List of U.S. security clearance terms

Last updated

This list covers security clearance terms used in the United States of America.

Contents

Within the U.S. government, security clearance levels serve as a mechanism to ascertain which individuals are authorized to access sensitive or classified information. These levels often appear in employment postings for Defense related jobs and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear energy positions.

The different organizations in the United States Federal Government use different terminology and lettering. Security clearances can be issued by many United States of America government agencies.

The checks for clearances and the granting of clearances is carried out by the US Office of Personnel Management. [1] [2]

Use

Security clearance levels often appear in employment postings for Defense related jobs, and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear energy positions. Employers generally prefer to hire people who are already cleared to access classified information at the level needed for a given job or contract, because security clearances can take up to a year to obtain. In general, most employers look for candidates who hold an active Department of Defense (DoD) collateral clearance or a blanket TS/SCI-cleared (Top Secret / Sensitive Compartmented Information) and who have a counterintelligence (CI), full-scope polygraph (FSP), also known as expanded scope screening (ESS).

Security levels

Security clearances can be issued by many United States of America government agencies, including the Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security (DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances. There are three levels of DoD security clearances: [3]

  1. TOP SECRET – Information in which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security.
  2. SECRET – Information in which the unauthorized disclosure could reasonably be expected to cause serious damage to the national security.
  3. CONFIDENTIAL – Information in which the unauthorized disclosure could reasonably be expected to cause damage to the national security.
  4. Unacknowledged Special Access Program (USAP): USAP & "Waived USAP" – Made known only to authorized persons, including members of the appropriate committees of the US Congress. Waived USAP is a subset of USAP.
  5. Alternative or Compensatory Control Measures (ACCM) – Security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve strict need-to-know controls and where SAP controls are not required. [4] [5] [6] [7] [8]

Additionally, the United States Department of Energy issues two levels of security clearances:

  1. Q Clearance – Allows access to Classified information up to and including TOP SECRET data with the special designation: Restricted Data (TS//RD) and special Q-Cleared "security" areas.[ citation needed ]
  2. L Clearance – Allows access to Classified information up to and including SECRET data with the special designation: Formerly Restricted Data (S//FRD) and special L-Cleared "limited" areas.[ citation needed ]

Additional Security descriptions and designations

Public trust position

Despite the common misconception, a public trust position is not a security clearance, and is not the same as the confidential designation. Certain positions which require access to sensitive information, but not information which is classified, must obtain this designation through a background check. Public Trust Positions can either be moderate-risk or high-risk. [9] [10]

Classification subsets: Sensitive Compartmented Information and Special Access Programs

Information "above Top Secret," a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly "above" Top Secret, since there is no clearance higher than Top Secret. SCI information may be either Secret or Top Secret, but in either case it has additional controls on dissemination beyond those associated with the classification level alone. In order to gain SCI Access, one would need to have a Single Scope Background Investigation (SSBI). Compartments of information are identified by code words. This is one means by which the "need to know" principle is formally and automatically enforced.[ citation needed ]

In order to have access to material in a particular SCI "compartment", the person must first have the clearance level for the material. The SCI designation is an add-on, not a special clearance level. Someone cleared at the SECRET level for some compartment X cannot see material in compartment X that is classified TOP SECRET. But the opposite is true: a person cleared for TOP SECRET with access to X material can also access SECRET material in compartment X. Compartments have designators which uniquely identify that compartment. These designators may also be classified, even protected under another SCI compartment.

As long as the holder of a clearance is sponsored, the clearance remains active. If the holder loses sponsorship, the holder is eligible for re-employment with the same clearance for up to 24 months without reinvestigation, after which an update investigation is required.

A Periodic Reinvestigation is typically required every five years for Top Secret and ten years for Secret/Confidential, depending upon the agency. Access to a compartment of information lasts only as long as the person's need to have access to a given category of information.[ citation needed ]

Additional Designations

Unclassified (U) is a valid security description, especially when indicating unclassified information within a document classified at a higher level. For example, the title of a Secret report is often unclassified, and must be marked as such. Material that is classified as Unclassified // For Official Use Only (U//FOUO) is considered between Unclassified and Confidential and may deal with employee data.[ citation needed ]

For access to information at a given classification level, individuals must have been granted access by the sponsoring government organization at that or a higher classification level, and have a need to know the information. The government also supports access to SCI and SAPs in which access is determined by need-to-know. These accesses require increased investigative requirements before access is granted. [11]

Investigations

The following investigations are used in clearance determinations: [12]

Many other investigative products have been used to grant clearances in the past. While some of them are still used to determine suitability for employment or enlistment, only the above are used to grant clearances.[ citation needed ]

Additional investigation or adjudication

Certain accesses require persons to undertake one or more polygraph tests:

SCI eligibility

Sensitive compartmented information (SCI) is a type of classified information controlled through formal systems established by the Director of National Intelligence. To access SCI, one must first have a favorable SSBI and be granted SCI eligibility. Because the SSBI is also used to grant collateral top secret eligibility, the two are often granted together and referred to as TS/SCI. Access to individual SCI control systems, compartments, and subcompartments may then be granted by the owner of that information. Note that additional investigation or adjudication may be required.[ citation needed ]

In general, military personnel and civilian employees (government and contractor) do not publish the individual compartments for which they are cleared. While this information is not classified, specific compartment listings may reveal sensitive information when correlated with an individual's résumé. Therefore, it is sufficient to declare that a candidate possesses a TS/SCI clearance with a polygraph.[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Classified information</span> Material that government claims requires confidentiality

Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know. Mishandling of the material can incur criminal penalties.

A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.

The Bell–LaPadula model (BLP) is a state machine model used for enforcing access control in government and military applications. It was developed by David Elliott Bell, and Leonard J. LaPadula, subsequent to strong guidance from Roger R. Schell, to formalize the U.S. Department of Defense (DoD) multilevel security (MLS) policy. The model is a formal state transition model of computer security policy that describes a set of access control rules which use security labels on objects and clearances for subjects. Security labels range from the most sensitive, down to the least sensitive.

<span class="mw-page-title-main">Sensitive compartmented information</span> Information relative to U.S. National Security

Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.

<span class="mw-page-title-main">Intelink</span>

Intelink is a group of secure intranets used by the United States Intelligence Community. The first Intelink network was established in 1994 to take advantage of Internet technologies and services to promote intelligence dissemination and business workflow. Since then it has become an essential capability for the US intelligence community and its partners to share information, collaborate across agencies, and conduct business. Intelink refers to the web environment on protected top secret, secret, and unclassified networks. One of the key features of Intelink is Intellipedia, an online system for collaborative data sharing based on MediaWiki. Intelink uses WordPress as the basis of its blogging service.

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings.

<span class="mw-page-title-main">Q clearance</span> U.S. Department of Energy security clearance level

Q clearance or Q access authorization is the U.S. Department of Energy (DOE) security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data. Restricted Data (RD) is defined in the Atomic Energy Act of 1954 and covers nuclear weapons and related materials. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data (FRD) and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data. Access to Restricted Data is only granted on a need-to-know basis to personnel with appropriate clearances.

<span class="mw-page-title-main">L clearance</span>

An L clearance is a security clearance used by the United States Department of Energy (DOE) and Nuclear Regulatory Commission for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954. It is equivalent to a United States Department of Defense (DOD) Secret clearance.

Classified information in the United Kingdom is a system used to protect information from intentional or inadvertent release to unauthorised readers. The system is organised by the Cabinet Office and is implemented throughout central and local government and critical national infrastructure. The system is also used by private sector bodies that provide services to the public sector.

A Single Scope Background Investigation (SSBI), now called a Tier 5 (T5) investigation, is a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI. It is governed by the U.S. Intelligence Community Policy Guidance Number 704.1.

National Agency Check with Local Agency and Credit Checks (NACLC) is a type of background check required in the United States for granting of security clearances.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.

The Department of the Navy Central Adjudication Facility, a Naval Criminal Investigative Service (NCIS) organization, was responsible for determining who within the Department of the Navy is eligible to hold a security clearance, to have access to Sensitive Compartmented Information (SCI), or to be assigned to sensitive duties. The aggregate body of DoN personnel consists of Active Duty and Reserve components of the United States Navy and Marine Corps, as well as civilians and contractors. In addition, DoN CAF makes SCI eligibility determinations for select contractor personnel. Collateral clearance determinations for contractor personnel are established by DISCO.

In information security, the process of being read into a compartmented program generally entails being approved for access to particularly sensitive and restricted information about a classified program, receiving a briefing about the program, and formally acknowledging the briefing, usually by signing a non-disclosure agreement describing restrictions on the handling and use of information concerning the program. Officials with the required security clearance and a need to know may be read into a covert operation or clandestine operation they will be working on. For codeword–classified programs, an official would not be aware a program existed with that codeword until being read in, because the codewords themselves are classified.

A variety of networks operating in special security domains handle classified information in the United States or sensitive but unclassified information, while other specialized networks are reserved specifically for unclassified use by the same agencies. Some sites accessed from these networks have been referred to as "classified websites" in official communications, such as the American embassy "Amman's Classified Web Site at http://www.state.sgov.gov/pinea/amman/" and "Mexico City's Classified Web Site at http://www.state.sgov.gov/p/wha/mexicocity" Some of these trace back to the Defense Data Network which split from the Internet in 1983.

The Government Security Classifications Policy (GSCP) is a system for classifying sensitive government data in the United Kingdom.

In the United Kingdom, government policy requires that staff undergo security vetting in order to gain access to government information.

<span class="mw-page-title-main">Intelligence Authorization Act for Fiscal Year 2014</span> United States Law

The Intelligence Authorization Act for Fiscal Year 2014 is a U.S. public law that authorizes appropriations for fiscal year 2014 for intelligence activities of the U.S. government. The law authorizes there to be funding for intelligence agencies such as the Central Intelligence Agency or the National Security Agency, but a separate appropriations bill would also have to pass in order for those agencies to receive any money.

References

  1. "Investigations FAQs". US Office of Personnel Management. Retrieved 9 February 2023. Security clearances are granted on a need-to-have basis when a person's position requires access to classified information.
  2. "Security Clearances". Northrop Grumman. 9 February 2023. Retrieved 9 February 2023.
  3. "Security Clearance FAQ". www.clearancejobs.com. Archived (PDF) from the original on 29 March 2004. Retrieved 30 October 2021.
  4. "DCMA Manual 3301-08: Information Security" (PDF). Defense Contract Management Agency. Department of Defense.
  5. "Department of Defense Manual" (PDF). 2013.
  6. "PART 117 - National Industrial Security Program Operating Manual". www.ecfr.gov. Retrieved 30 October 2021.
  7. "National Security Positions vs. Public Trust Positions". www.dm.usda.gov. 30 November 2010. Retrieved 30 October 2021.
  8. "FEDERAL SECURITY/SUITABILITY CLEARANCE CHART" (PDF). fedcas.com. Retrieved 30 October 2021.
  9. https://www.cdse.edu/Portals/124/Documents/student-guides/SA001-guide.pdf
  10. "Aligning OPM Investigative Levels With Reform Concepts" (PDF). archive.opm.gov. 24 August 2010. Retrieved 30 October 2021.; DOE M 470.4-5 pp. II-4--II-5