Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Friday, 13 September 2013

The US classification system

Posted on 11:35 by Unknown
(Updated: October 12, 2013)

Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments have systems to protect sensitive information by classifying it, which is best known from document markings like "Top Secret".

Here we'll explain the classification system of the United States, which is far more complex than most people think, also because it's one of the world's biggest secrecy systems. In 2012 almost 5 million (!) people in the US had a clearance for access to classified information.*

The deeper parts of this classification system are classified, but some new details and codewords have been revealed in documents from the recent Snowden-leaks.



Classification markings

All documents that contain classified information, whether digital or hard copy, have to be marked with the appropriate markings. These are shown in the classification or banner line, which is shown at the top and bottom of every document and usually has three parts, separated by double slashes:

Classification level // SCI or SAP compartment // Dissemination marking

An example of such a classification line would be:

TOP SECRET//COMINT//NOFORN

Additionally, all sections of a document should have a portion marking, which is an abbreviation of the full classification line. Below, the abbreviations for these portion markings are shown in brackets.

When a document contains joint or Foreign Government Information (FGI), the necessary markings are shown in a separate part of the classification line. Finally declassification instructions can be added. These markings will not be discussed here.

The meaning of abbreviations and codewords can be found in the separate listing of Abbreviations and Acronyms and the listing of Nicknames and Codewords.


Classification levels

The United States government classifies information according to the degree which the unauthorized disclosure would damage national security. Like many other countries, the US has three classifications levels. From the highest to the lowest level these are:

- TOP SECRET (TS, color code: orange)
- SECRET (S, color code: red)
- CONFIDENTIAL (C, color code: blue)

Government documents that do not have a classification can be marked as:
- UNCLASSIFIED (U, color code: green)


With 1.4 million people having a Top Secret clearance, it's more than clear that additional measures are needed to protect the more sensitive information. Therefore, that information is put in separated compartments, only accessible for those people who have the 'need-to-know'.

This system is called Sensitive Compartmented Information (SCI) for intelligence information, while other highly secret and sensitive information is protected by a Special Access Program (SAP). Both sub-systems will be explained below.


SCI compartments

Sensitive Compartmented Information (SCI) is a system to protect national intelligence information concerning sources and methods, and is divided into control systems and compartments, which are further subdivided in subcontrol systems and subcompartments. These systems and compartments are usually identified by a classified codeword, some of which were leaked or have been declassified. In total, there may be between 100 and 300 SCI compartments and subcompartments, grouped into about two dozen control systems.
Known and supposed SCI control systems are:
- COMINT or Special Intelligence (SI)
- TALENT KEYHOLE (TK)
- HUMINT Control System (HCS)
- KLONDIKE (KDK)
- RESERVE (RSV, since 2005)
- BYEMAN (BYE or B, defunct since 2005)
- Special Navy Control Program (SNCP)
- VERDANT (VER)
- PANGRAM (PM)
- MEDITATE (M)
- SPECTRE
- LOMA
- ? (GG)
- ? (CRU)
- AZURE BLUE (AB)
- STELLARWIND (STLW, since 2001)
- RAGTIME (RT, since 2001)

In a classification line this is shown like: TOP SECRET//SI

Multiple control systems are shown like: TOP SECRET//SI/TK


COMINT (SI)
This control system is for communications intercepts or Signals Intelligence and contains various sub-control systems and compartments, which are identified by an abbreviation or a codeword. In a classification line they follow COMINT or SI, connected by a hyphen.

Known COMINT sub-control systems are:
- Very Restricted Knowledge (VRK)
- Exceptionally Controlled Information (ECI)
- GAMMA (G)
- DELTA (D, now defunct)
- UMBRA (defunct)

In a classification line this is shown like: TOP SECRET//SI-ECI


Very Restricted Knowledge (VRK)
This sub-control system of SI contains compartments, which have an identifier of apparently three alpha numeric characters.

In a classification line this is shown like: TOP SECRET//SI-VRK 11A *


Exceptionally Controlled Information (ECI)
This sub-control system of SI contains compartments, which are identified by a classified codeword. In the classification line there's a three-letter abbreviation of this codeword.

Recently disclosed codewords for ECI compartments are:
- AMBULANT (AMB), APERIODIC, AUNTIE, PAINTEDEAGLE, PAWLEYS, PENDLETON, PIEDMONT, PICARESQUE (PIQ) and PITCHFORD. There's also an undisclosed codeword which has the abbreviation RGT.

In a classification line this is shown like: TOP SECRET//SI-ECI PIQ

Multiple compartments are shown like: TOP SECRET//SI-ECI PIQ-ECI AMB


GAMMA (G)
This sub-control system of SI is for highly sensitive communication intercepts and contains compartments, which are identified by a codeword or an identifier of four alphabetic characters.

Some former GAMMA compartments were:
- GABE, GANT, GILT, GOAT, GUPY, GYRO and GOUT

In a classification line this is shown like: TOP SECRET//SI-G GUPY

Multiple compartments are shown like: TOP SECRET//SI-G GUPY GYRO


TALENT KEYHOLE (TK)
This control system is for products of overhead collection systems, such as satellites and reconnaissance aircraft, and contains compartments, which are identified by a classified codeword.
The original TALENT compartment was created in the mid-1950s for the U-2. In 1960, it was broadened to cover all national aerial reconnaissance and the KEYHOLE compartment was created for satellite intelligence.

Some former TK subcompartments were:
- CHESS, RUFF and ZARF

In a classification line this is shown like: TOP SECRET//TK-ZARF


RESERVE (RSV)
This control system is for compartments protecting new sources and methods during the research, development, and acquisition process done by the National Reconnaissance Office (NRO). Compartments within RESERVE have an identifier of three alpha numeric characters.* There are no actual examples.

In a classification line this is shown like: TOP SECRET//RSV-XXX


KLONDIKE (KDK)
This control system is for geospational intelligence (GEOINT) and contains compartments with identifiers of up to six alpha numeric characters.* There are no actual examples.

In a classification line this is shown like: TOP SECRET//KDK-XXXXXX


? (GG)
This control system is for information derived from Measurement and Signature Intelligence (MASINT) and is identified by a codeword that is still classified. It's only known by the abbreviation.*


? (CRU)
This control system is identified by a codeword that is still classified and is only known by the abbreviation which was accidentally revealed in 2009.* It's related to highly secret CIA programs.

A compartment of CRU seems to be:
- GREYSTONE (GST)

In a classification line this is shown like: TOP SECRET//CRU-GST


GREYSTONE (GST)
This compartment is for information about the extraordinary rendition, interrogation and counter-terrorism programs, which the CIA established after the 9/11 attacks. It contains more than a dozen sub-compartments, which are identified by numeric characters.*

In a classification line this is shown like: TOP SECRET//CRU-GST 001


SAP compartments

Special Access Programs (SAP) are created to control access, distribution, and protection of particularly sensitive information. Each SAP is identified by a nickname which consists of two unassociated, unclassified words or a single classified codeword. Such an identifier is abbreviated in a two or three-character designator.

There are apparently over 100 SAPs, with many having numerous compartments and sub-compartments. The classification line for SAP information shows the words SPECIAL ACCESS REQUIRED (SAR), followed by the program nickname or codeword. Examples of program nicknames are BUTTER POPCORN, MEDIAN BELL, SENIOR ICE and SODA.

In a classification line this is shown like: TOP SECRET//SAR-MEDIAN BELL

Multiple SAP's are shown like: TOP SECRET//SAR-MB/SAR-SD


SAP sub-compartments
Subcompartments of SAPs are separated by spaces and they are listed in ascending alphabetic and numeric order. The classification markings do not show the hierarchy beyond the sub-compartment level. Sub-sub-compartments are listed in the same manner as sub-compartments.

In a classification line this is shown like: TOP SECRET//SAR-MB A691 D722


Dissemination markings

Dissemination markings or caveats are used to restrict the dissemination of information within only those people who have the appropriate clearance level and the need to know the information. Dissemination markings can also be used to control information which is unclassified. Some markings are used by multiple agencies, others are restricted to use by one agency.

Markings used by multiple agencies:
- FOR OFFICIAL USE ONLY (FOUO)
- SENSITIVE INFORMATION (SINFO, defunct since 2002)
- LAW ENFORCEMENT SENSITIVE (LES)

Intelligence community markings:
- ORIGINATOR CONTROLLED (ORCON) (OC)
- CONTROLLED IMAGERY (IMCON) (IMC)
- SOURCES AND METHODS INFORMATION (SAMI, defunct since 2009)
- NO FOREIGN NATIONALS (NOFORN) (NF)
- PROPRIETARY INFORMATION (PROPIN) (PR)
- AUTHORIZED FOR RELEASE TO (REL TO) [country/coalition designator]
- Releasable by Information Disclosure Official (RELIDO)
- Foreign Intelligence Surveillance Act (FISA)
- DISPLAY ONLY

National Security Agency (NSA) markings:
- [country trigraph] EYES ONLY

NSA also used SIGINT Exchange Designators, which were gradually replaced by the 'REL TO [...]' marking. Some former SIGINT Exchange Designators were:
- FRONTO
- KEYRUT
- SEABOOT
- SETTEE

National Geospatial intelligence Agency (NGA) markings:
- LIMITED DISTRIBUTION (LIMDIS) (DS)
- RISK SENSITIVE (RSEN)

Department of Defense (DoD) markings:
- NC2-ESI
- SPECIAL CATEGORY (SPECAT, defunct since 2010)

Department of Homeland Security (DHS) markings:
- SPECIAL SECURITY INFORMATION (SSI)

State Department (DoS) markings:
- EXCLUSIVE DISTRIBUTION (EXDIS) (XD)
- NO DISTRIBUTION (NODIS) (ND)
- SENSITIVE BUT UNCLASSIFIED (SBU)
- SBU NOFORN

Drug Enforcement Administration (DEA) markings:
- DEA SENSITIVE (DSEN)

Nuclear weapons related markings:
- RESTRICTED DATA (RD)
- FORMERLY RESTRICTED DATA (FRD)
- DOD UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (DCNI)
- DOE UNCLASSIFIED CONTROLLED NUCLEAR INFORMATION (UCNI)
- TRANSCLASSIFIED FOREIGN NUCLEAR INFORMATION (TFNI)

In a classification line this is shown like: SECRET//SI//ORCON

Multiple markings are shown like: SECRET//SI//ORCON/NOFORN


Nuclear weapons related markings
The markings Restricted Data (RD) and Former Restricted Data (FRD) are used by the Department of Defense and the Department of Energy for information about design and operation of nuclear warheads. Both can have the following two additional sub-markings:

- CRITICAL NUCLEAR WEAPON DESIGN INFORMATION (CNWDI)
- SIGMA (SG, followed by a number between 1 and 20)

In a classification line this is shown like: SECRET//RD-CNWDI

Multiple SIGMA markings are shown like: SECRET//RD-SIGMA 2 4


Internal markings
Some intelligence agencies also use internal markings, indicating that information may not be released or shown to anyone outside that particular agency without proper permission. Internal markings are shown after the dissemination markings at the very end of a classification line.

Central Intelligence Agency (CIA) internal markings:*
- CIA INTERNAL USE ONLY

National Security Agency (NSA) internal markings:
These markings are used to identify a COI or CoI, which stands for Community Of Interest. Recently disclosed COI identifiers are:
- BULLRUN
- ENDUE
- NOCON

In a classification line this is shown like: TOP SECRET//SI//NOFORN/BULLRUN


In order to prevent codewords being assigned twice, the Controlled Access Program Coordination Office (CAPCO) lists all codenames and authorized abbreviations of Sensitive Compartmented Information and Special Access Programs in the Authorized Classification and Control Markings Register or CAPCO list.


Links and Sources

- Wikipedia articles:
  - Classified information in the United States
  - Sensitive Compartmented Information
  - Special access program
- The 2010 Project BULLRUN Classification Guide
- The 2009 Intelligence Community Classification and Control Markings Implementation Manual (pdf)
- The 2008 DNI Authorized Classification and Control Markings Register (pdf)
- The 2004 listing of Country Code Trigraphs and Coalition Tetragraphs (pdf)
- Article about Security Clearances and Classifications
- Some notes about Sensitive Compartmented Information
- About The 5 secret code words that define our era
- Marc Ambinder & D.B. Grady, Deep State, Inside the Government Secrecy Industry, 2013, p. 164-167.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Classification | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • Digital Cameras Easily Turned into Spying Devices
    Newer cameras increasingly sport built-in Wi-Fi capabilities or allow users to add SD cards to achieve them in order to be able to upload a...
  • How secure is the Merkel-Phone?
    (Latest update: October 28, 2013) In an article by the German magazine Der Spiegel it was said that the NSA probably also eavesdropped on t...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Highly secure mobile phones
    (Updated: June 5, 2013) In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Theref...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ▼  September (31)
      • Business Espionage: Eavesdropping Devices Found at...
      • Commercial Espionage Fears Prompts... a conference...
      • Business Espionage - Bra Biz Ops Man Bugged
      • When Business Espionage Doesn't Work the Next Step...
      • Yet Another Good Reason to Conduct TSCM Sweeps
      • Fingerprint Security Appears Risky on iPhone, and ...
      • Is Your Cell Phone Talking to Your Carrier, or Beh...
      • PRISM as part of the BLARNEY program
      • Ex-Sheriff Pleads Guilty to Wiretapping
      • Afraid of Getting a Virus from a Public Recharging...
      • New iPhones Are Coming - Learn How to Sanitize You...
      • How Law Enforcement Can Watch Tweets in Real-time
      • New Mobile Survey Reveals 41% of Employees Are Del...
      • "Secure" Integrated Circuit Chip Salami'ed into Sp...
      • SpyCam Nails Airline Baggage Handlers at JFK
      • Sports Spying - Italian Football
      • Wizard of Id... More True than They Know
      • Alps Slayings Could be Linked to Industrial Espion...
      • The US classification system
      • School v. Students - Monitoring Social Media for A...
      • Sometimes the Bird Really is a Spy
      • Business Espionage: BMW Accused of Spying on Paris...
      • How to Check an iPhone for Spyware
      • The New York Times Quote of the Day :)
      • IT Industry Admits ‘Losing Battle’ Against State-B...
      • An NSA eavesdropping case study
      • Business Espionage: HTC - Cell Phone Company Takes...
      • The Newest Eavesdropping Gadget for PIs and Spies ...
      • Industrialists Hit by Cyber Espionage
      • Smartphone Spy Lens
      • Family doctor who used £60 spycam watch...
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile