Sunteți pe pagina 1din 439

On TheIr Own Terms: A LexIcon wIth an On TheIr Own Terms: A LexIcon wIth an On TheIr Own Terms: A LexIcon wIth

th an On TheIr Own Terms: A LexIcon wIth an


EmphasIs on nIormatIon EmphasIs on nIormatIon EmphasIs on nIormatIon EmphasIs on nIormatIon- -- -ReIated Terms ReIated Terms ReIated Terms ReIated Terms
Produced by the U.S. FederaI Covernment Produced by the U.S. FederaI Covernment Produced by the U.S. FederaI Covernment Produced by the U.S. FederaI Covernment

4 44 4
th th th th
edItIon, revIsed edItIon, revIsed edItIon, revIsed edItIon, revIsed
August, 2010 August, 2010 August, 2010 August, 2010

Susan L. Maret Ph.D. Susan L. Maret Ph.D. Susan L. Maret Ph.D. Susan L. Maret Ph.D.
Notes on the 4 Notes on the 4 Notes on the 4 Notes on the 4
th th th th
edItIon...........1 edItIon...........1 edItIon...........1 edItIon...........1
ntroductIon................2 ntroductIon................2 ntroductIon................2 ntroductIon................2

How to CIte th How to CIte th How to CIte th How to CIte thIs Work..........17 Is Work..........17 Is Work..........17 Is Work..........17
CreatIve Commons LIcense.........17 CreatIve Commons LIcense.........17 CreatIve Commons LIcense.........17 CreatIve Commons LIcense.........17
Contact nIormatIon.............17 Contact nIormatIon.............17 Contact nIormatIon.............17 Contact nIormatIon.............17
Terms ndex..............17 Terms ndex..............17 Terms ndex..............17 Terms ndex..............17- -- -35 35 35 35
Terms A Terms A Terms A Terms A- -- -Z.............35 Z.............35 Z.............35 Z.............35- -- -439 439 439 439
Notes on the 4 Notes on the 4 Notes on the 4 Notes on the 4
th th th th
edItIon edItIon edItIon edItIon
SInce the IIrst edItIon In 2005, On TheIr on Terms has reported Ianguage that reIIects
the scope oI U.S. InIormatIon poIIcy. Now In Its Iourth edItIon, the LexIcon Ieatures new terms
that Iurther chronIcIe the IederaI narratIve oI InIormatIon and Its reIatIonshIp to natIonaI
securIty, InteIIIgence operatIons, and Ireedom oI InIormatIon, prIvacy, technoIogy, and
surveIIIance as weII as types oI war, InstItutIonaIIzed secrecy, and censorshIp. ThIs Iourth
edItIon aIso IIsts InIormatIon terms oI note that arIse Irom popuIar cuIture and the schoIarIy
IIterature.
ThIs Iourth edItIon oI the LexIcon emphasIzes the hIstorIcaI aspects oI U.S. InIormatIon
poIIcy and assocIated programs In that It Is a testament to the InIormatIon poIItIcs oI the 8ush-
Cheney years; there Is aIso a Iook back to hIstorIcaI agency recordkeepIng practIces such as the
U.S. Army's computerIzed personaIItIes database, serendIpItousIy dIscovered In a 1972
congressIonaI hearIng on mIIItary surveIIIance oI cIvIIIans
1
and the 1970s DoD program Project
CameIot, whIch has paraIIeIs wIth Project MInerva eIIorts to recruIt academIcs.
2
ncIudIng these

1
Does CFA (the CounterInteIIIgence FIeId ActIvIty) have roots In the Army's CounterInteIIIgence Records
nIormatIon System (CRS), aIso caIIed the Fort Monroe Data 8ankZ OrTaIonZ Ieave It to FOA researchers
and hIstorIans to answer these questIons; see Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs,
avaIIabIe at The Memory HoIe, http:]]www.thememoryhoIe.org]2009]05]army-surveIIIance] and UncIe
Sam Is WatchIng You: HIghIIghts Irom the HearIngs oI the Senate SubcommIttee on ConstItutIonaI RIghts
(WashIngton: PubIIc AIIaIrs Press, 1971).
2
For addItIonaI dIscussIon oI the roIe oI academIa and the mIIItary and unIversIty as "hypermodern
mIIItarIzed knowIedge Iactory," see ]ohn ArmItage, "8eyond Hypermodern MIIItarIzed KnowIedge
FactorIes," RevIew oI EducatIon, Pedagogy, and CuIturaI StudIes 27 (2005):219-239 and Henry A. CIroux's






2
programs aIongsIde contemporary IederaI InIormatIon InItIatIves and pubIIc poIIcy crItIques
Iurthers the "hIstory oI 'govermentaIIty,' " an InquIry put Iorth by MIcheI FoucauIt (1994,1978:
219-222) that examInes the "ensembIe Iormed by the InstItutIons, procedures, anaIyses, and
reIIectIons, the caIcuIatIons and tactIcs that aIIow the exercIse oI thIs very specIIIc aIbeIt
compIex Iorm oI power." ThIs Iatter thought suggests an actIve, geneaIogIcaI roIe Ior FOA
researchers, archIvIsts, hIstorIans, InIormatIon proIessIonaIs, and pubIIc Interest groups In not
onIy rescuIng Iost hIstorIes but IntegratIng IIndIngs Into exIstIng understandIng oI IederaI
InIormatIon practIces.
Throughout the LexIcon, IInks have been verIIIed and repIaced. However, In certaIn
Instances, Web pages and documents have been removed by the IssuIng IederaI agency.
ConsIderIng the hIstorIcaI and archIvaI Importance oI thIs InIormatIon, IInks to the orIgInaI
source at the Wayback MachIne Is IncIuded.

ntroductIo ntroductIo ntroductIo ntroductIon n n n

On TheIr Own Terms Is a IexIcon oI InIormatIon-rIch terms created by the U.S.
IegIsIatIve, reguIatory, and poIIcy process, and routInIzed by varIous branches oI the U.S.
government. These terms represent a vIrtuaI seed cataIog to IederaI InIormatIonaIIy-drIven
procedures, poIIcIes, and practIces InvoIvIng among other matters, the InIormatIon IIIe cycIe,
record keepIng, ownershIp over InIormatIon, coIIectIon and anaIysIs oI InteIIIgence InIormatIon,
securIty cIassIIIcatIon categorIes and markIngs, censorshIp, cItIzen rIght-to-know, deceptIon,
propaganda, secrecy, technoIogy, surveIIIance, threat, natIonaI securIty, Iorms oI warIare, and
a myrIad oI assocIated ways oI controIIIng InIormatIon.
The abundance oI IederaIIy produced InIormatIon terms as reported In the LexIcon
IIIustrates the sheer weIght that rests on IederaI agencIes In grappIIng wIth every aspect oI
InIormatIon: communIcatIon, controI, IntegrIty, management, organIzatIon, preservatIon,
productIon, and securIty. LexIcon terms reIIect the roIe IederaI agencIes pIay In constructIng a
somewhat standardIzed, specIaIIzed Ianguage that orchestrates government poIIcIes and
communIcates natIonaI and InternatIonaI Interests among IeIIow agencIes, wIth Congress, the

The UnIversIty In ChaIns: ConIrontIng the MIIItary-ndustrIaI-AcademIc CompIex (8ouIder, CO: ParadIgm
PubIIshers, 2007).






3
pubIIc, and the InternatIonaI communIty. For exampIe, In speakIng oI the specIaIIzed
Ianguage oI the AIr Force Space Command (AFSPC), Lt. CoI. Dana FIood (2008: 31) notes:

"n the quarter-century oI Its exIstence, AFSPC has, IIke aII Iarge organIzatIons, evoIved
over tIme to deveIop Its own Ianguage, jargon, and termInoIogy. UnIortunateIy, by
accIdent, IunctIon, or desIgn, AFSPC was IargeIy a separate entIty Irom the rest oI the AIr
Force. Thus, IIke an IsoIated cuIture on a remote IsIand, AFSPC's Ianguage deveIoped to
a poInt that It became a separate dIaIect, sometImes IncomprehensIbIe to the parent AIr
Force cuIture."

WhIIe Ianguage provIdes a group the means to IdentIIy wIthIn a gIven cuIture or poIItIcaI
entIty (MueIIer 1973: 18), theorIsts such as DavId ]ohn Farmer (1995:1) cIaIm that Ianguage Is
"more than a tooI Ior thInkIng, Ior conceIvIng and communIcatIng thoughts;" It Is aIso a "Iactory
oI Ideas, approaches, IntuItIons, assumptIons, and urges" that mIrrors and shapes the IIIeworId.
n addItIon to "sanctIIyIng actIon" (EdeIman 1964: 114), ]ean-]acques LecercIe (1999:47)
observes that Ianguage Is not a "sImpIe representatIon" oI the worId, but an InterventIon wIthIn
It. LecercIe wrItes that "words do not onIy do thIngs, they are thIngs."
8ut In hIs "CIossary oI DIspossessIon," wrIter PauI de RooIj remInds us that "words are
very Important. Words Irame Issues, paIIIate, moIIIIy, excuIpate or even hIde sordId acts." Many
terms reported In the LexIcon meet de RooIj's descrIptIon, representIng a IederaI Ianguage oI
controI that oIten downpIays the sIgnIIIcance oI government actIons, poIIcIes, and programs.
3

"FIrstIruIts," "NatIonaI CensorshIp," "PubIIc DIpIomacy," and "RendItIon," couch questIonabIe
poIIcIes and practIces, and serve to IegItImate authorIty, controI over InIormatIon, and pubIIc

3
Deborah Tannen (1998: 14) cItes DwIght 8oIInger's work In makIng the poInt that "Ianguage Is IIke a
Ioaded gun." Tannen observes the "terms In whIch we taIk about somethIng shape the way we thInk about
It - even what we see."






4
awareness oI agency actIons. DescrIbed by CIaus MueIIer (1973:24)
4
as "dIstortIon" because
"condItIons and poIIcIes are quIte dIIIerent Irom theIr meanIngs," many LexIcon terms
constItute a poIItIcaI Ianguage that "Is desIgned to make IIes sound truthIuI and murder
respectabIe and to gIve an appearance oI soIIdIty to pure wInd" (OrweII 1950:92). Another way
oI vIewIng thIs Is that "Ianguage oIten masks admInIstratIve evII" (Adams and 8aIIour 1998:15).
5


nIormatIon Terms as 8ureaucratIc Voc nIormatIon Terms as 8ureaucratIc Voc nIormatIon Terms as 8ureaucratIc Voc nIormatIon Terms as 8ureaucratIc VocabuIary: A RevIew abuIary: A RevIew abuIary: A RevIew abuIary: A RevIew
Robert P. Watson (1998:389) observes "despIte the wIdespread use oI bureaucratese,
there has been InsuIIIcIent research devoted to the study oI the Ianguage oI bureaucracy, and
IIttIe Is known about Its eIIect." SrIkant SarangI and SteIan SIembrouck (1996:7) go Iurther,
questIonIng II the Ianguage oI bureaucracy Is a [sIc specIaIIzed] Ianguage used In bureaucratIc
settIngs, or II Is It Ianguage used In a partIcuIar way. n response to Watson, SarangI and
SIembrouck, pose that LexIcon terms comprIse a specIaIIzed, evoIvIng Ianguage that Is created
and empIoyed across bureaucratIc
6
settIngs by IederaI agencIes, whIch shouId reaIIy be thought
oI as "InIormatIon socIetIes."
7
WIth orIgIns In Iaw, reguIatIon, terrItory, customary practIces

4
MueIIer powerIuIIy IIIustrates hIs concept oI dIstortIon by oIIerIng exampIes oI "reIormuIated Ianguage,"
Irom the Meyers LexIcon pubIIshed In the WeImar RepubIIc In 1924, under NatIonaI SocIaIIst Cermany In
1936, as Language ReguIatIons Issued by the OIIIce oI the Press (ReIchspressant).
5
For exampIe, the CentraI nteIIIgence Agency's term "extraordInary rendItIon," Ia term that masks the
chIIIIng dImensIons oI "outsourcIng" torture and human rIghts vIoIatIons, brIngs to mInd Ceorge OrweII's
thought Irom hIs essay "PoIItIcs and the EngIIsh Language": "In our tIme, poIItIcaI speech and wrItIng are
IargeIy the deIense oI the IndeIensIbIe." See Essays, edIted and Introduced by ]ohn Carey (New York: AIIred
A. KnopI, 2002).
6
8ureaucracy as used In thIs work IoIIows Max Weber's (1958: 196-198) descrIptIon oI "IdeaI"
bureaucracy. That Is, actIvIty, authorIty, and the IuIIIIIment oI dutIes are dIstrIbuted In a IIxed way to
constItute bureaucratIc authorIty. ThIs system Is Iound In aII bureaucratIc structures as weII as Iarge party
organIzatIons and In management oI the modern oIIIce, or bureau, whIch Is based upon wrItten
documents ("the IIIes").
7
DeIInItIons oI InIormatIon socIety IncIude: spectacuIar technoIogIcaI InnovatIon; InvoIvement In
knowIedge productIon, new knowIedge; reIIance on those workers skIIIed In InIormatIon handIIng and






5
(reIIcs or habIts
8
), power, "hIdden arrangements" (Sjoberg, Vaughn and WIIIIams, 1984:446),
and ratIonaI IegaI authorIty, these terms communIcate and dIrect government poIIcy across
agencIes, to the Congress, and the pubIIc. The terms IIsted In thIs work, whIch Iorm the
"Ianguage oI bureaucracy," permeate every aspect oI the IederaI InIormatIon system. At tImes,
thIs system aIIronts cItIzen and congressIonaI understandIng oI IederaI InIormatIon practIces,
and has serIous consequences Ior what ]ames RusseII WIggens has outIIned as the rIght-to-
know.
9

A revIew oI the socIoIogIcaI, IegaI, poIIcy, and poIItIcaI scIence IIterature Is heIpIuI In
posItIonIng the probIem oI Ianguage In bureaucracy as a crItIcaI research probIem:
10


n generaI, the Ianguage oI bureaucracy can be thought oI as technIque. Robert Merton
(1964: vI) wrItes In the Ioreword to ]acques EIIuI's The TechnoIogIcaI SocIety that
technIque Is "any compIex oI standardIzed means Ior attaInIng a predetermIned resuIt."
WIth Its contrIbutIon to precIsIon, standardIzatIon oI oIIIce practIces and eIIIcIency oI
transactIons, especIaIIy reIated to InIormatIon handIIng and InIormatIon dIstrIbutIon, the
InIormatIon-Iaden Ianguage oI IederaI InIormatIon socIetIes sureIy quaIIIIes as
technIque.


technoIogy; spatIaI consIderatIons whereIn InIormatIon networks, computer and communIcatIons
technoIogIes provIde InIrastructure Ior monItorIng]governIng; cuIturaI acceptance and response to
government InIormatIon-saturated envIronments (Ior exampIe, e-government, "dIgItaI governance," e-
permIttIng, e-IIIIng oI taxes, etc.). 8ased In part on Webster (1995:6-23) and Weber, who 8enIger
(1986:6) beIIeves was the IIrst socIaI scIentIst to see bureaucracy as a type oI "crItIcaI new machInery."
8
See Anthony CIddens (1994: 101).
9
WIggens beIIeves "the peopIe's rIght to know Is reaIIy a composIte oI severaI rIghts: t has at Ieast IIve
broad, dIscernIbIe components: 1. the rIght to get InIormatIon; 2. the rIght to prInt wIthout prIor restraInt;
3. the rIght to prInt wIthout Iear oI reprIsaI not under due process; 4. the rIght oI access to IacIIItIes and
materIaI essentIaI to communIcatIon; and 5. the rIght to dIstrIbute InIormatIon wIthout InterIerence by
government actIng under Iaw or by cItIzens actIng In deIIance oI the Iaw." See Freedom or SecrecyZ (New
York: OxIord UnIversIty Press,1956). 3-4.
10
Denhardt (1981: 632) caIIs Ior a "crItIcaI theory oI pubIIc organIzatIons" that wouId "(1) examIne the
technIcaI basIs oI bureaucratIc domInatIon and the IdeoIogIcaI justIIIcatIons justIIIcatIons Ior thIs condItIon
and (2) ask In what ways members and cIIents oI pubIIc bureaucracIes mIght better understand the
resuItant IImItatIons pIaced upon theIr actIons and, In turn, deveIop new modes oI admInIstratIve praxIs."






6
Max Weber's work In Economy and SocIety, whIch Iends ItseII to the notIon put Iorth In
thIs work that Ianguage reIIects the quaIItIes oI the oIIIce, or bureau, specIIIcaIIy the
"technIcaI superIorIty" oI the bureaucracy as a Iorm oI human organIzatIon wIth goaIs oI
admInIstratIve precIsIon, eIIIcIency, and certaInty. The two pIIIars oI government,
wrItten Iaws and budget, requIre the mergIng oI the IIIes
11
by hIghIy skIIIed bureaucrats
who have the technIcaI knowIedge and skIIIs to navIgate the admInIstratIve Iandscape
(Weber 1958: 196).
12


Perrow, ReIss and WIIensky (1979:26) beIIeve organIzatIons deveIop a set oI concepts
InIIuenced by a technIcaI vocabuIary, whIch IncIude cIassIIIcatIon schemes that permIt
ease oI communIcatIon wIthIn IeveIs oI the bureaucratIc structure. AnythIng that does
not IIt Into these "set" concepts, or proceduraI Ianguage, Is not easIIy communIcated.

CIaus MueIIer (1973:14-15,18) theorIzes that Ianguage acts as a "cuIturaI and poIItIcaI
guIdance system Into whIch vaIues handed down Irom the past" that "enabIes" group
IdentIty, poIItIcaI stabIIIty, cohesIon oI vaIues, and unIIIcatIon oI Interests. ExtendIng
MueIIer's Idea to LexIcon, It Is posIted that bureaucratIc and agency specIIIc Ianguage,
aIong wIth conveyIng IegaI dIrectIve Ior actIon and poIIcy, reIIects the cuIturaI herItage
oI IederaI agencIes, such as member agencIes oI the nteIIIgence CommunIty and
Department oI DeIense.
13


n part, bureaucratIc Ianguages are based In ruIemakIng and the Iaw. As KarI OIIvecrona
(1971: 254) wrItes, IegaI Ianguage Is a "dIrectIve Ianguage" that Is used Ior conveyIng
InIormatIon. argue that dIrectIve (codIIIed) Ianguage as reported In thIs work aIso acts

11
For the purposes oI thIs work, thInk InIormatIon and Its transmIssIon occurrIng In aII Iormats,
IncarnatIons and states, not onIy Its physIcaIIty as represented In WeberIan paperbound IIIes.
12
Robert Denhardt (1981:629) wrItes whIIe Weber "saw bureaucratIc structures as the most ratIonaI way oI
organIzIng to attaIn socIaI ends, he descrIbed the IncreasIng dependence on such structures as the
"ratIonaIIzatIon" oI socIety. LackIng Marx's dIaIectIcaI perspectIve, Weber saw thIs deveIopment not onIy as
Iunc-tIonaI but aIso as naturaI and InevItabIe, IeadIng socIety In-to an "Iron cage" In whIch Ireedom and
IndIvIduaIIty wouId be severeIy IImIted. CurIousIy, whIIe attemptIng to document thIs threat, Weber may
have ImpIIcItIy provIded a source oI IegItImatIon Ior the IncreasIng bureaucratIza-tIon oI socIety."
13
See ]an CoIdman's Words oI nteIIIgence: A DIctIonary [Scarecrow Press, 2006] and Rob ]ohnston's
"dIsIavored" pubIIcatIon puIIed Irom the CA websIte In earIy 2006 AnaIytIc CuIture In the U.S. nteIIIgence
CommunIty: An EthnographIc Study, [WashIngton, D.C., CentraI nteIIIgence Agency, 2005], onIIne at FAS
[oI course!] http:]]www.Ias.org]sgp]news]secrecy]2006]04]042806.htmI






7
to InstItutIonaIIze specIIIc categorIes oI InIormatIon, InIormatIon-handIIng practIces,
14

Iorms oI censorshIp, InIormatIon gatherIng, thus InIIuencIng InIormatIon restrIctIon
and quaIIty, IncIudIng that oI secretIng and dIstortIng InIormatIon.

n addItIon to conveyIng InIormatIon about the admInIstratIve aspects oI government,
bureaucratIc Ianguage aIso bestows authorIty over ownershIp oI InIormatIon to IndIvIduaI
agencIes, extendIng property rIghts over oI InIormatIon productIon, access, and dIssemInatIon
oI seIect types oI InIormatIon. The term InIormatIon owner, "an oIIIcIaI wIth statutory or
operatIonaI authorIty Ior specIIIed InIormatIon and responsIbIIIty Ior estabIIshIng the controIs
Ior Its generatIon, coIIectIon, processIng, dIssemInatIon, and dIsposaI" (CommIttee Ior NatIonaI
SecurIty Systems 2003), Is one such term that supports the Idea oI InIormatIon as agency
property wIth IntrInsIc rIghts In controIIIng access to InIormatIon.
n addItIon, contrastIng EO 13292 wIth the OIIIce oI Management and 8udget's deIInItIon oI
InIormatIon as "any communIcatIon or representatIon oI knowIedge such as Iacts, data or
opInIons In any medIum or Iorm, IncIudIng textuaI, numerIcaI, graphIc, cartographIc, narratIve
or audIovIsuaI,"
15
creates dIssonance that InvoIves IederaIIy competIng notIons oI pubIIc
InIormatIon.
aIso suggest the Ianguage oI the bureaucracy Is perhaps tIed to the rIse oI
governmentaIIty, whIch MIcheI FoucauIt (1994:220-221) deIInes as a compIex process
occurrIng prImarIIy In countrIes oI the West,

".transIormed Into the admInIstratIve state durIng the IIIteenth and sIxteenth centurIes
and graduaIIy became 'governmentaIIzed,' " Into an "ensembIe Iormed by the
InstItutIons, procedures, [sIc, Ianguage and dIscourse] anaIyses, and reIIectIons, [whIch
IncIude] the caIcuIatIons and tactIcs that aIIow exercIse oI a very specIIIc aIbeIt compIex
Iorm oI power. "

FoIIowIng MIcheI FoucauIt's work In dIscourse anaIysIs, Dryzek (2005:9) wrItes that
dIscourse Is "a shared way oI apprehendIng the worId." DIscourses are "embedded In
Ianguage," and enabIe those who "subscrIbe to It Interpret bIts oI InIormatIon and put
them Into coherent storIes or accounts." DIscourses aIIow Ior the constructIon oI
"meanIng, and reIatIonshIps, and deIIne IegItImate knowIedge," and rest on
"assumptIons, judgments, and contentIons that provIde the basIc terms Ior anaIysIs,

14
8y "InIormatIon handIIng practIces," IncIude the mechanIcaI aspects oI InIormatIon processIng,
preservatIon, access, IIIe cycIe, cIassIIIcatIon, and so on, as weII as reguIatory, and determInatIve Ianguage
acts.
15
CIrcuIar No. A-130, "Management oI FederaI nIormatIon Resources." February 8, 1996,
http:]]www.whItehouse.gov]omb]cIrcuIars]a130]a130.htmI






8
debates, agreements and dIsagreements." We mIght then ask II the InIormatIon-Iaden
Ianguage oI IederaI agencIes quaIIIIes as dIscourseZ
ReIIectIng PIerre 8ourdIeu's (1991:45) Idea that Ianguage Is bound to the state, and
"Imposes ItseII on the whoIe popuIatIon as the onIy IegItImate Ianguage," terms reported
In the LexIcon dIrect and reguIate the aIIaIrs oI government and moderate
understandIng oI poIIcy across aII spheres oI InIIuence.
At It most eIementaI IeveI, It can be conjectured the Ianguage oI bureaucracy Is
communIcatIve actIon, or "that Iorm oI socIaI InteractIon In whIch the pIans oI actIon oI
dIIIerent actors are coordInated through an exchange oI communIcatIve acts, that Is,
through a use oI Ianguage orIentated towards reachIng understandIng" (Habermas
1981:44).

Postmodern (PM) expressIon permeates the IederaI InIormatIon machIne, most notabIy
represented by the Ianguage created by the U.S. mIIItary and InteIIIgence communIty
(C). For these entItIes, InIormatIon acts:

".as a weapon, as a myth, as a metaphor, as a Iorce muItIpIIer, as an edge, as a
trope, as a Iactor, as an asset, InIormatIon (and Its handmaIden-computers to
process It, muItImedIa to spread It, systems to represent It) has become the
centraI sIgn oI postmodernIty." (Cray 1997:22)
16


Postmodern IederaI Ianguage reIIects the muItIIarIous nature oI InIormatIon actIvItIes, IncIudIng
the rIse oI the "new gIobaI optIcs" oI surveIIIance and spyIng (VIrIIIo 2000:61). nIormatIon
gathered Irom a IabyrInthIne amount oI eIectronIc devIces and teIecommunIcatIon sources Is
re-patterned Irom InteIIIgence, surveIIIance, and IorecastIng tooIs Into a type oI Postmodern
War, or WIsdom WarIare.
17
ProvocatIve terms such as the Department oI the Army's

16
PostmodernIty (PM) Is a controversIaI notIon; Ior exampIe, ]ean-FrancoIs Lyotard's deIInItIon oI PM as
the "IncreduIIty toward metanarratIves" embodIes the Idea oI the IusIon oI the seII and personaI IIIe wIth
"reIatIons oI tIme-space" (CIddens 1994: p. 59). We are caught up In "everyday experIments" whose
outcomes are as open as those aIIectIng humanIty as a whoIe - these experIments shouId be seen as the
"dIspIacement and reapproprIatIon oI expertIse under the Impact oI the IntrusIveness" oI abstract
technoIogIcaI systems (CIddens 1994: 59-60).
17
See DavId Lyons' varIous works, especIaIIy SurveIIIance aIter September 11 (PoIIty; MaIden, MA , 2003);
ChrIstopher Dandeker's SurveIIIance, Power, and ModernIty : 8ureaucracy and DIscIpIIne Irom 1700 to the
Present Day (New York: St. MartIn's Press, 1990); ]ay StanIey and 8arry SteInhardt's 8Igger Monster,
Weaker ChaIns : the Crowth oI an AmerIcan SurveIIIance SocIety. (New York, NY : AmerIcan CIvII LIbertIes
UnIon, 2003), http:]]www.acIu.org]FIIes]OpenFIIe.cImZId=11572.






9
nIormatIon FratrIcIde suggests a IInk to OrweII's 1984; and the U.S. AIr Force Modus OperandI
Database Is remInIscent oI PhIIIp K. DIck's MInorIty Report's anaIytIcaI machInery "recordIng
prophecIes.careIuIIy" IIstenIng.

The ReguIatory and Statutory 8asIs oI FederaI Language The ReguIatory and Statutory 8asIs oI FederaI Language The ReguIatory and Statutory 8asIs oI FederaI Language The ReguIatory and Statutory 8asIs oI FederaI Language
HaroId C. ReIyea (2005:1-2) reports the HousekeepIng Statute oI 1789, codIIIed In
1875, and aIso known as 5 U.S.C. 22,
18
authorIzed IederaI department heads to "prescrIbe
reguIatIons regardIng custody, use, and preservatIon oI records, papers, and the property oI
theIr entIty."
19
U.S. Iaws such as the AdmInIstratIve Procedure Act, the AtomIc Energy Act oI

18
Now codIIIed as TItIe 5 > Part > Chapter 3 > 301.
19
See AmendIng SectIon 161 oI the RevIsed Statutes wIth Respect to the AuthorIty oI FederaI OIIIcers and
AgencIes to WIthhoId nIormatIon and LImIt the AvaIIabIIIty oI Records. [85
th
Congress, 2d SessIon. H.R.
Rep. No. 85-1461 to accompany H.R. 2767. (March 6, 1958). SerIaI Set no. 12072, "House MIsceIIaneous
Reports on PubIIc 8IIIs "]. The housekeepIng statute was "enacted to heIp CeneraI WashIngton get hIs
admInIstratIon underway by speIIIng out the authorIty Ior executIve oIIIcIaIs to set up oIIIces and IIIe
government documents.the statute has been cIted as authorIty to reIuse InIormatIon...but conceaIment
has been the resuIt oI the appIIcatIon oI 5 to an area where Congress has negIected to act over the years,
whIIe executIve oIIIcIaIs have Iet every IIIe cIerk become a censor" comments oI Mr. Dawson (1-2). The
report Is compeIIIng Ior Its debate chaIIengIng an unequIvocaI rIght to know; see CIare E. HoIIman's (24)
comments that totaI rIght to know wouId end any "conIIdentIaI exchange oI Ideas." AIso see AIso see AIso see AIso see AvaIIabIIIty oI
nIormatIon Irom FederaI Departments and AgencIes. [HearIngs beIore a subcommIttee oI the CommIttee
on Covernment OperatIons, House oI RepresentatIves, EIghty-Iourth Congress, IIrst sessIon-EIghty-IIIth
Congress, second sessIon. WashIngton, D.C.: U.S. Covernment PrIntIng OIIIce, 1958; Y4.C7:N3]],
especIaIIy Parts 11 and 14 testImony on the HousekeepIng Statute.
n addItIon, ]ohn ]. MItcheII's (1958:200) research on the "custody, use, and preservatIon"
Ianguage In the HousekeepIng Act Is InterestIng Ior Its InsIght Into the Intent oI the Act. MItcheII wrItes
that varIous deIInItIons are the same today as they were In 1789: "custody" denotes guardIng or
saIekeepIng; "use" InvoIves appIIcatIon or empIoyment; "preservatIon" ImpIIes protectIon Irom Injury or
destructIon. These deIInItIons do not justIIy any wIthhoIdIng or IImItIng oI the avaIIabIIIty oI records. The
substItutIon In the statute oI any word or phrase Irom any oI the above deIInItIons cannot conceIvabIy gIve
rIse to a rIght to wIthhoId InIormatIon or deny access to records. n Iact, the deIInItIons wouId ImpIy
avaIIabIIIty oI records, and that was the Intent oI Congress. MItcheII notes that aIthough secrecy and
cIaIms oI prIvIIege have been the resuIt oI the HousekeepIng Statute, "an exhaustIve search oI IegIsIatIve
hIstory reveaIs no Intent to provIde Ior secrecy or the wIthhoIdIng oI InIormatIon." MItcheII argues ".the
key words whIch have been so tortured are custody, use, and preservatIon." The deIInItIons oI these words
are the same today as they were In 1789: "custody denotes guardIng or saIekeepIng"; "use InvoIves
appIIcatIon or empIoyment"; "preservatIon ImpIIes protectIon Irom Injury or destructIon. These deIInItIons






10
1946 & 1954, the AntIterrorIsm and EIIectIve Death PenaIty Act oI 1996, the NatIonaI SecurIty
Act oI 1947, the CIassIIIed nIormatIon Procedures Act, the HomeIand SecurIty Act oI 2002, the
UnItIng and StrengthenIng AmerIca by ProvIdIng ApproprIate TooIs RequIred to ntercept and
Obstruct TerrorIsm (US PatrIot Act), and PresIdentIaI Records Act oI 1978 (44 U.S.C. 2201-
2207), aIong wIth agency reguIatIons, numerous PresIdentIaI DecIsIons DIrectIves, ExecutIve
Orders (EO), most notabIy 8381, 10104, 12356, 12958, 13292, and 13526, Memoranda, and
Freedom oI nIormatIon Act exemptIons enabIe agencIes to carve out InIormatIon poIIcy and
terrItory. ThIs compIex system oI Iaws and reguIatIons gIves rIse to specIaIIzed InIormatIon
categorIes, restrIctIons on InIormatIon, InIormatIon-handIIng practIces, and InIormatIon
poIIcIes, some IormaIIzed, some not, that uItImateIy determIne Interagency, pubIIc, and
congressIonaI access to InIormatIon.

The Secret SIde oI the Language The Secret SIde oI the Language The Secret SIde oI the Language The Secret SIde oI the Language


As much as thIs LexIcon Is an admInIstratIve-reguIatory dIctIonary oI InIormatIon terms,
It Is aIso a guIde to the Ianguage oI secrecy In that It pays homage to DanIeI PatrIck MoynIhan's
(1997) thought that two [InIormatIon] "regImes" exIst today In the UnIted States. The IIrst
regIme accordIng to MoynIhan, Is pubIIc reguIatIon Ior dIscIosure, dIscovery, and due process,
and Is under constant scrutIny. The second regIme Is "conceaIed wIthIn a vast bureaucratIc
compIex," whereIn "some congressIonaI oversIght may take pIace and some PresIdentIaI
controI." n thIs Iatter regIme, the pubIIc Is not excIuded aItogether, but the system Is Iraught

do not justIIy any wIthhoIdIng or IImItIng oI the avaIIabIIIty oI records. The substItutIon In the statute oI
any word or phrase Irom any oI the above deIInItIons cannot conceIvabIy gIve rIse to a rIght to wIthhoId
InIormatIon or deny access to records. n Iact, the deIInItIons wouId ImpIy avaIIabIIIty oI records, and that
was the Intent oI Congress."
20
For a deep revIew oI government secrecy, see Maret and CoIdman, Covernment Secrecy: CIassIc and
Contemporary ReadIngs. LIbrarIes UnIImIted, 2009.






11
wIth secrecy and "mIsadventure."
21
Secrecy, as supported by the muItItudInous cIassIIIcatIons,
desIgnatIons, and markIngs as IIsted In the LexIcon attest to the compIexIty oI the U.S. secrecy
system and the Ianguage that enabIes Its authorIty and power over InIormatIon. The Ianguage
oI secrecy can be thought oI as a Iorm oI jargon, where InIormatIon Is "repIaced wIth cIassIIIed,
whIch makes thIngs Iess conspIratorIaI and at the same tIme creates vIsIons oI busy, eIIIcIent
peopIe cIassIIyIng documents In a scIentIIIc way" (8oIInger 1980: 132).
Moreover, ambIguous InIormatIon securIty markIngs, or "pseudo-cIassIIIcatIons," many
deIIned here In the LexIcon, practIcaIIy serve as de Iacto IIrewaIIs preventIng InIormatIon access
and creatIng InIormatIon asymmetrIes Irom agency to agency, Congress, and cItIzens. t has
been suggested that pseudo-cIassIIIcatIons aIso have "persIstent and pernIcIous" eIIects on the
IIow oI threat InIormatIon.
22
n Its 2004 Report to the PresIdent, the nIormatIon SecurIty
OversIght OIIIce wrote:
LImItatIons on dIssemInatIon oI InIormatIon that are desIgned to deny InIormatIon to
the enemy on the battIeIIeId can Increase the rIsk that our own Iorces wIII be unaware oI
Important InIormatIon, contrIbutIng to the potentIaI Ior IrIendIy IIre IncIdents or other
IaIIures.

LIkewIse, ImposIng strIct compartmentaIIzatIon oI InIormatIon obtaIned Irom human
agents Increases the rIsk that a Covernment oIIIcIaI wIth access to other InIormatIon
that couId cast doubt on the reIIabIIIty oI the agent wouId not know oI the use oI that
agent's InIormatIon eIsewhere In the Covernment.

The NatIonaI CommIssIon on TerrorIst Attacks Upon the UnIted States noted that whIIe It
couId not state Ior certaIn that the sharIng oI InIormatIon wouId have succeeded In

21
From the CongressIonaI Record May 1, 1997.
22
Rep. ChrIstopher Shays, "EmergIng Threats: OvercIassIIIcatIon and Pseudo-CIassIIIcatIon." HearIng
beIore the SubcommIttee on NatIonaI SecurIty, EmergIng Threats, and nternatIonaI ReIatIons CommIttee
on Covernment ReIorm. House oI RepresentatIves, 109th Congress, FIrst SessIon, March 2, 2005,
http:]]www.Ias.org]sgp]congress]2005]030205overcIass.htmI






12
dIsruptIng the 9]11 pIot, It couId state that the IaIIure to share InIormatIon
contrIbuted to the government's IaIIure to Interrupt the pIot. SImpIy put, secrecy comes
at a prIce.
23


OrganIzatIon oI thIs Work OrganIzatIon oI thIs Work OrganIzatIon oI thIs Work OrganIzatIon oI thIs Work
For most entrIes, terms are dIrect quotes Irom U.S. government agency-produced
uncIassIIIed open sources and decIassIIIed InIormatIon avaIIabIe In prInt and on the Web.
Among other IederaI pubIIcatIons, the FederaI RegIster, Code oI FederaI ReguIatIons, and the
U.S. Code were consuIted In order to provIde addItIonaI vIews oI codIIIed InterpretatIons oI
InIormatIon Ianguage and InIormatIon-reIated actIvItIes. For government pubIIcatIons sources
avaIIabIe excIusIveIy In prInt, the SuDoc (SuperIntendent oI Documents) caII number Is IncIuded,
whereIn documents In prInt and mIcroIIche Iormat can be Iocated In government pubIIcatIons
sectIons oI most IIbrarIes.
24
deIIberateIy empIoyed an "In theIr own words" Iormat to
demonstrate Ianguage at work. n addItIon to these eIements, muItIpIe agency InterpretatIons
and deIInItIons are provIded to IIIustrate how agencIes have Interpreted, oIten wIdeIy, the same
ExecutIve Orders, pubIIc Iaws, reguIatIons, memoranda, and InternaI dIrectIves In devIsIng theIr
own agency-specIIIc InIormatIon Ianguage. ThIs scenarIo hoIds most true In the case oI
InIormatIon securIty-reIated terms. As the ]oInt SecurIty CommIssIon (1994) reports,

US Covernment securIty poIIcIes and practIces have evoIved In an ad hoc manner over
the Iast Iour decades. SecurIty poIIcy Is enuncIated In a coIIectIon oI documents
(ExecutIve Orders, NatIonaI SecurIty DecIsIon DIrectIves, NatIonaI SecurIty DIrectIves,
PresIdentIaI DecIsIon DIrectIves, IegIsIatIon, and IndIvIduaI department or agency

23
nIormatIon SecurIty OversIght OIIIce. 2004 Report to the PresIdent,
.http:]]www.archIves.gov]Isoo]reports]2004-annuaI-report.htmI
24
FederaI Web pages, Web sItes, and documents come and go. ThIs ephemeraI condItIon oI ImIormatIon
presents a chaIIenge In compIIIng the LexIcon. remaIn grateIuI to the FederatIon oI AmerIcan ScIentIsts
(FAS), NatIonaI SecurIty ArchIve (NSA), OM8 Watch, EPC, EFF, and the many pubIIc Interest groups that
preserve crItIcaI hIstorIcaI documents, and hence the pubIIc rIght to know.






13
dIrectIves and orders) prepared at dIIIerent tImes, by dIIIerent peopIe, In response to
dIIIerent requIrements and events, not as part oI a coherent pIanned eIIort.

Every eIIort was made to verIIy and accurateIy report orIgIns and sources oI terms. n
verIIyIng terms, especIaIIy the 8yzantIne terms arIsIng Irom the InteIIIgence communIty, hope
have cIeared up sIgnIIIcant probIems see wIth accurate InterpretatIon, hIstorIcaI context, and
cItatIon oI sources oIten IackIng In popuIar works and on Web sItes. LastIy, mIrrorIng CIIIes
DeIeuze's observatIon that "a concept sometImes needs a new word to express It, sometImes It
uses an everyday word that gIves It a sInguIar sense," IncIuded are terms Irom my research that
hope Iurther eIucIdates InIormatIon categorIes and concepts not weII represented In the
schoIarIy IIterature.
25

PractIcaIIy speakIng, the LexIcon Is Intended Ior use by cItIzens, students, and
researchers who struggIe to understand the compIex Ianguage oI the IederaI InIormatIon
machIne. The LexIcon Is aIso geared to those IndIvIduaIs who, In usIng the Freedom oI
nIormatIon Act (FOA) to request government InIormatIon, may be unIamIIIar wIth specIIIc
hIstory or terms reIated to IIIes, records, and the more occuIt areas oI securIty cIassIIIcatIon and
markIngs.
26

To thIs end, It Is my hope the LexIcon contrIbutes to Iurther understandIng oI the roIe oI
Ianguage and Its InIIuence on access to government InIormatIon, encouragIng cItIzens and
researchers aIIke to Iook beyond the oIten embIematIc Ianguage oI bureaucracy to the essence
oI words and actIons, and theIr reIatIonshIp wIth dIrect democracy.




25
Such as nucIear secrecy, thIs work.
26
ObvIousIy thIs guIde Is not desIgned Ior certaIn members oI the C who have a very dIIIerent
understandIng oI the proceduraI and IegaI aspects oI handIIng cIassIIIed, and potentIaIIy sensItIve
InIormatIon, and may IInd certaIn aspects oI thIs work sImpIIstIc. ThIs work Is Ior the rest oI us.






14
Works CIte Works CIte Works CIte Works CIted d d d

Adams, Cuy 8., and Danny L. 8aIIour. UnmaskIng AdmInIstratIve EvII. Thousand Oaks, CA: Sage
PubIIcatIons, 1998.
8enIger, ]ames R. The ControI RevoIutIon: TechnoIogIcaI and EconomIc OrIgIns oI the nIormatIon SocIety.
CambrIdge, MA: Harvard UnIversIty Press, 1986.
8IIIIg, MIchaeI. "CrItIcaI dIscourse anaIysIs and the rhetorIc oI crItIque." Ed. CIIbert WeIss and Ruth Wodak.
CrItIcaI DIscourse AnaIysIs: Theory and nterdIscIpIInarIty. New York: PaIgrave MacmIIIan, 2003.
35-46.
8oIInger, DwIght. Language, the Loaded Weapon. New York: Longman Croup, 1980.
8ourdIeu, PIerre. Language and SymboIIc Power. Ed. ]ohn 8. Thompson. Trans. CIno Raymond and
Matthew Adamson. CambrIdge, MA: Harvard UnIversIty Press, 1991.
Denhardt, Robert. "Toward a crItIcaI theory oI pubIIc organIzatIon." PubIIc AdmInIstratIon RevIew 41, No. 6
(Nov. - Dec., 1981): 628-635.
DIck, PhIIIp K. The MInorIty Report. New York, NY: CaroI PubIIshIng Croup, 1991.
De Rooj, PauI. "A CIossary oI DIspossessIon." DIssIdent VoIce (2 ]anuary 2006). 1 ]une 2009
<http:]]www.dIssIdentvoIce.org>.
Dryzek, ]ohn S. The PoIItIcs oI the Earth: EnvIronmentaI DIscourses. New York: OxIord UnIversIty Press,
2005.
Edwards, PauI N. The CIosed WorId: Computers and the PoIItIcs oI DIscourse In CoId War AmerIca.
CambrIdge: MT Press, 1996.
EdeIman, Murray ]. The SymboIIc Uses oI PoIItIcs. Urbana: UnIversIty oI IIInoIs Press, 1967.
EIIuI, ]acques. The TechnoIogIcaI SocIety. Trans. ]ohn WIIkInson. New York: AIIred KnopI, 1964.
Farmer, DavId ]ohn. The Language oI PubIIc AdmInIstratIon: 8ureaucracy, ModernIty, and PostmodernIty. .. .
TuscaIoosa: UnIversIty oI AIabama Press, 1995.
FoucauIt, MIcheI. DIscIpIIne and PunIsh: The 8Irth oI the PrIson. Trans. AIan SherIdan, New York: VIntage
8ooks, 1995.
. "CovernmentaIIty." Power: The EssentIaI Works oI FoucauIt 1954-1984. VoIume 3. Ed. ]ames D.
FaubIon. Trans. Robert HurIey. New York: The New Press, 1994.
. Language, Counter-Memory and PractIce: SeIected Essays and ntervIews. Ed. DonaId F.
8ouchard. Trans. DonaId 8ouchard & Sherry SImon. New York: CorneII UnIversIty Press, 1977.
. "Order oI DIscourse." SocIaI ScIence nIormatIon 10 no. 2 (1971): 7-30.
. Power]KnowIedge: SeIected ntervIews and Other WrItIngs, 1972-1977. Ed. and Trans. CoIIn
Cordon. New York: Pantheon 8ooks, 1980.
FIood, Dana. "Common Ianguage, common cuIture: how the space communIty must change Ianguage and
perspectIve to achIeve cross-domaIn IntegratIon and domInance." HIgh FrontIer 4 no. 4 (August
2008): 31-34. 1 ]une 2009 <http:]]www.aIspc.aI.mII]shared]medIa]document]AFD-080826
020.pdI>.
CIddens, Anthony. (1994). "LIvIng In a post-tradItIonaI socIety." Ed. UIrIch 8eck, Anthony CIddens and
Scott Lash. ReIIexIve ModernIzatIon: PoIItIcs, TradItIon and AesthetIcs In the Modern SocIaI Order.
StanIord: StanIord UnIversIty Press. 56-109.
. The NatIon-State and VIoIence. 8erkeIey: UnIversIty oI CaIIIornIa Press. 1987.






15
. PoIItIcs and SocIoIogy In the Thought oI Max Weber. London, MacmIIIan, 1972.
Cray, ChrIs HabIes. "PerpetuaI revoIutIon In mIIItary aIIaIrs, InternatIonaI securIty, and InIormatIon. " Ed.
Robert Latham. 8ombs and 8andwIdth: the EmergIng ReIatIonshIp between nIormatIon
TechnoIogy and SecurIty. New York: New Press, 2003. 199-214.
. Postmodern War: The New PoIItIcs oI ConIIIct. New York: CuIIIord Press, 1997.
Habermas, ]urgen. The Theory oI CommunIcatIve ActIon. Trans. Thomas McCarthy. 8oston: 8eacon Press,
1984-1987.
HarIey, ].8. "Maps, knowIedge and power." Ed. DenIs Cosgrove & Stephen DanIeIs. The conography oI
Landscape: Essays on the SymboIIc RepresentatIon, DesIgn, and Use oI Past EnvIronments. New
York: CambrIdge UnIversIty Press, 1988. 277- 311.
]oInt SecurIty CommIssIon. "RedeIInIng SecurIty: A Report to the Secretary oI DeIense and the DIrector oI
CentraI nteIIIgence." 28 February 1994. FederatIon oI AmerIcan ScIentIsts Web sIte. 1 ]une 2009
<http:]]www.Ias.org]sgp]IIbrary]jsc]>.
LakoII, Ceorge, and Mark ]ohnson. Metaphors We LIve 8y. ChIcago: UnIversIty oI ChIcago Press, 1980.
LecercIe, ]ean-]acques. The VIoIence oI Language. New York: RoutIedge, 1990.
Lutz, WIIIIam. DoubIespeak. New York: Harper & Row, 1989.
. The New DoubIespeak: Why No One Knows What Anyone's SayIng Anymore. New York:
HarperCoIIIns, 1996.
Lyotard, ]ean-FrancoIs. The Postmodern CondItIon: A Report on KnowIedge. Trans. CeoII 8ennIngton and
8rIan MassumI. MInneapoIIs: UnIversIty oI MInnesota Press, 1984.
MIIIs, C. WrIght. "Language, IogIc and cuIture." Ed. rvIng LouIs HorowItz. Power, PoIItIcs and PeopIe: The
CoIIected Essays oI C. WrIght MIIIs. New York: OxIord UnIversIty Press, 1963. 423-438.
. The Power EIIte. New York: OxIord UnIversIty Press, 1956.
MItcheII, ]ohn ]. "Covernment Secrecy In Theory and PractIce: 'RuIes and ReguIatIons' as an Autonomous
Screen." CoIumbIa Law RevIew 58 no. 2 (1958): 199-210.
MoynIhan, DanIeI. "Secrecy as Covernment ReguIatIon." CongressIonaI Record 1 May 1997. FederatIon oI
AmerIcan ScIentIsts Web sIte. 1 ]une 2009 <http:]]www.Ias.org]Irp]congress]1997cr]h970501
moynIhan.htm>.
MueIIer, CIaus. The PoIItIcs oI CommunIcatIon. New York, OxIord UnIversIty Press, 1973.
OIIvecrona, KarI. Law as Fact. London: Stevens, 1971.
OrweII, Ceorge. "PoIItIcs and the EngIIsh Ianguage." ShootIng an EIephant. New York: Harcourt 8race,
1950. 77-92.
Perrow, CharIes, AIbert ReIss, ]r., and HaroId L. WIIensky. CompIex OrganIzatIons: A CrItIcaI Essay. 3
rd
ed.
New York: McCraw-HIII, 1986.
RabInow, PauI. (Ed.). EssentIaI Works oI MIcheI FoucauIt, 1954-1984. New York: New Press, 2000.
ReIyea, HaroId. "Access to Covernment nIormatIon In the UnIted States." CRS Report to Congress 7
]anuary, 2005. FederatIon oI AmerIcan ScIentIsts Web sIte, ]une, 2009
<http:]]www.Ias.org]sgp]crs]97-71.pdI>.
SarangI, SrIkant, and SteIaan SIembrouck. Language, 8ureaucracy, and SocIaI ControI. Longman: New York,
1996.
Sjoberg, CIdeon, Ted R. Vaughan, and Norma WIIIIams. 8ureaucracy as MoraI ssue. ]ournaI oI AppIIed
8ehavIoraI ScIence 20 no. 4 (1984): 441-453.






16
Tannen, Deborah. The Argument CuIture: MovIng Irom Debate to DIaIogue. New York: Random House,
1998.
UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI RIghts.
Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs. 92
nd
Congress, second sessIon.
WashIngton, D.C.: U.S. Covernment PrIntIng OIIIce, 1972. The Memory HoIe. 1 ]une 2009
<http:]]www.thememoryhoIe.org]2009]05]army-surveIIIance]>.
VIrIIIo, PauI. The nIormatIon 8omb. Trans. ChrIs Turner. New York: Verso, 2000.
Watson, Robert D. "On the Ianguage oI bureaucracy: postmodernIsm, pIaIn EngIIsh, and WIttgensteIn." Ed.
Thomas D. Lynch & Todd ]. DIcker. Handbook oI OrganIzatIon Theory and Management: the
PhIIosophIcaI Approach. New York: M. Dekker, 1998. 389-413.
Weber, Max. Economy and SocIety: An OutIIne oI nterpretIve SocIoIogy. Trans. EphraIm FIschoII. Ed.
Cuenther Roth and CIaus WIttIch. 8erkeIey: UnIversIty oI CaIIIornIa Press, 1978.
. From Max Weber: Essays In SocIoIogy. Ed. and trans. H. H. Certh and C. WrIght MIIIs. New
York: OxIord UnIversIty Press, 1958.
Webster, Frank. TheorIes oI the nIormatIon SocIety. New York: RoutIedge, 1995.
WIggIns, ]ames RusseII. Freedom or SecrecyZ New York: OxIord UnIversIty Press, 1956.
WIttgensteIn, LudwIg. PhIIosophIcaI nvestIgatIons. Trans. C.E.M. Anscombe. New York: MacmIIIan, 1958.
WooIard, Kathryn A. "Language IdeoIogy as a IIeId oI InquIry." Ed. 8ambI 8. SchIeIIeIIn, Kathryn A.
WooIard, and PauI V. KroskrIty. Language deoIogIes: PractIce and Theory. New York: OxIord
UnIversIty Press, 1998. 3-47.
Yates, ]oanne. ControI through CommunIcatIon: The RIse oI System In AmerIcan Management. 8aItImore:
]ohns HopkIns UnIversIty Press, 1989.

~~~~ ~~~~ ~~~~ ~~~~






















17
CreatIve Commons LIcense CreatIve Commons LIcense CreatIve Commons LIcense CreatIve Commons LIcense
ThIs work Is IIcensed under the CreatIve Commons AttrIbutIon-NoDerIvs LIcense.
To vIew a copy oI thIs IIcense, vIsIt http:]]creatIvecommons.org]IIcenses]by-nd]3.0]
You are Iree:
To Share - to copy, dIstrIbute and transmIt thIs work under the IoIIowIng condItIons:
AttrIbutIon AttrIbutIon AttrIbutIon AttrIbutIon - You must attrIbute the work In the manner specIIIed by the author or
IIcensor (but not In any way that suggests that they endorse you or your use oI the
work).
No DerIvatIve Works No DerIvatIve Works No DerIvatIve Works No DerIvatIve Works - You may not aIter, transIorm, or buIId upon thIs work.


How to CIte ThIs Work How to CIte ThIs Work How to CIte ThIs Work How to CIte ThIs Work

Maret, Susan. On TheIr Own Terms: A LexIcon wIth an EmphasIs on nIormatIon-ReIated
Terms Produced by the U.S. FederaI Covernment. 4th edItIon, revIsed August 2010,
http:]]www.Ias.org]sgp]IIbrary]maret.pdI

Contact Contact Contact Contact
You can drop me a IIne at: IecoIogIe at yahoo.com



Thanks to aII the IoIks who voIunteered terms and oIIered advIce on IormattIng.
TERMS TERMS TERMS TERMS

100 Percen 100 Percen 100 Percen 100 Percent Shred PoIIcy, 34 t Shred PoIIcy, 34 t Shred PoIIcy, 34 t Shred PoIIcy, 34
199 data mInIng, 127 199 data mInIng, 127 199 data mInIng, 127 199 data mInIng, 127
201 FIIe, 34 201 FIIe, 34 201 FIIe, 34 201 FIIe, 34
25X, 75 25X, 75 25X, 75 25X, 75
25X 25X 25X 25X- -- -human, 75 human, 75 human, 75 human, 75
28 dIstInct poIIcIes Ior protectIon oI 28 dIstInct poIIcIes Ior protectIon oI 28 dIstInct poIIcIes Ior protectIon oI 28 dIstInct poIIcIes Ior protectIon oI
sensItIve uncIassIIIed InIormatIon, 380 sensItIve uncIassIIIed InIormatIon, 380 sensItIve uncIassIIIed InIormatIon, 380 sensItIve uncIassIIIed InIormatIon, 380
AbIe Danger, 34 AbIe Danger, 34 AbIe Danger, 34 AbIe Danger, 34
Access, 35 Access, 35 Access, 35 Access, 35
Access to CIassIIIed nIormatIon, 35 Access to CIassIIIed nIormatIon, 35 Access to CIassIIIed nIormatIon, 35 Access to CIassIIIed nIormatIon, 35
AccountabIIIty, 36 AccountabIIIty, 36 AccountabIIIty, 36 AccountabIIIty, 36
AccountabIIIty nIo AccountabIIIty nIo AccountabIIIty nIo AccountabIIIty nIormatIon, 36 rmatIon, 36 rmatIon, 36 rmatIon, 36
AcknowIedged SpecIaI Access Program, 36 AcknowIedged SpecIaI Access Program, 36 AcknowIedged SpecIaI Access Program, 36 AcknowIedged SpecIaI Access Program, 36
ActIonabIe MedIcaI nIormatIon RevIew, 36 ActIonabIe MedIcaI nIormatIon RevIew, 36 ActIonabIe MedIcaI nIormatIon RevIew, 36 ActIonabIe MedIcaI nIormatIon RevIew, 36
Advanced Research DeveIopment ActIvIty Advanced Research DeveIopment ActIvIty Advanced Research DeveIopment ActIvIty Advanced Research DeveIopment ActIvIty
(ARDA), 36, 291 (ARDA), 36, 291 (ARDA), 36, 291 (ARDA), 36, 291






18
Adverse nIormatIon, 37 Adverse nIormatIon, 37 Adverse nIormatIon, 37 Adverse nIormatIon, 37
ADVSE (AnaIysIs, DIssemInatIon, ADVSE (AnaIysIs, DIssemInatIon, ADVSE (AnaIysIs, DIssemInatIon, ADVSE (AnaIysIs, DIssemInatIon,
VIsuaIIzatIon, nsIght, and SemantIc VIsuaIIzatIon, nsIght, and SemantIc VIsuaIIzatIon, nsIght, and SemantIc VIsuaIIzatIon, nsIght, and SemantIc
Enhancement), Enhancement), Enhancement), Enhancement), 38 38 38 38
AdvIsory CommIttee on HIstorIcaI AdvIsory CommIttee on HIstorIcaI AdvIsory CommIttee on HIstorIcaI AdvIsory CommIttee on HIstorIcaI
DIpIomatIc DocumentatIon, 38, 165 DIpIomatIc DocumentatIon, 38, 165 DIpIomatIc DocumentatIon, 38, 165 DIpIomatIc DocumentatIon, 38, 165
AdvIsory SensItIvIty AttrIbutes, 39 AdvIsory SensItIvIty AttrIbutes, 39 AdvIsory SensItIvIty AttrIbutes, 39 AdvIsory SensItIvIty AttrIbutes, 39
AItergood v. NatIonaI ReconnaIssance AItergood v. NatIonaI ReconnaIssance AItergood v. NatIonaI ReconnaIssance AItergood v. NatIonaI ReconnaIssance
OIIIce OIIIce OIIIce OIIIce, , , , 299 299 299 299
Agency, 39 Agency, 39 Agency, 39 Agency, 39
AgencywIde Documents Access and AgencywIde Documents Access and AgencywIde Documents Access and AgencywIde Documents Access and
Management System (ADAMS), 40 Management System (ADAMS), 40 Management System (ADAMS), 40 Management System (ADAMS), 40
AgIIIty, 40 AgIIIty, 40 AgIIIty, 40 AgIIIty, 40
AgrIcuIturaI AgrIcuIturaI AgrIcuIturaI AgrIcuIturaI ChemIcaI Usage Reports, 40 ChemIcaI Usage Reports, 40 ChemIcaI Usage Reports, 40 ChemIcaI Usage Reports, 40
APAC, 151 APAC, 151 APAC, 151 APAC, 151
AII AII AII AII- -- -Source nteIIIgence, 41 Source nteIIIgence, 41 Source nteIIIgence, 41 Source nteIIIgence, 41
AIternatIve nIormatIon Leakage, 41 AIternatIve nIormatIon Leakage, 41 AIternatIve nIormatIon Leakage, 41 AIternatIve nIormatIon Leakage, 41
AIternatIve MedIa, 41 AIternatIve MedIa, 41 AIternatIve MedIa, 41 AIternatIve MedIa, 41

AIternatIve or Compensatory ControI AIternatIve or Compensatory ControI AIternatIve or Compensatory ControI AIternatIve or Compensatory ControI
Measures, 42 Measures, 42 Measures, 42 Measures, 42
AItIvore, 42 AItIvore, 42 AItIvore, 42 AItIvore, 42
AnaIysIs and ProductIon, 43 AnaIysIs and ProductIon, 43 AnaIysIs and ProductIon, 43 AnaIysIs and ProductIon, 43
AnaIyst Notebook 2, 43 AnaIyst Notebook 2, 43 AnaIyst Notebook 2, 43 AnaIyst Notebook 2, 43
AnomaIy, 43 AnomaIy, 43 AnomaIy, 43 AnomaIy, 43
AppII AppII AppII AppIIcatIon, 43 catIon, 43 catIon, 43 catIon, 43
Approved Ior PubIIc ReIease, 86 Approved Ior PubIIc ReIease, 86 Approved Ior PubIIc ReIease, 86 Approved Ior PubIIc ReIease, 86
ArchIvIng (Records), 44 ArchIvIng (Records), 44 ArchIvIng (Records), 44 ArchIvIng (Records), 44
Armed Forces CensorshIp, 44 Armed Forces CensorshIp, 44 Armed Forces CensorshIp, 44 Armed Forces CensorshIp, 44
AssassInatIon Record, 44 AssassInatIon Record, 44 AssassInatIon Record, 44 AssassInatIon Record, 44
AsymmetrIc AsymmetrIc nIormatIon AsymmetrIc AsymmetrIc nIormatIon AsymmetrIc AsymmetrIc nIormatIon AsymmetrIc AsymmetrIc nIormatIon
AsymmetrIes oI nIormatIon, 44 AsymmetrIes oI nIormatIon, 44 AsymmetrIes oI nIormatIon, 44 AsymmetrIes oI nIormatIon, 44
ATOMAL, 76 ATOMAL, 76 ATOMAL, 76 ATOMAL, 76
Attorney CeneraI HoIder's FOA Attorney CeneraI HoIder's FOA Attorney CeneraI HoIder's FOA Attorney CeneraI HoIder's FOA
CuIdeIInes CreatIng a 'New CuIdeIInes CreatIng a 'New CuIdeIInes CreatIng a 'New CuIdeIInes CreatIng a 'New Era oI Open Era oI Open Era oI Open Era oI Open
Covernment,', 167, 174 Covernment,', 167, 174 Covernment,', 167, 174 Covernment,', 167, 174
Attorney Work Product DoctrIne PrIvIIege, Attorney Work Product DoctrIne PrIvIIege, Attorney Work Product DoctrIne PrIvIIege, Attorney Work Product DoctrIne PrIvIIege,
327 327 327 327
Attorney Attorney Attorney Attorney- -- -CIIent PrIvIIege, 327 CIIent PrIvIIege, 327 CIIent PrIvIIege, 327 CIIent PrIvIIege, 327
AudIt PrIvIIege, 328 AudIt PrIvIIege, 328 AudIt PrIvIIege, 328 AudIt PrIvIIege, 328
AuthentIcatIon, 45 AuthentIcatIon, 45 AuthentIcatIon, 45 AuthentIcatIon, 45
AuthorIzed CIassIIIcatIon AuthorIzed CIassIIIcatIon AuthorIzed CIassIIIcatIon AuthorIzed CIassIIIcatIon and ControI and ControI and ControI and ControI
MarkIngs RegIster, MarkIngs RegIster, MarkIngs RegIster, MarkIngs RegIster, 89 89 89 89
AUTHORZED FOR RELEASE TO, 76 AUTHORZED FOR RELEASE TO, 76 AUTHORZED FOR RELEASE TO, 76 AUTHORZED FOR RELEASE TO, 76
Automated Ont Automated Ont Automated Ont Automated OntoIogIcaIIy 8ased LInk oIogIcaIIy 8ased LInk oIogIcaIIy 8ased LInk oIogIcaIIy 8ased LInk
AnaIysIs oI nternatIonaI Web Logs Ior the AnaIysIs oI nternatIonaI Web Logs Ior the AnaIysIs oI nternatIonaI Web Logs Ior the AnaIysIs oI nternatIonaI Web Logs Ior the
TImeIy DIscovery oI ReIevant and CredIbIe TImeIy DIscovery oI ReIevant and CredIbIe TImeIy DIscovery oI ReIevant and CredIbIe TImeIy DIscovery oI ReIevant and CredIbIe
nIormatIon, 46 nIormatIon, 46 nIormatIon, 46 nIormatIon, 46
Automated Trusted nIormatIon Exchange Automated Trusted nIormatIon Exchange Automated Trusted nIormatIon Exchange Automated Trusted nIormatIon Exchange
(ATX), 46 (ATX), 46 (ATX), 46 (ATX), 46
AutomatIc DecIassIIIcatIon, 46 AutomatIc DecIassIIIcatIon, 46 AutomatIc DecIassIIIcatIon, 46 AutomatIc DecIassIIIcatIon, 46
Autonomy, 47 Autonomy, 47 Autonomy, 47 Autonomy, 47
AvaIIabIe PubIIcIy, 47 AvaIIabIe PubIIcIy, 47 AvaIIabIe PubIIcIy, 47 AvaIIabIe PubIIcIy, 47
8ackground Use O 8ackground Use O 8ackground Use O 8ackground Use OnIy, 76 nIy, 76 nIy, 76 nIy, 76
8asIc nteIIIgence, 47 8asIc nteIIIgence, 47 8asIc nteIIIgence, 47 8asIc nteIIIgence, 47
8ehavIoraI AdvertIsIng, 48 8ehavIoraI AdvertIsIng, 48 8ehavIoraI AdvertIsIng, 48 8ehavIoraI AdvertIsIng, 48
8IodeIense KnowIedge Center (8KC), 48 8IodeIense KnowIedge Center (8KC), 48 8IodeIense KnowIedge Center (8KC), 48 8IodeIense KnowIedge Center (8KC), 48
8IomedIcaI Advanced Research and 8IomedIcaI Advanced Research and 8IomedIcaI Advanced Research and 8IomedIcaI Advanced Research and
DeveIopment Agency, 174 DeveIopment Agency, 174 DeveIopment Agency, 174 DeveIopment Agency, 174
8Iack, 49 8Iack, 49 8Iack, 49 8Iack, 49
8Iack or Covert Propaganda, 333 8Iack or Covert Propaganda, 333 8Iack or Covert Propaganda, 333 8Iack or Covert Propaganda, 333
8Iack Products, 49 8Iack Products, 49 8Iack Products, 49 8Iack Products, 49
8Iack Propaganda, 334 8Iack Propaganda, 334 8Iack Propaganda, 334 8Iack Propaganda, 334
8 88 8Iogs, 253 Iogs, 253 Iogs, 253 Iogs, 253
8Iue Pape 8Iue Pape 8Iue Pape 8Iue Paper, 52 r, 52 r, 52 r, 52
8ooz 8ooz 8ooz 8ooz- -- -AIIen HamIIton, nc, 241 AIIen HamIIton, nc, 241 AIIen HamIIton, nc, 241 AIIen HamIIton, nc, 241
8orn CIassIIIed, 52 8orn CIassIIIed, 52 8orn CIassIIIed, 52 8orn CIassIIIed, 52






19
8orn P 8orn P 8orn P 8orn Protected, 387 rotected, 387 rotected, 387 rotected, 387
8revIty Codes, 55 8revIty Codes, 55 8revIty Codes, 55 8revIty Codes, 55
8rIeIIng, 55 8rIeIIng, 55 8rIeIIng, 55 8rIeIIng, 55
8rowsIng, 55 8rowsIng, 55 8rowsIng, 55 8rowsIng, 55
8udget, 107 8udget, 107 8udget, 107 8udget, 107
8urden, 55 8urden, 55 8urden, 55 8urden, 55
8urden MethodoIogy, 358 8urden MethodoIogy, 358 8urden MethodoIogy, 358 8urden MethodoIogy, 358
8ureau oI nternatIonaI nIormatIon 8ureau oI nternatIonaI nIormatIon 8ureau oI nternatIonaI nIormatIon 8ureau oI nternatIonaI nIormatIon
Programs, 56, 393 Programs, 56, 393 Programs, 56, 393 Programs, 56, 393
8ureaucratIc Secrecy, 364 8ureaucratIc Secrecy, 364 8ureaucratIc Secrecy, 364 8ureaucratIc Secrecy, 364
8ye 8ye 8ye 8ye 8ye 8ye 8ye 8yeman 8yeman SpecIaI HandIIng man 8yeman SpecIaI HandIIng man 8yeman SpecIaI HandIIng man 8yeman SpecIaI HandIIng
(8SH), 56 (8SH), 56 (8SH), 56 (8SH), 56
CaII CaII CaII CaII- -- -IdentIIyIng nIormatIon, 57 IdentIIyIng nIormatIon, 57 IdentIIyIng nIormatIon, 57 IdentIIyIng nIormatIon, 57
CarnIvore, 42 CarnIvore, 42 CarnIvore, 42 CarnIvore, 42
CarnIvore DCS 1000, 57 CarnIvore DCS 1000, 57 CarnIvore DCS 1000, 57 CarnIvore DCS 1000, 57
Case Management Data Mart, 58 Case Management Data Mart, 58 Case Management Data Mart, 58 Case Management Data Mart, 58
CategorIcaI ExcIusIon, 58 CategorIcaI ExcIusIon, 58 CategorIcaI ExcIusIon, 58 CategorIcaI ExcIusIon, 58
CategorIes oI Data, 58 CategorIes oI Data, 58 CategorIes oI Data, 58 CategorIes oI Data, 58
Category, 59 Category, 59 Category, 59 Category, 59
CautIon CautIon CautIon CautIon - -- - (ConIIdentIaI) ProprIetary (ConIIdentIaI) ProprIetary (ConIIdentIaI) ProprIetary (ConIIdentIaI) ProprIetary
nIormatIon nv nIormatIon nv nIormatIon nv nIormatIon nvoIved (PROPN), 84 oIved (PROPN), 84 oIved (PROPN), 84 oIved (PROPN), 84
Caveated nIormatIon Caveat, 59 Caveated nIormatIon Caveat, 59 Caveated nIormatIon Caveat, 59 Caveated nIormatIon Caveat, 59
CensorshIp CensorshIp CensorshIp CensorshIp, , , , 59, 59, 59, 59, 230 230 230 230, 367 , 367 , 367 , 367
CentraI ForeIgn PoIIcy FIIe, 60 CentraI ForeIgn PoIIcy FIIe, 60 CentraI ForeIgn PoIIcy FIIe, 60 CentraI ForeIgn PoIIcy FIIe, 60
CA Crypts, 60 CA Crypts, 60 CA Crypts, 60 CA Crypts, 60
CA FIIe Numbers, 61 CA FIIe Numbers, 61 CA FIIe Numbers, 61 CA FIIe Numbers, 61
CA Records Search TooI (CREST), 61 CA Records Search TooI (CREST), 61 CA Records Search TooI (CREST), 61 CA Records Search TooI (CREST), 61
CA SIugIInes, 62 CA SIugIInes, 62 CA SIugIInes, 62 CA SIugIInes, 62
CPAV (Computer and nternet ProtocoI CPAV (Computer and nternet ProtocoI CPAV (Computer and nternet ProtocoI CPAV (Computer and nternet ProtocoI
Address VerIIIer) Address VerIIIer) Address VerIIIer) Address VerIIIer), 62 , 62 , 62 , 62
CIpher Text, 62 CIpher Text, 62 CIpher Text, 62 CIpher Text, 62
CIvII CensorshIp, 62 CIvII CensorshIp, 62 CIvII CensorshIp, 62 CIvII CensorshIp, 62
CIandestIne OperatIon, 63 CIandestIne OperatIon, 63 CIandestIne OperatIon, 63 CIandestIne OperatIon, 63
CIassIIIcatIon SecurIty CIassIIIcatIon, 63, CIassIIIcatIon SecurIty CIassIIIcatIon, 63, CIassIIIcatIon SecurIty CIassIIIcatIon, 63, CIassIIIcatIon SecurIty CIassIIIcatIon, 63,
69, 71 69, 71 69, 71 69, 71
CIassIIIcatIon AuthorIty, 65 CIassIIIcatIon AuthorIty, 65 CIassIIIcatIon AuthorIty, 65 CIassIIIcatIon AuthorIty, 65
CIassIIIcatIon 8Iock, 66 CIassIIIcatIon 8Iock, 66 CIassIIIcatIon 8Iock, 66 CIassIIIcatIon 8Iock, 66
CIassIIIcatIon by CompIIatIon, 66 CIassIIIcatIon by CompIIatIon, 66 CIassIIIcatIon by CompIIatIon, 66 CIassIIIcatIon by CompIIatIon, 66
CIassIIIcatIon Category, 66 CIassIIIcatIon Category, 66 CIassIIIcatIon Category, 66 CIassIIIcatIon Category, 66
CIassIIIcatIon ChaI CIassIIIcatIon ChaI CIassIIIcatIon ChaI CIassIIIcatIon ChaIIenge, 68 Ienge, 68 Ienge, 68 Ienge, 68
C CC CIassIIIcatIon costs, 65 IassIIIcatIon costs, 65 IassIIIcatIon costs, 65 IassIIIcatIon costs, 65
CIassIIIcatIon CuIdes, 68 CIassIIIcatIon CuIdes, 68 CIassIIIcatIon CuIdes, 68 CIassIIIcatIon CuIdes, 68
CIassIIIcatIon LeveI(s), 69 CIassIIIcatIon LeveI(s), 69 CIassIIIcatIon LeveI(s), 69 CIassIIIcatIon LeveI(s), 69
CIassIIIcatIon MarkIngs ControI MarkIngs, CIassIIIcatIon MarkIngs ControI MarkIngs, CIassIIIcatIon MarkIngs ControI MarkIngs, CIassIIIcatIon MarkIngs ControI MarkIngs,
71 71 71 71
CIassIIIcatIon PrIesthood, 89 CIassIIIcatIon PrIesthood, 89 CIassIIIcatIon PrIesthood, 89 CIassIIIcatIon PrIesthood, 89
CIassIIIed At 8Irth, 90 CIassIIIed At 8Irth, 90 CIassIIIed At 8Irth, 90 CIassIIIed At 8Irth, 90
CIassIIIed CommunIty, 90 CIassIIIed CommunIty, 90 CIassIIIed CommunIty, 90 CIassIIIed CommunIty, 90
CIassIIIed DeIense nIormatIon, 90 CIassIIIed DeIense nIormatIon, 90 CIassIIIed DeIense nIormatIon, 90 CIassIIIed DeIense nIormatIon, 90
CIassI CIassI CIassI CIassIIIed nIormatIon, 90 IIed nIormatIon, 90 IIed nIormatIon, 90 IIed nIormatIon, 90
CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act
(CPA), 92 (CPA), 92 (CPA), 92 (CPA), 92
CIassIIIed Matter, 92 CIassIIIed Matter, 92 CIassIIIed Matter, 92 CIassIIIed Matter, 92
CIassIIIed MIIItary nIormatIon (CM), 92 CIassIIIed MIIItary nIormatIon (CM), 92 CIassIIIed MIIItary nIormatIon (CM), 92 CIassIIIed MIIItary nIormatIon (CM), 92
CIassIIIed NatIonaI SecurIty nIormatIon, 93 CIassIIIed NatIonaI SecurIty nIormatIon, 93 CIassIIIed NatIonaI SecurIty nIormatIon, 93 CIassIIIed NatIonaI SecurIty nIormatIon, 93
CIassIIIed NavaI NucIear PropuIsIon CIassIIIed NavaI NucIear PropuIsIon CIassIIIed NavaI NucIear PropuIsIon CIassIIIed NavaI NucIear PropuIsIon
nIormatIon (C nIormatIon (C nIormatIon (C nIormatIon (C- -- -NNP), 93 NNP), 93 NNP), 93 NNP), 93
CIassIIIed NSA]C CIassIIIed NSA]C CIassIIIed NSA]C CIassIIIed NSA]CSS nIormatIon, 94 SS nIormatIon, 94 SS nIormatIon, 94 SS nIormatIon, 94
CIassIIIer, 94 CIassIIIer, 94 CIassIIIer, 94 CIassIIIer, 94
CIosed nIormatIon, 94 CIosed nIormatIon, 94 CIosed nIormatIon, 94 CIosed nIormatIon, 94
CIosed WorId, 94 CIosed WorId, 94 CIosed WorId, 94 CIosed WorId, 94
Code, 95 Code, 95 Code, 95 Code, 95
Code Name Codename, 95 Code Name Codename, 95 Code Name Codename, 95 Code Name Codename, 95
Codeword Code Word, 96 Codeword Code Word, 96 Codeword Code Word, 96 Codeword Code Word, 96
Codeword Compartment, 98 Codeword Compartment, 98 Codeword Compartment, 98 Codeword Compartment, 98
CognIzant SecurIty Agency, 98 CognIzant SecurIty Agency, 98 CognIzant SecurIty Agency, 98 CognIzant SecurIty Agency, 98
CoIIateraI nIormatIon, 98 CoIIateraI nIormatIon, 98 CoIIateraI nIormatIon, 98 CoIIateraI nIormatIon, 98






20
CoIIectIng, 98 CoIIectIng, 98 CoIIectIng, 98 CoIIectIng, 98
CoIIectIon, 99 CoIIectIon, 99 CoIIectIon, 99 CoIIectIon, 99
CoIIectIon CoIIectIon CoIIectIon CoIIectIon Agency, 99 Agency, 99 Agency, 99 Agency, 99
CoIIectIon Management, 99 CoIIectIon Management, 99 CoIIectIon Management, 99 CoIIectIon Management, 99
CoIIectIon oI nIormatIon, 100 CoIIectIon oI nIormatIon, 100 CoIIectIon oI nIormatIon, 100 CoIIectIon oI nIormatIon, 100
CoIIectIon PIan, 101 CoIIectIon PIan, 101 CoIIectIon PIan, 101 CoIIectIon PIan, 101
CoIor CoIor CoIor CoIor- -- -coded Threat LeveI System, 188 coded Threat LeveI System, 188 coded Threat LeveI System, 188 coded Threat LeveI System, 188
Combat nIormatIon, 101 Combat nIormatIon, 101 Combat nIormatIon, 101 Combat nIormatIon, 101
CombIned nteIIIgence Watch Center, 102 CombIned nteIIIgence Watch Center, 102 CombIned nteIIIgence Watch Center, 102 CombIned nteIIIgence Watch Center, 102
Command and ControI WarIare, 102 Command and ControI WarIare, 102 Command and ControI WarIare, 102 Command and ControI WarIare, 102
Common TerrorIsm nIormatIon Shar Common TerrorIsm nIormatIon Shar Common TerrorIsm nIormatIon Shar Common TerrorIsm nIormatIon SharIng Ing Ing Ing
Standards, 102 Standards, 102 Standards, 102 Standards, 102
CommunIcate, 102 CommunIcate, 102 CommunIcate, 102 CommunIcate, 102
CommunIcatIons Cover, 102 CommunIcatIons Cover, 102 CommunIcatIons Cover, 102 CommunIcatIons Cover, 102
CommunIcatIons nteIIIgence Database, 103 CommunIcatIons nteIIIgence Database, 103 CommunIcatIons nteIIIgence Database, 103 CommunIcatIons nteIIIgence Database, 103
CommunIcatIons SecurIty, 103 CommunIcatIons SecurIty, 103 CommunIcatIons SecurIty, 103 CommunIcatIons SecurIty, 103
CommunIty RIght to Know, 358 CommunIty RIght to Know, 358 CommunIty RIght to Know, 358 CommunIty RIght to Know, 358
ComparmentaIIzatIon, 103 ComparmentaIIzatIon, 103 ComparmentaIIzatIon, 103 ComparmentaIIzatIon, 103
CompartmentatIon, 103 CompartmentatIon, 103 CompartmentatIon, 103 CompartmentatIon, 103
Compartmented Mode, 103 Compartmented Mode, 103 Compartmented Mode, 103 Compartmented Mode, 103
compIIatIon theory., 26 compIIatIon theory., 26 compIIatIon theory., 26 compIIatIon theory., 261 11 1
CompromIse, 104 CompromIse, 104 CompromIse, 104 CompromIse, 104
CompromIsed, 104 CompromIsed, 104 CompromIsed, 104 CompromIsed, 104
CompromIsIng EmanatIons, 104 CompromIsIng EmanatIons, 104 CompromIsIng EmanatIons, 104 CompromIsIng EmanatIons, 104
Computer SecurIty Act SensItIve Computer SecurIty Act SensItIve Computer SecurIty Act SensItIve Computer SecurIty Act SensItIve
nIormatIon, 104 nIormatIon, 104 nIormatIon, 104 nIormatIon, 104
ConIIdentIaI, 105 ConIIdentIaI, 105 ConIIdentIaI, 105 ConIIdentIaI, 105
CONFDENTAL, 68 CONFDENTAL, 68 CONFDENTAL, 68 CONFDENTAL, 68
ConIIdentIaI 8usIness nIormatIon ConIIdentIaI 8usIness nIormatIon ConIIdentIaI 8usIness nIormatIon ConIIdentIaI 8usIness nIormatIon
8usIness ProprIetary nIormatIon, 105 8usIness ProprIetary nIormatIon, 105 8usIness ProprIetary nIormatIon, 105 8usIness ProprIetary nIormatIon, 105
ConIIdentIaI CommercIaI nIormatIo ConIIdentIaI CommercIaI nIormatIo ConIIdentIaI CommercIaI nIormatIo ConIIdentIaI CommercIaI nIormatIon, 106 n, 106 n, 106 n, 106
ConIIdentIaI nIormatIon, 71 ConIIdentIaI nIormatIon, 71 ConIIdentIaI nIormatIon, 71 ConIIdentIaI nIormatIon, 71
ConIIdentIaI Source, 107 ConIIdentIaI Source, 107 ConIIdentIaI Source, 107 ConIIdentIaI Source, 107
ConIIdentIaI ConIIdentIaI ConIIdentIaI ConIIdentIaI- -- -CIeared U.S. CItIzen, 106 CIeared U.S. CItIzen, 106 CIeared U.S. CItIzen, 106 CIeared U.S. CItIzen, 106
ConIIdentIaIIty, 107 ConIIdentIaIIty, 107 ConIIdentIaIIty, 107 ConIIdentIaIIty, 107
ConIIrmatIon oI nIormatIon (nteIIIgence), ConIIrmatIon oI nIormatIon (nteIIIgence), ConIIrmatIon oI nIormatIon (nteIIIgence), ConIIrmatIon oI nIormatIon (nteIIIgence),
107 107 107 107
ConIusIon Agent, 107 ConIusIon Agent, 107 ConIusIon Agent, 107 ConIusIon Agent, 107
CongressIonaI 8udget ]ustIIIcatIon 8ooks, CongressIonaI 8udget ]ustIIIcatIon 8ooks, CongressIonaI 8udget ]ustIIIcatIon 8ooks, CongressIonaI 8udget ]ustIIIcatIon 8ooks,
107 107 107 107
ConspIracy TheorIes, ConspIracy TheorIes, ConspIracy TheorIes, ConspIracy TheorIes, 109, 259 109, 259 109, 259 109, 259
Content Management, 109 Content Management, 109 Content Management, 109 Content Management, 109
ControI, 110 ControI, 110 ControI, 110 ControI, 110
ControIIed Access Area, 110 ControIIed Access Area, 110 ControIIed Access Area, 110 ControIIed Access Area, 110
ControIIed Access Program CoordInatIon ControIIed Access Program CoordInatIon ControIIed Access Program CoordInatIon ControIIed Access Program CoordInatIon
OIIIce (CAPCO), 89 OIIIce (CAPCO), 89 OIIIce (CAPCO), 89 OIIIce (CAPCO), 89
ControIIed DossIer, 110 ControIIed DossIer, 110 ControIIed DossIer, 110 ControIIed DossIer, 110
ControIIed Enhanced SaIeguards, 76 ControIIed Enhanced SaIeguards, 76 ControIIed Enhanced SaIeguards, 76 ControIIed Enhanced SaIeguards, 76
ControIIed nIormatIon, 110 ControIIed nIormatIon, 110 ControIIed nIormatIon, 110 ControIIed nIormatIon, 110
ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon OIIIce, OIIIce, OIIIce, OIIIce,
112 112 112 112
ControIIed UncIassIIIed nIormatIon, 111 ControIIed UncIassIIIed nIormatIon, 111 ControIIed UncIassIIIed nIormatIon, 111 ControIIed UncIassIIIed nIormatIon, 111
CopyrIght, 113 CopyrIght, 113 CopyrIght, 113 CopyrIght, 113
CopyrIght Law oI the UnIted States oI CopyrIght Law oI the UnIted States oI CopyrIght Law oI the UnIted States oI CopyrIght Law oI the UnIted States oI
AmerIca, 113 AmerIca, 113 AmerIca, 113 AmerIca, 113
CounterInIormatIon, 113 CounterInIormatIon, 113 CounterInIormatIon, 113 CounterInIormatIon, 113
Counter Counter Counter Counter- -- -nIormatIon Team, 113 nIormatIon Team, 113 nIormatIon Team, 113 nIormatIon Team, 113
CounterInteIIIgence (C), 114 CounterInteIIIgence (C), 114 CounterInteIIIgence (C), 114 CounterInteIIIgence (C), 114
CounterInteIIIgence AnaIysIs 8ranch (CA8) CounterInteIIIgence AnaIysIs 8ranch (CA8) CounterInteIIIgence AnaIysIs 8ranch (CA8) CounterInteIIIgence AnaIysIs 8ranch (CA8)
CompendIu CompendIu CompendIu CompendIum, 114 m, 114 m, 114 m, 114
CounterInteIIIgence AnaIytIcaI Research CounterInteIIIgence AnaIytIcaI Research CounterInteIIIgence AnaIytIcaI Research CounterInteIIIgence AnaIytIcaI Research
Data, 115 Data, 115 Data, 115 Data, 115
CounterInteIIIgence Automated CounterInteIIIgence Automated CounterInteIIIgence Automated CounterInteIIIgence Automated
nvestIgatIve, 116 nvestIgatIve, 116 nvestIgatIve, 116 nvestIgatIve, 116
CounterInteIIIgence CoIIectIon, 116 CounterInteIIIgence CoIIectIon, 116 CounterInteIIIgence CoIIectIon, 116 CounterInteIIIgence CoIIectIon, 116
CounterInteIIIgence FIeId ActIvIty (CFA), CounterInteIIIgence FIeId ActIvIty (CFA), CounterInteIIIgence FIeId ActIvIty (CFA), CounterInteIIIgence FIeId ActIvIty (CFA),
116, 132 116, 132 116, 132 116, 132






21
CounterInteIIIgence Records nIormatIon CounterInteIIIgence Records nIormatIon CounterInteIIIgence Records nIormatIon CounterInteIIIgence Records nIormatIon
System (CRS), 117 System (CRS), 117 System (CRS), 117 System (CRS), 117
Cou Cou Cou CounterterrorIsm CommunIcatIons Center, nterterrorIsm CommunIcatIons Center, nterterrorIsm CommunIcatIons Center, nterterrorIsm CommunIcatIons Center,
118 118 118 118
Country Tap, 118 Country Tap, 118 Country Tap, 118 Country Tap, 118
Court Court Court Court- -- -LegaI Records ReIated, 118 LegaI Records ReIated, 118 LegaI Records ReIated, 118 LegaI Records ReIated, 118
Covert Products, 119 Covert Products, 119 Covert Products, 119 Covert Products, 119
CrImInaI nteIIIgence, 119 CrImInaI nteIIIgence, 119 CrImInaI nteIIIgence, 119 CrImInaI nteIIIgence, 119
CrImInaI nteIIIgence System, 120 CrImInaI nteIIIgence System, 120 CrImInaI nteIIIgence System, 120 CrImInaI nteIIIgence System, 120
CrImInaI nvestIgatIon DIvIsIon Data MInIng, CrImInaI nvestIgatIon DIvIsIon Data MInIng, CrImInaI nvestIgatIon DIvIsIon Data MInIng, CrImInaI nvestIgatIon DIvIsIon Data MInIng,
120 120 120 120
CrItIcaI and SensItIve nIormatIon CrItIcaI and SensItIve nIormatIon CrItIcaI and SensItIve nIormatIon CrItIcaI and SensItIve nIormatIon LIst, 120 LIst, 120 LIst, 120 LIst, 120
CrItIcaI Energy nIrastructure nIormatIon CrItIcaI Energy nIrastructure nIormatIon CrItIcaI Energy nIrastructure nIormatIon CrItIcaI Energy nIrastructure nIormatIon
(CE), 120 (CE), 120 (CE), 120 (CE), 120
CrItIcaI nIormatIon, 121 CrItIcaI nIormatIon, 121 CrItIcaI nIormatIon, 121 CrItIcaI nIormatIon, 121
CrItIcaI nIrastructure nIormatIon (C), 121 CrItIcaI nIrastructure nIormatIon (C), 121 CrItIcaI nIrastructure nIormatIon (C), 121 CrItIcaI nIrastructure nIormatIon (C), 121
CrItIcaI nteIIIgence, 122 CrItIcaI nteIIIgence, 122 CrItIcaI nteIIIgence, 122 CrItIcaI nteIIIgence, 122
CrItIcaI NucIear Weapons DesIgn CrItIcaI NucIear Weapons DesIgn CrItIcaI NucIear Weapons DesIgn CrItIcaI NucIear Weapons DesIgn
nIormatIon (CNWD), 76 nIormatIon (CNWD), 76 nIormatIon (CNWD), 76 nIormatIon (CNWD), 76
CrItIcaI OversIght nIormatIon, 12 CrItIcaI OversIght nIormatIon, 12 CrItIcaI OversIght nIormatIon, 12 CrItIcaI OversIght nIormatIon, 122 22 2
CrItIcaI Program nIormatIon (CP), 122 CrItIcaI Program nIormatIon (CP), 122 CrItIcaI Program nIormatIon (CP), 122 CrItIcaI Program nIormatIon (CP), 122
CrItIcaI CrItIcaI CrItIcaI CrItIcaI- -- -SensItIve (CS) SensItIve (CS) SensItIve (CS) SensItIve (CS), 281 , 281 , 281 , 281
CRS PubIIcatIon PoIIcy, 123 CRS PubIIcatIon PoIIcy, 123 CRS PubIIcatIon PoIIcy, 123 CRS PubIIcatIon PoIIcy, 123
CRYPTO, 77 CRYPTO, 77 CRYPTO, 77 CRYPTO, 77
CryptographIc nIormatIon, 123 CryptographIc nIormatIon, 123 CryptographIc nIormatIon, 123 CryptographIc nIormatIon, 123
Cryptography, 123 Cryptography, 123 Cryptography, 123 Cryptography, 123
CuItIvatIon, 123 CuItIvatIon, 123 CuItIvatIon, 123 CuItIvatIon, 123
CuIturaI DIpIomacy, 124 CuIturaI DIpIomacy, 124 CuIturaI DIpIomacy, 124 CuIturaI DIpIomacy, 124
CustodIan, 124 CustodIan, 124 CustodIan, 124 CustodIan, 124
Cyberwar, 124 Cyberwar, 124 Cyberwar, 124 Cyberwar, 124
DaIIy DIgest, 125 DaIIy DIgest, 125 DaIIy DIgest, 125 DaIIy DIgest, 125
Damage As Damage As Damage As Damage Assessment, 125 sessment, 125 sessment, 125 sessment, 125
Damage Caused by UnauthorIzed Damage Caused by UnauthorIzed Damage Caused by UnauthorIzed Damage Caused by UnauthorIzed
DIscIosure, 125 DIscIosure, 125 DIscIosure, 125 DIscIosure, 125
Damage to the NatIonaI SecurIty, 125 Damage to the NatIonaI SecurIty, 125 Damage to the NatIonaI SecurIty, 125 Damage to the NatIonaI SecurIty, 125
Dark Web Dark Web TerrorIsm Research, Dark Web Dark Web TerrorIsm Research, Dark Web Dark Web TerrorIsm Research, Dark Web Dark Web TerrorIsm Research,
126 126 126 126
Data, 126 Data, 126 Data, 126 Data, 126
Data AggregatIon, 126 Data AggregatIon, 126 Data AggregatIon, 126 Data AggregatIon, 126
Data 8ase, 126 Data 8ase, 126 Data 8ase, 126 Data 8ase, 126
data mInIng, 34 data mInIng, 34 data mInIng, 34 data mInIng, 34
Data MInIng, 127 Data MInIng, 127 Data MInIng, 127 Data MInIng, 127
Data QuaIIty Act, 128 Data QuaIIty Act, 128 Data QuaIIty Act, 128 Data QuaIIty Act, 128
DCD 1]7, ", DCD 1]7, ", DCD 1]7, ", DCD 1]7, ", 128 128 128 128
DCSNET, 129 DCSNET, 129 DCSNET, 129 DCSNET, 129
DeceptIon, 129 DeceptIon, 129 DeceptIon, 129 DeceptIon, 129
DeceptIon Means, 129 DeceptIon Means, 129 DeceptIon Means, 129 DeceptIon Means, 129
DecIassIIIcatIon, 130 DecIassIIIcatIon, 130 DecIassIIIcatIon, 130 DecIassIIIcatIon, 130
DecIassIIIcatIon AuthorIty, 131 DecIassIIIcatIon AuthorIty, 131 DecIassIIIcatIon AuthorIty, 131 DecIassIIIcatIon AuthorIty, 131
DecIassIIIcatIon Event, 132 DecIassIIIcatIon Event, 132 DecIassIIIcatIon Event, 132 DecIassIIIcatIon Event, 132
DeIense CentraI ndex oI nvestIgatIons, DeIense CentraI ndex oI nvestIgatIons, DeIense CentraI ndex oI nvestIgatIons, DeIense CentraI ndex oI nvestIgatIons,
132 132 132 132
DeIense CounterInteIIIgence and Human DeIense CounterInteIIIgence and Human DeIense CounterInteIIIgence and Human DeIense CounterInteIIIgence and Human
nteIIIgence Center (DCHC), 132 nteIIIgence Center (DCHC), 132 nteIIIgence Center (DCHC), 132 nteIIIgence Center (DCHC), 132
DeIense DeIense DeIense DeIense CrItIcaI nIrastructure ReIated CrItIcaI nIrastructure ReIated CrItIcaI nIrastructure ReIated CrItIcaI nIrastructure ReIated
SensItIve InIormatIon, 132 SensItIve InIormatIon, 132 SensItIve InIormatIon, 132 SensItIve InIormatIon, 132
DeIense nIormatIon, 132 DeIense nIormatIon, 132 DeIense nIormatIon, 132 DeIense nIormatIon, 132
DeIense nIormatIon nIrastructure (D), DeIense nIormatIon nIrastructure (D), DeIense nIormatIon nIrastructure (D), DeIense nIormatIon nIrastructure (D),
133 133 133 133
DeIense nIormatIon Systems Network DeIense nIormatIon Systems Network DeIense nIormatIon Systems Network DeIense nIormatIon Systems Network
(DSN), 133 (DSN), 133 (DSN), 133 (DSN), 133
DeIense nIormatIon WarIare, 134 DeIense nIormatIon WarIare, 134 DeIense nIormatIon WarIare, 134 DeIense nIormatIon WarIare, 134
DeIense nteIIIgence ProductIon, 133 DeIense nteIIIgence ProductIon, 133 DeIense nteIIIgence ProductIon, 133 DeIense nteIIIgence ProductIon, 133
DeIensI DeIensI DeIensI DeIensIve CounterInIormatIon, 133 ve CounterInIormatIon, 133 ve CounterInIormatIon, 133 ve CounterInIormatIon, 133
DeIensIve nIormatIon OperatIons, 133 DeIensIve nIormatIon OperatIons, 133 DeIensIve nIormatIon OperatIons, 133 DeIensIve nIormatIon OperatIons, 133
Degrade, 134 Degrade, 134 Degrade, 134 Degrade, 134
DeIIberate CompromIse oI CIassIIIed DeIIberate CompromIse oI CIassIIIed DeIIberate CompromIse oI CIassIIIed DeIIberate CompromIse oI CIassIIIed
nIormatIon, 134 nIormatIon, 134 nIormatIon, 134 nIormatIon, 134






22
DeIIberatIve Process PrIvIIege, 328 DeIIberatIve Process PrIvIIege, 328 DeIIberatIve Process PrIvIIege, 328 DeIIberatIve Process PrIvIIege, 328
DemIse oI SensItIve HomeIand SecurIty nIo, DemIse oI SensItIve HomeIand SecurIty nIo, DemIse oI SensItIve HomeIand SecurIty nIo, DemIse oI SensItIve HomeIand SecurIty nIo,
385 385 385 385
Deny, 135 Deny, 135 Deny, 135 Deny, 135
Deny n Toto, 135 Deny n Toto, 135 Deny n Toto, 135 Deny n Toto, 135
Department oI Department oI Department oI Department oI DeIense DIrectIve, 135 DeIense DIrectIve, 135 DeIense DIrectIve, 135 DeIense DIrectIve, 135
Department oI DeIense nteIIIgence Department oI DeIense nteIIIgence Department oI DeIense nteIIIgence Department oI DeIense nteIIIgence
nIormatIon System (DODS), 135 nIormatIon System (DODS), 135 nIormatIon System (DODS), 135 nIormatIon System (DODS), 135
Department oI DeIense UncIassIIIed Department oI DeIense UncIassIIIed Department oI DeIense UncIassIIIed Department oI DeIense UncIassIIIed
ControIIed NucIear nIormatIon (DoD ControIIed NucIear nIormatIon (DoD ControIIed NucIear nIormatIon (DoD ControIIed NucIear nIormatIon (DoD
UCN, 136 UCN, 136 UCN, 136 UCN, 136
Department oI State SensItIve 8ut Department oI State SensItIve 8ut Department oI State SensItIve 8ut Department oI State SensItIve 8ut
UncIassIIIed, 137 UncIassIIIed, 137 UncIassIIIed, 137 UncIassIIIed, 137
DerIvatIve CIassIIIcatIon, 137 DerIvatIve CIassIIIcatIon, 137 DerIvatIve CIassIIIcatIon, 137 DerIvatIve CIassIIIcatIon, 137
Derogatory nIormatIon, 138 Derogatory nIormatIon, 138 Derogatory nIormatIon, 138 Derogatory nIormatIon, 138
DIgItaI Storm, 129 DIgItaI Storm, 129 DIgItaI Storm, 129 DIgItaI Storm, 129
DIrect nIormatIon WarIare, 138 DIrect nIormatIon WarIare, 138 DIrect nIormatIon WarIare, 138 DIrect nIormatIon WarIare, 138
DIrector oI CentraI nteIIIgence AuthorIzed DIrector oI CentraI nteIIIgence AuthorIzed DIrector oI CentraI nteIIIgence AuthorIzed DIrector oI CentraI nteIIIgence AuthorIzed
ControI MarkIngs DCD 1]7 "SecurIty ControI MarkIngs DCD 1]7 "SecurIty ControI MarkIngs DCD 1]7 "SecurIty ControI MarkIngs DCD 1]7 "SecurIty
ControIs on the DIssemInatIon oI ControIs on the DIssemInatIon oI ControIs on the DIssemInatIon oI ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon, 77 nteIIIgence nIormatIon, 77 nteIIIgence nIormatIon, 77 nteIIIgence nIormatIon, 77
DIrector oI NatIonaI nteIIIgenc DIrector oI NatIonaI nteIIIgenc DIrector oI NatIonaI nteIIIgenc DIrector oI NatIonaI nteIIIgence (DN), 138 e (DN), 138 e (DN), 138 e (DN), 138
DIscIosure, 138 DIscIosure, 138 DIscIosure, 138 DIscIosure, 138
DIscovery Process, 139 DIscovery Process, 139 DIscovery Process, 139 DIscovery Process, 139
DIscretIonary Access ControI, 139 DIscretIonary Access ControI, 139 DIscretIonary Access ControI, 139 DIscretIonary Access ControI, 139
DIsInIormatIon, 139 DIsInIormatIon, 139 DIsInIormatIon, 139 DIsInIormatIon, 139
DIsruptIve TechnoIogy OIIIce (DTO), 141 DIsruptIve TechnoIogy OIIIce (DTO), 141 DIsruptIve TechnoIogy OIIIce (DTO), 141 DIsruptIve TechnoIogy OIIIce (DTO), 141
DIssemInate, 141 DIssemInate, 141 DIssemInate, 141 DIssemInate, 141
DIssemInatIon and ExtractIon oI nIormatIon DIssemInatIon and ExtractIon oI nIormatIon DIssemInatIon and ExtractIon oI nIormatIon DIssemInatIon and ExtractIon oI nIormatIon
ControIIed by OrIgInator (ORCON), 78 ControIIed by OrIgInator (ORCON), 78 ControIIed by OrIgInator (ORCON), 78 ControIIed by OrIgInator (ORCON), 78, 88 , 88 , 88 , 88
DIssemIn DIssemIn DIssemIn DIssemInatIon ControI MarkIngs, 72 atIon ControI MarkIngs, 72 atIon ControI MarkIngs, 72 atIon ControI MarkIngs, 72
DIssent ChanneI, 142 DIssent ChanneI, 142 DIssent ChanneI, 142 DIssent ChanneI, 142
DIstrIbutIon CaptIons, 142 DIstrIbutIon CaptIons, 142 DIstrIbutIon CaptIons, 142 DIstrIbutIon CaptIons, 142
DIstrIbutIon LImItatIon, 78 DIstrIbutIon LImItatIon, 78 DIstrIbutIon LImItatIon, 78 DIstrIbutIon LImItatIon, 78
dIstrIbutIon markIngs, 86 dIstrIbutIon markIngs, 86 dIstrIbutIon markIngs, 86 dIstrIbutIon markIngs, 86
Document and MaterIaI, 142 Document and MaterIaI, 142 Document and MaterIaI, 142 Document and MaterIaI, 142
Document and Page MarkIngs, 143 Document and Page MarkIngs, 143 Document and Page MarkIngs, 143 Document and Page MarkIngs, 143
Document ExpIoItatIon, 143 Document ExpIoItatIon, 143 Document ExpIoItatIon, 143 Document ExpIoItatIon, 143
DO] MedIa Leak QuestIonnaIre, 143 DO] MedIa Leak QuestIonnaIre, 143 DO] MedIa Leak QuestIonnaIre, 143 DO] MedIa Leak QuestIonnaIre, 143
DossIer DossIer DossIer DossIer, 144 , 144 , 144 , 144
DOSTN (Department oI State DOSTN (Department oI State DOSTN (Department oI State DOSTN (Department oI State
TeIecommunIcatIons Network), 144 TeIecommunIcatIons Network), 144 TeIecommunIcatIons Network), 144 TeIecommunIcatIons Network), 144
DowngradIng, 144 DowngradIng, 144 DowngradIng, 144 DowngradIng, 144
Drug EnIorcement AdmInIstratIon SensItIve Drug EnIorcement AdmInIstratIon SensItIve Drug EnIorcement AdmInIstratIon SensItIve Drug EnIorcement AdmInIstratIon SensItIve
nIormatIon, 79, 145 nIormatIon, 79, 145 nIormatIon, 79, 145 nIormatIon, 79, 145
Drug]FInancIaI FusIon Center, 145 Drug]FInancIaI FusIon Center, 145 Drug]FInancIaI FusIon Center, 145 Drug]FInancIaI FusIon Center, 145
DuaI Use (nIormatIon), 146 DuaI Use (nIormatIon), 146 DuaI Use (nIormatIon), 146 DuaI Use (nIormatIon), 146
DysIunctIonaI nIormatIon RestrIctIons, 146 DysIunctIonaI nIormatIon RestrIctIons, 146 DysIunctIonaI nIormatIon RestrIctIons, 146 DysIunctIonaI nIormatIon RestrIctIons, 146
Eag Eag Eag EagIe Eyes, 146 Ie Eyes, 146 Ie Eyes, 146 Ie Eyes, 146
EarIy Report, 146 EarIy Report, 146 EarIy Report, 146 EarIy Report, 146
Earmark, 147 Earmark, 147 Earmark, 147 Earmark, 147
ECHELON, 147 ECHELON, 147 ECHELON, 147 ECHELON, 147
EIIect oI FaIIure to PubIIsh, 147 EIIect oI FaIIure to PubIIsh, 147 EIIect oI FaIIure to PubIIsh, 147 EIIect oI FaIIure to PubIIsh, 147
EIectromagnetIc DeceptIon, 148 EIectromagnetIc DeceptIon, 148 EIectromagnetIc DeceptIon, 148 EIectromagnetIc DeceptIon, 148
EIectronIc SeII EIectronIc SeII EIectronIc SeII EIectronIc SeII- -- -DIscIosure, 148 DIscIosure, 148 DIscIosure, 148 DIscIosure, 148
EIectronIc SurveIIIance StatIstIcs, 148 EIectronIc SurveIIIance StatIstIcs, 148 EIectronIc SurveIIIance StatIstIcs, 148 EIectronIc SurveIIIance StatIstIcs, 148
EIectronIc WarIare (EW), 149 EIectronIc WarIare (EW), 149 EIectronIc WarIare (EW), 149 EIectronIc WarIare (EW), 149
EIIcItatIon, 149 EIIcItatIon, 149 EIIcItatIon, 149 EIIcItatIon, 149
ELSUR FIIe, 149 ELSUR FIIe, 149 ELSUR FIIe, 149 ELSUR FIIe, 149
EnvIronmentaI Document, 149 EnvIronmentaI Document, 149 EnvIronmentaI Document, 149 EnvIronmentaI Document, 149
EnvIronmentaI mpact Statement (ES), 149 EnvIronmentaI mpact Statement (ES), 149 EnvIronmentaI mpact Statement (ES), 149 EnvIronmentaI mpact Statement (ES), 149
EquIty, 150 EquIty, 150 EquIty, 150 EquIty, 150
EspIonage, 150 EspIonage, 150 EspIonage, 150 EspIonage, 150
EspIonage Act, 249 EspIonage Act, 249 EspIonage Act, 249 EspIonage Act, 249
EssentIaI EIements oI FrIendIy nIormatIon EssentIaI EIements oI FrIendIy nIormatIon EssentIaI EIements oI FrIendIy nIormatIon EssentIaI EIements oI FrIendIy nIormatIon
(EEF), 151 (EEF), 151 (EEF), 151 (EEF), 151
EssentIaI EIements oI nIormatIon (EEs), EssentIaI EIements oI nIormatIon (EEs), EssentIaI EIements oI nIormatIon (EEs), EssentIaI EIements oI nIormatIon (EEs),
151 151 151 151






23
EstImatIve nteIIIgence, 151 EstImatIve nteIIIgence, 151 EstImatIve nteIIIgence, 151 EstImatIve nteIIIgence, 151
EstImatIve EstImatIve EstImatIve EstImatIve Language, 152 Language, 152 Language, 152 Language, 152
EternaI vIgIIance EternaI vIgIIance EternaI vIgIIance EternaI vIgIIance, 275 , 275 , 275 , 275
EthIcs In Covernment Act oI 1978, 359 EthIcs In Covernment Act oI 1978, 359 EthIcs In Covernment Act oI 1978, 359 EthIcs In Covernment Act oI 1978, 359
EvIdence, 354 EvIdence, 354 EvIdence, 354 EvIdence, 354
EvIdentIaI VaIue, 152 EvIdentIaI VaIue, 152 EvIdentIaI VaIue, 152 EvIdentIaI VaIue, 152
ExcIusIve DIstrIbutIon (EXDS), 79 ExcIusIve DIstrIbutIon (EXDS), 79 ExcIusIve DIstrIbutIon (EXDS), 79 ExcIusIve DIstrIbutIon (EXDS), 79
ExecutIon nIormatIon, 152 ExecutIon nIormatIon, 152 ExecutIon nIormatIon, 152 ExecutIon nIormatIon, 152
ExecutIve Order (EO), 152 ExecutIve Order (EO), 152 ExecutIve Order (EO), 152 ExecutIve Order (EO), 152
ExecutIve Order 12958, 94 ExecutIve Order 12958, 94 ExecutIve Order 12958, 94 ExecutIve Order 12958, 94
ExecutIve PrIvIIege, 328 ExecutIve PrIvIIege, 328 ExecutIve PrIvIIege, 328 ExecutIve PrIvIIege, 328
Exemp Exemp Exemp Exempted, 153 ted, 153 ted, 153 ted, 153
ExemptIons, 153 ExemptIons, 153 ExemptIons, 153 ExemptIons, 153
ExercIse Term, 154 ExercIse Term, 154 ExercIse Term, 154 ExercIse Term, 154
ExIormatIon, 154 ExIormatIon, 154 ExIormatIon, 154 ExIormatIon, 154
ExIgent Letters, 154 ExIgent Letters, 154 ExIgent Letters, 154 ExIgent Letters, 154
ExpIoIt, 155 ExpIoIt, 155 ExpIoIt, 155 ExpIoIt, 155
ExpIoItabIe Resources, 155 ExpIoItabIe Resources, 155 ExpIoItabIe Resources, 155 ExpIoItabIe Resources, 155
ExpIoItatIon, 155 ExpIoItatIon, 155 ExpIoItatIon, 155 ExpIoItatIon, 155
Export ControIIed nIormatIon, 155 Export ControIIed nIormatIon, 155 Export ControIIed nIormatIon, 155 Export ControIIed nIormatIon, 155
ExtraordInary SecurIty Measures, 156 ExtraordInary SecurIty Measures, 156 ExtraordInary SecurIty Measures, 156 ExtraordInary SecurIty Measures, 156
ExtremeIy SensItIve nIormatIon, 156 ExtremeIy SensItIve nIormatIon, 156 ExtremeIy SensItIve nIormatIon, 156 ExtremeIy SensItIve nIormatIon, 156
FabrIca FabrIca FabrIca FabrIcator, 157 tor, 157 tor, 157 tor, 157
FaIr nIormatIon PrIncIpIes, 157 FaIr nIormatIon PrIncIpIes, 157 FaIr nIormatIon PrIncIpIes, 157 FaIr nIormatIon PrIncIpIes, 157
Iake news Iake news Iake news Iake news, 314 , 314 , 314 , 314
Fake News, 157 Fake News, 157 Fake News, 157 Fake News, 157
F8 8IometrIc Center oI ExceIIence, 158 F8 8IometrIc Center oI ExceIIence, 158 F8 8IometrIc Center oI ExceIIence, 158 F8 8IometrIc Center oI ExceIIence, 158
F8 CentraI Records System CIassIIIcatIons, F8 CentraI Records System CIassIIIcatIons, F8 CentraI Records System CIassIIIcatIons, F8 CentraI Records System CIassIIIcatIons,
157 157 157 157
F8 nteIIIgence CommunIty Data Marts, 158 F8 nteIIIgence CommunIty Data Marts, 158 F8 nteIIIgence CommunIty Data Marts, 158 F8 nteIIIgence CommunIty Data Marts, 158
FederaI AdvIsory CommIttee Act, 174 FederaI AdvIsory CommIttee Act, 174 FederaI AdvIsory CommIttee Act, 174 FederaI AdvIsory CommIttee Act, 174, 359 , 359 , 359 , 359
FederaI Agen FederaI Agen FederaI Agen FederaI Agency MedIa PoIIcIes, 158 cy MedIa PoIIcIes, 158 cy MedIa PoIIcIes, 158 cy MedIa PoIIcIes, 158
FederaI nIormatIon Resources Management FederaI nIormatIon Resources Management FederaI nIormatIon Resources Management FederaI nIormatIon Resources Management
ReguIatIons, 158 ReguIatIons, 158 ReguIatIons, 158 ReguIatIons, 158
FederaI RegIster, 159 FederaI RegIster, 159 FederaI RegIster, 159 FederaI RegIster, 159
Feedback, 159 Feedback, 159 Feedback, 159 Feedback, 159
FIeId ManuaI, 159 FIeId ManuaI, 159 FIeId ManuaI, 159 FIeId ManuaI, 159
FIeId Press CensorshIp, 159 FIeId Press CensorshIp, 159 FIeId Press CensorshIp, 159 FIeId Press CensorshIp, 159
FIIe MystIque, 159 FIIe MystIque, 159 FIIe MystIque, 159 FIIe MystIque, 159
FIIe SerIes, 160 FIIe SerIes, 160 FIIe SerIes, 160 FIIe SerIes, 160
FIIes, 160 FIIes, 160 FIIes, 160 FIIes, 160
FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons, , , ,
30 30 30 300 00 0
FIIes wIthIn the DIrectorate oI ScIence & FIIes wIthIn the DIrectorate oI ScIence & FIIes wIthIn the DIrectorate oI ScIence & FIIes wIthIn the DIrectorate oI ScIence &
TechnoIogy TechnoIogy TechnoIogy TechnoIogy, 300 , 300 , 300 , 300
FIIes wIthIn the SecurIty Center FIIes wIthIn the SecurIty Center FIIes wIthIn the SecurIty Center FIIes wIthIn the SecurIty Center, 300 , 300 , 300 , 300
FInIshed nteIIIgence (F), 161 FInIshed nteIIIgence (F), 161 FInIshed nteIIIgence (F), 161 FInIshed nteIIIgence (F), 161
FRSTFRUTS Database, 161 FRSTFRUTS Database, 161 FRSTFRUTS Database, 161 FRSTFRUTS Database, 161
FSA, 151 FSA, 151 FSA, 151 FSA, 151
FOA Request, 161 FOA Request, 161 FOA Request, 161 FOA Request, 161
FOA Requester ServIce Center FOA PubIIc FOA Requester ServIce Center FOA PubIIc FOA Requester ServIce Center FOA PubIIc FOA Requester ServIce Center FOA PubIIc
LIaIsons, 162 LIaIsons, 162 LIaIsons, 162 LIaIsons, 162
For OIIIcIaI U For OIIIcIaI U For OIIIcIaI U For OIIIcIaI Use OnIy (FOUO), se OnIy (FOUO), se OnIy (FOUO), se OnIy (FOUO), 80, 81, 80, 81, 80, 81, 80, 81,
86, 86, 86, 86,168 168 168 168,337 ,337 ,337 ,337
Foreground nIormatIon, 162 Foreground nIormatIon, 162 Foreground nIormatIon, 162 Foreground nIormatIon, 162
ForeIgn 8roadcast nIormatIon ServIce ForeIgn 8roadcast nIormatIon ServIce ForeIgn 8roadcast nIormatIon ServIce ForeIgn 8roadcast nIormatIon ServIce
(F8S), 162 (F8S), 162 (F8S), 162 (F8S), 162
ForeIgn CIvII nteIIIgence, 163 ForeIgn CIvII nteIIIgence, 163 ForeIgn CIvII nteIIIgence, 163 ForeIgn CIvII nteIIIgence, 163
ForeIgn DenIaI and DeceptIon CommIttee, ForeIgn DenIaI and DeceptIon CommIttee, ForeIgn DenIaI and DeceptIon CommIttee, ForeIgn DenIaI and DeceptIon CommIttee,
248 248 248 248
ForeIgn Covernment nIormatIon (FC), ForeIgn Covernment nIormatIon (FC), ForeIgn Covernment nIormatIon (FC), ForeIgn Covernment nIormatIon (FC),
88, 88, 88, 88,163 163 163 163
ForeIgn nteIIIgence A ForeIgn nteIIIgence A ForeIgn nteIIIgence A ForeIgn nteIIIgence AdvIsory 8oard, 233 dvIsory 8oard, 233 dvIsory 8oard, 233 dvIsory 8oard, 233
ForeIgn nteIIIgence nIormatIon, 163 ForeIgn nteIIIgence nIormatIon, 163 ForeIgn nteIIIgence nIormatIon, 163 ForeIgn nteIIIgence nIormatIon, 163
ForeIgn nteIIIgence SurveIIIance Act, 164 ForeIgn nteIIIgence SurveIIIance Act, 164 ForeIgn nteIIIgence SurveIIIance Act, 164 ForeIgn nteIIIgence SurveIIIance Act, 164
ForeIgn nteIIIgence SurveIIIance Court oI ForeIgn nteIIIgence SurveIIIance Court oI ForeIgn nteIIIgence SurveIIIance Court oI ForeIgn nteIIIgence SurveIIIance Court oI
RevIew, 260 RevIew, 260 RevIew, 260 RevIew, 260
ForeIgn ReIatIons oI the UnIted States, 165 ForeIgn ReIatIons oI the UnIted States, 165 ForeIgn ReIatIons oI the UnIted States, 165 ForeIgn ReIatIons oI the UnIted States, 165






24
ForeIgn SchooIs nItIatIves NatIonaI Student ForeIgn SchooIs nItIatIves NatIonaI Student ForeIgn SchooIs nItIatIves NatIonaI Student ForeIgn SchooIs nItIatIves NatIonaI Student
Loan Data Sy Loan Data Sy Loan Data Sy Loan Data System, 166 stem, 166 stem, 166 stem, 166
ForeIgn TerrorIst TrackIng Task Force ForeIgn TerrorIst TrackIng Task Force ForeIgn TerrorIst TrackIng Task Force ForeIgn TerrorIst TrackIng Task Force
ActIvIty, 166 ActIvIty, 166 ActIvIty, 166 ActIvIty, 166
IoreseeabIe harm, 81, 170 IoreseeabIe harm, 81, 170 IoreseeabIe harm, 81, 170 IoreseeabIe harm, 81, 170
ForeseeabIe Harm Standard, 166 ForeseeabIe Harm Standard, 166 ForeseeabIe Harm Standard, 166 ForeseeabIe Harm Standard, 166
FormaI Access ApprovaI, 167 FormaI Access ApprovaI, 167 FormaI Access ApprovaI, 167 FormaI Access ApprovaI, 167
FormerIy RestrIcted Data (FRD), 167 FormerIy RestrIcted Data (FRD), 167 FormerIy RestrIcted Data (FRD), 167 FormerIy RestrIcted Data (FRD), 167
Forward TeII, 171 Forward TeII, 171 Forward TeII, 171 Forward TeII, 171
FOUO, 248 FOUO, 248 FOUO, 248 FOUO, 248
Free FIow oI nIormatIon, 174 Free FIow oI nIormatIon, 174 Free FIow oI nIormatIon, 174 Free FIow oI nIormatIon, 174
Freedom oI nIo Freedom oI nIo Freedom oI nIo Freedom oI nIormatIon Act (FOA), 171 rmatIon Act (FOA), 171 rmatIon Act (FOA), 171 rmatIon Act (FOA), 171
Freedom oI nIormatIon ExemptIons, 173 Freedom oI nIormatIon ExemptIons, 173 Freedom oI nIormatIon ExemptIons, 173 Freedom oI nIormatIon ExemptIons, 173
IrIendIy, 249 IrIendIy, 249 IrIendIy, 249 IrIendIy, 249
FugItIve Documents, 175 FugItIve Documents, 175 FugItIve Documents, 175 FugItIve Documents, 175
FuII FuII FuII FuII- -- -pIpe surveIIIance, 175 pIpe surveIIIance, 175 pIpe surveIIIance, 175 pIpe surveIIIance, 175
IunneI oI causaIIty, 228 IunneI oI causaIIty, 228 IunneI oI causaIIty, 228 IunneI oI causaIIty, 228
Further DIssemInatIon OnIy As DIrected, 87 Further DIssemInatIon OnIy As DIrected, 87 Further DIssemInatIon OnIy As DIrected, 87 Further DIssemInatIon OnIy As DIrected, 87
Fuse FuseIet, 175 Fuse FuseIet, 175 Fuse FuseIet, 175 Fuse FuseIet, 175
FusIon, 176 FusIon, 176 FusIon, 176 FusIon, 176
FusIon Centers, 176 FusIon Centers, 176 FusIon Centers, 176 FusIon Centers, 176
FutIIIt FutIIIt FutIIIt FutIIItarIan SocIety, 177 arIan SocIety, 177 arIan SocIety, 177 arIan SocIety, 177
CAMMA (C), 177 CAMMA (C), 177 CAMMA (C), 177 CAMMA (C), 177
Cenoa , 177 Cenoa , 177 Cenoa , 177 Cenoa , 177
CenuIne NatIonaI SecurIty Secrecy, 364 CenuIne NatIonaI SecurIty Secrecy, 364 CenuIne NatIonaI SecurIty Secrecy, 364 CenuIne NatIonaI SecurIty Secrecy, 364
CeospatIaI nIormatIon, 178 CeospatIaI nIormatIon, 178 CeospatIaI nIormatIon, 178 CeospatIaI nIormatIon, 178
CIobaI nIormatIon EnvIronment, 178 CIobaI nIormatIon EnvIronment, 178 CIobaI nIormatIon EnvIronment, 178 CIobaI nIormatIon EnvIronment, 178
CIobaI nIormatIon CrId (CC), 179 CIobaI nIormatIon CrId (CC), 179 CIobaI nIormatIon CrId (CC), 179 CIobaI nIormatIon CrId (CC), 179
CIobaI nIormatIon CrId DeIense Sector, 179 CIobaI nIormatIon CrId DeIense Sector, 179 CIobaI nIormatIon CrId DeIense Sector, 179 CIobaI nIormatIon CrId DeIense Sector, 179
CIobaI nIormatIon nIrast CIobaI nIormatIon nIrast CIobaI nIormatIon nIrast CIobaI nIormatIon nIrastructure (C), 179 ructure (C), 179 ructure (C), 179 ructure (C), 179
CIobaI ]ustIce nIormatIon SharIng nItIatIve, CIobaI ]ustIce nIormatIon SharIng nItIatIve, CIobaI ]ustIce nIormatIon SharIng nItIatIve, CIobaI ]ustIce nIormatIon SharIng nItIatIve,
180 180 180 180
CIobaI ]ustIce XML Data ModeI, 180, 412 CIobaI ]ustIce XML Data ModeI, 180, 412 CIobaI ]ustIce XML Data ModeI, 180, 412 CIobaI ]ustIce XML Data ModeI, 180, 412
C CC CIobaI war on terrorIsm, 409 IobaI war on terrorIsm, 409 IobaI war on terrorIsm, 409 IobaI war on terrorIsm, 409
CIobaIIzatIon, 180 CIobaIIzatIon, 180 CIobaIIzatIon, 180 CIobaIIzatIon, 180
CIomar Response, 181 CIomar Response, 181 CIomar Response, 181 CIomar Response, 181
CoogIe Earth CoogIe Maps, 182 CoogIe Earth CoogIe Maps, 182 CoogIe Earth CoogIe Maps, 182 CoogIe Earth CoogIe Maps, 182
CospeI oI NatIonaI SecurIty, 183 CospeI oI NatIonaI SecurIty, 183 CospeI oI NatIonaI SecurIty, 183 CospeI oI NatIonaI SecurIty, 183
gossIp or ru gossIp or ru gossIp or ru gossIp or rumor, 334 mor, 334 mor, 334 mor, 334
Covernment In the SunshIne, 359 Covernment In the SunshIne, 359 Covernment In the SunshIne, 359 Covernment In the SunshIne, 359
Covernment nIormatIon, 184 Covernment nIormatIon, 184 Covernment nIormatIon, 184 Covernment nIormatIon, 184
Covernment OII the SheII (COTS), 184 Covernment OII the SheII (COTS), 184 Covernment OII the SheII (COTS), 184 Covernment OII the SheII (COTS), 184
Covernment Secrecy, 364 Covernment Secrecy, 364 Covernment Secrecy, 364 Covernment Secrecy, 364
Cray LIterature, 184 Cray LIterature, 184 Cray LIterature, 184 Cray LIterature, 184
Cray MaII, 184 Cray MaII, 184 Cray MaII, 184 Cray MaII, 184
Cray Products, 185 Cray Products, 185 Cray Products, 185 Cray Products, 185
Cray Propaganda, 333 Cray Propaganda, 333 Cray Propaganda, 333 Cray Propaganda, 333
Crey LIterature, 185 Crey LIterature, 185 Crey LIterature, 185 Crey LIterature, 185
Crey Propaganda, 334 Crey Propaganda, 334 Crey Propaganda, 334 Crey Propaganda, 334
CSA Sens CSA Sens CSA Sens CSA SensItIve 8ut UncIassIIIed 8uIIdIng ItIve 8ut UncIassIIIed 8uIIdIng ItIve 8ut UncIassIIIed 8uIIdIng ItIve 8ut UncIassIIIed 8uIIdIng
nIormatIon, 185 nIormatIon, 185 nIormatIon, 185 nIormatIon, 185
CuardIan, 185, 404 CuardIan, 185, 404 CuardIan, 185, 404 CuardIan, 185, 404
CuIdance Documents, 186 CuIdance Documents, 186 CuIdance Documents, 186 CuIdance Documents, 186
Cunner PaIace, 192 Cunner PaIace, 192 Cunner PaIace, 192 Cunner PaIace, 192
CWOT CWOT CWOT CWOT, 294 , 294 , 294 , 294
HacktIvIsm, 186 HacktIvIsm, 186 HacktIvIsm, 186 HacktIvIsm, 186
HIgh 2 nIormatIon, 186 HIgh 2 nIormatIon, 186 HIgh 2 nIormatIon, 186 HIgh 2 nIormatIon, 186
HIstorIcaI RevIew Program, 187 HIstorIcaI RevIew Program, 187 HIstorIcaI RevIew Program, 187 HIstorIcaI RevIew Program, 187
HIstorIcaIIy SIgnIIIcant nIormatIon, 187 HIstorIcaIIy SIgnIIIcant nIormatIon, 187 HIstorIcaIIy SIgnIIIcant nIormatIon, 187 HIstorIcaIIy SIgnIIIcant nIormatIon, 187
HIstorIcaIIy VaIuabIe, HIstorIcaIIy VaIuabIe, HIstorIcaIIy VaIuabIe, HIstorIcaIIy VaIuabIe, 187 187 187 187
HomeIand SecurIty AdvIsory System, 188, HomeIand SecurIty AdvIsory System, 188, HomeIand SecurIty AdvIsory System, 188, HomeIand SecurIty AdvIsory System, 188,
189, 191 189, 191 189, 191 189, 191
HomeIand SecurIty nIormatIon, 189 HomeIand SecurIty nIormatIon, 189 HomeIand SecurIty nIormatIon, 189 HomeIand SecurIty nIormatIon, 189
HomeIand SecurIty nIormatIon 8uIIetIns, HomeIand SecurIty nIormatIon 8uIIetIns, HomeIand SecurIty nIormatIon 8uIIetIns, HomeIand SecurIty nIormatIon 8uIIetIns,
188, 189 188, 189 188, 189 188, 189
HomeIand SecurIty nIormatIon Network, HomeIand SecurIty nIormatIon Network, HomeIand SecurIty nIormatIon Network, HomeIand SecurIty nIormatIon Network,
189 189 189 189
HomeIand securIty nteIIIgence, 190 HomeIand securIty nteIIIgence, 190 HomeIand securIty nteIIIgence, 190 HomeIand securIty nteIIIgence, 190






25
HomeIand SecurIty nteIIIgence CommunI HomeIand SecurIty nteIIIgence CommunI HomeIand SecurIty nteIIIgence CommunI HomeIand SecurIty nteIIIgence CommunIty, ty, ty, ty,
191 191 191 191
HomeIand SecurIty OperatIons MornIng HomeIand SecurIty OperatIons MornIng HomeIand SecurIty OperatIons MornIng HomeIand SecurIty OperatIons MornIng
8rIeI, 191 8rIeI, 191 8rIeI, 191 8rIeI, 191
HomeIand SecurIty Threat AdvIsorIes, 188, HomeIand SecurIty Threat AdvIsorIes, 188, HomeIand SecurIty Threat AdvIsorIes, 188, HomeIand SecurIty Threat AdvIsorIes, 188,
191 191 191 191
HorIzontaI FusIon, 191 HorIzontaI FusIon, 191 HorIzontaI FusIon, 191 HorIzontaI FusIon, 191
HorIzontaI ntegratIon, 192 HorIzontaI ntegratIon, 192 HorIzontaI ntegratIon, 192 HorIzontaI ntegratIon, 192
Human EnvIronment, 192 Human EnvIronment, 192 Human EnvIronment, 192 Human EnvIronment, 192
Human TerraIn System, 192 Human TerraIn System, 192 Human TerraIn System, 192 Human TerraIn System, 192
HUMNT Manager, 193 HUMNT Manager, 193 HUMNT Manager, 193 HUMNT Manager, 193
con, 193 con, 193 con, 193 con, 193
nadequate Record KeepIn nadequate Record KeepIn nadequate Record KeepIn nadequate Record KeepIng (DetaInees), 194 g (DetaInees), 194 g (DetaInees), 194 g (DetaInees), 194
nadvertent DIscIosure, 194 nadvertent DIscIosure, 194 nadvertent DIscIosure, 194 nadvertent DIscIosure, 194
ncIdent, 194 ncIdent, 194 ncIdent, 194 ncIdent, 194
ncIdent Data Mart, 195 ncIdent Data Mart, 195 ncIdent Data Mart, 195 ncIdent Data Mart, 195
ndIcatIons and WarnIng (&W), 195 ndIcatIons and WarnIng (&W), 195 ndIcatIons and WarnIng (&W), 195 ndIcatIons and WarnIng (&W), 195
ndIrect nIormatIon WarIare, 195 ndIrect nIormatIon WarIare, 195 ndIrect nIormatIon WarIare, 195 ndIrect nIormatIon WarIare, 195
nIIuence OperatIons, 195 nIIuence OperatIons, 195 nIIuence OperatIons, 195 nIIuence OperatIons, 195
nIo, 196 nIo, 196 nIo, 196 nIo, 196
nIobIockade, 196 nIobIockade, 196 nIobIockade, 196 nIobIockade, 196
nIormant, 196 nIormant, 196 nIormant, 196 nIormant, 196
nIormatIon, 196 nIormatIon, 196 nIormatIon, 196 nIormatIon, 196
nIormatIon Assu nIormatIon Assu nIormatIon Assu nIormatIon Assurance (A), 198 rance (A), 198 rance (A), 198 rance (A), 198
nIormatIon Attack, 198 nIormatIon Attack, 198 nIormatIon Attack, 198 nIormatIon Attack, 198
nIormatIon 8ox, 199 nIormatIon 8ox, 199 nIormatIon 8ox, 199 nIormatIon 8ox, 199
nIormatIon 8ureaucratIzatIon, 199 nIormatIon 8ureaucratIzatIon, 199 nIormatIon 8ureaucratIzatIon, 199 nIormatIon 8ureaucratIzatIon, 199
nIormatIon CoIIectIon 8udget (C8), 199 nIormatIon CoIIectIon 8udget (C8), 199 nIormatIon CoIIectIon 8udget (C8), 199 nIormatIon CoIIectIon 8udget (C8), 199
nIormatIon Corps, 219 nIormatIon Corps, 219 nIormatIon Corps, 219 nIormatIon Corps, 219
nIormatIon CrIme nIormatIon CrImInaI, nIormatIon CrIme nIormatIon CrImInaI, nIormatIon CrIme nIormatIon CrImInaI, nIormatIon CrIme nIormatIon CrImInaI,
200 200 200 200
nIormatIon DIIIerentIaI, 203 nIormatIon DIIIerentIaI, 203 nIormatIon DIIIerentIaI, 203 nIormatIon DIIIerentIaI, 203
nIormatIon DomaIn, nIormatIon DomaIn, nIormatIon DomaIn, nIormatIon DomaIn, 203 203 203 203
nIormatIon DomInance, 203 nIormatIon DomInance, 203 nIormatIon DomInance, 203 nIormatIon DomInance, 203
nIormatIon EnvIronment, 204 nIormatIon EnvIronment, 204 nIormatIon EnvIronment, 204 nIormatIon EnvIronment, 204
nIormatIon ExpIoItatIon, 204 nIormatIon ExpIoItatIon, 204 nIormatIon ExpIoItatIon, 204 nIormatIon ExpIoItatIon, 204
nIormatIon ExpIoItatIon OIIIce, 204 nIormatIon ExpIoItatIon OIIIce, 204 nIormatIon ExpIoItatIon OIIIce, 204 nIormatIon ExpIoItatIon OIIIce, 204
nIormatIon FeudaIIsm, 205 nIormatIon FeudaIIsm, 205 nIormatIon FeudaIIsm, 205 nIormatIon FeudaIIsm, 205
nIormatIon FratrIcIde, 205 nIormatIon FratrIcIde, 205 nIormatIon FratrIcIde, 205 nIormatIon FratrIcIde, 205
nIormatIon FunctIon, 205 nIormatIon FunctIon, 205 nIormatIon FunctIon, 205 nIormatIon FunctIon, 205
nIormatIon FusIon, 205 nIormatIon FusIon, 205 nIormatIon FusIon, 205 nIormatIon FusIon, 205
nIormatIon CatherIng an nIormatIon CatherIng an nIormatIon CatherIng an nIormatIon CatherIng and AnaIysIs, 205 d AnaIysIs, 205 d AnaIysIs, 205 d AnaIysIs, 205
nIormatIon CrId, 206 nIormatIon CrId, 206 nIormatIon CrId, 206 nIormatIon CrId, 206
nIormatIon LaunderIng, 206 nIormatIon LaunderIng, 206 nIormatIon LaunderIng, 206 nIormatIon LaunderIng, 206
nIormatIon LIIe CycIe, 206 nIormatIon LIIe CycIe, 206 nIormatIon LIIe CycIe, 206 nIormatIon LIIe CycIe, 206
nIormatIon Management, 207 nIormatIon Management, 207 nIormatIon Management, 207 nIormatIon Management, 207
nIormatIon OperatIons (O), 207 nIormatIon OperatIons (O), 207 nIormatIon OperatIons (O), 207 nIormatIon OperatIons (O), 207
nIormatIon OperatIons Roadmap, 208 nIormatIon OperatIons Roadmap, 208 nIormatIon OperatIons Roadmap, 208 nIormatIon OperatIons Roadmap, 208
nIormatIon OperatIons Task Force, 208 nIormatIon OperatIons Task Force, 208 nIormatIon OperatIons Task Force, 208 nIormatIon OperatIons Task Force, 208
nIormatIon Owner, 209 nIormatIon Owner, 209 nIormatIon Owner, 209 nIormatIon Owner, 209
nI nI nI nIormatIon PeacekeepIng, 209 ormatIon PeacekeepIng, 209 ormatIon PeacekeepIng, 209 ormatIon PeacekeepIng, 209
nIormatIon PoIIutIon, 209 nIormatIon PoIIutIon, 209 nIormatIon PoIIutIon, 209 nIormatIon PoIIutIon, 209
nIormatIon ProtectIon, 210 nIormatIon ProtectIon, 210 nIormatIon ProtectIon, 210 nIormatIon ProtectIon, 210
nIormatIon PurIIIcatIon DIrectIves, 210 nIormatIon PurIIIcatIon DIrectIves, 210 nIormatIon PurIIIcatIon DIrectIves, 210 nIormatIon PurIIIcatIon DIrectIves, 210
nIormatIon RequIrements (R), 210 nIormatIon RequIrements (R), 210 nIormatIon RequIrements (R), 210 nIormatIon RequIrements (R), 210
nIormatIon Resources, 210 nIormatIon Resources, 210 nIormatIon Resources, 210 nIormatIon Resources, 210
nIormatIon Resources Management (RM), nIormatIon Resources Management (RM), nIormatIon Resources Management (RM), nIormatIon Resources Management (RM),
210 210 210 210
nIormatIon RIchness, 211 nIormatIon RIchness, 211 nIormatIon RIchness, 211 nIormatIon RIchness, 211
nIormatIon SecurIty (NFOSEC), 211 nIormatIon SecurIty (NFOSEC), 211 nIormatIon SecurIty (NFOSEC), 211 nIormatIon SecurIty (NFOSEC), 211
nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce
(SOO), 212 (SOO), 212 (SOO), 212 (SOO), 212
nIormatIon SharIng, 212 nIormatIon SharIng, 212 nIormatIon SharIng, 212 nIormatIon SharIng, 212
nIormatIon SharIng and AnaIysIs nIormatIon SharIng and AnaIysIs nIormatIon SharIng and AnaIysIs nIormatIon SharIng and AnaIysIs
OrganIzatIon (SAO, 213 OrganIzatIon (SAO, 213 OrganIzatIon (SAO, 213 OrganIzatIon (SAO, 213
nIormatIon SharIng CouncII, 213 nIormatIon SharIng CouncII, 213 nIormatIon SharIng CouncII, 213 nIormatIon SharIng CouncII, 213
nIormatIon SIIo AIIect, 215 nIormatIon SIIo AIIect, 215 nIormatIon SIIo AIIect, 215 nIormatIon SIIo AIIect, 215
InIormatIon superIorIty, 20 InIormatIon superIorIty, 20 InIormatIon superIorIty, 20 InIormatIon superIorIty, 203 33 3






26
nIormatIon SuperIorIty, 102, 179, 215 nIormatIon SuperIorIty, 102, 179, 215 nIormatIon SuperIorIty, 102, 179, 215 nIormatIon SuperIorIty, 102, 179, 215
nIormatIon System (S, 216 nIormatIon System (S, 216 nIormatIon System (S, 216 nIormatIon System (S, 216
nIormatIon TechnoIogy Agreement, 216 nIormatIon TechnoIogy Agreement, 216 nIormatIon TechnoIogy Agreement, 216 nIormatIon TechnoIogy Agreement, 216
nIormatIon WarIare (W), 217 nIormatIon WarIare (W), 217 nIormatIon WarIare (W), 217 nIormatIon WarIare (W), 217
nIormatIon WarrIor, 219 nIormatIon WarrIor, 219 nIormatIon WarrIor, 219 nIormatIon WarrIor, 219
nIormatIonaI n nIormatIonaI n nIormatIonaI n nIormatIonaI n- -- -8reedIng, 219 8reedIng, 219 8reedIng, 219 8reedIng, 219
nIormed CompIIance, 219 nIormed CompIIance, 219 nIormed CompIIance, 219 nIormed CompIIance, 219
nIormed Consent, 220 nIormed Consent, 220 nIormed Consent, 220 nIormed Consent, 220
nIosphere, 221 nIosphere, 221 nIosphere, 221 nIosphere, 221
InIowar, 218 InIowar, 218 InIowar, 218 InIowar, 218
nIragard, 221 nIragard, 221 nIragard, 221 nIragard, 221
n n n n- -- -Q QQ Q- -- -TeI, 222 TeI, 222 TeI, 222 TeI, 222
nsIght Smart DIscovery, 222 nsIght Smart DIscovery, 222 nsIght Smart DIscovery, 222 nsIght Smart DIscovery, 222
nspectabIe Space, 222 nspectabIe Space, 222 nspectabIe Space, 222 nspectabIe Space, 222
nstItutIonaI ControIs, 223 nstItutIonaI ControIs, 223 nstItutIonaI ControIs, 223 nstItutIonaI ControIs, 223
nstruments oI NatIonaI Power, 223 nstruments oI NatIonaI Power, 223 nstruments oI NatIonaI Power, 223 nstruments oI NatIonaI Power, 223
ntegraI FIIe 8Iock, 160, 223 ntegraI FIIe 8Iock, 160, 223 ntegraI FIIe 8Iock, 160, 223 ntegraI FIIe 8Iock, 160, 223
ntegrIty (oI InIormatIon), 224 ntegrIty (oI InIormatIon), 224 ntegrIty (oI InIormatIon), 224 ntegrIty (oI InIormatIon), 224
nteIInk, 224 nteIInk, 224 nteIInk, 224 nteIInk, 224
nteIIIgence, 225 nteIIIgence, 225 nteIIIgence, 225 nteIIIgence, 225
nteI nteI nteI nteIIIgence ActIvIty, 226 IIgence ActIvIty, 226 IIgence ActIvIty, 226 IIgence ActIvIty, 226
nteIIIgence CommunIty, 227 nteIIIgence CommunIty, 227 nteIIIgence CommunIty, 227 nteIIIgence CommunIty, 227
nteIIIgence CommunIty DIrectIves, 228 nteIIIgence CommunIty DIrectIves, 228 nteIIIgence CommunIty DIrectIves, 228 nteIIIgence CommunIty DIrectIves, 228
nteIIIgence CycIe, 228 nteIIIgence CycIe, 228 nteIIIgence CycIe, 228 nteIIIgence CycIe, 228
nteIIIgence nIormatIon, 229 nteIIIgence nIormatIon, 229 nteIIIgence nIormatIon, 229 nteIIIgence nIormatIon, 229
nteIIIgence nIormatIon Report, 232 nteIIIgence nIormatIon Report, 232 nteIIIgence nIormatIon Report, 232 nteIIIgence nIormatIon Report, 232
nteIIIgence ]ournaI, 232 nteIIIgence ]ournaI, 232 nteIIIgence ]ournaI, 232 nteIIIgence ]ournaI, 232
nteIIIgence LeveIs LeveIs oI nteIIIgence, nteIIIgence LeveIs LeveIs oI nteIIIgence, nteIIIgence LeveIs LeveIs oI nteIIIgence, nteIIIgence LeveIs LeveIs oI nteIIIgence,
232 232 232 232
nteIIIgence Method, 233 nteIIIgence Method, 233 nteIIIgence Method, 233 nteIIIgence Method, 233
nteIIIgence OversIght 8oard, 233 nteIIIgence OversIght 8oard, 233 nteIIIgence OversIght 8oard, 233 nteIIIgence OversIght 8oard, 233
nteIIIgence OversIght 8oard (O8), 233 nteIIIgence OversIght 8oard (O8), 233 nteIIIgence OversIght 8oard (O8), 233 nteIIIgence OversIght 8oard (O8), 233
nteIIIgence Process, 234 nteIIIgence Process, 234 nteIIIgence Process, 234 nteIIIgence Process, 234
nteIIIgence Report (NTREP), 234 nteIIIgence Report (NTREP), 234 nteIIIgence Report (NTREP), 234 nteIIIgence Report (NTREP), 234
nteIIIgence ReportIng, 234 nteIIIgence ReportIng, 234 nteIIIgence ReportIng, 234 nteIIIgence ReportIng, 234
nteIIIgence SAP, 235 nteIIIgence SAP, 235 nteIIIgence SAP, 235 nteIIIgence SAP, 235
nteIIIgence Secrecy, 365 nteIIIgence Secrecy, 365 nteIIIgence Secrecy, 365 nteIIIgence Secrecy, 365
nteIIIgence SharIng nteIIIgence SharIng nteIIIgence SharIng nteIIIgence SharIng Procedures, 260 Procedures, 260 Procedures, 260 Procedures, 260
nteIIIgence Subject Code nteIIIgence Subject Code nteIIIgence Subject Code nteIIIgence Subject Code 235 235 235 235
nteIIIgence, SurveIIIance and nteIIIgence, SurveIIIance and nteIIIgence, SurveIIIance and nteIIIgence, SurveIIIance and
ReconnaIssance (SR, 235 ReconnaIssance (SR, 235 ReconnaIssance (SR, 235 ReconnaIssance (SR, 235
nteragency SecurIty CIassIIIcatIon AppeaIs nteragency SecurIty CIassIIIcatIon AppeaIs nteragency SecurIty CIassIIIcatIon AppeaIs nteragency SecurIty CIassIIIcatIon AppeaIs
PaneI (SCAP), 235 PaneI (SCAP), 235 PaneI (SCAP), 235 PaneI (SCAP), 235
nternaI AIIaIrs Treasury EnIorcement nternaI AIIaIrs Treasury EnIorcement nternaI AIIaIrs Treasury EnIorcement nternaI AIIaIrs Treasury EnIorcement
CommunIcatIons System AudIt Data Mart, CommunIcatIons System AudIt Data Mart, CommunIcatIons System AudIt Data Mart, CommunIcatIons System AudIt Data Mart,
236 236 236 236
nternatIo nternatIo nternatIo nternatIonaI PubIIc nIormatIon [P] System, naI PubIIc nIormatIon [P] System, naI PubIIc nIormatIon [P] System, naI PubIIc nIormatIon [P] System,
236 236 236 236
nterrogatIon OperatIons, 237 nterrogatIon OperatIons, 237 nterrogatIon OperatIons, 237 nterrogatIon OperatIons, 237
nventIon Secrecy, 365 nventIon Secrecy, 365 nventIon Secrecy, 365 nventIon Secrecy, 365
nvestIgatIve Data Warehouse, 237 nvestIgatIve Data Warehouse, 237 nvestIgatIve Data Warehouse, 237 nvestIgatIve Data Warehouse, 237
SE Shared Spaces, 238 SE Shared Spaces, 238 SE Shared Spaces, 238 SE Shared Spaces, 238
]acques EIIuI, 333 ]acques EIIuI, 333 ]acques EIIuI, 333 ]acques EIIuI, 333
]ohn Moss, 171 ]ohn Moss, 171 ]ohn Moss, 171 ]ohn Moss, 171
]oInt AdvertIsIng and Market Research ]oInt AdvertIsIng and Market Research ]oInt AdvertIsIng and Market Research ]oInt AdvertIsIng and Market Research
Database, 238 Database, 238 Database, 238 Database, 238
]oInt Document ExpI ]oInt Document ExpI ]oInt Document ExpI ]oInt Document ExpIoItatIon Center, 239 oItatIon Center, 239 oItatIon Center, 239 oItatIon Center, 239
]oInt nIormatIon 8ureau (]8), 239 ]oInt nIormatIon 8ureau (]8), 239 ]oInt nIormatIon 8ureau (]8), 239 ]oInt nIormatIon 8ureau (]8), 239
]oInt nteIIIgence CommunIty CouncII, 239 ]oInt nteIIIgence CommunIty CouncII, 239 ]oInt nteIIIgence CommunIty CouncII, 239 ]oInt nteIIIgence CommunIty CouncII, 239
]oInt nteIIIgence Task Force, 242 ]oInt nteIIIgence Task Force, 242 ]oInt nteIIIgence Task Force, 242 ]oInt nteIIIgence Task Force, 242
]oInt nterrogatIon and DebrIeIIng Center ]oInt nterrogatIon and DebrIeIIng Center ]oInt nterrogatIon and DebrIeIIng Center ]oInt nterrogatIon and DebrIeIIng Center
(]DC), 240 (]DC), 240 (]DC), 240 (]DC), 240
]oInt MIIItary nteIIIgence Program, 240 ]oInt MIIItary nteIIIgence Program, 240 ]oInt MIIItary nteIIIgence Program, 240 ]oInt MIIItary nteIIIgence Program, 240
]oInt ProtectIon EnterprIse ]oInt ProtectIon EnterprIse ]oInt ProtectIon EnterprIse ]oInt ProtectIon EnterprIse Network (]PEN), Network (]PEN), Network (]PEN), Network (]PEN),
241 241 241 241
]oInt PsychoIogIcaI OperatIons Task Force, ]oInt PsychoIogIcaI OperatIons Task Force, ]oInt PsychoIogIcaI OperatIons Task Force, ]oInt PsychoIogIcaI OperatIons Task Force,
242 242 242 242






27
]oInt RegIonaI nIormatIon Exchange System ]oInt RegIonaI nIormatIon Exchange System ]oInt RegIonaI nIormatIon Exchange System ]oInt RegIonaI nIormatIon Exchange System
(]RES), 242 (]RES), 242 (]RES), 242 (]RES), 242
]oInt RegIonaI nteIIIgence Center, 242 ]oInt RegIonaI nteIIIgence Center, 242 ]oInt RegIonaI nteIIIgence Center, 242 ]oInt RegIonaI nteIIIgence Center, 242
]oInt WorIdwIde nteIIIgence ]oInt WorIdwIde nteIIIgence ]oInt WorIdwIde nteIIIgence ]oInt WorIdwIde nteIIIgence
CommunIcatIons System (]WCS), 235, CommunIcatIons System (]WCS), 235, CommunIcatIons System (]WCS), 235, CommunIcatIons System (]WCS), 235,
243 243 243 243
]UNE MaII, 243 ]UNE MaII, 243 ]UNE MaII, 243 ]UNE MaII, 243
Keystone Keystone Keystone Keystone PrIncIpIe oI CIassIIIcatIon, 244 PrIncIpIe oI CIassIIIcatIon, 244 PrIncIpIe oI CIassIIIcatIon, 244 PrIncIpIe oI CIassIIIcatIon, 244
KnowIedge, 244 KnowIedge, 244 KnowIedge, 244 KnowIedge, 244
KnowIedge Management, 244 KnowIedge Management, 244 KnowIedge Management, 244 KnowIedge Management, 244
Latest TIme nIormatIon Is oI VaIue, 245 Latest TIme nIormatIon Is oI VaIue, 245 Latest TIme nIormatIon Is oI VaIue, 245 Latest TIme nIormatIon Is oI VaIue, 245
Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng
Program (LESP) Exchange SpecIIIcatIon, Program (LESP) Exchange SpecIIIcatIon, Program (LESP) Exchange SpecIIIcatIon, Program (LESP) Exchange SpecIIIcatIon,
245 245 245 245
Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng Law EnIorcement nIormatIon SharIng
Program (LESP) Exchange Program (LESP) Exchange Program (LESP) Exchange Program (LESP) Exchange SpecIIIcatIon SpecIIIcatIon SpecIIIcatIon SpecIIIcatIon
(LEXS), 246 (LEXS), 246 (LEXS), 246 (LEXS), 246
Law EnIorcement SensItIve, 246 Law EnIorcement SensItIve, 246 Law EnIorcement SensItIve, 246 Law EnIorcement SensItIve, 246
Leak, 246 Leak, 246 Leak, 246 Leak, 246
Leak AnxIety, 249 Leak AnxIety, 249 Leak AnxIety, 249 Leak AnxIety, 249
Least PrIvIIege, 328 Least PrIvIIege, 328 Least PrIvIIege, 328 Least PrIvIIege, 328
LeveragIng, 249 LeveragIng, 249 LeveragIng, 249 LeveragIng, 249
LIbrary Awareness Program, 249 LIbrary Awareness Program, 249 LIbrary Awareness Program, 249 LIbrary Awareness Program, 249
LImItatIons on UncIassIIIed nIormatIon, LImItatIons on UncIassIIIed nIormatIon, LImItatIons on UncIassIIIed nIormatIon, LImItatIons on UncIassIIIed nIormatIon,
421 421 421 421
LImIted Access AuthorIzatIon (LAA), 250 LImIted Access AuthorIzatIon (LAA), 250 LImIted Access AuthorIzatIon (LAA), 250 LImIted Access AuthorIzatIon (LAA), 250
LImIted DIssemIna LImIted DIssemIna LImIted DIssemIna LImIted DIssemInatIon (LMDS), 81 tIon (LMDS), 81 tIon (LMDS), 81 tIon (LMDS), 81
LImIted OIIIcIaI Use, 86 LImIted OIIIcIaI Use, 86 LImIted OIIIcIaI Use, 86 LImIted OIIIcIaI Use, 86
LImIted OIIIcIaI Use nIormatIon (LOU), 250 LImIted OIIIcIaI Use nIormatIon (LOU), 250 LImIted OIIIcIaI Use nIormatIon (LOU), 250 LImIted OIIIcIaI Use nIormatIon (LOU), 250
LImIted to DOD and DOD Contractors OnIy, LImIted to DOD and DOD Contractors OnIy, LImIted to DOD and DOD Contractors OnIy, LImIted to DOD and DOD Contractors OnIy,
87 87 87 87
LImIted to Covernment AgencIes LImIted to Covernment AgencIes LImIted to Covernment AgencIes LImIted to Covernment AgencIes
nIormatIon, 86 nIormatIon, 86 nIormatIon, 86 nIormatIon, 86
L LL LInk anaIysIs, 34 Ink anaIysIs, 34 Ink anaIysIs, 34 Ink anaIysIs, 34
LombardI v. WhItman, LombardI v. WhItman, LombardI v. WhItman, LombardI v. WhItman, 259 259 259 259
L LL Lookout, 429 ookout, 429 ookout, 429 ookout, 429
Low 2 nIormatIon, 251 Low 2 nIormatIon, 251 Low 2 nIormatIon, 251 Low 2 nIormatIon, 251
MagIc Lantern, 251 MagIc Lantern, 251 MagIc Lantern, 251 MagIc Lantern, 251
Mandatory RevIew, 251 Mandatory RevIew, 251 Mandatory RevIew, 251 Mandatory RevIew, 251
Mark LombardI, 394, 395 Mark LombardI, 394, 395 Mark LombardI, 394, 395 Mark LombardI, 394, 395
MarkIng prohIbItIons, 93 MarkIng prohIbItIons, 93 MarkIng prohIbItIons, 93 MarkIng prohIbItIons, 93
MaskIng, 252 MaskIng, 252 MaskIng, 252 MaskIng, 252
MaterIaI, 252 MaterIaI, 252 MaterIaI, 252 MaterIaI, 252
MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI- -- -TerrorIsm TerrorIsm TerrorIsm TerrorIsm
nIormatIon Exchange, 252 nIormatIon Exchange, 252 nIormatIon Exchange, 252 nIormatIon Exchange, 252
MedIa, 253 MedIa, 253 MedIa, 253 MedIa, 253
MedIa Embed, 253 MedIa Embed, 253 MedIa Embed, 253 MedIa Embed, 253
MedIa MIstakes, 259 MedIa MIstakes, 259 MedIa MIstakes, 259 MedIa MIstakes, 259
Metadata, 253 Metadata, 253 Metadata, 253 Metadata, 253
METT METT METT METT- -- -TC, 254 TC, 254 TC, 254 TC, 254
MId MId MId MIdnIght ReguIatIons, 254 nIght ReguIatIons, 254 nIght ReguIatIons, 254 nIght ReguIatIons, 254
MIIItary SecurIty, 256 MIIItary SecurIty, 256 MIIItary SecurIty, 256 MIIItary SecurIty, 256
MIIItary AnaIyst Program, 254 MIIItary AnaIyst Program, 254 MIIItary AnaIyst Program, 254 MIIItary AnaIyst Program, 254
MIIItary DeceptIon, 255 MIIItary DeceptIon, 255 MIIItary DeceptIon, 255 MIIItary DeceptIon, 255
MIIItary deceptIon In support oI operatIons MIIItary deceptIon In support oI operatIons MIIItary deceptIon In support oI operatIons MIIItary deceptIon In support oI operatIons
securIty, 255 securIty, 255 securIty, 255 securIty, 255
MIIItary nIormatIon FunctIon, 255 MIIItary nIormatIon FunctIon, 255 MIIItary nIormatIon FunctIon, 255 MIIItary nIormatIon FunctIon, 255
MIIItary nteIIIgence 8oard, 256 MIIItary nteIIIgence 8oard, 256 MIIItary nteIIIgence 8oard, 256 MIIItary nteIIIgence 8oard, 256
MIIItary nteIIIgence ntegra MIIItary nteIIIgence ntegra MIIItary nteIIIgence ntegra MIIItary nteIIIgence ntegrated Data ted Data ted Data ted Data
System]ntegrated Database (MDS), 256 System]ntegrated Database (MDS), 256 System]ntegrated Database (MDS), 256 System]ntegrated Database (MDS), 256
MIIItary SensemakIng, 256 MIIItary SensemakIng, 256 MIIItary SensemakIng, 256 MIIItary SensemakIng, 256
MIIItary SymboI, 258 MIIItary SymboI, 258 MIIItary SymboI, 258 MIIItary SymboI, 258
MIneIIeId Record, 258 MIneIIeId Record, 258 MIneIIeId Record, 258 MIneIIeId Record, 258
MInerva ConsortIa Project MInerva, 258 MInerva ConsortIa Project MInerva, 258 MInerva ConsortIa Project MInerva, 258 MInerva ConsortIa Project MInerva, 258
MIsInIormatIon, 259 MIsInIormatIon, 259 MIsInIormatIon, 259 MIsInIormatIon, 259
MIssIon Creep, 260 MIssIon Creep, 260 MIssIon Creep, 260 MIssIon Creep, 260
ModeI CounterterrorIsm nvestIgatIve ModeI CounterterrorIsm nvestIgatIve ModeI CounterterrorIsm nvestIgatIve ModeI CounterterrorIsm nvestIgatIve
Strategy (MCS), 260 Strategy (MCS), 260 Strategy (MCS), 260 Strategy (MCS), 260






28
ModernIzed ntegrated Database (MD8), ModernIzed ntegrated Database (MD8), ModernIzed ntegrated Database (MD8), ModernIzed ntegrated Database (MD8),
261 261 261 261
Modus OperandI Database, 261 Modus OperandI Database, 261 Modus OperandI Database, 261 Modus OperandI Database, 261
MosaIc Theory, 261 MosaIc Theory, 261 MosaIc Theory, 261 MosaIc Theory, 261
MuItIIeveI Mode, 263 MuItIIeveI Mode, 263 MuItIIeveI Mode, 263 MuItIIeveI Mode, 263
MuItInatIonaI ]oInt PsychoIogIcaI OperatIons MuItInatIonaI ]oInt PsychoIogIcaI OperatIons MuItInatIonaI ]oInt PsychoIogIcaI OperatIons MuItInatIonaI ]oInt PsychoIogIcaI OperatIons
Task Force, 263 Task Force, 263 Task Force, 263 Task Force, 263
MuItIpIe Sources, 263 MuItIpIe Sources, 263 MuItIpIe Sources, 263 MuItIpIe Sources, 263
Named Area oI nterest, 263 Named Area oI nterest, 263 Named Area oI nterest, 263 Named Area oI nterest, 263
NatIonaI AppIIcatIons OIIIce, 264 NatIonaI AppIIcatIons OIIIce, 264 NatIonaI AppIIcatIons OIIIce, 264 NatIonaI AppIIcatIons OIIIce, 264
NatIonaI Asset Database, 264 NatIonaI Asset Database, 264 NatIonaI Asset Database, 264 NatIonaI Asset Database, 264
NatIonaI Cargo TrackIng PIan Cargo NatIonaI Cargo TrackIng PIan Cargo NatIonaI Cargo TrackIng PIan Cargo NatIonaI Cargo TrackIng PIan Cargo
TrackIng, 265 TrackIng, 265 TrackIng, 265 TrackIng, 265
NatIonaI CensorshIp, 266 NatIonaI CensorshIp, 266 NatIonaI CensorshIp, 266 NatIonaI CensorshIp, 266
NatIonaI CIandestIne ServIce (NCS), 266 NatIonaI CIandestIne ServIce (NCS), 266 NatIonaI CIandestIne ServIce (NCS), 266 NatIonaI CIandestIne ServIce (NCS), 266
NatIonaI CrIme nIormatIon Center, 267 NatIonaI CrIme nIormatIon Center, 267 NatIonaI CrIme nIormatIon Center, 267 NatIonaI CrIme nIormatIon Center, 267
NatIonaI DNA ndex System, 267 NatIonaI DNA ndex System, 267 NatIonaI DNA ndex System, 267 NatIonaI DNA ndex System, 267
NatIonaI ForeIgn nteIIIgence 8oard, 268 NatIonaI ForeIgn nteIIIgence 8oard, 268 NatIonaI ForeIgn nteIIIgence 8oard, 268 NatIonaI ForeIgn nteIIIgence 8oard, 268
N NN NatIonaI ForeIgn nteIIIgence Program atIonaI ForeIgn nteIIIgence Program atIonaI ForeIgn nteIIIgence Program atIonaI ForeIgn nteIIIgence Program
(NFP), 268 (NFP), 268 (NFP), 268 (NFP), 268
NatIonaI Cround nteIIIgence Center, 268 NatIonaI Cround nteIIIgence Center, 268 NatIonaI Cround nteIIIgence Center, 268 NatIonaI Cround nteIIIgence Center, 268
NatIonaI HIstorIcaI PubIIcatIons and Records NatIonaI HIstorIcaI PubIIcatIons and Records NatIonaI HIstorIcaI PubIIcatIons and Records NatIonaI HIstorIcaI PubIIcatIons and Records
CommIssIon, 269 CommIssIon, 269 CommIssIon, 269 CommIssIon, 269
NatIonaI ndustrIaI SecurIty Program (NSP), NatIonaI ndustrIaI SecurIty Program (NSP), NatIonaI ndustrIaI SecurIty Program (NSP), NatIonaI ndustrIaI SecurIty Program (NSP),
269 269 269 269
NatIonaI ndustrIaI SecurIty Program NatIonaI ndustrIaI SecurIty Program NatIonaI ndustrIaI SecurIty Program NatIonaI ndustrIaI SecurIty Program
OperatIng ManuaI (N OperatIng ManuaI (N OperatIng ManuaI (N OperatIng ManuaI (NSPOM; DoD SPOM; DoD SPOM; DoD SPOM; DoD
5220.22 5220.22 5220.22 5220.22- -- -M), 269 M), 269 M), 269 M), 269
NatIonaI nIormatIon nIrastructure (N), NatIonaI nIormatIon nIrastructure (N), NatIonaI nIormatIon nIrastructure (N), NatIonaI nIormatIon nIrastructure (N),
270 270 270 270
NatIonaI nteIIIgence, 270 NatIonaI nteIIIgence, 270 NatIonaI nteIIIgence, 270 NatIonaI nteIIIgence, 270
NatIonaI nteIIIgence 8oard, 271 NatIonaI nteIIIgence 8oard, 271 NatIonaI nteIIIgence 8oard, 271 NatIonaI nteIIIgence 8oard, 271
NatIonaI nteIIIgence CouncII, 271 NatIonaI nteIIIgence CouncII, 271 NatIonaI nteIIIgence CouncII, 271 NatIonaI nteIIIgence CouncII, 271
NatIonaI nteIIIgence Program, 271 NatIonaI nteIIIgence Program, 271 NatIonaI nteIIIgence Program, 271 NatIonaI nteIIIgence Program, 271
NatIonaI nteIIIgence Reserve Corps, 273 NatIonaI nteIIIgence Reserve Corps, 273 NatIonaI nteIIIgence Reserve Corps, 273 NatIonaI nteIIIgence Reserve Corps, 273
NatIonaI n NatIonaI n NatIonaI n NatIonaI nterests, 273 terests, 273 terests, 273 terests, 273
NatIonaI MedIa ExpIoItatIon Center, 273 NatIonaI MedIa ExpIoItatIon Center, 273 NatIonaI MedIa ExpIoItatIon Center, 273 NatIonaI MedIa ExpIoItatIon Center, 273
NatIonaI OperatIons SecurIty Program NatIonaI OperatIons SecurIty Program NatIonaI OperatIons SecurIty Program NatIonaI OperatIons SecurIty Program
(NOSP), 274 (NOSP), 274 (NOSP), 274 (NOSP), 274
NatIonaI SecurIty NatIonaI SecurIty NatIonaI SecurIty NatIonaI SecurIty, , , , 191, 191, 191, 191, 274 274 274 274, 367 , 367 , 367 , 367
- -- -c cc characterIstIcs oI the natIonaI securIty haracterIstIcs oI the natIonaI securIty haracterIstIcs oI the natIonaI securIty haracterIstIcs oI the natIonaI securIty
state state state state, 283 , 283 , 283 , 283
NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA), 276 , 276 , 276 , 276
NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch, 276 , 276 , 276 , 276
NatI NatI NatI NatIonaI SecurIty CouncII onaI SecurIty CouncII onaI SecurIty CouncII onaI SecurIty CouncII, 277 , 277 , 277 , 277
NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve, 277, , 277, , 277, , 277,
320 320 320 320
NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS), 277 , 277 , 277 , 277
NatIonaI SecurIty Letters NatIonaI SecurIty Letters NatIonaI SecurIty Letters NatIonaI SecurIty Letters, 279 , 279 , 279 , 279
NatIonaI SecurIty PresIdentIaI DIrectIve NatIonaI SecurIty PresIdentIaI DIrectIve NatIonaI SecurIty PresIdentIaI DIrectIve NatIonaI SecurIty PresIdentIaI DIrectIve
(NSPD) (NSPD) (NSPD) (NSPD), 281 , 281 , 281 , 281
NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs, 281 , 281 , 281 , 281
N NN NatIonaI securI atIonaI securI atIonaI securI atIonaI securIty space ty space ty space ty space, 282 , 282 , 282 , 282
NatIonaI securIty space programs NatIonaI securIty space programs NatIonaI securIty space programs NatIonaI securIty space programs, 282 , 282 , 282 , 282
NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy, 283 , 283 , 283 , 283
NatIonaI SecurIty System NatIonaI SecurIty System NatIonaI SecurIty System NatIonaI SecurIty System, 284 , 284 , 284 , 284
NatIonaI SecurIty Systems, 179 NatIonaI SecurIty Systems, 179 NatIonaI SecurIty Systems, 179 NatIonaI SecurIty Systems, 179
NatIonaI Strategy NatIonaI Strategy NatIonaI Strategy NatIonaI Strategy, 284 , 284 , 284 , 284
NATO UNCLASSFED (NU), 82 NATO UNCLASSFED (NU), 82 NATO UNCLASSFED (NU), 82 NATO UNCLASSFED (NU), 82
NavaI NucIear PropuIsIon nIormatIon NavaI NucIear PropuIsIon nIormatIon NavaI NucIear PropuIsIon nIormatIon NavaI NucIear PropuIsIon nIormatIon
(NNP) (NNP) (NNP) (NNP), 284 , 284 , 284 , 284
NCTC [NatIon NCTC [NatIon NCTC [NatIon NCTC [NatIonaI CounterterrorIsm Center] aI CounterterrorIsm Center] aI CounterterrorIsm Center] aI CounterterrorIsm Center]
OnIIne, 266 OnIIne, 266 OnIIne, 266 OnIIne, 266
Need to Know DetermInatIon Need to Know DetermInatIon Need to Know DetermInatIon Need to Know DetermInatIon, 287 , 287 , 287 , 287
Need Need Need Need- -- -to to to to- -- -Know Know Know Know, 284 , 284 , 284 , 284
Netwar Netwar Netwar Netwar, 287 , 287 , 287 , 287
Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System, , , ,
287 287 287 287






29
NCKA NCKA NCKA NCKA, 288 , 288 , 288 , 288
NIckname NIckname NIckname NIckname, 288 , 288 , 288 , 288
NIne CategorIes oI CIassIIIcatIon and NIne CategorIes oI CIassIIIcatIon and NIne CategorIes oI CIassIIIcatIon and NIne CategorIes oI CIassIIIcatIon and
ControI MarkIngs, 73 ControI MarkIngs, 73 ControI MarkIngs, 73 ControI MarkIngs, 73
No DIstrIbutIon (NOD No DIstrIbutIon (NOD No DIstrIbutIon (NOD No DIstrIbutIon (NODS), 82 S), 82 S), 82 S), 82
NOFORN, 77, 248 NOFORN, 77, 248 NOFORN, 77, 248 NOFORN, 77, 248
NoncrItIcaI NoncrItIcaI NoncrItIcaI NoncrItIcaI- -- -SensItIve (NCS) SensItIve (NCS) SensItIve (NCS) SensItIve (NCS), 282 , 282 , 282 , 282
NondIscIosure Agreements (NDA) NondIscIosure Agreements (NDA) NondIscIosure Agreements (NDA) NondIscIosure Agreements (NDA), 289 , 289 , 289 , 289
Non Non Non Non- -- -nteIIIgence CommunIty MarkIngs, 82 nteIIIgence CommunIty MarkIngs, 82 nteIIIgence CommunIty MarkIngs, 82 nteIIIgence CommunIty MarkIngs, 82
NonorganIc nteIIIgence Support NonorganIc nteIIIgence Support NonorganIc nteIIIgence Support NonorganIc nteIIIgence Support, 290 , 290 , 290 , 290
North AtIantIc Treaty OrganIzatIon North AtIantIc Treaty OrganIzatIon North AtIantIc Treaty OrganIzatIon North AtIantIc Treaty OrganIzatIon
nIormatIon (NATO) nIormatIon (NATO) nIormatIon (NATO) nIormatIon (NATO), 290 , 290 , 290 , 290
Not In the cIrcIe oI Iove Not In the cIrcIe oI Iove Not In the cIrcIe oI Iove Not In the cIrcIe oI Iove, 2 , 2 , 2 , 291 91 91 91
NOT RELEASA8LE TO NOT RELEASA8LE TO NOT RELEASA8LE TO NOT RELEASA8LE TO
CONTRACTORS]CONSULTANTS CONTRACTORS]CONSULTANTS CONTRACTORS]CONSULTANTS CONTRACTORS]CONSULTANTS
(NOCONTRACT or NC (NOCONTRACT or NC (NOCONTRACT or NC (NOCONTRACT or NC) )) ), 83 , 83 , 83 , 83, 87 , 87 , 87 , 87
NOT RELEASA8LE TO FORECN NATONALS, NOT RELEASA8LE TO FORECN NATONALS, NOT RELEASA8LE TO FORECN NATONALS, NOT RELEASA8LE TO FORECN NATONALS,
87 87 87 87
NoveI nteIIIgence Irom MassIve Data NoveI nteIIIgence Irom MassIve Data NoveI nteIIIgence Irom MassIve Data NoveI nteIIIgence Irom MassIve Data
(NMD) (NMD) (NMD) (NMD), 291 , 291 , 291 , 291
NucIear ReguIatory CommIssIon, 374 NucIear ReguIatory CommIssIon, 374 NucIear ReguIatory CommIssIon, 374 NucIear ReguIatory CommIssIon, 374
NucIear Secrecy, 365 NucIear Secrecy, 365 NucIear Secrecy, 365 NucIear Secrecy, 365
O8SCENE FIIe O8SCENE FIIe O8SCENE FIIe O8SCENE FIIe, 292 , 292 , 292 , 292
ObsoIete RestrIctIons ObsoIete RestrIctIons ObsoIete RestrIctIons ObsoIete RestrIctIons and ControI MarkIngs, and ControI MarkIngs, and ControI MarkIngs, and ControI MarkIngs,
77 77 77 77
OI OIIIcIaI Concern OI OIIIcIaI Concern OI OIIIcIaI Concern OI OIIIcIaI Concern, 292 , 292 , 292 , 292
OIIensIve CounterInIormatIon OIIensIve CounterInIormatIon OIIensIve CounterInIormatIon OIIensIve CounterInIormatIon, 292 , 292 , 292 , 292
OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons, 293 , 293 , 293 , 293
OIIIce oI CensorshIp OIIIce oI CensorshIp OIIIce oI CensorshIp OIIIce oI CensorshIp, 293 , 293 , 293 , 293
OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons, 293 , 293 , 293 , 293
OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence, 294 , 294 , 294 , 294
OIIIce oI StrategIc ServIces, 334 OIIIce oI StrategIc ServIces, 334 OIIIce oI StrategIc ServIces, 334 OIIIce oI StrategIc ServIces, 334
O OO OIIIcIaI DoD nIormatIon IIIcIaI DoD nIormatIon IIIcIaI DoD nIormatIon IIIcIaI DoD nIormatIon, 294 , 294 , 294 , 294
OIIIcIaI nIormatIon OIIIcIaI nIormatIon OIIIcIaI nIormatIon OIIIcIaI nIormatIon, 294 , 294 , 294 , 294
OIIIcIaI Use OnIy, 83 OIIIcIaI Use OnIy, 83 OIIIcIaI Use OnIy, 83 OIIIcIaI Use OnIy, 83
OIIIcIaI Use OnIy (OUO) OIIIcIaI Use OnIy (OUO) OIIIcIaI Use OnIy (OUO) OIIIcIaI Use OnIy (OUO), 295 , 295 , 295 , 295
OC OC OC OC-- -- -- --Project StrIkeback Project StrIkeback Project StrIkeback Project StrIkeback, 295 , 295 , 295 , 295
Open Source Center Open Source Center Open Source Center Open Source Center, 296 , 296 , 296 , 296
Open Source nIormatIon Open Source nIormatIon Open Source nIormatIon Open Source nIormatIon, 296 , 296 , 296 , 296
Open Source nIormatIon System (OSS) Open Source nIormatIon System (OSS) Open Source nIormatIon System (OSS) Open Source nIormatIon System (OSS), 297 , 297 , 297 , 297
Open Storage Open Storage Open Storage Open Storage, 298 , 298 , 298 , 298
Open Open Open Open- -- -So So So Source nteIIIgence (OSNT) urce nteIIIgence (OSNT) urce nteIIIgence (OSNT) urce nteIIIgence (OSNT), 297 , 297 , 297 , 297
OperatIon AIert OperatIon AIert OperatIon AIert OperatIon AIert, 293 , 293 , 293 , 293
OperatIonaI DocumentatIon (OPDOC) OperatIonaI DocumentatIon (OPDOC) OperatIonaI DocumentatIon (OPDOC) OperatIonaI DocumentatIon (OPDOC), 298 , 298 , 298 , 298
OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon, 299 , 299 , 299 , 299
operatIonaI IIIes as exempt operatIonaI IIIes as exempt operatIonaI IIIes as exempt operatIonaI IIIes as exempt, 300 , 300 , 300 , 300
OperatIonaI nIormatIon OperatIonaI nIormatIon OperatIonaI nIormatIon OperatIonaI nIormatIon, 300 , 300 , 300 , 300
OperatIonaI mIIItary deceptIon, 255 OperatIonaI mIIItary deceptIon, 255 OperatIonaI mIIItary deceptIon, 255 OperatIonaI mIIItary deceptIon, 255
OperatIonaI PSYOP, 338 OperatIonaI PSYOP, 338 OperatIonaI PSYOP, 338 OperatIonaI PSYOP, 338
OperatIon OperatIon OperatIon OperatIons SecurIty Protected nIormatIon s SecurIty Protected nIormatIon s SecurIty Protected nIormatIon s SecurIty Protected nIormatIon, , , ,
301 301 301 301
OpposIng nIormatIon OpposIng nIormatIon OpposIng nIormatIon OpposIng nIormatIon, 301 , 301 , 301 , 301
ORCON, 77 ORCON, 77 ORCON, 77 ORCON, 77
OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe, 301 , 301 , 301 , 301
OrIgInaI CIassIIIcatIon AuthorIty (OCA), OrIgInaI CIassIIIcatIon AuthorIty (OCA), OrIgInaI CIassIIIcatIon AuthorIty (OCA), OrIgInaI CIassIIIcatIon AuthorIty (OCA), 46, 46, 46, 46,
71, 71, 71, 71, 150, 302 150, 302 150, 302 150, 302
OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon, 301 , 301 , 301 , 301
OrIgInaI CIassIIIer OrIgInaI CIassIIIer OrIgInaI CIassIIIer OrIgInaI CIassIIIer, 302 , 302 , 302 , 302
OvercIassIIIcatIon OvercIassIIIcatIon OvercIassIIIcatIon OvercIassIIIcatIon, 303 , 303 , 303 , 303
OvercIassIII OvercIassIII OvercIassIII OvercIassIIIcatIon PreventIon Program catIon PreventIon Program catIon PreventIon Program catIon PreventIon Program, 303 , 303 , 303 , 303
Overt PeacetIme PsychoIogIcaI OperatIons Overt PeacetIme PsychoIogIcaI OperatIons Overt PeacetIme PsychoIogIcaI OperatIons Overt PeacetIme PsychoIogIcaI OperatIons
Programs (OP3) Programs (OP3) Programs (OP3) Programs (OP3), 303 , 303 , 303 , 303
Overt Products Overt Products Overt Products Overt Products, 303 , 303 , 303 , 303
P2 P2 P2 P2, 321 , 321 , 321 , 321
P5 P5 P5 P5, 321 , 321 , 321 , 321
PACER PACER PACER PACER, 304 , 304 , 304 , 304
Paperwork ReductIon Act Paperwork ReductIon Act Paperwork ReductIon Act Paperwork ReductIon Act, 304 , 304 , 304 , 304
PartItIon PartItIonIng PartItIon PartItIonIng PartItIon PartItIonIng PartItIon PartItIonIng, 305 , 305 , 305 , 305






30
PartItIoned SecurIty Mode PartItIoned SecurIty Mode PartItIoned SecurIty Mode PartItIoned SecurIty Mode, 306 , 306 , 306 , 306
Pass]FaII (P]F) Pass]FaII (P]F) Pass]FaII (P]F) Pass]FaII (P]F), 307 , 307 , 307 , 307
Passen Passen Passen Passenger Name Record ger Name Record ger Name Record ger Name Record, 306 , 306 , 306 , 306
passenger name records, 371 passenger name records, 371 passenger name records, 371 passenger name records, 371
Patent Secrecy Act oI 1952, 369 Patent Secrecy Act oI 1952, 369 Patent Secrecy Act oI 1952, 369 Patent Secrecy Act oI 1952, 369
Patents Patents Patents Patents, 307 , 307 , 307 , 307
PATHFNDER PATHFNDER PATHFNDER PATHFNDER, 307 , 307 , 307 , 307
Pen RegIster Pen RegIster Pen RegIster Pen RegIster, 308 , 308 , 308 , 308
PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS), 308 , 308 , 308 , 308
PerceptIon Management PerceptIon Management PerceptIon Management PerceptIon Management, 308 , 308 , 308 , 308
PERSEREC Database PERSEREC Database PERSEREC Database PERSEREC Database, 309 , 309 , 309 , 309
PersonaIIy dentIIIabIe nIormatIon PersonaIIy dentIIIabIe nIormatIon PersonaIIy dentIIIabIe nIormatIon PersonaIIy dentIIIabIe nIormatIon, 309 , 309 , 309 , 309
PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes, 309 , 309 , 309 , 309
PInk Paper PInk Paper PInk Paper PInk Paper, 310 , 310 , 310 , 310
PIaIn Text PIaIn Text PIaIn Text PIaIn Text, 310 , 310 , 310 , 310
PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty, 311 , 311 , 311 , 311
PoInter System or ndex PoInter System or ndex PoInter System or ndex PoInter System or ndex, 311 , 311 , 311 , 311
PoIIce nIormatIon PoIIce nIormatIon PoIIce nIormatIon PoIIce nIormatIon, 311 , 311 , 311 , 311
poIItIcaI secrecy, 366 poIItIcaI secrecy, 366 poIItIcaI secrecy, 366 poIItIcaI secrecy, 366
PortIon MarkIngs, 84 PortIon MarkIngs, 84 PortIon MarkIngs, 84 PortIon MarkIngs, 84
PossIbIe PossIbIe PossIbIe PossIbIe, 311 , 311 , 311 , 311
Power ProjectIon Power ProjectIon Power ProjectIon Power ProjectIon, 311 , 311 , 311 , 311
Power to the Edge Power to the Edge Power to the Edge Power to the Edge, 312 , 312 , 312 , 312
PractIcaI ObscurIty PractIcaI ObscurIty PractIcaI ObscurIty PractIcaI ObscurIty, 312 , 312 , 312 , 312
PractIcaI UtIIIty PractIcaI UtIIIty PractIcaI UtIIIty PractIcaI UtIIIty, 313 , 313 , 313 , 313
PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe, 313 , 313 , 313 , 313
Prepackaged News StorIes Prepackaged News StorIes Prepackaged News StorIes Prepackaged News StorIes, 314 , 314 , 314 , 314
PrepubIIcatIon RevIew PrepubIIcatIon RevIew PrepubIIcatIon RevIew PrepubIIcatIon RevIew, 315 , 315 , 315 , 315
PresIdent's ForeIgn nteIIIgence AdvIsory PresIdent's ForeIgn nteIIIgence AdvIsory PresIdent's ForeIgn nteIIIgence AdvIsory PresIdent's ForeIgn nteIIIgence AdvIsory
8oard, 325 8oard, 325 8oard, 325 8oard, 325
PresIdentIaI Record, 350 PresIdentIaI Record, 350 PresIdentIaI Record, 350 PresIdentIaI Record, 350
PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI, 318 , 318 , 318 , 318
PresIdentI PresIdentI PresIdentI PresIdentIaI DetermInatIon aI DetermInatIon aI DetermInatIon aI DetermInatIon, 319 , 319 , 319 , 319
PresIdentIaI DIrectIve PresIdentIaI DIrectIve PresIdentIaI DIrectIve PresIdentIaI DIrectIve, 320 , 320 , 320 , 320
PresIdentIaI FIndIng PresIdentIaI FIndIng PresIdentIaI FIndIng PresIdentIaI FIndIng, 320 , 320 , 320 , 320
PresIdentIaI Records PresIdentIaI Records PresIdentIaI Records PresIdentIaI Records, 321 , 321 , 321 , 321
PresIdentIaI RestrIctIons PresIdentIaI RestrIctIons PresIdentIaI RestrIctIons PresIdentIaI RestrIctIons, 321 , 321 , 321 , 321
PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements, 322 , 322 , 322 , 322
PresIdent's DaIIy 8rIeI (PD8) PresIdent's DaIIy 8rIeI (PD8) PresIdent's DaIIy 8rIeI (PD8) PresIdent's DaIIy 8rIeI (PD8), 324 , 324 , 324 , 324
PrImary CensorshIp, 325 PrImary CensorshIp, 325 PrImary CensorshIp, 325 PrImary CensorshIp, 325
PrIor RestraInt, 325 PrIor RestraInt, 325 PrIor RestraInt, 325 PrIor RestraInt, 325
PrIson PrIson PrIson PrIsoner oI War CensorshIp, 326 er oI War CensorshIp, 326 er oI War CensorshIp, 326 er oI War CensorshIp, 326
PrIvacy, 326 PrIvacy, 326 PrIvacy, 326 PrIvacy, 326
PrIvacy Act oI 1974, 326 PrIvacy Act oI 1974, 326 PrIvacy Act oI 1974, 326 PrIvacy Act oI 1974, 326
PrIvacy and CIvII LIbertIes OversIght 8oard, PrIvacy and CIvII LIbertIes OversIght 8oard, PrIvacy and CIvII LIbertIes OversIght 8oard, PrIvacy and CIvII LIbertIes OversIght 8oard,
326 326 326 326
PrIvIIege, 327 PrIvIIege, 327 PrIvIIege, 327 PrIvIIege, 327
PrIvIIeged nIormatIon, 329, 331 PrIvIIeged nIormatIon, 329, 331 PrIvIIeged nIormatIon, 329, 331 PrIvIIeged nIormatIon, 329, 331
PrIvIIeged Records, 331 PrIvIIeged Records, 331 PrIvIIeged Records, 331 PrIvIIeged Records, 331
ProActIve nteIIIgence (PANT), 331 ProActIve nteIIIgence (PANT), 331 ProActIve nteIIIgence (PANT), 331 ProActIve nteIIIgence (PANT), 331
Procedure Words (prowords), 332 Procedure Words (prowords), 332 Procedure Words (prowords), 332 Procedure Words (prowords), 332
Pro Pro Pro Process, 332 cess, 332 cess, 332 cess, 332
ProcessIng and ExpIoItatIon, 332 ProcessIng and ExpIoItatIon, 332 ProcessIng and ExpIoItatIon, 332 ProcessIng and ExpIoItatIon, 332
Project CameIot, 332 Project CameIot, 332 Project CameIot, 332 Project CameIot, 332
Propaganda, 333 Propaganda, 333 Propaganda, 333 Propaganda, 333
ProprIetary nIormatIon, 335 ProprIetary nIormatIon, 335 ProprIetary nIormatIon, 335 ProprIetary nIormatIon, 335
ProprIetary nIormatIon nvoIved (PROPN), ProprIetary nIormatIon nvoIved (PROPN), ProprIetary nIormatIon nvoIved (PROPN), ProprIetary nIormatIon nvoIved (PROPN),
72, 72, 72, 72, 336 336 336 336
ProscrIbed nIormatIon, 336 ProscrIbed nIormatIon, 336 ProscrIbed nIormatIon, 336 ProscrIbed nIormatIon, 336
Protect as RestrIcted Data, 336 Protect as RestrIcted Data, 336 Protect as RestrIcted Data, 336 Protect as RestrIcted Data, 336
Protected CrItIcaI nIrastructure n Protected CrItIcaI nIrastructure n Protected CrItIcaI nIrastructure n Protected CrItIcaI nIrastructure nIormatIon, IormatIon, IormatIon, IormatIon,
84, 336 84, 336 84, 336 84, 336
Protected Document, 336 Protected Document, 336 Protected Document, 336 Protected Document, 336
Pseudo Pseudo Pseudo Pseudo- -- -CIassIIIcatIon, 337 CIassIIIcatIon, 337 CIassIIIcatIon, 337 CIassIIIcatIon, 337
PsychoIogIcaI OperatIons (PSYOPS), 338 PsychoIogIcaI OperatIons (PSYOPS), 338 PsychoIogIcaI OperatIons (PSYOPS), 338 PsychoIogIcaI OperatIons (PSYOPS), 338
PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team
(POAT), 340 (POAT), 340 (POAT), 340 (POAT), 340






31
PsychoIogIcaI OperatIons DeveIopment PsychoIogIcaI OperatIons DeveIopment PsychoIogIcaI OperatIons DeveIopment PsychoIogIcaI OperatIons DeveIopment
Center (PDC), 340 Center (PDC), 340 Center (PDC), 340 Center (PDC), 340
PSYOP, 337 PSYOP, 337 PSYOP, 337 PSYOP, 337
PubIIc AIIaIrs, 340 PubIIc AIIaIrs, 340 PubIIc AIIaIrs, 340 PubIIc AIIaIrs, 340
PubIIc A PubIIc A PubIIc A PubIIc AIIaIrs Cround RuIes, 340 IIaIrs Cround RuIes, 340 IIaIrs Cround RuIes, 340 IIaIrs Cround RuIes, 340
PubIIc AIIaIrs CuIdance (PAC), 340 PubIIc AIIaIrs CuIdance (PAC), 340 PubIIc AIIaIrs CuIdance (PAC), 340 PubIIc AIIaIrs CuIdance (PAC), 340
PubIIc DIpIomacy, 341 PubIIc DIpIomacy, 341 PubIIc DIpIomacy, 341 PubIIc DIpIomacy, 341
PubIIc dIscIosure PubIIc dIscIosure PubIIc dIscIosure PubIIc dIscIosure, 317 , 317 , 317 , 317
PubIIc DomaIn, 342 PubIIc DomaIn, 342 PubIIc DomaIn, 342 PubIIc DomaIn, 342
PubIIc nIormatIon, 342 PubIIc nIormatIon, 342 PubIIc nIormatIon, 342 PubIIc nIormatIon, 342
PubIIc nIormatIon EnvIronment, 342 PubIIc nIormatIon EnvIronment, 342 PubIIc nIormatIon EnvIronment, 342 PubIIc nIormatIon EnvIronment, 342
PubIIc nterest DecIassIIIcatIon 8oard, 342 PubIIc nterest DecIassIIIcatIon 8oard, 342 PubIIc nterest DecIassIIIcatIon 8oard, 342 PubIIc nterest DecIassIIIcatIon 8oard, 342
PubIIcatIons RevIew 8oard PubIIcatIons RevIew 8oard PubIIcatIons RevIew 8oard PubIIcatIons RevIew 8oard, 3 , 3 , 3 , 316 16 16 16
PubIIcIy AvaIIabIe nIormatIon, 343 PubIIcIy AvaIIabIe nIormatIon, 343 PubIIcIy AvaIIabIe nIormatIon, 343 PubIIcIy AvaIIabIe nIormatIon, 343
PurgIng, 343 PurgIng, 343 PurgIng, 343 PurgIng, 343
QuantIco CIrcuIt, 343 QuantIco CIrcuIt, 343 QuantIco CIrcuIt, 343 QuantIco CIrcuIt, 343
QuasI Covernment, 343 QuasI Covernment, 343 QuasI Covernment, 343 QuasI Covernment, 343
RapId ReactIon MedIa Team (RRMT), 344 RapId ReactIon MedIa Team (RRMT), 344 RapId ReactIon MedIa Team (RRMT), 344 RapId ReactIon MedIa Team (RRMT), 344
Raw nteIIIgence (R), 344 Raw nteIIIgence (R), 344 Raw nteIIIgence (R), 344 Raw nteIIIgence (R), 344
ReaI TIme, 345 ReaI TIme, 345 ReaI TIme, 345 ReaI TIme, 345
ReaI ReaI ReaI ReaI- -- -tIme AnaIytIcaI nteIIIgence Database tIme AnaIytIcaI nteIIIgence Database tIme AnaIytIcaI nteIIIgence Database tIme AnaIytIcaI nteIIIgence Database
(RAD), 344 (RAD), 344 (RAD), 344 (RAD), 344
RecIassIIIcatIon, 345 RecIassIIIcatIon, 345 RecIassIIIcatIon, 345 RecIassIIIcatIon, 345
Rec Rec Rec Record, 346 ord, 346 ord, 346 ord, 346
Record Croup, 346 Record Croup, 346 Record Croup, 346 Record Croup, 346
Record nIormatIon, 347 Record nIormatIon, 347 Record nIormatIon, 347 Record nIormatIon, 347
RecordkeepIng System, 352 RecordkeepIng System, 352 RecordkeepIng System, 352 RecordkeepIng System, 352
Records, 347 Records, 347 Records, 347 Records, 347
Records HavIng Permanent HIstorIcaI VaIue, Records HavIng Permanent HIstorIcaI VaIue, Records HavIng Permanent HIstorIcaI VaIue, Records HavIng Permanent HIstorIcaI VaIue,
350 350 350 350
Records Management, 352 Records Management, 352 Records Management, 352 Records Management, 352
Red, 352 Red, 352 Red, 352 Red, 352
Red]8Iack Concept, 353 Red]8Iack Concept, 353 Red]8Iack Concept, 353 Red]8Iack Concept, 353
RedactIon, 353 RedactIon, 353 RedactIon, 353 RedactIon, 353
ReIerence MaterIaI, 353 ReIerence MaterIaI, 353 ReIerence MaterIaI, 353 ReIerence MaterIaI, 353
RegIonaI nIormatIon Sha RegIonaI nIormatIon Sha RegIonaI nIormatIon Sha RegIonaI nIormatIon SharIng System rIng System rIng System rIng System
(RSS)]RSSNET, 354 (RSS)]RSSNET, 354 (RSS)]RSSNET, 354 (RSS)]RSSNET, 354
Regrade, 354 Regrade, 354 Regrade, 354 Regrade, 354
REL. (TO), 77 REL. (TO), 77 REL. (TO), 77 REL. (TO), 77, 85 , 85 , 85 , 85
ReIeasabIe by nIormatIon DIscIosure ReIeasabIe by nIormatIon DIscIosure ReIeasabIe by nIormatIon DIscIosure ReIeasabIe by nIormatIon DIscIosure
OIIIcIaI (RELDO), 85 OIIIcIaI (RELDO), 85 OIIIcIaI (RELDO), 85 OIIIcIaI (RELDO), 85
ReIevant nIormatIon, 354 ReIevant nIormatIon, 354 ReIevant nIormatIon, 354 ReIevant nIormatIon, 354
RepIay, 49 RepIay, 49 RepIay, 49 RepIay, 49
RestrIcted, 85, 355 RestrIcted, 85, 355 RestrIcted, 85, 355 RestrIcted, 85, 355
RestrIcted CoIIateraI nIormatIon, 355 RestrIcted CoIIateraI nIormatIon, 355 RestrIcted CoIIateraI nIormatIon, 355 RestrIcted CoIIateraI nIormatIon, 355
RestrIcted Data (RD), 355 RestrIcted Data (RD), 355 RestrIcted Data (RD), 355 RestrIcted Data (RD), 355
RetroactIve RetroactIve RetroactIve RetroactIve Secrecy, 367 Secrecy, 367 Secrecy, 367 Secrecy, 367
ReveaI, 356 ReveaI, 356 ReveaI, 356 ReveaI, 356
Reverse FOA, 356 Reverse FOA, 356 Reverse FOA, 356 Reverse FOA, 356
RevoIutIon In MIIItary AIIaIrs (RMA), 356 RevoIutIon In MIIItary AIIaIrs (RMA), 356 RevoIutIon In MIIItary AIIaIrs (RMA), 356 RevoIutIon In MIIItary AIIaIrs (RMA), 356
Reynard, 357 Reynard, 357 Reynard, 357 Reynard, 357
RIght RIght RIght RIght- -- -to to to to- -- -Know, 357 Know, 357 Know, 357 Know, 357
RIsk Assessment and HorIzon ScannIng RIsk Assessment and HorIzon ScannIng RIsk Assessment and HorIzon ScannIng RIsk Assessment and HorIzon ScannIng
(RAHS), 360 (RAHS), 360 (RAHS), 360 (RAHS), 360
Ruse, 361 Ruse, 361 Ruse, 361 Ruse, 361
RussIan DeIInItIons oI CensorshIp, 60 RussIan DeIInItIons oI CensorshIp, 60 RussIan DeIInItIons oI CensorshIp, 60 RussIan DeIInItIons oI CensorshIp, 60
SaIeguardIng, 362 SaIeguardIng, 362 SaIeguardIng, 362 SaIeguardIng, 362
SaIeguards nIormatIon ( SaIeguards nIormatIon ( SaIeguards nIormatIon ( SaIeguards nIormatIon (SC), 361 SC), 361 SC), 361 SC), 361
SaIeguards nIormatIon SaIeguards nIormatIon SaIeguards nIormatIon SaIeguards nIormatIon-- -- -- --ModIIIed HandIIng ModIIIed HandIIng ModIIIed HandIIng ModIIIed HandIIng
(SC (SC (SC (SC- -- -M), 361 M), 361 M), 361 M), 361
SanItIzatIon, 362 SanItIzatIon, 362 SanItIzatIon, 362 SanItIzatIon, 362
SanItIze, 362 SanItIze, 362 SanItIze, 362 SanItIze, 362
Secondary CensorshIp, 362 Secondary CensorshIp, 362 Secondary CensorshIp, 362 Secondary CensorshIp, 362
Secrecy, 363 Secrecy, 363 Secrecy, 363 Secrecy, 363
Secrecy Oaths, 369 Secrecy Oaths, 369 Secrecy Oaths, 369 Secrecy Oaths, 369
Secrecy Orders, 369 Secrecy Orders, 369 Secrecy Orders, 369 Secrecy Orders, 369
- -- -type 1 secrecy order, 369 type 1 secrecy order, 369 type 1 secrecy order, 369 type 1 secrecy order, 369
- -- -type 2 secrecy order, 369 type 2 secrecy order, 369 type 2 secrecy order, 369 type 2 secrecy order, 369






32
- -- -type 3 secrecy order, 370 type 3 secrecy order, 370 type 3 secrecy order, 370 type 3 secrecy order, 370
SECRET, 68 SECRET, 68 SECRET, 68 SECRET, 68, 70, 226, 370 , 70, 226, 370 , 70, 226, 370 , 70, 226, 370
Secret ProtocoI Router Network (SPRNET), Secret ProtocoI Router Network (SPRNET), Secret ProtocoI Router Network (SPRNET), Secret ProtocoI Router Network (SPRNET),
362 362 362 362
Secret RestrIcted Data, 370 Secret RestrIcted Data, 370 Secret RestrIcted Data, 370 Secret RestrIcted Data, 370
Secret Secret Secret Secret- -- -CIeared U.S. CItIzen, 370 CIeared U.S. CItIzen, 370 CIeared U.S. CItIzen, 370 CIeared U.S. CItIzen, 370
Secure CoIIaboratIve OperatIonaI Prototype Secure CoIIaboratIve OperatIonaI Prototype Secure CoIIaboratIve OperatIonaI Prototype Secure CoIIaboratIve OperatIonaI Prototype
EnvIronment]nvestIgatIve Data EnvIronment]nvestIgatIve Data EnvIronment]nvestIgatIve Data EnvIronment]nvestIgatIve Data
Warehouse, 370 Warehouse, 370 Warehouse, 370 Warehouse, 370
Secure FIIght, 371 Secure FIIght, 371 Secure FIIght, 371 Secure FIIght, 371
SecurIty Categor SecurIty Categor SecurIty Categor SecurIty Category, 371 y, 371 y, 371 y, 371
SecurIty CIassIIIcatIon, 372 SecurIty CIassIIIcatIon, 372 SecurIty CIassIIIcatIon, 372 SecurIty CIassIIIcatIon, 372
SecurIty CIassIIIcatIon DesIgnatIons, 372 SecurIty CIassIIIcatIon DesIgnatIons, 372 SecurIty CIassIIIcatIon DesIgnatIons, 372 SecurIty CIassIIIcatIon DesIgnatIons, 372
SecurIty CIearance(s), 372 SecurIty CIearance(s), 372 SecurIty CIearance(s), 372 SecurIty CIearance(s), 372
SecurIty ControIs, 375 SecurIty ControIs, 375 SecurIty ControIs, 375 SecurIty ControIs, 375
SecurIty ndex, 375 SecurIty ndex, 375 SecurIty ndex, 375 SecurIty ndex, 375
SecurIty LabeI, 375 SecurIty LabeI, 375 SecurIty LabeI, 375 SecurIty LabeI, 375
Securocracy Securocrat, 375 Securocracy Securocrat, 375 Securocracy Securocrat, 375 Securocracy Securocrat, 375
SegregabIe and ReasonabIy SegregabIe SegregabIe and ReasonabIy SegregabIe SegregabIe and ReasonabIy SegregabIe SegregabIe and ReasonabIy SegregabIe
nIormatIon, 376 nIormatIon, 376 nIormatIon, 376 nIormatIon, 376
SeIe SeIe SeIe SeIect Agent SensItIve nIormatIon, 376 ct Agent SensItIve nIormatIon, 376 ct Agent SensItIve nIormatIon, 376 ct Agent SensItIve nIormatIon, 376
SeII EvaIuatIve PrIvIIege, 329 SeII EvaIuatIve PrIvIIege, 329 SeII EvaIuatIve PrIvIIege, 329 SeII EvaIuatIve PrIvIIege, 329
SemantIc TraIIIc AnaIyzer, 376 SemantIc TraIIIc AnaIyzer, 376 SemantIc TraIIIc AnaIyzer, 376 SemantIc TraIIIc AnaIyzer, 376
SenIor OIIIcIaI oI the nteIIIgence SenIor OIIIcIaI oI the nteIIIgence SenIor OIIIcIaI oI the nteIIIgence SenIor OIIIcIaI oI the nteIIIgence
CommunIty (SOC), 376 CommunIty (SOC), 376 CommunIty (SOC), 376 CommunIty (SOC), 376
SensItIve, 377 SensItIve, 377 SensItIve, 377 SensItIve, 377
SensItIve 8ut UncIassIIIed, 85 SensItIve 8ut UncIassIIIed, 85 SensItIve 8ut UncIassIIIed, 85 SensItIve 8ut UncIassIIIed, 85
SensItIve 8ut UncIassIIIed nIormatIon, 377 SensItIve 8ut UncIassIIIed nIormatIon, 377 SensItIve 8ut UncIassIIIed nIormatIon, 377 SensItIve 8ut UncIassIIIed nIormatIon, 377
SensItIve SensItIve SensItIve SensItIve by AggregatIon, 382 by AggregatIon, 382 by AggregatIon, 382 by AggregatIon, 382
SensItIve Compartmented nIormatIon (SC), SensItIve Compartmented nIormatIon (SC), SensItIve Compartmented nIormatIon (SC), SensItIve Compartmented nIormatIon (SC),
382 382 382 382
SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC)
ControI Systems]Codewords, 384 ControI Systems]Codewords, 384 ControI Systems]Codewords, 384 ControI Systems]Codewords, 384
SensItIve Compartmented nIormatIon SensItIve Compartmented nIormatIon SensItIve Compartmented nIormatIon SensItIve Compartmented nIormatIon
FacIIIty (SCF), 384 FacIIIty (SCF), 384 FacIIIty (SCF), 384 FacIIIty (SCF), 384
SensItIve HomeIand SecurIty nIormatIon SensItIve HomeIand SecurIty nIormatIon SensItIve HomeIand SecurIty nIormatIon SensItIve HomeIand SecurIty nIormatIon
(SHS), 384 (SHS), 384 (SHS), 384 (SHS), 384
SensItI SensItI SensItI SensItIve nIormatIon, 385 ve nIormatIon, 385 ve nIormatIon, 385 ve nIormatIon, 385
SensItIve nteIIIgence nIormatIon, 386 SensItIve nteIIIgence nIormatIon, 386 SensItIve nteIIIgence nIormatIon, 386 SensItIve nteIIIgence nIormatIon, 386
SensItIve PosItIon, 386 SensItIve PosItIon, 386 SensItIve PosItIon, 386 SensItIve PosItIon, 386
SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3- -- -DHS), 389, DHS), 389, DHS), 389, DHS), 389,
390 390 390 390
SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1- -- - TSA, TSA, TSA, TSA,
386 386 386 386
SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 - -- -
USDA), 388 USDA), 388 USDA), 388 USDA), 388
SensItIve SIte ExpIo SensItIve SIte ExpIo SensItIve SIte ExpIo SensItIve SIte ExpIoItatIon, 390 ItatIon, 390 ItatIon, 390 ItatIon, 390
SensItIve UncIassIIIed nIormatIon, 390 SensItIve UncIassIIIed nIormatIon, 390 SensItIve UncIassIIIed nIormatIon, 390 SensItIve UncIassIIIed nIormatIon, 390
Server In the Sky, 391 Server In the Sky, 391 Server In the Sky, 391 Server In the Sky, 391
ServIce mIIItary deceptIon, 255 ServIce mIIItary deceptIon, 255 ServIce mIIItary deceptIon, 255 ServIce mIIItary deceptIon, 255
Seven Member RuIe, 391 Seven Member RuIe, 391 Seven Member RuIe, 391 Seven Member RuIe, 391
ShIeId Laws, 392 ShIeId Laws, 392 ShIeId Laws, 392 ShIeId Laws, 392
SCMA CategorIes, 392 SCMA CategorIes, 392 SCMA CategorIes, 392 SCMA CategorIes, 392
SIgnIIIcant guIdance document, 186 SIgnIIIcant guIdance document, 186 SIgnIIIcant guIdance document, 186 SIgnIIIcant guIdance document, 186
SItuatIonaI UnderstandIng, 393 SItuatIonaI UnderstandIng, 393 SItuatIonaI UnderstandIng, 393 SItuatIonaI UnderstandIng, 393
SmIth SmIth SmIth SmIth- -- -Mundt, 333 Mundt, 333 Mundt, 333 Mundt, 333
Sne Sne Sne Snepp v. UnIted States pp v. UnIted States pp v. UnIted States pp v. UnIted States, 318 , 318 , 318 , 318
SocIaI MaIware, 394 SocIaI MaIware, 394 SocIaI MaIware, 394 SocIaI MaIware, 394
SocIaI Network AnaIysIs, 394 SocIaI Network AnaIysIs, 394 SocIaI Network AnaIysIs, 394 SocIaI Network AnaIysIs, 394
SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI
TeIecommunIcatIon, 409 TeIecommunIcatIon, 409 TeIecommunIcatIon, 409 TeIecommunIcatIon, 409
SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI SocIety Ior WorIdwIde nterbank FInancIaI
TeIecommunIcatIon (SWFT), 395 TeIecommunIcatIon (SWFT), 395 TeIecommunIcatIon (SWFT), 395 TeIecommunIcatIon (SWFT), 395
Source, 396 Source, 396 Source, 396 Source, 396
Source Document(s), 396 Source Document(s), 396 Source Document(s), 396 Source Document(s), 396
Sources Sources Sources Sources and Methods, 396 and Methods, 396 and Methods, 396 and Methods, 396
SousveIIIance, 397 SousveIIIance, 397 SousveIIIance, 397 SousveIIIance, 397






33
SpecIaI Access Program (SAP), 398 SpecIaI Access Program (SAP), 398 SpecIaI Access Program (SAP), 398 SpecIaI Access Program (SAP), 398
SpecIaI Access Programs, 128 SpecIaI Access Programs, 128 SpecIaI Access Programs, 128 SpecIaI Access Programs, 128
SpecIaI nIormatIon OperatIons (SO), 399 SpecIaI nIormatIon OperatIons (SO), 399 SpecIaI nIormatIon OperatIons (SO), 399 SpecIaI nIormatIon OperatIons (SO), 399
SpecIaI PsychoIogIcaI OperatIons SpecIaI PsychoIogIcaI OperatIons SpecIaI PsychoIogIcaI OperatIons SpecIaI PsychoIogIcaI OperatIons
Assessment, 399 Assessment, 399 Assessment, 399 Assessment, 399
SpecIaI SpecIaI SpecIaI SpecIaI- -- -SensItIve (SS) SensItIve (SS) SensItIve (SS) SensItIve (SS), 281 , 281 , 281 , 281
SpIIt KnowIedge, 399 SpIIt KnowIedge, 399 SpIIt KnowIedge, 399 SpIIt KnowIedge, 399
State DIstrIbutIo State DIstrIbutIo State DIstrIbutIo State DIstrIbutIon onIy (STADS), 86 n onIy (STADS), 86 n onIy (STADS), 86 n onIy (STADS), 86
S SS State secret cases, 331 tate secret cases, 331 tate secret cases, 331 tate secret cases, 331
S SS State secrets, 184 tate secrets, 184 tate secrets, 184 tate secrets, 184
State Secrets PrIvIIege, 329 State Secrets PrIvIIege, 329 State Secrets PrIvIIege, 329 State Secrets PrIvIIege, 329
StatIstIcaI Management AnaIysIs and StatIstIcaI Management AnaIysIs and StatIstIcaI Management AnaIysIs and StatIstIcaI Management AnaIysIs and
ReportIng TooI System (SMARTS)]SPSS, ReportIng TooI System (SMARTS)]SPSS, ReportIng TooI System (SMARTS)]SPSS, ReportIng TooI System (SMARTS)]SPSS,
399 399 399 399
Statutory PrIvIIege, 331 Statutory PrIvIIege, 331 Statutory PrIvIIege, 331 Statutory PrIvIIege, 331
Store, 399 Store, 399 Store, 399 Store, 399
StovepIpes, 400 StovepIpes, 400 StovepIpes, 400 StovepIpes, 400
StrategIc CommunIcatIons, 400 StrategIc CommunIcatIons, 400 StrategIc CommunIcatIons, 400 StrategIc CommunIcatIons, 400
Strat Strat Strat StrategIc CompressIon, 400 egIc CompressIon, 400 egIc CompressIon, 400 egIc CompressIon, 400
StrategIc nIormatIon WarIare, 401 StrategIc nIormatIon WarIare, 401 StrategIc nIormatIon WarIare, 401 StrategIc nIormatIon WarIare, 401
StrategIc nteIIIgence (S), 401 StrategIc nteIIIgence (S), 401 StrategIc nteIIIgence (S), 401 StrategIc nteIIIgence (S), 401
StrategIc mIIItary deceptIon, 255 StrategIc mIIItary deceptIon, 255 StrategIc mIIItary deceptIon, 255 StrategIc mIIItary deceptIon, 255
StrategIc PSYOP, 338 StrategIc PSYOP, 338 StrategIc PSYOP, 338 StrategIc PSYOP, 338
StructuraI secrecy, 368 StructuraI secrecy, 368 StructuraI secrecy, 368 StructuraI secrecy, 368
SuspIcIous ActIvIty Reports (SARs), 401 SuspIcIous ActIvIty Reports (SARs), 401 SuspIcIous ActIvIty Reports (SARs), 401 SuspIcIous ActIvIty Reports (SARs), 401
System AccredItatIon, 402 System AccredItatIon, 402 System AccredItatIon, 402 System AccredItatIon, 402
SystematIc DecIassII SystematIc DecIassII SystematIc DecIassII SystematIc DecIassIIIcatIon RevIew, 402 IcatIon RevIew, 402 IcatIon RevIew, 402 IcatIon RevIew, 402
TactIcaI nteIIIgence (T), 403 TactIcaI nteIIIgence (T), 403 TactIcaI nteIIIgence (T), 403 TactIcaI nteIIIgence (T), 403
TactIcaI mIIItary deceptIon, 255 TactIcaI mIIItary deceptIon, 255 TactIcaI mIIItary deceptIon, 255 TactIcaI mIIItary deceptIon, 255
TactIcaI PSYOP, 338 TactIcaI PSYOP, 338 TactIcaI PSYOP, 338 TactIcaI PSYOP, 338
TaIon Report, 403 TaIon Report, 403 TaIon Report, 403 TaIon Report, 403
T TT Target, or tIp arget, or tIp arget, or tIp arget, or tIp- -- -oII systems, 429 oII systems, 429 oII systems, 429 oII systems, 429
Tear LIne, 405 Tear LIne, 405 Tear LIne, 405 Tear LIne, 405
TechnIcaI Data, 405 TechnIcaI Data, 405 TechnIcaI Data, 405 TechnIcaI Data, 405
TechnIcaI nIormatIon, 406 TechnIcaI nIormatIon, 406 TechnIcaI nIormatIon, 406 TechnIcaI nIormatIon, 406
TechnIcaI Reports Automated nIormatIon TechnIcaI Reports Automated nIormatIon TechnIcaI Reports Automated nIormatIon TechnIcaI Reports Automated nIormatIon
LIsts (TRAL), 406 LIsts (TRAL), 406 LIsts (TRAL), 406 LIsts (TRAL), 406
TechnIcaI SurveIIIance Countermeasures TechnIcaI SurveIIIance Countermeasures TechnIcaI SurveIIIance Countermeasures TechnIcaI SurveIIIance Countermeasures
(TSCM), 406 (TSCM), 406 (TSCM), 406 (TSCM), 406
TEMPEST (TransIent EIectromagnetIc PuIse TEMPEST (TransIent EIectromagnetIc PuIse TEMPEST (TransIent EIectromagnetIc PuIse TEMPEST (TransIent EIectromagnetIc PuIse
SurveIIIance TechnoIogy), SurveIIIance TechnoIogy), SurveIIIance TechnoIogy), SurveIIIance TechnoIogy), 41, 223, 41, 223, 41, 223, 41, 223, 406 406 406 406
TerrorIsm nIormatIon, 407 TerrorIsm nIormatIon, 407 TerrorIsm nIormatIon, 407 TerrorIsm nIormatIon, 407
TerrorIsm nIormatIon Awareness, 407 TerrorIsm nIormatIon Awareness, 407 TerrorIsm nIormatIon Awareness, 407 TerrorIsm nIormatIon Awareness, 407
TerrorIsm nIormatIon PreventIon System TerrorIsm nIormatIon PreventIon System TerrorIsm nIormatIon PreventIon System TerrorIsm nIormatIon PreventIon System
( (( (OperatIon TPS) OperatIon TPS) OperatIon TPS) OperatIon TPS), 298, 408 , 298, 408 , 298, 408 , 298, 408
TerrorIsm LIaIson OIIIcers, 408 TerrorIsm LIaIson OIIIcers, 408 TerrorIsm LIaIson OIIIcers, 408 TerrorIsm LIaIson OIIIcers, 408
TerrorIst FInance TrackIng Program, 409 TerrorIst FInance TrackIng Program, 409 TerrorIst FInance TrackIng Program, 409 TerrorIst FInance TrackIng Program, 409
TerrorIst dentItIes Datamart EnvIronment TerrorIst dentItIes Datamart EnvIronment TerrorIst dentItIes Datamart EnvIronment TerrorIst dentItIes Datamart EnvIronment
(TDE), 410 (TDE), 410 (TDE), 410 (TDE), 410
TerrorIst ScreenIng Center, 371, 410 TerrorIst ScreenIng Center, 371, 410 TerrorIst ScreenIng Center, 371, 410 TerrorIst ScreenIng Center, 371, 410
TerrorIst SurveIIIance Program (TSP), 412 TerrorIst SurveIIIance Program (TSP), 412 TerrorIst SurveIIIance Program (TSP), 412 TerrorIst SurveIIIance Program (TSP), 412
TerrorIst WatchIIst Perso TerrorIst WatchIIst Perso TerrorIst WatchIIst Perso TerrorIst WatchIIst Person Data Exchange n Data Exchange n Data Exchange n Data Exchange
Standard, 412 Standard, 412 Standard, 412 Standard, 412
ThInThread, 413 ThInThread, 413 ThInThread, 413 ThInThread, 413
ThIrd ThIrd ThIrd ThIrd- -- -Agency RuIe, 413 Agency RuIe, 413 Agency RuIe, 413 Agency RuIe, 413
Threat, 414 Threat, 414 Threat, 414 Threat, 414
Threat AnaIysIs, 41 Threat AnaIysIs, 41 Threat AnaIysIs, 41 Threat AnaIysIs, 41
TARA (TactIcaI nteIIIgence and ReIated TARA (TactIcaI nteIIIgence and ReIated TARA (TactIcaI nteIIIgence and ReIated TARA (TactIcaI nteIIIgence and ReIated
ActIvItIes), 414 ActIvItIes), 414 ActIvItIes), 414 ActIvItIes), 414
TPOFF, 411, 414 TPOFF, 411, 414 TPOFF, 411, 414 TPOFF, 411, 414
TOLLS, 415 TOLLS, 415 TOLLS, 415 TOLLS, 415
Top Secret Top Secret Top Secret Top Secret- -- -CIeared U.S. CItIzen, 415 CIeared U.S. CItIzen, 415 CIeared U.S. CItIzen, 415 CIeared U.S. CItIzen, 415
TOP SECRET, 67 TOP SECRET, 67 TOP SECRET, 67 TOP SECRET, 67, 70 , 70 , 70 , 70
Top Secret Top Secret Top Secret Top Secret ControI Number, 415 ControI Number, 415 ControI Number, 415 ControI Number, 415
TotaI nIormatIon Awareness, 193, 415 TotaI nIormatIon Awareness, 193, 415 TotaI nIormatIon Awareness, 193, 415 TotaI nIormatIon Awareness, 193, 415
ToxIc Substances ControI Act, 105 ToxIc Substances ControI Act, 105 ToxIc Substances ControI Act, 105 ToxIc Substances ControI Act, 105
Trade Secrets, 368 Trade Secrets, 368 Trade Secrets, 368 Trade Secrets, 368
TradecraIt, 416 TradecraIt, 416 TradecraIt, 416 TradecraIt, 416






34
Trademark, 416 Trademark, 416 Trademark, 416 Trademark, 416
TranscIassIIIcatIon, 416 TranscIassIIIcatIon, 416 TranscIassIIIcatIon, 416 TranscIassIIIcatIon, 416
Trap and Trace DevIce, 416 Trap and Trace DevIce, 416 Trap and Trace DevIce, 416 Trap and Trace DevIce, 416
TrIbaI S TrIbaI S TrIbaI S TrIbaI Secret, 53 ecret, 53 ecret, 53 ecret, 53
Truth T Truth T Truth T Truth TeIIIng, 226 eIIIng, 226 eIIIng, 226 eIIIng, 226
TruthIuI Messages, 417 TruthIuI Messages, 417 TruthIuI Messages, 417 TruthIuI Messages, 417
T TT TSP, 417 SP, 417 SP, 417 SP, 417
TwIIIght nIormatIon, 417 TwIIIght nIormatIon, 417 TwIIIght nIormatIon, 417 TwIIIght nIormatIon, 417
TypoIogy oI Leaks, 247 TypoIogy oI Leaks, 247 TypoIogy oI Leaks, 247 TypoIogy oI Leaks, 247
U2, 418 U2, 418 U2, 418 U2, 418
UL, 418 UL, 418 UL, 418 UL, 418
UnacknowIedged SAP, 419 UnacknowIedged SAP, 419 UnacknowIedged SAP, 419 UnacknowIedged SAP, 419
UnauthorIzed DIscIosure, 419 UnauthorIzed DIscIosure, 419 UnauthorIzed DIscIosure, 419 UnauthorIzed DIscIosure, 419
UnauthorIzed dIscIosures oI cIassIIIed UnauthorIzed dIscIosures oI cIassIIIed UnauthorIzed dIscIosures oI cIassIIIed UnauthorIzed dIscIosures oI cIassIIIed
InIormatIon, 248 InIormatIon, 248 InIormatIon, 248 InIormatIon, 248
UncIassIIIed 8ut RestrIcted nIormatIon, 419 UncIassIIIed 8ut RestrIcted nIormatIon, 419 UncIassIIIed 8ut RestrIcted nIormatIon, 419 UncIassIIIed 8ut RestrIcted nIormatIon, 419
UncIassIIIed ControIIed NucIe UncIassIIIed ControIIed NucIe UncIassIIIed ControIIed NucIe UncIassIIIed ControIIed NucIear nIormatIon ar nIormatIon ar nIormatIon ar nIormatIon
(UCN), 419 (UCN), 419 (UCN), 419 (UCN), 419
UncIassIIIed nIormatIon, 86, 421 UncIassIIIed nIormatIon, 86, 421 UncIassIIIed nIormatIon, 86, 421 UncIassIIIed nIormatIon, 86, 421
UncIassIIIed nteIIIgence, 421 UncIassIIIed nteIIIgence, 421 UncIassIIIed nteIIIgence, 421 UncIassIIIed nteIIIgence, 421
UncIassIIIed LImIted, 421 UncIassIIIed LImIted, 421 UncIassIIIed LImIted, 421 UncIassIIIed LImIted, 421
UncIassIIIed]For OIIIcIaI Use OnIy, 420 UncIassIIIed]For OIIIcIaI Use OnIy, 420 UncIassIIIed]For OIIIcIaI Use OnIy, 420 UncIassIIIed]For OIIIcIaI Use OnIy, 420
UndIscIosed nIormatIon, 422 UndIscIosed nIormatIon, 422 UndIscIosed nIormatIon, 422 UndIscIosed nIormatIon, 422
UnIted States CIvIIIan nternee nIormatIon UnIted States CIvIIIan nternee nIormatIon UnIted States CIvIIIan nternee nIormatIon UnIted States CIvIIIan nternee nIormatIon
Center, 422 Center, 422 Center, 422 Center, 422
UnIted States UnIted States UnIted States UnIted States nIormatIon Agency, 423 nIormatIon Agency, 423 nIormatIon Agency, 423 nIormatIon Agency, 423
UnIted States nteIIIgence 8oard, 423 UnIted States nteIIIgence 8oard, 423 UnIted States nteIIIgence 8oard, 423 UnIted States nteIIIgence 8oard, 423
UnIted States oI AmerIca, PIaIntIII, v. The UnIted States oI AmerIca, PIaIntIII, v. The UnIted States oI AmerIca, PIaIntIII, v. The UnIted States oI AmerIca, PIaIntIII, v. The
ProgressIve nc., 367 ProgressIve nc., 367 ProgressIve nc., 367 ProgressIve nc., 367
UnIted States StrIke Command UnIted States StrIke Command UnIted States StrIke Command UnIted States StrIke Command
(USSTRCOM), 424 (USSTRCOM), 424 (USSTRCOM), 424 (USSTRCOM), 424
Unknown, 423 Unknown, 423 Unknown, 423 Unknown, 423
UnoIIIcIaI nIormatIon (NeoIItsIaInaya UnoIIIcIaI nIormatIon (NeoIItsIaInaya UnoIIIcIaI nIormatIon (NeoIItsIaInaya UnoIIIcIaI nIormatIon (NeoIItsIaInaya
InIormatsIya), 423 InIormatsIya), 423 InIormatsIya), 423 InIormatsIya), 423
Upgrade, 4 Upgrade, 4 Upgrade, 4 Upgrade, 424 24 24 24
UpgradIng, 424 UpgradIng, 424 UpgradIng, 424 UpgradIng, 424
Urban Legends, 259 Urban Legends, 259 Urban Legends, 259 Urban Legends, 259
Urban ResoIve 2015, 424 Urban ResoIve 2015, 424 Urban ResoIve 2015, 424 Urban ResoIve 2015, 424
USNORTHCOM, 241 USNORTHCOM, 241 USNORTHCOM, 241 USNORTHCOM, 241
VaIIdatIon oI nIormatIon, 425 VaIIdatIon oI nIormatIon, 425 VaIIdatIon oI nIormatIon, 425 VaIIdatIon oI nIormatIon, 425
Vaughn ndex, 425 Vaughn ndex, 425 Vaughn ndex, 425 Vaughn ndex, 425
VerIty K2 EnterprIse, 425 VerIty K2 EnterprIse, 425 VerIty K2 EnterprIse, 425 VerIty K2 EnterprIse, 425
Veterans AIIaIrs CentraI ncIdent Response Veterans AIIaIrs CentraI ncIdent Response Veterans AIIaIrs CentraI ncIdent Response Veterans AIIaIrs CentraI ncIdent Response
Center, 426 Center, 426 Center, 426 Center, 426
V VV VIdeo news reIeases, 140 Ideo news reIeases, 140 Ideo news reIeases, 140 Ideo news reIeases, 140
VIoIatIon, 426 VIoIatIon, 426 VIoIatIon, 426 VIoIatIon, 426
VIrtuaI P VIrtuaI P VIrtuaI P VIrtuaI ProvIng Cround, 427 rovIng Cround, 427 rovIng Cround, 427 rovIng Cround, 427
VIsuaI nIormatIon, 427 VIsuaI nIormatIon, 427 VIsuaI nIormatIon, 427 VIsuaI nIormatIon, 427
VoIuntary FurnIshed ConIIdentIaI VoIuntary FurnIshed ConIIdentIaI VoIuntary FurnIshed ConIIdentIaI VoIuntary FurnIshed ConIIdentIaI
nIormatIon, 428 nIormatIon, 428 nIormatIon, 428 nIormatIon, 428
War Card Database, 428 War Card Database, 428 War Card Database, 428 War Card Database, 428
Warden System, 428 Warden System, 428 Warden System, 428 Warden System, 428
WARNNC NOTCE WARNNC NOTCE WARNNC NOTCE WARNNC NOTCE - -- - NTELLCENCE SOURCES NTELLCENCE SOURCES NTELLCENCE SOURCES NTELLCENCE SOURCES
OR METHODS NVOLVED, OR METHODS NVOLVED, OR METHODS NVOLVED, OR METHODS NVOLVED, 87. 87. 87. 87. 88 88 88 88
WarnIng NotIces, 87 WarnIng NotIces, 87 WarnIng NotIces, 87 WarnIng NotIces, 87
WarrantIess SurveIIIance, 428 WarrantIess SurveIIIance, 428 WarrantIess SurveIIIance, 428 WarrantIess SurveIIIance, 428
Watch Watch Watch Watch LIsts, 429 LIsts, 429 LIsts, 429 LIsts, 429
W WW Watchout, 429 atchout, 429 atchout, 429 atchout, 429
WhIte or Overt Propaganda, 333 WhIte or Overt Propaganda, 333 WhIte or Overt Propaganda, 333 WhIte or Overt Propaganda, 333
WhIte Propaganda, 334 WhIte Propaganda, 334 WhIte Propaganda, 334 WhIte Propaganda, 334
WIretap Report, 149 WIretap Report, 149 WIretap Report, 149 WIretap Report, 149
WIsdom WarIare, 430 WIsdom WarIare, 430 WIsdom WarIare, 430 WIsdom WarIare, 430
WorkIng FIIes, 430 WorkIng FIIes, 430 WorkIng FIIes, 430 WorkIng FIIes, 430
WorkIng Papers, 430 WorkIng Papers, 430 WorkIng Papers, 430 WorkIng Papers, 430
WorId News ConnectIon, 162 WorId News ConnectIon, 162 WorId News ConnectIon, 162 WorId News ConnectIon, 162
WrIte WrIte WrIte WrIte- -- -to to to to- -- -ReIease, 431 ReIease, 431 ReIease, 431 ReIease, 431
X1 through X8, 89 X1 through X8, 89 X1 through X8, 89 X1 through X8, 89






35
XCDS (Exempt Irom CeneraI DecIa XCDS (Exempt Irom CeneraI DecIa XCDS (Exempt Irom CeneraI DecIa XCDS (Exempt Irom CeneraI DecIassIIIcatIon ssIIIcatIon ssIIIcatIon ssIIIcatIon
ScheduIes), 431 ScheduIes), 431 ScheduIes), 431 ScheduIes), 431
Xn, 431 Xn, 431 Xn, 431 Xn, 431
Yankee WhIte, 431 Yankee WhIte, 431 Yankee WhIte, 431 Yankee WhIte, 431




100 Percent Shred PoIIcy 100 Percent Shred PoIIcy 100 Percent Shred PoIIcy 100 Percent Shred PoIIcy
Every AIrman, cIvIIIan and contractor on base Is responsIbIe Ior destroyIng paper they create or use In
theIr workspaces when they no Ionger need It.

The 100 percent shred poIIcy requIres a 3]8 Inch crosscut shredder or better. PeopIe who do not have a
shredder In theIr work center shouId work wIth theIr unIt's OPSEC coordInator and resource advIsor to IInd
or procure one.

Source: USAF, MaIstrom AIr Force 8ase, "CettIng Into the habIt: 100 percent shred poIIcy begIns March 17,"
http:]]www.maImstrom.aI.mII]news]story.aspZId=123139099

201 FIIe 201 FIIe 201 FIIe 201 FIIe
The CA opens a 201 IIIe on an IndIvIduaI when It has an "operatIonaI Interest" In that person. (p.45)

Source: AssassInatIon RevIew 8oard, FInaI Report oI the AssassInatIon Records RevIew 8oard, September
1998, http:]]www.archIves.gov]research]jIk]revIew-board]report]


~ A ~ ~ A ~ ~ A ~ ~ A ~
AbIe Danger AbIe Danger AbIe Danger AbIe Danger
See Data MInIng, SocIaI Network AnaIysIs See Data MInIng, SocIaI Network AnaIysIs See Data MInIng, SocIaI Network AnaIysIs See Data MInIng, SocIaI Network AnaIysIs
n summer 2005, news reports began to appear regardIng a data mInIng InItIatIve that had been carrIed
out by the U.S. Army's Land nIormatIon WarIare Agency (LWA) In 1999-2000. The InItIatIve, reIerred to as
AbIe Danger, had reportedIy been requested by the U.S. SpecIaI OperatIons Command (SOCOM) as part oI
Iarger eIIort to deveIop a pIan to combat transnatIonaI terrorIsm. 8ecause the detaIIs oI AbIe Danger
remaIn cIassIIIed, IIttIe Is known about the program. However, In a brIeIIng to reporters, the Department
oI DeIense characterIzed AbIe Danger as a demonstratIon project to test anaIytIcaI methods and
technoIogy on very Iarge amounts oI data. The project InvoIved usIng IInk anaIysIs to IdentIIy underIyIng






36
connectIons and assocIatIons between IndIvIduaIs who otherwIse appear to have no outward connectIon
wIth one another. The IInk anaIysIs used both cIassIIIed and open source data, totaIIng a reported 2.5
terabytes. AII oI thIs data, whIch IncIuded InIormatIon on U.S. persons, was reportedIy deIeted In AprII
2000 due to U.S. Army reguIatIons requIrIng InIormatIon on U.S. persons be destroyed aIter a project ends
or becomes InactIve.

Source: ]eIIrey W. SeIIert. "Data MInIng and HomeIand SecurIty: An OvervIew." CRS Report to Congress
]anuary 27, 2006. FAS WebsIte, http:]]www.Ias.org]sgp]crs]secrecy]RS20748.pdI.

2. For a background and hIstory oI the AbIe Danger program, see the C report IIsted beIow.
FIgures 1-3, pages 8-9 have a very InterestIng socIaI network anaIysIs chart oI aIIeged A-Qaeda ceII IInks.

Source: DoD OIIIce oI the nspector CeneraI (C). "Report oI nvestIgatIon." September 18, 2006. FAS
WebsIte,http:]]www.Ias.org]Irp]agency]dod]Ig-abIedanger.pdI and Rep. Curt WeIdon. "WeIdon Rejects
DoD Report on AbIe Danger and Harassment oI MIIItary OIIIce."
http:]]www.Ias.org]Irp]news]2006]09]weIdon092106.htmI

Access Access Access Access
1. The abIIIty and means necessary to store data In, to retrIeve data Irom, to communIcate wIth, or
to make use oI any resource oI a system; 2. To obtaIn the use oI a resource; 3. capabIIIty and opportunIty
to gaIn detaIIed knowIedge oI or to aIter InIormatIon or materIaI; 4. capabIIIty and means to communIcate
wIth (I.e., Input to or receIve output Irom), or otherwIse make use oI any InIormatIon, resource, or
component In an AS. Note [Ior 3 and 4]: An IndIvIduaI does not have "access" II the proper authorIty or a
physIcaI, technIcaI, or proceduraI measure prevents hIm]her Irom obtaInIng knowIedge or havIng an
opportunIty to aIter InIormatIon, materIaI, resources, or components, and 5. An assIgned portIon oI
system resources Ior one data stream oI user communIcatIons or sIgnaIIng.

Source: "FederaI Standards TeIecommunIcatIons"
http:]]www.Its.bIdrdoc.gov]Is-1037]dIr-001]0104.htm

2. The abIIIty or opportunIty to gaIn knowIedge oI cIassIIIed InIormatIon.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2

Access to CIassIIIed nIormatIon Access to CIassIIIed nIormatIon Access to CIassIIIed nIormatIon Access to CIassIIIed nIormatIon
The abIIIty and opportunIty to obtaIn knowIedge oI cIassIIIed InIormatIon. Persons have access to
cIassIIIed InIormatIon II they are permItted to gaIn knowIedge oI the InIormatIon or II they are In a pIace
where they wouId be expected to gaIn such knowIedge. Persons do not have access to cIassIIIed
InIormatIon by beIng In a pIace where cIassIIIed InIormatIon Is kept II securIty measures prevent them
Iorm gaInIng knowIedge oI the InIormatIon.







37
Source: Department oI DeIense. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Accountab Accountab Accountab AccountabIIIty IIIty IIIty IIIty
(S) Process oI tracIng S actIvItIes to a responsIbIe source;(COMSEC, or CommunIcatIons SecurIty) PrIncIpIe
that an IndIvIduaI Is entrusted to saIeguard and controI equIpment, keyIng materIaI, and InIormatIon and
Is answerabIe to proper authorIty Ior the Ioss or mIsuse oI that equIpment or InIormatIon.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary. ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

AccountabIIIty nIormatIon AccountabIIIty nIormatIon AccountabIIIty nIormatIon AccountabIIIty nIormatIon
A set oI records, oIten reIerred to as an audIt traII, that coIIectIveIy provIdes documentary evIdence oI the
processIng or other actIons reIated to the securIty oI an Automated nIormatIon System.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
AcknowIedged SpecIaI Access Program AcknowIedged SpecIaI Access Program AcknowIedged SpecIaI Access Program AcknowIedged SpecIaI Access Program (SAP) (SAP) (SAP) (SAP)
See See See See SpecIaI Access Program SpecIaI Access Program SpecIaI Access Program SpecIaI Access Program
An exIstIng SAP whose overaII purpose Is IdentIIIed and Its specIIIc detaIIs, technoIogIes, materIaIs,
technIques, etc., oI the program are cIassIIIed as dIctated by theIr vuInerabIIIty to expIoItatIon and rIsk oI
compromIse.

Source: DoD DIrectIve 5205.7 "SpecIaI Access Program (SAP) PoIIcy." ]anuary 5, 2006,
http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]520507.htm

ActIonabIe MedIcaI nIormatIon RevIew ActIonabIe MedIcaI nIormatIon RevIew ActIonabIe MedIcaI nIormatIon RevIew ActIonabIe MedIcaI nIormatIon RevIew
See Prepub See Prepub See Prepub See PrepubIIcatIon RevIew IIcatIon RevIew IIcatIon RevIew IIcatIon RevIew
SInce 2006 U.S. Army censors have scrutInIzed hundreds oI medIcaI studIes, scIentIIIc posters, abstracts
and PowerpoInt presentatIons authored by doctors and scIentIsts at WaIter Reed and other Army medIcaI
research centers-part oI a IIttIe- known prepubIIcatIon revIew process caIIed "ActIonabIe MedIcaI
nIormatIon RevIew." The program Is Intended to deny raqI and AIghan Insurgents sensItIve data such as
combat Injury and death rates. 8ut dozens oI studIes revIewed under the program dId not InvoIve research
dIrectIy reIated to combat operatIons. nstead, they descrIbed controversIaI topIcs IIke the eIIects oI war
on soIdIers' chIIdren, hospItaI-acquIred InIectIons, post-depIoyment adjustment Issues, reIugees, suIcIde,
aIcohoIIsm, vaccInes, cancer among veterans and probIems wIth mIIItary heaIth care databases.

Source: EP MedIcaI News and Expose, "U.S. Army deIays, aIters medIcaI studIes under a IIttIe-known
scIentIIIc censorshIp program," http:]]www.epInews.com]AM.htmI







38
Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA)
See DIsruptIve TechnoIogy OIIIce, n See DIsruptIve TechnoIogy OIIIce, n See DIsruptIve TechnoIogy OIIIce, n See DIsruptIve TechnoIogy OIIIce, n- -- -Q QQ Q- -- -TEL TEL TEL TEL
1. ARDA's mIssIon Is to sponsor hIgh-rIsk hIgh-payoII research desIgned to Ieverage IeadIng edge
technoIogy In the soIutIon oI some oI the most crItIcaI pobIems IacIng the InteIIIgence communIty (C). As
such, ARDA's purpose Is to Incubate revoIutIonary research Ior the shared beneIIt oI the InteIIIgence
communIty (C) by orIgInatIng and managIng R&D Programs that :
Have the potentIaI to IundamentaIIy Impact Iuture operatIonaI needs and strategIes;
Demand substantIaI, Iong-term, venture Investment to spur rIsk-takIng;
Progress measurabIy toward mId-term and IInaI goaIs; and
Take many Iorms and empIoy many deIIvery vehIcIes.
Note: Superseded by the NatIonaI SecurIty Agency's DIsruptIve TechnoIogy OIIIce.

Source: ARDA. WebsIte prevIousIy avaIIabIe at http:]]www.Ic-arda.org] now through Wayback MachIne
http:]]web.archIve.org]web]*]http:]]www.Ic-arda.org] [NOTE: typo IeIt In.]

2. ARDA Is an InteIIIgence communIty (C) organIzatIon whose mIssIon Is descrIbed as "to sponsor
hIgh-rIsk, hIgh-payoII research desIgned to Ieverage IeadIng edge technoIogy to soIve some oI the most
crItIcaI probIems IacIng the nteIIIgence CommunIty (C)." ARDA's research support Is organIzed Into
varIous technoIogy "thrusts" representIng the most crItIcaI areas oI deveIopment. Some oI ARDA's current
research thrusts IncIude nIormatIon ExpIoItatIon, Quantum nIormatIon ScIence, CIobaI nIosystems
Access, NoveI nteIIIgence Irom MassIve Data, and Advanced nIormatIon Assurance.

]eIIrey W. SeIIert. "Data MInIng: An OvervIew." CRS Report Ior Congress ]anuary 27, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RS20748.pdI

Adverse nIormatIon Adverse nIormatIon Adverse nIormatIon Adverse nIormatIon
See Derogatory nIormatIon See Derogatory nIormatIon See Derogatory nIormatIon See Derogatory nIormatIon
1. Any IactuaI and verIIIabIe unIavorabIe InIormatIon that creates a questIon as to an IndIvIduaI's
eIIgIbIIIty Ior access authorIzatIon or an entIty's eIIgIbIIIty Ior a IavorabIe ForeIgn OwnershIp, ControI, or
nIIuence determInatIon (see "Derogatory nIormatIon," sectIon 710.8 oI TItIe 10, Code oI FederaI
ReguIatIons, beIow).
2. Any InIormatIon that adverseIy reIIects on the IntegrIty or character oI a cIeared empIoyee, that
suggests that hIs or her abIIIty to saIeguard cIassIIIed InIormatIon may be ImpaIred, or that hIs or her
access to cIassIIIed InIormatIon cIearIy may not be In the Interest oI natIonaI securIty.

Source: NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. ]anuary 1995,
http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]522022m.htm






39
3. Any InIormatIon that adverseIy reIIects on the ethIcs and compIIance program oI a company
wIth a cIeared IacIIIty, that suggests that the company's abIIIty to saIeguard cIassIIIed InIormatIon and]or
specIaI nucIear materIaI may be ImpaIred.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]nngIossary]termsaj.pdI
ADVSE (AnaIysIs, DIssemInatIon, VIsuaIIzatIon, nsIght, and SemantIc Enhancement) ADVSE (AnaIysIs, DIssemInatIon, VIsuaIIzatIon, nsIght, and SemantIc Enhancement) ADVSE (AnaIysIs, DIssemInatIon, VIsuaIIzatIon, nsIght, and SemantIc Enhancement) ADVSE (AnaIysIs, DIssemInatIon, VIsuaIIzatIon, nsIght, and SemantIc Enhancement)
The term "ADVSE" has been used InterchangeabIy Ior two dIIIerent stages oI research and deveIopment:
The IIrst reIers to a tooIset or deveIopment kIt - a set oI generIc tooIs to gather, IInk, and
present InIormatIon.
The second reIers to a coIIectIon oI depIoyed systems to test the eIIectIveness oI the tooIset In
specIIIc settIngs.
SInce each oI these reIerences to "ADVSE" raIses a dIIIerent set oI prIvacy protectIon rIsks, It Is Important
to dIstInguIsh between the rIsks presented by a deveIopment kIt and the rIsks presented by a depIoyed
system. ThIs report uses the IoIIowIng separate terms:

Source: DHS PrIvacy OIIIce RevIew oI the AnaIysIs, DIssemInatIon, VIsuaIIzatIon, nsIght and SemantIc
Enhancement (ADVSE) Program, ]uIy 11, 2007,
http:]]www.dhs.gov]xIIbrary]assets]prIvacy]prIvacyrptadvIse.pdI and CNet, "Report: DHS KIIIs Data-
MInIng Project," http:]]news.com.com]8301-107843-9773243-7.htmI

AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon
See the ForeIgn ReIatIons oI the UnIted States (FRUS) See the ForeIgn ReIatIons oI the UnIted States (FRUS) See the ForeIgn ReIatIons oI the UnIted States (FRUS) See the ForeIgn ReIatIons oI the UnIted States (FRUS)
1. EstabIIshed by PL102-138, the ForeIgn ReIatIons AuthorIzatIon Act, FIscaI Years 1992 and
1993, sIgned by PresIdent 8ush on October 28, 1991. SectIon 198 oI P.L. 102-138 added a new TItIe V to
the Department oI State's 8asIc AuthorItIes Act oI 1956 (22 U.S.C. 4351, et seq.). The statute sets the
membershIp oI the CommIttee at nIne members drawn Irom among hIstorIans, poIItIcaI scIentIsts,
archIvIsts, InternatIonaI Iawyers, and other socIaI scIentIsts who are dIstInguIshed In the IIeId oI U.S.
IoreIgn reIatIons.

SIx members represent the AmerIcan HIstorIcaI AssocIatIon, the OrganIzatIon oI AmerIcan HIstorIans, the
AmerIcan PoIItIcaI ScIence AssocIatIon, the SocIety oI AmerIcan ArchIvIsts, the AmerIcan SocIety oI
nternatIonaI Law, and the SocIety oI HIstorIans oI AmerIcan ForeIgn ReIatIons; there are aIso three "at
Iarge" members. The members are granted aII necessary securIty cIearances. The IegIsIatIon requIres that
the CommIttee meet Iour tImes a year. The HIstorIan oI the State Department serves as executIve
secretary oI the CommIttee. The AdvIsory CommIttee revIews records, advIses, and makes
recommendatIons to the OIIIce oI the HIstorIan, 8ureau oI PubIIc AIIaIrs, concernIng the ForeIgn ReIatIons
oI the UnIted States documentary serIes. The CommIttee monItors the overaII compIIatIon and edItorIaI
process oI the serIes and advIses on aII aspects oI the preparatIon and decIassIIIcatIon oI the serIes.






40
AIthough the CommIttee does not revIew the contents oI IndIvIduaI voIumes, It does monItor the
overaII process and makes recommendatIons on partIcuIar probIems that are brought to Its attentIon. The
CommIttee aIso revIews the decIassIIIcatIon procedures oI the Department oI State, aII guIdeIInes used In
the decIassIIIcatIon process, and, by random sampIIng, documents representatIve oI aII Department oI
State records that remaIn cIassIIIed aIter 30 years. The CommIttee Is requIred to submIt an annuaI report
to the Secretary oI State settIng Iorth Its IIndIngs Irom thIs revIew.

Source: Department oI State. "HIstorIcaI AdvIsory CommIttee." http:]]www.state.gov]r]pa]ho]aD.C.om]
and ForeIgn AIIaIrs ManuaI. 10 FAM 141.2-2, "ForeIgn ReIatIons oI the UnIted States."
http:]]IoIa.state.gov]RECS]Iams.aspZIeveI=2&Id=11&Iam=0 and OIIIce oI the nspector CeneraI,
Management RevIew oI the OIIIce oI the HIstorIan 8ureau oI PubIIc AIIaIrs, U.S. Department oI State, May
2009, http:]]oIg.state.gov]documents]organIzatIon]124568.pdI

2. SEC. 403. PROCEDURES FOR DENTFYNC RECORDS FOR THE FRUS SERES; DECLASSFCATON,
REVSONS, AND SUMMARES.
`(1) to coordInate wIth the State Department's OIIIce oI the HIstorIan In seIectIng records Ior possIbIe
IncIusIon In the FRUS serIes;
`(2) to permIt IuII access to the orIgInaI, unrevIsed records by such IndIvIduaIs hoIdIng approprIate
securIty cIearances as have been desIgnated by the HIstorIan as IIaIson to that department, agency, or
entIty, Ior purposes oI thIs tItIe, and by members oI the AdvIsory CommIttee; and
`(3) to permIt access to specIIIc types oI records not seIected Ior IncIusIon In the FRUS serIes by the
IndIvIduaIs IdentIIIed In paragraph (2) when requested by the HIstorIan In order to conIIrm that records
seIected by that department, agency, or entIty accurateIy represent the poIIcymakIng process reIIected In
the reIevant part oI the FRUS serIes.

Source: PL102-138, the ForeIgn ReIatIons AuthorIzatIon Act.,
http:]]Itp.Ias.org]sgp]advIsory]state]pI102138.htmI

AdvIsory SensItIvIty Att AdvIsory SensItIvIty Att AdvIsory SensItIvIty Att AdvIsory SensItIvIty AttrIbutes rIbutes rIbutes rIbutes
User-suppIIed IndIcators oI IIIe sensItIvIty that aIert other users to the sensItIvIty oI a IIIe so that they may
handIe It approprIate to Its deIIned sensItIvIty. AdvIsory sensItIvIty attrIbutes are not used by the AS to
enIorce IIIe access controIs In an automated manner.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090 "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003. http:]]IoIa.state.gov]RECS]Search.asp

Agency Agency Agency Agency
n InteIIIgence usage, an organIzatIon or IndIvIduaI engaged In coIIectIng and]or processIng InIormatIon

Source: Department oI DeIense. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]







41
A AA AgencywIde gencywIde gencywIde gencywIde D DD Documents ocuments ocuments ocuments A AA Access and ccess and ccess and ccess and M MM Management anagement anagement anagement S SS System (ADAMS) ystem (ADAMS) ystem (ADAMS) ystem (ADAMS)
An InIormatIon system that provIdes access to aII Image and text documents that the NRC has made
pubIIc sInce November 1, 1999, as weII as bIbIIographIc records (some wIth abstracts and IuII text) that
the NRC made pubIIc beIore November 1999.

Source: NucIear ReguIatory CommIssIon (NRC).http:]]www.nrc.gov]readIng-rm]adams.htmI

AgIIIty AgIIIty AgIIIty AgIIIty
See Power to the Edge See Power to the Edge See Power to the Edge See Power to the Edge
AgIIIty Is reIated to the abIIIty to conduct network-centrIc operatIons (NCO) and Is assocIated wIth Power
to the Edge prIncIpIes. A robustIy networked Iorce Is, by vIrtue oI Its Increased connectedness, more agIIe.
An Improved InIormatIon posItIon cIearIy enabIes agIIIty, whIIe the concept oI speed oI command that Is
assocIated wIth a network-centrIc Iorce Is cIoseIy reIated to the responsIveness attrIbute oI agIIIty.

Source: SImon Reay AtkInson and ]ames MoIIat The AgIIe OrganIzatIon: From nIormaI Networks to
CompIex EIIects and AgIIIty, DoD, CCRP, 2005, http:]]www.dodccrp.org]IIIes]AtkInsonAgIIe.pdI

AgnotoIogy AgnotoIogy AgnotoIogy AgnotoIogy
AttrIbuted to IInguIst an 8oa, the study oI Ignorance Irom agnoIa, "want oI perceptIon or knowIedge" and
agnosIa, "a state oI Ignorance or not knowIng, both Irom gnosIs meanIng knowIedge."

Source: Robert N. Proctor, "AgnotoIoguy: A MIssIng Term," AgnotoIogy: The MakIng and UnmaskIng oI
gnorance Robert N. Proctor and Londa SchIebInger, eds. StanIord Press: 2008. 27.

Agreement on Tr Agreement on Tr Agreement on Tr Agreement on Trade ade ade ade- -- -reIated Aspects oI nteIIectuaI oI Property RIghts (TRPS) reIated Aspects oI nteIIectuaI oI Property RIghts (TRPS) reIated Aspects oI nteIIectuaI oI Property RIghts (TRPS) reIated Aspects oI nteIIectuaI oI Property RIghts (TRPS)
A WTO agreement that obIIgates countrIes to provIde mInImum standards oI InteIIectuaI property (P)
protectIon In natIonaI Iaws and to enIorce mInImum standards Ior protectIng InteIIectuaI property. The
TRPS Agreement covers copyrIght and reIated rIghts (that Is, the rIghts oI perIormers, producers oI sound
recordIngs, and broadcastIng organIzatIons); trademarks IncIudIng servIce marks; geographIcaI IndIcatIons
IncIudIng appeIIatIons oI orIgIn; IndustrIaI desIgns; patents IncIudIng the protectIon oI new varIetIes oI
pIants; the Iayout-desIgns oI Integrated cIrcuIts; and undIscIosed InIormatIon, IncIudIng trade secrets and
test data.

Source: MerrItt R. 8IakesIee and CarIos A. CarcIa, The Language oI Trade 3
rd
edItIon, 2001
Department oI State, nternatIonaI nIormatIon Programs,
http:]]www.4uth.gov.ua]usa]engIIsh]trade]Ianguage]Index.htm

AgrIcuIturaI ChemIcaI Usage Repor AgrIcuIturaI ChemIcaI Usage Repor AgrIcuIturaI ChemIcaI Usage Repor AgrIcuIturaI ChemIcaI Usage Reports ts ts ts
See RIght to Know See RIght to Know See RIght to Know See RIght to Know
PubIIshed by the EnvIronmentaI, EconomIcs, and DemographIcs 8ranch, UnIted States Department oI
AgrIcuIture, NatIonaI AgrIcuIturaI StatIstIcs ServIce (USDA-NASS), the serIes reported pestIcIde usage on
vegetabIes, postharvest, on Iarm anImaIs, IIorIcuIture, and other appIIcatIons. ssued through the IederaI






42
deposItory system to IIbrarIes sInce 1990 and Iater onIIne, the reports are the onIy pubIIcIy avaIIabIe
data source on pestIcIde use In the U.S. and a vaIuabIe resource Ior Iarmers, the pubIIc, and poIIcymakers
In trackIng pestIcIde usage and compIIance wIth InternatIonaI bans on certaIn pestIcIdes.

On May 21, 2008, USDA announced It Is eIImInatIng the program as It can no Ionger aIIord the program.

Source: OM8 Watch, "USDA DroppIng Shroud over PestIcIde Use Data,"
http:]]www.ombwatch.org]node]3700 and Creen8Iz.com, "USDA Cuts PestIcIde-Use Data Reports,"
http:]]www.greenbIz.com]news]2008]05]28]usda-cuts-pestIcIde-use-data-reports

AII AII AII AII- -- -Source nteIIIgence Source nteIIIgence Source nteIIIgence Source nteIIIgence
1. nteIIIgence products and]or organIzatIons and actIvItIes that Incorporate aII sources oI
InIormatIon, most IrequentIy IncIudIng human resources InteIIIgence, Imagery InteIIIgence, measurement
and sIgnature InteIIIgence, sIgnaIs InteIIIgence, and open-source data In the productIon oI IInIshed
InteIIIgence.
2. n InteIIIgence coIIectIon, a phrase that IndIcates that In the satIsIactIon oI InteIIIgence
requIrements, aII coIIectIon, processIng, expIoItatIon, and reportIng systems and resources are IdentIIIed
Ior possIbIe use and those most capabIe are tasked. (Army) - nteIIIgence that Is produced through the
anaIysIs oI aII avaIIabIe InIormatIon obtaIned through InteIIIgence, surveIIIance, and reconnaIssance (SR)
operatIons.

Source: Department oI the Army. FM 2-0. nteIIIgence. May 2004,
http:]] www.Ias.org]Irp]doddIr]army]Im2-0.pdI and Department oI DeIense. DoD oI MIIItary and
AssocIated Terms. ]P 1-02. As Amended through 19 October 2009,
http:]]www.dtIc.mII]doctrIne]doddIctIonary]

AIternatIve nIormatIon Leakage AIternatIve nIormatIon Leakage AIternatIve nIormatIon Leakage AIternatIve nIormatIon Leakage
Steve: And that technoIogy exIsts pretty weII. Now, weII, what's InterestIng Is thIs Is another In a Iong
serIes oI securIty and InIormatIon Ieakage whIch Is a IunctIon oI eIectrIcaI or mechanIcaI or
eIectromagnetIc Ieakage Irom a computer. You know, we've aII heard, you know, years ago there was thIs
technoIogy caIIed Tempest, whIch was - It attempted to, and apparentIy successIuIIy, determIned what
Image you had on your screen based on the eIectromagnetIc Ieakage Irom a CRT.

Leo: "Van Eck IreakIng" they caII that, yeah.

Source: Leo Laporte, ThIs Is SecurIty Now! EpIsode 6 Ior September 22, 2005, Steve CIbson,
http:]]medIa.CRC.com]sn]SN-006.mp3

AIternatIve MedIa AIternatIve MedIa AIternatIve MedIa AIternatIve MedIa (U]]FOUO)
A term used to descrIbe varIous InIormatIon sources that provIde a Iorum Ior InterpretatIons oI events and
Issues that dIIIer radIcaIIy Irom those presented In mass
medIa products and outIets.






43

Source: DHS, DomestIc ExtremIsm LexIcon ReIerence AId March 26, 2009,
http:]]www.scrIbd.com]doc]14884903]DomestIc-ExtremIsm-LexIcon-US-Department-oI-HomeIand-
SecurIty-ReIerence-AId

AIternatIve or Compensatory ControI Measures AIternatIve or Compensatory ControI Measures AIternatIve or Compensatory ControI Measures AIternatIve or Compensatory ControI Measures
See See See See Need Need Need Need- -- -to to to to- -- -Know Know Know Know, , , , SpecIaI Access Program SpecIaI Access Program SpecIaI Access Program SpecIaI Access Programs ss s
Department oI DeIense aIso uses the markIng AIternatIve or Compensatory ControI Measures (ACCM) Ior
cIassIIIed InIormatIon that requIres specIaI securIty measures to saIeguard cIassIIIed InteIIIgence or
operatIons and support InIormatIon when normaI measures are InsuIIIcIent to achIeve strIct need-to-know
controIs and where specIaI access program (SAP) controIs are not requIred. ACCM measures are deIIned as
the maIntenance oI IIsts oI personneI to whom the specIIIc cIassIIIed InIormatIon has been or may be
provIded together wIth the use oI an uncIassIIIed nIckname. The ACCM desIgnatIon Is used In conjunctIon
wIth the securIty cIassIIIcatIon to IdentIIy the portIon, page, and document contaInIng ACCM InIormatIon.

Source: DeIense SecurIty ServIce. "CIassIIIcatIon CuIdeIInes And DIstrIbutIon ControIs OrIgInaI and
DerIvatIve CIassIIIcatIon." http:]]www.dss.mII]traInIng]csg]securIty]S1cIass]CIassII.htm; Head to
Wayback MachIne to vIew the doc,
http:]]web.archIve.org]web]20070317052725]http:]]www.dss.mII]traInIng]csg]securIty]S1cIass]CIassII.
htm

AItIvore AItIvore AItIvore AItIvore
See DCSNET See DCSNET See DCSNET See DCSNET
1. [The] source code to "AItIvore," a program that mImIcs aII the capabIIItIes oI CarnIvore. Part
protest agaInst CarnIvore's potentIaI Ior InvasIons oI prIvacy and part deIensIve measure aImed at
subvertIng CarnIvore, AItIvore Is the Iatest escaIatIon oI the ongoIng battIe over just how much prIvacy we
can expect In cyberspace.
AIso, to gIve SPs [nternet servIce provIders] an aIternatIve to the F8. The F8 comes up wIth a search
warrant and reaIIy, what the F8 wants, Is just the data. They don't care how you get It. I the SP can use
AItIvore Instead, they don't need to have thIs secretIve bIack box on the network.
Source: Sean Dugan. "DeIangIng CarnIvore." (IntervIew wIth AItIvore codewrIter Robert Craham) SaIon
September 25, 2000, http:]]archIve.saIon.com]tech]vIew]2000]09]25]robertgraham]Index.htmI
2. Dubbed "AItIvore," the source code conIorms to the Ieatures oI CarnIvore as descrIbed In the
F8's recent soIIcItatIon Ior Independent revIew oI Its program. AccordIng to Network CE, the F8 had
requested that any unIversIty that wanted to revIew the soItware verIIy that It:

monItors suspect's e-maII (eIther headers or IuII content),
monItors suspect's access to certaIn types oI servers, IncIudIng Web and FTP servers,
copIes aII packets to and Irom the suspect's P address, and






44
dIscovers the suspect's nternet address (when assIgned by the SP) by communIcatIng wIth the
provIder's InIrastructure.
Source: Robert Lemos. "Open-source CarnIvore cIone reIeased." September 20, 2000,
http:]]news.zdnet.com]2100-959522-524062.htmI

AnaIysIs and ProductIon AnaIysIs and ProductIon AnaIysIs and ProductIon AnaIysIs and ProductIon
n InteIIIgence usage, the conversIon oI processed InIormatIon Into InteIIIgence through the IntegratIon,
evaIuatIon, anaIysIs, and InterpretatIon oI aII source data and the preparatIon oI InteIIIgence products In
support oI known or antIcIpated user requIrements.

Source: Department oI DeIense DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

AnaIyst Notebook 2 AnaIyst Notebook 2 AnaIyst Notebook 2 AnaIyst Notebook 2
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
nIormatIon AnaIysIs and nIrastructure ProtectIon DIrectorate. CorreIates events and peopIe to specIIIc
InIormatIon;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: No.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI

AnomaIy AnomaIy AnomaIy AnomaIy
An IndIcatIon oI IoreIgn power actIvIty or knowIedge, InconsIstent wIth the expected norm, that suggests
knowIedge oI U.S. natIonaI securIty InIormatIon, processes, capabIIItIes, or actIvItIes. Reports oI anomaIIes
shaII be made through approprIateIy secure channeIs.

Source: UnIted States. Department oI ]ustIce. ]ustIce Management DIvIsIon. nIormatIon SecurIty PoIIcy
Croup. CIassIIIed natIonaI securIty InIormatIon. WashIngton, D.C.: U.S. Dept. oI ]ustIce, ]ustIce
Management DIvIsIon, SecurIty and Emergency PIannIng StaII: nIormatIon SecurIty PoIIcy Croup, 1998.
SUDOC: ]1.2:SE2]5

AppIIcatIon AppIIcatIon AppIIcatIon AppIIcatIon
n the InteIIIgence context, the dIrect extractIon and taIIorIng oI InIormatIon Irom an exIstIng IoundatIon
oI InteIIIgence and near tIme reportIng. t Is Iocused on and meets specIIIc, narrow requIrements, normaIIy
on demand.







45
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

ArchIvIng (Records) ArchIvIng (Records) ArchIvIng (Records) ArchIvIng (Records)
The maIntenance oI records In remote storage aIter a case has been cIosed or dIsposed oI, as a matter oI
contIngency, shouId the records be needed Ior Iater reIerence.

Source: DO], CIobaI ]ustIce nIormatIon SharIng nItIatIve, CrImInaI nteIIIgence CIossary oI Terms,
MInImum CrImInaI nteIIIgence TraInIng Standards, AppendIx, October 2007,
http:]]www.It.ojp.gov]documents]mIncrImInteIstand.pdI

Armed Forces CensorshIp Armed Forces CensorshIp Armed Forces CensorshIp Armed Forces CensorshIp
See See See See CensorshIp CensorshIp CensorshIp CensorshIp
The examInatIon and controI oI personaI communIcatIons to or Irom persons In the Armed Forces oI the
UnIted States and persons accompanyIng or servIng wIth the Armed Forces oI the UnIted States.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

AssassInatIon Record AssassInatIon Record AssassInatIon Record AssassInatIon Record
Se Se Se See Record e Record e Record e Record
1. SectIon 1400.1 oI the [sIc, AssassInatIon RevIew] 8oard's IInaI deIInItIon oI "assassInatIon
record" reads: (a) An assassInatIon record IncIudes, but Is not IImIted to, aII records, pubIIc and prIvate,
regardIess oI how IabeIed or IdentIIIed, that document, descrIbe, report on, anaIyze, or Interpret actIvItIes,
persons, or events reasonabIy reIated to the assassInatIon oI PresIdent ]ohn F. Kennedy and InvestIgatIons
oI or InquIrIes Into the assassInatIon (p.18).

2. The RevIew 8oard oIten turned back to the breadth oI Its deIInItIon oI the term
"assassInatIon record toId the RevIew 8oard that he dId not beIIeve that hIs oIIIce's records were
assassInatIon records because the records dId not mentIon the assassInatIon, or any oI the
centraI assassInatIon IIgures. When It was deIInIng the term "assassInatIon record," the
8oard antIcIpated that IederaI agencIes and others who possessed reIevant records wouId
chaIIenge the 8oard's judgment (p.19).

Source: AssassInatIon RevIew 8oard, FInaI Report oI the AssassInatIon Records RevIew 8oard, September
1998, http:]]www.archIves.gov]research]jIk]revIew-board]report]

AsymmetrIc AsymmetrIc nIormatIon AsymmetrIes oI nIormatIon AsymmetrIc AsymmetrIc nIormatIon AsymmetrIes oI nIormatIon AsymmetrIc AsymmetrIc nIormatIon AsymmetrIes oI nIormatIon AsymmetrIc AsymmetrIc nIormatIon AsymmetrIes oI nIormatIon
See See See See DeceptIon, nIormatIon DomInance, nIormatIon SuperIorIty, nIormatIon WarIare DeceptIon, nIormatIon DomInance, nIormatIon SuperIorIty, nIormatIon WarIare DeceptIon, nIormatIon DomInance, nIormatIon SuperIorIty, nIormatIon WarIare DeceptIon, nIormatIon DomInance, nIormatIon SuperIorIty, nIormatIon WarIare
1. A byproduct oI the InIormatIon revoIutIon that aIIows smaIIer pIayers to compete as Iarger ones
once dId or do.







46
Source: DavId ]. RothkopI. "CyberpoIItIk: The nIormatIon RevoIutIon and U.S. ForeIgn PoIIcy." March 22,
2000, http:]]www.carnegIeendowment.org]events]Index.cImZIa=eventDetaII&Id=51

2. DIssImIIarItIes In organIzatIon, equIpment, doctrIne, [InIormatIon] and vaIues between other
armed Iorces (IormaIIy organIzed or not) and US Iorces. Engagements are symmetrIc II Iorces,
technoIogIes, and weapons are sImIIar; they are asymmetrIc II Iorces, technoIogIes, and weapons are
dIIIerent, or II a resort to terrorIsm and rejectIon oI more conventIonaI ruIes oI engagement are the norm.

Source: Department oI the Army. "OperatIons." FM 3-0. ]une 2001,
http:]]www.dtIc.mII]doctrIne]jeI]servIcepubs]Im30a.pdI

3. U.S. mIIItary doctrIne does not accurateIy address or deIIne the concept oI asymmetry. n
addItIon to thIs IaIIure, US doctrIne worsens the eIIect by consIstentIy usIng the word to descrIbe other
concepts, actIons, or terms. The conIusIng voId Is Iound across aII servIces to varyIng degrees, but It Is
Iounded In joInt doctrIne.the deIInItIons oI asymmetry In doctrIne are too many, and eventuaIIy Ied the
servIce members to beIIeve that just about anythIng or everythIng asymmetrIc.

Source: Steven D. Pomper. AsymmetrIc: Myth In UnIted States MIIItary DoctrIne. ThesIs. Durham, NH:
UnIversIty oI New HampshIre, 1991. 36-37. ADA428994, http:]]handIe.dtIc.mII]100.2]ADA428994; aIso
see Steven Metz and DougIas ]ohnson , Asymmetry and U.S. MIIItary Strategy: DeIInItIon, 8ackground,
and StregeIc Concepts, StrategIc StudIes nstItute, 2001,
http:]]www.strategIcstudIesInstItute.army.mII]pdIIIIes]PU8223.pdI

4. n IormaI terms, we can deIIne asymmetry as any mIIItary sIgnIIIcant dIsparIty between
contendIng partIes wIth respect to the eIements oI mIIItary broadIy construed. AsymmetrIcs InvItes a study
oI the Iact that eIements oI mIIItary power are never appIIed In a vacuum, but aIways In partIcuIar poIItIcaI,
economIc, cuIturaI, reIIgIous, psychoIogIcaI, geographIc, and cIImatIc contexts that quaIIIy the utIIIty oI
each eIement oI power and condItIon the way each acts agaInst the other eIements oI power.

Source: LIoyd ]. Matthews. "ChaIIengIng the UnIted States SymmetrIcaIIy and AsymmetrIcaIIy: Can AmerIca
be DeIeatedZ" ]uIy 1998,
http:]]www.strategIcstudIesInstItute.army.mII]pubs]dIspIay.cImZPubD=230

AuthentIcatIon AuthentIcatIon AuthentIcatIon AuthentIcatIon
1. SecurIty measure desIgned to estabIIsh the vaIIdIty oI a transmIssIon, message, or orIgInator, or
a means oI verIIyIng an IndIvIduaI's authorIzatIon to receIve specIIIc categorIes oI InIormatIon.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

2. A securIty measure desIgned to protect a communIcatIons system agaInst acceptance oI a
IrauduIent transmIssIon or sImuIatIon by estabIIshIng the vaIIdIty oI a transmIssIon, message, or






47
orIgInator. 2. A means oI IdentIIyIng IndIvIduaIs and verIIyIng theIr eIIgIbIIIty to receIve specIIIc
categorIes oI InIormatIon. 3. EvIdence by proper sIgnature or seaI that a document Is genuIne and oIIIcIaI.
4. n evasIon and recovery operatIons, the process whereby the IdentIty oI an evader Is conIIrmed.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02, As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
Automated OntoIogIcaIIy 8ased LInk AnaIysIs oI nternatIonaI Web Logs Ior the TImeIy DIscovery oI Automated OntoIogIcaIIy 8ased LInk AnaIysIs oI nternatIonaI Web Logs Ior the TImeIy DIscovery oI Automated OntoIogIcaIIy 8ased LInk AnaIysIs oI nternatIonaI Web Logs Ior the TImeIy DIscovery oI Automated OntoIogIcaIIy 8ased LInk AnaIysIs oI nternatIonaI Web Logs Ior the TImeIy DIscovery oI
ReIevant and CredIbIe nIormatIon ReIevant and CredIbIe nIormatIon ReIevant and CredIbIe nIormatIon ReIevant and CredIbIe nIormatIon
A bIog search engIne whIch anaIyzes patterns oI Importance to the InteIIIgence communIty [sm]
8Iog research may provIde InIormatIon anaIysts and warIIghters wIth InvaIuabIe heIp In IIghtIng the war on
terrorIsm. Patterns IncIude the content oI the bIogs as weII as what hyperIInks are contaIned wIthIn the
bIog. WIthIn bIogs, hyperIInks act IIke reIerence cItatIons In research papers thereby aIIowIng someone to
dIscover the most Important events bIoggers are wrItIng about In just the same way that one can dIscover
the most Important papers In a IIeId by IIndIng whIch ones are the most cIted In research papers.
Source: WIIIIam ]. Sharp. 8Iogs Study May ProvIde CredIbIe nIormatIon. DoD. TransFormatIons,
http:]]www.deIenseIInk.mII]transIormatIon]artIcIes]2006-06]ta062906b.htmI and Rory O'Connor,
Pentagon StudIes 8Iogs as Terror-FIghtIng TooI. AIternet ]uIy 19, 2006,
http:]]www.aIternet.org]coIumnIsts]story]39227]

Automated Trusted nIormatIon Exchange (ATX) Automated Trusted nIormatIon Exchange (ATX) Automated Trusted nIormatIon Exchange (ATX) Automated Trusted nIormatIon Exchange (ATX)
Operated by the RegIonaI nIormatIon SharIng Systems, ATX Is a secure means to dIssemInate natIonaI
securIty or terrorIst threat InIormatIon to Iaw enIorcement and other IIrst responders vIa the ATX
eIectronIc buIIetIn board, secure Web sIte, and secure e-maII.

Source: DO], CIobaI ]ustIce nIormatIon SharIng nItIatIve, CrImInaI nteIIIgence CIossary oI Terms,
MInImum CrImInaI nteIIIgence TraInIng Standards, AppendIx, October 2007,
http:]]www.It.ojp.gov]documents]mIncrImInteIstand.pdI

AutomatIc DecIassIII AutomatIc DecIassIII AutomatIc DecIassIII AutomatIc DecIassIIIcatIon catIon catIon catIon
1. "AutomatIc decIassIIIcatIon" means the decIassIIIcatIon oI InIormatIon based soIeIy upon: (1)
the occurrence oI a specIIIc date or event as determIned by the orIgInaI cIassIIIcatIon authorIty; or (2) the
expIratIon oI a maxImum tIme Irame Ior duratIon oI cIassIIIcatIon estabIIshed under thIs order.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. ExecutIve Order 12958, "CIassIIIed NatIonaI SecurIty nIormatIon" (the Order), caIIed Ior a
renewed commItment by the ExecutIve branch to the concept oI decIassIIIcatIon tIed to specIIIc deadIInes,
reIerred to In the Order as automatIc decIassIIIcatIon. ThIs dIrectIon caIIs Ior aII 25-year-oId and oIder






48
hIstorIcaIIy vaIuabIe permanent records contaInIng cIassIIIed natIonaI securIty InIormatIon to be
decIassIIIed, exempted, excIuded, reIerred to other Interested agencIes, or approprIateIy deIayed by
December 31, 2006, and each year thereaIter, Ior such records prIor to theIr attaInIng 25-year-oId status.
As such, It Is Important to recognIze that December 31, 2006, represents not an end unto ItseII but rather
the begInnIng oI IntegratIng automatIc decIassIIIcatIon Into the IabrIc oI the securIty cIassIIIcatIon
Iramework.

Source: nIormatIon SecurIty OversIght OIIIce. "Report to the PresIdent: An Assessment oI DecIassIIIcatIon
In the ExecutIve 8ranch." September 21, 2005. http:]]www.archIves.gov]Isoo]reports]2005-
decIassIIIcatIon-report.htmI

Autonomy Autonomy Autonomy Autonomy
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
DeIense nteIIIgence Agency, Department oI Energy, Is a Iarge search engIne tooI that Is used to search
hundreds oI thousands oI word documents. s used Ior the organIzatIon and knowIedge dIscovery oI
InteIIIgence;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: No;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI

AvaIIabIe PubIIcIy AvaIIabIe PubIIcIy AvaIIabIe PubIIcIy AvaIIabIe PubIIcIy
nIormatIon that has been pubIIshed or broadcast Ior generaI pubIIc consumptIon, Is avaIIabIe on request
to a member oI the generaI pubIIc, couId IawIuIIy be seen or heard by any casuaI observer, or Is made
avaIIabIe at a meetIng open to the generaI pubIIc. n thIs context "generaI pubIIc" aIso means generaI
avaIIabIIIty to persons In a mIIItary communIty even though the mIIItary communIty Is not open to the
cIvIIIan generaI pubIIc.

Source: DoD. Under Secretary oI DeIense Ior PoIIcy. DoD 5240.1-R. Procedures CovernIng the ActIvItIes oI
DoD nteIIIgence Components That AIIect UnIted States Persons. December, 1982: 7.
http:]]www.Ias.org]Irp]doddIr]dod]d52401r.pdI


~ 8 ~ ~ 8 ~ ~ 8 ~ ~ 8 ~

8asIc nteIIIgence 8asIc nteIIIgence 8asIc nteIIIgence 8asIc nteIIIgence






49
FactuaI, IundamentaI, and reIatIveIy permanent InIormatIon about aII aspects oI a natIon - physIcaI,
socIaI, economIc, poIItIcaI, bIographIcaI, and cuIturaI - whIch Is used as a base Ior InteIIIgence products In
the support oI pIannIng, poIIcymakIng, and mIIItary operatIons.

Source: OIIIce oI PubIIc AIIaIrs, CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence : CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C. : SprIngIIeId, VA : NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2:C 76 PREX 3.2]2:C 94
8ehavIoraI AdvertIsIng 8ehavIoraI AdvertIsIng 8ehavIoraI AdvertIsIng 8ehavIoraI AdvertIsIng
See PrIvacy See PrIvacy See PrIvacy See PrIvacy
8ehavIoraI advertIsIng matches advertIsements to a consumer's Interests as determIned over tIme. I a
consumer vIsIts severaI dIIIerent traveI sItes beIore vIewIng a news sIte, the consumer mIght see a
behavIoraIIy-targeted traveI advertIsement dIspIayed on the news page, even though the news page
contaIns no traveI content. A tradItIonaI behavIoraI ad network assembIes proIIIes oI IndIvIduaI consumers
by trackIng users' actIvItIes on pubIIsher sItes wIthIn theIr network. When the consumer vIsIts a sIte where
the ad network has purchased ad space, the ad network coIIects data about that vIsIt whIIe servIng an
advertIsement based on the consumer's proIIIe. WhIIe onIy a smaII portIon oI onIIne ads are currentIy
targeted thIs way, behavIoraI advertIsIng Is a growIng segment oI the onIIne advertIsIng Industry.
Consumers' behavIoraI advertIsIng proIIIes may Incorporate many dIIIerent kInds oI data that are not
personaIIy IdentIIIabIe by themseIves.
Source: Center Ior Democracy & TechnoIogy (CDT), A PrImer on 8ehavIoraI AdvertIsIng, ]uIy 31, 2008,
http:]]cdt.org]pubIIcatIons]poIIcyposts]2008]12, LesIIe HarrIs, Center Ior Democracy & TechnoIogy,
TestImony, Senate Commerce, ScIence & TransportatIon CommIttee "PrIvacy mpIIcatIons oI OnIIne
AdvertIsIng," ]uIy 9, 2008, http:]]cdt.org]testImony]20080709harrIs.pdI, CDT, "OnIIne 8ehavIoraI
AdvertIsIng: DIscussIng the SP-Ad Network ModeI,"http:]]cdt.org]pubIIcatIons]poIIcyposts]2008]15 and
Robert M. TopoIskI, Free Press and PubIIc KnowIedge, "NebuAd and Partner SPs: WIretappIng, Forgery and
8rowser HIjackIng," ]une 18, 2008,
http:]]www.pubIIcknowIedge.org]pdI]nebuad-report-20080618.pdI

8IodeIense KnowIedge Center (8KC) 8IodeIense KnowIedge Center (8KC) 8IodeIense KnowIedge Center (8KC) 8IodeIense KnowIedge Center (8KC)
The 8IodeIense KnowIedge Center supports N8ACC IacIIIty component centers and has Its own IunctIons
and mIssIons. One Is to provIde scIentIIIc assessments and InIormatIon to the HomeIand SecurIty
OperatIons Center regardIng potentIaI bIoterrorIsm events. Another Is to be a reposItory oI bIodeIense
InIormatIon, IncIudIng genomIc sequences Ior pathogens oI concern, the exIstence and IocatIon oI
vaccInes, bIoIorensIcs InIormatIon, and InIormatIon about IndIvIduaIs, groups, or organIzatIons that mIght
be deveIopIng these pathogens. FInaIIy, the 8KC aIds In assessIng potentIaI bIoterrorIsm agents as
"materIaI threats" Ior the purpose oI the Project 8IoshIeId countermeasure procurement process.

Once proposed as one oI the centers comprIsIng the NatIonaI 8IodeIense AnaIysIs and Countermeasures
Center (N8ACC), dedIcated on September 10, 2004, but estabIIshed separateIy at Lawrence LIvermore






50
NatIonaI Laboratory, and now appears to be a center Independent oI the N8ACC IacIIIty and N8ACC
program.

Source: Dana A. Shea, The NatIonaI 8IodeIense AnaIysIs and Countermeasures Center: ssues Ior
Congress, CRS Reports Ior Congress February 15, 2007,
http:]]www.Ias.org]sgp]crs]homesec]RL32891.pdI

Note: The bIoIogIcaI weapons conventIon stIpuIates that the sIgnatorIes must not "deveIop, produce,
stockpIIe, or otherwIse acquIre or retaIn" bIoIogIcaI weapons, and does not dIstInguIsh between oIIensIve
and deIensIve IntentIons.

8Iack 8Iack 8Iack 8Iack
See Red See Red See Red See Red
n the InIormatIon processIng context, bIack denotes data, text, equIpment, processes, systems or
InstaIIatIons assocIated wIth unencrypted InIormatIon that requIres no emanatIons securIty reIated
protectIon. For exampIe, eIectronIc sIgnaIs are "bIack" II bearIng uncIassIIIed InIormatIon.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090 "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]IoIa.state.gov]RECS]Search.asp
8Iack Products 8Iack Products 8Iack Products 8Iack Products
Products that purport to emanate Irom a source other than the true one are known as bIack products.
8Iack products are best used to support strategIc pIans.

Source: DoD PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

8Iowback 8Iow 8ack nIo 8Iowback 8Iow 8ack nIo 8Iowback 8Iow 8ack nIo 8Iowback 8Iow 8ack nIormatIon 8Iowback RepIay rmatIon 8Iowback RepIay rmatIon 8Iowback RepIay rmatIon 8Iowback RepIay
See DIsInIormatIon, nIormatIon LaunderIng, Prepackaged News See DIsInIormatIon, nIormatIon LaunderIng, Prepackaged News See DIsInIormatIon, nIormatIon LaunderIng, Prepackaged News See DIsInIormatIon, nIormatIon LaunderIng, Prepackaged News
1. DeceptIon pIanted abroad by an InteIIIgence agency to mIsIead peopIe In other countrIes, then
returnIng to the orIgInatIng natIon, where It mIsIeads that peopIe, or even the government ItseII. When
WIIIIam CoIby, the UnIted States DIrector oI the CentraI nteIIIgence Agency testIIIed beIore the Church
CommIttee In 1977, he admItted
Source: Norman PoImar, and Thomas 8. AIIen. Spy 8ook: the EncycIopedIa oI EspIonage. New York :
Random House ReIerence, 2004. 2nd ed.
2. SpeakIng oI the CentraI nteIIIgence Agency (CA), RaIph W. McCehee (180-181) reports that CA
InteIIIgence reports and news reports "were IrequentIy sImIIar" SometImes a newspaper artIcIe preceded
the InteIIIgence report; sometImes the InteIIIgence report came IIrst; sometImes the two arrIved
sImuItaneousIy. CompIeteness oI detaII and accuracy oI observatIon showed the same resuIts.
OccasIonaIIy and omInousIy, a cabIed InteIIIgence report was IdentIcaI to a newspaper Item.






51
..UnIortunateIy there was no mechanIsm that prevented that dIsInIormatIon Irom contamInatIng and
spoIIIng the CA's own InIormatIon IIIes.OccasIonaIIy couId recognIze and separate out the CA-
generated artIcIes Irom others, but more oIten It was ImpossIbIe to teII posItIveIy whether an Item was
genuIne or pIanted. Many artIcIes that kept and IIIed, that served as background Ior the studIes wrote,
Iater turned out to be CA propaganda."
As an exampIe oI "InIormatIon bIowback," McCehee (181) wrItes that durIng the "CuIturaI RevoIutIon In
ChIna, the Agency's huge radIo transmItters on TaIwan broadcast Items as II they were contInuatIons oI
maInIand programs. TheIr broadcasts IndIcate the revoIutIon was gettIng out oI hand and was much more
serIous than It actuaIIy was. These broadcasts were pIcked up by the Agency's ForeIgn 8roadcast
nIormatIon ServIce (F8S) and IncIuded In Its daIIy bookIets oI transcrIptIons Irom the maInIand. From
there the InIormatIon was pIcked up by other oIIIces oI the Agency and reported as hard
InteIIIgence.here was a dangerous cycIe. Agency dIsInIormatIon, mIstaken as Iact, seeped Into the IIIes
oI U.S. government agencIes and the CA ItseII. t became IIxed as Iact In the mInds oI empIoyees who had
no Idea where It had orIgInated. "
Source: RaIph W. McCehee. DeadIy DeceIts: My 25 Years In the CA. New York: SherIdan Square
PubIIcatIons, 1983, and Tabassum ZakarIa. "U.S. PIantIng FaIse StorIes Common CoId War TactIc." Reuters
February 25, 2002, http:]]www.Ias.org]sgp]news]2002]02]re022502.htmI
3. One oI the major dangers oI dIsInIormatIon Is bIowback, In whIch IaIse InIormatIon reaches
not onIy Its Intended target abroad but cItIzens back home, and the Increased Interconnectedness oI the
worId Is makIng bIowback a greater rIsk. The short- term consequences vary. n practIce, It shouId not
matter a great deaI II ]oe SIxpack IaIseIy beIIeves the presIdent oI ndonesIa moonIIghts as a pornographIc
actor. On the other hand, there can be poIIcy consequences, as In the AIIende case, In whIch eIIorts to
dIscredIt hIm In ChIIe mIght have aIIected AmerIcan pubIIc opInIon and support Ior the NIxon's
AdmInIstratIon's ChIIe poIIcy.
Source: Thomas C. EIIIngton. "Won't Cet FooIed AgaIn: The ParanoId StyIe In the NatIonaI SecurIty State."
Covernment and OpposItIon 38 (2003): 436-455.

4. PossIbIIItIes oI bIowback agaInst the UnIted States shouId aIways be In the back oI the mInds oI
aII CA oIIIcers InvoIved In thIs type oI operatIon. Few, II any, operatIons are as expIosIve as thIs type. ThIs
Iact makes It ImperatIve that the best traIned and experIenced oIIIcers who can be Iound be assIgned.

Source: CA CIandestIne ServIce HIstory. "Overthrow oI PremIer Mossadeq oI ran, November 1952-August
1953," March 1954. AppendIx E. "MIIItary CrItIque: Lessons Learned Irom TPA]AX MIIItary PIannIng RE:
Aspects oI Coup d'Etat." 21, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE8828

5. .II one Is practIcIng deceptIon In order to aIIect pubIIc or InternatIonaI opInIon, the "bIow
back" Irom Ioss oI credIbIIIty can easIIy prove quIte damagIng. ThIs consIderatIon gaIned InternatIonaI
attentIon when It was reveaIed In earIy 2002 that DoD had estabIIshed an "OIIIce oI StrategIc nIIuence."






52
WhIIe It was quIckIy asserted that thIs organIzatIon wouId not be deceptIve, medIa sources ImpIIed that
IoreIgn medIa mIght be provIded wIth manIpuIated InIormatIon. ThIs set oII a IIurry oI charges and denIaIs
and the eventuaI; cIosIng oI the oIIIce. Even the appearance oI deceptIon can be expensIve.

Source: ]oseph W. CaddeII. "DeceptIon 101-PrImer on DeceptIon." December 2004,
http:]]www.Ias.org]Irp]eprInt]deceptIon.pdI
6. The term "bIowback," whIch oIIIcIaIs oI the CentraI nteIIIgence Agency IIrst Invented Ior theIr
InternaI use, Is startIng to cIrcuIate among students oI InternatIonaI reIatIons. t reIers to the unIntended
consequences oI poIIcIes that were kept secret Irom the AmerIcan peopIe. What the daIIy press reports as
the maIIgn acts oI "terrorIsts" or "drug Iords" or "rogue states" or "IIIegaI arms merchants" oIten turn out to
be bIowback Irom earIIer AmerIcan operatIons (8). 8Iowback ItseII can Iead to more bIowback, In a spIraI
oI destructIve behavIor (10).
n a sense bIowback Is sImpIy another way oI sayIng that a natIon reaps what It sows.as a concept,
bIowback Is obvIousIy most easy to grasp In Its most straIghtIorward manIIestatIon. The unIntended
consequences oI AmerIcan poIIcIes and acts In country X are a bomb at an AmerIcan embassy In country Y
or a dead AmerIcan In country Z.because we IIve In an IncreasIngIy Interconnected InternatIonaI system,
we are aII In a sense, IIvIng In a bIowback worId. AIthough the term orIgInaIIy appIIed onIy to the
unIntended consequences Ior AmerIcans oI AmerIcan poIIcIes, there Is every reason to wIden Its meanIng.
Whether, Ior exampIe, any unIntended consequences oI the AmerIcan poIIcIes that Iostered and then
heIghtened the economIc coIIapse oI ndonesIa In 1997 ever bIow back to the UnIted States, the
unIntended consequences Ior ndonesIans have been staggerIng IeveIs oI suIIerIng, poverty, and Ioss oI
hope. (17-18)
Source: ChaImers ]ohnson. 8Iowback: the Costs and Consequences oI AmerIcan EmpIre. New York:
MetropoIItan 8ooks, 2000. 3-33.

7. (DOD, NATO) 1. Escape, to the rear and under pressure, oI gases Iormed durIng the IIrIng oI
the weapon. 8Iowback may be caused by a deIectIve breech mechanIsm, a ruptured cartrIdge case, or a
IauIty prImer. 2. Type oI weapon operatIon In whIch the Iorce oI expandIng gases actIng to the rear
agaInst the Iace oI the boIt IurnIshes aII the energy requIred to InItIate the compIete cycIe oI operatIon. A
weapon whIch empIoys thIs method oI operatIon Is characterIzed by the absence oI any breech-Iock or
boIt-Iock mechanIsm.
27


Source: DoD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 31 October
2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

8. Perhaps the most dIsquIetIng danger In the CA use oI the medIa IIes In the phenomenon oI
bIow back or repIay, that Is the return to the UnIted States oI Agency propaganda pIanted abroad - the

27
Thanks to M.R. Ior suggestIng thIs deIInItIon.






53
braInwashIng oI the AmerIcan peopIe by one oI theIr own secret InteIIIgence agencIes, to put It In harsh,
OrweIIIan terms. [Note: the Church CommIttee IIIes contaIn reports oI bIowback & the "AspIn CommIttee,"
UnIted States. Congress. House. Permanent SeIect CommIttee on nteIIIgence. SubcommIttee on OversIght.
The CA and the MedIa : hearIngs beIore the SubcommIttee on OversIght oI the Permanent SeIect
CommIttee on nteIIIgence, House oI RepresentatIves, NInety-IIIth Congress, IIrst and second sessIons.
WashIngton : U.S. Covernment PrIntIng OIIIce, 1978. Y 4.n 8]18:C 33]
Source: Loch K. ]ohnson. AmerIca's Secret Power: the CA at Home and Abroad. New York: OxIord
UnIversIty Press, 1989. 197.
8Iue P 8Iue P 8Iue P 8Iue Paper aper aper aper
AprII 11, 1940 F8 DIrector Hoover InstItutes a specIaI reportIng procedure governIng senIor F8 oIIIcIaIs'
wrItten communIcatIons about especIaIIy sensItIve and admInIstratIve matters. Such reports were to be
prepared on coIored paper (IIrst bIue and then pInk) to precIude theIr serIaIIzatIon In the F8's centraI
records system. Hoover termInated thIs reportIng procedure In 1950. ThereaIter, F8 oIIIcIaIs reported
such InIormatIon In "InIormaI" memoranda (pIaIn whIte nonIetterhead paper), whIch were then maIntaIned
In oIIIce IIIes untII destroyed.
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 366.
8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed
See See See See CIassIIIcatIon LeveIs, CIassIIIed at 8Irth CIassIIIcatIon LeveIs, CIassIIIed at 8Irth CIassIIIcatIon LeveIs, CIassIIIed at 8Irth CIassIIIcatIon LeveIs, CIassIIIed at 8Irth, NucIear Secrecy, RestrIcted Data , NucIear Secrecy, RestrIcted Data , NucIear Secrecy, RestrIcted Data , NucIear Secrecy, RestrIcted Data

1. AccordIng to RIchard C. HewIett, throughout Its exIstence Irom 1946-1975, the UnIted States
AtomIc Energy CommIssIon (AEC) consIstentIy reIIed upon the born cIassIIIed concept In admInIsterIng Its
statutory authorIty to controI the dIssemInatIon oI cIassIIIed InIormatIon. CertaIn types oI InIormatIon
were "born cIassIIIed" whether that InIormatIon was generated In an oIIIcIaI government project, or In the
mInd oI a prIvate cItIzen workIng In hIs own home. Moreover, the AEC and staII aImost never used the
words "born cIassIIIed;" the concept, however, "grew quIte naturaIIy out oI the AmerIcan experIence In
WorId War . The atomIc bomb project was the best kept secrets oI the war."

The IIrst draIt oI the atomIc energy bIII, Introduced In the Senate December 20, 1945 by Senator 8rIen
McMahon, gave emphasIs to the dIstInctIon between scIentIIIc and reIated technIcaI InIormatIon as IInked
to atomIc energy, productIon and use oI IIssIonabIe materIaIs. Over the course oI dIscussIons regardIng
the bIII, the orIgInaI SectIon 9 (now 10) oI the McMahon bIII evoIved Irom "DIssemInatIon oI nIormatIon"
to "ControI oI InIormatIon" abandonIng the convoIutIons between "scIentIIIc" and "reIated technIcaI"
InIormatIon Ior a specIaI category oI "RestrIcted Data," or RD. RD Is "aII data concernIng
the manuIacture or utIIIzatIon oI atomIc weapons , productIon oI IIssIonabIe materIaIs or the use oI
IIssIonabIe materIaI In the productIon oI power, but shaII not IncIude any data whIch the commIssIon Irom
tIme to tIme determInes may be pubIIshed wIthout adverseIy aIIectIng the common deIense or securIty."







54
HewIett (175-176) beIIeves the category oI RD recognIzed the exIstIng sItuatIon that aII InIormatIon
reIated to these above-mentIoned aspects oI nucIear technoIogy, (IncIudIng the controversIaI and
nebuIous category oI "prIvateIy generated InIormatIon"), was aIready cIassIIIed, and couId be decIassIIIed
onIy by posItIve actIon on behaII oI the AEC; hereIn IIe the "seed oI the 'born cIassIIIed' concept." n other
words, anythIng that was cIassIIIed as RD meant that" everythIng encompassed by It was [thereIore]
automatIcaIIy cIassIIIed."

Source: RIchard C. HewIett. "The '8orn-CIassIIIed' Concept In the U.S. AtomIc Energy CommIssIon" May
1980. 173-187. n UnIted States. Congress. House. CommIttee on Covernment OperatIons. The
Covernment's CIassIIIcatIon oI PrIvate deas: ThIrty-Iourth Report. 96th Congress, 2d sessIon, House oI
RepresentatIves; no. 96-1540. WashIngton: CPO, 1980. SUDOC: X 96-2:H.rp.1540

2. Now Iet us get back to the InIormatIon that Is born cIassIIIed. ThIs phenomenon, too, Is
representatIve oI a great upheavaI. We were Invaded, as It were, by a trIbe oI peopIe pecuIIar In theIr
possessIon oI the IIssIonIng atom. PecuIIar, too, In that they couId be trusted to keep that knowIedge a
trIbaI secret. And so, because man's weIIare - Indeed man's survIvaI- was deemed to depend on It, the
trIbaI knowIedge was decreed to be RestrIcted Data, InaccessIbIe to peopIe outsIde the trIbe except aIter a
specIaI InItIatIon ceremony, known mysterIousIy as Q. [Q cIearance]

And so we were swept Into the new age; and aIong wIth a IIood oI new knowIedge, new hopes, and new
perIIs we had to cope wIth a new concept In controIIIng InIormatIon.

Source: DonaId WoodbrIdge. "Some Thoughts on CIassIIIcatIon In the AEC." NatIonaI CIassIIIcatIon
Management SocIety ]ournaI. Papers Irom the NatIonaI SemInar 6
th
V no. 1, 1971. 22-33.

3. SpeakIng oI the MorIand case (U.S. v. The ProgressIve, nc., 467 F. Supp. 990),
McCIoskey (188) notes: "the probIem IIes wIth the "8orn Secret" concept contaIned In the AtomIc Energy
Act oI 1954, whIch has three eIements: 1. CIassIIIcatIon procedures and poIIcIes oI the Department oI
Energy, 2. The ambIguIty oI the present Iaw as It Is beIng Interpreted by the Energy and ]ustIce
Departments, and 3. ncreasIng pubIIc dIspersIon oI scIentIIIc data bearIng on constructIon and use oI
weapons whIch can destroy mankInd."

Source: Hon. PauI N. McCIoskey, ]r. "AddItIonaI VIews." 188-193. n UnIted States. Congress. House.
CommIttee on Covernment OperatIons. The Covernment's CIassIIIcatIon oI PrIvate deas: ThIrty-Iourth
Report. 96th Congress, 2d sessIon, House oI RepresentatIves; no. 96-1540. WashIngton: CPO, 1980.
SUDOC: X 96-2:H.rp.1540

4. TechnIcaIIy, accordIng to the "born secret" cIause oI the AtomIc Energy Act, even II had gotten
aII three concepts wrong, my story couId stIII have been cIassIIIed, because II It's about nucIear energy,
and II It hasn't been decIassIIIed, then It's cIassIIIed, even II It's not true.







55
Source: Howard MorIand. "The HoIocaust 8omb: a QuestIon oI TIme." FAS e-prInts, February 5, 2003.
http:]]www.Ias.org]sgp]eprInt]morIand.htmI

5. The government cIaImed the "cIassIIIed at bIrth' concept to be necessary to "ensure that
sensItIve InIormatIon wouId not be dIvuIged beIore the UnIted States had an opportunIty to assess Its
Importance and take approprIate cIassIIIcatIon actIon."

Source: AIexander DeVoIpI et aI. 8orn Secret: the H-bomb, the ProgressIve Case and NatIonaI SecurIty.
New York: Pergamon Press, 1981, 59; aIso see WIIIIam 8urr, Thomas S. 8Ianton, and Stephen . Schwartz.
"The Costs and Consequences oI NucIear Secrecy." n Stephen Schwartz, (ed.) AtomIc AudIt: The Costs and
Consequences oI U.S. NucIear Weapons SInce 1940. 8rookIngs nstItute, 1998. 433-483.

6. The AtomIc Energy Act (the Act) has been wIth us sInce 1946. No Iaw passed beIore or sInce
gIves the government such sweepIng authorIty to keep InIormatIon secret. Under the InIormatIon controI
provIsIons oI the Act, practIcaIIy aII InIormatIon reIated to nucIear weapons and nucIear energy Is "born
cIassIIIed": It Is a government secret as soon as It comes Into exIstence. No governmentaI act Is necessary
to cIassIIy InIormatIon. Moreover, the InIormatIon, deIIned as RestrIcted Data, remaIns secret untII the
government aIIIrmatIveIy determInes that It may be pubIIshed. (163)

A questIon Iatent In the Ianguage oI the Act Is whether prIvateIy deveIoped or prIvateIy generated atomIc
energy InIormatIon - InIormatIon deveIoped or generated wIthout government Iunds and wIthout access
to cIassIIIed government documents - Is RestrIcted Data, and thus subject to the Act.

Source: Mary M. Chen. "The ProgressIve Case and the AtomIc Energy Act : WakIng to the Dangers oI
Covernment nIormatIon ControIs." Ceorge WashIngton Law RevIew 48 no. 2 (1979-1980): 163-311.

7. The deIInItIon oI RD contaIned In the AEA [AtomIc Energy Act] has been Interpreted to mean
that aII InIormatIon IaIIIng wIthIn the RD deIInItIon Is automatIcaIIy cIassIIIed or "born cIassIIIed.'' When the
AEA was wrItten, thIs was eIIectIveIy true and most oI thIs type oI InIormatIon was cIassIIIed. Now, thIs
aII-encompassIng deIInItIon Ior RD has been reduced by nearIy IIIty years oI decIassIIIcatIon actIons to a
core oI InIormatIon. nIormatIon whIch remaIns cIassIIIed as RD reIates prImarIIy to nucIear weapons
desIgn, or the use or acquIsItIon oI nucIear weapons or nucIear materIaI, wIth nucIear scIence and much
nucIear technoIogy excIuded because It Is no Ionger cIassIIIed. OnIy IIve areas oI nucIear technoIogy stIII
contaIn InIormatIon cIassIIIed as RD or FRD. Each oI these broad areas contaIns specIIIc InIormatIon that Is
stIII cIassIIIed and other InIormatIon that has been decIassIIIed. dentIIyIng whether specIIIc InIormatIon Is
cIassIIIed In these areas requIres technIcaI expertIse and reIerence to a cIassIIIcatIon guIde. The nucIear
IIeId Is now quIte mature; any new InIormatIon Is IIkeIy to be eIther Iurther detaII In an area Ior whIch
cIassIIIcatIon guIdance Is aIready weII estabIIshed, or characterIstIcs oI a new weapon desIgn operatIng
outsIde the enveIope oI Its predecessors. n the Iatter case, the cIassIIIcatIon oI such InIormatIon Is not
automatIcaIIy prescrIbed, but Is determIned by authorIzed oIIIcIaIs by appIIcatIon oI specIIIc crIterIa. ThIs
procedure de-emphasIzes, but does not aboIIsh, the "born cIassIIIed'' concept.







56
Source: Department oI Energy. 10 CFR Part 1045 "nIormatIon CIassIIIcatIon; Proposed RuIe." FederaI
RegIster 62 no. 10 (]anuary 15, 1997), at FAS, http:]]www.Ias.org]sgp]cIInton]doereg.htmI

8revIty Codes 8revIty Codes 8revIty Codes 8revIty Codes
A brevIty code Is a code whIch provIdes no securIty but whIch has as Its soIe purpose the shortenIng oI
messages rather than the conceaIment oI theIr content. Approved brevIty codes may be used when
preparIng mIIItary records, pubIIcatIons, correspondence, messages, operatIon pIans, orders, and reports.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004.,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
8rIeIIng 8rIeIIng 8rIeIIng 8rIeIIng
PresentatIon, usuaIIy oraI, oI InIormatIon. The preparatIon oI an IndIvIduaI Ior a specIIIc operatIon by
descrIbIng the sItuatIon to be encountered, the methods to be empIoyed, and the objectIve.

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C. : SprIngIIeId, VA : NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2:C 76 PREX 3.2]2:C 94

8rowsIng 8rowsIng 8rowsIng 8rowsIng
Act oI searchIng through S (InIormatIon system) storage to Iocate or acquIre InIormatIon, wIthout
necessarIIy knowIng the exIstence or Iormat oI InIormatIon beIng sought.

Source CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

8urden 8urden 8urden 8urden
The Impact on the pubIIc oI an InIormatIon coIIectIon or recordkeepIng; specIIIcaIIy:
8urden means the totaI tIme, eIIort, or IInancIaI resources expended by persons to generate, maIntaIn,
retaIn, or dIscIose or provIde InIormatIon to or Ior a FederaI agency, IncIudIng:
(I) RevIewIng InstructIons;
(II) DeveIopIng, acquIrIng, InstaIIIng, and utIIIzIng technoIogy and systems Ior the purpose oI coIIectIng,
vaIIdatIng, and verIIyIng InIormatIon;
(III) DeveIopIng, acquIrIng, InstaIIIng, and utIIIzIng technoIogy and systems Ior the purpose oI
processIng and maIntaInIng InIormatIon;
(Iv) DeveIopIng, acquIrIng, InstaIIIng, and utIIIzIng technoIogy and systems Ior the purpose oI dIscIosIng
and provIdIng InIormatIon;
(v) AdjustIng the exIstIng ways to compIy wIth any prevIousIy appIIcabIe InstructIons and requIrements;
(vI) TraInIng personneI to be abIe to respond to a coIIectIon oI InIormatIon;
(vII) SearchIng data sources;
(vIII) CompIetIng and revIewIng the coIIectIon oI InIormatIon; and






57
(Ix) TransmIttIng, or otherwIse dIscIosIng the InIormatIon.

Source. OIIIce oI Management and 8udget. 5 CFR 1320. "ControIIIng Paperwork 8urdens on the PubIIc."
http:]]www.gpoaccess.gov]cIr]Index.htmI

8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs (P) (P) (P) (P)
See Counter See Counter See Counter See Counter- -- -nIormatIon Team, nIormatIon ExpIoItatIon, Propaganda, PubIIc DIp nIormatIon Team, nIormatIon ExpIoItatIon, Propaganda, PubIIc DIp nIormatIon Team, nIormatIon ExpIoItatIon, Propaganda, PubIIc DIp nIormatIon Team, nIormatIon ExpIoItatIon, Propaganda, PubIIc DIpIomacy Iomacy Iomacy Iomacy
P deIIvers AmerIca's message to the worId through a number oI key products and servIces. The outreach
Is created strIctIy Ior InternatIonaI audIences, such as InternatIonaI medIa, government oIIIcIaIs, opInIon
Ieaders, and the pubIIc In more than 140 countrIes around the worId.
DeIIvers AmerIca's message to the worId, counteractIng negatIve preconceptIons, maIntaInIng an open
dIaIogue, and buIIdIng brIdges oI understandIng to heIp buIId a network oI communIcatIon, promote
AmerIcan voIces, and Iorge IastIng reIatIonshIps In InternatIonaI communItIes.
DeIIvers cIear and meanIngIuI U.S. poIIcy InIormatIon and artIcIes about U.S. socIety In the Ianguages
that attract the Iargest number oI vIewers -- EngIIsh, ArabIc, ChInese, French, PersIan, RussIan, and
SpanIsh.
Produces news artIcIes, eIectronIc and prInt pubIIcatIons, whIch provIdes context to U.S. poIIcIes, as
weII as products on U.S. vaIues, cuIture, and daIIy IIIe that serves as a wIndow on posItIve AmerIcan
vaIues.
Source: U.S. State Department. 8ureau oI nternatIonaI nIormatIon Programs,http:]]www.state.gov]r]IIp]

8ureaucratIc SIIppage 8ureaucratIc SIIppage 8ureaucratIc SIIppage 8ureaucratIc SIIppage
The tendency Ior broad poIIcIes to be aItered through successIve reInterpretatIon, such that the uItImate
ImpIementatIon may bear IIttIe resembIance to IegIsIated or other broad statements oI poIIcy Intent The
net resuIt, we suggest, can resembIe the chIIdhood game In whIch a "secret" Is whIspered to one person,
who then whIspers It to the next, and so on; the eventuaI secret, or the eventuaI ImpIementatIon oI the
poIIcy, can prove to have very IIttIe resembIance to the statement that started the process (p.222).

Source: WIIIIam R. Freudenburg and Robert CramIIng, "8ureaucratIc SIIppage and FaIIures oI Agency
VIgIIance: The Case oI the EnvIronmentaI StudIes Program." SocIaI ProbIems 41 no. 2 (1994):214-239.

8ye 8yeman 8yeman SpecIaI HandIIng (8SH) 8ye 8yeman 8yeman SpecIaI HandIIng (8SH) 8ye 8yeman 8yeman SpecIaI HandIIng (8SH) 8ye 8yeman 8yeman SpecIaI HandIIng (8SH)
See See See See SensItIve CompartmentaIIzed nIormatIon SensItIve CompartmentaIIzed nIormatIon SensItIve CompartmentaIIzed nIormatIon SensItIve CompartmentaIIzed nIormatIon
1. UncIassIIIed term that descrIbes sensItIve programs and operatIonaI data.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI






58
2. 8YEMAN CompartmentatIon Restructure CommIssIoned by: DNRO November 1993.
Conducted by: ]oInt Covernment and ndustry RevIew Team Purpose: Create securIty envIronment based
on need-to-know that enhances eIIIcIencIes, eIImInates dupIIcatIon, promotes sharIng oI technoIogy
assets
Source: DeIInIng the Future oI NRO Ior the 21st Century. August 1996,
http:]]www.Ias.org]Irp]nro]jeremIah9.htm
3. ThIs dIrectIve repIaced the orIgInaI ]une 1962 DoD DIrectIve on the NRO, and remaIns In Iorce
today. The dIrectIve specIIIes the roIe oI the DIrector oI the NRO, the reIatIonshIps between the NRO and
other organIzatIons, the dIrector's authorItIes, and securIty. t specIIIed that documents or other materIaI
concernIng NatIonaI ReconnaIssance Program matters wouId be handIed wIthIn a specIaI securIty system
(known as the 8YEMAN ControI System).
Source: NatIonaI SecurIty ArchIve. Department oI DeIense DIrectIve Number TS 5105.23. 27 March 1964,
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE8835]08-01.htm

~ C ~ ~ C ~ ~ C ~ ~ C ~
CaII CaII CaII CaII- -- -IdentIIyIng nIormat IdentIIyIng nIormat IdentIIyIng nIormat IdentIIyIng nIormatIon Ion Ion Ion
SectIon 102(2) oI CALEA [CommunIcatIons AssIstance Ior Law EnIorcement Act] deIInes caII-IdentIIyIng
InIormatIon as "dIaIIng or sIgnaIIng InIormatIon that IdentIIIes the orIgIn, dIrectIon, destInatIon, or
termInatIon oI each communIcatIon generated or receIved by a subscrIber by means oI any equIpment,
IacIIIty, or servIce oI a teIecommunIcatIons carrIer."
Source: CALEA mpIementatIon UnIt (CU), EIectronIc SurveIIIance TechnoIogy SectIon, OperatIonaI
TechnoIogy DIvIsIon, FederaI 8ureau oI nvestIgatIon, http:]]www.IbI.gov]hq]otd]otd.htm,
AIso see Ask CALEA. http:]]www.askcaIea.net]Iaqs.htmI#03
CarnIvore DCS 1000 CarnIvore DCS 1000 CarnIvore DCS 1000 CarnIvore DCS 1000
See See See See AItIvore, DCSNET AItIvore, DCSNET AItIvore, DCSNET AItIvore, DCSNET
1. CarnIvore Is soItware that runs under WIndows NT wIth ServIce Pack 3 or better that Is desIgned
to capture network traIIIc, based on a serIes oI optIons, and save that traIIIc to a storage medIum such as
a hard dIsk [memo redacted].

Source: EIectronIc PrIvacy Center (EPC). CarnIvore Purpose."
http:]]epIc.org]prIvacy]carnIvore]IoIadocuments.htmI and F8 Report to Congress on Use oI
CarnIvore]DCS 1000. http:]]www.epIc.org]prIvacy]carnIvore]2003report.pdI







59
2. CarnIvore Is a system whIch we are countIng on to heIp us In crItIcaI ways In combatIng acts
oI terrorIsm, espIonage, InIormatIon warIare, hackIng, and other serIous and vIoIent crImes occurrIng over
the nternet, acts whIch threaten the securIty oI our NatIon and the saIety oI our peopIe; a specIaI purpose
eIectronIc surveIIIance tooI.

Source: TestImony oI DonaId M. Kerr, AssIstant DIrector, Laboratory DIvIsIon, F8.
UnIted States Senate. CommIttee on the ]udIcIary. September 6, 2000. "CarnIvore DIagnostIc TooI."
http:]]www.IbI.gov]congress]congress00]kerr090600.htm

Case Management Data Mart Case Management Data Mart Case Management Data Mart Case Management Data Mart
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
Department oI HomeIand SecurIty. AssIsts In managIng Iaw enIorcement cases, IncIudIng Customs cases.
RevIews case Ioads, status, and reIatIonshIps among cases;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

CategorIcaI ExcIusIon CategorIcaI ExcIusIon CategorIcaI ExcIusIon CategorIcaI ExcIusIon
See EnvIronmentaI mpact Statement, TwIIIght nIormatIon See EnvIronmentaI mpact Statement, TwIIIght nIormatIon See EnvIronmentaI mpact Statement, TwIIIght nIormatIon See EnvIronmentaI mpact Statement, TwIIIght nIormatIon
Created under the NatIonaI EnvIronmentaI PoIIcy Act (NEPA),

and sIgned Into Iaw on ]anuary 1, 1970.


CategorIcaI excIusIon "means a category oI actIons whIch do not IndIvIduaIIy or cumuIatIveIy have a
sIgnIIIcant eIIect on the human envIronment and whIch have been Iound to have no such eIIect In
procedures adopted by a FederaI agency In adoptIon oI these procedures (CFR SectIon 1507.3) and Ior
whIch, thereIore, neIther an envIronmentaI assessment nor an envIronmentaI Impact statement Is
requIred."

Source: EPA. "ProtectIon oI the EnvIronment." 40 CFR 1508.4, http:]]www.gpoaccess.gov]CFR]Index.htmI

CategorIes oI Data CategorIes oI Data CategorIes oI Data CategorIes oI Data
n the context oI perceptIon management and Its constItuent approaches, data obtaIned by adversary
IndIvIduaIs, groups, InteIIIgence systems, and oIIIcIaIs. Such data IaII In two categorIes: a. InIormatIon--A
compIIatIon oI data provIded by protected or open sources that wouId provIde a substantIaIIy compIete
pIcture oI IrIendIy IntentIons, capabIIItIes, or actIvItIes. b. IndIcators--Data derIved Irom open sources or
Irom detectabIe actIons that adversarIes can pIece together or Interpret to reach personaI concIusIons or

28
CorneIIus M. KerwIn (60) characterIzes NEPA an "InIormatIon statute." (RuIemakIng: How
Covernment AgencIes WrIte Law and Make PoIIcy. . . . WashIngton, D.C.: CQ Press, 1994).






60
oIIIcIaI estImates concernIng IrIendIy IntentIons, capabIIItIes, or actIvItIes. (Note: n operatIons securIty,
actIons that convey IndIcators expIoItabIe by adversarIes, but that must be carrIed out regardIess, to pIan,
prepare Ior, and execute actIvItIes, are caIIed "observabIes.") See aIso operatIons securIty.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Category Category Category Category
RestrIctIve IabeI appIIed to cIassIIIed or uncIassIIIed InIormatIon to IImIt access.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

Caveated nIormatIon Caveat Caveated nIormatIon Caveat Caveated nIormatIon Caveat Caveated nIormatIon Caveat
See CIassIIIcatIon MarkIngs ControI MarkIngs, D.C.D 1]7, "SecurIty ControIs on the DIssemInatIon oI See CIassIIIcatIon MarkIngs ControI MarkIngs, D.C.D 1]7, "SecurIty ControIs on the DIssemInatIon oI See CIassIIIcatIon MarkIngs ControI MarkIngs, D.C.D 1]7, "SecurIty ControIs on the DIssemInatIon oI See CIassIIIcatIon MarkIngs ControI MarkIngs, D.C.D 1]7, "SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon
1. nIormatIon subject to one oI the authorIzed controI markIngs under SectIon 9 oI DCD 1]7,
"SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon."

Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." ]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI

2. A desIgnator used wIth a cIassIIIcatIon to Iurther IImIt the dIssemInatIon oI restrIcted
InIormatIon. (]P 3-07.4)

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CensorshIp CensorshIp CensorshIp CensorshIp
See Armed Force CensorshIp, CIvI See Armed Force CensorshIp, CIvI See Armed Force CensorshIp, CIvI See Armed Force CensorshIp, CIvII CensorshIp, FIeId Press CensorshIp, NatIonaI CensorshIp; PrImary I CensorshIp, FIeId Press CensorshIp, NatIonaI CensorshIp; PrImary I CensorshIp, FIeId Press CensorshIp, NatIonaI CensorshIp; PrImary I CensorshIp, FIeId Press CensorshIp, NatIonaI CensorshIp; PrImary
CensorshIp, PrIsoner oI War CensorshIp, Secondary CensorshIp. CensorshIp, PrIsoner oI War CensorshIp, Secondary CensorshIp. CensorshIp, PrIsoner oI War CensorshIp, Secondary CensorshIp. CensorshIp, PrIsoner oI War CensorshIp, Secondary CensorshIp.
1. A Iorm oI surveIIIance; aII socIaIIy structured proscrIptIons or prescrIptIons whIch InhIbIt or
prohIbIt dIssemInatIon oI Ideas, InIormatIon, Images and other messages through whIch a socIety's
channeIs oI communIcatIon whether these obstructIons are secured by poIItIcaI, economIc, reIIgIous, or
other systems oI authorIty. t IncIudes both overt and covert proscrIptIons and prescrIptIons.

Source: Sue Curry ]ansen. CensorshIp: The Knot that 8Inds Power and KnowIedge. New York: OxIord
UnIversIty Press, 1991.
2. Advance censorshIp Is the most serIous attack on Ireedom oI expressIon possIbIe. t puts the
burden oI prooI upon the person who desIres to communIcate InIormatIon Instead oI upon the
government attemptIng to suppress It. t Iorces the deIendant to compIy wIth the censor or to be Iound In
vIoIatIon oI the Iaw.






61

Source: Rep. Ted WeIss, 20
th
DIstrIct New York. Letter to RIchard Preyer, ChaIrman, Covernment
nIormatIon and ndIvIduaI RIghts SubcommIttee. n UnIted States. Congress. House. CommIttee on
Covernment OperatIons. SubcommIttee on Covernment nIormatIon and ndIvIduaI RIghts. . . . The
Covernment's CIassIIIcatIon oI PrIvate deas. HearIngs beIore a SubcommIttee oI the CommIttee on
Covernment OperatIons, House oI RepresentatIves, NInety-sIxth Congress, second sessIon, February 28,
March 20, and August 21, 1980. 785. SUDOC: Y 4.C 74]7: C 74]5

RussIan deIInItIons RussIan deIInItIons RussIan deIInItIons RussIan deIInItIons oI censorshIp oI censorshIp oI censorshIp oI censorshIp
1. Tsenzura. The examInatIon oI texts by an authorIzed state agency wIth the aIm oI approvIng or
bannIng theIr pubIIcatIon In the open press or theIr broadcast by radIo or teIevIsIon; the examInatIon oI
prIvate postaI correspondence to determIne the poIItIcaI bIas oI a text and Its IdeoIogIcaI content, and
removIng the possIbIIIty that InIormatIon constItutIng a state or mIIItary secret mIght be dIvuIged.

AIso the scrutIny oI manuscrIpts by open cIvII pubIIshIng houses, and the task oI aIIowIng or IorbIddIng
the works oI these houses to be sent abroad under the
responsIbIIIty oI the ChIeI DIrectorate Ior the protectIon oI State Secrets In PrInt under the USSR CouncII oI
MInIsters and IocaI branches.

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.

2. Tsenzura voyennaya, or mIIItary censorshIp same as above, under the dIrectIon oI the USST
MInIstry oI DeIence.

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.

CentraI ForeIgn PoIIcy FIIe CentraI ForeIgn PoIIcy FIIe CentraI ForeIgn PoIIcy FIIe CentraI ForeIgn PoIIcy FIIe
An automated database that contaIns texts oI teIegrams and abstracts oI wrItten documents about
Department poIIcIes datIng back to 1973.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 5FAM420, "OrganIzIng, MaIntaInIng and
ProtectIng Records." (5FAM421.2), http:]]www.state.gov]m]a]dIr]regs]

CA Crypts CA Crypts CA Crypts CA Crypts
The RevIew 8oard reIeased some CA "crypts " - codewords Ior operatIons and IndIvIduaIs. The RevIew
8oard aIso generaIIy reIeased CA "dIgraphs"-the IIrst two Ietters oI a crypt that IInk a partIcuIar crypt to a
partIcuIar IocatIon. CA oIten created crypts to reIer to other U.S. government agencIes; Ior exampIe, the
F8 was "ODENVY." The RevIew 8oard made a bIanket decIsIon to reIease aII U.S. government crypts. The
RevIew 8oard nearIy aIways reIeased CA crypts where those crypts denoted operatIons or IndIvIduaIs
reIatIng to MexIco CIty or Cuba. (The dIgraph Ior MexIco CIty was "L," and Ior Cuba, It was "AM.") For aII






62
other crypts, the RevIew 8oard protected the dIgraph and reIeased the remaInder oI the crypt. The
RevIew 8oard estabIIshed a Iew exceptIons, and where exceptIons appIIed, the 8oard requIred CA to
provIde crypt-specIIIc evIdence oI the need to protect. (p.51-52)

HTLNCUAL Is the crypt Ior CA's maII openIng and maII cover program Ior 1952 to 1973. The CA
reported to the RevIew 8oard that It destroyed most oI Its IormaI HTLNCUAL records In 1990 at the
dIrectIon oI CA's OIIIce oI CeneraI CounseI. (p.83)

Source: AssassInatIon RevIew 8oard, FInaI Report oI the AssassInatIon Records RevIew 8oard, September
1998, http:]]www.archIves.gov]research]jIk]revIew-board]report]

CA FIIe Numbers CA FIIe Numbers CA FIIe Numbers CA FIIe Numbers
The CA organIzes many oI Its IIIes by country and assIgns "country IdentIIIers" wIthIn partIcuIar IIIe
numbers. The RevIew 8oard reIeased nearIy aII CA IIIe numbers that reIerred to MexIco CIty. The RevIew
8oard protected the "country IdentIIIers" In CA IIIe numbers Ior aII other countrIes wIth the exceptIon oI
country IdentIIIers "15" and "19." The RevIew 8oard generaIIy reIeased aII CA "201" or "personaIIty" IIIe
numbers where the IIIes reIated to the assassInatIon.

Source: AssassInatIon RevIew 8oard, FInaI Report oI the AssassInatIon Records RevIew 8oard, September
1998, http:]]www.archIves.gov]research]jIk]revIew-board]report]

CA Records Search TooI (CREST) CA Records Search TooI (CREST) CA Records Search TooI (CREST) CA Records Search TooI (CREST)
1. CA database oI decIassIIIed InteIIIgence documents. The database, searchabIe by tItIe, data,
and text content, IncIudes DIrectorate oI OperatIons reports on the roIe oI InteIIIgence In the post WW-
perIod; materIaI on the creatIon, organIzatIon, and roIe oI the CA wIthIn the U.S. Covernment; a coIIectIon
oI IoreIgn scIentIIIc artIcIes, ground photographs and assocIated reIerence materIaIs; and the CA's IIrst
reIease oI motIon pIcture IIIm.

Source: NARA, "SearchabIe Databases In the LIbrary,"
http:]]www.archIves.gov]research]aIIc]tooIs]onIIne-databases.htmI#m4; the FIndIng AId Is Iocated here:
http:]]www.IoIa.cIa.gov]searcharchIve.asp

2. The CREST system Is the pubIIcIy-accessIbIe reposItory oI the subset oI CA records revIewed
under the 25-year program In eIectronIc Iormat (manuaIIy revIewed and reIeased records are accessIoned
dIrectIy Into the NatIonaI ArchIves In theIr orIgInaI Iormat). Over 10 mIIIIon pages have been reIeased In
eIectronIc Iormat and resIde on the CREST database, Irom whIch researchers have prInted aImost a mIIIIon
pages. To use CREST, a researcher must physIcaIIy be present at the NatIonaI ArchIves, CoIIege Park,
MaryIand. RecognIzIng thIs presents an obstacIe to many researchers, we have been InvestIgatIng ways to
Improve researcher knowIedge oI and access to CREST documents.

Source: CA, "25-Year Program ArchIve Search," http:]]www.IoIa.cIa.gov]searcharchIve.asp







63
CA SIugIInes CA SIugIInes CA SIugIInes CA SIugIInes
"SIugIInes" are CA routIng IndIcators, consIstIng oI two or more crypts, that appear above the text In CA
cabIes. (p.52)

An exampIe oI a CA sIugIIne Is " RY8AT CPFLOOR." "RY8AT" Is a CA crypt that meant "secret" and
CPFLOOR was the crypt that CA gave Lee Harvey OswaId durIng Its post-assassInatIon InvestIgatIon.
(p.53)

Source: AssassInatIon RevIew 8oard, FInaI Report oI the AssassInatIon Records RevIew 8oard, September
1998, http:]]www.archIves.gov]research]jIk]revIew-board]report]

CPAV (Computer and nternet ProtocoI Address VerIIIer) CPAV (Computer and nternet ProtocoI Address VerIIIer) CPAV (Computer and nternet ProtocoI Address VerIIIer) CPAV (Computer and nternet ProtocoI Address VerIIIer)
CPAV may cause any computer - wherever Iocated - that actIvates any CPAV authorIzed by thIs Court ("an
actIvatIng computer") to send network IeveI messages contaInIng the actIvatIng computer's P address
and]or MAC address, or other envIronmentaI varIabIes, and certaIn regIstry-type InIormatIon to a
computer controIIed by the F8. (p.3)

Source: UnIted States DIstrIct Court, Western DIstrIct oI WashIngton, AppIIcatIon and AIIIdavIt Ior Search
Warrant, ]une 12, 2007, (thanks to PoIItech Ior obtaInIng the doc),
http:]]poIItechbot.com]docs]IbI.cIpav.sanders.aIIIdavIt.071607.pdI and
http:]]poIItechbot.com]docs]IbI.cIpav.sanders.search.warrant.071607.pdI

CIpher Text CIpher Text CIpher Text CIpher Text
EncIphered InIormatIon.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

CIvII CensorshIp CIvII CensorshIp CIvII CensorshIp CIvII CensorshIp
See See See See CensorshIp CensorshIp CensorshIp CensorshIp
CensorshIp oI cIvIIIan communIcatIons, such as messages, prInted matter, and IIIms enterIng, IeavIng, or
cIrcuIatIng wIthIn areas or terrItorIes occupIed or controIIed by armed Iorces

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CIvII CensorshIp Detachment CIvII CensorshIp Detachment CIvII CensorshIp Detachment CIvII CensorshIp Detachment
A unIt oI the Supreme Commander oI the AIIIed Powers' (SCAP) Press, responsIbIe Ior controIIIng
InIormatIon, IncIudIng the medIa In postwar ]apan.

Source: Cordon W. Prange CoIIectIon, UnIversIty oI MaryIand LIbrarIes,






64
http:]]www.IIb.umd.edu]prange]htmI]IntroductIon.jsp#cIvII; Car AIperovItz, The DecIsIon to Use the
AtomIc 8omb and the ArchItecture oI an AmerIcan Myth [esp. chapter 48, 'CensorshIp and Secrecy," KnopI,
1995]; check wIth your IocaI IIbrary to see II It subscrIbes to the Prange database,
http:]]www.proquest.com]en-US]cataIogs]coIIectIons]detaII]Prange-CoIIectIon.shtmI

CIandestIne OperatIon CIandestIne OperatIon CIandestIne OperatIon CIandestIne OperatIon
A secret InteIIIgence coIIectIon actIvIty or covert poIItIcaI, economIc, propaganda, or paramIIItary actIon
conducted to ensure the secrecy oI the operatIon.

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA: NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2: C 76 and PREX 3.2]2: C 94

CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon
1. The act or process by whIch InIormatIon Is determIned to be cIassIIIed InIormatIon.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI
29


2. An so daresay, CLASSFCATON began to take on Its securIty connotatIons as It was
recognIzed that InIormatIon can and shouId be put Into dIIIerent cIasses dependIng on the degrees oI
protectIon requIred. n the mInds oI most oI us, cIassIIIed InIormatIon has come to mean prImarIIy
InIormatIon that the Iaw requIres us to protect, rather than InIormatIon that has been put Into a partIcuIar
cIass. ThIs semantIc conIusIon doesn't bother us very much ordInarIIy, but It becomes Important when we
are consIderIng the mystIque oI RestrIcted Data and when we choose to regard the phrase "born cIassIIIed
as other than a metaphor."

Source: DonaId WoodbrIdge. "Some Thoughts on CIassIIIcatIon In the AEC." NatIonaI CIassIIIcatIon
Management SocIety ]ournaI. Papers Irom the NatIonaI SemInar 6th V no. 1 1971. 22-33.

3. The process oI determInIng and IdentIIyIng the InIormatIon we need to protect In the Interests
oI natIonaI securIty - the InIormatIon we need to conceaI Irom the enemIes and potentIaI enemIes oI the
UnIted States.

Source: DOE. UnderstandIng CIassIIIcatIon. . . . WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior

29
The RussIan FederatIon aIso has an eIaborate system oI cIassIIIcatIon; see PIke and
http:]]www.Ias.org]Irp]worId]russIa]cIass.htm and Maret, FormaI and nIormaI RestrIctIve nIormatIon
CategorIes In the FSU]RussIan FederatIon http:]]www.Ias.org]Irp]worId]russIa]maret.pdI






65
DeIense Programs, OIIIce oI CIassIIIcatIon, 1987. E 1.15:0007]1 and ManuaI Ior dentIIyIng CIassIIIed
nIormatIon, August 28, 2007, http:]] www.doeaI.gov]OSTSSC]docs]DOEM475118.pdI

4. A category to whIch natIonaI securIty InIormatIon and materIaI Is assIgned to denote the degree
oI damage that unauthorIzed dIscIosure wouId cause to natIonaI deIense or IoreIgn reIatIons oI the UnIted
States and to denote the degree oI protectIon requIred. There are three such categorIes. a. top secret--
NatIonaI securIty InIormatIon or materIaI that requIres the hIghest degree oI protectIon and the
unauthorIzed dIscIosure oI whIch couId reasonabIy be expected to cause exceptIonaIIy grave damage to
the natIonaI securIty. ExampIes oI "exceptIonaIIy grave damage" IncIude armed hostIIItIes agaInst the
UnIted States or Its aIIIes; dIsruptIon oI IoreIgn reIatIons vItaIIy aIIectIng the natIonaI securIty; the
compromIse oI vItaI natIonaI deIense pIans or compIex cryptoIogIc and communIcatIons InteIIIgence
systems; the reveIatIon oI sensItIve InteIIIgence operatIons; and the dIscIosure oI scIentIIIc or
technoIogIcaI deveIopments vItaI to natIonaI securIty. b. secret--NatIonaI securIty InIormatIon or materIaI
that requIres a substantIaI degree oI protectIon and the unauthorIzed dIscIosure oI whIch couId
reasonabIy be expected to cause serIous damage to the natIonaI securIty. ExampIes oI "serIous damage"
IncIude dIsruptIon oI IoreIgn reIatIons sIgnIIIcantIy aIIectIng the natIonaI securIty; sIgnIIIcant ImpaIrment
oI a program or poIIcy dIrectIy reIated to the natIonaI securIty; reveIatIon oI sIgnIIIcant mIIItary pIans or
InteIIIgence operatIons; and compromIse oI sIgnIIIcant scIentIIIc or technoIogIcaI deveIopments reIatIng to
natIonaI securIty. c. conIIdentIaI--NatIonaI securIty InIormatIon or materIaI that requIres protectIon and
the unauthorIzed dIscIosure oI whIch couId reasonabIy be expected to cause damage to the natIonaI
securIty.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

6. Three SpecIaI Types oI CIassIIIcatIon:
a. CIassIIIcatIon by assocIatIon Is a sItuatIon where the mere Iact that two Items oI InIormatIon are
reIated Is In ItseII cIassIIIed;
b. Two or more Items oI uncIassIIIed InIormatIon, when put together create some addItIonaI Iactor
whIch warrants cIassIIIcatIon. ThIs Is termed "cIassIIIcatIon by compIIatIon."
c. MaskIng Is the act oI cIassIIyIng one pIece oI InIormatIon soIeIy to protect a separate Item oI
InIormatIon.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

7. Current CIassIIIcatIon System-Cumbersome and ConIusIng
The cIassIIIcatIon system Is more compIex than necessary. CIassIIIcatIon Is InherentIy subjectIve and the
current system InapproprIateIy IInks IeveIs oI cIassIIIcatIon wIth IeveIs oI protectIon. The current
cIassIIIcatIon system starts wIth three IeveIs oI cIassIIIcatIon (ConIIdentIaI, Secret, and Top Secret), oIten
reIerred to coIIectIveIy as coIIateraI. Layered on top oI these three IeveIs are at Ieast nIne addItIonaI
protectIon categorIes. These IncIude Department oI DeIense SpecIaI Access Programs (DoD SAPs),






66
Department oI Energy SpecIaI Access Programs, DIrector oI CentraI nteIIIgence SensItIve
Compartmented nIormatIon Programs (DC SC), and other materIaI controIIed by specIaI access or "bIgot"
IIsts, (The term "bIgot" Is saId to have been coIned durIng WorId War , wIth reIerence to the controIs on
InIormatIon sent TO C8RALTAR, or TOC8, reversed as 8COT), such as the war pIans oI the ]oInt ChIeIs oI
StaII and the operatIonaI IIIes and source InIormatIon oI the CA OperatIons DIrectorate. Further
compIIcatIng the system are restrIctIve markIngs and dIssemInatIon controIs such as ORCON
(dIssemInatIon and extractIon oI InIormatIon controIIed by orIgInator), NOFORN (not reIeasabIe to IoreIgn
natIonaIs), and "Eyes OnIy."

Source: ]oInt SecurIty CommIssIon. "RedeIInIng SecurIty: A Report to the Secretary oI DeIense and the
DIrector oI CentraI nteIIIgence." February 28, 1994, http:]]www.Ias.org]sgp]IIbrary]jsc]
8. Patents are cIassIIIed (organIzed) In the U.S. by a system usIng a 3 dIgIt cIass and a 3 dIgIt
subcIass to descrIbe every sImIIar groupIng oI patent art. A sIngIe InventIon may be descrIbed by muItIpIe
cIassIIIcatIon codes. See the ManuaI oI Patent CIassIIIcatIon.
Source: U.S. Patent and Trademark OIIIce. CIossary. http:]]www.uspto.gov]maIn]gIossary]Index.htmI#c
9. LImItIng the quantIty oI securIty cIassIIIed InIormatIon has been thought to be desIrabIe Ior a
varIety oI Important reasons: (1) promotIng an InIormed cItIzenry, (2) eIIectuatIng accountabIIIty Ior
government poIIcIes and practIces, (3) reaIIzIng oversIght oI government operatIons, and (4) achIevIng
eIIIcIency and economy In government management.

Source: HaroId C. ReIyea, "SecurIty CIassIIIed and ControIIed nIormatIon: HIstory, Status, and EmergIng
Management ssues. CRS Report to Congress RL 33494, updated February 11, 2008,
http:]]www.opencrs.com

10. See the SOO AnnuaI Report to the PresIdent Ior cIassIIIcatIon and decIassIIIcatIon statIstIcs,
http:]]www.archIves.gov]Isoo]reports]; Ior cIassIIIcatIon costs per EO ExecutIve Order 12958 and 12829,
see SOO's Report on Cost EstImates Ior SecurIty CIassIIIcatIon ActIvItIes. However, 2007 costs are
reported In the AnnuaI Report, 2007 (".the Covernment cost estImate Ior FY 2007 Is $8.65 bIIIIon, whIch
Is a $415 mIIIIon, or 4.8 percent Increase, above the cost estImates reported Ior FY 2006. The Industry
estImate Is up by $24.6 mIIIIon. ThIs makes the totaI FY 2007 cost estImate Ior Covernment and Industry
$9.91 bIIIIon, whIch Is $439 mIIIIon more (4.6 percent) than the totaI FY 2006 cost estImate Ior
Covernment and Industry. The Iargest Increase came Irom the PhysIcaI SecurIty category.p. 29,
http:]]www.archIves.gov]Isoo]reports]2007-annuaI-report.pdI). As per the AnnuaI Report, 2008, costs
wIII be pubIIshed separateIy; see the May 19, 2008 nIormatIon SecurIty OversIght OIIIce's (S00) Cost
Report Ior FIscaI Year 2008, http:]]www.Ias.org]sgp]Isoo]2008costs.pdI

CIassIIIcatIon AuthorIty CIassIIIcatIon AuthorIty CIassIIIcatIon AuthorIty CIassIIIcatIon AuthorIty






67
The authorIty to cIassIIy InIormatIon orIgInaIIy may be exercIsed onIy by: (1) the PresIdent and, In the
perIormance oI executIve dutIes, the VIce PresIdent; (2) agency heads and oIIIcIaIs desIgnated by the
PresIdent In the FederaI RegIster..."

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI and WhIte House-SOO.
"AdjudIcatIve CuIdeIInes Ior DetermInIng EIIgIbIIIty Ior Access to CIassIIIed nIormatIon," December 29,
2005 & February 3, 2006, http:]]www.state.gov]m]ds]cIearances]60321.htm

CIassIIIcatIon 8Iock CIassIIIcatIon 8Iock CIassIIIcatIon 8Iock CIassIIIcatIon 8Iock
EO 12958 requIres each cIassIIIed document and message to be marked wIth certaIn InIormatIon about
the source or authorIty Ior cIassIIIcatIon, duratIon oI cIassIIIcatIon, etc. ThIs InIormatIon Is usuaIIy Iocated
on the Iace oI a cIassIIIed document or the end oI a cIassIIIed message, and Is termed a "cIassIIIcatIon
bIock."

Source: DeIense nteIIIgence Agency. OIIIce oI SecurIty and CounterInteIIIgence, PoIIcy and SecurIty
Awareness 8ranch. Desk ReIerence CuIde to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon. AprII 2004.

CIassIIIcatIon by CompIIatIon CIassIIIcatIon by CompIIatIon CIassIIIcatIon by CompIIatIon CIassIIIcatIon by CompIIatIon
See See See See CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon
Two or more Items oI uncIassIIIed InIormatIon, when put together create some addItIonaI Iactor whIch
warrants cIassIIIcatIon. ThIs Is termed "cIassIIIcatIon by compIIatIon."

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001. http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI and ArvIn S. QuIst. CIassIIIcatIon oI
CompIIatIons oI nIormatIon. ]une 1991, http:]]www.Ias.org]sgp]IIbrary]compIIatIons.pdI

CIassIIIcatIon Category CIassIIIcatIon Category CIassIIIcatIon Category CIassIIIcatIon Category
30 30 30 30

See CIassIIIcatIon MarkIngs ControI MarkIngs, NatIonaI SecurIty nIormatIon See CIassIIIcatIon MarkIngs ControI MarkIngs, NatIonaI SecurIty nIormatIon See CIassIIIcatIon MarkIngs ControI MarkIngs, NatIonaI SecurIty nIormatIon See CIassIIIcatIon MarkIngs ControI MarkIngs, NatIonaI SecurIty nIormatIon
1. Types oI InIormatIon and actIvItIes eIIgIbIe Ior cIassIIIcatIon and nondIscIosure.

Source: ]ason Program OIIIce, MItre CorporatIon. "HorIzontaI ntegratIon: 8roader Access ModeIs Ior
ReaIIzIng nIormatIon DomInance." http:]]www.Ias.org]Irp]agency]DoD]jason]cIasspoI.pdI

For RussIan cIassIIIcatIon categorIes see ]ohn PIke's "CIassIIIcatIon LeveIs Used by the RussIan
FederatIon," and Maret's "FormaI and nIormaI RestrIctIve nIormatIon CategorIes In the FSU]RussIan
FederatIon." FAS, http:]]www.Ias.org]Irp]worId]russIa]cIass.htm






68
2. One oI three kInds oI InIormatIon; I.e., RestrIcted Data, FormerIy RestrIcted Data, or NatIonaI
SecurIty nIormatIon.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
3. CIInton ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," estabIIshed poIIcy
and guIdeIInes on cIassIIIcatIon oI natIonaI securIty InIormatIon, and Is amended by 8ush ExecutIve Order
13292 (March 25, 2003) In order to "prescrIbe a unIIorm system Ior cIassIIyIng, saIeguardIng and
cIassIIyIng natIonaI securIty InIormatIon reIatIng to deIense agaInst transnatIonaI terrorIsm."
8oth EO 12958 and EO 13292 outIIne specIIIc categorIes oI InIormatIon that "shaII not be consIdered Ior
cIassIIIcatIon unIess It concerns" can be cIassIIIed by an "authorIzed orIgInaI cIassIIIer." The 8ush EO,
moreover, added Ianguage reIated to terrorIsm, beIow:

MIIItary pIans, weapons systems, or operatIons;
ForeIgn government InIormatIon;
nteIIIgence actIvItIes (IncIudIng specIaI actIvItIes), InteIIIgence sources or methods, or cryptoIogy;
ForeIgn reIatIons or IoreIgn actIvItIes oI the UnIted States, IncIudIng conIIdentIaI sources;
ScIentIIIc, technoIogIcaI, or economIc matters reIatIng to the natIonaI securIty, whIch IncIudes
deIense agaInst transnatIonaI terrorIsm;
UnIted States Covernment programs Ior saIeguardIng nucIear materIaIs or IacIIItIes;
VuInerabIIItIes or capabIIItIes oI systems, InstaIIatIons, InIrastructures, projects, pIans, or
protectIon servIces reIatIng to the natIonaI securIty, whIch IncIudes deIense agaInst transnatIonaI
terrorIsm; or
Weapons oI mass destructIon.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.4 and ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

4. A category to whIch natIonaI securIty InIormatIon and materIaI Is assIgned to denote the degree
oI damage that unauthorIzed dIscIosure wouId cause to natIonaI deIense or IoreIgn reIatIons oI the UnIted
States and to denote the degree oI protectIon requIred. There are three such categorIes.

TOP SECRET -- NatIonaI securIty InIormatIon or materIaI that requIres the hIghest degree oI protectIon
and the unauthorIzed dIscIosure oI whIch couId reasonabIy be expected to cause exceptIonaIIy grave
damage to the natIonaI securIty. ExampIes oI "exceptIonaIIy grave damage" IncIude armed hostIIItIes
agaInst the UnIted States or Its aIIIes; dIsruptIon oI IoreIgn reIatIons vItaIIy aIIectIng the natIonaI securIty;
the compromIse oI vItaI natIonaI deIense pIans or compIex cryptoIogIc and communIcatIons InteIIIgence






69
systems; the reveIatIon oI sensItIve InteIIIgence operatIons; and the dIscIosure oI scIentIIIc or
technoIogIcaI deveIopments vItaI to natIonaI securIty.

SECRET -- NatIonaI securIty InIormatIon or materIaI that requIres a substantIaI degree oI protectIon and
the unauthorIzed dIscIosure oI whIch couId reasonabIy be expected to cause serIous damage to the
natIonaI securIty. ExampIes oI "serIous damage" IncIude dIsruptIon oI IoreIgn reIatIons sIgnIIIcantIy
aIIectIng the natIonaI securIty; sIgnIIIcant ImpaIrment oI a program or poIIcy dIrectIy reIated to the
natIonaI securIty; reveIatIon oI sIgnIIIcant mIIItary pIans or InteIIIgence operatIons; and compromIse oI
sIgnIIIcant scIentIIIc or technoIogIcaI deveIopments reIatIng to natIonaI securIty.

CONFDENTAL -- NatIonaI securIty InIormatIon or materIaI that requIres protectIon and the unauthorIzed
dIscIosure oI whIch couId reasonabIy be expected to cause damage to the natIonaI securIty.

Source: DoD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 31 October
2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CIassIIIcatIon ChaIIenge CIassIIIcatIon ChaIIenge CIassIIIcatIon ChaIIenge CIassIIIcatIon ChaIIenge
AuthorIzed hoIders oI InIormatIon cIassIIIed by the Department who, In good IaIth, beIIeve that specIIIc
InIormatIon Is ImproperIy cIassIIIed or uncIassIIIed are encouraged and expected to chaIIenge the
cIassIIIcatIon status oI the InIormatIon. The chaIIenge need not be more than a questIon as o why the
InIormatIon Is or Is not cIassIIIed, or Is cIassIIIed at a certaIn IeveI. No retrIbutIon or other negatIve actIon
shaII be taken Ior presentIng a chaIIenge.

Source: UnIted States. Department oI ]ustIce. ]ustIce Management DIvIsIon. nIormatIon SecurIty PoIIcy
Croup. CIassIIIed natIonaI securIty InIormatIon. WashIngton, D.C.: U.S. Dept. oI ]ustIce, ]ustIce
Management DIvIsIon, SecurIty and Emergency PIannIng StaII: nIormatIon SecurIty PoIIcy Croup, 1998.
SUDOC: ]1.2:SE2]5

CIassIIIcatIon CuIdes CIassIIIcatIon CuIdes CIassIIIcatIon CuIdes CIassIIIcatIon CuIdes
See See See See CIassIIIcatIon MarkIngs CIassIIIcatIon MarkIngs CIassIIIcatIon MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs ControI MarkIngs ControI MarkIngs ControI MarkIngs
1. Under ExecutIve Orders 12958 and 13292 "CIassIIIed NatIonaI SecurIty nIormatIon," and
Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty nIormatIon,"
respectIveIy, agencIes wIth orIgInaI cIassIIIcatIon authorIty are responsIbIe Ior the creatIon oI cIassIIIcatIon
guIdes "to IacIIItate the proper and unIIorm derIvatIve cIassIIIcatIon oI InIormatIon."

CIassIIIcatIon guIdes are a"documentary Iorm oI cIassIIIcatIon guIdance Issued by an orIgInaI cIassIIIcatIon
authorIty that IdentIIIes the eIements oI InIormatIon regardIng a specIIIc subject that must be cIassIIIed
and estabIIshes the IeveI and duratIon oI cIassIIIcatIon Ior each such eIement." n varIous agencIes that
constItute the C, guIdes themseIves are consIdered cIassIIIed materIaI.

WIthIn the Department oI Energy (DOE) there are three types oI cIassIIIcatIon guIdes:






70
PoIIcy CuIdes (cover DOE's cIassIIIcatIon poIIcy), Program CuIdes (whIch ImpIement poIIcy as It appIIes
to programs), and LocaI CuIdes (cover detaIIed operatIons wIthIn programs).

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 ; ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI; DOE. UnderstandIng
CIassIIIcatIon. WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior DeIense Programs, OIIIce oI
CIassIIIcatIon, 1987, E 1.15:0007]1; NatIonaI DeIense. 32 CFR 2001.15
http:]]www.gpoaccess.gov]cIr]Index.htmI and AR 380-5, AppendIx C "SecurIty CIassIIIcatIon CuIde
PreparatIon." http:]]www.Ias.org]Irp]doddIr]army]ar380-5]ag.htm

2. A "ControI MarkIngs RegIster" (nteIIIgence CommunIty (C) CIassIIIcatIon and ControI MarkIngs
RegIster and the CA NatIonaI SecurIty CIassIIIcatIon CuIde) IncIudes a IIst oI the authorIzed terms that
may be used to mark cIassIIIed materIaIs; aIso prescrIbes the exact Iormat Ior theIr dIspIay. OmItted Irom
the regIster are certaIn agency-unIque and sensItIve markIngs. MaIntaIned by the ControIIed Access
Program CoordInatIon OIIIce (CAPCO) oI the CommunIty Management StaII (CMS).

Source: "nteIIIgence CommunIty CIassIIIcatIon and ControI MarkIngs mpIementatIon."
http:]]www.Ias.org]sgp]othergov]IcmarkIngs.ppt and 2006-700-10: nteIIIgence CommunIty Update to
DCD 6]11, "ControIIed Access Program OversIght CommIttee."

3. DeveIoped by the Army C-2, onIIne tutorIaI at
http:]]www.damI.army.pentagon.mII]oIIIces]damI-cd]securIty.asp

Source: StandardIzed MethodoIogy Ior MakIng CIassIIIcatIon DecIsIons," OIIIce oI the Army Deputy ChIeI
oI StaII, C-2, October 25, 2006, http:]]www.Ias.org]sgp]othergov]dod]methodoIogy.pdI

CIassIIIcatIon LeveI(s) CIassIIIcatIon LeveI(s) CIassIIIcatIon LeveI(s) CIassIIIcatIon LeveI(s)
See See See See CIassIIIcatIon, CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon, CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon, CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon, CIassIIIcatIon SecurIty CIassIIIcatIon
1. A cIassIIIcatIon IeveI Is assIgned to InIormatIon owned by, produced by or Ior, or controIIed by
the UnIted States government.

Source: OIIIce oI ]ustIce Programs. Department oI ]ustIce. The NatIonaI CrImInaI nteIIIgence SharIng PIan
v.1.0. October 2003, http:]]It.ojp.gov]documents]200507ncIsp.pdI

2. A desIgnatIon assIgned to specIIIc eIements oI InIormatIon based on the potentIaI damage to
natIonaI securIty II dIscIosed to unauthorIzed persons. The three IeveIs In descendIng order oI potentIaI
damage are Top Secret, Secret, and ConIIdentIaI.






71
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
There are Three IeveIs oI CIassIIIed There are Three IeveIs oI CIassIIIed There are Three IeveIs oI CIassIIIed There are Three IeveIs oI CIassIIIed nIormatIon nIormatIon nIormatIon nIormatIon:


1. Top Secret
The hIghest cIassIIIcatIon IeveI appIIed to InIormatIon, whose unauthorIzed dIscIosure oI whIch reasonabIy
couId be expected to cause exceptIonaIIy grave damage to the natIonaI securIty."

Source: NARA. Reagan EO 12356 "NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-
regIster]executIve-orders]1982.htmI and ExecutIve Order 13292 "Further Amendment to ExecutIve Order
12958, as Amended, CIassIIIed NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-
regIster]executIve-orders]2003.htmI

Top-Secret Access AuthorIzatIons or CIearances are based on background InvestIgatIons conducted by
OPM or another Covernment agency, whIch conducts personneI securIty InvestIgatIons. Top Secret
cIearances permIt an IndIvIduaI to have access on a need-to-know basIs to Top Secret, Secret, and
ConIIdentIaI IeveIs oI NatIonaI SecurIty nIormatIon and FormerIy RestrIcted Data as requIred In the
perIormance oI dutIes. Top Secret Is appIIed to InIormatIon (RD, FRD, or NS).

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 , Los AIamos NatIonaI
Lab. "DeIInItIons," http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm , FederatIon oI
AmerIcan ScIentIsts, http:]]www.Ias.org]Irp]DoDdIr]doe]o56312c]o56312ca2.htm and Energy. 10 CFR
1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

2. Secret
nIormatIon, the unauthorIzed dIscIosure oI whIch reasonabIy couId be expected to cause serIous damage
to the natIonaI securIty that the orIgInaI cIassIIIcatIon authorIty Is abIe to IdentIIy or descrIbe; the
cIassIIIcatIon IeveI between ConIIdentIaI and Top Secret appIIed to InIormatIon whose unauthorIzed
dIscIosure couId reasonabIy be expected to cause serIous damage to the natIonaI securIty. Secret Is
appIIed to InIormatIon (RD, FRD, or NS).

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 , ExecutIve Order

For an examInatIon oI cIassIIIcatIon and codeword practIces In the UK, AustraIIa, and New
ZeaIand, see ]eIIrey RIcheIson and Desmond 8aII's The TIes That 8Ind: nteIIIgence CooperatIon between
the UKUSA CountrIes, the UnIted KIngdom, the UnIted States oI AmerIca, Canada, AustraIIa, and New
ZeaIand. . . . 8oston: AIIen & UnwIn,1985.






72
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon," http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI, Los AIamos
NatIonaI Lab. "DeIInItIons," http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm and Energy.
10 CFR 1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

3. ConIIdentIaI nIormatIon
a. nIormatIon, the unauthorIzed dIscIosure oI whIch reasonabIy couId be expected to cause damage to
the natIonaI securIty that the orIgInaI cIassIIIcatIon authorIty Is abIe to IdentIIy or descrIbe; The Iowest
IeveI oI cIassIIIcatIon whIch consIsts oI materIaI whIch couId be expected to cause some Iorm oI damage
to natIonaI securIty.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve Order
13292, "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

b. Except as may be expressIy provIded by statute, the use oI the cIassIIIcatIon ConIIdentIaI shaII be
authorIzed, by approprIate authorIty, onIy Ior deIense InIormatIon or materIaI the unauthorIzed dIscIosure
oI whIch couId be prejudIcIaI to the deIense Interests oI the natIon.

Source: NARA. EIsenhower EO 10501, November 5, 1953 "SaIeguardIng OIIIcIaI nIormatIon In the
nterests oI the DeIense oI the UnIted States." http:]]www.archIves.gov]IederaI-regIster]executIve-
orders]1953-eIsenhower.htmI

c. ConIIdentIaI Is appIIed to InIormatIon, the unauthorIzed dIscIosure oI whIch reasonabIy couId be
expected to cause damage to the natIonaI securIty that the approprIate oIIIcIaI Is abIe to IdentIIy or
descrIbe.
(II) For RD and FRD, ConIIdentIaI Is appIIed to InIormatIon, the unauthorIzed dIscIosure oI whIch couId
reasonabIy be expected to cause undue rIsk to the common deIense and securIty that the approprIate
oIIIcIaI Is abIe to IdentIIy or descrIbe.

Source: Energy. 10 CFR 1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs
32 32 32 32

See See See See CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon CIassIIIcatIon SecurIty CIassIIIcatIon

A unIIorm method oI markIng cIassIIIed InIormatIon Is reIIected In D.C.D 1]7, whIch aIso caIIed
Ior a "controI markIngs regIster" that IIsts aII the markIngs authorIzed to cIassIIy a document. DoD.
nteIIIgence CommunIty CIassIIIcatIon and ControI MarkIngs mpIementatIon. See
http:]]ww.Ias.org]sgp]othergov]IcmarkIngs.ppt







73
1. The physIcaI act oI IndIcatIng on cIassIIIed materIaI the assIgned cIassIIIcatIon or change
thereIn, together wIth such addItIonaI InIormatIon as may be requIred to show authorIty Ior the
cIassIIIcatIon or change and any specIaI IImItatIon on such materIaI.

Source: "PreIImInary DraIt - MInImum Standards Ior the HandIIng and TransmIssIon oI CIassIIIed
nIormatIon In ExecutIve Departments and AgencIes oI the FederaI Covernment. " ssued pursuant EO
9835, UnIted States. Congress. House. CommIttee on ExpendItures In the ExecutIve Departments.
SubcommIttee on Extra LegaI ActIvItIes In the Departments. nvestIgatIon oI Charges that Proposed
SecurIty ReguIatIons Under ExecutIve Order 9835 WIII LImIt Free Speech and a Free Press: hearIngs beIore
the UnIted States House CommIttee on ExpendItures In the ExecutIve Departments, SubcommIttee on Extra
LegaI ActIvItIes In the Departments, EIghtIeth Congress, IIrst sessIon, on Nov. 14, 1947. Y 4.Ex 7]13: Se 2;
aIso see HaroId ReIyea. "SecurIty CIassIIIed and ControIIed nIormatIon: HIstory, Status, and EmergIng
Management ssues." CRS Report to Congress ]une 26, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RL33494.pdI

2. AIso reIerred to as DIssemInatIon ControI MarkIngs DIssemInatIon ControI MarkIngs DIssemInatIon ControI MarkIngs DIssemInatIon ControI MarkIngs, , , , whIch IdentIIy the expansIon or IImItatIon
on the dIstrIbutIon oI InIormatIon. Some DIssemInatIon ControIs are restrIcted to use by certaIn AgencIes.
The IncIusIon oI these markIngs In the RegIster does not authorIze use oI these markIngs by other
AgencIes. MuItIpIe entrIes may be chosen Irom thIs DIssemInatIon ControI category II appIIcabIe. I
muItIpIe entrIes are used, they are IIsted In the order In whIch they appear In the RegIster and the
mpIementatIon ManuaI. Use a comma wIth no space Interjected as the separator between muItIpIe
DIssemInatIon ControI entrIes. ExampIes oI controI markIngs:

AuthorIzed Ior ReIease To (REL)
CrItIcaI NucIear Weapons DesIgn nIormatIon (CNWD)
For OIIIcIaI Use OnIy
FormerIy RestrIcted Data (FRD)
MCON (ControIIed magery)
Not ReIeasabIe to ForeIgn NatIonaIs (NOFORN)
OrIgInator ControIIed (ORCON)
ConIIdentIaI (CautIon) - ProprIetary nIormatIon nvoIved (PROPN)
RestrIcted Data (RD)
RIsk SensItIve (RSEN)
SAM (Sources and Methods nIormatIon)
UncIassIIIed ControIIed NucIear nIormatIon (UCN)

Source: U.S. AIr Force. Memo "mpIementatIon oI New CIassIIIcatIon MarkIng RequIrements." May 30,
2006, http:]]www.Ias.org]sgp]othergov]dod]aI053006.pdI [good exampIes oI portIon markIngs].

3. The term "cIassIIIcatIon markIngs" comprIses the IoIIowIng eIements: cIassIIIcatIon IeveI,
cIassIIIcatIon category (II RD or FRD), caveats (specIaI markIngs), cIassIIIer InIormatIon, and orIgInator






74
IdentIIIcatIon. From thIs poInt Iorward, the term "cIassIIIcatIon markIngs" means the markIngs IIsted
above. Any devIatIon Irom the standard cIassIIIcatIon markIngs wIII be stated specIIIcaIIy.

Other MarkIngs. MarkIngs other than cIassIIIcatIon markIngs are date oI orIgIn, cIassIIIcatIon oI
tItIes, unIque IdentIIIcatIon numbers (accountabIe onIy), destructIon date (TOP SECRET onIy), and portIon
markIng (OrIgInaIIy cIassIIIed NS onIy).

SpecIIIc exampIes oI markIngs, IncIudIng theIr recommended use, Iormat, and pIacement, are
contaIned In DOE C 471.2-1, CIassIIIed Matter ProtectIon and ControI mpIementatIon CuIde.

Source: Department oI Energy DOE M 471.2-1 "ManuaI Ior CIassIIIed Matter ProtectIon and ControI."
September 26, 1995. http:]]Ias.org]Irp]doddIr]doe]m4712-1.htm and DOE MarkIng Handbook: How to
Mark Matter ContaInIng CIassIIIed nIormatIon and UncIassIIIed ControIIed nIormatIon
September 29, 2006, http:]]www.pnI.gov]Isrc]pdI]doemarkInghandbook2006.pdI
4. MarkIng has sIx purposes:
a. AIert the hoIder that the Item requIres protectIon
b. AdvIse the hoIder oI the IeveI oI protectIon
c. Show what Is cIassIIIed and what Is not
d. Show how Iong the InIormatIon requIres protectIon
e. CIve the InIormatIon about the orIgIn oI the cIassIIIcatIon
I. ProvIde warnIngs about any specIaI securIty requIrements

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October 4,
2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

5. NIne CategorIes oI CIassIIIcatIon and ControI MarkIngs NIne CategorIes oI CIassIIIcatIon and ControI MarkIngs NIne CategorIes oI CIassIIIcatIon and ControI MarkIngs NIne CategorIes oI CIassIIIcatIon and ControI MarkIngs: :: :

U.S. CIassIIIcatIon
Non-U.S. CIassIIIcatIon
]oInt CIassIIIcatIon MarkIngs
SC ControI System]Codeword
SpecIaI Access RequIres
ForeIgn Covernment nIormatIon
DIssemInatIon ControIs
Non-nteIIIgence CommunIty MarkIngs
DecIassIIIcatIon Date

Source: "DMS CENSER Message SecurIty CIassIIIcatIons, CategorIes, and MarkIng Phrase RequIrements,"
DeIense nIormatIon Systems Agency, March 1999, http:]]www.Ias.org]sgp]othergov]DoD]genser.pdI







75
6. The term cIassIIIcatIon markIngs comprIses (contaIn) the IoIIowIng eIements:
CIassIIIcatIon IeveI
CIassIIIcatIon category (II RestrIcted Data or FormerIy RestrIcted Data)
Caveats (specIaI markIngs)
OrIgInator IdentIIIcatIon
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
7. There are three essentIaI markIngs requIred on aII InIormatIon as natIonaI securIty InIormatIon
(NS). The IoIIowIng shouId appear on the Iace oI each cIassIIIed document, or wIII be appIIed to other
cIassIIIed medIa In the approprIate manner:

a. CIassIIIcatIon LIne at top and bottom
b. PortIon MarkIng
c. CIassIIIcatIon 8Iock whIch consIsts oI the IoIIowIng:

IdentIty, by name or personaI IdentIIIer and posItIon oI the OrIgInaI CIassIIIcatIon
AuthorIty (OCA)
The agency and oIIIce oI orIgIn
DecIassIIIcatIon InstructIons
Reason Ior cIassIIIcatIon

OveraII page markIng Is the hIghest IeveI oI cIassIIIed InIormatIon contaIned In or reveaIed on a page;
PortIon MarkIng means the appIIcatIon oI certaIn cIassIIIcatIon markIngs to IndIvIduaI words, phrases,
sentences, paragraphs, or sectIons oI a
document to IndIcate theIr specIIIc cIassIIIcatIon IeveI and category (22 CFR 9 and 10 CFR 1045,
respectIveIy; see http:]]www.gpoaccess.gov]CFR]Index.htmI)

A AA An exceIIent IIIustratIon oI markIng Is here: n exceIIent IIIustratIon oI markIng Is here: n exceIIent IIIustratIon oI markIng Is here: n exceIIent IIIustratIon oI markIng Is here: http:]]www.Ias.org]sgp]news]2005]08]usa0805.htmI

8. AuthorIzed non-U.S. cIassIIIcatIon markIngs are
Top Secret (TS)
Secret (S)
ConIIdentIaI (C)
RestrIcted (R)
UncIassIIIed (U)

and are used by countrIes and InternatIonaI organIzatIons. UsuaIIy desIgnated by a trIgraph country code
(exampIe: DEU= Cermany)







76
Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI; aIso see chart "CIassIIIcatIon and ControI
MarkIngs Made Easy."

9. PoIIcy guIdeIInes Ior the cIassIIIcatIon, markIng, and decIassIIIcatIon oI natIonaI securIty
InIormatIon are Iound In the PresIdent's ExecutIve Order 12958, CIassIIIed NatIonaI SecurIty nIormatIon,
AprII 17, 1995 (http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI; the DoD
CuIde to MarkIng CIassIIIed Documents, DoD 5200.1-PH,
http:]]www.dtIc.mII]dtIc]pdI]customer]STNFOdata]DoD52001ph.pdI; CIassIIIcatIon and markIng
guIdeIInes Ior deIense Industry are In Chapter 4 oI the NatIonaI ndustrIaI SecurIty Program OperatIng
ManuaI, http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]522022m.htm

Types oI MarkIngs: Types oI MarkIngs: Types oI MarkIngs: Types oI MarkIngs:


25X 25X 25X 25X
1. ThIs markIng Is appIIed to InIormatIon when It has been exempted Irom 25-year oId automatIc
decIassIIIcatIon and cannot be used unIess the specIIIc InIormatIon has been approved through the
nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP) process. When thIs markIng Is used, It appears
on the "DecIassIIy on" IIne pIus a brIeI reIerence to the category(Ies) In sectIon oI 3.3b oI the (ExecutIve)
Order 12958, and the new date or event oI decIassIIIcatIon.

Source: DeIense nteIIIgence Agency. OIIIce oI SecurIty and CounterInteIIIgence, PoIIcy and SecurIty
Awareness 8ranch. Desk ReIerence CuIde to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon. AprII 2004.
2. The "25X" markIngs other than "25X-1-human" are appIIed when InIormatIon Is exempt Irom
25-year automatIc decIassIIIcatIon, and cannot be used unIess the specIIIc InIormatIon has been approved
through the nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP) generaIIy In the Iorm oI a
decIassIIIcatIon guIde.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
25X 25X 25X 25X- -- -human human human human
The IdentIty oI a conIIdentIaI human source or human InteIIIgence source Is not subject to automatIc
decIassIIIcatIon. The markIng Ior the exemptIon oI thIs specIIIc InIormatIon Is: DecIassIIy on: 25X1-


For hIstorIcaI background on the deveIopment oI cIassIIIcatIon see the preIace to ArvIn S. QuIst's
"SecurIty CIassIIIcatIon oI nIormatIon" at FederatIon oI AmerIcan ScIentIsts websIte,
http:]]www.Ias.org]sgp]IIbrary]quIst]preIace-rev.htmI







77
human. ThIs 25X-1-human markIng appIIes onIy to conIIdentIaI human sources or human InteIIIgence
sources, not aII InteIIIgence sources and methods.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
ATOMAL ATOMAL ATOMAL ATOMAL
NATO markIng Ior U.S.]U.K atomIc-reIated InIormatIon. The ATOMAL category Is eIther U.S. RestrIcted
Data or FormerIy RestrIcted Data or UnIted KIngdom AtomIc nIormatIon that has been oIIIcIaIIy reIeased
to NATO. DependIng upon the damage that wouId resuIt Irom unauthorIzed dIscIosure, ATOMAL
InIormatIon Is cIassIIIed eIther

COSMC TOP SECRET ATOMAL (CTSA)
NATO SECRET ATOMAL(NSA)
NATO CONFDENTAL ATOMAL (NCA)

Source: Department oI Energy DOE M 471.2-1 "ManuaI Ior CIassIIIed Matter ProtectIon and ControI."
September 26, 1995, http:]]Ias.org]Irp]doddIr]doe]m4712-1.htm

AUTHORZED FOR RELEASE TO AUTHORZED FOR RELEASE TO AUTHORZED FOR RELEASE TO AUTHORZED FOR RELEASE TO (name oI country(Ies)]InternatIonaI
organIzatIon)" (REL)
ThIs markIng Is used to IdentIIy nteIIIgence nIormatIon that an orIgInator has predetermIned to be
reIeasabIe or has reIeased, through estabIIshed IoreIgn dIscIosure procedures and channeIs, to the
IoreIgn]InternatIonaI organIzatIon IndIcated. ThIs markIng may be abbrevIated "REL (abbrevIated name oI
IoreIgn organIzatIon)."

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

8ackground Use OnIy 8ackground Use OnIy 8ackground Use OnIy 8ackground Use OnIy
An obsoIete controI markIng not used aIter the Issuance oI "SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon," AprII 12, 1995.

Source: RevIsed D.C.D 1]7, "SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon."
http:]]www.Ias.org]Irp]oIIdocs]D.C.Id17.htm

ControIIed Enhanced SaIeguards ControIIed Enhanced SaIeguards ControIIed Enhanced SaIeguards ControIIed Enhanced SaIeguards
DeIIned as measures more strIngent than those normaIIy requIred sInce Inadvertent or unauthorIzed
dIscIosure wouId create a rIsk oI substantIaI harm.







78
Source: To accompany the PresIdentIaI Memorandum, 8ackground on the ControIIed UncIassIIIed
nIormatIon Framework, reIeased May 9, 2008, http:]]www.Ias.org]sgp]cuI]background.pdI

CrItIcaI NucIear Weapons DesIgn nIormatIon (CNWD) CrItIcaI NucIear Weapons DesIgn nIormatIon (CNWD) CrItIcaI NucIear Weapons DesIgn nIormatIon (CNWD) CrItIcaI NucIear Weapons DesIgn nIormatIon (CNWD)
1. Department oI DeIense markIng Ior Top Secret RestrIcted Data or Secret RestrIcted Data
reveaIIng the theory oI operatIon or desIgn oI the components oI a thermonucIear or ImpIosIon-type
IIssIon bomb, warhead, demoIItIon munItIons, or test devIce. SpecIIIcaIIy excIuded Is InIormatIon
concernIng armIng, IusIng, and IIrIng systems; IImIted IIIe components; and totaIIy contaIned quantItIes oI
IIssIonabIe, IusIonabIe, and hIgh-expIosIve materIaIs by type. Among these excIuded Items are the
components whIch mIIItary personneI, IncIudIng contractor personneI, set, maIntaIn, operate, test, or
repIace.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. DoD category oI weapons data that Is comparabIe to "top secret" or "secret restrIcted data."
DIssemInated wIthIn the DOD on a need-to-know basIs, It IncIudes InIormatIon reIatIng to the theory oI
operatIon or desIgn oI the components oI a nucIear weapon. CNWD excIudes a number oI Iess sensItIve
InIormatIon reIated to the maIntenance and operatIon oI nucIear weapons.

Source: Stephen Schwartz (ed.), AtomIc AudIt: The Costs and Consequences oI U.S. NucIear Weapons SInce
1940. 8rookIngs nstItute. http:]]www.brook.edu]Ip]projects]nucwcost]box8-1.htm and DoD. NatIonaI
ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter 9. ]anuary 1995,
http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

CRYPTO CRYPTO CRYPTO CRYPTO
MarkIng or desIgnator IdentIIyIng COMSEC keyIng materIaI used to secure or authentIcate
teIecommunIcatIons carryIng cIassIIIed or sensItIve U.S. Covernment or U.S. Covernment derIved
InIormatIon.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary, May 2003, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

DIrector oI CentraI nteIIIgence AuthorIzed ControI MarkIngs DCD 1]7 "Se DIrector oI CentraI nteIIIgence AuthorIzed ControI MarkIngs DCD 1]7 "Se DIrector oI CentraI nteIIIgence AuthorIzed ControI MarkIngs DCD 1]7 "Se DIrector oI CentraI nteIIIgence AuthorIzed ControI MarkIngs DCD 1]7 "SecurIty ControIs on the curIty ControIs on the curIty ControIs on the curIty ControIs on the
DIssemInatIon oI nteIIIgence nIormatIon DIssemInatIon oI nteIIIgence nIormatIon DIssemInatIon oI nteIIIgence nIormatIon DIssemInatIon oI nteIIIgence nIormatIon" "" "
1. The Iour caveats approved Ior use wIth other securIty markIngs are:
ORCON. DIssemInatIon and extractIon oI InIormatIon controIIed by OrIgInator
PROPN. CautIon - ProprIetary nIormatIon nvoIved.
NOFORN. Not ReIeasabIe to ForeIgn NatIonaIs.
REL. (TO) AuthorIzed ReIease To (countrIes]country).






79
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. ObsoIete RestrIctIons and ControI MarkIngs DCD 1]7

12.1 The IoIIowIng controI markIngs are obsoIete and wIII not be used In accordance wIth the IoIIowIng
guIdeIInes:
12.1.1 WNNTEL and NOCONTRACT. The controI markIngs, WarnIng NotIce - nteIIIgence Sources or
Methods nvoIved (WNNTEL), and NOT RELEASA8LE TO CONTRACTORS]CONSULTANTS (abbrevIated
NOCONTRACT or NC) were rendered obsoIete eIIectIve 12 AprII 1995 were rendered obsoIete eIIectIve 12 AprII 1995 were rendered obsoIete eIIectIve 12 AprII 1995 were rendered obsoIete eIIectIve 12 AprII 1995. No permIssIon oI the orIgInator Is
requIred to reIease, In accordance wIth thIs DIrectIve, materIaI marked WNNTEL. HoIders oI documents
prIor to 12 AprII 1995 bearIng the NOCONTRACT markIng shouId appIy the poIIcIes and procedures
contaIned In SectIon 6.1 Ior possIbIe reIease oI such documents.
12.1.2 RemarkIng oI materIaI bearIng the WNNTEL, or NOCONTRACT, controI markIng Is not requIred;
however, hoIders oI materIaI bearIng these markIngs may IIne through or otherwIse remove the markIng(s)
Irom documents or other materIaI.
12.1.3 Other obsoIete markIngs IncIude: WARNNC NOTCE NTELLCENCE SOURCES OR METHODS
NVOLVED, WARNNC NOTCE SENSTVE SOURCES AND METHODS NVOLVED, WARNNC NOTCE
NTELLCENCE SOURCES AND METHODS NVOLVED, WARNNC NOTCE SENSTVE NTELLCENCE SOURCES
AND METHODS NVOLVED, CONTROLLED DSSEM, NSC PARTCPATNC ACENCES ONLY, NTEL
COMPONENTS ONLY, LMTED, CONTNUED CONTROL, NO DSSEM A8ROAD, 8ACKCROUND USE ONLY, US8
ONLY, NF8 ONLY.
[ reported thIs 3 years ago - wonder II anyone shIpped a copy oI DCD 1]7 over to State; see beIow,
Department oI State, ForeIgn ServIce ManuaI, 12FAM529.11, page 10, "dentIIIcatIon, MarkIng and
HandIIng," http:]]IoIa.state.gov]masterdocs]12Iam]12m0520.pdI ]

Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." ]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI

DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator (ORCON) DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator (ORCON) DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator (ORCON) DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator (ORCON)
1. ThIs markIng may be used onIy on nteIIIgence nIormatIon that cIearIy IdentIIIes or wouId
reasonabIy permIt ready IdentIIIcatIon oI an InteIIIgence source or method that Is
partIcuIarIy susceptIbIe to countermeasures that wouId nuIIIIy or measurabIy reduce Its eIIectIveness. ThIs
markIng may be abbrevIated as "ORCON" or "OC."

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm






80

DIstrIbutIon LImItatIon DIstrIbutIon LImItatIon DIstrIbutIon LImItatIon DIstrIbutIon LImItatIon
UncIassIIIed technIcaI data wIth mIIItary or space appIIcatIon Is marked wIth a dIstrIbutIon statement to
IImIt data access to government agencIes, DoD components, contractors, and those eIIgIbIe Ior export-
controI data. A dIstrIbutIon statement markIng Is dIstInct Irom, and In addItIon to, a securIty and
cIassIIIcatIon markIng. FoIIowIng Is a brIeI descrIptIon oI the varIous statements:
Statement "A". Statement "A". Statement "A". Statement "A". Approved Ior pubIIc reIease; dIstrIbutIon Is unIImIted. 8eIore a document can be marked
Statement "A", It must be processed Ior pubIIc reIease through PubIIc AIIaIrs SecurIty RevIew channeIs.
Statement "8". Statement "8". Statement "8". Statement "8". DIstrIbutIon authorIzed to US Covernment agencIes onIy.
Statement "C". Statement "C". Statement "C". Statement "C". DIstrIbutIon authorIzed to US Covernment agencIes and theIr contractors.
Statement "D". Statement "D". Statement "D". Statement "D". DIstrIbutIon authorIzed to DoD and DoD contractors onIy.
Statement "E". Statement "E". Statement "E". Statement "E". DIstrIbutIon to DoD components onIy.
Statement "F". Statement "F". Statement "F". Statement "F". Further dIssemInatIon onIy as dIrected by (Insert controIIIng DoD oIIIce) (date oI
determInatIon) or hIgher DoD authorIty. NormaIIy used onIy on cIassIIIed documents.
Statement "X". Statement "X". Statement "X". Statement "X". DIstrIbutIon authorIzed to government agencIes and prIvate IndIvIduaIs or enterprIses
eIIgIbIe to obtaIn export-controIIed technIcaI data.
Source: DoD. "DIstrIbutIon Statements on TechnIcaI Documents," March 18, 1987,
http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]523024p.pdI

Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon
UncIassIIIed documents contaInIng DEA SensItIve InIormatIon shaII be marked "DEA SensItIve" at the top
and bottom oI the Iront cover (II there Is one), the tItIe page (II there Is one), and the outsIde oI the back
cover (II there Is one).
b. n uncIassIIIed documents, each page contaInIng DEA SensItIve InIormatIon shaII be marked "DEA
SensItIve" top and bottom. CIassIIIed documents contaInIng DEA SensItIve InIormatIon shaII be marked as
requIred by Chapter 5, except that pages contaInIng DEA SensItIve InIormatIon but no cIassIIIed
InIormatIon wIII be marked "DEA SensItIve" top and bottom.
c. PortIons oI DoD documents that contaIn DEA SensItIve InIormatIon shaII be marked "(DEA)" at the
begInnIng oI the portIon. ThIs appIIes to cIassIIIed, as weII as uncIassIIIed documents. I a portIon oI a
cIassIIIed document contaIns both cIassIIIed and DEA SensItIve InIormatIon, the "DEA" markIng shaII be
IncIuded aIong wIth the parenthetIcaI cIassIIIcatIon markIng.






81
Source: DoD. DOD 5200.1-R. "nIormatIon SecurIty Program." AppendIx C. ]anuary 1997.
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm

ExcIusIve DIstrIbutIon (EXDS) ExcIusIve DIstrIbutIon (EXDS) ExcIusIve DIstrIbutIon (EXDS) ExcIusIve DIstrIbutIon (EXDS)
Means dIstrIbutIon excIusIveIy to oIIIcers wIth essentIaI need-to-know. ThIs captIon Is used onIy Ior hIghIy
sensItIve traIIIc between the WhIte House, the Secretary, the Under SecretarIes, and chIeI oI mIssIon.
Documents bearIng thIs specIaI dIstrIbutIon captIon shaII be treated as NOFORN. These documents must
be gIven the physIcaI protectIon prescrIbed by theIr cIassIIIcatIon.

Source: Department oI State. ForeIgn ServIce ManuaI. 12 FAM 530 "StorIng and SaIeguardIng CIassIIIed
MaterIaI." http:]]www.state.gov]m]a]dIr]regs]Iam]

For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO)
1. nIormatIon that has been determIned to quaIIIy Ior FOUO status shouId be IndIcated by markIngs when
IncIuded In documents and sImIIar materIaI. MarkIngs shouId be appIIed at the tIme documents are
draIted, whenever possIbIe, to promote proper protectIon oI the InIormatIon.
UncIassIIIed documents and materIaI contaInIng FOUO InIormatIon shaII be marked as IoIIows:
(1) Documents wIII be marked "FOR OFFCAL USE ONLY" at the bottom oI the Iront cover (II there Is one),
the tItIe page (II there Is one), the IIrst page, and the outsIde oI the back cover (II there Is one).
(2) Pages oI the document that contaIn FOUO InIormatIon shaII be marked "FOR OFFCAL USE ONLY" at the
bottom.
(3) MaterIaI other than paper documents (Ior exampIe, sIIdes, computer medIa, IIIms, etc.) shaII bear
markIngs whIch aIert the hoIder or vIewer that the materIaI contaIns FOUO InIormatIon.
(4) FOUO documents and materIaI transmItted outsIde the Department oI DeIense must bear an expanded
markIng on the Iace oI the document so that non-DoD hoIders understand the status oI the InIormatIon.
A statement sImIIar to thIs one shouId be used:
ThIs document contaIns InIormatIon exempt Irom mandatory dIscIosure under the FOA.
ExemptIon(s) appIy.
CIassIIIed documents and materIaI contaInIng FOUO InIormatIon shaII be marked as requIred by Chapter V
oI thIs reguIatIon, wIth FOUO InIormatIon IdentIIIed as IoIIows:
(1) OveraII markIngs on the document shaII IoIIow the ruIes In Chapter 5. No specIaI markIngs are requIred
on the Iace oI the document because It contaIns FOUO InIormatIon.
(2) PortIons oI the document shaII be marked wIth theIr cIassIIIcatIon as requIred by Chapter 5. I there are
uncIassIIIed portIons that contaIn FOUO InIormatIon, they shaII be marked wIth "FOUO" In parentheses at
the begInnIng oI the portIon. SInce FOUO InIormatIon Is, by deIInItIon, uncIassIIIed, the "FOUO" Is an
acceptabIe substItute Ior the normaI "U."






82
(3) Pages oI the document that contaIn cIassIIIed InIormatIon shaII be marked as requIred by Chapter 5.
Pages that contaIn FOUO InIormatIon but no cIassIIIed InIormatIon wIII be marked "FOR OFFCAL USE
ONLY" at the top and bottom.
TransmIttaI documents that have no cIassIIIed materIaI attached, but do have FOUO attachments shaII be
marked wIth a statement sImIIar to thIs one: "FOR OFFCAL USE ONLY ATTACHMENT."
Each part oI eIectrIcaIIy transmItted messages contaInIng FOUO InIormatIon shaII be marked approprIateIy.
UncIassIIIed messages contaInIng FOUO InIormatIon shaII contaIn the abbrevIatIon "FOUO" beIore the
begInnIng oI the text.
Source: DoD. DOD 5200.1-R "nIormatIon SecurIty Program." AppendIx C. ]anuary 1997,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm

2. 8oth DOE and DOD base theIr programs on the premIse that InIormatIon desIgnated as OUO
or FOUO must (1) have the potentIaI to cause IoreseeabIe harm to governmentaI, commercIaI, or prIvate
Interests II dIssemInated to the pubIIc or persons who do not need the InIormatIon to perIorm theIr jobs
and (2) IaII under at Ieast one oI eIght Freedom oI nIormatIon Act (FOA) exemptIons. AccordIng to CAO's
Standards Ior nternaI ControI In the FederaI Covernment, poIIcIes, procedures, technIques, and
mechanIsms shouId be In pIace to manage agency actIvItIes. However, whIIe DOE and DOD have poIIcIes In
pIace, our anaIysIs oI these poIIcIes showed a Iack oI cIarIty In key areas that couId aIIow Ior
InconsIstencIes and errors. For exampIe, It Is uncIear whIch DOD oIIIce Is responsIbIe Ior the FOUO
program, and whether personneI desIgnatIng a document as FOUO shouId note the FOA exemptIon used
as the basIs Ior the desIgnatIon on the document.

Source: CeneraI AccountabIIIty OIIIce. "ManagIng SensItIve nIormatIon: Departments oI Energy and
DeIense PoIIcIes and OversIght CouId 8e mproved." CAO-06-369, March 7, 2006,
http:]]www.gao.gov]htext]d06369.htmI and "ManagIng SensItIve nIormatIon: DOE and DOD CouId
mprove TheIr PoIIcIes and OversIght: Statement oI DavI M. D'AgostIno." CAO-06-531T. March 14, 2006,
http:]]www.gao.gov]htext]d06531t.htmI

3. The Department oI HomeIand SecurIty report to Congress, marked "For OIIIcIaI Use OnIy" on
the status oI deIenses agaInst shouIder-IIred antI-aIrcraIt mIssIIes was removed Irom the FederatIon oI
AmerIcan ScIentIsts web sIte aIter DHS objected to Its pubIIcatIon. "I the Report Is not removed Irom your
websIte wIthIn 2 busIness days, we wIII consIder Iurther approprIate actIons necessary to protect the
InIormatIon contaIned In the Report," Mr. Anderson wrote. See hIs August 9 Ietter here:
http:]]www.Ias.org]sgp]news]2006]08]dhs080906.pdI

Source: FAS. Secrecy News ssue 90, August 14, 2006, http:]]www.Ias.org]sgp]news]secrecy]

LImIted DIssemInatIon LImIted DIssemInatIon LImIted DIssemInatIon LImIted DIssemInatIon






83
1. RestrIctIve ControIs Ior cIassIIIed InIormatIon estabIIshed by an orIgInaI cIassIIIcatIon
authorIty to emphasIze need-to-know measures avaIIabIe wIthIn the reguIar securIty system.

Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI

2. EstabIIshes measures Ior the protectIon oI InIormatIon beyond those InvoIvIng access to
cIassIIIed InIormatIon per se, but not so strIngent as to requIre the estabIIshment oI a SpecIaI Access
Program. t prohIbIts use oI termInoIogy IndIcatIng enhancements to need-to-know, such as SpecIaI
Need-to-Know (SNTK), MUST KNOW, ControIIed Need-to-Know (CNTK), CIose HoId, or other sImIIar
securIty upgrade desIgnatIons and assocIated unIque securIty requIrements such as specIaIIzed
nondIscIosure statements.

Source: ]ohn PIke. "SecurIty and CIassIIIcatIon." http:]]www.ostgate.com]cIassIIIcatIon.htmI

3. Used to IdentIIy uncIassIIIed geospatIaI InIormatIon and data whIch the SecDEF may wIthhoId
Irom pubIIc dIscIosure; may onIy be used wIth UNCLASSFED.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

4. Means dIstrIbutIon strIctIy IImIted to oIIIcers, oIIIces, and agencIes wIth need-to-know. ThIs
captIon Is reserved Ior messages oI more than usuaI sensItIvIty. MaterIaI captIoned "LMDS" Is to be
controIIed, handIed, and stored In accordance wIth the cIassIIIcatIon IeveI oI the InIormatIon InvoIved.

Source: Department oI State. ForeIgn ServIce ManuaI. 12 FAM 530 "StorIng and SaIeguardIng CIassIIIed
MaterIaI." http:]]www.state.gov]m]a]dIr]regs]Iam]

NATO UNCLASSFED NATO UNCLASSFED NATO UNCLASSFED NATO UNCLASSFED
ThIs markIng Is appIIed to NATO InIormatIon that does not requIre securIty protectIon, and Is handIed In
accordance wIth InIormatIon management procedures.

Source: Department oI Energy DOE M 471.2-1 "ManuaI Ior CIassIIIed Matter ProtectIon and ControI."
September 26, 1995, http:]]Ias.org]Irp]doddIr]doe]m4712-1.htm

No DIstrIbutIon No DIstrIbutIon No DIstrIbutIon No DIstrIbutIon
Means no dIstrIbutIon to other than addressee wIthout the approvaI oI the ExecutIve Secretary. ThIs
captIon Is used onIy on messages oI the hIghest sensItIvIty between the PresIdent, the Secretary oI State,
and chIeIs oI mIssIon. Documents bearIng thIs specIaI dIstrIbutIon captIon shaII be treated as NOFORN.
These documents must be gIven the physIcaI protectIon prescrIbed by theIr cIassIIIcatIon.







84
Source: Department oI State. ForeIgn ServIce ManuaI. 12 FAM 530 "StorIng and SaIeguardIng CIassIIIed
MaterIaI." http:]]www.state.gov]m]a]dIr]regs]Iam]

Non Non Non Non- -- -nteIIIgence CommunIty MarkIngs nteIIIgence CommunIty MarkIngs nteIIIgence CommunIty MarkIngs nteIIIgence CommunIty MarkIngs
CommunIcatIons SecurIty MaterIaI (COMSEC)
ProtectIve measure to prevent unauthorIzed persons Irom receIvIng cIassIIIed InIormatIon vIa
teIecommunIcatIons.

May be used wIth Top Secret, Secret, ConIIdentIaI or UncIassIIIed.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

NOT RELEASA8LE TO CONTRACTORS]CONSULTANTS (NOCONTRACT or NC NOT RELEASA8LE TO CONTRACTORS]CONSULTANTS (NOCONTRACT or NC NOT RELEASA8LE TO CONTRACTORS]CONSULTANTS (NOCONTRACT or NC NOT RELEASA8LE TO CONTRACTORS]CONSULTANTS (NOCONTRACT or NC) )) )
ThIs markIng may be used onIy on nteIIIgence nIormatIon that Is provIded by a source on the express or
ImpIIed condItIon that It not be made avaIIabIe to contractors; or that, II dIscIosed to a contractor, wouId
actuaIIy or potentIaIIy gIve hIm]her a competItIve advantage, whIch couId reasonabIy be expected to cause
a conIIIct oI Interest wIth hIs]her obIIgatIon to protect the InIormatIon. ThIs markIng may be abbrevIated
as "NOCONTRACT" or "NC."

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS
ThIs markIng Is used to IdentIIy nteIIIgence nIormatIon that may not be reIeased In any Iorm to
IoreIgn governments, IoreIgn natIonaIs, or non-U.S. cItIzens. ThIs markIng may be abbrevIated
"NOFORN" or "NF."

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

OIIIcIaI Use OnIy OIIIcIaI Use OnIy OIIIcIaI Use OnIy OIIIcIaI Use OnIy
A securIty cIassIIIcatIon markIng used durIng the perIod ]uIy 18, 1949 through October 22, 1951.

Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI

OrIgInatIng Agency's DetermInatIon RequIred OrIgInatIng Agency's DetermInatIon RequIred OrIgInatIng Agency's DetermInatIon RequIred OrIgInatIng Agency's DetermInatIon RequIred
1. ndIcates that the InIormatIon must be revIewed by the orIgInator beIore any decIassIIIcatIon
can take pIace.







85
Source: NSPOM. Chapter 4. "CIassIIIcatIon and MarkIng."
http:]]www.Ias.org]sgp]IIbrary]nIspom]chap04.htm
2. "OADR" Is not an approved markIng Ior documents orIgInaIIy cIassIIIed under E.O. 12958, as
amended, and shouId not be contaIned In any orIgInaIIy cIassIIIed documents that have been created aIter
October 14, 1995.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
PortIon MarkIngs PortIon MarkIngs PortIon MarkIngs PortIon MarkIngs
1. Every portIon (normaIIy paragraphs, but aIso IncIudIng subjects, tItIes, charts, etc.) shaII be
portIon marked to IndIcate whIch portIons are cIassIIIed, and at what IeveI, and whIch portIons are
uncIassIIIed. PortIon markIngs shaII aIways be pIaced at the begInnIng oI the portIons. The symboIs TS
(Top Secret), S (Secret), C (ConIIdentIaI) and U (UncIassIIIed) are used to IndIcate the cIassIIIcatIon IeveI.

Source: DeIense nteIIIgence Agency. OIIIce oI SecurIty and CounterInteIIIgence, PoIIcy and SecurIty
Awareness 8ranch. Desk ReIerence CuIde to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon. AprII 2004.
2. A portIon Is ordInarIIy deIIned as a paragraph, but aIso IncIudes charts, tabIes, pIctures, and
IIIustratIons, as weII as subjects and tItIes. PortIon markIngs consIst oI the Ietters "(U)" Ior uncIassIIIed,
"(C)" Ior "ConIIdentIaI," "(S)" Ior "Secret," and "(TS)" Ior "Top Secret." These abbrevIatIons, In parentheses,
are pIaced beIore or aIter the portIon to whIch they appIy.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
CautIon CautIon CautIon CautIon - -- - (ConIIdentIaI) ProprIetary nIormatIon nvoIved (ConIIdentIaI) ProprIetary nIormatIon nvoIved (ConIIdentIaI) ProprIetary nIormatIon nvoIved (ConIIdentIaI) ProprIetary nIormatIon nvoIved (PROPN) (PROPN) (PROPN) (PROPN)
ThIs markIng Is used, wIth or wIthout a securIty cIassIIIcatIon, to IdentIIy InIormatIon provIded by a
commercIaI IIrm or prIvate source under an express or ImpIIed understandIng that the InIormatIon wIII be
protected as a trade secret or proprIetary data beIIeved to have actuaI or potentIaI vaIue. ThIs markIng
may be used In conjunctIon wIth the "NOCONTRACT" markIng to precIude dIssemInatIon to any contractor.
ThIs markIng may be abbrevIated as "PROPN" or "PR."

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

(Protected) CrItIcaI nIrastructure nIormatIon (Protected) CrItIcaI nIrastructure nIormatIon (Protected) CrItIcaI nIrastructure nIormatIon (Protected) CrItIcaI nIrastructure nIormatIon






86
The Protected C Program Manager or the Protected C Program Manager's desIgnees shaII mark
Protected C materIaIs as IoIIows: "ThIs document contaIns Protected C. n accordance wIth the
provIsIons oI 6 CFR part 29, It Is exempt Irom reIease under the Freedom oI nIormatIon Act (5 U.S.C.
552(b) (3)). UnauthorIzed reIease may resuIt In cIvII penaIty or other actIon. t Is to be saIeguarded and
dIssemInated In accordance wIth Protected C Program requIrements.''

Source: Department oI HomeIand SecurIty. "Protected CrItIcaI nIrastructure nIormatIon." 6 CFR 29.6,
http:]]www.gpoaccess.gov]cIr]Index.htmI

ReIeasabIe by nIormatIon DIscIosure OIIIcIaI (RELDO) ReIeasabIe by nIormatIon DIscIosure OIIIcIaI (RELDO) ReIeasabIe by nIormatIon DIscIosure OIIIcIaI (RELDO) ReIeasabIe by nIormatIon DIscIosure OIIIcIaI (RELDO)
EIIectIve ImmedIateIy, the nteIIIgence CommunIty may use the dIssemInatIon markIng ReIeasabIe 8y
nIormatIon DIscIosure OIIIcIaI (RELDO) to IacIIItate InIormatIon sharIng through streamIIned, rapId
reIease decIsIons by authorIzed dIscIosure oIIIcIaIs. RELDO Is a dIssemInatIon markIng that may be
appIIed to InteIIIgence InIormatIon to IndIcate that the orIgInator has authorIzed DesIgnated nteIIIgence
DIscIosure OIIIcIaIs (DDO) to make Iurther sharIng decIsIons In accordance wIth the exIstIng procedures
Ior uncaveated InteIIIgence materIaI (InteIIIgence wIth no restrIctIve dIssemInatIon controIs). RELDO may
be used IndependentIy or In conjunctIon wIth the "REL TO" dIssemInatIon markIng. When the RELDO
markIng Is appIIed by the orIgInator, the reIeasIng DDO must IoIIow exIstIng sharIng guIdeIInes and
maIntaIn accurate records oI aII sharIng decIsIons consIstent wIth D.C. dIrectIves. RELDO wIII be
Incorporated Into the AuthorIzed CIassIIIcatIon and ControI MarkIngs RegIster maIntaIned by the
ControIIed Access Program CoordInatIon OIIIce (CAPCO) In accordance wIth D.C.D 6]6 X H.

Source: DIrector oI CentraI nteIIIgence DIrectIve. "nteIIIgence CommunIty mpIementatIon oI ReIeasabIe
by nIormatIon DIscIosure OIIIcIaI (RELDO) DIssemInatIon MarkIng." DCD 8 SerIes PoIIcy Memoranda 1,
]une 9, 2005, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id8-memo.htmI

REL TO REL TO REL TO REL TO
REL TO IdentIIIes InIormatIon that an orIgInator has predetermIned to be reIeasabIe or has been reIeased,
through estabIIshed IoreIgn dIscIosure procedures and channeIs, to the IoreIgn country IndIcated. REL TO
must IncIude country code "USA" as the IIrst country code IIsted Ior U.S. cIassIIIed InIormatIon. Other
countrIes IoIIow In aIphabetIcaI order wIth each country code separated by a comma and a space wIth the
Iast country code separated by a space, a Iower case "and", and a space.

Source: DoD. "nteIIIgence CommunIty CIassIIIcatIon and ControI MarkIngs mpIementatIon."
http:]]www.Ias.org]sgp]othergov]IcmarkIngs.ppt

RestrIcted RestrIcted RestrIcted RestrIcted
An actIve securIty cIassIIIcatIon markIng used by some IoreIgn governments and InternatIonaI
organIzatIons.







87
EIsenhower EO 10501, November 5, 1953 "SaIeguardIng OIIIcIaI nIormatIon In the nterests oI the
DeIense oI the UnIted States" eIImInated the "RestrIcted" IeveI IeavIng onIy Top Secret, Secret, and
ConIIdentIaI. Made a dIIIerentIatIon between natIonaI securIty and natIonaI deIense.

Source: NatIonaI ArchIves and Records AdmInIstratIon (NARA). http:]]www.archIves.gov]IederaI-
regIster]executIve-orders]1953-eIsenhower.htmI and Department oI Energy. OIIIce oI SecurIty AIIaIrs.
OIIIce oI SaIeguards and SecurIty. "SaIeguards and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI

SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed
nIormatIon that has been determIned determIned determIned determIned to be S8U shouId be desIgnated as "SensItIve 8ut UncIassIIIed" wIth
the approprIate markIngs and IabeIs.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." Part 8.
07]22]2005, http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI

State DIstrIbutIon OnIy State DIstrIbutIon OnIy State DIstrIbutIon OnIy State DIstrIbutIon OnIy
PrecIudes InItIaI dIstrIbutIon to other IederaI agencIes and Is used when dIscIosure oI certaIn
communIcatIons to other agencIes wouId be prejudIcIaI to the best Interests oI the Department oI State.
ThIs captIon may be used In conjunctIon wIth the captIons "EXDS" and LMDS." MaterIaI captIoned
"STADS" Is to be controIIed, handIed, and stored In accordance wIth the cIassIIIcatIon IeveI oI the
InIormatIon InvoIved.

Source: Department oI State. ForeIgn ServIce ManuaI. 12 FAM 530 "StorIng and SaIeguardIng CIassIIIed
MaterIaI." http:]]www.state.gov]m]a]dIr]regs]Iam]

UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon
1. nIormatIon, a document, or materIaI that has been determIned not to be cIassIIIed or that has
been decIassIIIed by a proper authorIty; AIso deIIned as a IImIted dIstrIbutIon category appIIed to the wIde
range oI uncIassIIIed types oI oIIIcIaI InIormatIon, not requIrIng protectIon as NatIonaI SecurIty
nIormatIon, but IImIted to oIIIcIaI use and not pubIIcIy reIeasabIe.

Other sImIIar markIngs, such as For OIIIcIaI Use OnIy For OIIIcIaI Use OnIy For OIIIcIaI Use OnIy For OIIIcIaI Use OnIy (FOUO) and LImIted OIIIcIaI Use LImIted OIIIcIaI Use LImIted OIIIcIaI Use LImIted OIIIcIaI Use are not used to
IdentIIy cIassIIIed InIormatIon, and aIong wIth other term such as SensItIve, ConIerence, or Agency, SensItIve, ConIerence, or Agency, SensItIve, ConIerence, or Agency, SensItIve, ConIerence, or Agency, are
used as dIstrIbutIon markIngs dIstrIbutIon markIngs dIstrIbutIon markIngs dIstrIbutIon markIngs, and are not authorIzed cIassIIIcatIon desIgnatIons to IdentIIy cIassIIIed
InIormatIon.

Under an 18 October 1983 memorandum, sIx dIstrIbutIon statements, desIgnated A through F, were
approved estabIIshIng categorIes oI UncIassIIIed]LImIted Data:







88
A. Approved Ior PubIIc ReIease Approved Ior PubIIc ReIease Approved Ior PubIIc ReIease Approved Ior PubIIc ReIease Documents are avaIIabIe to the pubIIc, IoreIgn natIonaIs, companIes,
IoreIgn governments, and may be exported wIthout a IIcense.

8. LImIted to Covernment AgencIes nIormatIon LImIted to Covernment AgencIes nIormatIon LImIted to Covernment AgencIes nIormatIon LImIted to Covernment AgencIes nIormatIon covers weapons test and evaIuatIon data, contractor
perIormance evaIuatIon records, IoreIgn government data and proprIetary InIormatIon.

C. LImIted to Covernment AgencIes and theIr Contractors LImIted to Covernment AgencIes and theIr Contractors LImIted to Covernment AgencIes and theIr Contractors LImIted to Covernment AgencIes and theIr Contractors IncIudes documents InvoIvIng crItIcaI
technoIogIes that advance the state oI the art In an area oI sIgnIIIcant or potentIaIIy sIgnIIIcant mIIItary
appIIcatIon.

D. LI LI LI LImIted to DOD and DOD Contractors OnIy mIted to DOD and DOD Contractors OnIy mIted to DOD and DOD Contractors OnIy mIted to DOD and DOD Contractors OnIy Is desIgned to protect InIormatIon on system or hardware In
the deveIopment oI concept stage, whIch must be protected to prevent premature dIssemInatIon.

E. DIstrIbutIon DIstrIbutIon DIstrIbutIon DIstrIbutIon to DOD Components OnIy to DOD Components OnIy to DOD Components OnIy to DOD Components OnIy

F. Further DIssemInatIon OnIy As DIrected Further DIssemInatIon OnIy As DIrected Further DIssemInatIon OnIy As DIrected Further DIssemInatIon OnIy As DIrected Is normaIIy Imposed onIy on cIassIIIed documents, but may be
used on uncIassIIIed documents where specIIIc authorIty exIsts.

Source: ]ohn PIke. "SecurIty and CIassIIIcatIon." http:]]www.ostgate.com]cIassIIIcatIon.htmI

2. DIstrIbutIon authorIzed to US Covernment agencIes onIy (8, "DIstrIbutIon authorIzed to US
Covernment agencIes onIy "above):

Source: Steven D. Pomper. AsymmetrIc: Myth In UnIted States MIIItary DoctrIne. ThesIs. Durham, NH:
UnIversIty oI New HampshIre, 1991. 36-37. ADA428994
http:]]www.dtIc.mII]matrIs]t-docs]TRALMPT2-22-05.htmI

WarnIng NotIce WarnIng NotIce WarnIng NotIce WarnIng NotIce- -- -nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved (WNNTEL) (WNNTEL) (WNNTEL) (WNNTEL)
ThIs markIng Is used onIy on nteIIIgence nIormatIon that IdentIIIes or wouId reasonabIy permIt
IdentIIIcatIon oI an InteIIIgence source or method that Is susceptIbIe to countermeasures that couId nuIIIIy
or reduce Its eIIectIveness. ThIs markIng may be abbrevIated as "WNNTEL" or "WN." ThIs markIng may not
be used In conjunctIon wIth specIaI access or sensItIve compartmented InIormatIon (SC) controIs.

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

WarnIng NotIces WarnIng NotIces WarnIng NotIces WarnIng NotIces
WarnIng notIces sometImes appear on cIassIIIed documents to aIert the reader that specIaI precautIons are
requIred In the handIIng and reIeasIng oI InIormatIon. When requIred, the warnIng notIces deIIned beIow
shaII appear In theIr IuII Iorm on the Iront cover, tItIe page, or IIrst page oI a document. The short Iorm
shaII appear at the top or bottom center oI appIIcabIe pages, on teIegram captIon IInes, and on tabIes,
IIgures, charts, etc. The abbrevIated Iorm Is used IoIIowIng the cIassIIIcatIon symboI In portIon markIng.






89
When dIssemInatIon oI InIormatIon Is restrIcted to approprIateIy cIeared U.S. cItIzens, use
the IoIIowIng notIce: [short Iorm]abbrevIated Iorm]:

NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS NOT RELEASA8LE TO FORECN NATONALS NOFORN NOFORN NOFORN NOFORN]NF ]NF ]NF ]NF
When InIormatIon Is IImIted onIy to U.S. Covernment empIoyees, use the IoIIowIng notIce:

NOT RELEASA8LE TO CONTRACTORS OR CONTRACTOR CONSULTANTS NOT RELEASA8LE TO CONTRACTORS OR CONTRACTOR CONSULTANTS NOT RELEASA8LE TO CONTRACTORS OR CONTRACTOR CONSULTANTS NOT RELEASA8LE TO CONTRACTORS OR CONTRACTOR CONSULTANTS NO CONTRACT]NC NO CONTRACT]NC NO CONTRACT]NC NO CONTRACT]NC
When InIormatIon has been provIded to the UnIted States by IoreIgn government or InternatIonaI
organIzatIon, or InIormatIon Is generated by the UnIted States pursuant to a joInt arrangement wIth
IoreIgn government or InternatIonaI organIzatIon, use the notIce:

FORECN CO FORECN CO FORECN CO FORECN COVERNMENT NFORMATON VERNMENT NFORMATON VERNMENT NFORMATON VERNMENT NFORMATON]FC ]FC ]FC ]FC
I the InIormatIon Is IoreIgn government InIormatIon that must be conceaIed, do not use the markIng and
mark the document as II It were entIreIy oI U.S. orIgIn. I the markIng Is deIeted, the orIgInator must
maIntaIn a record oI the source oI the InIormatIon.

When InIormatIon IdentIIIes or wouId reasonabIy permIt IdentIIIcatIon oI an InteIIIgence source or method
that Is susceptIbIe to countermeasures that couId nuIIIIy or reduce Its eIIectIveness, use the IoIIowIng
notIce:

WARNNC NOTCE WARNNC NOTCE WARNNC NOTCE WARNNC NOTCE - -- - NTELLCENCE SOURCES OR METHODS NVOLVED NTELLCENCE SOURCES OR METHODS NVOLVED NTELLCENCE SOURCES OR METHODS NVOLVED NTELLCENCE SOURCES OR METHODS NVOLVED
WNNTEL]WN WNNTEL]WN WNNTEL]WN WNNTEL]WN
When the orIgInator must have contInuIng knowIedge and supervIsIon oI the use oI InIormatIon, use the
IoIIowIng notIce:

DSSEMNATON AND EXTRACTON OF NFORMATON CONTROLLED 8Y ORCNATOR DSSEMNATON AND EXTRACTON OF NFORMATON CONTROLLED 8Y ORCNATOR DSSEMNATON AND EXTRACTON OF NFORMATON CONTROLLED 8Y ORCNATOR DSSEMNATON AND EXTRACTON OF NFORMATON CONTROLLED 8Y ORCNATOR
ORCON]OC ORCON]OC ORCON]OC ORCON]OC
For cIassIIIed materIaI contaInIng RestrIcted Data or FormerIy RestrIcted Data, as deIIned by the AtomIc
Energy Act oI 1954 as amended (whIch concerns the desIgn, manuIacture, or utIIIzatIon oI atomIc
weapons; the productIon oI specIaI nucIear materIaI; or the use oI specIaI nucIear materIaI In the
productIon oI energy), the markIngs prescrIbed by the Department oI Energy wIII be appIIed as IoIIows:

RESTRCTED DATA. THS MATERAL CONTANS RESTRCTED DATA AS DEFNED N THE ATOMC ENERCY
ACT OF 1954. UNAUTHORZED DSCLOSURE SU8]ECT TO ADMNSTRATVE AND CRMNAL SANCTONS
RESTRCTED DATA ]RD or

FORMERLY RESTRCTED DATA. UNAUTHORZED DSCLOSURE SU8]ECT TO ADMNSTRATVE AND CRMNAL
SANCTONS. HANDLE AS RESTRCTED DATA N FORECN DSSEMNATON. SECTON 1448, ATOMC ENERCY
ACT OF 1954 FORMERLY RESTRCTED DATA]FRD

8eIore reIease to contractors, communIcatIon securIty (COMSEC) documents wIII be annotated on the tItIe
page or IIrst page as IoIIows:






90

COMSEC MATERAL - ACCESS 8Y CONTRACTOR PERSONNEL RESTRCTED TO U.S. CTZENS HOLDNC FNAL
COVERNMENT CLEARANCE

PIace thIs notatIon on COMSEC documents at the tIme oI theIr orIgInatIon when reIease to contractors Is
antIcIpated. A..D. COMSEC materIaI wIII be marked In accordance wIth CommunIcatIons SecurIty PoIIcy,
CSP 1. ForeIgn dIssemInatIon oI COMSEC InIormatIon Is governed by NCSC PoIIcy DIrectIve 6.

Source: Department oI State. ForeIgn ServIce ManuaI. 12FAM529.11 "dentIIIcatIon, MarkIng and
HandIIng." http:]]www.state.gov]m]a]dIr]regs]Iam]

X1 t X1 t X1 t X1 through X8 hrough X8 hrough X8 hrough X8
X1-X8 are not approved markIngs Ior documents orIgInaIIy cIassIIIed under E.0. 12958 as amended, and
shouId not be contaIned In any orIgInaIIy cIassIIIed documents on, or aIter, September 22, 2003.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No.1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
10. 8ecause securIty cIassIIIcatIon, however, was not possIbIe Ior some kInds oI InIormatIon
deemed In some quarters to be "sensItIve," other kInds oI desIgnatIons or markIngs came to be appIIed to
aIert IederaI empIoyees regardIng Its prIvIIeged or potentIaIIy harmIuI character. SometImes these
markIngs derIved Irom statutory provIsIons requIrIng the protectIon oI a type oI InIormatIon, others were
admInIstratIveIy authorIzed wIth IIttIe detaII about theIr use.

Source: HaroId C. ReIyea, "SecurIty CIassIIIed and ControIIed nIormatIon: HIstory, Status, and EmergIng
Management ssues. CRS Report to Congress RL 33494, updated February 11, 2008,
http:]]www.opencrs.com

Note: Note: Note: Note: On May 12, 2008, DIrector oI NatIonaI nteIIIgence reIeased "AuthorIzed CIassIIIcatIon and ControI
MarkIngs RegIster," http:]tInyurI.com]ye7yqxr,"

ThIs system uses a unIIorm IIst oI securIty cIassIIIcatIon and controI markIngs authorIzed Ior aII
dIssemInatIon oI cIassIIIed natIonaI InteIIIgence InIormatIon by components oI the C. ThIs markIng
system augments and Iurther deIInes the markIngs requIrements estabIIshed In ExecutIve Order 12958, as
amended, Ior portIon markIngs and overaII cIassIIIcatIon. ThIs system does not stIpuIate or modIIy the
cIassIIIcatIon authorIty InIormatIon requIred by E.O. 12958, as amended.

(U) Purpose
(U) ThIs AuthorIzed CIassIIIcatIon and ControI MarkIngs RegIster Is maIntaIned by the
ControIIed Access Program CoordInatIon OIIIce (CAPCO) (hereaIter, reIerred to as the
CAPCO RegIster.






91

8ased on thIs InIormatIon, thIs sectIon oI the LexIcon wIII be maIntaIned.

CIassIIIcatIon PrIesthood CIassIIIcatIon PrIesthood CIassIIIcatIon PrIesthood CIassIIIcatIon PrIesthood
NatIonaI cIassIIIcatIon eIIte Is a kInd oI secret socIety, cIosed to the unInItIated. t Is a sect marked by a
rIgorous InternaI dIscIpIIne, hIghIy deveIoped rItuaIs, a strIct hIerarchy, and a consIstent phIIosophy.
CentraI to thIs phIIosophy Is the prIncIpIe oI compartmentaIIzatIon, whIch hoIds that the best way to
controI oI InIormatIon Is to break It Into IIttIe pIeces, and never to aIIow too much to be assembIed In one
pIace.

The cIassIIIcatIon prIesthood has deveIoped an eIaborate system to protect Its secrets. The prIesthood
makes a dIstInctIon between cIassIIyIng documents and cIassIIyIng the InIormatIon contaIned wIthIn them.

Source: Stephen HIIgartner, RIchard C. 8eII, and Rory O'Connor.Nukespeak. New York: PenguIn 8ooks,
1982. 58-59.

CIassIIIed At 8Irth CIassIIIed At 8Irth CIassIIIed At 8Irth CIassIIIed At 8Irth
See See See See 8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed, , , , NucIear Secrecy NucIear Secrecy NucIear Secrecy NucIear Secrecy
8ased on the "born secret" InterpretatIon oI the AtomIc Energy Act oI 1954 whereIn a "wrIter or researcher
couId workIng Irom uncIassIIIed sources couId combIne InIormatIon In such a way as to produce concepts
that are 'cIassIIIed at bIrth'." DeVoIpI et aI (12) state that the IncIusIon oI prIvateIy generated InIormatIon
under cIassIIIcatIon authorIty derIved Irom Carter EO 12065 or the AtomIc Energy Act Is "Iar Irom cIear."

DOE asserts that aII InIormatIon whIch IaIIs under RestrIcted Data "comes Into exIstence as cIassIIIed."

Source: AtomIc Energy Act oI 1954 (P.L. 83-703), AIexander DeVoIpI et aI. 8orn Secret: the H-bomb, the
ProgressIve Case and NatIonaI SecurIty. New York: Pergamon Press, 1981, and Howard MorIand. "The
HoIocaust 8omb: a QuestIon oI TIme." FAS e-PrInts, http:]]www.Ias.org]sgp]eprInt]morIand.htmI

CIassIIIed CommunIty CIassIIIed CommunIty CIassIIIed CommunIty CIassIIIed CommunIty
An oIten-Invoked but III deIIned entIty that In thIs case [descrIbIng Project Sherwood] Is comprIsed oI
secret conIerences, pubIIcatIons, and InterIockIng advIsory commIttees. cIassIIIed communItIes, a key
CoId War InventIon provIded a kInd oI ersatz scIentIIIc openness. The combInatIon oI cIassIIIed
conIerences and pubIIcatIons Iostered a Iree IIow oI InIormatIon among the natIonaI Iabs. 8ecause most
Iab scIentIsts heId cIearances and hence couId pIug Into thIs network, there was IIttIe chance oI mIssIng
reIevant research or revIew.

Source: Peter WestwIck. "n the 8egInnIng." 8uIIetIn oI AtomIc ScIentIsts.
November-December, 2000, http:]]www.thebuIIetIn.org]artIcIe.phpZartoIn=nd00westwIck

CIassIIIed DeIense nIormatIon CIassIIIed DeIense nIormatIon CIassIIIed DeIense nIormatIon CIassIIIed DeIense nIormatIon
See See See See CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon, ,, , CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs






92
DeIense InIormatIon whIch Is cIassIIIed Top Secret, Secret, or ConIIdentIaI, dependIng on the sensItIvIty
oI the InIormatIon.

Source: Department oI the Army DIctIonary oI UnIted States Army Terms. Army ReguIatIon 310-25.
October, 1983,http:]]www.Ias.org]Irp]doddIr]army]ar310-25.pdI

CIassIIIed nIormatIon CIassIIIed nIormatIon CIassIIIed nIormatIon CIassIIIed nIormatIon
See See See See CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act CIassIIIed nIormatIon Procedures Act
1. "CIassIIIed natIonaI securIty InIormatIon" or "cIassIIIed InIormatIon" means InIormatIon that has
been determIned pursuant to thIs order or any predecessor order to requIre protectIon agaInst
unauthorIzed dIscIosure and Is marked to IndIcate Its cIassIIIed status when In documentary Iorm.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended,
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2

2. (A) any InIormatIon or materIaI that has been determIned by an oIIIcIaI oI the UnIted States
pursuant to Iaw, an ExecutIve Order, or reguIatIon to requIre protectIon agaInst unauthorIzed dIscIosure
Ior reasons oI natIonaI securIty, and

(8) any restrIcted data, as deIIned In sectIon 11(y) oI the AtomIc Energy Act oI 1954 (42 U.S.C. 2014 (y)

Source: 10 U.S.C. 47 801, http:]]www.gpoaccess.gov]uscode]browse.htmI
3. Any InIormatIon or materIaI that has been determIned by the UnIted States Covernment,
pursuant to an executIve order, statute, or reguIatIon, to requIre protectIon agaInst unauthorIzed
dIscIosure Ior reasons oI natIonaI securIty and any restrIcted data, as deIIned In paragraph r or sectIon 11
oI the AtomIc Energy Act oI 1954. [42 U.S.C. 2014(y)]
Source: PubIIc Law (PL) 96-456, CIassIIIed nIormatIon Procedures Act, Department oI ]ustIce. "SynopsIs oI
CPA." http:]]tInyurI.com]yc4IImy

4. DOE's strategy Ior protectIng and controIIIng cIassIIIed documents at DOE IacIIItIes InvoIves a
"graded protectIon system. Under such a system, the IeveI oI protectIon Ior a cIassIIIed document Is
commensurate wIth the threat to the document, the vuInerabIIIty oI the document, the vaIue oI the
document, and the IeveI oI rIsk to the document that DOE Is wIIIIng to accept. Not aII Items are protected
to the same degree.

Source: NucIear SecurIty: nIormatIon on DOE's RequIrements Ior ProtectIng and ControIIIng CIassIIIed
Documents : statement oI ]Im WeIIs, DIrector, Energy, Resources, and ScIence ssues, Resources,
CommunIty, and EconomIc DeveIopment DIvIsIon, beIore the SubcommIttee on OversIght and
nvestIgatIons, CommIttee on Commerce, House oI RepresentatIves. WashIngton, D.C.: U.S. CeneraI
AccountIng OIIIce, 2000. CAO]T-RCED-00 247, http:]]www.gao.gov]






93

5. A person not entItIed to receIve cIassIIIed InIormatIon untII aIter he or she has receIved a
securIty brIeIIng coverIng the provIsIons oI thIs reguIatIon and has executed a non dIscIosure agreement
(Form SF-312) accordIng to NatIonaI SecurIty DecIsIon DIrectIve 84 (NSDD 84) dated March 11, 1983.

Source: U.S. Department oI State ForeIgn AIIaIrs ManuaI. "StorIng and SaIeguardIng CIassIIIed MaterIaI."
12 FAM 530. (12 FAM 536.1-4 "DetermInatIon oI SecurIty 8rIeIIng"),
http:]]www.state.gov]m]a]dIr]regs]Iam]

CIassIIIed nIormatIon Procedures Act (CPA) CIassIIIed nIormatIon Procedures Act (CPA) CIassIIIed nIormatIon Procedures Act (CPA) CIassIIIed nIormatIon Procedures Act (CPA) PL 96 PL 96 PL 96 PL 96- -- -456 456 456 456
See See See See CraymaII CraymaII CraymaII CraymaII
1. Among other thIngs, CPA aIIows a court to "upon a suIIIcIent showIng, may authorIze the
UnIted States to deIete specIIIed Items oI cIassIIIed InIormatIon Irom documents to be made avaIIabIe to
the deIendant through dIscovery under the FederaI RuIes oI CrImInaI Procedure, to substItute a summary
oI the InIormatIon Ior such cIassIIIed documents, or to substItute a statement admIttIng reIevant Iacts that
the cIassIIIed InIormatIon wouId tend to prove." Sec. 4. "DIscovery oI cIassIIIed InIormatIon by deIendants"
states:

The court, upon a suIIIcIent showIng, may authorIze the UnIted States to deIete specIIIed Items oI
cIassIIIed InIormatIon Irom documents to be made avaIIabIe to the deIendant through dIscovery
under the FederaI RuIes oI CrImInaI Procedure, to substItute a summary oI the InIormatIon Ior
such cIassIIIed documents, or to substItute a statement admIttIng reIevant Iacts that the cIassIIIed
InIormatIon wouId tend to prove.

Source: 18 U.S.C. http:]]www.gpoaccess.gov]uscode]browse.htmI and Department oI ]ustIce. "SynopsIs
oI CPA." http:]]www.usdoj.gov]usao]eousa]IoIareadIngroom]usam]tItIe9]crm02054.htm

CIassIIIed Matter CIassIIIed Matter CIassIIIed Matter CIassIIIed Matter
OIIIcIaI InIormatIon or matter In any Iorm or oI any nature whIch requIres protectIon In the Interests oI
natIonaI securIty.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CIassIIIed MIIItary nIormatIon (CM) CIassIIIed MIIItary nIormatIon (CM) CIassIIIed MIIItary nIormatIon (CM) CIassIIIed MIIItary nIormatIon (CM)
See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon
nIormatIon whIch Is orIgInated by or Ior the DoD or Its Components or Is under theIr jurIsdIctIon or
controI and whIch requIres protectIon In the Interests oI natIonaI securIty. t Is desIgnated TOP SECRET,
SECRET and CONFDENTAL as descrIbed In EO 12356. CIassIIIed mIIItary InIormatIon may be dIscIosed In
oraI, vIsuaI or materIaI Iorm and Is dIvIded Into eIght categorIes:






94
a. Category 1 - OrganIzatIon, TraInIng And EmpIoyment OI MIIItary Forces; b. Category 2 - MIIItary
MaterIeI And MunItIons; c. Category 3 - AppIIed Research And DeveIopment nIormatIon; d. Category 4 -
ProductIon nIormatIon. DesIgns, drawIngs, chemIcaI and mathematIcaI equatIons, specIIIcatIons, modeIs,
manuIacturIng technIques, soItware source code and reIated InIormatIon (excIudIng Category 2 and 3
InIormatIon) necessary to manuIacture or substantIaIIy upgrade mIIItary materIeI and munItIons. The
IoIIowIng InIormatIon Is IurnIshed to Iurther cIarIIy the deIInItIon oI ProductIon nIormatIon:
(1) ManuIacturIng InIormatIon
(2) 8uIId-to-PrInt
(3) AssembIy nIormatIon
e. Category 5 - CombIned MIIItary OperatIons, PIannIng And ReadIness; I. Category 6 - U.S. Order OI
8attIe ; g. Category 7 - North AmerIcan DeIense; h. Category 8 - MIIItary nteIIIgence
Source: DoD. nternatIonaI Programs SecurIty Handbook. Chapter 3. OIIIce oI the Deputy to the Under
Secretary oI DeIense (PoIIcy) Ior PoIIcy Support, 1993,
http:]]www.Ias.org]sgp]IIbrary]Ipshbook]Chap03.htmI and Army ReguIatIon 380-10, "ForeIgn
DIscIosure and Contacts wIth ForeIgn RepresentatIves," ]une 22, 2005,
http:]]www.Ias.org]Irp]DoDdIr]army]ar380-10.pdI

CIassIIIed NatIonaI SecurIty nIormatIon CIassIIIed NatIonaI SecurIty nIormatIon CIassIIIed NatIonaI SecurIty nIormatIon CIassIIIed NatIonaI SecurIty nIormatIon
1. (c) "CIassIIIed natIonaI securIty InIormatIon" (hereaIter "cIassIIIed InIormatIon") means
InIormatIon that has been determIned pursuant to thIs order or any predecessor order to requIre
protectIon agaInst unauthorIzed dIscIosure and Is marked to IndIcate Its cIassIIIed status when In
documentary Iorm.

Source: EO 12958, "CIassIIIed NatIonaI SecurIty nIormatIon, Amended," (AprII 17, 1995),
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI ; The Nat'I SecurIty. ArchIve
Fund, nc. v. CA, 402 F. Supp. 2d 211 (D.D.C. 2005), http:]]www.justIce.gov]oIp]attachmentedec98.htm

2. Sec. 2001.23 AddItIonaI requIrements [1.6].
(a) MarkIng prohIbItIons. MarkIngs other than "Top Secret," "Secret," and "ConIIdentIaI," such as "For
OIIIcIaI Use OnIy," "SensItIve 8ut UncIassIIIed," "LImIted OIIIcIaI Use," or "SensItIve SecurIty nIormatIon"
shaII not be used to IdentIIy cIassIIIed natIonaI securIty InIormatIon. No other term or phrase shaII be used
In conjunctIon wIth these markIngs, such as "Secret SensItIve" or "Agency ConIIdentIaI," to IdentIIy
cIassIIIed natIonaI securIty InIormatIon. The terms "Top Secret," "Secret," and "ConIIdentIaI" shouId not be
used to IdentIIy non-cIassIIIed executIve branch InIormatIon.

Source: SOO and NARA, CIassIIIed NatIonaI SecurIty nIormatIon DIrectIve No. 1, September 23, 2003,
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-ImpIementIng-dIrectIve.htmI#2001.15

CIassIIIed NavaI NucIear CIassIIIed NavaI NucIear CIassIIIed NavaI NucIear CIassIIIed NavaI NucIear PropuIsIon nIormatIon (C PropuIsIon nIormatIon (C PropuIsIon nIormatIon (C PropuIsIon nIormatIon (C- -- -NNP) NNP) NNP) NNP)






95
AII cIassIIIed InIormatIon concernIng the desIgn, arrangement deveIopment, manuIacture, testIng,
operatIon, admInIstratIon, traInIng, maIntenance, and repaIr oI propuIsIon pIants oI navaI nucIear powered
shIps and prototypes, IncIudIng assocIated shIpboard and shore-based nucIear support IacIIItIes.

Source: CAO. ManagIng SensItIve nIormatIon: ActIons Needed to Ensure Recent Changes In DOE OversIght
Do Not Weaken an EIIectIve CIassIIIcatIon System. ]une 26, 2006,
http:]]www.gao.gov]new.Items]d06785.pdI

CIassIIIed NSA]CSS nIormatIon CIassIIIed NSA]CSS nIormatIon CIassIIIed NSA]CSS nIormatIon CIassIIIed NSA]CSS nIormatIon
See See See See CIassIIIcatIon, CIassIIIed n CIassIIIcatIon, CIassIIIed n CIassIIIcatIon, CIassIIIed n CIassIIIcatIon, CIassIIIed nIormatIon IormatIon IormatIon IormatIon
nIormatIon that Is cIassIIIed pursuant to the standards oI ExecutIve Order 12958, as amended, or any
predecessor order. t IncIudes, but Is not IImIted to, InteIIIgence and InteIIIgence-reIated InIormatIon,
sensItIve compartmented InIormatIon (InIormatIon concernIng or derIved Irom InteIIIgence sources and
methods), and cryptoIogIc InIormatIon (InIormatIon concernIng communIcatIons securIty and sIgnaIs
InteIIIgence, IncIudIng InIormatIon whIch Is aIso sensItIve compartmented InIormatIon) protected by
SectIon 798 oI TItIe 18, UnIted States Code.

Source: NSA]CSS. "ReportIng UnauthorIzed MedIa DIscIosures oI CIassIIIed NSA]CSS
nIormatIon." NSA]CSS PoIIcy 1-27, 20 March 2006, http:]]www.Ias.org]Irp]nsa]unauthorIzed.htmI

CIassIIIer CIassIIIer CIassIIIer CIassIIIer
An IndIvIduaI who makes a cIassIIIcatIon determInatIon and appIIes appIIes appIIes appIIes a securIty cIassIIIcatIon to InIormatIon
or materIaI. A cIassIIIer may eIther be a cIassIIIcatIon authorIty or may assIgn a securIty
cIassIIIcatIon based on a properIy cIassIIIed source or a cIassIIIcatIon guIde.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]Iam]

CIosed nIormatIon CIosed nIormatIon CIosed nIormatIon CIosed nIormatIon
nIormatIon that wIII eIther never be made pubIIc, or wIII become known decades aIter a partIcuIar actIon
or event. CIosed InIormatIon Is assocIated wIth "the rIght oI an IndIvIduaI to see or use a partIcuIar type or
IeveI oI cIassIIIed InIormatIon whIch Is dependent on a need to see or know" (Cohen 2); nIormatIon that Is
compartmented, and thereIore not avaIIabIe to the pubIIc, and cannot be accessed except by those who
hoId specIaI access cIearances. CIosed InIormatIon Is assocIated wIth a specIIIc IeveI oI prIvIIege.

Source: Susan L. Maret; SheIdon Cohen. "SecurIty CIearances and the ProtectIon oI NatIonaI SecurIty
nIormatIon Law and Procedures." DeIense PersonneI SecurIty Research Center, (DTC) TechnIcaI Report
00-4. November, 2000. AD-A388100]NA, http:]]www.sheIdoncohen.com]pubIIcatIons]securIty-
cIearances.htm
CIosed WorId CIosed WorId CIosed WorId CIosed WorId






96
FIrst aIr deIenses, then strategIc earIy warnIng and nucIear response, and Iater the sophIstIcated tactIcaI
systems oI the eIectronIc battIeIIeId grew Irom the controI and communIcatIons capacItIes oI InIormatIon
machInes. As metaphors, such systems constItuted a dome oI gIobaI technoIogIcaI oversIght, a cIosed
worId, wIthIn whIch every event was Interpreted as part oI a tItanIc struggIe between the superpowers.
naugurated In the Truman DoctrIne oI "contaInment," eIaborated In Rand CorporatIon theorIes oI nucIear
strategy, tested under IIre In the jungIes oI VIetnam, and resurrected In the ImpenetrabIe "peace shIeId" oI
RonaId Reagan's StrategIc DeIense nItIatIve, the key theme oI cIosed-worId dIscourse was gIobaI
surveIIIance and controI through hIgh-technoIogy mIIItary power. Computers made the cIosed worId work
sImuItaneousIy as technoIogy, as poIItIcaI system, and as IdeoIogIcaI mIrage.

8oth the engIneerIng and the poIItIcs oI cIosed-worId dIscourse centered around probIems oI human-
machIne IntegratIon: buIIdIng weapons, systems, and strategIes whose human and machIne components
couId IunctIon as a seamIess web, even on the gIobaI scaIes and In the vastIy compressed tIme Irames oI
superpower nucIear war. As symboI-manIpuIatIng IogIc machInes, computers wouId automate or assIst
tasks oI perceptIon, reasonIng, and controI In Integrated systems. Such goaIs, IIrst accompIIshed In WorId
War -era antI-aIrcraIt weapons, heIped Iorm both cybernetIcs, the grand theory oI InIormatIon and
controI In bIoIogIcaI and mechanIcaI systems, and artIIIcIaI InteIIIgence (A), soItware that sImuIated
compIex symboIIc thought. (1).

Source: PauI N. Edwards. CIosed WorId: Computers and the PoIItIcs oI DIscourse In CoId War AmerIca.
CambrIdge, MA: MT Press, 1996.

Code Code Code Code
1. Any system oI communIcatIon In whIch arbItrary groups oI symboIs represent unIts oI pIaIn
text oI varyIng Iength. Codes may be used Ior brevIty or Ior securIty.
2. A cryptosystem In whIch the cryptographIc equIvaIents (usuaIIy caIIed "code groups"), typIcaIIy
consIstIng oI Ietters or dIgIts (or both) In otherwIse meanIngIess combInatIons, are substItuted Ior pIaIn
text eIements whIch are prImarIIy words, phrases, or sentences.

Source: DoD. The Department oI DeIense DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Code Name Codename Code Name Codename Code Name Codename Code Name Codename
34 34 34 34

See Codeword Code Word, ExercIse Term, NCKA, NIckname See Codeword Code Word, ExercIse Term, NCKA, NIckname See Codeword Code Word, ExercIse Term, NCKA, NIckname See Codeword Code Word, ExercIse Term, NCKA, NIckname
1. 8rItIsh and US jargon, aka code name. t has been used InterchangeabIy wIth codeword In the
past. 8oth codenames and nIcknames were and are used In conjunctIon wIth operatIons and projects,
whereas codewords and cryptonyms are used standIng aIone wIth a dIgraph preIIx (CentraI nteIIIgence
Agency (CA) usage). Code names and nIcknames are aIways the second part oI an operatIon, pIan or
project tItIe. N.8. As noted eIsewhere, code words [and aIso codenames] are aIways cIassIIIed; nIcknames
are aIways uncIassIIIed and consIst oI two separate words, e.g., 8LUE 8RD Is a nIckname, but 8LUE8RD Is

couId not Iocate an oIIIcIaI DoD deIInItIon Ior "code name." DoD empIoys the term "code word."






97
a codeword or codename. Code names can be In mIIItary usage, eIther strategIc or tactIcaI. The Iormer
can be vIabIe Ior years, unIess compromIsed, whIIe the Iatter are ephemeraI.
AddItIonaIIy, It shouId be noted that codenames are used In conjunctIon wIth mIIItary operatIons, op-
eratIonaI or contIngency pIans, or concepts, whereas mIIItary projects are usuaIIy nonoperatIonaI
InteIIIgence, and counterInteIIIgence usage may dIIIer Irom mIIItary practIce. Codewords can stand aIone,
and when used In codeword InteIIIgence, they may or may not desIgnate InteIIIgence operatIons, but are
otherwIse used Ior access to the product oI such operatIons.
Source: Leo D. CarI. nternatIonaI DIctIonary oI nteIIIgence. . . . McLean, VA: nternatIonaI DeIense ConsuItant
ServIces, nc., 1990.

2. ArkIn wrItes there are three types oI Code Names:
NIcknames Code Words ExercIse Terms

For a detaIIed IIst oI Codenames by country, see Code Names: DecIpherIng US MIIItary PIans, Programs,
and OperatIons In the 9]11 WorId.

Source: : : : WIIIIam M. ArkIn. Code Names: DecIpherIng US MIIItary PIans, Programs, and OperatIons In the
9]11 WorId. Hanover, NH: SteerIorth Press, 2005, and hIs "Code Name oI the Week" Ieature at the
WashIngton Post http:]]bIog.washIngtonpost.com]earIywarnIng]codenameoItheweek]
3. The AmerIcan mIIItary adopted code names durIng the WorId War era, prImarIIy Ior securIty
reasons. ts use oI code names Ior operatIons grew out oI the practIce oI coIor-codIng war pIans durIng
the Interwar perIod. Even beIore AmerIca entered the war, the War Department had executed OperatIon
ndIgo, the reInIorcement oI ceIand, and had dubbed pIans to occupy the Azores and Dakar as OperatIons
Cray and 8Iack respectIveIy.
Source: Cregory C. SIemInskI. "The Art oI NamIng OperatIons." Parameters: US Army War CoIIege QuarterIy
Autumn 1995. [See the Wayback MachIne,http:]]tInyurI.com]75guht ]
4. Code names are]were aIso used by the F8. See Athan TheoharIs, ed. The F8: A ComprehensIve
ReIerence CuIde (PhoenIx: Oryx Press, 1998) Ior a number oI code names used by the F8 sInce the ].
Edgar Hoover days.
Codeword Code Word Codeword Code Word Codeword Code Word Codeword Code Word
See Code Names, NIcknames, SensItIve Compartmented nIormatIon (S See Code Names, NIcknames, SensItIve Compartmented nIormatIon (S See Code Names, NIcknames, SensItIve Compartmented nIormatIon (S See Code Names, NIcknames, SensItIve Compartmented nIormatIon (SC), SensItIve Compartmented C), SensItIve Compartmented C), SensItIve Compartmented C), SensItIve Compartmented
nIormatIon (SC) ControI Systems]Codewords nIormatIon (SC) ControI Systems]Codewords nIormatIon (SC) ControI Systems]Codewords nIormatIon (SC) ControI Systems]Codewords
1. Any serIes oI desIgnated words or terms used wIth a securIty cIassIIIcatIon to IndIcate that the
materIaI cIassIIIed was derIved through a sensItIve source or method, constItutes a partIcuIar type oI
sensItIve compartmentaIIzed InIormatIon (SC), and Is thereIore accorded IImIted dIstrIbutIon.







98
Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents."
October 4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

2. A sIngIe cIassIIIed word assIgned to represent a specIIIc specIaI access program; a unIque
name assIgned to a project, program, or eIement oI InIormatIon Ior the purpose oI saIeguardIng the true
nature oI the protected Interest. Code words may consIst oI symboIs, Ietters, or numbers, but do not
IncIude nIcknames, chemIcaI symboIs or abbrevIatIons.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
3. DesIgned to provIde specIaI protectIon, beyond that provIded by the IederaI cIassIIIcatIon
system, to a specIIIc category oI sensItIve InIormatIon; authorIzed by SectIon 9 oI ExecutIve Order 11652
(SEC. 9. "SpecIaI DepartmentaI Arrangements: The orIgInatIng Department or other approprIate authorIty
may Impose, In conIormIty wIth the provIsIons oI thIs order, specIaI requIrements wIth respect to access,
dIstrIbutIon and protectIon oI cIassIIIed InIormatIon and materIaI, IncIudIng those whIch presentIy reIate to
communIcatIons InteIIIgence, InteIIIgence sources and methods and cryptography.")

Source: CentraI nteIIIgence Agency. Center Ior the Study oI nteIIIgence. "CrItIque oI the Codeword
Compartment oI the CA." March 1977, http:]]www.Ias.org]sgp]othergov]codeword.htmI and EO 11652,
March 8, 1972, http:]]www.Ias.org]Irp]oIIdocs]eo]eo-11652.htm.

4. A word that has been assIgned a cIassIIIcatIon and a cIassIIIed meanIng to saIeguard IntentIons
and InIormatIon regardIng a cIassIIIed pIan or operatIon. b. A cryptonym used to IdentIIy sensItIve
InteIIIgence data.

Source: DoD. The Department oI DeIense DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
5. A sIngIe word Irom ]ANAP 299(S) whIch has an assIgned cIassIIIed meanIng to secure and
saIeguard Its InIormatIon about actuaI reaI-worId mIIItary pIans or operatIons cIassIIIed as CONFDENTAL
or hIgher. Code words are not assIgned Irom ]ANAP to test, drIII, or exercIse actIvItIes. A code word Is
pIaced In one oI three categorIes:
(1) AvaIIabIe. AIIocated to the usIng command. AvaIIabIe code words IndIvIduaIIy wIII be uncIassIIIed untII
pIaced In the actIve category; (2) ActIve. These are current and are assIgned a cIassIIIed meanIng; (3)
CanceIed. FormerIy actIve, but dIscontInued due to compromIse, suspected compromIse, cessatIon, or
compIetIon oI the operatIon to whIch It pertaIned. Each canceIed code word wIII not be used Ior 2 years
and remaIns canceIed untII returned to the actIve category.






99
Source: HQ North AmerIcan Aerospace DeIense Command NORAD ReguIatIon 11-3. Peterson AIr Force
8ase, CoIorado 80914-5002 25, August 1989. "Code Words, NIcknames and ExercIse Terms."
http:]]www.Ias.org]spp]mIIItary]docops]norad]reg11003.htm and ChaIrman oI the ]oInt ChIeIs oI StaII
ManuaI. Code Word, NIckname and ExercIse Term Report (Short TItIe - NCKA) AprII 1998,
http:]]Ias.org]Irp]doddIr]dod]cjcsm315029a.pdI

6. 8. A code word Is a sIngIe word assIgned a cIassIIIed meanIng by approprIate authorIty to
ensure proper securIty concernIng IntentIons and to saIeguard InIormatIon pertaInIng to actuaI, reaI-worId
mIIItary pIans or operatIons cIassIIIed as CONFDENTAL or hIgher once actIvated.

Source: Department oI the Navy, "Code Word, NIcknames, and ExercIse TermInoIogy System," OPNAVNST
5511.37D, ]anuary 30, 2007, http:]]www.Ias.org]Irp]doddIr]navy]opnavInst]551137d.pdI

Codeword Compartment Codeword Compartment Codeword Compartment Codeword Compartment
SecurIty devIce Is desIgned to provIde specIaI protectIon, beyond that provIded by the IederaI cIassIIIcatIon
system, to a specIIIc category oI sensItIve InIormatIon.

Source: CentraI nteIIIgence Agency. Center Ior the Study oI nteIIIgence. "CrItIque oI the Codeword
Compartment oI the CA." March 1977, http:]]www.Ias.org]sgp]othergov]codeword.htmI
CognIzant Sec CognIzant Sec CognIzant Sec CognIzant SecurIty Agency urIty Agency urIty Agency urIty Agency (CSA) (CSA) (CSA) (CSA)
AgencIes oI the ExecutIve 8ranch that have been authorIzed by reIerence (a) to estabIIsh an IndustrIaI
securIty program to saIeguard cIassIIIed InIormatIon under the jurIsdIctIon oI those agencIes when
dIscIosed or reIeased to U.S. ndustry. These agencIes are: The Department oI DeIense, DOE, CA, and
NRC.

Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006,
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

CoIIateraI nIormatIon CoIIateraI nIormatIon CoIIateraI nIormatIon CoIIateraI nIormatIon
See See See See CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon
1. AII natIonaI securIty InIormatIon cIassIIIed CONFDENTAL, SECRET AND TOP SECRET, under the
provIsIons oI an ExecutIve Order Ior whIch specIaI nteIIIgence CommunIty. systems oI compartmentatIon
(such as sensItIve compartmented InIormatIon) are not IormaIIy estabIIshed.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

2. ArkIn descrIbes CoIIateraI nIormatIon as:
NonsensItIve noncompartmentaIIzed InIormatIon cIassIIIed ConIIdentIaI, Secret or Top Secret.
SensItIve CompartmentaIIzed nIormatIon (SC)






100
SpecIaI InteIIIgence (S) a cIassIIIed category oI S reIerrIng to
sIgnaIs

Source: : : : WIIIIam M. ArkIn. Code Names: DecIpherIng US MIIItary PIans, Programs, and OperatIons In the
9]11 WorId. Hanover, NH: SteerIorth Press, 2005, and http:]]www.codenames.org]

CoIIectIng CoIIectIng CoIIectIng CoIIectIng
An actIvIty oI InIormatIon management: the contInuous acquIsItIon oI reIevant InIormatIon by any means,
IncIudIng dIrect observatIon, other organIc resources, or other oIIIcIaI, unoIIIcIaI, or pubIIc sources Irom
the InIormatIon envIronment.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
CoIIectIon CoIIectIon CoIIectIon CoIIectIon
1. The expIoItatIon oI sources by coIIectIon agencIes, and the deIIvery oI the InIormatIon obtaIned
to the approprIate processIng unIt Ior use In the productIon oI InteIIIgence. AIso, obtaInIng InIormatIon or
InteIIIgence InIormatIon In any manner, IncIudIng dIrect observatIons, IIaIson wIth oIIIcIaI agencIes, or
soIIcItatIon Irom oIIIcIaI, unoIIIcIaI, or pubIIc sources, or quantItatIve data Irom the test or operatIon oI
IoreIgn systems.

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. SprIngIIeId, VA: NatIonaI TechnIcaI nIormatIon
ServIce, [1999Z]. SUDOC: PREX 3.2: C 76 and PREX 3.2]2: C 94

2. nIormatIon shaII be consIdered as "coIIected" onIy when It has been receIved Ior use by an
empIoyee oI a DoD InteIIIgence component In the course oI hIs oIIIcIaI dutIes. Thus, InIormatIon
voIunteered to a DoD InteIIIgence component by a cooperatIng source wouId be "coIIected" under thIs
procedure when an empIoyee oI such component oIIIcIaIIy accepts, In some manner, such InIormatIon Ior
use wIthIn that component. Data acquIred by eIectronIc means Is "coIIected" onIy when It has been
processed Into InteIIIgIbIe Iorm.

Source: DoD 5240.1-R "Procedures CovernIng the ActIvItIes oI DoD nteIIIgence Components that AIIect
UnIted States Persons." December, 1982, http:]]www.Ias.org]Irp]doddIr]dod]d52401r.pdI

CoIIectIon Agency CoIIectIon Agency CoIIectIon Agency CoIIectIon Agency
Any IndIvIduaI, organIzatIon, or unIt that has access to sources oI InIormatIon and the capabIIIty oI
coIIectIng InIormatIon Irom them. See aIso agency.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]






101

CoIIectIon Management CoIIectIon Management CoIIectIon Management CoIIectIon Management
n InteIIIgence usage, the process oI convertIng InteIIIgence requIrements Into coIIectIon requIrements,
estabIIshIng prIorItIes, taskIng or coordInatIng wIth approprIate coIIectIon sources or agencIes, monItorIng
resuIts, and retaskIng, as requIred.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CoIIectIon oI nIormatIon CoIIectIon oI nIormatIon CoIIectIon oI nIormatIon CoIIectIon oI nIormatIon
1. 7 (A) means the obtaInIng, causIng to be obtaIned, soIIcItIng, or requIrIng the dIscIosure to
thIrd partIes or the pubIIc, oI Iacts or opInIons by or Ior an agency, regardIess oI Iorm or Iormat, caIIIng
Ior eIther--
(I) answers to IdentIcaI questIons posed to, or IdentIcaI reportIng or recordkeepIng requIrements
Imposed on, 10 or more persons, other than agencIes, InstrumentaIItIes, or empIoyees oI the UnIted
States; or
(II) answers to questIons posed to agencIes, InstrumentaIItIes, or empIoyees oI the UnIted States
whIch are to be used Ior generaI statIstIcaI purposes; and

(8) shaII not IncIude a coIIectIon oI InIormatIon descrIbed under sectIon 3518(c) (1) oI tItIe 44, UnIted
States Code.

Source: "The AnaIysIs oI ReguIatory FunctIons." 5 U.S.C. 601,
http:]]www.gpoaccess.gov]uscode]browse.htmI

2. CoIIectIon oI InIormatIon means, except as provIded In Sec. 1320.4, the obtaInIng, causIng to
be obtaIned, soIIcItIng, or requIrIng the dIscIosure to an agency, thIrd partIes or the pubIIc oI InIormatIon
by or Ior an agency by means oI IdentIcaI questIons posed to, or IdentIcaI reportIng, recordkeepIng, or
dIscIosure requIrements Imposed on, ten or more persons, whether such coIIectIon oI InIormatIon Is
mandatory, voIuntary, or requIred to obtaIn or retaIn a beneIIt.

CoIIectIon oI InIormatIon IncIudes any requIrement or request Ior persons to obtaIn, maIntaIn, retaIn,
report, or pubIIcIy dIscIose InIormatIon. As used In thIs Part, "coIIectIon oI InIormatIon'' reIers to the act oI
coIIectIng or dIscIosIng InIormatIon, to the InIormatIon to be coIIected or dIscIosed, to a pIan and]or an
Instrument caIIIng Ior the coIIectIon or dIscIosure oI InIormatIon, or any oI these, as approprIate.
(1)A "coIIectIon oI InIormatIon'' may be In any Iorm or Iormat, IncIudIng the use oI report Iorms;
appIIcatIon Iorms; scheduIes; questIonnaIres; surveys; reportIng or recordkeepIng requIrements;
contracts; agreements; poIIcy statements; pIans; ruIes or reguIatIons; pIannIng requIrements; cIrcuIars;
dIrectIves; InstructIons; buIIetIns;
requests Ior proposaI or other procurement requIrements; IntervIew guIdes; oraI communIcatIons; postIng,
notIIIcatIon, IabeIIng, or sImIIar dIscIosure requIrements; teIegraphIc or teIephonIc requests; automated,
eIectronIc, mechanIcaI, or other technoIogIcaI coIIectIon technIques; standard questIonnaIres used to






102
monItor compIIance wIth agency requIrements; or any other technIques or technoIogIcaI methods used
to monItor compIIance wIth agency requIrements. A "coIIectIon oI InIormatIon'' may ImpIIcItIy or expIIcItIy
IncIude reIated coIIectIon oI InIormatIon requIrements.

Source. OIIIce oI Management and 8udget. 5 CFR 1320. "ControIIIng Paperwork 8urdens on the PubIIc."
http:]]www.gpoaccess.gov]cIr]Index.htmI

CoIIectIon PIan CoIIectIon PIan CoIIectIon PIan CoIIectIon PIan
A DoD and NATO term Ior a pIan Ior coIIectIng InIormatIon Irom aII avaIIabIe sources to meet InteIIIgence
requIrements and Ior transIormIng those requIrements Into orders and requests to approprIate agencIes.
[Note: the Army term Is "InteIIIgence, surveIIIance, and reconnaIssance (SR) pIan."]

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
Combat nIormatIon Combat nIormatIon Combat nIormatIon Combat nIormatIon
See See See See nIormatI nIormatI nIormatI nIormatIon on on on
UnevaIuated data, gathered by or provIded dIrectIy to the tactIcaI commander whIch, due to Its hIghIy
perIshabIe nature or the crItIcaIIty oI the sItuatIon, cannot be processed Into tactIcaI InteIIIgence In tIme to
satIsIy the user's tactIcaI InteIIIgence requIrements.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
Combat Zones That See Combat Zones That See Combat Zones That See Combat Zones That See
See See See See Urban ResoIve 2015 Urban ResoIve 2015 Urban ResoIve 2015 Urban ResoIve 2015
The InherentIy three-dImensIonaI nature oI urban centers, wIth Iarge buIIdIngs, extensIve underground
passageways, and conceaIment Irom above requIres the use oI cIose-In Imagery sensIng, to obtaIn vItaI
reconnaIssance and targetIng InIormatIon. The rapId proIIIeratIon oI Iow-cost vIdeo sensors presents an
opportunIty to obtaIn the necessary reconnaIssance and targetIng InIormatIon by depIoyIng Iarge numbers
oI vIdeo cameras. The key technIcaI goaI oI Combat Zones That See Is to produce the aIgorIthms Ior
automatIcaIIy monItorIng vIdeo Ieeds to provIde the reconnaIssance and targetIng InIormatIon needed
24]7 to support mIIItary operatIons In urban terraIn. The voIume oI data InvoIved precIudes wIreIess
transmIssIon and manuaI observatIon oI aII sensor Ieeds. nstead, IocaI automatIc processIng oI vIdeo
Ieeds Is requIred. 8y co-IocatIng processors wIth vIdeo cameras, the bandwIdth requIred to eIIectIveIy
support mIIItary operatIons can be reduced to manageabIe IeveIs. Combat zones That See Intends to track
aII vehIcIes that move wIthIn an extended area oI observatIon. DespIte the decreasIng cost oI cameras,
processors, and communIcatIons, the compIete observatIon oI an entIre metropoIItan area Is not practIcaI.
Hence, It wIII be necessary to deveIop vehIcIe-assocIatIon technoIogy that permIts reIIabIe trackIng oI
IndIvIduaI vehIcIes, usIng cameras whose FIeIds oI VIew (FOV) do not overIap.






103
Source: DARPA. Proposer nIormatIon PamphIet (PP). "Combat Zones That See (CTS)." 8road Agency
Announcement 03-15 (8AA 03-15) see Wayback MachIne
http:]]web.archIve.org]web]20060619124609]http:]]dtsn.darpa.mII]Ixo]soIIcItatIons]CTS]IIIe]8AA03-
15CTSPP.pdI and Noah Shachtman. "8Ig 8rother Cets a 8raIn: The Pentagon's PIan Ior TrackIng
EverythIng That Moves." VIIIage VoIce ]uIy 9-15, 2003,
http:]]www.vIIIagevoIce.com]news]0328,shachtman,45399,1.htmI

CombIned nteIIIgence Watch Center CombIned nteIIIgence Watch Center CombIned nteIIIgence Watch Center CombIned nteIIIgence Watch Center
AIso known as the CombIned nteIIIgence Center (CC). Serves Is the IndIcatIons and warnIng center Ior
worIdwIde threats Irom space, mIssIIe, and strategIc aIr actIvIty, as weII as geopoIItIcaI unrest that couId
aIIect North AmerIca and U.S. Iorces]Interests abroad. The center's personneI gather InteIIIgence
InIormatIon to assIst aII the Cheyenne MountaIn work centers In correIatIng and anaIyzIng events to
support NORAD and US Space Command decIsIon makers.

Source: FAS. "Cheyenne MountaIn CompIex." http:]]www.Ias.org]nuke]guIde]usa]c3I]cmc.htm

Command and ControI WarIare Command and ControI WarIare Command and ControI WarIare Command and ControI WarIare
The Integrated use oI operatIons securIty, mIIItary deceptIon, psychoIogIcaI operatIons, eIectronIc warIare,
and physIcaI destructIon, mutuaIIy supported by InteIIIgence, to deny InIormatIon to, InIIuence, degrade,
or destroy adversary command and controI capabIIItIes, whIIe protectIng IrIendIy command and controI
capabIIItIes agaInst such actIons. Command and controI warIare Is an appIIcatIon oI InIormatIon
operatIons In mIIItary operatIons. AIso caIIed C2W. C2W Is both oIIensIve and deIensIve: a. C2-attack.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Common TerrorIsm nIormatIon SharIng Standards Common TerrorIsm nIormatIon SharIng Standards Common TerrorIsm nIormatIon SharIng Standards Common TerrorIsm nIormatIon SharIng Standards
The CTSS program Integrates InIormatIon exchange standards, based on common SE busIness processes
and deveIoped through the DO] and DHS NEM program management oIIIce, Into new SE-wIde IunctIonaI
standards. NEM epItomIzes a successIuI FederaI, State, IocaI, trIbaI, and prIvate sector InItIatIve and
provIdes a IoundatIon Ior natIonwIde InIormatIon exchanges IeveragIng data exchange standards eIIorts
successIuIIy ImpIemented by the CIobaI ]ustIce nIormatIon SharIng nItIatIve. NEM Is aIso beIng strongIy
embraced by the prIvate sector technoIogy communIty.

Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

CommunIcate CommunIcate CommunIcate CommunIcate
To use any means or method to convey InIormatIon oI any kInd Irom one person or pIace to another.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]






104

CommunIcatIons Cover CommunIcatIons Cover CommunIcatIons Cover CommunIcatIons Cover
See See See See nIormatIon SuperIorIty nIormatIon SuperIorIty nIormatIon SuperIorIty nIormatIon SuperIorIty
ConceaIIng or aIterIng oI characterIstIc communIcatIons patterns to hIde InIormatIon that couId be oI
vaIue to an adversary.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

CommunIcatIons nteIIIgence Database CommunIcatIons nteIIIgence Database CommunIcatIons nteIIIgence Database CommunIcatIons nteIIIgence Database
The aggregate oI technIcaI InIormatIon and InteIIIgence derIved Irom the InterceptIon and anaIysIs oI
IoreIgn communIcatIons (excIudIng press, propaganda, and pubIIc broadcast) used In the dIrectIon and
redIrectIon oI communIcatIons InteIIIgence Intercept, anaIysIs, and reportIng actIvItIes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
CommunIcatIons SecurIty CommunIcatIons SecurIty CommunIcatIons SecurIty CommunIcatIons SecurIty
ProtectIve measures taken to deny unauthorIzed persons InIormatIon derIved Irom teIecommunIcatIons oI
the U.S. Covernment reIatIng to natIonaI securIty and to ensure the authentIcIty oI such communIcatIons.

Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006,
http:]]www.Ias.org]sgp]IIbrary]nIspom.htm

ComparmentaIIzatIon ComparmentaIIzatIon ComparmentaIIzatIon ComparmentaIIzatIon
A nonhIerarchIcaI groupIng oI sensItIve InIormatIon used to controI access to data more IIneIy than wIth
hIerarchIcaI securIty cIassIIIcatIon aIone.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, nstructIon 4009. ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

Compar Compar Compar CompartmentatIon tmentatIon tmentatIon tmentatIon
EstabIIshment and management oI an organIzatIon so that InIormatIon about the personneI, InternaI
organIzatIon, or actIvItIes oI one component Is made avaIIabIe to any other component onIy to the extent
requIred Ior the perIormance oI assIgned dutIes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Compartmented Mode Compartmented Mode Compartmented Mode Compartmented Mode
Mode oI operatIon whereIn each user wIth dIrect or IndIrect access to a system, Its perIpheraIs, remote
termInaIs, or remote hosts has aII oI the IoIIowIng: (a) vaIId securIty cIearance Ior the most restrIcted






105
InIormatIon processed In the system; (b) IormaI access approvaI and sIgned nondIscIosure agreements
Ior that InIormatIon whIch a user Is to have access; and (c) vaIId need-to-know Ior InIormatIon whIch a
user Is to have access.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, nstructIon 4009. NatIonaI nIormatIon Assurance CIossary ]une, 2006.,
http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

CompromIse CompromIse CompromIse CompromIse
The dIscIosure oI cIassIIIed InIormatIon to persons not authorIzed access thereto.

Source: U.S. Department oI ]ustIce. UnIted States MarshaIs ServIce. OIIIce oI nspectIons. nternaI SecurIty
DIvIsIon. nIormatIon SecurIty. WashIngton D.C.: 1991. SUDOC: ] 25.2: n 3
CompromIsed CompromIsed CompromIsed CompromIsed
See CIassIIIed Matter See CIassIIIed Matter See CIassIIIed Matter See CIassIIIed Matter
A term appIIed to cIassIIIed matter, knowIedge oI whIch has, In whoIe or In part, passed to an
unauthorIzed person or persons, or whIch has been subject to rIsk oI such passIng.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
CompromIsIng EmanatIons CompromIsIng EmanatIons CompromIsIng EmanatIons CompromIsIng EmanatIons
ntentIonaI or unIntentIonaI InteIIIgence-bearIng sIgnaIs whIch, II Intercepted and anaIyzed, dIscIose
natIonaI securIty InIormatIon transmItted, receIved, handIed, or otherwIse processed by any InIormatIon
processIng equIpment. CompromIsIng emanatIons consIst oI eIectrIcaI or acoustIcaI energy emItted Irom
wIthIn equIpment or systems (e.g., personaI computers, workstatIons, IacsImIIe machInes, prInters,
copIers, typewrIters) whIch process natIonaI securIty InIormatIon.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]Iam]

C CC Computer SecurIty Act SensItIve nIormatIon omputer SecurIty Act SensItIve nIormatIon omputer SecurIty Act SensItIve nIormatIon omputer SecurIty Act SensItIve nIormatIon
Any InIormatIon, the Ioss, mIsuse, or unauthorIzed access to or modIIIcatIon oI whIch couId adverseIy
aIIect the natIonaI Interest or the conduct oI IederaI programs, or the prIvacy to whIch IndIvIduaIs are
entItIed under sectIon 5 USC552a (the PrIvacy Act), but whIch has not been specIIIcaIIy authorIzed under
crIterIa estabIIshed by an ExecutIve Order or an Act oI Congress to be kept secret In the Interest oI
natIonaI deIense or IoreIgn poIIcy." ReIerence PubIIc Law 100-235, The Computer SecurIty Act oI 1987,
whIch Is concerned wIth protectIng the avaIIabIIIty and IntegrIty as weII as the conIIdentIaIIty oI
InIormatIon.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."






106
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

CONARC ncIdent FIIes CONARC ncIdent FIIes CONARC ncIdent FIIes CONARC ncIdent FIIes
See See See See CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence FIeId ActIvIty, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence FIeId ActIvIty, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence FIeId ActIvIty, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence FIeId ActIvIty,
CounterInteIIIgence Records nIormatIon System (CRS) CounterInteIIIgence Records nIormatIon System (CRS) CounterInteIIIgence Records nIormatIon System (CRS) CounterInteIIIgence Records nIormatIon System (CRS)

A coIIectIon oI weekIy or bI-weekIy summarIes known as the CRS Reports. (p.46)

The CONARC FIIe system dupIIcates the nteIIIgence Command System. (p.50)

Source: UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI
RIghts. Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs by the staII oI the SubcommIttee on
ConstItutIonaI RIghts, CommIttee on the ]udIcIary, UnIted States Senate. WashIngton, U.S. Covernment
PrIntIng OIIIce, 1972, Y 4.] 89]2:AR 5]3, avaIIabIe at The Memory HoIe,
http:]]www.thememoryhoIe.org]2009]05]army-surveIIIance]

ConIIdentIaI ConIIdentIaI ConIIdentIaI ConIIdentIaI
See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon
CrImInaI InteIIIgence reports not desIgnated as sensItIve; and nIormatIon obtaIned through InteIIIgence
unIt channeIs that Is not cIassIIIed as sensItIve and Is Ior Iaw enIorcement use onIy.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404
ConIIdentIaI 8usIness nIormatIon 8usIness ProprIetary nIormatIon ConIIdentIaI 8usIness nIormatIon 8usIness ProprIetary nIormatIon ConIIdentIaI 8usIness nIormatIon 8usIness ProprIetary nIormatIon ConIIdentIaI 8usIness nIormatIon 8usIness ProprIetary nIormatIon
1. The ToxIc Substances ControI Act (TSCA) aIIows chemIcaI manuIacturers and others who
manuIacture or market chemIcaI-reIated substances and products to wIthhoId InIormatIon that Is
consIdered proprIetary or a trade secret.
The term conIIdentIaI busIness InIormatIon means trade secrets or conIIdentIaI commercIaI or IInancIaI
InIormatIon under FFRA sectIon 10(b) or 5 U.S.C. 552(b) (3) or (4). AIso known as "SensItIve 8usIness
nIormatIon" and "Trade Secret nIormatIon."

Source: EnvIronmentaI ProtectIon Agency. "SpecIaI RevIew Procedures." 40 CFR 154.3,
http:]]www.gpoaccess.gov]cIr]Index.htmI

2. Documents that can be dIscIosed may be subject to conIIdentIaIIty protectIon so as to
compIeteIy thwart the purpose oI dIscIosure.







107
Source: ]acqueIIne M. Warren. "ProbIems Encountered wIth ConIIdentIaIIty 8ars on ToxIc Substances
DIscIosure mposed by FederaI EnvIronmentaI Statutes." New York UnIversIty EnvIronmentaI Law ]ournaI 2
no. 2 (1993): 292-299. http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI

3. When the FOA was enacted, Congress recognIzed the need to protect conIIdentIaI busIness
InIormatIon, emphasIzIng that a IederaI agency shouId honor the promIses oI conIIdentIaIIty gIven to
submItters oI such data because "a cItIzen must be abIe to conIIde In hIs government."

Source: DO]. FOA Update. "ProtectIng 8usIness nIormatIon."
http:]]www.usdoj.gov]oIp]IoIaupdates]VoIV4]page1.htm

4. The U.S. nternatIonaI Trade CommIssIon aIIows busInesses submIttIng certaIn busIness data to
mark the data as conIIdentIaI busIness InIormatIon or busIness proprIetary InIormatIon. 8oth terms have
the same deIInItIon, but there are some dIIIerences In how the CommIssIon appIIes the terms In practIce.
See generaIIy nspector CeneraI, U.S. nternatIonaI Trade CommIssIon, nspectIon Report No. 02-98, and
RevIew oI CommIssIon PoIIcIes Ior MarkIng ControIIed Data,

ConIIdentIaI busIness InIormatIon Is InIormatIon whIch concerns or reIates to the trade secrets, processes,
operatIons, styIe oI works, or apparatus, or to the productIon, saIes, shIpments, purchases, transIers,
IdentIIIcatIon oI customers, InventorIes, or amount or source oI any Income, proIIts, Iosses, or
expendItures oI any person, IIrm, partnershIp, corporatIon, or other organIzatIon, or other InIormatIon oI
commercIaI vaIue, the dIscIosure oI whIch Is IIkeIy to have the eIIect oI eIther ImpaIrIng the CommIssIon's
abIIIty to obtaIn such InIormatIon as Is necessary to perIorm Its statutory IunctIons, or causIng substantIaI
harm to the competItIve posItIon oI the person, IIrm, partnershIp, corporatIon, or other organIzatIon Irom
whIch the InIormatIon was obtaIned, unIess the CommIssIon Is requIred by Iaw to dIscIose such
InIormatIon. The term ``conIIdentIaI busIness InIormatIon'' IncIudes ``proprIetary InIormatIon'' wIthIn the
meanIng oI sectIon 777(b) oI the TarIII Act oI 1930 (19 U.S.C. 1677I (b)). NonnumerIcaI characterIzatIons
oI numerIcaI conIIdentIaI busIness InIormatIon (e.g., dIscussIon oI trends) wIII be treated as conIIdentIaI
busIness InIormatIon onIy at the request oI the submItter Ior good cause shown.

Source: U.S. nternatIonaI Trade CommIssIon. 19 CFR 201.6(a). 19 CFR 207.7(a) (1).
See aIso 19 USC 1332(g), 19 USC 1673e(c) (4) (A), http:]]www.gpoaccess.gov]CFR]Index.htmI and
http:]]www.usItc.gov]oIg]OC-R-02-98.pdI

ConIIdentIaI ConIIdentIaI ConIIdentIaI ConIIdentIaI- -- -CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen
A cItIzen oI the UnIted States who has undergone a background InvestIgatIon by an authorIzed U.S.
Covernment Agency and been Issued a ConIIdentIaI securIty cIearance In accordance wIth ExecutIve
Orders 12968 and 10450 and ImpIementIng guIdeIInes and standards pubIIshed In 32 CFR Part 147.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]Iam]







108
ConIIden ConIIden ConIIden ConIIdentIaI CommercIaI nIormatIon tIaI CommercIaI nIormatIon tIaI CommercIaI nIormatIon tIaI CommercIaI nIormatIon
Records provIded by a submItter that may contaIn materIaI exempt Irom reIease under the FOA because
dIscIosure couId reasonabIy be expected to cause the submItter substantIaI competItIve harm.

Source: "PubIIc AvaIIabIIIty oI Records." 36 CFR 1250.2, http:]]www.gpoaccess.gov]CFR]Index.htmI

ConIIdentIaIIty ConIIdentIaIIty ConIIdentIaIIty ConIIdentIaIIty
Assurance that InIormatIon Is not dIscIosed to unauthorIzed IndIvIduaIs, processes, or devIces.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

ConIIdentIaI Source ConIIdentIaI Source ConIIdentIaI Source ConIIdentIaI Source
Any IndIvIduaI or organIzatIon that has provIded, or that may reasonabIy be expected to provIde,
InIormatIon to the UnIted States on matters pertaInIng to the natIonaI securIty wIth the expectatIon that
the InIormatIon or reIatIonshIp, or both, are to be heId In conIIdence.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI
ConIIrmatIon oI nIormatIon (nteIIIgence) ConIIrmatIon oI nIormatIon (nteIIIgence) ConIIrmatIon oI nIormatIon (nteIIIgence) ConIIrmatIon oI nIormatIon (nteIIIgence)
An InIormatIon Item Is saId to be conIIrmed when It Is reported Ior the second tIme, preIerabIy by another
Independent source whose reIIabIIIty Is consIdered when conIIrmIng InIormatIon.

Source: DoD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

ConIusIon Agent ConIusIon Agent ConIusIon Agent ConIusIon Agent
An IndIvIduaI who Is dIspatched by the sponsor Ior the prImary purpose oI conIoundIng the InteIIIgence or
counterInteIIIgence apparatus oI another country rather than Ior the purpose oI coIIectIng and
transmIttIng InIormatIon.

Source: DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02. As Amended through 31
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

[NatIonaI nteIIIgence Program] CongressIonaI 8udget ]ustIIIcatIon 8ooks [NatIonaI nteIIIgence Program] CongressIonaI 8udget ]ustIIIcatIon 8ooks [NatIonaI nteIIIgence Program] CongressIonaI 8udget ]ustIIIcatIon 8ooks [NatIonaI nteIIIgence Program] CongressIonaI 8udget ]ustIIIcatIon 8ooks (C8]8s) (C8]8s) (C8]8s) (C8]8s)
See Op See Op See Op See OperatIonaI FIIes eratIonaI FIIes eratIonaI FIIes eratIonaI FIIes
1. ]ustIIIcatIon materIaIs on natIonaI programs are submItted to the two InteIIIgence commIttees
aIong wIth cIassIIIed C8]8s, whIch IncIude one voIume Ior each NP program pIus an addItIonaI summary
voIume. The cIassIIIed books, avaIIabIe to Members and commIttee staII, IncIude expIanatory narratIve and






109
resource dIspIays Ior aII resources requested by the program. AIso IncIuded are descrIptIons oI base
IeveIs oI eIIorts, ongoIng InItIatIves and new InItIatIves wIth assocIated resource dIspIays. C8]8s are
submItted to Congress wIthIn a Iew weeks oI the deIIvery oI the budget In earIy February and Iorm the
basIs Ior the commIttees' revIew oI the entIre NP prIor to the draItIng oI annuaI InteIIIgence authorIzatIon
bIIIs.
CIassIIIed budget justIIIcatIon books, provIded by the AdmInIstratIon to Congress, are the prImary ways, In
addItIon to oraI testImony, by whIch Congress obtaIns InIormatIon about InteIIIgence programs. n 1997
HPSC [House Permanent SeIect CommIttee on nteIIIgence] crItIcIzed justIIIcatIon books Ior IackIng
"severaI crItIcaI components necessary Ior the CommIttee to ensure proper aIIgnment oI IundIng wIthIn
the IundIng approprIatIons categorIes. CIear IdentIIIcatIon oI each project; Its specIIIc budget request
numbers; the approprIatIon category (e.g., Other Procurement, DeIense-wIde; RDT&E, Navy, etc.); the
budget request IIne number, and II a research and deveIopment project, the Program EIement number
[are] essentIaI to thIs task....
Source: RIchard A. 8est, ]r. "nteIIIgence, SurveIIIance, and ReconnaIssance (SR) Programs: ssues Ior
Congress." CRS Report to Congress February 22, 2005. http:]]www.Ias.org]sgp]crs]InteI]RL32508.pdI
and DoD FInancIaI Management ReguIatIon VoIume 28, Chapter 16 "nteIIIgence Programs]ActIvItIes." ]une
2004, http:]]www.dod.mII]comptroIIer]Imr]02b]02b16.pdI.
2. The CommIttee [Permanent SeIect CommIttee on nteIIIgence] has become IncreasIngIy
Irustrated wIth the Iack oI detaII provIded In the project descrIptIons In the NatIonaI ForeIgn nteIIIgence
Program (NFP) C8]8s. Further, the CommIttee beIIeves that the IInancIaI management practIces at some
NFP agencIes are so Inadequate that specIIIc project-IeveI IInancIaI InIormatIon Is not even weII known
corporateIy. For exampIe, In preparatIon Ior the budget authorIzatIon, the CommIttee had to, once agaIn
ask representatIves Irom CA and NSA to provIde addItIonaI programmatIc InIormatIon on theIr systems
deveIopment actIvItIes--basIc InIormatIon that apparentIy was not readIIy avaIIabIe.
I NFP agencIes are unabIe to provIde detaIIed IInancIaI data Ior the congressIonaI oversIght process, the
CommIttee questIons whether they have the detaII necessary to make sound Investment decIsIons.
The CommIttee, thereIore, expects a change to the Iormat and content oI the NFP budget submIssIon.
SpecIIIcaIIy, the CommIttee wants aII Iuture NFP C8]8s to provIde the IoIIowIng InIormatIon on each
project vaIued at $1.0 mIIIIon or more (IncIudIng systems deveIoped by government personneI):
project mIssIon descrIptIon and budget Item justIIIcatIon;
key perIormance characterIstIcs and requIrements;
organIzatIons provIdIng management oversIght;
customers and products assocIated wIth the project;
contract InIormatIon;
budget breakout by program eIement number (RDT&E, Procurement, O&M) Ior the two proceedIng
IIscaI years, the budget year, the FYDP, and cost to compIete;






110
cIvIIIan and mIIItary manpower numbers and costs;
program hIghIIghts]pIanned program by type oI IundIng (RDT&E, Procurement, O&M) Ior the two
precedIng years, the budget year, and one year beyond the budget year;
project budgetary change summary and expIanatIon;
reIated program IundIng summary; and,
the project mIIestone scheduIe.
Source: nteIIIgence AuthorIzatIon Act Ior FIscaI Year 2001,
http:]]thomas.Ioc.gov]cgI-bIn]cpquery]TZ&report=hr620&dbname=106&
3. Freedom oI nIormatIon Act proceedIng In whIch pIaIntIII pro se Steven AItergood seeks
dIscIosure oI uncIassIIIed portIons oI the NatIonaI ReconnaIssance OIIIce (NRO) CongressIonaI 8udget
]ustIIIcatIon 8ook Ior FIscaI Year 2006. The requested InIormatIon has been wIthheId by deIendant NRO on
grounds that the requested record Is an "operatIonaI IIIe" that Is exempt Irom FOA processIng under 50
U.S.C. 403-5e.
Source: Steven AItergood v. NatIonaI ReconnaIssance OIIIce. Case No. 05-1307 (R8W),
http:]]www.Ias.org]sgp]IoIa]nro-cbjb]sa120505.pdI and ]udge WaIton's ruIIng In Steven AItergood v.
NatIonaI ReconnaIssance OIIIce, D.C. DIstrIct Case No. 05-1307, http:]]www.Ias.org]sgp]IoIa]nro-
cbjb]rbw072406.pdI

ConspIracy TheorIes ConspIracy TheorIes ConspIracy TheorIes ConspIracy TheorIes
8eIIeI that powerIuI, evII hIdden Iorces are secretIy manIpuIatIng the course oI worId events and hIstory.
ConspIracy theorIes are sImIIar to urban Iegends, but center around the Idea that powerIuI, evII hIdden
Iorces are secretIy manIpuIatIng the course oI worId events and hIstory and that nothIng Is as It seems.
InconvenIent Iacts such as these are reguIarIy Ignored or dIsmIssed by conspIracy theorIes In Iavor oI
extraordInarIIy compIex and convoIuted conspIracIes, Ior whIch there Is no evIdence, mereIy unInIormed
specuIatIon. NevertheIess, by bIamIng powerIuI aIIeged vIIIaIns, conspIracy theorIes IInd a wIde audIence
Ior whom suspIcIons are much more powerIuI In IormIng beIIeIs than IogIc, reason, or Iacts.

Source: U.S. State Department. nternatIonaI nIormatIon Programs. "DeIInItIons."
http:]]www.amerIca.gov]st]pubs-engIIsh]2005]]anuary]20050114144833atIahtneveI0.1894342.htmI
and NatIonaI SecurIty CouncII. "SubcuItures oI ConspIracy and MIsInIormatIon." NatIonaI Strategy Ior
CombatIng TerrorIsm,
http:]]www.gIobaIsecurIty.org]securIty]IIbrary]poIIcy]natIonaI]nsctsep2006sectIonv.htm
Content Management Content Management Content Management Content Management
The process oI capturIng and creatIng, managIng and storIng, and deIIverIng the substantIve detaIIs oI
structured and unstructured data.






111
Source: DIrector oI CentraI nteIIIgence DIrectIve 8]1. "nteIIIgence CommunIty PoIIcy on nteIIIgence
SharIng." ]une 4, 2004, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id8-1.htmI

Contractor Access RestrIcted nIormatIon Contractor Access RestrIcted nIormatIon Contractor Access RestrIcted nIormatIon Contractor Access RestrIcted nIormatIon
UncIassIIIed InIormatIon that InvoIves IunctIons reserved to the IederaI government as vested by the
ConstItutIon as Inherent power or as ImpIIed power as necessary Ior the proper perIormance oI Its dutIes.
n many Instances, CAR prevents contractors Irom makIng decIsIons that wouId aIIect current or Iuture
contracts and procurement procedures, prImarIIy durIng pre-award actIvItIes.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

ControI ControI ControI ControI
1. AuthorIty oI the agency that orIgInates InIormatIon, or Its successor In IunctIon, to reguIate
access to the InIormatIon.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. The Department's IegaI authorIty over a record, takIng Into account the abIIIty oI the
Department to use and dIspose oI the record as It sees IIt, to IegaIIy determIne the dIsposItIon oI a record,
the Intent oI the record's creator to retaIn or reIInquIsh controI over the record, the extent to whIch
Department personneI have read or reIIed upon the record, and the degree to whIch the record has been
Integrated Into the Department's record keepIng system or IIIes.

Source: 22 CFR 171. "ForeIgn ReIatIons, Department oI State." http:]]www.gpoaccess.gov]CFR]Index.htmI
(a detaIIed IIst oI records that are exempt under 5 U.S.C. 552a (k) (1). "The reason Ior InvokIng thIs
exemptIon Is to protect materIaI requIred to be kept secret In the Interest oI natIonaI deIense and IoreIgn
poIIcy").

ControIIed Access Ar ControIIed Access Ar ControIIed Access Ar ControIIed Access Area ea ea ea
SpecIIIcaIIy desIgnated areas wIthIn a buIIdIng where cIassIIIed InIormatIon may be handIed, stored,
dIscussed, or processed.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]Iam]

ControIIed DossIer ControIIed DossIer ControIIed DossIer ControIIed DossIer
FIIes oI a partIcuIarIy sensItIve nature due to substantIve content or method oI coIIectIon, whIch are
physIcaIIy segregated Irom the body oI ordInary materIaIs.







112
Source: DoD. Army ReguIatIon AR381-45. "nvestIgatIve Records ReposItory," August 25, 1989.,
http:]]www.army.mII]usapa]epubs]pdI]r38145.pdI

ControIIed nIormatIon ControIIed nIormatIon ControIIed nIormatIon ControIIed nIormatIon
1. nIormatIon conveyed to an adversary In a deceptIon operatIon to evoke desIred apprecIatIons.
2. nIormatIon and IndIcators deIIberateIy conveyed or denIed to IoreIgn targets to evoke InvaIId
oIIIcIaI estImates that resuIt In IoreIgn oIIIcIaI actIons advantageous to US Interests and objectIves.

Source: DoD. The Department oI DeIense DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon ControIIed UncIassIIIed nIormatIon
See SensItIve 8ut UncIassIIIed, See SensItIve 8ut UncIassIIIed, See SensItIve 8ut UncIassIIIed, See SensItIve 8ut UncIassIIIed, UncIassIIIed nIorma UncIassIIIed nIorma UncIassIIIed nIorma UncIassIIIed nIormatIon tIon tIon tIon
Note: Note: Note: Note: See Cen. CIapper's poIIcy dIrectIve AprII 7, 2009, "CIarIIIcatIon oI Current DoD PoIIcy on ControIIed
UncIassIIIed nIormatIon (CU)." http:]]www.Ias.org]sgp]cuI]ousd040709.pdI

1. UncIassIIIed InIormatIon to whIch access or dIstrIbutIon IImItatIons have been appIIed accordIng
to natIonaI Iaws, poIIcIes and reguIatIons oI the U.S. government. These types oI InIormatIon IncIude, but
are not IImIted to: patent secrecy data, conIIdentIaI medIcaI records, Inter- and Intra-agency memoranda
whIch are deIIberatIve In nature, data compIIed Ior Iaw enIorcement purposes, data obtaIned Irom a
company on a conIIdentIaI basIs, empIoyee personaI data, PrIvacy Act InIormatIon, InternaI ruIes and
practIces oI a government agency, whIch II reIeased, wouId cIrcumvent an agency poIIcy and Impede the
agency In the conduct oI Its mIssIon.
Source: Department oI the Army. Army ReguIatIon 380-10, "ForeIgn DIscIosure and Contacts wIth ForeIgn
RepresentatIves," ]une 22, 2005, http:]]www.Ias.org]Irp]DoDdIr]army]ar380-10.pdI, FAS, "U.S. Army's
Concerns wIth ProtectIon oI ControIIed UncIassIIIed nIormatIon," August 15, 2008,
http:]]www.Ias.org]sgp]othergov]dod]dIb-cuI.pdI, DanIeI WasserbIy, "Army Cyber Task Force To Manage
CrowIng ndustrIaI EspIonage RIsk," nsIde the Army, October 20, 2008,
http:]]deIensenewsstand.com]InsIder.aspZIssue=10202008sp, FAS nternatIonaI Programs SecurIty
Handbook Chapter 4. OIIIce oI the Deputy to the Under Secretary oI DeIense (PoIIcy) Ior PoIIcy Support,
1993, http:]]www.Ias.org]sgp]IIbrary]Ipshbook]Chap04.htmI and
http:]]www.Ias.org]sgp]IIbrary]Ipshbook]appq.htmI
2. ControIIed UncIassIIIed InIormatIon (CU) Is the categorIcaI desIgnatIon that reIers to uncIassIIIed
InIormatIon that does not meet the standards Ior NatIonaI SecurIty CIassIIIcatIon under ExecutIve Order
12958, as amended, but Is:
pertInent to the natIonaI Interests oI the UnIted States or to the Important Interests oI entItIes
outsIde the FederaI Covernment
under Iaw or poIIcy requIres protectIon Irom unauthorIzed dIscIosure, specIaI handIIng
saIeguards, or prescrIbed IImIts on exchange or dIssemInatIon






113
Source: NatIonaI ArchIves and Records AdmInIstratIon, ControIIed UncIassIIIed nIormatIon OIIIce,
http:]]www.archIves.gov]cuI]

3. `(1) CONTROLLED UNCLASSFED NFORMATON- The term `controIIed uncIassIIIed InIormatIon'
means a categorIcaI desIgnatIon that reIers to uncIassIIIed InIormatIon, IncIudIng uncIassIIIed InIormatIon
wIthIn the scope oI the InIormatIon sharIng envIronment estabIIshed under sectIon 1016 oI the
nteIIIgence ReIorm and TerrorIsm PreventIon Act oI 2004 (6 U.S.C. 485), IncIudIng uncIassIIIed homeIand
securIty InIormatIon, terrorIsm InIormatIon, and weapons oI mass destructIon InIormatIon (as deIIned In
such sectIon) and uncIassIIIed natIonaI InteIIIgence (as deIIned In sectIon 3(5) oI the NatIonaI SecurIty Act
oI 1947 (50 U.S.C. 401a(5))), that does not meet the standards oI NatIonaI SecurIty CIassIIIcatIon under
ExecutIve Order 12958, as amended, but Is (I) pertInent to the natIonaI Interests oI the UnIted States or to
the Important Interests oI entItIes outsIde the FederaI Covernment, and (II) under Iaw or NatIonaI ArchIves
and Records AdmInIstratIon poIIcy requIres saIeguardIng Irom unauthorIzed dIscIosure, specIaI handIIng
saIeguards, or prescrIbed IImIts on exchanges or dIssemInatIon.

Source: H.R. 6193, ""mprovIng PubIIc Access to Documents Act oI 2008,"
http:]]thomas.Ioc.gov]cgI-bIn]query]FZc110:16:.]temp]~mdbsVhIea]:e19883:; can't teII II thIs was
passed by the Senate http:]]thomas.Ioc.gov]cgI-bIn]bdquery]zZd110:h.r.06193: ; aIso see Open the
Covernment.org, http:]]www.openthegovernment.org]artIcIe]artIcIevIew]49]1]16 and DoD, eIImInatIng
S8U Ior CU, http:]]www.ombwatch.org]artIcIe]artIcIevIew]4140]

3. Creates a sIngIe poIIcy Ior the government, reducIng over 100 dIIIerent S8U markIngs to three:
Standard SaIeguardIng and standard DIssemInatIon;
Standard SaIeguardIng and specIIIed DIssemInatIon; and
Enhanced SaIeguardIng and SpecIIIed DIssemInatIon.

DescrIbes the mandatory standards Ior the desIgnatIng, markIng, saIeguardIng, and dIssemInatIng oI aII
controIIed uncIassIIIed terrorIsm-reIated InIormatIon orIgInated by the FederaI Covernment and shared
wIthIn the SE, regardIess oI the medIum used Ior Its dIspIay, storage, or transmIttaI;31 and StrongIy
encourages Its adoptIon by SLT and prIvate sector entItIes.

On May 9, 2008, the PresIdent Issued a memorandum requIrIng agencIes to ImpIement the CU Iramework.
n addItIon, the PresIdent desIgnated the NatIonaI ArchIves and Records AdmInIstratIon (NARA) as the
ExecutIve Agent. NARA, In coordInatIon wIth a CU CouncII, wIII govern the new Framework and oversee Its
ImpIementatIon.

Source: Program Manager, nIormatIon SharIng EnvIronment. AnnuaI Report to Congress on the
nIormatIon SharIng EnvIronment, ]une 30 2008, http:]]www.Ise.gov]docs]reports]AnnuaI-Report-to-
Congress-20080702.pdI

ControIIed UncIassIIIed nIormatIon OIIIce ControIIed UncIassIIIed nIormatIon OIIIce ControIIed UncIassIIIed nIormatIon OIIIce ControIIed UncIassIIIed nIormatIon OIIIce






114
The mIssIon oI the ControIIed UncIassIIIed nIormatIon OIIIce (CUO) Is to oversee and manage the
ImpIementatIon oI the CU Framework to accompIIsh the duaI objectIves oI ImprovIng the sharIng oI vItaI
InIormatIon wIth our NatIon's deIenders who need It whIIe aIso protectIng the prIvacy and other IegaI
rIghts oI AmerIcans.
DeveIop and Issue CU poIIcy standards and ImpIementatIon guIdance consIstent wIth the
PresIdents Memorandum, IncIudIng approprIate recommendatIons to State, IocaI, trIbaI, prIvate
sector, and IoreIgn partner entItIes Ior ImpIementIng the CU Framework.
EstabIIsh new saIeguardIng and dIssemInatIon controIs, as approprIate, and upon a determInatIon
that extraordInary cIrcumstances warrant the use oI addItIonaI CU markIngs, authorIze the use oI
such addItIonaI markIngs.
EstabIIsh and chaIr the CU CouncII.
EstabIIsh, approve, and maIntaIn saIeguardIng standards and dIssemInatIon InstructIons
IncIudIng, "SpecIIIed DIssemInatIon" requIrements proposed by the head oI departments and
agencIes.

Source: NatIonaI ArchIves and Records AdmInIstratIon, ControIIed UncIassIIIed nIormatIon OIIIce,
http:]]www.archIves.gov]cuI]

CopyrIght CopyrIght CopyrIght CopyrIght
See Patents, See Patents, See Patents, See Patents, Trademarks, Trade Secrets Trademarks, Trade Secrets Trademarks, Trade Secrets Trademarks, Trade Secrets
CopyrIght Is but one oI IIve prIncIpaI Iorms oI AmerIcan InteIIectuaI property ("P") Iaw, a category that
IncIudes trademarks, patents, trade secrets, and IIcenses.

Source: K. Matthews Dames, "The copyrIght Iandscape" OnIIne September 1, 2006,
http:]]www.aIIbusIness.com]IegaI]InteIIectuaI-property-Iaw-copyrIght]10548080-1.htmI

CopyrIght Law oI the UnIted States oI AmerIca CopyrIght Law oI the UnIted States oI AmerIca CopyrIght Law oI the UnIted States oI AmerIca CopyrIght Law oI the UnIted States oI AmerIca
A Iorm oI protectIon provIded to the authors oI "orIgInaI works oI authorshIp" IncIudIng IIterary, dramatIc,
musIcaI, artIstIc, and certaIn other InteIIectuaI works, both pubIIshed and unpubIIshed. The 1976
CopyrIght Act generaIIy gIves the owner oI copyrIght the excIusIve rIght to reproduce the copyrIghted
work, to prepare derIvatIve works, to dIstrIbute copIes or phonorecords oI the copyrIghted work, to
perIorm the copyrIghted work pubIIcIy, or to dIspIay the copyrIghted work pubIIcIy.
The copyrIght protects the Iorm oI expressIon rather than the subject matter oI the wrItIng. For exampIe,
a descrIptIon oI a machIne couId be copyrIghted, but thIs wouId onIy prevent others Irom copyIng the
descrIptIon; It wouId not prevent others Irom wrItIng a descrIptIon oI theIr own or Irom makIng and usIng
the machIne. CopyrIghts are regIstered by the CopyrIght OIIIce oI the LIbrary oI Congress.
Source: UnIted States CopyrIght OIIIce. "CeneraI nIormatIon ConcernIng Patents."
http:]]www.uspto.gov]web]oIIIces]pac]doc]generaI]#copyrIght






115

CounterInIormatIon CounterInIormatIon CounterInIormatIon CounterInIormatIon
ActIons dedIcated to controIIIng the InIormatIon reaIm.

Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995. [At the Wayback
MachIne, http:]]web.archIve.org]web]20040901091302]http:]]www.aI.mII]IIb]corner.htmI]
Counter Counter Counter Counter- -- -nIormatIon Team nIormatIon Team nIormatIon Team nIormatIon Team
See See See See 8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs 8ureau oI nternatIonaI nIormatIon Programs, PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy
"n coordInatIon wIth the CA, F8 and others, the team heIps U.S. embassIes IdentIIy and rebut other
natIons' dIsInIormatIon, most oIten IabrIcatIons about the UnIted States pIanted In IoreIgn newspapers or
teIevIsIon shows and, these days, on the nternet."
Source: Sourcewatch, http:]]www.sourcewatch.org]Index.phpZtItIe=Counter-nIormatIonTeam

CounterInteIIIgence CounterInteIIIgence CounterInteIIIgence CounterInteIIIgence
1. nIormatIon gathered, and actIvItIes conducted, to protect agaInst espIonage, other InteIIIgence
actIvItIes, sabotage, or assassInatIons conducted by or on behaII oI IoreIgn governments or eIements
thereoI, IoreIgn organIzatIons, or IoreIgn persons, or InternatIonaI terrorIst actIvItIes.
Source: NatIonaI SecurIty Act oI 1947, as amended (50 U.S.C. Chapter 15, 401(a)
,http:]]www.gpoaccess.gov]uscode]browse.htmI and ExecutIve Order 12333, 3.4. "UnIted States
nteIIIgence ActIvItIes."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1981-reagan.htmI
2. nIormatIon gathered and actIvItIes conducted to protect agaInst espIonage, other InteIIIgence
actIvItIes, sabotage, or assassInatIons conducted by or on behaII oI IoreIgn governments or eIements
thereoI, IoreIgn organIzatIons, or IoreIgn persons, or InternatIonaI terrorIst actIvItIes. (MarIne Corps)
WIthIn the MarIne Corps, counterInteIIIgence constItutes actIve and passIve measures Intended to deny
threat Iorce vaIuabIe InIormatIon about the IrIendIy sItuatIon, to detect and neutraIIze hostIIe InteIIIgence
coIIectIon, and to deceIve the enemy as to IrIendIy capabIIItIes and IntentIons.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
3. As deIIned In ExecutIve Order 12333, IncIudes "InIormatIon gathered" and "actIvItIes
conducted" In order to "to protect agaInst espIonage, other InteIIIgence actIvItIes, sabotage or
assassInatIon conducted on behaII oI IoreIgn powers, organIzatIons, or persons, or InternatIonaI terrorIst
actIvItIes but not IncIudIng personneI, physIcaI documents or communIcatIons securIty."







116
Source: ExecutIve Order 12333, http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1981-
reagan.htmI, and U.S. Department oI DeIense. "DoD CounterInteIIIgence FunctIonaI ServIces," DoD
nstructIon 5240.16, May 21, 2005, http:]]www.Ias.org]Irp]DoDdIr]DoD]I524016.pdI

Count Count Count CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum erInteIIIgence AnaIysIs 8ranch (CA8) CompendIum erInteIIIgence AnaIysIs 8ranch (CA8) CompendIum erInteIIIgence AnaIysIs 8ranch (CA8) CompendIum
See CounterInteIIIgence FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts See CounterInteIIIgence FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts See CounterInteIIIgence FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts See CounterInteIIIgence FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts
8oth voIumes whIch were cIassIIIed "SECRET," are entItIed CIvII DIsturbances and DIssIdence, VoIume 1 Is
subtItIed CItIes and OrganIzatIons oI nterest . VoIume 2 subtItIed PersonaIItIes oI nterest. 8oth were
prepared by the CounterInteIIIgence AnaIysIs 8ranch (CA8) and bear the ImprInt oI Headquarters,
Department oI the Army; OIIIce oI the AssIstant ChIeI oI StaII Ior nteIIIgence." Each opens wIth an
acknowIedgement that the basIc InIormatIon on organIzatIons and IndIvIduaIs contaIned thereIn was
provIded prImarIIy by the FederaI 8ureau oI nvestIgatIon.

The CompendIum empIoyed a Ioose-IeaI Iormat to IacIIItate the contInuaI updatIng oI InIormatIon.
StandardIzed Iormats were prescrIbed to assure unIIormIty In the presentatIon oI sIgnIIIcant data. New
InIormatIon was to be Interested In the Iorm oI repIacement pages. Users were encouraged to Iorward any
InIormatIon In theIr possessIon whIch couId IIII exIstIng gaps or add substantIve knowIedge to the present
treatment oI any cIty, organIzatIon, or personaIIty covered. (p.10)

n speakIng oI surveIIIance oI the AmerIcan FrIends ServIces CommIttee and "bIack organIzatIons," the
report states (p.12): "AIIegatIons oI possIbIe subversIve InIIuence appear IrequentIy [sIc, In the
CompendIum], usuaIIy wIthout reIerence to the source oI the charge , the evIdence on whIch It Is based, or
any expIanatIon oI what constItutes a 'subversIve group' or 'communIst Iront.'" SeveraI paragraphs Iater,
the report contInues ".the Army IndIscrImInateIy Iumped together organIzatIons oI unquestIoned
IegItImacy and IegaIIty (even In the eyes oI the Army) together wIth those Iew groups popuIarIy regarded
as havIng empIoyed unIawIuI methods In pursuIt oI theIr ends. n no case, however, was there prooI that
even these Iatter groups had vIoIated the Iaw, Iet aIone that they constItuted any threat to natIonaI
securIty."

Numerous copes oI the CompendIum were aIIegedIy destroyed aIter a 1970 ChIcago Sun TImes (p.20)
artIcIe broke news regardIng the document, "but thIs has not been assured."

Source: Source: AIan LeMond and Ron Fry. . . . No PIace to HIde. New York: St. MartIn's Press, 1975, UnIted
States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI RIghts. Army
SurveIIIance oI CIvIIIans: A Documentary AnaIysIs by the staII oI the SubcommIttee on ConstItutIonaI
RIghts, CommIttee on the ]udIcIary, UnIted States Senate. WashIngton, U.S. Covernment PrIntIng OIIIce,
1972, Y 4.] 89]2:AR 5]3, avaIIabIe at The Memory HoIe, http:]]www.thememoryhoIe.org]2009]05]army-
surveIIIance]

CounterInteIIIgence AnaIytIcaI Research Data System (CARDS CounterInteIIIgence AnaIytIcaI Research Data System (CARDS CounterInteIIIgence AnaIytIcaI Research Data System (CARDS CounterInteIIIgence AnaIytIcaI Research Data System (CARDS)
See See See See Data MInIng Data MInIng Data MInIng Data MInIng






117
Department oI Energy's nventory oI Data MInIng EIIorts. s used to Iog brIeIIngs and debrIeIIngs gIven
to DOE empIoyees who traveI to IoreIgn countrIes or Interact wIth IoreIgn vIsItors to DOE IacIIItIes. Data
are mIned to IdentIIy potentIaI threats to DOE assets;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

CounterInteIIIgence Automated nvestIgatIve Management System (C CounterInteIIIgence Automated nvestIgatIve Management System (C CounterInteIIIgence Automated nvestIgatIve Management System (C CounterInteIIIgence Automated nvestIgatIve Management System (C- -- -AMS) AMS) AMS) AMS)
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
Department oI Energy's nventory oI Data MInIng EIIorts. s an InvestIgatIve management system used by
Department oI Energy (DOE) IIeId sItes to track InvestIgatIve cases on IndIvIduaIs or countrIes that threaten
DOE assets. nIormatIon stored In thIs database Is aIso used to support IederaI and state Iaw enIorcement
agencIes In support oI natIonaI securIty;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: No.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

CounterInteIIIgence CoIIectIon CounterInteIIIgence CoIIectIon CounterInteIIIgence CoIIectIon CounterInteIIIgence CoIIectIon
The systematIc acquIsItIon oI InIormatIon concernIng espIonage, sabotage, terrorIsm, other InteIIIgence
actIvItIes or assassInatIons conducted by or on behaII oI terrorIsts, IoreIgn powers, and other entItIes.

Source: DoD. "DoD CounterInteIIIgence CoIIectIon ReportIng." DoD 5240.17. October 26,
2005,http:]]www.Ias.org]Irp]doddIr]dod]I524017.pdI

CounterInteIIIgence FIeId ActIvIty (CFA) CounterInteIIIgence FIeId ActIvIty (CFA) CounterInteIIIgence FIeId ActIvIty (CFA) CounterInteIIIgence FIeId ActIvIty (CFA)
See SpecIaI Ac See SpecIaI Ac See SpecIaI Ac See SpecIaI Access Programs, DeIense CounterInteIIIgence and Human nteIIIgence Center cess Programs, DeIense CounterInteIIIgence and Human nteIIIgence Center cess Programs, DeIense CounterInteIIIgence and Human nteIIIgence Center cess Programs, DeIense CounterInteIIIgence and Human nteIIIgence Center
1. The DeIense CounterInteIIIgence FIeId ActIvIty (CFA) Is a transIormatIon InItIatIve created to
Iead the deveIopment oI a "to-the-edge" counterInteIIIgence system Ior the Department oI DeIense. ts
mIssIon Is to produce a common DeIense Department counterInteIIIgence operatIonaI pIcture, and deIIver
unIque and actIonabIe InIormatIon to key decIsIon makers In IederaI, state and IocaI governments.
4.2. The Department wIII make IuII use oI advanced technoIogy to create and maIntaIn a coIIaboratIve C
anaIytIc envIronment to protect crItIcaI DoD and natIonaI assets.






118

4.4 AII DoD C matters and actIvItIes that aIIect or are reIated to DoD SpecIaI Access Programs (SAPs) shaII
compIy wIth the securIty procedures oI ExecutIve Order 12958 (reIerence (c)), DoD DIrectIve O-5205.7
(reIerence (d)), and the DoD OverprInt to the NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI
SuppIement (reIerence (e)).

6.2.8. DeveIop and Integrate the DeIense C nIormatIon System (DCS) Program, IncIudIng, but not IImIted
to, the archItecture, soItware deveIopment, traInIng, ImpIementatIon, and sustaInment oI the D.C.S whIIe
ensurIng the archItecturaI IntegrIty oI the system.

Source: NOTE: dead IInks - use the Wayback MachIne http:]]www.archIve.org]web]web.php - DeIense
SecurIty ServIce (DSS), "CounterInteIIIgence to the Edge," http:]]www.dss.mII]poIygraph]cIIa.htm and DoD
DIrectIve 5105.67, "Department oI DeIense CounterInteIIIgence FIeId ActIvIty (DoD CFA)," 02]19]2002,
http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI2]d510567x.htm; AIso see ]eIIrey RIcheIson's The
Pentagon's CounterspIes: The CounterInteIIIgence FIeId ActIvIty (CFA) EIectronIc 8rIeIIng 8ook the
NatIonaI SecurIty ArchIve, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88230]Index.htm

2. On August 3, 2008, aII DoD CFA C mIssIons, responsIbIIItIes, IunctIons, and
authorItIes as weII as aII assocIated resources IncIudIng aII personneI, support
contracts and contractors, and approprIate records and archIves shaII transItIon In
pIace to DA. PersonneI transIer notIIIcatIons, as approprIate and requIred, shaII be
accompIIshed In advance oI the August 3, 2008 transIer Irom DoD CFA to DA

Source: DoD. Deputy Secretary Ior DeIense, "EstabIIshment oI the DeIense CounterInteIIIgence and Human
nteIIIgence Center (D.C.HC)," DTM 08-032, ]uIy 22, 2008, http:]]www.Ias.org]Irp]doddIr]dod]D.C.hc.pdI

CounterInteIIIgence Records nIormatIon Sy CounterInteIIIgence Records nIormatIon Sy CounterInteIIIgence Records nIormatIon Sy CounterInteIIIgence Records nIormatIon System (CRS) stem (CRS) stem (CRS) stem (CRS)
See CONARC ncIdent FIIes, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence See CONARC ncIdent FIIes, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence See CONARC ncIdent FIIes, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence See CONARC ncIdent FIIes, CounterInteIIIgence AnaIysIs 8ranch (CA8) CompendIum, CounterInteIIIgence
FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts FIeId ActIvIty, Law EnIorcement nteIIIgence UnIts
1. AIso caIIed the Fort Monroe Data 8ank. "t contaIned thee basIc categorIes oI InIormatIon wIth a
cross-reIerence capabIIIty among them. The categorIes were IncIdents, personaIItIes, and
organIzatIons.InIormatIon Ior aII three IIIes was receIved Irom the IIve contInentaI armIes and the MIIItary
DIstrIct oI WashIngton (CONUSAMDW), the nteIIIgence Command, and the F8. Each oI these three
coIIectIon systems, In turn, gathered InIormatIon Irom state and munIcIpaI poIIce departments and the
news medIa" (p.45).

VoIumes 2-6 "PersonaIItIes edItIon" contaIn 2,269 pages oI detaIIed summarIes oI the poIItIcaI beIIeIs and
actIvItIes oI nearIy 5,000 peopIe, In addItIon to a 99-page Index to persons IIsted (p.51).

p. 72 oI the report detaIIs the Fort Hood "computerIzed storage system Ior cIvII dIsturbance and
InteIIIgence."







119
Source: UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI
RIghts. Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs by the staII oI the SubcommIttee on
ConstItutIonaI RIghts, CommIttee on the ]udIcIary, UnIted States Senate. WashIngton, U.S. Covernment
PrIntIng OIIIce, 1972, Y 4.] 89]2:AR 5]3, avaIIabIe at The Memory HoIe,
http:]]www.thememoryhoIe.org]2009]05]army-surveIIIance]

2. CRS was estabIIshed In ]anuary 1968, and computerIzed In May.

Source: AIan LeMond and Ron Fry.No PIace to HIde. New York: St. MartIn's Press, 1975. 229.

CounterterrorIsm CommunIcatIons Center CounterterrorIsm CommunIcatIons Center CounterterrorIsm CommunIcatIons Center CounterterrorIsm CommunIcatIons Center
An Interagency InItIatIve to deveIop and deIIver eIIectIve messages to undermIne IdeoIogIcaI support Ior
terror and to counter terrorIst propaganda. The Center [sIc, U.S. department oI State] provIdes IeadershIp
and coordInatIon Ior Interagency eIIorts In the war oI Ideas and seeks to Integrate and enhance the U.S.
Covernment's dIverse pubIIc dIpIomacy counterterrorIsm eIIorts.

Source: U.S. Senate CommIttee on HomeIand SecurIty and CovernmentaI AIIaIrs,
"VIoIent sIamIst ExtremIsm: Covernment EIIorts to DeIeat t," Statement oI ]eremy CurtIn, CoordInator,
8ureau oI nternatIonaI nIormatIon Programs, U.S. Department oI State, May 10, 2007,
http:]]www.InvestIgatIveproject.org]documents]testImony]284.pdI

Country Tap Country Tap Country Tap Country Tap
n speakIng oI NSA's warrantIess (emaIIs and phone) surveIIIance oI U.S. cItIzens as a counterterrorIsm
measure, Dr. 8rIan ReId wIth the EIectronIc FrontIer FoundatIon observed: "ThIs Is not a wIretap, thIs Is a
country-tap" [emphasIs added].

Source: KeIth PerIne, "]udIcIary Postpones DecIsIon on TeIecom mmunIty In ConsIderIng FSA 8III."
http:]]www.eII.org]pages]news-coverage-mark-kIeIn-washIngton and EFF, "NSA SpyIng,"
http:]]www.eII.org]Issues]nsa-spyIng

Court Court Court Court- -- -LegaI LegaI LegaI LegaI- -- -LItIgatIon Records ReIated LItIgatIon Records ReIated LItIgatIon Records ReIated LItIgatIon Records ReIated
See Pac See Pac See Pac See Pacer, Record, Records er, Record, Records er, Record, Records er, Record, Records
1. CeneraIIy consIdered pubIIc records, are pubIIshed and are avaIIabIe Irom the courts. The Supreme
Court has Iound a quaIIIIed FIrst Amendment rIght oI access to crImInaI trIaIs and to records dIrectIy
reIated to crImInaI trIaIs. Types oI court records (most deIInItIons taken Irom NoIo.com):

8rIeI: A document used to submIt a IegaI contentIon or argument to a court.
DIscovery documents: Used In pretrIaI InIormatIon gatherIng, most IederaI and state courts are
not requIrIng IItIgants to IIIe copIes oI pretrIaI deposItIons, InterrogatorIes and other documents
(FederaI RuIes oI CIvII Procedure 5 (d) ); It has been argued that the pretrIaI dIscIosure process Is
not a pubIIc matter (SeattIe TImes v. RhInehart, 1984)






120
Crand ]ury records: There Is no FIrst Amendment rIght oI access to grand jury proceedIngs.
Crand jurIes operate tradItIonaIIy and statutorIIy under strIct secrecy ruIes. The Supreme Court
has repeatedIy cIted severaI reasons Ior grand jury secrecy, IncIudIng the need to protect the
Innocent accused who Is exonerated. ThIs Is, at Ieast In part, a prIvacy Interest, and one oI a Iew
prIvacy Interests that can be cIearIy IdentIIIed as a IoII to the FIrst Amendment access Interests In
the crImInaI justIce system.
Source: Taken In part Irom Robert CeIIman Robert CeIIman Robert CeIIman Robert CeIIman, "PubIIc Records: Access, PrIvacy, and PubIIc PoIIcy: A DIscussIon
Paper." http:]]www.cdt.org]prIvacy]pubrecs]pubrec.htmI http:]]www.cdt.org]prIvacy]pubrecs]pubrec.htmI http:]]www.cdt.org]prIvacy]pubrecs]pubrec.htmI http:]]www.cdt.org]prIvacy]pubrecs]pubrec.htmI, DavId S. Sanson. "The PervasIve ProbIem oI
Court-SanctIoned Secrecy and the ExIgency oI NatIonaI ReIorm." 53 Duke L. ]. 807
http:]]www.Iaw.duke.edu]journaIs]dIj]artIcIes]dIj53p807.htm http:]]www.Iaw.duke.edu]journaIs]dIj]artIcIes]dIj53p807.htm http:]]www.Iaw.duke.edu]journaIs]dIj]artIcIes]dIj53p807.htm http:]]www.Iaw.duke.edu]journaIs]dIj]artIcIes]dIj53p807.htm, Center Ior Democracy and TechnoIogy. "A
QuIet RevoIutIon In the Courts: EIectronIc Access to State Court Records,"
http:]]www.cdt.org]pubIIcatIons]020821courtrecords.shtmI http:]]www.cdt.org]pubIIcatIons]020821courtrecords.shtmI http:]]www.cdt.org]pubIIcatIons]020821courtrecords.shtmI http:]]www.cdt.org]pubIIcatIons]020821courtrecords.shtmI, and Rocky MountaIn Chapter, SIerra CIub.
"Rocky FIats Crand ]ury Report PubIIshed," http:]]rmc.sIerracIub.org]rocky.shtmI http:]]rmc.sIerracIub.org]rocky.shtmI http:]]rmc.sIerracIub.org]rocky.shtmI http:]]rmc.sIerracIub.org]rocky.shtmI

]uror records: n some states, personaI juror records are seaIed by the court at the concIusIon oI a
crImInaI trIaI.
]uvenIIe records: n most states, juvenIIe court proceedIngs (IndIvIduaIs Iess than 21 years oId) are
cIosed to the press and pubIIc.
MemdIspos (Memorandum DIsposItIons or UnpubIIshed OpInIons): Pursuant to NInth CIrcuIt RuIe 36-
3, not pubIIshed In the FederaI Reporter, nor do they have precedentIaI vaIue. MemdIspos cannot
be cIted and are very controversIaI wIthIn the IegaI IIeId.

Source: Deborah ]ones MerrItt and ]ames ]. 8rudney "StaIkIng the Secret Law: What PredIcts PubIIcatIons In
the UnIted States Courts oI AppeaIs." VanderbIIt Law RevIew 54 (2001): 71, AIex KozInskI and Stephen
ReInhardt. "PIease Don't CIte ThIs: Why We Don't AIIow CItatIon to UnpubIIshed OpInIons."
http:]]www.nonpubIIcatIon.com]don'tZ20cIteZ20thIs.htm, "SorchInI II I v. CIty oI CovIna: ConcernIng
UnpubIIshed ]udIcIaI OpInIons," http:]]www.Ias.org]sgp]news]2001]05]sorchInI.htmI

OIIIcIaI reports: court reports dIrected by statute
SeaIed: Records determIned by eIther the Court or partIes, to be too sensItIve to be made pubIIc.
UnoIIIcIaI reports: pubIIshed wIthout statutory dIrectIon

2. A bIII to amend chapter 111 oI tItIe 28, UnIted States Code, reIatIng to protectIve orders, seaIIng oI
cases, dIscIosures oI dIscovery InIormatIon In cIvII actIons, and Ior other purposes. The purpose oI S.
2449, the SunshIne In LItIgatIon Act, Is to protect the pubIIc Irom potentIaI heaIth or saIety dangers that
are too oIten conceaIed by court orders restrIctIng dIscIosure oI InIormatIon.
Source: UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SunshIne In LItIgatIon Act oI 2008:
report (to accompany S. 2449). WashIngton, D.C.: U.S. C.P.O., 2008,
http:]]purI.access.gpo.gov]CPO]LPS99664






121
Covert Products Covert Products Covert Products Covert Products
A-5. Covert products requIre exceptIonaI coordInatIon, IntegratIon, and oversIght. The operatIons are
pIanned and conducted In such a manner that the responsIbIe agency or government Is not evIdent, and II
uncovered, the sponsor can pIausIbIy dIscIaIm any InvoIvement. Cray and bIack products are empIoyed In
covert operatIons.
Source: DoD PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

CrImInaI nteIIIgence CrImInaI nteIIIgence CrImInaI nteIIIgence CrImInaI nteIIIgence
Data whIch has been evaIuated to determIne that It Is reIevant to the IdentIIIcatIon oI and the crImInaI
actIvIty engaged In by an IndIvIduaI who or organIzatIon whIch Is reasonabIy suspected oI InvoIvement In
crImInaI actIvIty. [CertaIn crImInaI actIvItIes IncIudIng but not IImIted to Ioan sharkIng, drug traIIIckIng,
traIIIckIng In stoIen property, gambIIng, extortIon, smuggIIng, brIbery, and corruptIon oI pubIIc oIIIcIaIs
oIten InvoIve some degree oI reguIar coordInatIon and permanent organIzatIon InvoIvIng a Iarge number
oI partIcIpants over a broad geographIcaI area].

Source: ]udIcIaI AdmInIstratIon. 28 CFR 23, http:]]www.gpoaccess.gov]CFR]Index.htmI
CrImInaI nteIIIgence System CrImInaI nteIIIgence System CrImInaI nteIIIgence System CrImInaI nteIIIgence System
Arrangements, equIpment, IacIIItIes, and procedures used Ior the receIpt, storage, Interagency exchange
or dIssemInatIon, and anaIysIs oI crImInaI InteIIIgence InIormatIon.
Source: Department oI ]ustIce. "CrImInaI nteIIIgence nIormatIon OperatIng Systems." 28 CFR 23.3(b)(1) ,
http:]]www.gpoaccess.gov]CFR]Index.htmI

CrImInaI nvestIgatIon DIvIsIon Data MInIng CrImInaI nvestIgatIon DIvIsIon Data MInIng CrImInaI nvestIgatIon DIvIsIon Data MInIng CrImInaI nvestIgatIon DIvIsIon Data MInIng
U.S. Secret ServIce. MInes data In suspIcIous actIvIty reports receIved Irom
banks to IInd commonaIItIes In data to assIst In strategIcaIIy aIIocatIng resources;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

CrItIcaI and SensItIve CrItIcaI and SensItIve CrItIcaI and SensItIve CrItIcaI and SensItIve nIormatIon LIst nIormatIon LIst nIormatIon LIst nIormatIon LIst
A IIst contaInIng the most Important aspects oI a program or technoIogy, whether cIassIIIed or
uncIassIIIed, requIrIng protectIon Irom adversary expIoItatIon.






122
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
CrItIcaI Energy nIrastructure nIormatIon (CE CrItIcaI Energy nIrastructure nIormatIon (CE CrItIcaI Energy nIrastructure nIormatIon (CE CrItIcaI Energy nIrastructure nIormatIon (CE)
CE Is InIormatIon concernIng proposed or exIstIng crItIcaI InIrastructure (physIcaI or vIrtuaI) that:
ReIates to the productIon, generatIon, transmIssIon or dIstrIbutIon oI energy;
CouId be useIuI to a person pIannIng an attack on crItIcaI InIrastructure;
CIves strategIc InIormatIon beyond the IocatIon oI the crItIcaI InIrastructure.
CE s exempt Irom mandatory dIscIosure under the Freedom oI nIormatIon Act.
Source: FederaI Energy ReguIatory CommIssIon (FERC).
http:]]www.Ierc.gov]IegaI]ceII-IoIa]ceII.asp and FERC]DOE. "nIormatIon Requests." 18 CFR 388.113,
http:]]www.gpoaccess.gov]CFR]Index.htmI

CrItIcaI nIormatIon CrItIcaI nIormatIon CrItIcaI nIormatIon CrItIcaI nIormatIon
1. SpecIIIc Iacts about IrIendIy IntentIons, capabIIItIes, and actIvItIes vItaIIy needed by adversarIes
or competItors Ior them to pIan and act eIIectIveIy to guarantee IaIIure or unacceptabIe consequences Ior
mIssIon accompIIshment.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995.
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI and Department oI DeIense.
DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19 October 2009,
http:]]www.dtIc.mII]doctrIne]doddIctIonary]
CrItIcaI nIrastructure nIormatIon (C CrItIcaI nIrastructure nIormatIon (C CrItIcaI nIrastructure nIormatIon (C CrItIcaI nIrastructure nIormatIon (C)
See See See See Freedom oI nIormatIon Act ExemptIons, NatIonaI Asset Database Freedom oI nIormatIon Act ExemptIons, NatIonaI Asset Database Freedom oI nIormatIon Act ExemptIons, NatIonaI Asset Database Freedom oI nIormatIon Act ExemptIons, NatIonaI Asset Database
1. CrItIcaI nIrastructure has the deIInItIon reIerenced In sectIon 2 oI the HomeIand SecurIty Act
oI 2002 and means systems and assets, whether physIcaI or vIrtuaI, so vItaI to the UnIted States that the
IncapacIty or destructIon oI such systems and assets wouId have a debIIItatIng Impact on securIty, natIonaI
economIc securIty, natIonaI pubIIc heaIth or saIety, or any combInatIon oI those matters. The term "crItIcaI
InIrastructure InIormatIon" means InIormatIon not customarIIy In the pubIIc domaIn and reIated to the
securIty oI crItIcaI InIrastructure or protected systems-
(A) actuaI, potentIaI, or threatened InterIerence wIth, attack on, compromIse oI, or IncapacItatIon
oI crItIcaI InIrastructure or protected systems by eIther physIcaI or computer-based attack or
other sImIIar conduct (IncIudIng the mIsuse oI or unauthorIzed access to aII types oI
communIcatIons and data transmIssIon systems) that vIoIates FederaI, State, or IocaI Iaw, harms
Interstate commerce oI the UnIted States, or threatens pubIIc heaIth or saIety;






123
(8) the abIIIty oI any crItIcaI InIrastructure or protected system to resIst such InterIerence,
compromIse, or IncapacItatIon, IncIudIng any pIanned or past assessment, projectIon, or estImate
oI the vuInerabIIIty oI crItIcaI InIrastructure or a protected system, IncIudIng securIty testIng, rIsk
evaIuatIon thereto, rIsk management pIannIng, or rIsk audIt; or
(C) any pIanned or past operatIonaI probIem or soIutIon regardIng crItIcaI InIrastructure or
protected systems, IncIudIng repaIr, recovery, reconstructIon, Insurance, or contInuIty, to the
extent It Is reIated to such InterIerence, compromIse, or IncapacItatIon.
Source: Department oI HomeIand SecurIty PC
http:]]www.dhs.gov]dhspubIIc]dIspIayZtheme=52&content=3455 ;
CrItIcaI nIrastructure nIormatIon Act oI 2002 (TItIe SubtItIe 8, HomeIand SecurIty Act oI 2002, 6 U.S.C.
131-134), http:]]www.dhs.gov]Interweb]assetIIbrary]CAct.pdI
and CoaIItIon oI ]ournaIIsts Ior Open Covernment,
http:]]www.cjog.net]protestcrItIcaIInIrastructureI.htmI and Department oI HomeIand SecurIty.
"Protected CrItIcaI nIrastructure nIormatIon." 6 CFR 29.2, http:]]www.gpoaccess.gov]cIr]Index.htmI

2. A New ]ersey resIdent, requestIng access to a townshIp's eIectronIc map oI Iand parceIs, has
brought to IIght the IIrst pubIIc exampIe oI a Iaw that hIdes InIormatIon that meets standards Ior "crItIcaI
InIrastructure InIormatIon" (C). The IocaI munIcIpaI utIIIty denIed the resIdent's request Ior Iand parceI
InIormatIon, because the data had been protected by the Department oI HomeIand SecurIty (DHS) under
the C program.

Source: OM8 Watch. "FIrst PubIIc Case oI CrItIcaI nIrastructure nIormatIon." August 8, 2005,
http:]]www.ombwatch.org]artIcIe]artIcIevIew]2977]1]355

CrItIcaI nteIIIgence CrItIcaI nteIIIgence CrItIcaI nteIIIgence CrItIcaI nteIIIgence
nIormatIon oI such urgent Importance to the securIty oI the UnIted States that It Is dIrectIy transmItted at
the hIghest prIorIty to the PresIdent and other natIonaI decIsIonmakIng oIIIcIaIs beIore passIng through
reguIar evaIuatIve channeIs. n the mIIItary It Is InteIIIgence that requIres the ImmedIate attentIon oI the
commander. t IncIudes, but Is not IImIted to: (a) strong IndIcatIons oI the ImmedIate outbreak oI
hostIIItIes oI any type (warnIng oI attack); (b) aggressIon oI any nature agaInst a IrIendIy country; (c)
IndIcatIons or use oI nucIear]bIoIogIcaI chemIcaI weapons (targets); and (d) sIgnIIIcant events wIthIn
potentIaI enemy countrIes that may Iead to modIIIcatIons oI nucIear strIke pIans.

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA: NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2:C 76 and PREX 3.2]2:C 94
CrItIcaI OversIght nIormatIon CrItIcaI OversIght nIormatIon CrItIcaI OversIght nIormatIon CrItIcaI OversIght nIormatIon
See See See See SensItIve SecurIty nIormatIon SensItIve SecurIty nIormatIon SensItIve SecurIty nIormatIon SensItIve SecurIty nIormatIon
nIormatIon that speaks to the quaIIty and IntegrIty oI theIr perIormance as poIIcy makers, managers or
empIoyees oI our seaports, aIrports and transIt systems. t Is budget InIormatIon and detaIIs on revenue






124
and spendIng. t Is InIormatIon about personneI and theIr quaIIIIcatIons, traInIng and perIormance. t
Is InIormatIon about the constructIon and maIntenance oI new pubIIc assets, IncIudIng the myrIad change
orders that seem an InevItabIe Ieature oI the government contract process. t Is InIormatIon about deaIs
wIth carrIers and suppIIers and vendors and tenants. t Is aIso InIormatIon about pubIIc convenIence and
use oI the pubIIc areas -- and about personaI saIety.crItIcaI oversIght InIormatIon has a connectIon wIth
securIty.

Source: CoaIItIon oI ]ournaIIsts Ior Open Covernment, http:]]www.rcIp.org]news]documents]20040716-
ssIcomment.pdI

CrItIcaI Program nIormatIon (CP) CrItIcaI Program nIormatIon (CP) CrItIcaI Program nIormatIon (CP) CrItIcaI Program nIormatIon (CP)
13.1 CrItIcaI Program nIormatIon or CP, Is deIIned as that "key" InIormatIon about the program,
technoIogIes, and]or systems that II compromIsed wouId degrade combat eIIectIveness or shorten the
expected IIIe oI the system. CP may aIso provIde InsIght Into program vuInerabIIItIes, countermeasures,
and IImItatIons. UnauthorIzed access to thIs InIormatIon or systems couId aIIow someone to kIII, counter,
and cIone, negate, or degrade the system beIore or near the scheduIed depIoyment, IorcIng a major
desIgn change to maIntaIn the same IeveI oI eIIectIveness and capabIIIty. CP may be cIassIIIed or
uncIassIIIed InIormatIon. CIven the potentIaIIy grave consequences that can resuIt Irom the compromIse oI
CP, everyone who uses thIs sensItIve InIormatIon must ensure It Is adequateIy IdentIIIed and protected.

Source: AIr Force CIassIIIcatIon CuIde Ior the CIobaI 8roadcast System, AprII 29, 2007,
http:]]www.Ias.org]sgp]othergov]dod]gbs.pdI

CRS PubIIcatIon PoIIcy CRS PubIIcatIon PoIIcy CRS PubIIcatIon PoIIcy CRS PubIIcatIon PoIIcy
The reasons Ior IImItIng pubIIc dIssemInatIon oI our work can be summarIzed as
IoIIows. FIrst, there Is a danger that pIacIng CRS, a IegIsIatIve support agency, In an
IntermedIate posItIon, respondIng dIrectIy to constItuents as members oI the pubIIc, wouId threaten the
dIaIog on poIIcy Issues between Members and theIr constItuents that was envIsIoned by the ConstItutIon
as the essence oI the representatIonaI roIe oI Members. LeavIng dIssemInatIon oI CRS products to the
dIscretIon oI Members avoIds pIacIng a "IaceIess bureaucracy" between constItuents and theIr eIected
representatIve. (p.6)

Source: Access to CRS Reports Memorandum AprII 18, 2007,
http:]]Itp.Ias.org]sgp]crs]crs041807.pdI.

CryptographIc nIormatIon CryptographIc nIormatIon CryptographIc nIormatIon CryptographIc nIormatIon
AII InIormatIon sIgnIIIcantIy descrIptIve oI cryptographIc technIques and processes or oI cryptographIc
systems and equIpment (or theIr IunctIons and capabIIItIes) and aII cryptomaterIaI.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. As Amended through 19 October
2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]







125
Cryptography Cryptography Cryptography Cryptography

Art or scIence concernIng the prIncIpIes, means, and methods Ior renderIng pIaIn InIormatIon
unInteIIIgIbIe and Ior restorIng encrypted InIormatIon to InteIIIgIbIe Iorm.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary, ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

CuItIvatIon CuItIvatIon CuItIvatIon CuItIvatIon
A deIIberate and caIcuIated assocIatIon wIth a person Ior the purpose or recruItment, obtaInIng
InIormatIon, or gaInIng controI Ior these or other purposes.

Source: DoD. The Department oI DeIense DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CuIturaI DIpIomacy CuIturaI DIpIomacy CuIturaI DIpIomacy CuIturaI DIpIomacy
CuIturaI dIpIomacy, whIch has been deIIned as "the exchange oI Ideas, InIormatIon, art,
and other aspects oI cuIture among natIons and theIr peopIes In order to Ioster mutuaI
understandIng,"2 Is the IInchpIn oI pubIIc dIpIomacy; Ior It Is In cuIturaI actIvItIes that a
natIon's Idea oI ItseII Is best represented...

Source: MIIton C. CummIngs, ]r. CuIturaI DIpIomacy and the UnIted States Covernment: A Survey.
WashIngton, D.C.: Center Ior Arts and CuIture, 2003 and CuIturaI DIpIomacy
The LInchpIn oI PubIIc DIpIomacy: Report oI the AdvIsory CommIttee on CuIturaI DIpIomacy. U.S.
Department oI State, 2005, http:]]Iwp.uIowa.edu]about]CuIturaIDIpIomacyReport.pdI

CustodIan CustodIan CustodIan CustodIan
An IndIvIduaI who has possessIon oI or Is otherwIse charged wIth the responsIbIIIty Ior saIeguardIng and
accountIng Ior cIassIIIed InIormatIon.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]Iam]

Cyberwar Cyberwar Cyberwar Cyberwar
See See See See DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc
nIormatIon WarIare nIormatIon WarIare nIormatIon WarIare nIormatIon WarIare

ReIers to conductIng mIIItary operatIons accordIng to InIormatIon-reIated prIncIpIes. t means dIsruptIng
or destroyIng InIormatIon and communIcatIons systems. t means tryIng to know everythIng about an
adversary whIIe keepIng the adversary Irom knowIng much about oneseII. t means turnIng the "baIance oI
InIormatIon and knowIedge" In one's Iavor, especIaIIy II the baIance oI Iorces Is not. t means usIng






126
knowIedge so that Iess capItaI and Iabor may have to be expended.

ThIs Iorm oI warIare may InvoIve dIverse technoIogIes, notabIy Ior command and controI, Ior InteIIIgence
coIIectIon, processIng and dIstrIbutIon, Ior tactIcaI communIcatIons, posItIonIng, IdentIIyIng IrIend-or-Ioe,
and Ior "smart" weapons systems, to gIve but a Iew exampIes. t may aIso InvoIve eIectronIcaIIy bIIndIng,
jammIng, deceIvIng, overIoadIng and IntrudIng Into an adversary's InIormatIon and communIcatIons
cIrcuIts.

Source: ]ohn ]. ArquIIIa and DavId F. RonIeIdt . "Cyberwar and Netwar: New Modes, OId Concepts, oI
ConIIIct. " Rand Research RevIew xIx no. 2 (1995),
http:]]www.rand.org]pubIIcatIons]randrevIew]Issues]RRR.IaII95.cyber]cyberwar.htmI


~ D ~ ~ D ~ ~ D ~ ~ D ~

DaIIy DIgest DaIIy DIgest DaIIy DIgest DaIIy DIgest
A 10 to 15 page report whIch provIdes a gIobaI perspectIve on a sIngIe Issue and Is sent by 1:00 p.m.
Monday through FrIday to more than 750 senIor and mId-IeveI IoreIgn poIIcy oIIIcIaIs. The Iormat Is the
same as the EarIy Report. t Is aIso transmItted eIectronIcaIIy vIa e-maII and the nternet where It reaches
an expandIng audIence In the IoreIgn poIIcy communIty oI the U.S. Covernment, IncIudIng the WhIte
House, the Departments oI State, deIense, ]ustIce, treasury, and Commerce, the CA and both Houses oI
Congress.

Source: Department oI State. ForeIgn AIIaIrs ManuaI. 10 FAM 413.2, "OIIIce oI Research."
http:]]www.state.gov]m]a]dIr]regs]

Damage Assessment Damage Assessment Damage Assessment Damage Assessment
A determInatIon oI the eIIect oI a compromIse oI cIassIIIed InIormatIon on natIonaI securIty.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
Damage Caused by UnauthorIzed DIscIosure Damage Caused by UnauthorIzed DIscIosure Damage Caused by UnauthorIzed DIscIosure Damage Caused by UnauthorIzed DIscIosure
The decIsIon to appIy cIassIIIcatIon InvoIves two sub-eIements, both oI whIch requIre the appIIcatIon oI
"reasoned judgment on the part oI the cIassIIIer":

A determInatIon that the unauthorIzed dIscIosure oI the InIormatIon couId reasonabIy be expected to
cause damage to the natIonaI securIty oI the UnIted States, and that the damage can be IdentIIIed
or descrIbed. It Is not necessary Ior the orIgInaI cIassIIIer to produce a wrItten descrIptIon oI the
damage at the tIme oI the cIassIIIcatIon, but the cIassIIIer must be prepared to do so II the






127
InIormatIon becomes the subject oI a cIassIIIcatIon chaIIenge, a request Ior mandatory revIew
Ior decIassIIIcatIon, or a request under the Freedom oI nIormatIon Act.
A determInatIon oI the probabIe operatIons, technoIogIcaI and resource Impact oI cIassIIIcatIon.

Source: NatIonaI magery and MappIng Agency. NMA CuIde to MarkIng CIassIIIed Documents, October 4,
2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

Damage to the NatIonaI S Damage to the NatIonaI S Damage to the NatIonaI S Damage to the NatIonaI SecurIty ecurIty ecurIty ecurIty
See NatIonaI SecurIty See NatIonaI SecurIty See NatIonaI SecurIty See NatIonaI SecurIty
Harm to the natIonaI deIense or IoreIgn reIatIons oI the UnIted States Irom the unauthorIzed dIscIosure oI
InIormatIon, takIng Into consIderatIon such aspects oI the InIormatIon as the sensItIvIty, vaIue, utIIIty, and
provenance oI that InIormatIon.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

Dark Web Dark Web Dark Web Dark Web Dark Web TerrorIsm Research Dark Web TerrorIsm Research Dark Web TerrorIsm Research Dark Web TerrorIsm Research
1. The A Lab Dark Web project Is a Iong-term scIentIIIc research program that aIms to study and
understand the InternatIonaI terrorIsm (]IhadIst) phenomena vIa a computatIonaI, data-centrIc approach.
We aIm to coIIect "ALL" web content generated by InternatIonaI terrorIst groups, IncIudIng web sItes,
Iorums, chat rooms, bIogs, socIaI networkIng sItes, vIdeos, vIrtuaI worId, etc.

Source: A Lab, UnIversIty oI ArIzona, http:]]aI.arIzona.edu]research]terror]Index.htm

2. The UnIversIty oI ArIzona's uItra-ambItIous "Dark Web" project "aIms to systematIcaIIy coIIect
and anaIyze aII terrorIst-generated content on the Web," the NatIonaI ScIence FoundatIon notes. And that
anaIysIs, accordIng to the ArIzona Star, IncIudes a program whIch "IdentII[Ies] and track[s] IndIvIduaI
authors by theIr wrItIng styIes

Source: Noah Shachtman,"Do You WrIte LIke a TerrorIstZ WIred September 24, 2007,
http:]]bIog.wIred.com]deIense]2007]09]do-you-wrIte-II.htmI

Data Data Data Data
The Iowest cIass oI InIormatIon on the cognItIve hIerarchy. Data consIst oI raw sIgnaIs communIcated by
any nodes In an InIormatIon system, or sensIngs Irom the envIronment detected by a coIIector oI any kInd
(human, mechanIcaI, or eIectronIc).

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm






128
Data AggregatIon Data AggregatIon Data AggregatIon Data AggregatIon
CompIIatIon oI uncIassIIIed IndIvIduaI data systems and data eIements that couId resuIt In the totaIIty oI
the InIormatIon beIng cIassIIIed or oI beneIIcIaI use to an adversary.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

Data 8ase Data 8ase Data 8ase Data 8ase
Data base means a set oI data, consIstIng oI at Ieast one data IIIe, that Is suIIIcIent Ior a gIven purpose.

Source: NatIonaI ArchIves and Records AdmInIstratIon. 36 CFR 1234.2,
http:]]www.gpoaccess.gov]cIr]Index.htmI

Data MInIng Data MInIng Data MInIng Data MInIng
1. The scIence oI extractIng useIuI InIormatIon Irom Iarge data sets or databases.

Source: ]eIIrey W. SeIIert. "Data MInIng: An OvervIew." CRS Report Ior Congress December 16, 2004.
http:]]www.Ias.org]Irp]crs]RL31798.pdI & update, ]anuary 27, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RS20748.pdI

2. AppIIcatIon oI database technoIogy and technIques (such as statIstIcaI anaIysIs and modeIIng)
to uncover hIdden patterns and subtIe reIatIonshIps In data and to InIer ruIes that aIIow Ior the predIctIon
oI Iuture resuIts.

FederaI agencIes are usIng data mInIng Ior a varIety oI purposes, rangIng Irom ImprovIng servIce or
perIormance to anaIyzIng and detectIng terrorIst patterns and actIvItIes. Our survey oI 128 IederaI
departments and agencIes on theIr use oI data mInIng shows that 52 agencIes are usIng or are pIannIng to
use data mInIng. These departments and agencIes reported 199 data mInIng eIIorts, oI whIch 68 are
pIanned and 131 are operatIonaI. [emphasIs added].

The IIgure here shows the most common uses oI data mInIng eIIorts as descrIbed by agencIes. OI these
uses, the Department oI DeIense reported the Iargest number oI eIIorts aImed at ImprovIng servIce or
perIormance, managIng human resources, and anaIyzIng InteIIIgence and detectIng terrorIst actIvItIes. The
Department oI EducatIon reported the Iargest number oI eIIorts aImed at detectIng Iraud, waste, and
abuse. The NatIonaI AeronautIcs and Space AdmInIstratIon reported the Iargest number oI eIIorts aImed at
anaIyzIng scIentIIIc and research InIormatIon. For detectIng crImInaI actIvItIes or patterns, however, eIIorts
are spread reIatIveIy evenIy among the agencIes that reported havIng such eIIorts. n addItIon, out oI aII
199 data mInIng eIIorts IdentIIIed, 122 used personaI InIormatIon. [emphasIs added].

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI







129
3. WIIIIam ArkIn IdentIIIes over 500 "soItware tooIs, databases, data mInIng and processIng
eIIorts have been contracted Ior or are under deveIopment or In use at the NSA and other InteIIIgence
agencIes and mIIItary commands today."

Source: WIIIIam ArkIn. "NSA's MuItI-8IIIIon DoIIar Data MInIng EIIort." WashIngton Post May 12, 2006,
http:]]bIog.washIngtonpost.com]earIywarnIng]2006]05]nsasmuItIbIIIIondoIIardata.htmI

4. The FederaI Agency Data MInIng ReportIng Act oI 2007 mandates that IederaI agencIes must
report theIr data mInIng to Congress.

Source: S.236, FederaI Agency Data MInIng ReportIng Act oI 2007, 110
th
Congress, 1
st
sessIon,
http:]]thomas.Ioc.gov

Data QuaIIty Act Data QuaIIty Act Data QuaIIty Act Data QuaIIty Act
DIrected OM8 (OIIIce oI Management and 8udget) to Issue, by Sept. 30, 2001, "poIIcy and proceduraI
guIdance to FederaI agencIes" subject to the Paperwork ReductIon Act (44 U.S.C. 35 & PubIIc Law 106-554;
H.R. 5658) requIrIng IederaI agencIes to
wIthIn one year oI OM8's ImpIementIng guIdeIInes, Issue theIr own data quaIIty guIdeIInes
"ensurIng and maxImIzIng the quaIIty, objectIvIty, utIIIty, and IntegrIty oI InIormatIon (IncIudIng
statIstIcaI InIormatIon) dIssemInated";
estabIIsh "admInIstratIve mechanIsms aIIowIng aIIected persons to seek and obtaIn correctIon oI
InIormatIon maIntaIned and dIssemInated by the agency that does not compIy wIth the guIdeIInes"
report perIodIcaIIy to OM8 once the guIdeIInes are put In practIce detaIIIng "the number and
nature" oI data quaIIty compIaInts receIved by the agency, as weII as "how such compIaInts were
handIed.
Source: Susan M. 8Isong. "FederaI AgencIes Subject to Data QuaIIty Act."
http:]]IIbrary.IIndIaw.com]2003]]an]14]132464.htmI and OM8 Watch,
http:]]www.ombwatch.org]artIcIe]archIve]231ZTopIcD=2

DCD 1]7, "SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon DCD 1]7, "SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon DCD 1]7, "SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon DCD 1]7, "SecurIty ControIs on the DIssemInatIon oI nteIIIgence nIormatIon" "" "
1. EstabIIshes poIIcIes, controIs, procedures, and controI markIngs Ior the dIssemInatIon and
use oI InteIIIgence to ensure that It wIII be adequateIy protected.

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

2. DIrectIve estabIIshes poIIcIes, controIs, and procedures Ior the dIssemInatIon and use oI
InteIIIgence InIormatIon to ensure that, whIIe IacIIItatIng Its Interchange Ior InteIIIgence purposes, It wIII
be adequateIy protected. ThIs DIrectIve ImpIements and ampIIIIes appIIcabIe portIons oI the dIrectIves oI






130
the nIormatIon SecurIty OversIght OIIIce Issued pursuant to ExecutIve Order 12958 (E.O.) and
dIrectIves oI the SecurIty PoIIcy 8oard Issued pursuant to E.O. 12958 and PDD-29.
2.2 AddItIonaIIy, thIs DIrectIve sets Iorth poIIcIes and procedures governIng the reIease oI InteIIIgence to
contractors and consuItants, IoreIgn governments, InternatIonaI organIzatIons or coaIItIon partners
consIstIng oI sovereIgn states, and to IoreIgn natIonaIs and ImmIgrant aIIens, IncIudIng those empIoyed by
the US Covernment.
2.3 ExecutIve Order 12958 provIdes Ior the estabIIshment oI SpecIaI Access Programs, IncIudIng SensItIve
Compartmented nIormatIon. D.C.D 3]29 provIdes procedures Ior the estabIIshment and revIew oI SpecIaI
Access Programs pertaInIng to InteIIIgence actIvItIes and restrIcted coIIateraI InIormatIon. nteIIIgence
CommunIty components may estabIIsh and maIntaIn dIssemInatIon controIs on such InIormatIon as
approved under the poIIcIes and procedures contaIned In D.C.D 3]29, thIs D.C.D, and ImpIementIng
guIdance.
Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." ]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI

DCS NET DCS NET DCS NET DCS NET
See AItIvore, CALEA, CarnIvore See AItIvore, CALEA, CarnIvore See AItIvore, CALEA, CarnIvore See AItIvore, CALEA, CarnIvore
The F8's DIgItaI CoIIectIon System Network, that can (aIIegedIy) perIorm Instant wIretaps on aImost any
communIcatIons devIce In the US.
Other systems:
DCS-3000 DCS-3000 Network Map
DCS-5000
DCS-6000, known as DIgItaI Storm, captures and coIIects the content oI phone caIIs and text messages Ior
IuII wIretap orders.

Source: EFF, FOA LItIgatIon, http:]]www.eII.org]In]dIrectory]3673]228 (serIous redactIon) and
http:]]www.eII.org]Issues]IoIa]061708CKK, Ryan SIngeI, "PoInt, CIIck.Eavesdrop." WIred August 2007,
http:]]www.wIred.com]poIItIcs]securIty]news]2007]08]wIretap

DeceptIon DeceptIon DeceptIon DeceptIon
1. Those measures desIgned to mIsIead a IoreIgn power, organIzatIon, or person by manIpuIatIon,
dIstortIon, or IaIsIIIcatIon oI evIdence to Induce hIm to react In a manner prejudIcIaI to hIs Interests.

Source: UnIted States nteIIIgence CommunIty, http:]]www.InteIIIgence.gov]2-counterIntI.shtmI

2. Those measures desIgned to mIsIead the enemy by manIpuIatIon, dIstortIon, or IaIsIIIcatIon oI
evIdence to Induce the enemy to react In a manner prejudIcIaI to the enemy's Interests.







131
Source: DoD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

DeceptIon Means DeceptIon Means DeceptIon Means DeceptIon Means
Methods, resources, and technIques that can be used to convey InIormatIon to the deceptIon target. There
are three categorIes oI deceptIon means: a. physIcaI means - ActIvItIes and resources used to convey or
deny seIected InIormatIon to a IoreIgn power. (ExampIes IncIude mIIItary operatIons, IncIudIng exercIses,
reconnaIssance, traInIng actIvItIes, and movement oI Iorces; the use oI dummy equIpment and devIces;
tactIcs; bases, IogIstIc actIons, stockpIIes, and repaIr actIvIty; and test and evaIuatIon actIvItIes); b.
technIcaI means - MIIItary materIeI resources and theIr assocIated operatIng technIques used to convey or
deny seIected InIormatIon to a IoreIgn power through the deIIberate radIatIon, re-radIatIon, aIteratIon,
absorptIon, or reIIectIon oI energy; the emIssIon or suppressIon oI chemIcaI or bIoIogIcaI odors; and the
emIssIon or suppressIon oI nucIear partIcIes; c. admInIstratIve means - Resources, methods, and
technIques to convey or deny oraI, pIctorIaI, documentary, or other physIcaI evIdence to a IoreIgn power.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545-b.htm
DecIassIIIcatIon DecIassIIIcatIon DecIassIIIcatIon DecIassIIIcatIon
See See See See AutomatIc DecIassIIIcatIon AutomatIc DecIassIIIcatIon AutomatIc DecIassIIIcatIon AutomatIc DecIassIIIcatIon, , , , RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon
1. The determInatIon that cIassIIIed InIormatIon no Ionger requIres, In the Interests oI natIonaI
securIty, any degree oI protectIon agaInst unauthorIzed dIscIosure, coupIed wIth a removaI or canceIIatIon
oI the cIassIIIcatIon desIgnatIon.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

2. The process oI revIewIng and dIscIosIng prevIousIy desIgnated (cIassIIIed) natIonaI securIty and
nucIear reIated InIormatIon cIassIIIed by U.S. government branches, departments and agencIes. ExecutIve
Order 12356 [Reagan; 1982], ExecutIve Order 12958 [CIInton; 1995] and ExecutIve Order 13292 [8ush;
2003] set the stage Ior decIassIIIcatIon.

EO12356 Sec. 3.3 "SystematIc RevIew Ior DecIassIIIcatIon" desIgnated the ArchIvIst oI the UnIted States
(NatIonaI ArchIves) to abIde by the tImeIrames outIIned by nIormatIon SecurIty OversIght OIIIce (SOO).
ThIs EO set up a Iramework Ior aIIected agencIes to revIew sensItIve documents, specIIIcaIIy aIIowIng
decIassIIIcatIon to take pIace wIthIn the orIgInatIng agency.

EO12958 estabIIshed a scheduIe begInnIng on October 17, 2001 Ior automatIc decIassIIIcatIon oI
hIstorIcaIIy vaIuabIe twenty-IIve year-oId records that are not otherwIse exempt. These records were to
be automatIcaIIy decIassIIIed aIter IIve years-the deadIIne came and went. EO13292 moved the
10]17]2001 scheduIe to December 31, 2006 and preserves 12958's nteragency SecurIty CIassIIIcatIon






132
AppeaIs PaneI (SCAP), whIch has proven to be an exceptIonaIIy powerIuI tooI Ior correctIng
cIassIIIcatIon abuses by subjectIng them to the scrutIny oI an Interagency revIew paneI. The new order
wouId bIunt the SCAP's eIIectIveness, however, by permIttIng the DIrector oI CentraI nteIIIgence to reject
PaneI ruIIngs unIess he Is overrIdden by the PresIdent. (SectIon 5.3)

Source: AIvIn S. QuIst, http:]]www.Ias.org]sgp]IIbrary]quIst2]chap11.htmI and Secrecy News March 13,
2003, http:]]www.Ias.org]sgp]news]secrecy]2003]03]031303.htmI

3. DecIassIIIcatIon means the authorIzed change In the status oI InIormatIon Irom cIassIIIed
InIormatIon to uncIassIIIed InIormatIon.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2

4. When a document Is undergoIng cIassIIIcatIon, a decIassIIIcatIon date must be IncIuded. No
decIassIIIcatIon date entry Is gIven Ior an uncIassIIIed document. SOO dIrects the executIve branch In Its
"orderIy decIassIIIcatIon" oI hIstorIcaIIy vaIuabIe permanent cIassIIIed records that are twenty-IIve years
oId or oIder. The deadIIne Is December 31, 2006.

Source: SOO 2004 Report to the PresIdent http:]]www.archIves.gov]Isoo]reports]2004-annuaI-
report.htmI and Steven CarIInkeI." SenIor Agency OIIIcIaIs oI EntItIes Cranted OrIgInaI CIassIIIcatIon
AuthorIty by the PresIdent." http:]]www.Ias.org]sgp]Isoo]suspdecI.htmI

5. Many oI the nearIy 260 mIIIIon pages oI cIassIIIed natIonaI securIty InIormatIon subject to
automatIc decIassIIIcatIon by December 31, 2006, contaIn InIormatIon oI Interest to other agencIes. ThIs
means that the orIgInaI agency must not onIy revIew the cIassIIIed InIormatIon Ior decIassIIIcatIon, but It
must then reIer the document to any other agency that has an Interest In the cIassIIIed InIormatIon. WhIIe
agencIes have deveIoped strategIes to reduce the cost and tIme requIred, the reIerraI oI documents
remaIns one oI the most costIy and Iengthy components oI the decIassIIIcatIon revIew process. ThIs Is one
reason why the recent amendment to the Order aIIowed agencIes to deIay the automatIc decIassIIIcatIon oI
cIassIIIed records reIerred to them by other agencIes Ior an addItIonaI three years. WhIIe cIassIIIed records
that IaII Into thIs category must be subject to automatIc decIassIIIcatIon untII December 31, 2009. 8ased
on the data provIded, we estImate that 65 mIIIIon pages (25 percent oI the totaI) must be reIerred to and
acted upon by other agencIes by the extended date.

n addItIon to the 260 mIIIIons pages, 87 mIIIIon pages oI specIaI medIa, such as motIon pIctures or audIo
tapes, (regardIess oI medIa we report voIume In number oI pages) wIII need to be decIassIIIed, exempted,
or reIerred to other Interested agencIes by December 31, 2011, based upon the 5 addItIonaI years aIIotted
by the recent amendment to the Order Ior InIormatIon contaIned In specIaI medIa.

Source: SOO, Report to the PresIdent: An Assessment oI DecIassIIIcatIon In the ExecutIve 8ranch, 2004
November 30, 2004, http:]]www.Ias.org]sgp]Isoo]2004decIass.pdI






133

DecIassIIIcatIon AuthorIty DecIassIIIcatIon AuthorIty DecIassIIIcatIon AuthorIty DecIassIIIcatIon AuthorIty
(1) the oIIIcIaI who authorIzed the orIgInaI cIassIIIcatIon, II that oIIIcIaI Is stIII servIng In the same posItIon;
(2) the orIgInators current successor In IunctIon; (3) a supervIsory oIIIcIaI oI eIther; or (4) oIIIcIaIs
deIegated decIassIIIcatIon authorIty In wrItIng by the agency head or the senIor agency oIIIcIaI.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." SectIon 6.1(I),
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI and SOO. "FrequentIy Asked
QuestIons About E.O. 13292." http:]]www.archIves.gov]Isoo]Iaqs]eo-12958.htmI

DecIassIIIcatIon Event DecIassIIIcatIon Event DecIassIIIcatIon Event DecIassIIIcatIon Event
An event that eIImInates the need Ior contInued cIassIIIcatIon oI InIormatIon.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

DeIense CentraI ndex oI nvestIgatIons DeIense CentraI ndex oI nvestIgatIons DeIense CentraI ndex oI nvestIgatIons DeIense CentraI ndex oI nvestIgatIons
Reported 25 mIIIIon Index cards representIng IIIes on IndIvIduaIs and 760,000 cards representIng IIIes on
organIzatIons and IncIdents.

Source: UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI
RIghts. Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs. 92
nd
Congress, second sessIon.
WashIngton, D.C.: U.S. Covernment PrIntIng OIIIce, 1972. 86.

DeIense CounterInteIIIgence and Human nteIIIgence Center DeIense CounterInteIIIgence and Human nteIIIgence Center DeIense CounterInteIIIgence and Human nteIIIgence Center DeIense CounterInteIIIgence and Human nteIIIgence Center
See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA)
The DCHC shaII exercIse admInIstratIve and management oversIght oI natIonaI
securIty InvestIgatIons (e.g., espIonage) and reIated actIvItIes conducted by DoD C
organIzatIons. DA shaII NOT be desIgnated as a Iaw enIorcement actIvIty and shaII
not perIorm any Iaw enIorcement IunctIons prevIousIy assIgned to DoD CFA.

Source: DoD. Deputy Secretary Ior DeIense, "EstabIIshment oI the DeIense CounterInteIIIgence and Human
nteIIIgence Center (D.C.HC)," DTM 08-032, ]uIy 22, 2008, http:]]www.Ias.org]Irp]doddIr]dod]D.C.hc.pdI

DeIense CrItIcaI nIrastructure ReIated SensItIve InIormatIon DeIense CrItIcaI nIrastructure ReIated SensItIve InIormatIon DeIense CrItIcaI nIrastructure ReIated SensItIve InIormatIon DeIense CrItIcaI nIrastructure ReIated SensItIve InIormatIon
MentIoned In DoD DIrectIve 3020.40, but not deIIned.

Source: DoD. DoD DIrectIve 3020.40. "DeIense CrItIcaI nIrastructure Program (D.C.P)," August 19, 2005,
http:]]www.Ias.org]Irp]doddIr]dod]d302040.pdI

D DD DeIense nIormatIon eIense nIormatIon eIense nIormatIon eIense nIormatIon






134
1. Any document, wrItIng, sketch, photograph, pIan, modeI, specIIIcatIon, desIgn prototype, or
other recorded or oraI InIormatIon reIatIng to any deIense artIcIe, deIense servIce , or major combatant
vesseI, but shaII not IncIude RestrIcted Data as deIIned by the AtomIc Energy Act (AEA) oI 1954, as
amended, and data removed Irom the RestrIcted Data category under sectIon 142 oI that Act.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms.
http:]]www.dau.mII]pubs]CIossary]preIace.asp

2. OIIIcIaI InIormatIon whIch requIres protectIon In the Interests oI the natIonaI deIense, whIch Is
not common knowIedge, and whIch wouId be oI InteIIIgence vaIue to an enemy or potentIaI enemy In the
pIannIng or wagIng oI war agaInst the UnIted States or Its aIIIes.

Source: Department oI the Army DIctIonary oI UnIted States Army Terms. Army ReguIatIon 310-25.
October, 1983, http:]]www.Ias.org]Irp]doddIr]army]ar310-25.pdI
DeIense nIormatIon nIrastructure (D) DeIense nIormatIon nIrastructure (D) DeIense nIormatIon nIrastructure (D) DeIense nIormatIon nIrastructure (D)
The shared or Interconnected system oI computers, communIcatIons, data appIIcatIons, securIty, peopIe,
traInIng, and other support structures servIng Department oI DeIense (DOD) IocaI, natIonaI, and worIdwIde
InIormatIon needs. The deIense InIormatIon InIrastructure connects DOD mIssIon support, command and
controI, and InteIIIgence computers through voIce, teIecommunIcatIons, Imagery, vIdeo, and muItImedIa
servIces. t provIdes InIormatIon processIng and servIces to subscrIbers over the DeIense nIormatIon
Systems Network and IncIudes command and controI, tactIcaI, InteIIIgence, and commercIaI
communIcatIons systems used to transmIt DOD InIormatIon. AIso caIIed D. See aIso gIobaI InIormatIon
InIrastructure; InIormatIon; InIrastructure; natIonaI InIormatIon InIrastructure.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
DeIense nIormatIon Systems Network (DSN) DeIense nIormatIon Systems Network (DSN) DeIense nIormatIon Systems Network (DSN) DeIense nIormatIon Systems Network (DSN)
ntegrated network centraIIy managed and conIIgured to provIde Iong-hauI InIormatIon transIer servIces
Ior aII Department oI DeIense actIvItIes. t Is an InIormatIon transIer utIIIty desIgned to provIde dedIcated
poInt-to-poInt, swItched voIce and data, Imagery, and vIdeo teIeconIerencIng servIces. (]P 2-01)
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
DeIense nteIIIgence ProductIon DeIense nteIIIgence ProductIon DeIense nteIIIgence ProductIon DeIense nteIIIgence ProductIon
The IntegratIon, evaIuatIon, anaIysIs, and InterpretatIon oI InIormatIon Irom sIngIe or muItIpIe sources
Into IInIshed InteIIIgence Ior known or antIcIpated mIIItary and reIated natIonaI securIty consumer
requIrements.






135
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
DeIensIve CounterInIormatIon DeIensIve CounterInIormatIon DeIensIve CounterInIormatIon DeIensIve CounterInIormatIon
ActIons protectIng our mIIItary InIormatIon IunctIons Irom the adversary.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995. [See the Wayback
MachIne, http:]]web.archIve.org]web]20040901091302]http:]]www.aI.mII]IIb]corner.htmI] ]] ]
DeIensIve nIormatIon OperatIons DeIensIve nIormatIon OperatIons DeIensIve nIormatIon OperatIons DeIensIve nIormatIon OperatIons
The IntegratIon and coordInatIon oI poIIcIes and procedures, operatIons, personneI, and technoIogy to
protect and deIend InIormatIon and InIormatIon systems. DeIensIve InIormatIon operatIons are conducted
through InIormatIon assurance, physIcaI securIty, operatIons securIty, counter-deceptIon, counter-
psychoIogIcaI operatIons, counterInteIIIgence, eIectronIc warIare, and specIaI InIormatIon operatIons.
DeIensIve InIormatIon operatIons ensure tImeIy, accurate, and reIevant InIormatIon access whIIe denyIng
adversarIes the opportunIty to expIoIt IrIendIy InIormatIon and InIormatIon systems Ior theIr own
purposes. See aIso counterInteIIIgence; eIectronIc warIare; InIormatIon assurance; InIormatIon operatIons;
InIormatIon system; oIIensIve InIormatIon operatIons; operatIons securIty; physIcaI securIty; specIaI
InIormatIon operatIons.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

DeIensIve nIormatIon WarIare (W DeIensIve nIormatIon WarIare (W DeIensIve nIormatIon WarIare (W DeIensIve nIormatIon WarIare (W- -- -D) D) D) D)
See Cyberwar, See Cyberwar, See Cyberwar, See Cyberwar, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare
AII actIons taken to deIend agaInst InIormatIon attacks, that Is, attacks on decIsIon makers, the
InIormatIon and InIormatIon-based processes they reIy on, and theIr means oI communIcatIng theIr
decIsIons. StrIctIy speakIng, sInce these attacks can be Iaunched durIng peace tIme at nonmIIItary targets
by nonmIIItary groups, both IoreIgn and domestIc, the term W-D shouId be WS-D. However, W-D Is
currentIy In wIde use.

Source: DavId S. AIberts. DeIensIve nIormatIon WarIare. NatIonaI DeIense UnIversIty Press 8ook, August
1996, http:]]tInyurI.com]ygI9xq9

Degrade Degrade Degrade Degrade
n InIormatIon operatIons, usIng nonIethaI or temporary means to reduce the eIIectIveness or eIIIcIency oI
adversary command and controI systems and InIormatIon coIIectIon eIIorts or means.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents







136
DeIIberate CompromIse oI CIassIIIed nIormatIon DeIIberate CompromIse oI CIassIIIed nIormatIon DeIIberate CompromIse oI CIassIIIed nIormatIon DeIIberate CompromIse oI CIassIIIed nIormatIon
1. The act, attempt, or reported contempIatIon oI IntentIonaIIy conveyIng cIassIIIed documents,
InIormatIon, or materIaI to any unauthorIzed person, IncIudIng unauthorIzed pubIIc dIscIosure. (18 USC
798).

Source: DoD. AR 381-12. ]anuary 15, 1993. "SubversIon and EspIonage DIrected agaInst the U.S. Army."
http:]]Ias.org]Irp]doddIr]army]ar381-12.pdI

2. 18 USC 798 Is actuaIIy tItIed "DIscIosure oI CIassIIIed InIormatIon." [The word "deIIberate" Is
not mentIoned].

a) Whoever knowIngIy and wIIIIuIIy communIcates, IurnIshes, transmIts, or otherwIse makes avaIIabIe to an
unauthorIzed person, or pubIIshes, or uses In any manner prejudIcIaI to the saIety or Interest oI the UnIted
States or Ior the beneIIt oI any IoreIgn government to the detrIment oI the UnIted States any cIassIIIed
InIormatIon-
(1) concernIng the nature, preparatIon, or use oI any code, cIpher, or cryptographIc system oI the UnIted
States or any IoreIgn government; or (2) concernIng the desIgn, constructIon, use, maIntenance, or repaIr
oI any devIce, apparatus, or appIIance used or prepared or pIanned Ior use by the UnIted States or any
IoreIgn government Ior cryptographIc or communIcatIon InteIIIgence purposes; or (3) concernIng the
communIcatIon InteIIIgence actIvItIes oI the UnIted States or any IoreIgn government; or (4) obtaIned by
the processes oI communIcatIon InteIIIgence Irom the communIcatIons oI any IoreIgn government,
knowIng the same to have been obtaIned by such processes-

Source: 18 U.S.C.798. "DIscIosure oI CIassIIIed nIormatIon." http:]]www4.Iaw.corneII.edu]uscode]

Deny Deny Deny Deny
n InIormatIon operatIons, entaIIs wIthhoIdIng InIormatIon about Army Iorce capabIIItIes and IntentIons
that adversarIes need Ior eIIectIve and tImeIy decIsIonmakIng.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
Deny n Toto Deny n Toto Deny n Toto Deny n Toto
A category recentIy dIscovered on a decIassIIIed document approved Ior reIease May 19, 1989. The
document Is tItIed "nternatIonaI Congress oI Space MedIcIne," (MexIco, ]anuary 29, 1976) eIght pages,
heavIIy redacted, wIth bIank pages IabeIed "Deny n Toto."

Source: DDRS (DecIassIIIed Documents ReIerence System), subscrIptIon database and mIcroIIche avaIIabIe
at academIc IIbrarIes.

Department oI DeIense DIrectIve Department oI DeIense DIrectIve Department oI DeIense DIrectIve Department oI DeIense DIrectIve






137
A broad poIIcy document contaInIng what Is requIred by IegIsIatIon, the PresIdent, or the Secretary oI
DeIense to InItIate, govern, or reguIate actIons or conduct by the DoD Components wIthIn theIr specIIIc
areas oI responsIbIIItIes. DoD DIrectIves estabIIsh or descrIbe poIIcy, programs, and organIzatIons; deIIne
mIssIons; provIde authorIty; and assIgn responsIbIIItIes. One-tIme taskIng and assIgnments are not
approprIate In DoD DIrectIves.

Source: Department oI DeIense. WashIngton Headquarters. "DoD ssuances."
http:]]www.dtIc.mII]whs]dIrectIves]generaI.htmI
Department oI DeIense nteIIIgence nIormatIon System (DODS) Department oI DeIense nteIIIgence nIormatIon System (DODS) Department oI DeIense nteIIIgence nIormatIon System (DODS) Department oI DeIense nteIIIgence nIormatIon System (DODS)
The combInatIon oI Department oI DeIense personneI, procedures, equIpment, computer programs, and
supportIng communIcatIons that support the tImeIy and comprehensIve preparatIon and presentatIon oI
InteIIIgence and InIormatIon to mIIItary commanders and natIonaI-IeveI decIsIon makers.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Department oI DeIense UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN Department oI DeIense UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN Department oI DeIense UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN Department oI DeIense UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN) ) ) )
See See See See UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon, , , , UncIassIIIed ControIIed NucIear nIormatIon UncIassIIIed ControIIed NucIear nIormatIon UncIassIIIed ControIIed NucIear nIormatIon UncIassIIIed ControIIed NucIear nIormatIon
UncIassIIIed documents and materIaI contaInIng DoD UCN shaII be marked as IoIIows:
(1) The Iace oI the document and the outsIde oI the back cover (II there Is one) shaII be marked "DoD
UncIassIIIed ControIIed NucIear nIormatIon."
(2) PortIons oI the document that contaIn DoD UCN shaII be marked wIth "(DoD UCN)" at the begInnIng oI
the portIon. b. CIassIIIed documents and materIaI contaInIng DoD UCN shaII be marked In accordance
wIth Chapter V, except that:
(1) Pages wIth no cIassIIIed InIormatIon but contaInIng DoD UCN shaII be marked "DoD UncIassIIIed
ControIIed NucIear nIormatIon" at the top and bottom.
(2) PortIons oI the document that contaIn DoD UCN shaII be marked wIth "(DoD UCN)" at the begInnIng oI
the portIon-In addItIon to the cIassIIIcatIon markIng, where approprIate. c. MaterIaI other than paper
documents (Ior exampIe, sIIdes, computer medIa, IIIms, etc.) shaII bear markIngs that aIert the hoIder or
vIewer that the materIaI contaIns DoD UCN. d. Documents and materIaI contaInIng DoD UCN and
transmItted outsIde the Department oI DeIense must bear an expanded markIng on the Iace oI the
document so that non-DoD hoIders understand the status oI the InIormatIon. A statement sImIIar to thIs
one shouId be used:

DEPARTMENT OF DEFENSE
UNCLASSFED CONTROLLED NUCLEAR NFORMATON
EXEMPT FROM MANDATORY DSCLOSURE
(5 U.S.C. 552(b) (3), as authorIzed by 10 U.S.C. 128)

e. TransmIttaI documents that have DoD UCN attachments shaII bear a statement: "The attached
document contaIns DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN)."






138

DoD. DOD 5200.1-R. "nIormatIon SecurIty Program." AppendIx C. ]anuary 1997,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm

2. DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN) Is uncIassIIIed InIormatIon on
securIty measures (IncIudIng securIty pIans, procedures and equIpment) Ior the physIcaI protectIon oI DoD
SpecIaI NucIear MaterIaI (SNM), equIpment, or IacIIItIes. nIormatIon Is DesIgnated DoD UCN onIy when It
Is determIned that Its unauthorIzed dIscIosure couId reasonabIy be expected to have a sIgnIIIcant adverse
eIIect on the heaIth and saIety oI the pubIIc or the common deIense and securIty by IncreasIng
sIgnIIIcantIy the IIkeIIhood oI the IIIegaI productIon oI nucIear weapons or the theIt, dIversIon, or sabotage
oI DoD SNM, equIpment, or IacIIItIes. nIormatIon may be desIgnated DoD UCN by the Heads oI the DoD
Components and IndIvIduaIs to whom they have deIegated the authorIty.

Source: OIIIce oI the Secretary oI DeIense. 32 CFR 223, http:]]www.gpoaccess.gov]CFR]Index.htmI.

Department oI State SensItIve 8ut UncIassIIIed Department oI State SensItIve 8ut UncIassIIIed Department oI State SensItIve 8ut UncIassIIIed Department oI State SensItIve 8ut UncIassIIIed
UncIassIIIed InIormatIon that orIgInated wIthIn the Department oI State whIch warrants a degree oI
protectIon or admInIstratIve controI and meets the crIterIa Ior exemptIon Irom mandatory pubIIc
dIscIosure under FOA. PrIor to 26 ]anuary 1995, thIs InIormatIon was desIgnated and marked LOU
[LImIted Use OnIy]. The LOU desIgnatIon wIII no Ionger be used.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

DerIvatIve CIassIIIcatIon DerIvatIve CIassIIIcatIon DerIvatIve CIassIIIcatIon DerIvatIve CIassIIIcatIon
1. DerIvatIve cIassIIIcatIon Is a determInatIon that a document or materIaI contaIns or reveaIs
InIormatIon aIready cIassIIIed.

Source: Source: ArvIn S. QuIst. "SecurIty CIassIIIcatIon oI nIormatIon." Chapter 1,
http:]]www.Ias.org]sgp]IIbrary]quIst2]chap1.htmI

2. A determInatIon that InIormatIon Is In substance the same as InIormatIon currentIy cIassIIIed,
and the appIIcatIon oI cIassIIIcatIon markIngs.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

3. The IncorporatIng, paraphrasIng, restatIng, or generatIng In new Iorm InIormatIon that Is
aIready cIassIIIed, and markIng the newIy deveIoped materIaI consIstent wIth the cIassIIIcatIon markIngs
that appIy to the source InIormatIon. DerIvatIve cIassIIIcatIon IncIudes the cIassIIIcatIon oI InIormatIon






139
based on cIassIIIcatIon guIdance. The dupIIcatIon or reproductIon oI exIstIng cIassIIIed InIormatIon Is
not derIvatIve cIassIIIcatIon.

DerIvatIve cIassIIIers make 92Z percent oI aII cIassIIIcatIon decIsIons.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended,
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and SOO 2004 Report
to the PresIdent http:]]www.archIves.gov]Isoo]reports]2004-annuaI-report.htmI

4. DerIvatIve cIassIIIers may onIy cIassIIy documents or materIaI when they have cIassIIIcatIon
guIdance In the Iorm oI a guIde or cIassIIIed source documents or other guIdance by an orIgInaI cIassIIIer.

Source: DOE. UnderstandIng CIassIIIcatIon. . . . WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior
DeIense Programs, OIIIce oI CIassIIIcatIon, 1987. SUDOC: E 1.15:0007]1

Derogatory nIormatIon Derogatory nIormatIon Derogatory nIormatIon Derogatory nIormatIon
1. UnIavorabIe InIormatIon regardIng an IndIvIduaI whIch brIngs Into questIon the IndIvIduaIs'
eIIgIbIIIty or contInued eIIgIbIIIty Ior access authorIzatIon or suItabIIIty Ior IederaI empIoyment. SpecIIIc
types oI derogatory InIormatIon are IIsted In 10 CFR 710 (beIow) and ExecutIve Order 10450.

Source: http:]]www.Ias.org]Irp]doddIr]doe]o56312c]o56312ca2.htm, 59 FR 35185, ]uIy 8, 1994, as
amended at 66 FR 47063, Sept. 11, 200, Energy. 10 CFR 710.8,
http:]]www.gpoaccess.gov]CFR]Index.htmI

DIrect nIormatIon WarIare DIrect nIormatIon WarIare DIrect nIormatIon WarIare DIrect nIormatIon WarIare
See Cyberwar, DeIensIve nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare See Cyberwar, DeIensIve nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare See Cyberwar, DeIensIve nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare See Cyberwar, DeIensIve nIormatIon WarIare, nIormatIon WarIare, Netwar, StrategIc nIormatIon WarIare
ChangIng the adversary's InIormatIon wIthout InvoIvIng the IntervenIng perceptIve and anaIytIcaI
IunctIons.

Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995.,
[See the Wayback MachIne,
http:]]web.archIve.org]web]20040901091302]http:]]www.aI.mII]IIb]corner.htmI] ]] ]
DIrector oI NatIonaI nteIIIgence (DN) DIrector oI NatIonaI nteIIIgence (DN) DIrector oI NatIonaI nteIIIgence (DN) DIrector oI NatIonaI nteIIIgence (DN)
One oI the recommendatIons oI the NatIonaI CommIssIon on the TerrorIst Attacks Upon the UnIted States
("9]11 CommIssIon") was to repIace the posItIon oI the DIrector oI CentraI nteIIIgence (D.C.) wIth NatIonaI
nteIIIgence DIrector (ND) who wouId oversee and coordInate natIonaI InteIIIgence agencIes and programs.

The DN coordInates the IIIteen agencIes that comprIse the nteIIIgence CommunIty (C), and Is the
prIncIpaI InteIIIgence advIser to the presIdent and the statutory InteIIIgence advIsor to the NatIonaI
SecurIty CouncII. On AprII 21, 2005, authorIty was gIven under EO 12958 "CIassIIIed NatIonaI SecurIty
nIormatIon,'' amended to cIassIIy up to Top Secret IeveI.






140

Source: AIIred CummIng. "The PosItIon oI DIrector oI NatIonaI nteIIIgence: ssues Ior Congress." CRS
Report Ior Congress August 12, 2004 http:]]www.Ias.org]Irp]crs]RL32506.pdI, "DesIgnatIon Under
ExecutIve Order 12958" AprII 21, 2005, FederaI RegIster AprII 26, 2005,
http:]]www.Ias.org]sgp]bush]wh042105.htmI, OIIIce oI the DIrector oI NatIonaI nteIIIgence
http:]]www.dnI.gov] and CommIssIon on the nteIIIgence CapabIIItIes oI the UnIted States RegardIng
Weapons oI Mass DestructIon ("SIIberman-Robb CommIssIon"). March 31, 2005,
http:]]www.gpoaccess.gov]wmd]Index.htmI

DIscIosure DIscIosure DIscIosure DIscIosure
DIscIosure means a transIer by any means oI a record, a copy oI a record, or the InIormatIon contaIned In
a record to a recIpIent other than the subject IndIvIduaI, or the revIew oI a record by someone other than
the subject IndIvIduaI.

Source: NatIonaI ArchIves and Records AdmInIstratIon. 36 CFR 1202.4,
http:]]www.gpoaccess.gov]CFR]Index.htmI
DIscovery Process DIscovery Process DIscovery Process DIscovery Process
A process controIIed by a court, desIgned to compeI the exchange oI InIormatIon beIore a trIaI. DIscovery
aIIows one party to questIon other partIes, and sometImes wItnesses; DIscovery aIso aIIows one party to
Iorce the others to produce requested documents or other physIcaI evIdence. One major purpose oI
dIscovery Is to assess the strength or weakness oI an opponent's case, wIth the Idea oI openIng
settIement taIks.

The most common types oI dIscovery are InterrogatorIes, whIch consIst oI wrItten questIons the other
party must answer under penaIty oI perjury, and deposItIons, whIch InvoIve an In-person sessIon at whIch
one party to a IawsuIt has the opportunIty to ask oraI questIons oI the other party or her wItnesses under
oath whIIe a wrItten transcrIpt Is made by a court reporter. Other types oI pretrIaI dIscovery consIst oI
wrItten requests to produce documents and requests Ior admIssIons, by whIch one party asks the other to
admIt or deny key Iacts In the case.

Source: FederaI RuIes oI CIvII Procedure http:]]www.Iaw.corneII.edu]ruIes]Ircp]overvIew.htm and [NoIo]
Everybody's LegaI DIctIonary,
http:]]www.noIo.com]dIctIonary]dIctIonaryaIpha.cImZwordnumber=658&aIpha=D

DIscretIonary Access ControI DIscretIonary Access ControI DIscretIonary Access ControI DIscretIonary Access ControI
The means oI restrIctIng access to IIIes based on the IdentIty and need-to-know oI users and]or groups
to whIch the IIIes beIong.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI






141
DIsInIormatIon DIsInIormatIon DIsInIormatIon DIsInIormatIon
1. CareIuIIy contrIved mIsInIormatIon prepared by an InteIIIgence servIce Ior the purpose oI
mIsIeadIng, deIudIng, dIsruptIng, or undermInIng conIIdence In IndIvIduaIs, organIzatIons, or
governments.

Source: UnIted States nteIIIgence CommunIty,
http:]]www.InteIIIgence.gov]2-counterIntI.shtmI

2. nIormatIon dIssemInated prImarIIy by InteIIIgence organIzatIons or other covert agencIes
desIgned to dIstort InIormatIon or deceIve or InIIuence US decIsIonmakers, US Iorces, coaIItIon aIIIes, key
actors, or IndIvIduaIs vIa IndIrect or unconventIonaI means.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

3. MIsInIormatIon that Is deIIberateIy dIssemInated In order to InIIuence or conIuse adversarIes.

Source: FederaI CeographIc Data CommIttee. CuIdeIInes Ior ProvIdIng ApproprIate Access to CeospatIaI
Data In Response to SecurIty Concerns." ]une 2005,
http:]]www.Ias.org]sgp]othergov]IgD.C.0605.pdI

4. Whereas naccurate InIormatIon, dIstortIons oI truth, excessIve IImItatIons on access to
InIormatIon and the removaI or destructIon oI InIormatIon In the pubIIc domaIn are anathema to the ethos
oI IIbrarIanshIp and to the IunctIonIng oI a heaIthy democracy; and

Whereas, EvIdence exIsts reveaIIng that some U.S. government oIIIcIaIs and agencIes use dIsInIormatIon In
pursuIt oI poIItIcaI and economIc power, as weII as war, thwartIng the deveIopment oI an InIormed
cItIzenry and constItutIng a "crItIcaI probIem IacIng socIety"; and

Whereas, The IIst oI documented Instances oI government use oI dIsInIormatIon contInues to grow, and
IncIudes:
the dIstrIbutIon to medIa outIets oI government produced "vIdeo news reIeases" under the
guIse oI Independent journaIIsm;
the use oI commentators paId by government agencIes to express vIews IavorabIe to
government poIIcIes In cIear vIoIatIon oI FederaI CommunIcatIons CommIssIon reguIatIons;
the censorshIp oI scIentIIIc studIes warnIng oI the true threat oI gIobaI warmIng;
the IabrIcatIon and deIIberate dIstortIon oI InIormatIon used to justIIy the U.S. InvasIon oI
raq;
the removaI oI pubIIc InIormatIon Irom U.S. deposItory IIbrarIes; and
heIghtened assauIts on constItutIonaI rIghts under the guIse oI "natIonaI securIty"







142
Source: AmerIcan LIbrary AssocIatIon. "ResoIutIon on DIsInIormatIon, MedIa ManIpuIatIon, and
DestructIon oI PubIIc nIormatIon." ]une 29, 2005, http:]]tInyurI.com]yIo34dg

5. So, dIsInIormatIon Is In the eye oI the behoIder, not necessarIIy a term that just has an agreed-
on deIInItIon.

Source: Todd LeventhaI, ChIeI oI the Counter-nIormatIon Team, nternatIonaI nIormatIon Programs
8ureau, U.S. Department oI State, "Accuracy In the MedIa: MIsInIormatIon, MIstakes, and MIsIeadIng In
AmerIcan and Other MedIa," http:]]Ipc.state.gov]Ipc]44433.htm.

SovIet deIInItIons: SovIet deIInItIons: SovIet deIInItIons: SovIet deIInItIons:
1. From the RussIan dezInIormatsIa, a dIvIsIon oI the KC8 devoted to bIack propaganda "IaIse,
IncompIete, or mIsIeadIng InIormatIon that Is passed, Ied or conIIrmed to a targeted IndIvIduaI, group."

Source: RIchard H. ShuItz and Roy Codson. DezInIormatsIa:ActIve Measures In SovIet Strategy. WashIngton:
Pergamon-8rasey's, 1984.
2. DezInIormatsIonnyye svedenIya (dezInIormatsIya); dIsInIormatIon specIIIcaIIy prepared
InIormatIon to gIve the enemy a IaIse pIcture oI events whIch mIght be used as a basIs Ior decIsIons. Can
be used to conceaI state securIty agencIes operatIonaI procedures, Iorces and resources, or deIIectIng an
enemy towards a worthIess target, etc.
3. DezInIormatsIonnyye operatIvnaya: operatIonaI dIsInIormatIon operatIonaI procedure whIch
consIsts oI provIdIng the enemy wIth specIIIc specIaIIy prepared InIormatIon whIch wIII gIve a IaIse pIcture
oI actIvIty beIng undertaken by the counter-InteIIIgence servIce and may encourage the enemy to take
decIsIons whIch are advantageous to the counterInteIIIgence servIce.
4. DezInIormIrovanIye dIssemInatIon oI InIormatIon; Form oI operatIonaI actIvIty InvoIvIng IeedIng
dIsInIormatIon to the enemy or to thIrd partIes In order to conIuse them.

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.

DIsruptIve TechnoIogy OIIIce (DTO) DIsruptIve TechnoIogy OIIIce (DTO) DIsruptIve TechnoIogy OIIIce (DTO) DIsruptIve TechnoIogy OIIIce (DTO)
See See See See Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA) Advanced Research DeveIopment ActIvIty (ARDA)
NSA's [NatIonaI SecurIty Agency] DTO Iosters coIIaboratIon throughout the InteIIIgence worId wIth the
technIcaI and communItIes In academIa, the natIonaI IaboratorIes, and the commercIaI sector. DTO then
heIps transIer emergIng soIutIons to the InteIIIgence communIty technoIogy centers Ior IntegratIon and
ImpIementatIon. LIke DARPA, DTO aIso commonIy uses broad area announcements. DTO Iunds geospatIaI
scIences R&D joIntIy wIth NCA [natIonaI CeospatIaI Agency] through Its Advanced Research In nteractIve
VIsuaIIzatIon Ior AnaIysIs (ARVA) Program. DTO's mIssIon Is to sponsor hIgh- rIsk, hIgh-payoII research
desIgned to Ieverage IeadIng-edge technoIogy In the soIutIon oI some oI the most crItIcaI probIems IacIng
the C. The phase one Iocus oI DTO's ARVA program seeks to dramatIcaIIy Improve the vIsuaIIzatIon oI
geospatIaIIy based natIonaI-IeveI IoreIgn InteIIIgence InIormatIon.







143
Source: 8oard on Earth ScIences and Resources. PrIorItIes Ior CEONT Research at the NatIonaI
CeospatIaI-nteIIIgence Agency. NatIonaI AcademIes Press, 2006. 19, http:]]darwIn.nap.edu]

DIssemInate DIssemInate DIssemInate DIssemInate
An InIormatIon management actIvIty: to communIcate reIevant InIormatIon oI any kInd Irom one person or
pIace to another In a usabIe Iorm by any means to Improve understandIng or to InItIate or govern actIon.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

DIstrIbutIon CaptIons DIstrIbutIon CaptIons DIstrIbutIon CaptIons DIstrIbutIon CaptIons
See See See See EXDS, LMDS, NODS STADS EXDS, LMDS, NODS STADS EXDS, LMDS, NODS STADS EXDS, LMDS, NODS STADS
1. Records bearIng specIaI dIstrIbutIon and channeI captIons requIre specIaI handIIng and controI,
whIch Is sometImes more restrIctIve than that requIred by theIr securIty cIassIIIcatIon aIone. DetaIIed
requIrements Ior captIons are contaIned In the Records Management Handbook, 5 FAH-4 H-213 [not
onIIne] and the Correspondence Handbook, 5 FAH-1 H700. [and 12 FAM 539].

Source: Department oI State. ForeIgn AIIaIrs ManuaI. 5 FAM 420, "OrganIzIng, MaIntaInIng, and ProtectIng
Records." http:]]www.state.gov]m]a]dIr]regs]

2. WIse (72) wrItes that captIons were created under the ]ohnson AdmInIstratIon by then ExecutIve
Secretary oI State 8enjamIn H. Read.

Source: DavId WIse. PoIItIcs oI LyIng: Covernment DeceptIon, Secrecy, and Power. New York, Random
House 1973.

DIssent ChanneI DIssent ChanneI DIssent ChanneI DIssent ChanneI
The DIssent ChanneI Is reserved Ior consIderatIon oI dIssentIng or aIternatIve vIews on substantIve IoreIgn
poIIcy matters. The DIssent ChanneI may not be used to address non-poIIcy Issue. CompIaInts reIatIng to
vIoIatIon oI Iaw, ruIes, or reguIatIons; mIsmanagement; or Iraud, waste, or abuse may be addressed to
OC]NV (see 1 FAM 053 paragraph c). CIassIIIcatIon chaIIenges shouId not be addressed through the
DIssent ChanneI (see subpart C or 22 CFR 171).

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 2FAM070, "DIssent ChanneI." (F2AM071.2),
http:]]www.state.gov]m]a]dIr]regs]
Document and MaterIaI Document and MaterIaI Document and MaterIaI Document and MaterIaI
1. Any recorded InIormatIon, regardIess oI the nature oI the medIum or cIrcumstances oI the
recordIng.







144
Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended,
CIassIIIed NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. Any recorded InIormatIon, regardIess oI Its physIcaI Iorm or characterIstIcs, wIthout IImItatIon,
wrItten or prInted matter, automated data processIng storage medIa, maps, charts, paIntIngs, drawIngs,
IIIms, photographs, Imagery, engravIngs, sketches, workIng notes and papers, reproductIons oI such
thIngs by any means or process, and sound, voIce, magnetIc or eIectronIc recordIngs In any Iorm.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

Document and Page MarkIngs Document and Page MarkIngs Document and Page MarkIngs Document and Page MarkIngs
See See See See CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs
I a document contaIns some Secret InIormatIon and some ConIIdentIaI InIormatIon, the overaII markIng
wouId be "Secret." ThIs markIng must be pIaced at the top and bottom oI the outsIde oI the Iront cover (II
any), the tItIe page (II any), on the IIrst page, and on the outsIde oI the back cover (II any). nterIor pages
oI cIassIIIed documents must aIso be marked.

Source: DeIense nteIIIgence Agency. OIIIce oI SecurIty and CounterInteIIIgence, PoIIcy and SecurIty
Awareness 8ranch. Desk ReIerence CuIde to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon. AprII 2004.

Document ExpIoItatIon (DOCEX) Document ExpIoItatIon (DOCEX) Document ExpIoItatIon (DOCEX) Document ExpIoItatIon (DOCEX)
The systematIc extractIon oI InIormatIon Irom documents eIther produced by the threat, havIng been In
the possessIon oI the threat, or that are dIrectIy reIated to the current or Iuture threat sItuatIon Ior the
purpose oI producIng InteIIIgence or answerIng InIormatIon requIrements. ThIs may be conducted In
conjunctIon wIth human InteIIIgence (HUMNT) coIIectIon actIvItIes or may be conducted as a separate
actIvIty.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

DO] MedIa Leak QuestIonnaIre DO] MedIa Leak QuestIonnaIre DO] MedIa Leak QuestIonnaIre DO] MedIa Leak QuestIonnaIre
E4.1.1. I the medIa dIscIoses cIassIIIed InIormatIon wIthout proper authorIzatIon, the Heads oI the DoD
Components shaII submIt the DO] MedIa Leak QuestIonnaIre through securIty channeIs to the USD (). n
coordInatIon wIth the DoD CC, the USD() shaII prepare a Ietter addressed to the attentIon oI ChIeI, nternaI
SecurIty SectIon, CrImInaI DIvIsIon, 8ond 8uIIdIng, Room 9400, U.S. Department oI ]ustIce, 1400 New York
Avenue, Northwest, WashIngton, D.C.







145
Source: DoD DIrectIve 5210.50, ]uIy 22, 2005,
http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]521050p.pdI

Do Not FIIe Do Not FIIe Do Not FIIe Do Not FIIe
1. ]. Edgar Hoover necessItated the creatIon oI wrItten records, whIch mIght need to be
produced In response to a congressIonaI subpoena or court-ordered dIscovery motIon. Hoover mInImIzed
thIs rIsk through a Do Not FIIe procedure. Documents captIoned "Do Not FIIe" were not to be Indexed In
the F8's centraI records system but Instead were to be routed to the oIIIce IIIes oI senIor F8 oIIIcIaIs at
the F8's WashIngton, D.C., headquarters Ior revIew and approvaI (and were then to be reguIarIy
destroyed). The head oI an F8 IIeId oIIIce, In turn, created an "InIormaI" memorandum (that Is, a
nonoIIIcIaI record) oI each authorIzatIon and IIIed It In the oIIIce saIe "untII the next InspectIon by 8ureau
nspectors, at whIch tIme It [the InIormaI memo] Is destroyed" (see ExhIbIt 5.7, pages 184-86). The Do Not
FIIe procedure reIIned another specIaI records procedure that Hoover had devIsed In 1940 to saIeguard
sensItIve communIcatIons among senIor F8 oIIIcIaIs. To dIstInguIsh these more sensItIve InIormaI
memoranda Irom oIIIcIaI memoranda that were to be serIaIIzed and Indexed In the F8's centraI records
system, an InIormaI memorandum was to be wrItten on pInk paper (oIIIcIaI memoranda were wrItten on
whIte paper) and to contaIn the notatIon that the memorandum was "to be destroyed aIter actIon Is taken
and not sent to IIIes."
DatIng Irom theIr InceptIon as a specIaI recordkeepIng method, InIormaI and Do Not FIIe memoranda were
to be destroyed "aIter actIon Is taken." F8 assIstant dIrectors retaIned these memoranda In theIr oIIIce
IIIes and decIded when to destroy them. n March 1953, Hoover ended thIs dIscretIonary arrangement and
ordered F8 assIstant dIrectors to "destroy them as promptIy as possIbIe but In no case shaII they be
retaIned In excess oI sIx months."
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 22,
32, 183-86,366, 376.
2. The Do Not FIIe procedure was not a unIque F8 practIce Ior sanItIzIng the record.

Source: Athan TheoharIs. "Secrecy and Power: UnantIcIpated ProbIems In ResearchIng F8 FIIes. PoIItIcaI
ScIence QuarterIy 119 no.2 (2004): 271-290.

DossIer DossIer DossIer DossIer
An oIIIcIaI IIIe oI InvestIgatIve, InteIIIgence, or cI materIaIs coIIected on behaII oI the U.S. Army. May
consIst oI documents, IIIm, magnetIc tape, photographs, or a combInatIon thereoI. May be "personaI"
reIerrIng to an IndIvIduaI or "ImpersonaI" reIerrIng to a thIng, event or organIzatIon.

Source: DoD. Army ReguIatIon AR381-45. "nvestIgatIve Records ReposItory." August 25, 1989,
http:]]www.army.mII]usapa]epubs]pdI]r38145.pdI

DOSTN DOSTN DOSTN DOSTN (Department oI State TeIecommunIcatIons (Department oI State TeIecommunIcatIons (Department oI State TeIecommunIcatIons (Department oI State TeIecommunIcatIons Network Network Network Network) )) )






146
A "bIack" transmIssIon IacIIIty.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

DowngradIng DowngradIng DowngradIng DowngradIng
1. A determInatIon made by a decIassIIIcatIon authorIty that InIormatIon cIassIIIed and
saIeguarded at a specIIIed IeveI shaII be cIassIIIed and saIeguarded at a Iower IeveI.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. ChangIng a securIty cIassIIIcatIon Irom a hIgher to a Iower IeveI.

Source: NatIonaI magery and MappIng Agency. NMA CuIde to MarkIng CIassIIIed Documents, October 4,
2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI
Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon Drug EnIorcement AdmInIstratIon SensItIve nIormatIon
See See See See CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs, , , , UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon
DEA SensItIve InIormatIon Is uncIassIIIed InIormatIon that Is orIgInated by the Drug EnIorcement
AdmInIstratIon and requIres protectIon agaInst unauthorIzed dIscIosure to protect sources and methods oI
InvestIgatIve actIvIty, evIdence, and the IntegrIty oI pretrIaI InvestIgatIve reports. The AdmInIstrator and
certaIn other oIIIcIaIs oI the DEA have been authorIzed to desIgnate InIormatIon as DEA SensItIve; the
Department oI DeIense has agreed to ImpIement protectIve measures Ior DEA SensItIve InIormatIon In Its
possessIon. Types oI InIormatIon to be protected IncIude:
a. nIormatIon and materIaI that Is InvestIgatIve In nature;
b. nIormatIon and materIaI to whIch access Is restrIcted by Iaw;
c. nIormatIon and materIaI that Is crItIcaI to the operatIon and mIssIon oI the DEA; and
d. nIormatIon and materIaI the dIscIosure oI whIch wouId vIoIate a prIvIIeged reIatIonshIp.
Access to DEA SensItIve InIormatIon shaII be granted onIy to persons who have a vaIId need-to-know Ior
the InIormatIon. A securIty cIearance Is not requIred. DEA SensItIve InIormatIon In the possessIon oI the
Department oI DeIense may not be reIeased outsIde the Department wIthout authorIzatIon by the DEA.

Source: DoD. DOD 5200.1-R nIormatIon SecurIty Program. AppendIx C,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm

Drug]FInancIaI FusIon Center Drug]FInancIaI FusIon Center Drug]FInancIaI FusIon Center Drug]FInancIaI FusIon Center
See See See See Data MInIng, FusIon Centers Data MInIng, FusIon Centers Data MInIng, FusIon Centers Data MInIng, FusIon Centers






147
Department oI ]ustIce Headquarters. WIII contaIn data Irom, and be used by, OrganIzed CrIme and
Drug EnIorcement Task Force agencIes. The system wIII permIt the coIIectIon and cross case anaIysIs oI aII
drug and reIated IInancIaI InvestIgatIve data;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: PIanned;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

DuaI Use (nIormatIon) DuaI Use (nIormatIon) DuaI Use (nIormatIon) DuaI Use (nIormatIon)
tems that have both commercIaI and mIIItary or proIIIeratIon appIIcatIons. WhIIe thIs term Is used
InIormaIIy to descrIbe Items that are subject to the EAR, pureIy commercIaI Items are aIso subject to the
EAR (see Sec. 734.2(a) oI the EAR).

Source: Terms used In Export AdmInIstratIon ReguIatIons (EAR) 15 CFR 772.1,
http:]]www.gpoaccess.gov]cIr]Index.htmI

DysIunctIonaI nIormatIon RestrIctIons DysIunctIonaI nIormatIon RestrIctIons DysIunctIonaI nIormatIon RestrIctIons DysIunctIonaI nIormatIon RestrIctIons
A great deaI oI InIormatIon restrIctIon Is Iegacy, stemmIng Irom the IeIt need to guard
mIIItary-reIated InIormatIon Irom dIscIosure to those who can harm us. A more IImIted quantIty oI
InIormatIon may be restrIcted In the Interests oI eIIIcIency oI government. To accommodate that Interest,
the Congress, In enactIng the Freedom oI nIormatIon Act, permItted exemptIon
Irom mandatory dIscIosure oI pre-decIsIonaI advIce to decIsIon-makers, data reIevant to crImInaI
InvestIgatIons and InIormatIon oI so mInor a nature as to not merIt the eIIort to retrIeve and dIscIose It.
Other data has been predetermIned by Congress to merIt wIthhoIdIng. ThIs mIght IncIude nucIear energy-
reIated InIormatIon, InIormatIon about the personneI and processes oI InteIIIgence organIzatIons or
personaI prIvacy InIormatIon.

Source: M.E. 8owman, "DysIunctIonaI nIormatIon RestrIctIons" by M.E. 8owman, nteIIIgencer: ]ournaI oI
U.S. nteIIIgence StudIes FaII]WInter 2006-2007, http:]]www.Ias.org]sgp]eprInt]bowman.pdI



~ E ~ ~ E ~ ~ E ~ ~ E ~

EagIe Eyes EagIe Eyes EagIe Eyes EagIe Eyes
The EagIe Eyes program Is an AIr Force antI-terrorIsm InItIatIve that enIIsts the eyes and ears oI AIr Force
members and cItIzens In the war on terror. EagIe eyes teaches peopIe about the typIcaI actIvItIes terrorIsts
engage In to pIan theIr attacks. Armed wIth thIs InIormatIon, anyone can recognIze eIements oI potentIaI






148
terror pIannIng when they see It. The program provIdes a network oI IocaI, 24-hour phone numbers to
caII whenever a suspIcIous actIvIty Is observed. You and your IamIIy are encouraged to Iearn the categorIes
oI suspIcIous behavIor and stay attuned to your surroundIngs. I you observe somethIng suspIcIous, send
your Input usIng thIs "CrImebusters" IInk, or aIert IocaI authorItIes.

Source: AIr Force OIIIce oI SpecIaI nvestIgatIons, http:]]www.osI.andrews.aI.mII]eagIeeyes]Index.asp

EarIy Report EarIy Report EarIy Report EarIy Report
A seven to nIne page document based on reportIng oI edItorIaI commentary Irom major posts
commentIng on the Issues oI the day. t Is eIectronIcaIIy transmItted to hIgh IeveI oIIIcIaIs at the WhIte
House, State Department, Pentagon and other senIor aIIaIrs decIsIon makers by 8:00 a.m. Monday through
FrIday.

Source: Department oI State. ForeIgn AIIaIrs ManuaI. 10 FAM 413.2, "OIIIce oI Research."
http:]]www.state.gov]m]a]dIr]regs]

Earmark Earmark Earmark Earmark
1. An earmark Is a IIne-Item that Is Inserted Into a bIII to dIrect Iunds to a specIIIc project or
recIpIent wIthout any pubIIc hearIng or revIew. Members oI Congress-both In the House and the Senate-
use earmarks to dIrect Iunds to projects oI theIr choIce. TypIcaIIy earmarks Iund projects In the dIstrIct oI
the House member or the state oI the Senator who Inserted It; the beneIIcIary oI the Iunds can be a state
or IocaI agency or a prIvate entIty; oIten, the uItImate beneIIcIary Is a poIItIcaI supporter oI the IegIsIator.

Source: SunIIght FoundatIon. "Earmark FAQ." http:]]www.sunIIghtIoundatIon.com]earmarksFAQ

2. A WaII Street ]ournaI coIumn on March 26 (2008) reported that the CongressIonaI Research
ServIce "wIII no Ionger respond to requests Irom members oI Congress on the sIze, number oI background
oI [budget] earmarks." The new CRS poIIcy, the ]ournaI artIcIe aIIeged, "Is heIpIng Its masters hIde wasteIuI
spendIng."

Source: FAS has IncIuded both the WaII Street ]ournaI and CRS' response here:
http:]]www.Ias.org]sgp]crs]crs032607.pdI

ECHELON ECHELON ECHELON ECHELON
AssocIated wIth a gIobaI network oI computers that automatIcaIIy search through mIIIIons oI Intercepted
messages Ior pre-programmed keywords or Iax, teIex and e-maII addresses. Every word oI every message
In the IrequencIes and channeIs seIected at a statIon Is automatIcaIIy searched. The processors In the
network are known as the ECHELON DIctIonarIes. ECHELON connects aII these computers and aIIows the
IndIvIduaI statIons to IunctIon as dIstrIbuted eIements an Integrated system. An ECHELON statIon's
DIctIonary contaIns not onIy Its parent agency's chosen keywords, but aIso IIsts Ior each oI the other Iour
agencIes In the UK-USA system [NSA, CCHQ, DSD, CCS8 and CSE]







149
Source: FAS. http:]]www.Ias.org]Irp]program]process]echeIon.htm ; Temporary CommIttee on the
ECHELON nterceptIon System. http:]]www.europarI.eu.Int]commIttees]echeIonhome.htm ; Constant
8rand. "Europeans Warned over EcheIon SpyIng." The CuardIan May 2001,
http:]]www.guardIan.co.uk]europarI]Story]0,2763,498440,00.htmI

EIIect oI FaIIure to Pub EIIect oI FaIIure to Pub EIIect oI FaIIure to Pub EIIect oI FaIIure to PubIIsh IIsh IIsh IIsh
ProvIdes that, except to the extent that a person has actuaI and tImeIy notIce oI the terms thereoI, a
person may not In any manner be requIred to resort to, or to be adverseIy aIIected by, a matter requIred
to be pubIIshed In the FederaI RegIster and not so pubIIshed.

Source: "PubIIc nIormatIon." 5 U.S.C. 552(a) (1), http:]]www.gpoaccess.gov]uscode]browse.htmI

EIectromagnetIc DeceptIon EIectromagnetIc DeceptIon EIectromagnetIc DeceptIon EIectromagnetIc DeceptIon
The deIIberate radIatIon, re-radIatIon, aIteratIon, suppressIon, absorptIon, denIaI, enhancement, or
reIIectIon oI eIectromagnetIc energy In a manner Intended to convey mIsIeadIng InIormatIon to an enemy
or enemy eIectromagnetIc-dependent weapons, thereby degradIng or neutraIIzIng the enemy's combat
capabIIIty. Among the types oI eIectromagnetIc deceptIon are: a. manIpuIatIve eIectromagnetIc
deceptIon-ActIons to eIImInate reveaIIng, or convey mIsIeadIng, eIectromagnetIc teIItaIe IndIcators that
may be used by hostIIe Iorces; b. sImuIatIve eIectromagnetIc deceptIon-ActIons to sImuIate IrIendIy,
notIonaI, or actuaI capabIIItIes to mIsIead hostIIe Iorces; c. ImItatIve eIectromagnetIc deceptIon-The
IntroductIon oI eIectromagnetIc energy Into enemy systems that ImItates enemy emIssIons.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

EIectronIc SeII EIectronIc SeII EIectronIc SeII EIectronIc SeII- -- -DIscIosure DIscIosure DIscIosure DIscIosure
EPA's Web-based system aIIows Ior eIectronIc seII-dIscIosure under the EPA AudIt PoIIcy. The pIIot
program, known as the AudIt PoIIcy SeII-DIscIosure system or eDIscIosure, aIIows companIes natIonwIde
to eIectronIcaIIy seII-dIscIose vIoIatIons oI the Emergency PIannIng and CommunIty RIght-to-Know Act
(EPCRA) IncIudIng:
Emergency NotIIIcatIon (sectIon 304)
CERCLA sectIon 103 (onIy II Emergency NotIIIcatIon vIoIatIon dIscIosed)
MaterIaI SaIety Data Sheets (sectIon 311)
Emergency and Hazardous ChemIcaI nventory Forms (sectIon 312)
ToxIc ChemIcaI ReIease Forms (sectIon 313)
A busIness conIIdentIaIIty cIaIm may not be asserted wIth respect to any InIormatIon submItted through
eDIscIosure.
Source: EPA, http:]]www.epa.gov]compIIance]IncentIves]audItIng]edIscIosure.htmI






150
EIectronIc SurveIIIance StatIstIcs EIectronIc SurveIIIance StatIstIcs EIectronIc SurveIIIance StatIstIcs EIectronIc SurveIIIance StatIstIcs
See See See See CommunIcatIons AssIstance Ior Law EnIorcement Act CommunIcatIons AssIstance Ior Law EnIorcement Act CommunIcatIons AssIstance Ior Law EnIorcement Act CommunIcatIons AssIstance Ior Law EnIorcement Act
The OmnIbus CrIme ControI and SaIe Streets Act oI 1968 requIres the AdmInIstratIve OIIIce oI the UnIted
States Courts (AO) to report to Congress the number and nature oI IederaI and state appIIcatIons Ior
orders authorIzIng or approvIng the InterceptIon oI wIre, oraI, or eIectronIc communIcatIons. The WIretap
Report covers Intercepts concIuded durIng each caIendar year, and provIdes suppIementary InIormatIon on
arrests and convIctIons resuItIng Irom Intercepts concIuded In prIor years.
Source: CALEA mpIementatIon UnIt (CU), EIectronIc SurveIIIance TechnoIogy SectIon, OperatIonaI
TechnoIogy DIvIsIon, FederaI 8ureau oI nvestIgatIon. http:]]www.askcaIea.net]Iaqs.htmI#18 and U.S.
Courts. WIretap Report , http:]]www.uscourts.gov]IIbrary]wIretap.htmI
EIectronIc WarIare (EW) EIectronIc WarIare (EW) EIectronIc WarIare (EW) EIectronIc WarIare (EW)
See See See See nIormatIon OperatIons nIormatIon OperatIons nIormatIon OperatIons nIormatIon OperatIons
Any mIIItary actIon InvoIvIng the use oI eIectromagnetIc and dIrected energy to controI the
eIectromagnetIc spectrum or to attack the enemy. AIso caIIed EW. The three major subdIvIsIons wIthIn
eIectronIc warIare are: eIectronIc attack, eIectronIc protectIon, and eIectronIc warIare support. a. eIectronIc
attack.

Source: DoD. nIormatIon OperatIons. ]P 3-13, February 13 2006,
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp313.pdI

EIIcItatIon EIIcItatIon EIIcItatIon EIIcItatIon
AcquIsItIon oI InIormatIon Irom a person or group In a manner that does not dIscIose the Intent oI the
IntervIew or conversatIon. A technIque oI human source InteIIIgence coIIectIon, generaIIy overt, unIess the
coIIector Is other than he or she purports to be.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
ELSUR FIIe ELSUR FIIe ELSUR FIIe ELSUR FIIe
n September 1966, AssIstant Attorney CeneraI Fred VInson orders the creatIon oI a specIaI ELSUR ndex to
record the names oI aII IndIvIduaIs whose conversatIons had been Intercepted by F8 wIretaps or bugs. An
F8 term; an ELSUR IIIe Is the recordIng oI aII authorIzed wIretaps.
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 77,
372.
EnvIronmentaI Document EnvIronmentaI Document EnvIronmentaI Document EnvIronmentaI Document
See See See See EnvIronme EnvIronme EnvIronme EnvIronmentaI mpact Statement ntaI mpact Statement ntaI mpact Statement ntaI mpact Statement






151
ncIudes the documents specIIIed In Sec. 1508.9 (envIronmentaI assessment), Sec. 1508.11
(envIronmentaI Impact statement), Sec. 1508.13 (IIndIng oI no sIgnIIIcant Impact), and Sec. 1508.22
(notIce oI Intent).

Source: 40 CFR 1508.10. "DeIInItIons." http:]]www.gpoaccess.gov]cIr]Index.htmI

EnvIronmentaI mpact Statement (ES) EnvIronmentaI mpact Statement (ES) EnvIronmentaI mpact Statement (ES) EnvIronmentaI mpact Statement (ES)
See See See See State Secrets PrIvIIege State Secrets PrIvIIege State Secrets PrIvIIege State Secrets PrIvIIege
1. A detaIIed wrItten statement as requIred by sectIon 102(2) (C) oI the Act.

Source: 40 CFR 1508.11. "DeIInItIons." http:]]www.gpoaccess.gov]cIr]Index.htmI
2. (C) IncIude In every recommendtIon or report on proposaIs Ior IegIsIatIon and other major
FederaI actIons sIgnIIIcantIy aIIectIng the quaIIty oI the human envIronment, a detaIIed statement by the
responsIbIe oIIIcIaI on --
(I) the envIronmentaI Impact oI the proposed actIon, (II) any adverse envIronmentaI eIIects whIch cannot
be avoIded shouId the proposaI be ImpIemented, (III) aIternatIves to the proposed actIon, (Iv) the
reIatIonshIp between IocaI short-term uses oI man's envIronment and the maIntenance and enhancement
oI Iong-term productIvIty, and (v) any IrreversIbIe and IrretrIevabIe commItments oI resources whIch wouId
be InvoIved In the proposed actIon shouId It be ImpIemented.

Source: NatIonaI EnvIronmentaI PoIIcy Act oI 1969 (Pub. L. 91-190, 42 U.S.C. 4321-4347 , or "NEPA"),
http:]]ceq.eh.doe.gov]nepa]regs]nepa]nepaeqIa.htm

3. NEPA sectIon 102(2)(C) caIIs Ior each EnvIronmentaI mpact Statement (ES), aIong wIth
comments receIved Irom varIous IederaI, state, and IocaI agencIes, to be made avaIIabIe to the pubIIc "as
provIded by sectIon 552 oI TItIe 5." ThIs statutory cross-reIerence Is to the Freedom oI nIormatIon Act
(FOA) whIch exempts properIy cIassIIIed agency records Irom pubIIc dIscIosure. CEQ reguIatIons
ImpIementIng NEPA aIIow the attachment oI sensItIve data to an ES as a cIassIIIed appendIx, makIng the
data avaIIabIe to members oI Congress and agency oIIIcIaIs wIth proper securIty cIearances. ThereIore, a
court conIronted wIth a NEPA enIorcement case In whIch an ES contaIns cIassIIIed InIormatIon must IIrst
ask whether the InIormatIon couId properIy be wIthheId Irom a FOA requester.

Source: Stephen Dycus. "NEPA Secrets." New York UnIversIty Law ]ournaI 2 no. 2 (1993),
http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]2]2nyueIj300.htmI

EquIty EquIty EquIty EquIty
See See See See OrIgInaI CIassIIIcatIon AuthorIty (OCA) OrIgInaI CIassIIIcatIon AuthorIty (OCA) OrIgInaI CIassIIIcatIon AuthorIty (OCA) OrIgInaI CIassIIIcatIon AuthorIty (OCA)
nIormatIon orIgInaIIy cIassIIIed by or under the controI oI an agency.







152
Source: NatIonaI DeIense. "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001,
http:]]www.gpoaccess.gov]CFR]Index.htmI

EspIonage EspIonage EspIonage EspIonage
1. The act oI obtaInIng, deIIverIng, transmIttIng, communIcatIng, or receIvIng InIormatIon In
respect to the natIonaI deIense wIth an Intent or reason to beIIeve that the InIormatIon may be used to the
Injury oI the UnIted States or to the advantage oI any IoreIgn natIon.

Source: DoD. AR 381-12. ]anuary 15, 1993. "SubversIon and EspIonage DIrected agaInst the U.S. Army."
http:]]Ias.org]Irp]doddIr]army]ar381-12.pdI,
HaroId Edgar and 8enno C. SchmIdt, ]r. "The EspIonage Statutes and PubIIcatIon oI DeIense nIormatIon."
CoIumbIa Law RevIew 73 (1973): 929-1087, 18 U.S.C 793 http:]]assembIer.Iaw.corneII.edu]uscode];
ArtIcIe 106a, UnIIorm Code oI MIIItary ]ustIce,
http:]]www4.Iaw.corneII.edu]uscode]htmI]uscode10]uscsup0110.htmI and
CeoIIrey R. Stone, Covernment Secrecy vs. Freedom oI the Press, December 2006,
http:]]www.IIrstamendmentcenter.org]about.aspxZId=18048
2. The ForeIgn nteIIIgence SurveIIIance Act (FSA) can be used to monItor U.S. persons who
engage In unIawIuI coIIectIon oI cIassIIIed or controIIed InIormatIon even II they are not actIng on behaII
oI a IoreIgn power. That Is the upshot oI an August 14 ruIIng (pdI) dIscIosed Iast week In the case oI two
Iormer oIIIcIaIs oI the AmerIcan sraeI PubIIc AIIaIrs CommIttee (APAC).The deIendants had argued that
they were ImproperIy subjected to FSA surveIIIance sInce FSA requIres that the target be "an agent oI a
IoreIgn power" and, they InsIst, they were never actIng on behaII oI a IoreIgn power.
Source: FAS. "FSA SurveIIIance Can Target Non-SpIes." Secrecy News August 28, 2006 and OM8 Watch.
"New OIIIcIaI Secrets LawZ: Case Threatens Open Covernment and Freedom oI Press." August 22, 2006,
http:]]www.ombwatch.org]artIcIe]artIcIevIew]3566]1]459ZTopIcD=2
EssentIaI EIements oI FrIendIy nIormatIon (EEF) EssentIaI EIements oI FrIendIy nIormatIon (EEF) EssentIaI EIements oI FrIendIy nIormatIon (EEF) EssentIaI EIements oI FrIendIy nIormatIon (EEF)
Key questIons IIkeIy to be asked by adversary oIIIcIaIs and InteIIIgence systems about specIIIc IrIendIy
IntentIons, capabIIItIes, and actIvItIes, so they can obtaIn answers crItIcaI to theIr operatIonaI eIIectIveness.
AIso caIIed EEF.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
EssentIaI EssentIaI EssentIaI EssentIaI EIements oI nIormatIon (EEs) EIements oI nIormatIon (EEs) EIements oI nIormatIon (EEs) EIements oI nIormatIon (EEs)
The most crItIcaI InIormatIon requIrements regardIng the adversary and the envIronment needed by the
commander by a partIcuIar tIme to reIate wIth other avaIIabIe InIormatIon and InteIIIgence In order to
assIst In reachIng a IogIcaI decIsIon.






153
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. Amended. ]P 1-02. As
Amended through 19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

EstImatIve nteIIIgence EstImatIve nteIIIgence EstImatIve nteIIIgence EstImatIve nteIIIgence
A category oI InteIIIgence anaIysIs whIch judgments are made despIte IncompIete InIormatIon. There are
two basIc types: What Is goIng onZ and What wIII happenZ

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA: NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2:C 76 and PREX 3.2]2:C 94

EstImatIve Language EstImatIve Language EstImatIve Language EstImatIve Language
What We Mean When We Say: An ExpIanatIon oI EstImatIve Language
When we use words such as "we judge" or "we assess"-terms we use synonymousIy-as weII as "we
estImate," "IIkeIy" or "IndIcate," we are tryIng to convey an anaIytIcaI assessment or judgment. These
assessments, whIch are based on IncompIete or at tImes Iragmentary InIormatIon are not a Iact, prooI, or
knowIedge. Some anaIytIcaI judgments are based dIrectIy on coIIected InIormatIon; others rest on prevIous
judgments, whIch serve as buIIdIng bIocks. n eIther type oI judgment, we do not have "evIdence" that
shows somethIng to be a Iact or that deIInItIveIy IInks two Items or Issues.

Source: OIIIce oI the DIrector oI NatIonaI nteIIIgence, Prospects Ior raq's StabIIIty: A ChaIIengIng Road
Ahead ]anuary 2007, http:]]www.dnI.gov]nIc]PDFCFotherprod]raqNEKey]udgments.pdI

EvIden EvIden EvIden EvIdentIaI VaIue tIaI VaIue tIaI VaIue tIaI VaIue
The useIuIness oI records In documentIng the organIzatIon, IunctIons, and actIvItIes oI the agency
creatIng or receIvIng them. ConsIdered by NARA In appraIsIng records Ior permanent retentIon.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

ExecutIon nIormatIon ExecutIon nIormatIon ExecutIon nIormatIon ExecutIon nIormatIon
nIormatIon that communIcates a decIsIon and dIrects, InItIates, or governs actIon, conduct, or procedure.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

ExecutIve Order (EO) ExecutIve Order (EO) ExecutIve Order (EO) ExecutIve Order (EO)
1. ExecutIve orders are oIIIcIaI documents, numbered consecutIveIy, through whIch the PresIdent
oI the UnIted States manages the operatIons oI the FederaI Covernment.






154
The text oI ExecutIve Orders appears In the daIIy FederaI RegIster as each ExecutIve Order Is sIgned by
the PresIdent, and receIved by the OIIIce oI the FederaI RegIster. The text oI ExecutIve Orders begInnIng
wIth ExecutIve Order 7316 oI March 13, 1936, aIso appears In the sequentIaI edItIons oI TItIe 3 oI the
Code oI FederaI ReguIatIons (CFR).
Source: NatIonaI ArchIves and Records AdmInIstratIon (NARA). "ExecutIve Order FAQ's."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]about.htmI
2. The PresIdentIaI system oI InIormatIon restrIctIon that grew out oI WorId War Two became an
"extravagant and IndeIensIbIe system oI denIaI" exercIsed by the ExecutIve 8ranch that had no "standIng In
Iaw" (SchIesInger 341). Arthur SchIesInger (360) says
.secrecy by deIInItIon meant that poIIcIes undertaken wIthout consent. t wouId thereIore be In
the Interest oI PresIdents to reopen the PresIdency. 8ut recent PresIdents eIther have become so
enamored oI the short-run convenIences oI secrecy, or eIse had enough to conceaI, they Iorgot
the Iong-run necessIty, above aII Ior the PresIdency ItseII, oI open government.
Source: Arthur SchIesInger. The mperIaI PresIdency. New York: AtIantIc MonthIy, 1973.
3. The PresIdent's authorIty to Issue executIve orders derIves Irom powers both enumerated,
ImpIIed and InIerred by the ConstItutIon, as weII as Irom authorIty deIegated to the PresIdent by FederaI
statute.

n the overwheImIng majorIty oI cases, executIve orders and procIamatIons are an approprIate pubIIc way
oI guIdIng the actIons oI numerous FederaI agencIes and other components oI the ExecutIve branch. WhIIe
thousands oI executIve orders have been Issued over the Iast two centurIes, FederaI courts have been
extremeIy reIuctant to chaIIenge executIve authorIty. When executIve orders are Issued wIthout a
constItutIonaI or IegaI basIs, they ImpIIcate the SeparatIon oI Powers DoctrIne that underpIns dIvIded
government.
Source: Congressman 8ob 8arr, ExecutIve Orders and PresIdentIaI DIrectIves. . . . HearIng beIore the
SubcommIttee on CommercIaI and AdmInIstratIve Law oI the CommIttee on the ]udIcIary, House oI
RepresentatIves, One Hundred Seventh Congress, IIrst sessIon, March 22, 2001,
http:]]commdocs.house.gov]commIttees]judIcIary]hju72142.000]hju721420.htm
4. "Stroke oI the pen. Law oI the Land. KInda cooI."

Source: PauI 8egaIa, (Iormer CIInton AdmInIstratIon advIsor). New York TImes, ]uIy 5, 1998.

Exempted Exempted Exempted Exempted
See See See See Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons






155
NomencIature and markIng IndIcatIng InIormatIon has been determIned to IaII wIthIn an enumerated
exemptIon Irom automatIc decIassIIIcatIon under ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty
nIormatIon," amended.

Source: NatIonaI DeIense. "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001,
http:]]www.gpoaccess.gov]CFR]Index.htmI.

ExemptIons ExemptIons ExemptIons ExemptIons
See See See See Freedom oI nIormatIon Act ExemptIons, PresIdentIaI RestrIctIons Freedom oI nIormatIon Act ExemptIons, PresIdentIaI RestrIctIons Freedom oI nIormatIon Act ExemptIons, PresIdentIaI RestrIctIons Freedom oI nIormatIon Act ExemptIons, PresIdentIaI RestrIctIons
Statutory, reguIatory and admInIstratIve desIgnatIons that restrIct pubIIc dIscIosure oI InIormatIon due to
prIvacy and conIIdentIaIIty Issues, trade secrets, proprIetary, export controIs, Iaw enIorcement, homeIand
or natIonaI securIty concerns.

CategorIes oI records exempt Irom dIscIosure under 5 U.S.C. 552.
:
Source: "PubIIc nIormatIon." 5 U.S.C. 552. http:]]www.gpoaccess.gov]uscode]browse.htmI; aIso see
Freedom oI nIormatIon Act CuIde, March 2007, http:]]www.usdoj.gov]oIp]IoIaguIde07.htm

ExercIse Term ExercIse Term ExercIse Term ExercIse Term
See See See See Code Word Codeword, NCKA, NIckname Code Word Codeword, NCKA, NIckname Code Word Codeword, NCKA, NIckname Code Word Codeword, NCKA, NIckname
A nIckname or code word, normaIIy an uncIassIIIed nIckname, used to desIgnate a test, drIII or exercIse.
An exercIse term Is empIoyed to prevent conIusIon between exercIse dIrectIons and actuaI operatIons.

Source: ChaIrman oI the ]oInt ChIeIs oI StaII ManuaI. Code Word, NIckname and ExercIse Term Report
(Short TItIe - NCKA) AprII 1998, http:]]Ias.org]Irp]doddIr]dod]cjcsm315029a.pdI

ExIormatIon ExIormatIon ExIormatIon ExIormatIon
ExpIIcItIy dIscarded InIormatIon.what we caII InIormatIon In everyday IIIe Is reaIIy more IIke ExIormatIon:
In everyday Ianguage II somethIng contaIns InIormatIon, It Is a resuIt oI the productIon oI ExIormatIon; It
Is a summary, an abbrevIatIon suItabIe Ior guIdIng a transactIon (108). ExIormatIon Is perpendIcuIar to
InIormatIon (95). What Is rejected beIore expressIon; It Is about the mentaI work we do to probe what we
want say.

Source: Tor Nrretranders. The User IIusIon: CuttIng ConscIousness Down to SIze. Trans.]onathan
Sydenham. .. .New York: VIkIng PenguIn, 1998.

ExIgent Letters ExIgent Letters ExIgent Letters ExIgent Letters
PrIor to enactment oI the ECPA [EIectronIc CommunIcatIons PrIvacy Act], the Supreme Court heId that
customers had no Fourth Amendment protected prIvacy rIghts In the records the teIephone company
maIntaIned reIatIng to theIr teIephone use. Where a recognIzed expectatIon oI prIvacy exIsts Ior Fourth
Amendment purposes, the Amendment's usuaI demands such as those oI probabIe cause, partIcuIarIty,
and a warrant may be eased In the Iace oI exIgent cIrcumstances. For exampIe, the Fourth Amendment






156
requIrement that oIIIcers must knock and announce theIr purpose beIore IorcIbIy enterIng a buIIdIng
to execute a warrant can be eased In the presence oI certaIn exIgent cIrcumstances such as the threat oI
the destructIon oI evIdence or danger to the oIIIcers. SatIsIyIng Fourth Amendment requIrements,
however, does not necessary satIsIy statutory demands.

The ECPA prohIbIts communIcatIons servIce provIders Irom suppIyIng InIormatIon concernIng
customer records unIess one oI the statutory exceptIons appIIes. There are specIIIc exceptIons Ior
dIscIosure upon receIpt oI a grand jury subpoena89 or an NSL. A servIce provIder who knowIngIy or
IntentIonaIIy vIoIates the prohIbItIon Is subject to cIvII IIabIIIty, but there are no crImInaI penaItIes Ior the
breach.

Source: Source: CharIes DoyIe, "NatIonaI SecurIty Letters In ForeIgn nteIIIgence nvestIgatIons: LegaI
8ackground and Recent Amendments," CRS Report to Congress September 8, 2009, RS22406
http:]]www.Ias.org]sgp]crs]InteI]RS22406.pdI

ExpIoIt ExpIoIt ExpIoIt ExpIoIt
n InIormatIon operatIons, to gaIn access to adversary command and controI systems to coIIect
InIormatIon or to pIant IaIse or mIsIeadIng InIormatIon.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

ExpIoItabIe Resour ExpIoItabIe Resour ExpIoItabIe Resour ExpIoItabIe Resources ces ces ces
FormuIae, desIgns, drawIngs, research data, computer programs, technIcaI data packages, and the IIke,
whIch are not consIdered records wIthIn the CongressIonaI Intent oI reIerence because oI deveIopment
costs, utIIIzatIon, or vaIue. These Items are consIdered expIoItabIe resources to be utIIIzed In the best
Interest oI aII the pubIIc and are not preserved Ior InIormatIonaI vaIue or as evIdence oI agency IunctIons.
Requests Ior copIes oI such materIaI shaII be evaIuated In accordance wIth poIIcIes expressIy dIrected to
the approprIate dIssemInatIon or use oI these resources. Requests to Inspect thIs materIaI to determIne Its
content Ior InIormatIonaI purposes shaII normaIIy be granted, unIess InspectIon Is InconsIstent wIth the
obIIgatIon to protect the property vaIue oI the materIaI, as, Ior exampIe, may be true Ior patent
InIormatIon and certaIn IormuIae, or Is InconsIstent wIth another sIgnIIIcant and IegItImate governmentaI
purpose.

Source: FederaI Emergency Management Agency (FEMA), Department oI HomeIand SecurIty. "ProductIon or
DIscIosure oI nIormatIon." 44 CFR 5.3, http:]]www.gpoaccess.gov]cIr]Index.htmI
ExpIoItatIon ExpIoItatIon ExpIoItatIon ExpIoItatIon
DoD and NATO term: 1. (DOD onIy) TakIng IuII advantage oI success In mIIItary operatIons, IoIIowIng up
InItIaI gaIns, and makIng permanent the temporary eIIects aIready achIeved. 2. TakIng IuII advantage oI






157
any InIormatIon that has come to hand Ior tactIcaI, operatIonaI, or strategIc purposes. 3. An oIIensIve
operatIon that usuaIIy IoIIows a successIuI attack and Is desIgned to dIsorganIze the enemy In depth.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Export ControIIed nIormatIon Export ControIIed nIormatIon Export ControIIed nIormatIon Export ControIIed nIormatIon
1. nIormatIon and technoIogy that may onIy be reIeased to IoreIgn natIonaIs or IoreIgn
persons In accordance wIth the Export AdmInIstratIon ReguIatIons (15 CFR parts 730-774) and the
nternatIonaI TraIIIc In Arms ReguIatIons (22 CFR parts 120-130), respectIveIy. Export controIs reguIate
the transIer oI certaIn InIormatIon and potentIaI equIpment to IoreIgn natIonaIs, and "thereIore constraIn
who can partIcIpate In assocIated research and educatIonaI actIvItIes."

Source: FederaI RegIster ]uIy 12, 2005 (VoIume 70, Number 132).
http:]]www.gpoaccess.gov]Ir]Index.htmI and Center Ior StrategIc and nternatIonaI StudIes (CSS)
"SecurIty ControIs on ScIentIIIc nIormatIon and the Conduct oI ScIentIIIc Research."
http:]]www.csIs.org]Index.phpZoptIon=comcsIspubs&task=vIew&Id=32
2. Export controIIed InIormatIon or materIaI Is InIormatIon or materIaI that cannot be reIeased to
IoreIgn natIonaIs or representatIves oI a IoreIgn entIty wIthout IIrst obtaInIng approvaI or IIcense Irom the
Department oI State. ThIs pertaIns to Items controIIed by the nternatIonaI TraIIIc In Arms ReguIatIons or
the Department oI Commerce and IncIudes Items controIIed by the Export AdmInIstratIon ReguIatIons.
Export controIIed InIormatIon must be controIIed as S8U InIormatIon and marked accordIngIy.
Source: Centers Ior DIsease ControI. "SensItIve 8ut UncIassIIIed nIormatIon." February 2006,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu-2006.htmI
ExtraordInary SecurIty Measures ExtraordInary SecurIty Measures ExtraordInary SecurIty Measures ExtraordInary SecurIty Measures
See Code words Codewords, NIckname, SensItIve Compartmented nIormatIon (SC) ControI See Code words Codewords, NIckname, SensItIve Compartmented nIormatIon (SC) ControI See Code words Codewords, NIckname, SensItIve Compartmented nIormatIon (SC) ControI See Code words Codewords, NIckname, SensItIve Compartmented nIormatIon (SC) ControI
Systems]Codewords, SpecIaI Access Program Systems]Codewords, SpecIaI Access Program Systems]Codewords, SpecIaI Access Program Systems]Codewords, SpecIaI Access Program
A securIty measure necessary to adequateIy protect partIcuIarIy sensItIve InIormatIon but whIch Imposes a
substantIaI ImpedIment to normaI staII management and oversIght. ExtraordInary securIty measures are -
a. Program access nondIscIosure agreements (read-on statements).
b. SpecIIIc oIIIcIaIs authorIzed to determIne "need-to-know" (ACA]access approvaI authorIty).
c. NIcknames]codewords Ior program IdentIIIcatIon.
d. SpecIaI access requIred markIngs.
e. Program bIIIet structure.
I. Access roster.
g. Use oI cover.
h. Use oI specIaI mIssIon Iunds or procedures.
I. Use oI a SAP IacIIIty]vauIt.






158
j. Use oI a dedIcated SAP securIty manager.
k. Any other securIty measure beyond those requIred to protect coIIateraI.
I. nIormatIon In accordance wIth AR 38-5.
Source: Department oI the Army. "SpecIaI Access Programs (SAPs) and SensItIve ActIvItIes." AR 380-381.
AprII 21, 2004, http:]]www.Ias.org]Irp]doddIr]army]ar380-381.pdI
ExtremeIy SensItIve nIormatIon ExtremeIy SensItIve nIormatIon ExtremeIy SensItIve nIormatIon ExtremeIy SensItIve nIormatIon
1. nIormatIon and materIaI reIated to the SIngIe ntegrated OperatIonaI PIan (SOP) Ior the conduct
oI nucIear war IIghtIng operatIons.

Source: ]ohn PIke, "SecurIty and CIassIIIcatIon." http:]]www.ostgate.com]cIassIIIcatIon.htmI

2. [LooseIy deIIned] manuIacturIng detaIIs; R & D InIormatIon.

Source: ra S. WInkIer. "Anatomy oI an ndustrIaI EspIonage Attack." DeIense SecurIty ServIces.
[See the Wayback MachIne, http:]]tInyurI.com]ya8ccr6 ]

~ F ~ ~ F ~ ~ F ~ ~ F ~
FabrIcator FabrIcator FabrIcator FabrIcator
ndIvIduaIs or groups who, wIthout genuIne resources, Invent InIormatIon or InIIate or embroIder over
news Ior personaI gaIn or Ior poIItIcaI purposes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

FaIr nIormatIon PrIncIpIes FaIr nIormatIon PrIncIpIes FaIr nIormatIon PrIncIpIes FaIr nIormatIon PrIncIpIes
CoIIectIon LImItatIon PrIncIpIe
Data QuaIIty PrIncIpIe
Purpose SpecIIIcatIon PrIncIpIe
Use LImItatIon PrIncIpIe
SecurIty SaIeguards PrIncIpIe
Openness PrIncIpIe
ndIvIduaI PartIcIpatIon PrIncIpIe
AccountabIIIty PrIncIpIe
Source: OrganIsatIon Ior EconomIc Co-operatIon and DeveIopment, CuIdeIInes on the ProtectIon oI PrIvacy
and Transborder FIows oI PersonaI Data (ParIs, 1980)






159
Fake News Fake News Fake News Fake News
See See See See nIormatIon 8Iowback, nIormatIon LaunderIng, Prepackaged News nIormatIon 8Iowback, nIormatIon LaunderIng, Prepackaged News nIormatIon 8Iowback, nIormatIon LaunderIng, Prepackaged News nIormatIon 8Iowback, nIormatIon LaunderIng, Prepackaged News

F8 CentraI Records System CIassIIIcatIons F8 CentraI Records System CIassIIIcatIons F8 CentraI Records System CIassIIIcatIons F8 CentraI Records System CIassIIIcatIons
For a IIst oI Records System Numbers, see MIchaeI ]. RavnItzky's heIpIuI IIst at
http:]]www.newstrench.com]03secret]0categorIes.htmI; the F8's ConductIng Research In F8 Records,
8th edItIon, 1994; the F8 research page at http:]]www.IbI.gov]research.htm; Athan C. TheoharIs, "Secrecy
and Power: UnantIcIpated ProbIems In ResearchIng F8 FIIes." PoIItIcaI ScIence QuarterIy 119 no.2 (2004):
271-290, and hIs F8: An Annotated 8IbIIography and Research CuIde. New York: CarIand, 1994.

F8 8IometrIc Center oI ExceIIence F8 8IometrIc Center oI ExceIIence F8 8IometrIc Center oI ExceIIence F8 8IometrIc Center oI ExceIIence
LeveragIng the F8's extensIve experIence In bIometrIcs, thIs program Is commItted to strengthenIng
crImInaI InvestIgatIons and enhancIng natIonaI securIty, whIIe protectIng the prIvacy rIghts oI IndIvIduaIs.

Source: F8, 8COE, http:]]www.bIometrIccoe.gov]About.htm

F8 nteIII F8 nteIII F8 nteIII F8 nteIIIgence CommunIty Data Marts gence CommunIty Data Marts gence CommunIty Data Marts gence CommunIty Data Marts
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
FederaI 8ureau oI nvestIgatIon. s Intended to take a subset oI approved data Irom a data warehouse and
make It avaIIabIe to the InteIIIgence communIty;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: PIanned;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

FederaI Agency MedIa PoIIcIes FederaI Agency MedIa PoIIcIes FederaI Agency MedIa PoIIcIes FederaI Agency MedIa PoIIcIes
See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew
To assess the degree oI Ireedom wIth whIch scIence Is communIcated at IederaI agencIes,
the UnIon oI Concerned ScIentIsts conducted an InvestIgatIon oI 15 IederaI reguIatory
and scIence agencIes. FIrst, we anaIyzed exIstIng poIIcIes governIng communIcatIon wIth the medIa and
the pubIIc. Second, we surveyed a cross-sectIon oI IederaI scIentIsts to assess how these poIIcIes are put
Into practIce.
What We Found What We Found What We Found What We Found
8oth good poIIcy and good practIce In the communIcatIon oI scIentIIIc resuIts to the medIa are achIevabIe
goaIs Ior IederaI agencIes. Yet there Is no consIstency among agency poIIcIes,
and the abIIIty oI government scIentIsts to speak IreeIy about theIr research depends on the agency that
empIoys them.







160
Source: UCCS, Freedom to Speak: A Report Card on FederaI MedIa PoIIcIes, , , ,
http:]]www.ucsusa.org]assets]documents]scIentIIIcIntegrIty]Freedom-to-Speak.pdI

FederaI nIormatIon Resources Management ReguIatIons FederaI nIormatIon Resources Management ReguIatIons FederaI nIormatIon Resources Management ReguIatIons FederaI nIormatIon Resources Management ReguIatIons (FRMR) (FRMR) (FRMR) (FRMR)
ReguIatIons on InIormatIon resources management Issued by CSA and appIIcabIe to FederaI agencIes.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

FederaI RegIster FederaI RegIster FederaI RegIster FederaI RegIster
The 1935 FederaI RegIster Act created the daIIy pubIIcatIon the FederaI RegIster. SInce Saturday, March 14,
1936, each daIIy Issue oI the FederaI RegIster has pubIIshed, In order: (1) PresIdentIaI documents, such as
procIamatIons and executIve orders; (2) IederaI agency ruIes and reguIatIons; (3) Proposed ruIes; (4)
NotIces; and (5) NotIces oI SunshIne Act meetIngs. The FederaI RegIster aIso contaIns proposed, InterIm
and IInaI ruIes. Most proposed ruIes are pubIIshed IIrst as proposaIs, wIth an InvItatIon Ior pubIIc
comment and revIew, beIore ruIes become IInaI and have the Iorce oI Iaw. nterIm and IInaI ruIes have the
Iorce oI Iaw.

Source: NatIonaI ArchIves and Records AdmInIstratIon, http:]]www.archIves.gov]IederaI-
regIster]Iaws]IederaI-regIster and 44 U.S.C. Chapter 15. http:]]www.gpoaccess.gov]uscode]Index.htmI

Feedback Feedback Feedback Feedback
n InIormatIon operatIons, InIormatIon that reveaIs how the deceptIon target Is respondIng to the
deceptIon story and II the mIIItary deceptIon pIan Is workIng.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
FIeId ManuaI FIeId ManuaI FIeId ManuaI FIeId ManuaI
A manuaI contaInIng InstructIonaI, InIormatIonaI, and reIerence materIaI reIatIve to mIIItary traInIng and
operatIons. t Is the prImary means oI promuIgatIng mIIItary doctrIne, tactIcs, and technIques.
Source: Department oI the Army DIctIonary oI UnIted States Army Terms. Army ReguIatIon 310-25.
October, 1983, http:]]www.Ias.org]Irp]doddIr]army]ar310-25.pdI

FIeId Press CensorshIp FIeId Press CensorshIp FIeId Press CensorshIp FIeId Press CensorshIp
See See See See CensorshIp CensorshIp CensorshIp CensorshIp
The securIty revIew oI news materIaI subject to the jurIsdIctIon oI the Armed Forces oI the UnIted States,
IncIudIng aII InIormatIon or materIaI Intended Ior dIssemInatIon to the pubIIc. AIso caIIed FPC.







161
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

FIIe Myst FIIe Myst FIIe Myst FIIe MystIque Ique Ique Ique
ndeed, the hIstory oI prIvate InteIIIgence InstItutIons In thIs country may be charted by tracIng the
accumuIatIon and transIer oI IIIe coIIectIons. MaIntaInIng a IIIe coIIectIon on a partIcuIar subject serves two
purposes: (1) the coIIectIon and consoIIdatIon oI materIaI In order to maxImIze the subversIve character oI
the subject, whether an IndIvIduaI or an organIzatIon ; and (2) IdentIIIcatIon Ior aggressIve purposes, the
compIIatIon oI an "enemIes IIst" Ior adverse present actIon, and as targets In the eschatoIogIcaI poIItIcs oI
deIerred reckonIng. The IIIIng ImperatIveIy reIIects the deep rooted convIctIon that the enemy Is a
conspIracy oI reaI peopIe, cunnIng deceIvers who must IIrst be IIrst be IdentIIIed, then cornered, and
uItImateIy destroyed. The mere act oI openIng a countersubversIve IIIe on a subject Is an exercIse oI
power, an outIet Ior hostIIe emotIon and IntentIon. FIIe work aIso has an objectIve, poIItIcaI dImensIon. t
IortIIIes the resIstance to change by IInkIng It to governmentaI overthrow and socIaI dIsruptIon. n thIs
respect It dIstIIIs the essentIaIIy negatIve quaIIty oI AmerIcan conservatIsm, whIch typIcaIIy seeks to
generate poIItIcaI energy by attackIng measures that threaten the status quo wIthout submIttIng Its own
premIses to the test oI the democratIc process.
Source: Frank Donner. The Age oI SurveIIIance. New York: KnopI, 1980. 416.
FIIes FIIes FIIes FIIes
1. An arrangement oI records. The term Is used to denote papers, photographs, photographIc
copIes, maps, machIne-readabIe InIormatIon, or other recorded InIormatIon regardIess oI physIcaI Iorm or
characterIstIcs, accumuIated or maIntaIned In IIIIng equIpment, boxes, or machIne-readabIe medIa, or on
sheIves, and occupyIng oIIIce or storage space.

Source: NatIonaI ArchIves and Records AdmInIstratIon. 36 CFR 1220 "FederaI Records, CeneraI."
http:]]www.gpoaccess.gov]cIr]Index.htmI

2.A Iook back to the 1972 SubcommIttee on ConstItutIonaI RIghts hearIngs on Army SurveIIIance
oI CIvIIIans: a Documentary AnaIysIs emphasIzes the necessary roIe oI the "IIIes" In surveIIIance and
controI, mIrrorIng what HarIey (1988:279) characterIzes as "aII the retentIon and controI oI InIormatIon
and knowIedge" :

The core oI any InteIIIgence operatIons Is Its IIIes. The Army's IIIes on cIvIIIan poIItIcaI actIvIty
were voIumInous and Iar reachIng. Scores oI IocaI, regIonaI, and natIonaI records centers kept
track oI IndIvIduaIs and organIzatIons oI aII kInds, Irom the UnItarIan Church, congregatIons to
the Weathermen. Computers were used to store InIormatIon and to Index voIumInous IIbrarIes oI
dossIers. Where computers were not used, card Indexes opened the way to InIormatIon. (1972: 1)
Weber (1978: 255) wrItes that bureaucratIc admInIstratIon IundamentaIIy means domInatIon through
knowIedge, a Ieature that makes It specIIIcaIIy ratIonaI. Further, ratIonaIIzatIon mIght be consIdered as






162
the destructIon or IgnorIng oI InIormatIon In order to IacIIItate Its processIng (8enIger 1986:15). AIso
at pIay Is CIddens' (1987:178) Idea that aII states are InIormatIon socIetIes, but the natIon-state has
brought the gatherIng, storage and controI oI InIormatIon to a "hIgher pItch" than at prevIous tImes In
hIstory.
Source: Maret; see works cIted In the ntroductIon, thIs work.
FIIe SerIes FIIe SerIes FIIe SerIes FIIe SerIes
See ntegraI FIIe 8Iock See ntegraI FIIe 8Iock See ntegraI FIIe 8Iock See ntegraI FIIe 8Iock
FIIe unIts or documents arranged accordIng to a IIIIng system or kept together because they reIate to a
partIcuIar subject or IunctIon, resuIt Irom the same actIvIty, document a specIIIc kInd oI transactIon, take
a partIcuIar physIcaI Iorm, or have some other reIatIonshIp arIsIng out oI theIr creatIon, receIpt, or use,
such as restrIctIons on access or use.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended,
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve Order
13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

FInIshed nteIIIgence (F) FInIshed nteIIIgence (F) FInIshed nteIIIgence (F) FInIshed nteIIIgence (F)
Raw InIormatIon anaIyzed and corroborated. t shouId be produced In a consIstent Iormat to enhance
utIIIty and reguIarIy dIssemInated to a deIIned audIence.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004.
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

FRSTFRUTS Database FRSTFRUTS Database FRSTFRUTS Database FRSTFRUTS Database
The journaIIst surveIIIance program, code named "FIrstIruIts," was part oI a DIrector oI CentraI nteIIIgence
(DC) program that was maIntaIned at Ieast untII October 2004 and was authorIzed by then-DC Porter
Coss. FIrstIruIts was authorIzed as part oI a D.C. "CounterIng DenIaI and DeceptIon" program responsIbIe
to an entIty known as the ForeIgn DenIaI and DeceptIon CommIttee (FDDC).

The organIzatIon partIy InvoIved In dIrectIng the NatIonaI SecurIty Agency program to coIIect InteIIIgence
on journaIIsts -- FIrstIruIts -- Is the ForeIgn DenIaI and DeceptIon CommIttee (FDDC), a component oI the
NatIonaI nteIIIgence CouncII. FIrstIruIts partIcuIarIy targeted State Department and CA InsIders who were
IeakIng InIormatIon about the "cookIng" oI pre-war WMD InteIIIgence to partIcuIar journaIIsts, IncIudIng
those at the New York TImes, WashIngton Post, and C8S 60 MInutes.

Source: Sourcewatch, http:]]www.sourcewatch.org]Index.phpZtItIe=FIrstIruIts

FOA Request FOA Request FOA Request FOA Request






163
See See See See ExemptIons, ExemptIons, ExemptIons, ExemptIons, Freedom oI nIormatIon Act Freedom oI nIormatIon Act Freedom oI nIormatIon Act Freedom oI nIormatIon Act, , , , Freedom oI nIormatIon Act Exem Freedom oI nIormatIon Act Exem Freedom oI nIormatIon Act Exem Freedom oI nIormatIon Act ExemptIons, PresIdentIaI ptIons, PresIdentIaI ptIons, PresIdentIaI ptIons, PresIdentIaI
RestrIctIons RestrIctIons RestrIctIons RestrIctIons
1. A wrItten request Ior access to records oI the executIve branch oI the FederaI Covernment
heId by NARA, IncIudIng NARA operatIonaI records, or to PresIdentIaI records In the custody oI NARA that
were created aIter ]anuary 19, 1981, that cItes the Freedom oI nIormatIon Act.

Source: NatIonaI ArchIves and Records AdmInIstratIon. 36 CFR 1250.2,
http:]]www.gpoaccess.gov]CFR]Index.htmI

2. A FOA request can be made Ior any agency record. ThIs does not mean, however, that the
Department oI ]ustIce wIII dIscIose aII records sought. As noted above, there are statutory exemptIons that
authorIze the wIthhoIdIng oI InIormatIon oI a sensItIve nature. When the ]ustIce Department does wIthhoId
InIormatIon Irom you, It ordInarIIy must specIIy whIch exemptIon oI the FOA permIts the wIthhoIdIng. You
shouId be aware that the FOA does not requIre agencIes to do research Ior you, to anaIyze data, to
answer wrItten questIons, or to create records In order to respond to a request.

Source: Department oI ]ustIce. Freedom oI nIormatIon Act ReIerence CuIde. AprII 2005.
http:]]www.usdoj.gov]04IoIa]0411.htmI ; "Subpart A - Procedures Ior DIscIosure oI Records Under the
Freedom oI nIormatIon Act." http:]]www.usdoj.gov]04IoIa]0411.htmI, and House CommIttee on
Covernment ReIorm. "A CItIzen's CuIde to the Freedom oI nIormatIon Act." September 20, 2005,
http:]]www.Ias.org]sgp]IoIa]cItIzen.htmI

FOA FOA FOA FOA Requester ServIce Center FOA PubIIc LIaIsons Requester ServIce Center FOA PubIIc LIaIsons Requester ServIce Center FOA PubIIc LIaIsons Requester ServIce Center FOA PubIIc LIaIsons
FOA Requester ServIce Centers (Center), as approprIate, whIch shaII serve as the IIrst pIace that a FOA
requester can contact to seek InIormatIon concernIng the status oI the person's FOA request and
approprIate InIormatIon about the agency's FOA response. The Center shaII IncIude approprIate staII to
receIve and respond to InquIrIes Irom FOA requesters;

Source: ExecutIve Order 13392, "mprovIng Agency DIscIosure oI nIormatIon," December 14, 2005,
http:]]www.Ias.org]Irp]oIIdocs]eo]eo-13392.htm

Foreground nIormatIon Foreground nIormatIon Foreground nIormatIon Foreground nIormatIon
AII InIormatIon and materIaI joIntIy generated and Iunded pertaInIng to the cooperatIve program. ThIs
InIormatIon Is avaIIabIe Ior use by aII partIcIpatIng governments In accordance wIth the terms oI an MOA
[Memorandums oI Agreement].
Source: Department oI the Army. "SpecIaI Access Programs (SAPs) and SensItIve ActIvItIes." AR 380-381.
AprII 21, 2004, http:]]www.Ias.org]Irp]doddIr]army]ar380-381.pdI
ForeIgn 8roadcast nIormatIon ServIce (F8S) ForeIgn 8roadcast nIormatIon ServIce (F8S) ForeIgn 8roadcast nIormatIon ServIce (F8S) ForeIgn 8roadcast nIormatIon ServIce (F8S)
On February 26, 1941, the FCC receIved IundIng to Iaunch the "ForeIgn 8roadcast MonItorIng ServIce," the
IIrst name Ior F8S. Operated by the CA, F8S monItors[ed] and transIates[d] IoreIgn daIIy news accounts,






164
commentarIes, and government statements Irom broadcasts, press agency transmIssIons, newspapers,
and perIodIcaIs pubIIshed wIthIn the prevIous 48-72 hours. Separate edItIons cover East AsIa, East Europe,
LatIn AmerIca, Near East and South AsIa, AIrIca (Sub-Sahara), ChIna, Iormer SovIet UnIon and West Europe.
Found In mIcroIIche In most IIbrarIes wIth a government pubIIcatIons sectIon, and through subscrIptIon
through WorId News ConnectIon, whIch IncIudes IuII text and summarIes oI IoreIgn newspaper artIcIes,
conIerence proceedIngs, teIevIsIon and radIo broadcasts, perIodIcaIs, and non-cIassIIIed technIcaI reports.
The materIaI In WNC Is provIded to the NatIonaI TechnIcaI nIormatIon ServIce (NTS) by the Open Source
Center (OSC).
Source. Stephen C. Mercado. "F8S AgaInst the AxIs, 1941-1945." https:]]www.cIa.gov]IIbrary]center-
Ior-the-study-oI-InteIIIgence]kent-csI]docs]v45I5a04p.htm; WorId News ConnectIon
http:]]wnc.IedworId.gov] and FAS, nteIIIgence Resource Program. http:]]www.Ias.org]Irp]IbIs]
ForeIgn CIvII nteI ForeIgn CIvII nteI ForeIgn CIvII nteI ForeIgn CIvII nteIIIgence IIgence IIgence IIgence
nteIIIgence derIved Irom aII sources regardIng the socIaI, poIItIcaI and economIc
aspects oI governments & cIvII popuIatIons, theIr demographIcs, structures,
capabIIItIes, organIzatIons, peopIe, and events. (ThIs deIInItIon has been based on consIderatIon oI severaI
aIternatIves to descrIbe cIvIIIan socIaI, poIItIcaI, and
economIc InIormatIon: 1) CIvII ConsIderatIons-the poIItIcaI, socIaI, economIc, and cuIturaI Iactors oI and
AOR (area oI responsIbIIIty; Army FM 3-07 paragraph 2.7), 2) CIvII ConsIderatIons- the InIIuence oI
manmade InIrastructure, cIvIIIan InstItutIons, and attItudes & actIvItIes oI the cIvIIIan Ieaders, popuIatIons,
and organIzatIons wIthIn an AOR on the conduct oI mIIItary operatIons (Army FM-06), and 3) "CuIturaI
nteIIIgence" deIIned In USMC Urban CRH; and oIten cIted by RetIred CeneraI Anthony ZInnI).

Source: DeIense Advanced Research Project Agency (DARPA). "Urban SunrIse." February 2004,
http:]]www.Ias.org]man]eprInt]urban.pdI, and Department oI the Army FIeId ManuaI 3-07 (at
gIobaIsecurIty.org), http:]]www.gIobaIsecurIty.org]mIIItary]IIbrary]poIIcy]army]Im]3-07]

ForeIgn Covernment nIormatIon (FC) ForeIgn Covernment nIormatIon (FC) ForeIgn Covernment nIormatIon (FC) ForeIgn Covernment nIormatIon (FC)
See See See See CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon
DeIIned In ExecutIve Order 12958 (CIInton AprII 1995):
(1) InIormatIon provIded to the U.S. Covernment by a IoreIgn government or governments, an
InternatIonaI organIzatIon oI governments, or any eIement thereoI, wIth the expectatIon that the
InIormatIon, the source oI the InIormatIon, or both, are to be heId In conIIdence;(2) InIormatIon produced
by the U.S. pursuant to or as a resuIt oI a joInt arrangement wIth a IoreIgn government or governments, or
an InternatIonaI organIzatIon oI governments, or any eIement thereoI, requIrIng that the InIormatIon, the
are to be heId In conIIdence; or (3) InIormatIon receIved and treated as "ForeIgn Covernment nIormatIon"
under the terms oI a predecessor order."

8ush ExecutIve Order 13292 makes FC cIassIIIed InIormatIon.







165
Source: FAS. "WhIte House ConIerence CaII 8rIeIIng."
http:]]www.Ias.org]sgp]news]2003]03]wh032503.htmI and NatIonaI CIassIIIcatIon Management SocIety.
8uIIetIn. ]anuary-February 2005. 7-8, [See the Wayback MachIne,
http:]]web.archIve.org]web]20061016081303]http:]]www.cIassmgmt.com]newsItr]janIeb05.pdI ]

ForeIgn nteIIIgence nIormatIon ForeIgn nteIIIgence nIormatIon ForeIgn nteIIIgence nIormatIon ForeIgn nteIIIgence nIormatIon
See See See See EIectronIc SurveIIIance EIectronIc SurveIIIance EIectronIc SurveIIIance EIectronIc SurveIIIance
1. ForeIgn nteIIIgence. nIormatIon reIatIng to the capabIIItIes, IntentIons, or actIvItIes oI IoreIgn
governments or eIements thereoI, IoreIgn organIzatIons, or IoreIgn persons.
Source: NatIonaI SecurIty Act oI 1947, as amended (50 U.S.C. Chapter 15, 401(a)
http:]]www.gpoaccess.gov]U.S.C.ode]search.htmI and ExecutIve Order 12333, 3.4. "UnIted States
nteIIIgence ActIvItIes." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1981-reagan.htmI
ForeIgn nteIIIgence SurveIIIance Act (FSA) ForeIgn nteIIIgence SurveIIIance Act (FSA) ForeIgn nteIIIgence SurveIIIance Act (FSA) ForeIgn nteIIIgence SurveIIIance Act (FSA)
1. The ForeIgn nteIIIgence SurveIIIance Act 50 U.S.C. 1801 et seq., (FSA) as passed In 1978,
provIded a statutory Iramework Ior the use oI eIectronIc surveIIIance In the context oI IoreIgn InteIIIgence
gatherIng. n so doIng, the Congress sought to strIke a deIIcate baIance between natIonaI securIty
Interests and personaI prIvacy rIghts. Subsequent IegIsIatIon expanded IederaI Iaws deaIIng wIth IoreIgn
InteIIIgence gatherIng to address physIcaI searches, pen regIsters and trap and trace devIces, and access
to certaIn busIness records.
SectIon 218 oI the PatrIot Act amends the ForeIgn nteIIIgence SurveIIIance Act oI 1978, aIIowIng the
sharIng oI IoreIgn InteIIIgence InIormatIon between agencIes, and SectIon 504, amends the ForeIgn
nteIIIgence SurveIIIance Act oI 1978 (FSA; 50 U.S.C. 1806), and gIves IIcense to InteIIIgence oIIIcers to
who conduct eIectronIc surveIIIance to "coordInate eIIorts" wIth Iaw enIorcement to coordInate
InvestIgatIons.

Source: EIIzabeth 8. 8azan. "The ForeIgn nteIIIgence SurveIIIance Act. An OvervIew oI the Statutory
Framework and Recent ]udIcIaI DecIsIons." CRS Report to Congress, Updated September 22, 2004,
http:]]www.Ias.org]Irp]crs]RL30465.pdI; The UnItIng and StrengthenIng AmerIca by ProvIdIng
ApproprIate TooIs RequIred to ntercept and Obstruct TerrorIsm (USA PATROT ACT) Act oI 2000,
http:]]purI.access.gpo.gov]CPO]LPS17579, CRS, "Amendments to the ForeIgn nteIIIgence SurveIIIance
Act," [n.d.] http:]]www.Ias.org]sgp]crs]InteI]m071906.pdI, and HeptIng v.AT&T EFF,
http:]]www.eII.org]cases]heptIng

2. FSA was based on a sImpIe and Important ruIe. I the surveIIIance IIt wIthIn FSA-you eIther
had a warrant or a very specIIIc certIIIcatIon Irom the Attorney CeneraI-then the Iaw was you had to
cooperate, whether you were a IandIord, whether you were a phone company. You had an obIIgatIon to
cooperate and you were IuIIy protected Irom crImInaI or cIvII IIabIIIty II you IaIIed to cooperate. On the
other hand, II you cooperated wIthout the warrant or the certIIIcatIon requIred by the statute, then you
were subject to cIvII and crImInaI penaItIes Irom the State as weII as Irom the FederaI Covernment.







166
Source: TestImony Morton HaIperIn (p.67), UnIted States. Congress. House. CommIttee on the
]udIcIary. WarrantIess surveIIIance and the ForeIgn nteIIIgence SurveIIIance Act: the RoIe oI Checks and
8aIances In ProtectIng AmerIcan's PrIvacy RIghts. Pt. : HearIng beIore the CommIttee on the ]udIcIary,
House oI RepresentatIves, One Hundred Tenth Congress, IIrst sessIon, September 5, 2007, WashIngton :
U.S. C.P.O. 2008,
http:]]Irwebgate.access.gpo.gov]cgIbIn]getdoc.cgIZdbname=110househearIngs&docId=I:37599.pdI

Note Note Note Note: FSA SectIons wIII sunset In December 2009: SectIon 6001(a) oI the nteIIIgence ReIorm and
TerrorIsm ProtectIon Act (RTPA), aIso known as the "Ione woII" provIsIon; SectIon 206 oI the USA PATROT
ACT amended FSA to permIt muItIpoInt, or "rovIng," wIretaps by addIng IIexIbIIIty to the degree oI
specIIIcIty wIth whIch the IocatIon or IacIIIty subject to eIectronIc surveIIIance under FSA must be
IdentIIIed, and SectIon 215 oI the USA PATROT ACT enIarged the scope oI documents that couId be
sought under FSA, and Iowered the standard requIred beIore a court order couId be Issued compeIIIng the
productIon oI documents. See Edward C. LIu "Amendments to the ForeIgn nteIIIgence SurveIIIance Act
Set to ExpIre In 2009," CRS Report to Congress ]anuary 6, 2009 R40138,
http:]]www.Ias.org]sgp]crs]InteI]R40138.pdI

ForeIgn ReIat ForeIgn ReIat ForeIgn ReIat ForeIgn ReIatIons oI the UnIted States Ions oI the UnIted States Ions oI the UnIted States Ions oI the UnIted States
See AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon See AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon See AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon See AdvIsory CommIttee on HIstorIcaI DIpIomatIc DocumentatIon
1. The oIIIcIaI dIpIomatIc hIstory oI the UnIted States.

2. SpeakIng oI the State Department and the tImeIy Issuance oI FRUS, the AdvIsory CommIttee on
HIstorIcaI DIpIomatIc DocumentatIon stated:
Last year the commIttee reported that "It Is reasonabIe" to be optImIstIc that the
serIes wouId be In compIIance wIth the Iaw by the end oI 2010. We no Ionger have any
reason to be optImIstIc, and are IrankIy very pessImIstIc. t seems cIear that unIess there
Is a dramatIc Improvement In the pubIIcatIon scheduIe, the Department oI State wIII
remaIn sIgnIIIcantIy out oI compIIance wIth the Iaw weII Into the second decade oI the
21st century.

Source: Department oI State. 10 FAM 141.2-2, "ForeIgn ReIatIons oI the UnIted States."
http:]]IoIa.state.gov]RECS]Iams.aspZIeveI=2&Id=11&Iam=0 and Report oI the AdvIsory CommIttee on
HIstorIcaI DIpIomatIc DocumentatIon, ]anuary 1- December 31, 2007 (Issued May 19, 2008),
http:]]Ias.org]sgp]advIsory]state]hac2007.pdI; aIso see OIIIce oI the nspector CeneraI, Management
RevIew oI the OIIIce oI the HIstorIan 8ureau oI PubIIc AIIaIrs, U.S. Department oI State, May 2009,
http:]]oIg.state.gov]documents]organIzatIon]124568.pdI

3. (1) We IInd that the current workIng atmosphere In the HO and between the HO [sIc HIstorIans
OIIIce, State] and the HAC [sIc HIstorIcaI AdvIsory CommIttee] poses reaI threats to the hIgh schoIarIy
quaIIty oI the FRUS serIes and the beneIIts It brIngs. RemarkabIy, In aII our IntervIews and the statements
we receIved, onIy a sIngIe person suggested that there was no crIsIs, no probIem beyond what Is normaI In
an oIIIce.






167
(5) We recommend that there be a careIuI and supportIve study oI InIormatIon
securIty Issues In the HO that Is desIgned to generate practIcaI soIutIons to the
InIormatIon securIty workpIace chaIIenges that so many oI our IntervIewees have
descrIbed.

Source: Warren KImbaII, Report to the Secretary oI State oI the RevIew PaneI ExamInIng the mpact on the
ForeIgn ReIatIons SerIes oI Current DIsputes ReIated to the HIstorIcaI OIIIce, ]anuary 18, 2009,
FAS http:]]www.Ias.org]sgp]advIsory]state]ho-revIew.pdI; aIso see OIIIce oI the nspector CeneraI,
Management RevIew oI the OIIIce oI the HIstorIan 8ureau oI PubIIc AIIaIrs, U.S. Department oI State,
Report Number SP--09-43, May 2009,http:]]oIg.state.gov]documents]organIzatIon]124568.pdI

ForeIgn SchooIs nItIatIves NatIonaI Student Loan Data System ForeIgn SchooIs nItIatIves NatIonaI Student Loan Data System ForeIgn SchooIs nItIatIves NatIonaI Student Loan Data System ForeIgn SchooIs nItIatIves NatIonaI Student Loan Data System
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
Department oI EducatIon. Loan Data System]CentraI ProcessIng. s a proactIve InvestIgatIon eIIort that
Iooks at whether IInancIaI aId was granted IndIvIduaIs attendIng IoreIgn InstItutIons durIng perIods oI
nonenroIIment;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

ForeIgn TerrorIst TrackIng Task Force ActIvIty ForeIgn TerrorIst TrackIng Task Force ActIvIty ForeIgn TerrorIst TrackIng Task Force ActIvIty ForeIgn TerrorIst TrackIng Task Force ActIvIty
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
FederaI 8ureau oI nvestIgatIon. Supports the ForeIgn TerrorIst TrackIng Task Force that seeks to prevent
IoreIgn terrorIsts Irom gaInIng access to the UnIted States. Data Irom the Department oI HomeIand
SecurIty, FederaI 8ureau oI nvestIgatIon, and pubIIc data sources are put Into a data mart and mIned to
determIne unIawIuI entry and to support deportatIons and
prosecutIons;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI and WIIIIam ]. Krouse. "TerrorIst dentIIIcatIon,
ScreenIng, and TrackIng Under HomeIand SecurIty PresIdentIaI DIrectIve 6." CRS Report to Congress AprII
21, 2004, http:]]www.Ias.org]Irp]crs]RL32366.pdI






168

ForeseeabIe Harm Standard ForeseeabIe Harm Standard ForeseeabIe Harm Standard ForeseeabIe Harm Standard
AIter takIng aII oI these openness prIncIpIes Into account, there stIII wIII be records and portIons oI
records Ior whIch protectIon wIII remaIn entIreIy approprIate. As the Attorney CeneraI recognIzed In hIs
CuIdeIInes, "the dIscIosure obIIgatIon under the FOA Is not absoIute." Congress IncIuded exemptIons Irom
mandatory dIscIosure to protect agaInst dIIIerent harms, such as, Ior exampIe, harm to natIonaI securIty,
harm to personaI prIvacy, and harm to Iaw enIorcement Interests.

Under the Attorney CeneraI's CuIdeIInes, beIore wIthhoIdIng a record, the agency must reasonabIy Ioresee
that dIscIosure wouId harm an Interest protected by one oI the exemptIons. Thus, FOA proIessIonaIs
shouId examIne IndIvIduaI records wIth an eye toward determInIng whether there Is IoreseeabIe harm Irom
reIease oI that partIcuIar record, or portIon thereoI. Each record shouId be revIewed by agencIes Ior Its
content, and the actuaI Impact oI dIscIosure Ior that partIcuIar record, rather than sImpIy IookIng at the
type oI document or the type oI IIIe the record Is Iocated In.

Source: Attorney CeneraI HoIder's FOA CuIdeIInes CreatIng a 'New Era oI Open Covernment,' " AprII17,
2009, http:]]www.usdoj.gov]oIp]IoIapost]2009IoIapost8.htm

FormaI Access ApprovaI FormaI Access ApprovaI FormaI Access ApprovaI FormaI Access ApprovaI
Process Ior authorIzIng access to cIassIIIed or sensItIve InIormatIon wIth specIIIed access requIrements,
such as SensItIve Compartmented nIormatIon (SC), or PrIvacy Data, based on the specIIIed access
requIrements and a determInatIon oI the IndIvIduaI's securIty eIIgIbIIIty and need-to-know.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon Assurance
CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

FormerIy RestrIcted Data (FRD) FormerIy RestrIcted Data (FRD) FormerIy RestrIcted Data (FRD) FormerIy RestrIcted Data (FRD)
See See See See NatIonaI SecurIty nIormatIon, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty nIormatIon, RestrIcted Data RestrIcted Data RestrIcted Data RestrIcted Data
1. CIassIIIed InIormatIon joIntIy determIned by the DOE and the Department oI DeIense reIated to
the mIIItary utIIIzatIon oI atomIc weapons, and removed Irom the RD category pursuant to sectIon 142d oI
the AtomIc Energy Act, and be adequateIy saIeguarded by as NatIonaI SecurIty nIormatIon (NS).

Source: SectIon 142d oI the AtomIc Energy Act, Los AIamos NatIonaI Lab. "DeIInItIons."
http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm, DOE. UnderstandIng CIassIIIcatIon.
WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior DeIense Programs, OIIIce oI CIassIIIcatIon,
1987, and 10 CFR 1016 1016.3 "DeIInItIons." http:]]www.gpoaccess.gov]CFR]Index.htmI
35



35
QuIst wrItes that certaIn types oI secret InIormatIon reIated to nucIear materIaIs and processes
have theIr orIgIn In the MED SecurIty ManuaI, (U.S. EngIneer OIIIce, Manhattan EngIneer DIstrIct, Nov. 26,
1945,http:]]www.Ias.org]sgp]IIbrary]quIst2]chap7.htmI#15)






169
2. FRD are sometImes reIerred to as "cIassIIIed atomIc energy InIormatIon." FRD Is 8orn
CIassIIIed.

Source: ArvIn S. QuIst. "SecurIty CIassIIIcatIon oI nIormatIon." Chapter 3,
http:]]www.Ias.org]sgp]IIbrary]quIst2]chap3.htmI

3. LIttIe dIIIerence exIsts between NatIonaI SecurIty nIormatIon and FormerIy RestrIcted Data
except Ior the cumbersome requIrement Ior joInt DoD-DOE determInatIons on decIassIIIcatIon and the
process Ior sharIng the InIormatIon wIth other natIons-a process IargeIy redundant wIth other
mechanIsms Ior achIevIng sImIIar objectIves.

Source: AIbert Narath. Report oI the FundamentaI CIassIIIcatIon PoIIcy RevIew Croup. Chapter 3,
http:]]www.Ias.org]sgp]IIbrary]repIcprg.htmI#43

4. nIormatIon removed Irom the RestrIcted Data category upon a joInt determInatIon by the
Department oI Energy (or antecedent agencIes) and the Department oI deIense that such InIormatIon
reIates prImarIIy to the mIIItary utIIIzatIon oI atomIc weapons and that such InIormatIon can be
saIeguarded adequateIy as cIassIIIed deIense InIormatIon. For purposes oI IoreIgn dIssemInatIon,
however, such InIormatIon Is treated In the same manner as RestrIcted Data.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

5. OnIy DOE, NRC, DoD, and NASA can grant access to RD and FRD. Contractors oI aII other
IederaI agencIes must be processed Ior PCLs (personneI cIearance) by the DOE. The mInImum InvestIgatIve
requIrements and standards Ior access to RD and FRD are set Iorth In the NatIonaI ndustrIaI SecurIty
Program OperatIng ManuaI (NSPOM), Chapter 9.

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm
6. E.O. 12958, amended, does not appIy to RD or FRD.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO) For OIIIcIaI Use OnIy (FOUO)
See See See See CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs, , , , UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon UncIassIIIed nIormatIon
1. UncIassIIIed InIormatIon may onIy be shared wIth IndIvIduaIs who are determIned to have a
"need to know" It. Furthermore, DHS empIoyees and contractors must sIgn a specIaI Non-DIscIosure
Agreement beIore receIvIng access to uncIassIIIed FOUO InIormatIon.






170

The FOUO IabeI Is used wIthIn the DHS ".to IdentIIy uncIassIIIed InIormatIon oI a sensItIve nature, not
otherwIse categorIzed by statute or reguIatIon, the unauthorIzed dIscIosure oI whIch couId adverseIy
Impact a person's prIvacy and weIIare, the conduct oI a IederaI program, or other programs or operatIons
essentIaI to the natIonaI Interest."

The IoIIowIng types oI InIormatIon wIII be treated as FOUO InIormatIon. Where InIormatIon cIted beIow
aIso meets the standards Ior desIgnatIon pursuant to other exIstIng statutes or reguIatIons, the appIIcabIe
statutory or reguIatory guIdance wIII take precedence. For exampIe, shouId InIormatIon meet the
standards Ior desIgnatIon as SensItIve SecurIty nIormatIon (SS), then SS guIdance Ior markIng, handIIng,
and saIeguardIng wIII take precedence.

(a) nIormatIon oI the type that may be exempts Irom dIscIosure per 5 U.S.C. 552, Freedom oI nIormatIon
Act, and Its amendments. DesIgnatIon oI InIormatIon as FOUO does not ImpIy that the InIormatIon Is
aIready exempt Irom dIscIosure under FOA. Requests under FOA, Ior InIormatIon desIgnated as FOUO,
wIII be revIewed and processed In the same manner as any other FOA request.
(b) nIormatIon exempt Irom dIscIosure per 5 U.S.C. 552a, PrIvacy Act.
(c) nIormatIon wIthIn the InternatIonaI and domestIc bankIng and IInancIaI communItIes protected by
statute, treaty, or other agreements.
(d) Other InternatIonaI and domestIc InIormatIon protected by statute, treaty, reguIatIon or other
agreements.
(e) nIormatIon that couId be soId Ior proIIt.
(I) nIormatIon that couId resuIt In physIcaI rIsk to personneI.
(g) DHS InIormatIon technoIogy (T) InternaI systems data reveaIIng InIrastructure used Ior servers,
desktops, and networks; appIIcatIons name, versIon and reIease; swItchIng, router, and gateway
InIormatIon; InterconnectIons and access methods; mIssIon or busIness use]need. ExampIes oI
InIormatIon are systems InventorIes and enterprIse archItecture modeIs. nIormatIon pertaInIng to natIonaI
securIty systems and eIIgIbIe Ior cIassIIIcatIon under ExecutIve Order 12958, as amended, wIII be
cIassIIIed as approprIate.
(h) Systems securIty data reveaIIng the securIty posture oI the system. For exampIe, threat assessments,
system securIty pIans, contIngency pIans, rIsk management pIans, 8usIness mpact AnaIysIs studIes, and
CertIIIcatIon and AccredItatIon documentatIon.
(I) RevIews or reports IIIustratIng or dIscIosIng IacIIIty InIrastructure or securIty vuInerabIIItIes, whether to
persons, systems, or IacIIItIes, not otherwIse eIIgIbIe Ior cIassIIIcatIon under ExecutIve Order 12958, as
amended.
(j) nIormatIon that couId constItute an IndIcator oI U.S. government IntentIons, capabIIItIes, operatIons, or
actIvItIes or otherwIse threaten operatIons securIty.
(k) DeveIopIng or current technoIogy, the reIease oI whIch couId hInder the objectIves oI DHS, compromIse
a technoIogIcaI advantage or countermeasure, cause a denIaI oI servIce, or provIde an adversary wIth
suIIIcIent InIormatIon to cIone, counterIeIt, or cIrcumvent a process or system.






171
Source: Department oI HomeIand SecurIty Management DIrectIve 11042 "SaIeguardIng SensItIve 8ut
UncIassIIIed (For OIIIcIaI Use OnIy) nIormatIon," May 11, 2004, http:]]www.Ias.org]sgp]othergov]dhs-
sbu.htmI

2. FOUO Is not cIassIIIed InIormatIon, but InIormatIon that shouId be dIstrIbuted onIy to persons
who need to know the InIormatIon to be aware oI condItIons that wIII heIp keep the homeIand, and hence,
the communIty secure. WIthIn DHS, the caveat "For OIIIcIaI Use OnIy" wIII be used to IdentIIy S8U
InIormatIon wIthIn the DHS communIty that Is not otherwIse governed by state or reguIatIon. At thIs poInt
the desIgnatIon appIIes onIy to DHS advIsorIes and buIIetIns.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

3. For OIIIcIaI Use OnIy (FOUO) Is a document desIgnatIon, not a cIassIIIcatIon. ThIs desIgnatIon Is
used by Department oI DeIense and a number oI other IederaI agencIes to IdentIIy InIormatIon or materIaI
whIch, aIthough uncIassIIIed, may not be approprIate Ior pubIIc reIease.
Source: DoD. DeIense PersonneI SecurIty Research Center. "EmpIoyees CuIde to SecurIty ResponsIbIIItIes,"
http:]]www.hq.nasa.gov]oIIIce]ospp]securItyguIde]Home.htm
4. A desIgnatIon that Is appIIed to uncIassIIIed InIormatIon that may be exempt Irom mandatory
reIease to the pubIIc under the Freedom oI nIormatIon Act (FOA). The FOA specIIIes nIne exemptIons
whIch may quaIIIy certaIn InIormatIon to be wIthheId Irom reIease to the pubIIc II, by Its dIscIosure, a
IoreseeabIe harm wouId occur. They are:
(1) nIormatIon whIch Is currentIy and properIy cIassIIIed.
(2) nIormatIon that pertaIns soIeIy to the InternaI ruIes and practIces oI the agency. (ThIs
exemptIon has two proIIIes, "hIgh" and "Iow." The "hIgh" proIIIe permIts wIthhoIdIng oI a
document that, II reIeased, wouId aIIow cIrcumventIon oI an agency ruIe, poIIcy, or statute,
thereby ImpedIng the agency In the conduct oI Its mIssIon. The "Iow" proIIIe permIts wIthhoIdIng II
there Is no pubIIc Interest In the document, and It wouId be an admInIstratIve burden to process
the request.)
(3) nIormatIon specIIIcaIIy exempted by a statute estabIIshIng partIcuIar crIterIa Ior wIthhoIdIng.
The Ianguage oI the statute must cIearIy state that the InIormatIon wIII not be dIscIosed.
(4) nIormatIon such as trade secrets and commercIaI or IInancIaI InIormatIon obtaIned Irom a
company on a prIvIIeged or conIIdentIaI basIs that, II reIeased, wouId resuIt In competItIve harm to
the company, ImpaIr the government's abIIIty to obtaIn IIke InIormatIon In the Iuture, or protect
the government's Interest In compIIance wIth program eIIectIveness.
(5) nter-agency memoranda that are deIIberatIve In nature; thIs exemptIon Is approprIate Ior
InternaI documents that are part oI the decIsIon makIng process and contaIn subjectIve
evaIuatIons, opInIons and recommendatIons.
(6) nIormatIon the reIease oI whIch couId reasonabIy be expected to constItute a cIearIy






172
unwarranted InvasIon oI the personaI prIvacy oI IndIvIduaIs.
(7) Records or InIormatIon compIIed Ior Iaw enIorcement purposes that (a) couId reasonabIy be
expected to InterIere wIth Iaw enIorcement proceedIngs; (b) wouId deprIve a person oI a rIght to a
IaIr trIaI or ImpartIaI adjudIcatIon; (c) couId reasonabIy be expected to constItute an unwarranted
InvasIon oI the personaI prIvacy oI others, (d) dIscIose the IdentIty oI a conIIdentIaI source, (e)
dIscIose InvestIgatIve technIques and procedures, or (I) couId reasonabIy be expected to endanger
the IIIe or physIcaI saIety oI any IndIvIduaI.
(8) CertaIn records oI agencIes responsIbIe Ior supervIsIon oI IInancIaI InstItutIons.
(9) CeoIogIcaI and geophysIcaI InIormatIon concernIng weIIs. b. nIormatIon that Is currentIy and
properIy cIassIIIed can be wIthheId Irom mandatory reIease under the IIrst exemptIon category.
"For OIIIcIaI Use OnIy" Is appIIed to InIormatIon that Is exempt under one oI the other eIght
categorIes. So, by deIInItIon, InIormatIon must be uncIassIIIed In order to be desIgnated FOUO. I
an Item oI InIormatIon Is decIassIIIed, It can be desIgnated FOUO II It quaIIIIes under one oI those
other categorIes. ThIs means that (1) InIormatIon cannot be cIassIIIed and FOUO at the same tIme,
and (2) InIormatIon that Is decIassIIIed may be desIgnated FOUO, but onIy II It IIts Into one oI the
Iast eIght exemptIon categorIes (categorIes 2 through 9).
Source: DoD. DOD 5200.1-R nIormatIon SecurIty Program. AppendIx C,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm
5. "The 'FOUO' markIngs are no Ionger operatIve," an Army spokesman saId.

Source: "Human nteIIIgence CoIIector OperatIons," FIeId ManuaI FM 2-22.3, September 2006,
http:]]www.Ias.org]Irp]doddIr]army]Im2-22-3.pdI (FOUO markIng Is stIII beIng used In 2009 8TW).

Note: Note: Note: Note: Except they are; see Cen. CIapper's poIIcy dIrectIve AprII 7, 2009, "CIarIIIcatIon oI Current DoD
PoIIcy on ControIIed UncIassIIIed nIormatIon (CU)," http:]]www.Ias.org]sgp]cuI]ousd040709.pdI

Forward TeII Forward TeII Forward TeII Forward TeII
The transIer oI InIormatIon to a hIgher IeveI oI command.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Freedom oI nIormatIon Act (FOA) Freedom oI nIormatIon Act (FOA) Freedom oI nIormatIon Act (FOA) Freedom oI nIormatIon Act (FOA)
See See See See Freedom oI nIormatIon ExemptIons, FOA Request, PresIdentIaI RestrIctIons Freedom oI nIormatIon ExemptIons, FOA Request, PresIdentIaI RestrIctIons Freedom oI nIormatIon ExemptIons, FOA Request, PresIdentIaI RestrIctIons Freedom oI nIormatIon ExemptIons, FOA Request, PresIdentIaI RestrIctIons
1. n 1953 Congressmen ]ohn Moss, consIdered the Iather oI the Freedom oI nIormatIon Act,
requested InIormatIon Irom the EIsenhower CIvII ServIce CommIssIon to verIIy Its cIaIm that 2,800 IederaI
empIoyees had been IIred due to "securIty reasons." Moss requIred the InIormatIon to dIscern whether
these termInatIons entaIIed aIIegatIons oI dIsIoyaIty, espIonage or other condItIons (MoynIhan 173). The
CIvII ServIce CommIssIon reIused to suppIy the InIormatIon to Moss, who Iearned that as a member oI
Congress, he had no IegaI recourse to Iorce the CommIssIon to dIscIose the InIormatIon. n response,






173
Moss convened the SpecIaI Covernment nIormatIon SubcommIttee In 1955, "tasked wIth monItorIng
executIve secrecy" (MoynIhan 173). Moss and hIs commIttee determIned "the rIght to know has suIIered"
(MoynIhan 173). The CommIttee's InvestIgatIons Ied to greater understandIng oI securIty cIassIIIcatIon In
the ExecutIve 8ranch, how secrecy ImpaIrs not onIy the poIItIcaI partIcIpatIon oI Congress, but aIso
damages cItIzen partIcIpatIon. t wouId be a Iong, tortuous eIeven years beIore FOA was reaIIzed
(MoynIhan 173).

n seekIng a modeI Ior FOA, Moss Iooked Ior guIdance on InIormatIon rIghts Irom the U.S. ConstItutIon,
EngIIsh common Iaw, statutory Iaw and IederaI case Iaw (Kostyu 462). Moss aIso Incorporated the work oI
Kent Cooper, HaroId Cross and the Freedom oI nIormatIon CommIttee, AmerIcan SocIety oI Newspaper
EdItors (ASNE) Into hIs draIt Ireedom oI InIormatIon bIII. Moss and hIs subcommIttee reached the generaI
concIusIon that a modeI Ireedom oI InIormatIon IegIsIatIon shouId read "aII records shouId be open except
as otherwIse provIded by Iaw."
Source: UnIted States Congress. Senate CommIttee on CovernmentaI AIIaIrs. Report oI the CommIssIon on
ProtectIng and ReducIng Covernment Secrecy: HearIng beIore the CommIttee on CovernmentaI AIIaIrs
(UnIted States Senate, One Hundred FIIth Congress, FIrst SessIon, May 7, 1997. WashIngton: Covernment
PrIntIng OIIIce, 1997, http:]]www.access.gpo.gov]congress]commIssIons]secrecy]); PauI E. Kostyu.
"NothIng More, NothIng Less: Case Law LeadIng to the Freedom oI nIormatIon Act." AmerIcan ]ournaIIsm
12 no. 4 (1995): 464-476; Herbert N. FoersteI. Freedom oI nIormatIon and the RIght to Know: the OrIgIns
and AppIIcatIons oI the Freedom oI nIormatIon Act. Westport, CT: Creenwood Press, 1999, and the ]ohn
Moss FoundatIon websIte http:]]www.johnemossIoundatIon.org].

2. FOA appIIes onIy to IederaI agencIes and does not create a rIght oI access to records heId by
Congress, the courts, or by state or IocaI government agencIes. Each state has Its own pubIIc access Iaws
that shouId be consuIted Ior access to state and IocaI records. Each IederaI agency Is responsIbIe Ior
meetIng Its FOA responsIbIIItIes Ior Its own records.

Source: Department oI ]ustIce. "Freedom oI nIormatIon Act (FOA)," http:]]www.usdoj.gov]oIp]Index.htmI

3. The Freedom oI nIormatIon Act (FOA) estabIIshes a presumptIon that records In the
possessIon oI agencIes and departments oI the executIve branch oI the U.S. Covernment are accessIbIe to
the peopIe. ThIs was not aIways the approach to FederaI InIormatIon dIscIosure poIIcy. 8eIore enactment
oI the FOA In 1966, the burden was on the IndIvIduaI to estabIIsh a rIght to examIne these government
records. There were no statutory guIdeIInes or procedures to heIp a person seekIng InIormatIon. There
were no judIcIaI remedIes Ior those denIed access.

WIth the passage oI the FOA, the burden oI prooI shIIted Irom the IndIvIduaI to the government. Those
seekIng InIormatIon are no Ionger requIred to show a need Ior
InIormatIon. nstead, the "need to know'' standard has been repIaced by a "rIght to know'' doctrIne. The
government now has to justIIy the need Ior secrecy.







174
The FOA sets standards Ior determInIng whIch records must be dIscIosed and whIch records may be
wIthheId. The Iaw aIso provIdes admInIstratIve and judIcIaI remedIes Ior those denIed access to records.
Above aII, the statute requIres FederaI agencIes to provIde the IuIIest possIbIe dIscIosure oI InIormatIon to
the pubIIc. The hIstory oI the act reIIects that It Is a dIscIosure Iaw.

Source: House CommIttee on Covernment ReIorm. "A CItIzen's CuIde to the Freedom oI nIormatIon Act."
September 20, 2005, http:]]www.Ias.org]sgp]IoIa]cItIzen.htmI

4. The Freedom oI nIormatIon Act Is an InIormatIon dIscIosure statute whIch, through Its
exemptIon structure, strIkes a baIance between InIormatIon dIscIosure and nondIscIosure, wIth an
emphasIs on the "IuIIest responsIbIe dIscIosure." nasmuch as the FOA's exemptIons are dIscretIonary,
not mandatory, agencIes may make "dIscretIonary dIscIosures" oI exempt InIormatIon, as a matter oI theIr
admInIstratIve dIscretIon, where they are not otherwIse prohIbIted Irom doIng so.

Source: Department oI ]ustIce. "DIscretIonary DIscIosure and WaIver." Freedom oI nIormatIon CuIde,
http:]]www.usdoj.gov]oIp]dIscretIonary.htm; aIso see: Senator PatrIck Leahy on the 42nd AnnIversary oI
the Freedom oI nIormatIon Act, CongressIonaI Record ]une 25, 2008,
http:]]www.gpoaccess.gov]crecord]Index.htmI

Freedom oI nIormatIon Act Freedom oI nIormatIon Act Freedom oI nIormatIon Act Freedom oI nIormatIon Act ExemptIons ExemptIons ExemptIons ExemptIons
1. The Freedom oI nIormatIon Act outIInes InIormatIon that Is exempt Irom dIscIosure:
ExemptIon 1 Documents cIassIIIed Ior natIonaI securIty reasons
ExemptIon 2 nternaI personneI ruIes and practIces
ExemptIon 3 Documents exempted by statute
ExemptIon 4 Trade secrets
36

ExemptIon 5 nter]Interagency materIaIs (executIve prIvIIege)
ExemptIon 6 PersonneI and medIcaI records
ExemptIon 7- 7(F) Records "compIIed Ior Iaw enIorcement purposes"
ExemptIon 8 nIormatIon used In reguIatIng IInancIaI InstItutIons (bank examInatIon reports)
ExemptIon 9 CeoIogIcaI InIormatIon about oII weIIs and water resources
Records ExcIusIons
Source: Department oI ]ustIce. Freedom oI nIormatIon CuIde, http:]]www.usdoj.gov]oIp]IoI-act.htm ;
House CommIttee on Covernment ReIorm. "A CItIzen's CuIde to the Freedom oI nIormatIon Act."

36
Warren (292) remarks that FOA "IaIIs to deIIne what 'trade secrecy' means." ]acqueIIne M.
Warren. "ProbIems Encountered wIth ConIIdentIaIIty 8ars on ToxIc Substances DIscIosure mposed by
FederaI EnvIronmentaI Statutes." New York UnIversIty EnvIronmentaI Law ]ournaI 2 no. 2 (1993): 292-299.
http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI






175
September 20, 2005, http:]]www.Ias.org]sgp]IoIa]cItIzen.htmI and CIna MarIe Stevens and Todd 8.
TateIman. "ProtectIon oI SecurIty-ReIated nIormatIon." CRS Report Ior Congress September 27, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RL33670.pdI

2. The post 9]]11 "CrItIcaI nIrastructure nIormatIon" (C), whIch "reIates to the productIon,
generatIon, transportatIon, transmIssIon, or dIstrIbutIon oI energy; couId be useIuI to a person In pIannIng
an attack on crItIcaI InIrastructure," Is exempt Irom mandatory dIscIosure under the Freedom oI
nIormatIon Act, 5 U.S.C. 552.
CrItIcaI InIrastructure InIormatIon as deIIned In the PatrIot Act ("UnItIng and StrengthenIng AmerIca by
ProvIdIng ApproprIate TooIs RequIred to ntercept and Obstruct TerrorIsm Act oI 2001" ) consIdered Is
exempt Irom FOA, see ExemptIon 2.

Source: CIna MarIe Stevens. "HomeIand SecurIty Act oI 2002: CrItIcaI nIrastructure nIormatIon Act." CRS
Report Ior Congress February 28, 2003, http:]]www.Ias.org]sgp]crs]RL31762.pdI and Freedom oI
nIormatIon CuIde, http:]]www.usdoj.gov]oIp]IoI-act.htm

3. Moreover, on October 12, 2001, Attorney CeneraI ]ohn AshcroIt Issued a memorandum that
supersedes the Department oI ]ustIce FOA poIIcy memorandum that had been In eIIect sInce October
1993. The AshcroIt memo "estabIIshes a new "sound IegaI basIs" standard governIng the Department oI
]ustIce's decIsIons on whether to deIend agency actIons under the FOA when they are chaIIenged In court.
ThIs dIIIers Irom the "IoreseeabIe harm" standard that was empIoyed under the predecessor
memorandum. Under the new standard, agencIes shouId reach the judgment that theIr use oI a FOA
exemptIon Is on sound IootIng, both IactuaIIy and IegaIIy, whenever they wIthhoId requested InIormatIon."

Source: DO]. OIIIce oI nIormatIon and PrIvacy. FOA Post. "New Attorney CeneraI FOA Memorandum
ssued." October 2001, http:]]www.usdoj.gov]oIp]IoIapost]2001IoIapost19.htm

The AshcroIt memo repIaces the "sound IegaI basIs" guIdance wIth a standard oI "IoreseeabIe harm."

See deIInItIons oI SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon and ConIIdentIaI, ConIIdentIaI, ConIIdentIaI, ConIIdentIaI, thIs work. AIso the "Card
Memorandum" In Reporter's CommIttee Ior Freedom oI the Press, HomeIront ConIIdentIaI: How the War on
TerrorIsm AIIects Access to nIormatIon and the PubIIc's RIght to Know. 6
th
edItIon,
http:]]www.rcIp.org]homeIrontconIIdentIaI]IoI.htmI ; aIso see "PresIdent Obama's FOA Memorandum
and Attorney CeneraI HoIder's FOA CuIdeIInes CreatIng a 'New Era oI Open Covernment,' "
http:]]www.usdoj.gov]oIp]IoIapost]2009IoIapost8.htm (#3" Records shouId not be wIthheId mereIy
because they IaII wIthIn an exemptIon" Is noteworthy).

4. S. 1873 creates the "8IomedIcaI Advanced Research and DeveIopment Agency" (8ARDA)
coordInate and oversee actIvItIes that support and acceIerate quaIIIIed countermeasure or quaIIIIed
pandemIc or epIdemIc product advanced research and deveIopment. " RestrIcts FACA (FederaI AdvIsory
CommIttee Act) access to InIormatIon and meetIngs ; exempts "actIvItIes, workIng groups, and advIsory
boards oI the 8ARDA shaII not be subject to dIscIosure under sectIon 552 oI tItIe 5, UnIted States Code,






176
unIess the Secretary or DIrector determInes that such dIscIosure wouId pass no threat to natIonaI
securIty. Such a determInatIon shaII not be subject to judIcIaI revIew [112; emphasIs added].

Source: S.1873 "To prepare and strengthen the bIodeIenses oI the UnIted States agaInst the deIIberate,
accIdentaI, and naturaI outbreaks oI IIIness, and Ior other purposes." October 17, 2005. Text at CPO
Access, http:]]Irwebgate.access.gpo.gov.

Free FIow oI nIormatIon Free FIow oI nIormatIon Free FIow oI nIormatIon Free FIow oI nIormatIon
See See See See Covernment nIormatIon Covernment nIormatIon Covernment nIormatIon Covernment nIormatIon, , , , Open nIormatIon Open nIormatIon Open nIormatIon Open nIormatIon
Free IIow oI InIormatIon as a means In whIch open government aIIows the press, Interested IndIvIduaIs,
and others to see and hear what Is goIng on In government, and take the InItIatIve to pubIIcIze, comment
upon, and InIIuence governmentaI actIvItIes.

Source: UnIted States. AdvIsory CommIssIon on ntergovernmentaI ReIatIons. CItIzen PartIcIpatIon In the
AmerIcan FederaI System. WashIngton: AdvIsory CommIssIon on ntergovernmentaI ReIatIons, 1980.
SUDOC: Y 3.Ad 9]8:2 C 49]2

FugItIve Documents FugItIve Documents FugItIve Documents FugItIve Documents
FederaI agency pubIIcatIons that are not sent to the Covernment PrIntIng OIIIce Ior IncIusIon In the FederaI
DeposItory LIbrary Program (FLDP) whIch suppIIes IIbrarIes wIth pubIIc (not cIassIIIed or potentIaIIy
sensItIve) InIormatIon.
Source: CII 8aIdwIn. "FugItIve Document s- On the Loose or On the Run."
http:]]www.IIb.umIch.edu]govdocs]adnotes]2003]241003]an2410d.htm
Fu Fu Fu FuII II II II- -- -pIpe surveIIIance pIpe surveIIIance pIpe surveIIIance pIpe surveIIIance
UtIIIzed by the F8 when an SP can't IsoIate the IndIvIduaI or P address.

Source: DecIan McCuIIagh, "F8 turns to broad new wIretap method." ZDNet News ]anuary 30, 2007,
http:]]news.zdnet.com]2100-959522-6154457.htmI and PauI Ohm, "The OImsteadIan SeIzure CIause:
The Fourth Amendment and the SeIzure oI ntangIbIe Property," StanIord Law RevIew]CS SymposIum
2007, http:]]stIr.stanIord.edu]2008]01]theoImsteadIanseIzurecIause.htmI

Fuse FuseIet Fuse FuseIet Fuse FuseIet Fuse FuseIet
See See See See nIormatIon DomInance, nIormatIon OperatIons, nIormatIon SuperIorIty nIormatIon DomInance, nIormatIon OperatIons, nIormatIon SuperIorIty nIormatIon DomInance, nIormatIon OperatIons, nIormatIon SuperIorIty nIormatIon DomInance, nIormatIon OperatIons, nIormatIon SuperIorIty
1. .NetworkIng soItware enabIes commanders to share -- or Iuse -- InIormatIon Irom an array
oI aIr and ground sensors. ThIs wIII make the trackIng oI enemy ground troops, IrIendIy troops and
artIIIery and aIrcraIt easIer, experts saId.

Source: Cene ]. KoprowskI. "CIgabyte 8attIeIIeIds." Spacewar.com ]anuary 5, 2006,
http:]]www.spacewar.com]news]CIgabyte8attIeIIeIds.htmI






177
2. Army O Is conducted wIthIn the context oI joInt O, IncIudIng PSYOPS and deceptIon
campaIgns to ensure the strategIc, theater, and tactIcaI eIIorts are synchronIzed and coIIaboratIve.
n the aggregate, O technoIogIes wIII assIst In understandIng the battIespace. HIgh-speed processors wIII
Iuse InIormatIon Irom muItIpIe sources whIIe rapId generatIon oI hIgh-IIdeIIty databases wIII enabIe the
commander to vIsuaIIze current and Iuture operatIons. 8andwIdth on demand wIII IacIIItate common
understandIng at aII echeIons and new antenna conIIguratIons wIII aIIow dIssemInatIon oI "reaI tIme"
InIormatIon on the move. At the same tIme, Iow probabIIIty oI Intercept]Iow probabIIIty oI detectIon
sIgnature management wIII protect IrIendIy InIormatIon whIIe dIrected and RF energy wIII dIsrupt and deny
InIormatIon to the enemy.
Source: Army VIsIon 2010. "nIormatIon SuperIorIty."
http:]]www.army.mII]2010]InIormatIonsuperIorIty.htm

3. A common grId, In combInatIon wIth a dIstrIbuted and open archItecture, gIves us the abIIIty
Iater to go back and Iuse InIormatIon that was coIIected at prevIous tImes or to Iook at correIatIons oI
events.

Source: PauI C. KamInskI. "21st Century 8attIeIIeId DomInance." DeIense ssues 11 no. 10 (]anuary 16,
1996), http:]]www.deIenseIInk.mII]speeches]1996]s19960116-kamInskI.htmI

4. The purpose oI the ]oInt 8attIespace nIosphere (]8) FuseIets Concept oI OperatIons (CONOPS)
Is to propose an envIsIoned operatIonaI capabIIIty Ior the horIzontaI and vertIcaI IntegratIon, manIpuIatIon,
and productIon oI vaIue-added actIonabIe InIormatIon. ThIs proposed capabIIIty Is enabIed by an
InnovatIve technoIogy known as a IuseIet. FuseIets perIorm InIormatIon manIpuIatIon IunctIons wIthIn an
InIormatIon management Iramework caIIed the ]oInt 8attIespace nIosphere (]8).

Source: ]ames R. MIIIIgan. "DraIt: Concept oI OperatIons: ]oInt 8attIespace nIosphere (]8) FuseIets."
AFRL]FSE, ]oInt 8attIespace nIosphere (]8), AIr Force Research Laboratory nIormatIon DIrectorate. ]une
23, 2004, http:]]www.IuseIet.org]specIIIcatIons]FuseIetCONOPS-V1.1-23]un04.doc

FusIon FusIon FusIon FusIon
n InteIIIgence usage, the process oI examInIng aII sources oI InteIIIgence and
InIormatIon to derIve a compIete assessment oI actIvIty.

Source: Department oI DeIense DIctIonary. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

FusIon Centers FusIon Centers FusIon Centers FusIon Centers
1. A IusIon center Is an eIIectIve and eIIIcIent mechanIsm to exchange InIormatIon and
InteIIIgence, maxImIze resources, streamIIne operatIons, and Improve the abIIIty to IIght crIme and






178
terrorIsm by mergIng data Irom a varIety oI sources. n addItIon, IusIon centers are a conduIt Ior
ImpIementIng portIons oI the NatIonaI CrImInaI nteIIIgence SharIng PIan (NCSP).'

Source: Department oI ]ustIce. "NatIonaI CrImInaI nteIIIgence SharIng PIan."
http:]]It.ojp.gov]topIc.jspZtopIcId=209

2. a coIIaboratIve eIIort oI two or more agencIes that provIde resources, expertIse, and
InIormatIon to the center wIth the goaI oI maxImIzIng theIr abIIIty to detect, prevent, InvestIgate, and
respond to crImInaI and terrorIst actIvIty.

Source: U.S. Department oI ]ustIce and the U.S. Department oI HomeIand SecurIty, FusIon Center
CuIdeIInes: DeveIopIng and SharIng nIormatIon and nteIIIgence In a New Era, August 2006,
http:]]It.ojp.gov]documents]IusIoncenterguIdeIInesIawenIorcement.pdI

3. State and cIty IusIon centers (usIng the HomeIand SecurIty Data Network) are Iound at the
Department oI HomeIand SecurIty, FederaI Support to FusIon Centers the nIormatIon SharIng
EnvIronment, and the Senate CommIttee on HomeIand SecurIty and Covernment AIIaIrs, "Focus on FusIon
Centers: A Progress Report," AprII 17, 2008 (.pdI and audIo oI hearIng).

AIso see EPC, "nIormatIon FusIon Centers and PrIvacy," http:]]epIc.org]prIvacy]IusIon]

FutIIItarIan SocIety FutIIItarIan SocIety FutIIItarIan SocIety FutIIItarIan SocIety
A socIety that wIII not attempt to soIve the probIems It Iaces and oIten reIuses even to Iace Its probIems
because It Iears Ireedom. 8ecause It Iears Ireedom, It wIII not aIIow the experImentatIon, change,
dIscovery, and adventure necessary to the soIutIon oI Its probIems.

Source: WIIIIam ]. Newman. The FutIIItarIan SocIety. New York, C. 8razIIIer, 1961.



~ C ~ ~ C ~ ~ C ~ ~ C ~

CAMMA (C) CAMMA (C) CAMMA (C) CAMMA (C)
UncIassIIIed term used to descrIbe a type oI sensItIve compartmentaIIzed InIormatIon (SC).

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

Cenoa Cenoa Cenoa Cenoa
See See See See Advanced Research DeveIopment Agency (ARDA), DIsruptIve TechnoIogy OIIIce Advanced Research DeveIopment Agency (ARDA), DIsruptIve TechnoIogy OIIIce Advanced Research DeveIopment Agency (ARDA), DIsruptIve TechnoIogy OIIIce Advanced Research DeveIopment Agency (ARDA), DIsruptIve TechnoIogy OIIIce
1. WIII Iocus on deveIopIng InIormatIon technoIogy needed by teams oI InteIIIgence anaIysts and
operatIons and poIIcy personneI In attemptIng to antIcIpate and preempt terrorIst threats to US Interests.






179
Cenoa 's goaI Is to make such teams Iaster, smarter, and more joInt In theIr day-to-day operatIons.
Cenoa wIII appIy automatIon to team processes so that more InIormatIon wIII be expIoIted, more
hypotheses created and examIned, more modeIs buIIt and popuIated wIth evIdence, and In the Iarger
sense, more crIses deaIt wIth sImuItaneousIy. Cenoa wIII deveIop and depIoy: 1) cognItIve aIds that aIIow
humans and machInes to "thInk together" In reaI-tIme about compIIcated probIems; 2) means to overcome
the bIases and IImItatIons oI the human cognItIve system; 3) "cognItIve ampIIIIers" that heIp teams oI
peopIe rapIdIy and IuIIy comprehend compIIcated and uncertaIn sItuatIons; and, 4) the means to rapIdIy
and seamIessIy cut across and compIement exIstIng stove-pIped hIerarchIcaI organIzatIonaI structures by
creatIng dynamIc, adaptabIe, peer-to-peer coIIaboratIve networks.

Source: DARPA. "Cenoa " [See the Wayback MachIne,
http:]]web.archIve.org]web]20020802015004]http:]]www.darpa.mII]Iao]Cenoa.htm ]
and EIectronIc FrontIer FoundatIon (EFF). "Cenoa ." http:]]www.eII.org]PrIvacy]TA]genoa.php
2. Cenoa , whIch Iocused on buIIdIng InIormatIon technoIogIes to heIp anaIysts and poIIcy
makers antIcIpate and pre-empt terrorIst attacks. Cenoa was renamed TopsaII when It moved to ARDA,
InteIIIgence sources conIIrmed. (The name contInues the program's nautIcaI nomencIature; "genoa" Is a
synonym Ior the headsaII oI a shIp.)
As recentIy as October 2005, SAC was awarded a $3.7 mIIIIon contract under TopsaII. AccordIng to a
government-Issued press reIease announcIng the award, "The objectIve oI TopsaII Is to deveIop decIsIon-
support aIds Ior teams oI InteIIIgence anaIysts and poIIcy personneI to assIst In antIcIpatIng and pre-
emptIng terrorIst threats to U.S. Interests." That Ianguage repeats aImost verbatIm the boIIerpIate
descrIptIons oI Cenoa contaIned In contract documents, Pentagon budget sheets, and speeches by the
Cenoa program's Iormer managers.
Source: Shane HarrIs. "TA LIves on." NatIonaI ]ournaI Feb. 23, 2006,
http:]]natIonaIjournaI.com]about]njweekIy]storIes]2006]0223nj1.htm

CeospatIaI nIormatIon CeospatIaI nIormatIon CeospatIaI nIormatIon CeospatIaI nIormatIon
FoundatIon InIormatIon upon whIch aII other battIespace InIormatIon Is reIerenced to Iorm the common
operatIonaI pIcture.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

CIobaI nIormatIon EnvIronment CIobaI nIormatIon EnvIronment CIobaI nIormatIon EnvIronment CIobaI nIormatIon EnvIronment
1. AII ndIvIduaIs, organIzatIons, or systems, most oI whIch are outsIde the controI oI the mIIItary
or NatIonaI Command AuthorItIes, that coIIect, process, and dIssemInate InIormatIon to natIonaI and
InternatIonaI audIences.







180
U.S. Army FIeId ManuaI 100-6, "nIormatIon OperatIons," 1996,
http:]]www.Ias.org]Irp]doddIr]army]Im100-6]

2. AII IndIvIduaIs, organIzatIons or systems that coIIect, process and dIstrIbute InIormatIon. (AFDD
2-5.3)

Source: U.S. AIr Force. PubIIc AIIaIrs OperatIons. AIr Force DoctrIne Document 2-5.3, ]une 24, 2005. [See
the Wayback MachIne, http:]]web.archIve.org]web]20061007174450]http:]]www.e-
pubIIshIng.aI.mII]pubIIIes]aI]dd]aIdd2-5.3]aIdd2-5.3.pdI ]

CIobaI nIormatIon CrId DeIense Sector (CC) CIobaI nIormatIon CrId DeIense Sector (CC) CIobaI nIormatIon CrId DeIense Sector (CC) CIobaI nIormatIon CrId DeIense Sector (CC)
The gIobaIIy Interconnected, end-to- end set oI InIormatIon capabIIItIes, assocIated processes, and
personneI Ior coIIectIng, processIng, storIng, dIssemInatIng, and managIng InIormatIon on demand to
warIIghters, poIIcy makers, and support personneI IncIudIng aII owned and Ieased communIcatIons and
computIng systems and servIces, soItware (IncIudIng appIIcatIons), data, securIty servIces, and other
assocIated servIces necessary to achIeve InIormatIon superIorIty. t aIso IncIudes NatIonaI SecurIty
Systems as deIIned In SectIon 5142 oI the CIInger-Cohen Act oI 1996.

Source: DoD. DoD DIrectIve 3020.40. DeIense CrItIcaI nIrastructure Program (D.C.P). August 19, 2005,
http:]]www.Ias.org]Irp]doddIr]dod]d302040.pdI

CIobaI nIormatIon CrId (CC) CIobaI nIormatIon CrId (CC) CIobaI nIormatIon CrId (CC) CIobaI nIormatIon CrId (CC)
E2.1.1.1. The gIobaIIy Interconnected, end-to-end set oI InIormatIon capabIIItIes, assocIated processes,
and personneI Ior coIIectIng, processIng, storIng, dIssemInatIng and managIng InIormatIon on demand to
warIIghters, poIIcy makers, and support personneI. The CC IncIudes aII owned and Ieased
communIcatIons and computIng systems and servIces, soItware (IncIudIng appIIcatIons), data, securIty
servIces, and other assocIated servIces necessary to achIeve nIormatIon SuperIorIty. t aIso IncIudes
NatIonaI SecurIty Systems as deIIned In sectIon 5142 oI the CIInger-Cohen Act oI 1996 (reIerence (b)). The
CC supports aII Department oI DeIense, NatIonaI SecurIty, and reIated nteIIIgence CommunIty mIssIons
and IunctIons (strategIc, operatIonaI, tactIcaI, and busIness), In war and In peace. The CC provIdes
capabIIItIes Irom aII operatIng IocatIons (bases, posts, camps, statIons, IacIIItIes, mobIIe pIatIorms, and
depIoyed sItes). The CC provIdes InterIaces to coaIItIon, aIIIed, and non-DoD users and systems.

Source: DoD DIrectIve 8100.1 "CIobaI nIormatIon CrId (CC) OverarchIng PoIIcy."
September 19, 2002, http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]810001.htm

CIobaI nIormatIon nIrastructure (C) CIobaI nIormatIon nIrastructure (C) CIobaI nIormatIon nIrastructure (C) CIobaI nIormatIon nIrastructure (C)
1. WorIdwIde InterconnectIons oI the InIormatIon systems oI aII countrIes, InternatIonaI and
muItInatIonaI organIzatIons, and InternatIonaI commercIaI communIcatIons.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI






181

2. The worIdwIde InterconnectIon oI communIcatIons networks, computers, databases, and
consumer eIectronIcs that make vast amounts oI InIormatIon avaIIabIe to users. The gIobaI InIormatIon
InIrastructure encompasses a wIde range oI equIpment, IncIudIng cameras, scanners, keyboards, IacsImIIe
machInes, computers, swItches, compact dIsks, and audIo tape, cabIe, wIre, sateIIItes, IIber-optIc
transmIssIon IInes, networks oI aII types, teIevIsIons, monItors, prInters, and much more. The IrIendIy and
adversary personneI who make decIsIons and handIe the transmItted InIormatIon constItute a crItIcaI
component oI the gIobaI InIormatIon InIrastructure.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

CIobaI ]ustIce nIormatIon SharIng nItIatIve CIobaI ]ustIce nIormatIon SharIng nItIatIve CIobaI ]ustIce nIormatIon SharIng nItIatIve CIobaI ]ustIce nIormatIon SharIng nItIatIve (CIobaI) (CIobaI) (CIobaI) (CIobaI)
The CIobaI ]ustIce nIormatIon SharIng nItIatIve (CIobaI) serves as a FederaI AdvIsory CommIttee (FAC) and
advIses the U.S. Attorney CeneraI on justIce InIormatIon sharIng and IntegratIon InItIatIves. CIobaI was
created to support the broad scaIe exchange oI pertInent justIce and pubIIc saIety InIormatIon. t
promotes standards-based eIectronIc InIormatIon exchange to provIde the justIce communIty wIth tImeIy,
accurate, compIete, and accessIbIe InIormatIon In a secure and trusted envIronment.

CIobaI Is a ''group oI groups,'' representIng more than thIrty Independent organIzatIons spannIng the
spectrum oI Iaw enIorcement, judIcIaI, correctIonaI, and reIated bodIes. Member organIzatIons partIcIpate
In CIobaI wIth a shared responsIbIIIty and shared beIIeI that, together, they can brIng about posItIve
change by makIng recommendatIons and supportIng the InItIatIves oI the U.S. Department oI ]ustIce (DO]).

Source: Department oI ]ustIce. OIIIce oI ]ustIce Programs. 8ureau oI ]ustIce AssIstance,
http:]]It.ojp.gov]topIc.jspZtopIcId=8
CIobaI ]ustIce XML Data ModeI CIobaI ]ustIce XML Data ModeI CIobaI ]ustIce XML Data ModeI CIobaI ]ustIce XML Data ModeI
S SS See ee ee ee TerrorIst WatchIIst Person Data Exchange Standard, XML TerrorIst WatchIIst Person Data Exchange Standard, XML TerrorIst WatchIIst Person Data Exchange Standard, XML TerrorIst WatchIIst Person Data Exchange Standard, XML
The CIobaI ]ustIce XML Data ModeI (CIobaI ]XDM) Is Intended to be a data reIerence modeI Ior the
exchange oI InIormatIon wIthIn the justIce and pubIIc saIety communItIes. The CIobaI ]XDM Is sponsored
by the U.S. Department oI ]ustIce (Do]) OIIIce oI ]ustIce Programs (O]P), wIth deveIopment supported by
the CIobaI ]ustIce nIormatIon SharIng nItIatIve's (CIobaI) XML Structure Task Force (CXSTF). The IoIIowIng
are key IInks to CIobaI ]XDM resources.
Source: Department oI ]ustIce. OIIIce oI ]ustIce Programs. nIormatIon TechnoIogy nItIatIves,
http:]]www.It.ojp.gov]jxdm] and http:]]It.ojp.gov]jxdd]]ustIceXMLDataSheet.pdI
CIobaIIzatIon CIobaIIzatIon CIobaIIzatIon CIobaIIzatIon
The IntegratIon oI the poIItIcaI, economIc and cuIturaI actIvItIes oI geographIcaIIy and]or natIonaIIy
separated peopIes - Is not a dIscernIbIe event or chaIIenge. Is not new, but It Is acceIeratIng. MostIy,






182
gIobaIIzatIon Is IargeIy IrresIstIbIe. Thus, gIobaIIzatIon Is not a poIIcy optIon, but a Iact to whIch
poIIcymakers must adapt.

CIobaIIzatIon has acceIerated as a resuIt oI many posItIve Iactors, the most notabIe oI whIch IncIude: the
coIIapse oI communIsm and the end oI the CoId War; the spread oI capItaIIsm and Iree trade; more rapId
and gIobaI capItaI IIows and more IIberaI IInancIaI markets; the IIberaIIzatIon oI communIcatIons;
InternatIonaI academIc and scIentIIIc coIIaboratIon; and Iaster and more eIIIcIent Iorms oI transportatIon.
At the core oI acceIerated gIobaI IntegratIon - at once Its prIncIpaI cause and consequence - Is the
InIormatIon revoIutIon, whIch Is knockIng down once-IormIdabIe barrIers oI physIcaI dIstance, bIurrIng
natIonaI boundarIes and creatIng cross-border communItIes oI aII types.

Source: DonaId A. HIcks. OIIIce oI the Under Secretary oI DeIense Ior AcquIsItIon and TechnoIogy. FInaI
Report oI the DeIense ScIence 8oard Task Force on CIobaIIzatIon and SecurIty. December 1999,
http:]]www.acq.osd.mII]dsb]reports]gIobaIIzatIon.pdI

CIomar Response CIomar Response CIomar Response CIomar Response
See See See See Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons Freedom oI nIormatIon Act ExemptIons
1. Such records requesters who seek records concernIng specIIIc actuaI or aIIeged CA empIoyees,
operatIons, or sources and methods used In operatIons wIII necessarIIy be InIormed that we can neIther
conIIrm nor deny the exIstence oI any responsIve records. ThIs poIIcy Is requIred to protect the
conIIdentIaIIty oI such matters where pubIIc dIscIosure oI the exIstence or non-exIstence oI records wouId
Iead to the Ioss or the dImInutIon In vaIue oI our InteIIIgence program supportIng the natIon's IeadershIp.

Source: CentraI nteIIIgence Agency. "The Freedom oI nIormatIon Act 5 U.S.C. 552,"
http:]]www.IoIa.cIa.gov]IoIa.asp

2. A "CIomar" response Is an agency's express reIusaI even to conIIrm or deny the exIstence oI
any records responsIve to a FOA request. ThIs type oI response was IIrst judIcIaIIy recognIzed In the
natIonaI securIty context. PhIIIIppI v. CA, 546 F.2d 1009, 1013 (D.C. CIr. 1976) (raIsIng Issue oI whether
CA couId reIuse to conIIrm or deny Its tIes to Howard Hughes' submarIne retrIevaI shIp, the CIomar
ExpIorer). AIthough the "CIomarIzatIon" prIncIpIe orIgInated In a FOA exemptIon (1) case, It can be
appIIed In cases InvoIvIng other FOA exemptIons as weII, In partIcuIar prIvacy exemptIons (6) and (7) (C).
A "CIomar" response can be justIIIed onIy when the conIIrmatIon or denIaI oI the exIstence oI responsIve
records wouId, In and oI ItseII, reveaI exempt InIormatIon.
8ecause bureaus and oIIIces occasIonaIIy questIon when It Is approprIate to gIve a "CIomar" response, am
attachIng Ior your InIormatIon copIes oI the Department oI ]ustIce's (DO]) guIdance on prIvacy
"CIomarIzatIon". ThIs InIormatIon shouId be heIpIuI In provIdIng advIce to your cIIent bureaus and oIIIces
on thIs Issue. 8y copy oI thIs memorandum, am requestIng that the DepartmentaI FOA OIIIcer Iorward
DO]'s guIdance to the bureau and oIIIce FOA OIIIcers. The FOA OIIIcers shouId be advIsed to consuIt wIth
theIr desIgnated FOA attorneys In determInIng whether to Issue a "CIomar" response to a FOA request.






183
Source: Department oI ]ustIce. September 4, 1998, http:]]www.doI.gov]IoIa]gIomar.htm
3. SInce the earIy 1980s, the CA has taken advantage oI the "CIomar response," a reIusaI to
conIIrm or deny the exIstence oI records requested under FOA. FederaI courts aImost aIways accept the
CIomar response, and the CA expIoIts It so oIten that the NInth CIrcuIt (Hunt v. CentraI nteIIIgence
Agency, 981 F.2d 1116, 1120 9th CIr. 1992, notIng that "we are now onIy a short step [Irom] exemptIng
aII CA records Irom FOA") noted It has become "a near-bIanket FOA exemptIon." Note 150 states that
CIomar response arIses Irom a CA poIIcy IIrst artIcuIated In response to FOA requests concernIng the
CIomar ExpIorer, "a secret underwater vesseI."

Source: Ava 8arbour. "Ready.AIm.FOA! A Survey oI the Freedom oI nIormatIon Act In the Post-9]11
UnIted States." The 8oston PubIIc nterest Law ]ournaI SprIng 2004, 13 8.U. Pub. nt. L.]. 203.
4. The CA cIaImed that any records that mIght exIst whIch may reveaI any CA connectIon wIth or
Interest In the actIvItIes oI the CIomar ExpIorer, or any evIdence that mIght reveaI the exIstence oI records
oI thIs type wouId be cIassIIIed, and thereIore, exempt Irom dIscIosure under exemptIon 1 oI the FOA.
They aIso InsIsted that exemptIon 3 appIIed, as the NatIonaI SecurIty Act oI 1947 precIuded them Irom
reIeasIng InIormatIon reIated to the IunctIons oI CA personneI. ThIs was the IIrst Instance oI an agency
usIng the "can neIther conIIrm nor deny" answer In response to a FOA request. SInce then, the terms
"CIomar response," and "CIomarIzatIon" are used to descrIbe an agency's response when they can neIther
conIIrm nor deny whether records exIst.
Source: FAS. Project ]ennIIer Hughes CIomar ExpIorer.
http:]]www.Ias.org]Irp]program]coIIect]jennIIer.htm; Roy Varner, and Wayne CoIIIer. . . . A Matter oI RIsk: the
ncredIbIe nsIde Story oI the CA's Hughes CIomar ExpIorer MIssIon to RaIse a RussIan SubmarIne (New
York: Random House, 1978), and UnIted States. Congress. Senate. SubcommIttee on AdmInIstratIve
PractIce and Procedure, Freedom oI nIormatIon Act :HearIngs beIore the SubcommIttee on AdmInIstratIve
PractIce and Procedure oI the CommIttee on the ]udIcIary, (UnIted States Senate, NInety-IIIth Congress,
IIrst sessIon, on oversIght oI the Freedom oI InIormatIon act, September 15, 16, October 6, and November
10, 1977. WashIngton, D.C.: SubcommIttee on AdmInIstratIon PractIce and Procedure: U.S. CPO, 1978.
SUDOC: Y 4.] 89]2: n 3]13), contaIns detaIIed exhIbIts and testImony Irom the CA and NSC reIatIng to
the CIomar IncIdent and the agencIes' reIusaI to reIease InIormatIon.

CoogIe Earth CoogIe Maps CoogIe Earth CoogIe Maps CoogIe Earth CoogIe Maps CoogIe Earth CoogIe Maps
See NatIonaI SecurIty nIormatIon See NatIonaI SecurIty nIormatIon See NatIonaI SecurIty nIormatIon See NatIonaI SecurIty nIormatIon
1. 8ut Ior aII oI the pIaces that CoogIe Maps aIIows you to see, there are pIenty oI pIaces that are
oII-IImIts. Whether It's due to government restrIctIons, personaI-prIvacy IawsuIts or mIstakes, CoogIe
Maps has sIapped a "ProhIbIted" sIgn on the IoIIowIng 51 pIaces (The WhIte House, PAVE PAWS, U.S. AIr
Force .)







184
Source: T SecurIty EdItors, "8Iurred Out: 51ThIngs You Aren't AIIowed to See on CoogIe Maps," T
SecurIty, ]uIy 15, 2008, http:]]www.ItsecurIty.com]Ieatures]51-thIngs-not-on-googIe-maps-071508]

2. Two years have passed sInce CoogIe startIed the worId wIth Its Iree, onIIne, hIgh-resoIutIon
mappIng products oI the worId. ForeIgn governments expressed theIr shock and concern about such
detaIIed Imagery In the hands oI the generaI popuIace; theIr IacIIItIes and state secrets exposed to the
worId. "Today, wIth the advent oI cIvIIIan sateIIItes here and abroad, we have opened wIde the wIndow on
pIaces and events that, not so Iong ago, onIy spIes couId see," wrItes Sharon WeInberger.1 As the InItIaI
shock wore oII, IIve maIn responses to the "CoogIe threat" emerged Irom natIons around the worId:
negotIatIons wIth CoogIe, bannIng CoogIe products, deveIopIng a sImIIar product, takIng evasIve
measures, and nonchaIance. ThIs report dIscusses IoreIgn reportIng and government response to the
onIIne mappIng revoIutIon aIter the InItIaI brouhaha.

Source: DN, Open Source Center, "The CoogIe Controversy -- Two Years Later,"
]uIy 30, 2008, http:]]www.Ias.org]Irp]dnI]osc]googIe.pdI
CospeI oI NatIonaI SecurIty CospeI oI NatIonaI SecurIty CospeI oI NatIonaI SecurIty CospeI oI NatIonaI SecurIty
See NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State
One can hypothesIze that there Is a desIre among AmerIcans, when It comes to IoreIgn poIIcy, to IInd a
sIngIe concept, a CommandIng dea, that expIaIns how AmerIca reIates to the rest oI the worId, that
Integrates contradIctory InIormatIon, that suggests and ratIonaIIzes courses oI actIon, and that, as a court
oI Iast resort Ior both poIIcymakers and pubIIc, aImost magIcaIIy puts an end to dIsputes and debates, I
such Is the case, then "natIonaI securIty" has been a CommandIng dea Ior more than three decades oI
AmerIcan hIstory (p.196).
And what characterIzes the concept oI natIonaI securItyZ t postuIates the InterreIatedness oI so many
dIIIerent poIItIcaI, economIc, and mIIItary Iactors that deveIopments seen to have automatIc and dIrect
Impact on AmerIca's core Interests, VIrtuaIIy every deveIopment In the worId Is perceIved to be potentIaIIy
crucIaI. An adverse turn oI events anywhere endangers the UnIted States. ProbIems In IoreIgn reIatIons are
vIewed as urgent and ImmedIate threats. Thus, desIrabIe IoreIgn poIIcy goaIs are transIated Into Issues oI
natIonaI survIvaI, and the range oI threats becomes IImItIess. (p. 196)

The doctrIne Is characterIzed by expansIveness, a tendency to push the subjectIve boundarIes oI securIty
outward to more and more areas, to encompass more and more geography and
more and more probIems. t demands that the country assume oI posture oI mIIItary preparedness; the
natIon must be on permanent aIert. There was a new emphasIs on technoIogy and armed Iorce.
Consequent InstItutIonaI changes occurred, AII oI thIs Ieads to a
paradox: the growth oI AmerIcan power dId not Iead to a greater sense oI assuredness, but rather to an
enIargement oI the range perceIved threats that must urgentIy be conIronted (p.196)

ndeed the doctrIne oI natIonaI securIty was a IundamentaI revIsIon oI AmerIca's






185
perceIved reIatIon to the rest oI the worId, oI what StImson In 1941 had caIIed "our basIc theory oI
deIense." The natIon was to be permanentIy prepared. AmerIca's Interests and responsIbIIItIes were
unrestrIcted and gIobaI. NatIonaI securIty became a guIdIng ruIe, the CommandIng dea. t ay at the heart
oI a new and sometImes IntoxIcatIng vIsIon. (p. 220-221)
Source: DanIeI H. YergIn. "The gospeI oI natIonaI securIty: preparIng Ior war just over the horIzon,"
Shattered Peace:The OrIgIns oI the CoId War and the NatIonaI SecurIty State, New York: PenguIn 8ooks,
1977.
Covernment nIormatIon Covernment nIormatIon Covernment nIormatIon Covernment nIormatIon
nIormatIon that Is owned by, produced by or Ior, or Is under the controI oI the U.S. Covernment.
Source: Energy. 10 CFR 1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

Covernment OII the SheII (COTS) Covernment OII the SheII (COTS) Covernment OII the SheII (COTS) Covernment OII the SheII (COTS)
T products that are deveIoped by U.S. government organIzatIons wIth U.S. Covernment-reIated
requIrements In mInd and are desIgnated as avaIIabIe onIy to other U.S. Covernment organIzatIons n the
context oI NSTSSP No. 11 [NatIonaI nIormatIon Assurance AcquIsItIon PoIIcy]; COTS are nIormatIon
Assurance or nIormatIon Assurance-EnabIed products that oIten requIre specIaI Ieatures and assurances
that are not Iound In typIcaI CommercIaI-OII-the-SheII (COTS) products.

Source: U.S Department oI State. ForeIgn AIIaIrs ManuaI. 5 FAM 910,. "nIormatIon TechnoIogy AcquIsItIon
PoIIcIes." ]une 20, 2005, http:]]www.state.gov]m]a]dIr]regs]

Cray LIterature Cray LIterature Cray LIterature Cray LIterature
See See See See Crey LIterature Crey LIterature Crey LIterature Crey LIterature
MaterIaI not weII covered by conventIonaI book trade channeIs. nIormatIon contaIned wIthIn thIs category
Is oIten not avaIIabIe In any other kInd oI source. Cray IIterature Is IntrInsIcaIIy more dIIIIcuIt to IdentIIy,
acquIre, process, access, and otherwIse handIe than conventIonaI IIterature. ExampIes IncIude, but are not
IImIted to, conIerence papers, trade IIterature, eIectronIc buIIetIn boards, and IoreIgn government reports.
The most sIgnIIIcant poInt to make about the vaIue oI gray IIterature Is that the InIormatIon It contaIns
oIten Is not avaIIabIe In any other kInd oI source.

Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI

Cray MaII Cray MaII Cray MaII Cray MaII
See See See See CIassIIIed nIormatIon Procedures Act (CPA), State Secrets PrIvIIege CIassIIIed nIormatIon Procedures Act (CPA), State Secrets PrIvIIege CIassIIIed nIormatIon Procedures Act (CPA), State Secrets PrIvIIege CIassIIIed nIormatIon Procedures Act (CPA), State Secrets PrIvIIege
The threat by deIendants and theIr counseI to press Ior the reIease or dIscIose sensItIve (natIonaI securIty),
cIassIIIed InIormatIon, or state secrets durIng a trIaI.







186
No deIendant shaII dIscIose any InIormatIon known or beIIeved to be cIassIIIed In connectIon wIth a
trIaI or pretrIaI proceedIng untII notIce has been gIven under thIs subsectIon and untII the UnIted States
has been aIIorded a reasonabIe opportunIty to seek a determInatIon pursuant to the procedure set Iorth In
sectIon 6 oI the CIassIIIed nIormatIon Procedures Act (PL 96-456).

Source: UnIted States. Congress. House. Permanent SeIect CommIttee on nteIIIgence. SubcommIttee on
LegIsIatIon. CraymaII LegIsIatIon: HearIngs beIore the SubcommIttee on LegIsIatIon oI the Permanent
SeIect CommIttee on nteIIIgence, House oI RepresentatIves, NInety-sIxth Congress (IIrst sessIon, August
7, 1979, September 20, 1979, WashIngton: U.S. Covernment PrIntIng OIIIce, 1980. Y 4.n 8]18:C 79) and
LouIs FIsher. n the Name oI NatIonaI SecurIty: Unchecked PresIdentIaI Power and the ReynoIds Case.
Lawrence: UnIversIty Press oI Kansas, 2006, and Larry M. EIg, "The CIassIIIed Procedures nIormatIon Act:
An OvervIew," CRS Report to Congress 89-172A, March 2,1989, http:]]www.Ias.org]sgp]crs]secrecy]89-
172.pdI
Cray Products Cray Products Cray Products Cray Products
A-6. Products that conceaI and]or do not IdentIIy a source are known as gray products. Cray products are
best used to support operatIonaI pIans.

Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

Crey LIterature Crey LIterature Crey LIterature Crey LIterature
1. Not decIassIIIed; downgraded Irom secret to conIIdentIaI.

Source: : : : Herbert S. Marks and Ceorge F. TrowbrIdge . .. .Framework Ior AtomIc ndustry; a Commentary on the
AtomIc Energy Act oI 1954. WashIngton: 8NA ncorporated, 1955.

2. "nIormatIon produced on aII IeveIs oI government, academIcs, busIness and Industry In
eIectronIc and prInt Iormats not controIIed by commercIaI pubIIshIng I.e. where pubIIshIng Is not the
prImary actIvIty oI the producIng body." (Luxembourg, 1997 - Expanded In New York, 2004).

Source: CreyNet, http:]]www.greynet.org]
CSA SensItIve 8ut UncIassIIIed 8uIIdIng nIormatIon CSA SensItIve 8ut UncIassIIIed 8uIIdIng nIormatIon CSA SensItIve 8ut UncIassIIIed 8uIIdIng nIormatIon CSA SensItIve 8ut UncIassIIIed 8uIIdIng nIormatIon
nIormatIon concernIng CeneraI ServIces AdmInIstratIon PubIIc 8uIIdIng ServIces controIIed space IncIudIng
owned, Ieased or deIegated FederaI IacIIItIes. CSA-S8U-8 IncIudes buIIdIng desIgns such as IIoor pIans,
constructIon pIans and specIIIcatIons, renovatIon]aIteratIon pIans, equIpment pIans and IocatIons,
buIIdIng operatIng pIans, InIormatIon used Ior buIIdIng servIces contracts and]or contract guard servIces,
or any other InIormatIon consIdered a securIty rIsk.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.






187

CuardIan CuardIan CuardIan CuardIan (Program) (Program) (Program) (Program)
See SuspIcIous ActIvIty Reports See SuspIcIous ActIvIty Reports See SuspIcIous ActIvIty Reports See SuspIcIous ActIvIty Reports
s an InIormatIon technoIogy system maIntaIned at the Secret IeveI that aIIows TMU to coIIect suspIcIous
actIvIty reports (SARs) made to the F8 and revIew the SARs In an organIzed way to determIne whIch ones
warrant addItIonaI InvestIgatIve IoIIow-up. CuardIan's prImary purpose Is not to manage cases, but to
IacIIItate the reportIng, trackIng, and management oI threats to determIne wIthIn a short tIme span (30
days or Iess) whether a partIcuIar matter shouId be cIosed or reIerred Ior an InvestIgatIon. CuardIan aIso
IacIIItates the TRU's work In perIormIng Its anaIytIcaI IunctIons because the reports are avaIIabIe Ior
pattern and trend anaIysIs.

Source: DO], F8, "eCuardIan Threat TrackIng System PrIvacy mpact Assessment Ior the eCuardIan Threat
TrackIng System," http:]]IoIa.IbI.gov]eguardIanthreat.htm

CuIdance Documents CuIdance Documents CuIdance Documents CuIdance Documents
CuIdance document means an agency statement oI generaI appIIcabIIIty and Iuture eIIect, other than a
reguIatory actIon, that sets Iorth a poIIcy on a statutory, reguIatory, or technIcaI Issue or an InterpretatIon
oI a statutory or reguIatory Issue.

(h) ''SIgnIIIcant guIdance document'' -
(1) Means a guIdance document dIssemInated to reguIated entItIes or
the generaI pubIIc that, Ior purposes oI thIs order, may reasonabIy
be antIcIpated to: (A) Lead to an annuaI eIIect oI $100 mIIIIon or more or adverseIy
aIIect In a materIaI way the economy, a sector oI the economy, productIvIty,
competItIon, jobs, the envIronment, pubIIc heaIth or saIety, or State, IocaI, or trIbaI governments or
communItIes; (8) Create a serIous InconsIstency or otherwIse InterIere wIth an actIon taken or pIanned by
another agency; (C) MaterIaIIy aIter the budgetary Impact oI entItIements, grants, user Iees, or Ioan
programs or the rIghts or obIIgatIons oI recIpIents thereoI; or (D) RaIse noveI IegaI or poIIcy Issues arIsIng
out oI IegaI mandates, the PresIdent's prIorItIes, or the prIncIpIes set Iorth In thIs ExecutIve
order;.

Source: ExecutIve Order 13422, ]anuary 18, 2007, Further Amendment to ExecutIve Order 12866 on
ReguIatory PIannIng and RevIew, http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2007.htmI
Amends: ExecutIve Order 12866 , ReguIatory PIannIng and RevIew was sIgned September 30, 1993,
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1993-cIInton.htmI



~ H ~ ~ H ~ ~ H ~ ~ H ~
HacktIvIsm HacktIvIsm HacktIvIsm HacktIvIsm (U]]FOUO)
(A portmanteau oI "hackIng" and "actIvIsm"). The use oI cyber technoIogIes to achIeve a poIItIcaI end, or
technoIogy-enabIed poIItIcaI or socIaI actIvIsm. HacktIvIsm mIght IncIude websIte deIacements, denIaI-oI-






188
servIce attacks, hackIng Into the target's network to Introduce maIIcIous soItware (maIware), or
InIormatIon theIt.

Source: DHS, DomestIc ExtremIsm LexIcon ReIerence AId March 26, 2009,
http:]]www.scrIbd.com]doc]14884903]DomestIc-ExtremIsm-LexIcon-US-Department-oI-HomeIand-
SecurIty-ReIerence-AId

HIgh 2 nIormatIon HIgh 2 nIormatIon HIgh 2 nIormatIon HIgh 2 nIormatIon
SubstantIaI InternaI matters, the dIscIosure oI whIch wouId rIsk cIrcumventIon oI a IegaI requIrement;
records that "are reIated soIeIy to the InternaI personneI ruIes and practIces oI an agency."

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]exemptIon2.htm#hIgh2

HIstor HIstor HIstor HIstorIcaI RevIew Program IcaI RevIew Program IcaI RevIew Program IcaI RevIew Program
See ForeIgn ReIatIons oI the UnIted States See ForeIgn ReIatIons oI the UnIted States See ForeIgn ReIatIons oI the UnIted States See ForeIgn ReIatIons oI the UnIted States
n the 1980's, then DIrector oI CentraI nteIIIgence (DC) WIIIIam Casey secured the CA's operatIonaI
exemptIon In return Ior estabIIshIng an HIstorIcaI RevIew Program (HRP) to open up the CA's hIstorIcaI
record.

To ensure that reIeases have hIstorIcaI vaIue, oIIIcers seIect subjects wIth the advIce and guIdance oI the
CA's HIstory StaII, the DC's HIstorIcaI RevIew PaneI, and the generaI pubIIc. Under guIdeIInes IaId out Ior
the program, hIstorIcaI records are reIeased except In Instances where dIscIosure wouId damage natIonaI
securIty

Source: CA, "SpecIaI CoIIectIons," http:]]www.IoIa.cIa.gov]hIstorIcaI.asp and
Robert ]ervIs, "The CA and DecIassIIIcatIon: The RoIe oI the HIstorIcaI RevIew PaneI" Passport, AprII 2009,
http:]]www.shaIr.org]newsIetter]2009]Passport0409scan.pdI

HI HI HI HIstorIcaIIy SIgnIIIcant nIormatIon storIcaIIy SIgnIIIcant nIormatIon storIcaIIy SIgnIIIcant nIormatIon storIcaIIy SIgnIIIcant nIormatIon
There Is no satIsIactory means at present oI IdentIIyIng hIstorIcaIIy sIgnIIIcant InIormatIon wIthIn the vast
body oI InIormatIon that Is beIng revIewed and decIassIIIed. AccordIngIy, no prIorIty Is gIven to the
decIassIIIcatIon and reIease to the pubIIc oI such InIormatIon. (p.8)

ssue No. 2: A board consIstIng oI promInent hIstorIans, academIcIans, and Iormer Covernment oIIIcIaIs
wouId be appoInted by the ArchIvIst to determIne whIch events or actIvItIes oI the U.S. Covernment shouId
be consIdered hIstorIcaIIy sIgnIIIcant Irom a natIonaI securIty and IoreIgn poIIcy standpoInt, Ior a
partIcuIar year.
37
(p.8)


37
t Is remarkabIe that a seIect group oI IndIvIduaIs determIne the hIstorIcaI sIgnIIIcance oI actIons
and events.






189
ssue No. 11: Not InIrequentIy, requests to agencIes Irom IndIvIduaI members oI the pubIIc actuaIIy
hamper the agency's abIIIty to make hIstorIcaIIy sIgnIIIcant records avaIIabIe to the pubIIc In generaI.
(p.11)

Source: PubIIc nterest DecIassIIIcatIon 8oard, mprovIng DecIassIIIcatIon: Report to the PresIdent,
December 2007, http:]]www.archIves.gov]pIdb]recommendatIons]

HIstorIcaIIy VaIuabIe HIstorIcaIIy VaIuabIe HIstorIcaIIy VaIuabIe HIstorIcaIIy VaIuabIe
ExecutIve Order 12958, "CIassIIIed NatIonaI SecurIty nIormatIon" (the Order), caIIed Ior a renewed
commItment by the ExecutIve branch to the concept oI decIassIIIcatIon tIed to specIIIc deadIInes, reIerred
to In the Order as automatIc decIassIIIcatIon. ThIs dIrectIon caIIs Ior aII 25-year-oId and oIder hIstorIcaIIy
vaIuabIe permanent records contaInIng cIassIIIed natIonaI securIty InIormatIon to be decIassIIIed,
exempted, excIuded, reIerred to other Interested agencIes, or approprIateIy deIayed by December 31,
2006, and each year thereaIter, Ior such records prIor to theIr attaInIng 25-year-oId status. As such, It Is
Important to recognIze that December 31, 2006, represents not an end unto ItseII but rather the
begInnIng oI IntegratIng automatIc decIassIIIcatIon Into the IabrIc oI the securIty cIassIIIcatIon Iramework.

Source: nIormatIon SecurIty OversIght OIIIce. "Report to the PresIdent: An Assessment oI DecIassIIIcatIon
In the ExecutIve 8ranch." September 21, 2005. http:]]www.archIves.gov]Isoo]reports]2005-
decIassIIIcatIon-report.htmI

HomeIand SecurIty AdvIsory System HomeIand SecurIty AdvIsory System HomeIand SecurIty AdvIsory System HomeIand SecurIty AdvIsory System
EstabIIshed In March 2002, the HomeIand SecurIty AdvIsory System was desIgned to dIssemInate
InIormatIon regardIng the rIsk oI terrorIst acts to IederaI, state, and IocaI government agencIes and the
pubIIc. The HomeIand SecurIty AdvIsory System combInes threat InIormatIon wIth vuInerabIIIty
assessments and provIdes communIcatIons to pubIIc saIety oIIIcIaIs and the pubIIc.
HomeIand SecurIty Threat HomeIand SecurIty Threat HomeIand SecurIty Threat HomeIand SecurIty Threat AdvIsorIes AdvIsorIes AdvIsorIes AdvIsorIes contaIn actIonabIe InIormatIon about an IncIdent InvoIvIng,
or a threat targetIng, crItIcaI natIonaI networks or InIrastructures or key assets. They couId, Ior
exampIe, reIay newIy deveIoped procedures that, when ImpIemented, wouId sIgnIIIcantIy Improve
securIty or protectIon. They couId aIso suggest a change In readIness posture, protectIve actIons,
or response. ThIs category IncIudes products IormerIy named aIerts, advIsorIes, and sector
notIIIcatIons. AdvIsorIes are targeted to FederaI, state, and IocaI governments, prIvate sector
organIzatIons, and InternatIonaI partners.
HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns communIcate InIormatIon oI Interest to the natIon's
crItIcaI InIrastructures that do not meet the tImeIIness, specIIIcIty, or sIgnIIIcance threshoIds oI
warnIng messages. Such InIormatIon may IncIude statIstIcaI reports, perIodIc summarIes, IncIdent
response or reportIng guIdeIInes, common vuInerabIIItIes and patches, and conIIguratIon
standards or tooIs. t aIso may IncIude preIImInary requests Ior InIormatIon. 8uIIetIns are
targeted to FederaI, state, and IocaI governments, prIvate sector organIzatIons, and InternatIonaI
partners.






190
CoIor CoIor CoIor CoIor- -- -c cc coded Threat LeveI System oded Threat LeveI System oded Threat LeveI System oded Threat LeveI System Is used to communIcate wIth pubIIc saIety oIIIcIaIs and the
pubIIc at-Iarge through a threat-based, coIor-coded system so that protectIve measures can be
ImpIemented to reduce the IIkeIIhood or Impact oI an attack. RaIsIng the threat condItIon has
economIc, physIcaI, and psychoIogIcaI eIIects on the natIon; so, the HomeIand SecurIty AdvIsory
System can pIace specIIIc geographIc regIons or Industry sectors on a hIgher aIert status than
other regIons or IndustrIes, based on specIIIc threat InIormatIon. CoIors are: Creen (Low RIsk),
8Iue (Cuarded RIsk), YeIIow (EIevated RIsk), Orange (HIgh RIsk), and Red (Severe RIsk).
Source: Department oI HomeIand SecurIty. "CItIzen CuIdance on the HomeIand SecurIty AdvIsory System."
http:]]www.dhs.gov]dhspubIIc]dIspIayZtheme=29;
http:]]www.dhs.gov]Interweb]assetIIbrary]CItIzenCuIdanceHSAS2.pdI and
CeneraI AccountIng OIIIce (CAO). "HomeIand SecurIty AdvIsory System: PreIImInary ObservatIons
RegardIng Threat LeveI ncreases Irom YeIIow to Orange." March 11, 2004. CAO-04-453R,
http:]]www.gao.gov]htext]d04453r.htmI

HomeIand SecurIty nIormatIon HomeIand SecurIty nIormatIon HomeIand SecurIty nIormatIon HomeIand SecurIty nIormatIon
See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon
1. Any InIormatIon possessed by a FederaI, State or IocaI agency that

(A) reIates to the threat oI terrorIst actIvIty;
(8) reIates to the abIIIty to prevent, InterdIct, or dIsrupt terrorIst actIvIty;
(C) wouId Improve the IdentIIIcatIon or InvestIgatIon oI a suspected terrorIst or terrorIst organIzatIon;
or
(D) wouId Improve the response to a terrorIst act.

Source: LIbrary oI Congress. "Laws and ReguIatIon CovernIng the ProtectIon oI SensItIve 8ut UncIassIIIed
nIormatIon." http:]]www.Ioc.gov]rr]Ird]pdI-IIIes]sbu.pdI ; aIso see Andrew Card. ("The Card Memo")
"CuIdance on HomeIand SecurIty nIormatIon ssued." March 21, 2002, [See the Wayback MachIne,
http:]]web.archIve.org]web]20080306140939]http:]]www.usdoj.gov]oIp]IoIapost]2002IoIapost10.htm]
and Mark A, RandoI, "HomeIand SecurIty nteIIIgence: PerceptIons, Statutory DeIInItIons and Counter-
TerrorIsm," CRS Report Ior Congress ]anuary 14, 2009, RL33616,
http:]]www.Ias.org]sgp]crs]InteI]RL33616.pdI

2. The 9]11 CommIssIon and others have observed that the over-cIassIIIcatIon oI homeIand
securIty InIormatIon InterIeres wIth accurate, actIonabIe, and tImeIy homeIand securIty InIormatIon
sharIng, Increases the cost oI InIormatIon securIty, and needIessIy IImIts pubIIc access to InIormatIon.
(SectIon 2: FIndIngs (2))

Source: H.R.553 ReducIng Over-CIassIIIcatIon Act oI 2009, CongressIonaI Record, 155
(February 3, 2009), http:]]www.gpoaccess.gov]crecord]







191
HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns HomeIand SecurIty nIormatIon 8uIIetIns
See HomeIand SecurIty AdvIsory System See HomeIand SecurIty AdvIsory System See HomeIand SecurIty AdvIsory System See HomeIand SecurIty AdvIsory System
CommunIcate InIormatIon oI Interest to the natIon's crItIcaI InIrastructures that do not meet the
tImeIIness, specIIIcIty, or sIgnIIIcance threshoIds oI warnIng messages.

Source: Department oI HomeIand SecurIty,
http:]]www.dhs.gov]dhspubIIc]Interapp]edItorIaI]edItorIaI0335.xmI

HomeIand SecurIty nIormatIon Network HomeIand SecurIty nIormatIon Network HomeIand SecurIty nIormatIon Network HomeIand SecurIty nIormatIon Network (HSN) (HSN) (HSN) (HSN)
1. n February 2004, the Department oI HomeIand SecurIty (DHS) announced the
Iaunch oI Its HomeIand SecurIty nIormatIon Network (HSN) InItIatIve, desIgned to
connect aII 50 states, IIve U.S. terrItorIes, and 50 major urban areas wIth the
HomeIand SecurIty OperatIons Center (HSOC) at the department. To accompIIsh
thIs goaI, DHS adopted the ]RES InIrastructure, expandIng both Its capabIIItIes and
Its communIty oI users beyond Its orIgInaI "Iaw enIorcement and InteIIIgence
counterterrorIsm mIssIon" whIIe IeavIng the orIgInaI ]RES system In pIace.

Source: HaroId C. ReIyea and ]eIIrey W. SeIIert. "nIormatIon SharIng Ior HomeIand SecurIty: A 8rIeI
OvervIew." CRS Report to Congress ]anuary 10, 2005, http:]]www.Ias.org]sgp]crs]RL32597.pdI
2. The HomeIand SecurIty nIormatIon Network (HSN) aIIows aII states and major urban areas to
coIIect and dIssemInate InIormatIon between IederaI, state, and IocaI agencIes InvoIved In combatIng
terrorIsm.
heIps provIde sItuatIonaI awareness
IacIIItates InIormatIon sharIng and coIIaboratIon wIth homeIand securIty partners throughout the
IederaI, state and IocaI IeveIs
provIdes advanced anaIytIc capabIIItIes
enabIes reaI tIme sharIng oI threat InIormatIon
ThIs communIcatIons capabIIIty deIIvers to states and major urban areas reaI-tIme InteractIve connectIvIty
wIth the NatIonaI OperatIons Center.
Source: DHS, http:]]www.dhs.gov]xInIoshare]programs]gc1156888108137.shtm and CAO, nIormatIon
TechnoIogy: HomeIand SecurIty nIormatIon Network Needs to 8e 8etter CoordInated wIth Key State and
LocaI nItIatIves, CAO-07-822T, May 10, 2007, http:]]www.gao.gov

HomeIand SecurIty HomeIand SecurIty HomeIand SecurIty HomeIand SecurIty nteIIIgence (HSNT) nteIIIgence (HSNT) nteIIIgence (HSNT) nteIIIgence (HSNT)
1. CouId IIkeIy be deIIned as a more reIIned and IInIshed versIon oI homeIand securIty
InIormatIon. The nexus to terrorIsm and terrorIst-reIated events Is dIrect and compeIIIng. One
compIIcatIon oI dIscernIng what Is homeIand securIty InIormatIon remaIns how the InvestIgator or
operator knows that the actIvIty whIch they are InvestIgatIng or monItorIng Is reIated to terrorIsm.






192

Source: Todd Masse, "HomeIand SecurIty nteIIIgence: PerceptIons, Statutory DeIInItIons, and Approaches"
CRS Report Ior Congress August 18, 2006, RL33616, http:]]www.Ias.org]sgp]crs]InteI]RL33616.pdI

2. There are at Ieast three dIIIerent constructs that couId be used to Irame HSNT: (1) geographIc
structuraI, and (3) hoIIstIc (p.11).

An InteIIIgence approach that consIdered onIy actIvItIes assocIated wIth homegrown threats, wIthout a
more Integrated, gIobaI perspectIve on the threat, wouId mIss one oI the centraI Iessons Iearned Irom
9]11-the Importance oI IntegratIng InteIIIgence reIated to threats to natIonaI securIty regardIess oI the
geographIc IocatIon oI the source. (p.12)

Source: Mark A, RandoI, "HomeIand SecurIty nteIIIgence: PerceptIons, Statutory DeIInItIons and Counter-
TerrorIsm," CRS Report Ior Congress ]anuary 14, 2009, RL33616,
http:]]www.Ias.org]sgp]crs]InteI]RL33616.pdI

HomeIand SecurIty nteIIIgence CommunIty HomeIand SecurIty nteIIIgence CommunIty HomeIand SecurIty nteIIIgence CommunIty HomeIand SecurIty nteIIIgence CommunIty
ncIudes the organIzatIons oI the StakehoIder communIty that have InteIIIgence eIements.

Source: Department oI HomeIand SecurIty, DHS nteIIIgence EnterprIse StrategIc PIan, ]anuary 2006,
http:]]www.Ias.org]Irp]agency]dhs]stratpIan.pdI and Mark A, RandoI, "HomeIand SecurIty nteIIIgence:
PerceptIons, Statutory DeIInItIons and Counter-TerrorIsm," CRS Report Ior Congress ]anuary 14, 2009,
RL33616, http:]]www.Ias.org]sgp]crs]InteI]RL33616.pdI

HomeIand SecurIty OperatIons MornIng 8rIeI HomeIand SecurIty OperatIons MornIng 8rIeI HomeIand SecurIty OperatIons MornIng 8rIeI HomeIand SecurIty OperatIons MornIng 8rIeI
ComprIsed oI mostIy suspIcIous actIvIty reports mInus any InIormatIon on U.S. persons contaIned wIthIn
crImInaI InteIIIgence protected by prIvacy Iaws, Is shared on a SensItIve but UncIassIIIed (S8U) IeveI wIth
about 1500 FederaI, State, and IocaI InteIIIgence and Iaw enIorcement agencIes and subscrIbers.

Source: Matthew E. 8roderIck, DIrector HomeIand SecurIty OperatIons Center. Statement beIore the House
CommIttee on HomeIand SecurIty, nteIIIgence, nIormatIon SharIng, and TerrorIsm RIsk Assessment
SubcommIttee, ]uIy 20, 2005, http:]]buIk.resource.org]gpo.gov]hearIngs]110h]27686.pdI

HomeIand SecurIty Threat AdvIsorIes HomeIand SecurIty Threat AdvIsorIes HomeIand SecurIty Threat AdvIsorIes HomeIand SecurIty Threat AdvIsorIes
See H See H See H See HomeIand SecurIty AdvIsory System omeIand SecurIty AdvIsory System omeIand SecurIty AdvIsory System omeIand SecurIty AdvIsory System
ActIonabIe InIormatIon about an IncIdent InvoIvIng, or a threat targetIng, crItIcaI natIonaI networks or
InIrastructures or key assets.

Source: Department oI HomeIand SecurIty,
http:]]www.dhs.gov]xInIoshare]programs]CopyoIpressreIease0046.shtm

HorIzontaI FusIon HorIzontaI FusIon HorIzontaI FusIon HorIzontaI FusIon






193
See See See See CIobaI nIormatIon CrId CIobaI nIormatIon CrId CIobaI nIormatIon CrId CIobaI nIormatIon CrId
HorIzontaI FusIon, begun In ]anuary 2003, Is an award-wInnIng Department oI DeIense TransIormatIon
InItIatIve that brIngs together a coIIectIon oI 31 InItIatIves Iocused on enabIIng true net-centrIc warIare.
HorIzontaI FusIon Is at the IeadIng edge oI transIormIng the DOD through a portIoIIo oI InItIatIves that are
breakIng down the waIIs between dIverse InIormatIon stores In the deIense, InteIIIgence, dIpIomatIc, and
coaIItIon communItIes and Web-enabIIng these tooIs to create a new "nternet Ior the DOD." HorIzontaI
FusIon Is not onIy heIpIng to estabIIsh the standards Ior securIty, cross domaIn InIormatIon- sharIng,
tactIcaI wIreIess, and other tooIs, It Is aIso puttIng them Into practIce. ndeed, current InItIatIves have
aIready begun to make more InIormatIon avaIIabIe to those who need It, when they need It.
The HorIzontaI FusIon PortIoIIo IncIudes InItIatIves that wIII provIde the InIormatIon standards and the
Net-CentrIc EnterprIse ServIces (NCES) requIred to support net-centrIc operatIons. The CIobaI nIormatIon
CrId (CC) 8andwIdth ExpansIon (CC-8E) wIII Increase terrestrIaI communIcatIons capacIty, the ]oInt
TactIcaI RadIo System (]TRS) wIII provIde InteroperabIe wIreIess communIcatIons by users oI programmabIe
radIos, and the TransIormatIonaI SateIIIte (TSAT) CommunIcatIons wIII make hIgh bandwIdth InIormatIon
sources avaIIabIe to DoD "edge users"-warIIghters, anaIysts, commanders, joInt Iorces and coaIItIon
partners. Each InItIatIve represents a strategIc Investment In present and Iuture capabIIItIes that wIII
empower DoD edge users.
Source: DoD. "What Is HorIzontaI FusIonZ"
http:]]horIzontaIIusIon.dtIc.mII]Iaq] and Cunner PaIace [DVD]. Produced, wrItten and dIrected by MIchaeI
Tucker and Petra EpperIeIn. New York: PaIm PIctures, 2005.

HorIzontaI ntegratIon HorIzontaI ntegratIon HorIzontaI ntegratIon HorIzontaI ntegratIon
1. ReIers to the desIred end-state where InteIIIgence oI aII kInds IIows rapIdIy and seamIessIy to
the warIIghter, and enabIes InIormatIon domInance warIare.

Source: ]ason Program OIIIce, MItre CorporatIon. "HorIzontaI ntegratIon: 8roader Access ModeIs Ior
ReaIIzIng nIormatIon DomInance. http:]]www.Ias.org]Irp]agency]DoD]jason]cIasspoI.pdI

Human EnvIronment Human EnvIronment Human EnvIronment Human EnvIronment
See See See See EnvIronmentaI mpact Statement EnvIronmentaI mpact Statement EnvIronmentaI mpact Statement EnvIronmentaI mpact Statement
nterpreted comprehensIveIy to IncIude the naturaI and physIcaI envIronment and the reIatIonshIp oI
peopIe wIth that envIronment. (See the deIInItIon oI "eIIects'' (Sec. 1508.8).) ThIs means that economIc or
socIaI eIIects are not Intended by
themseIves to requIre preparatIon oI an envIronmentaI Impact statement. When an envIronmentaI Impact
statement Is prepared and economIc or socIaI and naturaI or physIcaI envIronmentaI eIIects are
InterreIated, then the envIronmentaI Impact statement.

Source: 40 CFR 1508.14. "DeIInItIons." http:]]www.gpoaccess.gov]cIr]Index.htmI

Human TerraIn System Human TerraIn System Human TerraIn System Human TerraIn System






194
1. HTS Is a new prooI-oI-concept program, run by the U.S. Army TraInIng and DoctrIne
Command (TRADOC), and servIng the joInt communIty. The near-term Iocus oI the HTS program Is to
Improve the mIIItary's abIIIty to understand the hIghIy compIex IocaI socIo-cuIturaI envIronment In the
areas where they are depIoyed;

The HTS approach Is to pIace the expertIse and experIence oI socIaI scIentIsts and regIonaI experts,
coupIed wIth reach-back, open-source research, dIrectIy In support oI depIoyed unIts engagIng In IuII-
spectrum operatIons.

Source: U.S. Army TraInIng and DoctrIne Command (TRADOC), "Human TerraIn System,"
http:]]humanterraInsystem.army.mII], http:]]humanterraInsystem.army.mII]mIssIonstatement.htmI, and
Hugh Custerson, "The U.S. mIIItary's quest to weaponIze cuIture," 8uIIetIn oI the AtomIc ScIentIsts ]une 20,
2008,http:]]www.thebuIIetIn.org]web-edItIon]coIumnIsts]hugh-gusterson]the-us-mIIItarys-quest-to-
weaponIze-cuIture

2. At tImes, the IexIcon we come up wIth Ior new programs appears aImost desIgned to Induce
maxImum paranoIa. n that veIn, "Human TerraIn Teams" IoIIows In the proud tradItIon oI InItIatIves IIke:
The OIIIce oI SpecIaI PIans; TALON ReportIng System; and TotaI nIormatIon Awareness.

Source: Robert Cates, Address to the AssocIatIon oI AmerIcan UnIversItIes, WashIngton, D.C., AprII 14,
2008, http:]]www.deIenseIInk.mII]speeches]speech.aspxZspeechId=1228 and Hugh Custerson, "The U.S.
mIIItary's quest to weaponIze cuIture," 8uIIetIn oI the AtomIc ScIentIsts ]une 20, 2008,
http:]]www.thebuIIetIn.org]web-edItIon]coIumnIsts]hugh-gusterson]the-us-mIIItarys-quest-to-
weaponIze-cuIture

HUMNT Manager HUMNT Manager HUMNT Manager HUMNT Manager
See See See See nteIIIgence nIormatIon, NatIonaI CIandestIne ServIce nteIIIgence nIormatIon, NatIonaI CIandestIne ServIce nteIIIgence nIormatIon, NatIonaI CIandestIne ServIce nteIIIgence nIormatIon, NatIonaI CIandestIne ServIce
The DCA wIII become the NatIonaI HUMNT manager. He wIII deIegate hIs day-to-day responsIbIIItIes as
the NatIonaI HUMNT manager to the DIrector oI the NCS. The creatIon oI the NCS [NatIonaI CIandestIne
ServIce] wIII Iurther enhance oI the nteIIIgence CommunIty's (C) cIandestIne HUMNT (Human nteIIIgence)
capabIIItIes and create a truIy natIonaI cIandestIne HUMNT capabIIIty. t wIII be successIuI due to the IuII
partIcIpatIon oI aII reIevant C members.

Source: CentraI nteIIIgence Agency Fact Sheet "CreatIon oI the NatIonaI HUMNT Manager." October 13,
2005, https:]]www.cIa.gov]news-InIormatIon]press-reIeases-statements]press-reIease-archIve-
2005]Is10132005.htmI


~ ~ ~ ~ ~ ~ ~ ~

con con con con






195
1. ReIers to categorIes oI "InIormatIon that are reIIexIveIy cIassIIIed, wIthout serIous
evaIuatIon oI any natIonaI securIty threat theIr reIease mIght pose. These Icons are rareIy or never
decIassIIIed, no matter what the Iaw, or the U.S. ConstItutIon mIght say."

Source: FAS. Secrecy News AprII 23, 2001. http:]]www.Ias.org]sgp]news]secrecy]2001]04]042301.htmI

2. AII to [sIc too] oIten, when government agencIes depIoy the (b) (1) and (b) (3) [FOA]
exemptIons, It has been to ensure contInued secrecy Ior what can be caIIed "cIassIIIcatIon Icons," whIch
are entIre categorIes oI InIormatIon that decIassIIIcatIon revIewers reIIexIveIy cIassIIy wIthout any Iresh
thInkIng about the reIevance oI contInued secrecy. Among those "Icons" are InteIIIgence spendIng, the
IocatIons oI hIstorIc nucIear weapons sItes, nucIear weapons stockpIIe InIormatIon, and the war pIans that
constItute the SOP (the SIngIe ntegrated OperatIonaI PIan Ior nucIear war).
Source: "DubIous Secrets." NatIonaI SecurIty ArchIve EIectronIc 8rIeIIng 8ook No. 90, ]eIIrey RIcheIson,
WIIIIam 8urr and Thomas 8Ianton (Eds.),
2003,http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE8890]Index.htm
nadequate Record KeepIng (DetaInees) nadequate Record KeepIng (DetaInees) nadequate Record KeepIng (DetaInees) nadequate Record KeepIng (DetaInees)
One oI the IundamentaI tenets oI the Iaws oI war Is that IuII and adequate records regardIng the capture
and treatment oI detaInees must be kept; a host oI Department oI DeIense and Army reguIatIons codIIy
thIs requIrement. Yet In more than a dozen cases, these reguIatIons were not IoIIowed, and InvestIgatIons
Into most oI these detaInee deaths appear to have been undermIned as a resuIt.
The Army's medIcaI record-keepIng was partIcuIarIy poor, wIth detaInees. medIcaI records oIten IeIt
IncompIete or entIreIy mIssIng. Thus, aIthough Army InvestIgatIons Iound that Iourteen detaInees dIed oI
naturaI causes because oI pre-exIstIng condItIons, at Ieast IIve case IIIes do not IncIude records
documentIng these condItIons. n some Instances, thIs appears to have been an admInIstratIve oversIght
by crImInaI InvestIgators who may not have requested records. n others, however, there were sImpIy no
medIcaI records to be Iound.
Source: HIna ShamsI and Deborah PearIsteIn (ed), Command's ResponsIbIIIty's DetaInee Deaths In U.S.
Custody In raq and AIghanIstan, Human RIghts FIrst, February 2006,
http:]]www.humanrIghtsIIrst.org]usIaw]etn]dIc]Index.asp; aIso see the Taguba Report wIth Annexes
http:]]www.dod.mII]pubs]IoI]detaInees]taguba]

nadvertent DI nadvertent DI nadvertent DI nadvertent DIscIosure scIosure scIosure scIosure
1. Type oI IncIdent InvoIvIng accIdentaI exposure oI InIormatIon to an IndIvIduaI not authorIzed
access.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009.NatIonaInIormatIon Assurance
CIossary, ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI ; aIso see






196
DOE, OIIIce oI CIassIIIcatIon and nIormatIon. Twenty-second Report to Congress on nadvertent
DIscIosures oI RestrIcted Data under ExecutIve Order 12958, August 2006,
http:]]www.Ias.org]sgp]othergov]doe]Inadvertent22.pdI

ncIdent ncIdent ncIdent ncIdent
See See See See nIormatIon OperatIons nIormatIon OperatIons nIormatIon OperatIons nIormatIon OperatIons
n InIormatIon operatIons, an assessed event oI attempted entry, unauthorIzed entry, or an InIormatIon
attack on an automated InIormatIon system. t IncIudes unauthorIzed
probIng and browsIng; dIsruptIon or denIaI oI servIce; aItered or destroyed Input, processIng, storage, or
output oI InIormatIon; or changes to InIormatIon system hardware, IIrmware, or soItware characterIstIcs
wIth or wIthout the users' knowIedge, InstructIon, or Intent. (]P 3-13).

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17,
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

ncIdent Data Mart ncIdent Data Mart ncIdent Data Mart ncIdent Data Mart
See See See See Data MInIng Data MInIng Data MInIng Data MInIng
Department oI HomeIand SecurIty. WIII Iook through IncIdent Iogs Ior patterns oI events. An IncIdent Is an
event InvoIvIng a Iaw enIorcement or government agency Ior whIch a Iog was created (e.g., traIIIc tIcket,
drug arrest, or IIrearm possessIon). The system may Iook at crImes In a partIcuIar geographIc IocatIon,
partIcuIar types oI arrests, or any type oI unusuaI actIvIty;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: PIanned;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses.CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI
ndIcatIons and WarnIng ndIcatIons and WarnIng ndIcatIons and WarnIng ndIcatIons and WarnIng
Those InteIIIgence actIvItIes Intended to detect and report tIme-sensItIve InteIIIgence InIormatIon on
IoreIgn deveIopments that couId InvoIve a threat to the UnIted States or aIIIed and]or coaIItIon mIIItary,
poIItIcaI, or economIc Interests or to US cItIzens abroad. t IncIudes IorewarnIng oI enemy actIons or
IntentIons; the ImmInence oI hostIIItIes; Insurgency; nucIear]nonnucIear attack on the UnIted States, Its
overseas Iorces, or aIIIed and]or coaIItIon natIons; hostIIe reactIons to US reconnaIssance actIvItIes;
terrorIsts' attacks; and other sImIIar events.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]






197
ndIrect nIormatIon WarIare ndIrect nIormatIon WarIare ndIrect nIormatIon WarIare ndIrect nIormatIon WarIare
ChangIng the adversary's InIormatIon by creatIng phenomena that the adversary must then observe and
anaIyze.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995.
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]

nIIuence OperatIons nIIuence OperatIons nIIuence OperatIons nIIuence OperatIons
EmpIoyment oI capabIIItIes to aIIect behavIors, protect operatIons, communIcate commander's Intent, and
project accurate InIormatIon to achIeve desIred eIIects across the cognItIve domaIn. These eIIects shouId
resuIt In dIIIerIng behavIor or a
change In the adversary decIsIon cycIe, whIch aIIgns wIth the commander's objectIves.
(AFDD 2-5)

Source: U.S. AIr Force. PubIIc AIIaIrs OperatIons. AIr Force DoctrIne Document 2-5.3, ]une 24, 2005.
[See the Wayback MachIne, http:]]tInyurI.com]ycntjj5 ]

nIo nIo nIo nIo
See See See See Proc Proc Proc Procedure Word edure Word edure Word edure Word
A procedure word meanIng, "The addressees ImmedIateIy IoIIowIng are addressed Ior InIormatIon."

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIobIockade nIobIockade nIobIockade nIobIockade
See nIormatIon WarIare
An InIormatIon warIare attack may aIso make transport oI peopIe and products ImpossIbIe, paraIyzIng an
economy, and It too may bIock the spread oI InIormatIon (especIaIIy as In an "InIobIockade"). (p.19)

Source: Lawrence T. Creenberg, Seymour E. Coodman, and KevIn ]. Soo Hoo, nIormatIon WarIare and
nternatIonaI Law, NatIonaI DeIense UnIversIty Press, 1998,
http:]]www.dodccrp.org]htmI4]booksdownIoads.htmI

nIormant nIormant nIormant nIormant
A person who, wIttIngIy or unwIttIngIy, provIdes InIormatIon to an agent, a cIandestIne servIce, or the
poIIce. 2. n reportIng, a person who has provIded specIIIc InIormatIon and Is cIted as a source.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents







198
nIormatIon nIormatIon nIormatIon nIormatIon
See See See See CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon, , , , Free Free Free Free- -- -FIow oI nIormatIon, Covernment nIormatIon, Open nIormatIon FIow oI nIormatIon, Covernment nIormatIon, Open nIormatIon FIow oI nIormatIon, Covernment nIormatIon, Open nIormatIon FIow oI nIormatIon, Covernment nIormatIon, Open nIormatIon
1. Any communIcatIon or representatIon oI knowIedge such as Iacts, data or opInIons In any
medIum or Iorm, IncIudIng textuaI, numerIcaI, graphIc, cartographIc, narratIve or audIovIsuaI.

Source: OIIIce oI Management and 8udget, CIrcuIar No. A-130, "Management oI FederaI nIormatIon
Resources." February 8, 1996, http:]]www.whItehouse.gov]omb]cIrcuIars]a130]a130.htmI

2. nIormatIon means any statement or estImate oI Iact or opInIon, regardIess oI Iorm or Iormat,
whether In numerIcaI, graphIc, or narratIve Iorm, and whether oraI or maIntaIned on paper, eIectronIc or
other medIa. "nIormatIon'' does not generaIIy IncIude Items In the IoIIowIng categorIes; however, OM8
may determIne that any specIIIc Item constItutes "InIormatIon'':
(1) AIIIdavIts, oaths, aIIIrmatIons, certIIIcatIons, receIpts, changes oI address, consents, or
acknowIedgments; provIded that they entaII no burden other than that necessary to IdentIIy the
respondent, the date, the respondent's address, and the nature oI the Instrument (by contrast, a
certIIIcatIon wouId IIkeIy InvoIve the coIIectIon oI "InIormatIon'' II an agency conducted or sponsored It as
a substItute Ior a coIIectIon oI InIormatIon to coIIect evIdence oI, or to monItor, compIIance wIth
reguIatory standards, because such a certIIIcatIon wouId generaIIy entaII burden In addItIon to that
necessary to IdentIIy the respondent, the date, the respondent's address, and the nature oI the
Instrument); (2) SampIes oI products or oI any other physIcaI objects; (3) Facts or opInIons obtaIned
through dIrect observatIon by an empIoyee or agent oI the sponsorIng agency or through nonstandardIzed
oraI communIcatIon In connectIon wIth such dIrect observatIons; (4) Facts or opInIons submItted In
response to generaI soIIcItatIons oI comments Irom the pubIIc, pubIIshed In the FederaI RegIster or other
pubIIcatIons, regardIess oI the Iorm or Iormat thereoI, provIded that no person Is requIred to suppIy
specIIIc InIormatIon pertaInIng to the commenter, other than that necessary Ior seII-IdentIIIcatIon, as a
condItIon oI the agency's IuII consIderatIon oI the comment;(5) Facts or opInIons obtaIned InItIaIIy or In
IoIIow-on requests, Irom IndIvIduaIs (IncIudIng IndIvIduaIs In controI groups) under treatment or cIInIcaI
examInatIon In connectIon wIth research on or prophyIaxIs to prevent a cIInIcaI dIsorder, dIrect treatment
oI that dIsorder, or the InterpretatIon oI bIoIogIcaI anaIyses oI body IIuIds, tIssues, or other specImens, or
the IdentIIIcatIon or cIassIIIcatIon oI such specImens; (6) A request Ior Iacts or opInIons addressed to a
sIngIe person; (7) ExamInatIons desIgned to test the aptItude, abIIItIes, or knowIedge oI the persons tested
and the coIIectIon oI InIormatIon Ior IdentIIIcatIon or cIassIIIcatIon In connectIon wIth such examInatIons;
(8) Facts or opInIons obtaIned or soIIcIted at or In connectIon wIth pubIIc hearIngs or meetIngs; (9) Facts
or opInIons obtaIned or soIIcIted through nonstandardIzed IoIIow-up questIons desIgned to cIarIIy
responses to approved coIIectIons oI InIormatIon; and (10) LIke Items so desIgnated by OM8.

Source. OIIIce oI Management and 8udget. 5 CFR 1320. "ControIIIng Paperwork 8urdens on the PubIIc."
http:]]www.gpoaccess.gov]cIr]Index.htmI

3. Any knowIedge that can be communIcated or documentary materIaI, regardIess oI Its physIcaI
Iorm or characterIstIcs, that Is owned by, produced by or Ior, or Is under the controI oI the UnIted States






199
Covernment.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended. March 28,
2003, http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve
Order 13292, "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

4. KnowIedge that can be communIcated by any means.

Source: U.S. Department oI ]ustIce. UnIted States MarshaIs ServIce. OIIIce oI nspectIons. nternaI SecurIty
DIvIsIon. nIormatIon SecurIty. WashIngton D.C.: 1991. SUDOC: ] 25.2: n 3

5. An Instance oI an InIormatIon type.

Source: FederaI nIormatIon ProcessIng Standards 199 (FPS). Standards Ior SecurIty CategorIzatIon oI
FederaI nIormatIon and nIormatIon Systems. February 2004.
6. Data and InstructIons.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]

7. (DOD) 1. Facts, data, or InstructIons In any medIum or Iorm. 2. The meanIng that a human
assIgns to data by means oI known conventIons used In theIr representatIon. (NATO) Unprocessed data oI
every descrIptIon whIch may be used In the productIon oI InteIIIgence. (Army) 1. n the generaI sense, the
meanIng humans assIgn to data. 2. n the context oI the cognItIve hIerarchy, data that have been
processed to provIde Iurther meanIng.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIormatIon Assurance (A) nIormatIon Assurance (A) nIormatIon Assurance (A) nIormatIon Assurance (A)
1. Measures that protect and deIend InIormatIon and InIormatIon systems by ensurIng theIr
avaIIabIIIty. ntegrIty, authentIcatIon, conIIdentIaIIty, and nonrepudIatIon. These measures IncIude
provIdIng Ior restoratIon oI InIormatIon systems by IncorporatIng protectIon, detectIon, and reactIon
capabIIItIes.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
2. (DOD) nIormatIon operatIons that protect and deIend InIormatIon and InIormatIon systems by
ensurIng theIr avaIIabIIIty, IntegrIty, authentIcatIon, conIIdentIaIIty, and nonrepudIatIon. ThIs IncIudes






200
provIdIng Ior restoratIon oI InIormatIon systems by IncorporatIng protectIon, detectIon, and reactIon
capabIIItIes. AIso caIIed A. See aIso InIormatIon; InIormatIon operatIons; InIormatIon system.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
nIormatIon Attack nIormatIon Attack nIormatIon Attack nIormatIon Attack
DIrectIy corruptIng InIormatIon wIthout vIsIbIy changIng the physIcaI entIty wIthIn whIch It resIdes.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]
nIormatIon 8ox nIormatIon 8ox nIormatIon 8ox nIormatIon 8ox
A DoD and NATO term: A space on an annotated overIay, mosaIc, map, etc., whIch Is used Ior
IdentIIIcatIon, reIerence, and scaIe InIormatIon.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. Amended. ]P 1-02. As Amended
through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

nIormatIon 8ureaucratIzatIon nIormatIon 8ureaucratIzatIon nIormatIon 8ureaucratIzatIon nIormatIon 8ureaucratIzatIon
See See See See Secrecy, Secrets Secrecy, Secrets Secrecy, Secrets Secrecy, Secrets
nIormatIon bureaucratIzatIon arIses Irom Max Weber's work In governmentaI and judIcIaI bureaucracy,
especIaIIy hIs Ideas regardIng IIIes and record keepIng practIces. Modern organIzatIons, as Weber noted,
both generate and are dependent, upon wrItten documents, or the IIIes. nIormatIon bureaucratIzatIon In
Weber's thoughts and manIIests In the ways InIormatIon Is gathered, secreted, partItIoned, terrItorIaIIzed,
manuIactured, baIkanIzed, restrIcted, hIstorIcaIIy engIneered, organIzed, IegItImated, and reIIIed wIthIn
admInIstratIve unIts oI the UnIted States government and other bureaucratIc InIormatIon machInes.
38

These "condItIons oI InIormatIon," whIch aIso IncIude the mIssIon-specIIIc, reguIatory, and statutory
Ianguage regardIng InIormatIon, obstruct debate about partIcIpatIon, rIsk, InIormed consent, seII-
determInatIon.
Source: DeIInItIon - Maret, based on Max Weber on Law In Economy and SocIety. Trans. Edward ShIIs and
Max RheInsteIn. Max RheInsteIn (Ed.). New York: SImon and Schuster, 1968.

nIormatIon CoIIectIon 8udget (C8) nIormatIon CoIIectIon 8udget (C8) nIormatIon CoIIectIon 8udget (C8) nIormatIon CoIIectIon 8udget (C8)
RequIres that each agency deveIop and submIt annuaIIy a comprehensIve budget Ior aII coIIectIons oI
InIormatIon Irom the pubIIc to be conducted or sponsored by the agency In the succeedIng 12 months.
The C8 Is expressed In the number oI hours requIred oI the pubIIc to compIy wIth request and
requIrements Ior InIormatIon.

38
8aIkanIzed In the sense oI a "Iragmentary state," arIses Irom the chaos oI Eastern Europe aIter the
coIIapse oI the SovIet UnIon.






201

The C8 Is the vehIcIe through whIch ORA [OIIIce oI nIormatIon and reguIatory PoIIcy], In consuItatIon
wIth each agency, sets "annuaI agency goaIs to reduce InIormatIon coIIectIon burdens Imposed on the
pubIIc." n addItIon, the C8 serves as a management tooI. Agency oIIIcIaIs can use the C8 In theIr InternaI
pIannIng and controI processes to revIew aII oI the coIIectIons oI InIormatIon theIr staII pIans to
ImpIement durIng the IorthcomIng year. OM8 uses the C8 In conjunctIon wIth management revIews oI
other agency actIvItIes to assess InIormatIon coIIectIon prIorItIes and to heIp maIntaIn the Iowest
necessary IeveI oI paperwork burden on the pubIIc, consIstent wIth the FederaI Covernment's need Ior
InIormatIon.

The PRA requIres that agencIes obtaIn OM8 approvaI Ior coIIectIons oI InIormatIon. A coIIectIon oI
InIormatIon wIthout current OM8 approvaI constItutes a vIoIatIon oI the PRA. Each year OM8 Is requIred to
report to Congress PRA vIoIatIons pubIIshed In the nIormatIon CoIIectIon 8udget oI the UnIted States.
39


Source: 5 CFR 1320.10 http:]]www.gpoaccess.gov]cIr]Index.htmI, and OM8, ExecutIve OIIIce oI the
PresIdent. "Reports to Congress Under the Paperwork ReductIon Act oI 1995," [See the Wayback MachIne,
http:]]web.archIve.org]web]20080307102929]http:]]www.whItehouse.gov]omb]InIoreg]prarep2.htmI ]
nIormatIon CrIme nIormatIon CrImInaI nIormatIon CrIme nIormatIon CrImInaI nIormatIon CrIme nIormatIon CrImInaI nIormatIon CrIme nIormatIon CrImInaI
See See See See CensorshIp CensorshIp CensorshIp CensorshIp, , , , CraymaII, CraymaII, CraymaII, CraymaII, Leak, NucIear Secrecy, Propaganda, Secret, Secrecy, State Secrets Leak, NucIear Secrecy, Propaganda, Secret, Secrecy, State Secrets Leak, NucIear Secrecy, Propaganda, Secret, Secrecy, State Secrets Leak, NucIear Secrecy, Propaganda, Secret, Secrecy, State Secrets No No No Note te te te: the
IoIIowIng Is a deIInItIon Is a work In progress. No IormaI deIInItIon exIsts.
The term was IIrst spotted In DIsmantIIng UtopIa: How nIormatIon Ended the SovIet UnIon. n thIs
work, the 1985 case oI AndreI MIronov Is reported. Mr. MIronov was prosecuted under the ArtIcIe 70 oI
the CrImInaI Code, whIch prohIbIted "antI-SovIet agItatIon and propaganda wIth the goaI oI undermInIng
and weakenIng the SovIet state and socIaI system." MIronov was sentenced to Iour years IncarceratIon and
three years In exIIe, and sent to the DubrouIog PrIson Camp. He was reIeased Irom prIson In 1987 under
Corbachev regIme. Mr. MIronov's crIme was beIng a part oI a samIzdat "rIng" that obtaIned, copIed, and
cIrcuIated IIIegaI IoreIgn IIterature and research.
40

A more recent exampIe oI an InIormatIon crIme Is the 2005 IncarceratIon oI ChInese journaIIst ShI
Tao, convIcted wIth the assIstance oI Yahoo!. ShI Tao was arrested, ImprIsoned, and sentenced Ior ten
years In prIson Ior sendIng Yahoo! emaII on the roIe oI the ChInese government In the TIananmen Square
massacre. ChInese authorItIes accused hIm oI "IIIegaIIy provIdIng state secrets to IoreIgn entItIes."
We mIght theoretIcaIIy posItIon the aIorementIoned cases as InIormatIon crImes. No IormaI

39
AccordIng to ORA's FIscaI Year 2005 ManagIng nIormatIon CoIIectIon: nIormatIon CoIIectIon
8udget oI the UnIted States, ". the pubIIc spent about 7.971 bIIIIon hours respondIng to or compIyIng
wIth InIormatIon requIrements. ThIs represents a 1.6Z decrease compared to Iast year's totaI oI 8.099
bIIIIon hours." See http:]]www.whItehouse.gov]OM8]InIoreg]2005IcbIInaI.pdI
40
SamIzdat has no oIIIcIaI deIInItIon; It Is a RussIan abbrevIatIon oI state pubIIshIng houses
CospoIItIzdat or AkademIzdat. LIteraIIy transIated, means seII-pubIIshed, unoIIIcIaIIy dIstrIbuted IIterary
works, whIch IncIude poIItIcaI wrItIngs, newsIetters, open Ietters, trIaI transcrIpts; samIzdat Is oIten
IIkened to materIaIs oI a poIItIcaI nature (Loeber 84, 99-101).






202
deIInItIon oI InIormatIon crIme exIsts; the term Is ImpIIed In state prosecutIon oI espIonage, Ieaks,
and dIscIosure oI sensItIve or potentIaIIy poIItIcaIIy expIosIve InIormatIon. There are certaIn
characterIstIcs oI an InIormatIon crIme suggested by InstItutIonaI structures oI Iaw and reguIatIon that
govern controI oI InIormatIon, and InIormaIIy as a poIItIcaI "thought controI," censorshIp, or In Instances
oI Imposed cuIturaI change.
TechnoIogy [emaII, encryptIon, soItware, computers In generaI] and certaIn technIques such as
redactIon oI InIormatIon or graymaII, are InvoIved In some way. An InIormatIon crIme carrIes wIth It some
type oI penaIty Ior dIscIosure, whIch may IncIudes harassment, monetary IInes, IncarceratIon, sIIencIng,
and other means oI punIshIng IndIvIduaIs or groups. Further, an InIormatIon crIme may have a coroIIary
wIth the motIves and penaItIes behInd the Ieak, especIaIIy Hess' typoIogy oI a "WhIstIebIower Leak," whIch
Is "usuaIIy used by career personneI; goIng to the press may be the Iast resort oI Irustrated cIvII servants
who IeeI they cannot resoIve theIr dIspute through admInIstratIve channeIs." DanIeI EIIsberg and the
Pentagon Papers Is one such exampIe.
The above cases IIIustrate that IndIvIduaIs are oIten sIngIed out In order Ior governments to
maIntaIn tIght controI over InIormatIon In attempt to maIntaIn domInance over pubIIc perceptIon;
bracketIng the roIe oI IndIvIduaIs or groups In any InIormatIon "crImes," can we estabIIsh that
governments and states are responsIbIe Ior commIttIng "InIormatIon crImes" through the
overcIassIIIcatIon oI InIormatIon, restrIctIng InIormatIon through executIve or deIIberatIve prIvIIege, the
mIsappIIcatIon oI FOA exemptIons, IntroductIon oI dIsInIormatIon, use oI vIdeo news reIeases, or
stubbornIy reIusIng the reIease oI crItIcaI hIstorIcaI InIormatIon (as In the Instances oI the CA and the
ForeIgn ReIatIon oI the UnIted States [FRUS] serIes)Z
41

CIoseIy IInked to censorshIp, manIpuIatIon oI InIormatIon [the tamperIng or aIteratIon oI a set oI Iacts,
records, databases, or archIves], and government, mIIItary, patent, and natIonaI securIty secrecy, It Is
Important to note that an InIormatIon crIme Is essentIaIIy tIed to SIsseIa 8ok's (1989:19) Idea oI secrecy as
"power over controIIIng the IIow oI InIormatIon." The IoIIowIng exampIe Irom the Chapter 13 oI the
AdvIsory CommIttee on Human RadIatIon ExperIments IIIustrates my poInt:

n the case oI research reIated to chemIcaI and bIoIogIcaI warIare, the mIIItary Issued a secret edIct
that pubIIshed artIcIes be cIeansed oI any reIerence to mIIItary purpose. [70] [70] [70] [70] n many cases the
opportunIty to obscure the IuII purpose oI research by careIuI wordIng was obvIous. As a DOD
document put It, "the term 'radIobIoIogy' Is so IIexIbIe semantIcaIIy that, dependIng upon the
InvestIgator's poInt oI vIew, any project couId be cIassIIIed as 'cIInIcaI' or 'basIc' or 'nucIear
weapons eIIects.' "[71] 71] 71] 71]

Footnotes to the above quote: 70. W. C. LaIor, Rear AdmIraI, U.S. Navy (Ret.), Secretary, ]oInt
ChIeIs oI StaII, to ChIeI oI StaII, U.S. Army et aI., 3 September 1952 ("SecurIty Measures on
ChemIcaI WarIare and 8IoIogIcaI WarIare") (ACHRE No. NARA-012495-A), 2. n the memo to the

Not just restrIctIon oI InIormatIon In regard to FRUS, but can the passIng on oI names by the CA
to the ndonesIan Army In 1965-1966 aIso consIdered an InIormatIon crImeZ WIkIIeaksZ thInk thIs
questIon Is worth ponderIng In terms oI [InIormatIon] ethIcs.






203
servIce chIeIs oI staII, the ]oInt ChIeIs decreed that "responsIbIe agencIes" shouId "[e]nsure,
InsoIar as practIcabIe, that aII pubIIshed artIcIes stemmIng Irom the 8W [bIoIogIcaI warIare] or CW
[chemIcaI warIare] research and deveIopment programs are dIsassocIated Irom anythIng whIch
mIght connect them wIth U.S. mIIItary endeavor." 71. OIIIce oI the DIrector oI DeIense Research
and EngIneerIng, ThIrtIeth ]oInt MedIcaI Research ConIerence, mInutes oI 8 ]anuary 1964 (ACHRE
No. DOD-062994-A), 3.

AIthough the term InIormatIon crIme or InIormatIon crImInaI Is not used, hIstorIcaI paraIIeIs oI
such crImes agaInst the pubIIc IIow oI InIormatIon rest wIth the sedItIon acts In EngIand [the InIormatIon
excesses oI the Star Chamber, the LIcensIng Order oI 1643; see MIIton's AreopagItIca: A Speech Ior the
LIberty oI UnIIcensed PrIntIng], and the ]uIy 14, 1798 [AIIen] SedItIon Act In the UnIted States. CertaIn
propaganda crImes oI states and government [NatIonaI SocIaIIst Cermany Ior exampIe; aIso see Nancy
Snow's work on war and propaganda In the U.S.] may aIso IaII Into the category oI a government
InIormatIon crIme.
ExampIes oI InIormatIon crImes are repIete In dystopIan IIterature. For exampIe, the InIormatIon
crImes oI 1984's WInston SmIth In keepIng a personaI dIary and CoIng Down the Memory HoIe [there are
numerous other exampIes]; Ray 8radbury's FahrenheIt 451, wIth Its covertIy stashed texts, book burnIng,
and penaItIes Ior knowIedge dIssemInatIon, IIIustrate the Iorce and potentIaI oI InIormatIon to aIter the
course oI actIon and consensus reaIIty.

8ased on thIs deIInItIon, a workIng deIInItIon oI 8ased on thIs deIInItIon, a workIng deIInItIon oI 8ased on thIs deIInItIon, a workIng deIInItIon oI 8ased on thIs deIInItIon, a workIng deIInItIon oI InIormatIon crIme InIormatIon crIme InIormatIon crIme InIormatIon crIme Is proposed: Is proposed: Is proposed: Is proposed:
Those acts whIch InvoIve the gatherIng, reveIatIon, communIcatIon, or sharIng oI poIItIcaIIy
expIosIve, sensItIve, censored, contrary, or secret InIormatIon or IorbIdden knowIedge, consIdered
potentIaIIy damagIng by a government, a state, an organIzatIon or an IndIvIduaI, and has the potentIaI Ior
embarrassment or chaIIengIng exIstIng IdeoIogIes, poIIcIes, and poIItIcaI structures, and carrIes wIth It
prosecutIon and penaItIes Ior dIscIosure; 2. espIonage or dIscIosure oI secret, sensItIve, or other
InIormatIon consIdered strategIc to a IoreIgn country, government, state or organIzatIon; 3. InIormatIon
crImes are those acts carrIed out by states or governments that InvoIve secretIng, restrIctIng, aIterIng, or
censorIng InIormatIon, as weII as the destructIon and tamperIng oI databases, records, and archIves. An
InIormatIon crIme may aIso InvoIved IIIegaI government spyIng, surveIIIance, InvasIon oI prIvacy, covert
recordkeepIng, and manIpuIatIon oI pubIIc InIormatIon through the scIentIIIc IIterature mass medIa or
press; 4. potentIaIIy IIIegaI and destructIve acts such as hackIng, tamperIng, erasIng, or destroyIng
technoIogy or data by governments, states, groups, or IndIvIduaIs.

The "ethIcs oI hackIng" Is a controversIaI subject; however, the Issue begs the questIon that do aII
cases oI hackIng ImpIy crImInaI behavIorZ The cIassIc "The Hacker ManIIesto" characterIzes hackIng as
aImost a Iorm oI "InIormatIon IIberatIon" : "We make use oI a servIce aIready exIstIng wIthout payIng Ior
what couId be dIrt-cheap II It wasn't run by proIIteerIng gIuttons, and you caII us crImInaIs. We expIore...
and you caII us crImInaIs. We seek aIter knowIedge... and you caII us crImInaIs.You buIId atomIc bombs,
you wage wars, you murder, cheat, and IIe to us and try to make us beIIeve It's Ior our own good, yet we're
the crImInaIs. Yes, am a crImInaI. My crIme Is that oI curIosIty." [See The Mentor's "The Hacker's
ManIIesto,http:]]www.technozen.com]manIIesto.htm, orIgInaIIy pubIIshed In the Iegendary magazIne






204

DependIng on the act and who Is responsIbIe Ior carryIng It out, the entIre notIon oI an "InIormatIon
crIme" vIoIates the spIrIt oI numerous human rIghts decIaratIons and prIncIpIes [Ior exampIe, the
nternatIonaI Covenant on CIvII and PoIItIcaI RIghts, the UnIversaI DecIaratIon oI Human RIghts, specIIIcaIIy
ArtIcIe 19, the ]ohannesburg PrIncIpIes on NatIonaI SecurIty, Freedom oI ExpressIon and Access to
nIormatIon, and other Instruments].

Source: Proposed deIInItIon, Maret; Scott Shane, DIsmantIIng UtopIa: How nIormatIon Ended the SovIet
UnIon. [ChIcago: van R. Dee, 1994]; N. 8eIInkova, "UnoIIIcIaI CensorshIp." [StudIes on the SovIet UnIon 11
(1971): 73-92]; D.A. Loeber, "SamIzdat under SovIet Iaw." [n D.D. 8arry, et aI. (Ed.), Contemporary SovIet
Law: Essays In Honor oI ]ohn N. Hazard. The Hague: MartInus NIjhoII, 1974]; Reporters WIthout 8orders,
"nIormatIon suppIIed by Yahoo! heIped journaIIst ShI Tao get 10 years In prIson,"
http:]]www.rsI.org]artIcIe.php3ZIdartIcIe=14884; Stephen Hess, The Covernment]Press ConnectIon:
Press OIIIcers and theIr OIIIces. [WashIngton, D.C.: 8rookIngs nstItutIon, 1984. 77-79]; and SIsseIa 8ok.
Secrets. [New York: VIntage 8ooks, 1989]. AIso see AIso see AIso see AIso see Stephen KotkIn's [1992] "Terror, RehabIIItatIon, and
HIstorIcaI Memory: An ntervIew wIth DmItrII urasov" [RussIan RevIew 5, 238-262] on the MemorIaI Project
In the RussIan FederatIon, and Antoon de 8aets' CensorshIp oI HIstorIcaI Thought: A WorId CuIde 1945-
2000 [Creenwood Press, 2002] Ior a panoramIc, cross-cuIturaI vIew oI censorshIp and InIormatIon crImes.
ThIs Iatter work pays homage to those peopIe who onIy crIme was the gatherIng and sharIng oI
InIormatIon, a process that 8ucky FuIIer characterIzed as the "prImary human actIvIty."

nIormatIon DIIIerentIaI nIormatIon DIIIerentIaI nIormatIon DIIIerentIaI nIormatIon DIIIerentIaI
SuperIor access to and the abIIIty to eIIectIveIy empIoy InIormatIon on the strategIc, operatIonaI and
tactIcaI sItuatIon whIch advanced US technoIogIes provIde our Iorces. Space power Is crucIaI, but does not
operate aIone, In assIstIng the joInt Iorce to enjoy superIorIty In command, controI, communIcatIons,
InteIIIgence, navIgatIon, and InIormatIon processIng.

Source: ]oInt ChIeIs oI StaII. ]oInt DoctrIne EncycIopedIa. ]uIy 16, 1997,
http:]]www.dtIc.mII]doctrIne]joIntdoctrIneencycIopedIa.htm

nIormatIon DomaIn nIormatIon DomaIn nIormatIon DomaIn nIormatIon DomaIn
The InIormatIon domaIn Is where InIormatIon IIves. t Is the domaIn where InIormatIon Is created,
manIpuIated, and shared. t Is the domaIn that IacIIItates the communIcatIon oI InIormatIon among
warIIghters. t Is the domaIn where the command and controI oI modern mIIItary Iorces Is communIcated,
where commander's Intent Is conveyed.

Source: DavId S. AIberts, et aI, UnderstandIng nIormatIon Age WarIare , DoD CCRP, August 2001, p. 12,
http:]]www.dodccrp.org]IIIes]AIbertsUAW.pdI

Phrack, 7, Pekka HImanen's The Hacker EthIc, and the SpIrIt oI the nIormatIon Age. [New York : Random
House, 2001], and the Department oI HomeIand SecurIty's deIInItIon, thIs work].






205

nIormatIon DomInance nIormatIon DomInance nIormatIon DomInance nIormatIon DomInance
1. The degree of information superiority that allows the possessor to use
information systems and capabilities to achieve an operational advantage in a conflict
or to control the situation in operations other than war while denying those
capabilities to the adversary.

Source: U.S. Army FIeId ManuaI 100-6, "nIormatIon OperatIons," 1996,
http:]]www.Ias.org]Irp]doddIr]army]Im100-6]

2. MartIn LIbIckI wrItes that InIormatIon domInance Is composed oI three eIements: "command
and controI that permIts everyone to know where they (and theIr cohorts) are In the battIespace and
enabIes them to execute operatIons when and as quIckIy as necessary; InteIIIgence that ranges Irom
knowIng the enemy's dIsposItIons to knowIng the IocatIon oI enemy assets In reaI-tIme wIth suIIIcIent
precIsIon Ior a one-shot kIII; and InIormatIon warIare that conIounds enemy InIormatIon systems at
varIous poInts (sensors, communIcatIons, processIng, and command), whIIe protectIng one's own. "

Source: NatIonaI DeIense UnIversIty StrategIc Forum Number 132, November 1997,
http:]]www.ndu.edu]Inss]strIorum]SF132]Iorum132.htmI

nIormatIon EnvIronment nIormatIon EnvIronment nIormatIon EnvIronment nIormatIon EnvIronment
1. Aggregate oI IndIvIduaIs, organIzatIons, or systems that coIIect, process, or dIssemInate
InIormatIon, aIso IncIuded Is the InIormatIon ItseII.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
2. (DOD) The aggregate oI IndIvIduaIs, organIzatIons or systems that coIIect, process, or
dIssemInate InIormatIon; aIso IncIuded Is the InIormatIon ItseII.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

3. The aggregate oI IndIvIduaIs, organIzatIons, and systems that coIIect,
process, dIssemInate, or act on InIormatIon (ThIs term and Its deIInItIon modIIy the exIstIng term and Its
deIInItIon and are approved Ior IncIusIon In the next edItIon oI ]P 1-02.)

Source: DoD. nIormatIon OperatIons. ]P 3-13, February 13 2006,
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp313.pdI

nIormatIon ExpIoItatIon nIormatIon ExpIoItatIon nIormatIon ExpIoItatIon nIormatIon ExpIoItatIon






206
The process oI extractIng, synthesIzIng, and]or presentIng reIevant InIormatIon Irom vast reposItorIes
oI raw and structured data. Data IncIudes muItIpIe medIa and genre types In aII the human Ianguages and
that aIso contaIns geospatIaI and abstract data. More specIIIcaIIy, nIormatIon ExpIoItatIon provIdes the
core IunctIonaIIty to access InIormatIon necessary Ior an anaIytIc process, especIaIIy In the nteIIIgence
CommunIty (C). At a mInImum, nIormatIon ExpIoItatIon IncIudes: Content Data TransIormatIon, Content
Data Mark-up, nIormatIon RetrIevaI, nIormatIon DIscovery, AnaIytIc KnowIedge-8ases, nIormatIon
UnderstandIng, Assessment and nterpretatIon, SynthesIs and FusIon, and PresentatIon and VIsuaIIzatIon.
ARDA's nIormatIon ExpIoItatIon programs are attemptIng to sIgnIIIcantIy advance the state oI the art In
some oI these areas wIth the expectatIon that advanced anaIytIc tooIs wIII emerge.

Source: Advanced Research DeveIopment Agency (ARDA), [See the Wayback MachIne,
http:]]tInyurI.com]yjIzb9t ]
nIormatIon ExpIoItatIon OIIIce nIormatIon ExpIoItatIon OIIIce nIormatIon ExpIoItatIon OIIIce nIormatIon ExpIoItatIon OIIIce
The nIormatIon ExpIoItatIon OIIIce (XO) deveIops technoIogIes Ior sensIng, expIoItatIon,
command]controI, and InIormatIon IntegratIon.

Source: DARPA. [See the Wayback MachIne, http:]]tInyurI.com]ykxtxec ]

nIormatIon FratrIcIde nIormatIon FratrIcIde nIormatIon FratrIcIde nIormatIon FratrIcIde
The resuIts oI empIoyIng InIormatIon operatIons eIements In a way that causes eIIects In the InIormatIon
envIronment that Impede the conduct oI IrIendIy operatIons or cause adverse eIIects on IrIendIy Iorces.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIormatIon FeudaIIsm nIormatIon FeudaIIsm nIormatIon FeudaIIsm nIormatIon FeudaIIsm
The transIer oI knowIedge assets Irom the InteIIectuaI commons Into prIvate hands. These hands beIong
to medIa congIomerates and Integrated IIIe scIences corporatIons rather than IndIvIduaI scIentIsts and
authors. The eIIect oI thIs.Is to raIse IeveIs oI prIvate monopoIIstIc power to dangerous gIobaI heIghts, at
a tIme when states, whIch have been weakened by the Iorces oI gIobaIIzatIon, have Iess capacIty to protect
theIr cItIzens Irom the consequences oI the exercIse oI thIs power.

Source: Peter Drahos, and ]ohn 8raIthwaIte. nIormatIon FeudaIIsm: Who Owns the KnowIedge EconomyZ
New York: The New Press, 2003. 2-3.

nIormatIon FunctIon nIormatIon FunctIon nIormatIon FunctIon nIormatIon FunctIon
Any actIvIty InvoIvIng the acquIsItIon, transmIssIon, storage, or transIormatIon oI InIormatIon.

Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]







207
nIormatIon FusIon nIormatIon FusIon nIormatIon FusIon nIormatIon FusIon
See See See See nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor
The uItImate goaI oI command, controI, communIcatIons, and computer systems Is to produce a pIcture oI
the battIespace that Is accurate and meets the needs oI warIIghters. ThIs goaI Is achIeved by IusIng I.e.,
reducIng InIormatIon to the mInImum essentIaIs and puttIng It In a Iorm that peopIe can act on. There Is
no one IusIng oI InIormatIon that meets the needs oI aII warrIors. However, wIth concIse, accurate, tImeIy,
and reIevant InIormatIon, unIty oI eIIort Is Improved, and uncertaInty Is reduced, enabIIng the Iorce as a
whoIe to expIoIt opportunItIes and IIght smarter.

Source: ]oInt ChIeIs oI StaII. ]oInt DoctrIne EncycIopedIa. ]uIy 16, 1997,
http:]]www.dtIc.mII]doctrIne]joIntdoctrIneencycIopedIa.htm

nIormatIon CatherIng and AnaIysIs nIormatIon CatherIng and AnaIysIs nIormatIon CatherIng and AnaIysIs nIormatIon CatherIng and AnaIysIs
The specIIIc actIons taken to gaIn InIormatIon about a system eIement or crItIcaI acquIsItIon process Ior
whIch the IeveI oI knowIedge Is InsuIIIcIent to permIt an InIormed decIsIon to be made wIth respect to
other rIsk-handIIng optIons.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp

nIormatIon CrId nIormatIon CrId nIormatIon CrId nIormatIon CrId
See See See See nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor nIormatIon WarIare, nIormatIon WarrIor, nIosphere , nIosphere , nIosphere , nIosphere
The networks that resuIt Irom open systems archItectures are caIIed InIormatIon grIds. They aIIow the
warrIor users to gaIn access, process, and transport InIormatIon In near reaI tIme to anyone eIse on the
network. nIormatIon grIds reIer to computer controIIed networks that provIde vIrtuaI connectIvIty on the
demand oI the networks that provIde vIrtuaI connectIvIty on the demand oI the warrIor; they support IocaI
and area network operatIons. They are aIso the basIc components oI Iarger grId networks that, when
Interconnected, support regIonaI, theater, and uItImateIy a gIobaI grId that Is aIso reIerred to as the
InIosphere.

Source: ]oInt ChIeIs oI StaII. ]oInt DoctrIne EncycIopedIa. ]uIy 16, 1997,
http:]]www.dtIc.mII]doctrIne]joIntdoctrIneencycIopedIa.htm

nIormatIon LaunderIng nIormatIon LaunderIng nIormatIon LaunderIng nIormatIon LaunderIng
See See See See 8Iowback 8Iowback 8Iowback 8Iowback
PosItIng rumors or gossIp, whIch wouId then be pIcked up by the maInstream broadcast and prInt medIa
as IegItImate storIes.

Source: D.]. Peterson. RussIa and the nIormatIon RevoIutIon. Rand NatIonaI SecurIty Research DIvIsIon,
2005. 84, http:]]www.rand.org]pubs]monographs]2005]RANDMC422.pdI

nIormatIon LIIe CycIe nIormatIon LIIe CycIe nIormatIon LIIe CycIe nIormatIon LIIe CycIe






208
Step 1: Created and produced (by authors In aII agencIes, In aII branches, at aII IeveIs, and In many
dIIIerent Iormats and medIums).
Step 2: CataIoged and Indexed (metadata tooIs appIIed).
Step 3: Temporary and permanent avaIIabIIIty and entItIement estabIIshed (ownershIp and dIscIosure
rIghts oI creators, pubIIshers, dIssemInators, IIcensees, IranchIsees).
Step 4: PubIIshed In the pubIIc domaIn or wIthheId Irom dIscIosure pursuant to a wIde varIety oI statutes,
InternaI agency poIIcIes, IoreIgn agreements, and so Iorth.
Step 5: Put Into IIIes, databases, coIIectIons, hoIdIngs, and other storage reposItorIes.
Step 6: CommunIcated, dIssemInated, and dIstrIbuted.
Step 7: Searched Ior and retrIeved (IuII text, abstracts, key words). Step 8: Used Ior decIsIon-
makIng and probIem soIvIng.
Step 9: ArchIved.
Step 10: Re-used over and over agaIn by government oIIIcIaIs, journaIIsts, archIvIsts, researchers, cItIzens,
and others (InIormatIon recycIed).
Step 11: DIsposed oI (temporarIIy or permanentIy).
Step 12: Expunged or destroyed II permanent retentIon perIod exceeded.
Step 13: Need Ior new InIormatIon to repIace oId InIormatIon estabIIshed.

Source: F. Woody Horton. "Covernment nIormatIon LIIe CycIe Management." AppendIx 16 ComprehensIve
Assessment oI PubIIc nIormatIon DIssemInatIon. NatIonaI CommIssIon on LIbrarIes and nIormatIon
ScIence, ]une 2000 - March 2001. SUDOC: Y 3.L 61:2 D 63]V.1-4
2. Stages through whIch InIormatIon passes, typIcaIIy characterIzed as creatIon or coIIectIon,
processIng, dIssemInatIon, use, storage, and dIsposItIon.

Source: OM8. "Management oI FederaI nIormatIon Resources." CIrcuIar A-130. February 1996,
http:]]www.whItehouse.gov]omb]cIrcuIars]a130]a130.htmI
nIormatIon Management nIormatIon Management nIormatIon Management nIormatIon Management
The provIsIon oI reIevant InIormatIon to the rIght person at the rIght tIme In a usabIe Iorm to IacIIItate
sItuatIonaI understandIng and decIsIonmakIng. t uses procedures and InIormatIon systems to coIIect,
process, store, dIspIay, and dIssemInate InIormatIon.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIormatIon OperatIons (O) nIormatIon OperatIons (O) nIormatIon OperatIons (O) nIormatIon OperatIons (O)






209
See See See See Prepackaged News Prepackaged News Prepackaged News Prepackaged News
1. ActIons taken to aIIect adversary InIormatIon and InIormatIon systems whIIe deIendIng one's
own InIormatIon and InIormatIon systems.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp
2. Any actIon InvoIvIng the acquIsItIon, transmIssIon, storage, or transIormatIon oI InIormatIon
that enhances the empIoyment oI mIIItary Iorces.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]
3. (DOD) ActIons taken to aIIect adversary InIormatIon and InIormatIon systems whIIe deIendIng
one's own InIormatIon and InIormatIon systems. (Army) The empIoyment oI the core capabIIItIes oI
eIectronIc warIare, computer network operatIons, psychoIogIcaI operatIons, mIIItary deceptIon, and
operatIons securIty, In concert wIth specIIIed supportIng and reIated capabIIItIes, to aIIect and deIend
InIormatIon and InIormatIon systems and to InIIuence decIsIonmakIng.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

4. The Integrated empIoyment oI eIectronIc warIare (EW), computer network operatIons (CNO),
psychoIogIcaI operatIons (PSYOP), mIIItary deceptIon (MLDEC), and OperatIons SecurIty (OPSEC), In concert
wIth specIIIed supportIng and reIated capabIIItIes, to InIIuence, dIsrupt, corrupt, or usurp adversarIaI
human and automated decIsIon makIng whIIe protectIng our own.

Source: DoD. nIormatIon OperatIons. ]P 3-13, February 13 2006. p. III.
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp313.pdI ; EWA nIormatIon and nIrastructure
TechnoIogIes, nc. (T).http:]]www.ewa-IIt.com]content.aspZsectIonD=2 ; NatIonaI SecurIty ArchIve.
"RumsIeId's Roadmap to Propaganda: nIormatIon OperatIons Roadmap." ]anuary 26, 2006. p.11,
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88177] and CIay WIIson. "nIormatIon OperatIons and
Cyberwar: CapabIIItIes and ReIated PoIIcy ssues." CRS Report to Congress Updated September 14, 2006,
http:]]www.Ias.org]sgp]crs]natsec]RL31787.pdI

nIormatIon OperatIons Roadmap nIormatIon OperatIons Roadmap nIormatIon OperatIons Roadmap nIormatIon OperatIons Roadmap
See See See See Prepackaged News, Propaganda, Prepackaged News, Propaganda, Prepackaged News, Propaganda, Prepackaged News, Propaganda, PsychoIogIcaI OperatIons (PSYOPS), PsychoIogIcaI OperatIons (PSYOPS), PsychoIogIcaI OperatIons (PSYOPS), PsychoIogIcaI OperatIons (PSYOPS), PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy
ObtaIned under the Freedom oI nIormatIon Act by the NatIonaI SecurIty ArchIve at Ceorge WashIngton
UnIversIty and posted on the Web today, the 74-page "nIormatIon OperatIons Roadmap" admIts that
"InIormatIon Intended Ior IoreIgn audIences, IncIudIng pubIIc dIpIomacy and PSYOP, IncreasIngIy Is
consumed by our domestIc audIence and vIce-versa," but argues that "the dIstInctIon between IoreIgn and






210
domestIc audIences becomes more a questIon oI USC [U.S. government] Intent rather than InIormatIon
dIssemInatIon practIces."



Source: NatIonaI SecurIty ArchIve. "RumsIeId's Roadmap to Propaganda: nIormatIon OperatIons Roadmap."
]anuary 26, 2006. http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88177] and
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88177]InIoopsroadmap.pdI

nIormatIon OperatIons Task Force nIormatIon OperatIons Task Force nIormatIon OperatIons Task Force nIormatIon OperatIons Task Force
See See See See nIormatIon OperatIons Roadmap, OIIIce oI StrategIc nIIuence, PubIIc DIpIomacy nIormatIon OperatIons Roadmap, OIIIce oI StrategIc nIIuence, PubIIc DIpIomacy nIormatIon OperatIons Roadmap, OIIIce oI StrategIc nIIuence, PubIIc DIpIomacy nIormatIon OperatIons Roadmap, OIIIce oI StrategIc nIIuence, PubIIc DIpIomacy
Created shortIy aIter September 11, was to Iocus on "deveIopIng, coordInatIng, deconIIIctIng, and
monItorIng the deIIvery oI tImeIy, reIevant, and eIIectIve messages to targeted InternatIonaI audIences."

Source: DanIeI SchuIman. "MInd Cames." CoIumbIa ]ournaIIsm RevIew May-]une 2006,
http:]]www.cjr.org]edItorIaI]mIndgamescjronthemIIItary.php

nIormatIon Owner nIormatIon Owner nIormatIon Owner nIormatIon Owner
An oIIIcIaI wIth statutory or operatIonaI authorIty Ior specIIIed InIormatIon and responsIbIIIty Ior
estabIIshIng the controIs Ior Its generatIon, coIIectIon, processIng, dIssemInatIon, and dIsposaI.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

nIormatIon PeacekeepIng nIormatIon PeacekeepIng nIormatIon PeacekeepIng nIormatIon PeacekeepIng
1. nIormatIon PeacekeepIng Is the actIve expIoItatIon oI InIormatIon and InIormatIon technoIogy-
-In order to modIIy peaceIuIIy the baIance oI power between specIIIc IndIvIduaI and groups--so as to
achIeve natIonaI poIIcy objectIves. The three eIements oI nIormatIon PeacekeepIng, In order oI prIorIty,
are: open-source InteIIIgence (provIdIng useIuI actIonabIe uncIassIIIed InIormatIon); InIormatIon
technoIogy (provIdIng "tooIs Ior truth" that aIIord the recIpIent access to InternatIonaI InIormatIon and the
abIIIty to communIcate wIth others); and eIectronIc securIty and counter-InteIIIgence (a strIctIy deIensIve
aspect oI nIormatIon OperatIons).
AIthough nIormatIon PeacekeepIng Is not to be conIused wIth cIandestIne or covert methods, there are
gray areas. nIormatIon PeacekeepIng may requIre the cIandestIne deIIvery oI cIassIIIed or open source
InteIIIgence, or the covert deIIvery oI "tooIs Ior truth" such as the tradItIonaI radIo broadcast equIpment, or
the more recentIy popuIar ceIIuIar teIephones and IacsImIIe machInes. nIormatIon PeacekeepIng may aIso
requIre covert assIstance In estabIIshIng and practIcIng eIectronIc securIty and counterInteIIIgence In the
Iace oI host country censorshIp or InterIerence.

SentIment akIn to WaIter LIppmann's 1922 Idea posIted In PubIIc OpInIon that InIormatIon and
propaganda are IndecIpherabIe, and IoIIowed up by ]acques EIIuI In hIs varIous works on propaganda.






211
Source: Robert D. SteeIe. "nIormatIon PeacekeepIng: The Purest Form oI War."
http:]]www.Ias.org]Irp]eprInt]cyberwar-chapter.htm
2. A negIected aspect oI InIormatIon operatIons. ConsIsts oI three aspects: open source
InteIIIgence, InIormatIon technoIogy, eIectronIc securIty and counterInteIIIgence.

Source: Robert D. SteeIe. On nteIIIgence: SpIes and Secrecy In an Open WorId. FaIrIax, VA: AFCEA 2000.

nIormatIon PoIIutIon nIormatIon PoIIutIon nIormatIon PoIIutIon nIormatIon PoIIutIon
The dIsguIsIng oI commercIaI message sources as edItorIaI. To address the InIormatIon poIIutIon that may
occur when sIngIe ads are Iormatted to resembIe storIes,

Source: C.T. Cameron and PatrIcIa CurtIn, "TracIng sources oI InIormatIon poIIutIon: A survey and
experImentaI test oI prInt medIa's IabeIIng poIIcy Ior Ieature advertIsIng." ]ournaIIsm and Mass
CommunIcatIon QuarterIy 71 no.1 (1995): 178-189.

nIormatIon ProtectIon nIormatIon ProtectIon nIormatIon ProtectIon nIormatIon ProtectIon
SecurIty oI InIormatIon and command, controI, communIcatIons, and computer (C4) systems InvoIves the
proceduraI and technIcaI protectIon oI InIormatIon and C4 systems major components (termInaI devIces,
transmIssIon medIa, swItches, and controI and management), and Is an IntegraI component oI the joInt
Iorce commander's command and controI protectIon eIIort.

Source: ]oInt ChIeIs oI StaII. ]oInt DoctrIne EncycIopedIa. ]uIy 16, 1997,
http:]]www.dtIc.mII]doctrIne]joIntdoctrIneencycIopedIa.htm

nIormatIon PurIIIcatIon DIrectIves nIormatIon PurIIIcatIon DIrectIves nIormatIon PurIIIcatIon DIrectIves nIormatIon PurIIIcatIon DIrectIves
See Propaganda See Propaganda See Propaganda See Propaganda
"We have created, Ior the IIrst tIme In aII hIstory, a garden oI pure IdeoIogy. Where each worker may bIoom
secure Irom the pests oI contradIctory and conIusIng truths."

Source: AppIe, "1984" MacIntosh commercIaI, http:]]www.urIahcarpenter.InIo]1984.htmI
nIormatIon RequIrements nIormatIon RequIrements nIormatIon RequIrements nIormatIon RequIrements
(DOD, NATO) Those Items oI InIormatIon regardIng the enemy and hIs envIronment whIch need to be
coIIected and processed In order to meet the InteIIIgence requIrements oI a commander. (Army) AII
InIormatIon eIements the commander and staII requIre to successIuIIy conduct operatIons, that Is, aII
eIements necessary to address the Iactors oI METT-TC. [Note: the MarIne Corps uses METT-T].
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents







212
nIormatIon Resources nIormatIon Resources nIormatIon Resources nIormatIon Resources
nIormatIon and reIated resources,such as personneI, equIpment, Iunds, and InIormatIon technoIogy.

Source: "PubIIc PrIntIng and Documents." 44 U.S.C. 3502 (6),
http:]]www.gpoaccess.gov]uscode]browse.htmI

nIormatIon Resources Management (RM) nIormatIon Resources Management (RM) nIormatIon Resources Management (RM) nIormatIon Resources Management (RM)
The pIannIng, budgetIng, organIzIng, dIrectIng, traInIng, controIIIng, and management actIvItIes
assocIated wIth the burden, coIIectIon, creatIon, use, and dIssemInatIon oI InIormatIon by AgencIes. The
term IncIudes the management oI InIormatIon and reIated resources, such as FederaI InIormatIon
processIng resources.

nIormatIon resources management pIannIng Is an IntegraI part oI overaII mIssIon pIannIng. AgencIes need
to pIan Irom the outset Ior the steps In the InIormatIon IIIe cycIe. When creatIng or coIIectIng InIormatIon,
agencIes must pIan how they wIII process and transmIt the InIormatIon, how they wIII use It, how they wIII
protect Its IntegrIty, what provIsIons they wIII make Ior access to It, whether and how they wIII dIssemInate
It, how they wIII store and retrIeve It, and IInaIIy, how the InIormatIon wIII uItImateIy be dIsposed oI.

Source: OM8. "Management oI FederaI nIormatIon Resources." CIrcuIar A-130. February 1996,
http:]]www.whItehouse.gov]omb]cIrcuIars]a130]a130.htmI

nIormatIon RIchness nIormatIon RIchness nIormatIon RIchness nIormatIon RIchness
The rIchness, or quaIIty, oI InIormatIon has eIght attrIbutes that measure Important eIements oI
InIormatIon rIchness and are dIspIayed on a KIvIat dIagram. As dIscussed earIIer, the attrIbutes oI
InIormatIon quaIIty that have been In use Ior decades comprIse the majorIty oI those
IncIuded In FIgure 42, specIIIcaIIy:
nIormatIon compIeteness,
nIormatIon correctness,
nIormatIon currency,
nIormatIon accuracy or precIsIon, and
nIormatIon consIstency.

Source: DavId S. AIberts, et aI, UnderstandIng nIormatIon Age WarIare , DoD CCRP, August 2001, p. 95-
96, http:]]www.dodccrp.org]IIIes]AIbertsUAW.pdI

nIorma nIorma nIorma nIormatIon SecurIty tIon SecurIty tIon SecurIty tIon SecurIty
1. ProtectIon oI unauthorIzed access to or modIIIcatIon oI InIormatIon, whether In storage,
processIng, or transIt, and agaInst the denIaI oI servIce to authorIzed users or the provIsIon oI servIce to
unauthorIzed users, IncIudIng those measures necessary to detect, document, and counter such threats.

Source: U.S. Army FIeId ManuaI 100-6, "nIormatIon OperatIons," 1996,
http:]]www.Ias.org]Irp]doddIr]army]Im100-6]






213

2. ProtectIng InIormatIon and InIormatIon systems Irom unauthorIzed access, use, dIscIosure,
dIsruptIon, modIIIcatIon, or destructIon In order to provIde-

(A) IntegrIty, whIch means guardIng agaInst Improper InIormatIon modIIIcatIon or
destructIon, and IncIudes ensurIng InIormatIon nonrepudIatIon and authentIcIty;(8) conIIdentIaIIty, whIch
means preservIng authorIzed restrIctIons on access and dIscIosure, IncIudIng means Ior protectIng
personaI prIvacy and proprIetary InIormatIon; (C) avaIIabIIIty, whIch means ensurIng tImeIy and reIIabIe
access to and use oI InIormatIon; and (D) authentIcatIon, whIch means utIIIzIng dIgItaI credentIaIs to
assure the IdentIty oI users and vaIIdate theIr access]

Source: "PubIIc PrIntIng and Documents." 44 U.S.C. 35 Subchapter 3532,
http:]]www.gpoaccess.gov]U.S.C.ode]
3. (DOD) The protectIon and deIense oI InIormatIon and InIormatIon systems agaInst
unauthorIzed access or modIIIcatIon oI InIormatIon, whether In storage, processIng, or transIt, and agaInst
the denIaI oI servIce to authorIzed users. nIormatIon securIty IncIudes those measures necessary to
detect, document, and counter such threats. nIormatIon securIty Is composed oI computer securIty and
communIcatIons securIty.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce nIormatIon SecurIty OversIght OIIIce
An agency wIthIn the NatIonaI ArchIves and Records AdmInIstratIon (NARA), the nIormatIon SecurIty
OversIght OIIIce (SOO), whIch deveIops securIty cIassIIIcatIon poIIcIes (IncIudIng cIassIIyIng,
decIassIIyIng and saIeguardIng natIonaI securIty InIormatIon Ior InIormatIon generated wIthIn the IederaI
government and Industry, IncIudIng the NatIonaI ndustrIaI SecurIty Program (NSP) ; SOO receIves Its
poIIcy and program guIdance Irom the NatIonaI SecurIty CouncII. SOO evaIuates the eIIectIveness oI the
securIty cIassIIIcatIon programs estabIIshed by government and Industry to protect InIormatIon vItaI to
"natIonaI securIty Interests. " SOO authorIty rests wIth ExecutIve Orders 12958 "CIassIIIed NatIonaI
SecurIty nIormatIon" [PDF] and 12829 "NatIonaI ndustrIaI SecurIty Program" [PDF], as amended.

Source: SOO, http:]]www.archIves.gov]Isoo]about] and SOO AnnuaI Reports to the PresIdent
http:]]www.archIves.gov]Isoo]reports]

nIormatIon SharIng nIormatIon SharIng nIormatIon SharIng nIormatIon SharIng
The term InIormatIon "sharIng" suggests that the IederaI government entIty that coIIects the InIormatIon
"owns" It and can decIde whether or not to "share" It wIth others. ThIs concept Is deepIy embedded In the
nteIIIgence CommunIty's cuIture. We reject It.







214
nIormatIon coIIected by the nteIIIgence CommunIty--or Ior that matter, any government agency--
beIongs to the U.S. government. OIIIcIaIs are IIducIarIes who hoId the InIormatIon In trust Ior the natIon.
They do not have authorIty to wIthhoId or dIstrIbute It except as such authorIty Is deIegated by the
PresIdent or provIded by Iaw. As we have noted eIsewhere, we thInk that the DIrector oI NatIonaI
nteIIIgence couId take an Important, symboIIc IIrst step toward changIng the nteIIIgence CommunIty's
cuIture by jettIsonIng the term "InIormatIon sharIng" ItseII--perhaps In Iavor oI the term "InIormatIon
IntegratIon" or "InIormatIon access."

Source: CommIssIon on the nteIIIgence CapabIIItIes oI the UnIted States RegardIng Weapons oI Mass
DestructIon ("SIIberman-Robb CommIssIon"). March 31, 2005,
http:]]www.gpoaccess.gov]wmd]Index.htmI

nIormatIon SharIng and AnaIy nIormatIon SharIng and AnaIy nIormatIon SharIng and AnaIy nIormatIon SharIng and AnaIysIs OrganIzatIon (SAO sIs OrganIzatIon (SAO sIs OrganIzatIon (SAO sIs OrganIzatIon (SAO) ) ) )
Any IormaI or InIormaI entIty or coIIaboratIon created or empIoyed by pubIIc or prIvate sector
organIzatIons Ior purposes oI:
(1) CatherIng and anaIyzIng C In order to better understand securIty probIems and InterdependencIes
reIated to crItIcaI InIrastructure and protected systems In order to ensure the avaIIabIIIty, IntegrIty, and
reIIabIIIty thereoI; (2) CommunIcatIng or sharIng C to heIp prevent, detect, mItIgate, or recover Irom the
eIIects oI an InterIerence, compromIse, or IncapacItatIon probIem reIated to crItIcaI InIrastructure or
protected systems; and (3) VoIuntarIIy dIssemInatIng C to Its members, FederaI, State, and IocaI
governments, or to any other entItIes that may be oI assIstance In carryIng out the purposes specIIIed In
thIs sectIon.

Source: Department oI HomeIand SecurIty. "Protected CrItIcaI nIrastructure nIormatIon." 6 CFR 29.2,
http:]]www.gpoaccess.gov]cIr]Index.htmI

nIormatIon SharIng CouncII nIormatIon SharIng CouncII nIormatIon SharIng CouncII nIormatIon SharIng CouncII
See See See See nIormatIon SharIng EnvIronment nIormatIon SharIng EnvIronment nIormatIon SharIng EnvIronment nIormatIon SharIng EnvIronment
The nIormatIon SharIng CouncII shaII serve durIng the two-year perIod begInnIng on the date oI the InItIaI
desIgnatIon oI the program manager by the PresIdent under subsectIon (I)(1), unIess sooner removed Irom
servIce and repIaced by the PresIdent (at the soIe dIscretIon oI the PresIdent) wIth a successor body.

(2) SPECFC DUTES- n assIstIng the PresIdent and the program manager In theIr dutIes under thIs
sectIon, the nIormatIon SharIng CouncII shaII-

(A) advIse the PresIdent and the program manager In deveIopIng poIIcIes, procedures, guIdeIInes,
roIes, and standards necessary to estabIIsh, ImpIement, and maIntaIn the SE; (8) work to ensure
coordInatIon among the FederaI departments and agencIes partIcIpatIng In the SE In the
estabIIshment, ImpIementatIon, and maIntenance oI the SE; (C) IdentIIy and, as approprIate,
recommend the consoIIdatIon and eIImInatIon oI current programs, systems, and processes used
by FederaI departments and agencIes to share InIormatIon, and recommend, as approprIate, the
redIrectIon oI exIstIng resources to support the SE; (D) IdentIIy gaps, II any, between exIstIng






215
technoIogIes, programs and systems used by FederaI departments and agencIes to share
InIormatIon and the parameters oI the proposed InIormatIon sharIng envIronment; (E) recommend
soIutIons to address any gaps IdentIIIed under subparagraph (D); (F) recommend means by whIch
the SE can be extended to aIIow Interchange oI InIormatIon between FederaI departments and
agencIes and approprIate authorItIes oI State and IocaI governments; and (C) recommend whether
or not, and by whIch means, the SE shouId be expanded so as to aIIow Iuture expansIon
encompassIng other reIevant categorIes oI InIormatIon.

Source: nteIIIgence ReIorm and TerrorIsm PreventIon Act oI 2004 (RTPA), Pub. L. No. 108-458, 118 Stat.
3638, http:]]thomas.Ioc.gov]cgI-bIn]query]DZc108:4:.]temp]~c108LC8Vk::

nIormatIon SharIng EnvIronment (SE) nIormatIon SharIng EnvIronment (SE) nIormatIon SharIng EnvIronment (SE) nIormatIon SharIng EnvIronment (SE)
See See See See SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed SensItIve 8ut UncIassIIIed
1. The terms `InIormatIon sharIng envIronment' and `SE' mean an approach that IacIIItates the
sharIng oI terrorIsm InIormatIon, whIch approach may IncIude any methods determIned necessary and
approprIate Ior carryIng out thIs sectIon.

Source: nteIIIgence ReIorm and TerrorIsm PreventIon Act oI 2004 (RTPA), Pub. L. No. 108-458, 118 Stat.
3638, http:]]thomas.Ioc.gov]cgI-bIn]query]DZc108:4:.]temp]~c108LC8Vk::
2. nIormatIon SharIng CuIdeIInes. ConsIstent wIth sectIon 1016(d) oI RTPA, hereby Issue the
IoIIowIng guIdeIInes and reIated requIrements, the ImpIementatIon oI whIch shaII be conducted In
consuItatIon wIth, and wIth support Irom, the PM as dIrected by the DN:
a. CuIdeIIne 1 - DeIIne Common Standards Ior How nIormatIon Is AcquIred, Accessed, Shared,
and Used WIthIn the SE; b. CuIdeIIne 2 - DeveIop a Common Framework Ior the SharIng oI
nIormatIon 8etween and Among ExecutIve Departments and AgencIes and State, LocaI, and TrIbaI
Covernments, Law EnIorcement AgencIes, and the PrIvate Sector; c. CuIdeIIne 3 - StandardIze
Procedures Ior SensItIve 8ut UncIassIIIed nIormatIon
3. PromotIng a CuIture oI nIormatIon SharIng. Heads oI executIve departments and agencIes
must actIveIy work to create a cuIture oI InIormatIon sharIng wIthIn theIr respectIve departments or
agencIes by assIgnIng personneI and dedIcatIng resources to terrorIsm InIormatIon sharIng, by reducIng
dIsIncentIves to such sharIng, and by hoIdIng theIr senIor managers and oIIIcIaIs accountabIe Ior Improved
and Increased sharIng oI such InIormatIon.

Source: WhItehouse Press ReIease. "CuIdeIInes and RequIrements In Support oI the nIormatIon SharIng
EnvIronment." December 16, 2005, http:]]www.Ias.org]sgp]news]2005]12]wh121605-memo.htmI
and Thomas E. McNamara, "8uIIdIng on the nIormatIon SharIng EnvIronment: AddressIng ChaIIenges oI
mpIementatIon" 8eIore the SubcommIttee on nteIIIgence, nIormatIon SharIng, and TerrorIsm RIsk
Assessment House CommIttee on HomeIand SecurIty May 10, 2006,






216
http:]]www.Ias.org]Irp]congress]2006hr]051006mcnamara.pdI

3. CreatIng the SE Is not about buIIdIng a massIve new InIormatIon system. The SE aIIgns and
Ieverages exIstIng InIormatIon sharIng poIIcIes, busIness processes, technoIogIes, systems, and promotes
a cuIture oI InIormatIon sharIng through Increased coIIaboratIon.

CuIdeIIne One: The PresIdent dIrected that common standards be deveIoped "to maxImIze the acquIsItIon,
access, retentIon, productIon, use, management, and sharIng oI terrorIsm InIormatIon wIthIn the SE,
consIstent wIth the protectIon oI InteIIIgence, Iaw enIorcement, protectIve, and mIIItary sources, methods,
and actIvItIes." These common standards, the PresIdent Iurther dIrected, must accommodate and account
Ior the need to Improve upon the sharIng oI terrorIsm-reIated InIormatIon wIth State, IocaI, and trIbaI
governments and the prIvate sector.

Source: SE, http:]]www.Ise.gov]pages]vIsIon.htmI and http:]]www.Ise.gov]pages]background.htmI

nIormatIon SIIo AIIect nIormatIon SIIo AIIect nIormatIon SIIo AIIect nIormatIon SIIo AIIect
nIormatIon "sIIo aIIect," by whIch agencIes across the IederaI and state IeveIs IaII to share InIormatIon
wIth each other. The 9]11 CommIssIon cIted sIIo eIIect as a contrIbutIng Iactor to the IaIIure oI U.S.
InteIIIgence and Iaw enIorcement agencIes to track down the terrorIsts InvoIved In the 9]11 attacks.

Source: OM8Watch "nteIIIgence AgencIes Co WIkI," November 7, 2006,
http:]]www.ombwatch.org]artIcIe]artIcIevIew]3634]1]1ZTopIcD=1

nIormatIon SuperIorIty nIormatIon SuperIorIty nIormatIon SuperIorIty nIormatIon SuperIorIty
1. CapabIIIty to coIIect, process, and dIssemInate an unInterrupted IIow oI InIormatIon whIIe
expIoItIng or denyIng an adversary's abIIIty to do the same. (DoD DIrectIve DoD 5000.2)

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp
2. (DOD) That degree oI domInance In the InIormatIon domaIn whIch permIts the conduct oI
operatIons wIthout eIIectIve opposItIon. (Army) The operatIonaI advantage derIved Irom the abIIIty to
coIIect, process, and dIssemInate an unInterrupted IIow oI InIormatIon whIIe expIoItIng or denyIng an
adversary's abIIIty to do the same. AIso caIIed S.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

3. That degree oI domInance In the InIormatIon domaIn whIch permIts the conduct oI operatIons
wIthout eIIectIve opposItIon. (]P 1-02). The AIr Force
preIers to cast `superIorIty' as a state oI reIatIve advantage, not a capabIIIty, and vIews






217
InIormatIon superIorIty as: [The degree oI domInance In the InIormatIon domaIn whIch
aIIows IrIendIy Iorces the abIIIty to coIIect, controI, expIoIt, and deIend InIormatIon
wIthout eIIectIve opposItIon.] (AFDD 2-5) taIIcIzed deIInItIon In brackets appIIes onIy
to the AIr Force and Is oIIered Ior cIarIty.

Source: U.S. AIr Force. PubIIc AIIaIrs OperatIons. AIr Force DoctrIne Document 2-5.3, ]une 24, 2005,
[See the Wayback MachIne, http:]]web.archIve.org]web]20061007174450]http:]]www.e-
pubIIshIng.aI.mII]pubIIIes]aI]dd]aIdd2-5.3]aIdd2-5.3.pdI ]

nIormatIon System (S nIormatIon System (S nIormatIon System (S nIormatIon System (S) ) ) )


1. A dIscrete set oI InIormatIon resources (e.g., personneI, data, soItware, computers, and
communIcatIons equIpment) organIzed Ior the coIIectIon, processIng, maIntenance, use, sharIng,
dIssemInatIon or dIsposItIon oI InIormatIon.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp

2. (Army) The equIpment and IacIIItIes that coIIect, process, store, dIspIay, and dIssemInate
InIormatIon. ThIs IncIudes computers-hardware and soItware-and communIcatIons, as weII as poIIcIes
and procedures Ior theIr use.

Source: Department oI the Army, "KnowIedge Management SectIon," U.S. Army FIeId ManuaI 6-01.1,
August 29, 2008, http:]]www.Ias.org]Irp]doddIr]army]Im6-01-1.pdI

3. A dIscrete set oI InIormatIon resources organIzed Ior the coIIectIon, processIng, maIntenance,
use, sharIng, dIssemInatIon, or dIsposItIon oI InIormatIon.

Source: "PubIIc PrIntIng and Documents." 44 U.S.C. 3502 (8),
http:]]www.gpoaccess.gov]uscode]browse.htmI
4. The entIre InIrastructure, organIzatIon, personneI, and components that coIIect, process, store,
transmIt, dIspIay, dIssemInate, and act on InIormatIon. (Army) The equIpment and IacIIItIes that coIIect,

A IIst oI DoD and InteIIIgence InIormatIon systems can be Iound at FederatIon oI AmerIcan ScIentIsts,
http:]]www.Ias.org]Irp]program]IIst.htm http:]]www.Ias.org]Irp]program]IIst.htm http:]]www.Ias.org]Irp]program]IIst.htm http:]]www.Ias.org]Irp]program]IIst.htm; aIso see WIIIIam ArkIn's "NSA's MuItI-8IIIIon
DoIIar Data MInIng EIIort." WashIngton Post May 12, 2006,
http:]]bIog.washIngtonpost.com]earIywarnIng]2006]05]nsasmuItIbIIIIo http:]]bIog.washIngtonpost.com]earIywarnIng]2006]05]nsasmuItIbIIIIo http:]]bIog.washIngtonpost.com]earIywarnIng]2006]05]nsasmuItIbIIIIo http:]]bIog.washIngtonpost.com]earIywarnIng]2006]05]nsasmuItIbIIIIo
ndoIIardata.htmI ndoIIardata.htmI ndoIIardata.htmI ndoIIardata.htmI








218
process, store, dIspIay, and dIssemInate InIormatIon. ThIs IncIudes computers-hardware and
soItware-and communIcatIons, as weII as poIIcIes and procedures Ior theIr use. AIso caIIed NFOSYS.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

nIormatIon TechnoIogy Agreement nIormatIon TechnoIogy Agreement nIormatIon TechnoIogy Agreement nIormatIon TechnoIogy Agreement (TA) (TA) (TA) (TA)
A WTO agreement to eIImInate tarIIIs on a wIde range oI InIormatIon technoIogy products. The
nIormatIon TechnoIogy Agreement was concIuded at the IIrst mInIsterIaI conIerence oI the WorId Trade
OrganIzatIon at SIngapore In December 1996. TA product coverage IncIudes computers and computer
equIpment, semIconductors and Integrated cIrcuIts, computer soItware products, teIecommunIcatIons
equIpment, semIconductor manuIacturIng equIpment, and computer-based anaIytIcaI Instruments. TA
partIcIpants were to eIImInate tarIIIs on these products by the year 2000, recognIzIng that extended
stagIng mIght be granted In IImIted cIrcumstances.

Source: MerrItt R. 8IakesIee and CarIos A. CarcIa, The Language oI Trade 3
rd
edItIon, 2001
Department oI State, nternatIonaI nIormatIon Programs,
http:]]www.4uth.gov.ua]usa]engIIsh]trade]Ianguage]Index.htm

nIormatIon WarIare (W) nIormatIon WarIare (W) nIormatIon WarIare (W) nIormatIon WarIare (W)
See Cyberwar, DeIensIve nIormatIon WarIare, See Cyberwar, DeIensIve nIormatIon WarIare, See Cyberwar, DeIensIve nIormatIon WarIare, See Cyberwar, DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, Netwar, StrategIc nIormatIon Netwar, StrategIc nIormatIon Netwar, StrategIc nIormatIon Netwar, StrategIc nIormatIon
WarIare WarIare WarIare WarIare
1. SImpIy the use oI InIormatIon to achIeve our natIonaI objectIves.

Source: Ceorge ]. SteIn. "nIormatIon WarIare." [See the Wayback MachIne,
http:]]web.archIve.org]web]20070311222533]http:]]www.aIrpower.maxweII.aI.mII]aIrchronIcIes]apj]ste
In.htmI ]
2. Cone are the terms InIormatIon-In-warIare and InIormatIon warIare as they reIate to the pIIIars
oI O. RepIacIng them are three dIstInct groups oI capabIIItIes that Iorm the IoundatIon oI the new
doctrInaI deIInItIon oI O and, when IInked, can achIeve operatIonaIIy sIgnIIIcant eIIects: "nIormatIon
operatIons . . . are the Integrated empIoyment oI the capabIIItIes oI InIIuence operatIons, eIectronIc
warIare [EW] operatIons, and network warIare operatIons, In concert wIth specIIIed Integrated controI
enabIers, to InIIuence, dIsrupt, corrupt, or usurp adversarIaI human and automated decIsIon makIng whIIe
protectIng our own.

Source: Capt Randy MIze, USAF "RevIsed AIr Force DoctrIne Document 2-5, nIormatIon OperatIons." [See
the Wayback MachIne,
http:]]web.archIve.org]web]20060617215224]http:]]www.aIrpower.maxweII.aI.mII]aIrchronIcIes]apj]apj
05]sum05]notam1.htmI ]







219
3. ActIons taken to achIeve InIormatIon superIorIty by aIIectIng adversary InIormatIon,
InIormatIon-based processes, InIormatIon systems, and computer-based networks whIIe deIendIng one's
own InIormatIon, InIormatIon based processes, InIormatIon systems, and computer-based networks.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003. http:]]www.dau.mII]pubs]CIossary]preIace.asp; AIso see: "What Is nIormatIon WarIareZ" NatIonaI
DeIense UnIversIty ACS Paper 3, August 1995.
http:]]stInet.dtIc.mII]cgIbIn]CetTRDocZAD=ADA367662&LocatIon=U2&doc=CetTRDoc.pdI
4. Any actIon to deny, expIoIt, corrupt, or destroy the enemy's InIormatIon and Its IunctIons;
protectIng ourseIves agaInst those actIons; and expIoItIng our own mIIItary InIormatIon IunctIons.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[See the Wayback MachIne,
http:]]web.archIve.org]web]20040901091302]http:]]www.aI.mII]IIb]corner.htmI] ]] ]

5. nIormatIon operatIons conducted durIng tIme oI crIsIs or conIIIct to achIeve or promote
specIIIc objectIves over a specIIIc adversary or adversarIes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary] term removed Irom ]oInt DoctrIne; see DoD.
nIormatIon OperatIons. ]P 3-13, February 13 2006. p. III,
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp313.pdI

6. Any dIscussIon oI InIormatIon warIare, netwar, cyberwar, or even perceptIon manIpuIatIon as a
component oI command and controI warIare by the armed Iorces oI the UnIted States at the strategIc IeveI
must occur In the context oI the moraI nature oI communIcatIon In a pIuraIIstIc, secuIar, democratIc
socIety. That Is, the questIon must be raIsed whether usIng the technIques oI InIormatIon warIare at the
strategIc IeveI Is compatIbIe wIth AmerIcan purposes and prIncIpIes.

Source: Ceorge SteIn. "nIormatIon War - Cyberwar - Netwar." 8attIeIIeId oI the Future: 21st Century
WarIare ssues." AIr and Space Power ChronIcIe [See the Wayback MachIne,
http:]]web.archIve.org]web]20071110080055]http:]]www.aIrpower.maxweII.aI.mII]aIrchronIcIes]battIe]
chp6.htmI ]
7. n the IIeId oI InIormatIon warIare, everythIng Is, then hypothetIcaI; and just as InIormatIon and
dIsInIormatIon have become IndIstInguIshabIe Irom each other, so have attacks and mere accIdents.And
yet the message here Is not scrambIed, as was stIII the case wIth the counter-measures In eIectronIc
warIare; It has become cybernetIc. That Is to say, the 'InIormatIon' Is not so much the expIIcIt content as
the rapIdIty oI Its Ieedback.

Source: PauI VIrIIIo. The nIormatIon 8omb. Trans., ChrIs Turner. New York: Verso, 2000. 142-143.






220

8. nIormatIon warIare (W) - aIso known as 'InIowar' - Is a term used to descrIbe any range oI
attempts by one sIde In a conIIIct to deny or dIsrupt an enemy's InIormatIon and InIormatIon systems,
whIIe preventIng adversarIes Irom doIng the same to the InIormatIon and InIormatIon systems oI IrIendIy
Iorces. W Is a centraI component oI the much broader RevoIutIon In MIIItary AIIaIrs (RMA) currentIy
transIormIng the US mIIItary, and Is cIoseIy assocIated wIth reIated concepts such as: cyberwar, netwar,
command and controI warIare (C2W), InIormatIon operatIons (O); as weII as oIder stapIes oI US
InIormatIon strategy such as pubIIc dIpIomacy, psychoIogIcaI operatIons (PYSOPS), sIgnaIs InteIIIgence
(SCNT), and eIectronIc warIare (EW).

Source: KonstantIn KIIIbarda, "DeIInIng nIormatIon WarIare (W)" nIormatIon WarIare MonItor,
http:]]tInyurI.com]npvry7

nIormatIon WarrIor nIormatIon WarrIor nIormatIon WarrIor nIormatIon WarrIor
See nIormatIon FusIon, nIormatIon CrId, nIormatIon WarIare See nIormatIon FusIon, nIormatIon CrId, nIormatIon WarIare See nIormatIon FusIon, nIormatIon CrId, nIormatIon WarIare See nIormatIon FusIon, nIormatIon CrId, nIormatIon WarIare
A new breed oI soIdIer caIIed an InIormatIon warrIor be created wIthIn the mIIItary. ThIs soIdIer wouId be a
part oI an nIormatIon Corps that wouId "promote joIntness where It Is crItIcaIIy needed (InIormatIon
InteroperabIIIty), eIevate InIormatIon as an eIement oI war, deveIop an InIormatIon warrIor ethos and
currIcuIum, and heIghten DOD attentIon to the gIobaI cIvIIIan net" (LIbIckI 1994). MartIn C. LIbIckI (1995)
wrItes "thIs brave new soIdIer wouId not onIy be sent Into the InIormatIon battIeIIeId, but wouId aIso be
InvoIved In InteIIIgence-based warIare (whIch consIsts oI the desIgn, protectIon, and denIaI oI systems
that seek suIIIcIent knowIedge to domInate the battIespace."

Source: MartIn LIbIckI, "The Mesh and the Net: SpecuIatIons on Armed ConIIIct In an Age oI Free SIIIcon."
NatIonaI DeIense UnIversIty, March 1994. [See the Wayback MachIne,
http:]]web.archIve.org]web]20020203103852]http:]]www.ndu.edu]ndu]Inss]macnaIr]mcnaIr28]m028c
ont.htmI ] ] and "What Is nIormatIon WarIareZ" NatIonaI DeIense UnIversIty ACS Paper 3, August 1995,
http:]]stInet.dtIc.mII]cgI-bIn]CetTRDocZAD=ADA367662&LocatIon=U2&doc=CetTRDoc.pdI

nIormatIonaI n nIormatIonaI n nIormatIonaI n nIormatIonaI n- -- -8reedIng 8reedIng 8reedIng 8reedIng
See nIormatI See nIormatI See nIormatI See nIormatIon 8ureaucratIzatIon on 8ureaucratIzatIon on 8ureaucratIzatIon on 8ureaucratIzatIon
nIormatIon secrecy programs, IncIudIng those ImpIemented by the Department oI DeIense (DOD), the
Department oI Energy (DOE), and other IederaI and state agencIes wIth cIassIIIed natIonaI securIty
responsIbIIItIes, create InsuIar "IsIand-IIke" socIetIes. A sea oI requIrements, IncIudIng securIty cIearances
1 and "need to know" 2 restrIctIons, IsoIate peopIe outsIde the "secret IsIand." PeopIe wIth cIassIIIed
InIormatIon can dIscuss such InIormatIon onIy wIth persons on theIr IsIand--those wIth sImIIar securIty
cIearances. 3 ThIs phenomenon creates InIormatIonaI In-breedIng, as InIormatIon can be shared onIy wIth
the other persons who possess proper securIty cIearances and who have been deemed to have a "need to
know." 8ecause oI the manner In whIch bureaucracIes award cIearances, IndIvIduaIs seIected Ior these
programs tend to have predomInantIy the same background, Interests, and vaIues.







221
Source: Laurent R. HourcIe. "MIIItary Secrecy and EnvIronmentaI CompIIance." New York UnIversIty Law
]ournaI 2 no. 2 (1993), http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI

nIormed CompIIanc nIormed CompIIanc nIormed CompIIanc nIormed CompIIance ee e
The concepts oI "InIormed compIIance" and "shared responsIbIIIty" were Introduced Into the TarIII Act oI
1930, and the TItIe V oI the North AmerIcan Free Trade Agreement mpIementatIon Act (NAFTA). Under
SectIon 484 oI the TarIII Act, as amended, 19 U.S.C. SectIon 1484, It Is up to the Importer oI record to
ensure "reasonabIe care to enter, cIassIIy and vaIue Imported merchandIse, and provIde any other
InIormatIon necessary to enabIe Customs to properIy assess dutIes, coIIect accurate statIstIcs and
determIne whether any other appIIcabIe IegaI requIrement Is met."

Source: "Entry oI MerchandIse." 19 U.S.C. SectIon 1484, http:]]www.gpoaccess.gov]uscode]browse.htmI

n n n nIormed Consent Iormed Consent Iormed Consent Iormed Consent
1. 8asIc eIements oI InIormed consent. n seekIng InIormed consent, the IoIIowIng InIormatIon
shaII be provIded to each subject:
(1) A statement that the study InvoIves research, an expIanatIon oI the purposes oI the research and the
expected duratIon oI the subject's partIcIpatIon, a descrIptIon oI the procedures to be IoIIowed, and
IdentIIIcatIon oI any procedures whIch are experImentaI; (2) A descrIptIon oI any reasonabIy IoreseeabIe
rIsks or dIscomIorts to the subject. [contInues]

Source: "ProtectIon oI Human Subjects." 21 CFR 50.2, http:]]www.gpoaccess.gov]cIr]Index.htmI
2. .In hIs AprII 30 Ietter to StaIIord Warren, [CarroII] WIIson announced that the AEC had
approved Warren's commIttee's recommendatIons Ior a "program Ior obtaInIng medIcaI data oI Interest to
the CommIssIon In the course oI treatment oI patIents, whIch may InvoIve cIInIcaI testIng." WIIson's Ietter
speIIed out ground ruIes that were agreed upon. The commIssIon understood that "treatment (whIch may
InvoIve cIInIcaI testIng) wIII be admInIstered to a patIent onIy when there Is expectatIon that It may have
therapeutIc eIIect." n addItIon, the commIssIon adopted the requIrement Ior documentatIon oI consent
agreed upon In Warren's meetIng wIth the Iawyers:
[]t shouId be susceptIbIe oI prooI Irom oIIIcIaI records that, prIor to treatment, each IndIvIduaI
patIent, beIng In an understandIng state oI mInd, was cIearIy InIormed oI the nature oI the
treatment and Its possIbIe eIIects, and expressed hIs wIIIIngness to receIve the treatment.
The commIssIon deIerred to Warren's request that wrItten reIeases Irom the patIent not be requIred.
However,
It does request that In every case at Ieast two doctors shouId certIIy In wrItIng (made part oI an
oIIIcIaI record) to the patIent's understandIng state oI mInd, to the expIanatIon IurnIshed hIm, and
to hIs wIIIIngness to accept the treatment.[11]






222
Source: Department oI Energy Openness Project. AdvIsory CommIttee on Human RadIatIon
ExperIments. (WIIson's use oI InIormed (consent) Is one oI the earIIest uses oI the term),
http:]]www.eh.doe.gov]ohre]roadmap]achre]chap12.htmI
3. Respect Ior persons requIres that subjects, to the degree that they are capabIe, be gIven the
opportunIty to choose what shaII or shaII not happen to them. ThIs opportunIty Is provIded when adequate
standards Ior InIormed consent are satIsIIed. WhIIe the Importance oI InIormed consent Is unquestIoned,
controversy prevaIIs over the nature and possIbIIIty oI an InIormed consent. NonetheIess, there Is
wIdespread agreement that the consent process can be anaIyzed as contaInIng three eIements:
InIormatIon, comprehensIon and voIuntarIness.
nIormatIon. Most codes oI research estabIIsh specIIIc Items Ior dIscIosure Intended to assure that
subjects are gIven suIIIcIent InIormatIon. These Items generaIIy IncIude: the research procedure, theIr
purposes, rIsks and antIcIpated beneIIts, aIternatIve procedures (where therapy Is InvoIved), and a
statement oIIerIng the subject the opportunIty to ask questIons and to wIthdraw at any tIme Irom the
research. AddItIonaI Items have been proposed, IncIudIng how subjects are seIected, the person
responsIbIe Ior the research, etc.
Source: The NatIonaI CommIssIon Ior the ProtectIon OI Human Subjects oI 8IomedIcaI and 8ehavIoraI
Research. "EthIcaI PrIncIpIes and CuIdeIInes Ior the ProtectIon oI Human Subjects oI Research." ("8eImont
Report"), AprII 18, 1979, http:]]www.Ida.gov]oc]ohrt]R8S]beImont.htmI
nIosphere nIosphere nIosphere nIosphere
The nIosphere Is cyberspace ("gIobaI systems oI Internetted computers, communIcatIons InIrastructure,
onIIne conIerencIng entItIes, databases and InIormatIon utIIItIes generaIIy known as the Net"), and a "IIIth
dImensIon" oI war whIch have been tradItIonaIIy Iought on Iand, aIr, sea. Space controI oI the InIosphere
Is deIIned as the abIIIty to use the InIosphere Ior the Iurtherance oI strategIc objectIves and the abIIIty oI
the enemy Irom doIng the same.

Source: ]ohn ArquIIIa, and DavId RonIeIdt. The Emergence oI NoopoIItIk: Toward an AmerIcan nIormatIon
Strategy. Santa MonIca, CA: Rand, 1999, http:]]www.rand.org]pubIIcatIons]MR]MR1033]

nIragard nIragard nIragard nIragard
See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon
An InIormatIon sharIng and anaIysIs eIIort servIng the Interests and combInIng the knowIedge base oI a
wIde range oI members. At Its most basIc IeveI, nIraCard Is a partnershIp between the FederaI 8ureau oI
nvestIgatIon and the prIvate sector. nIraCard Is an assocIatIon oI busInesses, academIc InstItutIons, state
and IocaI Iaw enIorcement agencIes, and other partIcIpants dedIcated to sharIng InIormatIon and
InteIIIgence to prevent hostIIe acts agaInst the UnIted States. nIraCard Chapters are geographIcaIIy IInked
wIth F8 FIeId OIIIce terrItorIes.







223
Source: nIragard, http:]]www.InIragard.net], Matthew RothschIId's "The F8 DeputIzes 8usIness,"
March 2008, http:]]www.progressIve.org]magrothschIId0308 (ThIs story Is #3 on the 2009 Project
Censored IIst), and Matthew RothschIId, "WIII NorthCom take over In SwIne FIu OutbreakZ" The ProgressIve
AprII 29, 2009, http:]]www.progressIve.org]wx042909.htmI

Each F8 FIeId OIIIce has a SpecIaI Agent CoordInator who gathers Interested IndIvIduaIs to Iorm a chapter.
Any IndIvIduaI can joIn nIraCard. LocaI executIve boards govern and share InIormatIon wIthIn the
membershIp. Chapters hoId reguIar meetIngs to dIscuss Issues, threats and other matters that Impact
theIr companIes. Speakers Irom pubIIc and prIvate agencIes and the Iaw enIorcement communItIes are
InvIted. The IoIIowIng IIIustrates addItIonaI actIvItIes that IocaI chapters may oIIer.

The nIraCard secure websIte provIdes members wIth InIormatIon about recent IntrusIons, research reIated
to crItIcaI InIrastructure protectIon, and the capabIIIty to communIcate secureIy wIth other members.

MembershIp 8eneIIts:
o F8 certIIIed and accredIted system
o Access to sensItIve but uncIassIIIed InIormatIon
o VaIuabIe networkIng opportunItIes
o Secure communIcatIon

Source: nIragard, "About," http:]]www.InIragard.net]about.phpZmn=1&sm=1-0

n n n n- -- -Q QQ Q- -- -TeI TeI TeI TeI
Chartered In 1999 as a prIvate, Independent, nonproIIt corporatIon, n-Q-TeI Is an evoIvIng bIend oI
corporate strategIc venture capItaI, busIness, nonproIIt and government R&D modeIs. To achIeve Its
mIssIon oI IdentIIyIng and deIIverIng new technoIogIes to the CA and nteIIIgence CommunIty (C), n-Q-
TeI borrows key eIements Irom each modeI that enabIe It to IInk the C to InnovatIon In the commercIaI
market, and back agaIn.

Source: n-Q-TeI. "About QT," http:]]www.Iqt.org]about-Iqt]hIstory.htmI and
https:]]www.cIa.gov]IIbrary]pubIIcatIons]addItIonaI-pubIIcatIons]In-q-teI]Index.htmI ; aIso see MeIIssa
8oyIe MahIe. DenIaI and DeceptIon: an nsIder's VIew oI the CA Irom ran-Contra to 9]11. New York:
NatIon 8ooks. 267-268.

nsIght Smart DIscovery nsIght Smart DIscovery nsIght Smart DIscovery nsIght Smart DIscovery
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
DeIense nteIIIgence Agency; WIII be a data mInIng knowIedge dIscovery tooI to work
agaInst unstructured text. WIII categorIze nouns (names, IocatIons, events) and present InIormatIon In
Images;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: PIanned;
Features: PersonaI InIormatIon: Yes;






224
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI and ]. NIchoIas Hoover. "Can Data MInIng Catch
TerrorIstsZ" nIormatIon Week May 22, 2006,
http:]]www.InIormatIonweek.com]securIty]showArtIcIe.jhtmIZartIcIeD=188100750

nspectabIe Space nspectabIe Space nspectabIe Space nspectabIe Space
See See See See TEMPEST TEMPEST TEMPEST TEMPEST
Three dImensIonaI space surroundIng equIpment that process cIassIIIed and]or sensItIve InIormatIon
wIthIn whIch TEMPEST expIoItatIon Is not consIdered practIcaI or where IegaI authorIty to IdentIIy and]or
remove a potentIaI TEMPEST expIoItatIon exIsts.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

nstItutIonaI ControIs nstItutIonaI ControIs nstItutIonaI ControIs nstItutIonaI ControIs (C) (C) (C) (C)
1. A non-engIneered admInIstratIve or IegaI controIs that IImIt Iand or resource use and]or
protect the IntegrIty oI a remedy. access or use oI property. There are Iour categorIes oI Cs:
governmentaI controIs, proprIetary controIs, enIorcement and permIt tooIs wIth C components, and
InIormatIonaI devIces.

nIormatIonaI devIces IncIude: deed notIces, hazardous waste sIte regIstrIes, advIsorIes, and pubIIc
educatIon actIvItIes. Weaknesses: Do not restrIct Iand [exposure] In any way.

Source: EnvIronmentaI ProtectIon Agency. RCRA NatIonaI MeetIng. "What Are nstItutIonaI ControIsZ"
]anuary 16, 2002, , , , http:]]www.epa.gov]superIund]poIIcy]Ic]guIde]cItguIde.pdI

2. Under DOE P 454.1 "InstItutIonaI controIs" may IncIude admInIstratIve or IegaI controIs, physIcaI
barrIers or markers, and methods to preserve InIormatIon and data and InIorm current and Iuture
generatIons oI hazards and rIsks.
Source: Department oI Energy. nstItutIonaI ControIs: mpIementatIon CuIde. DOE C 454.1-1 10-14-05,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]454]g4541-1.pdI

nstruments oI NatIonaI Power nstruments oI NatIonaI Power nstruments oI NatIonaI Power nstruments oI NatIonaI Power
AII oI the means avaIIabIe to the government In Its pursuIt oI natIonaI objectIves. They are expressed as
dIpIomatIc, economIc, InIormatIonaI and mIIItary.

Source: DOD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]







225
ntegraI FIIe 8Iock ntegraI FIIe 8Iock ntegraI FIIe 8Iock ntegraI FIIe 8Iock
See FIIe SerIes See FIIe SerIes See FIIe SerIes See FIIe SerIes
A dIstInct component oI a IIIe serIes, as (deIIned by EO 13292), that shouId be maIntaIned as a separate
unIt In order to ensure the IntegrIty oI the records. An IntegraI IIIe bIock may consIst oI a set oI records
coverIng eIther a specIIIc topIc or range oI tIme such as a presIdentIaI admInIstratIon or a IIve-year
retIrement scheduIe wIthIn a specIIIc IIIe serIes that Is retIred Irom actIve use as a group.

ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

ntegrIty (oI InIormatIon) ntegrIty (oI InIormatIon) ntegrIty (oI InIormatIon) ntegrIty (oI InIormatIon)
1. ntegrIty reIers to keepIng InIormatIon accurate, I.e., keepIng It Irom beIng modIIIed or
corrupted.

Source: CeneraI AccountIng OIIIce (CAO). nIormatIon SecurIty: Computer Attacks at Department oI
DeIense Pose ncreasIng RIsks. CAO]AMD-96-84, 1996), http:]]www.gao.gov

2. "ntegrIty" reIers to the securIty oI InIormatIon -- protectIon oI the InIormatIon Irom
unauthorIzed access or revIsIon, to ensure that the InIormatIon Is not compromIsed through corruptIon or
IaIsIIIcatIon.

Source: OIIIce oI Management and 8udget (OM8). "CuIdeIInes Ior EnsurIng and MaxImIzIng the QuaIIty,
ObjectIvIty, UtIIIty, and ntegrIty oI nIormatIon DIssemInated by FederaI AgencIes. " October 1, 2001,
http:]]www.whItehouse.gov]omb]Iedreg]IInaIInIormatIonquaIItyguIdeIInes.htmI

3. The state that exIsts when InIormatIon Is unchanged Irom Its source and has not been
accIdentaIIy or IntentIonaIIy modIIIed, aItered or destroyed.
Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI and
Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards and
SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
nteIInk nteIInk nteIInk nteIInk
1. The nteIInk-S8U Is a US Covernment, ]oInt-use, remoteIy accessed, and operatIonaIIy
ImpIemented InIormatIon servIce that Is used to access and process uncIassIIIed, pubIIcIy accessIbIe
InIormatIon onIy. t provIdes a protected envIronment to exchange authorIzed uncIassIIIed, uncIassIIIed
Ior oIIIcIaI use onIy, and sensItIve but uncIassIIIed InIormatIon among personneI oI the DeIense, the
DIpIomatIc, the HomeIand SecurIty, the nteIIIgence, and the Law EnIorcement communItIes. The nteIInk-
S8U IIrewaIIs protect users and aIIow customers to access the pubIIc nternet; thus gIvIng nteIInk-S8U
users a sIngIe poInt oI






226
access to an unprecedented amount oI uncIassIIIed open source InIormatIon.

Source: DoD, Open Source nteIIIgence, FM 2-22.9, AppendIx F, December 2006, ExpIres December 2008,
http:]]www.Ias.org]Irp]doddIr]army]ImI2-22-9.pdI

2. nteIInk, whIch began test bed operatIon In 1994, Is both an archItecturaI Iramework and an
Integrated InteIIIgence dIssemInatIon and coIIaboratIon servIce provIdIng unIIorm methods Ior exchangIng
InteIIIgence among InteIIIgence provIders and users. The nteIInk Iramework conIorms to the Iuture
dIrectIon oI the NatIonaI nIormatIon nIrastructure (N). The nteIInk servIce was patterned aIter the
nternet modeI In whIch a varIety oI InstItutIons have come together In the context oI a gIobaI network to
share InIormatIon. The nteILNK InteIIIgence network IInks InIormatIon In the varIous cIassIIIed databases
oI the US InteIIIgence agencIes (e.g. F8, CA, DEA, NSA, USSS, NRO) to IacIIItates communIcatIon and the
sharIng oI documents and other resources.

Source: CIobaIsecurIty.org. "nteIInk." http:]]www.gIobaIsecurIty.org]InteII]systems]InteIInk.htm

nteIIIgence nteIIIgence nteIIIgence nteIIIgence
See See See See nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon
1. A body oI InIormatIon and the concIusIons drawn there Irom that Is acquIred and IurnIshed In
response to the known or perceIved requIrements oI customers; It Is oIten derIved Irom InIormatIon that
may be conceaIed or not Intended to be avaIIabIe Ior use by the acquIrer; It Is the product oI a cycIIcaI
process.
A term to reIer coIIectIveIy to the IunctIon, actIvItIes, or organIzatIons that are InvoIved In the process oI
pIannIng, gatherIng, and anaIyzIng InIormatIon oI potentIaI vaIue to decIsIon-makers and to the
productIons oI InteIIIgence as deIIned In A. above.
The product resuItIng Irom the coIIectIon, coIIatIon, evaIuatIon, anaIysIs, IntegratIon, and InterpretatIon oI
aII coIIected InIormatIon.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. The product resuItIng Irom the coIIectIon, processIng, IntegratIon, anaIysIs, evaIuatIon, and
InterpretatIon oI avaIIabIe InIormatIon concernIng IoreIgn countrIes or areas, and 2. nIormatIon and
knowIedge about an adversary obtaIned through observatIon, InvestIgatIon, anaIysIs, or understandIng.

See aIso acoustIc InteIIIgence; aII-source InteIIIgence; basIc InteIIIgence; cIvII deIense InteIIIgence; combat
InteIIIgence; communIcatIons InteIIIgence; crItIcaI InteIIIgence; current InteIIIgence; departmentaI
InteIIIgence; domestIc InteIIIgence; eIectronIc InteIIIgence; eIectro-optIcaI InteIIIgence; IoreIgn InteIIIgence;
IoreIgn InstrumentatIon sIgnaIs InteIIIgence; generaI mIIItary InteIIIgence; human resources InteIIIgence;






227
Imagery InteIIIgence; joInt InteIIIgence; Iaser InteIIIgence; measurement and sIgnature InteIIIgence;
medIcaI InteIIIgence; merchant InteIIIgence; mIIItary InteIIIgence; natIonaI InteIIIgence; nucIear InteIIIgence;
open-source InteIIIgence; operatIonaI InteIIIgence; photographIc InteIIIgence; poIItIcaI InteIIIgence; radar
InteIIIgence; radIatIon InteIIIgence; scIentIIIc and technIcaI InteIIIgence; securIty InteIIIgence; strategIc
InteIIIgence; tactIcaI InteIIIgence; target InteIIIgence; technIcaI InteIIIgence; technIcaI operatIonaI
InteIIIgence; terraIn InteIIIgence; unIntentIonaI radIatIon InteIIIgence.

[NOTE: the above InteIIIgence types are not entIreIy IIsted In thIs work; they are IncIuded to IIIustrate the
IeveI oI specIaIIzatIon]

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]data]I]02719.htmI

3. The technIcaI term oI governments to descrIbe aII the necessary InIormatIon, both overt and
secret, whIch It needs Ior IashIonIng Its poIIcIes and doIng Its work.

Source: CarI ]. FrIedrIch. The PathoIogy oI PoIItIcs: VIoIence, 8etrayaI, CorruptIon, Secrecy, and
Propaganda. New York: Harper & Row, 1972. 210.

4. One oI the broadest deIInItIons oI InteIIIgence Is that "InteIIIgence Is knowIedge, organIzatIon,
and actIvIty."10 ArguabIy, one oI the most meanIngIuI purposes oI InteIIIgence Is "to estabIIsh where the
danger IIes."11 Some wouId argue based on thIs deIInItIon that "InteIIIgence Is InteIIIgence"-that Is,
dIIIerentIatIng tradItIonaI Irom non-tradItIonaI InteIIIgence Is a theoretIcaI matter whIch may have IIttIe
reIatIon to the end resuIt-protectIng natIonaI securIty. (p.3)

Source: Mark A, RandoI, "HomeIand SecurIty nteIIIgence: PerceptIons, Statutory DeIInItIons and Counter-
TerrorIsm," CRS Report Ior Congress ]anuary 14, 2009, RL33616,
http:]]www.Ias.org]sgp]crs]InteI]RL33616.pdI

5. nteIIIgence can be thought oI as that whIch states do In secret to support theIr eIIorts to
mItIgate, InIIuence, or mereIy understand other natIons (or varIous enemIes) that couId harm them.

nteIIIgence thus by deIInItIon resIst schoIarshIp.

Source: MIchaeI Warner, "Sources and methods Ior the study oI InteIIIgence," Handbook oI nteIIIgence
StudIes Loch ]ohnson (ed), New York: RoutIedge, 2007. 17-27.

6. FInaIIy, the reaI purpose oI InteIIIgence - truth teIIIng - must be pIaced at the center oI (sIc CA)
Agency concerns. ThIs Is a harsh prescrIptIon; It Is certaInIy the most dIIIIcuIt objectIve oI the Iot. 8ut It
must be the prIncIpaI purpose oI Agency IeadershIp to estabIIsh beyond questIon the capacIty oI Its
experts and Its IacIIItIes to seek out and IInd the truth, or the nearest approxImatIon oI the truth possIbIe.
PubIIc cynIcIsm wIII have to be dIspeIIed beIore thIs Is possIbIe; It wIII take tIme. (642)






228

Source: E. DrexeI CodIrey ]r. "EthIcs and nteIIIgence." ForeIgn AIIaIrs 56 no.3 (1978):624-642.

nteIIIgence ActIvIty nteIIIgence ActIvIty nteIIIgence ActIvIty nteIIIgence ActIvIty
An actIvIty that an agency wIthIn the nteIIIgence CommunIty Is authorIzed to conduct pursuant to the
Order.

Source: Department oI State. 22 CFR 9. AppendIx A, http:]]www.gpoaccess.gov]cIr]Index.htmI

nteIIIgence CommIttees* nteIIIgence CommIttees* nteIIIgence CommIttees* nteIIIgence CommIttees*
As part oI the NatIonaI SecurIty Act, Congress In 1991 requIred the DIrector oI CentraI nteIIIgence and the
heads oI aII departments, agencIes, and other entItIes oI the U.S. government InvoIved In InteIIIgence
actIvItIes to keep the InteIIIgence commIttees "IuIIy and currentIy InIormed oI aII InteIIIgence actIvItIes,"
other than a covert actIon. The procedures Ior covert actIons are speIIed out eIsewhere. The nteIIIgence
CommIttees are to receIve "any InIormatIon or materIaI concernIng InteIIIgence actIvItIes . . . whIch Is
requested by eIther oI the InteIIIgence commIttees In order to carry out Its authorIzed responsIbIIItIes

(*House Permanent SeIect CommIttee on nteIIIgence and Senate SeIect CommIttee on nteIIIgence)

Source: LouIs FIsher, "CongressIonaI Access to ExecutIve 8ranch nIormatIon: LegIsIatIve TooIs,"
CRS Report to Congress May 17, 2001 RL30966, http:]]www.opencrs.com

nteIIIgence CommunIty nteIIIgence CommunIty nteIIIgence CommunIty nteIIIgence CommunIty
See n See n See n See n- -- -Q QQ Q- -- -TeI TeI TeI TeI
1. The C Is a IederatIon oI executIve branch agencIes and organIzatIons that work separateIy and
together to conduct InteIIIgence actIvItIes necessary Ior the conduct oI IoreIgn reIatIons and the protectIon
oI the natIonaI securIty oI the UnIted States. These actIvItIes IncIude:
CoIIectIon oI InIormatIon needed by the PresIdent, the NatIonaI SecurIty CouncII, the SecretarIes oI
State and DeIense, and other ExecutIve 8ranch oIIIcIaIs Ior the perIormance oI theIr dutIes and
responsIbIIItIes;
ProductIon and dIssemInatIon oI InteIIIgence;
CoIIectIon oI InIormatIon concernIng, and the conduct oI actIvItIes to protect agaInst, InteIIIgence
actIvItIes dIrected agaInst the US, InternatIonaI terrorIst and InternatIonaI narcotIcs actIvItIes, and
other hostIIe actIvItIes dIrected agaInst the US by IoreIgn powers, organIzatIons, persons, and
theIr agents;
SpecIaI actIvItIes;
AdmInIstratIve and support actIvItIes wIthIn the US and abroad necessary Ior the perIormance oI
authorIzed actIvItIes; and
Such other InteIIIgence actIvItIes as the PresIdent may dIrect Irom tIme to tIme.






229
Members oI the C are: CentraI nteIIIgence Agency (CA); wIthIn the DoD, the NatIonaI SecurIty Agency
(NSA), the NatIonaI ReconnaIssance OIIIce (NRO), and the NatIonaI CeospatIaI-nteIIIgence Agency (NCA),
the DeIense nteIIIgence Agency (DA; State Department's 8ureau oI nteIIIgence and Research (NR);
FederaI 8ureau oI nvestIgatIon (F8); InteIIIgence organIzatIons oI the Iour mIIItary servIces (AIr Force,
Army, Navy, and MarInes); Department oI HomeIand SecurIty (DHS); Coast Cuard, now part oI DHS; Energy
Department and Department oI the Treasury.

Source: UnIted State nteIIIgence CommunIty. http:]]www.InteIIIgence.gov]1who.shtmI, ExecutIve Order
12333, "UnIted States nteIIIgence ActIvItIes" http:]]www.archIves.gov]IederaI-regIster]executIve-
orders]1981-reagan.htmI, and NatIonaI nteIIIgence ReIorm Act oI 2004, (S.2845),
http:]]thomas.Ioc.gov]cgI-bIn]query]FZc108:1:.]temp]~c108YCu9x6:e8145:

2. The C as we know It today Is the resuIt oI haII a century oI ad hoc deveIopment. Each
agency or organIzatIon makes sense on Its own, but II one were to desIgn an C today Irom scratch, thIs Is
not IIkeIy to be the array that wouId be chosen. OnIy InteIIIgence, oI aII major government IunctIons, Is
carrIed out by a very dIsparate number oI agencIes and organIzatIons that are eIther Independent oI one
another or housed In separate departments headed by oIIIcIaIs whose maIn concerns are poIIcy, not
InteIIIgence. ndeed, reIerrIng to It as a "communIty" Is more accurate than most peopIe reaIIze, capturIng
as It does a sense oI mutuaIIty and Independence.

Source: UnIted States. Congress. House. Permanent SeIect CommIttee on nteIIIgence. C21, nteIIIgence
CommunIty In the 21st Century: StaII Study ( (( (Permanent SeIect CommIttee on nteIIIgence, House oI
RepresentatIves, One Hundred Fourth Congress WashIngton: CPO, 1996),
http:]]www.access.gpo.gov]congress]house]InteI]Ic21]Ic21001.htmI and Terence O'Hara. "n-Q-TeI,
CA's Venture Arm, nvests In Secrets." WashIngton Post August 15, 2005,
http:]]www.washIngtonpost.com]wp-dyn]content]artIcIe]2005]08]14]AR2005081401108.htmI

nteIIIgence CommunIty DIrectIves nteIIIgence CommunIty DIrectIves nteIIIgence CommunIty DIrectIves nteIIIgence CommunIty DIrectIves
The DIrector oI NatIonaI nteIIIgence (DN) estabIIshed nteIIIgence CommunIty DIrectIves (CDs) as the
prIncIpaI means by whIch the DN provIdes guIdance, poIIcy, and dIrectIon to the nteIIIgence CommunIty.
The DN aIso dIrected that aII DIrector oI CentraI nteIIIgence DIrectIves (D.C.Ds) remaIn In Iorce untII
canceIed or superseded by an CD. The contents oI an CD may be Issued In an nteIIIgence CommunIty
PoIIcy Memorandum prIor to Its IormaI pubIIcatIon In an CD.

Source: FAS. "DIrector oI NatIonaI nteIIIgence nteIIIgence CommunIty DIrectIves."
http:]]www.Ias.org]Irp]dnI]Icd]Index.htmI

nteIIIgence CycIe nteIIIgence CycIe nteIIIgence CycIe nteIIIgence CycIe
See See See See nteIIIgence nteIIIgence nteIIIgence nteIIIgence, , , , nteIIIgence L nteIIIgence L nteIIIgence L nteIIIgence LeveIs eveIs eveIs eveIs
1. The process by whIch InIormatIon Is acquIred and converted Into InteIIIgence and made
avaIIabIe to customers.







230
Source: CentraI nteIIIgence Agency. OIIIce oI PubIIc AIIaIrs. A Consumer's CuIde to nteIIIgence:
CaInIng KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA:
NatIonaI TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2: C 76 and PREX 3.2]2: C 94.

2. Loch K. ]ohnson characterIzes the InteIIIgence cycIe as a "IunneI oI causaIIty," whIch
encompasses a Ieedback system oI personaIItIes, events, hIstory, cycIes, IdeoIogIes, myths, knowIedge,
perceptIons and experIence.

Source: Loch K. ]ohnson. AmerIca's Secret Power: the CA at Home and Abroad. New York: OxIord
UnIversIty Press, 1989. 78-79.

3. The process oI taskIng, coIIectIng, processIng, anaIyzIng, and dIssemInatIng InteIIIgence Is
caIIed the InteIIIgence cycIe. The InteIIIgence cycIe drIves the day-to-day actIvItIes oI the nteIIIgence
CommunIty. t starts wIth the needs oI those who are oIten reIerred to wIthIn the nteIIIgence CommunIty
as InteIIIgence "consumers"--that Is, poIIcymakers, mIIItary oIIIcIaIs, and other decIsIon makers who need
InteIIIgence InIormatIon In conductIng theIr dutIes and responsIbIIItIes. These needs--aIso reIerred to as
InteIIIgence requIrements--are sorted and prIorItIzed wIthIn the nteIIIgence CommunIty, and are used to
drIve the coIIectIon actIvItIes oI the members oI the nteIIIgence CommunIty that coIIect InteIIIgence. Once
InIormatIon has been coIIected It Is processed, InItIaIIy evaIuated, and reported to both consumers and so-
caIIed "aII-source" InteIIIgence anaIysts at agencIes IIke the CA, DA, and the State Department's 8ureau oI
nteIIIgence and Research. AII-source anaIysts are responsIbIe Ior perIormIng a more thorough evaIuatIon
and assessment oI the coIIected InIormatIon by IntegratIng the data obtaIned Irom a varIety oI coIIectIon
agencIes and sources--both cIassIIIed and uncIassIIIed. ThIs assessment Ieads to a IInIshed InteIIIgence
report beIng dIssemInated to the consumer. The "Ieedback" part oI the cycIe assesses the degree to whIch
the IInIshed InteIIIgence addresses the needs oI the InteIIIgence consumer and wIII determIne II Iurther
coIIectIon and anaIysIs Is requIred.

Source: CommIssIon on the nteIIIgence CapabIIItIes oI the UnIted States RegardIng Weapons oI Mass
DestructIon ("SIIberman-Robb CommIssIon"). March 31, 2005. and AppendIx C. "An nteIIIgence
CommunIty PrImer." http:]]www.gpoaccess.gov]wmd]Index.htmI

nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon nteIIIgence nIormatIon
See nteIIIgence, nteIIIgence CycIe, nteIIIgence LeveIs See nteIIIgence, nteIIIgence CycIe, nteIIIgence LeveIs See nteIIIgence, nteIIIgence CycIe, nteIIIgence LeveIs See nteIIIgence, nteIIIgence CycIe, nteIIIgence LeveIs
1. nIormatIon that Is under the jurIsdIctIon and controI oI the DIrector oI CentraI nteIIIgence or a
member oI the nteIIIgence CommunIty.
nIormatIon on InteIIIgence communIty protectIve securIty programs (e.g., personneI, physIcaI, technIcaI,
and InIormatIon securIty).
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI






231
2. nteIIIgence nIormatIon IncIudes the IoIIowIng cIassIIIed InIormatIon:

ForeIgn InteIIIgence and counterInteIIIgence as deIIned In EO 12333;
nIormatIon descrIbIng U.S. IoreIgn InteIIIgence and counterInteIIIgence actIvItIes, sources,
methods, equIpment, or methodoIogy used Ior the acquIsItIon, processIng, or expIoItatIon oI such
InteIIIgence; IoreIgn mIIItary hardware obtaIned Ior expIoItatIon; and photography or recordIngs
resuItIng Irom U.S. InteIIIgence coIIectIon eIIorts; and
nIormatIon on nteIIIgence CommunIty protectIve securIty programs (e.g., personneI, physIcaI,
technIcaI, and InIormatIon securIty). ThIs type oI InIormatIon Is coIIected, processed, produced or
dIssemInated by the DIrector oI CentraI nteIIIgence and other agencIes oI the nteIIIgence
CommunIty under the authorIty oI EO 12333).

AIso "nIormatIon and knowIedge about an adversary obtaIned through observatIon, InvestIgatIon,
anaIysIs, or understandIng."

SeveraI types oI InteIIIgence SeveraI types oI InteIIIgence SeveraI types oI InteIIIgence SeveraI types oI InteIIIgence:
1. COMNT - CommunIcatIons InteIIIgence; COMNT Is technIcaI and InteIIIgence
InIormatIon derIved Irom IoreIgn communIcatIons by other than the Intended recIpIents. COMNT Is
produced by the coIIectIon and processIng oI IoreIgn communIcatIons passed by eIectromagnetIc means,
wIth specIIIc exceptIons stated beIow, and by the processIng oI IoreIgn encrypted communIcatIons,
however transmItted. CoIIectIon comprIses search, Intercept, and dIrectIon IIndIng. ProcessIng comprIses
range estImatIon, transmItter]operator anaIysIs, traIIIc anaIysIs, cryptanaIysts, decryptIon, study oI pIaIn
text, the IusIon oI these processes, and the reportIng oI resuIts. COMNT shaII not IncIude:

ntercept and processIng oI unencrypted wrItten communIcatIons, except
the processIng oI wrItten pIaIn text versIons oI communIcatIons whIch have
been encrypted or are Intended Ior subsequent encryptIon.

ntercept and processIng oI press, propaganda and other pubIIc
broadcasts, except Ior processIng encrypted or "hIdden meanIng" passages
In such broadcasts.

OraI and wIre InterceptIons conducted under DoD DIrectIve 5200.24.

CensorshIp.

2. nIormatIon Irom the Intercept oI IoreIgn communIcatIons by other than the Intended
recIpIents; It does not IncIude the monItorIng oI IoreIgn pubIIc medIa or the Intercept oI communIcatIons
obtaIned durIng the course oI counterInteIIIgence InvestIgatIons wIthIn the UnIted States. COMNT IncIudes
the IIeIds oI traIIIc anaIysIs, cryptanaIysIs, and dIrectIon IIndIng, and Is a part oI SIgnaIs nteIIIgence
(SCNT).







232
Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence:
CaInIng KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA:
NatIonaI TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2: C 76 PREX 3.2]2: C 94.

Types oI nteIIIgence Types oI nteIIIgence Types oI nteIIIgence Types oI nteIIIgence
ELNT - EIectronIcs InteIIIgence; ELNT Is technIcaI and InteIIIgence InIormatIon
derIved Irom IoreIgn, non-communIcatIons, eIectromagnetIc radIatIons emanatIng Irom other than atomIc
detonatIon or radIoactIve sources. ELNT Is produced by the coIIectIon (observatIon and recordIng), and
the processIng Ior subsequent InteIIIgence purposes oI that InIormatIon.

CEONT - (DOD) The expIoItatIon and anaIysIs oI Imagery and geospatIaI InIormatIon to descrIbe, assess,
and vIsuaIIy depIct physIcaI Ieatures and geographIcaIIy reIerenced actIvItIes on the Earth. CeospatIaI
InteIIIgence consIsts oI Imagery, Imagery InteIIIgence, and geospatIaI InIormatIon. AIso caIIed CEONT.

Source: DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02. As Amended through 31
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary] and NCA, OIIIce oI CEONT ScIences,
http:]]earth-InIo.nga.mII]CandC]

HUMNT - Human based InteIIIgence
A DOD and NATO term: A category oI InteIIIgence derIved Irom InIormatIon coIIected and provIded by
human sources. [Note: In Army and MarIne Corps usage, human InteIIIgence operatIons cover a wIde range
oI actIvItIes encompassIng reconnaIssance patroIs, aIrcrew reports and debrIeIs, debrIeIIng oI reIugees,
InterrogatIons oI prIsoners oI war, and the conduct oI counterInteIIIgence Iorce protectIon source
operatIons.]

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

MNT - magery InteIIIgence.
MASNT - Measurement and SIgnatures nteIIIgence.
MEDNT - MedIcaI nteIIIgence
That category oI InteIIIgence resuItIng Irom coIIectIon, evaIuatIon, anaIysIs, and InterpretatIon oI IoreIgn
medIcaI, bIo-scIentIIIc, and envIronmentaI InIormatIon that Is oI Interest to strategIc pIannIng and mIIItary
medIcaI pIannIng and operatIons Ior the conservatIon oI the IIghtIng strength oI IrIendIy Iorces and the
IormatIon oI assessments oI IoreIgn medIcaI capabIIItIes In both mIIItary and cIvIIIan sectors.

OSNT - Open-source InteIIIgence; nIormatIon oI potentIaI InteIIIgence vaIue that Is avaIIabIe to the
generaI pubIIc.







233
RNT - UnIntentIonaI RadIatIon nteIIIgence. nteIIIgence derIved Irom the coIIectIon and anaIysIs oI
non-InIormatIon bearIng eIements extracted Irom the eIectromagnetIc energy unIntentIonaIIy emanated
by IoreIgn devIces, equIpment, and systems, excIudIng those generated by the detonatIon oI nucIear
weapons.

Source: ]oInt ChIeIs oI StaII. ]oInt DoctrIne EncycIopedIa. ]uIy 16, 1997,
http:]]www.dtIc.mII]doctrIne]joIntdoctrIneencycIopedIa.htm

SCNT - SIgnaIs communIcatIons, eIectronIcs, and IoreIgn InstrumentatIon sIgnaIs
A category oI InteIIIgence InIormatIon comprIsIng aII CommunIcatIons nteIIIgence (COMNT), EIectronIcs
nteIIIgence (ELNT), and TeIemetry nteIIIgence (TELNT). SCNT operatIonaI controI Is the authorItatIve
dIrectIon oI SCNT actIvItIes, IncIudIng taskIng and aIIocatIon oI eIIort, and the authorItatIve prescrIptIon
oI those unIIorm technIques and standards by whIch SCNT InIormatIon Is coIIected, processed and
reported.

TECHNT - TechnIcaI InteIIIgence. ReIers chIeIIy to MNT and SCNT.

TELENT - TechnIcaI and InteIIIgence InIormatIon derIved Irom the Intercept,
processIng, and anaIysIs oI IoreIgn teIemetry.

Source: DeIense SecurIty ServIce [See the Wayback MachIne,
http:]]web.archIve.org]web]20061214152720]http:]]www.dss.mII]Isec]chapter9.htm ], DoD. DoD
DIctIonary oI MIIItary Terms and AssocIated Terms, ]P-02. As Amended through 31 October 2009,
http:]]www.dtIc.mII]doctrIne]doddIctIonary] and DODD 5100.20. "The NatIonaI SecurIty Agency and the
CentraI SecurIty ServIce," December 23, 1971, ASD (), thru Ch 4, ]une 24, 1991,
http:]]www.Ias.org]Irp]doddIr]dod]d510020.htm

nteIIIgence nIormatIon Report nteIIIgence nIormatIon Report nteIIIgence nIormatIon Report nteIIIgence nIormatIon Report
nteIIIgence nIormatIon Report (R). The R Is the prImary vehIcIe to provIde
human InteIIIgence InIormatIon to the consumer. t uses a message Iormat structure whIch supports
automated data entry Into nteIIIgence CommunIty databases.

Source: DoD. "DoD CounterInteIIIgence CoIIectIon ReportIng." DoD 5240.17. October 26, 2005,
http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]I524017102605]I524017p.pdI

nteIIIgence ]ournaI nteIIIgence ]ournaI nteIIIgence ]ournaI nteIIIgence ]ournaI
A chronoIogIcaI Iog oI InteIIIgence actIvItIes coverIng a stated perIod, usuaIIy 24 hours. t Is an Index oI
reports and messages that have been receIved and transmItted, Important events that have occurred, and
actIons taken. The journaI Is a permanent and oIIIcIaI record.

Source: Department oI DeIense. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]






234

nteIIIgence LeveIs LeveIs oI nteIIIgence nteIIIgence LeveIs LeveIs oI nteIIIgence nteIIIgence LeveIs LeveIs oI nteIIIgence nteIIIgence LeveIs LeveIs oI nteIIIgence
See nteIIIgence, nteIIIgence CycIe See nteIIIgence, nteIIIgence CycIe See nteIIIgence, nteIIIgence CycIe See nteIIIgence, nteIIIgence CycIe
The IeveIs oI InteIIIgence correspond to the estabIIshed IeveIs oI war: strategIc, operatIonaI, strategIc, operatIonaI, strategIc, operatIonaI, strategIc, operatIonaI, and tactIcaI. tactIcaI. tactIcaI. tactIcaI.
LIke the IeveIs oI war, the IeveIs oI InteIIIgence serve as a Iramework In whIch commanders and M
personneI vIsuaIIze the IogIcaI IIow oI operatIons, aIIocatIon oI resources, and assIgnment oI tasks. The
IeveIs oI InteIIIgence are not tIed to specIIIc echeIons but rather to the Intended outcome oI the operatIons
whIch they support. As IIIustrated In FIgure 2-1, echeIons and IeveIs oI InteIIIgence vary. The reIatIonshIp
Is based upon the poIItIcaI and mIIItary objectIves oI the operatIon and the commander's needs.

Source: Department oI the Army. FM 34-1. "FundamentaI oI EW OperatIons." Chapter 2. nteIIIgence and
EIectronIc WarIare OperatIons. September 1994.
http:]]www.Ias.org]Irp]doddIr]army]Im34-1]ch2.htm#2-6
nteIIIgence Method nteIIIgence Method nteIIIgence Method nteIIIgence Method
The method whIch Is used to provIde support to an InteIIIgence source or operatIon, and whIch, II
dIscIosed, Is vuInerabIe to counteractIon that couId nuIIIIy or sIgnIIIcantIy reduce Its eIIectIveness In
supportIng the IoreIgn InteIIIgence or IoreIgn counterInteIIIgence actIvItIes oI the UnIted States, or
whIch wouId, II dIscIosed, reasonabIy Iead to the dIscIosure oI an InteIIIgence source or operatIon.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

nteIIIgence OversIght 8o nteIIIgence OversIght 8o nteIIIgence OversIght 8o nteIIIgence OversIght 8oard (O8) ard (O8) ard (O8) ard (O8)
See PresIdent's See PresIdent's See PresIdent's See PresIdent's ForeIgn nteIIIgence AdvIsory 8oard ForeIgn nteIIIgence AdvIsory 8oard ForeIgn nteIIIgence AdvIsory 8oard ForeIgn nteIIIgence AdvIsory 8oard
1. EstabIIshed as a standIng commIttee oI the PresIdent's ForeIgn nteIIIgence AdvIsory 8oard
(PFA8). The O8 shaII consIst oI no more than Iour members desIgnated by the PresIdent Irom among the
membershIp oI the PFA8. The ChaIrman oI the PFA8 may aIso serve as the ChaIrman or a member oI the
O8 II so desIgnated by the PresIdent. The O8 shaII utIIIze such IuII-tIme staII and consuItants as
authorIzed by the ChaIrman oI the O8 wIth the concurrence oI the ChaIrman oI the PFA8. Sec. 2.2. The
O8 shaII:

(a) prepare Ior the PresIdent reports oI InteIIIgence actIvItIes that the O8 beIIeves may be unIawIuI or
contrary to ExecutIve order or PresIdentIaI dIrectIve; (b) Iorward to the Attorney CeneraI reports receIved
concernIng InteIIIgence actIvItIes that the O8 beIIeves may be unIawIuI or contrary to ExecutIve order or
PresIdentIaI dIrectIve; (c) revIew the InternaI guIdeIInes oI each agency wIthIn the nteIIIgence CommunIty
that concern the IawIuIness oI InteIIIgence actIvItIes; (d) revIew the practIces and procedures oI the
nspectors CeneraI and CeneraI CounseI oI the nteIIIgence CommunIty Ior dIscoverIng and reportIng
InteIIIgence actIvItIes that may be unIawIuI or contrary to ExecutIve order or PresIdentIaI dIrectIve; and (e)
conduct such InvestIgatIons as the O8 deems necessary to carry out Its IunctIons under thIs order.

Source: "War and NatIonaI DeIense." 50 U.S.C. 15 401.http:]]www.gpoaccess.gov]cIr]Index.htmI
\






235
2. The PresIdent's nteIIIgence OversIght 8oard (O8) was estabIIshed by PresIdent CeraId Ford
In 1976 as a WhIte House entIty wIth oversIght responsIbIIIty Ior the IegaIIty and proprIety oI InteIIIgence
actIvItIes. The 8oard, whIch reports to the PresIdent, Is charged prImarIIy wIth preparIng reports "oI
InteIIIgence actIvItIes that the O8 beIIeves may be unIawIuI or contrary to ExecutIve order or PresIdentIaI
dIrectIve." The 8oard may aIso reIer such reports to the Attorney CeneraI. ThIs standard assIsts the
PresIdent In ensurIng that hIghIy sensItIve InteIIIgence actIvItIes compIy wIth Iaw and PresIdentIaI dIrectIve.
n 1993, the O8 was made a standIng commIttee oI the PFA8.
Source: CentraI nteIIIgence Agency. "ExecutIve OversIght oI nteIIIgence." Factbook on nteIIIgence. [See
the Wayback MachIne,
http:]]web.archIve.org]web]20060616234124]http:]]cIa.gov]cIa]pubIIcatIons]IactteII]executIveoversIg
ht.htmI ]
3. An Independent oversIght board created to IdentIIy InteIIIgence abuses aIter the CA scandaIs
oI the 1970s dId not send any reports to the attorney generaI oI IegaI vIoIatIons durIng the IIrst 5 1]2
years oI the 8ush admInIstratIon's counterterrorIsm eIIort, the ]ustIce Department has toId Congress.

Source: ]ohn SoIomon "nteIIIgence WorId, a Mute Watchdog: PaneI Reported No VIoIatIons Ior FIve Years,"
WashIngton Post ]uIy 15, 2007; Ior oversIght, see Department OI ]ustIce CorrectIve ActIons on the F8's
Use oI NatIonaI SecurIty Letters, March 20,2007,
http:]]www.justIce.gov]opa]pr]2007]March]07nsd168.htmI
4. ExecutIve Order 13462 estabIIshed the PresIdent's nteIIIgence AdvIsory 8oard who aIso serve
on the "O8 shaII consIst oI not more than IIve members oI the PA8 who are desIgnated by the PresIdent
Irom among members oI the PA8." (5.b)
Source: C.W. 8ush, EO 13462, February 29, 2008, http:]]edocket.access.gpo.gov]2008]pdI]08-970.pdI

nteIIIgence Process nteIIIgence Process nteIIIgence Process nteIIIgence Process
The process by whIch InIormatIon Is converted Into InteIIIgence and made avaIIabIe to users. The process
consIsts oI sIx InterreIated InteIIIgence operatIons: pIannIng and dIrectIon, coIIectIon, processIng and
expIoItatIon, anaIysIs and productIon, dIssemInatIon and IntegratIon, and evaIuatIon and Ieedback. See
aIso anaIysIs and productIon; coIIectIon; dIssemInatIon and IntegratIon; evaIuatIon and Ieedback;
InteIIIgence; pIannIng and dIrectIon; processIng and expIoItatIon.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

nteIIIgence Report (NTREP) nteIIIgence Report (NTREP) nteIIIgence Report (NTREP) nteIIIgence Report (NTREP)
A specIIIc report oI InIormatIon, usuaIIy on a sIngIe Item, made at any IeveI oI command In tactIcaI
operatIons and dIssemInated as rapIdIy as possIbIe In keepIng wIth the tImeIIness oI the InIormatIon.







236
Source: Department oI DeIense DIctIonary. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

nteIIIgence ReportIng nteIIIgence ReportIng nteIIIgence ReportIng nteIIIgence ReportIng
The preparatIon and conveyance oI InIormatIon by any means.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
nteIIIgence SAP nteIIIgence SAP nteIIIgence SAP nteIIIgence SAP
See SpecIaI Access Program See SpecIaI Access Program See SpecIaI Access Program See SpecIaI Access Program
A SAP [SpecIaI Access Program] prImarIIy to protect the pIannIng and executIon oI especIaIIy sensItIve
InteIIIgence or C operatIons or coIIectIon actIvItIes.
Source: Department oI the Army. "SpecIaI Access Programs (SAPs) and SensItIve ActIvItIes." AR 380-381.
AprII 21, 2004. http:]]www.Ias.org]Irp]doddIr]army]ar380-381.pdI
nteIIIgence Subject Cod nteIIIgence Subject Cod nteIIIgence Subject Cod nteIIIgence Subject Code e e e
A system oI subject and area reIerences to Index the InIormatIon contaIned In InteIIIgence reports as
requIred by a generaI InteIIIgence document reIerence servIce.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

nteIIIgence, SurveIIIance and R nteIIIgence, SurveIIIance and R nteIIIgence, SurveIIIance and R nteIIIgence, SurveIIIance and ReconnaIssance (SR econnaIssance (SR econnaIssance (SR econnaIssance (SR) )) )
The term "InteIIIgence, surveIIIance and reconnaIssance," or "SR," encompasses muItIpIe actIvItIes reIated
to the pIannIng and operatIon oI sensors and assets that coIIect, process, and dIssemInate data In support
oI current and Iuture mIIItary operatIons. nteIIIgence data can take many Iorms, IncIudIng optIcaI, radar,
or InIrared Images or eIectronIc sIgnaIs. ThIs data can come Irom a varIety oI sources, IncIudIng
surveIIIance and reconnaIssance systems rangIng Irom sateIIItes, to manned aIrcraIt IIke the U-2,
unmanned aIrcraIt systems IIke the AIr Force's CIobaI Hawk and Predator and the Army's Hunter, to other
ground, aIr, sea, or space-based equIpment, to human InteIIIgence teams. DOD SR actIvItIes support the
mIssIons oI the Department oI DeIense and the DIrector oI NatIonaI nteIIIgence, as weII as the mIssIons oI
other government agencIes.

Source: TestImony, SubcommIttee on AIr and Land Forces, CommIttee on Armed ServIces, House oI
RepresentatIves, PreIImInary ObservatIons on DOD's Approach to ManagIng RequIrements Ior New
Systems, ExIstIng Assets, and Systems DeveIopment, CAO AprII 19, 2007. http:]]www.gao.gov

nteIIIpedIa nteIIIpedIa nteIIIpedIa nteIIIpedIa
[CIassIIIed] wIkI Ior the nteIIIgence CommunIty
LIves on the ]oInt WorIdwIde nteIIIgence CommunIcatIons System (]WCS)






237

Source: FAS. DN press reIease http:]]www.Ias.org]Irp]news]2006]10]odnI103006.pdI

nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP) nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP) nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP) nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP)
An agency wIthIn the NatIonaI ArchIves and Records AdmInIstratIon (NARA) whIch provIdes the "pubIIc and
users oI the cIassIIIcatIon system wIth a Iorum Ior Iurther revIew oI cIassIIIcatIon decIsIons." EstabIIshed
by ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," sIgned on AprII 17, 1995. SCAP's
mIssIon under EO 12958 5.3:
1. CIassIIIcatIon ChaIIenges: decIdIng on appeaIs by authorIzed persons who have IIIed cIassIIIcatIon
chaIIenges under SectIon 1.8 oI EO 12958, as amended;
2. ExemptIons Irom AutomatIc DecIassIIIcatIon: approvIng, denyIng or amendIng agency exemptIons
Irom automatIc decIassIIIcatIon, as provIded In SectIon 3.3 oI EO 12958, as amended; and
3. Mandatory DecIassIIIcatIon RevIew AppeaIs: decIdIng on mandatory decIassIIIcatIon revIew appeaIs
by partIes whose requests Ior decIassIIIcatIon under SectIon 3.5 oI EO 12958, as amended, have
been denIed at the agency IeveI.
SCAP Is composed oI representatIves oI the Departments oI DeIense, State and ]ustIce,
the CA, NARA and the NatIonaI SecurIty AdvIser.

Source: nteragency SecurIty CIassIIIcatIon AppeaIs PaneI (SCAP).
http:]]www.archIves.gov]Isoo]oversIght-groups]Iscap]Index.htmI, FederatIon oI AmerIcan ScIentIsts
http:]]www.Ias.org]sgp]advIsory]Iscap] and WIIIIam 8urr, "The Secrecy Court oI Last Resort," NatIonaI
SecurIty ArchIve ]une 5, 2009, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88276]Index.htm

nternaI AIIaIrs Treasury EnIorcement CommunIcatIons System AudIt Data Mart nternaI AIIaIrs Treasury EnIorcement CommunIcatIons System AudIt Data Mart nternaI AIIaIrs Treasury EnIorcement CommunIcatIons System AudIt Data Mart nternaI AIIaIrs Treasury EnIorcement CommunIcatIons System AudIt Data Mart
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Department oI HomeIand SecurIty. AssIsts the nternaI AIIaIrs group by mInIng crImInaI
actIvIty data to ascertaIn how Customs' empIoyees are usIng the Treasury EnIorcement System;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI

nternatIonaI PubIIc nIormatIon [P] System nternatIonaI PubIIc nIormatIon [P] System nternatIonaI PubIIc nIormatIon [P] System nternatIonaI PubIIc nIormatIon [P] System
See nIormatIon OperatIon Roadmap See nIormatIon OperatIon Roadmap See nIormatIon OperatIon Roadmap See nIormatIon OperatIon Roadmap
30 AprII 1999 PresIdent CIInton Issued a secret PresIdentIaI DecIsIon DIrectIon -- PDD 68 -- orderIng the
creatIon oI an nternatIonaI PubIIc nIormatIon (P) to address probIems IdentIIIed durIng mIIItary mIssIons






238
In Kosovo and HaItI, when no sIngIe US agency was empowered to coordInate US eIIorts to seII Its
poIIcIes and counteract bad press abroad. The P system Is geared towards preventIon and mItIgatIon oI
crIses and operate on a contInuous basIs. PDD-68 Is evIdentIy Intended to repIace the provIsIons oI NSDD
77 "Management oI PubIIc DIpIomacy ReIatIve to NatIonaI SecurIty" Issued by PresIdent Reagan on 14
February 1983.

nternatIonaI PubIIc nIormatIon [P] System Is desIgned to "InIIuence IoreIgn audIences" In support oI US
IoreIgn poIIcy and to counteract propaganda by enemIes oI the UnIted States. The Intent Is "to enhance
U.S. securIty, boIster AmerIca's economIc prosperIty and to promote democracy abroad," accordIng to the
P Core Croup Charter.

Source: PresIdentIaI DecIsIon DIrectIve PDD 68, 30 AprII 1999,
http:]]www.Ias.org]Irp]oIIdocs]pdd]pdd-68.htm and http:]]www.Ias.org]Irp]oIIdocs]pdd]pdd-68.htm
nterrogatIon OperatIons nterrogatIon OperatIons nterrogatIon OperatIons nterrogatIon OperatIons
DoD deIInes InteIIIgence InterrogatIon as the systematIc process oI usIng approved InterrogatIon
approaches to questIon a captured or detaIned person to obtaIn reIIabIe InIormatIon to satIsIy InteIIIgence
requIrements, consIstent wIth appIIcabIe Iaw. nterrogatIon Is an art that can onIy be eIIectIve II practIced
by traIned and certIIIed Interrogators. CertIIIed Interrogators are traIned to empIoy technIques that wIII
convInce an uncooperatIve source to provIde accurate and reIevant InIormatIon.

Source: DoD, OIIIce oI the nspector CeneraI, Report No. 06-NTEL-10 August 25, 2006
EvaIuatIon Report, RevIew oI DoD-DIrected nvestIgatIons oI DetaInee Abuse,
http:]]www.dodIg.mII]r]reports]ExecSumnteIRpt082506.pdI and UnIted States. Congress. House.
CommIttee on the ]udIcIary. SubcommIttee on the ConstItutIon, CIvII RIghts, and CIvII LIbertIes.
Department oI ]ustIce to Cuantanamo 8ay: AdmInIstratIon Lawyers and AdmInIstratIon nterrogatIon RuIes.
Part : hearIng beIore the SubcommIttee on the ConstItutIon, CIvII RIghts, and CIvII LIbertIes oI the
CommIttee on the ]udIcIary, House oI RepresentatIves, One Hundred Tenth Congress, second sessIon, May
6, 2008, http:]]tInyurI.com]ybw66k ]

nvestIgatIve Data Warehouse nvestIgatIve Data Warehouse nvestIgatIve Data Warehouse nvestIgatIve Data Warehouse
1. . . . The DW provIdes the capabIIIty to broaden data expIoItatIon Ior the F8's InteIIIgence and
InvestIgatIve eIIorts, to search and present Integrated resuIts In a desIred Iorm on a sIngIe user pIatIorm,
and aIso manage the quaIIty oI servIce provIded by the F8 and other government agencIes. n addItIon,
the DW aIIows examInatIon oI reIatIonshIps between Items oI Interest, IncIudIng persons, pIaces,
communIcatIons devIces, organIzatIons, IInancIaI transactIons, and case-reIated InIormatIon across Iarge
amounts oI data.
The DW Program objectIves are to:
Create a data warehouse usIng consIstentIy deIIned and ImpIemented data eIements to provIde a
sIngIe-access reposItory Ior InIormatIon;






239
ConsIstentIy deIIne, store, and dIspIay varIed InIormatIon (data, text, graphIcs, drawIng,
Imagery, photos, audIo, and vIdeo);
Source: F8, "nvestIgatIve Data Warehouse," http:]]www.IbI.gov]hq]ocIo]Idw011209.htm

2. DespIte the vast amount oI personaI InIormatIon contaIned In the DW, the F8 has never
pubIIshed a PrIvacy Act notIce descrIbIng the system or expIaInIng the ways In whIch the records mIght be
used.

Source: EIectronIc FrontIer FoundatIon, "FOA: DO]'s nvestIgatIve Data Warehouse,"
http:]]www.eII.org]Issues]IoIa]061773R8W

3. There are 38 data sources were IncIuded In the DW on or beIore August 2004.

Source: EIectronIc FrontIer FoundatIon, "Report on the nvestIgatIve Data Warehouse," AprII 2008,
http:]]www.eII.org]Issues]IoIa]InvestIgatIve-data-warehouse-report

SE Shared Sp SE Shared Sp SE Shared Sp SE Shared Spaces aces aces aces
a key eIement oI the SE EAF (EnterprIse ArchItecture Framework)-descrIbes a IunctIonaI concept, not a
technoIogy ImpIementatIon approach. The SE EAF heIps resoIve the InIormatIon processIng and usage
probIems IdentIIIed by the 9]11 CommIssIon and RTPA by empIoyIng a structured, networked approach
to InIormatIon sharIng

Make standardIzed terrorIsm-reIated InIormatIon, appIIcatIons and servIces accessIbIe to other SE
partIcIpants In each oI the three SE securIty domaIns-S8U, Secret, and SensItIve Compartmented
nIormatIon (SC);

Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI


~ ] ~ ~ ] ~ ~ ] ~ ~ ] ~

]oInt AdvertIsIng and Market Research Database ]oInt AdvertIsIng and Market Research Database ]oInt AdvertIsIng and Market Research Database ]oInt AdvertIsIng and Market Research Database
1. The commIttee beIIeves that the Department oI DeIense has an Important corporate-IeveI roIe
to pIay In compIementIng the recruItIng and advertIsIng programs oI the IndIvIduaI servIces. n that IIght,
the commIttee beIIeves that the Department's joInt advertIsIng and market research reInventIon eIIort can
have a dIrect, posItIve Iong-term Impact on the abIIIty oI the Department and the mIIItary servIces to
recruIt quaIIty personneI. The commIttee beIIeves that such a capabIIIty Is especIaIIy crItIcaI at a tIme when
the recruItIng eIIorts oI the mIIItary servIces couId soon be chaIIenged by a range oI Iactors. For that






240
reason, the commIttee recommends an Increase oI $10.0 mIIIIon to the budget request Ior the
Department's joInt advertIsIng and market research eIIort.

Source: House Report 108-491, NatIonaI DeIense AuthorIzatIon Act Ior FIscaI Year 2005,
http:]]www.thomas.gov]cgI-bIn]cpquery

2. n May 2005, the Department oI DeIense announced that It had created a massIve database Ior
recruItIng. The "]oInt AdvertIsIng and Market Research" system proposed to combIne student InIormatIon,
SocIaI SecurIty Numbers, and InIormatIon Irom state motor vehIcIe reposItorIes Into a mega database oI aII
those 16-25 years oI age. The InIormatIon wouId be housed at a prIvate dIrect marketIng IIrm. n ]une
2005, EPC and eIght prIvacy and consumer groups objected to the creatIon oI the database, arguIng that
It vIoIated the PrIvacy Act and was unnecessarIIy InvasIve.

Source: EIectronIc PrIvacy nIormatIon Center (EPC) comments to DoD,
http:]]epIc.org]prIvacy]proIIIIng]dodrecruItIng.htmI
]oInt Document ExpIoItatIon Center ]oInt Document ExpIoItatIon Center ]oInt Document ExpIoItatIon Center ]oInt Document ExpIoItatIon Center (]DEC) (]DEC) (]DEC) (]DEC)
A physIcaI IocatIon Ior derIvIng InteIIIgence InIormatIon Irom captured adversary documents IncIudIng aII
Iorms oI eIectronIc data and other Iorms oI stored textuaI and graphIc InIormatIon. t Is normaIIy
subordInate to the joInt Iorce]]-2. See aIso InteIIIgence.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
]oInt nIormatIon 8ureau (]8) ]oInt nIormatIon 8ureau (]8) ]oInt nIormatIon 8ureau (]8) ]oInt nIormatIon 8ureau (]8)
FacIIIty estabIIshed by the joInt Iorce commander to serve as the IocaI poInt Ior the InterIace between the
mIIItary and the medIa durIng the conduct oI joInt operatIons. When operated In support oI muItInatIonaI
operatIons, a joInt InIormatIon bureau Is caIIed a "combIned InIormatIon bureau" or an "aIIIed press
InIormatIon center."
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

]oInt nteIIIgence CommunIty Counc ]oInt nteIIIgence CommunIty Counc ]oInt nteIIIgence CommunIty Counc ]oInt nteIIIgence CommunIty CouncII II II II
The NatIonaI nteIIIgence DIrector, who shaII chaIr the CouncII. ConsIsts oI the IoIIowIng:
` (2) The Secretary oI State.
` (3) The Secretary oI the Treasury.
` (4) The Secretary oI DeIense.
` (5) The Attorney CeneraI.
` (6) The Secretary oI Energy.
` (7) The Secretary oI HomeIand SecurIty.






241
` (8) Such other oIIIcers oI the UnIted States Covernment as the PresIdent may desIgnate Irom
tIme to tIme.
`(c) FUNCTONS- The ]oInt nteIIIgence CommunIty CouncII shaII assIst the NatIonaI nteIIIgence DIrector
to In deveIopIng and ImpIementIng a joInt, unIIIed natIonaI InteIIIgence eIIort to protect natIonaI securIty
by--
`(1) advIsIng the DIrector on estabIIshIng requIrements, deveIopIng budgets, IInancIaI
management, and monItorIng and evaIuatIng the perIormance oI the InteIIIgence communIty, and
on such other matters as the DIrector may request; and
` (2) ensurIng the tImeIy executIon oI programs, poIIcIes, and dIrectIves estabIIshed or deveIoped
by the DIrector.

Source: U.S. Code, TTLE 50 > CHAPTER 15 > SU8CHAPTER > 402-
http:]]www.Iaw.corneII.edu]uscode]htmI]uscode50]uscsec5000000402----001-.htmI
]oInt n ]oInt n ]oInt n ]oInt nterrogatIon and DebrIeIIng Center terrogatIon and DebrIeIIng Center terrogatIon and DebrIeIIng Center terrogatIon and DebrIeIIng Center
A physIcaI IocatIon Ior the expIoItatIon oI InteIIIgence InIormatIon Irom enemy prIsoners oI war and
other nonprIsoner sources. t Is normaIIy subordInate to the joInt Iorce]]-2.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
]oInt MIIItary nteI ]oInt MIIItary nteI ]oInt MIIItary nteI ]oInt MIIItary nteIIIgence Program IIgence Program IIgence Program IIgence Program
The ]MP shaII Improve the eIIectIveness oI DoD InteIIIgence actIvItIes when those actIvItIes InvoIve
resources Irom more than one DoD Component; when users oI the InteIIIgence data are Irom more than
one DoD Component; and]or when centraIIzed pIannIng, management, coordInatIon, or oversIght wIII
contrIbute to the eIIectIveness oI the eIIort. The ]MP shaII InItIaIIy be comprIsed oI the IoIIowIng
component programs
(Programs, IunctIons, and actIvItIes may be added to or deIeted Irom ]MP, on the approvaI oI the Deputy
Secretary oI DeIense.):

a. DeIense CryptoIogIc Program
b. DeIense magery Program (DP).
c. DeIense MappIng, ChartIng, and Ceodesy Program (DMCCP).
d. DeIense CeneraI nteIIIgence and AppIIcatIons Program (DCAP).
(1) DeIense AIrborne ReconnaIssance Program (DARP).
(2) DeIense nteIIIgence Counterdrug Program (DCP).
(3) DeIense nteIIIgence Agency's TactIcaI Program (DATP).
(4) DeIense Space ReconnaIssance Program (DSRP).
(5) DeIense nteIIIgence SpecIaI TechnoIogy Program (DSTP).

Source: DOD DIrectIve 5205.9 ]oInt MIIItary nteIIIgence Program (]MP), AprII 7, 1995,
http:]]www.Ias.org]Irp]doddIr]dod]jmIp.htm and RIchard A. 8est, ]r. "nteIIIgence, SurveIIIance, and






242
ReconnaIssance (SR) Programs: ssues Ior Congress." CRS Report to Congress February 22, 2005,
http:]]www.Ias.org]sgp]crs]InteI]RL32508.pdI

]oInt ProtectIon EnterprIse Network (]PEN) ]oInt ProtectIon EnterprIse Network (]PEN) ]oInt ProtectIon EnterprIse Network (]PEN) ]oInt ProtectIon EnterprIse Network (]PEN)
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
1. System LocatIon : 8ooz-AIIen HamIIton, nc, 5201 Leesburg PIke, SuIte 400, FaIIs Church, VA
22041-3203.
CategorIes oI IndIvIduaIs covered by the system: CategorIes oI IndIvIduaIs covered by the system: CategorIes oI IndIvIduaIs covered by the system: CategorIes oI IndIvIduaIs covered by the system: Any IndIvIduaI, cIvIIIan or mIIItary, InvoIved In, wItnessIng
or suspected oI beIng InvoIved In or reportIng possIbIe crImInaI actIvIty aIIectIng the Interests, property,
and]or personneI on a DoD InstaIIatIon.
CategorIes oI records In the system: CategorIes oI records In the system: CategorIes oI records In the system: CategorIes oI records In the system: nvestIgatIve InIormatIon supportIng known or suspected suspIcIous
actIvIty and IncIdents at DoD InstaIIatIons. nIormatIon IncIudes subject's name, aIIases, SocIaI SecurIty
Number, address(es), teIephone number, date oI bIrth, drIver's IIcense number, passport number, IIcense
pIate number, vehIcIe descrIptIon, descrIptIon oI occupants, source oI InvestIgatIon, rIsk anaIysIs, threat
assessment, vIctIm names, names oI InIormants, names oI Iaw enIorcement oIIIcers and InvestIgators, and
subject's group aIIIIIatIons, II any.
RetentIon and dIsposaI: RetentIon and dIsposaI: RetentIon and dIsposaI: RetentIon and dIsposaI: DIsposItIon pendIng (untII the NatIonaI ArchIves and Records AdmInIstratIon
approves the retentIon and dIsposItIon oI these records, treat as permanent).
AuthorIty Ior maIntenance oI the system: AuthorIty Ior maIntenance oI the system: AuthorIty Ior maIntenance oI the system: AuthorIty Ior maIntenance oI the system: 10 U.S.C. 113, Secretary oI DeIense; 10 U.S.C. 3013, Secretary oI
the Army; 10 U.S.C. 8013, Secretary oI the AIr Force; 10 U.S.C. 5013, Secretary oI the Navy; SectIon 21,
nternaI SecurIty Act oI 1950 (Pub. L. 81-831); 40 U.S.C. 318, as deIegated by the AdmInIstrator, CeneraI
ServIces AdmInIstratIon, to the Deputy Secretary oI DeIense, September 1987, SpecIaI PoIIce; and E.O.
9397 (SSN).
Record source categorIes: Record source categorIes: Record source categorIes: Record source categorIes: Suspects, wItnesses, vIctIms, and other personneI, InIormants, varIous DoD,
IederaI, state, and IocaI InvestIgatIve agencIes, and any other IndIvIduaI or organIzatIon, whIch may suppIy
pertInent InIormatIon.
Source: FederaI RegIster September 26, 2003 VoIume 68 no. 187 pages 55593-55594.
http:]]www.gpoaccess.gov]Ir]search.htmI and DeIenseLNK
http:]]www.deIenseIInk.mII]prIvacy]notIces]js]]S008CSD.htmI
2. nIormatIon shared In ]PEN IncIudes reports oI suspected surveIIIance oI mIIItary IacIIItIes;
eIIcItatIon attempts and suspIcIous questIonIng; tests oI securIty; unusuaI repetItIve actIvItIes; bomb
threats; and other suspIcIous actIvIty. AddItIonaIIy, ]PEN can report IncIdents such as chemIcaI, bIoIogIcaI,
radIoIogIcaI, nucIear aIarms or aIerts; IIre and bomb expIosIons; vehIcIe turn-rounds; and Iorce protectIon
condItIons. The generaI noted USNORTHCOM pIans to expand ]PEN DoD-wIde wIthIn Its area oI
responsIbIIIty over the next two years.






243
Management oI the ]PEN system oIIIcIaIIy transIerred to USNORTHCOM Dec. 5. The command, whIch
decIared IuII operatIonaI capabIIIty oI Its homeIand deIense mIssIon Sept. 11, 2003, now has the
responsIbIIIty to make the ]PEN system operatIonaI across the natIon.

Source: NORTHCOM. "]PEN Shares AntIterrorIsm nIormatIon Across NatIon." March 3, 2004.
http:]]www.northcom.mII]News]2004]030304.htmI and DoD, nspector CeneraI Threat and LocaI
ObservatIon NotIce (TALON) Report Program AppendIx . Deputy C Ior nteIIIgence, ]une 20, 2006,
Memorandum, Report No. 07-1 NTEL-09 ]une 27,2007, http:]]www.Ias.org]Irp]agency]dod]taIon.pdI
]oInt PsychoIogIcaI OperatIons Task Force ]oInt PsychoIogIcaI OperatIons Task Force ]oInt PsychoIogIcaI OperatIons Task Force ]oInt PsychoIogIcaI OperatIons Task Force
See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons
Composed oI headquarters and operatIonaI assets. t assIsts the joInt Iorce commander In deveIopIng
strategIc, operatIonaI, and tactIcaI psychoIogIcaI operatIon pIans Ior a theater campaIgn or other
operatIons. MIssIon requIrements wIII determIne Its composItIon and assIgned or attached unIts to support
the joInt task Iorce commander. AIso caIIed ]POTF. (]P 1-02)
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

]oInt RegIonaI nIormatIon Exchange Sy ]oInt RegIonaI nIormatIon Exchange Sy ]oInt RegIonaI nIormatIon Exchange Sy ]oInt RegIonaI nIormatIon Exchange System (]RES) stem (]RES) stem (]RES) stem (]RES)
8egan as a pIIot project Ior the sharIng oI counterterrorIsm InIormatIon between IocaI
and state Iaw enIorcement and the Department oI DeIense (DOD). ]RES was
InItIated by the ]oInt nteIIIgence Task Force - CombatIng TerrorIsm (]TF-CT), Ied
by the DeIense nteIIIgence Agency (DA). The InItIaI partIcIpants IncIuded the New
York PoIIce Department CounterterrorIsm 8ureau (NYPD-CT8) and the CaIIIornIa
Department oI ]ustIce AntI-TerrorIsm nIormatIon Center (CATC). AIter
assessment oI the pIIot phase, ]RES became operatIonaI In February 2003. The
number oI partIcIpants has aIso grown to IncIude other munIcIpaIItIes, states, and
IederaI agencIes

Source: HaroId C. ReIyea and ]eIIrey W. SeIIert. "nIormatIon SharIng Ior HomeIand SecurIty: A 8rIeI
OvervIew." CRS Report to Congress ]anuary 10, 2005, http:]]www.Ias.org]sgp]crs]RL32597.pdI
] ]] ]oInt RegIonaI nteIIIgence Center oInt RegIonaI nteIIIgence Center oInt RegIonaI nteIIIgence Center oInt RegIonaI nteIIIgence Center


The ]oInt RegIonaI nteIIIgence Center, the IIrst such center In the natIon, opened Its doors Thursday to
heIp more than 2001 Iaw enIorcement agencIes coordInate theIr eIIorts to prevent terrorIst attacks.

More than 30 InteIIIgence anaIysts Irom the F8, the Los AngeIes PoIIce Department, the Los AngeIes
County SherIII's Department and other agencIes are aIready workIng out oI the NorwaIk IacIIIty. The center

45
How does the ]oInt RegIonaI nteIIIgence Center mesh wIth the ]TTF (]oInt TerrorIsm Task
Force)Z [See 8III oI RIghts DeIense CommIttee "]TTF FAQ," http:]]www.bordc.org]resources]jttI-Iaq.php ]






244
wIII serve as a hub Ior InIormatIon gatherIng, anaIysIs and sharIng among IederaI, state and IocaI Iaw
enIorcement oIIIcIaIs and saIety agencIes. The aIm oI the eIIort Is preventIng terrorIst attacks and
combatIng vIoIent crIme In Los AngeIes, Orange, Ventura, San 8ernardIno, RIversIde, Santa 8arbara and
San LuIs ObIspo countIes.
Source: AshIey SurdIn. "nteIIIgence Center Ior Los AngeIes RegIon 8egIns ts Work." Los AngeIes TImes ]uIy
28, 2006, http:]]www.IatImes.com]news]IocaI]Ia-me-homeIand28juI28,0,1741923.storyZcoII=Ia-home-
headIInes
]oInt WorIdwIde nteIIIgence CommunIcatIons System (]WCS) ]oInt WorIdwIde nteIIIgence CommunIcatIons System (]WCS) ]oInt WorIdwIde nteIIIgence CommunIcatIons System (]WCS) ]oInt WorIdwIde nteIIIgence CommunIcatIons System (]WCS)
See See See See nteIIIpedIa nteIIIpedIa nteIIIpedIa nteIIIpedIa
The sensItIve, compartmented InIormatIon portIon oI the DeIense nIormatIon Systems Network. t
Incorporates advanced networkIng technoIogIes that permIt poInt-to-poInt or muItIpoInt InIormatIon
exchange InvoIvIng voIce, text, graphIcs, data, and vIdeo teIeconIerencIng.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
]UNE Ma ]UNE Ma ]UNE Ma ]UNE MaI II II
n ]une 1949, Hoover approved the ]UNE maII procedure. Whenever reportIng InIormatIon obtaIned Irom
"hIghIy conIIdentIaI sources" (I.e., wIretaps, bugs, break-Ins, or maII openIngs) or Irom "the most sensItIve
sources, such as Covernors, secretarIes to hIgh oIIIcIaIs who may be dIscussIng such oIIIcIaIs and theIr
attItude," F8 agents were to captIon these reports "]UNE." Thus captIoned, these reports were to be routed
to the SpecIaI FIIe Room at F8 headquarters to be ''maIntaIned under Iock and key." Hoover suppIemented
these restrIctIons In ]uIy 1949 when IssuIng 8ureau 8uIIetIn number 34. Whenever uncoverIng InIormatIon
that "couId cause embarrassment to the 8ureau, II dIstrIbuted," agents were not to IncIude thIs InIormatIon
wIthIn the text oI theIr report but Instead "on admInIstratIve pages attached to the reguIar report."
OIIIcIaIs at F8 headquarters couId detach the admInIstratIve pages whenever the report was "dIstrIbuted
to agencIes outsIde the 8ureau"-and no one wouId know that InIormatIon was beIng wIthheId.
These reports were then to be maIntaIned separate Irom the F8's centraI records system In a SpecIaI FIIe
Room at the F8 headquarters In WashIngton, D.C. F8 DIrector WIIIIam Webster termInates the ]UNE MaII
procedure In November 1978.
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 31-
32, 368.

~K ~ ~K ~ ~K ~ ~K ~

Keystone PrIncIpIe oI CIassIIIcatIon Keystone PrIncIpIe oI CIassIIIcatIon Keystone PrIncIpIe oI CIassIIIcatIon Keystone PrIncIpIe oI CIassIIIcatIon






245
1. CompIIatIons oI uncIassIIIed InIormatIon to whIch the compIIer has added no substantIve
vaIue (I.e., no substantIve InIormatIon) shouId not be cIassIIIed. ThIs concIusIon Is based on a IundamentaI
prIncIpIe oI cIassIIIcatIon-that cIassIIIed InIormatIon cannot be compIeteIy subdIvIded Into separate,
uncIassIIIed components. DOE has stated thIs prIncIpIe as IoIIows:
nIormatIon that Is cIassIIIed under the AtomIc Energy Act must not be so subdIvIded that aII Its
components (IncIudIng contextuaI InIormatIon) are uncIassIIIed.
*

ThIs Is sometImes caIIed the keystone prIncIpIe oI cIassIIIcatIon. ThIs keystone prIncIpIe may be vIsuaIIzed
by consIderIng a cIassIIIed photograph or drawIng that has been subdIvIded Into many components (e.g.,
pIeces oI a puzzIe), each oI whIch reveaIs an Item oI InIormatIon. AccordIng to the keystone prIncIpIe oI
cIassIIIcatIon, not aII oI the components can be uncIassIIIed II the entIre entIty Is cIassIIIed. One or more
key pIeces must be cIassIIIed so that the entIre "pIcture" cannot be obtaIned when aII oI the uncIassIIIed
pIeces are assembIed. Thus, II IndIvIduaI Items oI InIormatIon are truIy uncIassIIIed (I.e., II no cIassIIIcatIon
error has been made), then assembIIng (compIIIng) the Items cannot reveaI cIassIIIed InIormatIon. [ThIs
ruIe Is stated In severaI DOE cIassIIIcatIon guIdes.]

Source: ArvIn S. QuIst. "CIassIIIcatIon oI CompIIatIons oI nIormatIon." SecurIty CIassIIIcatIon oI
nIormatIon. voIume 2, chapter 10. AprII 1993, http:]]www.Ias.org]sgp]IIbrary]quIst2]chap10.htmI

2. CIassIIIcatIon oI aII InIormatIon oI potentIaI use to proIIIerants or adversarIes Is ImpractIcaI and
poses an unwarranted burden on the IIow oI InIormatIon In a Iree socIety. ThereIore, a keystone approach,
whIch cIassIIIes the mInImum amount oI key InIormatIon, crItIcaI to the deveIopment and productIon oI
nucIear weapons, shaII be utIIIzed. (Proposed).

Source: Dr. PauI T. CunnIngham, ChaIr. "AppendIx C." Report oI the FundamentaI CIassIIIcatIon PoIIcy
RevIew Croup Report oI the NucIear MaterIaIs ProductIon WorkIng Croup. ]anuary 15, 1997,
http:]]www.Ias.org]sgp]IIbrary]app-g.htmI

KnowIedge KnowIedge KnowIedge KnowIedge
n the context oI the cognItIve hIerarchy, InIormatIon anaIyzed to provIde meanIng and vaIue or evaIuated
as to ImpIIcatIons Ior the operatIon.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

KnowIedge Management KnowIedge Management KnowIedge Management KnowIedge Management
1. The art oI creatIng, organIzIng, appIyIng, and transIerrIng knowIedge to IacIIItate sItuatIonaI
understandIng and decIsIonmakIng. KnowIedge management supports ImprovIng organIzatIonaI IearnIng,
InnovatIon, and perIormance. KnowIedge management processes ensure that knowIedge products and
servIces are reIevant, accurate, tImeIy, and useabIe to commanders and decIsIonmakers. (FM 3-0)







246
Source: Department oI the Army, "KnowIedge Management SectIon," U.S. Army FIeId ManuaI 6-01.1,
August 29, 2008, http:]]www.Ias.org]Irp]doddIr]army]Im6-01-1.pdI

2. KnowIedge Management Is a set oI management practIces whIch has been recentIy Iorged out
oI the combInatIon oI organIzatIon studIes, InIormatIon scIence and management practIce. WhIIe
KnowIedge Management Is stIII new as a reIerence dIscIpIIne, It has aIready estabIIshed a IormaI posItIon
In the worIds oI management and academIa.

Source: FederaI KnowIedge Management nItIatIve, "PreIImInary Roadmap," FederaI KM WorkIng Croup,
February, 2009, http:]]wIkI.nasa.gov]cm]wIkI]ZId=6251#gen31

~ L ~ ~ L ~ ~ L ~ ~ L ~
Latest TIme nIormatIon Is oI VaIue Latest TIme nIormatIon Is oI VaIue Latest TIme nIormatIon Is oI VaIue Latest TIme nIormatIon Is oI VaIue
The tIme by whIch an InteIIIgence organIzatIon or staII must deIIver InIormatIon to the requester In order
to provIde decIsIonmakers wIth tImeIy InteIIIgence. ThIs must IncIude the tIme antIcIpated Ior processIng
and dIssemInatIng that InIormatIon, as weII as Ior makIng the decIsIon.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIcatIon Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIcatIon Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIcatIon Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIcatIon
A subset oI the NatIonaI nIormatIon Exchange ModeI (NEM) - was deveIoped to serve as an "Interpreter"
between dIIIerent Iaw enIorcement systems, enabIIng partIcIpants on one system to obtaIn resuIts Irom
others In a IamIIIar Iormat.
At the FederaI IeveI, the F8's Law EnIorcement On-IIne (LEO) system has provIded a protected means Ior
sharIng SensItIve 8ut UncIassIIIed (S8U) data wIth regIonaI Iaw enIorcement (LE) agency partners through a
project orIgInaIIy known as RegIonaI Data Exchange (R-DEx) and subsequentIy adopted by the Department
oI ]ustIce (DO]) Ior aII oI Its components and renamed OneDO]. UsIng LEO, DO] Is IntegratIng the OneDO]
regIonaI partnershIps wIth a new Law EnIorcement NatIonaI Data Exchange (N-DEx) program under the F8
CrImInaI ]ustIce nIormatIon ServIces (C]S) DIvIsIon. n addItIon, DO] supports sIx RegIonaI nIormatIon
SharIng System (RSS) Network centers that provIde taIIored support Ior specIaIIzed LE IunctIons to meet
regIonaI needs
The LESP Exchange SpecIIIcatIon (LEXS) deIInes a common Iormat In whIch Iaw enIorcement data can be
shared. The most commonIy used eIements Iorm the IoundatIon upon whIch practItIoners can buIId
specIaIIzed extensIons to suIt IndIvIduaI communItIes. LEXS 3.1 Is based on NEM 2.0.

Source: ]ustIce Standards CIearInghouse mpIementatIon,
http:]]It.ojp.gov]deIauIt.aspxZarea=ImpIementatIonAssIstance&page=1017&standard=486






247
Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIc Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIc Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIc Law EnIorcement nIormatIon SharIng Program (LESP) Exchange SpecIIIcatIon (LEXS) atIon (LEXS) atIon (LEXS) atIon (LEXS)
A subset oI the NatIonaI nIormatIon Exchange ModeI (NEM)- was deveIoped to serve as an "Interpreter"
between dIIIerent Iaw enIorcement systems, enabIIng partIcIpants on one system to obtaIn resuIts Irom
others In a IamIIIar Iormat.
Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

Law EnIorcement SensItIve Law EnIorcement SensItIve Law EnIorcement SensItIve Law EnIorcement SensItIve
See ControIIed UncIassIIIed nIormatIon See ControIIed UncIassIIIed nIormatIon See ControIIed UncIassIIIed nIormatIon See ControIIed UncIassIIIed nIormatIon
UncIassIIIed but shouId not be dIssemInated beyond Iaw enIorcement cIrcIes; provIdes more detaIIed
InIormatIon about potentIaI suspects that wouId be InapproprIate to pubIIcIze. The F8 Is "movIng away
Irom S8U to Its own LES." t Is not cIear II LES Is aIso a type oI cIearance (p.164 n.184 & p.85 n.118).

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004.
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404, DO], Law EnIorcement nteIIIgence CIassIIIcatIons,
Products and DIssemInatIon, November 23, 2004,
http:]]www.cops.usdoj.gov]pdI]e09042536Chapter06.pdI and "CapItoI PoIIce papers Iound on street,"
WashIngton TImes December 7, 2009,
http:]]www.washIngtontImes.com]news]2009]dec]07]capItoI-poIIce-papers-Iound-on-street-corner]

Leak Leak Leak Leak
1. A dIscIosure oI InIormatIon that has been cIassIIIed under EO 10501.

Source: NARA. EIsenhower EO 10501, November 5, 1953 "SaIeguardIng OIIIcIaI nIormatIon In the
nterests oI the DeIense oI the UnIted States,"
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1953-eIsenhower.htmI

2. AdmInIstratIve Leak. UnauthorIzed dIscIosure oI admInIstratIve matters (Part V; 4d)
CIassIIIed nIormatIon SecurIty Leak. DeIIberatIve dIscIosures oI cIassIIIed InIormatIon (Part 8.)

Source: CharIes CooIIdge, ChaIrman. Report to the Secretary oI DeIense by the CommIttee on CIassIIIed
nIormatIon. Department oI DeIense. November 8, 1956
46

http:]]www.thememoryhoIe.org]IoI]cooIIdge.htm; Ior an InterestIng dIscussIon on Ieaks, see Rep. ]ohn E.
Moss, SpecIaI SubcommIttee on Covernment nIormatIon, and Mr. CooIIdge, In UnIted States. Congress.
House. CommIttee on Covernment OperatIons. SpecIaI SubcommIttee on Covernment nIormatIon.
AvaIIabIIIty oI nIormatIon Irom FederaI Departments and AgencIes. (Part 8. Department oI DeIense.
HearIngs beIore the UnIted States House CommIttee on Covernment OperatIons, SpecIaI SubcommIttee on

46
The CooIIdge CommIttee aIso recommended In 8c. agencIes "gIve reasons Ior cIassIIIcatIon
whenever possIbIe when requests Ior InIormatIon are denIed."






248
Covernment nIormatIon, EIghty-FIIth Congress, IIrst sessIon, on Mar. 11, 12, 1957. . . . WashIngton: CPO,
1957, SUDOC: Y4.C 74]7: N3]pt.8).

3. CoIned In the earIy twentIeth century, was appIIed to Inadvertent sIIps In whIch InIormatIon was
pIcked up by reporters. The words quIckIy acquIred a broader, more actIve meetIng: any caIcuIated reIease
oI InIormatIon to reporters wIth the stIpuIatIon that the source remaIns unIdentIIIed.

Source: RIchard KIeIbowIcz. "Leaks to the Press as a CommunIcatIon wIthIn and between OrganIzatIons."
Newspaper Research ]ournaI 1 no. 2 (1979]1980): 53-58 and UnIted States. Congress. Senate. CommIttee
on the ]udIcIary. ExamInIng DO]'s InvestIgatIon oI journaIIsts who pubIIsh cIassIIIed InIormatIon: Iessons
Irom the ]ack Anderson case: hearIng beIore the CommIttee on the ]udIcIary, UnIted States Senate, One
Hundred NInth Congress, second sessIon, ]une 6, 2006. WashIngton: U.S. C.P.O., 2007,
http:]]www.Ias.org]Irp]congress]2006hr]journaIIsts.htmI

4. Hess: TypoIogy oI Leaks:
Ego Leak: CIvIng InIormatIon prImarIIy to satIsIy a sense oI seII.
CoodwIII Leak: nIormatIon oIIered to "accumuIate credIt" as a pIay Ior a Iuture Iavor.
PoIIcy Leak: A straIghtIorward pItch Ior or agaInst a proposaI usIng some document or InsIder
InIormatIon as the Iure to get more attentIon than mIght be otherwIse justIIIed. The Ieak oI the Pentagon
Papers IaIIs Into thIs category.
AnImus Leak: Used to settIe grudges; InIormatIon Is reIeased In order to cause embarrassment to
another person.
TrIaI-8aIIoon Leak: ReveaIIng a proposaI that Is under consIderatIon In order to assess Its assets
and IIabIIItIes. UsuaIIy proponents have too much Invested In a proposaI to wan to Ieave It to the vagarIes
oI the press and pubIIc opInIon. More IIkeIy, those who send up a trIaI baIIoon want to see It shot down,
and because It Is easIer to generate opposItIon to aImost anythIng than to buIId support, thIs Is the most
IIkeIy eIIect.
WhIstIebIower Leak: UsuaIIy used by career personneI; goIng to the press may be the Iast resort oI
Irustrated cIvII servants who IeeI they cannot resoIve theIr dIspute through admInIstratIve channeIs. Hess
Is careIuI to poInt out that WhIstIebIowIng Is not synonymous wIth IeakIng.

Source: Stephen Hess. The Covernment]Press ConnectIon: Press OIIIcers and theIr OIIIces. WashIngton,
D.C.: 8rookIngs nstItutIon, 1984. 77-79; aIso see ]ohn Dean's "8ush's UnoIIIcIaI OIIIcIaI Secrets Act: How
the ]ustIce Department Has Pushed to CrImInaIIze The DIscIosure oI Non-SecurIty ReIated Covernment
nIormatIon." http:]]wrIt.news.IIndIaw.com]dean]20030926.htmI

5. UnauthorIzed dIscIosures oI cIassIIIed InIormatIon; a communIcatIon or physIcaI transIer oI
InIormatIon to an unauthorIzed recIpIent.
Source: Department oI DeIense. DoD DIrectIve 5210.50 ]uIy 22, 2005, "UnauthorIzed DIscIosure oI
CIassIIIed nIormatIon to the PubIIc." http:]]www.Ias.org]Irp]DoDdIr]DoD]d521050.pdI ; Secretary oI
DeIense DonaId RumsIeId "The mpact oI LeakIng CIassIIIed nIormatIon" memo ]uIy 12, 2002.






249
http:]]IoI.mIssourI.edu]whIstIebIowIng]ImpactoIIeakIng.pdI ; and Dave Eberhart. "CA Expert: Leaks oI
CIassIIIed nIormatIon Must Stop." ]uIy 27, 2002. (thIs artIcIe reported ]ames 8. 8ruce, vIce chaIrman oI the
DN]CA's ForeIgn DenIaI and DeceptIon CommIttee, statement that "We've got to do whatever It takes - II
It takes sendIng SWAT teams Into journaIIsts' homes - to stop these Ieaks." Story archIved at The Memory
HoIe, http:]]www.thememoryhoIe.org]cIa-swat-journaIIsts.htm)
6. UnauthorIzed dIscIosures oI cIassIIIed InIormatIon. As one oI the prImary bodIes Intended to
conduct oversIght oI InteIIIgence actIvItIes on behaII oI the AmerIcan peopIe, we are mIndIuI oI the need
Ior ongoIng and thorough revIew oI such actIvItIes. However, the deIIcate baIance between protectIng
natIonaI securIty and saIeguardIng cIvII IIbertIes must be carrIed out In a manner that IuIIy protects both
Interests, through mechanIsms such as reguIar reportIng to the congressIonaI InteIIIgence commIttees and
the use oI the nteIIIgence CommunIty WhIstIebIower ProtectIon Act. 8y deIInItIon, no IndIvIduaI--whether
a journaIIst, government oIIIcIaI, or InteIIIgence communIty empIoyee--can or shouId sIngIehandedIy
presume to determIne what InIormatIon `deserves' to be wIthheId Irom dIscIosure In order to protect
natIonaI securIty, especIaIIy wIthout IuII knowIedge oI the surroundIng context.
Source: House nteIIIgence CommIttee report on the FY 2007 nteIIIgence
AuthorIzatIon Act. FAS, http:]]www.Ias.org]Irp]congress]2006rpt]hrpt109-411.htmI
7. (U) NSA]CSS shaII IdentIIy unauthorIzed medIa dIscIosures oI cIassIIIed NSA]CSS InIormatIon. n
accordance wIth the procedures and responsIbIIItIes outIIned beIow, sIgnIIIcant medIa dIscIosures oI
NSA]CSS cIassIIIed InIormatIon shaII be communIcated to NSA]CSS organIzatIons, the Department oI
DeIense (DoD), the DIrector oI NatIonaI nteIIIgence (DN), and the Department oI ]ustIce (Do]).
(U) The determInatIon that an unauthorIzed dIscIosure quaIIIIes as a sIgnIIIcant unauthorIzed
dIscIosure shaII be made by the OIIIce oI PoIIcy and Records (D.C.3) and the OIIIce oI CeneraI CounseI
(D2). OrganIzatIons wIth purvIew over dIscIosed InIormatIon shaII not make thIs determInatIon.
(U]]FOUO) nIormatIon assocIated wIth an unauthorIzed medIa dIscIosure shaII be cIassIIIed at the
IeveI oI the dIscIosure. UntII an actuaI cIassIIIcatIon IeveI has been determIned, reIerences to potentIaI
unauthorIzed dIscIosures shaII be protected as cIassIIIed.
(U]]FOUO) ndIcatIons or assessments oI potentIaI damage resuItIng Irom an unauthorIzed
dIscIosure shaII not be reIeasabIe to IoreIgn countrIes or InternatIonaI organIzatIons unIess specIIIcaIIy
dIrected otherwIse by the DIrector, NSA]ChIeI, CSS (DRNSA]CHCSS) or the DIrector oI PoIIcy and Records.
nIormatIon regardIng unauthorIzed dIscIosures oI InteIIIgence InIormatIon shaII be marked as NOFORN,
and transmIttaI oI any InIormatIon regardIng unauthorIzed dIscIosures shaII empIoy specIaI protectIons
(e.g., encryptIon).
Source: NSA]CSS. "ReportIng UnauthorIzed MedIa DIscIosures oI CIassIIIed NSA]CSS
nIormatIon." NSA]CSS PoIIcy 1-27, 20 March 2006, http:]]www.Ias.org]Irp]nsa]unauthorIzed.htmI






250
8. t shouId be noted that some hIgh rankIng oIIIcIaIs erroneousIy beIIeve they have the
authorIty to Ieak cIassIIIed InIormatIon In Iurtherance oI government poIIcy. Such
dIscIosures may onIy be made by persons wIth decIassIIIcatIon authorIty under ExecutIve
Order 12065 or otherwIse Irom the PresIdent. WIthout such authorIty, "IrIendIy" Ieaks are just as unIawIuI
as any other unauthorIzed dIscIosure oI cIassIIIed InIormatIon.
Source: Report oI the nterdepartmentaI Croup on UnauthorIzed DIscIosures oI CIassIIIed nIormatIon" (the
"WIIIard" Report), March 31, 1982, http:]]www.Ias.org]sgp]IIbrary]wIIIard.pdI
9. n a momentous expansIon oI the government's authorIty to reguIate
pubIIc dIscIosure oI natIonaI securIty InIormatIon, a IederaI court ruIed that even prIvate cItIzens who do
not hoId securIty cIearances can be prosecuted Ior unauthorIzed receIpt and dIscIosure oI cIassIIIed
InIormatIon.

The August 9 (2006) ruIIng by ]udge T.S. EIIIs, , denIed a motIon to dIsmIss the case oI two Iormer
empIoyees oI the AmerIcan sraeI PubIIc AIIaIrs CommIttee (APAC) who were charged under the EspIonage
Act wIth IIIegaIIy receIvIng and transmIttIng cIassIIIed InIormatIon.
Source: FAS, Secrecy News, August 10, 2006, http:]]www.Ias.org]sgp]jud]rosen080906.pdI
and http:]]www.Ias.org]bIog]secrecy]2006]08]recIpIentsoIIeaksmaybepro.htmI
Leak AnxIety Leak AnxIety Leak AnxIety Leak AnxIety
No IormaI deIInItIon, but mentIoned In the Secrecy News artIcIe "DIscIosure oI TSA ManuaI StIrs Leak
AnxIety," on the reIease oI a "sensItIve" TSA passenger screenIng manuaI and correspondIng congressIonaI
InquIrIes regardIng TSA's poIIcy on Inadvertent dIscIosures and Ieak oI agency InIormatIon to
nongovernmentaI bIogs and Web sItes.
Source: FAS, "DIscIosure oI TSA ManuaI StIrs Leak AnxIety," Secrecy News December 10, 2009,
http:]]www.Ias.org]bIog]secrecy]2009]12]IeakanxIety.htmI.
LeveragIng LeveragIng LeveragIng LeveragIng
n InIormatIon operatIons, the eIIectIve use oI InIormatIon, InIormatIon systems, and technoIogy to
Increase the means and synergy In accompIIshIng InIormatIon operatIons strategy
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

LIbrary Awareness Program LIbrary Awareness Program LIbrary Awareness Program LIbrary Awareness Program
AIthough Its F8 code name remaIns secret (FoersteI 1991: 176), detaIIs oI the program were IIrst brought
to natIonaI promInence In a September 18, 1987 Iront page story In the New York TImes. From 1973 untII
the Iate 1980s, the F8 conducted a secret surveIIIance program wIthIn AmerIca's uncIassIIIed scIentIIIc
IIbrarIes, IncIudIng both pubIIc and unIversIty IIbrarIes. That program, known as the LIbrary Awareness






251
Program, had two goaIs: To restrIct access by IoreIgn natIonaIs, partIcuIarIy SovIet and East Europeans,
to uncIassIIIed scIentIIIc InIormatIon, and to recruIt IIbrarIans to report on any "IoreIgners" usIng AmerIca's
uncIassIIIed scIentIIIc IIbrarIes.
The LIbrary Awareness Program seems reIated to the notorIous NSDD-145 "to encourage, advIse, assIst
the prIvate sector" In protectIng "sensItIve non-government InIormatIon" (FoersteI 1991: 178)
Source: Herbert N. FoersteI. "Secrecy In ScIence; Remarks." March 29, 1999.
http:]]www.aaas.org]spp]secrecy]Presents]IoersteI.htm and hIs SurveIIIance In the Stacks: the F8's
LIbrary Awareness Program. New York: Creenwood Press, 1991.
LImIted Access AuthorIzatIon (LAA) LImIted Access AuthorIzatIon (LAA) LImIted Access AuthorIzatIon (LAA) LImIted Access AuthorIzatIon (LAA)
SecurIty access authorIzatIon to CONFDENTAL or SECRET InIormatIon granted to non-U.S. cItIzens
requIrIng such IImIted access In the course oI theIr reguIar dutIes.

Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006.
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

LImIted OIIIcIaI Use nIormatIon (LOU) LImIted OIIIcIaI Use nIormatIon (LOU) LImIted OIIIcIaI Use nIormatIon (LOU) LImIted OIIIcIaI Use nIormatIon (LOU)
1. Term used to desIgnate uncIassIIIed InIormatIon oI a sensItIve, proprIetary, or personaIIy
prIvate nature that must be protected agaInst reIease to unauthorIzed IndIvIduaIs.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. UncIassIIIed InIormatIon oI a sensItIve, proprIetary, or personaIIy prIvate nature whIch must be
protected agaInst reIease to unauthorIzed IndIvIduaIs. nIormatIon must not be desIgnated LImIted
OIIIcIaI Use to conceaI IneIIIcIency. mIsdeeds or mIsmanagement.

SensItIve uncIassIIIed InIormatIon "shaII be IdentIIIed" as LImIted OIIIcIaI Use InIormatIon. CategorIes oI
LOU:
nIormant and wItness InIormatIon
Crand ]ury InIormatIon
nvestIgatIve InIormatIon
nIormatIon that couId be soId Ior proIIt
PersonaI InIormatIon whIch IaIIs subject to the PrIvacy Act oI 1974
Reports that dIscIose securIty vuInerabIIItIes

Source: U.S. Department oI ]ustIce Order 2620.7, September 2, 1987 and U.S. Department oI ]ustIce.
UnIted States MarshaIs ServIce. OIIIce oI nspectIons. nternaI SecurIty DIvIsIon. nIormatIon SecurIty.
WashIngton D.C.: 1991. SUDOC: ] 25.2: n 3






252

Low 2 nIormatIon Low 2 nIormatIon Low 2 nIormatIon Low 2 nIormatIon
nternaI matters oI a reIatIveIy trIvIaI nature; records that "are reIated soIeIy to the InternaI personneI ruIes
and practIces oI an agency."

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]exemptIon2.htm#Iow2

~ M ~ ~ M ~ ~ M ~ ~ M ~
MagIc L MagIc L MagIc L MagIc Lantern antern antern antern
1. MagIc Lantern can be remoteIy InstaIIed on a computer vIa e-maII contaInIng a vIrus dIsguIsed
as a harmIess computer IIIe, known as a "Trojan horse" program, or through other common vuInerabIIItIes
hackers use to break Into computers, Keystrokes recorded by MagIc Lantern can be stored to be seIzed
Iater In a raId or even transmItted back to the F8 over the nternet.
Source: Center Ior Democracy and TechnoIogy (CDT). "DIgItaI Search and SeIzure: UpdatIng PrIvacy
ProtectIons to Keep Pace wIth TechnoIogy". February 2006, http:]]www.cdt.org]pubIIcatIons]dIgItaI-
search-and-seIzure.pdI
2. Under the "sneak and peek" provIsIon oI the USA PatrIot Act, pushed through Congress by ]ohn
AshcroIt, the F8, wIth a warrant, can break Into your home and oIIIce when you're not there and, on the
IIrst trIp, Iook around. They can examIne your hard drIve, snatch IIIes, and pIant the MagIc Lantern on
your computer. t's aIso known as the "snIIIer keystroke Iogger." Once InstaIIed, the MagIc Lantern creates
a record oI every tIme you press a key on the computer. t's aII saved In pIaIn text, and durIng the F8's
next secret vIsIt to your home or oIIIce, that InIormatIon Is downIoaded as the agents aIso pIck up
whatever other records and papers they IInd oI Interest.
Source: Nat HentoII. "The F8's MagIc Lantern:AshcroIt couId be In Your Computer," VIIIage VoIce May 24,
2002, http:]]www.vIIIagevoIce.com]news]0222,hentoII,35142,6.htmI
Mandatory DecIassIIIcatIon RevIew (MDR) Mandatory DecIassIIIcatIon RevIew (MDR) Mandatory DecIassIIIcatIon RevIew (MDR) Mandatory DecIassIIIcatIon RevIew (MDR)
1. RevIew Ior possIbIe decIassIIIcatIon perIormed In response to a request receIved Irom an
organIzatIon or an IndIvIduaI.

Source: DeIense nteIIIgence Agency. OIIIce oI SecurIty and CounterInteIIIgence, PoIIcy and SecurIty
Awareness 8ranch. Desk ReIerence CuIde to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon. AprII 2004.







253
2. MDR Is a means by whIch any IndIvIduaI can request an agency to revIew a cIassIIIed record
Ior decIassIIIcatIon, regardIess oI Its age or orIgIn, subject to certaIn IImItatIons set Iorth In E.O. 12958, as
amended.

Source: nIormatIon SecurIty OversIght OIIIce. 2005 Report to the PresIdent.,
http:]]www.archIves.gov]Isoo]reports]

MaskIng MaskIng MaskIng MaskIng
MaskIng Is the other specIaI type oI cIassIIIcatIon and Is the act oI cIassIIyIng one pIece oI InIormatIon
soIeIy to protect a separate Item oI InIormatIon.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

MaterIaI MaterIaI MaterIaI MaterIaI
An data regardIess oI physIcaI Iorm or characterIstIc, IncIudIng wrItten or prInted matter, automated
InIormatIon system storage medIa, maps, charts, paIntIngs, drawIngs, IIIm, photographs, engravIngs,
sketches, workIng notes, papers, reproductIons oI any such thIngs by any means or process, and sound,
voIce, magnetIc or eIectronIc recordIngs.

Source: War and NatIonaI DeIense. 50 U.S.C. 15 Subchapter V 435a
http:]]www.gpoaccess.gov]uscode]browse.htmI, and the Permanent House SeIect CommIttee on
nteIIIgence. S. 2507 "To authorIze approprIatIons Ior IIscaI year 2001 Ior InteIIIgence and InteIIIgence-
reIated actIvItIes oI the UnIted States Covernment, the CommunIty Management Account, and the CentraI
nteIIIgence Agency RetIrement and DIsabIIIty System, and Ior other purposes."
http:]]www.Ias.org]Irp]congress]2000rpt]s2507.htmI

MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI MatrIx (MuItIstate AntI- -- -TerrorIsm nIormatIon Exchange TerrorIsm nIormatIon Exchange TerrorIsm nIormatIon Exchange TerrorIsm nIormatIon Exchange) )) )
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
MatrIx was operated by the data-aggregator company SeIsInt ("provIder oI InIormatIon management
products"), purchased by LexIs NexIs In September 2004. MatrIx database InIormatIon IncIuded
commercIaI and government InIormatIon such as vehIcuIar records, proIessIonaI and huntIng IIcenses,
voter roIIs, and court records, avaIIabIe to Iaw enIorcement oIIIcIaIs to track potentIaI terrorIst actIvIty.

DIscontInued In AprII 2005, MatrIx Is currentIy beIng dIscussed In FIorIda wIth pIans to enIarge the scope
oI InIormatIon to IInancIaI and Insurance records.

Source: ACLU. "Feature on MATRX." http:]]www.acIu.org]PrIvacy]PrIvacy.cImZD=14240&c=130 and Ryan
SIngeI. "FIorIda PIannIng Son oI MatrIx." WIred AprII 25, 2005,
http:]]www.wIred.com]news]prIvacy]0,1848,67313,00.htmI and ]eIIrey W. SeIIert, " , " , " , "Data MInIng and
HomeIand SecurIty: An OvervIew" "" " Updated ]anuary 18, 2007,
http:]]opencrs.com]document]RL31798]2007-01-18






254

MedI MedI MedI MedIa aa a
Any prInt, eIectronIc, or broadcast outIet (IncIudIng bIogs) where InIormatIon Is made avaIIabIe to the
generaI pubIIc.

Source: NSA]CSS. "ReportIng UnauthorIzed MedIa DIscIosures oI CIassIIIed NSA]CSS
nIormatIon." NSA]CSS PoIIcy 1-27, 20 March 2006, http:]]www.Ias.org]Irp]nsa]unauthorIzed.htmI
MedIa Embed MedIa Embed MedIa Embed MedIa Embed
2. C. A medIa embed Is deIIned as a medIa representatIve remaInIng wIth a unIt on an extended basIs -
perhaps a perIod oI weeks or even months. (2)
3. 8 WIthout makIng commItments to medIa organIzatIons, depIoyIng unIts wIII IdentIIy IocaI medIa Ior
potentIaI embeds and nomInate them through PA ChanneIs. (3).
6. A. MedIa products wIII not be subject to securIty revIew or censorshIp except as IndIcated In Para. 6.
A.1. SecurIty at the source wIII be the ruIe. U.S. mIIItary personneI shaII protect cIassIIIed InIormatIon Irom
unauthorIzed or Inadvertent dIscIosure. (11)
6.A.1 The nature oI the embeddIng process may InvoIve observatIon oI sensItIve InIormatIon, IncIudIng
troop movements, battIe preparatIons, materIeI capabIIItIes and vuInerabIIItIes and other InIormatIon as
IIsted In Para 4.C. When a commander or hIs]her desIgnated representatIve has reason to beIIeve that a
medIa member wIII have access to thIs type oI sensItIve InIormatIon, prIor to aIIowIng such access, he]she
wIII take prudent precautIons to ensure the securIty oI that InIormatIon.
What InIormatIon Is sensItIve and what the parameters are Ior coverIng thIs type oI InIormatIon I medIa
are InadvertentIy exposed to sensItIve InIormatIon they shouId be brIeIed aIter exposure on what
InIormatIon they shouId avoId coverIng. (11-12)
Source: PubIIc AIIaIrs CuIdance (PAC) on EmbeddIng MedIa DurIng PossIbIe Future
OperatIons]depIoyments In the U.S. CentraI Command (CENTCOM) Area oI ResponsIbIIIty (AOR). February
2003, http:]]www.deIenseIInk.mII]news]Feb2003]d20030228pag.pdI

Metadata Metadata Metadata Metadata
1. Data descrIbIng stored data about data; that Is, data descrIbIng the structure, data eIements,
InterreIatIonshIps, and other characterIstIcs oI eIectronIc records.

Source: DoD. 5015.2-STD. "DesIgn CrIterIa Standard Ior EIectronIc Records Management SoItware
AppIIcatIons." http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]50152std061902]p50152s.pdI

2. nIormatIon about InIormatIon; more specIIIcaIIy, InIormatIon about the meanIng oI other data.







255
Source: DoD.The Department oI DeIense DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

METT METT METT METT- -- -TC TC TC TC
A memory aId used In two contexts: (1) n the context oI InIormatIon management, the major subject
categorIes Into whIch reIevant InIormatIon Is grouped Ior mIIItary operatIons: mIssIon, enemy, terraIn and
weather, troops and support avaIIabIe, tIme avaIIabIe, cIvII consIderatIons. (2) n the context oI tactIcs, the
major Iactors consIdered durIng mIssIon anaIysIs. [Note: the MarIne Corps uses METT-T: mIssIon, enemy,
terraIn and weather, troops and support avaIIabIe-tIme avaIIabIe.]

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

MIdnIght ReguIatIons MIdnIght ReguIatIons MIdnIght ReguIatIons MIdnIght ReguIatIons
The 8ush admInIstratIon dIsputed news reports oI heIghtened reguIatory actIvIty In Its IInaI months.
"There's no great Increase In the number oI reguIatIons that we're revIewIng rIght now," WhIte House
spokesman Tony Fratto toId the press October 31 about the OIIIce oI Management and 8udget's
customary revIew oI agencIes' sIgnIIIcant reguIatIons.1
n Iact, OM8's OIIIce oI nIormatIon and ReguIatory AIIaIrs, or ORA, approved 157 IInaI ruIes Irom
September 1, 2008, to December 31, 2008, accordIng to RegnIo.gov. ORA approved onIy 83 IInaI ruIes
durIng the same perIod In 2007; 92 In 2006; and 81 In 2005.

ThIs Increased output Is not uncommon. Most admInIstratIons pump out a stream oI new reguIatIons at
the end oI a presIdent's term. These reguIatIons are dIsparagIngIy caIIed "mIdnIght" reguIatIons. 8ut not
aII mIdnIght reguIatIons are created equaI. (See AppendIx).

Source: Reece RushIng, RIck MeIberth, and Matt MadIa, AIter MIdnIght: The 8ush Legacy oI DereguIatIon
and What Obama Can Do, ]anuary 2009, Center Ior AmerIcan Progress and OM8Watch,
http:]]www.amerIcanprogress.org]Issues]2009]01]aItermIdnIght.htmI
MIIItary AnaIyst Program MIIItary AnaIyst Program MIIItary AnaIyst Program MIIItary AnaIyst Program
The Pentagon mIIItary anaIyst program was Iaunched In earIy 2002 by then-AssIstant Secretary oI DeIense
Ior PubIIc AIIaIrs VIctorIa CIarke. The Idea was to recruIt "key InIIuentIaIs" to heIp seII a wary pubIIc on "a
possIbIe raq InvasIon." Former N8C mIIItary anaIyst Kenneth AIIard caIIed the eIIort "psyops on steroIds."

Source: SourceWatch, "Pentagon mIIItary anaIysts program,"
http:]]www.sourcewatch.org]Index.phpZtItIe=PentagonmIIItaryanaIystprogram, 8ryan WhItman,
"Pentagon used psychoIogIcaI operatIon on US pubIIc, documents show," Raw Story
http:]]rawstory.com]2009]09]bryan-whItman-part-1] and DOD ReadIng Room, "MIIItary AnaIyst
Program", http:]]www.dod.mII]pubs]IoI]mIIanaIysts]







256
MIIItary DeceptIon MIIItary DeceptIon MIIItary DeceptIon MIIItary DeceptIon
See DeceptIon See DeceptIon See DeceptIon See DeceptIon
ActIons executed to deIIberateIy mIsIead adversary mIIItary decIsIon makers as to IrIendIy mIIItary
capabIIItIes, IntentIons, and operatIons, thereby causIng the adversary to take specIIIc actIons (or
InactIons) that wIII contrIbute to the accompIIshment oI the IrIendIy mIssIon. The IIve categorIes oI mIIItary
deceptIon are as IoIIows.

a. StrategIc mIIItary deceptIon--MIIItary deceptIon pIanned and executed by and In support oI senIor
mIIItary commanders to resuIt In adversary mIIItary poIIcIes and actIons that support the orIgInator's
strategIc mIIItary objectIves, poIIcIes, and operatIons.

b. OperatIonaI mIIItary deceptIon--MIIItary deceptIon pIanned and executed by and In support oI
operatIonaI-IeveI commanders to resuIt In adversary actIons that are IavorabIe to the orIgInator's
objectIves and operatIons. OperatIonaI mIIItary deceptIon Is pIanned and conducted In a theater to support
campaIgns and major operatIons.

c. TactIcaI mIIItary deceptIon--MIIItary deceptIon pIanned and executed by and In support oI tactIcaI
commanders to resuIt In adversary actIons that are IavorabIe to the orIgInator's objectIves and operatIons.
TactIcaI mIIItary deceptIon Is pIanned and conducted to support battIes and engagements.

d. ServIce mIIItary deceptIon--MIIItary deceptIon pIanned and executed by the ServIces that pertaIn to
ServIce support to joInt operatIons. ServIce mIIItary deceptIon Is desIgned to protect and enhance the
combat capabIIItIes oI ServIce Iorces and systems.

e. MIIItary deceptIon In support oI operatIons securIty (OPSEC)--MIIItary deceptIon pIanned and executed
by and In support oI aII IeveIs oI command to support the preventIon oI the Inadvertent compromIse oI
sensItIve or cIassIIIed actIvItIes, capabIIItIes, or IntentIons. DeceptIve OPSEC measures are desIgned to
dIstract IoreIgn InteIIIgence away Irom, or provIde cover Ior, mIIItary operatIons and actIvItIes.

Source: DoD. DoD DIctIonary oI MIIItary and AssocIated Terms. ]oInt PubIIcatIon 1-02.As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]; DoD. MIIItary DeceptIon. ]oInt
PubIIcatIon 3-13.4 (FormerIy ]P 3-58) ]uIy 13, 2006,
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp3134.pdI and CIay WIIson. "nIormatIon OperatIons and
Cyberwar: CapabIIItIes and ReIated PoIIcy ssues." CRS Report to Congress Updated September 14, 2006,
http:]]www.Ias.org]sgp]crs]natsec]RL31787.pdI

MIIItary nIormatIon FunctIon MIIItary nIormatIon FunctIon MIIItary nIormatIon FunctIon MIIItary nIormatIon FunctIon
Any InIormatIon IunctIon supportIng and enhancIng the empIoyment oI mIIItary Iorces.

Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995.
[See the Wayback MachIne, http:]]tInyurI.com]ydvgypI ]







257
MIIItary nteIIIgence 8oard MIIItary nteIIIgence 8oard MIIItary nteIIIgence 8oard MIIItary nteIIIgence 8oard (M8) (M8) (M8) (M8)
A decIsIonmakIng Iorum whIch IormuIates DeIense InteIIIgence poIIcy and programmIng prIorItIes. The
MIIItary nteIIIgence 8oard, chaIred by the DIrector, DeIense nteIIIgence Agency, who Is duaI-hatted as
DIrector oI MIIItary nteIIIgence, consIsts oI senIor mIIItary and cIvIIIan InteIIIgence oIIIcIaIs oI each ServIce,
US Coast Cuard, each Combat Support Agency, the ]oInt StaII]]-2]]-6, Deputy AssIstant Secretary oI
DeIense (nteIIIgence), nteIIIgence Program Support Croup, DA's DIrectorates Ior nteIIIgence ProductIon,
nteIIIgence OperatIons, and nIormatIon and ServIces, and the combatant command ]-2s.

Source: Department oI DeIense. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As Amended
through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

MIIItary nteIIIgence ntegrated Data System]ntegrated Database (MDS) MIIItary nteIIIgence ntegrated Data System]ntegrated Database (MDS) MIIItary nteIIIgence ntegrated Data System]ntegrated Database (MDS) MIIItary nteIIIgence ntegrated Data System]ntegrated Database (MDS)
An archItecture Ior ImprovIng the manner In whIch mIIItary InteIIIgence Is anaIyzed, stored, and
dIssemInated. The ntegrated Database (D8) Iorms the core automated database Ior the MIIItary
nteIIIgence ntegrated Data System (MDS) program and Integrates the data In the InstaIIatIon, order oI
battIe, equIpment, and seIected eIectronIc warIare and command, controI, and communIcatIons IIIes. The
D8 Is the natIonaI-IeveI reposItory Ior the generaI mIIItary InteIIIgence InIormatIon avaIIabIe to the entIre
Department oI DeIense nteIIIgence nIormatIon System communIty and maIntaIned by DA and the
commands.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

MIIItary SecurIty MIIItary SecurIty MIIItary SecurIty MIIItary SecurIty
DenIaI to the enemy durIng such tIme as It can be useIuI to hIm oI aII knowIedge, that In the opInIon oI
the authorIty responsIbIe Ior such mIIItary securIty wouId beneIIt hIm materIaIIy.

Source: LouIs NIcot RIdenour. "MIIItary SecurIty & the AtomIc 8omb." Fortune November (1945): 32, 170-
171, 216, 218, 221, 223.

MIIItary SensemakIng SensemakIng MIIItary SensemakIng SensemakIng MIIItary SensemakIng SensemakIng MIIItary SensemakIng SensemakIng
1. SensemakIng Is a reIatIveIy new concept that has IargeIy been assocIated wIth WeIck (1995) and
hIs work In organIzatIonaI behavIor. SensemakIng reIers to the set oI processes InvoIved In tryIng to
Improve one's understandIng oI a sItuatIon, oIten In response to surprIse. (p. I)

Source: WInston R. SIeck, et aI, FOCUS: A ModeI oI SensemakIng, TechnIcaI Report 1200 May 2007,
http:]]stInet.dtIc.mII]cgI-bIn]CetTRDocZAD=A469770&LocatIon=U2&doc=CetTRDoc.pdI; aIso see Per-
Arne Persson and ]ames M. Nyce, TechnoIogy and SensemakIng In the Modern MIIItary OrganIzatIon, 7
th

CCRTS 2002, http:]]www.dodccrp.org]events]7thCCRTS]Tracks]Track3.htm (scroII down Ior artIcIe)
SensemakIng SymposIum, October 23-25, 2001,
http:]]www.dodccrp.org]events]2001sensemakIngsymposIum]Day1.htm and Command and ControI
Research Program, OIIIce oI the AssIstant Secretary oI DeIense






258
Ior Command, ControI, CommunIcatIons and nteIIIgence FInaI Report SensemakIng SymposIum,
October 23-25, 2001, http:]]www.au.aI.mII]au]awc]awcgate]ccrp]sensemakIngIInaIreport.pdI

2. SensemakIng Is the current buzz word In dIscussIons oI C2, havIng succeeded sItuatIonaI
awareness (SA) as everybody's IavorIte concept.[11] As a consequence, sensemakIng has come to acquIre
a varIety oI meanIngs but It seems now to be used most oIten wIth Its everyday, commonsense meanIng
(wIth aII the outdated phIIosophIcaI baggage that thIs ImpIIes) rather than wIth Its orIgInaI technIcaI
meanIng Introduced by WeIck (1995) as what peopIe do In order to decIde how to act In the sItuatIons they
encounter. ThIs has made the concept Iess useIuI than It couId have been.

n the DOODA concept, we IoIIow WeIck (1995) and deIIne sensemakIng as the IunctIon that produces an
understandIng oI the mIssIon In terms oI what needs to be done to accompIIsh It In the sItuatIon at hand.

Source: 8erndt 8rehmer, "UnderstandIng the FunctIons oI C2 s the Key to Progress," Command and
ControI Research Program 1 no. 1 (2007), http:]]www.dodccrp.org]htmI4]journaIv1n107.htmI

3. SensemakIng Is about such thIngs as pIacement oI Items Into Irameworks, comprehendIng,
redressIng surprIse, constructIng meanIng, InteractIng In pursuIt oI mutuaI understandIng, and patternIng.

Source: KarI E. WeIck, SensemakIng In OrganIzatIons, , , , Thousand Oaks: Sage PubIIcatIons, 1995: 6.

4. Sense-MakIng mandates the constructIon oI attrIbutes whIch capture aspects oI movement In
tIme-space bound moments to attrIbutes whIch attend In some way Sense-MakIng's centraI concepts:
tIme, space, movement, gap (p.154); Sense-MakIng, specIIIcaIIy through the use oI the Sense-MakIng
metaphor, mandates that attentIon be Iocused on the phenomenoIogIcaI horIzon oI the actor's worId - the
past (IncIudIng the hIstorIcaI past), the present, and the Iuture; as weII as the connectIons (verbIngs)
between past-present-Iuture (p. 155). Sense-MakIng Is varIousIy descrIbed as a metaphor and a
methodoIogy)

Source: 8renda DervIn, "Sense-MakIng's ]ourney Irom Metatheory to MethodoIogy to Method: An
ExampIe usIng nIormatIon SeekIng and Use as Research Focus," 8renda DervIn, LoIs Foreman-Wernet, and
ErIc Lauterbach (eds), Sense-makIng MethodoIogy Reader: SeIected WrItIngs oI 8renda DervIn. (CresskIII,
N]: Hampton Press, 2003: 133-164),
http:]]communIcatIon.sbs.ohIo-state.edu]sense-makIng]art]artabsdervIn03smjourney.htmI

5. The process by whIch IndIvIduaIs (or organIzatIons) create an understandIng so that they can
act In a prIncIpIed and InIormed manner. SensemakIng tasks oIten InvoIve searchIng Ior documents that
are reIevant Ior a purpose and then extractIng and reIormuIatIng InIormatIon so that It can be used. When
a sensemakIng task Is dIIIIcuIt, sensemakers usuaIIy empIoy externaI representatIons to store the
InIormatIon Ior repeated manIpuIatIon and vIsuaIIzatIon. SensemakIng tasks InherentIy InvoIve an
embodIment as an actor (or actors), an envIronment, Iorms oI knowIng, and ways to work wIth what Is






259
known. WorkIng can take dIIIerent Iorms -- such as IogIcaI, metaphorIcaI, physIcaI, or Image-based
reasonIng

Source: PARC (PaIo AIto Research Center) CIossary,
http:]]www2.parc.com]IstI]groups]hdI]sensemakIng]gIoss-Irame.htm

MIIItary SymboI MIIItary SymboI MIIItary SymboI MIIItary SymboI
A mIIItary symboI Is a graphIc representatIon oI unIts, equIpment, InstaIIatIons, controI measures, and
other eIements reIevant to mIIItary operatIons. As a part oI doctrIne, these symboIs provIde a common
vIsuaI Ianguage Ior aII users. StandardIzatIon oI mIIItary symboIs Is essentIaI II operatIonaI InIormatIon Is
to be passed among mIIItary unIts wIthout mIsunderstandIng.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
MIneIIeId Record MIneIIeId Record MIneIIeId Record MIneIIeId Record
A DoD and NATO term: A compIete wrItten record oI aII pertInent InIormatIon concernIng a mIneIIeId,
submItted on a standard Iorm by the oIIIcer In charge oI the IayIng operatIons.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

MInerva ConsortIa Project MInerva MInerva ConsortIa Project MInerva MInerva ConsortIa Project MInerva MInerva ConsortIa Project MInerva
See Human TerraIn System, Pr See Human TerraIn System, Pr See Human TerraIn System, Pr See Human TerraIn System, Project CameIot oject CameIot oject CameIot oject CameIot
1. WIth the MInerva InItIatIve, we envIsIon a consortIa oI unIversItIes that wIII promote research In
specIIIc areas. These consortIa couId aIso be reposItorIes oI open-source documentary archIves. The
Department oI DeIense, perhaps In conjunctIon wIth other government agencIes, couId provIde the
IundIng Ior these projects.

Let me be cIear that the key prIncIpIe oI aII components oI the MInerva ConsortIa wIII be compIete
openness and rIgId adherence to academIc Ireedom and IntegrIty. There wIII be no room Ior "sensItIve but
uncIassIIIed," or other such restrIctIons In thIs project. We are Interested In IurtherIng our knowIedge oI
these Issues and In soIIcItIng dIverse poInts oI vIew - regardIess oI whether those vIews are crItIcaI oI the
Department's eIIorts. Too many mIstakes have been made over the years because our government and
mIIItary dId not understand - or even seek to understand - the countrIes or cuItures we were deaIIng wIth.

Source: Robert Cates, Address to the AssocIatIon oI AmerIcan UnIversItIes, WashIngton, D.C., AprII 14,
2008, http:]]www.deIenseIInk.mII]speeches]speech.aspxZspeechId=1228

2. When research that couId be Iunded by neutraI cIvIIIan agencIes Is Instead Iunded by the
mIIItary, knowIedge Is subtIy mIIItarIzed and bent In the way a tree Is bent by a prevaIIIng wInd. The pubIIc






260
comes to accept that basIc academIc research on reIIgIon and vIoIence "beIongs" to the mIIItary;
schoIars who never saw themseIves as doIng mIIItary research now do; maybe they wonder II theIr access
to Iuture IundIng Is best secured by not crItIcIzIng U.S. IoreIgn poIIcy; a dIscIpIIne whose Independence
Irom mIIItary and corporate IundIng IueIed the kInd oI crItIcaI thInkIng a democracy needs Is now
compromIsed; and the prIorItIes oI the mIIItary Iurther deIIne the basIc terms oI pubIIc and academIc
debate.

Source: Hugh Custerson, "The U.S. mIIItary's quest to weaponIze cuIture," 8uIIetIn oI the AtomIc ScIentIsts
]une 20, 2008, http:]]www.thebuIIetIn.org]web-edItIon]coIumnIsts]hugh-gusterson]the-us-mIIItarys-
quest-to-weaponIze-cuIture

MIsInIormatIon MIsInIormatIon MIsInIormatIon MIsInIormatIon
See DIsInIormatIon See DIsInIormatIon See DIsInIormatIon See DIsInIormatIon
1. ncorrect InIormatIon Irom any source that Is reIeased Ior unknown reasons or to soIIcIt a
response or Interest Irom a non-poIItIcaI or non-mIIItary target.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
2. MIsInIormatIon reIers to IaIse or mIsIeadIng InIormatIon that Is spread unIntentIonaIIy. I one
unwIttIngIy spreads IaIse or mIsIeadIng InIormatIon, that Is mIsInIormatIon. OI course, many tImes It Is
ImpossIbIe to ascertaIn IntentIons, so It may not be cIear whether IaIse InIormatIon represents
dIsInIormatIon or mIsInIormatIon. MIsInIormatIon can be Iurther subdIvIded Into:

MedIa MIstakes MedIa MIstakes MedIa MIstakes MedIa MIstakes whIch happen IrequentIy gIven the pressure oI deadIInes and ImperIect knowIedge
Urban Legends Urban Legends Urban Legends Urban Legends -- Untrue storIes that are wIdeIy beIIeved because they speak to a wIdespread Iear, hope,
or other emotIon
ConspIracy TheorIes ConspIracy TheorIes ConspIracy TheorIes ConspIracy TheorIes -- 8eIIeI that powerIuI, evII hIdden Iorces are secretIy manIpuIatIng the course oI
worId events and hIstory.
Source: U.S. State Department. nternatIonaI nIormatIon Programs. "How to dentIIy MIsInIormatIon."
http:]]usInIo.state.gov]medIa]ArchIve]2005]]uI]27-595713.htmI [See the Wayback MachIne,
http:]]web.archIve.org]web]20080115092101]http:]]usInIo.state.gov]medIa]ArchIve]2005]]uI]27-
595713.htmI ]
3. The Second CIrcuIt U.S. Court oI AppeaIs recentIy ruIed that the U.S. EnvIronmentaI ProtectIon
Agency (EPA) Is not IIabIe Ior any harm resuItIng Irom theIr IntentIonaI mIsInIormatIon about aIr quaIIty
around the WorId Trade Center (WTC) sIte IoIIowIng the September 11 attacks. The IawsuIt, LombardI v.
WhItman, was IIIed by IIve emergency responders who worked at the WTC sIte wIthout adequate






261
saIeguards, In part because oI the mIsguIded assurances oI saIe aIr quaIIty. The AprII 19 court
decIsIon Iavors protectIng government IIabIIIty over the pubIIc's rIght to know about envIronmentaI rIsks
that couId compromIse theIr saIety.

Source: OM8Watch, "Court PIcks IIusIon oI SaIety over ProtectIng PubIIc," May 1, 2007,
http:]]www.ombwatch.org]artIcIe]artIcIevIew]3819]1]1ZTopIcD=1

MIssIon Creep MIssIon Creep MIssIon Creep MIssIon Creep
1. MIssIon creep Is one the IeadIng rIsks oI data mInIng cIted by cIvII IIbertarIans, and represents
how controI over one's InIormatIon can be a tenuous proposItIon. MIssIon creep reIers to the use oI data
Ior purposes other than that Ior whIch the data was orIgInaIIy coIIected. ThIs can occur regardIess oI
whether the data was provIded voIuntarIIy by the IndIvIduaI or was coIIected through other means.

Source: ]eIIrey W. SeIIert. "Data MInIng: An OvervIew." CRS Report Ior Congress ]anuary 27, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RS20748.pdI

2. n the decade oI the 1990s the term mIssIon creep became a buzzword. Even though Its precIse
meanIng Is uncertaIn, mIssIon creep InIIuences mIIItary operatIons on the poIIcy, operatIonaI, and tactIcaI
common deIInItIon produced a trump card that
IeveIs. ..One deIInItIon oI mIssIon creep Is derIved Irom sItuatIons In whIch the mIIItary moves Irom weII-
deIIned or achIevabIe mIssIons to III-deIIned or ImpossIbIe ones. ThIs ImpIIes settIng up Iorces Ior IaIIure
sInce mIssIons become unachIevabIe.

Source: Adam 8. SIegeI. "MIssIon Creep or MIssIon UnderstoodZ"
http:]]www.dtIc.mII]doctrIne]jeI]jIqpubs]1825.pdI

ModeI CounterterrorIsm nvestIgatIve Strategy (MCS) ModeI CounterterrorIsm nvestIgatIve Strategy (MCS) ModeI CounterterrorIsm nvestIgatIve Strategy (MCS) ModeI CounterterrorIsm nvestIgatIve Strategy (MCS)
On November 18, 2002 the ForeIgn nteIIIgence SurveIIIance Court oI RevIew Issued an opInIon approvIng
the nteIIIgence SharIng Procedures, thereby authorIzIng the F8 to share InIormatIon, IncIudIng FSA-
derIved InIormatIon, between our crImInaI and InteIIIgence InvestIgatIons. WIth thIs opInIon, we were
IInaIIy abIe to conduct our terrorIsm InvestIgatIons wIth the IuII use and coordInatIon oI our crImInaI and
InteIIIgence tooIs and personneI. (U)
To IormaIIze thIs merger oI InteIIIgence and crImInaI operatIons, we have abandoned the separate case
cIassIIIcatIons Ior "crImInaI" InternatIonaI terrorIsm InvestIgatIons (wIth the cIassIIIcatIon number 265) and
"InteIIIgence" InternatIonaI terrorIsm InvestIgatIons (cIassIIIcatIon number 199), and have consoIIdated
them Into a sIngIe cIassIIIcatIon Ior "InternatIonaI terrorIsm" (new cIassIIIcatIon number 315). ThIs
recIassIIIcatIon oIIIcIaIIy desIgnates an InternatIonaI terrorIsm InvestIgatIon as one that can empIoy
InteIIIgence tooIs as weII as crImInaI processes and procedures. n ]uIy 2003, we IormaIIzed thIs approach
In our ModeI CounterterrorIsm nvestIgatIve Strategy (MCS), whIch was Issued to aII IIeId oIIIces and has
been the subject oI extensIve IIeId traInIng. (U)






262
Source. Department oI ]ustIce. F8 Response to "A RevIew oI the F8's HandIIng oI nteIIIgence
nIormatIon PrIor to the September 11 Attacks." ]une 2005,
http:]]www.usdoj.gov]oIg]specIaI]0506]app3.htm and C8Snews.com "New F8 nteI RuIes Worry CrItIcs."
http:]]www.cbsnews.com]storIes]2003]12]13]terror]maIn588380.shtmI

ModernIzed ntegrated Database (MD8 ModernIzed ntegrated Database (MD8 ModernIzed ntegrated Database (MD8 ModernIzed ntegrated Database (MD8) )) )
The natIonaI IeveI reposItory Ior the generaI mIIItary InteIIIgence avaIIabIe to the entIre Department oI
DeIense nteIIIgence nIormatIon System communIty and, through CIobaI Command and ControI System
Integrated Imagery and InteIIIgence, to tactIcaI unIts. ThIs data Is maIntaIned and updated by the DeIense
nteIIIgence Agency. Commands and ServIces are deIegated responsIbIIIty to maIntaIn theIr portIon oI the
database. (]P 3-51)

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Modus OperandI Database Modus OperandI Database Modus OperandI Database Modus OperandI Database
See Da See Da See Da See Data MInIng ta MInIng ta MInIng ta MInIng
Department oI the AIr Force. s an InvestIgatIve tooI used to IdentIIy and track trends In crImInaI behavIor.
t IInks characterIstIcs oI crImes and provIdes detaIIs on crIme scenes and other crIme Iactors;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: No.

[Note Irom Maret Note Irom Maret Note Irom Maret Note Irom Maret, p.31 oI the CAO report: one expects a system oI thIs nature Irom Iet's say, DO], but the
AIr ForceZ s thIs a cIerIcaI error on CAO's partZ FOA researchers, heIp!]

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

MosaIc Theory MosaIc Theory MosaIc Theory MosaIc Theory
1. AIso termed compIIatIon theory. Under the Freedom oI nIormatIon Act, an agency Is requIred
to dIscIose any InIormatIon that does not IaII wIthIn one oI the FOA exemptIons. However, some
InIormatIon, whIIe seemIngIy Innocuous or suItabIe Ior pubIIc reIease on Its own, can be extremeIy
harmIuI when grouped wIth other InIormatIon. To provIde protectIon Irom pubIIc dIscIosure oI InIormatIon
that merIts protectIon because oI the context In whIch It Is presented, the courts have sanctIoned the use
oI the "mosaIc" or "compIIatIon" theory. The compIIatIon approach Is expIIcItIy recognIzed In ExecutIve
Order 12958, supra, whIch sets Iorth the standards Ior appIyIng compIIatIon In cIassIIyIng natIonaI
securIty InIormatIon.






263
CompIIatIons oI Items oI InIormatIon that are IndIvIduaIIy uncIassIIIed may be cIassIIIed II the
compIIed InIormatIon reveaIs an addItIonaI assocIatIon or reIatIonshIp that: (1) meets the standards Ior
cIassIIIcatIon under thIs order; and (2) Is not otherwIse reveaIed In the IndIvIduaI Items oI InIormatIon.
"CompIIatIon" means an aggregatIon oI pre-exIstIng uncIassIIIed Items oI InIormatIon. SectIon 1.7(e) oI
E.O. 12958, as amended by E.O. 13292 or March 25, 2003, 68 FR 15,315 (March 28, 2003).
The courts have appIIed the theory most commonIy In the natIonaI securIty area, where the courts have
repeatedIy stated that the "mosaIc-IIke nature oI InteIIIgence gatherIng" oIten changes the way an agency
wIII cIassIIy or protect InIormatIon that seems otherwIse Innocuous. SaIIsbury v. U.S., 690 F. 2d 966, 971
(D.C. CIr. 1982). However, Its use aIso has been routIneIy sanctIoned Ior wIthhoIdIng InIormatIon under
exemptIons other than ExemptIon 1. See, e.g., Dorsett v. Dept. oI Treasury, 307 F. Supp 2d 28 (D.D.C.
2004) (ExemptIon 2), HaIperIn v. CA, 629 F. 2d 144 (D.C. CIr. 1980) (ExemptIon 3); TImken Co. v. U.S.
Customs ServIce, 491 F. Supp 557 (D.D.C. 1980) (ExemptIon 4); Center Ior NatIonaI SecurIty StudIes v. U.S.
Department oI ]ustIce, 331 F. 3d 918 (D.C. CIr. 2003) (ExemptIon 7).
Source: NucIear ReguIatory CommIssIon. Task Force Report on PubIIc DIscIosure oI SecurIty-ReIated
nIormatIon. SECY-05-0091. May 18, 2005, http:]]www.Ias.org]sgp]othergov]nrc-dIsc.pdI
2. WIthIn the government these systems process and communIcate cIassIIIed natIonaI securIty
InIormatIon concernIng the vItaI Interests oI the UnIted States. Such InIormatIon, even II uncIassIIIed In
IsoIatIon, oIten can reveaI hIghIy cIassIIIed and other sensItIve InIormatIon when taken In aggregate. The
compromIse oI thIs serIous damage to the UnIted States and Its natIonaI securIty Interests.
Source: Reagan NatIonaI SecurIty DecIsIon DIrectIve Number 145. "NatIonaI PoIIcy on TeIecommunIcatIons
and Automated nIormatIon Systems SecurIty." http:]]www.Ias.org]Irp]oIIdocs]nsdd145.htm
3. DescrIbes a basIc precept oI InteIIIgence gatherIng. DIsparate Items oI InIormatIon, though
IndIvIduaIIy oI IImIted or no utIIIty to the possessor, can take on added sIgnIIIcance when combIned wIth
other Items oI InIormatIon. CombInIng the Items IIIumInates theIr InterreIatIonshIps and breeds anaIytIc
synergIes, so that the resuItIng mosaIc oI InIormatIon Is worth more than the sum oI Its parts. n the
context oI natIonaI securIty, the mosaIc theory suggests the potentIaI Ior an adversary to deduce Irom
IndependentIy Innocuous Iacts a strategIc vuInerabIIIty, expIoItabIe Ior maIevoIent ends.

Source: DavId Pozen. "The MosaIc Theory, NatIonaI SecurIty, and the Freedom oI nIormatIon Act." YaIe
Law ]ournaI 115 no. 3 (2005): 102, http:]]papers.ssrn.com]soI3]papers.cImZabstractId=820326

4. Even usIng the Covernment's theoretIcaI modeI oI a mosaIc, It must be acknowIedged that the
mosaIc theory Is onIy as persuasIve as the tIIes whIch compose It and the gIue whIch bInds them together
-- just as a brIck waII Is onIy as strong as the IndIvIduaI brIcks whIch support It and the cement that keeps
the brIcks In pIace. ThereIore, II the IndIvIduaI pIeces oI a mosaIc are InherentIy IIawed or do not IIt
together, then the mosaIc wIII spIIt apart, just as the brIck waII wIII coIIapse. A IInaI poInt must be kept In
mInd. One consequence oI usIng InteIIIgence reports and summarIes In IIeu oI dIrect evIdence Is that






264
certaIn questIons sImpIy cannot be answered, I.e., there are no [*16] wItnesses to cross-examIne or
deposItIon transcrIpts to consuIt. 4 SIzeabIe gaps may appear In the record and may weII remaIn unIIIIed;
each party wIII attempt to account Ior these deIIcIencIes by posItIng what they thInk are the most
compeIIIng IogIcaI InIerences to be drawn Irom the exIstIng evIdence. AccordIngIy, that exIstIng evIdence
must be weIghed and evaIuated as to Its strength, Its reIIabIIIty, and the degree to whIch It Is corroborated

Source: AII AII 8In AII Ahmed, et aI v. 8arack H. Obama, , et aI., Respondents, UnIted States DIstrIct Court
Ior the DIstrIct oI CoIumbIa, CIvII ActIon No. 05-1678, May 11, 2009; aIso see Andy WorthIngton, "]udge
Condemns 'MosaIc' oI Cuantanamo nteIIIgence and UnreIIabIe WItnesses," Common Dreams, May 14,
2009, http:]]www.commondreams.org]headIIne]2009]05]14-6

MuItIIeveI Mode MuItIIeveI Mode MuItIIeveI Mode MuItIIeveI Mode
NFOSEC (InIormatIon systems securIty) mode oI operatIon whereIn aII the IoIIowIng statements are
satIsIIed concernIng the users who have dIrect or IndIrect access to the system, Its perIpheraIs, remote
termInaIs, or remote hosts: a. some users do not have a vaIId securIty cIearance Ior aII the InIormatIon
processed In the S; b. aII users have the proper securIty cIearance and approprIate IormaI access approvaI
Ior that InIormatIon to whIch they have access; and c. aII users have a vaIId need-to-know onIy Ior
InIormatIon to whIch they have access.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
MuItInatIonaI ]oInt PsychoIogIcaI OperatIons Task Force MuItInatIonaI ]oInt PsychoIogIcaI OperatIons Task Force MuItInatIonaI ]oInt PsychoIogIcaI OperatIons Task Force MuItInatIonaI ]oInt PsychoIogIcaI OperatIons Task Force
See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons
A task Iorce composed oI PSYOP unIts Irom one or more IoreIgn countrIes Iormed to carry out a specIIIc
PSYOP mIssIon or prosecute PSYOP In support oI a theater campaIgn or other operatIon. The muItInatIonaI
joInt POTF may have conventIonaI non-PSYOP unIts assIgned or attached to support the conduct oI
specIIIc mIssIons

Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

MuItIpIe Sources MuItIpIe Sources MuItIpIe Sources MuItIpIe Sources
Two or more source documents, cIassIIIcatIon guIdes, or a combInatIon oI both.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI


~ N ~ ~ N ~ ~ N ~ ~ N ~

Named Area oI nterest Named Area oI nterest Named Area oI nterest Named Area oI nterest






265
The geographIcaI area where InIormatIon that wIII satIsIy a specIIIc InIormatIon requIrement can be
coIIected. Named areas oI Interest are usuaIIy seIected to capture IndIcatIons oI adversary courses oI
actIon, but aIso may be reIated to condItIons oI the battIespace.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

NatIonaI AppIIcatIons OIIIce NatIonaI AppIIcatIons OIIIce NatIonaI AppIIcatIons OIIIce NatIonaI AppIIcatIons OIIIce
1. The executIve agent to IacIIItate the use oI InteIIIgence communIty technoIogIcaI assets Ior cIvII,
homeIand securIty and Iaw enIorcement purposes wIthIn the UnIted States. The oIIIce wIII begIn InItIaI
operatIon by IaII 2007 and wIII buIId on the Iong-standIng work oI the CIvII AppIIcatIons CommIttee, whIch
was created In 1974 to IacIIItate the use oI the capabIIItIes oI the InteIIIgence communIty Ior cIvII, non-
deIense uses In the UnIted States

Source: DHS, NAO Factsheet, http:]]www.dhs.gov]xnews]reIeases]pr1187188414685.shtm, NAO
Charter, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88229]48.pdI , TIm Shorrock, " "" "8ush Coes PrIvate to
Spy on You" CorpWatch November 27, 2007, http:]]www.truthout.org]docs2006]120607M.shtmI
2. To provIde the Department oI HomeIand SecurIty and cIvII, state and IocaI emergency pIanners
wIth Imagery and data Irom sateIIItes run by the NatIonaI ReconnaIssance OIIIce and the NatIonaI
CeospatIaI nteIIIgence Agency.

Source: A8C News, http:]]abcnews.go.com]TheLaw]StoryZId=3567635&page=2

NatIonaI Asset Database NatIonaI Asset Database NatIonaI Asset Database NatIonaI Asset Database
See CrItIcaI nIrastructure nIormatIon See CrItIcaI nIrastructure nIormatIon See CrItIcaI nIrastructure nIormatIon See CrItIcaI nIrastructure nIormatIon
1. The USA PATROT Act oI 2001(P.L. 107-56) deIInes "crItIcaI InIrastructure" as: systems and
assets, whether physIcaI or vIrtuaI, so vItaI to the UnIted States that the IncapacIty or destructIon oI such
systems and assets wouId have a debIIItatIng Impact on securIty, natIonaI economIc securIty, natIonaI
pubIIc heaIth or saIety, or any combInatIon oI those matters" (Sec. 1016e). ThIs deIInItIon was adopted,
by reIerence, by the HomeIand SecurIty Act oI 2002 (P.L. 107-296, Sec. 2.4) estabIIshIng the Department
oI HomeIand SecurIty (DHS). The NatIonaI Strategy aIso adopts the deIInItIon oI "crItIcaI InIrastructure" In
P.L. 107-56, and provIdes the IoIIowIng IIst oI specIIIc InIrastructure sectors (and assets) IaIIIng under that
deIInItIon:

nIormatIon technoIogy TeIecommunIcatIons ChemIcaIs TransportatIon systems
Emergency servIces PostaI and shIppIng servIces AgrIcuIture and Iood PubIIc heaIth and heaIthcare
DrInkIng water- water treatment Energy 8ankIng and IInance NatIonaI monuments and Icons DeIense
IndustrIaI base Key Industry-technoIogy sItes and Large gatherIng sItes.







266
For exampIe, out oI 33,000 IndIvIduaI assets cataIoged In DHS's "natIonaI asset database," the agency
consIders onIy 1,700, or 5Z, to be natIonaIIy crItIcaI. The 33,000 assets In the DHS database themseIves
constItute onIy a subset oI aII assets In the crItIcaI InIrastructure sectors

Source: PauI W. ParIomak ."CuardIng AmerIca: SecurIty Cuards and U.S. CrItIcaI nIrastructure ProtectIon."
November 12, 2004. CRS Report to Congress http:]]www.Ias.org]sgp]crs]RL32670.pdI ; ]ohn D. MoteII.
"CrItIcaI nIrastructures: 8ackground, PoIIcy, and mpIementatIon." CRS Report to Congress AprII 18, 2006,
http:]]www.Ias.org]sgp]crs]homesec]RL30153.pdI and ]ohn MoteII. "CrItIcaI nIrastructure: the NatIonaI
Asset Database." CRS Report to Congress September 14, 2006,
http:]]www.Ias.org]sgp]crs]homesec]RL33648.pdI.

2. HomeIand SecurIty Department has stepped up assurances that It wIII maIntaIn the
conIIdentIaIIty oI crItIcaI InIrastructure InIormatIon submItted to the NatIonaI Asset Database, accordIng to
the newIy revIsed draIt NatIonaI nIrastructure ProtectIon PIan 8ase PIan versIon 2.0. DHS wIII evaIuate aII
requests to vIew the database and wIII grant access onIy to seIect DHS empIoyees and others on a "tIghtIy
controIIed, need-to-know" basIs, the revIsed pIan states.

Source: AIIce LIpowIcz. "DHS vows to protect InIo on natIonaI database." WashIngton TechnoIogy ]anuary
24, 2006, http:]]marc.InIo]ZI=Isn&m=113817222815165&w=2

3. The OIIIce oI nIrastructure ProtectIon (OP) In the Department oI HomeIand
SecurIty (DHS) has been deveIopIng and maIntaInIng a NatIonaI Asset Database.
The Database contaIns InIormatIon on over 77,000 IndIvIduaI assets, rangIng Irom
dams, hazardous materIaIs sItes, and nucIear power pIants to IocaI IestIvaIs, pettIng
zoos, and sportIng good stores.

Source: ]ohn MoteII, "CrItIcaI nIrastructure: The NatIonaI Asset Database," CRS Report to Congress,
Updated ]uIy 16, 2007, http:]]www.Ias.org]sgp]crs]homesec]RL33648.pdI

NatIonaI Cargo TrackIng PIan Cargo TrackIng NatIonaI Cargo TrackIng PIan Cargo TrackIng NatIonaI Cargo TrackIng PIan Cargo TrackIng NatIonaI Cargo TrackIng PIan Cargo TrackIng
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Department oI the Navy. s used to conduct predIctIve anaIysIs Ior counterterrorIsm, smaII weapons oI
mass destructIon proIIIeratIon, narcotIcs, aIIen smuggIIng, and other hIgh- Interest actIvItIes InvoIvIng
contaIner shIppIng actIvIty;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: No;
Features: PrIvate sector data: Yes;
Features: Other agency data: No.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI






267
NatIonaI CensorshIp NatIonaI CensorshIp NatIonaI CensorshIp NatIonaI CensorshIp
See CensorshIp See CensorshIp See CensorshIp See CensorshIp
The examInatIon and controI under cIvII authorIty oI communIcatIons enterIng, IeavIng, or transItIng the
borders oI the UnIted States, Its terrItorIes, or Its possessIons.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

NatIonaI CIandestIne ServIce (NCS) NatIonaI CIandestIne ServIce (NCS) NatIonaI CIandestIne ServIce (NCS) NatIonaI CIandestIne ServIce (NCS)
See HUMNT Manager, nteIIIgence nIormatIon See HUMNT Manager, nteIIIgence nIormatIon See HUMNT Manager, nteIIIgence nIormatIon See HUMNT Manager, nteIIIgence nIormatIon
WIthIn the CA to coordInate U.S. HUMNT (human InteIIIgence) eIIorts; Intended to make the CA DIrector
"natIonaI HUMNT manager" Ior aII IIIteen InteIIIgence agencIes. to Improve cooperatIon among the spy
agencIes, as weII as streamIIne the IIow oI InIormatIon to eIected oIIIcIaIs. The 9]11 CommIssIon ("Kean
CommIssIon") aIso recommended
The CA DIrector shouId emphasIze (a) rebuIIdIng the CA's anaIytIc capabIIItIes; (b) transIormIng the
cIandestIne servIce by buIIdIng Its human InteIIIgence capabIIItIes; (c) deveIopIng a stronger Ianguage
program, wIth hIgh standards and suIIIcIent IInancIaI IncentIves; (d) renewIng emphasIs on recruItIng
dIversIty among operatIons oIIIcers so they can bIend more easIIy In IoreIgn cItIes; (e) ensurIng a seamIess
reIatIonshIp between human source coIIectIon and sIgnaIs coIIectIon at the operatIonaI IeveI; and (I)
stressIng a better baIance between unIIateraI and IIaIson operatIons.
1 The NCS wIII serve as the natIonaI authorIty Ior coordInatIon, deconIIIctIon, and evaIuatIon oI
cIandestIne HUMNT operatIons across the nteIIIgence CommunIty, both abroad and InsIde the UnIted
States, consIstent wIth exIstIng Iaws, executIve orders, and Interagency agreements.

Source: NatIonaI CommIssIon on TerrorIst Attacks Upon the UnIted States. Chapter 13. http:]]www.9-
11commIssIon.gov]report]911ReportCh13.htm ; ]oInt nquIry StaII Statement ProposaIs Ior ReIorm
wIthIn the nteIIIgence CommunIty. October 3, 2002,
http:]]www.Ias.org]Irp]congress]2002hr]100302hIII.htmI; ]ohn 8. Roberts . Op-Ed. "ChInese MoIe Hunt
at CA." WashIngton TImes http:]]www.maII-archIve.com]osIntyahoogroups.com]msg15651.htmI ; DN
press reIease "EstabIIshment oI the NatIonaI CIandestIne ServIce (NCS)," October 13, 2005,
http:]]www.dnI.gov]pressreIeases]20051013reIease.htm, and CentraI nteIIIgence Agency Fact Sheet
"CreatIon oI the NatIonaI HUMNT Manager." October 13, 2005,
http:]]www.Ias.org]Irp]news]2005]10]dcIa101305Is.htmI

NatIonaI CounterterrorIsm Center NatIonaI CounterterrorIsm Center NatIonaI CounterterrorIsm Center NatIonaI CounterterrorIsm Center
See HomeIand SecurIty Data Network, FusIon Cente See HomeIand SecurIty Data Network, FusIon Cente See HomeIand SecurIty Data Network, FusIon Cente See HomeIand SecurIty Data Network, FusIon Centers rs rs rs
Through HSDN, IusIon center staII can access the NatIonaI CounterterrorIsm Center (NCTC), a cIassIIIed
portaI oI the most current terrorIsm-reIated InIormatIon







268
Source: DHS, http:]]www.dhs.gov]xInIoshare]programs]gc1156877184684.shtm, SE, AnnuaI Report
to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI, and http:]]www.nctc.gov]

NatIonaI CrIme nIormatIon Center NatIonaI CrIme nIormatIon Center NatIonaI CrIme nIormatIon Center NatIonaI CrIme nIormatIon Center (NCC) (NCC) (NCC) (NCC)
A natIonwIde InIormatIon system dedIcated to servIng and supportIng crImInaI justIce agencIes -- IocaI,
state, and IederaI -- In theIr mIssIon to uphoId the Iaw and protect the pubIIc. NCC 2000 serves crImInaI
justIce agencIes In aII 50 states, the DIstrIct oI CoIumbIa, the CommonweaIth oI Puerto RIco, the UnIted
States VIrgIn sIands, and Canada, as weII as IederaI agencIes wIth Iaw enIorcement mIssIons. NCC 2000
provIdes a major upgrade to those servIces provIded by NCC [NatIonaI CrIme nIormatIon Center], and
extends these servIces down to the patroI car and mobIIe oIIIcer.

NCC 2000's addItIonaI capabIIItIes IncIude Enhanced Name Search: Enhanced Name Search: Enhanced Name Search: Enhanced Name Search: Uses the New York State dentIIIcatIon
and nteIIIgence System (NYSS); FIngerprInt Searches: FIngerprInt Searches: FIngerprInt Searches: FIngerprInt Searches: Stores and searches the rIght Index IIngerprInt.
Search InquIrIes compare the prInt to aII IIngerprInt data on IIIe (wanted persons and mIssIng
persons);ProbatIon]ParoIe: ProbatIon]ParoIe: ProbatIon]ParoIe: ProbatIon]ParoIe: ConvIcted Persons or SupervIsed ReIease FIIe contaIns records oI subjects
under supervIsed reIease; nIormatIon LInkIng: nIormatIon LInkIng: nIormatIon LInkIng: nIormatIon LInkIng: Connects two or more records so that an InquIry on one
retrIeves the other record(s); Mugshots: Mugshots: Mugshots: Mugshots: One mugshot per person record may be entered In NCC 2000;
ConvIcted Sex OIIender RegIstry: ConvIcted Sex OIIender RegIstry: ConvIcted Sex OIIender RegIstry: ConvIcted Sex OIIender RegIstry: ContaIns records oI IndIvIduaIs who are convIcted sexuaI oIIenders or
vIoIent sexuaI predators; SENTRY FIIe: SENTRY FIIe: SENTRY FIIe: SENTRY FIIe: An Index oI IndIvIduaIs Incarcerated In the IederaI prIson system;
DeIayed nquIry: DeIayed nquIry: DeIayed nquIry: DeIayed nquIry: Every record entered or modIIIed Is checked agaInst the InquIry Iog. ProvIdes the enterIng
and InquIrIng agency wIth a response II any other agency InquIred on the subject In the Iast IIve days, and
On On On On- -- -IIne Ad IIne Ad IIne Ad IIne Ad- -- -hoc nquIry: hoc nquIry: hoc nquIry: hoc nquIry: A IIexIbIe technIque that aIIows users to search the actIve databases and access
the system's hIstorIcaI data.
Source: FederaI 8ureau oI nvestIgatIon. CrImInaI ]ustIce nIormatIon System. F8 NatIonaI CrIme
nIormatIon Center, http:]]www.IbI.gov]hq]cjIsd]ncIc.htm

NatIonaI DecIassIIIcatIon nItIatIve NatIonaI DecIassIIIcatIon nItIatIve NatIonaI DecIassIIIcatIon nItIatIve NatIonaI DecIassIIIcatIon nItIatIve
ThIs program was conceIved In response to an AprII 2006 audIt report by the nIormatIon SecurIty
OversIght OIIIce (SOO) entItIed "WIthdrawaI oI Records Irom PubIIc Access at the NatIonaI ArchIves and
Records AdmInIstratIon Ior CIassIIIcatIon Purposes."
Source: NARA, press reIease, September 6, 2007, http:]]www.archIves.gov]press]press-
reIeases]2006]nr06-137.htmI
NatIonaI DNA ndex System NatIonaI DNA ndex System NatIonaI DNA ndex System NatIonaI DNA ndex System (DNS) (DNS) (DNS) (DNS)
NatIonaI DNA ndex System (NDS) Is a system oI DNA proIIIe records Input by crImInaI justIce agencIes
(IncIudIng state and IocaI Iaw enIorcement agencIes). The CombIned DNA ndex System (CODS) Is the
automated DNA InIormatIon processIng and teIecommunIcatIon system that supports NDS. Pursuant to
the DNA dentIIIcatIon Act oI 1994 (DNA Act), certaIn categorIes oI InIormatIon must be coIIected: 1) DNA
IdentIIIcatIon records oI persons convIcted oI crImes; 2) AnaIyses oI DNA sampIes recovered Irom crIme
scenes; 3) AnaIyses oI DNA sampIes recovered Irom unIdentIIIed human remaIns; 4) AnaIyses oI DNA






269
sampIes voIuntarIIy contrIbuted Irom reIatIves oI mIssIng persons; and 5) known reIerence sampIe
Irom mIssIng persons. At state and IocaI IeveIs, In addItIon to the above specImen categorIes, state Iaw
determInes what categorIes oI specImens and what oIIenses may be IncIuded In the database. NDS does
not retaIn InIormatIon that wouId aIIow the NDS CustodIan to personaIIy IdentIIy the record by name or
other personaI IdentIIIer. ndIvIduaIs seekIng to revIew theIr records are dIrected to contact the FederaI,
State, or IocaI authorIty that receIved the DNA sampIe to obtaIn InstructIons on how to access theIr
records. DNA proIIIes are stored eIectronIcaIIy and searched Ior possIbIe matches.

Source: Department oI ]ustIce]FederaI 8ureau oI nvestIgatIon, F8 PA, February 24, 2004,
http:]]IoIa.IbI.gov]ndIspIa.htm and CODS, F8, http:]]www.IbI.gov]hq]Iab]codIs]natIonaI.htm

NatIonaI ForeIgn nteIIIgence 8oard NatIonaI ForeIgn nteIIIgence 8oard NatIonaI ForeIgn nteIIIgence 8oard NatIonaI ForeIgn nteIIIgence 8oard (NF8) (NF8) (NF8) (NF8)
See Nat See Nat See Nat See NatIonaI nteIIIgence 8oard, UnIted States nteIIIgence 8oard IonaI nteIIIgence 8oard, UnIted States nteIIIgence 8oard IonaI nteIIIgence 8oard, UnIted States nteIIIgence 8oard IonaI nteIIIgence 8oard, UnIted States nteIIIgence 8oard
NF8 wIII serve as the senIor nteIIIgence CommunIty advIsory InstrumentaIIty to the DIrector oI CentraI
nteIIIgence (DC) on the substantIve aspects oI natIonaI InteIIIgence. NF8 wIII advIse the DC on:
a. ProductIon, revIew, and coordInatIon oI natIonaI IoreIgn InteIIIgence; b. nteragency exchanges
oI IoreIgn InteIIIgence InIormatIon; c. SharIng oI CommunIty InteIIIgence products wIth IoreIgn
governments; d. ProtectIon oI InteIIIgence sources and methods; e. ActIvItIes oI common concern;
I. Such other matters as may be reIerred to It by the DC.

Source: DIrector oI CentraI nteIIIgence DIrectIve 3]1. ]anuary 14, 1997,
http:]]www.Ias.org]Irp]oIIdocs]dcId3-1.htmI
NatIonaI ForeIgn nteIIIgence Program (NFP) NatIonaI ForeIgn nteIIIgence Program (NFP) NatIonaI ForeIgn nteIIIgence Program (NFP) NatIonaI ForeIgn nteIIIgence Program (NFP)
See NatIonaI nteIIIgence Program See NatIonaI nteIIIgence Program See NatIonaI nteIIIgence Program See NatIonaI nteIIIgence Program
The [Iormer] term "NatIonaI ForeIgn nteIIIgence Program" reIers to aII programs, projects, and actIvItIes oI
the InteIIIgence communIty, as weII as any other programs oI the InteIIIgence communIty desIgnated
joIntIy by the DIrector oI CentraI nteIIIgence and the head oI a UnIted States department or agency or by
the PresIdent. Such term does not IncIude programs, projects, or actIvItIes oI the mIIItary departments to
acquIre InteIIIgence soIeIy Ior the pIannIng and conduct oI tactIcaI mIIItary operatIons by UnIted States
Armed Forces.
Source: 50 U.S.C. 401a (6)) http:]]www.Iaw.corneII.edu]uscode] and ExecutIve Order 12333,
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1981-reagan.htmI
NatIonaI Crou NatIonaI Crou NatIonaI Crou NatIonaI Cround nteIIIgence Center nd nteIIIgence Center nd nteIIIgence Center nd nteIIIgence Center
PremIer InteIIIgence anaIysIs organIzatIon In DoD.
ProvIdIng contInuous InteIIIgence on IoreIgn ground Iorces Ior the warIIghter and supportIng
decIsIonmakers.
...From anaIytIc products that ensure U.S. Iorces and theIr aIIIes wIII aIways have a decIsIve edge In
equIpment, organIzatIon, and traInIng on any Iuture battIeIIeId...






270
...To on-the-spot InteIIIgence Ior the IIght...
...To provIdIng InIormatIon that aIIects poIIcy decIsIons at aII IeveIs.
n an organIzatIonaI envIronment oI trust, respect, and communIcatIons dedIcated to seIIIess servIce Ior
the natIon.
Source: U.S. Army [See the Wayback MachIne,
http:]]web.archIve.org]web]20061001024440]http:]]avenue.org]ngIc]VIsIon.htmI ]

NatIonaI HIstorIcaI PubIIcatIons and Records CommIssIon NatIonaI HIstorIcaI PubIIcatIons and Records CommIssIon NatIonaI HIstorIcaI PubIIcatIons and Records CommIssIon NatIonaI HIstorIcaI PubIIcatIons and Records CommIssIon
A statutory body aIIIIIated wIth the NatIonaI ArchIves and Records AdmInIstratIon (NARA), supports a wIde
range oI actIvItIes to preserve, pubIIsh, and encourage the use oI documentary sources, created In every
medIum rangIng Irom quIII pen to computer, reIatIng to the hIstory oI the UnIted States.

Source: NARA, "About NHPRC," http:]]www.archIves.gov]nhprc]about]

NatIonaI NatIonaI NatIonaI NatIonaI ndustrIaI SecurIty Program (NSP) ndustrIaI SecurIty Program (NSP) ndustrIaI SecurIty Program (NSP) ndustrIaI SecurIty Program (NSP)
EstabIIshed by ExecutIve Order 12829, ]anuary 6 1993, "NatIonaI ndustrIaI SecurIty Program" Ior the
protectIon oI InIormatIon cIassIIIed pursuant to ExecutIve Order 12958, AprII 17, 1995, "CIassIIIed
NatIonaI SecurIty nIormatIon," or Its successor or predecessor orders, and the AtomIc Energy Act oI 1954,
as amended.

The NatIonaI SecurIty CouncII Is responsIbIe Ior provIdIng poIIcy dIrectIon Ior the NSP. The Secretary oI
DeIense has been desIgnated ExecutIve Agent Ior the NSP by the PresIdent. The DIrector, nIormatIon
SecurIty OversIght OIIIce (SOO) Is responsIbIe Ior ImpIementIng and monItorIng the NSP and Ior IssuIng
ImpIementIng bIndIng agency dIrectIves. The NSP OperatIng ManuaI outIInes guIdance Ior IacIIIty
cIearances, cIassIIIcatIon and markIng. Among the goaIs oI NSP are: AchIevIng unIIormIty In securIty
procedures; (2) ImpIementIng the recIprocIty prIncIpIe In securIty procedures, partIcuIarIy wIth regard to
IacIIIty and personneI cIearances; (3) eIImInatIng dupIIcatIve or unnecessary requIrements; and (4)
achIevIng reductIons In securIty costs

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995. http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm and SOO. Report on the
mpIementatIon oI the NatIonaI ndustrIaI SecurIty Program. ]uIy 31, 1997,
http:]]www.Ias.org]sgp]Isoo]nIsprept.htmI

NatIonaI ndustrIaI SecurIty Program OperatIng NatIonaI ndustrIaI SecurIty Program OperatIng NatIonaI ndustrIaI SecurIty Program OperatIng NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM; DoD 5220.22-M)
1. ]oInt Department oI DeIense, Department oI Energy, U.S. NucIear ReguIatory CommIssIon and
CentraI nteIIIgence Agency IndustrIaI and personneI securIty reguIatory manuaI; NSPOM repIaces
Department oI DeIense ndustrIaI SecurIty ManuaI Ior SaIeguardIng CIassIIIed nIormatIon, ]anuary 1991.
NSPOM deIInes access, cIassIIIcatIon and markIng ruIes Ior contractors.







271
Source: NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM).
http:]]www.Ias.org]sgp]IIbrary]nIspom]Ioreword.htm and
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

2. The nIormatIon SecurIty OversIght OIIIce (SOO), NatIonaI ArchIves and Records
AdmInIstratIon (NARA), Is pubIIshIng thIs DIrectIve as a proposed ruIe and pursuant to sectIon 102(b) (1)
oI ExecutIve Order 12829, as amended, reIatIng to the NatIonaI ndustrIaI SecurIty Program. ThIs order
estabIIshes a NatIonaI ndustrIaI SecurIty Program (NSP) to saIeguard FederaI Covernment cIassIIIed
InIormatIon that Is reIeased to contractors, IIcensees, and grantees oI the UnIted States Covernment.
Redundant, overIappIng, or unnecessary requIrements Impede those Interests. ThereIore, the NSP serves
as the sIngIe, Integrated, cohesIve IndustrIaI securIty program to protect cIassIIIed InIormatIon and to
preserve our NatIon's economIc and technoIogIcaI Interests. ThIs DIrectIve sets Iorth guIdance to agencIes
to set unIIorm standards throughout the NSP that promote these objectIves.

Source: SOO. "NatIonaI ndustrIaI SecurIty Program DIrectIve No.1." 32 CFR Part 2004 (Fed RegIster ]anuary
27, 2006), http:]]www.gpoaccess.gov]Ir]Index.htmI

NatIonaI nIormatIon nIrastructure (N) NatIonaI nIormatIon nIrastructure (N) NatIonaI nIormatIon nIrastructure (N) NatIonaI nIormatIon nIrastructure (N)
See DeIense nIormatIon See DeIense nIormatIon See DeIense nIormatIon See DeIense nIormatIon nIrastructure, CIobaI InIormatIon nIrastructure, nIormatIon nIrastructure, CIobaI InIormatIon nIrastructure, nIormatIon nIrastructure, CIobaI InIormatIon nIrastructure, nIormatIon nIrastructure, CIobaI InIormatIon nIrastructure, nIormatIon
1. NatIonwIde InterconnectIon oI communIcatIons networks, computers, databases, and consumer
eIectronIcs that make vast amount oI InIormatIon avaIIabIe to users. t IncIudes both pubIIc and prIvate
networks, the nternet, the pubIIc swItched network, and cabIe, wIreIess, and sateIIIte communIcatIons.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

2. The natIonwIde InterconnectIon oI communIcatIons networks, computers, databases, and
consumer eIectronIcs that make vast amounts oI InIormatIon avaIIabIe to users. The natIonaI InIormatIon
InIrastructure encompasses a wIde range oI equIpment, IncIudIng cameras, scanners, keyboards, IacsImIIe
machInes, computers, swItches, compact dIsks, vIdeo and audIo tape, cabIe, wIre, sateIIItes, IIber-optIc
transmIssIon IInes, networks oI aII types, teIevIsIons, monItors, prInters, and much more. The IrIendIy and
adversary personneI who make decIsIons and handIe the transmItted InIormatIon constItute a crItIcaI
component oI the natIonaI InIormatIon InIrastructure.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

NatIonaI nteIIIgence NatIonaI nteIIIgence NatIonaI nteIIIgence NatIonaI nteIIIgence
NatIonaI InteIIIgence' and `InteIIIgence reIated to the natIonaI securIty'--
(A) each reIer to InteIIIgence whIch pertaIns to the Interests oI more than one department or agency oI the
Covernment; and (8) do not reIer to counterInteIIIgence or Iaw enIorcement actIvItIes conducted by the






272
FederaI 8ureau oI nvestIgatIon except to the extent provIded Ior In procedures agreed to by the
NatIonaI nteIIIgence DIrector and the Attorney CeneraI, or otherwIse as expressIy provIded Ior In thIs tItIe.

Source: NatIonaI nteIIIgence ReIorm Act oI 2004,
http:]]thomas.Ioc.gov]cgI-bIn]query]FZc108:1:.]temp]~c108YCu9x6:e8145:

NatIonaI nteIIIgence 8oard NatIonaI nteIIIgence 8oard NatIonaI nteIIIgence 8oard NatIonaI nteIIIgence 8oard
See NatIonaI ForeIgn nteIIIgence 8oard See NatIonaI ForeIgn nteIIIgence 8oard See NatIonaI ForeIgn nteIIIgence 8oard See NatIonaI ForeIgn nteIIIgence 8oard
AdvIses the DN on: productIon, revIew, and coordInatIon oI natIonaI InteIIIgence; Interagency exchanges
oI natIonaI InteIIIgence InIormatIon; sharIng oI C InteIIIgence products wIth IoreIgn governments;
protectIon oI InteIIIgence sources and methods; actIvItIes oI common concern and other matters as may
be reIerred to It by the DN.

Source: CD 202, http:]]www.Ias.org]Irp]dnI]Icd]Icd-202.pdI and
http:]]www.Ias.org]bIog]secrecy]2007]08]dnIIssuesdIrectIvesonanaIy.htmI

NatIonaI NatIonaI NatIonaI NatIonaI nteIIIgence nteIIIgence nteIIIgence nteIIIgence CouncII CouncII CouncII CouncII
EstabIIshed wIthIn the OIIIce oI the DIrector oI CentraI nteIIIgence; composed oI senIor anaIysts wIthIn the
InteIIIgence communIty and substantIve experts Irom the pubIIc and prIvate sector, who shaII be
appoInted by, report to, and serve at the pIeasure oI, the DIrector oI CentraI nteIIIgence. The CouncII
shaII-
(A) produce natIonaI InteIIIgence estImates Ior the Covernment, IncIudIng, whenever the CouncII
consIders approprIate, aIternatIve vIews heId by eIements oI the InteIIIgence communIty;
(8) evaIuate communIty-wIde coIIectIon and productIon oI InteIIIgence by the InteIIIgence
communIty and the requIrements and resources oI such coIIectIon and productIon; and

Source: War and NatIonaI DeIense. 50 U.S.C. 15 Subchapter 403-3,
http:]]www.gpoaccess.gov]uscode]browse.htmI

NatIonaI nteIIIgence Program NatIonaI nteIIIgence Program NatIonaI nteIIIgence Program NatIonaI nteIIIgence Program
See NatIonaI ForeIgn nteIIIgence Program See NatIonaI ForeIgn nteIIIgence Program See NatIonaI ForeIgn nteIIIgence Program See NatIonaI ForeIgn nteIIIgence Program
1. There Is no perIectIy cIear IIne between `natIonaI' InteIIIgence and InteIIIgence that supports
joInt mIIItary operatIons or otherwIse supports mIIItary requIrements. Some `natIonaI' systems provIde
essentIaI support to the mIIItary, and some mIIItary systems provIde InteIIIgence Ior natIonaI needs. The
mIIItary Is the Iargest consumer and producer oI InteIIIgence, and It has needs Ior InteIIIgence on a 24-
hour basIs to support mIIItary operatIons around the worId. The chaIIenge In reIormIng the nteIIIgence
CommunIty Is to ensure that the needs oI natIonaI customers and mIIItary customers are both met
adequateIy. ThIs bIII consoIIdates the buIk oI the InteIIIgence assets under the NatIonaI nteIIIgence
DIrector In a way that may make It dIIIIcuIt to ensure adequate InteIIIgence support to the mIIItary. As the
CSS 11 stated, `Any successIuI InteIIIgence reIorm must respect the mIIItary's need to maIntaIn a robust
organIc tactIcaI InteIIIgence capabIIIty and to have rapId access to natIonaI InteIIIgence assets and
InIormatIon.'






273

The bIII reported by the CommIttee contaIns a deIInItIon oI the NatIonaI nteIIIgence Program (NP) that
may not meet thIs test, and thus may have harmIuI unIntended consequences. The underIyIng draIt bIII
saId that any program, project or actIvIty oI the mIIItary departments (nameIy, the Army, Navy, AIr Force
and MarInes) to acquIre InteIIIgence `soIeIy' Ior the pIannIng and conduct oI `tactIcaI' mIIItary operatIons
were not part oI the NP.

Source: CarI LevIn. Senate Report 108-359 - NatIonaI nteIIIgence ReIorm Act oI 2004. to accompany S.
2840 together wIth AddItIonaI VIews,
http:]]thomas.Ioc.gov]cgI-bIn]cpquery]TZ&report=sr359&dbname=108&
2. The bIII [NatIonaI nteIIIgence ReIorm Act oI 2004] sIgnIIIcantIy changes the deIInItIon oI the
NatIonaI ForeIgn nteIIIgence Program. The NP Is deIIned to IncIude aII programs, projects, and actIvItIes
(whether or not pertaInIng to natIonaI InteIIIgence) oI the NatIonaI nteIIIgence AuthorIty, the CentraI
nteIIIgence Agency, the NatIonaI SecurIty Agency, the NatIonaI CeospatIaI-nteIIIgence Agency, the
NatIonaI ReconnaIssance OIIIce, the OIIIce oI nteIIIgence oI the FederaI 8ureau oI nvestIgatIon, and the
OIIIce oI nIormatIon AnaIysIs oI the Department oI HomeIand SecurIty. The NP aIso IncIudes aII natIonaI
InteIIIgence programs, projects and actIvItIes oI the eIements oI the InteIIIgence communIty and any other
program, project, or actIvIty oI a department, agency or eIement oI the UnIted States Covernment reIatIng
to natIonaI InteIIIgence unIess the ND and the head oI the aIIected entIty determIne otherwIse. These
provIsIons ensure that the ND wIII have compIete budgetary controI over the core eIements oI the
InteIIIgence communIty whIch produce natIonaI InteIIIgence.
The NP deIInItIon specIIIcaIIy excIudes programs, projects and actIvItIes oI the mIIItary departments that
acquIre InteIIIgence prIncIpaIIy Ior the pIannIng and conduct oI joInt or tactIcaI mIIItary operatIons by the
UnIted States Armed Forces. Any assets that are currentIy In the ]MP but are natIonaI and do not acquIre
InteIIIgence prIncIpaIIy Ior the pIannIng and conduct oI joInt or tactIcaI mIIItary operatIons by the UnIted
States Armed Forces shouId be moved to the NP. The IncIusIon oI the word `prIncIpaIIy' Is meant to
reIIect that some mIIItary assets serve both natIonaI and tactIcaI or joInt purposes; the mere Iact that a
DoD asset produces some natIonaI InteIIIgence thus does not requIre that asset to be moved to the NP.
Source: Senate Report 108-359 - NatIonaI nteIIIgence ReIorm Act oI 2004. to accompany S. 2840
together wIth addItIonaI vIews, http:]]thomas.Ioc.gov]cgI-bIn]cpquery]TZ&report=sr359&dbname=108&
3. NP encompasses more than haII oI overaII InteIIIgence spendIng and IncIudes most eIIorts oI
the nteIIIgence CommunIty (C) -- the CA, the DeIense nteIIIgence Agency (DA), the NatIonaI
ReconnaIssance OIIIce (NRO), the NatIonaI CeospatIaI- nteIIIgence Agency (NCA) [IormerIy the NatIonaI
magery and MappIng Agency (NMA)], and the NatIonaI SecurIty Agency (NSA). n accordance wIth the
nteIIIgence ReIorm Act, the DN has overaII responsIbIIIty Ior preparIng NP budget submIssIons based on
prIorItIes estabIIshed by the PresIdent and takIng Into account Input Irom DOD agencIes that have NP
responsIbIIItIes. NP budget totaIs are authorIzed In annuaI InteIIIgence authorIzatIon acts; totaI amounts






274
are specIIIed In the cIassIIIed scheduIe that accompany approprIatIons IegIsIatIon, but are not made
pubIIc.
Source: RIchard A. 8est, ]r. "nteIIIgence, SurveIIIance, and ReconnaIssance (SR) Programs: ssues Ior
Congress." CRS Report to Congress February 22, 2005, http:]]www.Ias.org]sgp]crs]InteI]RL32508.pdI
NatIonaI nteIIIgence Reserve Corps NatIonaI nteIIIgence Reserve Corps NatIonaI nteIIIgence Reserve Corps NatIonaI nteIIIgence Reserve Corps
The DIrector oI NatIonaI nteIIIgence may provIde Ior the estabIIshment and traInIng oI a NatIonaI
nteIIIgence Reserve Corps (In thIs sectIon reIerred to as "NatIonaI nteIIIgence Reserve Corps") Ior the
temporary reempIoyment on a voIuntary basIs oI Iormer empIoyees oI eIements oI the InteIIIgence
communIty durIng perIods oI emergency, as determIned by the DIrector.

Source: U.S. Code TTLE 50 > CHAPTER 15 > SU8CHAPTER > 403-1c
http:]]www.Iaw.corneII.edu]uscode]50]uscsec5000000403----001c.htmI
NatIonaI nterests NatIonaI nterests NatIonaI nterests NatIonaI nterests
1. n a very generIc sense, natIonaI Interests are "that whIch Is deemed by a partIcuIar state (actor)
to be a . . . desIrabIe goaI."

Source: C. R. 8errIdge and AIan ]ames, A DIctIonary oI DIpIomacy, HampshIre, UK: PaIgrave-MacmIIIan,
Second EdItIon, 2003, p. 181., cIted In AIan C. StoIberg, "CraItIng NatIonaI nterests In the 21
st
Century, "
Ed. ]. 8oone 8arthoIomees, ]r., NatIonaI SecurIty PoIIcy and Strategy, CuIde to NatIonaI SecurIty ssues voI.
2 , 3rd ed., U.S. Army War CoIIege, 2008. 3-14.
http:]]www.strategIcstudIesInstItute.army.mII]pdIIIIes]PU8871.pdI

2. The natIonaI Interest, on the other hand, reIers to the weII-beIng oI AmerIcan cItIzens and
AmerIcan enterprIse InvoIved In InternatIonaI reIatIons and aIIected by poIItIcaI Iorces beyond the
admInIstratIve controI oI the UnIted States government. (p.6)

It Is useIuI to thInk oI the pubIIc Interest as beIng the concern oI IederaI, state, and
IocaI government-wIth the presIdent sharIng hIs authorIty wIth Congress, the courts, and the IIIty states -
and the natIonaI Interest beIng the concern onIy oI the IederaI government, wIth
the PresIdent, rather than congress or the courts, exercIsIng the prIncIpaI authorIty and responsIbIIIty Ior
the natIon's weIIare. (p.7)

Source: NeuchterIeIn, DonaId E. UnIted States NatIonaI nterests In a ChangIng WorId, LexIngton: UnIversIty
Press oI Kentucky, 1973. 6-7.
NatIonaI MedIa ExpIoItatIon Center NatIonaI MedIa ExpIoItatIon Center NatIonaI MedIa ExpIoItatIon Center NatIonaI MedIa ExpIoItatIon Center
"wIII serve to advance the C's coIIectIve DOMEX [document and medIa expIoItatIon] capabIIItIes on behaII
oI the DN."






275
b. DOMEX wIII support a wIde range oI InteIIIgence actIvItIes.DOMEX reportIng and anaIysIs are
consIdered InteIIIgence products. (p.2)
Source: "Document and MedIa ExpIoItatIon" CD 302, ]uIy 6, 2007, http:]]www.Ias.org]Irp]dnI]Icd]Icd-
302.pdI

NatIona NatIona NatIona NatIonaI OperatIons SecurIty Program I OperatIons SecurIty Program I OperatIons SecurIty Program I OperatIons SecurIty Program
Created by Reagan NatIonaI SecurIty DecIsIon DIrectIve (NSDD) 298, ]anuary 22, 1988.Each ExecutIve
department and agency assIgned or supportIng natIonaI securIty mIssIons wIth cIassIIIed or sensItIve
actIvItIes shaII estabIIsh a IormaI OperatIons SecurIty Program (OPSEC) program wIth the IoIIowIng
common Ieatures:
SpecIIIc assIgnment oI responsIbIIIty Ior OPSEC dIrectIon and ImpIementatIon.
SpecIIIc requIrements to pIan Ior and ImpIement OPSEC In antIcIpatIon oI and, where approprIate,
durIng department or agency actIvIty.
DIrectIon to use OPSEC anaIytIcaI technIques to assIst In IdentIIyIng vuInerabIIItIes and to seIect
approprIate OPSEC measures.
Enactment oI measures to ensure that aII personneI commensurate wIth theIr posItIons and securIty
cIearances, are aware oI hostIIe InteIIIgence threats and understand the OPSEC process.
AnnuaI revIew and evaIuatIon oI OPSEC procedures so as to assIst the Improvement oI OPSEC
programs.
ProvIsIon Ior Interagency support and cooperatIon wIth respect to OPSEC programs.
AgencIes wIth mInImaI actIvItIes that couId aIIect natIonaI securIty need not estabIIsh a IormaI OPSEC
program; however, they must cooperate wIth other departments and agencIes to mInImIze damage to
natIonaI securIty when OPSEC probIems arIse.
Source: FAS. NSDD - NatIonaI SecurIty DecIsIon DIrectIves, Reagan AdmInIstratIon,
http:]]www.Ias.org]Irp]oIIdocs]nsdd298.htm

NatIonaI SecurIty NatIonaI SecurIty NatIonaI SecurIty NatIonaI SecurIty
See the CospeI oI NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See the CospeI oI NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See the CospeI oI NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State See the CospeI oI NatIonaI SecurIty, NatIonaI SecurIty nIormatIon, NatIonaI SecurIty State
1. (y) NatIonaI deIense or IoreIgn reIatIons oI the UnIted States.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. The terrItorIaI IntegrIty, sovereIgnty, and InternatIonaI Ireedom oI actIon oI the UnIted States.
nteIIIgence actIvItIes reIatIng to natIonaI securIty encompass aII the mIIItary, economIc, poIItIcaI, scIentIIIc,
technoIogIcaI, and other aspects oI IoreIgn deveIopments that pose actuaI or potentIaI threats to US
natIonaI Interests.







276
Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence:
CaInIng KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA:
NatIonaI TechnIcaI nIormatIon ServIce, [1999Z].PREX 3.2: C 76 PREX 3.2]2: C 94

3. CItIng Cregory McLauchIan, Hooks (p. 366) wrItes; "the shIIt Irom deIense to natIonaI securIty
bIurred the dIIIerence between tImes oI peace and war and put pressure on the U.S. to manage socIety
more IntensIveIy at aII tImes."

Source: Cregory Hooks, "The RIse oI the Pentagon and U.S. State 8uIIdIng: The DeIense Program as
ndustrIaI PoIIcy," The AmerIcan ]ournaI oI SocIoIogy 96 no.2 (1990):358-404.

4. The deIInItIons oI "natIonaI securIty" and what constItutes "InteIIIgence"- and thus what must
be cIassIIIed - are uncIear. 8oundarIes between IoreIgn and domestIc InIormatIon, as weII as InteIIIgence
and Iaw enIorcement, are bIurred. (p.11)

Source: OIIIce oI the DIrector oI NatIonaI nteIIIgence AssocIate DIrector oI NatIonaI nteIIIgence
and ChIeI nIormatIon OIIIcer, nteIIIgence CommunIty CIassIIIcatIon CuIdance FIndIngs and
RecommendatIons Report, ]anuary 2008, http:]]www.Ias.org]sgp]othergov]InteI]cIass.pdI

5. (41.) To support the necessarIIy heavy burdens Ior natIonaI securIty, the moraIe oI the cItIzens
oI the UnIted States must be based both on responsIbIIIty and Ireedom Ior the IndIvIduaI. The dangers
Irom SovIet subversIon and espIonage requIre strong and eIIectIve securIty measures. EternaI vIgIIance,
however, Is needed In theIr exercIse to prevent the IntImIdatIon oI Iree crItIcIsm. t Is essentIaI that
necessary measures oI protectIon shouId not be used as to destroy the natIonaI unIty based on Ireedom,
not on Iear.

Source: NSC 162]2 "A Report to the NatIonaI SecurIty PoIIcy: 8asIc NatIonaI SecurIty PoIIcy," October 30,
1953.

6. SecurIty poInts to some degree oI protectIon oI vaIues prevIousIy acquIred. n WaIter
LIppmann's words, a natIon Is secure to the extent to whIch It Is not In danger oI havIng to sacrIIIce core
vaIues, II It wIshes to avoId war, and Is abIe, II chaIIenged, to maIntaIn them by vIctory In such a war. ThIs
deIInItIon ImpIIes that securIty rIses and IaIIs wIth the abIIIty oI a natIon to deter an attack, or to deIeat It.
ThIs Is In accord wIth common usage oI the term. (p.147)

n the IIrst pIace, every Increment oI securIty must be paId Ior by addItIonaI sacrIIIces oI other vaIues
usuaIIy oI a kInd more exactIng than the mere expendIture oI precIous tIme on the part oI poIIcy makers.
(p.158)

Source: ArnoId WoIIers. (1962). "NatIonaI securIty as an ambIguous symboI." DIscord and CoIIaboratIon:
Essays on nternatIonaI PoIItIcs 8aItImore: ]ohns HopkIns Press. 148-165.







277
7. NatIonaI securIty Is not a vaIue In ItseII, but rather a condItIon that aIIows a natIon to
maIntaIn Its vaIues.

Source: Thomas S. 8Ianton (2003), "8eyond the 8aIancIng Test: NatIonaI SecurIty and Open Covernment In
the UnIted States," Ed. Susan Maret & ]an CoIdman, Covernment Secrecy: CIassIc and Contemporary
ReadIngs. Westport, CT: LIbrarIes UnIImIted]Creenwood Press, 2008. 600-626.

8. Note that terms IIke natIonaI securIty system, natIonaI securIty bureaucracy, natIonaI securIty
Interests and natIonaI securIty poIIcy are IIberaIIy sprInkIed throughout the Project on NatIonaI SecurIty
ReIorm, PreIImInary FIndIngs,
http:]]www.pnsr.org]data]Images]pnsrZ20preIImInaryZ20IIndIngsZ20juIyZ202008.pdI but not deIIned.

For an hIstorIcaI overvIew oI the evoIutIon oI the concept oI natIonaI securIty, see DougIas T. Stuart's
CreatIng the NatIonaI SecurIty State: A HIstory oI the Law that TransIormed AmerIca (PrInceton UnIversIty
Press, 2008).

NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA) NatIonaI SecurIty Area (NSA)
An area estabIIshed on non-FederaI Iands Iocated wIthIn the UnIted States, Its possessIons, or terrItorIes,
Ior saIeguardIng cIassIIIed and]or restrIcted data InIormatIon, or protectIng DOE (Department oI Energy)
equIpment and]or materIaI. EstabIIshment oI an NSA temporarIIy pIaces such non-FederaI Iands under
the controI oI the DOE and resuIts onIy Irom an emergency event.

Source: DoD. DIrectIve 5100.52, "DoD Response to an AccIdent or SIgnIIIcant IncIdent InvoIvIng
RadIoactIve MaterIaIs." December 21, 1989, http:]]www.Ias.org]nuke]guIde]usa]doctrIne]dod]5100-
52m]chap2.pdI (repIaced by DoD DIrectIve 3150.8, "DoD Response to RadIoIogIcaI AccIdents",
06]13]1996)

NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch NatIonaI SecurIty 8ranch
The NatIonaI SecurIty 8ranch (NS8) consIsts oI the F8's CounterterrorIsm DIvIsIon (CTD),
CounterInteIIIgence DIvIsIon (CD), DIrectorate oI nteIIIgence (D), and the new Weapons oI Mass
DestructIon DIrectorate (WMDD) and combInes the mIssIons, capabIIItIes, and resources oI each. The NS8
oversees the natIonaI securIty operatIons oI these Iour components and Is aIso accountabIe Ior the
natIonaI securIty IunctIons carrIed out by other F8 dIvIsIons.
(The NS8 was estabIIshed by authorIty oI a ]une 28, 2005, memorandum Irom the PresIdent dIrectIng the
Attorney CeneraI to ImpIement the WMD CommIssIon's recommendatIon Ior the F8 to estabIIsh a
"NatIonaI SecurIty ServIce."

NOTE: the WMD report Is here: http:]]www.gpoaccess.gov]wmd]Index.htmIreport]wmdreport.pdI. Try to
IInd a recommendatIon oI thIs exact entIty, "natIonaI securIty servIce"!).
Source: F8, NatIonaI SecurIty 8ranch,






278
http:]]www.IbI.gov]hq]nsb]nsbIaq.htm#estabIIshed

Na Na Na NatIonaI SecurIty CouncII tIonaI SecurIty CouncII tIonaI SecurIty CouncII tIonaI SecurIty CouncII
1. The NatIonaI SecurIty CouncII (NSC) was estabIIshed by the NatIonaI SecurIty Act oI 1947 to
advIse the PresIdent wIth respect to the IntegratIon oI domestIc, IoreIgn, and mIIItary poIIcIes reIatIng to
natIonaI securIty. The NSC Is the hIghest ExecutIve 8ranch entIty provIdIng revIew oI, guIdance Ior, and
dIrectIon to the conduct oI aII natIonaI IoreIgn InteIIIgence and counterInteIIIgence actIvItIes. The statutory
members oI the NSC are the PresIdent, the VIce PresIdent, the Secretary oI State, and the Secretary oI
DeIense. The DIrector oI NatIonaI nteIIIgence and the ChaIrman oI the ]oInt ChIeIs oI StaII partIcIpate as
advIsors (p.586).
Source: CentraI nteIIIgence Agency. "ExecutIve OversIght oI nteIIIgence." Factbook on nteIIIgence, [See
the Wayback MachIne,
http:]]web.archIve.org]web]20060616234124]http:]]cIa.gov]cIa]pubIIcatIons]IactteII]executIveoversIg
ht.htmI ] and CongressIonaI Record ]anuary 29, 1952,
2. The NSC IIes at the heart oI the natIonaI securIty apparatus, beIng the hIghest coordInatIve and
advIsory body wIthIn the Covernment In thIs area asIde Irom the PresIdent's CabInet. The CabInet has no
statutory roIe, but the NSC does. (p.1)

Source: RIchard A. 8est ]r., "The NatIonaI SecurIty CouncII: An OrganIzatIonaI Assessment," CRS Report to
Congress ]une 8, 2009, RL30840 ,http:]]www.Ias.org]sgp]crs]natsec]RL30840.pdI

NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve
See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve
ssued by the Reagan admInIstratIon to In creatIng oIIIcIaI natIonaI securIty poIIcy "Ior the guIdance oI the
deIense, InteIIIgence, and IoreIgn poIIcy estabIIshments oI the UnIted States government."

Source: FederatIon oI AmerIcan ScIentIsts. "NSDD - NatIonaI SecurIty DecIsIon DIrectIves
Reagan AdmInIstratIon." http:]]www.Ias.org]Irp]oIIdocs]nsdd]Index.htmI

NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS) NatIonaI SecurIty nIormatIon (NS)
See: CIassIIIcatIon LeveIs, CIassIIIed at 8Irth and CIassIIIed MIIItary nIormatI See: CIassIIIcatIon LeveIs, CIassIIIed at 8Irth and CIassIIIed MIIItary nIormatI See: CIassIIIcatIon LeveIs, CIassIIIed at 8Irth and CIassIIIed MIIItary nIormatI See: CIassIIIcatIon LeveIs, CIassIIIed at 8Irth and CIassIIIed MIIItary nIormatIon (CM) on (CM) on (CM) on (CM)
1. ConsIsts oI data, nucIear and otherwIse, cIassIIIed under the authorIty oI varIous presIdentIaI
executIve orders; thIs category, accordIng to DeVoIpI et aI (11-12, 287), Is a category oI RestrIcted Data
as expressed In the AtomIc Energy Act oI 1954, and subject to specIaI controIs. "8oundIess In scope," NS
orIgInated wIth Carter EO 12065, whIch DeVoIpI and hIs coIIeagues (131, 138) reIer to as the "NatIonaI
SecurIty nIormatIon ExecutIve Order." n 1993, QuIst cIaImed that current authorIty Ior cIassIIyIng
InIormatIon as NS comes Irom ExecutIve Order (EO) 12356.

DependIng on the degree oI harm that unauthorIzed dIscIosure couId "reasonabIy be expected to cause","
NS can be cIassIIIed as Top Secret, Secret or ConIIdentIaI (DeVoIpI, et aI 138).






279

Source: AIexander DeVoIpI et aI. 8orn Secret: the H-bomb, the ProgressIve Case and NatIonaI SecurIty.
New York: Pergamon Press, 1981.

2. NatIonaI SecurIty nIormatIon (NS) means InIormatIon that has been
determIned pursuant to ExecutIve Order 12958 or prIor ExecutIve Orders to requIre protectIon agaInst
unauthorIzed dIscIosure and Is marked to IndIcate Its cIassIIIcatIon status when In document Iorm. NS Is
reIerred to as "deIense InIormatIon'' In the AtomIc Energy Act.

Source: Energy. 10 CFR 1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

8y extensIon, 8ush ExecutIve Order 13292 (March 28, 2003) Iurther expands NS to InIormatIon reIated to

MIIItary pIans, weapons systems, or operatIons;
ForeIgn government InIormatIon;
nteIIIgence actIvItIes (IncIudIng specIaI actIvItIes), InteIIIgence sources or methods, or cryptoIogy;
ForeIgn reIatIons or IoreIgn actIvItIes oI the UnIted States, IncIudIng conIIdentIaI sources;
ScIentIIIc, technoIogIcaI, or economIc matters reIatIng to the natIonaI securIty, whIch IncIudes
deIense agaInst transnatIonaI terrorIsm;
UnIted States Covernment programs Ior saIeguardIng nucIear materIaIs or IacIIItIes;
VuInerabIIItIes or capabIIItIes oI systems, InstaIIatIons, InIrastructures, projects, pIans, or
protectIon servIces reIatIng to the natIonaI securIty, whIch IncIudes deIense agaInst transnatIonaI
terrorIsm; or
Weapons oI mass destructIon.

Source: FAS, ExecutIve Order 12065, http:]]www.Ias.org]Irp]oIIdocs]eo]eo-12065.htm;
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]1978.htmI; ExecutIve Order 13292 "Further
Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty nIormatIon,"
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI ; ArvIn S. QuIst. "SecurIty
CIassIIIcatIon oI nIormatIon," http:]]www.Ias.org]sgp]IIbrary]quIst2]chap3.htmI, and LouIs FIsher,
CongressIonaI Access to NatIonaI SecurIty nIormatIon Law LIbrary oI Congress May 2009,
http:]]Ioc.gov]Iaw]heIp]usconIaw]pdI]CW.2009.pdI

3. Any InIormatIon that has been determIned pursuant to ExecutIve Order 12356 [CIInton; 1995],
ExecutIve Order 13292 ["Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI
SecurIty nIormatIon," 8ush 2003] or any predecessor order to requIre protectIon agaInst unauthorIzed
dIscIosure and that Is so desIgnated. The IeveIs TOP SECRET, SECRET and CONFDENTAL are used to
desIgnate such InIormatIon.

Source: DOE DIrectIve. DOE-5631.2c. http:]]www.Ias.org]Irp]DoDdIr]doe]o56312c]o56312ca2.htm,







280
4. OIIIcIaI InIormatIon or materIaI whIch requIres protectIon agaInst unauthorIzed dIscIosure
In the Interest oI natIonaI deIense or IoreIgn reIatIons oI the UnIted States. The current authorIty Ior
cIassIIyIng InIormatIon as NS comes Irom ExecutIve Order (EO) 12356. A decIaratIon oI NS requIres prIor
approvaI Irom an authorIzed person.

Source: DOE. UnderstandIng CIassIIIcatIon. . . . WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior
DeIense Programs, OIIIce oI CIassIIIcatIon, 1987. SUDOC: E 1.15:0007]1

5. NS embodIes both poIIcy InteIIIgence and mIIItary InteIIIgence.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law EnIorcement
AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

NatIonaI SecurIty Letters NatIonaI SecurIty Letters NatIonaI SecurIty Letters NatIonaI SecurIty Letters
1. A type oI admInIstratIve subpoena whIch may be Issued IndependentIy by F8 IIeId oIIIces and
not subject to judIcIaI revIew unIess a case comes to court. Under SectIon 505 oI the PatrIot Act whIch
authorIzed F8 IIeId agents to Issue natIonaI securIty Ietters to obtaIn IInancIaI, bank and credIt records oI
IndIvIduaIs.

n certaIn Instances, under 18 U.S.C. 2709, It Is possIbIe Ior the F8 to requIre the productIon oI records
and InIormatIon pertaInIng to wIre or eIectronIc communIcatIons through a NatIonaI SecurIty Letter, where
the onIy requIrement Is Ior the agent oI the F8 to certIIy that the records and InIormatIon sought are
"reIevant to an authorIzed InvestIgatIon."

Source: CongressIonaI Research ServIce. "AdmInIstratIve Subpoenas and NatIonaI SecurIty Letters In
CrImInaI and ForeIgn nteIIIgence nvestIgatIons: 8ackground and Proposed Adjustments." AprII 15, 2005.
http:]]www.Ias.org]sgp]crs]natsec]RL32880.pdI and AmerIcan CIvII LIbertIes UnIon (ACLU). "ChaIIengIng
the ConstItutIonaIIty oI the NatIonaI SecurIty Letter," http:]]www.acIu.org]nsI]

2. We Iound that 60 percent oI the InvestIgatIve IIIes we examIned contaIned one or more
vIoIatIons oI F8 InternaI controI poIIcIes reIatIng to NatIonaI SecurIty Letters (p.23).
naccuracIes In the OCC (OIIIce oI CeneraI CounseI) database are outIIned In the ExecutIve Summary.

Source: U.S. Department oI ]ustIce, OIIIce oI the nspector CeneraI, A RevIew oI the FederaI 8ureau oI
nvestIgatIon's Use oI NatIonaI SecurIty Letters, March 2007,
http:]]www.usdoj.gov]oIg]specIaI]s0703b]IInaI.pdI (p. xxIII has a useIuI graphIc on F8 use oI NSLs).

3. ]udge VIctor Marrero, oI the U.S. DIstrIct Court In Manhattan, ruIed unconstItutIonaI both the
gag on recIpIents oI the orders and theIr Iack oI judIcIaI scrutIny. t was hIs second decIsIon strIkIng down
natIonaI-securIty Ietters. Three years ago, he ruIed that the orders vIoIated the FIrst Amendment. 8ut an
appeaIs court asked hIm to reconsIder the decIsIon aIter the PatrIot Act was revIsed thIs year.






281

Source: Andrea Foster, The WIred Campus http:]]chronIcIe.com]wIredcampus]Index.phpZId=2358
and ACLU, http:]]www.acIu.org]saIeIree]natIonaIsecurItyIetters]31580prs20070906.htmI
Updated InIo at: DO], OIIIce oI the nspector CeneraI, March 2008 A RevIew oI the F8's Use oI NatIonaI
SecurIty Letters: Assessment oI CorrectIve ActIons and ExamInatIon oI NSL Usage In
2006,http:]]www.usdoj.gov]oIg]specIaI]s0803b]IInaI.pdI ; aIso see aIso see aIso see aIso see UnIted States. Congress. House.
CommIttee on the ]udIcIary. SubcommIttee on the ConstItutIon, CIvII RIghts, and CIvII LIbertIes, NatIonaI
SecurIty Letters ReIorm Act oI 2007 : hearIng beIore the SubcommIttee on the ConstItutIon, CIvII RIghts,
and CIvII LIbertIes oI the CommIttee on the ]udIcIary, House oI RepresentatIves, One Hundred Tenth
Congress, second sessIon, on H.R. 3189, AprII 15, 2008,
http:]]Irwebgate.access.gpo.gov]cgI-bIn]getdoc.cgIZdbname=110househearIngs&docId=I:41795.pdI,
UnIted States. Congress. House. . . . CommIttee on the ]udIcIary, FederaI 8ureau oI nvestIgatIon. Part :
hearIng beIore the CommIttee on the ]udIcIary, House oI RepresentatIves, One Hundred Tenth Congress,
second sessIon, AprII 23, 2008. WashIngton: U.S. C.P.O., 2008.
http:]]Irwebgate.access.gpo.gov]cgIbIn]getdoc.cgIZdbname=110househearIngs&docId=I:41904.pdI
and H. R. 3846, FSA Amendments Act oI 2009 "To amend the ForeIgn nteIIIgence SurveIIIance Act oI
1978 to provIde addItIonaI cIvII IIbertIes protectIons, and Ior other purposes," 111
th
Congress, 1
st
sessIon,
October, 20, 2009, http:]]thomas.Ioc.gov]cgI-bIn]query]zZc111:H.R.3846:

4. FIve IederaI statutes authorIze varIous InteIIIgence agencIes to demand, through NatIonaI
SecurIty Letters (NSLs), certaIn customer InIormatIon Irom communIcatIons provIders, IInancIaI
InstItutIons, and consumer credIt reportIng agencIes, under the RIght to FInancIaI PrIvacy Act, the FaIr
CredIt ReportIng Act, the NatIonaI SecurIty Act, and EIectronIc CommunIcatIons PrIvacy Act. The USA
PATROT Act expanded NSL authorIty. Later reports oI the Department oI ]ustIce nspector CeneraI
IndIcated that (1) the F8 consIdered the expanded authorIty very useIuI; (2) aIter expansIon the number oI
NSLs requests Increased dramatIcaIIy; (3) the number oI requests reIatIng to AmerIcans Increased
substantIaIIy; and (4) F8 use oI NSL authorIty had sometImes IaIIed to compIy wIth statutory, Attorney
CeneraI, or F8 poIIcIes.

OrIgInaIIy, the NSL statutes authorIzed nondIscIosure requIrements prohIbItIng recIpIents Irom
dIscIosIng receIpt or the content oI the NSL to anyone, ever. They now permIt judIcIaI revIew oI
these secrecy provIsIons. As understood by the courts, recIpIents may request the IssuIng agency to seek
and justIIy to the court the contInued bIndIng eIIect oI any secrecy requIrement.

Source: CharIes DoyIe, "NatIonaI SecurIty Letters: Proposed Amendments In the 111th Congress," CRS
Report to Congress October 28, 2009, R40887, http:]]opencrs.com]document]R40887]

5. The ancestor oI the IIrst NSL Ietter provIsIon Is a statutory exceptIon to prIvacy protectIons
aIIorded by the RIght to FInancIaI PrIvacy Act (RFPA).11 ts hIstory Is not partIcuIarIy InstructIve and
consIsts prImarIIy oI a determInatIon that the exceptIon In Its orIgInaI Iorm shouId not be too broadIy
construed.12 8ut the exceptIon was just that, an exceptIon. t was neIther an aIIIrmatIve grant oI authorIty
to request InIormatIon nor a command to IInancIaI InstItutIons to provIded InIormatIon when asked. t






282
removed the restrIctIons on the reIease oI customer InIormatIon Imposed on IInancIaI InstItutIons by
the RIght to FInancIaI PrIvacy Act, but It IeIt them Iree to decIIne to compIy when asked to do so.

Source: Source: CharIes DoyIe, "NatIonaI SecurIty Letters In ForeIgn nteIIIgence nvestIgatIons: LegaI
8ackground and Recent Amendments," CRS Report to Congress September 8, 2009, RS22406
http:]]www.Ias.org]sgp]crs]InteI]RS22406.pdI


NatIonaI SecurIty PresIdentIaI DIrectIve (NSPD) NatIonaI SecurIty PresIdentIaI DIrectIve (NSPD) NatIonaI SecurIty PresIdentIaI DIrectIve (NSPD) NatIonaI SecurIty PresIdentIaI DIrectIve (NSPD)
See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve
n the Ceorge W. 8ush AdmInIstratIon, the dIrectIves that are used to promuIgate PresIdentIaI decIsIons on
natIonaI securIty matters are desIgnated NatIonaI SecurIty PresIdentIaI DIrectIves.
As dIscussed In NSPD 1, thIs new category oI dIrectIves repIaces both the PresIdentIaI DecIsIon DIrectIves
and the PresIdentIaI RevIew DIrectIves oI the prevIous AdmInIstratIon. UnIess other otherwIse IndIcated,
however, past DIrectIves remaIn In eIIect untII they are superseded. On October 29, 2001, PresIdent 8ush
Issued the IIrst oI a new serIes oI HomeIand SecurIty PresIdentIaI DIrectIves (HSPDs) governIng homeIand
securIty poIIcy.
Source: FederatIon oI AmerIcan ScIentIsts. "NatIonaI SecurIty PresIdentIaI DIrectIve: Ceorge W. 8ush
AdmInIstratIon." http:]]www.Ias.org]Irp]oIIdocs]nspd]Index.htmI

NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs NatIonaI SecurIty SensItIvIty LeveIs
FederaI empIoyment posItIons as deIIned by the US OIIIce oI PersonaI Management. SpecIaI-SensItIve (SS)
ncIudes any posItIons that the head oI the agency determInes to be In a IeveI hIgher than CrItIcaI-
SensItIve because oI specIaI requIrements under authorIty other than EO 10450 and EO 12968
(e.g., D.C.D 6]4, PersonneI SecurIty Standards and Procedures CovernIng EIIgIbIIIty Ior Access to
SensItIve Compartmented nIormatIon (SC)).

CrItIcaI-SensItIve (CS) PotentIaI Ior exceptIonaIIy grave damage to the natIonaI securIty; ncIudes posItIons
InvoIvIng any oI the IoIIowIng:
Access to Top Secret natIonaI securIty InIormatIon or materIaIs;
RequIrement Ior a Department oI Energy (DOE) "Q" securIty cIearance Ior access to DOE natIonaI
securIty InIormatIon, materIaIs, and]or sItes.
DeveIopment or approvaI oI war pIans, pIans or partIcuIars oI Iuture major or specIaI operatIons
oI war, or crItIcaI and extremeIy Important Items oI war.
nvestIgatIve dutIes, the Issuance oI personneI securIty cIearances, or duty on personneI securIty
boards.
CommIssIoned Iaw enIorcement dutIes.






283
Other posItIons reIated to natIonaI securIty, regardIess oI dutIes, that requIre the same degree
oI trust.

NoncrItIcaI-SensItIve (NCS) PotentIaI Ior damage to serIous damage to the natIonaI securIty: ncIudes
posItIons InvoIvIng any oI the IoIIowIng:
*Access to Secret or ConIIdentIaI natIonaI securIty InIormatIon or materIaIs;
*RequIrement to obtaIn a Department oI Energy (DOE) "L" securIty cIearance Ior access to DOE
natIonaI securIty InIormatIon, materIaIs, and]or sItes;
DutIes that may dIrectIy or IndIrectIy adverseIy aIIect the natIonaI securIty operatIons oI the
agency.
Source: OIIIce oI PersonneI Management. "NatIonaI SecurIty PosItIons." 5 CFR 732,
http:]]www.gpoaccess.gov]cIr]Index.htmI

NatIonaI SecurIty Space NatIonaI SecurIty Space NatIonaI SecurIty Space NatIonaI SecurIty Space Programs Programs Programs Programs
ThIrd, U.S. natIonaI securIty space programs are vItaI to peace and stabIIIty, and the two oIIIcIaIs prImarIIy
responsIbIe and accountabIe Ior those programs are the Secretary oI DeIense and the DIrector oI CentraI
nteIIIgence. TheIr reIatIonshIp Is crItIcaI to the deveIopment and depIoyment oI the space capabIIItIes
needed to support the PresIdent In war, In crIsIs and aIso In peace. They must work cIoseIy and eIIectIveIy
together, In partnershIp, both to set and maIntaIn the course Ior natIonaI securIty space programs and to
resoIve the dIIIerences that arIse between theIr respectIve bureaucracIes. OnIy II they do so wIII the armed
Iorces, the nteIIIgence CommunIty and the NatIonaI Command AuthorItIes have the InIormatIon they need
to pursue our deterrence and deIense objectIves successIuIIy In thIs compIex, changIng and stIII
dangerous worId.

Source: Report oI the CommIssIon to Assess UnIted States NatIonaI SecurIty Space Management and
OrganIzatIon Pursuant to P.L. 106-65, ]anuary 11, 2001, p. 10,
http:]]www.dod.mII]pubs]spaceabout.htmI

NatIonaI SecurIty State NatIonaI SecurIty State NatIonaI SecurIty State NatIonaI SecurIty State
See NatIonaI SecurIty See NatIonaI SecurIty See NatIonaI SecurIty See NatIonaI SecurIty
1. The AmerIcan state must act Ior ItseII and Ior the worId agaInst those who we deem as
enemIes. VIrtuaIIy aII oI these actIvItIes and assumptIons are grounded In past IdentIIIabIe Iaws, ruIes,
secret reguIatIons, and bureaucratIc structures that determIne the present and Iuture. n other words,
PresIdent Ceorge W. 8ush dId not have to start de novo.

RepubIIcan and DemocratIc and admInIstratIons aIIke operated a NatIonaI SecurIty State through countIess
reguIatIons, secret memoranda, deIense contracts, wIretaps, and hardware acquIsItIons whIch IaId the
groundwork Ior the current 8ush admInIstratIon's response. From FDR Iorward, AmerIcan poIItIcaI,
economIc, and mIIItary eIItes shared In the creatIon oI the CentraI nteIIIgence Agency (CA), the NatIonaI
SecurIty Agency (NSA), the Department oI DeIense (DoD), the Department oI Energy (DOE), the NatIonaI






284
ReconnaIssance OIIIce (NRO), and dozens oI other bureaucracIes. They coIIaborated In extendIng the
power and reach oI the FederaI 8ureau oI nvestIgatIon (F8). ThIs Iramework Is woven Into AmerIca's
socIaI IabrIc, IncIudIng Its educatIonaI InstItutIons, corporatIons, scIentIIIc enterprIses, and the medIa.

Source: Marcus C. RaskIn and A. CarI LeVan."The NatIonaI SecurIty State and the Tragedy oI EmpIre." n
Marcus C. RaskIn and A. CarI LeVan. . . . n Democracy's Shadow: the Secret WorId oI NatIonaI SecurIty. .. . New
York: NatIon 8ooks, 2005. 3-42.

2. DeIInIng characterIstIcs oI the natIonaI securIty state:
OrganIzIng Ior war, CoId War, and IImIted war (RaskIn & LeVan)
ControI oI the pubIIc sphere (RaskIn & LeVan)
LImItIng or undermInIng IndIvIduaI rIghts (RaskIn & LeVan)
ControI and protectIon oI InIormatIon across tIers
EmphasIs on surveIIIance, wIth a rIse In the technoIogIcaI abIIIty to capture, record, and
manIpuIate InIormatIon
Covert actIons and the rIse oI secrecy regardIng state actIons
NucIear weapons are a key component oI the NSS (Dwyer & Dwyer 185; e.g., AtomIc Energy Act oI
1948, 1954); thIs InIormatIon must be protected
EvoIutIon Irom a war state Into a securIty state
FederaI (and IocaI) Iaw enIorcement metamorphosIng Into securIty enIorcement (Raven-Hansen
217)

Source: AnabeI L. Dwyer and DavId ]. Dwyer. "Courts and UnIversItIes as nstItutIons In the NatIonaI
SecurIty State," n Marcus C. RaskIn and A. CarI LeVan. . . . n Democracy's Shadow: the Secret WorId oI
NatIonaI SecurIty. .. . (New York: NatIon 8ooks, 2005. 165-203); Peter Raven-Hansen, "SecurIty's Conquest oI
FederaI Law EnIorcement," n Marcus C. RaskIn and A. CarI LeVan. . . . n Democracy's Shadow: the Secret
WorId oI NatIonaI SecurIty ( (( (New York: NatIon 8ooks, 2005. 217-236), and Marcus C. RaskIn and A. CarI
LeVan, "The NatIonaI SecurIty State and the Tragedy oI EmpIre," n Marcus C. RaskIn and A. CarI LeVan. . . . n
Democracy's Shadow: the Secret WorId oI NatIonaI SecurIty. .. . ( (( (New York: NatIon 8ooks, 2005. 3-42).

3. The EIsenhower "natIonaI deIense standard," extended to "Interest oI natIonaI deIense or
IoreIgn reIatIons oI the UnIted States (coIIectIveIy termed 'natIonaI securIty').
Source: Arthur SchIesInger, The mperIaI PresIdency. New York: AtIantIc MonthIy, 1973. 49.
NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy NatIonaI SecurIty Strategy
The art and scIence oI deveIopIng, appIyIng, and coordInatIng the Instruments oI natIonaI power
(dIpIomatIc, economIc, mIIItary, and InIormatIonaI) to achIeve objectIves that contrIbute to natIonaI
securIty. AIso caIIed natIonaI strategy or grand strategy. (]P 3-0)

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]






285

NatIonaI SecurIty System NatIonaI SecurIty System NatIonaI SecurIty System NatIonaI SecurIty System
Any teIecommunIcatIons or InIormatIon system operated by the UnIted States Covernment, the IunctIon,
operatIon, or use oI whIch: 1. InvoIves InteIIIgence actIvItIes; 2. InvoIves cryptoIogIc actIvItIes reIated to
natIonaI securIty; 3. InvoIves command and controI oI mIIItary Iorces; 4. InvoIves equIpment that Is an
IntegraI part oI a weapon or weapon system; or 56. Is crItIcaI to the dIrect IuIIIIIment oI mIIItary or
InteIIIgence mIssIons and does not IncIude a system that Is to be used Ior routIne admInIstratIve and
busIness appIIcatIons (IncIudIng payroII, IInance, IogIstIcs, and personneI management).

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
and 40 U.S.C. 1452, http:]]www.gpoaccess.gov]uscode]browse.htmI
NatIonaI Strategy NatIonaI Strategy NatIonaI Strategy NatIonaI Strategy
The art and scIence oI deveIopIng and usIng the dIpIomatIc, economIc, and InIormatIonaI powers oI a
natIon, together wIth Its armed Iorces, durIng peace and war to secure natIonaI objectIves. AIso caIIed
natIonaI securIty strategy or grand strategy.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

NavaI NucIear PropuIsIon nIormatIon (NNP) NavaI NucIear PropuIsIon nIormatIon (NNP) NavaI NucIear PropuIsIon nIormatIon (NNP) NavaI NucIear PropuIsIon nIormatIon (NNP)
NNP concerns aII cIassIIIed and controIIed uncIassIIIed InIormatIon reIated to the navaI nucIear propuIsIon
program. ThIs markIng suppIements exIstIng cIassIIIcatIon and controI systems and Is not a separate
category outsIde oI the authorItIes provIded under the AEA or ExecutIve Order 12958 Ior, as an exampIe,
cIassIIIed NNP. The use oI "NNP" Is an addItIonaI markIng appIIed to some oI the prevIousIy deIIned
categorIes oI InIormatIon to IndIcate addItIonaI controIs Ior protectIon or access.

Source: CAO. ManagIng SensItIve nIormatIon: ActIons Needed to Ensure Recent Changes In DOE OversIght
Do Not Weaken an EIIectIve CIassIIIcatIon System. ]une 26, 2006,
http:]]www.gao.gov]new.Items]d06785.pdI

Need Need Need Need- -- -to to to to- -- -Know Know Know Know
1. Carrett (1) wrItes that ExecutIve Order 10501 ("SaIeguardIng OIIIcIaI nIormatIon In the nterests
oI the DeIense oI the UnIted States, "November 5, 1953) "estabIIshes the basIs Ior the need-to-know
concept":
"KnowIedge or possessIon oI cIassIIIed deIense InIormatIon shaII be permItted onIy to persons
whose oIIIcIaI dutIes requIre such access In the Interest oI promotIng natIonaI deIense and II they have
been determIned to be trustworthy."
Need-to-know Is deIIned by DoD DIrectIve 5200.1 SubsectIon V.D, EncIosure 1 as:






286
"The dIssemInatIon oI cIassIIIed InIormatIon oraIIy, In wrItIng, or by any other means, shaII be
IImIted to those persons whose oIIIcIaI dutIes requIre knowIedge or possessIon thereoI."
Source: C. DonaId Carrett. "The RoIe oI 'Need-to-Know' In ReIeasIng CIassIIIed nIormatIon." DeIense
ndustry 8uIIetIn 5 no. 2 (February 1969): 1-3.
2. A determInatIon made by the possessor oI cIassIIIed InIormatIon that a prospectIve recIpIent
has a requIrement Ior access to, knowIedge oI, or possessIon oI the cIassIIIed InIormatIon to perIorm
tasks or servIces essentIaI to the IuIIIIIment oI a cIassIIIed contract or program.
Source: DoD. DeIense PersonneI SecurIty Research Center. "EmpIoyees CuIde to SecurIty ResponsIbIIItIes."
http:]]www.hq.nasa.gov]oIIIce]ospp]securItyguIde]Home.htm
3. A determInatIon by a person havIng responsIbIIIty Ior cIassIIIed InIormatIon or materIaI, that a
proposed recIpIent's access to such cIassIIIed InIormatIon or matter Is necessary In the perIormance oI
oIIIcIaI or contractuaI dutIes oI empIoyment.

Source: DOE. Department oI Energy DIrectIve DOE-5631.2c,
http:]]www.Ias.org]Irp]doddIr]doe]o56312c]Index.htmI

4. A determInatIon made by a possessor oI cIassIIIed InIormatIon that a prospectIve recIpIent, In
the Interest oI natIonaI securIty, has a requIrement Ior access to, knowIedge oI, or possessIon oI cIassIIIed
InIormatIon In order to accompIIsh IawIuI and authorIzed Covernment purposes.

Source: U.S. Department oI ]ustIce. UnIted States MarshaIs ServIce. OIIIce oI nspectIons. nternaI SecurIty
DIvIsIon. nIormatIon SecurIty. WashIngton D.C.: 1991. SUDOC: ] 25.2: n 3

5. A determInatIon made by an authorIzed hoIder oI cIassIIIed InIormatIon that a prospectIve
recIpIent requIres access to specIIIc cIassIIIed InIormatIon In order to perIorm or assIst In a IawIuI and
authorIzed government IunctIon.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

6. A determInatIon by an authorIzed hoIder oI cIassIIIed InIormatIon that access to specIIIc
cIassIIIed materIaI In theIr possessIon (typo In NMA doc here) Is requIred by another person to perIorm a
specIIIc and authorIzed IunctIon to carry out a natIonaI task. Such person shaII possess an approprIate
cIearance and access approvaIs In accordance wIth D.C.D 1]14.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI







287
7. n addItIon to a securIty cIearance, a person must have a need to have access to the
partIcuIar cIassIIIed InIormatIon or materIaI sought In connectIon wIth the perIormance oI hIs]her oIIIcIaI
dutIes or by contractuaI obIIgatIons. The determInatIon oI that need wIII be made by the oIIIcIaI(s) havIng
responsIbIIIty Ior the cIassIIIed InIormatIon or materIaI.

Source: U.S.C.S. "NatIonaI SecurIty PosItIon Handbook 440-7-H, CIossary oI DeIInItIons." March 2004,
http:]]www.usgs.gov]usgs-manuaI]handbook]hb]440-7-h]440-7-h-appa.htmI

8. Requested InIormatIon Is pertInent and necessary to the requestor agency In InItIatIng,
IurtherIng, or compIetIng an InvestIgatIon.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

9. A crIterIon used In securIty procedures that requIres the custodIans oI cIassIIIed InIormatIon to
estabIIsh, prIor to dIscIosure, that the Intended recIpIent must have access to the InIormatIon to perIorm
hIs or her oIIIcIaI dutIes.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

10. "Need-to-know" Is the determInatIon by an authorIzed hoIder oI cIassIIIed InIormatIon that a
prospectIve recIpIent requIres access to specIIIc cIassIIIed InIormatIon In order to perIorm or assIst In a
IawIuI and authorIzed governmentaI IunctIon. Such persons shaII possess an approprIate securIty
cIearance and access approvaI granted pursuant to ExecutIve Order 12968, Access to CIassIIIed
nIormatIon.
Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." 3.6]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI

11. Need-to-know demands not mereIy that customers receIve onIy what they need, but aIso that
they receIve aII the InIormatIon they need to carry out theIr mIssIons. To eIIectIveIy ImpIement thIs
dIrectIve, C agencIes must work cooperatIveIy wIth customers to understand theIr requIrements and
ensure that they receIve aII appIIcabIe InteIIIgence InIormatIon whIIe mInImIzIng the rIsk oI unauthorIzed
dIscIosure. Customers, In turn, wIII be responsIbIe Ior ensurIng the appIIcatIon oI need-to-know wIthIn
theIr organIzatIons.

Source: DIrector oI CentraI nteIIIgence DIrectIve 8]1. "nteIIIgence CommunIty PoIIcy on nteIIIgence
SharIng." ]une 4, 2004, http:]]www.Ias.org]Irp]oIIdocs]dcId8-1.htmI







288
Need to Know DetermInatIon Need to Know DetermInatIon Need to Know DetermInatIon Need to Know DetermInatIon
1. DecIsIon made by an authorIzed hoIder oI oIIIcIaI InIormatIon that a prospectIve recIpIent
requIres access to specIIIc oIIIcIaI InIormatIon to carry out oIIIcIaI dutIes.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

2. Need to know means a determInatIon by a person havIng responsIbIIIty
Ior protectIng SaIeguards nIormatIon that a proposed recIpIent's access to SaIeguards nIormatIon Is
necessary In the perIormance oI oIIIcIaI, contractuaI, or IIcensee dutIes oI empIoyment.
47


Source: Energy. 10 CFR 73, http:]]www.gpoaccess.gov]CFR]Index.htmI; ExecutIve Order 10501
(SaIeguardIng OIIIcIaI nIormatIon In the Interests oI the DeIense oI the UnIted States), November 5, 1953
estabIIshes the basIs Ior the need-to-know concept.

Netwar Netwar Netwar Netwar
See See See See Cyberwar, DeIensIve nIormatIon WarIare, Cyberwar, DeIensIve nIormatIon WarIare, Cyberwar, DeIensIve nIormatIon WarIare, Cyberwar, DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, StrategIc nIormatIon WarIare, StrategIc nIormatIon WarIare, StrategIc nIormatIon WarIare, StrategIc
nIormatIon WarIare nIormatIon WarIare nIormatIon WarIare nIormatIon WarIare
ReIers to InIormatIon-reIated conIIIct at a grand IeveI between natIons or socIetIes. t means tryIng to
dIsrupt or damage what a target popuIatIon knows or thInks It knows about ItseII and the worId around It.
A netwar may Iocus on pubIIc or eIIte opInIon, or both. t may InvoIve dIpIomacy, propaganda and
psychoIogIcaI campaIgns, poIItIcaI and cuIturaI subversIon, deceptIon oI or InterIerence wIth IocaI medIa,
InIIItratIon oI computer networks and databases, and eIIorts to promote dIssIdent or opposItIon
movements across computer networks.

Source: ]ohn ]. ArquIIIa and DavId F. RonIeIdt. "Cyberwar and Netwar: New Modes, OId Concepts, oI
ConIIIct. " Rand Research RevIew xIx no. 2 (1995),
http:]]www.rand.org]pubIIcatIons]randrevIew]Issues]RRR.IaII95.cyber]cyberwar.htmI

Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System Next CeneratIon dentIIIcatIon (NC) System
See F8 Center Ior 8IometrIc ExceIIence See F8 Center Ior 8IometrIc ExceIIence See F8 Center Ior 8IometrIc ExceIIence See F8 Center Ior 8IometrIc ExceIIence
The NC System wIII advance the IntegratIon strategIes and IndexIng oI addItIonaI, IawIuIIy authorIzed,
bIometrIc data, provIdIng the Iramework Ior a Iuture muItImodaI system whIch wIII IacIIItate bIometrIc
IusIon IdentIIIcatIon technIques. ThIs Iramework wIII be expandabIe, scaIabIe, and IIexIbIe to

47
The NucIear ReguIatory CommIssIon changed reguIatIons to expand the categorIes oI peopIe who
may seek access to cIassIIIed InIormatIon assocIated wIth NRC reguIated actIvItIes to IncIude
envIronmentaI and pubIIc Interest organIzatIons. The categorIes oI IacIIItIes that may be authorIzed to
store such InIormatIon wIII aIso be expanded. The reguIatIons changed on ]uIy 5, 2005. The new
reguIatIons wIII aIIow potentIaI Intervenors to seek access authorIzatIons and IacIIIty securIty cIearances.
http:]]www.ens-newswIre.com]ens]jun2005]2005-06-02-09.asp







289
accommodate new technoIogIes and emergIng bIometrIcs standards, and wIII be InteroperabIe wIth
exIstIng bIometrIc systems.

Source: F8 Press ReIease, "F8 Announces Contract Award Ior Next CeneratIon dentIIIcatIon System,"
February 12, 2008, http:]]www.IbI.gov]pressreI]pressreI08]ngIcontract021208.htm and RIchard Koman,
"F8 pIannIng massIve database," ZDNet December 24, 2007, http:]]government.zdnet.com]Zp=3580

NCKA NCKA NCKA NCKA
See Code Word Codeword, ExercIse Term, NIckname See Code Word Codeword, ExercIse Term, NIckname See Code Word Codeword, ExercIse Term, NIckname See Code Word Codeword, ExercIse Term, NIckname
The Code Word, NIckname and ExercIse Term (NCKA) system Is desIgned to IuIIy automate the OSD
requIrement Ior maIntenance oI code words, nIcknames, exercIse terms, and reconnaIssance nIcknames
data by the ]oInt StaII. NCKA maIntaIns records oI aII reported code words and theIr status, aII
reconnaIssance nIcknames used at the ]oInt ReconnaIssance Center, aII exercIse terms, and aII currentIy
authorIzed nIcknames. The system vaIIdates code word and nIckname usage wIth assIgned agencIes and
ensures that authorIzed nIcknames and code words are not dupIIcated. The NCKA transactIon provIdes a
way to regIster and maIntaIn code words, nIcknames, and exercIse terms. NCKA currentIy resIdes In the
CIobaI Command and ControI System, cIassIIIed Top Secret (CCCS (TS)).

Source: ChaIrman oI the ]oInt ChIeIs oI StaII ManuaI. Code Word, NIckname and ExercIse Term Report
(Short TItIe - NCKA). AprII 1998, http:]]Ias.org]Irp]doddIr]dod]cjcsm315029a.pdI

NIckname NIckname NIckname NIckname
See Code Names, Code word Codeword, ExercIse Term, NCKA See Code Names, Code word Codeword, ExercIse Term, NCKA See Code Names, Code word Codeword, ExercIse Term, NCKA See Code Names, Code word Codeword, ExercIse Term, NCKA
1. AssIgnment oI the IIrst word nIckname IdentIIIes the usIng agency;
NIcknames may be assIgned to actuaI, reaI-worId events, projects, movement oI Iorces, and other
nonexercIse actIvItIes InvoIvIng eIements oI InIormatIon oI any cIassIIIcatIon category. However, the
nIckname wIth the descrIptIon or meanIng It represents aIong wIth the reIatIonshIp oI the nIckname and
Its meanIng must be uncIassIIIed. A nIckname Is not desIgned to achIeve a securIty objectIve.

Source: HQ North AmerIcan Aerospace DeIense Command NORAD ReguIatIon 11-3. Peterson AIr Force
8ase, CoIorado 80914-5002 25, August 1989. "Code Words, NIcknames and ExercIse Terms."
http:]]www.Ias.org]spp]mIIItary]docops]norad]reg11003.htm

2. A combInatIon oI two separate uncIassIIIed words that Is assIgned an uncIassIIIed meanIng and
Is empIoyed onIy Ior uncIassIIIed admInIstratIve, moraIe, or pubIIc InIormatIon purposes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

3. NIcknames are assIgned by NCKA; n 1975, the ]CS ImpIemented these guIdeIInes by
estabIIshIng a computer system to IuIIy automate the maIntenance and reconcIIIatIon oI nIcknames, code
words, and exercIse terms. [76] The computer system, caIIed the Code Word, NIckname, and ExercIse






290
Term System (an unwIeIdy name shortened to NCKA), Is stIII In operatIon today and can be accessed
through the WorIdwIde MIIItary Command and ControI System. The NCKA system Is not, as some assume
a random word generator Ior nIcknames; It Is, In Iact, mereIy an automated means Ior submIttIng,
vaIIdatIng, and storIng them. The authorIty to create nIcknames rests not wIth those who manage the
NCKA system, but wIth 24 DOD components, agencIes, and unIIIed and specIIIed commands.[77] ]CS
assIgns each oI these organIzatIons a serIes oI two-Ietter aIphabetIc sequences and requIres that the IIrst
word oI each two-word nIckname begIn wIth a Ietter paIr Irom one oI the sequences.[78] For exampIe, the
US AtIantIc Command (USACOM) Is assIgned sIx two-Ietter aIphabetIc sequences: AC-AL, ES-EZ, ]C-]L,
QA-QF, SM-SR, and UM-UR.[79] SeIectIng the Ietter paIr UR Irom the Iast oI these sequences, a staII
oIIIcer recommended the nIckname Urgent Fury Ior the 1983 InvasIon oI Crenada.

Source: Cregory C. SIemInskI. "The Art oI NamIng OperatIons." Parameters: US Army War CoIIege QuarterIy
Autumn 1995, http:]]carIIsIe-www.army.mII]usawc]Parameters]1995]sIemInsk.htm

4. NIcknames may be assIgned to actuaI, reaI-worId events, projects, movement oI Iorces, or
other non-exercIse actIvItIes. They may InvoIve InIormatIon oI any cIassIIIcatIon, but the nIckname and the
descrIptIon or meanIng It represents must be uncIassIIIed. A nIckname Is not desIgned to achIeve a
securIty objectIve

Source: Department oI the Navy, "Code Word, NIcknames, and ExercIse TermInoIogy System," OPNAVNST
5511.37D, ]anuary 30, 2007. http:]]www.Ias.org]Irp]doddIr]navy]opnavInst]551137d.pdI

NondIscIosure Agreements NondIscIosure Agreements NondIscIosure Agreements NondIscIosure Agreements
1. A conIIdentIaIIty agreement; a contract to protect the conIIdentIaIIty oI secret InIormatIon that
Is dIscIosed durIng empIoyment or another type oI busIness transactIon.

Source: NatIonaI DeIense. 32 CFR 2003, http:]]www.gpoaccess.gov]cIr]Index.htmI; NARA, EO 12958
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI and 8rIeIIng 8ookIet,
http:]]www.archIves.gov]Isoo]traInIng]standard-Iorm-312.pdI

2. SF 312, SF 189, and SF 189-A are nondIscIosure agreements between the UnIted States and
an IndIvIduaI; AII empIoyees oI executIve branch departments, and Independent agencIes or oIIIces, who
have not prevIousIy sIgned the SF 189, must sIgn the SF 312 beIore beIng granted access to cIassIIIed
InIormatIon.

Source: DeIense SecurIty ServIce. "CIassIIIed nIormatIon NondIscIosure Agreement."
http:]]www.dtIc.mII]whs]dIrectIves]InIomgt]Iorms]eIorms]sI0312.pdI and
http:]]www.dss.mII]IIIes]pdI]newsI312.pdI

3. DHS Form 11000-6, SensItIve 8ut UncIassIIIed nIormatIon NondIscIosure Agreement (NDA), as
a condItIon oI access to such InIormatIon. Others not contractuaIIy obIIgated to DHS, but to whom access
to InIormatIon wIII be granted, may be requested to execute an NDA as determIned by the appIIcabIe






291
program manager. The revIsed DHS poIIcy InvaIIdates prevIousIy sIgned NDAs. Pursuant to the revIsed
poIIcy, DHS OIIIce oI SecurIty wIII deveIop and ImpIement an educatIon and awareness program Ior the
saIeguardIng oI S8U InIormatIon. Once the program Is deveIoped and approprIate notIIIcatIons are
provIded, aII empIoyees wIII partIcIpate In cIassroom or computer-based traInIng sessIons desIgned to
educate empIoyees on what constItutes S8U InIormatIon.

Source: Department oI HomeIand SecurIty Management DIrectIve 11042,
http:]]www.Ias.org]sgp]othergov]dhs-sbu-rev.pdI; DHS Management DIrectIve 11042.1, revIsed ]anuary
6, 2005, http:]]www.Ias.org]sgp]othergov]dhs20050111.pdI and FAS, Secrecy News ]anuary 12, 2005,
http:]]www.Ias.org]sgp]news]secrecy]2005]01]011205.htmI
Nonor Nonor Nonor NonorganIc nteIIIgence Support ganIc nteIIIgence Support ganIc nteIIIgence Support ganIc nteIIIgence Support
See HUMNT, PSYOP See HUMNT, PSYOP See HUMNT, PSYOP See HUMNT, PSYOP
OrganIc InteIIIgence support rareIy provIdes aII oI the necessary InIormatIon requIred Ior PSYOP unIts to
pIan, produce, dIssemInate, and evaIuate the PSYOP eIIort. ThereIore, PSYOP S-2s must Ieverage the
avaIIabIe InteIIIgence assets that are externaI to the PSYOP communIty. PSYOP depend on HUMNT, sIgnaI
InteIIIgence (SCNT), Imagery InteIIIgence (MNT), open-source InteIIIgence (OSNT), technIcaI InteIIIgence
(TECHNT), and counterInteIIIgence (C) support to pIan theIr mIssIons. These InteIIIgence dIscIpIInes are
dIscussed In the IoIIowIng paragraphs.

Source: DoD PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

North AtIantIc Treaty OrganIzatIon nIormatIon (NATO) North AtIantIc Treaty OrganIzatIon nIormatIon (NATO) North AtIantIc Treaty OrganIzatIon nIormatIon (NATO) North AtIantIc Treaty OrganIzatIon nIormatIon (NATO)
See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs
1. Except Ior the IoreIgn securIty cIassIIIcatIon desIgnatIon RESTRCTED, IoreIgn cIassIIIcatIon
desIgnatIons, IncIudIng those oI InternatIonaI organIzatIons oI governments, e.g., NATO, generaIIy paraIIeI
U.S. cIassIIIcatIon desIgnatIons. A tabIe oI equIvaIents Is contaIned In 12 FAM 529 ExhIbIt 529.13-1.

Source: Department oI State. ForeIgn ServIce ManuaI. 12FAM529.11 "dentIIIcatIon, MarkIng and
HandIIng." http:]]www.state.gov]m]a]dIr]regs]

2. NATO CLASSFED has Iour IeveIs oI cIassIIIed InIormatIon:
COSMC TOP SECRET (CTS)
NATO SECRET (NS)
NATO CONFDENTAL (NC)
NATO RESTRCTED (NR)

The North AtIantIc CouncII oI NATO has agreed that each member natIon wIII estabIIsh a natIonaI securIty
authorIty responsIbIe Ior the securIty oI NATO cIassIIIed InIormatIon wIthIn Its country and In Its natIonaI
agencIes abroad.







292
Source: Department oI Energy DOE M 471.2-1 "ManuaI Ior CIassIIIed Matter ProtectIon and ControI."
September 26, 1995. http:]]Ias.org]Irp]doddIr]doe]m4712-1.htm;
DoD DIrectIve 5100.55 "UnIted States SecurIty AuthorIty Ior North AtIantIc Treaty OrganIzatIon AIIaIrs."
AprII 21, 1982, http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]510055.htm

Not n the CIrcIe oI Love Not n the CIrcIe oI Love Not n the CIrcIe oI Love Not n the CIrcIe oI Love
See Need to Know See Need to Know See Need to Know See Need to Know
]EREMY SCAHLL: And thIs 8Iackwater program Is an outgrowth oI that separatIng oI ]SOC Irom the broader
mIIItary chaIn oI command, and that Is why my sources say there are senIor IIgures wIthIn the mIIItary and
the a admInIstratIon rIght now that may be unaware oI It because as he saId, "They are not In the cIrcIe oI
Iove."
AMY COODMAN: "Not In the cIrcIe oI IoveZ"
]EREMY SCAHLL: That Is the phrase that was used twIce by the mIIItary InteIIIgence source that spoke to.
What we are seeIng now, and aIso taIked to CoIoneI Lawrence WIIkerson, who was the ChIeI oI StaII to
then Secretary oI State CoIIn PoweII. And he descrIbed, he IIrst oI aII, when taIked about thIs, saId the
program wouId not surprIse hIm, and that he was very dIsturbed when he sees execute orders the comIng
out, sayIng that ]SOC Is essentIaIIy above the SpecIaI OperatIons Command and the SpecIaI OperatIons
Command Is essentIaIIy In a support roIe Ior these ]SOC teams. So, what am toId Is that thIs program Is
so compartmentaIIzed, that there are probabIy very top-IeveI peopIe that are unaware oI It, and In Iact,
what my mIIItary InteIIIgence source says, Is that 8Iackwater personneI that are workIng as part oI thIs
program, and have worked as part oI thIs program, have been gIven roIIIng securIty cIearances above theIr
actuaI securIty cIearance.

Source: ]eremy ScahIII, "8Iackwater's Secret War In PakIstan: ]eremy ScahIII ReveaIs PrIvate MIIItary FIrm
OperatIng In PakIstan Under Covert AssassInatIon and KIdnappIng Program," Novermber 24, 2009,
Democracy Now
http:]]www.democracynow.org]2009]11]24]bIackwaterssecretwarInpakIstanjeremy and ScahIII,
"The secret war In PakIstan," The NatIon November 23, 2009
http:]]www.thenatIon.com]doc]20091207]scahIII

NoveI nteIIIgence Irom MassIve Data (NMD) NoveI nteIIIgence Irom MassIve Data (NMD) NoveI nteIIIgence Irom MassIve Data (NMD) NoveI nteIIIgence Irom MassIve Data (NMD)
See Advanced Research DeveIopment ActIvIty (ARDA) See Advanced Research DeveIopment ActIvIty (ARDA) See Advanced Research DeveIopment ActIvIty (ARDA) See Advanced Research DeveIopment ActIvIty (ARDA)
The NoveI nteIIIgence Irom MassIve Data program Is aImed at IocusIng anaIytIc attentIon on the most
crItIcaI InIormatIon Iound wIthIn massIve data - InIormatIon that IndIcates the potentIaI Ior strategIc
surprIse. NoveI nteIIIgence Is actIonabIe InIormatIon not prevIousIy known to the anaIyst or poIIcy makers.
t gIves the anaIyst new InsIght Into a prevIousIy unapprecIated or mIsunderstood threat. MassIve data has
muItIpIe dImensIons that may cause dIIIIcuIty, some oI whIch IncIude voIume or depth, heterogeneIty or
breadth, and compIexIty.

That Is, data may be "massIve" because oI the sheer quantIty oI sImIIar Items, typIcaIIy a petabyte or more.
Some InteIIIgence data sources grow at the rate oI Iour petabytes per month now, and the rate oI growth
Is IncreasIng. A smaIIer voIume oI data may nonetheIess be consIdered "massIve" because It consIsts oI






293
separateIy authored InIormatIon objects In numerous types and Iormats: structured text In varIous
Iormats, unstructured text, spoken text, audIo, vIdeo, tabIes, graphs, dIagrams, Images, maps, equatIons,
chemIcaI IormuIas, etc. Data may aIso be deemed "massIve" because oI Its Inherent compIexIty, whIch
arIses when a sIngIe document contaIns IInks between muItIpIe InIormatIon objects, wIth the meanIng oI
any object dependent on InIormatIon contaIned wIthIn other objects. UnderstandIng the content oI
compIex data requIres beIng abIe to process data that has aIready been Iused together, whIch Is beyond
the capabIIIty oI current technoIogy. A deeper IeveI oI compIexIty comes Into pIay when InIormatIon
requIres a varIety oI expertIse Ior IuII comprehensIon because oI the Interconnectedness oI the domaIns.

Source: nteIIIgence CommunIty Advanced Research and DeveIopment ActIvIty (ARDA). NMD. [See the
Wayback MachIne, http:]]web.archIve.org]web]20050610014439]http:]]Ic-
arda.org]NoveInteIIIgence]Index.htmI ] and ]eIIrey W. SeIIert. "Data MInIng: An OvervIew." CRS Report
Ior Congress ]anuary 27, 2006, http:]]www.Ias.org]sgp]crs]secrecy]RS20748.pdI

~ O ~ ~ O ~ ~ O ~ ~ O ~
O8SCENE FIIe O8SCENE FIIe O8SCENE FIIe O8SCENE FIIe
1. Obscene or pornographIc materIaIs "that may arouse the curIosIty oI 8ureau empIoyees" that
were restrIcted by the Hoover F8.
2. March 24, 1925 8ureau DIrector Hoover authorIzes a specIaI O8SCENE Ietter procedure and
creates a separate O8SCENE FIIe Ior agent reports on "obscene or Improper" materIaIs.
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 363.
OI OIIIcIaI Concern OI OIIIcIaI Concern OI OIIIcIaI Concern OI OIIIcIaI Concern
See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew See PrepubIIcatIon RevIew
MaterIaIs are on matters oI oIIIcIaI concern II they reIate to any poIIcy, program, or operatIon oI the
empIoyee's agency or to current U.S. IoreIgn poIIcIes, or reasonabIy may be expected to aIIect the IoreIgn
reIatIons oI the UnIted States.

Source: U.S. Department oI State. 3 FAM 4172 1-3(A), http:]]www.state.gov]m]a]dIr]regs]
OIIens OIIens OIIens OIIensIve CounterInIormatIon Ive CounterInIormatIon Ive CounterInIormatIon Ive CounterInIormatIon
ActIons agaInst the adversary's InIormatIon IunctIons.
Source: Department oI the AIr Force. "Cornerstones oI nIormatIon WarIare." 1995,
[At the Wayback MachIne,
http:]]web.archIve.org]web]20040901091302]http:]]www.aI.mII]IIb]corner.htmI]







294
OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons OIIensIve nIormatIon OperatIons
1. The Integrated use oI assIgned and supportIng capabIIItIes and actIvItIes, mutuaIIy supported
by InteIIIgence, to aIIect adversary decIsIonmakers to achIeve or promote specIIIc objectIves. These
capabIIItIes and actIvItIes IncIude, but are not IImIted to, operatIons securIty, mIIItary deceptIon,
psychoIogIcaI operatIons, eIectronIc warIare, physIcaI destructIon, and specIaI InIormatIon operatIons, and
couId aIso IncIude computer network attack. (Army) The Integrated use oI assIgned and supportIng
capabIIItIes and actIvItIes, mutuaIIy supported by InteIIIgence, to aIIect enemy decIsIonmakers or to
InIIuence others to achIeve or promote specIIIc objectIves.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
and Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

OIIIce oI CensorshIp OIIIce oI CensorshIp OIIIce oI CensorshIp OIIIce oI CensorshIp
ProvIdes Ior the Secretary oI DeIense to exercIse on InterIm basIs pendIng operatIonaI readIness oI the
OIIIce oI CensorshIp, censorshIp oI communIcatIons crossIng the borders oI the UnIted States and any oI
Its terrItorIes or possessIons.

The DIrector oI CensorshIp Is hereby authorIzed and dIrected to request and coordInate the voIuntary
cooperatIon oI the domestIc press, radIo and teIevIsIon broadcasters and motIon pIcture producers In the
wIthhoIdIng Irom pubIIcatIon mIIItary and other InIormatIon whIch shouId not be reIeased In the Interest
oI eIIectIve prosecutIon oI war.

Source: EIsenhower Emergency ActIon Document, "ExecutIve Order to estabIIsh the OIIIce oI CensorshIp,
and descrIbIng Its IunctIons and dutIes," InItIated by OIIIce oI DeIense MobIIIzatIon, 1956 craIted to
support "OperatIon AIert"; Dee CarrIson, 8racIng Ior Armageddon: Why CIvII DeIense Never Worked New
York: OxIord UnIversIty Press, 2006; and CONELRAD, The EIsenhower 10,
http:]]www.coneIrad.com]atomIcsecrets]secrets.phpZsecrets=e18

OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons OIIIce oI CIobaI CommunIcatIons
The mIssIon oI the OIIIce shaII be to advIse the PresIdent, the heads oI approprIate oIIIces wIthIn the
ExecutIve OIIIce oI the PresIdent, and the heads oI executIve departments and agencIes (agencIes) on
utIIIzatIon oI the most eIIectIve means Ior the UnIted States Covernment to ensure consIstency In
messages that wIII promote the Interests oI the Ior and among coaIItIon partners oI the UnIted States, and
InIorm InternatIonaI audIences. The OIIIce shaII provIde such advIce on actIvItIes In whIch the roIe oI the
UnIted States Covernment Is apparent or pubIIcIy acknowIedged.

Source: ExecutIve Order 13283, "EstabIIshIng the OIIIce oI CIobaI CommunIcatIons." ]anuary 21, 2003,
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI







295
OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence OIIIce oI StrategIc nIIuence
See nIormatIon OperatIons Task Force See nIormatIon OperatIons Task Force See nIormatIon OperatIons Task Force See nIormatIon OperatIons Task Force
n November 2001, the OIIIce oI the Secretary oI DeIense (OSD) stood up the OIIIce oI StrategIc nIIuence
under the dIrect supervIsIon oI the Under Secretary oI DeIense Ior PoIIcy (USD-P). OS was desIgned to
provIde DoD wIth a serIes oI InIormatIon poIIcy optIons and programs that conducted worIdwIde and
target specIIIc anaIysIs and opInIon poIIs. OS was aIso tasked to InItIate programs that countered hostIIe
propaganda, mIsInIormatIon and dIsInIormatIon dIrected agaInst the UnIted States and Its aIIIes Irom
IoreIgn sources. The organIzatIon was composed oI cIvIIIan and mIIItary personneI wIth Interagency,
InIormatIonaI, technoIogIcaI and regIonaI expertIse and pIaced under the dIrectIon oI 8rIgadIer CeneraI
SImon P. Worden, a hIghIy experIenced InIIuence specIaIIst, astro-scIentIst and technoIogIst Irom
USSPACECOM.

nIormed specuIatIon has It that whIIe OS was hIghIy successIuI In determInIng Its
baseIIne mIssIon requIrement agaInst the CWOT
48
and begInnIng to execute pro-US InIIuence programs
abroad, It was not capabIe oI protectIng ItseII Irom poIItIcaI "rIce bowI" Issues and petty jeaIousIes. When a
serIes oI coordInated press reIeases wIth IntentIonaIIy IeadIng dIsInIormatIon hIt the medIa on the
February 20, 2002, a medIa IeedIng Irenzy agaInst OS ensued. DoD decIded to cIose the oIIIce rather than
counter the InternaIIy spread dIsInIormatIon and take correctIve actIons to eIImInate Ieaks and securIty
vIoIatIons. SInce OS was dIssoIved, no other organIzatIon wIthIn the Interagency has attempted to IdentIIy,
coordInate, synchronIze and conduct Iong-term, anaIytIcaIIy based, InIIuence programs In support oI the
U.S. government In the gIobaI envIronment.

Source: CoI. 8rad M. Ward. StrategIc nIIuence OperatIons - The nIormatIon ConnectIons. Army War
CoIIege. AprII, 2003, http:]]www.Ias.org]Irp]eprInt]ward.pdI

OIIIcIaI DoD nIormatIon OIIIcIaI DoD nIormatIon OIIIcIaI DoD nIormatIon OIIIcIaI DoD nIormatIon
AII InIormatIon that Is In the custody and controI oI the Department oI DeIense, reIates to InIormatIon In
the custody and controI oI the Department, or was acquIred by DoD empIoyees as part oI theIr oIIIcIaI
dutIes or because oI theIr oIIIcIaI status wIthIn the Department.

Source: DoD, "CIearance oI DoD nIormatIon Ior PubIIc ReIease," DoD DIrectIve 5230.09,
August 22, 2008, http:]]www.Ias.org]Irp]doddIr]dod]d523009.pdI

OIIIcIaI nIormatIon OIIIcIaI nIormatIon OIIIcIaI nIormatIon OIIIcIaI nIormatIon
See CIosed nIormatIon, TwIIIght nIormatIon See CIosed nIormatIon, TwIIIght nIormatIon See CIosed nIormatIon, TwIIIght nIormatIon See CIosed nIormatIon, TwIIIght nIormatIon
nIormatIon whIch Is owned by, produced Ior or by, or Is subject to the controI oI the UnIted States
Covernment. AII cIassIIIed InIormatIon Is consIdered oIIIcIaI InIormatIon. [emphasIs added]

48
The CIobaI War on Terror appears to have shIIted to "Overseas ContIngency OperatIons," see
WashIngton Post March 25, 2009,
http:]]www.washIngtonpost.com]wp-dyn]content]artIcIe]2009]03]24]AR2009032402818.htmI






296
Source: DoD. DeIense PersonneI SecurIty Research Center. "EmpIoyees CuIde to SecurIty
ResponsIbIIItIes,"
http:]]www.hq.nasa.gov]oIIIce]ospp]securItyguIde]Home.htm
OIIIcIaI Use OnIy OIIIcIaI Use OnIy OIIIcIaI Use OnIy OIIIcIaI Use OnIy
1. A desIgnatIon IdentIIyIng a certaIn uncIassIIIed but sensItIve InIormatIon that may be exempt
Irom pubIIc reIease under the Freedom oI nIormatIon Act; or
2. A securIty cIassIIIcatIon markIng used durIng the perIod ]uIy 18, 1949 through October 22,
1951.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
3. On AprII 9, 2003, DOE Issued dIrectIves that IormaIIy estabIIshed an OUO program wIthIn DOE
Ior the IIrst tIme sInce the AtomIc Energy CommIssIon. These dIrectIves appIy to aII DOE and NatIonaI
NucIear SecurIty AdmInIstratIon (NNSA) eIements that (1) IdentIIy InIormatIon under theIr cognIzance as
OUO and mark documents accordIngIy, or 2. possess documents marked as OUO by other DOE eIements
or marked wIth other agency markIngs equIvaIent to OUO (e.g., DoD "For OIIIcIaI use OnIy"; Department oI
State's "SensItIve 8ut UncIassIIIed.")

Any empIoyee, IederaI or contractor can determIne that an uncIassIIIed document contaIns OUO
InIormatIon [emphasIs added] II that document Is orIgInated wIthIn hIs]her oIIIce, or Is under the controI
oI hIs]her oIIIce. No specIaI authorIty or traInIng Is requIred. As outIIned In the manuaI, the IIrst step Is Ior
the empIoyee to determIne II the InIormatIon has the potentIaI to damage CovernmentaI, commercIaI, or
prIvate Interests II gIven to someone who doesn't need It to perIorm hIs]her job or other DOE authorIzed
actIvIty.

Source: DOE ManuaI 471.3-1 and DOE CommunIque. voI. 20 no. 1 February 2004,
http:]]www.Ias.org]sgp]othergov]doe]comm0204.pdI

OC OC OC OC-- -- -- --Project StrIkeback Project StrIkeback Project StrIkeback Project StrIkeback
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Department oI EducatIon. Compares Department oI EducatIon and FederaI 8ureau oI
nvestIgatIon data Ior anomaIIes. AIso verIIIes personaI IdentIIIers;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.







297
Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-
548, May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

Open Source Center Open Source Center Open Source Center Open Source Center
1. 8ased at the CA, the Center wIII advance the nteIIIgence CommunIty's expIoItatIon oI openIy
avaIIabIe InIormatIon to IncIude the nternet, databases, press, radIo, teIevIsIon, vIdeo, geospatIaI data,
photos and commercIaI Imagery. The Center's IunctIons wIII IncIude coIIectIon, anaIysIs and research,
traInIng and InIormatIon technoIogy management to IacIIItate government-wIde access and use. The
Center wIII buIId on the estabIIshed expertIse oI the CA's ForeIgn 8roadcast nIormatIon ServIce (F8S),
whIch has provIded the U.S. Covernment a broad range oI hIghIy vaIued products and servIces sInce 1941.
The DIrector oI the CA wIII admInIster the Center on behaII oI the DN.

Source: OIIIce oI the DIrector oI NatIonaI nteIIIgence. November 8, 2005,
http:]]www.dnI.gov]pressreIeases]20051108reIease.htm
2. 8ased at CA, eIIectIve 1 November 2005. The Center wIII buIId on the estabIIshed expertIse oI
the CA's ForeIgn 8roadcast nIormatIon ServIce (F8S) - an organIzatIon that enjoys a Iong hIstory oI
provIdIng the US government hIghIy vaIued open source products and servIces. The Center's IunctIons wIII
IncIude coIIectIon, anaIysIs and research, traInIng, and InIormatIon technoIogy management to IacIIItate
government-wIde access and use.
Source: CentraI nteIIIgence Agency. Press ReIease. November 8, 2005. [See the Wayback MachIne,
http:]]web.archIve.org]web]20060705165235]http:]]www.cIa.gov]cIa]pubIIcaIIaIrs]pressreIease]2005
]pr11082005.htmI ]and Secrecy News May 18, 2008 "Open Source Center Keeps PubIIc In the Dark,"
http:]]www.Ias.org]bIog]secrecy]2008]05]opensourcecent.htmI
Open Source nIormatIon Open Source nIormatIon Open Source nIormatIon Open Source nIormatIon
1. nIormatIon that Is pubIIcIy avaIIabIe (Ior exampIe, any member oI the pubIIc couId IawIuIIy
obtaIn InIormatIon by request or observatIon), as weII as other uncIassIIIed InIormatIon that has IImIted
pubIIc dIstrIbutIon or access. Open-source InIormatIon aIso IncIudes any InIormatIon that may be used In
an uncIassIIIed context wIthout compromIsIng natIonaI securIty or InteIIIgence sources or methods. I the
InIormatIon Is not pubIIcIy avaIIabIe, certaIn IegaI requIrements reIatIng to coIIectIon, retentIon, and
dIssemInatIon mIght appIy.

Source: OIIIce oI PubIIc AIIaIrs. CentraI nteIIIgence Agency. A Consumer's CuIde to nteIIIgence: CaInIng
KnowIedge and ForeknowIedge oI the WorId around Us. WashIngton, D.C.: SprIngIIeId, VA: NatIonaI
TechnIcaI nIormatIon ServIce, [1999Z]. SUDOC: PREX 3.2: C 76 and PREX 3.2]2: C 94

2. PubIIcIy avaIIabIe InIormatIon (that Is, InIormatIon that any member oI the pubIIc couId IawIuIIy
obtaIn by request or observatIon), as weII as other uncIassIIIed InIormatIon that has IImIted pubIIc
dIstrIbutIon or access (IncIudIng InIormatIon Irom companIes, academIa and other sources). Access to
such InIormatIon may or may not requIre payment.






298

Source: FederaI CeographIc Data CommIttee. CuIdeIInes Ior ProvIdIng ApproprIate Access to CeospatIaI
Data In Response to SecurIty Concerns." ]une 2005, http:]]www.Ias.org]sgp]othergov]IgD.C.0605.pdI

3. October 1, 2005, the CA's "open source" unIt wIII be operatIonaI, scannIng WebsItes,
newspapers, radIo, teIevIsIon, [the InIocommons In other words].

Source: TImothy ]. 8urger. "OpenIng up the CA." TIme 166 no. 7 (August 15, 2005).

Open Source nIormatIon System Open Source nIormatIon System Open Source nIormatIon System Open Source nIormatIon System
nIormatIon network whIch provIdes access to U.S. Covernment and other open source coIIectIons.

Source: DeIense TechnIcaI nIormatIon Center (DTC). PubIIc STNET CIossary.
http:]]stInet.dtIc.mII]heIp]acronyms.htmI and FAS.http:]]www.Ias.org]Irp]program]dIssemInate]osIs.htm

Open Open Open Open- -- -Source nteIIIgence Source nteIIIgence Source nteIIIgence Source nteIIIgence
1. nIormatIon oI potentIaI InteIIIgence vaIue that Is avaIIabIe to the generaI pubIIc.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
2. HIghIy cIassIIIed messages or anaIytIcaI products underwent a sanItatIon process whIch tended
to remove Important detaIIs. The end resuIt was InteIIIgence reports whIch were too generaI or broad to be
oI much use. An attempt to dIssemInate hIghIy cIassIIIed documents down to port oI entry IeveI, resuIted
In the dIscovery that Iew II any personneI at that IeveI had the requIsIte cIearances. n other Instances, the
necessary securIty InIrastructure was unavaIIabIe.
.gIven the IargeIy uncIassIIIed nature oI open source InteIIIgence products, the aIorementIoned Issues oI
cIearances and securIty InIrastructure are IrreIevant. Not onIy can these OSNT products be dIssemInated
to Inspectors at a port oI entry, they can aIso be provIded to state and IocaI Iaw enIorcement. n Iact,
OSNT products couId be dIssemInated to the IuII compIIment oI IIrst responders such as IIreIIghters,
EMT's unIversIty poIIce departments, hospItaIs and IuII securIty IIrms. ConsIder Ior a moment what a
paradIgm shIIt that wouId represent.
Source: EIIot A. ]ardInes, PresIdent, Open Source PubIIshIng, ncorporated's (OSP) and AssIstant Deputy
DIrector oI NatIonaI nteIIIgence Ior Open Source. 8eIore the House CommIttee on HomeIand SecurIty,
SubcommIttee on nteIIIgence, nIormatIon SharIng, and TerrorIsm RIsk Assessment. HearIng on "UsIng
Open-Source nIormatIon EIIectIveIy." ]une 21, 2005. 1-2, http:]]www.osInt.org]testImonyjardInes.pdI

3. Open source InIormatIon, accordIng to some observers, generaIIy IaIIs Into Iour
categorIes: wIdeIy avaIIabIe data and InIormatIon; targeted commercIaI data; IndIvIduaI experts; and "gray"
IIterature, whIch consIsts oI wrItten InIormatIon produced by the prIvate sector, government, and academe






299
that has IImIted avaIIabIIIty, eIther because Iew copIes are produced, exIstence oI the materIaI Is
IargeIy unknown, or access to InIormatIon Is constraIned. WIthIn these Iour categorIes, open source
InIormatIon can IncIude:

medIa such as newspaper, magazInes, radIo, teIevIsIon, and computer-based InIormatIon;
pubIIc data such as government reports, and oIIIcIaI data such as budgets and demographIcs,
hearIngs, IegIsIatIve debates, press conIerences, and speeches;
InIormatIon derIved Irom proIessIonaI and academIc sources such as conIerences, symposIa,
proIessIonaI assocIatIons, academIc papers, dIssertatIons and theses, and experts;
commercIaI data such as commercIaI Imagery; and,
gray IIterature such as trIp reports, workIng papers, dIscussIon papers, unoIIIcIaI government
documents, proceedIngs, preprInts, research reports, studIes, and market surveys.

Open source InIormatIon aIso can IncIude InIormatIon, whIch aIthough uncIassIIIed, couId be consIdered
company proprIetary, IInancIaIIy sensItIve, IegaIIy protected, or personaIIy damagIng.24 WIth IncreasIng
Irequency, It aIso IncIudes InIormatIon derIved Irom nternet bIogs. AccordIng to nteIIIgence CommunIty
oIIIcIaIs, bIogs are provIdIng "a Iot oI rIch InIormatIon that are teIIIng us a Iot about socIaI perspectIve and
everythIng Irom what the generaI IeeIIng Is[,], to ... peopIe puttIng InIormatIon on there that doesn't exIst
anywhere eIse."

Source: RIchard A. 8est, ]r., and AIIred CummIng," Open Source nteIIIgence (OSNT): ssues Ior Congress,"
December 5, 2007, RL34270, CRS Report to Congress, http:]]www.Ias.org]sgp]crs]InteI]RL34270.pdI

Open Storage Open Storage Open Storage Open Storage
Storage oI cIassIIIed InIormatIon wIthIn an accredIted IacIIIty but not In CeneraI ServIces AdmInIstratIon
approved secure contaIners, whIIe the IacIIIty Is unoccupIed by authorIzed personneI.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
OperatIon TPS OperatIon TPS OperatIon TPS OperatIon TPS
See TerrorIsm nIormatIon PreventIon System See TerrorIsm nIormatIon PreventIon System See TerrorIsm nIormatIon PreventIon System See TerrorIsm nIormatIon PreventIon System
OperatIonaI DocumentatIon OperatIonaI DocumentatIon OperatIonaI DocumentatIon OperatIonaI DocumentatIon
1. VIsuaI InIormatIon documentatIon oI actIvItIes to convey InIormatIon about peopIe, pIaces, and
thIngs. t Is generaI purpose documentatIon normaIIy accompIIshed In peacetIme.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]dod







300
2. OperatIvnoye dokumentIrovanIye. FactuaI InIormatIon detaIIIng the subversIve actIvItIes oI
InteIIIgence oIIIcers and agents oI capItaIIst InteIIIgence servIces or antI-SovIet eIements. AIso the
organIzatIonaI aspects oI the actIvItIes oI state securIty agencIes.

Source: MItrokhIn, VasIIy, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.

OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon OperatIonaI FIIes ExemptIon
1. FIIes "that document the means by whIch IoreIgn InteIIIgence or counterInteIIIgence Is coIIected
through scIentIIIc and technIcaI systems."

Source: War and NatIonaI DeIense. 50 U.S.C 403-5e, http:]]www.gpoaccess.gov]uscode]browse.htmI

2. NatIonaI ReconnaIssance OIIIce toId a IederaI court It shouId not have to process a Freedom oI
nIormatIon Act request Ior uncIassIIIed portIons oI Its congressIonaI budget justIIIcatIon book because
the document Is contaIned In "operatIonaI IIIes" that are exempt Irom search and revIew under the FOA.

That contentIon was chaIIenged In a IawsuIt by the FederatIon oI AmerIcan ScIentIsts, whIch toId the court
that the budget book cannot be consIdered an operatIonaI IIIe because It Is dIssemInated InsIde and
outsIde oI the agency, and that records that have been dIssemInated are excIuded by statute Irom the
deIInItIon oI operatIonaI IIIes.

Source: FAS. Secrecy News. December 6, 2005,
http:]]www.Ias.org]sgp]news]secrecy]2005]12]Index.htmI and AItergood v. NatIonaI ReconnaIssance
OIIIce, http:]]www.Ias.org]sgp]IoIa]nro-cbjb]Index.htmI
3. Congress granted the DeIense nteIIIgence Agency an exemptIon Irom the Freedom oI
nIormatIon Act Ior Its "operatIonaI IIIes," but onIy Ior the next two years. DA Is the IIIth InteIIIgence
agency -- aIter CA, NSA, NRO and NCA-- to receIve such an exemptIon, whIch permIts It to excIude Irom
searchIng or revIewIng Ior reIease under FOA IIIes "that document the conduct oI IoreIgn InteIIIgence or
counterInteIIIgence
operatIons."

Source: FAS. Secrecy News ]anuary 5, 2006,
http:]]www.Ias.org]sgp]news]secrecy]2006]01]010506.htmI, http:]]www.Ias.org]sgp]IoIa]nro-
cbjb]Index.htmI, and FY 2006 DeIense AuthorIzatIon Act, accompanyIng report Ianguage,
http:]]www.Ias.org]sgp]congress]2005]dIa-opIIIes.htmI
4. EIIectIve 21 AprII 2005, sectIon 1071(a)(6) oI the nteIIIgence ReIorm and TerrorIsm PreventIon
Act oI 2004 amended the CA nIormatIon Act, to provIde that the DIrector oI CA (D]CA), wIth the
coordInatIon oI the DIrector oI NatIonaI nteIIIgence (DN), may exempt CA operatIonaI IIIes Irom the FOA






301
search, revIew, pubIIcatIon, and dIscIosure provIsIons; and that not Iess than once every ten years, the
D]CA and the DN shaII revIew the exemptIons In Iorce, In order to make the determInatIons noted above.

The IoIIowIng categorIes oI CA operatIonaI IIIes as exempt Irom the search, revIew, pubIIcatIon, and
dIscIosure provIsIons oI the FOA. FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons FIIes wIthIn the DIrectorate oI OperatIons - PersonaIIty FIIes, ExternaI
OrganIzatIons FIIes, OperatIonaI nterest FIIes, OperatIonaI ActIvIty FIIes, PoIIcy and Management FIIes
(ncIudIng CIandestIne ServIce HIstory Program FIIes), Cover Arrangements FIIes; FIIes wIthIn the FIIes wIthIn the FIIes wIthIn the FIIes wIthIn the
DIrectorate oI ScIence & TechnoIogy DIrectorate oI ScIence & TechnoIogy DIrectorate oI ScIence & TechnoIogy DIrectorate oI ScIence & TechnoIogy - SIgnaI nteIIIgence ActIvItIes FIIes, OperatIonaI and TechnIcaI
Support FIIes, nteIIIgence CoIIectIons Systems FIIes, magery AnaIysIs and ExpIoItatIon FIIes; FIIes wIthIn FIIes wIthIn FIIes wIthIn FIIes wIthIn
the SecurIty Center the SecurIty Center the SecurIty Center the SecurIty Center - -- - Covert SecurIty ApprovaI]SECRET FIIes, ProvIsIonaI Covert SecurIty ApprovaI]SECRET
FIIes, OperatIonaI ApprovaI FIIes, ProvIsIonaI OperatIonaI ApprovaI FIIes, Anonymous PersonneI ActIons
FIIes, ApprovaI To PoIygraph Ior OperatIonaI Purposes FIIes, DIversIIIed Cover OIIIcer FIIes,
Contract]ExternaI FIIes, Covert SecurIty ApprovaI]SECRET FIIes, NatIonaI Resources DIvIsIon and Name
Check]OperatIonaI Program FIIes, ndustrIaI SpecIaI SecurIty ApprovaI]Covert, ndustrIaI SecurIty
ApprovaI]Covert, and ndustrIaI SpecIaI SecurIty ApprovaI]Covert ReInvestIgatIon FIIes, nternaI]Covert
FIIes, ConsuItant ExternaI]OperatIons and ConsuItant nternaI]OperatIons FIIes.

Source: CA. Report oI the Second DecennIaI RevIew oI CA OperatIonaI FIIe
ExemptIons. ]une 28, 2005. FAS, http:]]www.Ias.org]sgp]othergov]cIaopI2.htmI

OperatIonaI nIormatIon OperatIonaI nIormatIon OperatIonaI nIormatIon OperatIonaI nIormatIon
RIdenour, accordIng to QuIst, RIdenour In 1945 was the IIrst author to dIscuss the three cIasses oI
InIormatIon - technIcaI, scIentIIIc, and operatIonaI - that a government may want to cIassIIy as "subjectIve
and objectIve InIormatIon. " OperatIonaI InIormatIon has the IoIIowIng propertIes oI
Compactness: "a Iew words can carry a great secret, thereIore It Is easy to steaI."
UnIversaIIy understandabIe: "anyone can steaI It."
ArbItrary: "It thereIore needs to be stoIen; II the InIormatIon consIsts oI mIIItary InIormatIon It Is
most IIkeIy "ImprobabIe and thereIore has an eIement oI surprIse."
Subject to change
PerIshabIe: "Even the most strIngent oI securIty measures can be toIerated.as they are not
permanent."
Source: LouIs NIcot RIdenour. "MIIItary SecurIty & the AtomIc 8omb." Fortune November (1945): 32, 170-171,
216+, and ArvIn S. QuIst. SecurIty CIassIIIcatIon oI nIormatIon. VoIume 2. PrIncIpIes Ior CIassIIIcatIon oI
nIormatIon. AprII 1993, http:]]www.Ias.org]sgp]IIbrary]quIst2]chap2.htmI http:]]www.Ias.org]sgp]IIbrary]quIst2]chap2.htmI http:]]www.Ias.org]sgp]IIbrary]quIst2]chap2.htmI http:]]www.Ias.org]sgp]IIbrary]quIst2]chap2.htmI

OperatIons Resea OperatIons Resea OperatIons Resea OperatIons Research rch rch rch
The anaIytIcaI study oI mIIItary probIems undertaken to provIde responsIbIe commanders and staII
agencIes wIth a scIentIIIc basIs Ior decIsIon on actIon to Improve mIIItary operatIons.







302
Source: Department oI DeIense. DoD DIctIonary oI MIIItary and AssocIated Terms. ]P 1-02. As
Amended through 31 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary] and OIIIce oI the
Under Secretary oI DeIense. Report oI the DeIense ScIence 8oard AdvIsory Croup on DeIense nteIIIgence
OperatIons Research AppIIcatIons Ior nteIIIgence, SurveIIIance and ReconnaIssance (SR), ]anuary, 2009,
http:]]www.Ias.org]Irp]agency]dod]dsb]or-InteI.pdI

Op Op Op OperatIons SecurIty Protected nIormatIon eratIons SecurIty Protected nIormatIon eratIons SecurIty Protected nIormatIon eratIons SecurIty Protected nIormatIon
UncIassIIIed InIormatIon concernIng CDC mIssIon, IunctIons, operatIons, or programs that requIre
protectIon In the natIonaI Interest, securIty or homeIand deIense as Iterated In NatIonaI SecurIty DecIsIon
DIrectIve 298, ]anuary 1988, whIch estabIIshed a NatIonaI OperatIons SecurIty Program.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

OpposIng nIormatIon OpposIng nIormatIon OpposIng nIormatIon OpposIng nIormatIon
ntentIonaI or unIntentIonaI truth-based InIormatIon Irom any source that represents an opposIng vIew.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

ORCON ORCON ORCON ORCON
See DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator CIassIIIcatIon MarkIngs See DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator CIassIIIcatIon MarkIngs See DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator CIassIIIcatIon MarkIngs See DIssemInatIon and ExtractIon oI nIormatIon ControIIed by OrIgInator CIassIIIcatIon MarkIngs
ControI MarkIngs ControI MarkIngs ControI MarkIngs ControI MarkIngs

OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe OrganIzatIonaI HIstory FIIe
HIstorIcaI documents, photographs, and other Items oI sIgnIIIcance to and beIongIng to a partIcuIar Army
organIzatIon. (See AR 25-400-2.)

Source: Department oI the Army. HIstorIcaI ActIvItIes, MIIItary HIstory: ResponsIbIIItIes, PoIIcIes, and
Procedures, 21 September 2007, http:]]www.monmouth.army.mII]hIstorIan]reg]r8705.pdI

OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon OrIgInaI CIassIIIcatIon
See 8orn CIassIIIed See 8orn CIassIIIed See 8orn CIassIIIed See 8orn CIassIIIed
1. nIormatIon that meets the crIterIa and subject areas oI EO 12356 or through unauthorIzed
dIscIosure oI the InIormatIon "reasonabIy be expected to cause damage to natIonaI securIty."

Source: DOE. UnderstandIng CIassIIIcatIon. . . . WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary Ior
DeIense Programs, OIIIce oI CIassIIIcatIon, 1987. SUDOC: E 1.15:0007]1







303
2. OrIgInaI CIassIIIcatIon Is an InItIaI determInatIon by an authorIzed cIassIIIer that InIormatIon
requIres extraordInary protectIon, because unauthorIzed dIscIosure oI the InIormatIon couId reasonabIy
be expected to cause damage to the natIonaI securIty. The process oI orIgInaI cIassIIIcatIon ordInarIIy
IncIudes both the determInatIon oI the need to protect the InIormatIon and the pIacement oI markIngs to
IdentIIy the InIormatIon as cIassIIIed. 8y deIInItIon, orIgInaI cIassIIIcatIon precedes aII other aspects oI the
securIty cIassIIIcatIon system, e.g., derIvatIve cIassIIIcatIon, saIeguardIng and decIassIIIcatIon.

Source: SOO. "2001 AnnuaI Report to the PresIdent." http:]]www.archIves.gov]Isoo]reports]2001-
annuaI-report.htmI

3. The InItIaI determInatIon that InIormatIon requIres, In the Interest oI natIonaI securIty,
protectIon agaInst unauthorIzed dIscIosure. t Is the act oI decIdIng that InIormatIon never cIassIIIed
beIore meets the crIterIa to be desIgnated as cIassIIIed InIormatIon. AIthough the process oI makIng
orIgInaI cIassIIIcatIon decIsIons can be compIex and dIIIIcuIt, It consIsts oI sIx steps (aIready cIassIIIed,
eIIgIbIIIty, damage, cIassIIIcatIon IeveI, duratIon, communIcatIon oI decIsIon; chart, page 5 oI NMA CuIde).

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

OrIgInaI CIassIIIcatIon AuthorIty OrIgInaI CIassIIIcatIon AuthorIty OrIgInaI CIassIIIcatIon AuthorIty OrIgInaI CIassIIIcatIon AuthorIty
See EquIty See EquIty See EquIty See EquIty
1. AIso caIIed orIgInaI cIassIIIers; IndIvIduaIs desIgnated In wrItIng, eIther by the PresIdent or by
seIected agency heads, to cIassIIy InIormatIon In the IIrst Instance. Under ExecutIve Order 12958, as
amended, onIy orIgInaI cIassIIIers determIne what InIormatIon II dIscIosed wIthout authorIty couId
"reasonabIy be expected to cause damage to the natIonaI securIty." OrIgInaI cIassIIIers must be abIe to
IdentIIy or descrIbe the damage Incurred Irom reIease oI InIormatIon. ApproxImateIy 4,000 oIIIcIaIs hoId
orIgInaI cIassIIIcatIon authorIty.

SOO states "8ecause they are the onIy IndIvIduaIs In the process authorIzed to exercIse dIscretIon In
makIng cIassIIIcatIon decIsIons, theIr decIsIon to cIassIIy partIcuIar InIormatIon constItutes the IIrst stage
In the IIIe cycIe oI cIassIIIed natIonaI securIty InIormatIon and can spawn hundreds II not thousands oI
derIvatIve cIassIIIcatIon decIsIons."

Source: nIormatIon SecurIty OversIght OIIIce (SOO). 2004 Report to the PresIdent
http:]]www.archIves.gov]Isoo]reports]2004-annuaI-report.htmI; Ior a IIst oI OCAs, see FAS, CIInton EO
12958. http:]]www.Ias.org]sgp]cIInton]oca.htmI; MethodoIogy Ior DetermInIng ApproprIateness oI an
OrIgInaI CIassIIIcatIon DecIsIon http:]]www.archIves.gov]Isoo]pdI]approprIate-cIassIIIcatIon.pdI; and
Memorandum Ior See DIstrIbutIon, StandardIzed MethodoIogy Ior MakIng CIassIIIcatIon DecIsIons (2006Z),
http:]]www.Ias.org]sgp]othergov]dod]methodoIogy.pdI

OrIgInaI CIassIIIer OrIgInaI CIassIIIer OrIgInaI CIassIIIer OrIgInaI CIassIIIer






304
An authorIzed IndIvIduaI In the executIve branch who InItIaIIy determInes that partIcuIar InIormatIon
requIres a specIIIc degree oI protectIon agaInst unauthorIzed dIscIosure In the Interest oI natIonaI securIty
and appIIes the cIassIIIcatIon desIgnatIon "Top Secret," "Secret," or "ConIIdentIaI."

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

OvercIassIIIcatIon OvercIassIIIcatIon OvercIassIIIcatIon OvercIassIIIcatIon
1. DerIvatIve decIsIons that cannot trace theIr orIgIn or that ImproperIy appIy source guIdance are
a major source oI overcIassIIIcatIon.

Source: (WrIght) CommIssIon on Covernment SecurIty, 1955, the (StIIweII) Department oI DeIense SecurIty
RevIew CommIssIon, 1985, and the CommIssIon on ProtectIng and ReducIng Covernment Secrecy In 1997.
http:]]www.Ias.org]sgp]congress]2005]030205overcIass.htmI; aIso see "ExecutIve Order 12958,
Amended," http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI.

2. RequIre that aII IInIshed InteIIIgence products created by the Department be sImuItaneousIy
prepared In the standard uncIassIIIed Iormat, provIded that such an uncIassIIIed product wouId reasonabIy
be expected to be oI any beneIIt to a State, IocaI, trIbaI or terrItorIaI government, Iaw enIorcement agency
or other emergency response provIder, or the prIvate sector, based on Input provIded by the nteragency
Threat Assessment and CoordInatIon Croup DetaII estabIIshed under sectIon 210D. (Sec. 210F,
OvercIassIIIcatIon PreventIon Program).

Source: H.R.553 ReducIng Over-CIassIIIcatIon Act oI 2009, CongressIonaI Record, 155
(February 3, 2009), http:]]www.gpoaccess.gov]crecord]

Ov Ov Ov Overt PeacetIme PsychoIogIcaI OperatIons Programs ert PeacetIme PsychoIogIcaI OperatIons Programs ert PeacetIme PsychoIogIcaI OperatIons Programs ert PeacetIme PsychoIogIcaI OperatIons Programs
See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons
Those programs deveIoped by combatant commands, In coordInatIon wIth the chIeIs oI US dIpIomatIc
mIssIons, that pIan, support, and provIde Ior the conduct oI psychoIogIcaI operatIons, durIng mIIItary
operatIons other than war, In support oI US regIonaI objectIves, poIIcIes, Interests, and theater mIIItary
mIssIons.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
Overt Products Overt Products Overt Products Overt Products
A product that openIy IdentIIIes Its source Is known as an overt product. Overt products are dIssemInated
and acknowIedged by the orIgInator or by an accredIted agency thereoI. They are dIssemInated wIthout
IntentIon to deceIve the target audIence as to where they orIgInated.







305
Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI


~ P ~ ~ P ~ ~ P ~ ~ P ~

PACER PACER PACER PACER
PubIIc A AA Access to C CC Court E EE EIectronIc R RR Records (PACER) Is an eIectronIc pubIIc access servIce that aIIows users
to obtaIn case and docket InIormatIon Irom FederaI AppeIIate, DIstrIct and 8ankruptcy courts, and the U.S.
Party]Case ndex vIa the nternet. Each court maIntaIns Its own databases wIth case InIormatIon. 8ecause
PACER database systems are maIntaIned wIthIn each court, each jurIsdIctIon wIII have a dIIIerent URL.
AccessIng and queryIng InIormatIon Irom each servIce Is comparabIe; however, the Iormat and content oI
InIormatIon provIded may dIIIer sIIghtIy.

PACER Is a servIce oI the UnIted States ]udIcIary. The PACER ServIce Center Is run by the AdmInIstratIve
OIIIce oI the UnIted States Courts. PACER Is not Iree, but cheaper than an IndIvIduaI WestIaw or LexIs
NexIs account (perhaps; see http:]]pacer.psc.uscourts.gov]Iaq.htmI#CP8).

Source: UnIted States ]udIcIary, http:]]pacer.psc.uscourts.gov]pacerdesc.htmI

Paperwork ReductIon Act Paperwork ReductIon Act Paperwork ReductIon Act Paperwork ReductIon Act
49 49 49 49

The purposes oI thIs subchapter are to--
(2) ensure the greatest possIbIe pubIIc beneIIt Irom and maxImIze the utIIIty oI InIormatIon created,
coIIected, maIntaIned, used, shared and dIssemInated by or Ior the FederaI Covernment;
(3) coordInate, Integrate, and to the extent practIcabIe and approprIate, make unIIorm FederaI InIormatIon
resources management poIIcIes and practIces as a means to Improve the productIvIty, eIIIcIency, and
eIIectIveness oI Covernment programs, IncIudIng the reductIon oI InIormatIon coIIectIon burdens on the
pubIIc and the Improvement oI servIce deIIvery to the pubIIc;
(5) mInImIze the cost to the FederaI Covernment oI the creatIon, coIIectIon, maIntenance, use,
dIssemInatIon, and dIsposItIon oI InIormatIon;

49
AccordIng to 8Ium, (1; Secrecy Report Card 2005.
http:]]www.openthegovernment.org]otg]SRC2005.pdI)) In 2004, every document
cIassIIIed cost the government $460 to secure; shouIdn't the PRA extend to the expense oI cIassIIyIng
docsZ








306
(7) provIde Ior the dIssemInatIon oI pubIIc InIormatIon on a tImeIy basIs, on equItabIe terms, and In a
manner that promotes the utIIIty oI the InIormatIon to the pubIIc and makes eIIectIve use oI InIormatIon
technoIogy;
(8) ensure that the creatIon, coIIectIon, maIntenance, use, dIssemInatIon, and dIsposItIon oI InIormatIon by
or Ior the FederaI Covernment Is consIstent wIth appIIcabIe Iaws, IncIudIng Iaws reIatIng to--
(9) ensure the IntegrIty, quaIIty, and utIIIty oI the FederaI statIstIcaI system;
(10) ensure that InIormatIon technoIogy Is acquIred, used, and managed to Improve perIormance oI
agency mIssIons, IncIudIng the reductIon oI InIormatIon coIIectIon burdens on the pubIIc;
Source: Paperwork ReductIon Act. 44 USC 35 3501,
http:]]www.archIves.gov]IederaI-regIster]Iaws]paperwork-reductIon]3501.htmI

2. The PRA requIres that agencIes obtaIn OM8 approvaI Ior coIIectIons oI InIormatIon. A coIIectIon
oI InIormatIon wIthout current OM8 approvaI constItutes a vIoIatIon oI the PRA. Each year OM8 Is requIred
to report to Congress PRA vIoIatIons pubIIshed In the nIormatIon CoIIectIon 8udget oI the UnIted States.

Source: OIIIce oI Management and 8udget. "FIscaI Year 2005 nIormatIon CoIIectIon 8udget." OM8 8uIIetIn
04-04. September 28, 2004, http:]]www.whItehouse.gov]omb]buIIetIns]Iy04]b04-04.pdI

PartItIon PartItIonIng PartItIon PartItIonIng PartItIon PartItIonIng PartItIon PartItIonIng
See nIormatIonaI n See nIormatIonaI n See nIormatIonaI n See nIormatIonaI n- -- -8reedIng 8reedIng 8reedIng 8reedIng
PartItIonIng Is the act oI terrItorIaIIy contaInIng and restrIctIng access to InIormatIon based on Its
perceIved Importance. PartItIonIng Is accompIIshed vIa codes, code-words, symboIs, IIIIng practIces,
access cIearances, markIngs, subdIvIsIons, categorIes, caveats, and ImposItIon oI agency-specIIIc controIs
over InIormatIon. PartItIonIng Is best represented In the bureaucracy
50
, and has Its roots In Weber's (1978:
988) Idea oI the IIIes whereIn,


50
Max Weber (1968: 223) wrItes that "From a pureIy technIcaI poInt oI vIew, a bureaucracy Is
capabIe oI attaInIng the hIghest degree oI eIIIcIency, and Is In thIs sense IormaIIy the most ratIonaI known
means oI exercIsIng authorIty over human beIngs. t Is superIor to any other Iorm In precIsIon, In stabIIIty,
In the strIngency oI Its dIscIpIIne, and In Its reIIabIIIty. t thus makes possIbIe a partIcuIarIy hIgh degree oI
caIcuIabIIIty oI resuIts Ior the heads oI the organIzatIon and Ior those actIng In reIatIon to It. t Is IInaIIy
superIor both In IntensIve eIIIcIency and In the scope oI Its operatIons and Is IormaIIy capabIe oI
appIIcatIon to aII kInds oI admInIstratIve tasks." Max Weber on Law In Economy and SocIety. (Trans.
Edward ShIIs and Max RheInsteIn. Ed. Max RheInsteIn. New York: SImon and Schuster, 1968).









307
ncreasIngIy aII order In pubIIc and prIvate organIzatIons Is dependent on the system oI IIIes
and the dIscIpIInes oI oIIIcIaIdom, that means, Its habIt oI paInstakIng obedIence wIthIn Its
wonted sphere oI actIon.

n the process oI manuIacturIng and systematIzIng InIormatIon Irom Its varIous channeIs, codes, IunctIons
and products, partItIonIng oI InIormatIon serves to IegItImate certaIn types oI InIormatIon access and
practIces whIIe dImInIshIng others. An exampIe oI partItIonIng Is that oI "InIormatIonaI In-breedIng,"
whereIn InIormatIon can be shared onIy wIth those on the same "secret IsIand" who hoId sImIIar prIvIIege
(HourcIe 316). To my knowIedge, "partItIon" has never been used In the way Intend.

Source: DeIInItIon, Maret; Max Weber. Economy and SocIety: An OutIIne oI nterpretIve SocIoIogy. Trans.
EphraIm FIschoII. Ed. Cuenther Roth and CIaus WIttIch. 8erkeIey: UnIversIty oI CaIIIornIa Press, 1978, and
Laurent R. HourcIe. "MIIItary Secrecy and EnvIronmentaI CompIIance." New York UnIversIty EnvIronmentaI
Law ]ournaI 2 no. 2 (1993): 316-346,
http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI

PartItIoned SecurIty Mode PartItIoned SecurIty Mode PartItIoned SecurIty Mode PartItIoned SecurIty Mode
nIormatIon system (S) securIty mode whereIn aII personneI have the cIearance, but not necessarIIy IormaI
access approvaI and need-to-know, Ior aII InIormatIon handIed by an S.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

Passenger Name Record Passenger Name Record Passenger Name Record Passenger Name Record
See Secure FIIght See Secure FIIght See Secure FIIght See Secure FIIght
A record that contaIns detaIIed InIormatIon about an IndIvIduaI's traveI on a partIcuIar IIIght, IncIudIng
InIormatIon provIded by the passenger when makIng the IIIght reservatIon. Though the content oI PNRs
varIes among aIrIInes, PNRs may IncIude, among other InIormatIon: (1) Passenger name; (2) reservatIon
date; (3) traveI agency or agent; (4) traveI ItInerary InIormatIon; (5) Iorm oI payment; (6) IIIght number;
and (7) seatIng IocatIon.

(Page 10 oI http:]]www.dhs.gov]Interweb]assetIIbrary]C8P-DHSPNRUndertakIngs5-25-04.pdI IIsts data
eIements that must be reported by aIr carrIers to the Department oI HomeIand SecurIty 8ureau oI Customs
and 8order ProtectIon (C8P)).

The European Court oI ]ustIce (EC]) struck down a passenger name record deaI that aIIowed the transIer oI
personaI InIormatIon on European traveIers to the U.S.
government, as no accord was struck by the court-appoInted deadIIne oI September 30.

Source: DHS. TSA. "Reports, Forms, and RecordkeepIng RequIrements: Agency nIormatIon CoIIectIon
ActIvIty Under OM8 RevIew; Secure FIIght Test Phase," FederaI RegIster 69(185): September 24, 2004;
EIectronIc PrIvacy nIormatIon Center (EPC). "EU-US AIrIIne Passenger Data DIscIosure,"






308
http:]]www.epIc.org]prIvacy]IntI]passengerdata.htmI; WIIIIam ]. Krouse. "TerrorIst WatchIIst Checks
and AIr Passenger PrescreenIng." CRS Report to Congress September 6, 2006,
http:]]www.Ias.org]sgp]crs]homesec]RL33645.pdI; EPC, RuIIng oI the European Court oI ]ustIce.
http:]]www.epIc.org]redIrect]eccourtpassenger.htmI and DHS, Statement by HomeIand SecurIty
Secretary MIchaeI ChertoII on Passenger Name Record Agreement wIth European UnIon

Pass]FaII Pass]FaII Pass]FaII Pass]FaII
A decIassIIIcatIon technIque that regards InIormatIon at the IuII document or IoIder IeveI. Any exemptIbIe
portIon oI a document or IoIder may resuIt In exemptIon (IaIIure) oI the entIre documents or IoIders.
Documents or IoIders that contaIn no exemptIbIe InIormatIon are passed and thereIore decIassIIIed.
Documents wIthIn exempt IoIders
are exempt Irom automatIc decIassIIIcatIon. DecIassIIIed documents may be subject to FOA exemptIons
other than the securIty exemptIon ((b) (1)), and the requIrements pIaced by IegaI authorItIes governIng
PresIdentIaI records and materIaIs.

Source: NatIonaI DeIense. 32 CFR 2001, http:]]www.gpoaccess.gov]CFR]Index.htmI.

Patent(s) Patent(s) Patent(s) Patent(s)
A patent Ior an InventIon Is the grant oI a property rIght to the Inventor, Issued by the UnIted States Patent
and Trademark OIIIce. CeneraIIy, the term oI a new patent Is 20 years Irom the date on whIch the
appIIcatIon Ior the patent was IIIed In the UnIted States or, In specIaI cases, Irom the date an earIIer
reIated appIIcatIon was IIIed, subject to the payment oI maIntenance Iees. U.S. patent grants are eIIectIve
onIy wIthIn the UnIted States, U.S. terrItorIes, and U.S. possessIons. Under certaIn cIrcumstances, patent
term extensIons or adjustments may be avaIIabIe.
There are three types oI patents: 1) UtIIIty patents may be granted to anyone who Invents or dIscovers any
new and useIuI process, machIne, artIcIe oI manuIacture, or composItIon oI matter, or any new and useIuI
Improvement thereoI; 2) DesIgn patents may be granted to anyone who Invents a new, orIgInaI, and
ornamentaI desIgn Ior an artIcIe oI manuIacture; and 3) PIant patents may be granted to anyone who
Invents or dIscovers and asexuaIIy reproduces any dIstInct and new varIety oI pIant.
Source: U.S. Patent and Trademark OIIIce. "CeneraI nIormatIon ConcernIng Patents."
http:]]www.uspto.gov

PATHFNDER PATHFNDER PATHFNDER PATHFNDER
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
DeIense nteIIIgence Agency. s a data mInIng tooI deveIoped Ior anaIysts that provIdes
the abIIIty to anaIyze government and prIvate sector databases rapIdIy. t can compare and search muItIpIe
Iarge databases quIckIy;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;






309
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

Pen RegIster Pen RegIster Pen RegIster Pen RegIster
SectIon 3127(3) oI TItIe 18, UnIted States Code, Is amended--
(A) by strIkIng "eIectronIc or other ImpuIses'' and aII that IoIIows through "Is attached'' and InsertIng
"dIaIIng, routIng, addressIng, or sIgnaIIng InIormatIon transmItted by an Instrument or IacIIIty Irom whIch
a wIre or eIectronIc communIcatIon Is transmItted, provIded, however, that such InIormatIon shaII not
IncIude the contents oI any communIcatIon''; and
(8) by InsertIng "or process'' aIter "devIce'' each pIace It appears.

Source: UnItIng and StrengthenIng AmerIca by ProvIdIng ApproprIate TooIs RequIred to ntercept and
Obstruct TerrorIsm (USA PATROT ACT) Act oI 2000, sectIon 216,
http:]]purI.access.gpo.gov]CPO]LPS17579

PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS) PeopIe Access SecurIty ServIce (PASS)
1. Mandated by the nteIIIgence ReIorm and TerrorIsm PreventIon Act oI 2004, "the passport card
Is Intended as a Iower cost means oI estabIIshIng IdentIty and natIonaIIty Ior AmerIcan cItIzens In two
IImIted sItuatIons--Ior cItIzens crossIng U.S. Iand borders and traveIIng by sea between the U.S., Canada,
MexIco, the CarIbbean or 8ermuda."

Source: State Department's FederaI RegIster PASS Card ProposaI, FederaI RegIster
71 no. 200 (October 17, 2006): 60928-60932, http:]]access.gpo.gov

2. Accepted documents Ior U.S. cItIzens wIII be eIther a vaIId U.S. passport or the proposed
PeopIe Access SecurIty ServIce (PASS) card, whIch, II adopted as proposed, wouId IncIude a Iong-range
wIreIess technoIogy that wouId create an Increased securIty rIsk. ThIs Is a sIgnIIIcant change Irom the
prevIous system, where U.S. cItIzens wouId show a drIver's IIcense, bIrth certIIIcate or nothIng at aII to
cross the border.

Source: EIectronIc PrIvacy nIormatIon Center (EPC). "HomeIand SecurIty PASS Card: Leave Home WIthout
t," SpotIIght on SurveIIIance, August 2006,
http:]]epIc.org]prIvacy]surveIIIance]spotIIght]0806]

PerceptIon Management PerceptIon Management PerceptIon Management PerceptIon Management
See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons See PsychoIogIcaI OperatIons
ActIons to convey and]or deny seIected InIormatIon and IndIcators to IoreIgn audIences to InIIuence theIr
emotIons, motIves, and objectIve reasonIng as weII as to InteIIIgence systems and Ieaders at aII IeveIs to
InIIuence oIIIcIaI estImates, uItImateIy resuItIng In IoreIgn behavIors and oIIIcIaI actIons IavorabIe to the






310
orIgInator's objectIves. n varIous ways, perceptIon management combInes truth projectIon, operatIons
securIty, cover and deceptIon, and psychoIogIcaI operatIons.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary] and ]oInt PubIIcatIon 3-53. DoctrIne Ior ]oInt
PsychoIogIcaI OperatIons. September 5, 2003, http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp353.pdI

PERSEREC Database PERSEREC Database PERSEREC Database PERSEREC Database
SInce 1987, the DeIense PersonneI SecurIty Research Center (PERSEREC) has maIntaIned a database on
espIonage by AmerIcan cItIzens based IargeIy on open sources, and has coIIected IIIes on each oI the 173
IndIvIduaIs In the database. EspIonage by AmerIcans
Is the worst outcome Ior the personneI securIty system that works to reduce the rIsk oI InsIder threat.
AIthough Its maIn Iocus Is the personneI securIty system,
PERSEREC monItors and anaIyzes espIonage by AmerIcans In order to Improve understandIng oI thIs
betrayaI oI trust by a smaII mInorIty oI cItIzens.
The PERSEREC espIonage database Is based on open source InIormatIon.

Source: KatherIne L. HerbIg, Changes In EspIonage by AmerIcans: 1947-2007 77 7, TechnIcaI Report 02-05,
March 2008, http:]]www.dhra.mII]perserec]reports.htmI

Pers Pers Pers PersonaIIy dentIIIabIe nIormatIon onaIIy dentIIIabIe nIormatIon onaIIy dentIIIabIe nIormatIon onaIIy dentIIIabIe nIormatIon
1. CeneraIIy, prIvacy Interests cognIzabIe under the FOA are Iound to exIst In such personaIIy
IdentIIyIng InIormatIon as a person's name, address, phone number, date oI bIrth, crImInaI hIstory,
medIcaI hIstory, and socIaI securIty number.34

Source: Department oI ]ustIce, FOA CuIde, "ExemptIon 6," and Iootnote #34, 2009
http:]]www.justIce.gov]oIp]IoIaguIde09]exemptIon6.pdI

2. P has become the generaIIy accepted Ianguage; ALA began usIng thIs term In 1991 when It
adopted the PoIIcy ConcernIng ConIIdentIaIIty oI PersonaIIy dentIIIabIe nIormatIon about LIbrary Users P
connects IndIvIduaIs to what they bought wIth theIr credIt cards, what they checked out wIth theIr IIbrary
cards, and what Web sItes they vIsIted where they pIcked up cookIes. More than sImpIe IdentIIIcatIon, P
can buIId up a pIcture oI tastes and Interests-a dossIer oI sorts, though crude and oIten Inaccurate. WhIIe
targeted advertIsIng Is the obvIous use Ior P, some peopIe wouId use thIs InIormatIon to assess an
IndIvIduaI's character, decIde II they were a securIty rIsk, or embarrass them Ior opposIng a partIcuIar
posItIon. 8ecause oI the chIIIIng eIIect that such scrutIny can have on open InquIry and Ireedom oI
expressIon, IIbrarIes and bookstores have Iong resIsted requests to reIease InIormatIon that connects
IndIvIduaI persons wIth specIIIc books.

Source: AmerIcan LIbrary AssocIatIon. "CuIdeIInes Ior DeveIopIng a LIbrary PrIvacy PoIIcy," 2005,
http:]]tInyurI.com]yg5779I







311
PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes PhysIcaI SecurIty Codes
See CrItIcaI NucIear Weapons DesIgn nIormatIon, SecurIty C See CrItIcaI NucIear Weapons DesIgn nIormatIon, SecurIty C See CrItIcaI NucIear Weapons DesIgn nIormatIon, SecurIty C See CrItIcaI NucIear Weapons DesIgn nIormatIon, SecurIty CIearances Iearances Iearances Iearances
AccordIng to DoD 5160.65-M, "securIty aspects oI conventIonaI ammunItIon IIIe-cycIe management. t
covers poIIcIes and procedures Ior physIcaI securIty, InIormatIon securIty, exchangIng securIty
InIormatIon, and categorIzIng securIty rIsks Ior sensItIve ammunItIon and expIosIves. PhysIcaI securIty
poIIcIes and procedures are desIgned Ior maxImum unIIormIty and standardIzatIon. AIthough they are
aImed at securIng the DoD conventIonaI ammunItIon P8, they are adaptabIe to the specIaI needs oI the
IndIvIduaI MIIItary ServIces."

The IoIIowIng codes IndIcate "the degrees oI protectIon requIred Ior materIaIs In the Interest oI natIonaI
securIty:"
Code A: ConIIdentIaI FormerIy RestrIcted Data
RequIres L CIearance
Code 8: ConIIdentIaI RestrIcted Data
The Iowest cIassIIIcatIon IeveI appIIed to InIormatIon whose unauthorIzed dIscIosure couId reasonabIy be
expected to cause damage to the natIonaI securIty.
RequIres L CIearance.
Code C (ConIIdentIaI)
Code D: ConIIdentIaI CryptoIogIc
Code E Secret CryptoIogIc
Code F: Top Secret CryptoIogIc
Code C: Secret FormerIy RestrIcted Data
RequIres L CIearance.
Code H: Secret RestrIcted Data
Code K: Top Secret FormerIy RestrIcted Data
Code L: Top Secret RestrIcted Data.
RequIres Q CIearance.
Code S: Secret
Code T: Top Secret
Code U: UncIassIIIed

Source: DoD 5160.65-M "SIngIe Manager Ior ConventIonaI AmmunItIon (mpIementatIon ]oInt
ConventIonaI AmmunItIon PoIIcIes and Procedures)", 04]1989." Chapter 12 TabIe 12-11,
http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]516065m0489]chap12.pdI
PInk Paper PInk Paper PInk Paper PInk Paper
See 8Iue Paper See 8Iue Paper See 8Iue Paper See 8Iue Paper
To dIstInguIsh these more sensItIve InIormaI memoranda Irom oIIIcIaI memoranda that were to be
serIaIIzed and Indexed In the F8's centraI records system, an InIormaI memorandum was to be wrItten on






312
pInk paper (oIIIcIaI memoranda were wrItten on whIte paper) and to contaIn the notatIon that the
memorandum was "to be destroyed aIter actIon Is taken and not sent to IIIes."
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 22.
PIaIn Text PIaIn Text PIaIn Text PIaIn Text
Unencrypted InIormatIon.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

PoInter System or ndex PoInter System or ndex PoInter System or ndex PoInter System or ndex
A system that stores InIormatIon desIgned to IdentIIy IndIvIduaIs, organIzatIons, and]or crIme
methodoIogIes wIth the purpose oI IInkIng Iaw enIorcement agencIes that have sImIIar InvestIgatIve
and]or InteIIIgence Interests In the entIty deIIned by
the system.

Source: DO], CIobaI ]ustIce nIormatIon SharIng nItIatIve, CrImInaI nteIIIgence CIossary oI Terms,
MInImum CrImInaI nteIIIgence TraInIng Standards, AppendIx, October 2007,
http:]]www.It.ojp.gov]documents]mIncrImInteIstand.pdI
PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty PIan nIormatIon CapabIIIty
The capabIIIty that aIIows a supported command to enter and update key eIements oI InIormatIon In an
operatIon pIan stored In the ]oInt OperatIon PIannIng and ExecutIon System.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PoIIce nIormatIon PoIIce nIormatIon PoIIce nIormatIon PoIIce nIormatIon
The products Irom the coIIectIon, anaIysIs, and InterpretatIon oI aII avaIIabIe InIormatIon concernIng
known and potentIaI enemy and crImInaI threats and vuInerabIIItIes oI support organIzatIons. t InvoIves
InteIIIgence preparatIon oI the battIeIIeId, crImInaI InteIIIgence preparatIon oI the battIeIIeId, and the
poIIce InIormatIon assessment process.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

PossIbIe PossIbIe PossIbIe PossIbIe
nIormatIon or InteIIIgence reported by onIy one Independent source Is cIassIIIed as "possIbIy true." The
test Ior Independence Is certaInty that the InIormatIon report oI a source was not derIved Irom some other






313
source, usuaIIy resuItIng In reIIance on orIgInaI reportIng. A cIassIIIcatIon oI "possIbIy true" cannot be
based on anaIytIcaI judgment aIone.

Source: Department oI the Army. FM 34-1. CIossary. nteIIIgence and EIectronIc WarIare OperatIons.
September 1994, http:]]www.Ias.org]Irp]doddIr]army]Im34-1]gIoss.htm#CLOSS

Power ProjectIon Power ProjectIon Power ProjectIon Power ProjectIon
The abIIIty oI a natIon to appIy aII or some oI Its eIements oI natIonaI power-poIItIcaI [Note: the Army
repIaces "poIItIcaI" wIth "dIpIomatIc" In thIs newer versIon oI the deIInItIon], economIc, InIormatIonaI, or
mIIItary-to rapIdIy and eIIectIveIy depIoy and sustaIn Iorces In and Irom muItIpIe dIspersed IocatIons to
respond to crIses, to contrIbute to deterrence, and to enhance regIonaI stabIIIty.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

Power to the Edge Power to the Edge Power to the Edge Power to the Edge
See AgIIIty See AgIIIty See AgIIIty See AgIIIty
1. Power to the Edge prIncIpIes, partIcuIarIy those that InvoIve IncreasIng the abIIIty oI the edge to
understand and act, are reIated to agIIIty. n Iact, Power to the Edge states that "edge organIzatIons have
the attrIbutes to be agIIe. ThIs Is because agIIIty requIres that avaIIabIe InIormatIon Is combIned In new
ways, that a varIety oI perspectIves are brought to bear, and that assets can be empIoyed dIIIerentIy to
meet the needs oI a varIety oI sItuatIons" (page 217).

Source: SImon Reay AtkInson and ]ames MoIIat The AgIIe OrganIzatIon: From nIormaI Networks to
CompIex EIIects and AgIIIty, DoD, CCRP, 2005, (p. xxI),
http:]]www.dodccrp.org]IIIes]AtkInsonAgIIe.pdI

2. Power to the edge Is about changIng the way IndIvIduaIs, organIzatIons, and systems reIate to
one another and work. Power to the edge InvoIves the empowerment oI IndIvIduaIs at the edge oI an
organIzatIon (where the organIzatIon Interacts wIth Its operatIng envIronment to have an Impact or eIIect
on that envIronment) or, In the case oI systems, edge devIces. Empowerment InvoIves expandIng access to
InIormatIon and the eIImInatIon oI unnecessary constraInts. (p. 4-5)

Source: DavId S. AIberts and RIchard E. Hayes Power to the Edge Command, ControI, In the nIormatIon
Age, DoD, CCRP 2003, http:]]www.dodccrp.org]htmI4]booksdownIoads.htmI

PractIcaI ObscurIty PractIcaI ObscurIty PractIcaI ObscurIty PractIcaI ObscurIty
51 51 51 51


51
Thanks to SLS S]SU grad student Anne SawuckI Ior brIngIng thIs concept to my attentIon.






314
1. The "practIcaI obscurIty" concept expressIy recognIzes that the passage oI tIme may
actuaIIy Increase the prIvacy Interest at stake when dIscIosure wouId revIve InIormatIon that was once
pubIIc knowIedge but has Iong sInce Iaded Irom memory.

Source: DO]. FOA CuIde, ExemptIon 7c, 2009, pp.578-579.
http:]]www.justIce.gov]oIp]IoIaguIde09]exemptIon7c.pdI

2. 8ut the Issue here Is whether the compIIatIon oI otherwIse hard-to-obtaIn InIormatIon aIters
the prIvacy Interest ImpIIcated by dIscIosure oI that InIormatIon. PIaInIy there Is a vast dIIIerence between
the pubIIc records that mIght be Iound aIter a dIIIgent search oI courthouse IIIes, county archIves, and
IocaI poIIce statIons throughout the country and a computerIzed summary Iocated In a sIngIe
cIearInghouse oI InIormatIon.

Source: ]usItce Stevens, UnIted States Department oI ]ustIce v. Reporters CommIttee Ior Freedom oI the
Press, 489 U.S. 749 (1989),
http:]]caseIaw.Ip.IIndIaw.com]cgI-bIn]getcase.pIZcourt=US&voI=489&InvoI=749 and Nancy S. Marder,
"From 'PractIcaI ObscurIty'" to Web DIscIosure: A New UnderstandIng oI PubIIc nIormatIon,"59 Syracuse L.
Rev. 441 (2009).

PractIcaI UtIIIty PractIcaI UtIIIty PractIcaI UtIIIty PractIcaI UtIIIty
See 8urden See 8urden See 8urden See 8urden
The actuaI, not mereIy the theoretIcaI or potentIaI, useIuIness oI InIormatIon to or Ior an agency, takIng
Into account Its accuracy, vaIIdIty, adequacy, and reIIabIIIty, and the
agency's abIIIty to process the InIormatIon It coIIects (or a person's abIIIty to receIve and process that
whIch Is dIscIosed, In the case oI a thIrd-party or pubIIc dIscIosure) In a useIuI and tImeIy IashIon. n
determInIng whether InIormatIon wIII have "practIcaI utIIIty,'' OM8 wIII take Into account whether the
agency demonstrates actuaI tImeIy use Ior the InIormatIon eIther to carry out Its IunctIons or make It
avaIIabIe to thIrd-partIes or the pubIIc, eIther dIrectIy or by means oI a thIrd-party or pubIIc postIng,
notIIIcatIon, IabeIIng, or sImIIar dIscIosure requIrement, Ior the use oI persons who have an Interest In
entItIes or transactIons over whIch the agency has jurIsdIctIon. n the case oI recordkeepIng requIrements
or generaI purpose statIstIcs (see Sec. 1320.3(c) (3)), "practIcaI utIIIty'' means that actuaI uses can be
demonstrated.

Source. OIIIce oI Management and 8udget. 5 CFR 1320. "ControIIIng Paperwork 8urdens on the PubIIc."
http:]]www.gpoaccess.gov]cIr]Index.htmI

PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe PrecautIonary PrIncIpIe
1. When an actIvIty raIses threats oI harm to human heaIth or the envIronment, precautIonary
measures shouId be taken even II some cause and eIIect reIatIonshIps are not IuIIy estabIIshed
scIentIIIcaIIy. n thIs context the proponent oI an actIvIty, rather than the pubIIc, shouId bear the burden oI
prooI. The process oI appIyIng the PrecautIonary PrIncIpIe must be open, InIormed and democratIc and






315
must IncIude potentIaIIy aIIected partIes. t must aIso InvoIve an examInatIon oI the IuII range oI
aIternatIves, IncIudIng no actIon.

Source: WIngspread ConIerence on the PrecautIonary Statement. ]anuary 26, 1998,
http:]]www.sehn.org]wIng.htmI
2. PrecautIon Is at the basIs oI some U.S. envIronmentaI and Iood and drug IegIsIatIon, aIthough
the prIncIpIe Is not mentIoned by name. These Iaws Incorporate IoresIght, preventIon, and care, and many
gIve reguIators authorIty to take actIon to prevent possIbIe but unproven harm. For exampIe:
As a precautIonary measure, the Food and Drug AdmInIstratIon requIres aII new drugs to be tested
beIore they are put on the market.
The Food QuaIIty and ProtectIon Act oI 1996 requIres pestIcIdes to be proven saIe Ior chIIdren or
removed. SeveraI are beIng phased out.
The NatIonaI EnvIronmentaI PoIIcy Act Is precautIonary In two ways: 1) t emphasIzes IoresIght and
attentIon to consequences by requIrIng an envIronmentaI Impact assessment Ior any IederaIIy
Iunded project, and 2) It mandates consIderatIon oI aIternatIve pIans. NEPA Is one oI the best
natIonaI exampIes oI precautIonary actIon.
Source: ScIence and EnvIronmentaI HeaIth Network. "PrecautIonary PrIncIpIe FAQ. "
http:]]www.sehn.org]ppIaqs.htmI
Prepackaged News Prepackaged News Prepackaged News Prepackaged News
52 52 52 52

See Propaganda, SmIth See Propaganda, SmIth See Propaganda, SmIth See Propaganda, SmIth- -- -Mundt Act oI 1948 Mundt Act oI 1948 Mundt Act oI 1948 Mundt Act oI 1948
AIso termed "Iake news."
1. Prepackaged news storIes are compIete, audIo-vIdeo presentatIons that may be IncIuded In
vIdeo news reIeases, or VNRs. They are Intended to be IndIstInguIshabIe Irom news segments broadcast to
the pubIIc by Independent teIevIsIon news organIzatIons. To heIp accompIIsh thIs goaI, these storIes
IncIude actors or others hIred to portray "reporters" and may be accompanIed by suggested scrIpts that
teIevIsIon news anchors can use to Introduce the story durIng the broadcast. These practIces aIIow
prepackaged news storIes to be broadcast, wIthout aIteratIon, as teIevIsIon news.

The pubIIcIty or propaganda prohIbItIon states, "No part oI any approprIatIon contaIned In thIs or any
other Act shaII be used Ior pubIIcIty or propaganda purposes wIthIn the UnIted States not heretoIore
authorIzed by the Congress." CAO has Iong Interpreted thIs provIsIon to prohIbIt agencIes Irom, among
other thIngs, producIng materIaIs that are covert as to orIgIn. Our opInIons have emphasIzed that the
crItIcaI eIement oI covert propaganda Is conceaIment oI the government's roIe In producIng the materIaIs.
AgencIes have vIoIated thIs Iaw when they used approprIated Iunds to produce artIcIes and op-ed pIeces
that were the ostensIbIe posItIon oI persons not assocIated wIth the government.

52
There are paraIIeIs In U.S. hIstory wIth the WW CreeI CommIssIon (CommIttee on PubIIc
nIormatIon (CP) ), and USA, Ior exampIe, see Nancy Snow's varIous works.






316

n two IegaI opInIons thIs past year, IederaI agencIes commIssIoned and dIstrIbuted prepackaged news
storIes and Introductory scrIpts about theIr actIvItIes that were desIgned to be IndIstInguIshabIe Irom news
storIes produced by prIvate news broadcasters. n neIther case dId the agency IncIude any statement or
other IndIcatIon In Its news storIes that dIscIosed to the teIevIsIon vIewIng audIence, the target audIence oI
the purported news storIes, that the agency wrote and produced those news storIes. n other words,
teIevIsIon-vIewIng audIences dId not know that storIes they watched on teIevIsIon news programs about
the government were, In Iact, prepared by the government. CAO concIuded that those prepackaged news
storIes vIoIated the pubIIcIty or propaganda prohIbItIon.

Source: U.S. CeneraI AccountabIIIty OIIIce. "VIdeo News ReIeases: UnattrIbuted Prepackaged News StorIes
VIoIate PubIIcIty or Propaganda ProhIbItIon." [CAO-05-643T. May 12, 2005,
http:]]www.gao.gov]htext]d05643t.htmI] and Center Ior MedIa and Democracy, DIane Farsetta and DanIeI
PrIce,"StIII Not the News: StatIons OverwheImIngIy FaII to DIscIose VNRs." November 14, 2006,
http:]]www.prwatch.org]Iakenews2]execsummary

2. SEC. 821. No part oI any Iunds approprIated In thIs or any other Act shaII be used by an agency
oI the executIve branch, other than Ior normaI and recognIzed executIve-IegIsIatIve reIatIonshIps, Ior
pubIIcIty or propaganda purposes, and Ior the preparatIon, dIstrIbutIon or use oI any kIt, pamphIet,
bookIet, pubIIcatIon, radIo, teIevIsIon or IIIm presentatIon desIgned to support or deIeat IegIsIatIon
pendIng beIore the Congress, except In presentatIon to the Congress ItseII.

Source: "MakIng ApproprIatIons Ior the Departments oI TransportatIon, Treasury, and HousIng and Urban
DeveIopment, the ]udIcIary, DIstrIct oI CoIumbIa, and Independent agencIes Ior the IIscaI year endIng
September 30, 2006, and Ior other purposes." 109 P.L. 115; 119 Stat. 2396; 2005 Enacted H.R. 3058; 109
Enacted H.R. 3058. November 30, 2005, http:]]www.gpoaccess.gov]pIaws]

3. The Covernment AccountabIIIty OIIIce has scored the OIIIce oI NatIonaI Drug ControI PoIIcy and
the EducatIon and HeaIth and Human ServIces departments, among others, Ior spendIng mIIIIons oI
doIIars on prepackaged news storIes desIgned to mImIc TV newscasts and Ior payIng popuIar pundIts Ior
posItIve medIa treatment. n severaI reports Issued sInce 2004, CAO accused some agencIes oI engagIng
In IIIegaI "covert propaganda" Ior producIng vIdeo news reIeases that dId not IdentIIy who produced them.
8ut agencIes can contInue to use vIdeo news reIeases so Iong as they dIscIose theIr orIgIn - and
they do. Last year, the nterIor Department produced one starrIng CIInt Eastwood to heIp Iaunch a
campaIgn to Improve pubIIc parks and wIIdIIIe reIuges. n recent years, agencIes have used them to
promote hIghway saIety and warn agaInst consumer scams and unpasteurIzed juIces, CAO noted. FederaI
oIIIcIaIs and experts say that as agencIes Iaunch new pubIIc reIatIons programs, they must be careIuI not
to emphasIze Image over substance and resuIts.

Source: MoIIIe ZIegIer. "CrItIcs say corporate-styIe PR goes too Iar." August 30th, 2006,
http:]]IederaItImes.com]Index.phpZS=2060330. . . . AIso see: AIso see: AIso see: AIso see: 9]24]07 Press ReIease, CommIssIoner






317
AdeIsteIn AppIauds (Comcast) EnIorcement 8ureau VNR DecIsIon,
http:]]www.Icc.gov]commIssIoners]adeIsteIn]pressreIeases.htmI

PrepubIIcatIon RevIew PrepubIIcatIon RevIew PrepubIIcatIon RevIew PrepubIIcatIon RevIew
See Non DIs See Non DIs See Non DIs See Non DIscIosure Agreement cIosure Agreement cIosure Agreement cIosure Agreement
1. Reagan NatIonaI SecurIty DecIsIon DIrectIve 84, "SaIeguardIng NatIonaI SecurIty nIormatIon,"
March 11, 1983;
AII present Compartmented nIormatIon

be requIred to sIgn a nondIscIosure agreement as a condItIon oI
access to SC and other cIassIIIed InIormatIon, and that thIs partIcuIar agreement must IncIude a provIsIon
Ior prepubIIcatIon revIew oI wrItIng Ior pubIIc consumptIon to assure deIetIon oI SC and other cIassIIIed
InIormatIon:
Source: NSDD 84. "SaIeguardIng NatIonaI SecurIty nIormatIon,"
http:]]www.Ias.org]Irp]oIIdocs]nsdd]nsdd-084.htm
2. The prepubIIcatIon revIew agreement requIted by NSDD 84, was, In Iact, a revIsed versIon oI the
CA's Form 4193. Unknown to Congress, the Reagan admInIstratIon had aIready been usIng the CA's
IIIetIme censorshIp contract Form 4193, as a "boIIerpIate" secrecy contract throughout the government.
The CeneraI AccountIng OIIIce reported at the end oI 1983, excIudIng the CA and the NatIonaI SecurIty
Agency, 23 agencIes had requIred 119,000 empIoyees to sIgn Form 4193.

PrepubIIcatIon revIew agreements In academIa revIsIt the controIs Imposed by PresIdent Reagan under
NSDD 84. The dIrectIve's provIsIons Ior IIIetIme prepubIIcatIon revIew appIIed to unIversIty researchers
because certaIn research grants are government sponsored. The practIce oI usIng prepubIIcatIon revIew In
scIence-reIated government grants has Ied to a trend In other government-sponsored unIversIty research
contracts In areas InvoIvIng neIther mIIItary nor cIassIIIed InIormatIon.

Source: Steven L. Katz. Covernment Secrecy: DecIsIons wIthout Democracy. . . . WashIngton, D.C.: PeopIe Ior
the AmerIcan Way, 1987. 31-34, 42; aIso see CA, "Agency PrepubIIcatIon RevIew oI CertaIn MaterIaI
Prepared Ior PubIIc DIssemInatIon," May 2007, http:]]www.Ias.org]Irp]cIa]prb2007.pdI

3. AII government empIoyees wIth hIgh securIty cIearances are requIred to sIgn "Form 4193" whIch
contaIns a IIIetIme promIse to submIt Ior prepubIIcatIon revIew aII wrItIngs, IncIudIng works oI IIctIon.
NondIscIosure Agreements and H.R. 4392, the "nteIIIgence AuthorIzatIon Act Ior FIscaI Year 2001"
(popuIarIy known as the "OIIIcIaI Secret Act") punIshes IederaI empIoyees Ior dIscIosIng cIassIIIed
InIormatIon.
53
ThIs Is a IIIetIme agreement.

53
Kate MartIn, dIrector oI the Center Ior NatIonaI SecurIty StudIes beIIeves the Act Is
unconstItutIonaI and "sanctIons Ior dIscIosure aIready exIst." The Act aIso, Ignores pubIIc debate and
poses a rIsk to Ireedom oI the press. FAS http:]]www.Ias.org]sgp]news]2000]09]Ieaks.htmI







318
Source: UnIted States. Congress. House. CommIttee on the ]udIcIary. SubcommIttee on CIvII and
ConstItutIonaI RIghts. PresIdentIaI DIrectIve on the Use oI PoIygraphs and PrepubIIcatIon RevIew : HearIngs
beIore the SubcommIttee on CIvII and ConstItutIonaI RIghts oI the CommIttee on the ]udIcIary, House oI
RepresentatIves, NInety-eIghth Congress, IIrst and second sessIons ... AprII 21, 28, 1983, and February 7,
1984 PubIIsher WashIngton : CPO, 1985. Y 4.] 89]1:98]114

4. CA: PerIormed by the CA's PubIIcatIons RevIew 8oard (PR8) and IederaI courts "have approved
the process, whIch stems Irom the DC's statutory obIIgatIon to protect sources and methods." AccordIng
to HedIey, "the soIe purpose oI prepubIIcatIon revIew Is to assIst authors In avoIdIng Inadvertent
dIscIosure oI cIassIIIed InIormatIon whIch, II dIscIosed, wouId be damagIng to natIonaI securIty--just that
and nothIng more."

Source: ]ohn HoIIIster HedIey. "RevIewIng the Work oI CA Authors: Secrets, Free Speech, and FIg Leaves."
https:]]www.cIa.gov]IIbrary]center-Ior-the-study-oI-InteIIIgence]csI-pubIIcatIons]csI-
studIes]studIes]sprIng98]Secret.htmI ; aIso see RaIph W. McChee's "AppendIx: ThIs 8ook and the Secrecy
Agreement," DeadIy DeceIts: My 25 Years In the CA. New York: SherIdan Square PubIIcatIons, 1983, and
CA. "Agency PrepubIIcatIon RevIew oI CertaIn MaterIaI Prepared Ior PubIIc DIssemInatIon." ]uIy 22, 2005,
http:]]www.Ias.org]Irp]cIa]prb2005.pdI

5. Department oI State. Not termed 'PrepubIIcatIon RevIew" but de Iacto acts as such:

OIIIcIaI appearances beIore the medIa or generaI pubIIc to gIve IormaI IntervIews, speeches, or
remarks must be cIeared wIth the AssIstant Secretary Ior PubIIc AIIaIrs. See 3 FAM. See 10 FAM 121.4.
AII unoIIIcIaI speakIng, wrItIng, or teachIng actIvItIes whIch are oI oIIIcIaI concern must be
approved by the AssIstant Secretary Ior PubIIc AIIaIrs, In accordance wIth 3 FAM. See 10 FAM 121.4.

Former empIoyees remaIn obIIgated by Iaw not to dIscIose cIassIIIed InIormatIon, and certaIn
empIoyees may be bound by non-dIscIosure agreements. See aIso 3 FAM 628.2a-c.

Source: Department oI State. ForeIgn AIIaIrs ManuaI. 10 FAM 120 & 120.2, "Remarks and WrItIngs Ior the
MedIa and CeneraI PubIIc." http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-
1]I545con.htm#contents and Weaver v. UnIted States nIormatIon Agency. 520 U.S. 1251; 117 S. Ct. 2407;
138 L. Ed. 2d 174; 1997 U.S. LEXS 3405; 65 U.S.L.W. 3798; 12 .E.R. Cas. (8NA) 1568, ]une 2, 1997,
DecIded.

6. Department oI DeIense (DoD) has been among the IIrst government departments to take the
Iead In speIIIng out ruIes Ior what shouId and shouId not go on a web sIte and how InIormatIon shouId be
revIewed beIore It Is posted on a web sIte.

Source: DeIense SecurIty ServIce. "Pre-PubIIcatIon RevIew oI WebsIte Content."[See Wayback MachIne,
http:]]web.archIve.org]web]20060220114841]http:]]www.dss.mII]search-
dIr]traInIng]csg]securIty]S2uncIas]WebsIte.htm ]






319

7. NatIonaI SecurIty Agency CentraI SecurIty Agency:
Why a pre Why a pre Why a pre Why a pre- -- -pubIIcatIon revIewZ pubIIcatIon revIewZ pubIIcatIon revIewZ pubIIcatIon revIewZ
AII NSA]CSS aIIIIIates (past and present) are responsIbIe Ior IorwardIng Ior revIew any InIormatIon
Intended Ior pubIIc dIscIosure whIch Is or may be based on protected InIormatIon gaIned whIIe assocIated
wIth NSA]CSS.
Note: PubIIc dIscIosure means dIscIosure to one or more persons who do not have the approprIate access
authorIzatIon, securIty cIearance and]or need-to-know to receIve protected InIormatIon.
Who must submIt materIaIs Int Who must submIt materIaIs Int Who must submIt materIaIs Int Who must submIt materIaIs Intended Ior pubIIcatIon to NSA]CSS Ior revIewZ ended Ior pubIIcatIon to NSA]CSS Ior revIewZ ended Ior pubIIcatIon to NSA]CSS Ior revIewZ ended Ior pubIIcatIon to NSA]CSS Ior revIewZ
Pre-pubIIcatIon revIew responsIbIIItIes are the same whether you are an NSA]CSS empIoyee, a contractor,
a mIIItary member or other aIIIIIate who has had access to NSA]CSS InIormatIon or IacIIItIes. ncIuded In
thIs sort oI InIormatIon Is any work that reIates to the nteIIIgence CommunIty In generaI, such as spy
noveIs. PubIIcatIons about gardenIng, cookIng, sports, craIts, etc. do not need to undergo pre-pubIIcatIon
revIew unIess unIess unIess unIess mentIon oI the author's aIIIIIatIon wIth NSA]CSS Is IncIuded.
RemInder: Pre-pubIIcatIon revIew Is a IIIetIme responsIbIIIty. Your responsIbIIIty does not end when you
end your assocIatIon wIth NSA]CSS.
Source: NatIonaI SecurIty Agency CentraI SecurIty Agency. [See the Wayback MachIne
http:]]web.archIve.org]web]20080211063422]http:]]www.nsa.gov]pubIIc]pubII00010.cIm]

8. ]ustIce Stevens, In the dIssentIng opInIon In the prepubIIcatIon revIew case Snepp v. UnIted
States wrote:
The mere Iact that the Agency has the authorIty to revIew the text oI a crItIcaI book In search oI
cIassIIIed InIormatIon beIore It Is pubIIshed Is bound to have an InhIbItIng eIIect on the author's wrItIng.
Moreover, the rIght to deIay pubIIcatIon untII the revIew Is compIeted Is ItseII a Iorm oI prIor restraInt that
wouId not be toIerated In other contexts.

Source: Snepp v. UnIted States 444 U.S. 507 (1980), Iootnote 17.
http:]]caseIaw.Ip.IIndIaw.com]scrIpts]getcase.pIZcourt=us&voI=444&InvoI=507; Andrew R. Sommer,
"Casenote: The State Secrets PrIvIIege In PrepubIIcatIon RevIew: ProposIng a SoIutIon to AvoId a SeemIngIy
nevItabIe Tragedy." Ceorge Mason Law RevIew FaII, 2003 (12 Ceo. Mason L. Rev. 211); Angus MackenzIe.
Secrets: The CA's War at Home. UnIversIty oI CaIIIornIa Press, 1997, ]onathan C. Medow, "The FIrst
Amendment and the Secrecy State: Snepp V. UnIted States," UnIversIty oI PennsyIvanIa Law RevIew 130
no.4 (1982): 775-844, and Robert C. WrIght v. FederaI 8ureau oI nvestIgatIon, (FataI 8etrayaIs
manuscrIpt) http:]]www.Ias.org]sgp]jud]wrIght050609.pdI.
PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI PresIdentIaI Advance ManuaI
There are severaI ways the advance person can prepare a sIte to mInImIze demonstrators. FIrst, as aIways,
work wIth the Secret ServIce and have them ask the IocaI poIIce department to desIgnate a protest area






320
where demonstrators can be pIaced, preIerabIy not In vIew oI the event sIte or motorcade route. The
IormatIon oI "raIIy squads" Is a common way to prepare Ior demonstrators by counterIng theIr message.
ThIs tactIc InvoIves utIIIzIng smaII groups oI voIunteers to spread IavorabIe messages usIng Iarge hand
heId sIgns, pIacards, or perhaps a Iong sheet banner, and pIacIng them In strategIc areas around the sIte.
These squads shouId be Instructed aIways to Iook Ior demonstrators. The raIIy squad's task Is to use theIr
sIgns and banners as shIeIds between the demonstrators and the maIn press pIatIorm. I the
demonstrators are yeIIIng, raIIy squads can begIn and Iead supportIve chants to drown out the protestors
(USA!, USA!, USA!). (p.34)
Source: ACLU, "WhIte House PoIIcy IIegaIIy SIIences AmerIcans CrItIcaI oI 8ush,"
http:]]www.acIu.org]Ireespeech]protest]sIIenced.htmI and Peter 8aker, "WhIte House ManuaI DetaIIs How
to DeaI WIth Protesters," WashIngton Post August 22, 2007, http:]]tInyurI.com]ykoI6rI

PresIdentIaI DecIsIon DIrectIves PresIdentIaI DecIsIon DIrectIves PresIdentIaI DecIsIon DIrectIves PresIdentIaI DecIsIon DIrectIves
See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve See PresIdentIaI DIrectIve
1. There are severaI types oI PDDs, each determIned and expanded on by IndIvIduaI presIdentIaI
admInIstratIons begInnIng wIth Truman admInIstratIon. PDDs are not pubIIcIy dIscIosed or pubIIshed (as
Ior exampIe ExecutIve Orders are pubIIshed In the FederaI RegIster and Code oI FederaI ReguIatIons), or
reveaIed to Congress. PDDs remaIn In eIIect untII they are superseded by a new presIdentIaI
admInIstratIon. PDDs may be consIdered a "presIdentIaI secret Iaw. "

Source: FAS Project on Covernment Secrecy, http:]]www.Ias.org]Irp]oIIdocs]dIrect.htm

2. PresIdentIaI DecIsIon DIrectIve (PDD) serIes Is used to promuIgate PresIdentIaI decIsIons on
natIonaI securIty matters.

Source: FAS. PresIdentIaI DecIsIon DIrectIves. CIInton AdmInIstratIon 1993-2000,
http:]]www.Ias.org]Irp]oIIdocs]pdd]Index.htmI

3. A CAO study Iound that sInce 1961, onIy 247 oI the DIrectIves were pubIIcIy reIeased out oI the
1,042 PDDs that were Issued by varIous presIdentIaI admInIstratIons. OI the 247 PDDs, CAO Iound that
116, "or about haII oI the 247.IeII Into three IdentIIIed categorIes -- they estabIIshed poIIcy, dIrected the
ImpIementatIon oI poIIcy, and]or authorIzed the commItment oI government resources. "

Source: CeneraI AccountIng OIIIce. NatIonaI SecurIty: the Use oI PresIdentIaI DIrectIves to Make and
mpIement U.S. PoIIcy: Report to the ChaIrman, CommIttee on Covernment OperatIons, House oI
RepresentatIves. . . . WashIngton, D.C., 1988. http:]]www.gao.gov and CeneraI AccountIng OIIIce. The Use oI
PresIdentIaI DIrectIves to Make and mpIement U.S. PoIIcy. NSAD-92-72, ]anuary 1992,
http:]]www.gao.gov

PresIdentIaI DetermInatIon PresIdentIaI DetermInatIon PresIdentIaI DetermInatIon PresIdentIaI DetermInatIon
See PresIdentIaI FIndIng See PresIdentIaI FIndIng See PresIdentIaI FIndIng See PresIdentIaI FIndIng






321
1. SInce the enactment oI the ForeIgn AssIstance Act In 1961, specIaI authorItIes have been In
eIIect; each use oI the specIaI authorItIes Is condItIoned on a determInatIon or certIIIcatIon by the
PresIdent. The ImpIementIng procedure Is known as a PresIdentIaI DetermInatIon (PD). The PresIdent has
never deIegated the authorIty to Invoke these specIaI authorItIes. OveraII responsIbIIIty Ior recommendIng
that the PresIdent Invoke a specIaI authorIty was transIerred Irom the Agency Ior nternatIonaI
DeveIopment In 1968 to the State Department.

A PresIdentIaI FIndIng or DetermInatIon Is a document sIgned by the PresIdent determInIng and
authorIzIng use oI an authorIty [such as "cIoakIng"]. CeneraIIy, thIs Is accompanIed by documents
supportIng and justIIyIng authorIty. (46).

Source: CeneraI AccountIng OIIIce. "Use OI SpecIaI PresIdentIaI AuthorItIes For ForeIgn AssIstance. " CAO
NSAD-05-79. May 20, 1985, http:]]www.gao.gov (IIsts PDs Irom the 1960s).

2. AccordIng to ReIyea, DetermInatIons, "as a partIcuIar type oI admInIstratIve order," IIrst
appeared In the FederaI RegIster and Code oI FederaI ReguIatIons (CFR) In 1964.

Source: HaroId C. ReIyea. "PresIdent DIrectIves: 8ackground and OvervIew." ]anuary 7, 2005.
http:]]www.Ias.org]Irp]crs]98-611.pdI; aIso see "The PresIdent's ConstItutIonaI AuthorIty to Conduct
MIIItary OperatIons agaInst TerrorIsts and NatIons SupportIng Them." September 25, 2001,
http:]]www.Ias.org]Irp]agency]doj]oIc092501.htmI; UnIted States. Congress. House. CommIttee on
Covernment OperatIons. SpecIaI SubcommIttee on Covernment nIormatIon. AvaIIabIIIty oI nIormatIon
Irom FederaI Departments and AgencIes. Part 8. Department oI DeIense. (HearIngs beIore the UnIted
States House CommIttee on Covernment OperatIons, SpecIaI SubcommIttee on Covernment nIormatIon,
EIghty-FIIth Congress, IIrst sessIon, on Mar. 11, 12, 1957. . . . WashIngton: CPO, 1957. SUDOC: Y4.C 74]7:
N3]pt.8), and 3 U.S.C 4 301. DetermInatIons may be Iocated at the U.S. Department oI State WebsIte,
http:]]www.state.gov]

PresIdentIaI DIre PresIdentIaI DIre PresIdentIaI DIre PresIdentIaI DIrectIve ctIve ctIve ctIve
See See See See NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve NatIonaI SecurIty DecIsIon DIrectIve, NatIonaI SecurIty PresIdentIaI DIrectIve
A presIdentIaI dIrectIve has the same substantIve IegaI eIIect as an executIve order. t Is the substance oI
the presIdentIaI actIon that Is determInatIve, not the Iorm oI the document conveyIng that actIon. 8oth an
executIve order and a presIdentIaI dIrectIve remaIn eIIectIve upon a change In admInIstratIon, unIess
otherwIse specIIIed In the document, and both contInue to be eIIectIve untII subsequent presIdentIaI
actIon Is taken.

Source: Department oI ]ustIce. "LegaI EIIectIveness oI a PresIdentIaI DIrectIve, as Compared to an ExecutIve
Order." ]anuary 29, 2000. http:]]www.usdoj.gov]oIc]predIrectIve.htm; Ior a IIst oI PDs, see FAS, Project on
Covernment Secrecy. http:]]www.Ias.org]Irp]oIIdocs]nsdd]Index.htmI; HaroId C. ReIyea. "PresIdent
DIrectIves: 8ackground and OvervIew." ]anuary 7, 2005. http:]]www.Ias.org]Irp]crs]98-611.pdI, Ceorge
CaIdweII. "PresIdentIaI DIrectIves and Where to FInd Them." LIbrary oI Congress,






322
http:]]www.Ioc.gov]rr]news]dIrectIves.htmI and HaroId C. ReIyea, "PresIdentIaI DIrectIves: 8ackground
and OvervIew," Updated AprII 23, 2007, CRS Report to Congress, http:]]www.Ias.org]Irp]crs]98-611.pdI

PresIdentIaI FIndIng PresIdentIaI FIndIng PresIdentIaI FIndIng PresIdentIaI FIndIng
See PresIdentIaI DetermInatIon See PresIdentIaI DetermInatIon See PresIdentIaI DetermInatIon See PresIdentIaI DetermInatIon
1. A PresIdentIaI authorIzatIon or dIrectIve based on an InvestIgatIon Ior covert actIon, In whIch
the PresIdent "IInds" covert actIvItIes crItIcaI to natIonaI securIty. A IIndIng may not may not authorIze or
sanctIon a covert actIon, or any aspect oI any such actIon, whIch aIready has occurred, nor authorIze any
actIon that wouId vIoIate the ConstItutIon or any statute oI the UnIted States.

Source: War and NatIonaI DeIense. 50 U.S.C. Sec. 413b. http:]]www.gpoaccess.gov]U.S.C.ode]

2. Can IncIude poIItIcaI actIvIty, secret use oI propaganda, economIc dIsruptIon, paramIIItary
operatIons,; IormaIIzed covert actIon by requIrIng the PresIdent to InIorm Congress In wrItIng (the
Hughes-Ryan Act oI 1974 whIch requIred the PresIdent to report any non-InteIIIgence CA operatIons such
as covert operatIons to reIevant CongressIonaI commIttee (around 8 congressIonaI commIttees at the tIme
oI the Act) In a tImeIy IashIon; the 1980 nteIIIgence AccountabIIIty Act whIch requIred onIy two commIttee
be InIormed oI the presIdent's "IIndIng."

Source: Leonard W. Levy and LouIs FIsher, eds., EncycIopedIa oI the AmerIcan PresIdency. . . . New York:
SImon & Schuster, 1994.

PresIdentIaI Records PresIdentIaI Records PresIdentIaI Records PresIdentIaI Records
I a PresIdent, prIor to the concIusIon oI hIs term oI oIIIce or Iast consecutIve term oI oIIIce, as the case
may be, specIIIes duratIons, not to exceed 12 years, Ior whIch access to certaIn InIormatIon contaIned In
PresIdentIaI records shaII be restrIcted, In accordance wIth 44 U.S.C. 2204, the ArchIvIst or hIs desIgnee
shaII IdentIIy the PresIdentIaI records aIIected, or any reasonabIy segregabIe portIon thereoI, In
consuItatIon wIth that PresIdent or hIs desIgnated representatIve(s).

Source: NARA. 36 CFR 1270.40, http:]]www.gpoaccess.gov]CFR]Index.htmI

PresIdentIaI Restr PresIdentIaI Restr PresIdentIaI Restr PresIdentIaI RestrIctIons IctIons IctIons IctIons
The PresIdentIaI Records Act (PRA) estabIIshes that eIght oI the nIne FOA exemptIons shaII appIy to
PresIdentIaI records, whIch stay In eIIect aIter the PresIdentIaI restrIctIons expIre. Congress specIIIcaIIy
excIuded PresIdentIaI records Irom the FOA (b) (5) exemptIon concernIng the deIIberatIve process and
other recognIzed prIvIIeges. Four oI the sIx presIdentIaI restrIctIons are IdentIcaI to correspondIng FOA
exemptIons: exemptIons 1, Ior cIassIIIed natIonaI securIty InIormatIon; exemptIons 3, Ior InIormatIon
protected by other statute; exemptIons 4, Ior trade secrets and conIIdentIaI busIness InIormatIon; and
exemptIons 6, Ior unwarranted InvasIons oI personaI prIvacy. PresIdentIaI exemptIon 2 ("P2"), Ior
"appoIntments to FederaI oIIIce," has no FOA counterpart, but Is subsumed, In Iarge part, under FOA
exemptIon (b) (6). PresIdentIaI exemptIon 5 ("P5"), concernIng "conIIdentIaI communIcatIons requestIng or
submIttIng advIce, between the PresIdent and hIs advIsers, or between such advIsers," Is sImIIar to FOA






323
exemptIon (b)(5), and protects the dIscIosure oI presIdentIaI communIcatIons, deIIberatIons, and other
InIormatIon that couId be subject to a common Iaw or constItutIonaIIy-based prIvIIege.

Source: ]ohn W. CarIIn. "On the mpIementatIon and EIIectIveness oI the PresIdentIaI Records Act oI 1978."
November 6, 2001, http:]]www.archIves.gov]presIdentIaI-IIbrarIes]Iaws]access]pra-1978.htmI and
PresIdentIaI Records Act oI 1978 and "PresIdentIaI Records Act ExecutIve Order
Further mpIementatIon oI the PresIdentIaI Records Act ExecutIve Order." November 1, 2001 [See the
Wayback MachIne,
http:]]web.archIve.org]web]20071214203059]http:]]www.whItehouse.gov]news]reIeases]2001]11]200
11101-12.htmI
PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements PresIdentIaI SIgnIng Statements
1. Many PresIdents have used sIgnIng statements to make substantIve IegaI, constItutIonaI, or
admInIstratIve pronouncements on the bIII beIng sIgned. AIthough the recent practIce oI IssuIng sIgnIng
statements to create "IegIsIatIve hIstory" remaIns controversIaI, the other uses oI PresIdentIaI sIgnIng
statements generaIIy serve IegItImate and deIensIbIe purposes.
We beIIeve that such statements may on approprIate occasIons perIorm useIuI and IegaIIy sIgnIIIcant
IunctIons. These IunctIons IncIude (1) expIaInIng to the pubIIc, and partIcuIarIy to constItuencIes
Interested In the bIII, what the PresIdent beIIeves to be the IIkeIy eIIects oI Its adoptIon, (2) dIrectIng
subordInate oIIIcers wIthIn the ExecutIve 8ranch how to Interpret or admInIster the enactment, and (3)
InIormIng Congress and the pubIIc that the ExecutIve beIIeves that a partIcuIar provIsIon wouId be
unconstItutIonaI In certaIn oI Its appIIcatIons, or that It Is unconstItutIonaI on Its Iace, and that the
provIsIon wIII not be gIven eIIect by the ExecutIve 8ranch to the extent that such enIorcement wouId
create an unconstItutIonaI condItIon.
These IunctIons must be careIuIIy dIstInguIshed Irom a much more controversIaI -- and apparentIy recent
-- use oI PresIdentIaI sIgnIng statements, I.e., to create IegIsIatIve hIstory to whIch the courts are
expected to gIve some weIght when construIng the enactment. n what IoIIows, we outIIne the ratIonaIes
Ior the IIrst three IunctIons, and then consIder arguments Ior and agaInst the Iourth IunctIon.(2) The
AppendIx to the memorandum surveys the use oI sIgnIng statements by earIIer PresIdents and provIdes
exampIes oI such statements that were Intended to have IegaI sIgnIIIcance or eIIects.
n 1986, then-Attorney CeneraI Meese entered Into an arrangement wIth the West PubIIshIng Company to
have PresIdentIaI sIgnIng statements pubIIshed Ior the IIrst tIme In the U.S. Code CongressIonaI and
AdmInIstratIve News, the standard coIIectIon oI IegIsIatIve hIstory. Mr. Meese expIaIned the purpose oI the
project as IoIIows:
To make sure that the PresIdent's own understandIng oI what's In a bIII Is the same . . . or Is gIven
consIderatIon at the tIme oI statutory constructIon Iater on by a court, we have now arranged wIth
the West PubIIshIng Company that the presIdentIaI statement on the sIgnIng oI a bIII wIII






324
accompany the IegIsIatIve hIstory Irom Congress so that aII can be avaIIabIe to the court Ior
Iuture constructIon oI what that statute reaIIy means.
Source: Department oI ]ustIce. "The LegaI SIgnIIIcance oI PresIdentIaI SIgnIng Statements." Memorandum
Ior 8ernard N. Nussbaum, CounseI to the PresIdent. November 3,
1993,http:]]www.usdoj.gov]oIc]sIgnIng.htm
2. The thesIs that emerges Irom thIs study Is that the Ceorge W. 8ush admInIstratIon has very
eIIectIveIy expanded the scope and character oI the sIgnIng statement not onIy to address specIIIc
provIsIons oI IegIsIatIon that the WhIte House wIshes to nuIIIIy, but aIso In an eIIort to sIgnIIIcantIy
reposItIon and strengthen the powers oI the presIdency reIatIve to the Congress. ThIs tour d' Iorce has
been carrIed out In such a systematIc and careIuI IashIon that Iew In Congress, the medIa, or the schoIarIy
communIty are aware that anythIng has happened at aII.
WhIIe there certaInIy were exampIes In the past oI the use oI sIgnIng statements (FIsher 1997, 132-41;
DeIIInger 1993), It was RonaId Reagan's attorney generaI, EdwIn Meese , who was responsIbIe Ior the
deveIopment oI the sIgnIng statement Into a sIgnIIIcant and commonIy used Instrument oI executIve dIrect
actIon. PrIor to Reagan, such statements were rareIy used Ior the kInds oI substantIve purposes to whIch
they wouId be put startIng wIth the Reagan years. LookIng back prIor to the Reagan admInIstratIon,
AssIstant Attorney CeneraI WaIter DeIIInger Iound some sIxteen sItuatIons In whIch thIrteen dIIIerent
presIdents Issued sIgnIng statements that addressed what the presIdent consIdered to be probIematIc
parts oI IegIsIatIon presented Ior sIgnature (DeIIInger 1993). The Reagan admInIstratIon saw the sIgnIng
statement as a useIuI and potentIaIIy Important tooI.
SIgnIng statements are attractIve Ior two reIated IegaI reasons. The IIrst Is that they are, In most cases,
extremeIy dIIIIcuIt to chaIIenge unIess an admInIstratIon deIIberateIy makes cIear specIIIcaIIy how
and In what cIrcumstances It wIII Invoke the terms oI the sIgnIng statement.

Source: PhIIIIp ]. Cooper. "Ceorge W. 8ush, Edgar AIIan Poe, and the Use and Abuse oI PresIdentIaI SIgnIng
Statements. " PresIdentIaI StudIes QuarterIy 35 no. 3 (2005): 515-533.
3. For Important IegIsIatIon, however, presIdents oIten prepare sIgnIng statements to pubIIcIze,
expIaIn, or justIIy theIr decIsIons. These statements may praIse or crItIcIze the IegIsIatIon In questIon, and
they are Important prImarIIy Ior theIr poIItIcaI, not IegaI sIgnIIIcance.
n the 1980s, a sIgnIIIcant controversy arose concernIng IegaI cognIzance oI presIdentIaI sIgnIng
statements. On occasIon, presIdents wouId use sIgnIng statements to Impose theIr InterpretatIon oI a
statute. Under PresIdent RonaId Reagan, thIs practIce became systematIc.
Source: Leonard W. Levy and LouIs FIsher. EncycIopedIa oI the AmerIcan PresIdency. New York: SImon &
Schuster, 1994. 1372-1373.






325
4. WhIIe the number oI provIsIons chaIIenged or objected to by PresIdent 8ush has gIven rIse
to controversy, It Is Important to note that the substance oI hIs sIgnIng statements do not appear to dIIIer
substantIveIy Irom those Issued by eIther PresIdents Reagan or CIInton. As wIth those AdmInIstratIons, the
majorIty oI the 8ush sIgnIng statements make generaIIzed objectIons to perceIved encroachments on
executIve authorIty. Moreover, In aImost aII Instances where PresIdent 8ush has raIsed a constItutIonaI
concern or objectIon, he has stated that he wIII construe the provIsIon at Issue In a manner that wIII avoId
hIs concerns. ReIatedIy, In some statements that raIse constItutIonaI objectIons, PresIdent 8ush has
decIared that he wouId compIy wIth the provIsIon at Issue "as a matter oI comIty." ProIessor PhIIIp ].
Cooper has characterIzed the constItutIonaI objectIons raIsed by PresIdent 8ush as IaIIIng across
seventeen categorIes, rangIng Irom generaIIzed assertIons oI presIdentIaI authorIty to supervIse the
"unItary executIve branch" to IederaIIsm IImIts Imposed by the Supreme Court In UnIted States v. PrIntz.
Source: T.]. HaIstead. "PresIdentIaI SIgnIng Statements: ConstItutIonaI and nstItutIonaI
mpIIcatIons." CRS Report to Congress September 22, 2006,
http:]]www.Ias.org]sgp]crs]natsec]RL33667.pdI
5. There Is no estabIIshed deIInItIon oI "sIgnIng statement." SIgnIng statements usuaIIy take the
Iorm oI a presIdentIaI statement or press reIease Issued In connectIon wIth the PresIdent's sIgnIng oI a
bIII. There Is even some dIsagreement as to the IIrst hIstorIcaI use oI a sIgnIng statement. Many schoIars
cIte PresIdent Andrew ]ackson's statement accompanyIng an approprIatIons act InvoIvIng InternaI
Improvements as the IIrst sIgnIng statement. Other schoIars poInt to a statement made by PresIdent ]ames
Monroe a month aIter sIgnIng a Iaw reguIatIng the appoIntment oI mIIItary oIIIcers. VarIous presIdentIaI
admInIstratIons have used sIgnIng statements sInce the earIy nIneteenth century wIth a varIety oI
responses by Congress and the courts.

Source: CAO. PresIdentIaI SIgnIng Statements AccompanyIng the FIscaI Year 2006 ApproprIatIons Acts,
]une 18, 2007, http:]]www.gao.gov]decIsIons]appro]308603.htm

6. n addItIon, thIs statement IaIIed to IdentIIy the specIIIc nature oI concerns, statIng onIy that
the provIsIons "couId InhIbIt the PresIdent's abIIIty to carry out hIs constItutIonaI obIIgatIons to take care
that the Iaws be IaIthIuIIy executed, to protect natIonaI securIty, to supervIse the executIve branch, and to
execute hIs authorIty as Commander In ChIeI." The nature oI these objectIons, however, Is not cIarIIIed or
substantIated accordIng to T.]. HaIstead oI the CongressIonaI Research ServIce. As poInted out by
ProIessor NIchoIas QuInn Rosenkranz oI Ceorgetown UnIversIty's Iaw SchooI, the statement Ieaves the
PresIdent's constItutIonaI objectIons "somewhat theoretIcaI," at best.

Source: FIndIngs oI the SubcommIttee on OversIght and nvestIgatIons In Support oI the FuII CommIttee re:
PresIdentIaI SIgnIng Statements, http:]]www.Ias.org]sgp]congress]2008]sIgnIng.pdI; aIso see CPO
Access, CommIttee on the ]udIcIary, Senate HearIng 109-1053, The Use oI PresIdentIaI SIgnIng
Statements, ]une 27, 2006, UnIted States. Congress. House. CommIttee on the ]udIcIary, PresIdentIaI
sIgnIng statements under the 8ush admInIstratIon : a threat to checks and baIances and the ruIe oI IawZ :
hearIng beIore the CommIttee on the ]udIcIary, House oI RepresentatIves, One Hundred Tenth Congress,






326
IIrst sessIon, ]anuary 31, 2007. WashIngton : U.S. C.P.O., http:]]Irwebgate.access.gpo.gov]cgI-
bIn]getdoc.cgIZdbname=110househearIngs&docId=I:32844.pdI

PresIdent's DaIIy PresIdent's DaIIy PresIdent's DaIIy PresIdent's DaIIy 8rIeI 8rIeI 8rIeI 8rIeI
1. CA cIassIIIed natIonaI securIty InIormatIon and anaIysIs sent to the PresIdent daIIy; Is "InherentIy
prIvIIeged," accordIng to the CA, and thereIore cannot be pubIIcIy dIscIosed, regardIess oI age or content.

Source: See "ProIessor Sues CA Ior PresIdent's DaIIy 8rIeI," December 23,
2004, http:]]www2.gwu.edu]~nsarchIv]pdbnews]Index.htm

2. The PresIdent's DaIIy 8rIeI has undergone an equaIIy sIgnIIIcant transIormatIon. The CA's
DIrectorate oI nteIIIgence Is stIII the backbone oI the PD8 and wIII remaIn so, but the PD8 now beneIIts
Irom the partIcIpatIon oI anaIysts across the C. ThIs has brought more expertIse to bear and made It
easIer to IdentIIy anaIytIc dIsagreements and InteIIIgence gaps.

Source: ]ohn D. Negroponte, "TransIormIng nteIIIgence -- A Focus on AnaIysIs nteIIIgence and NatIonaI
SecurIty AIIIance," ]une 07, 2006,
http:]]www.dnI.gov]speeches]prInterIrIendIy]20060607speechprInt.htm

PresIdent's ForeIgn nteIIIgence AdvIsory 8oard PresIdent's ForeIgn nteIIIgence AdvIsory 8oard PresIdent's ForeIgn nteIIIgence AdvIsory 8oard PresIdent's ForeIgn nteIIIgence AdvIsory 8oard
See nteIIIgence OversIght 8oard See nteIIIgence OversIght 8oard See nteIIIgence OversIght 8oard See nteIIIgence OversIght 8oard
The PresIdent's ForeIgn nteIIIgence AdvIsory 8oard (PFA8) provIdes advIce to the PresIdent concernIng the
quaIIty and adequacy oI InteIIIgence coIIectIon, oI anaIysIs and estImates, oI counterInteIIIgence, and oI
other InteIIIgence actIvItIes. The PFA8, through Its nteIIIgence OversIght 8oard, aIso advIses the PresIdent
on the IegaIIty oI IoreIgn InteIIIgence actIvItIes. The PFA8 currentIy has 16 members seIected Irom among
dIstInguIshed cItIzens outsIde the government who are quaIIIIed on the basIs oI achIevement, experIence,
Independence, and IntegrIty.
UnIque wIthIn the government, the PFA8 tradItIonaIIy has been tasked wIth provIdIng the PresIdent wIth
an Independent source oI advIce on the eIIectIveness wIth whIch the InteIIIgence communIty Is meetIng
the natIon's InteIIIgence needs and the vIgor and InsIght wIth whIch the communIty pIans Ior the Iuture.
Source: The WhIte House. ForeIgn nteIIIgence AdvIsory 8oard,
http:]]www.whItehouse.gov]admInIstratIon]eop]pIab]
PrImary CensorshIp PrImary CensorshIp PrImary CensorshIp PrImary CensorshIp
See CensorshIp See CensorshIp See CensorshIp See CensorshIp
Armed Iorces censorshIp perIormed by personneI oI a company, battery, squadron, shIp, statIon, base, or
sImIIar unIt on the personaI communIcatIons oI persons assIgned, attached, or otherwIse under the
jurIsdIctIon oI a unIt.






327
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PrIor RestraInt PrIor RestraInt PrIor RestraInt PrIor RestraInt
n Iurther arguments [In the ProgressIve case], the government noted that 'prIor restraInts have been
upheId by the courts where the government has demonstrated the need to preserve the secrecy oI
cIassIIIed or sensItIve InIormatIon." ExampIes cIted IncIuded secrecy restrIctIons Imposed on Iormer COA
empIoyees, and restraInts agaInst a government contractor's communIcatIon detaIIs about constructIng
and operatIng a torpedo.

Source: AIexander DeVoIpI et aI. 8orn Secret: the H-bomb, the ProgressIve Case and NatIonaI SecurIty.
New York: Pergamon Press, 1981. 59.
PrIsoner oI War CensorshIp PrIsoner oI War CensorshIp PrIsoner oI War CensorshIp PrIsoner oI War CensorshIp
See CensorshIp See CensorshIp See CensorshIp See CensorshIp
The censorshIp oI the communIcatIons to and Irom enemy prIsoners oI war and cIvIIIan Internees heId by
the UnIted States Armed Forces.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PrIvacy PrIvacy PrIvacy PrIvacy
]udge Thomas CooIey deIIned as "the rIght to be IeIt aIone."

Source: TreatIse on the Law oI Torts (ts ed., 1879; d 29), SamueI Warren and LouIs D. 8randeIs. "The
RIght to PrIvacy." Harvard Law RevIew V no. 5 (1890)
http:]]IacuIty.umI.edu]sgaIIagher]8randeIsprIvacy.htm, "Context" oI W]8 artIcIe
http:]]IacuIty.umI.edu]sgaIIagher]harvardIawrevIew.htm, and EIIen AIderman and CaroIIne Kennedy.
The RIght to PrIvacy. New York: VIntage 8ooks, 1997.

PrIvacy Act oI 1974 PrIvacy Act oI 1974 PrIvacy Act oI 1974 PrIvacy Act oI 1974 ( (( (P.L. 93 P.L. 93 P.L. 93 P.L. 93- -- -579) 579) 579) 579)
Each agency that maIntaIns a system oI records shaII . . . upon request by any IndIvIduaI to gaIn access to
hIs record or to any InIormatIon pertaInIng to hIm whIch Is contaIned In the system, permIt hIm and upon
hIs request, a person oI hIs own choosIng to accompany hIm, to revIew the record and have a copy made
oI aII or any portIon thereoI In a Iorm comprehensIbIe to hIm, except that the agency may requIre the
IndIvIduaI to IurnIsh a wrItten statement authorIzIng dIscussIon oI that IndIvIduaI's record In the
accompanyIng person's presence."

Source: 5 U.S.C. 552a (d) (1), "OvervIew oI the PrIvacy Act oI 1974,"
http:]]www.usdoj.gov]opcI]1974prIvacyact-overvIew.htm and EPC "The PrIvacy Act oI 1974,"
http:]]www.epIc.org]prIvacy]1974act]







328
PrIvacy and CIvII LIbertIes OversIght 8oard PrIvacy and CIvII LIbertIes OversIght 8oard PrIvacy and CIvII LIbertIes OversIght 8oard PrIvacy and CIvII LIbertIes OversIght 8oard (PCLO8) (PCLO8) (PCLO8) (PCLO8)
1. Recommended by the NatIonaI CommIssIon on TerrorIst Attacks Upon the
UnIted States (9]11 CommIssIon), the PrIvacy and CIvII LIbertIes OversIght 8oard
(PCLO8) was InItIaIIy estabIIshed as an agency wIthIn the ExecutIve OIIIce oI the
PresIdent (EOP) In 2004. CrItIcs, however, maIntaIned that the board appeared to be
a presIdentIaI appendage, devoId oI the capabIIIty to exercIse Independent judgment
and assessment or to provIde ImpartIaI IIndIngs and recommendatIons. ThIs
vIewpoInt gaIned acceptance In the 110th Congress when the PCLO8 was
reconstItuted as an Independent agency wIthIn the executIve branch by the
mpIementIng RecommendatIons oI the 9]11 CommIssIon Act (R9]11CA), sIgned
Into Iaw on August 6, 2007.

Source: HaroId ReIyea, "PrIvacy and CIvII LIbertIes OversIght 8oard: New ndependent Agency," CRS Report
Ior Congress November 26, 2008, RL34385, http:]]www.Ias.org]sgp]crs]mIsc]RL34385.pdI
2. The 8oard advIses the PresIdent and other senIor executIve branch oIIIcIaIs to ensure that
concerns wIth respect to prIvacy and cIvII IIbertIes are approprIateIy consIdered In the ImpIementatIon oI
aII Iaws, reguIatIons, and executIve branch poIIcIes reIated to eIIorts to protect the NatIon agaInst
terrorIsm. ThIs IncIudes advIsIng on whether adequate guIdeIInes, supervIsIon, and oversIght exIst to
protect these Important IegaI rIghts oI aII AmerIcans.
n addItIon, the 8oard Is specIIIcaIIy charged wIth responsIbIIIty Ior revIewIng the terrorIsm InIormatIon
sharIng practIces oI executIve branch departments and agencIes to determIne whether guIdeIInes
desIgned to approprIateIy protect prIvacy and cIvII IIbertIes are beIng IoIIowed,
Source: PrIvacy 8oard, [See the Wayback MachIne,
http:]]web.archIve.org]web]20080122053540]http:]]www.prIvacyboard.gov] ]

PrIvIIege PrIvIIege PrIvIIege PrIvIIege
1. t Is my opInIon that varIous types oI rIghts, or prIvIIege are InextrIcabIy tIed to controI - and
sometImes not In a negatIve way - oI InIormatIon; prIvIIege outIInes specIaIIzed, controIIed access to, and
power over, InIormatIon whIch can encourage pubIIc dIscIosure, ensure conIIdentIaIIty, or Impose secrecy:

Types oI PrIvIIege Types oI PrIvIIege Types oI PrIvIIege Types oI PrIvIIege:
Attorney-CIIent PrIvIIege
ConIIdentIaI, open communIcatIon between a cIIent and attorney so the attorney Is compIeteIy InIormed oI
aII Iacts In a IegaI matter.

Source: FederaI RuIes oI CIvII Procedure at R. 26, http:]]www.Iaw.corneII.edu]ruIes]Ircp] and the FederaI
RuIes oI EvIdence at R. 501, http:]]www.Iaw.corneII.edu]ruIes]Ire]

Attorney Work Product DoctrIne PrIvIIege






329
8oth the attorney and cIIent can assert the work product doctrIne prIvIIege. t Is not desIgned to
protect cIIent conIIdences but, rather, to sheIter the "mentaI processes" oI the attorney. t Is consIdered an
Independent source oI ImmunIty Irom dIscovery. Fed. R. CIv. P. 26(b)(1) states that, partIes may obtaIn
dIscovery, regardIng any matter, not prIvIIeged, ... R. 26(b)(3) deIInes prIvIIege as prepared In antIcIpatIon
oI IItIgatIon or Ior trIaI by or Ior another party or by or Ior that party's representatIve.

Source: FederaI RuIes oI CIvII Procedure at R. 26, http:]]www.Iaw.corneII.edu]ruIes]Ircp] and the FederaI
RuIes oI EvIdence at R. 501, http:]]www.Iaw.corneII.edu]ruIes]Ire]

AudIt PrIvIIege
AIso known as Industry seII-audIt and poIIuter secrecy, aIIows companIes to evaIuate practIces and
operatIons to ascertaIn compIIance wIth aII appIIcabIe envIronmentaI Iaws and reguIatIons. The pubIIc Is
not InvoIved. I vIoIatIons occur, the company Is encouraged to dIscIose them to the EPA voIuntarIIy. n
return, the EPA wIII dramatIcaIIy reduce or waIve penaItIes

Source: RIchard DahI. "AudIt-PrIvIIege Laws: The RIght to Know NothIng." EnvIronmentaI HeaIth
PerspectIves 107 no. 10 (1999): http:]]www.ehponIIne.org]reaIIIIes]docs]1999]107-10]spheres.htmI and
http:]]www.epa.gov]compIIance]state]authorItIes.htmI

DeIIberatIve Process PrIvIIege
AppIIes to InIormatIon generated as a process oI Agency dIscussIon and actIon on a matter. Protects
agencIes Irom premature dIscIosure oI proposed poIIcIes beIore they are adopted and to encourage Irank
dIscussIons on matters oI poIIcy between subordInates and superIors. nIormatIon oI thIs nature Is oIten
reIerred to as "predecIsIonaI" or "deIIberate documents."

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde, http:]]www.usdoj.gov]oIp]IoI-
act.htm and Robert C. WrIght v. FederaI 8ureau oI nvestIgatIon, (FataI 8etrayaIs manuscrIpt),
http:]]www.Ias.org]sgp]jud]wrIght050609.pdI

ExecutIve PrIvIIege
AIIows the presIdent and other hIgh oIIIcIaIs oI the executIve branch to keep certaIn communIcatIons
prIvate II dIscIosIng those communIcatIons wouId dIsrupt the IunctIons or decIsIonmakIng processes oI
the executIve branch. As demonstrated by the Watergate hearIngs, thIs prIvIIege does not extend to
InIormatIon germane to a crImInaI InvestIgatIon; PresIdentIaI cIaIms oI a rIght to preserve the
conIIdentIaIIty oI InIormatIon and documents.

Source: NoIo Press LegaI CIossary. http:]]www.noIo.com]deIInItIon.cIm]Term]892DA109-E432-4AD3-
8348D9160EA44ECA]aIpha]E]; UnIted States v. NIxon 418 U.S. 683 (1974) ; aIso see Arthur SchIesInger.
The mperIaI PresIdency (New York: AtIantIc MonthIy, 1973) Ior a hIstorIcaI dIscussIon oI the prIvIIege, and
Morton Rosenberg, "PresIdentIaI CIaIms oI ExecutIve PrIvIIege: HIstory, Law, PractIce and Recent
DeveIopments," Updated August 21, 2008 CRS Report to Congress RL30319 ,
http:]]www.Ias.org]sgp]crs]secrecy]RL30319.pdI






330

Least PrIvIIege
PrIncIpIe requIrIng that each subject be granted the most most most most restrIctIve set oI prIvIIeges needed Ior the
perIormance oI authorIzed tasks. AppIIcatIon oI thIs prIncIpIe IImIts the damage that can resuIt
Irom accIdent, error, or unauthorIzed use oI an InIormatIon system.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]IoIa.state.gov]RECS]Search.asp

PrIvIIeged nIormatIon
ExemptIon 4 oI the Freedom oI nIormatIon Act has been utIIIzed by some courts as an aIternatIve Ior
protectIng non-conIIdentIaI commercIaI or IInancIaI InIormatIon. AIso reIated to the Trade Secrets Act.

Source: U.S. Department oI ]ustIce. "ExemptIon 4," Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]exemptIon4.htm#prIvIIeged

SeII EvaIuatIve PrIvIIege
DesIgned to protect materIaIs reIatIng to an organIzatIon's InternaI studIes Ior Iear that II subjected to the
adversary process, many oI these studIes wouId never occur or wouId be severeIy tempered In the candor.

Source: "The SeII EvaIuatIve PrIvIIege as AppIIed to SeII-ReguIatory OrganIzatIons." Prepared by Faegre &
8enson. The Law Has ts PrIvIIeges. MInneapoIIs, MN: MInnesota nstItute oI LegaI EducatIon, 1993.

State Secrets PrIvIIege
A common Iaw evIdentIary prIvIIege that aIIows the government to deny dIscovery oI mIIItary secrets. n
UnIted States v. ReynoIds, 345 U.S. 1, 97 L. Ed. 727, 73 S. Ct. 528 (1953), the Supreme Court deIIned the
process through whIch the government can cIaIm the state secrets prIvIIege, "whIch Is not to be IIghtIy
Invoked."

Source: FAS. Secrecy News AprII 21, 2004, http:]]www.Ias.org]sgp]jud]Index.htmI#reynoIds and Edward
C. LIu, "The State Secrets PrIvIIege and Other LImIts on LItIgatIon nvoIvIng CIassIIIed nIormatIon," CRS
Reports Ior Congress R40603 May 28, 2009, http:]]www.Ias.org]sgp]crs]secrecy]R40603.pdI

- PetItIoners, heIrs to the orIgInaI pIaIntIIIs In ReynoIds, are now askIng the Supreme Court to
revIew the case and to permIt them to argue that they were deIrauded by the government. The petItIoners
were rebuIIed by the Court In 2003 when they IIrst
sought reconsIderatIon oI the 1953 ruIIng, and theIr arguments have subsequentIy been rejected by the
Iower courts as weII. StIII, the case raIses InterestIng questIons not onIy about the IntegrIty oI the orIgInaI
ReynoIds decIsIon, whIch Is a cornerstone oI natIonaI securIty Iaw, but aIso about the judIcIaI system's
capacIty to acknowIedge and correct Its errors.







331
Source: FAS. Secrecy News ]anuary 5, 2006,
http:]]www.Ias.org]sgp]news]secrecy]2006]01]010506.htmI; PetItIon Ior a WrIt oI CertIorarI In HerrIng
v. U.S., IIIed at the Supreme Court on December 21, 2005, http:]]www.Ias.org]sgp]jud]herrIng1205.pdI
and LouIs FIsher. n the Name oI NatIonaI SecurIty: Unchecked PresIdentIaI Power and the ReynoIds Case.
Lawrence: UnIversIty Press oI Kansas, 2006.

- 8etween the years 1953-1976, the prIvIIege was used 4 tImes; SInce 2001, the States Secret
prIvIIege has been Invoked 23 tImes.

Source: RIck 8Ium. Secrecy Report Card 2005. OpenTheCovernment.org. September 2005,
http:]]www.openthegovernment.org]otg]SRC2005.pdI

- Mr. KhaIed EI-MasrI, a Cerman cItIzen oI Lebanese orIgIn aIIeged that he was kIdnapped and
tortured under the CA's "extraordInary rendItIon" program. The case was dIsmIssed aIter the CA Invoked
the state secrets prIvIIege. n hIs dIsmIssaI oI the EI-MasrI case, ]udge T.S. EIIIs, wrote that "To succeed
on hIs cIaIms, EI-MasrI wouId have to prove that he was abducted, detaIned, and subjected to crueI and
degradIng treatment, aII as part oI the UnIted States' extraordInary rendItIon program. As noted above,
any answer to the compIaInt by the deIendants rIsks the dIscIosure oI specIIIc detaIIs about the rendItIon
argument."

Source: KhaIed EI-MasrI v. Ceorge Tenent. Case No. 1:05cv1417,
http:]]www.Ias.org]sgp]jud]statesec]eImasrI051206.pdI; (RIchard Horn v. FrankIIn HuddIe ]r.) Secrecy
News bIog: "SeaIed V. SeaIed: How Courts ConIront State Secrets,"
http:]]www.Ias.org]bIog]secrecy]2006]06]seaIedvseaIedhowcourtscon.htmI

- The states secret prIvIIege was used by the New York TImes - not a IederaI entIty - In "a motIon to
dIsmIss the IIbeI suIt brought agaInst It by Steven ]. HatIIII, the Iormer Army scIentIst who saId he was
erroneousIy IInked by the TImes to the 2001 anthrax attacks."

Source. FAS, Secrecy News ]anuary 22, 2007,
http:]]www.Ias.org]bIog]secrecy]2007]01]thestatesecretsdoctrIneand.htmI

- Now, aIong these same IInes, my admInIstratIon Is aIso conIrontIng chaIIenges to what Is known as the
"state secrets" prIvIIege.ThIs Is a doctrIne that aIIows the government to chaIIenge IegaI cases InvoIvIng
secret programs. t's been used by many past PresIdents -- RepubIIcan and Democrat -- Ior many
decades. And whIIe thIs prIncIpIe Is absoIuteIy necessary In some cIrcumstances to protect natIonaI
securIty, am concerned that It has been over-used. t Is aIso currentIy the subject oI a wIde range oI
IawsuIts. So Iet me Iay out some prIncIpIes here.We must not protect InIormatIon mereIy because It
reveaIs the vIoIatIon oI a Iaw or embarrassment to the government. And that's why my admInIstratIon Is
nearIng compIetIon oI a thorough revIew oI thIs practIce.







332
And we pIan to embrace severaI prIncIpIes Ior reIorm. We wIII appIy a strIcter IegaI test to materIaI
that can be protected under the state secrets prIvIIege. We wIII not assert the prIvIIege In court wIthout
IIrst IoIIowIng our own IormaI process, IncIudIng revIew by a ]ustIce Department commIttee and the
personaI approvaI oI the Attorney CeneraI. And each year we wIII voIuntarIIy report to Congress when we
have Invoked the prIvIIege and why because, as saId beIore, there must be proper oversIght over our
actIons.

Source: 8arack Obama, "Remarks by the PresIdent on NatIonaI SecurIty," May 21, 2009, NARA,
http:]]www.whItehouse.gov]thepressoIIIce]Remarks-by-the-PresIdent-On-NatIonaI-SecurIty-5-21-
09]

A seIected IIst oI state secret cases can be Iound at FederatIon oI AmerIcan ScIentIsts websIte:
http:]]www.Ias.org]sgp]jud]statesec]Index.htmI; "Shays Looks to LImIt State Secrets PrIvIIege," OM8
Watch ]une 27, 2006, http:]]www.ombwatch.org]artIcIe]artIcIevIew]3481]1]451; LouIs FIsher. n the
Name oI NatIonaI SecurIty: Unchecked PresIdentIaI Power and the ReynoIds Case. Lawrence: UnIversIty
Press oI Kansas, 2006; PractIcaI CuIdeIInes Ior nvokIng the State Secrets PrIvIIege, U.S.
Army Memorandum Ior FIIe, AprII 24, 2001, http:]]www.Ias.org]sgp]jud]statesec]army-ssp.pdI and
UnIted States. Congress. Senate. CommIttee on the ]udIcIary. State Secrets ProtectIon Act: Report
Together wIth MInorIty VIews (to accompany S. 2533) (IncIudIng cost estImate oI the CongressIonaI 8udget
OIIIce). WashIngton, D.C.: U.S. C.P.O., 2008, http:]]purI.access.gpo.gov]CPO]LPS99667, and DO].
"Attorney CeneraI EstabIIshes New State Secrets PoIIcIes and Procedures,"September 23, 2009,
http:]]www.justIce.gov]opa]pr]2009]September]09-ag-1013.htmI

Statutory PrIvIIege
A CA "conceIt reIerrIng to the statutory requIrement that the DC must protect InteIIIgence sources and
methods. AIthough thIs statute Is oIten empIoyed In a seII-Interested way, It Is an obIIgatIon oI Iaw and
not a "prIvIIege" that can be waIved."

Source: FAS. Secrecy News AprII 23, 2002,
http:]]www.Ias.org]sgp]news]secrecy]2002]04]042302.htmI

PrIvIIeged nIormatIon PrIvIIeged nIormatIon PrIvIIeged nIormatIon PrIvIIeged nIormatIon
ExemptIon 4 oI the Freedom oI nIormatIon Act has been utIIIzed by some courts as an aIternatIve Ior
protectIng non-conIIdentIaI commercIaI or IInancIaI InIormatIon. AIso reIated to The Trade Secrets Act.

Source: U.S. Department oI ]ustIce. "ExemptIon 4," Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]exemptIon4.htm#prIvIIeged

PrIvIIeged Records PrIvIIeged Records PrIvIIeged Records PrIvIIeged Records
Sec. 8. WIthhoIdIng oI PrIvIIeged Records DurIng 12-Year PerIod. n the perIod not to exceed 12 years aIter
the concIusIon oI a PresIdency durIng whIch sectIon 2204(a) and sectIon 2204(b) oI tItIe 44 appIy, a
Iormer PresIdent or the Incumbent PresIdent may request wIthhoIdIng oI any prIvIIeged records not






333
aIready protected Irom dIscIosure under sectIon 2204. I the Iormer PresIdent or the Incumbent
PresIdent so requests, the ArchIvIst shaII not permIt access to any such prIvIIeged records unIess and untII
the Incumbent PresIdent advIses the ArchIvIst that the Iormer PresIdent and the Incumbent PresIdent agree
to authorIze access to the records or untII so ordered by a IInaI and nonappeaIabIe court order.

Source: "PresIdentIaI Records Act ExecutIve Order Further mpIementatIon oI the PresIdentIaI Records Act
ExecutIve Order." November 1, 2001, 2001 [See the Wayback MachIne, http:]]tInyurI.com]ycrzvc7 ]

ProActIve nteIIIgence (PANT) ProActIve nteIIIgence (PANT) ProActIve nteIIIgence (PANT) ProActIve nteIIIgence (PANT)
Seeks to study the dynamIcs oI compIex InteIIIgence targets (IncIusIve oI terrorIst organIzatIons) by
examInIng patterns oI causaI reIatIonshIps that are IndIcatIve oI neIarIous actIvIty.

Source: DN, Data MInIng Report, February 15, 2008, http:]]www.Ias.org]Irp]dnI]datamInIng.pdI

Procedure Words Procedure Words Procedure Words Procedure Words
To keep voIce transmIssIons as short and cIear as possIbIe, radIo operators empIoy procedure words
(prowords)-a word or phrase IImIted to radIo teIephone procedure, used to IacIIItate communIcatIon by
conveyIng InIormatIon In a condensed standard Iorm.
Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

Process Process Process Process
An InIormatIon management actIvIty: to raIse the meanIng oI InIormatIon Irom data to knowIedge.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
ProcessIng and ExpIoItatIon ProcessIng and ExpIoItatIon ProcessIng and ExpIoItatIon ProcessIng and ExpIoItatIon
(DOD) n InteIIIgence usage, the conversIon oI coIIected InIormatIon Into Iorms suItabIe to the productIon
oI InteIIIgence.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Project Cam Project Cam Project Cam Project CameIot eIot eIot eIot
See MInerva ConsortIa See MInerva ConsortIa See MInerva ConsortIa See MInerva ConsortIa
Project CameIot has as Its maIn objectIve an evaIuatIon oI the IeasIbIIIty oI deveIopIng and ImpIementIng a
dynamIc socIaI systems modeI to:






334
a. IdentIIy IndIcators oI condItIons and trends whIch, II contInued, wouId probabIy Iead to the outbreak
oI InternaI war; b. determIne the probabIe eIIects oI varIous courses oI actIons by the IndIgenous
government upon socIaI processes In the IndIgenous cuIture; c. maIntaIn InIormatIon on the condItIons
reIerred too In a. and b. above In such a way, IncIudIng the specIIyIng oI dynamIc InterreIatIonshIps
among cIasses oI InIormatIon and the socIetaI eIements represented thereby.

Source: (DoD) "Document Number 2," n rvIng LouIs HorowItz (ed.) The RIse and FaII oI Project CameIot
(CambrIdge: MT Press); ]ohan CaItung , "AIter CameIot," ScIentIIIc CoIonIaIIsm," TransItIon no.30 (AprII-
May, 1967): 11-15; ]oseph C. ]orgensen, "On EthIcs and AnthropoIogy," Current AnthropoIogy, 12 no.3
(1971): 321-334; ]oy Rohde, CounterInsurgency on Contract: Project CameIot, SocIaI ScIence, and
AmerIcan NatIonaI SecurIty In the CoId War MIIIer Center Ior PubIIc AIIaIrs, May 10, 2007,
http:]]webstorage1.mcpa.vIrgInIa.edu]IIbrary]mc]apd]rohde.pdI; and KaIman H. SIIver, "AmerIcan
AcademIc EthIcs and SocIaI Research Abroad: The Lesson oI Project CameIot," ProceedIngs and Papers: The
New nteIIIgence RequIrements (Nov., 1965): 215-236.

Propaganda Propaganda Propaganda Propaganda
See 8ureau oI nternatIonaI nIormatIon Programs, Counter See 8ureau oI nternatIonaI nIormatIon Programs, Counter See 8ureau oI nternatIonaI nIormatIon Programs, Counter See 8ureau oI nternatIonaI nIormatIon Programs, Counter- -- -nIormatIon Team, nIormatIon ExpIoItatIon, nIormatIon Team, nIormatIon ExpIoItatIon, nIormatIon Team, nIormatIon ExpIoItatIon, nIormatIon Team, nIormatIon ExpIoItatIon,
PubIIc DIpIomacy, SmIth PubIIc DIpIomacy, SmIth PubIIc DIpIomacy, SmIth PubIIc DIpIomacy, SmIth- -- -Mundt Act Mundt Act Mundt Act Mundt Act
1. EIIuI suggests that InIormatIon and propaganda are IndIstInguIshabIe In a technoIogIcaI
socIety.
54


Propaganda Is deIIned as a Iorm oI communIcatIon that draws upon eIements oI InIormatIon and
persuasIon, and appears to be a Iorm oI InIormatIve communIcatIon, and used to promote InstItutIonaI
objectIves that are not necessarIIy In the best Interest oI the audIence. There are severaI specIIIc types oI
propaganda:

8Iack or Covert Propaganda 8Iack or Covert Propaganda 8Iack or Covert Propaganda 8Iack or Covert Propaganda: IaIse sources are gIven, accompanIed by IIes, IabrIcatIons and deceptIons;
DIrect Propaganda DIrect Propaganda DIrect Propaganda DIrect Propaganda must be preceded by propaganda that Is socIoIogIcaI In character, sIow, generaI,
seekIng to create a cIImate, an atmosphere oI
IavorabIe preIImInary attItudes; Cray Propaganda Cray Propaganda Cray Propaganda Cray Propaganda: a source may or may not be correctIy IdentIIIed, and the
accuracy oI the InIormatIon Is uncertaIn; oIten used to embarrass an enemy or competItor; WhIte or Overt WhIte or Overt WhIte or Overt WhIte or Overt

54
s It possIbIe that ]acques EIIuI based hIs Iamous maxIm on testImony Irom seIect members oI the ASNE
[AmerIcan SocIety oI Newspaper EdItors] durIng the UnIted States nIormatIon and EducatIonaI Exchange
Act oI 1947 hearIngsZ [H.R 3342, SmIth-Mundt hearIng; May 13-14, 16-17, 20, 1947, 80
th
Congress,
FIrst SessIon. Y 4.F76]1:n3]. The hearIngs are truIy remarkabIe In theIr dIscussIon oI the U.S.
government's roIe In creatIng news and "InIormatIon programs" Ior InternatIonaI audIences. For exampIe,
Mr. McKeIway (102) oI ASNE states ".Iet us IrankIy recognIze the Covernment's program as an
experIment In propaganda, and not to conIuse that program wIth the dIssemInatIon oI untaInted news."
There are many dIscussIons In these hearIngs whIch mIrror debates over DoD's vIdeo news reIeases and
subsequent CAO InvestIgatIons oI Iake news.






335
Propaganda Propaganda Propaganda Propaganda: the source Is correctIy IdentIIIed and communIcates accurate InIormatIon; attempts to
buIId credIbIIIty.

Source: ]acques EIIuI. Propaganda: The FormatIon oI Men's AttItudes. New York: VIntage 8ooks, 1973;
VIctorIa O'DonneII, and Carth S. ]owett. "Propaganda as a Form oI CommunIcatIon," Propaganda: A
PIuraIIstIc PerspectIve, Ed. Ted ]. SmIth . New York: Praeger, 1989. 49-62; NIchoIas ]. CuII, DavId CuIbert,
and DavId WeIch, Propaganda and Mass PersuasIon: A HIstorIcaI EncycIopedIa, 1500 to the Present, Santa
8arbara, CA: A8C-CLO, 2003, and Noam Chomsky, Necessary IIusIons: Thought ControI In DemocratIc
SocIetIes, , , , 8oston, MA : South End Press, 1989.

2. DOD and NATO terms; Any Iorm oI communIcatIon In support oI natIonaI objectIves desIgned
to InIIuence the opInIons, emotIons, attItudes, or behavIor oI any group In order to beneIIt the sponsor,
eIther dIrectIy or IndIrectIy.

8Iack Propaganda 8Iack Propaganda 8Iack Propaganda 8Iack Propaganda - Propaganda that purports to emanate Irom a source other than the true one. See FM
33-1-1.
Crey Propaganda Crey Propaganda Crey Propaganda Crey Propaganda - Propaganda that does not specIIIcaIIy IdentIIy any source. See FM 33-1-1. WhIte WhIte WhIte WhIte
Propaganda Propaganda Propaganda Propaganda - Propaganda dIssemInated and acknowIedged by the sponsor or by an accredIted agency
thereoI. See FM 3-05.30.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents
3. 8Iack propaganda and dIsInIormatIon are vIrtuaIIy IndIstInguIshabIe. 8oth reIer to the spreadIng
oI IaIse InIormatIon In order to InIIuence peopIe's opInIons or actIons. DIsInIormatIon Is a specIaI type oI
bIack propaganda whIch hInges on absoIute secrecy and whIch Is usuaIIy supported by IaIse documents.

Source: VIctor MarchettI, and ]ohn D. Marks. The CA and the CuIt oI nteIIIgence. New York: KnopI, 1974.
165 and NIchoIas ]. CuII, DavId CuIbert, and DavId WeIch, Propaganda and Mass PersuasIon: A HIstorIcaI
EncycIopedIa, 1500 to the Present, Santa 8arbara, CA: A8C-CLO, 2003.

4. The dIvIsIon between the two [bIack and whIte propaganda] was recognIzed durIng the recent
war; the OIIIce oI War nIormatIon (OW) was restrIcted to whIte, and the OIIIce oI StrategIc ServIces (OSS)
to bIack. Over and above them was PsychoIogIcaI WarIare, an armed servIces organIzatIon, but thIs
exercIsed onIy the Ioosest supervIsIon, and where bIack propaganda was concerned, Issued very Iew II any
wrItten orders to IIeId operatIves. n the very nature oI the case, bIack had to be kept In a posItIon where It
couId be honestIy dIsavowed at any tIme; otherwIse pubIIc oIIIcIaIs and even some mIIItary men, objectIng
to the essentIaI deceIt InvoIved In any bIack operatIon, mIght crIppIe the enterprIse.
Among the most Important kInds oI bIack propaganda Is the pIanted bIt oI gossIp or rumor.






336
8ecker, Howard. "The Nature and Consequences oI 8Iack Propaganda." AmerIcan SocIoIogIcaI RevIew
14 no. 2 (AprII 1949): 221-235, and WIIIIam E. Daugherty. A PsychoIogIcaI WarIare Casebook. 8aItImore
PubIIshed Ior OperatIons Research OIIIce. 8aItImore, MD: ]ohns HopkIns Press 1958. 221-222.
5. SEC. 821. No part oI any Iunds approprIated In thIs or any other Act shaII be used by an agency
oI the executIve branch, other than Ior normaI and recognIzed executIve-IegIsIatIve reIatIonshIps, Ior
pubIIcIty or propaganda purposes, and Ior the preparatIon, dIstrIbutIon or use oI any kIt, pamphIet,
bookIet, pubIIcatIon, radIo, teIevIsIon or IIIm presentatIon desIgned to support or deIeat IegIsIatIon
pendIng beIore the Congress, except In presentatIon to the Congress ItseII.

Source: "MakIng approprIatIons Ior the Departments oI TransportatIon, Treasury, and HousIng and Urban
DeveIopment, the ]udIcIary, DIstrIct oI CoIumbIa, and Independent agencIes Ior the IIscaI year endIng
September 30, 2006, and Ior other purposes. " 109 P.L. 115; 119 Stat. 2396; 2005 Enacted H.R. 3058;
109 Enacted H.R. 3058, November 30, 2005, http:]]www.gpoaccess.gov]pIaws]

Former SovIet UnIon C deIInItIons oI propaganda: Former SovIet UnIon C deIInItIons oI propaganda: Former SovIet UnIon C deIInItIons oI propaganda: Former SovIet UnIon C deIInItIons oI propaganda:
WhIte beIaya subversIve ImperIaIIst Iorm oI propaganda IdeoIogIcaI sabotage. the acuteness oI these
operatIons depends on the nature oI reIatIons wIth the country agaInst whIch they are carrIed out.

Crey seraya subversIve ImperIaIIst Iorm oI propaganda carrIed out by NCOs, IncIudIng antI-SovIet emIgre
centres and prIvate IndIvIduaIs, usuaIIy IInanced by capItaIIst countrIes, who are abIe to "camouIIage theIr
subversIve actIvItIes and deny InvoIvement."

8Iack chornaya subversIve ImperIaIIst Iorm oI propaganda carrIed out by the enemy In the name oI
Iegendary underground groups and opposItIon eIements In socIaIIst countrIes. The enemy's InvoIvement Is
careIuIIy conceaIed. ExampIes: droppIng IeaIIets and newspapers onto the terrItory oI other countrIes as
though they had been Issued there by "underground organIzatIons," (poIItIcaI personaIItIes or cItIzens In
socIaIIst countrIes) the spreadIng oI IaIse rumours and gossIp, radIo propaganda, aIIeged to be broadcast
Irom "underground radIo statIons"

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.

ProprIetary nIormatIon ProprIetary nIormatIon ProprIetary nIormatIon ProprIetary nIormatIon
1. MaterIaI and InIormatIon reIatIng to or assocIated wIth a company's products, busIness, or
actIvItIes, IncIudIng but not IImIted to IInancIaI InIormatIon; data or statements; trade secrets; product
research and deveIopment; exIstIng and Iuture product desIgns and perIormance specIIIcatIon; marketIng
pIans or technIques; schematIcs; cIIent IIsts; computer programs; processes; and know-how that has been
cIearIy IdentIIIed and properIy marked by the company as proprIetary InIormatIon, trade secrets, or
company conIIdentIaI InIormatIon. The InIormatIon must have been deveIoped by the company and not be
avaIIabIe to the Covernment or to the pubIIc wIthout restrIctIon Irom another source.







337
Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

2. ProprIetary InIormatIon Is InIormatIon such as trade secrets and commercIaI or IInancIaI
InIormatIon obtaIned Irom a company on a prIvIIeged or conIIdentIaI basIs that, II reIeased, wouId resuIt In
competItIve harm to the company, ImpaIr the government's abIIIty to obtaIn IIke InIormatIon In the Iuture,
or ImpaIr the government's Interest In compIIance wIth program eIIectIveness.

Source: Centers Ior DIsease ControI. "SensItIve 8ut UncIassIIIed nIormatIon."
February 2006, http:]]www.Ias.org]sgp]othergov]cD.C.-sbu-2006.htmI

ProprIetary nIormatIon nvoIved (PROPN) ProprIetary nIormatIon nvoIved (PROPN) ProprIetary nIormatIon nvoIved (PROPN) ProprIetary nIormatIon nvoIved (PROPN)
See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs

ProscrIbed nIormatIon ProscrIbed nIormatIon ProscrIbed nIormatIon ProscrIbed nIormatIon
ProscrIbed nIormatIon Is: a. Top Secret InIormatIon; b. CommunIcatIon SecurIty (COMSEC) InIormatIon,
except cIassIIIed keys used to operate secure teIephone unIts (STU s); c. RestrIcted Data as deIIned In the
U.S. AtomIc Energy Act oI 1954, as amended; d. SpecIaI Access Program (SAP) InIormatIon; or e. SensItIve
Compartmented nIormatIon (SC).

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm

Protect as RestrIcted Data Protect as RestrIcted Data Protect as RestrIcted Data Protect as RestrIcted Data
A handIIng method Ior computer-generated numerIcaI data or reIated InIormatIon, whIch Is not readIIy
recognIzed as cIassIIIed or uncIassIIIed because oI the hIgh output and Iow densIty oI potentIaIIy cIassIIIed
data. (Note: ThIs InIormatIon Is desIgnated as "Protect as RestrIcted Data" because It has not had a
cIassIIIcatIon revIew and must be protected under a dIIIerent set oI securIty ruIes."
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
Protected CrItIca Protected CrItIca Protected CrItIca Protected CrItIcaI nIrastructure nIormatIon I nIrastructure nIormatIon I nIrastructure nIormatIon I nIrastructure nIormatIon
Protected CrItIcaI nIrastructure nIormatIon, or Protected C means C (IncIudIng the IdentIty oI the
submIttIng person or entIty) that Is voIuntarIIy submItted to DHS Ior Its use regardIng the securIty oI
crItIcaI InIrastructure and protected systems, anaIysIs, warnIng, Interdependency study, recovery,
reconstItutIon, or other InIormatIonaI purpose, when accompanIed by an express statement as descrIbed
In Sec. 29.5. ThIs InIormatIon maIntaIns Its protected status unIess DHS's Protected C Program Manager
or the Protected C Program Manager's desIgnees render a IInaI decIsIon that the InIormatIon Is not
Protected C.







338
Source: Department oI HomeIand SecurIty. "Protected CrItIcaI nIrastructure nIormatIon." 6 CFR 29.2,
http:]]www.gpoaccess.gov]cIr]Index.htmI

Protected Document Protected Document Protected Document Protected Document
(1) Protected document.--The term ``protected document'' means any record--
(A) Ior whIch the Secretary oI DeIense has Issued a certIIIcatIon, as descrIbed In subsectIon (d), statIng
that dIscIosure oI that record wouId endanger cItIzens oI the UnIted States, members oI the UnIted States
Armed Forces, or empIoyees oI the UnIted States Covernment depIoyed outsIde the UnIted States; and..
Source: H.R.111-298 ConIerence Report on H.R.2892, Department oI HomeIand SecurIty ApproprIatIons
Act, 2010, http:]]www.Ias.org]sgp]congress]2009]protected.htmI and
2. On October 28, 2009, the PresIdent sIgned Into Iaw the Department oI HomeIand SecurIty
ApproprIatIons Act, 2010. SectIon 565 oI that Act vests the Secretary wIth authorIty to Issue a certIIIcatIon
wIth respect to certaIn photographIc records. I such a certIIIcatIon Is Issued, the covered records are not
subject to dIscIosure under FOA.

Source: UnIted States Department oI DeIense v. AmerIcan CIvII LIbertIes UnIon
http:]]www.scotusbIog.com]wp]wp-content]upIoads]2009]11]photos-US-supp-brIeI-11-13-09.pdI
Pseudo Pseudo Pseudo Pseudo- -- -CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon CIassIIIcatIon
See CIassIIIcatIon MarkIngs ControI MarkI See CIassIIIcatIon MarkIngs ControI MarkI See CIassIIIcatIon MarkIngs ControI MarkI See CIassIIIcatIon MarkIngs ControI MarkIngs ngs ngs ngs
Not Iong ago, In the cIosIng days oI ]anuary, CCN Update, the onIIne, eIectronIc news servIce oI
Covernment Computer News, reported that 'dozens oI cIassIIIed HomeIand SecurIty Department
documents" had been accIdentaIIy made avaIIabIe on a pubIIc nternet sIte Ior severaI days due to an
apparent securIty gIItch at the Department oI Energy. DescrIbIng the contents oI the materIaIs and
reactIons to the breach, the account stated that the "documents were marked 'Ior oIIIcIaI use onIy,' the
Iowest secret-IeveI cIassIIIcatIon." The documents, oI course, were not securIty cIassIIIed, because the
markIng cIted Is not authorIzed by E.O 12958. nterestIngIy, however, In vIew oI the Iact that thIs
mIsrepresentatIon appeared In a story to whIch three reporters contrIbuted, perhaps It reIIects, to some
extent, the current state oI conIusIon about the orIgIn and status oI new InIormatIon controI markIngs
whIch have appeared oI Iate.
EarIy IndIcatIons are that very IIttIe oI the attentIon to detaII that attends the securIty cIassIIIcatIon
program Is to be Iound In other InIormatIon controI markIng actIvItIes. Key terms oIten Iack deIInItIon
[emphasIs added]. Vagueness exIsts regardIng who Is authorIzed to appIyIng markIngs, Ior what reasons,
and Ior how Iong. UncertaInty prevaIIs concernIng who Is authorIzed to remove markIngs and Ior what
reasons.
Source: HaroId C. ReIyea. "EmergIng Threats and Pseudo-CIassIIIcatIon." Statement beIore the House
Covernment ReIorm SubcommIttee on NatIonaI SecurIty, EmergIng Threats, and nternatIonaI ReIatIons.
March 2, 2005. 9, 19, http:]]www.Ias.org]sgp]congress]2005]030205overcIass.htmI and CAO,






339
nIormatIon SharIng: The FederaI Covernment Needs to EstabIIsh PoIIcIes and Processes Ior SharIng
TerrorIsm-ReIated and SensItIve but UncIassIIIed nIormatIon, CAO-06-385, March 2006,
http:]]www.gao.gov]new.Items]d06385.pdI

PSYOP PSYOP PSYOP PSYOP
The earIIest recorded use oI the "psychoIogIcaI operatIons" occurred earIy In 1945 when CaptaIn (Iater
Rear AdmIraI) EIIIs M. ZacharIas, U.S. Navy, empIoyed the term In an operatIon pIan desIgned to hasten the
surrender oI ]apan. WIthout any descrIptIon or expIanatIon the term was used In the context "AII
psychoIogIcaI operatIons wIII be coordInated both as to tImes and trends In order to avoId reductIon oI
eIIectIveness oI thIs maIn operatIon." The next use oI the term was In 1951, when the Truman
AdmInIstratIon renamed an Interagency strategy commIttee gIvIng It the tItIe PsychoIogIcaI OperatIons
CoordInatIng CommIttee. AIthough the Department oI the Army made the change In 1971, It was not untII
the 1960s that psychoIogIcaI operatIons came to suppIant psychoIogIcaI warIare as the aII-IncIusIve term
In common use.

Source: WIIIIam E. Daugherty. "OrIgIn oI psyop termInoIogy." n RonaId De McLaurIn, et aI (Ed.) The Art
and ScIence oI PsychoIogIcaI OperatIons: Case StudIes oI MIIItary AppIIcatIon. voIume 1, Department oI
the Army, AmerIcan nstItutes Ior Research, 1976.

PsychoIogIcaI OperatIons (PSYOPS) PsychoIogIcaI OperatIons (PSYOPS) PsychoIogIcaI OperatIons (PSYOPS) PsychoIogIcaI OperatIons (PSYOPS)
See nIormatIon OperatIons, nIormatIon OperatIons Roadmap, Overt PeacetIme, PerceptIon Management, See nIormatIon OperatIons, nIormatIon OperatIons Roadmap, Overt PeacetIme, PerceptIon Management, See nIormatIon OperatIons, nIormatIon OperatIons Roadmap, Overt PeacetIme, PerceptIon Management, See nIormatIon OperatIons, nIormatIon OperatIons Roadmap, Overt PeacetIme, PerceptIon Management,
Propaganda, PsychoIogIcaI OperatIons Program, PubIIc DIpIomacy Propaganda, PsychoIogIcaI OperatIons Program, PubIIc DIpIomacy Propaganda, PsychoIogIcaI OperatIons Program, PubIIc DIpIomacy Propaganda, PsychoIogIcaI OperatIons Program, PubIIc DIpIomacy
1. PIanned operatIons to convey seIected InIormatIon and IndIcators to IoreIgn audIences to
InIIuence theIr emotIons, motIves, objectIve reasonIng, and uItImateIy the behavIor oI IoreIgn
governments, organIzatIons, groups, and IndIvIduaIs. The purpose oI psychoIogIcaI operatIons Is to
Induce or reInIorce IoreIgn attItudes and behavIor IavorabIe to the orIgInator's objectIves.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]; ]oInt PubIIcatIon 3-53. DoctrIne Ior ]oInt
PsychoIogIcaI OperatIons. September 5, 2003, http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp353.pdI
and CIay WIIson, "nIormatIon OperatIons and Cyberwar: CapabIIItIes and ReIated PoIIcy ssues." CRS
Report to Congress Updated September 14, 2006, http:]]www.Ias.org]sgp]crs]natsec]RL31787.pdI

2. There are three categorIes oI mIIItary PSYOP: strategIc, operatIonaI, and tactIcaI.
StrategIc PSYOP are InternatIonaI InIormatIon actIvItIes conducted by US Covernment (USC) agencIes to
InIIuence IoreIgn attItudes, perceptIons, and behavIor In Iavor oI US goaIs and objectIves durIng peacetIme
and In tImes oI conIIIct.

OperatIonaI PSYOP are conducted across the range oI mIIItary operatIons, IncIudIng durIng peacetIme, In a
deIIned operatIonaI area to promote the eIIectIveness oI the joInt Iorce commander's (]FC's) campaIgns
and strategIes.







340
TactIcaI PSYOP are conducted In the area assIgned a tactIcaI commander across the range oI mIIItary
operatIons to support the tactIcaI mIssIon agaInst opposIng Iorces.

Source: ]oInt PubIIcatIon 3-53. DoctrIne Ior ]oInt PsychoIogIcaI OperatIons. September 5, 2003,
http:]]www.dtIc.mII]doctrIne]jeI]newpubs]jp353.pdI

3. (U) PSYOP enhancements outIIned In thIs report, and cIarIIIcatIon oI respectIve responsIbIIItIes
and tasks assocIated wIth PSYOP, DoD support to pubIIc dIpIomacy and pubIIc aIIaIrs, wIII enhance DoD's
abIIIty to aggressIveIy conduct O and to do so IuIIy consIstent wIth broader natIonaI securIty objectIves.
(p. 6)

Future operatIons requIre that PSYOP capabIIItIes be Improved to enabIe PSYOP Iorces to rapIdIy generate
and dIssemInate audIence specIIIc, commercIaI-quaIIty products Into denIed areas, and that these
products Iocus on aggressIve behavIor modIIIcatIon oI adversarIes at the operatIonaI and tactIcaI IeveI oI
war. The IIkeIIhood that PSYOP messages wIII be repIayed to a much broader audIence, IncIudIng the
AmerIcan pubIIc, requIres that specIIIc boundarIes be estabIIshed Ior PSYOP. n partIcuIar:

(U) PSYOP shouId Iocus on support to mIIItary endeavors (ExercIses, depIoyments and operatIons) In a
non-permIssIve or semI-permIssIve envIronments (I.e., when adversarIes are part oI the equatIon).

(U) DoD shouId coIIaborate wIth other agencIes Ior U.S. Covernment pubIIc dIpIomacy programs and
InIormatIon objectIves. PSYOP Iorces and capabIIItIes can be empIoyed In support oI pubIIc dIpIomacy
(e.g., as part oI approved theater securIty guIdeIInes).

(U) DoD PubIIc AIIaIrs shouId be more proactIve In support oI U.S. Covernment PubIIc DIpIomacy
objectIves to IncIude a broader set oI IoreIgn medIa audIences. (p.15-16)

Source: NatIonaI SecurIty ArchIve. "RumsIeId's Roadmap to Propaganda: nIormatIon OperatIons Roadmap."
]anuary 26, 2006, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88177]
4. PSYOP Is oIten conIused wIth propaganda, whIch Is practIced by many oI our adversarIes, and
In some cases, by seIected U.S. agencIes and poIItIcIans. Propaganda has connotatIons oI deceptIon and
dIstortIon. Propaganda has no ruIes and can be a mIxture oI the truth, IncorrectIy attrIbuted truth
(sometImes reIerred to as gray propaganda), or pure IIctIon, purposeIy mIsattrIbuted (bIack propaganda or
covert propaganda). U.S. DoD PSYOP, on the other hand, are actIons taken to InIIuence the emotIons,
attItudes and uItImateIy the behavIor oI a target audIence. The Intent Is to InIIuence target audIences In
ways that support USC natIonaI poIIcy objectIves at the strategIc, operatIonaI and tactIcaI IeveIs.
AddItIonaIIy, DoD PSYOP programs are aIways based on truth In order to maIntaIn IocaI and regIonaI
credIbIIIty equaI to or greater than that oI pubIIc aIIaIrs actIvItIes and IocaI journaIIsts. n many Instances,
PSYOP products and actIvItIes (newspapers, radIo broadcasts, IeaIIets, hand bIIIs and Iace-to-Iace
communIcatIon) become the prImary source oI trusted InIormatIon wIthIn an area oI conIIIct or dIsaster.
Another deIInItIon Is provIded In the UnIted States SpecIaI OperatIons Forces Posture Statement whIch






341
descrIbes PSYOP as "pIanned operatIons to convey seIected InIormatIon and IndIcators to IoreIgn
audIences to InIIuence theIr emotIons, motIves, objectIve reasonIng and, uItImateIy, the behavIor oI
IoreIgn government organIzatIons, groups and IndIvIduaIs. The purpose oI psychoIogIcaI operatIons Is to
Induce or reInIorce IoreIgn attItudes and behavIor IavorabIe to the orIgInator's objectIves."
Source: CoI. 8rad Ward. "StrategIc nIIuence OperatIons: The nIormatIon ConnectIon." U.S. Army War
CoIIege. AprII, 2003, http:]]www.Ias.org]Irp]eprInt]ward.pdI and DavId Mugg, Satan vs. Satan: The Use oI
8Iack PSYOP to RegaIn the TactIcaI nItIatIve In the CounterInsurgency FIght ADA471500,
http:]]oaI.dtIc.mII]oaI]oaIZ&verb=getRecord&metadataPreIIx=htmI&IdentIIIer=ADA471500
PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team PsychoIogIcaI OperatIons Assessment Team
A smaII, taIIored team (approxImateIy 4 to 12 personneI) that consIsts oI PSYOP pIanners and product
dIstrIbutIon]dIssemInatIon and IogIstIcs specIaIIsts. The team Is depIoyed to theater at the request oI the
combatant commander to assess the sItuatIon, deveIop PSYOP objectIves and recommend the approprIate
IeveI oI support to accompIIsh the mIssIon.

Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

PsychoIogIcaI OperatIons DeveIopment Center PsychoIogIcaI OperatIons DeveIopment Center PsychoIogIcaI OperatIons DeveIopment Center PsychoIogIcaI OperatIons DeveIopment Center
A regIonaI psychoIogIcaI operatIons unIt that desIgns InIormatIonaI products and programs and makes
recommendatIons to the joInt Iorce commander through the joInt targetIng coordInatIon board Ior other
joInt Iorces to conduct psychoIogIcaI actIons In support oI mIIItary and natIonaI objectIves. The
psychoIogIcaI operatIons deveIopment center Is the centraI core oI a psychoIogIcaI operatIons task Iorce. t
consIsts oI a target audIence anaIysIs detachment, a pIans and programs detachment, and a test and
evaIuatIon detachment.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

PubIIc AIIaIrs PubIIc AIIaIrs PubIIc AIIaIrs PubIIc AIIaIrs
Those pubIIc InIormatIon, command InIormatIon, and communIty reIatIons actIvItIes dIrected toward both
the externaI and InternaI pubIIcs wIth Interest In the Department oI DeIense. AIso caIIed PA.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PubIIc AIIaIrs Cround RuIes PubIIc AIIaIrs Cround RuIes PubIIc AIIaIrs Cround RuIes PubIIc AIIaIrs Cround RuIes
S SS See PubIIc AIIaIrs ee PubIIc AIIaIrs ee PubIIc AIIaIrs ee PubIIc AIIaIrs
CondItIons estabIIshed by a mIIItary command to govern the conduct oI news gatherIng and the reIease
and]or use oI specIIIed InIormatIon durIng an operatIon or durIng a specIIIc perIod oI tIme.






342

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
PubIIc AIIaIrs CuIdance (PAC) PubIIc AIIaIrs CuIdance (PAC) PubIIc AIIaIrs CuIdance (PAC) PubIIc AIIaIrs CuIdance (PAC)
NormaIIy, a package oI InIormatIon to support the pubIIc dIscussIon oI deIense Issues and operatIons.
Such guIdance can range Irom a teIephonIc response to a specIIIc questIon to a more comprehensIve
package. ncIuded couId be an approved pubIIc aIIaIrs poIIcy, contIngency statements, answers to
antIcIpated medIa questIons, and communIty reIatIons guIdance. The pubIIc aIIaIrs guIdance aIso
addresses the method(s), tImIng, IocatIon, and other detaIIs governIng the reIease oI InIormatIon to the
pubIIc. PubIIc aIIaIrs guIdance Is approved by the AssIstant to the Secretary oI DeIense Ior PubIIc AIIaIrs.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy PubIIc DIpIomacy
See DIsInIormatIon, 8ureau oI nternatIonaI nIormatIon Programs, Counter See DIsInIormatIon, 8ureau oI nternatIonaI nIormatIon Programs, Counter See DIsInIormatIon, 8ureau oI nternatIonaI nIormatIon Programs, Counter See DIsInIormatIon, 8ureau oI nternatIonaI nIormatIon Programs, Counter- -- -nIormatIon Team, nIormatIon Team, nIormatIon Team, nIormatIon Team,
nIormatIon OperatIons Roadmap, Propaganda nIormatIon OperatIons Roadmap, Propaganda nIormatIon OperatIons Roadmap, Propaganda nIormatIon OperatIons Roadmap, Propaganda
1. Through the use oI modern Instruments and technIques oI communIcatIon It Is possIbIe today
to reach Iarge or InIIuentIaI segments oI natIonaI popuIatIons - to InIorm them, to InIIuence theIr
attItudes, and at tImes perhaps even motIvate them to a partIcuIar course oI actIon. These groups, In turn,
are capabIe oI exertIng notIceabIe, even decIsIve, pressures on theIr governments.

Source: UnIted States. Congress. House. CommIttee on ForeIgn AIIaIrs. deoIogIcaI operatIons and IoreIgn
poIIcy. Report no. 2 on WInnIng the coId war: the U.S.IdeoIogIcaI oIIensIve, by the SubcommIttee on
nternatIonaI OrganIzatIons and Movements oI the CommIttee on ForeIgn AIIaIrs, House oI
RepresentatIves, pursuant to H. Res. 55, a resoIutIon authorIzIng the CommIttee on ForeIgn AIIaIrs to
conduct thorough studIes and InvestIgatIons oI aII matters comIng wIthIn the jurIsdIctIon oI the
CommIttee. WashIngton, D.C.: U.S. CPO, 1964.

2. Those overt InternatIonaI pubIIc InIormatIon actIvItIes oI the UnIted States Covernment
desIgned to promote UnIted States IoreIgn poIIcy objectIves by seekIng to understand, InIorm, and
InIIuence IoreIgn audIences and opInIon makers, and by broadenIng the dIaIogue between AmerIcan
cItIzens and InstItutIons and theIr counterparts abroad.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]; aIso see Reagan NSDD 77, ]anuary 14,
1983, http:]]www.Ias.org]Irp]oIIdocs]nsdd]23-1966t.gII.

3. EngagIng, InIormIng, and InIIuencIng key InternatIonaI audIences) Is practIced In harmony wIth
pubIIc aIIaIrs (outreach to AmerIcans) and tradItIonaI dIpIomacy to advance U.S. Interests and securIty and
to provIde the moraI basIs Ior U.S. IeadershIp In the worId.






343

Source: U.S. Department oI State. "Under Secretary Ior PubIIc DIpIomacy and PubIIc AIIaIrs."
http:]]www.state.gov]r]; aIso see WIIIIam P. KIehI, "Can Humpty Dumpty 8e SavedZ" AmerIcan DIpIomacy 8
no. 4 (2002), http:]]www.pubIIcdIpIomacy.org]98.htm, AIvIn A. Snyder, WarrIors oI DIsInIormatIon:
AmerIcan Propaganda, SovIet LIes, and the WInnIng oI the CoId War, An nsIder's Account (New York:
Arcade Pub., 1995), NIchoIas ]. CuII, DavId CuIbert, and DavId WeIch, Propaganda and Mass PersuasIon: A
HIstorIcaI EncycIopedIa, 1500 to the Present, (Santa 8arbara, CA: A8C-CLO, 2003), CeoIIrey Cowan and
NIchoIas ]. CuII. (eds.), PubIIc DIpIomacy In a ChangIng WorId, (Thousand Oaks, CA: Sage, 2008), and Laura
AIexandre, "n the servIce oI the state: pubIIc dIpIomacy, government medIa and RonaId Reagan." MedIa,
CuIture & SocIety 9 no.1 (1987): 29-46.

Note: See "Pentagon CIoses OIIIce Accused oI ssuIng Propaganda Under 8ush," Thom Shanker, New York
TImes AprII 15, 2009, http:]]www.nytImes.com]2009]04]16]us]poIItIcs]16poIIcy.htmI)

PubIIc DomaIn PubIIc DomaIn PubIIc DomaIn PubIIc DomaIn
CIassIIIed InIormatIon that has made Its way Into the pubIIc domaIn, eIther by Ieak or unauthorIzed
dIscIosure.

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]exemptIon1.htm#pubIIc

PubIIc nIormatIon PubIIc nIormatIon PubIIc nIormatIon PubIIc nIormatIon
nIormatIon oI a mIIItary nature, the dIssemInatIon oI whIch through pubIIc news medIa Is not InconsIstent
wIth securIty, and the reIease oI whIch Is consIdered desIrabIe or nonobjectIonabIe to the responsIbIe
reIeasIng agency

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

PubIIc nIormatIon EnvIronment PubIIc nIormatIon EnvIronment PubIIc nIormatIon EnvIronment PubIIc nIormatIon EnvIronment
AII IndIvIduaIs, organIzatIons or systems that coIIect, process and dIssemInate InIormatIon Ior pubIIc
consumptIon. (AFDD 2-5)

Source: U.S. AIr Force. PubIIc AIIaIrs OperatIons. AIr Force DoctrIne Document 2-5.3, ]une 24, 2005,
[See Wayback MachIne, http:]]web.archIve.org]web]20061007174450]http:]]www.e-
pubIIshIng.aI.mII]pubIIIes]aI]dd]aIdd2-5.3]aIdd2-5.3.pdI ]
PubIIc nterest DecIassIIIcatIon 8oard PubIIc nterest DecIassIIIcatIon 8oard PubIIc nterest DecIassIIIcatIon 8oard PubIIc nterest DecIassIIIcatIon 8oard
(b) PURPOSES- The purposes oI the 8oard are as IoIIows:
(1) To advIse the PresIdent, the AssIstant to the PresIdent Ior NatIonaI SecurIty AIIaIrs, the DIrector
oI the OIIIce oI Management and 8udget, and such other executIve branch oIIIcIaIs as the 8oard consIders






344
approprIate on the systematIc, thorough, coordInated, and comprehensIve IdentIIIcatIon, coIIectIon,
revIew Ior decIassIIIcatIon, and reIease to Congress, Interested agencIes, and the pubIIc oI decIassIIIed
records and materIaIs (IncIudIng donated hIstorIcaI materIaIs) that are oI archIvaI vaIue, IncIudIng records
and materIaIs oI extraordInary pubIIc Interest.
(2) To promote the IuIIest possIbIe pubIIc access to a thorough, accurate, and reIIabIe
documentary record oI sIgnIIIcant UnIted States natIonaI securIty decIsIons and sIgnIIIcant UnIted States
natIonaI securIty actIvItIes In order to--
(A) support the oversIght and IegIsIatIve IunctIons oI Congress;
(8) support the poIIcymakIng roIe oI the executIve branch;
(C) respond to the Interest oI the pubIIc In natIonaI securIty matters; and
(D) promote reIIabIe hIstorIcaI anaIysIs and new avenues oI hIstorIcaI study In natIonaI securIty
matters.

Source: "PubIIc nterest DecIassIIIcatIon 8oard." 108 P.L. 458; 118 Stat. 3638; 2004 Enacted S. 2845; 108
Enacted S. 2845.FAS, http:]]www.Ias.org]sgp]congress]2005]pIda.htmI

PubIIcIy AvaIIabIe nIormatIon PubIIcIy AvaIIabIe nIormatIon PubIIcIy AvaIIabIe nIormatIon PubIIcIy AvaIIabIe nIormatIon
nIormatIon that Is generaIIy accessIbIe to the Interested pubIIc In any Iorm and, thereIore, not subject to
the EAR (See part 732 oI the Export AdmInIstratIon RuIes (EAR).

Source: Commerce and ForeIgn Trade. 15 CFR 772.1, http:]]www.gpoaccess.gov]cIr]Index.htmI

PurgIng PurgIng PurgIng PurgIng
RenderIng stored InIormatIon unrecoverabIe.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

~ Q ~ ~ Q ~ ~ Q ~ ~ Q ~

QuantIco CIrcuIt QuantIco CIrcuIt QuantIco CIrcuIt QuantIco CIrcuIt
Named Ior the F8's Academy on the UnIted States MarIne Corps 8ase at QuantIco, VIrgInIa, the warrantIess
surveIIIance program gIves the U.S. government dIrect hIgh-speed access to wIreIess carrIers and hence
voIce caIIs]messages and data packets.

Source: "New TeIecom WhIstIebIower DescrIbes Open SurveIIIance Cateway," EIectronIc FrontIer FoundatIon
EFFector 21, no.8 March 7, 2008, http:]]w2.eII.org]eIIector]21]16.php and KevIn PouIson, "WhIstIe-
8Iower: Feds Have a 8ackdoor nto WIreIess CarrIer -- Congress Reacts," March 6, 2008,
http:]]bIog.wIred.com]27bstroke6]2008]03]whIstIebIower-I.htmI

QuasI Covernment QuasI Covernment QuasI Covernment QuasI Covernment
See n See n See n See n- -- -Q QQ Q- -- -TeI TeI TeI TeI






345
The quasI government, vIrtuaIIy by Its name aIone and the IntentIonaI bIurrIng
oI the governmentaI and prIvate sectors, Is not easIIy deIIned. n generaI, the term
Is used In two ways: to reIer to entItIes that have some IegaI reIatIon or assocIatIon,
however tenuous, to the IederaI government; or to the terraIn that putatIveIy exIsts
between the governmentaI and prIvate sectors. For the most part, thIs report wIII use
the term quasI government In the Iormer context, reIerrIng to entItIes wIth some IegaI
reIatIonshIp to the IederaI government. The one common characterIstIc to thIs
meIange oI entItIes In the quasI government Is that they are not agencIes oI the UnIted
States as that term Is deIIned In TItIe 5 oI the U.S. Code.

Source: KevIn R. Kosar, "The QuasI Covernment: HybrId OrganIzatIons wIth 8oth Covernment and PrIvate
Sector LegaI CharacterIstIcs," CRS Report to Congress Updated February 13, 2007, , , ,
http:]]www.Ias.org]sgp]crs]mIsc]RL30533.pdI

~ R ~ ~ R ~ ~ R ~ ~ R ~

ReaI ReaI ReaI ReaI- -- -tIme AnaIytIcaI nteIIIgence Database (RAD) tIme AnaIytIcaI nteIIIgence Database (RAD) tIme AnaIytIcaI nteIIIgence Database (RAD) tIme AnaIytIcaI nteIIIgence Database (RAD) and Hashkeeper and Hashkeeper and Hashkeeper and Hashkeeper
See NatIonaI MedIa ExpIoItatI See NatIonaI MedIa ExpIoItatI See NatIonaI MedIa ExpIoItatI See NatIonaI MedIa ExpIoItatIon Center on Center on Center on Center
RAD Is a reIatIonaI database used to record key pIeces oI InIormatIon and to quIckIy IdentIIy IInks among
peopIe, pIaces, busInesses, IInancIaI accounts, teIephone numbers, and other InvestIgatIve InIormatIon
examIned by our anaIysts.

HashKeeper Is a soItware appIIcatIon that quIckIy eIImInates known operatIng system IIIes and Iocuses on
eIectronIc IIIes created by the user]subject oI the InvestIgatIon

Source: DO], NatIonaI Drug nteIIIgence Center, "Document and MedIa ExpIoItatIon,"
http:]]www.usdoj.gov]ndIc]domex]domex.pdI

RapId ReactIon MedIa Team (RRMT) RapId ReactIon MedIa Team (RRMT) RapId ReactIon MedIa Team (RRMT) RapId ReactIon MedIa Team (RRMT)
RRMT wIII serve as a "quIck start brIdge" between Saddam HusseIn's state-controIIed medIa network and a
Ionger "raqI Free MedIa" network In a post-Saddam era. The major eIements oI the RRMT are
2.1 USC medIa experts team
2.2UK experts
2.3 HandpIcked raqI medIa experts

Source: ]oyce 8attIe, "Pentagon 'RapId ReactIon MedIa Team' Ior raq" EIectronIc 8rIeIIng 8ook, NatIonaI
SecurIty ArchIve,
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88219]Index.htm, IncIudes documents obtaIned vIa FOA (as
cIted above).

Raw nteIIIgence (R) Raw nteIIIgence (R) Raw nteIIIgence (R) Raw nteIIIgence (R)






346
nIormatIon that has been obtaIned Irom generaIIy reIIabIe sources; however, It Is not necessarIIy
corroborated. t Is deemed vaIId not onIy because oI the sources but aIso because It coIncIdes wIth other
known InIormatIon. Raw InteIIIgence usuaIIy Is tIme sensItIve and Its vaIue Is perIshabIe In a reIatIveIy
short perIod.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

ReaI TIme ReaI TIme ReaI TIme ReaI TIme
PertaInIng to the tImeIIness oI data or InIormatIon whIch has been deIayed onIy by the tIme requIred Ior
eIectronIc communIcatIon. ThIs ImpIIes that there are no notIceabIe deIays. See FM

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004.
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon
See RetroactIve Secre See RetroactIve Secre See RetroactIve Secre See RetroactIve Secrecy cy cy cy
1. RestoratIon oI cIassIIIcatIon to InIormatIon prevIousIy cIassIIIed as NatIonaI SecurIty nIormatIon
and then decIassIIIed.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. The CA and other IederaI agencIes have secretIy recIassIIIed over 55,000 pages oI records
taken Irom the open sheIves at the NatIonaI ArchIves and Records AdmInIstratIon (NARA), accordIng to a
report pubIIshed today on the WorId WIde Web by the NatIonaI SecurIty ArchIve at Ceorge WashIngton
UnIversIty. Matthew AId, author oI the report and a vIsItIng IeIIow at the ArchIve, dIscovered thIs secret
program through hIs wIde-rangIng research In InteIIIgence, mIIItary, and dIpIomatIc records at NARA and
Iound that the CA and mIIItary agencIes have revIewed mIIIIons oI pages at an unknown cost to taxpayers
In order to sequester documents Irom coIIectIons that had been open Ior years.
To justIIy theIr recIassIIIcatIon program, oIIIcIaIs at CA and mIIItary agencIes have argued that durIng the
ImpIementatIon oI ExecutIve Order 12958, PresIdent CIInton's program Ior buIk decIassIIIcatIon oI
hIstorIcaI IederaI records, many sensItIve InteIIIgence-reIated documents that remaIned cIassIIIed were
InadvertentIy reIeased at NARA, especIaIIy In State Department IIIes. Even though researchers had been
combIng through and copyIng documents Irom those coIIectIons Ior years, CA and other agencIes
compeIIed NARA to grant them access to the open IIIes so they couId recIassIIy documents. WhIIe thIs
recIassIIIcatIon actIvIty began Iate In the 1990s, Its scope wIdened durIng the 8ush admInIstratIon, and It






347
Is scheduIed to contInue untII 2007. The CA has Ignored arguments Irom NARA oIIIcIaIs that some oI
the Impounded documents have aIready been pubIIshed.
Source: AId, Matthew M. (ed.). DecIassIIIcatIon In Reverse: The U.S. nteIIIgence CommunIty's Secret
HIstorIcaI Document RecIassIIIcatIon Program. NatIonaI SecurIty ArchIve, February 21, 2006,
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88179]

3. The audIt aIso Iound that In attemptIng to recover records that stIII contaIned cIassIIIed
InIormatIon, there were a sIgnIIIcant number oI Instances when records that were cIearIy InapproprIate Ior
contInued cIassIIIcatIon were wIthdrawn Irom pubIIc access. We concIuded that 24 percent oI the sampIed
records IeII Into thIs category, and an addItIonaI 12 percent were questIonabIe. n one re-revIew eIIort, the
CentraI nteIIIgence Agency (CA) wIthdrew a consIderabIe number oI pureIy uncIassIIIed records In order
to obIuscate the cIassIIIed equIty that the agency was Intent on protectIng. ncIuded In the InapproprIate
category above, at Ieast 12 percent oI the records sampIed had apparentIy been properIy decIassIIIed, but
were Iater ImproperIy recIassIIIed.

Source: nIormatIon SecurIty OversIght OIIIce (SOO). AudIt oI the WIthdrawaI oI Records Irom PubIIc
Access at the NatIonaI ArchIves and Records AdmInIstratIon Ior CIassIIIcatIon Purposes. AprII 26, 2006.
http:]]www.archIves.gov]Isoo]reports]2006-audIt-report.htmI

Record Record Record Record
1. The term "record", when used In connectIon wIth the proceedIngs oI a court-martIaI, means:
(A) an oIIIcIaI wrItten transcrIpt, wrItten summary, or other wrItIng reIatIng to the proceedIngs; or
(8) an oIIIcIaI audIotape, vIdeotape, or sImIIar materIaI Irom whIch sound, or sound and vIsuaI
Images, depIctIng the proceedIngs may be reproduced.

Source: "Armed Forces." 10 U.S.C. 47 801, http:]]www.gpoaccess.gov]U.S.C.ode]

2. n the PrIvacy Act oI 1974, a record Is "any Item, coIIectIon, or groupIng oI InIormatIon about an
IndIvIduaI that Is maIntaIned by an agency, IncIudIng, but not IImIted to, hIs educatIon, IInancIaI
transactIons, medIcaI hIstory, and crImInaI or empIoyment hIstory and that contaIns hIs name, or the
IdentIIyIng number, symboI, or other IdentIIyIng partIcuIar assIgned to the IndIvIduaI, such as a IInger or
voIce prInt or a photograph."

Source: 5 U.S.C. 552a(a)(4). The PrIvacy Act oI 1974 http:]]www.usdoj.gov]opcI]prIvstat.htm and EPC,
http:]]www.epIc.org]prIvacy]1974act] [suppIIed by Robert CeIIman].

3. A record means any Item oI InIormatIon about an IndIvIduaI that IncIudes an IndIvIduaI
IdentIIIer and can IncIude as IIttIe as one descrIptIve Item about an IndIvIduaI.







348
Source: "OIIIce oI Management and 8udget PrIvacy Act mpIementatIon CuIdeIInes and
ResponsIbIIItIes" (]uIy 9, 1975), http:]]www.deIenseIInk.mII]prIvacy]1975OM8PACuIde]75]ULY09.pdI
[suppIIed by Robert CeIIman].
Record Croup Record Croup Record Croup Record Croup
NARA arranges Its hoIdIngs accordIng to the archIvaI prIncIpIe oI provenance. ThIs prIncIpIe provIdes that
records be
attrIbuted to the agency that created or maIntaIned them and
arranged thereunder as they were IIIed when In actIve use.
n the NatIonaI ArchIves, appIIcatIon oI the prIncIpIe oI provenance takes the Iorm oI numbered record
groups, wIth each record group comprIsIng the records oI a major government entIty, usuaIIy a bureau or
an Independent agency. For exampIe, NatIonaI ArchIves Record Croup 4 Is Records oI the U.S. Food
AdmInIstratIon.
Source: NatIonaI ArchIves and Records AdmInIstratIon (NARA). "The Record Croup Concept." Excerpted
Irom: CuIde to FederaI Records In the NatIonaI ArchIves oI the UnIted States. CompIIed by Robert 8.
Matchette et aI. WashIngton, D.C.: NatIonaI ArchIves and Records AdmInIstratIon, 1995,
http:]]www.archIves.gov]research]guIde-Ied-records]Index numerIc]concept.htmI and Record Croup
CIusters Contents and LocatIons. http:]]www.archIves.gov]research]aIIc]tooIs]record-group-
cIusters.htmI
Record nIormatIon Record nIormatIon Record nIormatIon Record nIormatIon
AII Iorms (e.g., narratIve, graphIc, data, computer memory) oI InIormatIon regIstered In eIther temporary
or permanent Iorm so that It can be retrIeved, reproduced, or preserved.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Records Records Records Records
1. Records oI an agency and PresIdentIaI papers or PresIdentIaI records, as those terms are
deIIned In TItIe 44 UnIted State Code, IncIudIng those created or maIntaIned by a government contractor,
IIcensee, certIIIcate hoIder, or grantee that are subject to the sponsorIng agency's controI under the terms
oI the contract, IIcense, certIIIcate, or grant.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. The recordIngs oI evIdence oI actIvItIes perIormed or resuIts achIeved (e.g., Iorms, reports, test
resuIts) whIch serve as the basIs Ior verIIyIng that the organIzatIon and the InIormatIon are perIormIng as






349
Intended. AIso used to reIer to unIts oI reIated data IIeIds (I.e., groups oI data IIeIds that can be
accessed by a program and that contaIn the compIete set oI InIormatIon on partIcuIar Items).

Source: NatIonaI nstItute oI Standards and TechnoIogy (NST) SpecIaI PubIIcatIon 800-53, "nIormatIon
SecurIty." http:]]csrc.nIst.gov]pubIIcatIons]PubsSPs.htmI

3. ncIudes aII books, papers, maps, photographs, machIne readabIe materIaIs, or other
documentary materIaIs, regardIess oI physIcaI Iorm or characterIstIcs, made or receIved by an agency oI
the UnIted States Covernment under FederaI Iaw or In connectIon wIth the transactIon oI pubIIc busIness
and preserved or approprIate Ior preservatIon by that agency or Its IegItImate successor as evIdence oI
the organIzatIon, IunctIons, poIIcIes, decIsIons, procedures, operatIons or other actIvItIes oI the
Covernment or because oI the InIormatIonaI vaIue oI the data In them (44 U.S.C 3301).

Source: NARA. "FederaI Records, CeneraI." 36 CFR 1220, http:]]www.gpoaccess.gov]CFR]Index.htmI

Ty Ty Ty Types oI Records pes oI Records pes oI Records pes oI Records
Abandoned Records
Records that support a program that no Ionger exIst, or can be IdentIIIed, regardIess oI medIa. AIso
known as "orphaned records". Records deserted by IederaI and contractor empIoyees. ThIs usuaIIy occurs
when personneI reIocate, transIer, or termInate. AbandonIng records Is a common practIce throughout
DOE.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

AccessIoned Records
Records oI permanent hIstorIcaI vaIue In the IegaI custody oI NARA (NatIonaI ArchIves and Records
AdmInIstratIon).

Source: "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001,
http:]]www.gpoaccess.gov]CFR]Index.htmI.

AdmInIstratIve Records
Records reIatIng to budget, personneI, suppIy, and sImIIar housekeepIng, or IacIIItatIve, IunctIons common
to most agencIes, In contrast to program records.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

Agency Records
A record In the possessIon and controI oI the NucIear ReguIatory CommIssIon (NRC) that Is assocIated wIth
Covernment busIness. Agency record does not IncIude records such as:






350
(1) PubIIcIy-avaIIabIe books, perIodIcaIs, or other pubIIcatIons that are owned or copyrIghted by non-
FederaI sources; (2) Records soIeIy In the possessIon and controI oI NRC contractors; (3) PersonaI records
In possessIon oI NRC personneI that have not been cIrcuIated, were not requIred to be created or retaIned
by the NRC, and can be retaIned or dIscarded at the author's soIe dIscretIon, or records oI a personaI
nature that are not assocIated wIth any Covernment busIness; or (4) Non-substantIve InIormatIon In Iogs
or scheduIe books oI the ChaIrman or CommIssIoners, uncIrcuIated except Ior typIng or recordIng
purposes.
Source: NucIear ReguIatory CommIssIon (NRC). 10 CFR 9.13 "DeIInItIons."
http:]]www.gpoaccess.gov]CFR]Index.htmI

Consumer Records
Consumer reports pertaInIng to the empIoyee under the FaIr CredIt ReportIng Act.

Source: "Commerce and Trade." 15 U.S.C. 1681a, http:]]www.gpoaccess.gov]U.S.C.ode]

FInancIaI Records
MaIntaIned by a IInancIaI InstItutIon as deIIned In 31 U.S.C 5312(a) or by a hoIdIng company as deIIned In
sectIon 1101(6) oI The RIght to FInancIaI PrIvacy Act oI 1978 (12 U.S.C 3401): As part oI aII InvestIgatIons
and reInvestIgatIons, agencIes may request the Department oI the Treasury to search currency transactIon
databases Ior InternatIonaI transportatIon oI currency or monetary Instruments, IoreIgn bank and IInancIaI
accounts, transactIons under $10,000 that are reported as possIbIe money IaunderIng vIoIatIons, and
records oI IoreIgn traveI.

Source: "Money and FInance." 31 U.S.C. 5312(a), sectIon 1101(6) oI The RIght to FInancIaI PrIvacy Act oI
1978 (12 U.S.C. 3401), http:]]www.gpoaccess.gov]U.S.C.ode]

NewIy DIscovered Records
Records that were InadvertentIy not revIewed prIor to the eIIectIve date oI automatIc decIassIIIcatIon
because the agency decIassIIIcatIon authorIty was unaware oI theIr exIstence.

Source: "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001,
http:]]www.gpoaccess.gov]CFR]Index.htmI.

OIIIcIaI Record
SectIon 3 (c) oI provIdes that "Save as otherwIse requIred by statute, matters oI oIIIcIaI record shaII In
accordance wIth pubIIshed ruIe be made avaIIabIe to persons properIy and dIrectIy concerned except
InIormatIon heId conIIdentIaI Ior good cause Iound." The Introductory savIng cIause Is Intended to
preserve exIstIng statutory requIrements Ior conIIdentIaI treatment oI certaIn materIaIs, such as Income
tax returns.






351
Each agency shouId pubIIsh In the FederaI RegIster, under 3 (a) (1), a ruIe IIstIng the types oI oIIIcIaI
records In Its IIIes, cIassIIyIng them In terms oI whether or not they are conIIdentIaI In character, statIng
the manner In whIch InIormatIon Is avaIIabIe (as by InspectIon or saIe oI photostatIc copIes), the method
oI appIyIng Ior InIormatIon, and by what oIIIcIaIs the appIIcatIon wIII be determIned.
The term "oIIIcIaI record" Is dIIIIcuIt oI deIInItIon. n generaI, It may be stated that matters oI oIIIcIaI
record wIII IncIude (a) appIIcatIons, regIstratIons, petItIons, reports and returns IIIed by members oI the
pubIIc wIth the agency pursuant to statute or the agency's ruIes, and (b) aII documents embodyIng agency
actIons, such as orders, ruIes and IIcenses. n IormaI proceedIngs, the pIeadIngs, transcrIpts oI testImony,
exhIbIts, and aII documents receIved In evIdence or made a part oI the record are "matters oI oIIIcIaI
record."
SectIon 3 (c) does not purport to deIIne "oIIIcIaI record." Each agency must examIne Its IunctIons and the
substantIve statutes under whIch It operates to determIne whIch oI Its materIaIs are to be treated as
matters oI oIIIcIaI record Ior the purposes oI the sectIon. ndIcatIve oI the types oI records whIch are
consIdered oIIIcIaI records by Congress are maps, pIats, or dIagrams In the custody oI the Secretary oI the
nterIor (5 U.S.C. 488), [25] records, books or papers In the CeneraI Land OIIIce (28 U.S.C. 672), and
regIstratIon statements IIIed wIth the SecurItIes and Exchange CommIssIon under the SecurItIes Act (15
U.S.C. 77I).
Source: Attorney CeneraI's ManuaI on the AdmInIstratIve Procedure Act. Prepared by the UnIted States
Department oI ]ustIce Tom C. CIark, Attorney CeneraI, 1947,
http:]]www.Iaw.Isu.edu]IIbrary]admIn]1947cover.htmI
Permanent Records
Permanent Records'' means any FederaI record that has been determIned by NARA to have suIIIcIent vaIue
to warrant Its preservatIon In the NatIonaI ArchIves oI the UnIted States. Permanent records IncIude aII
records accessIoned by NARA Into the NatIonaI ArchIves oI the UnIted States and Iater Increments oI the
same records, and those Ior whIch the dIsposItIon Is permanent on SF 115s, Request Ior Records
DIsposItIon AuthorIty, approved by NARA on or aIter May 14, 1973.

Source: "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001,
http:]]www.gpoaccess.gov]CFR]Index.htmI.

PresIdentIaI Record
The PresIdentIaI Records Act oI 1978 deIInes a presIdentIaI record as:

.documentary materIaIs, or any reasonabIy segregabIe portIon thereoI, created or receIved by the
PresIdent, hIs ImmedIate staII, or a unIt or IndIvIduaI oI the ExecutIve OIIIce oI the PresIdent whose
IunctIon Is to advIse and assIst the PresIdent, In the course oI conductIng actIvItIes whIch reIate to or
have an eIIect upon the carryIng out oI the constItutIonaI, statutory, or other oIIIcIaI or ceremonIaI
dutIes oI the PresIdent.






352

PubIIc Records
Each state has a pubIIc records Iaw that specIIIcaIIy deIInes and outIInes access to pubIIc InIormatIon.
MedIcaI records, adoptIon records and some types oI crImInaI records are consIdered exempt Irom pubIIc
access due to prIvacy concerns. Arrests and search warrants, IndIctments, crImInaI summons, and non-
testImonIaI IdentIIIcatIon orders are pubIIc unIess seaIed by court order.

Records HavIng Permanent HIstorIcaI VaIue
PresIdentIaI papers or PresIdentIaI records and the records oI an agency that the ArchIvIst has determIned
shouId be maIntaIned permanentIy In accordance wIth TItIe 44 UnIted State Code.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

RIghts-and-nterests Records
That type oI vItaI records essentIaI to protectIng the rIghts and Interests oI an organIzatIon and oI the
IndIvIduaIs dIrectIy aIIected by Its actIvItIes.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

Suspense FIIes
FIIes arranged chronoIogIcaIIy to remInd oIIIcIaIs oI actIons to be compIeted by a specIIIc date. AIso caIIed
IoIIowup IIIes or tIckIer IIIes.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

Temporary Records
Any records whIch have been determIned by the ArchIvIst oI the UnIted States to have InsuIIIcIent vaIue
(on the basIs oI current standards) to warrant Its preservatIon by the NatIonaI ArchIves and Records
AdmInIstratIon. ThIs determInatIon may take the Iorm oI:
(a) A serIes oI records desIgnated as dIsposabIe In an agency records dIsposItIon scheduIe approved by
NARA (Standard Form 115, Request Ior Records DIsposItIon AuthorIty); or
(b) A serIes oI records desIgnated as dIsposabIe In a CeneraI Records ScheduIe. UnscheduIed records are
records the IInaI dIsposItIon oI whIch has not been approved by NARA.

Source: NARA. "CeneraI Records Management DeIInItIons."
http:]]www.archIves.gov]mIdatIantIc]agencIes]records-mgmt]deIInItIons.htmI

TextuaI FIIes






353
The term usuaIIy appIIed to manuscrIpt and typescrIpt paper records, as dIstInct Irom eIectronIc,
audIovIsuaI, cartographIc, remote-sensIng Imagery, archItecturaI, and engIneerIng records.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

UnscheduIed records
Are those that have not been IncIuded on a Standard Form 115, Request Ior Records DIsposItIon AuthorIty,
approved by NARA; those descrIbed but not authorIzed Ior dIsposaI on an SF 115 approved prIor to May
14, 1973; and those descrIbed on an SF 115 but not approved by NARA (wIthdrawn, canceIed, or
dIsapproved).

Source: NARA. "CeneraI Records Management DeIInItIons."
http:]]www.archIves.gov]mIdatIantIc]agencIes]records-mgmt]deIInItIons.htmI

VItaI Records
Records essentIaI to the contInued IunctIonIng or reconstItutIon oI an organIzatIon durIng and aIter an
emergency and aIso those records essentIaI to protectIng the rIghts and Interests oI that organIzatIon and
oI the IndIvIduaIs dIrectIy aIIected by Its actIvItIes. SometImes caIIed essentIaI records. ncIude both
emergency-operatIng and rIghts-and-Interests records. VItaI records consIderatIons are part oI an
agency's records dIsaster preventIon and recovery program.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons."
http:]]cIo.energy.gov]rmdeIInItIons.pdI

RecordkeepIng System RecordkeepIng System RecordkeepIng System RecordkeepIng System
A manuaI or automated system In whIch records are coIIected, organIzed, and categorIzed to IacIIItate
theIr preservatIon, retrIevaI, use, and dIsposItIon.

Source: NARA. "FederaI Records, CeneraI." 36 CFR 1220.
http:]]www.gpoaccess.gov]CFR]Index.htmI

Records Management Records Management Records Management Records Management
1. PIannIng, controIIIng, dIrectIng, organIzIng, traInIng, promotIng, and other managerIaI actIvItIes
InvoIved wIth respect to records creatIon, records maIntenance and use, and records dIsposItIon In order
to achIeve adequate and proper documentatIon oI the poIIcIes and transactIons oI the FederaI Covernment
and eIIectIve and economIcaI management oI agency operatIons.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2







354
2. 8asIc records management terms are deIIned In 36 CFR 1220.14. Terms such as database,
database management system, eIectronIc maII system, eIectronIc record, and so on.

Red Red Red Red
See See See See 8Iack 8Iack 8Iack 8Iack
n an InIormatIon processIng context, denotes encrypted]cIassIIIed data, text, equIpment, processes,
systems or InstaIIatIons assocIated wIth InIormatIon that requIres emanatIons securIty protectIon. For
exampIe, wIrIng that carrIes unencrypted cIassIIIed InIormatIon eIther excIusIveIy or mIxed wIth
uncIassIIIed Is termed "red."

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003. , ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

RedactIon RedactIon RedactIon RedactIon
1. The removaI oI exempted InIormatIon Irom copIes oI a document.

AgencIes are encouraged but are not requIred to redact documents that contaIn InIormatIon that Is
exempt Irom automatIc decIassIIIcatIon under sectIon 3.3 oI the Order, especIaIIy II the InIormatIon that
must remaIn cIassIIIed comprIses a reIatIveIy smaII portIon oI the document.

Source: "CIassIIIed NatIonaI SecurIty nIormatIon." 32 CFR 2001.
http:]]www.gpoaccess.gov]CFR]Index.htmI.

2. RedactIon means a sanItIzatIon technIque that InvoIves removaI (edItIng out) oI exempted
InIormatIon Irom a document.

Source: SOO. "CIassIIIed NatIonaI SecurIty nIormatIon."FederaI RegIster November 16, 1999,
http:]]www.Ias.org]sgp]Isoo]IsoodIr1a.htmI

3. Computer RedactIon
".[I]I technIcaIIy IeasIbIe, the amount oI the InIormatIon deIeted shaII be IndIcated at the pIace In the
record where such deIetIon Is made." d. However, Its terms are not IImIted to InIormatIon maIntaIned In
eIectronIc Iorm, so It aIso codIIIes the sound admInIstratIve practIce oI markIng records to show aII
deIetIons when records are dIscIosed In conventIonaI paper Iorm. "

Source: U.S. Department oI ]ustIce. "Congress Enacts E-FOA Amendments."
http:]]www.usdoj.gov]oIp]IoIaupdates]VoIXV4]page1.htm

Red]8Iack Concept Red]8Iack Concept Red]8Iack Concept Red]8Iack Concept
SeparatIon oI eIectrIcaI and eIectronIc cIrcuIts, components, equIpment, and systems that handIe cIassIIIed
pIaIn text (RED) InIormatIon, In eIectrIcaI sIgnaI Iorm, Irom those whIch handIe uncIassIIIed (8LACK)
InIormatIon In the same Iorm.






355
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty. "SaIeguards
and SecurIty CIossary oI Terms." December 18, 1995.
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
ReIerence MaterIaI ReIerence MaterIaI ReIerence MaterIaI ReIerence MaterIaI
Documentary materIaI over whIch the CCA, who Iets the cIassIIIed contract, does not have cIassIIIcatIon
jurIsdIctIon, and dId not have cIassIIIcatIon jurIsdIctIon at the tIme the materIaI was orIgInated. Most
materIaI made avaIIabIe to contractors by the DTC and other secondary dIstrIbutIon agencIes Is reIerence
materIaI as thus deIIned.
Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006,
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

RegIonaI nIormatIon SharIng System (RSS)]RSSNET RegIonaI nIormatIon SharIng System (RSS)]RSSNET RegIonaI nIormatIon SharIng System (RSS)]RSSNET RegIonaI nIormatIon SharIng System (RSS)]RSSNET
An estabIIshed system oI sIx regIonaI centers that are used to "share InteIIIgence and coordInate eIIorts
agaInst crImInaI networks that operate In many IocatIons across jurIsdIctIonaI IInes." The RSS Program was
created to combat tradItIonaI Iaw enIorcement targets, such as drug traIIIckIng and vIoIent crIme, but has
been expanded to IncIude other actIvItIes, such as terrorIsm and cybercrIme.

The RSS system has created rIss.net, the onIy secure Internet-based natIonaI network Ior sharIng oI
crImInaI InteIIIgence among IederaI, state, and IocaI Iaw enIorcement
agencIes. RSS aIso operates secure WATS]patch and teIephone communIcatIons Ior one-on-one contact
wIth RSS. RSS databases can provIde crImInaI InteIIIgence InIormatIon and reIerraI contacts Ior
InIormatIon exchange wIth other member agencIes.

Source: HaroId C. ReIyea and ]eIIrey W. SeIIert. "nIormatIon SharIng Ior HomeIand SecurIty: A 8rIeI
OvervIew." CRS Report to Congress ]anuary 10, 2005, http:]]www.Ias.org]sgp]crs]RL32597.pdI ; Attorney
CeneraI AshcroIt's "Memorandum to aII U.S. Attorneys." November 13, 2001; "RevIew oI UnIted States
Attorneys' OIIIces' Use oI nteIIIgence Research SpecIaIIsts. " December 2005,
http:]]www.usdoj.gov]oIg]reports]EOUSA]e0603]IInaI.pdI and Department oI ]ustIce. 8ureau oI ]ustIce
AssIstance. nteIIIgence-Led PoIIcIng: The New nteIIIgence ArchItecture,
http:]]www.ncjrs.gov]pdIIIIes1]bja]210681.pdI

Regrade Regrade Regrade Regrade
A determInatIon that cIassIIIed InIormatIon requIres a dIIIerent degree oI protectIon agaInst unauthorIzed
dIscIosure than currentIy provIded, together wIth a change oI cIassIIIcatIon desIgnatIon that reIIects such a
dIIIerent degree oI protectIon.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

ReIevant EvIdence ReIevant EvIdence ReIevant EvIdence ReIevant EvIdence






356
EvIdence havIng any tendency to make the exIstence oI any Iact that Is oI consequence to the
determInatIon oI the actIon more probabIe or Iess probabIe than It wouId be wIthout the evIdence.

Source: ArtIcIe 101. RuIe 401. FederaI RuIes oI EvIdence, http:]]www.Iaw.corneII.edu]ruIes]Ire]ruIes.htm

ReIevant nIormatIon ReIevant nIormatIon ReIevant nIormatIon ReIevant nIormatIon
AII InIormatIon oI Importance to commanders and staIIs In the exercIse oI command and controI.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

RestrIcted RestrIcted RestrIcted RestrIcted
Reports that at an earIIer date were cIassIIIed sensItIve or conIIdentIaI and the need Ior hIgh-IeveI securIty
no Ionger exIsts; and

NonconIIdentIaI InIormatIon prepared Ior]by Iaw enIorcement agencIes.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

RestrIcted CoIIateraI nIormatIon RestrIcted CoIIateraI nIormatIon RestrIcted CoIIateraI nIormatIon RestrIcted CoIIateraI nIormatIon
ThIs DIrectIve aIso covers programs other than SC or specIaI access programs that Impose controIs
governIng access to cIassIIIed InteIIIgence InIormatIon or controI procedures beyond those normaIIy
provIded Ior access to ConIIdentIaI, Secret, or Top Secret InIormatIon, and Ior whIch IundIng Is specIIIcaIIy
IdentIIIed. ThIs DIrectIve does not cover access controIs Ior human or organIzatIonaI sources.

Source: DIrector oI CentraI nteIIIgence. ControIIed Access Program OversIght CommIttee ]une 2, 1995.,
http:]]www.Ias.org]Irp]oIIdocs]D.C.Id3-29.htmI

RestrI RestrI RestrI RestrIcted Data (RD) cted Data (RD) cted Data (RD) cted Data (RD)
See See See See 8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed 8orn CIassIIIed
1. AII data concernIng the IoIIowIng, but not IncIudIng data decIassIIIed or removed Irom the RD
category pursuant to sectIon 142 oI the AtomIc Energy Act:

desIgn, manuIacture, or utIIIzatIon oI atomIc weapons;
productIon oI specIaI nucIear materIaI; or
use oI specIaI nucIear materIaI In the productIon oI energy
mass or dImensIons oI IIssIIe materIaIs, pIts, or nucIear assembIy systems






357
eIIIcIency oI nucIear materIaIs
boostIng systems
InItIator desIgn
test InIormatIon reveaIIng RD
navaI nucIear propuIsIon InIormatIon
radIoIogIcaI warIare

RD Is 8orn CIassIIIed.

Source: The McMahon Act (AEC, 1954)
http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm; ArvIn S. QuIst. Chapter 3. "CIassIIIcatIon
oI nIormatIon," http:]]www.Ias.org]sgp]IIbrary]quIst2]chap3.htmI; QuIst, "PrIncIpIes Ior CIassIIIcatIon
oI nIormatIon," http:]]www.Ias.org]sgp]IIbrary]quIst2]Index.htmI; DOE, UnderstandIng CIassIIIcatIon. . . .
WashIngton, D.C.: AssIstant Secretary Ior DeIense Programs, OIIIce oI CIassIIIcatIon, 1987, SUDOC:E
1.15:0007]1; and Energy. 10 CFR 1045, http:]]www.gpoaccess.gov]CFR]Index.htmI

2. OnIy DOE, NRC, DoD, and NASA can grant access to RD and FRD. Contractors oI aII other
IederaI agencIes must be processed Ior PCLs (personneI cIearance) by the DOE. The mInImum InvestIgatIve
requIrements and standards Ior access to RD and FRD are set Iorth In the NatIonaI ndustrIaI SecurIty
Program OperatIng ManuaI (NSPOM), Chapter 9.

Source: DoD. NatIonaI ndustrIaI SecurIty Program OperatIng ManuaI (NSPOM). DoD 5220.22-M. Chapter
9. ]anuary 1995, http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm
3. E.O. 12958, amended, does not appIy to RD or FRD.
Source: nIormatIon SecurIty OversIght OIIIce. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon 8ookIet.
SOO mpIementIng DIrectIve No. 1 EIIectIve September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI
ReveaI ReveaI ReveaI ReveaI
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
nternaI Revenue ServIce. WIII be used to detect IInancIaI crImInaI actIvIty such as
tax evasIon;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: PIanned;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: No.







358
Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI

Reverse FOA Reverse FOA Reverse FOA Reverse FOA
A "reverse" FOA actIon Is one In whIch the "submItter oI InIormatIon, usuaIIy a corporatIon or other
busIness entIty"' that has suppIIed an agency wIth "data on Its poIIcIes, operatIons or products, seeks to
prevent the agency that coIIected the InIormatIon Irom reveaIIng It to a thIrd party [usuaIIy] In response to
the Iatter's FOA request."

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]reverse.htm

RevoIutIon In MIIItary AIIaIrs (RMA) RevoIutIon In MIIItary AIIaIrs (RMA) RevoIutIon In MIIItary AIIaIrs (RMA) RevoIutIon In MIIItary AIIaIrs (RMA)
DramatIc changes In the art oI warIare precIpItated by rapId technoIogIcaI advances. ExpIoItIng the RMA
means not onIy acquIrIng new systems based on advanced technoIogy but aIso deveIopIng the concepts,
doctrIne, and organIzatIons to IuIIy utIIIze the new technoIogIes In a way to domInate the battIeIIeId.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp

Reynard Reynard Reynard Reynard
A seedIIng eIIort to study the emergIng phenomenon oI socIaI (partIcuIarIy terrorIst) dynamIcs In vIrtuaI
worIds and Iarge-scaIe onIIne games and theIr ImpIIcatIons Ior the nteIIIgence CommunIty. The cuIturaI
and behavIoraI norms oI vIrtuaI worIds and gamIng are generaIIy unstudIed. ThereIore, Reynard wIII seek
to IdentIIy the emergIng socIaI, behavIoraI and cuIturaI norms In vIrtuaI worIds and gamIng envIronments.
The project wouId then appIy the Iessons Iearned to determIne the IeasIbIIIty oI automatIcaIIy detectIng
suspIcIous behavIor and actIons In the vIrtuaI worId.

Source: DN, Data MInIng Report, February 15, 2008, http:]]www.Ias.org]Irp]dnI]datamInIng.pdI

RIght RIght RIght RIght- -- -to to to to- -- -Know Know Know Know
1. "t seems to me that 'the RIght to Know' shouId be the phrase, because It represents the
peopIe's rIght, as It actuaIIy Is, and not mereIy a seIIIsh rIght oI prInters aIone, as It Is not. t means that
the government may not, and the newspapers and broadcasters shouId not, by any method whatever curb
deIIvery oI any InIormatIon essentIaI to the pubIIc weIIare and enIIghtenment. To do so shouId constItute
maIIeasance and be punIshabIe. I the FIrst Amendment to the AmerIcan constItutIon were beIng wrItten
now It weII couId be worded: 'Congress shaII make no Iaw.abrIdgIng the RIght to Know through oraI or
prInted word or any other mans oI communIcatIng Ideas or InteIIIgence.' What Is needed today Is a
constItutIonaI amendment that wouId more properIy state what Is reaIIy meant In connectIon wIth thIs
Ireedom by whIch newspapers and radIo IunctIon Ior the peopIe."






359

Source: Kent Cooper. The RIght to Know: An ExposItIon oI the EvIIs oI News SuppressIon and Propaganda.
New York: Farrar, Straus and Cudahy, 1956. 1617, and "RIght to Know" edItorIaI. New York TImes ]anuary
23, 1945, p.18.

2. The peopIe's rIght to know Is reaIIy a composIte oI severaI rIghts. t has at Ieast IIve broad,
dIscernIbIe components: 1. the rIght to get InIormatIon; 2. the rIght to prInt wIthout prIor restraInt; 3. the
rIght to prInt wIthout Iear oI reprIsaI not under due process; 4. the rIght oI access to IacIIItIes and materIaI
essentIaI to communIcatIon; and 5. the rIght to dIstrIbute InIormatIon wIthout InterIerence by government
actIng under Iaw or by cItIzens actIng In deIIance oI the Iaw.

Source: ]ames RusseII WIggIns. Freedom or SecrecyZ New York: OxIord UnIversIty Press, 1956. 3-4.

3. Reduced to Its sImpIest terms the concept IncIudes two cIoseIy reIated Ieatures: FIrst, the rIght
to read, to IIsten, to see, and to otherwIse receIve communIcatIons; and second, the rIght to obtaIn
InIormatIon as a basIs Ior transmIttIng Ideas or Iacts to others. Together these constItute the reverse sIde
oI the coIn Irom the rIght to communIcate. 8ut the coIn Is one pIece, nameIy the system oI Ireedom oI
expressIon.

Source: Emerson, Thomas . "LegaI FoundatIons oI the RIght to Know SymposIum: The FIrst Amendment
and the RIght to Know." 1976 Wash. U. L. Q. (1976) 1-25.

4. Requestor has oIIIcIaI capacIty and statutory authorIty to the InIormatIon beIng sought.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law EnIorcement
AgencIes. Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004.,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

ncIuded here are reguIatory mandates Ior pubIIc dIscIosure oI varIous types oI InIormatIon. ThIs Is ncIuded here are reguIatory mandates Ior pubIIc dIscIosure oI varIous types oI InIormatIon. ThIs Is ncIuded here are reguIatory mandates Ior pubIIc dIscIosure oI varIous types oI InIormatIon. ThIs Is ncIuded here are reguIatory mandates Ior pubIIc dIscIosure oI varIous types oI InIormatIon. ThIs Is not an not an not an not an
exhaustIve IIst exhaustIve IIst exhaustIve IIst exhaustIve IIst:

CommunIty RIght to Know (RTK) ToxIc ReIease nventory
1. n response to the 8hopaI accIdent, the UnIted States reauthorIzed and expanded the SuperIund
Amendments and ReauthorIzatIon Act oI 1986 (SARA) to IncIude the Emergency PIannIng and CommunIty
RIght-to-Know Act oI 1986 (EPCRA), whIch Increased the pubIIc's rIght to know about chemIcaI hazards,
chemIcaI emergencIes, and chemIcaI reIeases In theIr communItIes.

More than 3,400 ndIans dIed (conservatIve estImates - another estImate Is 8,000
http:]]www.bhopaI.net]oIdsIte]poIsonpapers.htmI ) and more than 200,000 IndIvIduaIs Injured when






360
The purpose oI RTK Is to "Increase communIty awareness oI chemIcaI hazards and to IacIIItate
emergency pIannIng" through Emergency PIannIng (SectIons 301-303), Emergency ReIease NotIIIcatIon
(SectIon 304), CommunIty RIght-to-Know ReportIng RequIrements (SectIons 311-312), and ToxIc ReIease
nventory ReportIng (SectIon 313). However, onIy certaIn companIes wIthIn a SC (Standard ndustrIaI
CIassIIIcatIon Code) are obIIged to report; the current TR toxIc chemIcaI IIst currentIy IncIudes over 650
IndIvIduaIIy IIsted chemIcaIs and chemIcaI categorIes out oI the approxImateIy 70,000-100,000 chemIcaIs
used In commerce, and the approxImateIy one thousand addItIonaI chemIcaIs Introduced annuaIIy.



Source: EPA, http:]]www.epa.gov]epahome]r2k.htm

2. The EPA Is consIderIng changes to the TR: changes In reportIng requIrements Irom the current
annuaI reportIng requIrement to every other year reportIng aII IacIIItIes, and aIIows IacIIItIes to wIthhoId
InIormatIon on Iow-IeveI productIon oI persIstent bIoaccumuIatIve toxIns (P8Ts), IncIudIng Iead and
mercury.

There Is a IascInatIng dIscussIon oI "8urden MethodoIogy" on page 57827.

Source: EPA. "TR 8urden ReductIon Proposed RuIe." FederaI RegIster October 4, 2005,
http:]]edocket.access.gpo.gov]2005]pdI]05-19710.pdI.

EthIcs In Covernment Act oI 1978
RequIres the IIIIng oI detaIIed IInancIaI statements by IederaI government oIIIcIaIs to be IIIed wIth an
OIIIce oI Covernment EthIcs, whIch revIews them to see II there Is a conIIIct between an IndIvIduaI's pubIIc
job and hIs prIvate hoIdIngs. The statements are consIdered pubIIc documents.

AdvIsory commIttees covered by the Act must open theIr meetIngs under the Covernment In the SunshIne
Law as weII as dIscIose theIr records as requIred by the Freedom oI nIormatIon Act.

Source: Steven CoIdberg, "PubIIc Access to Covernment nIormatIon":
http:]]usInIo.org]enus]medIa]pressIreedom]Ireedom6.htm and 5 U.S.C. App.
http:]]www.access.gpo.gov]U.S.C.ode]tItIe5a]5a3.htmI

methyI Isocyanate was reIeased Irom UnIon CarbIde's 8hopaI InsectIcIde pIant In 1984. See
http:]]www.bhopaI.org]

n Its reportIng on "reducIng burden assocIated wIth IacIIIty reportIng" to the ToxIcs ReIease
nventory, EPA (31) wrItes: "the objectIve Is to reduce the amount oI InIormatIon, [emphasIs added] and
thereIore the amount oI tIme, requIred oI IacIIItIes to compIy wIth TR, and II warranted, to reIIeve certaIn
IacIIItIes (e.g., certaIn smaII busInesses) oI reportIng requIrements aItogether." ORA's FIscaI Year 2005
ManagIng nIormatIon CoIIectIon: nIormatIon CoIIectIon 8udget oI the UnIted States:
http:]]www.whItehouse.gov]OM8]InIoreg]2005IcbIInaI.pdI.






361

FederaI AdvIsory CommIttee Act (FACA)
1. Mandates that each advIsory commIttee meetIng shaII be open to the pubIIc, advIsory
commIttee proceedIngs pubIIshed In the FederaI RegIster, and dIscIose theIr records as requIred by the
Freedom oI nIormatIon Act.
Source: PubIIc Law 92-463, Oct. 6, 1972. 5 U.S.C., AppendIx.
http:]]www.access.gpo.gov]U.S.C.ode]tItIe5a]5a1.htmI and StephanIe SmIth, "FederaI AdvIsory
CommIttees: A PrImer," Updated March 20, 2007, CRS Report Ior Congress RL30260,
http:]]www.Ias.org]sgp]crs]mIsc]RL30260.pdI

2. S.1873 "To prepare and strengthen the bIodeIenses oI the UnIted States agaInst the deIIberate,
accIdentaI, and naturaI outbreaks oI IIIness, and Ior other purposes" restrIcts FACA (FederaI AdvIsory
CommIttee Act) access to InIormatIon and meetIngs (111).

Source: S.1873 "To prepare and strengthen the bIodeIenses oI the UnIted States agaInst the deIIberate,
accIdentaI, and naturaI outbreaks oI IIIness, and Ior other purposes." October 17, 2005. Text at CPO
Access http:]]Irwebgate.access.gpo.gov (10]17]2005: 12]11]05 10]17]2005: 12]11]05 10]17]2005: 12]11]05 10]17]2005: 12]11]05 Read twIce and reIerred to the
CommIttee on HeaIth, EducatIon, Labor, and PensIons. (text oI measure as Introduced: CR S11424-11433)

Covernment In the SunshIne Act
ReguIatory guIdance Ior pubIIc meetIngs; agencIes "shaII make promptIy avaIIabIe to the pubIIc, In a pIace
easIIy accessIbIe to the pubIIc, the transcrIpt, eIectronIc recordIng, or mInutes (as requIred by paragraph
(1)) oI the dIscussIon oI any Item on the agenda, or oI any Item oI the testImony oI any wItness receIved
at the meetIng, except Ior such Item or Items oI such dIscussIon or testImony as the agency determInes to
contaIn InIormatIon whIch may be wIthheId under subsectIon (c). CopIes oI such transcrIpt, or mInutes, or
a transcrIptIon oI such recordIng dIscIosIng the IdentIty oI each speaker, shaII be IurnIshed to any person
at the actuaI cost oI dupIIcatIon or transcrIptIon. The agency shaII maIntaIn a compIete verbatIm copy oI
the transcrIpt, a compIete copy oI the mInutes, or a compIete eIectronIc recordIng oI each meetIng, or
portIon oI a meetIng, cIosed to the pubIIc, Ior a perIod oI at Ieast two years aIter such meetIng, or untII
one year aIter the concIusIon oI any agency proceedIng wIth respect to whIch the meetIng or portIon was
heId, whIchever occurs Iater.

Source: Covernment OrganIzatIon and EmpIoyees. "Open MeetIngs." 5 U.S.C. 552b.
http:]]www.gpoaccess.gov]uscode]browse.htmI and Steven CoIdberg "PubIIc Access to Covernment
nIormatIon." http:]]usInIo.org]enus]medIa]pressIreedom]Ireedom6.htm

SecurIty and Exchange CommIssIon (SEC)
SEC estabIIshed requIrements Ior contInuous dIscIosure In Iorms 10-K, 10-Q, 8-K, etc.







362
Source: "CommodIty and SecurItIes Exchanges." ReguIatIon S-K, 17 CFR 229,
http:]]www.gpoaccess.gov]CFR]Index.htmI

RIsk Assessment and HorIzon ScannIng (RAHS) RIsk Assessment and HorIzon ScannIng (RAHS) RIsk Assessment and HorIzon ScannIng (RAHS) RIsk Assessment and HorIzon ScannIng (RAHS)
See TotaI nIormatIon Awareness (TA) See TotaI nIormatIon Awareness (TA) See TotaI nIormatIon Awareness (TA) See TotaI nIormatIon Awareness (TA)
WhIIe dIIIerent In desIgn Irom TA, the RAHS system shares some InteIIectuaI roots wIth the doomed Darpa
eIIort..RAHS as a system that monItors muItIpIe Ieeds oI data -- both open and cIassIIIed -- to detect
possIbIe threats. "EssentIaIIy It's a strategIc tooI that tIes together every one oI the agencIes In a
government Into a Iarge network that Is constantIy scannIng the horIzon IookIng Ior weak sIgnaIs that
poInt toward the possIbIIIty oI a sIgnIIIcant event that wouId have Important ImpIIcatIons Ior SIngapore,"
he [sIc Peterson] saId.

Source: Sharon WeInberger, "Son oI TA: Pentagon SurveIIIance System s Reborn In AsIa," WIred March 22,
2007, http:]www.wIred.com]poIItIcs]onIInerIghts]news]2007]03]SNCAPOREZcurrentPage=1

RoutIne Use RoutIne Use RoutIne Use RoutIne Use
1. A routIne use Is a term Irom the PrIvacy Act oI 1974. t means "wIth respect to the dIscIosure oI
a record, the use oI such record Ior a purpose whIch Is compatIbIe wIth the purpose Ior whIch It was
coIIected."

Source: 5 U.S.C. 552a (a) (7). The PrIvacy Act oI 1974 http:]]www.usdoj.gov]opcI]prIvstat.htm and EPC,
http:]]www.epIc.org]prIvacy]1974act]

2. One oI the prImary objectIves oI the Act Is to restrIct the use oI InIormatIon to the purposes Ior
whIch It was coIIected. The term "routIne use" was Introduced to recognIze the practIcaI IImItatIons oI
restrIctIng use oI InIormatIon to expIIcIt and expressed purposes Ior whIch It was coIIected. t recognIzes
that there are coroIIary purposes "compatIbIe wIth the purpose Ior whIch [the InIormatIon] was coIIected"
that are approprIate and necessary Ior the eIIIcIent conduct oI government and In the best Interest oI both
the IndIvIduaI and the pubIIc.

Source: "OIIIce oI Management and 8udget PrIvacy Act mpIementatIon CuIdeIInes and ResponsIbIIItIes"
(]uIy 9, 1975), http:]]www.deIenseIInk.mII]prIvacy]1975OM8PACuIde]75]ULY09.pdI

3. An agency can adopt a routIne use aIter pubIIshIng the routIne use Ior pubIIc comment In the
FederaI RegIster.

Source: 5 U.S.C. 552a (e) (11). The PrIvacy Act oI 1974, http:]]www.usdoj.gov]opcI]prIvstat.htm and
EPC, http:]]www.epIc.org]prIvacy]1974act] [deIInItIons contrIbuted by Robert CeIIman,
http:]]www.bobgeIIman.com]].







363
Ruse Ruse Ruse Ruse
See DeceptIon See DeceptIon See DeceptIon See DeceptIon
n mIIItary deceptIon, a trIck oI war desIgned to deceIve the adversary, usuaIIy InvoIvIng the deIIberate
exposure oI IaIse InIormatIon to the adversary's InteIIIgence coIIectIon system.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents


~ S ~ ~ S ~ ~ S ~ ~ S ~
SaIeguards nIormatIon (SC) SaIeguards nIormatIon (SC) SaIeguards nIormatIon (SC) SaIeguards nIormatIon (SC)
1. nIormatIon not otherwIse cIassIIIed as NatIonaI SecurIty nIormatIon or RestrIcted Data whIch
specIIIcaIIy IdentIIIes a IIcensee's or appIIcant's detaIIed, (1) securIty measures Ior the physIcaI protectIon
oI specIaI nucIear materIaI, or (2) securIty measures Ior the physIcaI protectIon and IocatIon oI certaIn
pIant equIpment vItaI to the saIety oI productIon or utIIIzatIon IacIIItIes.

Source: Energy. 10 CFR 73, http:]]www.gpoaccess.gov]CFR]Index.htmI

2. A specIaI category oI sensItIve uncIassIIIed InIormatIon to be protected Irom unauthorIzed
dIscIosure under sectIon 147 oI the AtomIc Energy Act oI 1954, as amended (AEA). AIthough SC Is
consIdered to be sensItIve uncIassIIIed InIormatIon, It Is handIed and protected more IIke cIassIIIed
NatIonaI SecurIty nIormatIon than IIke other sensItIve uncIassIIIed InIormatIon (e.g., prIvacy and
proprIetary InIormatIon).

Source: AtomIc Energy Act oI 1954 http:]]www.nrc.gov];
NucIear ReguIatory CommIssIon. "PhysIcaI ProtectIon oI PIants and MaterIaIs.'' 10 CFR 73,
http:]]www.gpoaccess.gov]Ir]Index.htmI and FederaI RegIster October 31, 2006,
http:]]www.gpoaccess.gov]Ir]Index.htmI

3. SaIeguards nIormatIon--ModIIIed HandIIng (SC-M). SC-M pertaIns to certaIn SC subject to
handIIng requIrements that are modIIIed Irom what part 73 ItseII currentIy requIres. ThIs desIgnatIon Ior
SC appIIes to certaIn quantItIes oI source, byproduct, and specIaI nucIear materIaIs Ior whIch the rIsk oI
unauthorIzed dIscIosure oI InIormatIon Is reIatIveIy Iow.

Source: FederaI RegIster February 11, 2005 (VoIume 70, Number 28), Page 7196-7217,
http:]]www.gpoaccess.gov]Ir]Index.htmI







364
SaIeguardIng SaIeguardIng SaIeguardIng SaIeguardIng
Measures and controIs that are prescrIbed to protect cIassIIIed InIormatIon.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

SanItIzatIon SanItIzatIon SanItIzatIon SanItIzatIon
See See See See RedactIon RedactIon RedactIon RedactIon
The process oI edItIng, or otherwIse aIterIng, InteIIIgence or InteIIIgence InIormatIon to protect sensItIve
sources, methods, and anaIytIcaI capabIIItIes so as to permIt greater dIssemInatIon oI the data.

Source: DoD. nstructIon 5210.52. "SecurIty CIassIIIcatIon oI AIrborne Sensor magery and magIng
Systems." May 18, 1989, http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]521052p.pdI

SanItIze SanItIze SanItIze SanItIze
Process to remove InIormatIon Irom medIa such that data recovery Is not possIbIe. t IncIudes removIng aII
cIassIIIed IabeIs, markIngs, and actIvIty Iogs.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
SCAME SCAME SCAME SCAME
Acronym used to remember the steps In anaIyzIng opponent propaganda. The Ietters stand Ior "source,
content, audIence, medIa, eIIects."

Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI
Secondary CensorshIp Secondary CensorshIp Secondary CensorshIp Secondary CensorshIp
Armed Iorces censorshIp perIormed on the personaI communIcatIons oI oIIIcers, cIvIIIan empIoyees, and
accompanyIng cIvIIIans oI the Armed Forces oI the UnIted States, and on those personaI communIcatIons
oI enIIsted personneI oI the Armed Forces not subject to Armed Forces prImary censorshIp or those
requIrIng reexamInatIon.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

Secret ProtocoI Router Network (SPRNET) Secret ProtocoI Router Network (SPRNET) Secret ProtocoI Router Network (SPRNET) Secret ProtocoI Router Network (SPRNET)






365
ProvIdes secure cIassIIIed Secret communIcatIons; access to Secret counterterrorIsm reports, data, and
anaIysIs; and the capabIIIty to communIcate eIectronIc natIonaI securIty data among the USAO [UnIted
State Attorney OIIIces] dIstrIcts, other components, and other Iaw enIorcement and natIonaI securIty
agencIes.

Source: RevIew oI UnIted States Attorneys' OIIIces' Use oI nteIIIgence Research SpecIaIIsts. December
2005, http:]]www.usdoj.gov]oIg]reports]EOUSA]e0603]IInaI.pdI

Secrecy Secrecy Secrecy Secrecy
1. Secrecy sImpIy means that a document Is not avaIIabIe when you need It.

Source: ]ames Werner. "Secrecy and Its EIIect on EnvIronmentaI ProbIems In the MIIItary: An EngIneer's
PerspectIve." New York UnIversIty EnvIronmentaI Law ]ournaI 2 no. 2 (1993): 351-359,
http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI

2. Secrecy Is a Iorm oI government reguIatIon. There are many such Iorms, but a generaI dIvIsIon
can be made between reguIatIons deaIIng wIth domestIc aIIaIrs, and those deaIIng wIth IoreIgn aIIaIrs. n
the IIrst category, It Is generaIIy the case that government prescrIbes what the cItIzen may do; In the
second category, It Is generaIIy the case that government prescrIbes what the cItIzen may know.

Source: Report oI the CommIssIon on ProtectIng and ReducIng Covernment Secrecy ("MoynIhan
CommIssIon"), Senate Document 105-2, 1997; aIso see "Secrecy: a 8rIeI Account oI the AmerIcan
ExperIence," http:]]www.Ias.org]sgp]IIbrary]moynIhan]appa1.htmI

3. The compuIsory wIthhoIdIng oI knowIedge, reInIorced by the prospects oI sanctIons Ior
dIscIosure.

Source: Edward A. ShIIs. The Torment oI Secrecy: The 8ackground and Consequences oI AmerIcan SecurIty
PoIIcIes. CIencoe, L: The Free Press, 1956.
4. AnythIng that "Is kept IntentIonaIIy hIdden, set apart In the mInd oI Its keeper as requIrIng
conceaIment."

."ConIIIcts over secrecy.are conIIIcts over power: the power that comes through controIIIng the IIow oI
InIormatIon."

Source: SIsseIa 8ok. Secrets. New York: VIntage 8ooks, 1989. 5,19.

5. ConscIousIy wIIIed conceaIment.







366
Source: SImmeI, Ceorg. "The socIoIogy oI secrecy and secret socIetIes." AmerIcan ]ournaI oI SocIoIogy 11
no.4 (1906): 441-498.

6. ".a tamperIng oI communIcatIons." PoIItIcaI and governmentaI secrecy consIsts oI the process
oI secretIng InIormatIon about poIItIcaI entItIes, especIaIIy when that InIormatIon has sIgnIIIcant
ImpIIcatIons Ior rIvaI entItIes oI the generaI pubIIc."

Source: FrIedrIch, CarI. "Nature and IunctIon oI secrecy and propaganda." Ed. Susan L. Maret and ]an
CoIdman. Covernment Secrecy: CIassIc and Contemporary readIngs. Westport, CT: LIbrarIes UnIImIted,
2008. 85-86.

Types oI S Types oI S Types oI S Types oI Secrecy ecrecy ecrecy ecrecy
Note that many Note that many Note that many Note that many types oI secrec types oI secrec types oI secrec types oI secrecy have no estabIIshed deIInItIon: y have no estabIIshed deIInItIon: y have no estabIIshed deIInItIon: y have no estabIIshed deIInItIon:
8ureaucratIc Secrecy 8ureaucratIc Secrecy 8ureaucratIc Secrecy 8ureaucratIc Secrecy, ,, , whIch reIers to the IargeIy unconscIous hoardIng and wIthhoIdIng oI InIormatIon that
characterIzes aII bureaucracIes, as cIassIcaIIy descrIbed by Max Weber. UnIIke poIItIcaI secrecy, there Is no
partIcuIar advantage to be gaIned Irom bureaucratIc secrecy, nor Is there a persuasIve natIonaI securIty
ratIonaIe.
Source: Steven AItergood. "Secrecy Is 8ack In FashIon." 8uIIetIn oI the AtomIc ScIentIsts November-
December 2000. http:]]www.thebuIIetIn.org]artIcIe.phpZartoIn=nd00aItergood
EssentIaI Secrecy EssentIaI Secrecy EssentIaI Secrecy EssentIaI Secrecy
The condItIon achIeved Irom the denIaI oI crItIcaI InIormatIon to adversarIes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
CenuIne CenuIne CenuIne CenuIne NatIonaI SecurIty Secrecy NatIonaI SecurIty Secrecy NatIonaI SecurIty Secrecy NatIonaI SecurIty Secrecy pertaIns to that body oI InIormatIon whIch, II dIscIosed, couId actuaIIy
damage natIonaI securIty In some IdentIIIabIe way. OI course, thIs descrIptIon begs the crucIaI questIons
oI what "natIonaI securIty" Is, what constItutes "damage," and how the meanIng oI these two terms may
change over tIme. 8ut wIthout attemptIng to concIusIveIy deIIne natIonaI securIty, common sense suggests
that thIs category IncIudes thIngs IIke desIgn detaIIs oI advanced mIIItary technoIogIes, as weII as those
types oI InIormatIon that must remaIn secret In order Ior authorIzed dIpIomatIc and InteIIIgence IunctIons
to be perIormed. The sensItIvIty oI thIs kInd oI InIormatIon Is the reason we have a secrecy system In the
IIrst pIace, and when It Is workIng properIy the system posItIveIy serves the pubIIc Interest.
Source: Steven AItergood. "Secrecy Is 8ack In FashIon." 8uIIetIn oI the AtomIc ScIentIsts November-
December 2000. http:]]www.thebuIIetIn.org]artIcIe.phpZartoIn=nd00aItergood






367
Covernment Secrecy Covernment Secrecy Covernment Secrecy Covernment Secrecy
WIth the exceptIon oI the procedures Ior cIassIIyIng "nucIear-reIated InIormatIon" under the AtomIc
Energy Act and protectIng InteIIIgence "sources and methods" under the NatIonaI SecurIty Act, the
mechanIcs Ior protectIng natIonaI securIty InIormatIon have evoIved through a serIes oI executIve orders.
Over the past haII century, the Congress has pIayed onIy a IImIted roIe In any consIderatIon oI how the
system shouId IunctIon, IImItIng ItseII to occasIonaI oversIght hearIngs. The ExecutIve 8ranch has assumed
the authorIty both Ior structurIng the cIassIIIcatIon system and Ior decIdIng the grounds upon whIch
secrets shouId be created and maIntaIned. Thus, what commonIy Is reIerred to as 'government secrecy'
more properIy couId be termed 'admInIstratIve secrecy' or 'secrecy by reguIatIon.'

Source: Report oI the CommIssIon on ProtectIng and ReducIng Covernment Secrecy ("MoynIhan
CommIssIon"), Senate Document 105-2, 1997,
http:]]www.Ias.org]sgp]IIbrary]moynIhan]chap1.htmI
nteIIIgence Secrecy nteIIIgence Secrecy nteIIIgence Secrecy nteIIIgence Secrecy
The October 30 ODN news reIease went on to InsIst that "Any and aII subsIdIary InIormatIon concernIng
the NatIonaI nteIIIgence (NP) budget wIII not be dIscIosed as such dIscIosures couId harm natIonaI
securIty."

"Any and aII subsIdIary InIormatIon"Z ThIs ImpIIes, Ior exampIe, that II a breakdown oI the amount oI
money spent by the InteIIIgence communIty on decIassIIIcatIon actIvItIes were pubIIshed, It "couId harm
natIonaI securIty." 8ut that hardIy seems IIkeIy.

n a candId moment Iast year, ODN oIIIcIaIs admItted that they reaIIy don't know why they cIassIIy aII the
thIngs that they do. "There Is wIde varIance In appIIcatIon oI cIassIIIcatIon IeveIs," an InternaI ]anuary
2008 ODN study (pdI) obtaIned by Secrecy News Iound. "The deIInItIons oI 'natIonaI securIty' and what
constItutes 'InteIIIgence' -- and thus what must be cIassIIIed -- are uncIear."
Source: Secrecy News, FAS Project on Covernment Secrecy ssue No. 87, November 2, 2009,
http:]]www.Ias.org]bIog]secrecy]
nventIon Secrecy nventIon Secrecy nventIon Secrecy nventIon Secrecy
Whenever pubIIcatIon or dIscIosure by the grant oI a patent on an InventIon In whIch the Covernment has
a property Interest mIght, In the opInIon oI the head oI the Interested Covernment agency, be detrImentaI
to the natIonaI securIty, the CommIssIoner upon beIng so notIIIed shaII order that the InventIon be kept
secret and shaII wIthhoId the grant oI a patent thereIor under the condItIons set Iorth hereInaIter.
Whenever the pubIIcatIon or dIscIosure oI an InventIon by the grantIng oI a patent, In whIch the
Covernment does not have a property Interest, mIght, In the opInIon oI the CommIssIoner, be detrImentaI
to the natIonaI securIty, he shaII make the appIIcatIon Ior patent In whIch such InventIon Is dIscIosed






368
avaIIabIe Ior InspectIon to the AtomIc Energy CommIssIon, the Secretary oI DeIense, and the chIeI oIIIcer
oI any other department or agency oI the Covernment desIgnated by the PresIdent as a deIense agency oI
the UnIted States. Each IndIvIduaI to whom the appIIcatIon Is dIscIosed shaII sIgn a dated acknowIedgment
thereoI, whIch acknowIedgment shaII be entered In the IIIe oI the appIIcatIon.
Source: nventIon Secrecy Act oI 1951, http:]]www.Ias.org]sgp]othergov]InventIon]35usc17.htmI, FAS,
"nventIon Secrecy," http:]]www.Ias.org]sgp]othergov]InventIon]Index.htmI, Secrecy News FAS Project on
Covernment Secrecy. ssue No. 83, October 22, 2009, http:]]www.Ias.org]bIog]secrecy]

NucIear Secrecy NucIear Secrecy NucIear Secrecy NucIear Secrecy
See nIormatIon CrIme, nIormatIon CrImInaI, Leaks See nIormatIon CrIme, nIormatIon CrImInaI, Leaks See nIormatIon CrIme, nIormatIon CrImInaI, Leaks See nIormatIon CrIme, nIormatIon CrImInaI, Leaks
The IntentIonaI bIockIng, compartmentaIIzIng, conceaIment, controI, dIstortIng, hoardIng, censorIng, and
manIpuIatIon oI InIormatIon reIated to the numerous dImensIons oI hIstorIc and ongoIng atomIc or
nucIear IueI cycIe actIvItIes, IncIudIng access to InIormatIon reIated to poIIutIon, rIsk, pubIIc heaIth, waste,
and weapons deveIopment. NucIear secrecy Is InstItutIonaIIzed through bureaucratIc organIzatIon, statute,
reguIatIon, decree, securIty cIassIIIcatIon oI InIormatIon, Ianguage, controI oI the medIa, and InIormaI
practIces, carryIng wIth It some type oI penaIty Ior dIscIosure such as harassment, monetary IInes,
IncarceratIon, and other means oI sIIencIng IndIvIduaIs.

base my deIInItIon on SIsseIa 8ok's (1989) work on secrecy as the IntentIonaI conceaIment and bIockIng
oI InIormatIon, socIoIogIst Edward ShIIs' (1956) Idea oI secrecy as the "compuIsory wIthhoIdIng oI
knowIedge, reInIorced by the prospects oI sanctIons Ior dIscIosure, " Steven AItergood's characterIzatIon
oI specIIIc types oI secrecy [thIs sectIon], and recent deveIopments InvoIvIng recIassIIIcatIon oI CoId War
weapons data. ThIs deIInItIon Is aIso based on the penaItIes Ior dIscIosure oI "atomIc" InIormatIon under
the U.S. AtomIc Energy Act oI 1948 and 1954, as weII as the Iaws oI other countrIes [the UK and RussIan
FederatIon, Ior exampIe].

Source: DeIInItIon, Maret
57
; 8ok, Secrets: On the EthIcs oI ConceaIment and ReveIatIon. [New York: VIntage
8ooks]; ShIIs, The Torment oI Secrecy [CIencoe, L: The Free Press]; WIIIIam 8urr, Thomas S. 8Ianton, and
Stephen . Schwartz. "The Costs and Consequences oI NucIear Secrecy," [n Stephen Schwartz, (ed.) AtomIc
AudIt: The Costs and Consequences oI U.S. NucIear Weapons SInce 1940. 8rookIngs nstItute, 1998. 433-
483]; NatIonaI SecurIty ArchIve 8rIeIIng 8ook, WIIIIam 8urr (ed.). How Many and Where Are the Nukes,
August 18, 2006, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88197]Index.htm, Steven AItergood and
Frank N. von HIppeI, "The U.S. HIghIy EnrIched UranIum DecIaratIon: Transparency DeIerred but not
DenIed," http:]]cns.mIIs.edu]pubs]npr]voI14]141]141aItergood.pdI, CarroII QuIqIey, "NucIear rIvaIry and
the CoId War: 1945-1950," Tragedy and Hope: A HIstory oI the WorId In Our TIme [MacmIIIan, 1966], and

Thanks to RonaId A. Hardert Ph.D. Ior hIs assIstance In heIpIng me IIesh out the specIIIcs oI nuke
secrecy.






369
Car AIperovItz, The DecIsIon to Use the AtomIc 8omb and the ArchItecture oI an AmerIcan Myth [esp.
chapter 48, 'CensorshIp and Secrecy," KnopI, 1995].
PoIItIcaI Secrecy PoIItIcaI Secrecy PoIItIcaI Secrecy PoIItIcaI Secrecy, whIch reIers to the deIIberate and conscIous use oI cIassIIIcatIon authorIty Ior poIItIcaI
advantage, IrrespectIve oI any threat to natIonaI securIty. TypIcaIIy, the Intent here Is to shIeId an oIIIcIaI
or a vuInerabIe program Irom embarrassment or controversy.
ThIs Is the smaIIest oI the three categorIes but It Is the most dangerous to the poIItIcaI heaIth oI the
natIon. For exampIe, some oI the earIy research on the eIIects oI radIatIon exposure on human subjects
was expIIcItIy cIassIIIed to evade pubIIc controversy and IegaI IIabIIIty. [2] More recentIy, the cIassIIIcatIon
oI a Ietter wrItten by MT ProIessor Ted PostoI crItIcaI oI mIssIIe deIense technoIogy was most IIkeIy an
Instance oI poIItIcaI secrecy. [3]
Source: Steven AItergood. "Secrecy Is 8ack In FashIon." 8uIIetIn oI the AtomIc ScIentIsts November-
December 2000, http:]]www.thebuIIetIn.org]artIcIe.phpZartoIn=nd00aItergood
RetroactIve Secrecy RetroactIve Secrecy RetroactIve Secrecy RetroactIve Secrecy
See See See See RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon RecIassIIIcatIon
1. n UnIted States oI AmerIca, PIaIntIII v. The ProgressIve nc., ErwIn KnoII, SamueI Day, ]r., and
Howard MorIand, DeIendants, the PIaIntIII "advanced the concept oI retroactIve secrecy, decIarIng that
prevIousIy pubIIshed artIcIes contaIned secrets."

Source: Stephen HIIgartner, RIchard C. 8eII, and Rory O'Connor. Nukespeak. New York: PenguIn 8ooks,
1982. 66-71.
2. The government argues that Its natIonaI securIty Interest aIso permIts It to Impress
cIassIIIcatIon and censorshIp upon InIormatIon orIgInatIng In the pubIIc domaIn, II when drawn together,
synthesIzed and coIIated, such InIormatIon acquIres the character oI presentIng ImmedIate, dIrect and
IrreparabIe harm to the Interests oI the UnIted States.

DeIendants contend that the projected artIcIe mereIy contaIns data aIready In the pubIIc domaIn and
readIIy avaIIabIe to any dIIIgent seeker. They say other natIons aIready have the same InIormatIon or the
opportunIty to obtaIn It. How then, they argue, can they be In vIoIatIon oI 42 U.S.C. 2274(b) and 2280
whIch purport to authorIze InjunctIve reIIeI agaInst one who wouId dIscIose restrIcted data "wIth reason to
beIIeve such data wIII be utIIIzed to Injure the UnIted States or to secure an advantage to any IoreIgn
natIon . . ."Z

AIthough the government states that some oI the InIormatIon Is In the pubIIc domaIn, It contends that
much oI the data Is not, and that the MorIand artIcIe contaIns a core oI InIormatIon that has never beIore
been pubIIshed. Furthermore, the government's posItIon Is that whether or not specIIIc InIormatIon Is "In






370
the pubIIc domaIn" or has been "decIassIIIed" at some poInt Is not determInatIve. The government states
that a court must Iook at the nature and context oI prIor dIscIosures and anaIyze what the practIcaI Impact
oI the prIor dIscIosures are as contrasted to that oI the present reveIatIon.

The government IeeIs that the mere Iact that the author, Howard MorIand, couId prepare an artIcIe
expIaInIng the technIcaI processes oI thermonucIear weapons does not mean that those processes are
avaIIabIe to everyone. They Iay heavy emphasIs on the argument that the danger IIes In the exposItIon oI
certaIn concepts never heretoIore dIscIosed In conjunctIon wIth one another.

Source: UnIted States oI AmerIca, PIaIntIII, v. The ProgressIve nc., ErwIn KnoII, SamueI Day, ]r., and
Howard MorIand, DeIendants, 467 F. Supp. 990 and 486 F. Supp. 5; MIchaeI MacdonaId Mooney, ""RIght
Conduct" Ior a 'Free Press': the ContaInment oI Secrets," Harper's MagazIne 260 (March 1980): 35-45, and
The ProgressIve November 1979 Issue "The H-8omb Secret: How We Cot t and Why We're TeIIIng It," Issue
onIIne at: http:]]progressIve.org]Zq=node]2252
Secrecy In the PubIIc nterest, Secrecy In the PubIIc nterest, Secrecy In the PubIIc nterest, Secrecy In the PubIIc nterest, Not deIIned. ThIs statute amends the HousekeepIng Statute, estabIIshes
agency communIcatIon oI ruIes and actIvItIes vIa the FederaI RegIster. "PubIIc nIormatIon." Sec. 3. Except
to the extent that there Is InvoIved (1) any IunctIon oI the UnIted States requIrIng secrecy In the pubIIc
Interest or (2) any matter reIatIng soIeIy to the InternaI management oI an agency.

Source: 60 U.S. Statutes at Large 238 (1946) and LouIs FIsher. n the Name oI NatIonaI SecurIty: Unchecked
PresIdentIaI Power and the ReynoIds Case. Lawrence: UnIversIty Press oI Kansas, 2006.

StructuraI Secrecy StructuraI Secrecy StructuraI Secrecy StructuraI Secrecy
The way that patterns oI InIormatIon, organIzatIonaI structure, processes, and transactIons, and the
structure oI reguIatory reIatIons systematIcaIIy undermIne the attempts to know and Interpret sItuatIons In
aII organIzatIons. At NASA, structuraI secrecy conceaIed the serIousness oI the O-rIng probIem,
contrIbutIng to the persIstence oI the scIentIIIc paradIgm on whIch the beIIeI In acceptabIe rIsk was based.

Source: Vaughan, DIane. The ChaIIenger Launch DecIsIon: RIsky TechnoIogy, CuIture, and DevIance at
NASA. .. . ChIcago: UnIversIty oI ChIcago Press, 1996.

TacIt SIIence, or a PartIaI Secret TacIt SIIence, or a PartIaI Secret TacIt SIIence, or a PartIaI Secret TacIt SIIence, or a PartIaI Secret
Thompson (3) has wrItten on a type oI secrecy he caIIs tacIt sIIence, or a partIaI secret. ThIs type oI secrecy
Is somewhere between deep conceaIment and IuII dIscIosure, and based on the phIIosophy thIngs are
better IeIt unsaId. Thompson wrItes "such secrets are not compIeteIy conceaIed because theIr content may
be wIdeIy known or couId be wIdeIy known. 8ut theIr content Is not made expIIcIt, and Its not beIng made
expIIcIt Is necessary" Ior a poIIcy's eIIectIveness. Thompson has IdentIIIed three kInds oI tacIt
sIIences]partIaI secrets:







371
Excuses and NonenIorcement CompeIIed SIIence PoIItIcaI HypocrIsy

Source: DennIs F. Thompson. "DemocratIc Secrecy." PoIItIcaI ScIence QuarterIy 114 no. 2 (1999): 181-193.
Trade Secrets Trade Secrets Trade Secrets Trade Secrets
1. Any conIIdentIaI IormuIa, pattern, process, devIce, InIormatIon or compIIatIon oI InIormatIon
that Is used In an empIoyer's busIness, and that gIves the empIoyer an opportunIty to obtaIn an advantage
over competItors who do not know or use It.

Source: "CrImes and CrImInaI Procedure." 29 CFR 1910.1200; AppendIx D (CFR) sets out the crIterIa to be
used In evaIuatIng trade secrets. http:]]www.gpoaccess.gov]CFR]Index.htmI

2. "The EconomIc EspIonage Act oI 1996" made the theIt oI trade secrets a IederaI crImInaI
oIIense. EconomIc espIonage, as descrIbed In 1831, reIers to IoreIgn power-sponsored or -coordInated
InteIIIgence actIvIty, dIrected at the U.S. government or corporatIons, entItIes, or other IndIvIduaIs
operatIng In the UnIted States, Ior the purpose oI unIawIuIIy obtaInIng trade secrets Under the Act, the
F8's NatIonaI CounterInteIIIgence Center has authorIty to prosecute trade secret theIt In the UnIted States,
InternatIonaI and on the nternet.

Source: 18 U.S.C. 1831-1839, and PatrIck W. KeIIey. "The EconomIc EspIonage Act oI 1996."
http:]]www.IbI.gov]pubIIcatIons]Ieb]1997]juIy976.htm

VarIous Iormer KC8 C deIInItIons oI secrecy VarIous Iormer KC8 C deIInItIons oI secrecy VarIous Iormer KC8 C deIInItIons oI secrecy VarIous Iormer KC8 C deIInItIons oI secrecy
Sekretnaya InIormatsIya
InIormatIon and data whose open pubIIcatIon and dIscussIon Is IorbIdden by authorItIes and constItutes
sate secrets, and InIormatIon contaIned In oIIIcIaI documents and In scIentIIIc traInIng materIaIs whIch
bear a secrecy cIassIIIcatIon.

Sekretnost
a substantIaI characterIstIcs oI a pIece oI InIormatIon, whIch determInes the degree oI protectIon whIch
the adversary gIves It to prevent dIscIosure.

TaynopIs; secret wrItIng
The varIous means oI producIng InvIsIbIe manuscrIpts and typed texts whIch can onIy be read aIter specIaI
processIng.

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.







372
Secrecy Oaths Secrecy Oaths Secrecy Oaths Secrecy Oaths
House and Senate requIrements dIIIer wIth regard to secrecy oaths. At the begInnIng
oI the 104th Congress, the House adopted a secrecy oath Ior aII Members, oIIIcers, and
empIoyees oI the chamber. 8eIore any such person may have access to cIassIIIed
InIormatIon, he or she must "soIemnIy swear (or aIIIrm) that wIII not dIscIose any
cIassIIIed InIormatIon receIved In the course oI my servIce wIth the House oI
RepresentatIves, except as authorIzed by the House oI RepresentatIves or In accordance
wIth Its RuIes" (House RuIe XX, cIause 13, 108th Congress). PrevIousIy, a sImIIar oath
was requIred onIy Ior members and staII oI the House Permanent SeIect CommIttee on
nteIIIgence; thIs requIrement had been added In the 102nd Congress as part oI the SeIect CommIttee's
InternaI ruIes, IoIIowIng abortIve attempts to estabIIsh It In pubIIc Iaw.

Source: FrederIck M. KaIser. "ProtectIon oI CIassIIIed nIormatIon by Congress: PractIces and ProposaIs."
CRS Report to Congress ]anuary 11, 2006, http:]]www.Ias.org]sgp]crs]RS21900.pdI

Secrecy Order Secrecy Order Secrecy Order Secrecy Order
See nventIon Secrecy, Patents See nventIon Secrecy, Patents See nventIon Secrecy, Patents See nventIon Secrecy, Patents
The U.S. Patent & Trademark OIIIce (PTO) Is responsIbIe Ior revIewIng patent appIIcatIons and ImposIng
secrecy orders when dIscIosure oI an InventIon by pubIIcatIon oI a patent wouId be detrImentaI to the
natIonaI securIty. A secrecy order wIthhoIds the grant oI a patent, orders that the InventIon be kept In
secrecy and restrIcts IIIIng oI IoreIgn patent appIIcatIons.
A type 1 secrecy order appIIes to patent appIIcatIons contaInIng uncIassIIIed subject matter that cannot be
IawIuIIy exported under exIstIng U.S. export controI Iaws wIthout government approvaI. A type 1 secrecy
order Is onIy Imposed upon recommendatIon Irom the Department oI DeIense.
The Intent oI a type 2 secrecy order Is to treat cIassIIIed]cIassIIIabIe InIormatIon In a patent appIIcatIon In
the same manner as any other cIassIIIed materIaI under the SM. AccordIngIy, thIs secrecy order IncIudes
notIIIcatIon oI the cIassIIIcatIon IeveI oI the technIcaI data In the appIIcatIon, and provIdes a IeveI oI
protectIon at that cIassIIIcatIon IeveI.
A type 3 secrecy order Is used Ior patent appIIcatIons whIch contaIn technIcaI data that wouId be cIassIIIed
based upon Its technIcaI content, but cannot be cIassIIIed or pIaced under a type 2 secrecy order because
there Is no known government property Interest In the InventIon.
Source: FAS. "The Secrecy Order Program In the UnIted States Patent & Trademark OIIIce" (Rev. 6]27]91)
http:]]www.Ias.org]sgp]othergov]InventIon]program.htmI, and Herbert N. FoersteI. Secret ScIence:
FederaI ControI oI AmerIcan ScIence and TechnoIogy. Westport, CT: Praeger, 1993. 168-172.
Secret Secret Secret Secret






373
See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon
1. The cIassIIIcatIon IeveI between ConIIdentIaI and Top Secret appIIed to InIormatIon whose
unauthorIzed dIscIosure couId reasonabIy be expected to cause serIous damage to the natIonaI securIty.

Source: Los AIamos NatIonaI Lab. "DeIInItIons."
http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm

Secret Secret Secret Secret- -- -CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen
A cItIzen oI the UnIted States who has undergone a background InvestIgatIon by an authorIzed U.S.
Covernment Agency and been Issued a Secret securIty cIearance In accordance wIth ExecutIve Orders
12968 and 10450 and ImpIementIng guIdeIInes and standards pubIIshed In 32 CFR Part 147.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003. http:]]www.state.gov]m]a]dIr]regs]

Secret RestrIcted Data Secret RestrIcted Data Secret RestrIcted Data Secret RestrIcted Data
See 8orn CIassIIIed, RestrIcted Data See 8orn CIassIIIed, RestrIcted Data See 8orn CIassIIIed, RestrIcted Data See 8orn CIassIIIed, RestrIcted Data
nIormatIon cIassIIIed as Secret RestrIcted Data Is sImpIy whatever the DOE cIassIIIcatIon oIIIce ruIes as
cIassIIIed. t make no dIIIerence II the same InIormatIon Is weII known In open scIentIIIc journaIs; II the
DOE says that somethIng Is cIassIIIed It remaIns SRD even though every cItIzen In the country can read It
In a physIcs journaI or physIcs textbook.

Source: Hugh E. DewItt. "Statement." UnIted States. Congress. House. CommIttee on Covernment
OperatIons. SubcommIttee on Covernment nIormatIon and ndIvIduaI RIghts. . . . The Covernment's
CIassIIIcatIon oI PrIvate deas., (HearIngs beIore a SubcommIttee oI the CommIttee on Covernment
OperatIons, House oI RepresentatIves, NInety-sIxth Congress, second sessIon, February 28, March 20, and
August 21, 1980. 550. SUDOC: Y 4.C 74]7:C 74]5); aIso see "]oInt Statement Ior the House SubcommIttee
on Covernment nIormatIon and ndIvIduaI RIghts," C.E. Marsh, A. de VoIpI, T.A. PostoI, and C.S. StanIord,
561-571.

Secure CoIIaboratIve OperatIonaI Prototype EnvIronment]nvestIgatIve Data War Secure CoIIaboratIve OperatIonaI Prototype EnvIronment]nvestIgatIve Data War Secure CoIIaboratIve OperatIonaI Prototype EnvIronment]nvestIgatIve Data War Secure CoIIaboratIve OperatIonaI Prototype EnvIronment]nvestIgatIve Data Warehouse ehouse ehouse ehouse
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
FederaI 8ureau oI nvestIgatIon. AIIows the F8 to search muItIpIe data sources through one InterIace to
uncover terrorIst and crImInaI actIvItIes and reIatIonshIps. Data sources are a combInatIon oI structured
and unstructured text;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.






374

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004. http:]]www.gao.gov]htext]d04548.htmI

Secure FI Secure FI Secure FI Secure FIIght (Test Records) Ight (Test Records) Ight (Test Records) Ight (Test Records)


See Passenger Name Record Data See Passenger Name Record Data See Passenger Name Record Data See Passenger Name Record Data
1. Secure FIIght InvoIves the submIssIon oI a IImIted amount oI passenger InIormatIon by an
aIrcraIt operator to TSA whenever a reservatIon Is made Ior a IIIght In whIch the orIgIn and destInatIon are
domestIc aIrports. t Is Important to note that the InIormatIon coIIected by the aIrcraIt operators and
submItted to TSA wIII be used soIeIy Ior the purpose oI comparIng a subset oI the passenger reservatIon
data to watch IIsts. No other use oI the InIormatIon Is authorIzed. Under thIs new program, TSA wIII
compare the IdentIIyIng InIormatIon oI aIrIIne passengers contaIned In passenger name records (PNRs) to
the IdentIIyIng InIormatIon oI IndIvIduaIs In the TerrorIst ScreenIng Database oI the TerrorIst ScreenIng
Center
(TSC).

Source: TransportatIon SaIety AdmInIstratIon (TSA).[See the Wayback MachIne
http:]]www.archIve.org]web]web.php http:]]www.tsa.gov]pubIIc]Interapp]edItorIaI]edItorIaI1716.xmI;
FederaI RegIster 69 no.185 (September 24, 2004), http:]]www.gpoaccess.gov]Ir]

Secure FIIght was suspended In 2006. For background InIormatIon, see the EIectronIc PrIvacy nIormatIon
Center's Secure FIIght page, http:]]epIc.org]prIvacy]aIrtraveI]secureIIIght.htmI

SecurIty Category SecurIty Category SecurIty Category SecurIty Category
The characterIzatIon oI InIormatIon or an InIormatIon system based on an assessment oI the potentIaI
Impact that a Ioss oI conIIdentIaIIty, IntegrIty, or avaIIabIIIty oI such InIormatIon or InIormatIon system
wouId have an organIzatIonaI operatIons, organIzatIonaI assets, or IndIvIduaIs.

Source: FPS (FederaI nIormatIon ProcessIng Standard) PubIIcatIon 199. "Standards Ior SecurIty
CategorIzatIon oI FederaI nIormatIon and nIormatIon Systems." February 2004.
http:]]www.csrc.nIst.gov]pubIIcatIons]IIps]IIps199]FPS-PU8-199-IInaI.pdI

SecurIty CIassIIIcatIon SecurIty CIassIIIcatIon SecurIty CIassIIIcatIon SecurIty CIassIIIcatIon
See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon See CIassIIIcatIon

58
The precursor to Secure FIIght was the Computer AssIsted Passenger PrescreenIng System (CAPPS
). See ]eIIrey W. SeIIert, " , " , " , "Data MInIng and HomeIand SecurIty: An OvervIew" "" " Updated ]anuary 18, 2007,
http:]]opencrs.com]document]RL31798]2007-01-18








375

SecurIty CIassIIIcatIon DesIgnatIons SecurIty CIassIIIcatIon DesIgnatIons SecurIty CIassIIIcatIon DesIgnatIons SecurIty CIassIIIcatIon DesIgnatIons
ReIers to "Top Secret," and "Secret," and "ConIIdentIaI" desIgnatIons on cIassIIIed InIormatIon or materIaI.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

SecurIty CIearance(s) SecurIty CIearance(s) SecurIty CIearance(s) SecurIty CIearance(s)
See NondIscIosure Agreements See NondIscIosure Agreements See NondIscIosure Agreements See NondIscIosure Agreements
1. L Access AuthorIzatIons or CIearances L Access AuthorIzatIons or CIearances L Access AuthorIzatIons or CIearances L Access AuthorIzatIons or CIearances
a. L cIearances permIt an IndIvIduaI access, on a need-to-know basIs, to ConIIdentIaI RestrIcted
Data, Secret and ConIIdentIaI FormerIy RestrIcted Data, Secret and ConIIdentIaI NatIonaI SecurIty
nIormatIon provIded such InIormatIon Is not desIgnated cIassIIIed cryptographIc InIormatIon (CRYPTO),
other cIassIIIed communIcatIons securIty (COMSEC) InIormatIon, or SensItIve Compartmented nIormatIon;
and specIaI nucIear materIaI In quantItIes descrIbed In the DOE 5632 Order serIes, as requIred In the
perIormance oI oIIIcIaI dutIes.

When L access authorIzatIons or cIearances are granted to empIoyees oI access permIt hoIders, they are
IdentIIIed as L(X) access authorIzatIons or cIearances and permIt access onIy to the type oI ConIIdentIaI
RestrIcted Data specIIIed In the access permIt. 8ackground checks not as strIngent as In Q cIearance.

Source: DOE. PersonneI SecurIty Program,
http:]]www.Ias.org]Irp]DoDdIr]doe]o56312c]o56312ca2.htm

b. L access authorIzatIon means an access authorIzatIon granted by the CommIssIon that Is
normaIIy based on a natIonaI agency check wIth a Iaw and credIt InvestIgatIon (NACLC) or an access
natIonaI agency check and InquIrIes InvestIgatIon (ANAC) conducted by the OIIIce oI PersonneI
Management.

Source: NucIear ReguIatory CommIssIon (NRC) 10 CFR 25.5 "DeIInItIons,"
http:]]www.gpoaccess.gov]CFR]Index.htmI

c. The 1954 amended AtomIc Energy Act gave rIse to L cIearance, and gray areas oI InIormatIon
whIch are "Intended to gIve Industry readIer access to data necessary to gettIng Into the IIeId."

Source: Herbert S. Marks and Ceorge F. TrowbrIdge. "The ControI oI nIormatIon under the AtomIc Energy
Act oI 1954."8uIIetIn oI the AtomIc ScIentIsts 11 no.4 (1955): 128-130.

2. Q Access AuthorIzatIons or CIearances Q Access AuthorIzatIons or CIearances Q Access AuthorIzatIons or CIearances Q Access AuthorIzatIons or CIearances






376
a. Q cIearances permIt an IndIvIduaI to have access, on a need-to-know basIs, to Top Secret,
Secret, and ConIIdentIaI IeveIs oI RestrIcted Data, FormerIy RD.

Q (Q SensItIve) CIearance aIIows access to: Top Secret RestrIcted Data ~Top Secret FormerIy RestrIcted
Data ~Top Secret NatIonaI SecurIty nIormatIon ~ Secret RestrIcted Data ~ SpecIaI NucIear MaterIaI
(Category & ) ~ ExcIusIon Area Access

Q (NonsensItIve) CIearance gIves access to Iess sensItIve types oI SpecIaI NucIear MaterIaI. ndIvIduaIs
workIng wIth Q non-sensItIve cIearances aIso have armed guards statIoned nearby.

Source: Los AIamos NatIonaI Lab, http:]]www.IanI.gov]securIty]cIearances]Index.shtmI

b. Q access authorIzatIon means an access authorIzatIon granted by the CommIssIon normaIIy
based on a sIngIe scope background InvestIgatIon conducted by the OIIIce oI PersonneI Management, the
FederaI 8ureau oI nvestIgatIon, or other U.S. Covernment agency whIch conducts personneI securIty
InvestIgatIons.

Source: NucIear ReguIatory CommIssIon (NRC) 10 CFR 25.5 "DeIInItIons,"
http:]]www.gpoaccess.gov]CFR]Index.htmI

3. FacIIIty SecurIty CIearance (FCL) FacIIIty SecurIty CIearance (FCL) FacIIIty SecurIty CIearance (FCL) FacIIIty SecurIty CIearance (FCL)
Any IIrm or busIness under contract to the Department whIch requIre access to cIassIIIed InIormatIon wIII
need a IacIIIty securIty cIearance commensurate wIth the IeveI oI access requIred.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM570, "ndustrIaI SecurIty Program."
http:]]www.state.gov]m]a]dIr]regs]

4. Secret SecurIty CIearance Secret SecurIty CIearance Secret SecurIty CIearance Secret SecurIty CIearance
Cranted to those persons that have"need-to-know" natIonaI securIty InIormatIon, cIassIIIed at the
ConIIdentIaI or Secret IeveI. t Is generaIIy the most approprIate securIty cIearance Ior state and IocaI Iaw
enIorcement oIIIcIaIs that do not routIneIy work on an F8 Task Force or In an F8 IacIIIty. A Secret securIty
cIearance takes the Ieast amount oI tIme to process and aIIows Ior escorted access to F8 IacIIItIes.

Source: FederaI 8ureau oI nvestIgatIon (F8). SecurIty CIearance Process Ior State and LocaI Law
EnIorcement , http:]]www.IbI.gov]cIearance]securItycIearance.htm
5. Top Secret SecurIty CIearance Top Secret SecurIty CIearance Top Secret SecurIty CIearance Top Secret SecurIty CIearance
A Top Secret cIearance may be granted to those persons who have"need-to-know" natIonaI securIty
InIormatIon, cIassIIIed up to the Top Secret IeveI, and who need unescorted access to F8 IacIIItIes, when
necessary. ThIs type oI cIearance wIII most oIten be approprIate Ior Iaw enIorcement oIIIcers assIgned to






377
F8 Task Forces housed In F8 IacIIItIes. n addItIon to aII the requIrements at the Secret IeveI, a
background InvestIgatIon, coverIng a 10-year tIme perIod, Is requIred. Once IavorabIy adjudIcated Ior a
Top Secret securIty cIearance, the candIdate wIII be requIred to sIgn a Non-DIscIosure Agreement.
Source: FederaI 8ureau oI nvestIgatIon (F8). SecurIty CIearance Process Ior State and LocaI Law
EnIorcement, http:]]www.IbI.gov]cIearance]securItycIearance.htm

6. SometImes the CA must grant reguIators top secret cIearances and brIeI Inspectors IuIIy on
hIghIy sensItIve programs. The cIearance check requIres an extensIve background InvestIgatIon and,
thereIore, Is a IengthIer process than the routIne compIIance InspectIon descrIbed above. 9 The IeveI and
scope oI access the Agency aIIords these reguIators Is equaI to that granted to oIIIcIaIs In the InteIIIgence
communIty who have a "need to know" certaIn cIassIIIed securIty InIormatIon to perIorm specIaIIzed
natIonaI securIty IunctIons. ProtectIon oI cIassIIIed InIormatIon has not conIIIcted wIth the EPA's
perIormance oI Its compIIance oversIght In such Instances.

Source: R. 8radIord StIIes. "EnvIronmentaI Law and the CentraI nteIIIgence Agency: s There a ConIIIct
8etween Secrecy and EnvIronmentaI CompIIanceZ" New York UnIversIty Law ]ournaI 2 no. 2 (1993).
59

http:]]www1.Iaw.nyu.edu]journaIs]envtIIaw]Issues]voI2]Index.htmI

7. SecurIty cIearances and wrItten nondIscIosure agreements can be requIred Ior
congressIonaI staII but are handIed dIIIerentIy by the Senate and House. The Senate
OIIIce oI SecurIty mandates such requIrements Ior aII Senate empIoyees needIng access
to cIassIIIed InIormatIon. No comparabIe across-the-board requIrement Ior securIty
cIearances or secrecy agreements exIsts Ior House empIoyees. SecurIty cIearances Ior
staII and nondIscIosure agreements are requIred, however, Ior House oIIIces that IoIIow
the provIsIons oI ExecutIve Order 12968, governIng access In the executIve branch.

Source: FrederIck M. KaIser. "ProtectIon oI CIassIIIed nIormatIon by Congress: PractIces and ProposaIs."
CRS Report to Congress ]anuary 11, 2006. http:]]www.Ias.org]sgp]crs]RS21900.pdI

8. The NucIear ReguIatory CommIssIon (NRC) InstItuted new reguIatIons to gIve IndIvIduaIs
("Intervenors") assocIated wIth envIronmentaI and pubIIc Interest organIzatIons the abIIIty to access
cIassIIIed InIormatIon assocIated wIth NRC-reguIated actIvItIes, such as "potentIaI Intervenors In a hearIng
Ior a potentIaI hIgh-IeveI radIoactIve waste reposItory and (2) advanced reactor desIgn vendors."

59
As PauI WoIIowItz's Ieaked memo oI March 7, 2003 states envIronmentaI Iaws [CERCLA, CIean AIr Act,
CIean Water Act, CoastaI Zone Management Act, ESA, MarIne ProtectIon, Research and SanctuarIes Act,
PubIIc HeaIth ServIce Act, RCRA, SaIe Water DrInkIng Act, & TSCA] authorIze the PresIdent to exempt
IederaI agencIes Irom reportIng requIrements II It Is determIned the exemptIon Is In the "paramount
Interest oI the UnIted States" and "necessary reasons oI natIonaI securIty."






378

ntervenors wIII be Issued a securIty cIearance to IacIIItIes storIng cIassIIIed InIormatIon, and a background
check, as weII as beIng InIormed "that unauthorIzed dIscIosure oI cIassIIIed InIormatIon couId resuIt In
cIvII or crImInaI penaItIes. A person seekIng access to cIassIIIed InIormatIon must, In addItIon to havIng a
securIty cIearance, have a need to know the partIcuIar InIormatIon beIng sought."

Source: "NRC RevIses ReguIatIons on Access to CIassIIIed nIormatIon." http:]]www.nrc.gov]readIng-
rm]doc-coIIectIons]news]2005]05-087.htmI

SecurIty ControIs SecurIty ControIs SecurIty ControIs SecurIty ControIs
The management, operatIonaI and technIcaI controIs (I.e., saIeguards or countermeasures) prescrIbed Ior
an InIormatIon system to protect the conIIdentIaIIty, IntegrIty, and avaIIabIIIty oI the system and Its
InIormatIon.

The characterIzatIon oI InIormatIon or an InIormatIon system based on an assessment oI the potentIaI
Impact that a Ioss oI conIIdentIaIIty, IntegrIty, or avaIIabIIIty oI such InIormatIon or InIormatIon system
wouId have an organIzatIonaI operatIons, organIzatIonaI assets, or IndIvIduaIs.

Source: FPS (FederaI nIormatIon ProcessIng Standard) PubIIcatIon 199. "Standards Ior SecurIty
CategorIzatIon oI FederaI nIormatIon and nIormatIon Systems." February 2004,
http:]]csrc.nIst.gov]pubIIcatIons]IIps]IIps199]FPS-PU8-199-IInaI.pdI

SecurIty ndex SecurIty ndex SecurIty ndex SecurIty ndex
CustodIaI DetentIon cards wIII be known as SecurIty ndex. F8 agents were to contInue "to InvestIgate
dangerous and potentIaIIy dangerous" cItIzens and aIIens and to IIst them In the SecurIty ndex. SensItIve
that hIs InsubordInatIon couId be dIscovered, Hoover admonIshed F8 oIIIcIaIs that thIs renamed IIst was
to be "strIctIy conIIdentIaI and shouId at no tIme be mentIoned or aIIuded to In InvestIgatIve reports or
dIscussed wIth agencIes or IndIvIduaIs outsIde the 8ureau," wIth the exceptIon oI MD and ON oIIIcIaIs,
"and then onIy on a strIctIy conIIdentIaI basIs."
]uIy 13, 1943 Attorney CeneraI 8IddIe termInates the F8's CustodIaI DetentIon IIst. Hoover IormaIIy
compIIes wIth thIs order on August 14, 1943, but covertIy dIrects F8 oIIIcIaIs to change the name to
SecurIty ndex.
Source: Athan TheoharIs, ed. The F8: A ComprehensIve ReIerence CuIde. PhoenIx: Oryx Press, 1998. 21,
367.
SecurIty LabeI SecurIty LabeI SecurIty LabeI SecurIty LabeI






379
nIormatIon representIng the sensItIvIty oI a subject or object, such as Its hIerarchIcaI cIassIIIcatIon
(ConIIdentIaI, Secret, Top Secret) together wIth any appIIcabIe nonhIerarchIcaI securIty categorIes (e.g.,
sensItIve compartmented InIormatIon, crItIcaI nucIear weapons desIgn InIormatIon).

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

Securocracy Securocrat Securocracy Securocrat Securocracy Securocrat Securocracy Securocrat
See NatIonaI SecurIty State See NatIonaI SecurIty State See NatIonaI SecurIty State See NatIonaI SecurIty State
1. EmphasIs on (InIormatIon) secrecy, securIty cIassIIIcatIon oI InIormatIon, the creatIon oI new
secrets, recIassIIIcatIon oI InIormatIon, and InstItutIonaIIzed practIces oI compartmented access and
InIormatIon exemptIon; Secrecy bureaucracy.

Source: Steven AItergood, and Tom 8Ianton. "The Securocrats' Revenge." The NatIon 269 no. 5 (1999): 20.

2. Weber's (1958: 233) observatIon that the concept oI the oIIIcIaI secret Is the specIIIc InventIon
oI the bureaucracy, and nothIng Is so IanatIcaIIy deIended.

Source: H. H. Certh and C. WrIght MIIIs, ed. and trans, From Max Weber: Essays In SocIoIogy. New York:
OxIord UnIversIty Press, 1958.

SegregabIe and ReasonabIy SegregabIe nIormatIon SegregabIe and ReasonabIy SegregabIe nIormatIon SegregabIe and ReasonabIy SegregabIe nIormatIon SegregabIe and ReasonabIy SegregabIe nIormatIon
I a requested record contaIns materIaI covered by an exemptIon and materIaI that Is not exempt, and It Is
determIned under the procedures In thIs subpart to wIthhoId the exempt materIaI, any reasonabIy
segregabIe nonexempt materIaI shaII be separated Irom the exempt materIaI and reIeased.

Source: Source: Department oI ]ustIce "Freedom oI nIormatIon CuIde."
http:]]www.usdoj.gov]oIp]IoI-act.htm and http:]]www.usdoj.gov]oIp]IItIgatIon.htm#reasonabIy

SeIect Agent SensItIve nIormatIon SeIect Agent SensItIve nIormatIon SeIect Agent SensItIve nIormatIon SeIect Agent SensItIve nIormatIon
The portIon oI the NatIonaI Laboratory RegIstratIon and SeIect Agent Program InIormatIon that has been
determIned by the HHS OrIgInaI CIassIIIcatIon AuthorIty to be sensItIve but uncIassIIIed and Is prohIbIted
Irom pubIIc dIscIosure by PubIIc Law 107-188, PubIIc HeaIth SecurIty and 8IoterrorIsm Preparedness and
Response Act oI 2002. See aIso 42 USC 247d-6b (d).

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." 07]22]2005,
http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

SemantIc TraIIIc AnaIyzer SemantIc TraIIIc AnaIyzer SemantIc TraIIIc AnaIyzer SemantIc TraIIIc AnaIyzer






380
A soItware appIIcatIon [InstaIIed by NatIonaI SecurIty Agency's "secret room" InsIde AT&T's San FrancIsco
swItchIng oIIIce] that runs on standard 8M or DeII servers usIng the LInux operatIng system. t's renowned
wIthIn certaIn cIrcIes Ior Its abIIIty to Inspect traIIIc In reaI tIme on hIgh-bandwIdth pIpes, IdentIIyIng
packets oI Interest as they race by at up to 10 Cbps.

nternet companIes can InstaII the anaIyzers at every entrance and exIt poInt oI theIr networks, at theIr
"cores" or centers, or both. The anaIyzers communIcate wIth centraIIzed "IogIc servers" runnIng specIaIIzed
appIIcatIons. The combInatIon can keep track oI, anaIyze and record nearIy every Iorm oI Internet
communIcatIon, whether e-maII, Instant message, vIdeo streams or VOP phone caIIs that cross the
network.

Source: Robert Poe. "The UItImate Net MonItorIng TooI." WIred May 17, 2006.,
http:]]www.wIred.com]news]technoIogy]0,70914-0.htmI and Narus http:]]www.narus.com]

SenIor OIIIcIaI oI the nteIIIgence CommunIty (SOC) SenIor OIIIcIaI oI the nteIIIgence CommunIty (SOC) SenIor OIIIcIaI oI the nteIIIgence CommunIty (SOC) SenIor OIIIcIaI oI the nteIIIgence CommunIty (SOC)
The head oI an agency, oIIIce, bureau, other InteIIIgence eIement as IdentIIIed In SectIon 3 oI the NatIonaI
SecurIty Act oI 1947, as amended, 50 USC 401a(4), and SectIon 3.4(I) (1 through 6) oI ExecutIve Order
12333.

Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." ]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI

SensItIve SensItIve SensItIve SensItIve
1. nIormatIon pertaInIng to sIgnIIIcant Iaw enIorcement cases currentIy under InvestIgatIon;

CorruptIon (poIIce or other government oIIIcIaIs), or other sensItIve InIormatIon;
nIormant IdentIIIcatIon InIormatIon; and CrImInaI InteIIIgence reports whIch requIre strIct dIssemInatIon
and reIease crIterIa.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

2. RequIrIng specIaI protectIon Irom dIscIosure that couId cause embarrassment, compromIse, or
threat to the securIty oI the sponsorIng power. May be appIIed to an agency, InstaIIatIon, person, posItIon,
document, materIaI, or actIvIty.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 19
October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]







381
SensItIve 8ut UncIassIIIed nIormatIon SensItIve 8ut UncIassIIIed nIormatIon SensItIve 8ut UncIassIIIed nIormatIon SensItIve 8ut UncIassIIIed nIormatIon
1. "An overarchIng term: Loss oI, mIsuse oI, or unauthorIzed access to or modIIIcatIon oI couId
adverseIy aIIect the natIonaI Interest or the conduct oI IederaI programs, or the prIvacy to whIch
IndIvIduaIs are entItIed to under SectIon 552a oI TItIe 5 as amended, but whIch has not been specIIIcaIIy
authorIzed under crIterIa estabIIshed by an ExecutIve Order or an act oI Congress to be kept secret In the
deIense oI natIonaI Interest or IoreIgn poIIcy."

The IoIIowIng Department oI HomeIand SecurIty InIormatIon categorIes IaII under S8U:
For OIIIcIaI Use OnIy (FOUO)
OIIIcIaI Use OnIy (OUO)
SensItIve HomeIand SecurIty nIormatIon (SHS)
LImIted OIIIcIaI Use (LOU)
Law EnIorcement SensItIve (LES)
SaIeguardIng nIormatIon (SC)
UncIassIIIed NucIear nIormatIon (UCN)
Any other InIormatIon agencIes use to categorIze InIormatIon as sensItIve but uncIassIIIed.

Source: FAS. "Department oI HomeIand SecurIty Non-DIscIosure Agreement."
http:]]www.Ias.org]sgp]othergov]dhs-nda.pdI

2. S8U descrIbes InIormatIon whIch warrants a degree oI protectIon and admInIstratIve controI
that meets the crIterIa Ior exemptIon Irom pubIIc dIscIosure ser Iorth under SectIon 552 and 552a oI TItIe
5 U.S.C., the Freedom oI nIormatIon Act and the PrIvacy Act. S8U InIormatIon IncIudes, but Is not IImIted
to:

(1)MedIcaI, personneI, IInancIaI, InvestIgatory, vIsa, Iaw enIorcement, or other InIormatIon whIch, II
reIeased, couId resuIt In harm or unIaIr treatment to any IndIvIduaI or group, or couId have a negatIve
Impact upon IoreIgn poIIcy or reIatIons; and
(2)nIormatIon oIIered under condItIons oI conIIdentIaIIty whIch arIses In the courser oI a deIIberatIve
process (or a cIvII dIscovery process), IncIudIng attorney-cIIent prIvIIege or work product, and InIormatIon
arIsIng Irom advIce and counseI oI subordInates to poIIcy makers.

Source: UnIted States. Department oI State. VoIume 12 FAM 540. "SensItIve 8ut UncIassIIIed nIormatIon
(S8U)." http:]]www.state.gov]m]a]dIr]regs]

3. SensItIve 8ut UncIassIIIed" (IormerIy "LImIted OIIIcIaI Use") InIormatIon. SensItIve 8ut
UncIassIIIed (S8U) InIormatIon Is InIormatIon orIgInated wIthIn the Department oI State that warrants a
degree oI protectIon and admInIstratIve controI and meets the crIterIa Ior exemptIon Irom mandatory
pubIIc dIscIosure under the Freedom oI nIormatIon Act. 8eIore 26 May 1995, thIs InIormatIon was
desIgnated and marked "LImIted OIIIcIaI Use (LOU)." The LOU desIgnatIon wIII no Ionger be used.






382

Source: DoD. DOD 5200.1-R nIormatIon SecurIty Program. AppendIx C,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm

4. n response to technoIogIcaI deveIopments In cryptography, computer systems securIty, on
September 17, 1984, RonaId Reagan sIgned NatIonaI SecurIty DecIsIon DIrectIve 145 (NSDD-145). The
NSDD-145 authorIzed NSA to deveIop means to protect "uncIassIIIed sensItIve" InIormatIon. NSDD-145
permItted NSA to controI the dIssemInatIon oI government, government-derIved, and even non-
government InIormatIon that mIght adverseIy aIIect "natIonaI securIty;" some InterpretatIons oI the
DIrectIve IncIude broad deIInItIons oI InIormatIon that shouId be protected such as "aII InIormatIon"
IncIuded In scIentIIIc and technoIogy [transIer] that resIdes In pubIIc IIbrarIes and databases such as
DIaIog, LexIs-NexIs and other commercIaI products. AccordIng to the EIectronIc PrIvacy nIormatIon
Center (EPC), thIs was "the IIrst tIme In Its thIrty-two year hIstory, the NSA was assIgned responsIbIIItIes
outsIde Its tradItIonaI IoreIgn eavesdroppIng and mIIItary and dIpIomatIc communIcatIons securIty roIes."
60


Source: "CrItIcaI nIrastructure ProtectIon and the Endangerment oI CIvII LIbertIes: An Assessment oI the
PresIdent's CommIssIon on CrItIcaI nIrastructure ProtectIon (PCCP)," EIectronIc PrIvacy nIormatIon Center
WashIngton, D.C. 1998, http:]]epIc.org]reports]epIc-cIp.htmI , and U.S. NatIonaI CommIssIon on LIbrarIes
and nIormatIon ScIence (NCLS). HearIng on SensItIve 8ut Not CIassIIIed nIormatIon. May 28, 1987.
SUDOC: Y 3.L 61:2 H 35

5. UncIassIIIed InIormatIon may onIy be shared wIth IndIvIduaIs who are determIned to have a
"need to know" It. Furthermore, DHS empIoyees and contractors must sIgn a specIaI Non-DIscIosure
Agreement beIore receIvIng access to uncIassIIIed FOUO InIormatIon. DHS dIrectIve (MD 11042)

Source: "SaIeguardIng SensItIve 8ut UncIassIIIed (For OIIIcIaI Use OnIy) nIormatIon," May 11, 2004,
(obtaIned by Secrecy News through the Freedom oI nIormatIon Act.)
and http:]]www.Ias.org]sgp]othergov]dhs-sbu.htmI ; superseded by MD 11042.1, ]anuary 5, 2005. . . .
6. The "sensItIve but uncIassIIIed" desIgnatIon Is appIIed to uncIassIIIed InIormatIon that may be
exempt Irom mandatory reIease to the pubIIc under FOA. (For the nIne FOA exemptIons, see the FOA
deIInItIon In thIs sectIon.) S8U Is the IormaI desIgnatIon Ior InIormatIon that, by Iaw or reguIatIon, requIres

60
NSDD-145 states: "ThIs DIrectIve estabIIshes InItIaI objectIves oI poIIcIes, and an organIzatIonaI
structure to guIde the conduct oI natIonaI actIvItIes dIrected toward saIeguardIng systems whIch process
or communIcate sensItIve InIormatIon Irom hostIIe expIoItatIon." ; at (10) "dentIIy categorIes oI sensItIve
non-government InIormatIon, the Ioss oI whIch couId adverseIy aIIect the natIonaI securIty Interest, and
recommend steps to protect such InIormatIon. " FAS, PresIdentIaI DIrectIves and ExecutIves Orders,
http:]]www.Ias.org]Irp]oIIdocs]nsdd145.htm







383
some Iorm oI protectIon but Is outsIde the IormaI system oI cIassIIIcatIon, In accordance wIth ExecutIve
Order 12958, as amended.
Source: Centers Ior DIsease ControI. "SensItIve 8ut UncIassIIIed nIormatIon."
February 2006, http:]]www.Ias.org]sgp]othergov]cD.C.-sbu-2006.htmI

7. n addItIon to InIormatIon that couId reasonabIy be expected to assIst In the deveIopment or
use oI weapons oI mass destructIon, whIch shouId be cIassIIIed or recIassIIIed as descrIbed In Parts and
above, departments and agencIes maIntaIn and controI sensItIve InIormatIon reIated to AmerIca's
homeIand securIty that mIght not meet one or more oI the standards Ior cIassIIIcatIon set Iorth In Part 1 oI
ExecutIve Order 12958. The need to protect such sensItIve InIormatIon Irom InapproprIate dIscIosure
shouId be careIuIIy consIdered, on a case-by-case basIs, together wIth the beneIIts that resuIt Irom the
open and eIIIcIent exchange oI scIentIIIc, technIcaI, and IIke InIormatIon.

Source: Andrew Card. ("The Card Memo") "CuIdance on HomeIand SecurIty nIormatIon ssued." March 21,
2002, , [See the Wayback MachIne, http:]]tInyurI.com]ycvby6e ]
8. CuIdeIIne 3 - StandardIze Procedures Ior SensItIve 8ut UncIassIIIed nIormatIon To promote and
enhance the eIIectIve and eIIIcIent acquIsItIon, access, retentIon, productIon, use, management, and
sharIng oI SensItIve 8ut UncIassIIIed (S8U) InIormatIon, IncIudIng homeIand securIty InIormatIon, Iaw
enIorcement InIormatIon, and terrorIsm InIormatIon, procedures and standards Ior desIgnatIng, markIng,
and handIIng S8U InIormatIon (coIIectIveIy "S8U procedures") must be standardIzed across the FederaI
Covernment. S8U procedures must promote approprIate and consIstent saIeguardIng oI the InIormatIon
and must be approprIateIy shared wIth, and accommodate and reIIect the ImperatIve Ior tImeIy and
accurate dIssemInatIon oI terrorIsm InIormatIon to, State, IocaI, and trIbaI governments, Iaw enIorcement
agencIes, and prIvate sector entItIes. ThIs eIIort must be consIstent wIth ExecutIve Orders 13311 and
13388, sectIon 892 oI the HomeIand SecurIty Act oI 2002, sectIon 1016 oI RTPA, sectIon 102A oI the
NatIonaI SecurIty Act oI 1947, the Freedom oI nIormatIon Act, the PrIvacy Act oI 1974, and other
appIIcabIe Iaws and executIve orders and dIrectIves.
(I) WIthIn 90 days aIter the date oI thIs memorandum, each executIve department and agency wIII conduct
an Inventory oI Its S8U procedures, determIne the underIyIng authorIty Ior each entry In the Inventory, and
provIde an assessment oI the eIIectIveness oI Its exIstIng S8U procedures. The resuIts oI each Inventory
shaII be reported to the DN, who shaII provIde the compIIed resuIts to the Secretary oI HomeIand SecurIty
and the Attorney CeneraI.
Source: WhItehouse Press ReIease. "CuIdeIInes and RequIrements In Support oI the nIormatIon SharIng
EnvIronment." December 16, 2005, http:]]www.Ias.org]sgp]news]2005]12]wh121605-memo.htmI
and FAS. Secrecy News December 20, 2005,
http:]]www.Ias.org]sgp]news]secrecy]2005]12]122005.htmI






384

9. DHS Form 11000-6, SensItIve 8ut UncIassIIIed nIormatIon NondIscIosure Agreement (NDA), as
a condItIon oI access to such InIormatIon. Others not contractuaIIy obIIgated to DHS, but to whom access
to InIormatIon wIII be granted, may be requested to execute an NDA as determIned by the appIIcabIe
program manager.
The revIsed DHS poIIcy InvaIIdates prevIousIy sIgned NDAs. Pursuant to the revIsed poIIcy, DHS OIIIce oI
SecurIty wIII deveIop and ImpIement an educatIon and awareness program Ior the saIeguardIng oI S8U
InIormatIon. Once the program Is deveIoped and approprIate notIIIcatIons are provIded, aII empIoyees wIII
partIcIpate In cIassroom or computer-based traInIng sessIons desIgned to educate empIoyees on what
constItutes S8U InIormatIon.

Source: Department oI HomeIand SecurIty Management DIrectIve 11042
http:]]www.Ias.org]sgp]othergov]dhs-sbu-rev.pdI; DHS Management DIrectIve 11042.1, revIsed ]anuary
6, 2005, http:]]www.Ias.org]sgp]othergov]dhs20050111.pdI and FAS. Secrecy News ]anuary 12, 2005.
http:]]www.Ias.org]sgp]news]secrecy]2005]01]011205.htmI

10. UsIng targeted FOA requests and research, the ArchIve gathered data on the InIormatIon
protectIon poIIcIes oI 37 major agencIes and components. OI the agencIes and components anaIyzed, onIy
8 oI 37 (or 22Z) have poIIcIes that are authorIzed by statute or reguIatIon whIIe the majorIty (24 out oI 37,
or 65Z) IoIIow InIormatIon protectIon poIIcIes that were generated InternaIIy, Ior exampIe by dIrectIve or
other InIormaI guIdance. EIeven agencIes reported no poIIcy regardIng sensItIve uncIassIIIed InIormatIon
or provIded no documents responsIve to the ArchIve's request.

Among the agencIes and components that together handIe the vast majorIty oI FOA requests In the
IederaI government, 28 dIstInct poIIcIes Ior protectIon oI sensItIve uncIassIIIed InIormatIon exIst: some
poIIcIes conIIate InIormatIon saIeguardIng markIngs wIth FOA exemptIons and some IncIude deIInItIons
Ior protected InIormatIon rangIng Irom very broad or vague to extremeIy Iocused or IImIted.

Source: NatIonaI SecurIty ArchIve. PSEUDO-SECRETS: A Freedom oI nIormatIon AudIt oI the U.S.
Covernment's PoIIcIes on SensItIve UncIassIIIed nIormatIon. March 2006.
http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88183]S8UZ20ReportZ20IInaI.pdI, and
CenevIeve ]. Knezo. "SensItIve 8ut UncIassIIIed" nIormatIon and Other ControIs: PoIIcy and OptIons Ior
ScIentIIIc and TechnIcaI nIormatIon." CRS Report to Congress February 15, 2006,
http:]]www.Ias.org]sgp]crs]secrecy]RL33303.pdI

11. CAO revIewed 56 dIIIerent sensItIve but uncIassIIIed desIgnatIons (16 oI whIch beIong to one
agency - NOTE: S8U categorIes by agency Is IncIuded In the report NOTE: S8U categorIes by agency Is IncIuded In the report NOTE: S8U categorIes by agency Is IncIuded In the report NOTE: S8U categorIes by agency Is IncIuded In the report) to protect InIormatIon that they deem
crItIcaI to theIr mIssIons-Ior exampIe, sensItIve Iaw or drug enIorcement InIormatIon or controIIed
nucIear InIormatIon. For most desIgnatIons there are no governmentwIde poIIcIes or procedures that
descrIbe the basIs on whIch an agency shouId assIgn a gIven desIgnatIon and ensure that It wIII be used






385
consIstentIy Irom one agency to another. WIthout such poIIcIes, each agency determInes what
desIgnatIons and assocIated poIIcIes to appIy to the sensItIve InIormatIon It deveIops or shares. More than
haII the agencIes reported chaIIenges In sharIng such InIormatIon.

Source: CAO. nIormatIon SharIng: The FederaI Covernment Needs to EstabIIsh PoIIcIes and Processes
Ior SharIng TerrorIsm-ReIated and SensItIve but UncIassIIIed nIormatIon.
CAO-06-385, March 2006, http:]]www.gao.gov]new.Items]d06385.pdI

AIso see Secrecy News ]anuary 16, 2008, "Pentagon TackIes ControI on UncIassIIIed nIormatIon"
http:]]www.Ias.org]bIog]secrecy]2008]01]pentagontackIescontroIsonu.htmI

12. S8U InIormatIon Is currentIy shared accordIng to an ungoverned body oI poIIcIes and
practIces that conIuse both Its producers and users. Across the FederaI Covernment today more than
100 unIque markIngs and over 130 dIIIerent IabeIIng or handIIng processes and procedures are used
Ior S8U InIormatIon. The resuIt Is an unmanageabIe coIIectIon oI S8U sharIng practIces that Impede
the proper IIow oI InIormatIon between FederaI, SLT, and prIvate sector partners. ThIs Is a natIonaI
concern because the terrorIst threat to the natIon requIres that many communItIes oI Interest, at
dIIIerent IeveIs oI government, share thIs vItaI but sensItIve InIormatIon.

AIthough the PresIdent's approvaI oI the new CU Iramework means that, Ior the SE, aII S8U
InIormatIon Is now CU, In thIs Report we contInue to use the terms InterchangeabIy because oI the
deep hIstorIcaI roots oI the term "S8U." Over tIme, however, the term CU wIII repIace S8U.

Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

13. AIthough the CU Framework Is Intended to Improve the sharIng oI onIy terrorIsm-reIated
InIormatIon, the Task Force concIuded that a sIngIe, standardIzed Iramework Ior markIng,
saIeguardIng, and dIssemInatIng aII ExecutIve 8ranch S8U Is requIred to Iurther the goaIs oI:
standardIzIng currentIy dIsparate termInoIogy and procedures (represented by over 107
dIstInct S8U regImes);
IacIIItatIng InIormatIon-sharIng through the promuIgatIon oI common and understandabIe
ruIes Ior InIormatIon protectIon and dIssemInatIon;
and enhancIng government transparency through poIIcIes and traInIng that cIarIIy the
standards Ior protectIng InIormatIon wIthIn the Framework. (p. vIII)

Source: Report and RecommendatIons oI the PresIdentIaI Task Force on ControIIed UncIassIIIed
nIormatIon, August 25, 2009, http:]]www.dhs.gov]xIIbrary]assets]cuItaskIorcerpt.pdI
NOTE: NOTE: NOTE: NOTE: A comprehensIve IIst oI S8U MarkIngs CurrentIy In Use Is Iocated In AppendIx 2.



386
SensItIve by AggregatIon SensItIve by AggregatIon SensItIve by AggregatIon SensItIve by AggregatIon
ReIers to the Iact that InIormatIon on one sIte may seem unImportant, but when combIned wIth
InIormatIon Irom other web sItes, It may Iorm a Iarger and more compIete pIcture that was neIther
Intended nor desIred. SImIIarIy, the compIIatIon oI a Iarge amount oI InIormatIon together on one sIte
may Increase the sensItIvIty oI that InIormatIon and make It more IIkeIy that sIte wIII be accessed by
those seekIng InIormatIon that can be used agaInst the government.

Source: Centers Ior DIsease ControI. "ManuaI CuIde - nIormatIon SecurIty CD.C.-02."
OIIIce oI SecurIty and Emergency Preparedness "SensItIve 8ut UncIassIIIed nIormatIon." Part 8.
07]22]2005, http:]]www.Ias.org]sgp]othergov]cD.C.-sbu.pdI.

SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC) SensItIve Compartmented nIormatIon (SC)
See See See See Codewords Codewords Codewords Codewords
1. Reagan NatIonaI SecurIty DecIsIon DIrectIve 84, "SaIeguardIng NatIonaI SecurIty nIormatIon"
(March 11, 1983) dIrected "aII persons wIth access to SensItIve Compartmented nIormatIon (SC) shaII
be requIred to sIgn a nondIscIosure agreement as a condItIon oI access to SC and other cIassIIIed
InIormatIon, and that thIs partIcuIar agreement must IncIude a provIsIon Ior prepubIIcatIon revIew oI
wrItIng Ior pubIIc consumptIon to assure deIetIon oI SC and other cIassIIIed InIormatIon."

Source: FAS. NatIonaI SecurIty DecIsIon DIrectIves, http:]]www.Ias.org]Irp]oIIdocs]nsdd]nsdd-
084.htm

2. Further restrIcts access to the most sensItIve InIormatIon by ImposIng specIaI controIs, or
"compartments" oI InIormatIon Ior a specIIIc IunctIon. SC Is gIven code words, and coIors. EIIte
groups, who are subject to more strIngent background checks, are gIven the code words to access
each compartment. CIassIIIed nteIIIgence nIormatIon concernIng or derIved Irom InteIIIgence
sources, methods, or anaIytIcaI processes, whIch Is requIred to be handIed wIthIn IormaI access
controI systems estabIIshed by the DIrector oI CentraI nteIIIgence.

Source: DeIense SecurIty ServIce. NatIonaI ndustrIaI SecurIty Program,
http:]]www.Ias.org]sgp]IIbrary]nIspom]chap09.htm, and 50 U.S.C.15 Subchapter V 435a,
http:]]www.gpoaccess.gov]uscode]browse.htmI

3. CIassIIIed nIormatIon concernIng or derIved Irom InteIIIgence sources, methods, or
anaIytIcaI processes, whIch Is requIred to be handIed wIthIn IormaI access controI systems estabIIshed
by the DIrector or CentraI nteIIIgence. ThIs term does not IncIude RestrIcted Data as deIIned In
SectIon , PubIIc Law 83-703, and AtomIc Energy Act oI 21954 as amended.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents."
October 4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

4. AII InIormatIon and materIaIs bearIng specIaI communIty controIs IndIcatIng restrIcted
handIIng wIthIn present and Iuture communIty InteIIIgence coIIectIon programs and theIr end products
Ior whIch communIty systems oI compartmentatIon have been or wIII be IormaIIy estabIIshed. (These


387
controIs are over and above the provIsIons oI DOD 5200.1-R, nIormatIon SecurIty Program
ReguIatIon.)

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

5. SpecIaI access programs and sensItIve compartmented InIormatIon that Iorms Its most
hIghIy guarded subset are the uItImate In securIty conIusIon. They represent an uItrasecret
cIassIIIcatIon deIIned by a set oI codes and markIngs Imposed by IndIvIduaI IederaI agencIes on
exIstIng cIassIIIcatIon categorIes.these new IeveIs oI above top secret have conIused even poIItIcaI
Ieaders.

Source: Herbert N. FoersteI. Secret ScIence: FederaI ControI oI AmerIcan ScIence and TechnoIogy.
Westport, CT: Praeger, 1993.

6. SC reIers to InIormatIon that Is derIved Irom InteIIIgence sources and methods. t Is
protected under procedures estabIIshed by the DIrector oI CentraI nteIIIgence.

Source: FAS. Secrecy News September 4, 2001,
http:]]www.Ias.org]sgp]news]secrecy]2001]09]090401.htmI

Types oI SC Types oI SC Types oI SC Types oI SC:
Covered Covered Covered Covered CIassIIIed MaterIaI CIassIIIed MaterIaI CIassIIIed MaterIaI CIassIIIed MaterIaI

Any materIaI cIassIIIed at the SensItIve CompartmentaIIzed nIormatIon (SC) IeveI.

Source: War and NatIonaI DeIense. 50 U.S.C. 15 Subchapter V 435a,
http:]]www.gpoaccess.gov]uscode]browse.htmI

Non Non Non Non- -- -AccountabIe SC AccountabIe SC AccountabIe SC AccountabIe SC

SC (sensItIve compartmented InIormatIon) that does not requIre document accountabIIIty.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents."
October 4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

TK TK TK TK

UncIassIIIed term to descrIbe a type oI SC.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents."
October 4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

SensItIve Compartmented nIormatIon (SC) ControI Systems]Codewords SensItIve Compartmented nIormatIon (SC) ControI Systems]Codewords SensItIve Compartmented nIormatIon (SC) ControI Systems]Codewords SensItIve Compartmented nIormatIon (SC) ControI Systems]Codewords


388
An SC ControI System Is the system oI proceduraI protectIve mechanIsms used to reguIate or guIde
each program estabIIshed by the D.C. as SC. A ControI System provIdes the abIIIty to exercIse
restraInt, dIrectIon, or InIIuence over or provIde that degree oI access controI or physIcaI protectIon
necessary to reguIate, handIe or manage InIormatIon or Items wIthIn an approved program.

The three SC ControI Systems IncIuded In the regIster are: 8YE, COMNT and TALENT KEYHOLE.

Source: DoD. "nteIIIgence CommunIty CIassIIIcatIon and ControI MarkIngs mpIementatIon,"
http:]]www.Ias.org]sgp]othergov]IcmarkIngs.ppt

SensItIve Compartmented nIormatIon FacIIIty (SCF) SensItIve Compartmented nIormatIon FacIIIty (SCF) SensItIve Compartmented nIormatIon FacIIIty (SCF) SensItIve Compartmented nIormatIon FacIIIty (SCF)
1. AccredIted area, room, or group oI rooms, buIIdIngs, or InstaIIatIon where SC may be
stored, used, dIscussed, and ]or processed.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

2. An accredIted area, room, group oI rooms, or InstaIIatIon where sensItIve compartmented
InIormatIon (SC) may be stored, used, dIscussed, and]or eIectronIcaIIy processed. SensItIve
compartmented InIormatIon IacIIIty (SCF) proceduraI and physIcaI measures prevent the Iree access oI
persons unIess they have been IormaIIy IndoctrInated Ior the partIcuIar SC authorIzed Ior use or
storage wIthIn the SCF. AIso caIIed SCF. See aIso sensItIve compartmented InIormatIon.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

SensItIve HomeIand SecurIty nIormatIo SensItIve HomeIand SecurIty nIormatIo SensItIve HomeIand SecurIty nIormatIo SensItIve HomeIand SecurIty nIormatIon (SHS) n (SHS) n (SHS) n (SHS)
See HomeIand SecurIty nIormatIon, SensItIve 8ut UncIassIIIed See HomeIand SecurIty nIormatIon, SensItIve 8ut UncIassIIIed See HomeIand SecurIty nIormatIon, SensItIve 8ut UncIassIIIed See HomeIand SecurIty nIormatIon, SensItIve 8ut UncIassIIIed
1. SectIon 392 oI the HomeIand SecurIty Act oI 2002 requIred the PresIdent to prescrIbe and
ImpIement procedures by whIch agencIes wouId "IdentIIy and saIeguard homeIand securIty
InIormatIon that Is sensItIve but uncIassIIIed." A U.S. Covernment oIIIcIaI who spoke to Secrecy News
on condItIon oI anonymIty stated that a government-wIde poIIcy on protectIng SHS "has been
perIodIcaIIy dIscussed, pushed cIose to some actIon, and then sent back Ior Iurther study. There are a
dozen hard and Iast deadIInes that have been mIssed on thIs whoIe subject. thInk It's IaIr to say It's
dead. The concept Is not dead but It's hIghIy unIIkeIy anythIng wIII come oI It."

8ecause Congress IaIIed to deIIne the statutory meanIng oI "sensItIve," crItIcs IncIudIng the FederatIon
oI AmerIcan ScIentIsts were concerned that the estabIIshment oI the "SensItIve HomeIand SecurIty
nIormatIon" (SHS) category was an InvItatIon to IormaIIze
the IndIscrImInate wIthhoIdIng oI InIormatIon. MeanwhIIe, however, he [the oIIIcIaI] saId that a
separate Interagency InItIatIve was underway to deIIne and reguIate the even broader category oI
"sensItIve but uncIassIIIed" InIormatIon. CIven that agencIes were unabIe to reach consensus on the
deIInItIon oI terrorIsm-reIated SHS, It wIII be "exponentIaIIy more dIIIIcuIt" to come to agreement on
the vastIy Iarger and more amorphous domaIn oI "sensItIve but uncIassIIIed" InIormatIon, he saId.


389

Source: FAS Project on Covernment Secrecy. "The DemIse oI SensItIve HomeIand SecurIty nIo." No.
113 December 12, 2005, http:]]www.Ias.org]sgp]news]secrecy]2005]12]121205.htmI
2. EstabIIshed In the HomeIand SecurIty Act oI 2002, whIch "caIIs Ior us to IdentIIy and
saIeguard homeIand securIty InIormatIon that Is sensItIve, but uncIassIIIed." The reguIatIons
governIng thIs category have not been compIeted.
Source: Remarks by Secretary RIdge to the AssocIatIon oI AmerIcan UnIversItIes
http:]]www.dhs.gov]xnews]speeches]speech0104.shtm ; AIIce R. 8uckhaIter, ]ohn CIbbs, and
MarIeke LewIs. "Laws and ReguIatIon CovernIng the ProtectIon oI SensItIve 8ut UncIassIIIed
nIormatIon." FederaI Research DIvIsIon, LIbrary oI Congress. September 2004,
http:]]www.Ioc.gov]rr]Ird]pdI-IIIes]sbu.pdI ; Andrew Card. ("The Card Memo") "CuIdance on
HomeIand SecurIty nIormatIon ssued," March 21, 2002, [See the Wayback MachIne,
http:]]web.archIve.org]web]20080306140939]http:]]www.usdoj.gov]oIp]IoIapost]2002IoIapost10.h
tm ]

3. Rep. Sabo, the top Democrat on the HomeIand SecurIty SubcommIttee, oIIered an
amendment to the Department oI HomeIand SecurIty FY06 IundIng bIII, requIrIng DHS to cIarIIy "SS"
poIIcy and procedure, IncIudIng whIch staII may approprIateIy have desIgnatIon authorIty. The
amendment aIso wIthhoIds $10 mIIIIon untII the Department documents and justIIIes Its use. The
amendment was approved by the ApproprIatIons CommIttee.

Source: Press ReIease "Sabo Amendment Addresses Abuse oI "SS" DesIgnatIon wIthIn the DHS." May
10, 2005, http:]]www.Ias.org]sgp]news]2005]05]sabo051005.htmI

SensItIve nIormatIon SensItIve nIormatIon SensItIve nIormatIon SensItIve nIormatIon
1. a. The Computer SecurIty Act oI 1987 estabIIshed requIrements Ior protectIon oI certaIn
InIormatIon In FederaI Covernment automated InIormatIon systems (AS). ThIs InIormatIon Is reIerred
to as "sensItIve" InIormatIon, deIIned In the Act as: "Any InIormatIon, the Ioss, mIsuse, or
unauthorIzed access to or modIIIcatIon oI whIch couId adverseIy aIIect the natIonaI Interest or the
conduct oI FederaI programs, or the prIvacy to whIch IndIvIduaIs are entItIed under sectIon 552a oI
tItIe 5, UnIted States Code (the PrIvacy Act), but whIch has not been specIIIcaIIy authorIzed under
crIterIa estabIIshed by an ExecutIve order or an Act oI Congress to be kept secret In the Interest oI
natIonaI deIense or IoreIgn poIIcy."
b. Two aspects oI thIs deIInItIon deserve attentIon. FIrst, the Act appIIes onIy to uncIassIIIed
InIormatIon that deserves protectIon. Second, unIIke most other programs Ior protectIon oI
InIormatIon, the Act Is concerned wIth protectIng the avaIIabIIIty and IntegrIty, as weII as the
conIIdentIaIIty oI InIormatIon. Much oI the InIormatIon whIch IIts the Act's deIInItIon oI "sensItIve" IaIIs
wIthIn the other categorIes oI InIormatIon dIscussed In thIs AppendIx. Some does not.

Source: DoD. DOD 5200.1-R nIormatIon SecurIty Program. AppendIx C,
http:]]Ias.org]Irp]doddIr]dod]5200-1r]appendIxc.htm



390
2. CIassIIIed or SensItIve UncIassIIIed nIormatIon.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty.
"SaIeguards and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
3. Any InIormatIon, the Ioss, or mIsuse, or unauthorIzed access to whIch wouId or couId
adverseIy aIIect the organIzatIonaI and]or natIonaI Interest but whIch does not meet crIterIa specIIIed
In DoD 5200.1R (reIerence (c)).

Source: Department oI DeIense. DoD 5200.1-M. AcquIsItIon Systems ProtectIon Program. March 1994,
http:]]www.dtIc.mII]whs]dIrectIves]corres]pdI]52001m0394]p52001m.pdI

SensItIve nteIIIgence nIormatIon SensItIve nteIIIgence nIormatIon SensItIve nteIIIgence nIormatIon SensItIve nteIIIgence nIormatIon
Such InteIIIgence InIormatIon, the unauthorIzed dIscIosure oI whIch wouId Iead to counteractIon,

(1) ]eopardIzIng the contInued productIvIty oI InteIIIgence sources or methods whIch provIde
InteIIIgence vItaI to the natIonaI securIty; or (2) OIIsettIng the vaIue oI InteIIIgence vItaI to the natIonaI
securIty.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc
SecurIty Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

SensItIve PosItIon SensItIve PosItIon SensItIve PosItIon SensItIve PosItIon
Any posItIon wIthIn the Department oI the Army the occupant oI whIch couId brIng about by vIrtue oI
the nature oI the posItIon a materIaI adverse eIIect on the natIonaI securIty. Such posItIons IncIude any
duty or responsIbIIIty whIch requIre access to top secret, secret or conIIdentIaI InIormatIon or
materIaI, or any other posItIon so desIgnated by the Secretary oI the Army or hIs desIgnee.

Source: Department oI the Army DIctIonary oI UnIted States Army Terms. Army ReguIatIon 310-25.
October,1983, http:]]www.Ias.org]Irp]doddIr]army]ar310-25.pdI

SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1 SensItIve SecurIty nIormatIon (SS) (1- -- - TSA TSA TSA TSA) )) )
The TransportatIon SaIety AdmInIstratIon, created In 2001 by the AvIatIon and TransportatIon SecurIty
Act, November 19, 2001 (P.L. 107-71), has authorIty to wIthhoId certaIn InIormatIon Irom pubIIc
dIscIosure as weII as deveIop reguIatIons regardIng the estabIIshment oI reguIatIons regardIng SS.
The Code oI FederaI ReguIatIons outIInes what constItutes SS: n accordance wIth 49 U.S.C. 114(s), SS
Is

InIormatIon obtaIned or deveIoped In the conduct oI securIty actIvItIes,
IncIudIng research and deveIopment, the dIscIosure oI whIch TSA has
determIned wouId--
(1) ConstItute an unwarranted InvasIon oI prIvacy (IncIudIng, but not IImIted to, InIormatIon
contaIned In any personneI, medIcaI, or sImIIar IIIe);


391
(2) ReveaI trade secrets or prIvIIeged or conIIdentIaI InIormatIon obtaIned Irom any person; or
(3) 8e detrImentaI to the securIty oI transportatIon. [contInued]

SoIIenberger (6: 2004b) poInts out, SS Is "born protected." That Is, SS reguIatIons "prohIbIt TSA Irom
makIng avaIIabIe to the pubIIc any transportatIon InIormatIon 'obtaIned or deveIoped durIng securIty
actIvItIes, or research and deveIopment actIvItIes.' (see number 15, above). CIassIIyIng NS (natIonaI
securIty InIormatIon) requIres government oIIIcIaIs to determIne, pursuant to EO 12958 "that the
document contaIns natIonaI securIty, InteIIIgence, or IoreIgn reIatIons InIormatIon "that quaIIIIes as
beIng wIthheId Irom pubIIc dIscIosure.

2. CommentIng on the postIng oI "an outdated, uncIassIIIed versIon oI a Standard OperatIng
Procedures document.to the FederaI 8usIness OpportunItIes Web sIte" (TSA), FAS remarked that
".exIstIng IegaI authorItIes cannot easIIy be used to compeI the removaI oI such records Irom pubIIc
websItes, and that any attempt to do so wouId IIkeIy be counterproductIve, and wouId ItseII do
damage to press Ireedom and other socIetaI vaIues."

Source: TSA, "TSA Statement on PostIng oI OperatIons Document,"
http:]]www.tsa.gov]press]happenIngs]standardoperatIngprocedures.shtm and FAS, "DIscIosure oI
TSA ManuaI StIrs Leak AnxIety," Secrecy News December 10, 2009,
http:]]www.Ias.org]bIog]secrecy]2009]12]IeakanxIety.htmI

10.25.2006 10.25.2006 10.25.2006 10.25.2006: The HomeIand SecurIty ApproprIatIons Act [2007] IncIude provIsIons that documents
categorIzed as "sensItIve securIty InIormatIon" (SS) be reIeased aIter three years.

Source: 49 CFR 1520.5. TransportatIon SecurIty AdmInIstratIon, Department oI HomeIand SecurIty.
http:]]www.gpoaccess.gov]cIr]Index.htmI; MItcheI SoIIenberger. "SensItIve SecurIty nIormatIon (SS)
and TransportatIon SecurIty: 8ackground and ControversIes." CRS Report Ior Congress February 5,
2004a, http:]]www.IIrstamendmentcenter.org]pdI]CRS.securIty1.pdI ; "SensItIve SecurIty nIormatIon
and TransportatIon SecurIty: ssues and CongressIonaI OptIons." CRS Report Ior Congress ]une 9,
2004b, http:]]www.Ias.org]sgp]crs]RL32425.pdI ; CAO-05-677. "TransportatIon SecurIty
AdmInIstratIon: CIear PoIIcIes and OversIght Needed Ior DesIgnatIon oI SensItIve SecurIty nIormatIon."
]une 2005, http:]]www.gao.gov]hIghIIghts]d05677hIgh.pdI; Steven AItergood. "The Secrets oI FIIght."
SIate November 18, 2004, http:]]sIate.msn.com]Id]2109922] ; HaroId ReIyea. "SecurIty CIassIIIed
and ControIIed nIormatIon: HIstory, Status, and EmergIng Management ssues." CRS Report to
Congress ]une 26, 2006, http:]]www.Ias.org]sgp]crs]secrecy]RL33494.pdI , and CIna MarIe Stevens
and Todd 8. TateIman. "ProtectIon oI SecurIty-ReIated nIormatIon." CRS Report Ior Congress
September 27, 2006, http:]]www.Ias.org]sgp]crs]secrecy]RL33670.pdI

2. The conIerees are concerned that because oI InsuIIIcIent management controIs,
InIormatIon that shouId be In the pubIIc domaIn may be unnecessarIIy wIthheId Irom pubIIc scrutIny.
The conIerees requIre the Secretary to ensure that each approprIate oIIIce has an oIIIcIaI wIth the cIear
authorIty to desIgnate documents as SS and to provIde cIear guIdance as to what Is SS materIaI and
what Is not. DesIgnatIon means an orIgInaI determInatIon made by a IImIted number oI appoInted
oIIIcIaIs pursuant to 49 CFR Sec. 1520.5(b (1)-(16)). The conIerees dIrect the Secretary to report to the


392
CommIttees not Iater than ]anuary 3, 2006, the tItIes oI aII documents that are desIgnated by DHS as
SS In theIr entIrety durIng the perIod begInnIng October 1, 2005, and endIng December 31, 2005, and
a IuII-year report each year thereaIter.

Source: House oI RepresentatIves. ConIerence Report on H.R. 2360, Department oI HomeIand SecurIty
ApproprIatIons Act, 2006. H. Report 109-241.
http:]]www.Ias.org]sgp]congress]2005]dhs-ssI.htmI and Thomas
http:]]thomas.Ioc.gov]cgI-bIn]query]FZr109:1:.]temp]~r1093OrAas:e111888:

SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 SensItIve SecurIty nIormatIon (SS) (2 - -- - USDA) USDA) USDA) USDA)
See For OIIIcIaI Use OnIy, SensItIve 8ut UncIassIIIed See For OIIIcIaI Use OnIy, SensItIve 8ut UncIassIIIed See For OIIIcIaI Use OnIy, SensItIve 8ut UncIassIIIed See For OIIIcIaI Use OnIy, SensItIve 8ut UncIassIIIed
UncIassIIIed InIormatIon oI a sensItIve nature, that II pubIIcIy dIscIosed couId be expected to have a
harmIuI Impact on the securIty oI FederaI operatIons or assets, the pubIIc heaIth or saIety oI the
cItIzens oI the UnIted States or Its resIdents, or the natIon's Iong-term economIc prosperIty; and whIch
descrIbes, dIscusses, or reIIects:
1. The abIIIty oI any eIement oI the crItIcaI InIrastructure oI the UnIted States to resIst IntrusIon,
InterIerence, compromIse, theIt, or IncapacItatIon by eIther physIcaI or computer-based
attack or other sImIIar conduct that vIoIates FederaI, State, or IocaI Iaw; harms Interstate,
InternatIonaI commerce oI the UnIted States; or, threatens pubIIc heaIth or saIety;
2. Any currentIy vIabIe assessment, projectIon, or estImate oI the securIty vuInerabIIIty oI any
eIement oI the crItIcaI InIrastructure oI the UnIted States, specIIIcaIIy IncIudIng, but not
IImIted to vuInerabIIIty assessment, securIty testIng, rIsk evaIuatIon, rIsk-management
pIannIng, or rIsk audIt;
3. Any currentIy appIIcabIe operatIonaI probIem or soIutIon regardIng the securIty oI any
eIement oI the crItIcaI InIrastructure oI the UnIted States, specIIIcaIIy IncIudIng but not IImIted
to the repaIr, recovery, redesIgn, reconstructIon, reIocatIon, Insurance, and contInuIty oI
operatIons oI any eIement;
4. The IoIIowIng categorIes are provIded Ior IIIustratIon purposes onIy as exampIes oI the types
oI InIormatIon (regardIess oI Iormat) that may be categorIzed as SS:
1. PhysIcaI securIty status oI USDA IaboratorIes, research centers, IIeId IacIIItIes, etc.,
whIch may aIso contaIn vuInerabIIItIes;
2. nvestIgatIve and anaIytIcaI materIaIs concernIng InIormatIon about physIcaI securIty
at USDA IacIIItIes such as the above-named IacIIItIes;
3. nIormatIon that couId resuIt In physIcaI rIsk to IndIvIduaIs;
4. nIormatIon that couId resuIt In serIous damage to crItIcaI IacIIItIes and]or
InIrastructures;
5. Cyber SecurIty nIormatIon, whIch IncIudes, but Is not IImIted to
a. Network DrawIngs or PIans
b. Program and System SecurIty PIans
c. MIssIon CrItIcaI and SensItIve nIormatIon TechnoIogy (T) Systems and
AppIIcatIons
d. CapItaI PIannIng and nvestment ControI Data (-TPS)
e. T ConIIguratIon Management Data and LIbrarIes


393
I. T RestrIcted Space (DrawIngs, PIans and EquIpment SpecIIIcatIons as weII as
actuaI space)
g. ncIdent and VuInerabIIIty Reports
h. RIsk Assessment Reports, CheckIIsts, Trusted FacIIItIes ManuaI and SecurIty
Users CuIde
I. Cyber SecurIty PoIIcy CuIdance and ManuaI Chapters
USDA reIers to uncIassIIIed sensItIve InIormatIon as "SensItIve SecurIty nIormatIon" (SS), and says
"basIcaIIy, It's to be treated the same as "SensItIve 8ut UncIassIIIed nIormatIon" or "For OIIIcIaI Use
OnIy nIormatIon."

Source: U.S. Department oI AgrIcuIture (U.S.D.A.). DR 3440-2 "ControI and ProtectIon oI SensItIve
SecurIty nIormatIon." ]anuary 30, 2003, http:]]www.da.usda.gov]pdsd]ssI.htm, and HaroId ReIyea.
"SecurIty CIassIIIed and ControIIed nIormatIon: HIstory, Status, and EmergIng Management ssues."
CRS Report to Congress ]une 26, 2006, http:]]www.Ias.org]sgp]crs]secrecy]RL33494.pdI

2. The conIerees are concerned that because oI InsuIIIcIent management controIs,
InIormatIon that shouId be In the pubIIc domaIn may be unnecessarIIy wIthheId Irom pubIIc scrutIny.
The conIerees requIre the Secretary to ensure that each approprIate oIIIce has an oIIIcIaI wIth the cIear
authorIty to desIgnate documents as SS and to provIde cIear guIdance as to what Is SS materIaI and
what Is not. DesIgnatIon means an orIgInaI determInatIon made by a IImIted number oI appoInted
oIIIcIaIs pursuant to 49 CFR Sec. 1520.5(b (1)-(16)). The conIerees dIrect the Secretary to report to the
CommIttees not Iater than ]anuary 3, 2006, the tItIes oI aII documents that are desIgnated by DHS as
SS In theIr entIrety durIng the perIod begInnIng October 1, 2005, and endIng December 31, 2005, and
a IuII-year report each year thereaIter.

Source: House oI RepresentatIves. ConIerence Report on H.R. 2360, Department oI HomeIand SecurIty
ApproprIatIons Act, 2006. H. Report 109-241,
http:]]www.Ias.org]sgp]congress]2005]dhs-ssI.htmI and Thomas
http:]]thomas.Ioc.gov]cgI-bIn]query]FZr109:1:.]temp]~r1093OrAas:e111888:
SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3 SensItIve SecurIty nIormatIon (3- -- -DHS) DHS) DHS) DHS)
n an attempt to IImIt unnecessary controIs on uncIassIIIed InIormatIon, Congress Iast year requIred
the Department oI HomeIand SecurIty to IdentIIy by tItIe aII DHS documents that were marked as
"SensItIve SecurIty nIormatIon" (SS) that may not be pubIIcIy dIscIosed. n response, the IIrst DHS
report to Congress IIsted approxImateIy one thousand tItIes that had been marked as SS between
October 1 and December 31, 2005.
A copy oI that report has just been reIeased wIth mInor redactIons In response to a Freedom oI
nIormatIon Act request Irom the FederatIon oI AmerIcan ScIentIsts.

Source: Secrecy News, "DHS IIsts 'sensItIve securIty InIormatIon tItIes,'" "Department oI HomeIand
SecurIty Documents DesIgnated In TheIr EntIrety as SensItIve SecurIty nIormatIon (SS), October 1 Thru
December 31, 2005," http:]]www.Ias.org]sgp]othergov]dhs]ssI-tItIes.pdI


394

SensItIve SIte ExpIoItatIon SensItIve SIte ExpIoItatIon SensItIve SIte ExpIoItatIon SensItIve SIte ExpIoItatIon
A reIated serIes oI actIvItIes InsIde a captured sensItIve sIte to expIoIt personneI documents, eIectronIc
data, and materIaI captured at the sIte, whIIe neutraIIzIng any threat posed by the sIte or Its contents.
AIso caIIed SSE.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon SensItIve UncIassIIIed nIormatIon
1. nIormatIon Ior whIch dIscIosure, Ioss, mIsuse, aIteratIon, or destructIon couId adverseIy
aIIect natIonaI securIty or governmentaI Interests. NatIonaI securIty Interests are those uncIassIIIed
matters that reIate to the natIonaI deIense or IoreIgn reIatIons oI the U.S. Covernment. CovernmentaI
Interests are those reIated, but not IImIted to the wIde range oI government or government-derIved
economIc, human, IInancIaI, IndustrIaI, agrIcuIture, technoIogIcaI, and Iaw-enIorcement InIormatIon,
as weII as the prIvacy or conIIdentIaIIy oI personaI or commercIaI proprIetary InIormatIon provIded by
the U.S. Covernment by Its cItIzens.
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty.
"SaIeguards and SecurIty CIossary oI Terms." December 18, 1995.
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI
2. nIormatIon whIch, eIther aIone or In the aggregate, meets any oI the IoIIowIng
crIterIa and Is deemed sensItIve by the Department oI State, and must be protected In accordance
wIth the magnItude oI Its Ioss or harm that couId resuIt Irom Inadvertent or deIIberate dIscIosure,
aIteratIon or destructIon oI the data:
MedIcaI, personneI, IInancIaI, InvestIgatIve or any other InIormatIon the reIease oI whIch
wouId resuIt In substantIaI harm, embarrassment, InconvenIence, or unIaIr treatment to the
Department or any IndIvIduaI on whom the InIormatIon Is maIntaIned, such as InIormatIon
protected by 5 U.S.C. 522a;
nIormatIon reIatIng to the Issuance or reIusaI oI vIsas or permIts to enter the UnIted States,
as stated In SectIon 222, 8 U.S.C. 1202;
nIormatIon whIch may jeopardIze the physIcaI saIety oI Department IacIIItIes, personneI and
theIr dependents, as weII as U.S. cItIzens abroad;
ProprIetary, trade secrets, commercIaI or IInancIaI InIormatIon the reIease oI whIch
wouId pIace the company or IndIvIduaI on whom the InIormatIon Is maIntaIned at a competItIve
dIsadvantage;
nIormatIon the reIease oI whIch wouId have a negatIve eIIect on IoreIgn poIIcy or
reIatIons
nIormatIon reIatIng to oIIIcIaI traveI to IocatIons deemed to have a terrorIst threat;
nIormatIon consIdered mIssIon-crItIcaI to an oIIIce or organIzatIon, but whIch Is not natIonaI
securIty InIormatIon; and
nIormatIon whIch couId be manIpuIated to commIt Iraud.


395

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12 FAM 090, "DeIInItIons oI DIpIomatIc
SecurIty Terms." November 13, 2003. http:]]www.state.gov]m]a]dIr]regs]

SentIment AnaIysIs SentIment AnaIysIs SentIment AnaIysIs SentIment AnaIysIs
1. A consortIum oI major unIversItIes, usIng HomeIand SecurIty Department money, Is
deveIopIng soItware that wouId Iet the government monItor negatIve opInIons oI the UnIted States or
Its Ieaders In newspapers and other pubIIcatIons overseas. Such a "sentIment anaIysIs" Is Intended to
IdentIIy potentIaI threats to the natIon, securIty oIIIcIaIs saId.

Source: ErIc LIpton, "SoItware 8eIng DeveIoped to MonItor OpInIons oI U.S." New York TImes October
4, 2006, https:]]www.nytImes.com]2006]10]04]us]04monItor.htmIZr=1

2. CS proIessors CIaIre CardIe and LIIIIan Lee are workIng on sentIment-anaIysIs technoIogIes
Ior extractIng and summarIzIng opInIons Irom unstructured human-authored documents. They
envIsIon systems that (a) IInd revIews, edItorIaIs, and other expressIons oI opInIon on the Web and (b)
create condensed versIons oI the materIaI or graphIcaI summarIes oI the overaII consensus.

Source: CorneII UnIversIty, "SentIment AnaIysIs,"
http:]]www.cs.corneII.edu]Events]40years]pg2627.pdI

Server In the Sky Server In the Sky Server In the Sky Server In the Sky
The F8 toId the CuardIan: "Server In the Sky Is an F8 InItIatIve desIgned to Ioster the advanced search
and exchange oI bIometrIc InIormatIon on a gIobaI scaIe. WhIIe It Is currentIy In the concept and
desIgn stages, once compIete It wIII provIde a technIcaI Iorum Ior member natIons to submIt bIometrIc
search requests to other natIons. t wIII maIntaIn a core hoIdIng oI the worId's 'worst oI the worst'
IndIvIduaIs. Any IdentIIIcatIon oI these peopIe wIII be sent as a prIorIty message to the requestIng
natIon."

Source: Owen 8owcott, "F8 wants Instant access to 8rItIsh IdentIty data," The CuardIan ]anuary 15,
2008, http:]]www.guardIan.co.uk]uk]2008]jan]15]worId.ukcrImeR and Ichard Koman, "'Server In the
Sky' F8 InternatIonaI bIometrIc db pIanned," ZDNet ]anuary 14, 2008,
http:]]government.zdnet.com]Zp=3605

Seven Member R Seven Member R Seven Member R Seven Member RuIe uIe uIe uIe
1. An ExecutIve agency, on request oI the CommIttee on Covernment OperatIons oI the House
oI RepresentatIves, or oI any seven members thereoI, or on request oI the CommIttee on
CovernmentaI AIIaIrs oI the Senate, or any IIve members thereoI, shaII submIt any InIormatIon
requested oI It reIatIng to any matter wIthIn the jurIsdIctIon oI the commIttee.

Source: 5 U.S.C. 2954. "nIormatIon to CommIttees oI Congress on Request."
http:]]www.Iaw.corneII.edu]uscode]htmI]uscode05]uscsec0500002954----000-.htmI



396
2. As a matter oI IegaI InterpretatIon, the Department oI ]ustIce has taken the posItIon that
the Seven Member RuIe does not entItIe members oI the Covernment ReIorm CommIttee to
InIormatIon Irom the executIve branch. As a matter oI practIce, however, IederaI agencIes have
commonIy compIIed wIth requests under the Seven Member RuIe.

The 8ush AdmInIstratIon, however, has resIsted provIdIng members InIormatIon under the Seven
Member RuIe, IorcIng CommIttee members to InItIate IItIgatIon on two separate occasIons to enIorce
theIr rIghts. The IIrst case InvoIved census records. On AprII 6, 2001, eIghteen members oI the
Covernment ReIorm CommIttee used the Seven Member RuIe to request the adjusted data Ior the
2000 DecennIaI Census Irom the department oI Commerce. The request was made because the
Department had prepared both an unadjusted data set and a data set adjusted Ior sampIIng errors,
but had onIy reIeased the unadjusted data. The 8ush AdmInIstratIon rejected the request.

Source: U.S. House oI RepresentatIves. CommIttee on Covernment ReIorm. "Secrecy In the 8ush
AdmInIstratIon." September 14, 2004. 82-83,
http:]]democrats.reIorm.house.gov]Ieatures]secrecyreport]pdI]pdIsecrecyreport.pdI

ShIeId Laws ShIeId Laws ShIeId Laws ShIeId Laws
Absent a statutory or constItutIonaI recognItIon oI journaIIsts' prIvIIege, a
reporter may be compeIIed to testIIy In IegaI, admInIstratIve, or other governmentaI
proceedIngs. ThIrty-three states and the DIstrIct oI CoIumbIa have recognIzed a
journaIIsts' prIvIIege through enactment oI press "shIeId Iaws," whIch protect the
reIatIonshIp between reporters, theIr source, and sometImes, the InIormatIon that may
be communIcated In that reIatIonshIp.1 Another 16 states have recognIzed a
journaIIsts' prIvIIege through court decIsIons; WyomIng Is the onIy state that has no
IegIsIatIveIy or judIcIaIIy adopted journaIIsts' prIvIIege. The journaIIsts' prIvIIege Is
dIstInct Irom other recognIzed prIvIIeges In that It vests onIy wIth the journaIIst, not
wIth the source oI the InIormatIon.

Source: Henry Cohen," ]ournaIIsts' PrIvIIege to WIthhoId nIormatIon In ]udIcIaI and Other ProceedIngs:
State ShIeId Statutes," CRS Report to Congress ]une 27, 2007,
http:]]www.Ias.org]sgp]crs]secrecy]RL32806.pdI

SCMA CategorIe SCMA CategorIe SCMA CategorIe SCMA CategorIes ss s
See CIassIIIcatIon MarkIngs ControI MarkIngs, FormerIy RestrIcted Data, RestrIcted Data See CIassIIIcatIon MarkIngs ControI MarkIngs, FormerIy RestrIcted Data, RestrIcted Data See CIassIIIcatIon MarkIngs ControI MarkIngs, FormerIy RestrIcted Data, RestrIcted Data See CIassIIIcatIon MarkIngs ControI MarkIngs, FormerIy RestrIcted Data, RestrIcted Data
1. WIthIn the RestrIcted Data and FormerIy RestrIcted Data categorIes, SCMA desIgnates
degrees oI access to InIormatIon concernIng the desIgn, manuIacture, or utIIIzatIon oI nucIear
weapons or nucIear expIosIve devIces. There are 16 categorIes oI SCMA [see
http:]]www.Ias.org]sgp]othergov]doe]sIgmas.htmI]
Source: Department oI Energy. OIIIce oI SecurIty AIIaIrs. OIIIce oI SaIeguards and SecurIty.
"SaIeguards and SecurIty CIossary oI Terms." December 18, 1995,
http:]]www.dIrectIves.doe.gov]pdIs]doe]doetext]neword]470]m4704-7.pdI


397
2. SIgma 16, whIch wouId entaII Increased protectIon Ior certaIn InIormatIon, emerged Irom
Iormer Energy Secretary HazeI O'Leary's "hIgher Iences" InItIatIve back In 1997 and even earIIer.
CurrentIy, InIormatIon on the desIgn, manuIacture and utIIIzatIon oI nucIear weapons Is broken down
Into 15 so-caIIed SIgma categorIes. The present deIInItIons oI these categorIes, as weII as that oI the
pendIng SIgma 16, may be Iound here: http:]]www.Ias.org]sgp]othergov]doe]sIgmas.htmI
Source: FAS. Secrecy News September 4, 2001,
http:]]www.Ias.org]sgp]news]secrecy]2001]09]090401.htmI

3. SIgmas are categorIes oI InIormatIon reIated to the desIgn, manuIacture, or utIIIzatIon oI
atomIc weapons or nucIear expIosIve devIces that requIre dIIIerent or more strIngent protectIon.
SIgma 16 wIII be a new category comprIsed oI documents contaInIng 1. nucIear weapons desIgn
specIIIcatIons that wouId permIt the reproductIon and IunctIon oI the weapons, and 2. aggregatIons oI
desIgn InIormatIon that provIde comprehensIve InsIght Into nucIear weapons capabIIIty, vuInerabIIIty,
or desIgn phIIosophIes.

Source: UnIted States. CeneraI AccountIng OIIIce. NucIear SecurIty: DOE Needs to mprove ControI over
CIassIIIed nIormatIon. WashIngton, D.C.: U.S. CeneraI AccountIng OIIIce, 2001,
http:]]www.gao.gov]new.Items]d01806.pdI

SItuatIonaI UnderstandIng SItuatIonaI UnderstandIng SItuatIonaI UnderstandIng SItuatIonaI UnderstandIng
The product oI appIyIng anaIysIs and judgment to reIevant InIormatIon to determIne the reIatIonshIps
among the mIssIon varIabIes to IacIIItate decIsIonmakIng. (FM 3-0

Source: Department oI the Army, "KnowIedge Management SectIon," U.S. Army FIeId ManuaI 6-01.1,
August 29, 2008, http:]]www.Ias.org]Irp]doddIr]army]Im6-01-1.pdI

SmIth SmIth SmIth SmIth- -- -Mundt Act oI 1948 Mundt Act oI 1948 Mundt Act oI 1948 Mundt Act oI 1948
See 8ureau oI nternatIonaI nIormatIon Programs See 8ureau oI nternatIonaI nIormatIon Programs See 8ureau oI nternatIonaI nIormatIon Programs See 8ureau oI nternatIonaI nIormatIon Programs (P), Counter (P), Counter (P), Counter (P), Counter- -- -nIormatIon Team, nIormatIon nIormatIon Team, nIormatIon nIormatIon Team, nIormatIon nIormatIon Team, nIormatIon
ExpIoItatIon, Propaganda, PubIIc DIpIomacy ExpIoItatIon, Propaganda, PubIIc DIpIomacy ExpIoItatIon, Propaganda, PubIIc DIpIomacy ExpIoItatIon, Propaganda, PubIIc DIpIomacy
1. The SmIth-Mundt Act oI 1948 n2 Is a key statute outIInIng the gIobaI mIssIon oI U.S.
propaganda abroad and IImItatIons on dIstrIbutIon oI U.S. propaganda at home.

The SmIth-Mundt Act estabIIshed exchange oI students, proIessors, books and educatIonaI materIaIs
between the UnIted States and other countrIes. The act aIso authorIzed the IederaI government --
specIIIcaIIy, the State Department -- to empIoy Its own agencIes and prIvate organIzatIons to
"dIssemInate abroad . . . InIormatIon about the UnIted States, Its peopIe, and Its poIIcIes, through
press, pubIIcatIons, radIo, motIon pIctures, and other InIormatIon medIa, and through InIormatIon
centers and Instructors abroad." ThIs eIIort was necessary, Congress asserted, because AmerIca had
shortsIghtedIy IaIIed to systematIcaIIy promote ItseII to other natIons, and by 1948 the UnIted States
was engaged In a massIve and bItter propaganda war wIth the SovIet UnIon Ior the hearts and mInds
oI the worId.



398
Source: AIIen W. PaImer and Edward L. Carter. "The SmIth-Mundt Act's 8an on DomestIc Propaganda:
An AnaIysIs oI the CoId War Statute LImItIng Access to PubIIc DIpIomacy." CommunIcatIons Law and
PoIIcy 11 no.1 (WInter 2006): 1-34.

2. 8an on domestIc actIvItIes by UnIted States nIormatIon Agency: Except as provIded In
sectIon 1461 oI thIs tItIe and thIs sectIon, no Iunds authorIzed to be approprIated to the UnIted States
nIormatIon Agency shaII be used to InIIuence pubIIc opInIon In the UnIted States, and no program
materIaI prepared by the UnIted States nIormatIon Agency shaII be dIstrIbuted wIthIn the UnIted
States. ThIs sectIon shaII not appIy to programs carrIed out pursuant to the MutuaI EducatIonaI and
CuIturaI Exchange Act oI 1961 (22 U.S.C. 2451 et seq.). The provIsIons oI thIs sectIon shaII not
prohIbIt the UnIted States nIormatIon Agency Irom respondIng to InquIrIes Irom members oI the
pubIIc about Its operatIons, poIIcIes, or programs [22 U.S.C. CHAPTER 18 > SU8CHAPTER V > 1461-
1a]

Source: U.S. nIormatIon and EducatIonaI Exchange Act oI 1948 ("SmIth-Mundt Act oI 1948," PL 80-
402, 22 U.S.C. 1461); NatIonaI SecurIty ArchIve. "RumsIeId's Roadmap to Propaganda." ]anuary 26,
2006. http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88177]Index.htm; Pub. L. 108-458, U.S.C V,
7108, Dec. 17, 2004, 118 Stat. 3790,

SocIaI MaIware SocIaI MaIware SocIaI MaIware SocIaI MaIware
The combInatIon oI weII-wrItten maIware wIth weII-desIgned emaII Iures, whIch we caII socIaI
maIware. (p.3)

8ut the IndustrIaIIsatIon oI onIIne crIme over the past IIve years means that capabIy-wrItten maIware,
whIch wIII not be detected by antI-vIrus programs, Is now avaIIabIe on the market. AII an attacker
needs Is the socIaI skIII and patIence to work the maIware Irom one person to another untII enough
machInes have been compromIsed to compIete the mIssIon. What's more, the `best practIce' advIce
that one sees In the corporate sector comes nowhere even cIose to preventIng such an attack. Thus
socIaI maIware Is unIIkeIy to remaIn a tooI oI governments. (p.8)

Source: ShIshIr Nagaraja and Ross Anderson, "The snoopIng dragon: socIaI-maIware surveIIIance oI
the TIbetan movement," March 2009, http:]]www.cI.cam.ac.uk]techreports]UCAM-CL-TR-746.pdI
and nIormatIon WarIare MonItor, TrackIng ChostNet: nvestIgatIng a Cyber EspIonage Network, March
2009, http:]]www.InIowar-monItor.net]

SocIaI Network AnaIysIs SocIaI Network AnaIysIs SocIaI Network AnaIysIs SocIaI Network AnaIysIs



61
ArtIst Mark LombardI's mInd mappIng]socIaI networkIng projects IIIustratIng money
IaunderIng, terrorIsm, and the arms trade are earIy exampIes oI modeIIng oI networks; aIso see NPR's
"The ConspIracy Art oI Mark LombardI,"
http:]]www.npr.org]tempIates]story]story.phpZstoryd=1487185 , Mark LombardI: CIobaI
Networks [New York: ndependent Curators nternatIonaI, 2003], and Edward TuIte's "DesIgn oI causaI
dIagrams: 8arr art chart, LombardI dIagrams, evoIutIonary trees, Feynman dIagrams, tImeIInes,"
http:]]www.edwardtuIte.com]bboard]q-and-a-Ietch-msgZmsgId=0000yO


399
See AbIe Danger, Data MInIng See AbIe Danger, Data MInIng See AbIe Danger, Data MInIng See AbIe Danger, Data MInIng
SocIaI network anaIysIs (SNA) Is characterIzed by a dIstInct and unIque methodoIogy Ior coIIectIng
data, perIormIng statIstIcaI anaIysIs, and makIng vIsuaI representatIons. Such appIIcatIons can be
useIuI Ior devIsIng more eIIectIve schemes Ior promotIng Ideas or exertIng InIIuence In organIzatIons.
These are certaInIy Important IunctIons, but the reIevance oI such anaIysIs to counterInsurgency
(CON) prImarIIy deaIs wIth expIaInIng how peopIe behave and how that behavIor Is aIIected by theIr
reIatIon-
shIps. n the past, SNA contrIbuted to the 8rItIsh success In deIeatIng the MaIaysIan
Insurgency. More recentIy In raq, It has been used In the caImIng oI the FaIIujah regIon by the U.S.
MarIne Corps, and In the capture oI Saddam HusseIn by the 4th nIantry DIvIsIon.

For an Insurgency, a socIaI network Is not just a descrIptIon oI who Is In the Insurgent organIzatIon,
but a pIcture oI the popuIatIon, how they are put together, and how they Interact wIth one another.
OIten, socIaI networks are Iarge, compIex, and amorphous. They can be beyond the cognItIve
IImItatIons oI a human anaIyst.

Source: Department oI the Army. CounterInsurgency FInaI DraIt - Not Ior mpIementatIon. FM 3-24,
FMFM 3-24. ]une 2006 (FInaI DraIt), http:]]www.Ias.org]Irp]doddIr]army]Im3-24Id.pdI and PauI
Marks. "Pentagon sets Its sIghts on socIaI networkIng websItes." ]une 9, 2006,
http:]]www.newscIentIst.com]artIcIe]mg19025556.200ZD.C.MP=NLC

SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIo SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIo SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIo SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT) n (SWFT) n (SWFT) n (SWFT)
See TerrorIst FInance TrackIng Program See TerrorIst FInance TrackIng Program See TerrorIst FInance TrackIng Program See TerrorIst FInance TrackIng Program
The SWFT network carrIes up to 12.7 mIIIIon messages a day contaInIng InstructIons on many oI the
InternatIonaI transIers oI money between banks. The messages typIcaIIy IncIude the names and
account numbers oI bank customers - Irom U.S. cItIzens to major corporatIons - who are sendIng or
receIvIng Iunds.

Under the program, [the U.S. Department oI the ] Treasury Issues a new subpoena once a month, and
SWFT turns over huge amounts oI eIectronIc IInancIaI data, accordIng to Stuart Levey, the
department's undersecretary Ior terrorIsm and IInancIaI InteIIIgence. The admInIstratIve subpoenas are
Issued under authorIty granted In the 1977 nternatIonaI Emergency EconomIc Powers Act.

The 8eIgIum PrIvacy CommIssIon has Iound that SWFT dId not obey 8eIgIum Iaw when It transIerred
vast amounts oI IInancIaI data to the U.S. Treasury Department.

Source: ]osh Meyer and Creg MIIIer. "TerrorIst FInance TrackIng Program."
http:]]www.commondreams.org]headIInes06]0623-06.htm ; SWFT,
http:]]www.swIIt.com]Index.cImZItemId=43232; ]ennIIer K. EIsea and M. Maureen Murphy.
"Treasury's TerrorIst FInance Program's Access to nIormatIon HeId by the SocIety Ior WorIdwIde
nterbank FInancIaI TeIecommunIcatIon (SWFT)." CRS Report to Congress ]uIy 6, 2006,
http:]]www.Ias.org]sgp]crs]natsec]RS22469.pdI; AIexI Mostrous and an CobaIn. "CA's secret UK
bank trawI may be IIIegaI." The CuardIan August 21, 2006,
http:]]www.guardIan.co.uk]terrorIsm]story]0,,1854813,00.htmI and EPC. "8eIgIum Data PrIvacy


400
CommIssIon: Summary oI the opInIon on the transIer oI personaI data by SCRL SWFT IoIIowIng the
UST (OFAC) subpoenas," http:]]www.epIc.org]redIrect]beIpcop0906.htmI - Note - the 8eIgIan IInk
Is dead; try thIs: PrIvacy nternatIonaI, "8eIgIan PrIme MInIster condemns SWFT data transIers to U.S.
as 'IIIegaI'," http:]]www.prIvacyInternatIonaI.org]artIcIe.shtmIZcmd[347]=x-347-543789

Source Source Source Source
1. A person, thIng, or actIvIty Irom whIch InIormatIon Is obtaIned.
2. n cIandestIne actIvItIes, a person (agent), normaIIy a IoreIgn natIonaI, In the empIoy oI an
InteIIIgence actIvIty Ior InteIIIgence purposes.
3. n InterrogatIon actIvItIes, any person who IurnIshes InIormatIon, eIther wIth or wIthout the
knowIedge that the InIormatIon Is beIng used Ior InteIIIgence purposes. n thIs context, a controIIed
source Is In the empIoyment or under the controI oI the InteIIIgence actIvIty and knows that the
InIormatIon Is to be used Ior InteIIIgence purposes. An uncontroIIed source Is a voIuntary contrIbutor
oI InIormatIon and may or may not know that the InIormatIon Is to be used Ior InteIIIgence purposes.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the
Navy. OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents

Source Document(s) Source Document(s) Source Document(s) Source Document(s)
See DerIvatIve CIas See DerIvatIve CIas See DerIvatIve CIas See DerIvatIve CIassIIIcatIon sIIIcatIon sIIIcatIon sIIIcatIon
1. An exIstIng document that contaIns cIassIIIed InIormatIon that Is Incorporated,
paraphrased, restated, or generated In new Iorm Into a new document.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve
Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

2. A cIassIIIed document (I.e., memo, Ietter, scIentIIIc report, etc.) other than a cIassIIIcatIon
guIde, Irom whIch InIormatIon Is extracted Ior IncIusIon In another document.

Source: DOE. UnderstandIng CIassIIIcatIon. . . . WashIngton, D.C.: U.S. Dept. oI Energy, AssIstant Secretary
Ior DeIense Programs, OIIIce oI CIassIIIcatIon, 1987. SUDOC: E 1.15:0007]1

Sources and Methods Sources and Methods Sources and Methods Sources and Methods
1. There Is no statutory deIInItIon oI eIther the phrase or Its constItuent eIements. ThereIore,
presIdents couId dIrect (or the DCs couId adopt) a Iess restrIctIve InterpretatIon oI the provIsIon, by
narrowIy deIInIng sources and methods that need to be protected.

Source: ]ames X. Dempsey. "The CA and Secrecy." A CuIture oI Secrecy: the Covernment Versus the
PeopIe's RIght to Know. Athan C. TheoharIs (Ed.), (Lawrence: UnIversIty Press oI Kansas, 1998. 37-59),
and CommIssIon on ProtectIng and ReducIng Covernment Secrecy. Report on the CommIssIon on


401
ProtectIng and ReducIng Covernment Secrecy, Senate Document 105-2. 1997,
http:]]www.gpo.gov]congress]commIssIons]secrecy]Index.htmI

2. The CA charter provIdes that InIormatIon concernIng the sources and methods oI
InteIIIgence coIIectIon must remaIn secret. Such InIormatIon Is not avaIIabIe Ior pubIIc dIscIosure and
Is redacted (or bIacked out) Irom documents, but sIgnIIIcant amounts oI anaIytIcaI or pubIIcIy derIved
InIormatIon are avaIIabIe.

Source: CentraI nteIIIgence Agency. "The Freedom oI nIormatIon Act, 5 U.S.C. 552."
http:]]www.IoIa.cIa.gov]IoIa.asp
3. CA v. SIms, a 1985 Supreme Court case that InvoIved a request Ior InIormatIon Irom the
CentraI nteIIIgence Agency (CA) regardIng a project code-named "MKULTRA." The pIaIntIIIs In SIms
made a FOA request Ior the names oI the approxImateIy eIghty InstItutIons and 185 IndIvIduaIs
InvoIved In the MKULTRA research. AIthough the CA dIscIosed some names, It Invoked FOA
ExemptIon 3, rather than ExemptIon 7, to wIthhoId the names oI aII IndIvIduaI researchers and
twenty-one InstItutIons. The Agency reIIed on a statute that stated "the DIrector oI CentraI
nteIIIgence shaII be responsIbIe Ior protectIng InteIIIgence sources and methods Irom unauthorIzed
dIscIosure." n deIerrIng to the CA's judgment that the MKULTRA researchers were "InteIIIgence
sources" wIthIn the meanIng oI the statute, the Court heId that "the decIsIons oI the DIrector, who
must oI course be IamIIIar wIth the whoIe pIcture, as judges are not, are worthy oI great deIerence
gIven the magnItude oI the natIonaI securIty Interests and potentIaI rIsks at stake." The majorIty In
Center Ior NatIonaI SecurIty StudIes cIted thIs Ianguage approvIngIy, and ruIed that decIsIons oI the
]ustIce Department oIIIcIaIs In charge oI the terrorIsm InvestIgatIon are entItIed to the same deIerence.
Source: 8radIey Pack. "FOA FrustratIon: Access to Covernment Records Under the 8ush
AdmInIstratIon." 46 ArIz. L. Rev. 815. [notes 154-161] and Sec. 103 (50 U.S.C. 403-3] c (7) NatIonaI
SecurIty Act oI 1947 ]uIy 26, 1947. (As Amended), http:]]www.InteIIIgence.gov]0-
natsecact1947.shtmI
SousveIIIance SousveIIIance SousveIIIance SousveIIIance
To vIew Irom beIow.

WorId SurveIIIance SubjectrIghts Day Is December 24 as proposed by poIItIcaI scIentIst RonaId
DeIbert where "ordInary peopIe aII over the worId wIII caII Into questIon the growIng and
dehumanIzIng eIIects oI Increased vIdeo surveIIIance, automated Iace recognItIon, and Covernment
(Corporate+Covernment) trackIng In pubIIc pIaces, as weII as prIvate pIaces."

Source: CItIzenLab
http:]]www.cItIzenIab.org]moduIes.phpZop=modIoad&name=WSD&IIIe=Index, Steve Mann, ]ason
NoIan and 8arry WeIIman. "SousveIIIance: nventIng and UsIng WearabIe ComputIng DevIces Ior Data
CoIIectIon In SurveIIIance EnvIronments." SurveIIIance & SocIety 1 no. 3(2003): 331-355.
http:]]www.surveIIIance-and socIety.org]artIcIes1(3)]sousveIIIance.pdI and PatrIck DI]usto, "Record


402
the Lens That Records You," WIred November 28, 2002,
http:]]www.wIred.com]cuIture]IIIestyIe]news]2002]11]56185

SpecIaI Access Program (SAP) SpecIaI Access Program (SAP) SpecIaI Access Program (SAP) SpecIaI Access Program (SAP)
1. Any program that Imposes need-to-know or access controIs beyond those normaIIy
requIred Ior access to ConIIdentIaI, Secret, or Top Secret InIormatIon. ExampIes oI such controIs
IncIude, but are not IImIted to specIaI cIearance, adjudIcatIon, or InvestIgatIve requIrements; specIaI
desIgnatIon oI oIIIcIaIs authorIzed to determIne need to know; or specIaI IIsts oI persons determIned
to have a need-to-know. SpecIaI access controIs may be appIIed to "an extremeIy sensItIve actIvIty
requIrIng specIaI protectIon Irom dIscIosure to prevent sIgnIIIcant damage to natIonaI securIty or the
reputatIon or Interests oI the UnIted States." Any program ImposIng a need-to-know or access
controIs beyond those normaIIy provIded Ior access

Source: Army ReguIatIon 380-381, 12 October 1998, sectIon 1-4(6), DoD 5200.1-M, and Army
ReguIatIon 380-381, 21 AprII 2004, http:]]www.Ias.org]Irp]DoDdIr]army]ar380-381.pdI

2. A sensItIve program, approved In wrItIng by a head oI agency wIth orIgInaI top secret
cIassIIIcatIon authorIty, that Imposes need-to-know and access controIs beyond those normaIIy
provIded Ior access to conIIdentIaI, secret, or top secret InIormatIon. The IeveI oI controIs Is based on
the crItIcaIIty oI the program and the assessed hostIIe InteIIIgence threat. The program may be an
acquIsItIon program, an InteIIIgence program, or an operatIons and support program.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
19 October 2009, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

3. A program estabIIshed Ior a specIIIc cIass oI cIassIIIed InIormatIon that Imposes
saIeguardIng and access requIrements that exceed those normaIIy requIred Ior InIormatIon at the
same cIassIIIcatIon IeveI.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended,
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958- amendment.htmI#1.2

4. Any program, whIch may or may not contaIn SC (sensItIve compartmented InIormatIon),
ImposIng a need-to-know and access controIs beyond those normaIIy provIded Ior access to
CONFDENTAL, SECRET AND TOP SECRET InIormatIon. Such controIs may IncIude, but are not IImIted
to, access approvaI; adjudIcatIve or InvestIgatIve requIrements; specIaI desIgnatIon oI oIIIcIaIs
authorIzed to determIne need-to-know; or specIaI IIst or persons determIned to have a need-to-
know.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents."
October 4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI

SpecIaI nIormatIon OperatIons (SO) SpecIaI nIormatIon OperatIons (SO) SpecIaI nIormatIon OperatIons (SO) SpecIaI nIormatIon OperatIons (SO)


403
nIormatIon operatIons that by theIr sensItIve nature and due to theIr potentIaI eIIect or Impact,
securIty requIrements, or rIsk to the natIonaI securIty oI the UnIted States, requIre a specIaI revIew and
approvaI process.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through
17 October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
SpecIaI PsychoIogIcaI OperatIons Assessment SpecIaI PsychoIogIcaI OperatIons Assessment SpecIaI PsychoIogIcaI OperatIons Assessment SpecIaI PsychoIogIcaI OperatIons Assessment
A PSYOP InteIIIgence document that Iocuses on any oI a varIety OperatIons assessment oI dIIIerent
subjects pertInent to PSYOP, such as a partIcuIar target group, sIgnIIIcant socIaI InstItutIon, or medIa
anaIysIs. A SPA can serve as an ImmedIate reIerence Ior the pIannIng and conduct oI PSYOP.

Source: DoD. PsychoIogIcaI OperatIons, FM 3-05.30 MCRP 3-40.6, AprII 2005,
http:]]www.Ias.org]Irp]doddIr]army]Im3-05-30.pdI

SpIIt KnowIedge SpIIt KnowIedge SpIIt KnowIedge SpIIt KnowIedge
SeparatIon Into data and InIormatIon Into two or more parts, each part constantIy kept under controI
oI authorIzed IndIvIduaIs or teams so no one IndIvIduaI or team wIII know the whoIe data.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006. http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

StatIstIcaI Management AnaIysIs and ReportIng TooI System (SMARTS)]SP StatIstIcaI Management AnaIysIs and ReportIng TooI System (SMARTS)]SP StatIstIcaI Management AnaIysIs and ReportIng TooI System (SMARTS)]SP StatIstIcaI Management AnaIysIs and ReportIng TooI System (SMARTS)]SPSS SS SS SS
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Drug EnIorcement Agency. s a query anaIysIs and reportIng tooI that puIIs data
Irom many systems. t aIIows Ior statIstIcaI anaIyses oI drug cases Drug EnIorcement AdmInIstratIon's
statIstIcaI reportIng;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-
548, May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

Store Store Store Store
An InIormatIon management actIvIty: to retaIn reIevant InIormatIon In any Iorm, usuaIIy Ior orderIy,
tImeIy retrIevaI and documentatIon, untII It Is needed Ior exercIsIng command and controI.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the
Navy. OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents



404
StovepIpes StovepIpes StovepIpes StovepIpes
8ureaucratIc organIzatIonaI structure and equItIes that restrIct IIexIbIIIty to work across organIzatIonaI
IInes.

Source: MeIIssa 8oyIe MahIe. DenIaI and DeceptIon: an nsIder's VIew oI the CA Irom ran-Contra to
9]11. New York: NatIon 8ooks.

StrategIc Co StrategIc Co StrategIc Co StrategIc CompressIon mpressIon mpressIon mpressIon
The IormIng oI unexpected causaI reIatIonshIps and breakIng oI expected causaI reIatIonshIps among
the tactIcaI, operatIonaI, and strategIc IeveIs oI conIIIct. StrategIc compressIon acceIerates due to the
rapIdIty oI InIormatIon transmIssIon and the Iack oI understandIng oI preexIstIng and emergent
trends and socIaI appetItes both wIthIn the IocaI area oI conIIIct and wIthIn a worId-wIde audIence. As
such, the IeveIs oI war seem to compress In tIme and In causaI IInkages.

Source: U.S. ]oInt Forces Command, MarInes begIn ]oInt Urban WarrIor 07,
http:]]www.jIcom.mII]newsIInk]storyarchIve]2007]pa052107.htmI

StrategIc CommunIcatIons StrategIc CommunIcatIons StrategIc CommunIcatIons StrategIc CommunIcatIons


The pIannIng, executIon, and assessment oI Integrated and coordInated US Covernment themes and
messages that advance US Interests and poIIcIes through a synchronIzed Interagency eIIort supported
by pubIIc dIpIomacy, pubIIc aIIaIrs, and mIIItary InIormatIon operatIons In concert wIth other poIItIcaI,
economIc, InIormatIon
and mIIItary actIons.

Source: U.S. AIr Force. PubIIc AIIaIrs OperatIons, AIr Force DoctrIne Document 2-5.3, ]une 24, 2005.
[See Wayback MachIne, http:]]web.archIve.org]web]20061007174450]http:]]www.e-
pubIIshIng.aI.mII]pubIIIes]aI]dd]aIdd2-5.3]aIdd2-5.3.pdI ] Note: DoD 2008 IIscaI year budget
IncIudes three mIIIIon doIIars Ior "strategIc communIcatIon and IntegratIon."

StrategIc CompressIon StrategIc CompressIon StrategIc CompressIon StrategIc CompressIon
The IormIng oI unexpected causaI reIatIonshIps and breakIng oI expected causaI reIatIonshIps among
the tactIcaI, operatIonaI, and strategIc IeveIs oI conIIIct. StrategIc compressIon acceIerates due to the
rapIdIty oI InIormatIon transmIssIon and the Iack oI understandIng oI preexIstIng and emergent

62
The Rendon Croup, nc. was awarded "a $6,400,919 IIrm-IIxed-prIce contract Ior StrategIc
CommunIcatIons OperatIon Support" In September, 2005. See DoD Contracts, September 27, 2005,
http:]]www.deIenseIInk.mII]contracts]2005]ct20050927.htmI & ]ames 8amIord
(November 17,2005), "The Man Who SoId the War: Meet ]ohn Rendon, 8ush's CeneraI In the
Propaganda War," RoIIIng Stone
http:]]www.roIIIngstone.com]poIItIcs]story]8798997]themanwhosoIdth
ewar]



405
trends and socIaI appetItes both wIthIn the IocaI area oI conIIIct and wIthIn a worId-wIde audIence. As
such, the IeveIs oI war seem to compress In tIme and In causaI IInkages.

Source: US]FCOM, ]oInt Urban WarrIor 07,
http:]]www.jIcom.mII]newsIInk]storyarchIve]2007]pa052107.htmI

StrategIc nIormatIon WarIare StrategIc nIormatIon WarIare StrategIc nIormatIon WarIare StrategIc nIormatIon WarIare
See Cyberwar, DeIensIve nIormatIon WarIare, DIrect See Cyberwar, DeIensIve nIormatIon WarIare, DIrect See Cyberwar, DeIensIve nIormatIon WarIare, DIrect See Cyberwar, DeIensIve nIormatIon WarIare, DIrect nIormatIon WarIare, nIormatIon WarIare, nIormatIon WarIare, nIormatIon WarIare, nIormatIon WarIare, Netwar nIormatIon WarIare, Netwar nIormatIon WarIare, Netwar nIormatIon WarIare, Netwar
ntersectIon oI InIormatIon and strategIc warIare.

Source: Roger C. MoIander, et aI. "What Is nIormatIon WarIareZ" n StrategIc nIormatIon WarIare
RIsIng. Santa MonIca: Rand Corp., 1998,
http:]]www.rand.org]pubIIcatIons]MR]MR964]MR964.pdI]MR964.ch1.pdI

StrategIc nteIIIgence (S) StrategIc nteIIIgence (S) StrategIc nteIIIgence (S) StrategIc nteIIIgence (S)
ExamInes crIme patterns and crIme trends Ior management use In decIsIon makIng, resource
deveIopment, resource aIIocatIon, and poIIcy pIannIng. StrategIc InteIIIgence typIcaIIy Iocuses on
specIIIc crIme types, such as crImInaI enterprIses, drug traIIIckers, terrorIsts, or other Iorms oI
compIex crImInaIIty. S aIso provIdes detaIIed InIormatIon on a specIIIed type oI crIme or crImInaIIty.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

SuspIcIous ActIvIty Reports (SARs) SuspIcIous ActIvIty Reports (SARs) SuspIcIous ActIvIty Reports (SARs) SuspIcIous ActIvIty Reports (SARs)
See nIormatIon SharIng EnvIronment (SE) See nIormatIon SharIng EnvIronment (SE) See nIormatIon SharIng EnvIronment (SE) See nIormatIon SharIng EnvIronment (SE)
1. The 8ank Secrecy Act requIres MS8s (Money ServIces 8usInesses) to IIIe suspIcIous actIvIty
reports wIth the U.S. Department oI the Treasury's FInancIaI CrImes EnIorcement Network (FInCEN).
Check cashers and seIIers and redeemers oI stored vaIue are not requIred to, but may voIuntarIIy IIIe a
SAR.

An MS8 must IIIe a SAR when It knows or suspects that: The Iunds come Irom IIIegaI actIvIty or
dIsguIse Iunds Irom IIIegaI actIvIty; the transactIon Is structured to evade 8SA requIrements or appears
to serve no known busIness or apparent IawIuI purpose; or, the MS8 Is beIng used to IacIIItate crImInaI
actIvIty.

Source: nternaI Revenue ServIces, "SuspIcIous ActIvIty Reports, "
http:]]www.Irs.gov]busInesses]smaII]artIcIe]0,,Id=154555,00.htmI

2. ThIs year, the LAPD estabIIshed a departmentwIde process Ior gatherIng, processIng, and
sharIng terrorIsmreIated SARs. ConsIstent wIth the SESAR FunctIonaI Standard, thIs process uses
eIearnIng and roII caII traInIng to InIorm oIIIcers how to recognIze potentIaI terrorIst actIvItIes whIIe
provIdIng standardIzed reportIng codes that IacIIItate the reportIng and revIew oI terrorIsm reIated


406
suspIcIous IncIdents. LAPD Is bIendIng suspIcIous actIvIty reports wIth other crItIcaI InIrastructure and
reIevant crIme data
In order to IdentIIy patterns and trends that may be IndIcators oI potentIaI threats
to IocatIons wIthIn the cIty.

Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

System AccredItatIon System AccredItatIon System AccredItatIon System AccredItatIon
The oIIIcIaI authorIzatIon granted to an InIormatIon system to process sensItIve InIormatIon In Its
operatIonaI envIronment based on a comprehensIve securIty evaIuatIon oI the system's hardware,
IIrmware, and soItware securIty desIgn, conIIguratIon and ImpIementatIon and oI the other system
proceduraI, admInIstratIve, physIcaI, TEMPEST, personneI, and communIcatIons securIty controIs.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc
SecurIty Terms." November 13, 200,. http:]]www.state.gov]m]a]dIr]regs]

System oI Record System oI Record System oI Record System oI Record
1. From the PrIvacy Act oI 1974, "a group oI any records under the controI oI any agency Irom
whIch InIormatIon Is retrIeved by the name oI the IndIvIduaI or by some IdentIIyIng number, symboI,
or other IdentIIyIng partIcuIar assIgned to the IndIvIduaI."

Source: 5 U.S.C. 552a (a) (5). The PrIvacy Act oI 1974. EPC, http:]]www.epIc.org]prIvacy]1974act]
[kIndIy suppIIed by Robert CeIIman].

2. The hIghIy technIcaI "system oI records" deIInItIon Is perhaps the sIngIe most
Important PrIvacy Act concept, because It generaIIy makes coverage under the Act dependent upon the
method oI retrIevaI oI a record rather than Its substantIve content. Records must be accessed by the
agency by use oI a personaI IdentIIIer. The mere capabIIIty or potentIaI Ior retrIevaI Is not enough.

Source: "OvervIew oI the PrIvacy Act oI 1974", 2004 EdItIon,
http:]]www.usdoj.gov]oIp]1974deIInItIons.htm#system [kIndIy suppIIed by Robert CeIIman].

SystematIc DecIassIIIcatIon RevIew SystematIc DecIassIIIcatIon RevIew SystematIc DecIassIIIcatIon RevIew SystematIc DecIassIIIcatIon RevIew
See DecIassIIIcatIon See DecIassIIIcatIon See DecIassIIIcatIon See DecIassIIIcatIon
RevIew Ior decIassIIIcatIon oI cIassIIIed InIormatIon contaIned In records that have been determIned
by the ArchIvIst to have permanent hIstorIcaI vaIue In accordance wIth TItIe 44, UnIted States Code.

Source: SOO. ExecutIve Order 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended.
http:]]www.archIves.gov]Isoo]poIIcy-documents]eo-12958-amendment.htmI#1.2 and ExecutIve
Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed NatIonaI SecurIty
nIormatIon." http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI




407


~ T ~ ~ T ~ ~ T ~ ~ T ~

TactIcaI nteIIIgence (T) TactIcaI nteIIIgence (T) TactIcaI nteIIIgence (T) TactIcaI nteIIIgence (T)
See nteIIIgence, nteIIIgence nIormatIon See nteIIIgence, nteIIIgence nIormatIon See nteIIIgence, nteIIIgence nIormatIon See nteIIIgence, nteIIIgence nIormatIon
Seeks to gather and manage dIverse InIormatIon to IacIIItate a successIuI prosecutIon oI the
InteIIIgence target. T Is aIso used Ior specIIIc decIsIon makIng or probIem soIvIng to deaI wIth an
ImmedIate sItuatIon or crIsIs.

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. .. . Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004.
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

TaIon Report TaIon Report TaIon Report TaIon Report
See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA) See CounterInteIIIgence FIeId ActIvIty (CFA)
1. A Iormatted wrItten record oI non-vaIIdated threat InIormatIon.

Source: DoD. "DoD CounterInteIIIgence CoIIectIon ReportIng." DoD 5240.17. October 26, 2005,
http:]]www.Ias.org]Irp]doddIr]dod]I524017.pdI

2. Dec. 15, 2005 - The DeIense Department has ordered a revIew oI an InteIIIgence system
that compIIes InIormatIon on possIbIe worIdwIde threats to U.S. mIIItary personneI and InstaIIatIons, a
senIor DoD oIIIcIaI saId here today.
Some recent news reports aIIege that the Threat and LocaI ObservatIon NotIce system, known by the
acronym TALON, had ImproperIy stored InIormatIon about some cIvIIIan IndIvIduaIs and non-
government-aIIIIIated groups on Its database.
"t appears as II there may have been thIngs that were IeIt In the database that shouIdn't have been
IeIt there," DoD spokesman 8ryan WhItman toId Pentagon reporters.
The TALON system coIIects and evaIuates InIormatIon about possIbIe threats to U.S. servIce members
and deIense cIvIIIans at statesIde and overseas mIIItary InstaIIatIons, WhItman saId. AnaIysts examIne
the InIormatIon, he saId, to ascertaIn whether there couId be a genuIne threat.
The DeIense Department announced Dec. 14 that It wouId conduct a Iour-poInt revIew oI the TALON
system, WhItman saId, that wIII consIst oI:
ExamInIng the TALON reportIng system to ensure that It IuIIy compIIes wIth DoD procedures
and U.S. Iaw;
RevIewIng poIIcIes and procedures to make sure that they are beIng properIy appIIed In
respect to any reportIng and retentIon oI InIormatIon on U.S. persons;


408
ExamInIng the TALON database to IdentIIy any other InIormatIon that mIght be ImproperIy
stored In the database, and;
ProvIdIng aII DoD counterInteIIIgence and InteIIIgence personneI wIth reIresher traInIng
concernIng the Iaws, poIIcIes and procedures governIng the coIIectIon, reportIng and storage
oI InIormatIon reIated to the warnIng oI potentIaI threats to DoD personneI and IacIIItIes.
Source: Cerry ]. CIImore. "DoD Orders RevIew oI AntI-Threat nteI-CatherIng System." DeIenseLNK
News, http:]]www.deIenseIInk.mII]news]Dec2005]200512153672.htmI

3. The TALON ReportIng System Is an InnovatIve InItIatIve to document unIIItered and non-
vaIIdated potentIaI threat InIormatIon about suspIcIous actIvIty IInked to possIbIe InternatIonaI
terrorIst threats to DoD personneI and resources that mIght have otherwIse gone unreported. ThIs
InIormatIon Is reported by concerned cItIzens and Department personneI or obtaIned through
InIormatIon sharIng wIth cIvIIIan Iaw enIorcement agencIes. The program, has been productIve.

The revIew conIIrmed that TALON ReportIng System shouId be used onIy to report InIormatIon
regardIng possIbIe InternatIonaI terrorIst actIvIty, and concIuded that aII TALON reports shouId be
retaIned In accordance wIth DoDD 5240.1-R "ActIvItIes oI DoD nteIIIgence Components That AIIect
UnIted States Persons, " dated December 1982.

Source: Deputy Secretary oI DeIense Cordon EngIand. "Threats to the Department oI DeIense." Memo,
March 30, 2006, http:]]www.Ias.org]Irp]agency]dod]033006taIon.pdI

4. DoD's CounterInteIIIgence FIeId ActIvIty (CFA) wIII cIose the TALON ReportIng System
eIIectIve Sept. 17, 2007, and maIntaIn a record copy oI the coIIected data In accordance wIth
InteIIIgence oversIght requIrements. To ensure there Is a mechanIsm In pIace to document and assess
potentIaI threats to DoD resources, the AssIstant Secretary oI DeIense Ior HomeIand DeIense and
AmerIcas' SecurIty AIIaIrs wIII propose a system to streamIIne such threat reportIng and better meet
the DeIense department's needs.

n the InterIm, untII thIs new reportIng program Is adopted, DoD components wIII send InIormatIon
concernIng Iorce protectIon threats to the FederaI 8ureau oI nvestIgatIon's CuardIan reportIng
system.

Source: DeIenseIInk, http:]]www.deIenseIInk.mII]reIeases]reIease.aspxZreIeaseId=11251 and TALON
was suspended In 2007; see ]eIIrey RIcheIson's The Pentagon's CounterspIes EIectronIc 8rIeIIng 8ook
the NatIonaI SecurIty ArchIve, http:]]www.gwu.edu]~nsarchIv]NSAE88]NSAE88230]Index.htm

TANCRAM TANCRAM TANCRAM TANCRAM
1. Tangram Is envIsIoned as a IuIIy automated, contInuousIy operatIng, InteIIIgence anaIysIs
support system that's capabIe oI conIIgurIng ItseII to achIeve a reasonabIe tradeoII between estImated
InteIIIgence vaIue and cost.



409
ThIs work wIII be compIete September 2010. AIr Force Research Laboratory, Rome, N.Y., Is the
contractIng actIvIty. (FA8750-06-C-0208).

See Cryptome has a copy oI the TANCRAM "Proposer's nIormatIon Packet (PP)"
http:]]cryptome.InIo]tangram-InteI.htm and DeIenseLInk, September 25, 2006,
http:]]www.deIenseIInk.mII]Contracts]Contract.aspxZContractD=3349; aIso see Shane HarrIs'
"Agency expIores new tooI to connect InteIIIgence dots." October 20, 2006.
http:]]www.govexec.com]storypage.cImZartIcIeId=35310&sId=28

2. SeekIng to demonstrate the IeasIbIIIty and InteIIIgence vaIue oI a semI-autonomous
terrorIst threat assessment system concept. ts most ImmedIate objectIve Is to assess the threat
IIkeIIhood oI known threat entItIes. The sImpIest oI methods wouId be InItIated by a search Ior
InIormatIon about the specIIIc entIty. However, a surveIIIance and warnIng system must aIso provIde
warnIngs.

Source: DN, Data MInIng Report, February 15, 2008, http:]]www.Ias.org]Irp]dnI]datamInIng.pdI

Tear LIne Tear LIne Tear LIne Tear LIne
See WrIte See WrIte See WrIte See WrIte- -- -to to to to- -- -ReIease ReIease ReIease ReIease
1. n a cIassIIIed report there may be a summary oI crItIcaI InIormatIon, wIthout a descrIptIon
oI sources and methods that Is beIow a desIgnated IIne on the report. ThIs portIon Is "torn oII" oI the
report makIng It SensItIve 8ut UncIassIIIed (S8U) and may be dIssemInated to Iaw enIorcement
personneI who do not have a securIty cIearance as "Law EnIorcement SensItIve. "

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law
EnIorcement AgencIes. Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004. 85
n.118, http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404

2. A "tear IIne" Is the pIace on an InteIIIgence report (usuaIIy denoted by a serIes oI dashes)
at whIch the sanItIzed versIon oI a more hIghIy cIassIIIed and]or controIIed report begIns. The
sanItIzed InIormatIon beIow the tear IIne shouId contaIn the substance oI the InIormatIon above the
tear IIne, but wIthout IdentIIyIng the sensItIve sources and methods. ThIs wIII permIt wIder
dIssemInatIon, In accordance wIth the "need to know" prIncIpIe and IoreIgn dIscIosure guIdeIInes, oI
the InIormatIon beIow the tear IIne.

Source: DIrector oI CentraI nteIIIgence "DIrectIve 1]7 SecurIty ControIs on the DIssemInatIon oI
nteIIIgence nIormatIon." 3.6. ]une 30, 1998, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id1-7.htmI
TechnIcaI Data TechnIcaI Data TechnIcaI Data TechnIcaI Data
nIormatIon governed by reIerence (w) and the Export AdmInIstratIon ReguIatIon (EAR) (reIerence (z))
The export oI technIcaI data that Is InherentIy mIIItary In character Is controIIed by reIerence (w). The
export oI technIcaI data that has both mIIItary and cIvIIIan uses Is controIIed by reIerence (z).

Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006,






410
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

TechnIca TechnIca TechnIca TechnIcaI nIormatIon I nIormatIon I nIormatIon I nIormatIon
nIormatIon IncIudIng scIentIIIc, whIch reIates to research, deveIopment, engIneerIng, test, evaIuatIon,
productIon, operatIon, use and maIntenance oI munItIons, and other mIIItary suppIIes and equIpment.

Source: DeIense AcquIsItIon UnIversIty. CIossary: DeIense AcquIsItIon Acronyms and Terms. 11
th
ed.,
2003, http:]]www.dau.mII]pubs]CIossary]preIace.asp

TechnIcaI Reports Automated nIormatIon LIsts ( TechnIcaI Reports Automated nIormatIon LIsts ( TechnIcaI Reports Automated nIormatIon LIsts ( TechnIcaI Reports Automated nIormatIon LIsts (TRAL) TRAL) TRAL) TRAL)
A group oI 25 subject-based eIectronIc maII IIsts desIgned to make users aware oI DTC's most recentIy
added uncIassIIIed]unIImIted reports.

Source: DeIense TechnIcaI nIormatIon Center (DTC). PubIIc STNET CIossary.
http:]]stInet.dtIc.mII]heIp]acronyms.htmI

TechnIcaI SurveIIIance Countermeasures (TSCM) TechnIcaI SurveIIIance Countermeasures (TSCM) TechnIcaI SurveIIIance Countermeasures (TSCM) TechnIcaI SurveIIIance Countermeasures (TSCM)
1. TechnIques and measures to detect and neutraIIze a wIde varIety oI hostIIe penetratIon
technoIogIes that are used to obtaIn unauthorIzed access to cIassIIIed and sensItIve InIormatIon. TechnIcaI
penetratIons IncIude the empIoyment oI optIcaI, eIectro-optIcaI, eIectromagnetIc, IIuIdIc, and acoustIc
means as the sensor and transmIssIon medIum, or the use oI varIous types oI stImuIatIon or modIIIcatIon
to equIpment or buIIdIng components Ior the dIrect or IndIrect transmIssIon oI InIormatIon meant to be
protected.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

2. TechnIques and measures to detect, neutraIIze, and]or expIoIt a wIde varIety oI hostIIe and
IoreIgn penetratIon technoIogIes that are used to obtaIn unauthorIzed access to cIassIIIed and sensItIve
InIormatIon.

Source: DoD DIrectIve 5240.5, "TechnIcaI SurveIIIance Countermeasures (TSCM) Program. February 22,
2006, http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]524005.htm

TEMPEST (TransIent EIectromagnetIc PuIse SurveIIIance TechnoIogy) TEMPEST (TransIent EIectromagnetIc PuIse SurveIIIance TechnoIogy) TEMPEST (TransIent EIectromagnetIc PuIse SurveIIIance TechnoIogy) TEMPEST (TransIent EIectromagnetIc PuIse SurveIIIance TechnoIogy)
1. ReIers to InvestIgatIons and studIes "oI compromIsIng emanatIons assocIated wIth
InIormatIon processIng systems, as reIated to cIassIIIed InIormatIon."







411
Source: EIIIs Mount. Top Secret]Trade Secret. NeaI-Schuman, 1985.

2. TEMPEST Is an uncIassIIIed short name reIerrIng to InvestIgatIons and studIes oI
compromIsIng emanatIons. CompromIsIng emanatIons are unIntentIonaI InteIIIgence-bearIng sIgnaIs that,
II Intercepted and anaIyzed, wIII dIscIose cIassIIIed InIormatIon when they are transmItted, receIved,
handIed, or otherwIse processed by any InIormatIon processIng equIpment. 8ecause the detaIIs oI many
TEMPEST Issues are cIassIIIed and controIIed under strIct condItIons oI need-to-know, uncIassIIIed
dIscussIons must be somewhat generaI.

Source: FAS Project on nteIIIgence ReIorm, http:]]www.Ias.org]Irp]program]securIty]tempest.htm and
http:]]www.Ias.org]sgp]IIbrary]nIspom]chap11.htm

TerrorIsm nIormatIon TerrorIsm nIormatIon TerrorIsm nIormatIon TerrorIsm nIormatIon
See nIormatIon SharIng EnvIronment See nIormatIon SharIng EnvIronment See nIormatIon SharIng EnvIronment See nIormatIon SharIng EnvIronment
The term `terrorIsm InIormatIon' means aII InIormatIon, whether coIIected, produced, or dIstrIbuted by
InteIIIgence, Iaw enIorcement, mIIItary, homeIand securIty, or other actIvItIes reIatIng to-- (A) the
exIstence, organIzatIon, capabIIItIes, pIans, IntentIons, vuInerabIIItIes, means oI IInance or materIaI
support, or actIvItIes oI IoreIgn or InternatIonaI terrorIst groups or IndIvIduaIs, or oI domestIc groups or
IndIvIduaIs InvoIved In transnatIonaI terrorIsm;
(8) threats posed by such groups or IndIvIduaIs to the UnIted States, UnIted States persons, or UnIted
States Interests, or to those oI other natIons;
(C) communIcatIons oI or by such groups or IndIvIduaIs; or
(D) groups or IndIvIduaIs reasonabIy beIIeved to be assIstIng or assocIated wIth such groups or IndIvIduaIs.

Source: nteIIIgence ReIorm and TerrorIsm PreventIon Act oI 2004 (RTPA), Pub. L. No. 108-458, 118 Stat.
3638, http:]]thomas.Ioc.gov]cgI-bIn]query]DZc108:4:.]temp]~c108LC8Vk::

AIso see: AIso see: AIso see: AIso see: EIIzabeth MartIn, "TerrorIsm and ReIated Terms In Statute and ReguIatIon: SeIected Language"
CRS Report to Congress December 5, 2006. http:]]Ipc.state.gov]78437.htm (note the IInk to .pdI Is to FAS
- Does State encounter the same dIIIIcuIty In obtaInIng CRS reportsZ).

TerrorIsm nIormatIon TerrorIsm nIormatIon TerrorIsm nIormatIon TerrorIsm nIormatIon Awareness Awareness Awareness Awareness
See Data MInIng, TotaI nIormatIon Awareness See Data MInIng, TotaI nIormatIon Awareness See Data MInIng, TotaI nIormatIon Awareness See Data MInIng, TotaI nIormatIon Awareness
PrevIousIy known as TotaI nIormatIon Awareness, thIs name created In some mInds the ImpressIon that
TA was a system to be used Ior deveIopIng dossIers on U. S. cItIzens. That Is not DoD's Intent In pursuIng
thIs program. Rather, DoD's purpose In pursuIng these eIIorts Is to protect U. S. cItIzens by detectIng and
deIeatIng IoreIgn terrorIst threats beIore an attack. To make thIs objectIve absoIuteIy cIear, DARPA has
changed the program name to TerrorIsm nIormatIon Awareness.






412

TerrorIsm nIormatIon Awareness (TA) Is a research and deveIopment program that wIII Integrate
advanced coIIaboratIve and decIsIon support tooIs; Ianguage transIatIon; and data search, pattern
recognItIon, and prIvacy protectIon technoIogIes Into an experImentaI prototype network Iocused on
combatIng terrorIsm through better anaIysIs and decIsIon makIng. I successIuI, and II depIoyed, thIs
program oI programs wouId provIde decIsIon-and poIIcy-makers wIth advance actIonabIe InIormatIon and
knowIedge about terrorIst pIannIng and preparatIon actIvItIes that wouId aId In makIng InIormed decIsIons
to prevent Iuture InternatIonaI terrorIst attacks agaInst the UnIted States at home or abroad. n short,
DoD's aIm In TA Is to seek to make a sIgnIIIcant Ieap In technoIogy to heIp those workIng to "connect the
dots" oI terrorIst-reIated actIvIty. A TA-IIke system] network couId provIde the deIense and InteIIIgence
communItIes wIth tooIs and methods to soIve many oI the probIems that have been IdentIIIed In the
aItermath oI the attacks agaInst the UnIted States on September 11, 2001, 2 and that are reIated to
ImprovIng InIormatIon anaIysIs In our contInuIng war agaInst terrorIsm.

Source: DARPA. "ExecutIve Summary." Report to Congress regardIng the TerrorIsm nIormatIon Awareness
Program, http:]]www.eII.org]PrIvacy]TA]TA-report.htmI

TerrorIsm nIormatIon PreventIon System (OperatIon T TerrorIsm nIormatIon PreventIon System (OperatIon T TerrorIsm nIormatIon PreventIon System (OperatIon T TerrorIsm nIormatIon PreventIon System (OperatIon TPS) PS) PS) PS)
1. The program was announced In concept In ]anuary 2002 Ior the stated purpose oI creatIng a
natIonaI InIormatIon sharIng system Ior specIIIc Industry groups to report suspIcIous, pubIIcIy observabIe
actIvIty that couId be reIated to terrorIsm. The program Is scheduIed to be operatIonaI In the IaII oI 2002
as one oI the new CItIzen Corps programs.

The InItIatIve's desIgn Is based on exIstIng programs, such as HIghway Watch and Coast Watch, that aIIow
truckers and shIp captaIns to report dangerous condItIons aIong theIr routes. n response to sIgnIIIcant
demand among Industry groups, OperatIon TPS wouId make these programs avaIIabIe natIonwIde by
provIdIng specIIIc Industry groups a sIngIe phone number Ior reportIng potentIaIIy terrorIst-reIated
actIvItIes occurrIng In pubIIc areas. SpecIIIcaIIy, Industry groups have Iooked to the ]ustIce Department to
oIIer a reIIabIe and cost-eIIectIve system that theIr workers couId use to report InIormatIon to state, IocaI,
and IederaI Iaw enIorcement agencIes about unusuaI actIvItIes they mIght observe In the normaI course oI
theIr daIIy routInes.

Source: TPS "CItIzen Corps" Webpages cached The MemoryHoIe
http:]]www.thememoryhoIe.org]poIIcestate]tIps-deIeted.htm ; aIso see ]ay StanIey and 8arry SteInhardt.
"8Igger Monster, Weaker ChaIns: The Crowth oI an AmerIcan SurveIIIance SocIety." ACLU, ]anuary 2003,
http:]]www.acIu.org]PrIvacy]PrIvacy.cImZD=11573&c=39







413
2. Any and aII actIvItIes oI the FederaI Covernment to ImpIement the proposed component
program oI the CItIzen Corps known as OperatIon TPS (TerrorIsm nIormatIon and PreventIon System) are
hereby prohIbIted.

Source: HomeIand SecurIty Act oI 2002. SectIon 880,
http:]]www.Ias.org]sgp]congress]2002]hr5710-111302.htmI

3. TraIned by the F8, "Hundreds oI poIIce, IIreIIghters, paramedIcs and even utIIIty workers have
been traIned and recentIy dIspatched as "TerrorIsm LIaIson OIIIcers" In CoIorado and a handIuI oI other
states to hunt Ior "suspIcIous actIvIty" - and are reportIng theIr IIndIngs Into secret government
databases." (FInIey)

See attorney Mark SIIversteIn's observatIon that recruItment oI "TerrorIsm LIaIson OIIIcers" (TLOs) Is
remInIscent oI TPS. (RothschIId)

Source: 8ruce FInIey "Terror watch uses IocaI eyes 181," Denver Post ]une 28, 2008,
http:]]www.denverpost.com]news]cI9725077 and Matthew RothschIId, "8ush's Secret Army oI Snoops
and SnItches" The ProgressIve ]uIy 9, 2008, http:]]www.aIternet.org]rIghts]90829]

TerrorIst FInance TrackIng Program TerrorIst FInance TrackIng Program TerrorIst FInance TrackIng Program TerrorIst FInance TrackIng Program
See SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT) See SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT) See SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT) See SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT)
1. The TerrorIst FInance TrackIng Program, whose exIstence was kept secret.Is run by the CentraI
nteIIIgence Agency and overseen by the U.S. Treasury Department. Through It, counterterrorIsm anaIysts
request InIormatIon on actIvItIes by suspected terrorIsts Irom the databases oI the SocIety Ior WorIdwIde
nterbank FInancIaI TeIecommunIcatIon, or SWFT, a 8eIgIum-based, bank-owned entIty that coIIects and
reIays IInancIaI message traIIIc between thousands oI banks In more than 200 countrIes.

Source: LIz Moyer. SwIIt DeIense. Forbes ]une 23, 2006, http:]]www.Iorbes.com]2006]06]23]swIIt-
terrorIst-money-transIer-cxIm0623swIIt.htmI
2. Whereas IoIIowIng the September 11, 2001 terrorIst attacks, the PresIdent, wIth the support oI
Congress, dIrected the FederaI Covernment to use aII approprIate measures to IdentIIy, track, and pursue
not onIy those persons who commIt terrorIst acts here and abroad, but aIso those who provIde IInancIaI or
other support Ior terrorIst actIvIty;
Whereas consIstent wIth thIs dIrectIve, the UnIted States Covernment InItIated a IawIuIIy cIassIIIed TerrorIst
FInance TrackIng Program and the Secretary oI the Treasury Issued IawIuI subpoenas to gather
InIormatIon on suspected InternatIonaI terrorIsts through bank transactIon InIormatIon;






414
Whereas under the TerrorIst FInance TrackIng Program, the UnIted States Covernment onIy revIews
InIormatIon as part oI specIIIc terrorIsm InvestIgatIons and based on InteIIIgence that Ieads to targeted
searches, such as searches oI a specIIIc IndIvIduaI or entIty;
Whereas the TerrorIst FInance TrackIng Program Is IIrmIy rooted In sound IegaI authorIty based on
ExecutIve Orders and statutory mandates, IncIudIng the nternatIonaI Emergency EconomIc Powers Act oI
1977 and the UnIted NatIons PartIcIpatIon Act;
Whereas the TerrorIst FInance TrackIng Program consIsts oI the approprIate and IImIted use oI transactIon
InIormatIon whIIe maIntaInIng respect Ior IndIvIduaI prIvacy; [contInued].
Source: "Whereas the UnIted States Is currentIy engaged In a gIobaI war on terrorIsm to prevent Iuture
attacks agaInst AmerIcan cIvIIIan and mIIItary Interests at home and abroad" H. Res 895 109
th
Congress,
2d SessIon ]une 28, 2006. Thomas, http:]]thomas.Ioc.gov]cgI-bIn]query]DZc109:1:.]temp]~c109PPeoPw:
3. Treasury cItes ExecutIve Order 13224, 3 "8IockIng Property and ProhIbItIng TransactIons WIth
Persons Who CommIt, Threaten to CommIt, or Support TerrorIsm," as authorIty Ior the SWFT program as a
component oI Its "TerrorIst FInancIng TrackIng Program." E.O. 13224 was Issued by PresIdent 8ush on
September 23, 2001, pursuant to the nternatIonaI Emergency EconomIc Powers Act (EEPA), 50 U.S.C.
1701-1706. EEPA permIts the PresIdent to exercIse broad powers over property or IInancIaI transactIons,
IncIudIng transIers oI credIt or payments through bankIng InstItutIons and securItIes or other obIIgatIons,
that InvoIve any Interest oI a IoreIgn country or a natIonaI oI that country. To Invoke Its authorItIes, the
PresIdent must decIare a natIonaI emergency based on the exIstence oI an unusuaI or extraordInary threat
to U.S. natIonaI securIty, IoreIgn poIIcy, or economy havIng Its source, In whoIe or substantIaI part, outsIde
the UnIted States.
FIndIng that IoreIgn terrorIst acts, IncIudIng those oI September 11, and threats oI Iuture terrorIsm
constItute an unusuaI and extraordInary threat to the natIonaI securIty, IoreIgn poIIcy, and economy oI the
UnIted States, PresIdent 8ush Issued E.O. 13224. t deIegates to the Secretary oI the Treasury aII necessary
authorIty under EEPA to bIock
the assets wIthIn U.S. jurIsdIctIon oI named IndIvIduaIs and entItIes who are determIned by the Secretary oI
State and the Secretary oI the Treasury, In consuItatIon wIth each other and wIth the Attorney CeneraI, to
pose a sIgnIIIcant rIsk oI terrorIsm or to be assIstIng, sponsorIng, or provIdIng IInancIaI, materIaI, or
technoIogIcaI support Ior terrorIst acts or desIgnated persons.






415
Source: ]ennIIer K. EIsea and M. Maureen Murphy. "Treasury's TerrorIst FInance Program's Access to
nIormatIon HeId by the SocIety Ior WorIdwIde nterbank FInancIaI TeIecommunIcatIon (SWFT)." CRS Report
to Congress ]uIy 6, 2006, http:]]www.Ias.org]sgp]crs]natsec]RS22469.pdI

TerrorIst dent TerrorIst dent TerrorIst dent TerrorIst dentItIes Datamart EnvIronment (TDE) ItIes Datamart EnvIronment (TDE) ItIes Datamart EnvIronment (TDE) ItIes Datamart EnvIronment (TDE)
Hosted by the NCTC and dIstrIbuted by the TerrorIst ScreenIng Center (TSC), that provIdes consoIIdated
and vaIIdated InIormatIon on terrorIst IdentItIes to a wIde range oI customers...

Source: SE, AnnuaI Report to Congress on the nIormatIon SharIng EnvIronment 2008,
http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

TerrorIst ScreenIng Center TerrorIst ScreenIng Center TerrorIst ScreenIng Center TerrorIst ScreenIng Center
See TPOFF, Watch LIsts See TPOFF, Watch LIsts See TPOFF, Watch LIsts See TPOFF, Watch LIsts
1. Attorney CeneraI ]ohn AshcroIt, Secretary oI HomeIand SecurIty Tom RIdge, Secretary oI State
CoIIn PoweII, F8 DIrector Robert MueIIer, and DIrector oI CentraI nteIIIgence Ceorge Tenet announced the
creatIon oI the TerrorIst ScreenIng Center (TSC) to consoIIdate terrorIst watchIIsts and provIde 24]7
operatIonaI support Ior thousands oI FederaI screeners across the country and around the worId.
ConsoIIdatIng nIormatIon: The TSC wIII receIve the vast majorIty oI Its InIormatIon about known or
suspected terrorIsts Irom the TTC aIter TTC has assembIed and anaIyzed that InIormatIon Irom a wIde
range oI sources. n addItIon, the F8 wIII provIde the TSC wIth InIormatIon about pureIy domestIc
terrorIsm, I.e., havIng no connectIon to InternatIonaI terrorIst actIvItIes. The TSC wIII consoIIdate thIs
InIormatIon Into an uncIassIIIed terrorIst screenIng database and make the database accessIbIe to querIes
Ior IederaI, state, and IocaI agencIes Ior a varIety oI screenIng purposes.
The TSC, through the partIcIpatIon oI the Department oI HomeIand SecurIty, Department oI ]ustIce,
Department oI State, and nteIIIgence CommunIty representatIves, wIII determIne whIch InIormatIon In the
Database wIII be avaIIabIe Ior whIch types oI screenIng.
SaIeguardIng nIormatIon: The TSC wIII not IndependentIy coIIect any InIormatIon on U.S. cItIzens. n Iact,
the TSC does not coIIect InIormatIon at aII - It onIy receIves InIormatIon provIded by the TTC and the F8.
The TTC wIII provIde to the TSC aII approprIate and necessary InIormatIon connected to InternatIonaI
terrorIsm about any IndIvIduaIs - U.S. cItIzens or not - that TTC partner agencIes hoId pursuant to theIr
own authorItIes, and the F8 wIII provIde to the TSC approprIate and necessary InIormatIon concernIng
domestIc terrorIsm, regardIess oI whether It InvoIves U.S. cItIzens. I the TSC receIves InIormatIon on U.S.
cItIzens connected wIth terrorIsm, Its use oI that InIormatIon Is subject to the same IegaI IImItatIons to
whIch It wouId be subject II the InIormatIon were not IncIuded In the Database.






416
Source: Department oI ]ustIce. "TerrorIst ScreenIng Center Fact Sheet." 2003,
http:]]www.IbI.gov]pressreI]pressreI03]tscIactsheet091603.htm
2. The Department oI State Is proud to be part oI the TerrorIst ScreenIng Center," Secretary oI
State PoweII saId. "ThIs cooperatIve eIIort wIII heIp the UnIted States IIght terrorIsm by IdentIIyIng vIsa
appIIcants and others who are known to be threats to our securIty, beIore they can do us harm.
CombInIng the knowIedge oI the F8, Department oI ]ustIce, nteIIIgence CommunIty, Department oI
HomeIand SecurIty and the Department oI State's TPOFF program Is a Iong-desIred goaI that Is now
reaIIty. We are gratIIIed that the State Department's TPOFF program, whIch contaIns over 100,000 names
oI potentIaI terrorIsts, wIII Iorm the basIs Ior both the TTC and TSC databases. ReaI-tIme access by our
consuIar oIIIcers to the InIormatIon provIded by the other agencIes wIII make vIsa Issuance more secure
and better protect AmerIca's borders. We Iook Iorward to a successIuI partnershIp wIth our IeIIow agencIes
In the war on terrorIsm.
Source: WhIte House press reIease. "New TerrorIst ScreenIng Center EstabIIshed." September 16, 2001,
[See the Wayback MachIne,
http:]]web.archIve.org]web]20080307005324]http:]]www.whItehouse.gov]news]reIeases]2003]09]200
30916-8.htmI ]

3. A muItI-agency organIzatIon admInIstered by the FederaI 8ureau oI nvestIgatIon (F8) that
consoIIdates terrorIst watchIIst InIormatIon and provIdes 24-hour, 7-day a week operatIonaI support Ior
IederaI, state, IocaI, and IoreIgn governments.1 The TSC was created by the September 16, 2003,
HomeIand SecurIty PresIdentIaI DIrectIve-6 (HSPD-6), whIch dIrected the TSC to Integrate aII exIstIng U.S.
government terrorIst watchIIsts and assIst In the screenIng oI IndIvIduaIs who, Ior exampIe, appIy Ior a
vIsa, attempt to enter the UnIted States through a port-oI-entry, attempt to traveI InternatIonaIIy on a
commercIaI aIrIIne, or are stopped by a IocaI Iaw enIorcement oIIIcer Ior a traIIIc vIoIatIon. PrIor to the
estabIIshment oI the TSC, the IederaI government reIIed on at Ieast a dozen separate terrorIst watchIIsts
maIntaIned by dIIIerent IederaI agencIes.

SpecIIIcaIIy, we IdentIIIed 20 watchIIst records on suspected or known terrorIsts that were not made
avaIIabIe to the IrontIIne screenIng agents (such as a border patroI oIIIcer, vIsa appIIcatIon revIewer, or
IocaI poIIce oIIIcer) Ior use durIng watchIIst screenIng encounters (such as at a border crossIng, through
the vIsa appIIcatIon process, or durIng a routIne traIIIc stop). We aIso Iound that the number oI dupIIcate
records In the database has sIgnIIIcantIy Increased sInce our Iast revIew. (p.II).

Source: DO], OIIIce oI the nspector CeneraI, FoIIow-Up AudIt oI the TerrorIst ScreenIng Center, AudIt
Report 07-41, September 2007,






417
http:]]www.usdoj.gov]oIg]reports]F8]a0741]IInaI.pdI and SE, AnnuaI Report to Congress on the
nIormatIon SharIng EnvIronment 2008, http:]]www.Ias.org]Irp]agency]Ise]2008report.pdI

TerrorIst SurveIIIance Program (TSP) TerrorIst SurveIIIance Program (TSP) TerrorIst SurveIIIance Program (TSP) TerrorIst SurveIIIance Program (TSP)
WarrantIess surveIIIance conducted by the NatIonaI SecurIty Agency and suspended Iate 2006-earIy 2007
In Iavor oI the FSA Court.

Source: OM8 Watch, "NSA WarrantIess SpyIng Program Shut Down, but QuestIons RemaIn," ]une 23, 2007
http:]]www.ombwatch.org]artIcIe]artIcIevIew]3690] and the 2006 case ACLU vs. NSA,
http:]]www.acIu.org]saIeIree]nsaspyIng]Index.htmI. AudIo at:
http:]]w2.eII.org]IegaI]cases]att]ACLUappeaIargument.mp3
TerrorIst WatchIIst Person Data Exchange Standard TerrorIst WatchIIst Person Data Exchange Standard TerrorIst WatchIIst Person Data Exchange Standard TerrorIst WatchIIst Person Data Exchange Standard
See CIobaI ]ustIce XML Data ModeI, See CIobaI ]ustIce XML Data ModeI, See CIobaI ]ustIce XML Data ModeI, See CIobaI ]ustIce XML Data ModeI, TerrorIst Thre TerrorIst Thre TerrorIst Thre TerrorIst Threat ntegratIon Center at ntegratIon Center at ntegratIon Center at ntegratIon Center
From the memorandum oI understandIng between the Attorney CeneraI, the Secretary oI HomeIand
SecurIty, and the DIrector oI CentraI nteIIIgence:
ProvIde a data exchange Iormat Ior terrorIst watchIIst data that supports the Department oI State,
Department oI ]ustIce, nteIIIgence CommunIty under the DIrector oI CentraI nteIIIgence, and the
Department oI HomeIand SecurIty to deveIop and maIntaIn, to the extent permIssIbIe by Iaw,
the most thorough, accurate, and current InIormatIon possIbIe about IndIvIduaIs known or
approprIateIy suspected to be or have been InvoIved In actIvItIes constItutIng, In preparatIon Ior,
In aId oI, or reIated to terrorIsm
n ]une 2003, the C MWC chartered a paneI comprIsed oI representatIves Irom the F8, the Department oI
State, the NatIonaI nteIIIgence AgencIes, the C MWC, the TerrorIst Threat ntegratIon Center, the
Department oI DeIense, and the Department oI HomeIand SecurIty to estabIIsh a terrorIst watchIIst person
data exchange standard (TWPDES). The paneI drew on a varIety oI reIerence InIormatIon, IncIudIng
seIectIng standards and agency ImpIementatIons, to produce a watchIIst exchange data structure as a W3C
XML schema, backed up by a cIass modeI, a data eIement dIctIonary, and supportIng documentatIon.
The prImary reIerences used by the paneI were the person-oI-Interest cIass Irom an NSA entIty-oI-
Interest cIass modeI, and two Department oI ]ustIce sources: The ]ustIce XML Data DIctIonary (prereIease
3.0.0) and the NatIonaI CrIme nIormatIon Center codes.
The paneI was augmented at tImes by representatIves oI MTRE CorporatIon, who specIaIIze In the
components oI proper names, and by representatIves oI the DoD 8IometrIcs Management OIIIce, whIch Is
promuIgatIng the Common 8IometrIc Exchange FIIe Format.






418
Source: nteIIIgence CommunIty Metadata WorkIng Croup. http:]]Icmwg.org]person]IntroductIon.asp
[Page removed, not at Wayback MachIne]

ThInThread ThInThread ThInThread ThInThread
The NatIonaI SecurIty Agency pIIot program deveIoped In the Iate 1990s that wouId have enabIed It [NSA]
to gather and anaIyze huge amounts oI communIcatIons data wIthout runnIng aIouI oI prIvacy Iaws. 8ut
aIter the Sept. 11 attacks, It sheIved the project - not because It IaIIed to work but because oI bureaucratIc
InIIghtIng and a sudden WhIte House expansIon oI the agency's surveIIIance powers, accordIng to severaI
InteIIIgence oIIIcIaIs. ThInThread was deveIoped to handIe greater voIumes oI InIormatIon, partIy In
expectatIon oI threats surroundIng the mIIIennIum ceIebratIons. Sources say It bundIed Iour cuttIng-edge
surveIIIance tooIs. The agency opted Instead to adopt onIy one component oI the program, whIch
produced a Iar Iess capabIe and rIgorous program. t remaIns the backbone oI the NSA's warrantIess
surveIIIance eIIorts, trackIng domestIc and overseas communIcatIons Irom a vast databank oI InIormatIon,
and monItorIng seIected caIIs.

Source: SIobhan Corman. "NSA rejected system that sIIted phone data IegaIIy." 8aItImore Sun May 18,
2006 [No Ionger onIIne. Check at your IocaI IIbrary].

ThIrd ThIrd ThIrd ThIrd- -- -Agency RuIe Agency RuIe Agency RuIe Agency RuIe
1. The governIng ruIe that states that except as provIded In sectIon 102, NatIonaI SecurIty Act oI
1947, cIassIIIed InIormatIon orIgInatIng In one U.S. agency (e.g. DoD) wIII not be dIssemInated by another
agency to whIch the InIormatIon has been made avaIIabIe wIthout the consent oI the orIgInatIng agency.

Source: DoD. Army ReguIatIon AR381-45. "nvestIgatIve Records ReposItory." August 25, 1989.
http:]]www.army.mII]usapa]epubs]pdI]r38145.pdI, and NatIonaI SecurIty Act oI 1947.
http:]]www.InteIIIgence.gov]0-natsecact1947.shtmI#s102

2. When consIderIng dIssemInatIng sensItIve materIaI, a Iaw enIorcement organIzatIon shouId
Impose the "ThIrd Agency RuIe." ThIs means that any recIpIent oI InteIIIgence Is prohIbIted Irom sharIng
the InIormatIon wIth another (I.e., thIrd) agency. ThIs aIIords some degree oI controI and accountabIIIty,
yet may be waIved by the orIgInatIng agency when approprIate.

Source: DO], Law EnIorcement nteIIIgence CIassIIIcatIons, Products and DIssemInatIon, November 23,
2004, http:]]www.cops.usdoj.gov]pdI]e09042536Chapter06.pdI
aw EnIorcement nteIIIgence
Threat Threat Threat Threat
n the securIty technoIogy context, the IIkeIIhood that attempts wIII be made to gaIn unauthorIzed access
to InIormatIon or IacIIItIes.






419

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

Threat AnaIysIs Threat AnaIysIs Threat AnaIysIs Threat AnaIysIs
ExamInatIon oI InIormatIon to IdentIIy the eIements comprIsIng a threat.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary, ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI

TARA (TactIcaI TARA (TactIcaI TARA (TactIcaI TARA (TactIcaI nteIIIgence nteIIIgence nteIIIgence nteIIIgence and ReIated ActIvItIes) and ReIated ActIvItIes) and ReIated ActIvItIes) and ReIated ActIvItIes)
TactIcaI nteIIIgence and ReIated ActIvItIes comprIsed oI the array oI reconnaIssance and target acquIsItIon
programs that are a IunctIonaI part oI the basIc mIIItary Iorce structure and provIde dIrect InIormatIon
support to mIIItary operatIons.
Source: Permanent SeIect CommIttee on nteIIIgence. House oI RepresentatIves,
One Hundred Fourth Congress. C21: The nteIIIgence CommunIty In the 21st Century,
http:]]www.access.gpo.gov]congress]house]InteI]Ic21]Ic21toc.htmI and RIchard A. 8est, ]r.
"nteIIIgence, SurveIIIance, and ReconnaIssance (SR) Programs: ssues Ior Congress." CRS Report to
Congress February 22, 2005, http:]]www.Ias.org]sgp]crs]InteI]RL32508.pdI
TPOFF TPOFF TPOFF TPOFF
See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center
The U.S. government's prIncIpaI terrorIst watch IIst database prIor to HSPD-6. TPOFF Is a cIassIIIed
computer Iookout system, whIch was maIntaIned by the DOS's [Department oI State, 8ureau oI nteIIIgence
Research] NR to IdentIIy and watch-IIst known and suspected terrorIsts. Created In 1987, It orIgInaIIy
consIsted oI 3x5 Index cards In a shoe box.

8egInnIng In 1987, the DOS [Department oI State] began keepIng watch IIst (Iookout) records on known
and suspected terrorIsts through a system known as TPOFF. WhIIe the DOS had maIntaIned computerIzed
vIsa records sInce 1965, IncIudIng watch IIsts, the events surroundIng the IIrst WorId Trade Center
bombIng In 1993 prompted the CA to acceIerate the deveIopment oI the ConsuIar Lookout and SecurIty
System (CLASS), so that, among other records, TPOFF-generated terrorIst watch IIst records couId be
more easIIy and eIIIcIentIy searched by computer at U.S. consuIar posts and embassIes abroad. ConsuIar,
InteIIIgence, ImmIgratIon, and Iaw enIorcement oIIIcers nomInate IndIvIduaIs Ior IncIusIon In TPOFF.

Source: WIIIIam ]. Krouse. "TerrorIst dentIIIcatIon, ScreenIng, and TrackIng Under HomeIand SecurIty
PresIdentIaI DIrectIve 6." CRS Report to Congress AprII 21, 2004. http:]]www.Ias.org]Irp]crs]RL32366.pdI






420

TOLLS TOLLS TOLLS TOLLS
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Drug EnIorcement Agency. s a database oI teIephone caIIs Irom court ordered and
approved wIretaps and TItIe InvestIgatIons. nIormatIon such as teIephone numbers, tIme and date oI
caIIs, and caII duratIon Is captured. Data are mIned Ior patterns to gIve Ieads In InvestIgatIons oI drug
traIIIckIng;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: No;
Features: Other agency data: No.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

Top Secret Top Secret Top Secret Top Secret- -- -CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen CIeared U.S. CItIzen:
A cItIzen oI the UnIted States who has has has has undergone a background InvestIgatIon by an authorIzed U.S.
Covernment Agency and been Issued a Top Secret securIty cIearance In accordance wIth ExecutIve
Orders 12968 and 10450 and ImpIementIng guIdeIInes and standards pubIIshed In 32 CFR Part 147.

Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc SecurIty
Terms." November 13, 2003, http:]]www.state.gov]m]a]dIr]regs]

Top Top Top Top Secret ControI Number Secret ControI Number Secret ControI Number Secret ControI Number
ConsIsts oI the controI symboI oI the organIzatIon eIement, the Iast two dIgIts oI the caIendar year, the
consecutIve number oI the Top Secret document orIgInated or receIved that year, and the copy number.
For exampIe:

I the Top Secret controI number Is LND-89]17, copy 3, LND Is the TS controI number Ior London; 89 Is
the caIendar year; 17 IndIcates the 17
th
TS document eIther orIgInated or receIved at post that year; and
copy 3 IndIcates the thIrd copy made oI LND-89]17.

Source: Department oI State. ForeIgn AIIaIrs ManuaI. 12 FAM 530, "StorIng and SaIeguardIng CIassIIIed
MaterIaI." http:]]www.state.gov]m]a]dIr]regs]

TotaI nIormatIon Awareness TotaI nIormatIon Awareness TotaI nIormatIon Awareness TotaI nIormatIon Awareness
See AsymmetrIc nIormatIon, Data MInIng, TerrorIsm nIormatIon Awareness See AsymmetrIc nIormatIon, Data MInIng, TerrorIsm nIormatIon Awareness See AsymmetrIc nIormatIon, Data MInIng, TerrorIsm nIormatIon Awareness See AsymmetrIc nIormatIon, Data MInIng, TerrorIsm nIormatIon Awareness






421
DeIense Advanced Research Projects Agency (DARPA) program headed by nIormatIon Awareness
OIIIce DIrector ]ohn PoIndexter, and Is now known as the TerrorIsm nIormatIon Awareness OIIIce. As "the
key to IIghtIng terrorIsm Is InIormatIon," TA's mIssIon was to deveIop data-mInIng, knowIedge dIscovery
tooIs, and predIctIve [terrorIst]terrorIsm] modeIs, that wouId "ImagIne, deveIop, appIy, Integrate,
demonstrate and transItIon InIormatIon technoIogIes, components and prototype, cIosed-Ioop,
InIormatIon systems that wIII counter asymmetrIc threats by achIevIng totaI InIormatIon awareness useIuI
Ior preemptIon; natIonaI securIty warnIng; and natIonaI securIty decIsIon makIng."

Source: EIectronIc FrontIer FoundatIon "TotaI nIormatIon Awareness." http:]]www.eII.org]PrIvacy]TA],
http:]]www.eII.org]PrIvacy]TA]20030523tIareportrevIew.php, ]ohn PoIndexter, "OvervIew oI the
nIormatIon Awareness OIIIce." (archIved at FAS http:]]www.Ias.org]Irp]agency]dod]poIndexter.htmI),
and DARPA. nIormatIon Awareness OIIIce sIte (archIved at The Memory HoIe),
http:]]www.thememoryhoIe.org]poIIcestate]Iao-Iogo.htm

TradecraIt TradecraIt TradecraIt TradecraIt
The best practIces oI the nteIIIgence CommunIty (C) are termed tradecraIt. n the earIy 1990s, anaIytIc
tradecraIt were coIIected In technIcaI notes and used Ior traInIng. A CompendIum oI AnaIytIc TradecraIt
Notes was pubIIshed In 1996.

Source: Edward WaItz. KnowIedge Management In the nteIIIgence EnterprIse. 8oston: Artech House, 2003.
151-152; A CompendIum oI AnaIytIc TradecraIt Notes, VoIume (Notes 1-10),
http:]]www.au.aI.mII]au]awc]awcgate]cIa]tradecraItnotes]contents.htm

Trademark Trademark Trademark Trademark
A word, phrase, symboI or desIgn, or combInatIon oI words, phrases, symboIs or desIgns, whIch IdentIIIes
and dIstInguIshes the source oI the goods or servIces oI one party Irom those oI others. A servIce mark Is
the same as a trademark except that It IdentIIIes and dIstInguIshes the source oI a servIce rather than a
product.

Source: U.S. Patent and Trademark OIIIce. http:]]www.uspto.gov]

Transc Transc Transc TranscIassIIIcatIon IassIIIcatIon IassIIIcatIon IassIIIcatIon
nIormatIon removed Irom the RD category by a joInt determInatIon oI DOE and DOD and pIaced In the
FRD category In accordance wIth sectIon 142d oI the AtomIc Energy Act. ThIs InIormatIon Is prImarIIy
reIated to the mIIItary utIIIzatIon oI atomIc weapons and can be adequateIy saIeguarded as NS. ThIs
authorIty Is severeIy restrIcted and cannot be exercIsed by RD CIassIIIers. Contact the DOE Ior InIormatIon.






422
Source: DoD. DeIense PersonneI SecurIty Research Center. "EmpIoyees CuIde to SecurIty
ResponsIbIIItIes," http:]]www.hq.nasa.gov]oIIIce]ospp]securItyguIde]Home.htm
Trap and Trace DevIce Trap and Trace DevIce Trap and Trace DevIce Trap and Trace DevIce
SectIon 3127(4) oI tItIe 18, UnIted States Code, Is amended-
(A) by strIkIng "oI an Instrument'' and aII that IoIIows through the semIcoIon and InsertIng "or other
dIaIIng, routIng, addressIng, and sIgnaIIng InIormatIon reasonabIy IIkeIy to IdentIIy the source oI a wIre or
eIectronIc communIcatIon, provIded, however, that such InIormatIon shaII not IncIude the contents oI any
communIcatIon;''; and (8) by InsertIng "or process'' aIter "a devIce''.

Source: UnItIng and StrengthenIng AmerIca by ProvIdIng ApproprIate TooIs RequIred to ntercept and
Obstruct TerrorIsm (USA PATROT ACT) Act oI 2000, sectIon 216,
http:]]purI.access.gpo.gov]CPO]LPS17579

TruthIuI Messages TruthIuI Messages TruthIuI Messages TruthIuI Messages
AccordIng to "documents and IntervIews wIth contractors, government oIIIcIaIs and mIIItary personneI,"
the U.S. government "has been conductIng an InIormatIon war that Is extensIve, costIy and oIten hIdden."
The goaI Is "to counter antI-AmerIcan sentIment In the MusIIm worId." The 1,200-strong Fourth
PsychoIogIcaI OperatIons Croup based at Fort 8ragg, North CaroIIna, "turns out what Its oIIIcers caII
'truthIuI messages' to support" the government's objectIves.

Source: ]eII Certh, "MIIItary's nIormatIon War s Vast and OIten SecretIve." New York TImes December 11,
2005. http:]]www.nytImes.com; AIexander Cockburn "CNN and PSYOPS," March 26, 2000,
http:]]www.counterpunch.org]cnnpsyops.htmI

TSP TSP TSP TSP
See ForeIgn nteIIIgence SurveIIIance Act (FSA), State Secrets PrIvIIege See ForeIgn nteIIIgence SurveIIIance Act (FSA), State Secrets PrIvIIege See ForeIgn nteIIIgence SurveIIIance Act (FSA), State Secrets PrIvIIege See ForeIgn nteIIIgence SurveIIIance Act (FSA), State Secrets PrIvIIege
A secret program (hereInaIter "TSP") undIsputedIy Inaugurated by the NatIonaI SecurIty Agency (hereInaIter
"NSA") at Ieast by 2002 and contInuIng today, whIch Intercepts wIthout beneIIt oI warrant or other judIcIaI
approvaI, prIor or subsequent, the InternatIonaI teIephone and Internet communIcatIons oI numerous
persons and organIzatIons wIthIn thIs country. The TSP has been acknowIedged by thIs AdmInIstratIon to
have been authorIzed by the PresIdent's secret order durIng 2002 and reauthorIzed at Ieast thIrty tImes
sInce.

The Permanent njunctIon oI the TSP requested by PIaIntIIIs Is granted Inasmuch as each oI the Iactors
requIred to be met to sustaIn such an InjunctIon have undIsputedIy been met.59 The IrreparabIe Injury
necessary to warrant InjunctIve reIIeI Is cIear, as the FIrst and Fourth Amendment rIghts oI PIaIntIIIs are
vIoIated by the TSP. See DombrowskI v. PIIster, 380 U.S. 479 (1965). The IrreparabIe Injury converseIy






423
sustaIned by DeIendants under thIs InjunctIon may be rectIIIed by compIIance wIth our ConstItutIon
and]or statutory Iaw, as amended II necessary. PIaIntIIIs have prevaIIed, and the pubIIc Interest Is cIear, In
thIs matter. t Is the uphoIdIng oI our ConstItutIon. As ]ustIce Warren wrote In U.S. v. RobeI, 389 U.S. 258
(1967): mpIIcIt In the term 'natIonaI deIense' Is the notIon oI deIendIng those vaIues and Ideas whIch set
thIs NatIon apart. . . . t wouId Indeed be IronIc II, In the name oI natIonaI deIense, we wouId sanctIon the
subversIon oI . . . those IIbertIes . . . whIch makes the deIense oI the NatIon worthwhIIe.

Source: ACLU v. NatIonaI SecurIty Agency, August 17, 2006,
http:]]www.acIu.org]Images]nsaspyIng]assetupIoadIIIe68926477.pdI

TwIIIght nIormatIon TwIIIght nIormatIon TwIIIght nIormatIon TwIIIght nIormatIon
See CategorIcaI ExcIusIon, NatIonaI SecurIty, PartItIon, RedactIon, Secrecy See CategorIcaI ExcIusIon, NatIonaI SecurIty, PartItIon, RedactIon, Secrecy See CategorIcaI ExcIusIon, NatIonaI SecurIty, PartItIon, RedactIon, Secrecy See CategorIcaI ExcIusIon, NatIonaI SecurIty, PartItIon, RedactIon, Secrecy
TwIIIght nIormatIon "IIes somewhere between deep conceaIment and IuII dIscIosure" (Thompson).
63

CompetIng eIements oI secrecy and partIaI dIscIosure are the bIpoIar eIements oI twIIIght InIormatIon.
TwIIIght InIormatIon may be partIaIIy reIeased through (redacted) Freedom oI nIormatIon Act requests,
consIst oI InIormatIon prevIousIy consIdered cIassIIIed, sensItIve, or proprIetary, or sImpIy be omItted due
to reguIatory perceptIons oI no rIsk, as In the case oI NEPA's categorIcaI excIusIon.

TwIIIght InIormatIon has Its roots In the Reagan AdmInIstratIon NatIonaI SecurIty DIrectIve NSDD-145,
whIch authorIzed the NatIonaI SecurIty Agency (NSA) to deveIop means to protect "uncIassIIIed sensItIve
InIormatIon." NSDD-145 permItted NSA to controI the dIssemInatIon oI government, government-derIved,
and non-government InIormatIon that mIght "adverseIy aIIect the natIonaI securIty." NSDD-145 has had a
powerIuI Impact on IIbrarIans, pubIIshers, scIentIsts, and cItIzens who argue that natIonaI securIty
cIassIIIcatIon aIready exIsts to protects sensItIve InIormatIon.

Source: DeIInItIon, Maret; UnIted States. NatIonaI CommIssIon on LIbrarIes and nIormatIon ScIence
(NCLS). HearIng on SensItIve 8ut Not CIassIIIed nIormatIon, WashIngton, D.C.: 1988, and Herbert N.
FoersteI. Secret ScIence: FederaI ControI oI AmerIcan ScIence and TechnoIogy. Westport, CT: Praeger,
1993, (EspecIaIIy Chapter 5, "Secret 8ut Not CIassIIIed")



~ U ~ ~ U ~ ~ U ~ ~ U ~

63
Remarks oI Senator ]ohn Kerry In speakIng oI Senate coIIeague DanIeI MoynIhan: ".our vast
InteIIIgence apparatus, buIIt to sustaIn AmerIca In the Iong twIIIght struggIe oI the CoId War contInues to
grow at an exponentIaI rate." CongressIonaI Record May 1, 1997,
http:]]www.Ias.org]sqp]congress]kerry.htmI






424
U2 U2 U2 U2
See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs
A cIassIIIcatIon and dIstrIbutIon statement to descrIbe uncIassIIIed, unIImIted dIstrIbutIon documents and
cItatIons approved Ior pubIIc reIease.

Source: DeIense TechnIcaI nIormatIon Center (DTC). "PubIIc STNET CIossary."
http:]]stInet.dtIc.mII]heIp]acronyms.htmI

U UU UL LL L
See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs See CIassIIIcatIon MarkIngs ControI MarkIngs
A cIassIIIcatIon and dIstrIbutIon statement to descrIbe uncIassIIIed, unIImIted dIstrIbutIon documents and
cItatIons. These documents must be requested on DTC Form 55 (Request Ior ReIease oI LImIted
Document) II you do not have permIssIon to vIew or order the document.

Source: DeIense TechnIcaI nIormatIon Center (DTC). "PubIIc STNET CIossary."
http:]]stInet.dtIc.mII]heIp]acronyms.htmI

UnacknowIedged SAP UnacknowIedged SAP UnacknowIedged SAP UnacknowIedged SAP
See SpecIaI Access Programs See SpecIaI Access Programs See SpecIaI Access Programs See SpecIaI Access Programs
A SAP havIng protectIve controIs ensurIng the exIstence oI the program Is not acknowIedged, aIIIrmed, or
made known to any person not authorIzed Ior such InIormatIon.

Source: DoD DIrectIve 5205.7 "SpecIaI Access Program (SAP) PoIIcy." ]anuary 5, 2006,
http:]]www.dtIc.mII]whs]dIrectIves]corres]htmI]520507.htm

UnauthorIzed DIscIosure UnauthorIzed DIscIosure UnauthorIzed DIscIosure UnauthorIzed DIscIosure
1. CommunIcatIon or physIcaI transIer oI cIassIIIed InIormatIon to an unauthorIzed recIpIent.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI , and DoD DIrectIve 5210.50.
UnauthorIzed DIscIosure oI CIassIIIed nIormatIon to the PubIIc.

2. The compromIse oI cIassIIIed InIormatIon by communIcatIon or physIcaI transIer to an
unauthorIzed recIpIent. t IncIudes the unauthorIzed dIscIosure oI cIassIIIed InIormatIon In a
newspaper, journaI, or other pubIIcatIon where such InIormatIon Is traceabIe to an agency because
oI a dIrect quotatIon or other unIqueIy IdentIIIabIe Iact.







425
Source: U.S. Department oI State. ForeIgn AIIaIrs ManuaI. 12FAM090, "DeIInItIons oI DIpIomatIc
SecurIty Terms." November 13, 2003, http:]]IoIa.state.gov]RECS]Search.asp

UncIassIIIed 8ut UncIassIIIed 8ut UncIassIIIed 8ut UncIassIIIed 8ut RestrIcted RestrIcted RestrIcted RestrIcted nIormatIon nIormatIon nIormatIon nIormatIon
See RestrIcted See RestrIcted See RestrIcted See RestrIcted

UncIassIIIed 8ut SensItIve UncIassIIIed 8ut SensItIve UncIassIIIed 8ut SensItIve UncIassIIIed 8ut SensItIve
See SensItIve 8ut Unc See SensItIve 8ut Unc See SensItIve 8ut Unc See SensItIve 8ut UncIassIIIed IassIIIed IassIIIed IassIIIed

UncIassIIIed ControIIed NucIear nIormatIon (UCN) UncIassIIIed ControIIed NucIear nIormatIon (UCN) UncIassIIIed ControIIed NucIear nIormatIon (UCN) UncIassIIIed ControIIed NucIear nIormatIon (UCN)
See DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN) See DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN) See DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN) See DoD UncIassIIIed ControIIed NucIear nIormatIon (DoD UCN)
1. A DOE cIassIIIcatIon to prevent the unauthorIzed dIssemInatIon oI uncIassIIIed InIormatIon on
physIcaI securIty Ior specIaI nucIear materIaI, crItIcaI InstaIIatIons, and equIpment.

Source: U.S. Department oI Energy. "UncIassIIIed ControIIed NucIear nIormatIon TopIcaI CuIdeIIne Ior
DOE FacIIIty and SIte RevIews." http:]]www.ostI.gov]htmI]ostI]opennet]document]tg-Isr-1]tg-Isr-1.htmI

2. The AtomIc Energy Act oI 1954, as amended, created UncIassIIIed ControIIed NucIear
nIormatIon, among other categorIes oI InIormatIon. UncIassIIIed ControIIed NucIear nIormatIon Is certaIn
uncIassIIIed Covernment InIormatIon whose unauthorIzed dIssemInatIon Is prohIbIted. ThIs InIormatIon
concerns atomIc energy deIense programs; pertaIns to the desIgn oI productIon IacIIItIes or utIIIzatIon
IacIIItIes; securIty measures Ior the physIcaI protectIon oI productIon or nucIear materIaI storage IacIIItIes;
or the desIgn or manuIacture oI any nucIear weapon or component whIch was decIassIIIed or removed
Irom the RestrIcted Data category.

.the Secretary oI Energy (hereInaIter In thIs sectIon reIerred to as the "Secretary"), wIth respect to atomIc
energy deIense programs, shaII prescrIbe such reguIatIons, aIter notIce and opportunIty Ior pubIIc
comment thereon, or Issue such orders as may be necessary to prohIbIt the unauthorIzed dIssemInatIon oI
uncIassIIIed InIormatIon pertaInIng to

(A) the desIgn oI productIon IacIIItIes or utIIIzatIon IacIIItIes;
(8) securIty measures (IncIudIng securIty pIans, procedures, and equIpment) Ior the physIcaI protectIon oI
(I) productIon or utIIIzatIon IacIIItIes,
(II) nucIear materIaI contaIned In such IacIIItIes, or
(III) nucIear materIaI In transIt; or
(C) the desIgn, manuIacture, or utIIIzatIon oI any atomIc weapon or component II the desIgn, manuIacture,
or utIIIzatIon oI such weapon or component was contaIned In any InIormatIon decIassIIIed or removed






426
Irom the RestrIcted Data category by the Secretary (or the head oI the predecessor agency oI the
Department oI Energy) pursuant to sectIon 2162 oI thIs tItIe.

Source: 42 U.S.C. 2168. http:]]www.gpoaccess.gov]U.S.C.ode]; AtomIc Energy Act, Chapter 12 sectIon
148 and DOE, SaIeguards and SecurIty nIormatIon SecurIty Handbook. http:]]www.pnI.gov]Isrc]text.stm
and Department oI Energy. "UncIassIIIed ControIIed NucIear nIormatIon, CeneraI CuIdeIIne CC-5."
February 2004, http:]]www.Ias.org]sgp]othergov]doe]ucnI.pdI

UncIassIIIed]For OIIIcIaI Use OnIy UncIassIIIed]For OIIIcIaI Use OnIy UncIassIIIed]For OIIIcIaI Use OnIy UncIassIIIed]For OIIIcIaI Use OnIy (U]FOUO) (U]FOUO) (U]FOUO) (U]FOUO)
(U) WarnIng: ThIs document Is UNCLASSFED]]FOR OFFCAL USE ONLY (U]]FOUO). t contaIns InIormatIon
that may be exempt Irom pubIIc reIease under the Freedom oI nIormatIon Act (5 U.S.C. 552). t Is to be
controIIed, stored, handIed, transmItted, dIstrIbuted, and dIsposed oI In accordance wIth DHS poIIcy
reIatIng to FOUO InIormatIon and Is not to be reIeased to the pubIIc, the medIa, or other personneI who do
not have a vaIId need-to-know wIthout prIor approvaI oI an authorIzed DHS oIIIcIaI. State and IocaI
homeIand securIty oIIIcIaIs may share thIs document wIth authorIzed securIty personneI wIthout Iurther
approvaI Irom DHS.
(U) ThIs product contaIns U.S. person InIormatIon that has been deemed necessary Ior the Intended
recIpIent to understand, assess, or act on the InIormatIon provIded. t has been hIghIIghted In thIs
document wIth the IabeI USPER and shouId be handIed In accordance wIth the recIpIent's InteIIIgence
oversIght or InIormatIon handIIng procedures.

Source: DHS, DomestIc ExtremIsm LexIcon ReIerence AId, March 26, 2009,
http:]]www.scrIbd.com]doc]14884903]DomestIc-ExtremIsm-LexIcon-US-Department-oI-HomeIand-
SecurIty-ReIerence-AId

UncIa UncIa UncIa UncIassIIIed nIormatIon ssIIIed nIormatIon ssIIIed nIormatIon ssIIIed nIormatIon
See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon See SensItIve 8ut UncIassIIIed nIormatIon
1. nIormatIon that has not been determIned pursuant to EO 12958 or any predecessor order to
requIre protectIon agaInst unauthorIzed dIscIosure and that Is not desIgnated as cIassIIIed.

Source: CommIttee Ior NatIonaI SecurIty Systems (CNSS). nstructIon 4009. NatIonaI nIormatIon
Assurance CIossary. ]une, 2006, http:]]www.cnss.gov]Assets]pdI]cnssI4009.pdI
and EO 12958 "CIassIIIed NatIonaI SecurIty nIormatIon," Amended, http:]]www.archIves.gov]Isoo]poIIcy-
documents]eo-12958-amendment.htmI#1.2

2. CIvIc-reIated InIormatIon to whIch, In Its orIgInaI Ior, the generaI pubIIc had dIrect access (I.e.,
pubIIc records); and Newspaper, magazIne, and perIodIcaI cIIppIngs deaIIng wIth specIIIc crImInaI
categorIes.






427

Source: DavId L. Carter. Law EnIorcement nteIIIgence: a CuIde Ior State, LocaI, and TrIbaI Law EnIorcement
AgencIes. Dept. oI ]ustIce, OIIIce oI CommunIty OrIented PoIIcIng ServIces, 2004,
http:]]www.cops.usdoj.gov]deIauIt.aspZtem=1404 ; AIso see: ]ames ]. 8agIey. "UnderstandIng
Covernment ControIs on UncIassIIIed nIormatIon or Who's on FIrstZ" NCMS VIewpoInts 1 (1993),
http:]]www.Ias.org]sgp]eprInt]bagIey.htmI

UncIassIIIed nteII UncIassIIIed nteII UncIassIIIed nteII UncIassIIIed nteIIIgence Igence Igence Igence
"nteIIIgence Is InIormatIon, whIch has been dIscovered, dIscrImInated, dIstIIIed, and dIssemInated In a
Iorm taIIored to the needs oI a specIIIc poIIcymaker at a specIIIc tIme and pIace."

Source: Robert DavId SteeIe. "VIrtuaI nteIIIgence: ConIIIct AvoIdance and ResoIutIon Through nIormatIon
PeacekeepIng." http:]]www.usIp.org]vIrtuaIdIpIomacy]pubIIcatIons]papers]vIrInteII.htmI
UncIassIIIed LImIted UncIassIIIed LImIted UncIassIIIed LImIted UncIassIIIed LImIted
nIormatIon exempt Irom pubIIc reIease by the Freedom oI nIormatIon Act or other statutory authorIty. A
DoD dIrectIve Issued In 1970 estabIIshed dIstrIbutIon IImItatIons on technIcaI reports whIch used the term.
UncIassIIIed UnIImIted appIIed to InIormatIon whIch was approved Ior pubIIc reIease by competent
authorIty--an IndIvIduaI or organIzatIon authorIzed to reIease the InIormatIon to the pubIIc, whether
IoreIgn or domestIc.
UncIassIIIed LImIted meant that some oIIIcIaI reason supported wIthhoIdIng InIormatIon In technIcaI
reports Irom pubIIc reIease wIthout approvaI by approprIate authorIty. The dIrectIve aIso provIded reasons
why a report shouId not be reIeased to the pubIIc except upon approvaI by the contractIng agency. The
current dIrectIve that governs dIstrIbutIon IImItatIon Ior technIcaI reports Is DoD 5230.24, DIstrIbutIon
Statements on TechnIcaI Documents. ExampIes oI LImItatIons on UncIassIIIed nIormatIon ExampIes oI LImItatIons on UncIassIIIed nIormatIon ExampIes oI LImItatIons on UncIassIIIed nIormatIon ExampIes oI LImItatIons on UncIassIIIed nIormatIon:
Freedom oI nIormatIon Act (5 USC 552)
UncIassIIIed ControIIed NucIear nIormatIon (20 CFR 1017.1)
DoD UncIassIIIed ControIIed NucIear nIormatIon (10 USC 128)
nternatIonaI TraIIIc In Arms ReguIatIon (22 USC 2778 (a))
Export ControI AdmInIstratIon ReguIatIon (FE8 1992, EAA oI 1979) DuaI-Use nIormatIon
UncIassIIIed NatIonaI SecurIty ReIated nIormatIon (DoD 15210.74)
SensItIve but UncIassIIIed nIormatIon (COMSEC]SM)
WIthhoIdIng oI UncIassIIIed TechnIcaI Data Irom PubIIc DIscIosure (DODD 5230.25, PL 98-94) (10
USC 130)
MIIItarIIy CrItIcaI TechnoIogIes LIst
DIstrIbutIon Statements on TechnIcaI Documents (DODD 5230.24)






428
LImIted OIIIcIaI Use nIormatIon
Computer SecurIty Act oI 1987 (PL 100-235) SensItIve nIormatIon
Drug EnIorcement AdmInIstratIon SensItIve nIormatIon
COMSEC SuppIement to the DoD SM SensItIve nIormatIon and TechnoIogIes
Source: ]ames ]. 8agIey. "UnderstandIng ControIs on UncIassIIIed Covernment nIormatIon or Who's on
FIrstZ." Reposted wIth permIssIon Irom NCMS VIewpoInts 1, 1993 (a pubIIcatIon oI the NatIonaI
CIassIIIcatIon Management SocIety), http:]]www.Ias.org]sgp]eprInt]bagIey.htmI
UndIscIosed nIormatIon UndIscIosed nIormatIon UndIscIosed nIormatIon UndIscIosed nIormatIon
29) Chapter Three Is added IoIIowIng ArtIcIe 54 Ior protectIon oI UndIscIosed nIormatIon. CPA]ORD]26
AprII 2004]81 8:
30)ArtIcIe 1 Is added as the IIrst artIcIe In Chapter Three to read as IoIIows: "NaturaI and IegaI persons
shaII have the possIbIIIty oI preventIng InIormatIon IawIuIIy wIthIn theIr controI Irom beIng dIscIosed to,
acquIred by, or used by others wIthout theIr consent In a manner contrary to honest commercIaI practIces
so Iong as such InIormatIon:

a) Is secret In the sense that It Is not, as a body or In the precIse conIIguratIon and assembIy oI Its
components, generaIIy known among or readIIy accessIbIe to persons wIthIn the cIrcIes that normaIIy deaI
wIth the kInd oI InIormatIon In questIon;

b) has commercIaI vaIue because It Is secret; and

c) has been subject to reasonabIe steps under the cIrcumstances by the person IawIuIIy In controI oI the
InIormatIon to keep It secret."
Source: CoaIItIon ProvIsIonaI AuthorIty, "Order 81, whIch deaIs wIth 'Patent, ndustrIaI DesIgn, UndIscIosed
nIormatIon, ntegrated CIrcuIts and PIant VarIety,' http:]]www.trade.gov]statIc]Iraqmemo81.pdI
UnIted States CIvIIIan nternee nIormatIon Center UnIted States CIvIIIan nternee nIormatIon Center UnIted States CIvIIIan nternee nIormatIon Center UnIted States CIvIIIan nternee nIormatIon Center
The natIonaI center oI InIormatIon In the UnIted States Ior enemy and US cIvIIIan Internees.
Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]
UnIted States nIormatIon Agency UnIted States nIormatIon Agency UnIted States nIormatIon Agency UnIted States nIormatIon Agency
On October 1, 1999, USA was Integrated Into the State Department. The OIIIce oI the Undersecretary Ior






429
PubIIc DIpIomacy and PubIIc AIIaIrs was created to oversee the pubIIc dIpIomacy programs that USA
admInIstered. USA's OIIIce oI Research and MedIa ReactIon was merged Into State's 8ureau oI nteIIIgence
and Research. USA's InternatIonaI broadcastIng operatIons were taken over by the newIy created
8roadcastIng 8oard oI Covernors. AIthough State may provIde poIIcy guIdance and advIce, the 8oard Is
Independent Irom State.
Source: U.S. PubIIc DIpIomacy: State Department Expands EIIorts but Faces SIgnIIIcant ChaIIenges: Report
to the CommIttee on nternatIonaI ReIatIons, House oI RepresentatIves. .. . WashIngton, D.C.: U.S. CeneraI
AccountIng OIIIce, 2003. http:]]www.gao.gov]new.Items]d03951.pdI; U.S. Department oI State.
"Department OrganIzatIon," http:]]www.state.gov]r]pa]eI]rIs]dos]436.htm, and Nancy Snow. . . .
Propaganda, nc.: SeIIIng AmerIca's CuIture to the WorId. New York: Seven StorIes Press, 1998.
UnIted States nteIIIgence 8oard UnIted States nteIIIgence 8oard UnIted States nteIIIgence 8oard UnIted States nteIIIgence 8oard
n 1958, the US CommunIcatIons nteIIIgence 8oard (US8) merged wIth the nteIIIgence AdvIsory
CommIttee to Iorm the US nteIIIgence 8oard, an eIement oI the NatIonaI SecurIty CouncII. n 1976, the
US8 was aboIIshed and repIaced wIth the NatIonaI ForeIgn nteIIIgence 8oard. For InIo on Its organIzatIon,
see pp. 280II oI RIcheIson.
Source: ]eIIrey RIcheIson. The U.S.nteIIIgence CommunIty. CambrIdge, MA: 8aIIInger, 1985.
Unknown Unknown Unknown Unknown
1. A code meanIng "InIormatIon not avaIIabIe." 2. An unIdentIIIed target. An aIrcraIt or shIp that has not
been determIned to be hostIIe, IrIendIy, or neutraI usIng IdentIIIcatIon IrIend or Ioe and other technIques,
but that must be tracked by aIr deIense or navaI engagement systems.

Source: Department oI the Army. MarIne Corps Combat DeveIopment Command. Department oI the Navy.
OperatIonaI Terms and CraphIcs. FM 1-02 (FM 101-5). September 21, 2004,
http:]]www.Ias.org]man]dod-101]army]docs]Im101-5-1]I545con.htm#contents and Department oI
DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17 October 2008,
http:]]www.dtIc.mII]doctrIne]doddIctIonary]

UnoIIIcIaI nIormatIon ( UnoIIIcIaI nIormatIon ( UnoIIIcIaI nIormatIon ( UnoIIIcIaI nIormatIon (NeoIItsIaInaya InIormatsIya) NeoIItsIaInaya InIormatsIya) NeoIItsIaInaya InIormatsIya) NeoIItsIaInaya InIormatsIya)
nIormatIon whIch comes Irom weII-InIormed IndIvIduaIs, but whIch Is not openIy conIIrmed by the
government, admInIstratIon or oIIIcIaIs.

Source: VasIIy MItrokhIn, ed. KC8 LexIcon: The SovIet nteIIIgence's OIIIcer's Handbook. London: Frank
Cass, 2002.






430
Upgrade Upgrade Upgrade Upgrade
A determInatIon that certaIn cIassIIIed InIormatIon, In the Interest oI natIonaI securIty, requIres a hIgher
degree oI protectIon agaInst unauthorIzed dIscIosure than currentIy provIded, coupIed wIth a changIng oI
the cIassIIIcatIon desIgnatIon to reIIect such a hIgher degree.

Source: DoD. NatIonaI ndustrIaI SecurIty ManuaI (NSPOM). DoD 5220.22-M, February 28, 2006,
https:]]www.dss.mII]CW]Show8Inary]DSS]Isp]IaccIear]downIoadnIspom.htmI

UpgradIng UpgradIng UpgradIng UpgradIng
The determInatIon that certaIn cIassIIIed InIormatIon requIres, In the Interests oI natIonaI securIty, a
hIgher degree oI protectIon agaInst unauthorIzed dIscIosure than currentIy provIded, coupIed wIth a
changIng oI the cIassIIIcatIon desIgnatIon to reIIect the hIgher degree.

Source: NatIonaI magery and MappIng Agency. "NMA CuIde to MarkIng CIassIIIed Documents." October
4, 2001, http:]]www.Ias.org]sgp]othergov]DoD]nImaguIde.pdI
Urban ResoIve 2015 Urban ResoIve 2015 Urban ResoIve 2015 Urban ResoIve 2015
Urban ResoIve Is an experIment sponsored by U.S. ]oInt Forces Command, ]oInt ExperImentatIon
DIrectorate, ]oInt Urban OperatIons OIIIce, wIth technIcaI assIstance Irom the nstItute Ior DeIense
AnaIyses, ]oInt Advanced WarIIghtIng Program.
t Is a dIstrIbuted sImuIatIon to be carrIed out at the U.S. ]oInt Forces Command, ]oInt ExperImentatIon
DIrectorate, DIstrIbuted ContInuous ExperImentatIon EnvIronment, at the U.S. Army TopographIc
EngIneerIng Center at Fort 8eIvoIr, VIrgInIa, and at the Space and NavaI WarIare Systems Command
IacIIItIes In San DIego, CaIIIornIa.
Source: UnIted States ]oInt Forces Command,
http:]]www.jIcom.mII]about]experIments]uresoIve.htm; the ]oInt Forces Command podcast can be
subscrIbed to through ITunes MusIc Store.
UnIted State UnIted State UnIted State UnIted States StrIke Command (USSTRCOM) s StrIke Command (USSTRCOM) s StrIke Command (USSTRCOM) s StrIke Command (USSTRCOM)
UnIted States StrIke Command (USSTRCOM) was estabIIshed In 1961 to IurnIsh depIoyabIe, combat-ready
Iorces as In an emergency sItuatIon anywhere wIthIn the UnIted States or overseas. A two servIce
command (Army and AIr Force), USSTRCOM Is headquartered at McDIII AIr Force 8ase FLA and Is
commanded by an Army generaI. t has two major components, the U.S. Army Forces StrIkes Command
(ARSTRKE) and the U.S. AIr Force StrIke Command (AFSTRKE), are headquartered In cIose proxImIty.







431
Source: UnIted States. Congress. Senate. CommIttee on the ]udIcIary. SubcommIttee on ConstItutIonaI
RIghts. Army SurveIIIance oI CIvIIIans: A Documentary AnaIysIs. 92
nd
Congress,second sessIon.
WashIngton, D.C.: U.S. Covernment PrIntIng OIIIce, 1972. 86.


~ V~ ~ V~ ~ V~ ~ V~
VaIIdatIon oI nIormatIon VaIIdatIon oI nIormatIon VaIIdatIon oI nIormatIon VaIIdatIon oI nIormatIon
Procedures governIng the perIodIc revIew oI crImInaI InteIIIgence InIormatIon to assure Its contInuIng
compIIance wIth system submIssIon crIterIa estabIIshed by reguIatIon or program poIIcy.
Source: ]udIcIaI AdmInIstratIon. 28 CFR 23, http:]]www.gpoaccess.gov]CFR]Index.htmI
Vaughn ndex Vaughn ndex Vaughn ndex Vaughn ndex
1. OrIgInated Irom Vaughn v. Rosen, 484 F.2d 820 (D.C. CIr. 1973), cert. denIed, 415 U.S. 977
(1974), whereIn the court rejected an agency's concIusory aIIIdavIt statIng that requested Freedom oI
nIormatIon Act (FOA) documents were subject to exemptIon. A Vaughn ndex must: (1) IdentIIy each
document wIthheId; (2) state the statutory exemptIon cIaImed; and (3) expIaIn how dIscIosure wouId
damage the Interests protected by the cIaImed exemptIon."

Source: 'LectrIc Law LIbrary's LexIcon "Vaughn ndex," http:]]www.IectIaw.com]deI2]u049.htm

2. There Is no set Iorm oI a Vaughn ndex aIthough the Vaughn decIsIon requIres agencIes to
prepare an ItemIzed Index, correIatIng each wIthheId document (or portIon) wIth a specIIIc FOA
exemptIon and the reIevant part oI the agency's nondIscIosure justIIIcatIon. A Vaughn ndex shouId
IndIcate, Ior each document, that any reasonabIy segregabIe InIormatIon has been dIscIosed.

Source: U.S. Department oI ]ustIce. Freedom oI nIormatIon Act CuIde,
http:]]www.usdoj.gov]oIp]IItIgatIon.htm

3. A sampIe Vaughn motIon Iorm that can be submItted to a U.S. dIstrIct court Is IncIuded In
AppendIx C.

Source: MeIanson, PhIIIp H. Secrecy Wars: NatIonaI SecurIty, PrIvacy, and the PubIIc's RIght to Know.
WashIngton, D.C.: 8rassey's, 2001.







432
4. An exampIe oI a Vaughan ndex reIIectIng documents the CA wIthheId Irom the ACLU
regardIng torture Is here: http:]]tInyurI.com]yjohpk2

VerIty K2 EnterprIse VerIty K2 EnterprIse VerIty K2 EnterprIse VerIty K2 EnterprIse
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
DeIense nteIIIgence Agency, nIormatIon AnaIysIs and nIrastructure ProtectIon DIrectorate. MInes data
Irom the InteIIIgence communIty and nternet searches to IdentIIy IoreIgn terrorIsts or U.S. cItIzens
connected to IoreIgn terrorIsm actIvItIes;
Purpose: AnaIyzIng InteIIIgence and detectIng terrorIst actIvItIes;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: Yes.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI & EIectronIc nIormatIon PrIvacy Center (EPC) vs.
Department oI DeIense, requestIng "expedIted processIng and reIease oI agency records requested by
PIaIntIII Irom the DeIense nteIIIgence Agency, a component oI DeIendant Department oI
DeIense,http:]]www.epIc.org]opengov]verItyk2]compIaInt.pdI

Veterans AIIaIrs CentraI ncIdent Response Center Veterans AIIaIrs CentraI ncIdent Response Center Veterans AIIaIrs CentraI ncIdent Response Center Veterans AIIaIrs CentraI ncIdent Response Center
See Data MInIng See Data MInIng See Data MInIng See Data MInIng
Department oI Veterans AIIaIrs Headquarters. s used to monItor and manage IntrusIon detectIon and
IIrewaIIs. ScrIpts are wrItten Ior IorensIc anaIysIs to go through data
coIIected Irom system and network Iogs;
Purpose: DetectIng crImInaI actIvItIes or patterns;
Status: OperatIonaI;
Features: PersonaI InIormatIon: Yes;
Features: PrIvate sector data: Yes;
Features: Other agency data: No.

Source: CeneraI AccountIng OIIIce. Data MInIng: FederaI EIIorts Cover a WIde Range oI Uses. CAO-04-548,
May 4, 2004, http:]]www.gao.gov]htext]d04548.htmI

VIdeo News ReIease VIdeo News ReIease VIdeo News ReIease VIdeo News ReIease
See Prepackaged News See Prepackaged News See Prepackaged News See Prepackaged News

VIoIatIon VIoIatIon VIoIatIon VIoIatIon






433
Any knowIng, wIIIIuI, or negIIgent actIon that couId reasonabIy be expected to resuIt In an authorIzed
dIscIosure oI cIassIIIed InIormatIon; Any knowIng, wIIIIuI, or negIIgent actIon to cIassIIy or contInue the
cIassIIIcatIon oI InIormatIon contrary to the requIrements oI thIs order or Its ImpIementIng dIrectIves; or
Any knowIng, wIIIIuI, or negIIgent actIon to create or contInue a specIaI access program contrary to the
requIrements oI thIs order.

Source: ExecutIve Order 13292 "Further Amendment to ExecutIve Order 12958, as Amended, CIassIIIed
NatIonaI SecurIty nIormatIon."
http:]]www.archIves.gov]IederaI-regIster]executIve-orders]2003.htmI

VIrtuaI Case FIIe VIrtuaI Case FIIe VIrtuaI Case FIIe VIrtuaI Case FIIe
1. The Iast pIece oI the puzzIe Is ImmInent: a reIatIonaI database wIth a web InterIace caIIed
VIrtuaI Case FIIe that wIII coIIect ALL InvestIgatIve InIormatIon reIatIng to crImInaI cases and natIonaI
securIty InvestIgatIons Ior F8 empIoyees to search and anaIyze.
Source: "T nIrastructure Ior 21
st
Century CrIme: CO ZaI AzmI TaIks About the F8's TechnoIogy Make
Over." AprII 2, 2004, http:]]www.IbI.gov]page2]aprII04]040204cIoazmI.htm
2. The User AppIIcatIon Component Is repIacement oI user appIIcatIons that wIII enhance our
abIIIty to access, organIze and anaIyze InIormatIon. SpecIIIcaIIy, the TrIIogy Program wIII mIgrate IIve
InvestIgatIve appIIcatIons Into a "VIrtuaI Case FIIe" (VCF), to provIde user-IrIendIy, web browser access to
mIssIon crItIcaI InIormatIon. A web-based InterIace wIII enabIe our users to have a graphIcaI InterIace wIth
InvestIgatIve InIormatIon. t wIII eIImInate the cumbersome aspects oI our current system, greatIy enhance
our coIIaboratIve envIronment and go a Iong way towards eIImInatIng the probIems obvIous Irom Hanssen
and McVeIgh.
Source: TestImony oI Sherry HIggIns, Project Management ExecutIve Ior the OIIIce oI the DIrector, F8
8eIore the Senate ]udIcIary SubcommIttee on AdmInIstratIve OversIght and the Courts, ]uIy 16, 2002, "F8
nIrastructure," http:]]www.IbI.gov]congress]congress02]hIggIns071602.htm
3. FIve-sIx years oI deIay, troubIes wIth contractor SAC (ScIence AppIIcatIons nternatIonaI
CorporatIon), and between $104- $170 mIIIIon spent, F8 DIrector Robert MueIIer toId Congress that the
SentIneI system "wIII pave the road startIng wIth our Iegacy case management system, Ior subsequent
transIormatIon oI aII Iegacy appIIcatIons to modern technoIogy under our EnterprIse ArchItecture."
Source: ]ames C. McCroddy and Herbert S. LIn (Ed.), A RevIew oI the F8's TrIIogy nIormatIon TechnoIogy
ModernIzatIon Program. NatIonaI AcademIes Press, 2004, http:]]www.nap.edu]cataIog]10991.htmI and






434
Harry CoIdsteIn. "Who KIIIed the VIrtuaI Case FIIeZ EEE Spectrum OnIIne 42 no. 8 (2005), [See the
Wayback MachIne,
http:]]web.archIve.org]web]20080202103506]http:]]www.spectrum.Ieee.org]sep05]1455 ]
VIrtuaI ProvIng Cround VIrtuaI ProvIng Cround VIrtuaI ProvIng Cround VIrtuaI ProvIng Cround
VPC Is a dIstrIbuted, Integrated compIex oI materIeI system perIormance and reIIabIIIty sImuIatIon
capabIIItIes that generates vaIId materIeI system eIIectIveness InIormatIon by presentIng verIIIed modeIed
stImuII to systems operatIng In synthetIc envIronments accordIng to reaIIstIc procedures and ground truth
InIormatIon.

Source: U.S. Army DeveIopmentaI Test Command. "VIrtuaI ProvIng Cround." http:]]vpg.dtc.army.mII]
[Now a bIocked sIte]

VIsuaI nIormatIon VIsuaI nIormatIon VIsuaI nIormatIon VIsuaI nIormatIon
Use oI one or more oI the varIous vIsuaI medIa wIth or wIthout sound. CeneraIIy, vIsuaI InIormatIon
IncIudes stIII photography, motIon pIcture photography, vIdeo or audIo recordIng, graphIc arts, vIsuaI aIds,
modeIs, dIspIay, vIsuaI presentatIon servIces, and the support processes. AIso caIIed V.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

VoIuntary FurnIshed ConIIdentIaI nIormatIon VoIuntary FurnIshed ConIIdentIaI nIormatIon VoIuntary FurnIshed ConIIdentIaI nIormatIon VoIuntary FurnIshed ConIIdentIaI nIormatIon
A submIssIon oI a record that--
(I) Is made to the Department In the absence oI authorIty oI the Department requIrIng that record to be
submItted; and (II) Is not submItted or used to satIsIy any IegaI requIrement or obIIgatIon or to obtaIn any
grant, permIt, beneIIt (such as agency Iorbearance, Ioans, or reductIon or modIIIcatIons oI agency
penaItIes or ruIIngs), or other approvaI Irom the Covernment.

Source: S. 622 "RestoratIon oI Freedom oI nIormatIon Act oI 2005." http:]]thomas.Ioc.gov]cgI-
bIn]query]zZc109:S.622.S


~ W ~ ~ W ~ ~ W ~ ~ W ~
War Card Database War Card Database War Card Database War Card Database
The War Card database presents "the raq-reIated pubIIc pronouncements oI top 8ush admInIstratIon
oIIIcIaIs to be tracked on a day-by-day basIs agaInst theIr prIvate assessments and the actuaI 'ground
truth' as It Is now known. Throughout the database, passages contaInIng IaIse statements by the top 8ush
admInIstratIon oIIIcIaIs are hIghIIghted In yeIIow. The 935 IaIse statements In the database may aIso be






435
accessed by seIectIng the "FaIse Statements" optIon Irom the "Subject" puII-down menu and may be
dIspIayed wIthIn seIected date ranges usIng the seIectIon tooI beIow."

Source: Center Ior PubIIc ntegrIty, http:]]projects.pubIIcIntegrIty.org]WarCard]Search]DeIauIt.aspx

Warden System Warden System Warden System Warden System
An InIormaI method oI communIcatIon used to pass InIormatIon to US cItIzens durIng emergencIes.

Source: Department oI DeIense. DoD oI MIIItary and AssocIated Terms. ]P 1-02. As Amended through 17
October 2008, http:]]www.dtIc.mII]doctrIne]doddIctIonary]

WarnIng NotIce WarnIng NotIce WarnIng NotIce WarnIng NotIce- -- -nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved nteIIIgence Sources or Methods nvoIved
See See See See CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs CIassIIIcatIon MarkIngs ControI MarkIngs

WarnIng NotIces WarnIng NotIces WarnIng NotIces WarnIng NotIces
See See See See CIassIIIcatIon MarkIngs C CIassIIIcatIon MarkIngs C CIassIIIcatIon MarkIngs C CIassIIIcatIon MarkIngs ControI MarkIngs ontroI MarkIngs ontroI MarkIngs ontroI MarkIngs

WarrantIess SurveIIIance WarrantIess SurveIIIance WarrantIess SurveIIIance WarrantIess SurveIIIance
See ForeIgn nteIIIgence SurveIIIance (FSA), NatIonaI SecurIty, PrIvacy See ForeIgn nteIIIgence SurveIIIance (FSA), NatIonaI SecurIty, PrIvacy See ForeIgn nteIIIgence SurveIIIance (FSA), NatIonaI SecurIty, PrIvacy See ForeIgn nteIIIgence SurveIIIance (FSA), NatIonaI SecurIty, PrIvacy
1. ThIs PresIdent appears to have Iorgotten that Iact. Not onIy has he asserted the rIght to go
around the FSA court and the wIretap act, but he has actuaIIy done so. Even more dIsturbIng, he does not
beIIeve that he Is accountabIe to the Congress, the courts or anyone eIse. ThIs CommIttee created the FSA
statute and the FSA court, yet the PresIdent beIIeves we are not entItIed to know what he or the courtare
doIng. The PresIdent aIso beIIeves that we are not entItIed to know what he Is doIng, or has been doIng,
outsIde the conIInes oI the FSA statute. Now we have passed a IIawed bIII that, In the guIse oI updatIng
the FSA Iaw, actuaIIy gIves the PresIdent aImost unIettered power to spy wIthout court supervIsIon, not
just on IoreIgners, but on AmerIcans.

Source: Rep. ]ohn Conyers (p.4), UnIted States. Congress. House. CommIttee on the ]udIcIary. WarrantIess
surveIIIance and the ForeIgn nteIIIgence SurveIIIance Act: the RoIe oI Checks and 8aIances In ProtectIng
AmerIcan's PrIvacy RIghts. Pt. : hearIng beIore the CommIttee on the ]udIcIary, House oI RepresentatIves,
One Hundred Tenth Congress, IIrst sessIon, September 5, 2007, WashIngton: U.S. C.P.O. 2008,
http:]]Irwebgate.access.gpo.gov]cgIbIn]getdoc.cgIZdbname=110househearIngs&docId=I:37599.pdI

2. The government has asserted three Interests In engagIng In wIretaps Ior "natIonaI securIty"
purposes (apart Irom wIretappIng to detect possIbIe vIoIatIons oI the crImInaI Iaw, IncIudIng the Iaws
agaInst espIonage, sedItIon, and treason). These are: (1) gatherIng IoreIgn InteIIIgence InIormatIon; (2)






436
preventIng InIormatIon about the UnIted States Irom reachIng IoreIgn InteIIIgence servIces; and (3)
protectIng the UnIted States agaInst InternaI threats to Its stabIIIty (1975-1976: 133).

n speakIng oI hIs own warrantIess surveIIIance, Dr. HaIperIn (1975-1976: 159-160) wrItes

n pre- Watergate days It seemed InconceIvabIe that word oI the surveIIIance wouId ever Ieak out.
The mIstake was In gIvIng such broad power and dIscretIon to executIve branch oIIIcIaIs. ThIs Is
why the IoundIng Iathers InsIsted that warrants Irom a magIstrate be requIred beIore there couId
be a search and seIzure. Where the "thIng" to be seIzed Is InIormatIon, the need Ior a warrant Is
even more urgent.

Source: Morton HaIperIn, "NatIonaI SecurIty and CIvII LIbertIes," ForeIgn PoIIcy 21 (WInter, 1975-1976):
125-160.

Watch LIsts Watch LIsts Watch LIsts Watch LIsts
See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center See TerrorIst ScreenIng Center
TerrorIst and crImInaI watch IIst systems--sometImes reIerred to as watchout, Iookout, target, or tIp-oII
systems--are Important tooIs In controIIIng and protectIng our natIon's borders. The events oI September
11, 2001, and other IncIdents sInce then, have hIghIIghted the need to share these watch IIsts. n IIght oI
the Importance oI border securIty, CAO was asked to IdentIIy IederaI databases and systems that contaIn
watch IIsts, the agencIes that maIntaIn and use them In protectIng our natIon's borders, the kInd oI data
they contaIn, whether IederaI agencIes are sharIng InIormatIon Irom these IIsts wIth each other and wIth
state and IocaI governments and prIvate organIzatIons, the structuraI characterIstIcs oI those IIsts that are
automated, and whether opportunItIes exIst to consoIIdate these watch IIsts.

SpecIIIcaIIy, nIne IederaI agencIes--whIch prIor to the creatIon oI the Department oI HomeIand SecurIty
(DHS) spanned the Departments oI DeIense, ]ustIce, State, TransportatIon, and the Treasury--deveIop and
maIntaIn 12 watch IIsts.

Source: U.S. CeneraI AccountIng OIIIce. "nIormatIon TechnoIogy: TerrorIst Watch LIsts ShouId 8e
ConsoIIdated to Promote 8etter ntegratIon and SharIng." CAO-03-322 AprII 15, 2003,
http:]]www.gao.gov]htext]d03322.htmI; aIso see DO], OC, The FederaI 8ureau oI nvestIgatIon's TerrorIst
WatchIIst NomInatIon PractIces, AudIt Report 09-25, May 2009,
http:]]www.usdoj.gov]oIg]reports]F8]a0925]IInaI.pdI

WIsdom WarIare WIsdom WarIare WIsdom WarIare WIsdom WarIare
A cognItIve process that has three maIn components: knowIedge, whIch IncIudes systems that coIIect raw
data, organIze It Into useIuI InIormatIon, anaIyze It to create InteIIIgence, and assImIIate It to gaIn






437
knowIedge; wIsdom contaIns those systems that aIIow humans to Interact wIth the knowIedge to
exercIse wIsdom, whIch IncIudes modeIIng and sImuIatIon tooIs; Human System ntegratIon, or HS,
contaIns aII oI the systems necessary to assIst decIsIon makers In gettIng the InIormatIon needed In the
Iorm desIred. Once the decIsIon makers understand the InIormatIon, they can appIy experIence to make
the best decIsIons.

Source: Lt CoI Edward F. Murphy, et aI. nIormatIon OperatIons: WIsdom WarIare For 2025, AIr Force 2025
voIume 1. AprII, 1996,
http:]]www.Ias.org]spp]mIIItary]docops]usaI]2025]v1c1]v1c1-1.htm#CONTENTS

WorkIng FIIes WorkIng FIIes WorkIng FIIes WorkIng FIIes
1. Documents such as rough notes, caIcuIatIons, or draIts assembIed or created and used to
prepare or anaIyze other documents. AIso caIIed workIng papers.

Source: DOE. ChIeI nIormatIon OIIIcer. "Records Management DeIInItIons,"
http:]]cIo.energy.gov]rmdeIInItIons.pdI

WorkIng Papers WorkIng Papers WorkIng Papers WorkIng Papers
WorkIng papers are cIassIIIed materIaIs (notes, draIts, drawIngs, etc.) that are generated In the preparatIon
oI a IInIshed document. They must be dated when IIrst created. They must aIso be marked wIth the overaII
cIassIIIcatIon, any appIIcabIe specIacIaI category notIce, and the annotatIon "WORKNC PAPERS" on each
page and the cover (II any). t Is recommended that portIon markIngs be appIIed at the tIme oI generatIon
to aId In appIyIng proper markIngs to the IInIshed product.

Source: NatIonaI CIassIIIcatIon Management SocIety. 8uIIetIn. ]anuary-February 2005. 4.
https:]]www.cIassmgmt.com]Home] [Issue no Ionger onIIne]

2. Documents or materIaIs, regardIess oI the medIa, whIch are expected to be revIsed prIor to the
preparatIon oI IInIshed product Ior dIscrImInatIon or retentIon.

Source. SOO. MarkIng CIassIIIed NatIonaI SecurIty nIormatIon. SOO mpIementIng SecurIty DIrectIve 1,
September 22, 2003,
http:]]www.archIves.gov]Isoo]traInIng]markIng-bookIet.pdI

WrIte WrIte WrIte WrIte- -- -to to to to- -- -ReIease ReIease ReIease ReIease
A generaI approach whereby InteIIIgence reports are wrItten In such a way that sources and methods are
dIsguIsed so that the report can be dIstrIbuted to customers or InteIIIgence partners at Iower securIty
IeveIs. n essence, wrIte-to-reIease Is proactIve sanItIzatIon that makes InteIIIgence more readIIy avaIIabIe






438
to a more dIverse set oI customers. The term encompasses a number oI specIIIc ImpIementatIon
approaches, IncIudIng sanItIzed Ieads and TearIIne reportIng.

Source: DIrector oI CentraI nteIIIgence DIrectIve 8]1. "nteIIIgence CommunIty PoIIcy on nteIIIgence
SharIng," ]une 4, 2004, http:]]www.Ias.org]Irp]oIIdocs]D.C.Id8-1.htmI


~ X, Y, Z ~ ~ X, Y, Z ~ ~ X, Y, Z ~ ~ X, Y, Z ~

XCDS (Exempt Irom CeneraI D XCDS (Exempt Irom CeneraI D XCDS (Exempt Irom CeneraI D XCDS (Exempt Irom CeneraI DecIassIIIcatIon ScheduIes) ecIassIIIcatIon ScheduIes) ecIassIIIcatIon ScheduIes) ecIassIIIcatIon ScheduIes)
CDS.begIns wIth the date oI Issuance, or the date oI prevIousIy assIgned cIassIIIcatIon.
XCDS-3.Is automatIcaIIy decIassIIIed 20 years aIter date cIassIIIcatIon Is assIgned.
XCDS-2.Is to be revIewed Ior decIassIIIcatIon 30 years aIter date cIassIIIcatIon Is assIgned.

Source: Departments oI the AIr Force, The Army, The Navy and TransportatIon. "FF MARK X (SF)]MARK X
Systems SecurIty CIassIIIcatIon." ]anuary 3, 1975,
[See the Wayback MachIne,
http:]]web.archIve.org]web]20050209174612]http:]]neds.daps.dIa.mII]DIrectIves]5510141.pdI ]

Xn Xn Xn Xn
See See See See DecIa DecIa DecIa DecIassIIIcatIon ssIIIcatIon ssIIIcatIon ssIIIcatIon
SIgnIIIes a decIassIIIcatIon wIthIn 10 years because dIscIosure couId reasonabIy be expected to cause
damage to the natIonaI securIty beyond the 10-year IImIt; where "n" Is the exemptIon category number as
IIsted In sectIon 1.6 oI EO 12958,

Source: Los AIamos NatIonaI Lab. "DeIInItIons."
http:]]www.hr.IanI.gov]SCourses]AII]PortIonMarkIng]deIIne.htm

Yankee WhIte Yankee WhIte Yankee WhIte Yankee WhIte
See See See See NIckname NIckname NIckname NIckname
A rIgorous, specIaI securIty InvestIgatIon and background check Ior (mIIItary) personneI workIng wIth the
PresIdent. The 89 SPS (U.S. AIr Force SecurIty PoIIce Squadron) admInIsters the Yankee WhIte cIearance
program.

Source: DoD. DoD 5210.87 "SeIectIon oI DoD PersonneI and CIvIIIan PersonneI and Contractor EmpIoyees
Ior AssIgnment to PresIdentIaI Support ActIvItIes (PSAs)," 11]30]1998.
http:]]www.dtIc.mII]whs]dIrectIves]corres]rtI]521055x.rtI and CIobaI SecurIty.org
http:]]www.gIobaIsecurIty.org]wmd]systems]nucIear-IootbaII.htm






439

S-ar putea să vă placă și