Sensitive Compartmented Information

Last updated
Example of intelligence on covert meetings held by the French President Francois Hollande. The intelligence was collected by the National Security Agency and classified as TOP SECRET//COMINT-GAMMA//ORCON/NOFORN, and released in form of a Global SIGINT Highlight on 22 May 2012. Wikileaks-france-nsa-comint-gamma.png
Example of intelligence on covert meetings held by the French President François Hollande. The intelligence was collected by the National Security Agency and classified as TOP SECRET//COMINT-GAMMA//ORCON/NOFORN, and released in form of a Global SIGINT Highlight on 22 May 2012.

Sensitive compartmented information (SCI) is a type of United States classified information concerning or derived from sensitive intelligence sources, methods, or analytical processes. All SCI must be handled within formal access control systems established by the Director of National Intelligence. [1]

Contents

SCI is not a classification. SCI clearance has sometimes been called "above Top Secret," [2] but information at any classification level may exist within an SCI control system. When "decompartmentalized" this information is treated the same as collateral information at the same classification level.

SCI must be processed, stored, used or discussed in a sensitive compartmented information facility.

Access

Eligibility for access to SCI is determined by a Single Scope Background Investigation (SSBI) or periodic reinvestigation. [3] Because the same investigation is used to grant Top Secret security clearances, the two are often written together as TS/SCI. Eligibility alone does not confer access to any specific SCI material; it is simply a qualification. One must receive explicit permission to access an SCI control system or compartment. This process may include a polygraph or other approved investigative or adjudicative action. [4]

Once it is determined a person should have access to an SCI compartment, they sign a nondisclosure agreement, are "read in" or indoctrinated, and the fact of this access is recorded in a local access register or in a computer database. Upon termination from a particular compartment, the employee again signs the nondisclosure agreement.

Control systems

An SCI cover sheet from 1967. SCI cover sheet (1967).jpg
An SCI cover sheet from 1967.

SCI is divided into control systems, which are further subdivided into compartments and sub-compartments. These systems and compartments are usually identified by a classified codeword. Several such codewords have been declassified. The following SCI control systems, with their abbreviations and compartments, are known:

Special Intelligence (SI)
Special Intelligence (so in the CAPCO manual, but always SI in document markings) is the control system covering communications intelligence. Special Intelligence is a term for communications intercepts. [5] The previous title for this control system was COMINT, but this was deprecated in 2011. [6]
SI has several compartments, of which the following are known or declassified:
  • Very Restricted Knowledge (VRK)
  • Exceptionally Controlled Information (ECI), which was used to group compartments for highly sensitive information, but was deprecated as of 2011. [7]
  • GAMMA (SI-G, SI-G-AAAA, AAAA represents 4 alpha characters to indicate sub Gamma compartments), which has subcompartments identified by four alphanumeric characters. [8]
Several now-retired codewords protected SI compartments based on their sensitivity, generally referred to as Top Secret Codeword (TSC) and Secret Codeword (SC). [9] These codewords were:
  • UMBRA for the most sensitive material
  • SPOKE for less sensitive material
  • MORAY for the least sensitive SI that required codeword protection. [10]
These three codewords, the usage of which was terminated in 1999, [11] were attached directly to the classification without reference to COMINT or SI, e.g. Top Secret UMBRA.
STELLARWIND (STLW)
This codeword was revealed on June 27, 2013, when The Guardian published a draft report from the NSA Inspector General about the electronic surveillance program STELLARWIND. This program was started by President George W. Bush shortly after the 9/11 attacks. For information about this program, a new security compartment was created which was given STELLARWIND as its permanent cover term on October 31, 2001. [12]
ENDSEAL (EL)
This U.S. Navy's control system was revealed in the 2013 Classification Manual. ENDSEAL information must always be classified as Special Intelligence (SI), so probably it is related to SIGINT or ELINT. [13] It has two subcompartments: ECRU (EL-EU) and NONBOOK (EL-NK).
TALENT KEYHOLE (TK)
TK covers space-based IMINT (Imagery intelligence), SIGINT (Signals intelligence), and MASINT (Measurement and signature intelligence) collection platforms; related processing and analysis techniques; and research, design, and operation of these platforms (but see Reserve below). [14] The original TALENT compartment was created in the mid-1950s for the U-2. In 1960, it was broadened to cover all national aerial reconnaissance (to later include SR-71 sourced imagery) and the KEYHOLE compartment was created for satellite intelligence. [15] TALENT KEYHOLE is now a top-level control system; KEYHOLE is no longer a distinct compartment. Known compartments include RUFF (IMINT satellites), ZARF (ELINT satellites), and CHESS (U-2). [16] The KEYHOLE series KH-1 through KH-4b were part of the new TALENT-KEYHOLE designation. [17]
HUMINT Control System (HCS)
HCS is the HUMINT (Human-source Intelligence) Control System. This system was simply designated "HUMINT" until confusion arose between collateral (regular) HUMINT and the control system. The current nomenclature was chosen to eliminate the ambiguity. [18] There are two compartments HCS-O (Operation) and HCS-P (Product). HCS-O-P marking was also used in "Review of the Unauthorized Disclosures of Former National Security Agency Contractor Edward Snowden".
KLONDIKE (KDK)
KLONDIKE protects sensitive geospatial intelligence. [19] It has three main subcompartments: KDK BLUEFISH (KDK-BLFH, KDK-BLFH-xxxxxx, xxxxxx represents up to 6 alphanumeric characters indicating a sub BLUEFISH compartment), KDK IDITAROD (KDK-IDIT, KDK-IDIT-xxxxxx, xxxxxx represents up to 6 alphanumeric characters indicating a sub IDITAROD compartment) and KDK KANDIK (KDK-KAND, KDK-KAND-xxxxxx, xxxxxx represents up to 6 alphanumeric characters indicating a sub KANDIK compartment).
RESERVE (RSV)
RESERVE is the control system for National Reconnaissance Office compartments protecting new sources and methods during the research, development, and acquisition process. [20] RSV-XXX, XXX represents 3 alphanumeric characters to indicate sub Reserve compartments.
BYEMAN (BYE)
BYEMAN is a retired control system covering certain overhead collection systems, including CORONA and OXCART. [21] Most BYE content was transferred to TK. BYE Special Handling content was transferred to Reserve.

Markings

SCI control system markings are placed immediately after the classification level markings in a banner line or portion marking. [22] Sometimes, especially on older documents, they are stamped. The following banner line and portion marking describe a top secret document containing information from the notional SI-GAMMA 1234 subcompartment, the notional SI-MANSION compartment, and the notional TALENT KEYHOLE-LANTERN compartment:

TOP SECRET//SI-GAMMA 1234-MANSION/TALENT KEYHOLE-LANTERN//NOFORN
(TS//SI-G 1234-M/TK-L//NF)

Older documents were marked with HANDLE VIA xxxx CONTROL CHANNELS (or "HVxCC"), HANDLE VIA xxxx CHANNELS ONLY (or "HVxCO"), or HANDLE VIA xxxx CHANNELS JOINTLY (or "HVxCJ"), but this requirement was rescinded in 2006. [23] For example, COMINT documents were marked as HANDLE VIA COMINT CHANNELS ONLY. This marking led to the use of the caveat CCO (COMINT Channels Only) in portion markings, [24] but CCO is also obsolete. [25]

Notes

  1. ICD 1, p. 22
  2. Robert S. McNamara, quoted in Richelson, The Intelligence Community, p. 511
  3. ICPG 704.1
  4. ICD 1, p. 9
  5. UKUSA COMINT Agreement, PDF p. 27. Note that common SIGINT terms were defined differently in this version of the UKUSA agreement; the modern definitions were codified by 1955.
  6. Intelligence Community Classification and Control Markings Implementation Manual v4.2, p. 58
  7. NRO Review and Redaction Guide, p. 140.
  8. Intelligence Community Classification and Control Markings Implementation Manual v4.2, p. 60-63
  9. In Camera Affidavit of Eugene F. Yeats
  10. Richelson p. 512-514
  11. " Implementation Guidance for Elimination of Codewords October 22, 1999
  12. NSA inspector general report on email and internet data collection under Stellar Wind – full document June 27, 2013. See page 12 for the assignment of the cover term.
  13. Robert Sesek, My First FOIA Request: ODNI CAPCO v6, April 10, 2014
  14. Intelligence Community Classification and Control Markings Implementation Manual v5.1, p. 65
  15. Critique of the Codeword Compartment
  16. Richelson, The US Intelligence Community, p. 514
  17. http://nsarchive.gwu.edu/NSAEBB/NSAEBB225/doc23.pdf Archived 2016-11-01 at the Wayback Machine
  18. Authorized Classification and Control Markings Register v1.2
  19. Intelligence Community Classification and Control Markings Implementation Manual v4.2, p. 56
  20. Intelligence Community Classification and Control Markings Implementation Manual v5.1, p. 54
  21. National Reconnaissance Office Review and Redaction Guide, p. 7
  22. Authorized Classification and Control Markings Register v1.2
  23. ICPM 2006-700-8
  24. See this page for an example.
  25. Authorized Classification and Control Markings Register v1.2

Bibliography

Related Research Articles

Foreign instrumentation signals intelligence, FISINT is intelligence from the interception of foreign electromagnetic emissions associated with the testing and operational deployment of foreign aerospace, surface, and subsurface systems. Since it deals with signals that have communicational content, it is a subset of Communications Intelligence (COMINT), which, in turn, is a subset of SIGINT. Unlike general COMINT signals, the content of FISINT signals is not in regular human language, but rather in machine to machine (instrumentation) language or in a combination of regular human language and instrumentation language. FISINT is also considered as a subset of MASINT.

Classified information Material that a government body claims is sensitive information that requires protection of confidentiality, integrity, or availability

Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the material can incur criminal penalties.

A security clearance is a status granted to individuals allowing them access to classified information or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.

SCI may refer to:

Sensitive Compartmented Information Facility enclosed area within a building that is used to process Sensitive Compartmented Information

A Sensitive Compartmented Information Facility, in British and United States military, national security/national defense and intelligence parlance, is an enclosed area within a building that is used to process Sensitive Compartmented Information (SCI) types of classified information.

The ICD-10 Procedure Coding System (ICD-10-PCS) is an international system of medical classification used for procedural coding. The Centers for Medicare and Medicaid Services, the agency responsible for maintaining the inpatient procedure code set in the U.S., contracted with 3M Health Information Systems in 1995 to design and then develop a procedure classification system to replace Volume 3 of ICD-9-CM. ICD-9-CM contains a procedure classification; ICD-10-CM does not. ICD-10-PCS is the result. ICD-10-PCS was initially released in 1998. It has been updated annually since that time.

The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments.

Special Access Programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or Presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings.

Q clearance U.S. Dept. of Energy clearance level

Q clearance or Q access authorization is the Department of Energy (DOE) security clearance required to access Top Secret Restricted Data, Formerly Restricted Data, and National Security Information, as well as Secret Restricted Data. Restricted Data (RD) is defined in the Atomic Energy Act of 1954 and covers nuclear weapons and related materials. The lower-level L clearance is sufficient for access to Secret Formerly Restricted Data (FRD) and National Security Information, as well as Confidential Restricted Data, Formerly Restricted Data, and National Security Information. Access to Restricted Data is only granted on a need-to-know basis to personnel with appropriate clearances.

Classified information in the United Kingdom is a system used to protect information from intentional or inadvertent release to unauthorised readers. The system is organised by the Cabinet Office and is implemented throughout central and local government and critical national infrastructure. The system is also used by private sector bodies that provide services to the public sector.

The Special Security Office (SSO) is a function within multiple arms of the United States federal government and armed forces with the mission to provide a reliable and secure means to receive and disseminate Sensitive Compartmented Information (SCI) and Special Access Programs (SAP) to authorized recipients in the United States government and military organizations. In the military, they are administered by the Defense Intelligence Agency.

ICD-10 is the 10th revision of the International Statistical Classification of Diseases and Related Health Problems (ICD), a medical classification list by the World Health Organization (WHO). It contains codes for diseases, signs and symptoms, abnormal findings, complaints, social circumstances, and external causes of injury or diseases. Work on ICD-10 began in 1983, became endorsed by the Forty-third World Health Assembly in 1990, and was first used by member states in 1994. It will be replaced by ICD-11 on January 1, 2022.

Signals intelligence by alliances nations and industries, many organizations, national or not, are responsible for communications security as well as SIGINT; the organization makes codes and ciphers that it hopes opponents cannot break. There is a synergy between the two components; there is a saying among cryptologists that no one is qualified to create a cipher unless they have successfully cryptanalyzed a cipher of equivalent complexity.

Signals intelligence operational platforms by nation

Signals intelligence operational platforms are employed by nations to collect signals intelligence, which is intelligence-gathering by interception of signals, whether between people or between machines, or mixtures of the two. As sensitive information is often encrypted, signals intelligence often involves the use of cryptanalysis. However, traffic analysis—the study of who is signalling whom and in what quantity—can often produce valuable information, even when the messages themselves cannot be decrypted.

National intelligence programs, and, by extension, the overall defenses of nations, are vulnerable to attack. It is the role of intelligence cycle security to protect the process embodied in the intelligence cycle, and that which it defends. A number of disciplines go into protecting the intelligence cycle. One of the challenges is there are a wide range of potential threats, so threat assessment, if complete, is a complex task. Governments try to protect three things:

The process of being read into a compartmented program generally entails being approved for access to particularly sensitive and restricted information about a classified program, receiving a briefing about the program, and formally acknowledging the briefing, usually by signing a non-disclosure agreement describing restrictions on the handling and use of information concerning the program. Officials with the required security clearance and a need to know may be read into a covert operation or clandestine operation they will be working on. For codeword–classified programs, an official would not be aware a program existed with that codeword until being read in, because the codewords themselves are classified.

A variety of networks operating in special security domains handle classified information in the United States or sensitive but unclassified information, while other specialized networks are reserved specifically for unclassified use by the same agencies. Some sites accessed from these networks have been referred to as "classified websites" in official communications, such as the American embassy "Amman's Classified Web Site at http://www.state.sgov.gov/pinea/amman/" and "Mexico City's Classified Web Site at http://www.state.sgov.gov/p/wha/mexicocity" Some of these trace back to the Defense Data Network which split from the Internet in 1983.

Bullrun (decryption program) code name of a decryption program run by the NSA

Bullrun is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA). The British Government Communications Headquarters (GCHQ) has a similar program codenamed Edgehill. According to the BULLRUN classification guide published by The Guardian, the program uses multiple methods including computer network exploitation, interdiction, industry relationships, collaboration with other intelligence community entities, and advanced mathematical techniques.

The Government Security Classifications Policy (GSCP) is a system for classifying sensitive government data in the United Kingdom.