A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance. [1] [ full citation needed ]
National Security Clearances are a hierarchy of levels, depending on the classification of materials that can be accessed—Baseline Personnel Security Standard (BPSS), Counter-Terrorist Check (CTC), Enhanced Baseline Standard (EBS), Security Check (SC), enhanced Security Check (eSC), Developed Vetting (DV), enhanced Developed Vetting (eDV), and STRAP.
The BPSS is the entry-level National Security Clearance, and both CTC and EBS are effectively enhancements to the BPSS, with CTC relating to checking for susceptibility to extremist persuasion, and EBS relating to checking for susceptibility to espionage persuasion, the latter being needed for supervised access to SECRET material. The SC again is focused on susceptibility to espionage persuasion, and is required for an individual to have long-term unsupervised access to SECRET material and occasional access to TOP SECRET (TS) material, whilst for regular access to TS the DV, eDV is required. Occasionally STRAP is required with DV.
Those with National Security Clearance are commonly required to sign a statement to the effect that they agree to abide by the restrictions of the Official Secrets Act (OSA). This is popularly referred to as "signing the Official Secrets Act". Signing this has no effect on which actions are legal, as the act is a law, not a contract, and individuals are bound by it whether or not they have signed it. Signing it is intended more as a reminder to the person that they are under such obligations. To this end, it is common to sign this statement both before and after a period of employment that involves access to secrets.
After the United States entered into World War II, Britain changed its security classifications to match those of the U.S.. Previously, classifications had included the top classification "Most Secret", but it soon became apparent that the United States did not fully understand the UK's classifications, and classified information appeared in the U.S.'s press. This spearheaded the uniformity in classification between the United Kingdom and the United States. The terminology and levels of British security classifications have also changed from Positive Vetting and Enhanced Positive Vetting to SC, eSC, DV, eDV and STRAP.
In addition to National Security Clearances, other types of roles and organisations stipulate a need for clearances, including:
A United States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it.
The US president can declassify previously classified information, following a detailed process. [2]This section has multiple issues. Please help improve it or discuss these issues on the talk page . (Learn how and when to remove these messages)
|
The UN has a Security Clearance (SC) procedure and document for United Nations staff travelling to areas designated as security phase areas, with numbers ranging from one to five ("no-phase" areas are calm countries where no SC is required).
United Nations staff can apply for SC online, at the website of the Department for Safety and Security.
In the post World War II era, there have been several highly publicized, and often controversial, cases of officials or scientists having their security clearances revoked, including:
Name | Reason | Year of revocation |
---|---|---|
Sandy Berger | Mishandling of classified documents | 2005 |
Rod Blagojevich [3] | Corruption charges | 2008 |
John O. Brennan | Claimed but not processed [4] | N/A |
John M. Deutch | Mishandling of classified information | 1999 |
Thomas Andrews Drake | Unauthorized disclosure of secrets | 2010 |
Abdel-Moniem El-Ganayni | Unknown reasons | 2008 |
Michael T. Flynn | Lying to the FBI | 2017 |
Wen Ho Lee | Espionage charges | 1999 |
Robert Oppenheimer | Communist sympathies | 1954 |
Aldric Saucier | Whistleblowing on fraud [5] | 1992 |
Edward Snowden | Unauthorized disclosure of secrets | 2013 |
Alan Turing (UK) | Homosexuality conviction | 1952 |
Qian Xuesen | Communist sympathies | 1950 |
This list does not cover people whose security clearance lapsed possibly following changing their job. [6]
German language official files
Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance with a need to know. Mishandling of the material can incur criminal penalties.
Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence.
Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications, permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization. There are two contexts for the use of multilevel security.
Eyes only is jargon used with regard to classified information. Whereas a classified document is normally intended to be available to readers with the appropriate security clearance and a need to know, an "eyes only" designation, whether official or informal, indicates that the document is intended only for a specific set of readers. As such the document should not be read by other individuals even if they otherwise possess the appropriate clearance. Another meaning is that the document is under no circumstances to be copied or photographed, "eyes only" meaning that it is to be physically read by cleared personnel and nothing more, to ensure that no unauthorized copies of the text are made which might be unaccounted for.
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.
Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings.
Q clearance or Q access authorization is the U.S. Department of Energy (DOE) security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data. Restricted Data (RD) is defined in the Atomic Energy Act of 1954 and covers nuclear weapons and related materials. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data (FRD) and National Security Information, as well as Confidential Restricted Data and Formerly Restricted Data. Access to Restricted Data is only granted on a need-to-know basis to personnel with appropriate clearances.
Classified information in the United Kingdom is a system used to protect information from intentional or inadvertent release to unauthorised readers. The system is organised by the Cabinet Office and is implemented throughout central and local government and critical national infrastructure. The system is also used by private sector bodies that provide services to the public sector.
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the security and international relations of a nation depending on the level of sensitivity and nature of the information.
The United States Intelligence Community A-Space, or Analytic Space, is a project started in 2007 from the Office of the Director of National Intelligence's (ODNI) Office of Analytic Transformation and Technology to develop a common collaborative workspace for all analysts from the USIC. It is accessible from common workstations and provides unprecedented access to interagency databases, a capability to search classified and unclassified sources simultaneously, web-based messaging, and collaboration tools. The Defense Intelligence Agency (DIA) is the executive agent for building the first phase of A-Space. Initial operational capability was scheduled for December 2007. A-Space went live on the government's classified Joint Worldwide Intelligence Communications System 22 September 2008. A-Space is built on Jive Software's Clearspace application.
The FBI Name Check is a background check procedure performed by the Federal Bureau of Investigation for federal agencies, components within the legislative, judicial, and executive branches of the federal government; foreign police and intelligence agencies; and state and local law enforcement agencies within the criminal justice system. The FBI Name Check is performed by the FBI as a part of the National Name Check Program, which dates back to Executive Order 10450 that was issued during the Eisenhower Administration. The FBI Name Check for an individual involves a search of the FBI's Central Records System Universal Index for any appearance of the name of the individual, as well as close phonetic variants and permutations of that name, in any of the records stored in the Universal Index. If any such occurrences are found, the Name Check also involves retrieval and analysis of the relevant paper and electronic files from local FBI offices and from other law-enforcement agencies.
USIS was a US corporation that provided security-based information and service solutions to both government and corporate customers, in the United States and abroad. Its corporate headquarters were in Falls Church, Virginia, in Greater Washington, D.C. Training took place in Boyers, Pennsylvania. USIS was a part of Altegrity Inc., a company headquartered in the Falls Church area that was owned by Providence Equity Partners.
The Government Security Classifications Policy (GSCP) is a system for classifying sensitive government data in the United Kingdom.
In the United Kingdom, government policy requires that staff undergo security vetting in order to gain access to government information.
The Intelligence Authorization Act for Fiscal Year 2014 is a U.S. public law that authorizes appropriations for fiscal year 2014 for intelligence activities of the U.S. government. The law authorizes there to be funding for intelligence agencies such as the Central Intelligence Agency or the National Security Agency, but a separate appropriations bill would also have to pass in order for those agencies to receive any money.
The US Department of Commerce Office of Security is a division of the United States Department of Commerce (DOC) that works to provide security services for facilities of the department. Its aim is to provide policies, programs, and oversight as it collaborates with facility managers to mitigate terrorism risks to DOC personnel and facilities, program managers to mitigate espionage risks to DOC personnel, information, and facilities, and Department and Bureau leadership to increase emergency preparedness for DOC operations.
John Philip Mudd is an American media commentator and former counterterrorism official in the Central Intelligence Agency (CIA) and Federal Bureau of Investigation (FBI).
A United States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it.
A Canada security clearance is required for viewing classified information in Canada.