This list covers security clearance terms used in the United States of America.
Within the U.S. government, security clearance levels serve as a mechanism to ascertain which individuals are authorized to access sensitive or classified information. These levels often appear in employment postings for Defense related jobs and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear energy positions.
The different organizations in the United States Federal Government use different terminology and lettering. Security clearances can be issued by many United States of America government agencies.
The checks for clearances and the granting of clearances is carried out by the US Office of Personnel Management. [1] [2]
Security clearance levels often appear in employment postings for Defense related jobs, and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear energy positions. Employers generally prefer to hire people who are already cleared to access classified information at the level needed for a given job or contract, because security clearances can take up to a year to obtain. In general, most employers look for candidates who hold an active Department of Defense (DoD) collateral clearance or a blanket TS/SCI-cleared (Top Secret / Sensitive Compartmented Information) and who have a counterintelligence (CI), full-scope polygraph (FSP), also known as expanded scope screening (ESS).
Security clearances can be issued by many United States of America government agencies, including the Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security (DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances. There are three levels of DoD security clearances: [3]
Additionally, the United States Department of Energy issues two levels of security clearances:
Despite the common misconception, a public trust position is not a security clearance, and is not the same as the confidential designation. Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk. [9] [10]
Information "above Top Secret," a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly "above" Top Secret, since there is no clearance higher than Top Secret. SCI information may be either Secret or Top Secret, but in either case it has additional controls on dissemination beyond those associated with the classification level alone. In order to gain SCI Access, one would need to have a Single Scope Background Investigation (SSBI). Compartments of information are identified by code words. This is one means by which the "need to know" principle is formally and automatically enforced.[ citation needed ]
In order to have access to material in a particular SCI "compartment", the person must first have the clearance level for the material. The SCI designation is an add-on, not a special clearance level. Someone cleared at the SECRET level for some compartment X cannot see material in compartment X that is classified TOP SECRET. But the opposite is true: a person cleared for TOP SECRET with access to X material can also access SECRET material in compartment X. Compartments have designators which uniquely identify that compartment. These designators may also be classified, even protected under another SCI compartment.
As long as the holder of a clearance is sponsored, the clearance remains active. If the holder loses sponsorship, the holder is eligible for re-employment with the same clearance for up to 24 months without reinvestigation, after which an update investigation is required.
A Periodic Reinvestigation is typically required every five years for Top Secret and ten years for Secret/Confidential, depending upon the agency. Access to a compartment of information lasts only as long as the person's need to have access to a given category of information.[ citation needed ]
Unclassified (U) is a valid security description, especially when indicating unclassified information within a document classified at a higher level. For example, the title of a Secret report is often unclassified, and must be marked as such. Material that is classified as Unclassified // For Official Use Only (U//FOUO) is considered between Unclassified and Confidential and may deal with employee data.[ citation needed ]
For access to information at a given classification level, individuals must have been granted access by the sponsoring government organization at that or a higher classification level, and have a need to know the information. The government also supports access to SCI and SAPs in which access is determined by need-to-know. These accesses require increased investigative requirements before access is granted. [11]
The following investigations are used in clearance determinations: [12]
Many other investigative products have been used to grant clearances in the past. While some of them are still used to determine suitability for employment or enlistment, only the above are used to grant clearances.[ citation needed ]
Certain accesses require persons to undertake one or more polygraph tests:
Sensitive compartmented information (SCI) is a type of classified information controlled through formal systems established by the Director of National Intelligence. To access SCI, one must first have a favorable SSBI and be granted SCI eligibility. Because the SSBI is also used to grant collateral top secret eligibility, the two are often granted together and referred to as TS/SCI. Access to individual SCI control systems, compartments, and subcompartments may then be granted by the owner of that information. Note that additional investigation or adjudication may be required.[ citation needed ]
In general, military personnel and civilian employees (government and contractor) do not publish the individual compartments for which they are cleared. While this information is not classified, specific compartment listings may reveal sensitive information when correlated with an individual's résumé. Therefore, it is sufficient to declare that a candidate possesses a TS/SCI clearance with a polygraph.[ citation needed ]
Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance with a need to know. Mishandling of the material can incur criminal penalties.
A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.
The Bell–LaPadula model (BLP) is a state-machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell, and Leonard J. LaPadula, subsequent to strong guidance from Roger R. Schell, to formalize the U.S. Department of Defense (DoD) multilevel security (MLS) policy. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from the most sensitive, down to the least sensitive.
Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.
Intelink is a group of secure intranets used by the United States Intelligence Community. The first Intelink network was established in 1994 to take advantage of Internet technologies and services to promote intelligence dissemination and business workflow. Since then it has become an essential capability for the US intelligence community and its partners to share information, collaborate across agencies, and conduct business. Intelink refers to the web environment on protected top secret, secret, and unclassified networks. One of the key features of Intelink is Intellipedia, an online system for collaborative data sharing based on MediaWiki. Intelink uses WordPress as the basis of its blogging service.
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.
Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings.
Q clearance or Q access authorization is the U.S. Department of Energy (DOE) security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data. Restricted Data (RD) is defined in the Atomic Energy Act of 1954 and covers nuclear weapons and related materials. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data (FRD) and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data. Access to Restricted Data is only granted on a need-to-know basis to personnel with appropriate clearances.
An L clearance is a security clearance used by the United States Department of Energy (DOE) and Nuclear Regulatory Commission for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954. It is equivalent to a United States Department of Defense (DOD) Secret clearance.
Classified information in the United Kingdom is a system used to protect information from intentional or inadvertent release to unauthorised readers. The system is organised by the Cabinet Office and is implemented throughout central and local government and critical national infrastructure. The system is also used by private sector bodies that provide services to the public sector.
A Single Scope Background Investigation (SSBI), now called a Tier 5 (T5) investigation, is a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI. It is governed by the U.S. Intelligence Community Policy Guidance Number 704.1.
Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks.
National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:
The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.
The Department of the Navy Central Adjudication Facility, a Naval Criminal Investigative Service (NCIS) organization, was responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties. The aggregate body of DoN personnel consists of Active Duty and Reserve components of the United States Navy and Marine Corps, as well as civilians and contractors. In addition, DoN CAF makes SCI eligibility determinations for select contractor personnel. Collateral clearance determinations for contractor personnel are established by DISCO.
A variety of networks operating in special security domains handle classified information in the United States or sensitive but unclassified information, while other specialized networks are reserved specifically for unclassified use by the same agencies. Some sites accessed from these networks have been referred to as "classified websites" in official communications, such as the American embassy "Amman's Classified Web Site at http://www.state.sgov.gov/pinea/amman/" and "Mexico City's Classified Web Site at http://www.state.sgov.gov/p/wha/mexicocity" Some of these trace back to the Defense Data Network which split from the Internet in 1983.
The Government Security Classifications Policy (GSCP) is a system for classifying sensitive government data in the United Kingdom.
The Intelligence Authorization Act for Fiscal Year 2014 is a U.S. public law that authorizes appropriations for fiscal year 2014 for intelligence activities of the U.S. government. The law authorizes there to be funding for intelligence agencies such as the Central Intelligence Agency or the National Security Agency, but a separate appropriations bill would also have to pass in order for those agencies to receive any money.
A United States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it.
A Canada security clearance is required for viewing classified information in Canada.
Security clearances are granted on a need-to-have basis when a person's position requires access to classified information.