INDUSTRIAL SECURITY MANUAL FOR SAFEGUARDING CLASSIFIED INFORMATION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01356R000200350006-4
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
393
Document Creation Date:
December 23, 2016
Document Release Date:
August 17, 2012
Sequence Number:
6
Case Number:
Publication Date:
September 1, 1987
Content Type:
REPORT
File:
Attachment | Size |
---|---|
CIA-RDP89B01356R000200350006-4.pdf | 22.68 MB |
Body:
-
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
a
a
a
es
a
a
a INDUSTRIAL
IN
a
a
SECURITY ?
a
a
I ?
?
MANUAL FOR
a
a
a
a
a
SAFEGUARDING
a
a
a CLASSIFIED
I
a
INFORMATION
?
?
a
a
IN
IN
a
ON
a
a
a
a
a
a
a
111111111111111111111111111111111
a
111.
a
a
a
a
a
?a
a
a
a
111111111111111111111111111111111111111111111111111111111111111111111111411111111111111111111111111111111111111111111111111111111MIIII15
DEPARTMENT OF DEFENSE
SEPTEMBER 1987
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitize
I Copy Approved for Release
TRANSMITTAL SLIP
2012/08/17: CIA-RDF
DATE.24 Odobee
TO: D.b ip5
ROOM NO.
BUILDING
REMARKS:
A.AM:Ck- DO b ISM.
L./
P44.. /Ltd-
FROM: a/poLicy
ROOM NO.
BUILDING
EXTENSION
FORM NO. REPLACES FORM 36-8
1 FEB 56 241 WHICH MAY BE USED.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
(47)
89B01356R000200350006-4
STAT
?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
INTELLIGENCE COMMUNITY STAFF
22 October 1987
C/Policy Br/ES/OS
Please note paragraph 75e from the
current DoD ISM 5220.22M which you have.
This statement contradicts DCID 1/14,
Annex B.
We called DoD and they say it is an
error and they will notify everyone by
their periodic bulletins.
SS/OD&E has been advised.
STAT
STAT
INFORMATION
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section IX. SENSITIVE COMPARTMENTED INFORMATION AND COMSEC INFORMATION
75. SENSITIVE COMPARTMENTED INFORMATION.
a. The provisions of this manual apply to research, development, and
production of SENSITIVE COMPARTMENTED INFORMATION. In addition, special
security requirements supplementing this manual will be prescribed by the
contracting department for SENSITIVE COMPARTMENTED INFORMATION contracts,
except that, for SENSITIVE COMPARTMENTED INFORMATION contracts awarded by
military department procurement activities for the NSA, the NSA will prescribe
the special security requirements.
b. In the case of SENSITIVE COMPARTMENTED INFORMATION contracts awarded
by military department procurement activities for the NSA, the NSA shall be
responsible for exercising security controls over the contract.
c. In the case of SENSITIVE COMPARTMENTED INFORMATION contracts awarded
by and for a military department or DoD Agency, an activity designated by the
contracting military department or DoD Agency shall be responsible for exercis-
ing security controls over the contract.
d. Access to SENSITIVE COMPARTMENTED INFORMATION will be granted to
contractor employees requiring access by the activity designated to exercise
security controls over the contract as provided above.
e. Denial or revocation of authorization for access to SENSITIVE
COMPARTMENTED INFORMATION is not appealable.
76. COMSEC Information. The contractor shall protect COMSEC information in
accordance with the requirements of the DoD 5220.22-S-1 (CSISM).
165
76.
?/F7
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
DEFENSE INVESTIGATIVE SERVICE
1900 HALF ST. S.W.
WA5H1NIGTON. D.C. 20324-1700
FOREWORD
This manual is issued under the directional authority of, and in
accordance with, Department of Defense Directive 5220.22, "Department of
Defense Industrial Security Program." It establishes uniform security
practices within industrial plants, educational institutions, and all
organizations and facilities used by prime contractors and subcontractors
having classified information of the Department of Defense, certain other
executive departments and agencies, or certain foreign governments. Users of
this publication are encouraged to submit suggestions for improving the
publication, through channels, to the Director, Defense Investigative Service.
DoD 5220.22.41, "Industrial Security Manual for Safeguarding Classified
Information," November 1, 1986, is hereby canceled and superseded.
This revision is required by the demands of national security as
determined by the U.S. Government. It is issued pursuant to and constitutes
notice prescribed by section 1A(i) of DD Form 441, "Department of Defense
Security Agreement," January 1984 and section IA of DIS Form 1149, "Department
of Defense Transportation Security Agreemen " September 1986.
or
0 RIENI
For sale by the Superintendent of Documents, US. Government Printing Office
Washington, DC 20402
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
SUMMARY OF CHANGES -
The following is a brief description of substantial changes to the Industrial
Security Manual since November 1986. These changes are marked by an asterisk
in the right-hand margin of the text.
Paragraph
3u.1, 3ag.1, 3ax.1,
and 3ck.1
Adds definition of
Compromising Emanations,
Designated Countries,
Information Processing
Equipment, and TEMPEST.
55 Establishes FSO training
requirement.
5b
51
Changes "Automatic Data
Processing" term to
"Automated Information
System."
Requires cleared employees to
be informed of their
responsibility to make certain
reports to the FSO.
5g Establishes the use of the SF
189-A in lieu of the DISCO
Form 482 in documenting
security briefings and
terminations. Requires
execution of the "Security
Debriefing Acknowledgement"
portion of the SF 189-A for
a leave of absence in excess
of 120 days vice 30 days.
5m
Provides that classified
material retention will
normally not be authorized
for more than 5 years.
Footnote 10 Deleted.
5ak Clarifies Hotline intent.
Sal Adds new paragraph which
discuss TEMPEST requirements.
iii
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H .1,1.I _ A. II I t I -
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220 .22-M
6a(9)
SUMMARY OF CHANGES
Deleted. Reports of refusal
to execute SF 189-A are to be
sent to DISCO in accordance
with new paragraph 6b(11).
6b(1) Changes paragraph 26c to 26b.
6b(2)
Requires submission of DISCO
Form 562 for absences in
excess of 120 days vice 30
days.
6b(11) Requires reports of refusal to
execute SF 189-A to be sub-
mitted to DISCO.
10a
10e
20b
20e
20h
20n
24a(1)(g)
Provides for contractor
involvement in preparation
and use of the DD 254.
Establishes contractor
requirement and authority
to challenge questionable
classification guidance.
Establishes clearance
eligibility requirements for
certain naturalized U.S.
citizens.
Deletes specifics regarding
cleared guards, and replaces
with statement, "and when
otherwise required by the
terms of this manual."
Changes leave of absence
period from 30 days to 120
days.
Establishes new requirement
for written clearance
verification and reconcilia-
tion by the contractor when
requested by DISCO.
Deletes possession prerequi-
site for issuance of Company
CONFIDENTIAL clearance.
Establishes nsw prnvision
relating to the Nuclear
Weapon PRP.
iv
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
24a(1)(h)
SUMMARY OF CHANGES
Requires DoD-granted clear-
ances for certain naturalized
U.S. citizens.
24a(3) Requires DoD-granted LAA's for
non-U.S. employees requiring
access to classified
information.
24b
24b(1)(b)
Deletes requirement for the
contractor to possess
classified information to be
eligible to issue clearances
at the CONFIDENTIAL level.
Prohibits contractor-granted
CONFIDENTIAL clearances for
naturalized U.S. citizens from
a Designated country.
24b(4) Adds reference to naturalized
citizen from Designated
countries, and deletes
reference to DIS Form 180.
26a(2) Eliminates privacy procedures
and establishes alternative
procedures for employees not
desiring to disclose certain
information.
26a(4) Deletes use of DISCO Form 703/
704 (Envelope), and requires
return of completed PSQ to
employer.
26a(5)
Deletes requirement to
complete FD 258 prior to
completion of PSQ's.
26a(6) Deletes reference to DIS Form
180, and use of preaddressed
envelopes.
26a(7)
26b(2)(c)
Consolidates and amends
provision of 26a(7) and (8).
Paragraph (c) text to
paragraph (d). Paragraph (d)
text to paragraph (e). New
text in paragraph (c) relates
to naturalized U.S. citizens
from Designated countries.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 - , 11,1 ' t
44.44 4
I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
SUMMARY OF CHANGES
26b(3)
26c
26d
20a, 24b(2), 26e(2)(b), 26e(3)(b),
26f(1), 26g, 26k, 30b
26j(2)(c)
34a(1)
34a(2)(b)
36
38a
Appendix I.B.
Appendix I.F.5
Appendix I.F.6
Appendix I.K.
Appendix I.N.
Appendix VI
Appendix XIII
vi
Modified to reflect elimina-
tion of privacy provisions.
Revises interim PCL approval
and eligibility requirements.
Establishes special clearance
transfers between collocated
facilities under certain
conditions.
Deletes reference to DIS Form
180.
Changes location of LOC "MAIL
TO" instructions from the Job
Title section of the PSQ to
the Remarks section.
Expands personnel control of
closed areas.
Provides exception to guard
requirement.
Supplanting Access Control
System Devices provision
totally rewritten.
Requires visitor identifica-
tion prior to any disclosure.
Adds new privacy section
instructions.
Adds LAA reference.
Adds naturalized U.S. citizen
from Designated country.
Deletes DIS Form 180 use and
actual form.
Replaces DISCO Form 482 with
SF 189-A.
Adds 18 6 641, 50 6 421, and
Executive Order 12356
Paragraph. references added to
questions for easy reference
to area under review.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
-GLOSSARY OF ACRONYMS ANDABBREVIATIONS COMONLY USED
IN THE DoD INDUSTRIAL SECURITY PROGRAM
ACDA U.S. Arms Control and Disarmament Agency
ACO Administrative Contracting Officer
ACSI Assistant Chief of Staff for Intelligence, Department of Army
AIS Automated Information System
AISE Automated Information System Equipment
APO Army Post Office
ASD(C) Assistant Secretary of Defense (Comptroller)
BI Background Investigation
BL Bill of Lading
(C) CONFIDENTIAL
CAB Civil Aeronautics Board
CAGE Commercial and Government Entity Number (formerly FSC)
CBL Commercial Bill(s) of Lading
CDSS Canadian Department of Supply and Services
CENTO Central Treaty Organization
CM Candidate Material
CNWDI Critical Nuclear Weapon Design Information
COMINT Communications Intelligence
COMSEC Communications Security
CONUS Continental United States
COR Central Office of Record
COSMIC--TOP Property of NATO and Subject to Special Security Controls
SECRET
CPU Central Processing Unit
CRT Cathode Ray Tube
CSISM COMSEC Supplement to the Industrial Security Manual
CSO Cognizant Security Office
CSS Constant Surveillance Service
CUSR Central United States Registry
CVA Central Verifications Activity
DAR Defense Acquisition Regulation (formerly ASPR)
DCAS Defense Contract Administration Services
DCASR Defense Contract Administration Services Region
DCII Defense Central Index of Investigations
DGSC Defense General Supply Center
DIA Defense Intelligence Agency
DIS Defense Investigative Service
DISCO Defense Industrial Security Clearance Office
DISCR, OGC, Director for Industrial Security Clearance Review, Office of
OSD the General Counsel, Office of Secretary of Defense
DISP Defense Industrial Security Program
DLA Defense Logistics Agency
DNACC Defense National Agency Check Center
DoD Department of Defense
DOE Department of Energy (formerly ERDA)
DOT Department of Transportation
vii
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
DSI Defense Security Institute (formerly the Defense Industrial
Security Institute (DISI))-
DSP&P Director for Security Plans & Programs, Office of the Deputy
Under Secretary of Defense (Policy)
DTIC Defense Technical Information Center
DUSD (P) Deputy Under Secretary of Defense for Policy
RAM Electronic Accounting Machines
EAR Export Administration Regulation
EEFI Essential Elements of Friendly Information
ENAC Expanded National Agency Check
E.O. Executive Order
EPA Environmental Protection Agency
FAA Federal Aviation Administration, Department of Transportation
(formerly Federal Aviation Agency)
FAR Federal Acquisition Regulation
FBI Federal Bureau of Investigation
FCL Facility (Security) Clearance
FEMA Federal Emergency Management Agency
FMS Foreign Military Sales
FOCI Foreign Ownership, Control, or Influence
(FRD) FORMERLY RESTRICTED DATA
FRS Federal Reserve System
FSC Federal Supply Code (see CAGE)
FSO Facility Security Officer/Supervisor
FSS Federal Supply Schedule
GAO General Accounting Office
GBL Government Bill(s) of Lading
GFE Government Furnished Equipment
GYP Government Furnished Property
GPO Government Printing Office
GSA General Services Administration
GSOIA General Security of Information Agreement
HHS Department of Health and Human Services
HOF Home Office Facility
HQ Headquarters
ICC Interstate Commerce Commission
IFB Invitation for Bid
IPO International Pact Organization
ISB Industrial Security Bulletin
ISCRO Industrial Security Clearance Review Office
ISL Industrial Security Letter
ISM Industrial Security Manual for Safeguarding Classified
Information (DoD 5220.22-)!)
ISR Industrial Security Regulation (DoD 5220.22-R)
ITAR International Traffic in Arms Regulation
\
KGB Committee on State Security (Soviet Union)
viii
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
LAA
LOC
MAAG
MAP
M70
MIL-STD
MTMC
N/A
VAC
NASA
NATO
NCSC
NIS
NPLO
NRC
NSA
NSF
OASD(PA)
OISI
OODEPs
OPM
OPSEC
OSI
PCL
PCO
PIC
PMF
PRP
PSCF
PSQ
PSS
(RD)
RFI
RFP
RFQ
(S)
SBA
SEATO
SEC
STOP
SPP
SSO
TO
TPS
(TS)
Limited Access Authorization
Letter of Consent, DISCO Form 560
Military Assistance Advisory Group
Mutual Aid Program
Mutual Defense Assistance Program
Multiple Facility Organization
Military Standard (Book Form)
Military Traffic Management Command (formerly MTMTS)
Not Applicable
National Agency Check
National Aeronautics and Space Administration
North Atlantic Treaty Organization
National Communications Security Committee
Naval Investigative Service
NATO Production Logistics Organization
Nuclear Regulatory Commission
National Security Agency
National Science Foundation
Office of the Assistant Secretary of Defense (Public Affairs)
Office of Industrial Security, International
Owners, Officers, Directors, Partners, Regents, Trustees, or
Executive Personnel
Office of Personnel Management OSD
Operations Security
Office of Secretary of Defense
Office of Special Investigations, USAF
Personnel
Procuring
Personnel
Principal
Personnel
Personnel
(Security) Clearance
Contracting Officer
Investigations Center
Management Facility
Reliability Program
Security Clearance Files (Industrial)
Personnel Security Questionnaire
Protective Security Service
RESTRICTED DATA
Representative of a Foreign Interest
Request for Proposal
Request for Quote
SECRET
Small Business Administration
Southeast Asia Treaty Organization
Securities and Exchange Commission
Single Integrated Operational Plan
Standard Practice Procedure (s)
System Security Officer
Transportation Officer
Transportation Protection Service
TOP SECRET
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II JLHuI I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
TSEC U.S. Telecommunications Security
TWX Teletype Communications
(U) UNCLASSIFIED
UA User Agency
U.K. United Kingdom
UL Underwriters' Laboratories
U.S. United States of America
USAFSS U.S. Air Force Security Service
U.S.0 United States Code
USIA United States Information Agency
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
TABLE OF CONTENTS
Paragraph Page,
Foreword
Summary of Changes iii
1
2
3
4
5
6
7
8
9
Glossary of Acronyms and Abbreviations Used in
the DoD Industrial Security Program
Section I. GENERAL
Scope
Applicable Federal Statutes, Executive Orders, and Regulations. . .
Definitions
Designation of Cognizant Security Office
General Requirements
Reports
Loss, Compromise, or Suspected Compromise of Classified
Information
Badges and Identification Cards
DoD Sponsorship of Meetings
1
2
3
16
17
33
40
42
43
Section II. HANDLING OF CLASSIFIED INFORMATION
10
Classification
49
11
Marking
52
12
Record of Classified Material
63
13
Special Requirements for TOP SECRET
66
14
Storage
68
15
Alternate Storage Locations
73
16
Safeguards During Use
73
17
Transmission
74
18
Reproduction
83
19
Destruction
84
Section III. SECURITY CLEARANCES
20
General
89
20.1
Emergency Higher Level Access
92
21
Facility Security Clearances
94
22
Personnel Clearances Required in Connection with Facility
Clearances
96
23
Security Clearance of Negotiators
100
24
Security Clearance of Additional Personnel
100
25
Preemployment Clearance Application -- Prohibited
103
26
Application for Personnel Security Clearance
103
27
Clearance of Present and Former Civilian and Military Personnel
of the DoD and Certain Other Government Agencies
109
xi
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-44
28 Contractor's Clearance Record 111
29 Administrative Termination of Personnel Security Clearances 111
30 Administrative Downgrading of TOP SECRET Personnel Security
Clearances 113
31 Access to Classified Information by Non-United States Citizens. . 113
31.1
Immigrant Aliens
114
31.2
Foreign Nationals
115
31.3
Access Limitations for Immigrant Aliens, Foreign Nationals, and
Firms Granted a Reciprocal Facility Security Clearance
115
Section IV. CONTROL OF AREAS
32
Purpose
117
33
General
117
34
Area Controls
118
35
Supplemental or Supplanting Alarm Systems
120
36
Supplanting and Supplemental Electronic, Mechanical, and
Electro-Mechanical Access Control Devices
123
Section V. VISITOR CONTROL PROCEDURES
Part 1. Visits to User Agency Contractors
37
General
127
38
Identification and Control of Visitors
129
39
Visitor Records
130
40
Long-Term Visitors
130
41
Visitor Categories and Procedures
131
42
Visits Involving Access to RESTRICTED DATA
135
-Part 2. Visits to User Agency Activities
43
General Rules -- In Addition to Paragraph 37
136
44
Visits to User Agency Activities in the United States
136
45
Visits to User Agency Activities Outside the United States
137
Part 3. Visits to Government Activities Other Than User Agencies
46
Visits to DOE Installations or DOE Contractors
138
47
Visits to Activities Other Than DOE
138
Part 4. Visits to Foreign Governments and Activities
48
General
138
49
Processing Time
140
50
Use of OISI
140
Part 5. Visits in Connection With Bilateral Industrial
Security Agreements and NATO Visits Procedures
51
Visits in Connection with Bilateral Industrial Security Agreements.
140
52
NATO Visit Procedures
141
4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
53 , NFL? Programs-Clearance and Visit Procedures 142
54 Records of NATO Visits 143
55 Certificate of Security Clearance 143
Section VI. SUBCONTRACTORS, VENDORS, AND SUPPLIERS
56 Application to Subcontractors 145
57 Application to Sub-Subcontractors 145
58 Determination of Clearance Status 145
59 Safeguarding Ability 146
60 Classification Guidance 147
61 Required Distribution 150
62 Notification of Selection 151
63 Unsatisfactory Security Conditions 151
64 Disposition of Classified Information 151
65 Subcontracting With Foreign Industry 152
66 Subcontracts Arising From Foreign Classified Contracts 153
Section VII. CONSULTANTS
67 General 155
68 Consultant -- Type A . 155
69 Consultant -- Type B 156
70 Consultant -- Type C 156
71 Consultants to User Agencies Employed Under Civil Service
Procedures 157
Section VIII. PARENT-SUBSIDIARY AND MULTIPLE FACILITY ORGANIZATIONS
72 Parent-Subsidiary Relationship 159
73 Multiple Facility Organizations 160
74 Temporary Help Suppliers 162
Section IX. SENSITIVE COMPARTMENTED INFORMATION AND COMSEC INFORMATION
75 SENSITIVE COMPARTMENTED INFORMATION 165
76 COMSEC Information 165
Section X. GRAPHIC ARTS
77 Special Requirements for Graphic Arts 167
78 Production Control Records 167
79 Area Controls -- Additional Requirements 167
80 Special Conditions 168
81 Destruction -- Special Requirements 169
82 Mailing Lists 170
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section XI. NATO INFORMATION
83 Application 171
84 Authority 171
85 Supervision and Orientation Requirements 171,
86 Security Clearances 172
87 Reproduction, Preparation, and Marking 172
88 Transmission of NATO Material 173
89 Functions of the Contracting Officer 175
90 NATO Reporting Requirements 175
91 Subcontracting 176
Section XII. OVERSEAS OPERATIONS
Part 1. Access to U.S. Classified Information
92 General 177
93 Access to Classified Information 177
94 Safeguarding U.S. Classified Information 178
95 Overseas Assistance 179
96 Notification of Overseas Assignment 180
97 Security Briefings and Certificates 181
Part 2. Access to Classified Information of Foreign Governments and
International Pact Organizations Under a Security Assurance
98 General 182
99 Security Assurance 183
Section XIII. SECURITY REQUIREMENTS FOR AUTOMATED INFORMATION SYSTEMS
Part 1. General
100 Reserved 185
101 Applicability 185
102 Objectives 185
Part 2
103 General 186
104 AIS Security Modes of Operation 187
104.1 Concurrent Processing of Multiple Classification Levels 190
105 Personnel Security 190
106 Physical Security 192
107 Reserved 194
108 Reserved 194
108.1 Protection of Software and Data 194
109 Transmission Controls 196
110 Subcontracting Controls 196
111 Audit Trails 197
xiv
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Part 3. Procedures
112
AIS Security Approval
198
113
AIS Security Level Upgrading
201
114
AIS Security Level Downgrading
202
115
Media and Equipment Clearance .... . . ?
202
116
Media and Equipment Declassification
203
Section XIV. CRITICAL NUCLEAR WEAPON DESIGN INFORMATION
117
Policy
207
118
Access Requirement
207
119
Briefings
207
120
Records
207
121
Marking
207
122
Subcontracting and Consultants
208
123
Transmission Outside the Facility
208
Section XV. OPERATIONS SECURITY (OPSEC)
124
Purpose
209
125
General
209
126
Applicability
209
127
Procedures for Self-Inspecting OPSEC Programs
210
Appendix I. INDUSTRIAL SECURITY FORMS
A.
Application
211
B.
Special Privacy Section Instructions
211
C.
"Department of Defense Personnel Security Questionnaire
(Industrial-NAC)" (DD Form 48)
211
D.
"Application and Authorization for Access to Confidential
Information (Industrial)" (DD Form 48-2)
215
E.
"Department of Defense Personnel Security Questionnaire
(Updating)" (DD Form 48-3)
218
F.
"Department of Defense Personnel Security Questionnaire
(Industrial)" (DD Form 49)
221
G.
"Department of Defense Contract Security Classification
Specification" (DD Form 254)
227
H.
"Applicant Fingerprint Card" (FD Form 258)
236
I.
"Request for Visit or Access Approval" (DOE F 5631.20)
239
J.
"Letter of Notification of Facility Security Clearance"
(DIS FL 381-R)
240
K.
Reserved
241
L.
"Department of Defense Security Agreement" (DD Form 441) and
"Appendage" (DD Form 441-1)
242
M.
"Certificate Pertaining to Foreign Interests" (DD Form 441s)
246
N.
"Classified Information Nondisclosure Agreement, (Industrial/
Commercial/Non-Government), Standard Form (SF) 189-A
250
O.
"Letter of Consent" (DISCO Form 560)
252
P.
Reserved
253
! Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Q ?
"Personnel Security Clearance Change Notification"
(DISCO Form 562) 253
R. Reserved 257
S. Reserved 257
T. "Department of Defense Transportation Security Agreement"
(DIS Form 1149) 257
U. "Facility Clearance Register" (DD Form 1541) and "Registration
for Scientific and Technical Information Services"
(DD Form 1540) 260
V. Letter Agreement to Safeguard Classified Information for an
Employee Performing Consultant Services 264
Appendix II. DERIVATIVE CLASSIFICATION INFORMATION AND PROCEDURES
A. Scope and Application 267
B. Downgrading/Declassification and "Classified by" Line
Procedures 270
C. Applying Derivative Markings to New Material 271
D. Most Restrictive Marking Determination 271
E. Downgrading/Declassification Actions for Pre-August 1, 1982
Material 272
F. Extracts of Information 272
G. Changing Classification Markings 272
H. Release of Declassified Information 272
Appendix III. FOREIGN CLASSIFIED CONTRACTS
Table Outlining Responsibilities for Security Actions 273
Appendix IV. REQUIREMENTS FOR THE CONSTRUCTION OF STORAGE
VAULTS AND STRONGROOMS
A. Application 275
B. Class A Vault 275
C. Class B Vault 276
D. Class C Vault 276
E. Structural Design 277
F. Strongrooms 277
G. Approval 278
Appendix V. REQUIREMENTS FOR THE CONSTRUCTION OF CLOSED AREAS
A. Application 279
B. Requirements 279
xvi
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1.1 DoD 5220.22-M
Appendix VI. . EXTRACTS .OF THE ESPIONAGE.. ANDSABDTAGE ACTS, OTHER
FEDERAL CRIMINAL STATUTES, AND EXECUTIVE ORDER 12356 281
Appendix VII. GUIDANCE FOR PREPARATION OF SECURITY BRIEFINGS
A. Defense Security Briefings 289
B. Counterintelligence Awareness Briefings 291
APPENDIX VIII. INFORMATION REGARDING COGNIZANT SECURITY OFFICES,
DISCO, DSI, AND OISI 297
Appendix IX. USE OF ESCORTS FOR CLASSIFIED SHIPMENTS
(also applies to carrier custodians)
A. General 305
B. Instructions and Operating Procedures 305
C. Functions of an Escort 305
Appendix X. REQUIREMENTS APPLICABLE TO THE HAND-CARRYING OF
CLASSIFIED MATERIAL ABOARD COMMERCIAL PASSENGER AIRCRAFT
A. General 307
B. Background 307
C. Routine Processing 307
D. Approval 307
E. Authorization Letter and Identification Card 308
F. Preparation for Transmission 309
G. Special Processing 309
H. Incident Situations 310
I. Briefing 311
Appendix XI. RESERVED 313
Appendix XII. DOCUMENTS ACCEPTABLE FOR PROOF OF U.S.
CITIZENSHIP 315
Appendix XIII. GUIDANCE FOR CONTRACTOR SELF-INSPECTIONS
A. Facility Clearance 317
B. Access Authorizations 317
C. Security Education 318
D. Standard Practice Procedures 319
E. Subcontracting 319
F. Visit Control 319
G. Classification 320
H. Employee Identification 320
I. Foreign Travel 321
xvii
I Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I.1 11 I. LL
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
J. Public Release 321
K. Classified Storage 321
L. Markings 322
M. Transmissions 323
N. Classified Material Controls 324
0. Controlled Areas . 324
P. Disposition 325
Q. Reproduction 326
R. Classified Meeting 327
S. Consultants 327
T. AIS 327
U. COMSEC/CRYPTO 328
V. International Operations 329
Appendix XIV. EQUIVALENT FOREIGN AND INTERNATIONAL PACT
ORGANIZATION SECURITY CLASSIFICATIONS 333
Appendix XV. AREAS COVERED BY MTMC AND HOTLINE NUMBERS TO BE
USED FOR EMERGENCIES 339
Appendix XVI. INDEX 341
xviii
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section I. GENERAL
1. Scope.
a. This manual establishes the requirements for safeguarding all
classified information to which contractors and their subcontractors,
vendors, or suppliers have access or possession (see paragraph 3aa). The
manual is written in terms of the most common situation where the contractor
has access to, or possession of, classified information in connection with
the performance of a classified contract. However, it also is applicable
to the safeguarding of classified information in connection with all aspects
of precontract activity including preparation of bids and proposals, precon-
tract negotiations, and all aspects of postcontract activity. Moreover, the
requirements are equally applicable to the safeguarding of classified
information not released or disclosed under a procurement contract, such as
government-sponsored independent research and development advance agreements
or User Agency (UA) programs participated in by a firm, organization, or
individual on a voluntary or grant basis. Examples of the latter programs
are the long-range scientific and technical planning programs and programs
designed to provide planning briefings for industry. In such situations
the official of the UA (or his or her designated representative) who
releases or discloses the classified information to the contractor shall
fulfill the responsibilities which this manual assigns to the contracting
officer (such as furnishing necessary classification guidance, authorizing
retention of classified material, and certifying contractors' need to
attend classified meetings). In addition, as a general rule, terms such
as "cleared employees," "authorized personnel," and "employees in-process
for clearance," used herein, encompass all contractor employees granted a
personnel security clearance or limited access authorization and those
employees under consideration for access to classified information by the
DoD.
b. The requirements of this manual reflect the provisions of applicable
federal statutes, E.O.'s, and DoD directives.
c. The Secretary of Defense Is authorized to act in behalf of the
departments and agencies listed below in rendering industrial security
services. This authority is contained in an exchange of letters between the
Secretary of Defense and: (i) the Administrator, National Aeronautics and
Space Administration; (ii) the Secretary of Commerce; (iii) the Administrator,
General Services Administration (GSA); (iv) the Secretary of State; (v) the
Administrator, Small Business Administration; (vi) the Director, National
Science Foundation (NSF); (vii) the Secretary of the Treasury; (viii) the
Secretary of Transportation; (ix) the Secretary of the Interior; (x) the
Secretary of Agriculture; (xi) the Director, United States Information
Agency (USIA); (xii) the Secretary of Labor; (xiii) the Administrator,
Environmental Protection Agency (EPA); (xiv) the Attorney General, Department
of Justice; (xv) the Director, U.S. Arms Control and Disarmament Agency; (xvi)
the Director, Federal Emergency Management Agency (FEMA); (xvii) the Chairman,
Board of Governors, Federal Reserve System (FRS); and (xviii) the Comptroller
General of the United States, General Accounting Office (GAO).
1 1.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
d. The Deputy Under Secretary of Defense for Policy (DUSD(P)), his or
her designee, or higher authority provides overall policy guidance for the
DoD Industrial Security Program. The Director, DIS is responsible for the
administration of the DoD Industrial Security Program on behalf of all UA's.
Except for certain functions performed by the Commander or Head of a UA
installation, with respect to those facilities or contractor activities
located on the installation, the Directors of Industrial Security shall
perform cognizant security office (CSO) functions prescribed in this manual,
with respect to all contractor facilities within their respective regions
(see appendix VIII for geographical areas of responsibility).
e. UA's have the authority of, and exercise the functions of, a con-
tracting officer as prescribed in this manual and the ISR. Certain of these
functions, under delegation, are performed by the ACO.
f. This manual also shall apply to the safeguarding of foreign classi-
fied information, which has been furnished to U.S. contractors and which the
U.S. Government is obligated to protect in the interest of national defense.
When foreign classified information is made available to a contractor by a
UA in connection with a U.S. classified contract, procedures applicable to
U.S. classified information shall apply. However, when foreign classified
information is made available to U.S. contractors in connection with a foieign
classified contract, the responsibility for the actions, which this manual
charges to the contracting officer and the contracting UA, shall be as pre-
scribed in appendix III. Responsibilities not specifically assigned in
appendix III are reserved to the foreign government agency or foreign
contracting activity concerned.
g. Revisions to this manual that have been approved by the DUSD(P) will
be published in page change form and will be effective the date of the change.
h. Although not a component of the Defense Industrial Security Program
(DISP), the DoD Operations Security Program (OPSEC) is discussed in Section XV
of this manual in order to provide contractors participating in the DISP with
advice and guidance concerning OPSEC in the event they become involved with
this program via UA imposed OPSEC contractual requirements. The DoD OPSEC
program is applicable only to defense contractors participating in the DISP
when the contractor User Agency determines that OPSEC measures are essential
to protect classified information for specific classified contracts.
2. Applicable Federal Statutes, Executive Orders, and Regulations.
a. Espionage Acts, 18 U.S.C. 55 793-799
b. Sabotage Acts, 18 U.S.C. 55 2151-2157
c. Conspiracy Statute 18 U.S.C. 55 371
d. Internal Security Act (1950) (in part), 50 U.S.C. 55 781-798
e. National Security Act of 1947, as amended
f. Armed Services Procurement Act of 1947, as amended
7
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
g. Atomic-Energy Act (1954), Public law 703, 83rd Congress, as amended
h. E.O. 10104, February 1, 1950
i. E.O. 12356, April 2, 1982
j. National Aeronautics and Space Act of 1958, as amended
k. E.O. 10865, February 20, 1960
1. Federal Aviation Act of 1958, as amended
m. E.O. 10909, January 17, 1961
n. International Traffic in Arms Regulation (ITAR), Code of Federal
Regulations, Title 22, Chapter 1, Parts 121-127
o. Export Control Act of 1949, as amended
p. Mutual Security Act of 1954, as amended
q. Information Security Oversight Office (IS00) Directive No. 1,
June 23, 1982, concerning national security information
3. Definitions. The following definitions are established for the purpose
of this manual.
a. Access, Accessibility. This refers to the ability and opportunity
to obtain knowledge of classified information. An individual, in fact, may
have access to classified information by being in a place where such
information is kept, if the security measures which are in force do not
prevent him or her from gaining knowledge of the classified information 1/.
b. Automated Information System (AIS). An assembly of computer
hardware, software and firmware configured for the purpose of automating
the functions of calculating, computing, sequencing, storing, retrieving,
displaying, communicating, or otherwise manipulating data, information and
textual material (see definition of Computer Hardware).
c. AIS Security. The totality of security safeguards needed to
provide an acceptable level of protection for an AIS and the classified
data processed. Includes all hardware/software functions, characteristics
and mechanisms; operational, accountability and access control procedures
at the computer and remote terminal facilities; and management constraints,
physical structures and devices needed to provide an aeceptable level of
1/ The entry into a controlled area, per se, will not constitute access to
classified information, if the security measures which are in force prevent
the gaining of knowledge of the classified information. Therefore, the
entry into a controlled area under conditions that prevent the gaining of
knowledge of classified information will not necessitate a personnel secu-
rity clearance (PCL).
3 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L . . I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
protection for classified information in any state of storage, processing,
display or communication within the AIS.
d. Alien. An alien is any person who is not a citizen or national of
the U.S. (see "ImmigrantAlien," paragraph 3av).
d.l. Application Software. Computer programs developed for specific
functional uses and to solve particular problems, for example, navigation,
fire control and flight simulation. Contrast with System Software.
e. Authorized Persons. Authorized persons are those persons who have
a need-to-know for the classified information involved and have been cleared
for the receipt of such information (see paragraph 3bg). Responsibility for
determining whether individuals' duties require that they possess, or have
access to, any classified information and whether they are authorized to
receive it rests on the individual who has possession, knowledge, or control
of the information involved, and not on the prospective recipients.
f. Candidate Material. This is material that is referred to
collectively as special nuclear materials and nuclear weapons.
f.l. Carve-Out. A classified contract issued in connection with an
approved Special Access Program in which the DIS has been relieved of
inspection responsibility in whole or in part.
g. Reserved.
h. Classification Authority. This refers to the authority that is
vested in an official of a UA to make an initial determination that
information requires protection against unauthorized disclosure in the
interest of national security.
i. Classified Contract. A classified contract is any contract that
requires or will require access to classified information by the contractor or
his or her employees in the performance of the contract. (A contract may be a
classified contract even though the contract document is not classified.)
j. Classification Guide. This is a document issued by an authorized
original classifier that prescribes the level of classification and appropri-
ate declassification instructions for specified information to be classified
on a derivative basis. (Classification guides are provided to contractors by
the DD Form 254, "Department of Defense Contract Security Classification
Specification.")
k. Classified Information. This is information or material that is:
(i) owned by, produced by or for, or under the control of the U.S. Government;
(ii) determined under E.O. 12356 or prior orders to require protection against
unauthorized disclosure; and (iii) so designated.
1. Classifier. A classifier is an individual who makes a classifi-
cation determination and applies a security classification to information or
material. A classifier may be a classification authority or may derivatively
4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
assign a sevurity LlassifIcation based on a Troperly classified source or a
classification guide. Within this context, contractors may apply security
classification markings based on classified source material or a DD Form 254,
as required by this manual.
m. Closed Area. -A closed area is a controlled area that is established
to safeguard classified material, which, because of its size or nature, cannot
be adequately protected by the safeguards prescribed in paragraph 16 or stored
during nonworking hours in accordance with paragraph 14 (see section IV).
n. Closed Vehicle. A closed vehicle is a conveyance which is fully
enclosed by sides, permanent top, and door.
o. Critical Nuclear Weapons Design Information (CNWDI). CNWDI is TOP
SECRET RESTRICTED DATA or SECRET RESTRICTED DATA revealing the theory of
operation or design of the components of a thermonuclear or implosion-type
fission bomb, warhead, demolition munition, or test device. Specifically
excluded is information concerning arming, fusing, and firing systems; limited
life components; and totally contained quantities of fissionable, and high-
explosive materials by type. Among these excluded items are the components
which DoD personnel, including contractor personnel, set, maintain, operate,
test, or replace.
p. Cognizant Security Office (CSC). The term refers to the office of
the DIS Director of Industrial Security who has industrial security jurisdic-
tion over the geographical area in which a facility is located.
q. Colleges and Universities. This refers to all educational
institutions that award academic degrees, and related research activities
directly associated with a college or university through organization or by
articles of incorporation.
r. Communications Intelligence (COMINT). This is technical and
intelligence information derived from foreign communications by other than
the intended recipient.
s. Communications Security (COMSEC). COMSEC refers to protective
measures taken to deny unauthorized persons information derived from tele-
communications of the U.S. Government relating to national security and
to ensure the authenticity of such communications. COMSEC protection
results from the application of security measures to electrical systems
which generate, handle, process, or use national security information and
also includes the application of physical security measures to COMSEC
information or materials.
t. Complex. A complex is a facility, or any element thereof, which
consists of one or more buildings or structures physically enclosed within a
common perimeter barrier that is supplemented by protective measures to .
inhibit unauthorized access and control authorized access.
u. Compromise. A compromise is the disclosure of classified
information to persons not authorized access thereto.
5 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
i 1.I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
u.1 Compromising Emanations. This refers to unintentional ?
intelligence-bearing signals which, if intercepted and analyzed, disclose
national security information (classified information) transmitted,
received, handled or otherwise processed by any information-processing
equipment (see "TEMPEST").
u.2 Computer Facility. One or more AIS's located within a single
area.
u.3 Computer Hardware. Any physical equipment or device used in
the configuration and operation of an AIS. Includes general and special
purpose digital, analog and hybrid computers which perform logical, arith-
metic or storage functions; and all components directly related to or
operating in conjunction with such computers which are used to create,
compose, collect, store, edit, process, communicate, display or
disseminate information.
v. CONFIDENTIAL. "CONFIDENTIAL" is the designation that shall be
applied to information or material the unauthorized disclosure of which
could be reasonably expected to cause damage to the national security.
Examples of "damage" include the compromise of information that indicates
strength of ground, air, and naval forces in the U.S. and overseas areas;
disclosure of technical information used for training, maintenance, and
inspection of classified munitions of war; and revelation of performance
characteristics, test data, design, and production data on munitions of war.
w. Consignee. The consignee is a person, firm, or government activity
named as the receiver of a shipment; one to whom a shipment is consigned.
x. Consignor. The consignor is a person, firm, or government activity
by whom articles are shipped. The consignor is usually the shipper.
x.1 Constant Surveillance Service (CSS). A transportation protective
service provided by a commercial carrier qualified by MTMC to transport
CONFIDENTIAL shipments. The service requires constant surveillance of the
shipment at all times by a qualified carrier representative, however, an FCL
for the carrier is not required. In addition, the carrier providing the
service must maintain a signature and tally record for the shipment (see
paragraph 3cg).
y. Continental Limits of the United States (CONUS). This refers to
U.S. territory, including the adjacent territorial waters located within the
North American continent between Canada and Mexico.
z. Contracting Officer. A contracting officer is any government
official who, in accordance with departmental or agency procedures, is
currently designated as a contracting officer with the authoriry to enter into
and administer contracts, and make determinations and findings with respect
thereto, or any part of such authority. The term also includes the designated
representative of the contracting officer acting within the limits of his or
her authority. For purposes of this manual, the term contracting officer
refers to the contracting officer at the purchasing office who is identified
as the PCO and the contracting officer at a contract administration office who
is identified as the ACO. Normally, the responsibilities which this manual
3. 6
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
assigns to the contracting offIxer during the precontract, contract award, and.
postcontract stages of a classified procurement will be performed by the PCO,
with the ACO performing those responsibilities which arise during the perform-
ance stages of a classified contract.
aa. Contractor. A contractor is any industrial, educational, commer-
cial, or other entity that has executed a DD Form 441, "Department of Defense
Security Agreement," with a DoD agency for the purpose of performing on a
classified contract or other classified procurement. The term contractor also
refers to an individual who manages such an entity.
ab. CRYPTO. "CRYPTO" is a marking or a designator identifying all
COMSEC keying material that is used to protect or authenticate telecommuni-
cations carrying national security-related information. (This CRYPTO mark-
ing also identifies COMSEC equipment and/or computer software containing
operational keying variables.)
ac. Custodian. A custodian is an individual who has possession of, or
is otherwise charged with, the responsibility for safeguarding or accounting
for classified information.
ad. Declassification. This is the determination that classified infor-
mation no longer requires, in the interests of national security, any degree
of protection against unauthorized disclosure, together with a removal or can-
cellation of the classification designation.
ae. Declassification Event. This is an event that eliminates the need
for continued classification of information.
af. Department of Defense. DoD refers to Office of the Secretary of
Defense (OSD) (including all boards, councils, staffs, and commands), DoD
agencies, and the Departments of the Army, Navy, and Air Force (including all
of their activities).
ag. Derivative Classification. This is a determination that infor-
mation is in substance the same as information currently classified and
application of the same classification markings.
ag.1 Designated Countries. Those countries whose policies are
inimical to U.S. interest: Afghanistan, Albania, Angola, Bulgaria, Cuba,
Czechoslovakia, Ethiopia, German Democratic Republic (GDR) (East Germany
including the Soviet Sector of Berlin), Hungary, Iran, Iraq, Kampuchea
(formerly Cambodia), Laos, Libya, Mongolian People's Republic (Outer
Mongolia), Nicaragua, North Korea, People's Republic of China (including
Tibet), Poland, Rumania, South Yemen, Syria, Union of Soviet Socialist
Republics (USSR) (includes Estonia, Latvia, Lithuania, and all other
constituent republics, Kurile Islands and South Sakhalin (Karafuto)),
Vietnam, and Yugoslavia.
ah. Document. A document is any recorded information, regardless of
its physical form or characteristics, including, without limitation, written
or printed matter, data processing cards and tapes, maps, charts, paintings,
drawings, engravings, sketches, working notes, and papers; reproductiOns of
such things by any means or process; and sound, voice, magnetic, or electronic
recordings in any form.
7 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
ai. Downgrade. This is a determination that classified information
requires, in the interests of national security, a lower degree of protection
against unauthorized disclosure than currently provided, together with a
changing of the classification designation to reflect such a lower degree of
protection.
ai.1 Essential Elements of Friendly Information. Key questions, or
critical information secrets about United States intentions, military
capabilities, plans or programs needed by an adversary to relate with
other available information and intelligence in order to assist that
adversary in reaching a logical decision. DoD military components refer
to the Essential Elements of Friendly Information as EEFI. These EEFI may
be disclosed through OPSEC indicators.
aj. Executive Personnel. Executive personnel are those individuals
in managerial positions, other than owners, officers, or directors, who
administer the operations of the facility. (This category includes such
designations as general manager, plant manager, plant superintendent, or
similar designations, and facility security supervisor (FSO).)
ak. Facility. A facility is a plant, laboratory, office, college, uni-
versity, or commercial structure with associated warehouses, storage areas,
utilities, and components, which, when related by function and location, form
an operating entity. (A business or educational organization may consist of
one or more facilities as defined above.) For purposes of industrial secu-
rity, the term does not include UA installations.
al. Facility (Security) Clearance (FCL). This is an administrative
determination that, from a security viewpoint, a facility is eligible for
access to classified information of a certain category (and all lower
categories).
am. Firmware. A method of organizing control of an AIS in a micro-
programmed structure in addition to, or rather than, software or hardware.
Microprograms are composed of microinstructions, normally resident in
read-only memory (ROM), to directly control the sequencing of computer
circuits at the detailed level of the single machine instruction.
an. Foreign Government Information. This is information that is: (i)
provided to the U.S. by a foreign government or governments, an international
organization of governments, or any element thereof with the expectation,
expressed or implied, that the information, the source of the information, or
both, are to be held in confidence; or (ii) produced by the U.S. pursuant to,
or as a result of, a joint arrangement with a foreign government or
governments, an international organization of governments, or any element
thereof, requiring that the information, the arrangement, or both are to be
held in confidence.
ao. Foreign Interest. The term refers to any foreign government or
agency of a foreign government; any form of business enterprise organized
under the laws of any country other than the U.S. or its possessions; and any
form of business enterprise organized or incorporated under the laws of the
U.S., a state, or other jurisdiction of he U.S'. that is Owned or controlled
by a foreign government, firm, corporation, or person. Included in this
3. 8
Declassified in Part -Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
definition is any natural person who is not a citizen or national of the U.S.
(An immigrant alien as defined in paragraph 3av is excluded from the
definition of a foreign interest.)
ap. Foreign Nationals. This refers to all persons not citizens of, not
nationals of, nor immigrant aliens to, the U.S.
aq. FORMERLY RESTRICTED DATA (FRD). This is information removed from
the RESTRICTED DATA category upon a joint determination by the DOE (or .
antecedent agencies) and the DoD that such information relates primarily to
the military utilization of atomic weapons, and that such information can be
adequately safeguarded as classified defense information. For purposes of
foreign dissemination, however, such information is treated in the same manner
as RESTRICTED DATA.
ar. Graphic Arts. This refers to facilities and individuals engaged
in performing consultation, service, or the production of any component or end
product which contributes to, or results in, the reproduction of classified
information. Regardless of trade names of specialized processes, it includes
writing, illustrating, advertising services, copy preparation, all methods of
printing, finishing services, duplicating, photocopying, and film processing
activities.
as. Hardened Container. A hardened container is a container of such
strength and durability as to provide security protection to prevent items
from breaking out of the container and to facilitate the detection of any
tampering with the container while in transit. Some examples of hardened
containers are banded or wired boxes, wooden boxes, and closed cargo
transporters.
at. Reserved.
au. Home Office Facility (HOF). The HOF is the headquarters facility
of a multiple facility organization (see paragraph be below).
ay. Immigrant Alien. An immigrant alien is any person who is lawfully
admitted into the U.S. under an immigration visa for permanent residence (see
paragraph 24 for special prerequisites for clearance of immigrant aliens).
aw. Industrial Security. This refers to that portion of internal
security which is concerned with the protection of classified information
in the hands of U.S. industry.
ax. Information. Information is knowledge that can be communicated by
any Means.
ax.1 Information Processing Equipment. Any equipment or device which
electro-mechanically or electronically processes, reproduces, converts, or
otherwise manipulates any form of information. The following equipment
is typical: electric typewriters, reproduction copiers, word processors,
composing and editing equipment, video displays, automated data processors,
telecommunications equipment and systems. including teletype, facsimile and
cryptographic equipment, and all interfaces, power sources, and inter-
connecting paths which are part of the system or equipment.
9 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L. _1iiI I
4.4.? 4.4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
ay. Information Security. This refers to the result of any system of
administrative policies and procedures for identifying, controlling, and
protecting from unauthorized disclosure, information the protection of which
is authorized by E.O. or statute.
az. Intelligence. Intelligence is the product resulting from the
collection, evaluation, analysis, integration, and interpretation of all
available information, which concerns one or more aspects of foreign nations
or of areas of foreign operations, and which is immediately or potentially
significant to military planning and operations.
az.1 Letter of Consent (LOC) (DISCO Form 560). The form used by
DISCO to notify a contractor that a personnel security clearance or a
Limited Access Authorization (LAA) has been granted to an employee.
az.2 Limited Access Authorized (LAA). Security access authoriza-
tion to CONFIDENTIAL or SECRET information granted to non-U.S. citizens
requiring such limited access in the course of their regular duties.
ba. Locked Entrance. A locked entrance is an entrance to a closed or
restricted area which is kept closed and locked at all times except when tem-
porarily unlocked and opened under supervision for the purpose of passing
material or authorized personnel into or out of the area.
bb. Material. Material refers to any product or substance on, or in
which, information is embodied.
bc. Multiple Facility Organization (ff0). A legal entity (single
proprietorship, partnership, association, trust, or corporation) that is
composed of two or more cleared facilities.
bd. National of the United States. A national of the U.S. is:
(1) a citizen of the U.S., or
(2) a person who, though not a citizen of the U.S., owes permanent
allegiance to the U.S. 2/.
be. National Security. This refers to the national defense and foreign
relations of the U.S.
bf. NATO Classified Information. The term "NATO classified informa-
tion" embraces all classified information -- military, political, and
economic -- that is circulated within and by NATO, whether such information
originates in the organization itself or is received from member nations or
from other international organizations.
2/ See 8 U.S.C. ? 1101(a)(22). 8 U.S.C. 5 1401, subsection (a) lists in
paragraphs (1) through (7) categories of persons born in and outside the
U.S. or its possessions who may qualify as nationals of the U.S. When
doubt exists as to whether or not a person can qualify as a naLiuual-oL-the
U.S., this subsection should be consulted.
3 10
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LAJV J4GV4ILLO.
bg. Need-to-Know. This is a determination made ,by the possessor of
classified information that a prospective recipient, in the interest of
national security, has a requirement for access to (see paragraph a above),
knowledge of, or possession of the classified information in order to perform
tasks or services essential to the fulfillment of a classified contract or
program approved by a UA.
bh. Negotiator. A negotiator is any employee, in addition to the .
OODEPs, who requires access to classified information during the negotiation
of a contract or the preparation of a bid or quotation pertaining to a prime
or subcontract. (This category may include, but is not limited to, account-
ants, stenographers, clerks, engineers, draftsmen, and production personnel.)
bi. Nuclear Weapon Security Program. A limited number of defense
contractors are involved in the DoD nuclear weapon security program. This
program identifies certain positions categorized as Critical or Controlled,
depending upon the degree of involvement with nuclear weapons. Assignment
to such positions is governed by the DoD Nuclear Weapon Personnel Reliability
Program (PRP), the specific procedures of which will be set forth separately
in appropriate contractual agreements. Al]. personnel in Critical or Con-
trolled positions must have a security clearance commensurate with the
security classification of information required by their duties. -
bj. Officers (Corporation, Association, or Other Types of Business or
Educational Institution). Officers are those persons in positions established
as officers in the articles of incorporation or bylaws of the organization.
This definition includes all principal officers; that is, those persons
occupying positions normally identified as president, senior vice president,
secretary, treasurer, and those persons occupying similar positions. In
unusual cases, the determination of principal officer status may require a
careful analysis of an individual's assigned duties, responsibilities, and
authority as officially recorded by the organization. Excluded from this
definition are: (i) assistant vice presidents who have no management
responsibilities related to performance on classified contracts, (ii)
assistant secretaries, and (iii)' assistant treasurers.
bk. Reserved.
bk.1 Operations Security (OPSEC). The process of denying adver-
saries information about friendly capabilities and intentions by
identifying, controlling, and protecting indicators associated with
planning and conducting military operations and other activities.
Section XV of this manual contains a detailed discussion of OPSEC and
its relationship to industrial security.
bk.2 OPSEC Indicators. Actions or information (classified or
unclassified), obtainable by an adversary, that would allow the adversary
to develop or confirm assumptions, estimates and facts about United States
intentions, military capabilities, plans, or programs, thereby compromising
essential secrecy.
bl. Original Classification. This is an initial determination that
information requires, in the interest of national security, protection against
unauthorized disclosure, together with a classification designation signifying
the level of protection required.
11 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOU DhLV.-LL-M
b1.1.Parent. A parent firm is a corporation that can control another
corporation (subsidiary) by ownership of a majority of its stock. The control
may exist by direct stock ownership of an immediate subsidiary or by indirect
ownership through one or more intermediate levels of subsidiaries.
bm. Personnel (Security) Clearance (PCL). A PCL is an administrative
determination that an individual is eligible, from a security point of view,
for access to classified information of the same or lower category as the
level of the PCL being granted.
bn. Possessions. U.S. possessions are the Virgin Islands, Guam,
American Samoa, Swain's Island, Howland Island, Baker Island, Jarvis Island,
Midway Islands (this consists of Sand Island and Eastern Island), Kingman
Reef, Johnston Atoll, Navassa Island, Swan Island, Wake Island and Palmyra
Island.
bo. Principal Management Facility (PMF). A cleared facility of an
MFO which reports directly to the HOF and whose principal management
official has been delegated certain personnel security administration
responsibilities or a defined geographical or functional area. The PMF
will function as a Home Office Facility in relation to its area of
responsibility. Both cleared and uncleared facilities may be under the
jurisdiction of a PMF. (See paragraph 73 for approval requirements.)
bp. Protected Area. An area housing computer hardware used in the
configuration and operation of an AIS which is continuously protected by a
collective level of physical security safeguards and personnel access con-
trols to prevent or detect unauthorized modification of the hardware.
bq. Protective Security Service (PSS). A transportation protective
service provided by a cleared commercial carrier qualified by MTMC to
transport SECRET shipments. The carrier must provide continuous attendance
and surveillance of the shipment by qualified carrier representatives and
maintain a signature and tally record. In the case of air movement, how-
ever, observation of the shipment is not required during the period it is
stored in the carrier's aircraft in connection with flight, provided the
shipment is loaded into a compartment that is not accessible to any
unauthorized person aboard. Conversely, if the shipment is loaded into a
compartment of the aircraft that is accessible to an unauthorized person
aboard, the shipment must remain under the constant surveillance of a
cleared escort or qualified carrier representative.
hr. Public Disclosure. Public disclosure is the passing of informa-
tion and/or materials pertaining to a classified contract to the public, or
any member of the public, by any means of communication.
bs. Qualified Carrier. A qualified carrier is a carrier that has met
all of the following criteria.
(1) The requirement for the carrier's service has been established
by a shipper.
(2) The carrier is authorized by-law, regulatory body, or
regulation to provide the required transportation service.
3. 12
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
Doi) .)z-zu.zz-ti ?
(3) A determination has been made by MTMC or the designated
Commander overseas that: (i) the carrier is capable of and authorized to
furnish PSS in accordance with an applicable tariff, government tender,
agreement, or contract provision; and (ii) no other qualified carrier is
available to perform the required service.
(4) The carrier has executed a DIS Form 1149, "Transportation
Security Agreement," with, and has been granted a SECRET FCL by, the
appropriate CSO.
bt. Reference Material. The term reference material means documentary
material over which the UA does not have classification jurisdiction, and did
not have classification jurisdiction at the time such material was originated.
Most material made available to contractors by the DTIC and other secondary
distribution agencies is reference material as thus defined.
bu. Regrade. This is to assign a higher or lower security classifica-
tion to an item of classified material.
by. Remote Terminal. A remote terminal is a device for communication
with an ADP system from a location, which is not within the central computer
facility.
by. Representatives of a Foreign Interest (RFI). This term refers to
citizens or nationals of the U.S. or immigrant aliens who, in their individual
capacities, or on behalf of a corporation (whether as a corporate officer or
official, or as a corporate employee who is personally involved with the for-
eign entity), are acting as representatives, officials, agents, or employees
of a foreign government, firm, corporation, or person. However, U.S. citi-
zens and nationals who have been appointed by their U.S. employer to be its
representatives in the management of a foreign subsidiary (that is, a foreign
firm in which the U.S. firm has 'ownership of at least 51% of the voting stock)
will not be considered RIVE, solely because of their employment, provided the
appointing employer is their principal employer and is a firm that possesses
or is in process for an FCL.
bx. Restricted Area. This is a controlled area established to safe-
guard classified material, which, because of its size or nature, cannot be
adequately protected during working hours by the safeguards prescribed in
paragraph 16, but which is capable of being stored during nonworking hours
in accordance with paragraph 14 (see section IV).
by. RESTRICTED DATA. "RESTRICTED DATA" is all data (information) con-
cerning: (i) design, manufacture, or utilization of atomic weapons; (ii) the
production of special nuclear material; or (iii) the use of special nuclear
material in the production of energy, but not to include data declassified or
removed from the RESTRICTED DATA category pursuant to Section 142 of the
Atomic Energy Act (see section lly, Atomic Energy Act of 1954, as amended, and
paragraph aq, FORMERLY RESTRICTED DATA, above).
bz. SECRET. "SECRET" is the designation that shall be applied only to
information or material the unauthorized disclosure of which reasonably could
be expected to cause serious damage to the national security. Examples of
"serious damage" include disruption of foreign relations significantly affect-
13 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
? . L _11 L W Ji.?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOU LLU.LL-C1
ing the national security, significant impairment of a program or policy
directly related to the national security, revelation of significant military
plans or intelligence operations, compromise of significant military plans or
intelligence operations, and compromise of significant scientific or techno-
logical developments relating to national security.
ca. SECRET Classified Shipment. This refers to SECRET material
moving in commercial transportation service that requires PSS of a qualified
carrier in the interest of national security.
cb. Security. Security refers to the safeguarding of information
classified TOP SECRET, SECRET, or CONFIDENTIAL against unlawful or
unauthorized dissemination, duplication, or observation.
cc. Security Cognizance. This refers to the responsibility for acting
for UA's in the discharge of industrial security responsibilities described in
this manual.
cd. SENSITIVE COMPARTMENTED INFORMATION (SCI). This is all informa-
tion and material that requires special controls for restricted handling
within compartmented intelligence systems and for which compartmentation is
established.
cc. Shipper. A shipper is the one who releases custody of material to
a carrier for transportation to a consignee (see also consignor, paragraph
3x.)
cf. Short Title. This is an identifying combination of letters and
numbers assigned to a publication or equipment for purposes of brevity.
cg. Signature and Tally Record. A record that is an integral part
of PSS and CSS and is designed to provide continuous accountability and
custody of a shipment from point of pickup to delivery to the consignee.
For commercial air shipments a signature is not required from the flight
crew or attendees of the carrier's aircraft.
ch. Single Line Service. This refers to freight that moves from point
of origin to destination over the lines of only one carrier.
ci. Special Access Program. A special access program is any program
imposing "need-to-know" or access controls beyond those normally provided for
access to CONFIDENTIAL, SECRET, or TOP SECRET information. Such a pro-
gram includes, but is not limited to, special clearance, adjudication, or
investigative requirements, special designation of officials authorized to
determine "need-to-know," or special lists of persons determined to have a
"need-to-know."
cj. Subsidiary. A subsidiary is a corporation that is controlled by
another corporation (parent) by reason of the latter corporation's ownership
of at least a majority (over 50%) of the capital stock. A subsidiary is a
legal entity and shall be processed separately for an FCL.
cj.l. System Security Officer (SSO). The contractor person respansible
for the implementation of AIS security, and operational compliance with the
documented security measures and controls, at the contractor facility.
3. 14
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
ck. System Sof,tware, Computer programs that control, monitor or
facilitate use of the AIS, for example, operating systems, programming
languages, communications, input-output control, sorts, security packages
and other utility-type programs. Considered to also include off-the-shelf
application packages obtained from manufacturers and commercial vendors,
such as for word processing, spreadsheets, data base management, graphics
and computer-aided design.
ck.1 TEMPEST. TEMPEST is an unclassified short name referring to
investigations and studies of compromising emanations. It is often used
synonymously for the term "compromising emanations," e.g. TEMPEST tests,
TEMPEST inspections (See "Compromising Emanations").
cl. TOP SECRET. "TOP SECRET" is the designation that shall be applied
only to information or material the unauthorized disclosure of which reason-
ably could be expected to cause exceptionally grave damage to the national
security. Examples of "exceptionally grave damage" include armed hostilities
against the U.S. or its allies, disruption of foreign relations vitally
affecting the national security, the compromise of vital national defense
plans or complex cryptologic and communications intelligence systems, the
revelation of sensitive intelligence operations, and the disclosure of
scientific or technological developments vital to national security.
cm. Transmission. Transmission is the sending of information from
one location to another by radio, microwave, laser, or other nonconnective
methods, as well as by cable, wire, or other connective medium. Transmis-
sion also includes movement involving the actual transfer of custody and
responsibility for a document or other classified material from one author-
ized addressee to another.
cm.]. Transportation Protection Service (TPS). A commercial carrier
service performed according to DoD standards that provides intransit
physical security for shipments of classified material. The two services
used for shipments of SECRET and CONFIDENTIAL material are PSS and CSS,
respectively.
cn. Transshipping Activity (Government). This refers to a government
activity to which a carrier transfers custody of freight for reshipment by
another carrier to the consignee.
co. United States and Its Territorial Areas. This includes the 50
states, the District of Columbia, the Commonwealth of Puerto Rico, Guam,
American Samoa, the U.S. Virgin Islands, the Trust Territory of the Pacific
Islands (also called Micronesia), Midway Islands, Wake Island, Johnston Atoll,
Kingman Reef, Swain's Island, Howland Island, Baker Island, Jarvis Island,
Navassa Island, Swan Island, and Palmyra Island.
cp. Unauthorized Person. An unauthorized person is any person not
authorized to have access to specific classified information in accordance
with the provisions of this manual.
cq. United States (U.S.). This refers to the 50 states and the
District of Columbia.
15 3.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I I, I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Cr. Upgrade. This is a determination that certain classified infor-
mation, in the interest of national security, requires a higher degree of
protection against unauthorized disclosure than is currently provided, coupled
with a changing of the classification designation to reflect such a higher
degree.
cs. User Agencies (UA's). This term refers to the OSD (including all
boards, councils, staffs, and commands), DoD agencies, Departments of the
Army, Navy, and Air Force (including all of their activities), and Depart-
ments of: State, Commerce, Treasury, Transportation, Interior, Agriculture,
Labor and Justice, NASA, GSA, SBA, NSF, EPA, ACDA, FEMA, GAO, FRS, and
USIA.
Ct.
weapon and
Cu.
Weapon System. Weapon system is a general term used to describe a
those components required for its operation.
Reserved.
4. Designation of Cognizant Security Office. The Regional Directors of DIS
are responsible for administration of industrial security within their respec-
tive regions. The office of the Director of Industrial Security in each DIS
Region is designated as the CSO for all contractor facilities located within
the region (see appendix VIII). All relationships between the UA and the
contractor on industrial security matters shall be handled through, or in
coordination with, the CSO, except those matters specifically set forth in
this manual as responsibilities of the contracting officer. Al]. questions
of interpretation with respect to this manual, or problems involving the
industrial security procedures as they pertain to the contractor, shall be
forwarded to the CSO. In the case of a facility or contractor activity
located on a UA installation, requests for interpretations of this manual
shall be forwarded to the CSO through the Commander or Head of the UA
installation. The management of each facility that has been assigned to
one of the DIS Regions for security cognizance shall be notified in writing of
this action at such time as the DoD Industrial Security Program is initiated
at the facility. The designation of CSO to exercise security cognizance at a
facility will not relieve any UA of the responsibility for protecting and
safeguarding its classified information incident to its classified contracts
with the facility, or from visiting the facility to review the security
aspects of such contracts. However, the security administration of a U.S.
classified contract awarded to a U.S. contractor, which requires performance
for a UA at a location outside the U.S., Puerto Rico, or a U.S. possession
or trust territory, shall be the responsibility of the UA awarding the
classified contract, except when the contracting UA has an agreement with the
U.S. installation Commander in such area to perform this function for it, or
DIS has accepted responsibility at the request of the UA. The Director of
Industrial Security in each DIS Region in which the HOF or principal U.S.
based office of the contractor is located will assume security cognizance for
such U.S. based facility, and except for contractor granted CONFIDENTIAL
clearances, DISCO will clear all of the contractor's employees requiring
access to classified information in support of a UA contract, regardless of
the physical location of such employees. Contractor activities located
outside the U.S., Puerto Rico, or a U.S. possession, territory, or trust
territory will not be granted an FCL.
1.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
16
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
5. Geperal Requirements. The contractor shall be responsible for-'" -
safeguarding all classified information under his or her control. In the
furtherance of this requirement, the contractor will be responsible for the
following.
a. Facility Security Officer/Supervisor (FSO). The contractor shall
appoint a U.S. citizen, who is required to be cleared as part of the FCL,
to supervise and direct security measures necessary for the proper applica-
tion of U.S. Government furnished guidance or specifications for classifi-
cation, downgrading, upgrading, and for safeguarding classified information.
The FSO, and those otherwise performing security duties, shall complete
security training as deemed appropriate by the CSO. Training for the FSO
will be based on the facility's involvement in the DISP, and as a minimum
will consist of the following:
(1) Facilities with no safeguarding capability: Satisfactory
completion of the Essentials of Industrial Security Management (EISM)
correspondence course within 6 months of obtaining an FCL or assuming
security responsibilities.
(2) Facilities with safeguarding capability: Satisfactory
completion of the EISM correspondence course within 6 months of obtaining
an FCL or assuming security responsibilities and, attendance at an
Industrial Security Management Course conducted by the DoDSI within 12
months of acquiring safeguarding capability. Extensions to the 12 month
requirement may be granted by the CSO when the Management Course is not
available.
b. Automated Information System. The contractor shall not utilize
an AIS system for the processing of classified data without the prior
approval of the CSO (see section XIII).
c. Limitation on Disclosure. Contractors shall ensure that classified
information is furnished or disclosed only to authorized persons (see para-
graph 3e). To this end they shall determine to what extent their employees,
subcontractors, vendors, and suppliers require access to classified informa-
tion in the performance of tasks or services essential to the fulfillment of
the contract 3/. They shall take all reasonable measures to adjust plant
layout and organize work, so as to limit such access to the least number
of individuals or firms consistent with the efficient performance of the
classified contract.
3/ A contractor is not authorized to turn over classified intelligence informa-
tion to a subcontractor, vendor, or supplier without prior written authoriza-
tion of the contracting UA. All classified intelligence information, whether
obtained during a visit or through other sources, shall be safeguarded and
controlled in accordance with the provisions of this manual, as well as
any additional instructions that may be received from the releasing UA
activity and any specific restrictive markings or limitations appearing on
documents. All inquiries concerning source, acquisition, use, control, or
restrictions pertaining to intelligence information shall be directed to
the contracting UA activity concerned.
. _3
fy,??)
17 5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 11 I _ ?, , ,..._, 1,i . I . . I ,
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
d. Safeguarding. The contractor shall provide suitable protective
measures within his or her facility for the safeguarding of classified infor-
mation. A contractor performing work within the confines of a UA installation
must safeguard classified information in accordance with provisions of this
manual, unless responsibilities for security are modified by the contract. All
classified material received by the contractor which: (1) is not related to a
contract, project, or program pursuant to paragraph la, or (2) for which no
safeguarding or disposition instructions have been received, shall be safe-
guarded in accordance with the provisions of this manual, and the CSO shall be
notified pursuant to paragraph 6a(18).
e. Adverse Clearance Actions. In the event a contractor is notified
by the DIS that a personnel security clearance concerning any of its OODEPs,
employees, or consultants has been denied, suspended, or revoked, the
contractor shall promptly preclude access to classified information by the
affected individual. A case-by-case evaluation of the assigned duties and
responsibilities of such affected individuals shall be undertaken to deter-
mine whether functional or physical reassignment will be necessary.
f. Individual Responsibility for Safeguarding. The contractor shall
on a recurring basis, remind all cleared personnel, including those located
outside the U.S., of their continuing responsibilities for safeguarding
classified information. Each cleared employee shall be made aware of the
security procedures: (i) pertaining to that employee's particular work
assignment; (ii) any security deficiencies resulting from recurring
inspections by the CSO that require individual corrective action on the
part of the employee; and (iii) shall be given an indoctrination in the
methods and operations used by hostile intelligence services to subvert
U.S. industrial personnel, as well as defensive measures to be employed by
employees in order to counter such subversion. Part B of appendix VII
provides indoctrination information on this subject. When representatives
of the U.S. Government provide specific counterintelligence awareness
briefings to the FSO, the FS0 shall ensure that all cleared key personnel
are also briefed, either at the time the FSO is briefed or at a subsequent
briefing to be conducted by the FS0 or designee. In addition, the employee
who has possession or knowledge of an element or item of classified informa-
tion shall be informed that the employee is responsible for determining
whether a prospective recipient is an authorized person (see paragraph 3e).
The employee shall be informed that he or she is required to advise the
recipient of the classification of the information which he or she discloses.
The contractor shall also inform its employees that unauthorized disclosure of
classified information violates DoD regulations and contractual obligations,
and is punishable under the provisions of federal criminal statutes. The
employees shall also be informed of their responsibility for making certain *
reports to the FS0 as specified in other paragraphs of this manual, such as, *
a change of name, becoming an RFI, contacts with representatives of Desig- *
nated countries, etc.
g. Initial Security Briefings. Prior to permitting employees to have
access to classified information, contractors shall brief them on their
obligations to safeguard classified information, advise them of its
importance, inform them of the required security practices and procedures,
5. 18
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
r
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
-asd have them -read, or have read-to that; the-poltions of the espionagelaws;
conspiracy laws, and federal criminal statutes applicable to the safeguarding
of classified information, which appear in Appendix VI of this manual.
(1) Following the initial security briefing the employees shall
be required to execute the "Classified-Information Nondisclosure Agreement,
(Industrial/Commercial/Non-Government)," Standard Form (SF) 189-A 4/. The
signature of the employee executing the SF 189-A shall be witnessed by his
or her supervisor or by another designated representative of the facility.
Both signatures must bear the same date. The SF 189-A must also be signed
and accepted by a person empowered to act on behalf of the United States
Government. The FSO is hereby specifically delegated the authority to
accept, on behalf of the United States Government, the executed SF 189-A for *
contractor employees. Further delegation of this authority is permitted in
unusual circumstances provided that such delegations are in writing, specify *
the individuals who may accept the executions, and are made part of the
facility's permanent security files. Only those individuals who occupy
responsible positions within the facility's security system may be delegated *
such authority. In unusual circumstances, such as facilities with very few
employees, a representative of the CSO or other government official may Sign *
the acceptance portion of the form. The date of the acceptor's signature
does not have to be the same as the date of execution.
(2) An employee shall be required to execute the "Security
Debriefing Acknowledgment" portion of the SF 189-A at the time of termina-
tion of employment (discharge, resignation, or retirement); at the beginning *
of a layoff or leave of absence for an indefinite period, or a prescribed
period in excess of 120 days; if the employee's PCI, is administratively
terminated; if the employee's PCL is suspended or revoked by the DoD; and
upon termination of the facility's FCL.
4/ DISCO Form 482, "Security Briefing and Termination Statements
(Industrial Personnel)" and its predecessor forms, are hereby cancelled
and shall no longer be executed. All cleared employees, who previously
executed these forms, must execute the SF 189-A as soon as possible but
not later than December 31, 1988. However, execution of the new form
by currently cleared employees shall be carried out in a manner that
does not cause undue disruption in operations or contract performance.
In this connection, the SF 189-A may be completed in conjunction with
normal security actions, such as required or recurring refresher
briefings or it may be completed using a batch distribution approach
(by department, office, building, and the like). The system selected is *
the prerogative of facility management. Refusal to execute the SF 189-A *
may be cause for denial of further access to classified information and
removal of the PCL. Contractors shall report to DISCO any refusal by a
cleared employee to sign the SF 189-A as required by paragraph 6b(11).
The existing DISCO Forms 482 for current employees may be destroyed as
soon as they execute the SF 189-A.
19 5.
! Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I J 1.1 1 I .4 4 .I.?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(3) The contractor shall retain the executed SF 189-A for fifty *
(50) years or for the duration-of the FCL, whichever is sooner. If a *
cleared operating location of an MPO ceases to be cleared, the SF 189-A *
shall be forwarded to the HOF, if the HOF continues to be a cleared facility.*
If the contractor's FCL is terminated, the SF 189-A shall be forwarded to *
the CSO. The SF 189-A shall be maintained in such a manner that they can *
be expeditiously retrieved if required by the Government. In the interest *
of storage efficiency, contractors may place executed SF 189-A on *
microfiche after the employee terminates employment, if they wish to do so. *
(4) If a terminating employee had access to TOP SECRET, COMSEC,
or other information requiring a special access authorization by the U.S.
Government, he or she shall be given an oral debriefing which shall include
a statement of: (i) the purpose of the debriefing, (ii) the serious nature
of the subject matter which requires protection in the national interest,
(iii) the need for caution and discretion, and (iv) advice concerning any
travel restrictions which are appropriate.
h. Special Features of Design. Shall not incorporate any special
features of design or construction in any project other than that for which
they are furnished by, developed for, or designed for the Government, if such
incorporation would disclose classified information unless prior written
authorization of the contracting officer concerned has been obtained. However,
classified features of design or construction may be incorporated by the con-
tractor in other U.S. User Agency projects of equal or higher classification
unless specifically prohibited by the Government. U.S. classified information
shall not be used in the performance of a foreign classified contract unless
the information was furnished through the designated military department in
connection with that contract, or the U.S. contracting officer concerned has
expressly authorized in writing the use of that information.
i. Security of Combinations. The contractor shall ensure that the
combinations to safes, containers, vaults, and three-position dial-type
changeable combination padlocks used to lock containers holding classified
material are classified and safeguarded, in accordance with the highest level
of the classified material stored in a given container. If a written record
is established for the combinations, the record shall be marked with the
classification designation, that is, TOP SECRET, SECRET, or CONFIDENTIAL,
of the highest level of material stored in the container. Other markings
specified in paragraph 11 for classified material are not required. However,
if the record is for the combination of a container used for storage of
special categories of information, such as NATO, CNWDI, RESTRICTED DATA, or
other information that requires special briefings or access requirements,
procedures shall be established to ensure that the special requirements are
adhered to and only those persons having a need-to-know are given access to
the record of the combination. In addition, accountability for the written
record shall be established in accordance with paragraph 12. The combinations
shall be changed at intervals of at least once every year (if NATO or CRYPTO
classified material is stored, the combination shall be changed every 6
months) and at the earliest practical time following:
(1) the reassignment, transfer, or termination of any person having
-knowledge of the-combination, or when the PCL granted to any such person is
downgraded to a level lower than the category of material stored, or is
suspended or revoked by proper authority;
5. 20
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-)1
(2) th? compromise or_suspected-compromise of the safes and
containers or their combinations, or discovery of the container being left
unlocked and unattended; or
(3) the initial receipt of safes, containers, and three-position
dial-type changeable combination padlocks.
Combinations to safes, containers, vaults, and three-position dial-type
changeable combination padlocks shall be changed under the above schedule by
a person entrusted with the combination or authorized access to the contents
of the container in accordance with paragraph 14c, or by the FSO or his or her
designated representative. Under no circumstances shall the changing of the
combinations be performed by an outside locksmith or subcontractor employee.
To prevent unauthorized substitution, combination padlocks shall be placed
inside of the open container or secured to a hasp, drawer, or handle of the
container when it is open.
j. Security Checks. The contractor shall perform security checks
within the facility to ensure that at all times security precautions are
taken to protect classified material in the possession of the facility and
shall designate an individual or individuals to make room or area checks
during normal working hours to ensure that all classified material not under
surveillance has been properly stored.
k. Transmission. The contractor shall establish procedures for the
proper transmittal of classified material under the provisions of paragraph
17.
1. Disposition of Classified Material. The contractor shall return to
the contracting officer, or his or her designated representative, all classi-
fied material furnished by a UA, including all reproductions thereof, and shall
surrender all classified material developed by the contractor in connection with
a UA contract, program, or solicitation 5/ 6/, unless the material has been
destroyed in accordance with paragraph 19, or the retention of the material is
authorized under the provisions of paragraph m below. Such material shall be
returned or surrendered in accordance with the following schedule;
(1) if a bid, proposal, or quote is not submitted or is withdrawn
within 90 days after the opening date of bids, proposals, or quotes;
(2) if a bid, proposal, or quote is not accepted -- within 90 days
after notification that a bid, proposal, or quote has not been accepted and if
further retention is necessary to serve a UA purpose, a request for approval
shall be submitted to the appropriate contracting officer in accordance with
paragraph m below; or
(3) if a successful bidder -- on final delivery of goods or serv-
ices, or on completion or termination of the contract, unless otherwise pre-
scribed in the contract or directed by the contracting officer.
(Footnotes 5/ and 6/ are on the following page.)
21 5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
IV V I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD -11).-L-l-M
m. Retention of Classified Material
(1) The contractor may retain classified material in special
cases when a bid, proposal, or quote is not accepted or on completion or
termination of the contract, provided the contractor requests and justifies
such retention and its retention is agreed to by the contracting officer.
However, under no circumstances will retention be authorized for more than
5 years unless the material is designated as a permanently valuable record
of the government and the facility is responsible for maintaining it for
the government. The contractor shall be authorized to retain classified
material only:
(a) when retention is necessary for the maintenance of the
contractor's essential records;
(b) when classified information is also patentable or is
proprietary data in which the contractor has title; or
(c) when retention of the material will assist the contractor
and will benefit the U.S. Government in the performance of other UA contracts
(the contracting officer of a current classified contract may authorize
transfer of. the material to the current contract when the material is
identified by the contractor in accordance with the procedure set forth in
paragraph 5m(1)(d) 7/ -- in these situations the material will be disposed of,
in accordance with paragraph 51, at the completion of the current contract);
and
5/ The placing of an appropriate notation on each document, indicating the
specific contract to which it pertains, will assist in achieving compliance
with this paragraph.
6/ Classified material, which is not related to a proposal or classified
contract (see paragraph la), may be destroyed in accordance with the
provisions of paragraph 19c (unless specifically prohibited), or disposed
of in accordance with instructions issued by the UA that originally
furnished the material.
7/ When such approval is granted the contracting officer who has cognizance
over the classified material shall be notified by the current contracting
officer. In the event retention of information under the circumstances
contemplated in this paragraph involves information of a DoD UA being
retained by a contractor of a non-DoD UA, or vice versa, or between non-DoD
agencies, the concurrence of the contracting officer of the completed or
terminated contractor bid which was not accepted must be obtained by the
current contracting officer prior to authorizing retention of the materials.
Information authorized for retention under these circumstances will be
identified as to its origin; and its ultimate disposition or declassifica-
tion will remain with its originating agency.
5. 22
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(d) when the contractor justifies and requests retenticdi ?
authority in writing, indicates the period of time retention is necessary,
and identifies the classified material for which retention is requested as
follows: TOP SECRET and SECRET material shall be identified in a list of
specific documents unless, in the case of SECRET material only, the contract-
ing officer has authorized identification by subject matter and approximate
number of documents; CONFIDENTIAL material shall be identified by subject
matter and approximate number of documents. However, authorization of the
contracting officer is not required for the retention of: (i) records held
by the contractor in accordance with the records retention requirements of
the basic contract; (ii) records authorized for retention for a specific
period under the terms of the basic contract; and (iii) records which during
the contract period, the contracting officer authorized the contractor to
retain for a specific period following completion of the contract; provided
that in each case the contractor informs the contracting officer of the
material to be retained, identifying it in the manner prescribed above.
(2) The contractor may retain classified material which does not
relate to a contract, for a limited time unless indicated otherwise on the
material. For example, the contractor may retain material obtained at classi-
fied symposiums or meetings as long as needed, but not for a period to exceed
1 year from the date of receipt. Retention beyond that time is authorized
only when the contractor requests and justifies such retention, and retention
is agreed to by a contracting officer of a current contract or an official of
the UA which released the information.
n. Termination of Security Agreement. The contractor shall, notwith-
standing the provisions of paragraphs 1 and in above, in the event that the
DD Form 441 is terminated for any reason by either party and is not superseded
by a new DD Form 441, render all classified material in his or her possession
to the UA concerned, or dispose of such material in accordance with instructions
from the UA concerned. The DIS FL 381-R, "Letter of Notification of Facility
Security Clearance," and the contractor's copy of the DD Form 441 shall be
returned to the CSO. Control station records, reproduction records, destruc-
tion certificates, and visitor records for which the retention period is not
expired at the time of termination of the DD Form 441, shall continue to be
maintained by the contractor until the expiration of the prescribed retention
period. These records shall be subject to review and recall by the U.S.
Government at any time within the retention period.
o. Public Disclosure. Contractors shall not disclose information 8/
pertaining to classified contracts or projects, except as specified in
paragraph (2) below, without prior review and clearance of the Directorate
for Freedom of Information and Security Review, Office of the Assistant
8/ In addition to the requirements of this paragraph, the disclosure of
unclassified technical data is also governed by the Export Administration
Act of 1979, administered by the Secretary of Commerce through the EAR, and
the Arms Export Control Act of 1984, administered by the Secretary of State
through the ITAR.
23 5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H .HI I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Secretary of Defense (Public Affairs), 9/ (OASD(PA)), The Pentagon,
Washington, D.C. 20301, in order to preclude the disclosure of information
requiring protection in the interest of national security.
(1) Requests for clearance shall be submitted to the activity
specified in item 13 of the Contract Security Classification Specification (DD
Form 254). Each request for clearance shall indicate the approximate date the
contractor intends to release the information for public disclosure and
identify the media to which he/she intends to make the initial release. A
copy of each request that is approved for release shall be retained for a
period of one inspection cycle for review by the cognizant security office.
All information developed subsequent to the initial clearance shall also be
cleared by the OASD(PA) prior to public disclosure.
(2) Contractors performing on DoD classified contracts need not
submit for clearance the following information:
(a) The fact that a contract has been received, including the
subject matter of the contract, and/or type of item in general terms provided
the name or description of the subject matter is not classified.
letter, etc.
(b) The method/type of contract; that is, bid, negotiated,
(c) Total dollar amount of the contract unless that informa-
tion equates to, (i) a level of effort in a sensitive research area, or (ii)
quantities of stocks of certain weapons and equipments which are classified.
of employees.
(d) Whether the contract will require the hiring or termination
(e) Other information which from time to time may be authorized
on a case-by-case basis by the OASD(PA) in a specific agreement with the
contractor.
by OASD(PA).
(f) Information previously officially approved for disclosure
(3) The provisions of this paragraph also apply to-information
pertaining to classified contracts or projects intended for use in unclassi-
fied brochures, promotional sales literature, reports to stockholders or
similar type material. In case of doubt about the need to clear information,
contractors shall query the activity identified in item 13 of the DD Form 254
or the OASD(PA).
9/ If the information pertains to a classified contract or project awarded by
a non-DoD agency, requests for clearance to disclose shall be submitted to
that agency.
5. 24
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
p. Olascificd Sale:: Literature, The contractor shall-not publish-or
distribute, or permit to be published or distributed, brochures, promotional
sales literature, or similar material containing classified information,
without prior review and written authorization by the contracting officer
concerned or his or her designated representative. The authorization for such
publication and distribution shall be indicated on the cover of the document,
or the first page of the document, if there is no cover. However, publication
and distribution to authorized persons (see paragraph 3e) may be made without
specific authorization from the contracting officer for:
(1) classified material which is published or distributed for
necessary use within the organization of the contractor or his or her
subcontractor in the performance of the contract,
(2) classified material prepared in reply to a request for proposal
or invitation to bid received from a UA or a cleared prime contractor or
subcontractor of a UA or classified information contained in an unsolicited
proposal submitted to a UA, and
(3) classified material submitted in response to an official
request of a UA.
q. Disclosure at Meetings. The contractor shall not disclose in any
manner classified information at a conference, seminar, symposium, exhibit, or
convention (hereinafter referred to as a meeting), unless one of the following
conditions is met.
(1) Classified information may be disclosed at a meeting conducted
pursuant to, and as a necessary element of, a specific contract held only in
the prime or subcontractor's facility and attended only by authorized persons
who have a need-to-know in connection with the contract, including employees
of the contractor or subcontractors, consultants thereto, and authorized
visitors, and over which meeting controls have been established to ensure that
the meeting site is physically secure, that the classified notes, minutes, and
summaries resulting from the meeting are properly safeguarded and that the
attendees are given sufficient classification guidance during the oral
presentations.
(2) Classified information may be disclosed at a meeting conducted
by a DoD activity, provided that when the information to be disclosed is under
the jurisdiction of another U.S. Government agency or when the meeting is to
be attended by representatives outside the DoD, the contractor requests the
conducting activity to obtain written approval from the contracting officer
concerned prior to the disclosure. A copy of such request shall be furnished
to the contracting officer concerned. The contractor is not required to
obtain approval if only DoD information is to be disclosed, and only the
contractor, subcontractors and their employees, and DoD personnel are to
attend the meeting.
(3) Classified information may be disclosed at a meeting conducted
by a contractor, association, institute, or society whose membership is
comprised primarily of contractors cleared by DoD, contractor employees, or
DoD personnel, and sponsored for security purposes by the DoD (including the
departments and agencies named in paragraph lc), provided written approval of
25
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
5.
_1 II hi, I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
the contracting officer concerned is furnished to the sponsoring activity
prior to the disclosure, and the additional requirements of paragraph 9 are
fulfilled; or
(4) Classified information may be disclosed at a meeting conducted
or sponsored by U.S. Government agencies other than DoD, provided the con-
tractor requests and obtains written approval from the contracting officer
concerned prior to the disclosure. Security sponsorship of a meeting by a UA
other than DoD will be in accordance with the provisions of that agency.
However, as a minimum, the requirements of the ISM shall apply for the
safeguarding of classified information.
r. Controlled Areas. The contractor shall place in effect a system
to control access of employees and visitors to closed and restricted areas
(see section IV).
s. Standard Practice Procedure (SPP). Prior to the issuance of an
FCL by the CSO, the contractor shall submit a written SPP (interim or final)
in sufficient detail to place into effect all security controls required by
the DD Form 441 and this manual which are applicable to the operations of
the facility. An interim SPP must implement requirements of this manual
which are immediately applicable to the operations of the facility in
connection with the facility's anticipated involvement with classified
information. The contractor shall modify the SPP on notification from the
CSO that it does not adequately implement the requirements of this manual.
The SPP shall be revised when necessary to implement changes in the con-
tractor's operations and shall be revised as necessary within 4 months
after receipt of a revision to this manual.
(1) MFO's, or parent-subsidiary collocated facilities, may
publish a SPP applicable throughout the organization, but the SPP shall
then be adapted as necessary to apply to specific operating locations.
A copy of the SPP shall be furnished to each appropriate CSO.
(2) The SPP for a facility at which only one employee or manage-
ment official is assigned shall provide for the notification to the CSO
of the death or incapacitation of that employee. Specifically, the SPP
shall:
(a) identify by name, address, and telephone number, the
individual(s) who would notify the CSO of such an occurrence (the said
individual(s) would not require access to classified information and
therefore need not be cleared); and
(b) include provisions for keeping the CSO advised of the
current combination to the container or, in the case of one-person
facilities of an MFO, for keeping the HOF FS0 advised of the current
combination to the container.
t. Special Access Programs. The contractor shall implement special
access program requirements when such requirements are included in a DD Form
254 or other appropriate contract-related document.
5. 26
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
u. Defensive Security Briefing.
(1) The contractor shall require all cleared employees (including
cleared directors), Type A Consultants, and temporary help supplier person-
nel, to inform him or her of their intended travel to or through a Designated
country; attendance at an international scientific, technical, engineer-
ing, or other professional meeting, regardless of the geographic location of
such a meeting, when it can be anticipated that representatives of Designated
countries will participate or be in attendance; or of plans to host an
unclassified visit by representatives of Designated countries at a facility
engaged in classified work or research. In instances where the individual is
located at a using contractor or UA as a consultant or an employee of a
temporary help supplier, the using contractor or UA, as appropriate, will be
notified of the intended travel, attendance at a meeting, or hosting of a
visit. In the case of a facility where only one individual is located, the
CSO will be so informed. When an individual works for more than one
contractor or UA, each will be notified, and in the case of temporary help
supplier personnel, the principal employer in addition to the using contractor
or UA shall be notified.
(2) The contractor shall give the individual a defensive security
briefing based upon the guidance contained in appendix VII. For temporary
help supplier personnel, only one contractor or UA (where access is at the
highest level) is required to accomplish the briefing. Usually the indivi-
dual involved would be in the best position to determine which contractor
or UA can most conveniently accomplish the briefing. Accordingly, the
individual should make appropriate arrangements with that activity and
furnish the other contractors or UA's at which he or she is employed an
advance notice stating when and by whom the briefing is to be given.
Individuals who frequently travel, attend meetings, or host visitors as
described above need not be briefed on each such occasion provided the
individuals have been thoroug4ly briefed at least once within the preceding 6
months and reminded of their security responsibilities. Prior to departure of
personnel for travel to or through a Designated country or to attend a meeting
outside the U.S., all classified information in the custody of such personnel
shall be accounted for by the using contractor or UA. Employees expected to
engage in marketing activities with representatives of Designated countries
shall also be provided with a defensive security briefing based on the
guidance contained in appendix VII.
(3) The contractor shall, on completion of the briefing, obtain
from the individuals briefed statements identifying who furnished the briefing
and attesting that they understand their individual responsibilities for
safeguarding classified information. This statement shall be retained for
at least 3 years when an employee has had access to TOP SECRET, COMSEC, or
special access program information, and for at least 2 years when access has
been to SECRET or CONFIDENTIAL information. In the case of temporary help
supplier personnel, the statement shall be forwarded to the temporary help
supplier for retention. If the UA or CSO conducts the briefing, it is
responsible for obtaining the briefing statement.
(4) The contractor shall submit a report as required by paragraph
6b(9) unless the UA or CSO conducted the briefing, in which case the UA or CSO
will submit the report.
27 5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II V 1.11
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
v. Relationships with Citizens or Residents of Designated
Countries.
(1) The contractor shall require all cleared employees, including
those in the process of being cleared by the DoD, to immediately notify the
contractor who shall submit a report to DISCO, in accordance with paragraph
6b(4), if either or both of the following events should occur subsequent to
the completion of the employee's PCL forms:
(a) a member of the immediate family of the employee or the
employee's spouse takes up residence in a Designated country; or
(b) through marriage, the employee acquires relatives who are
citizens or residents of a Designated country.
(2) The contractor shall require all temporary help supplier
personnel, while such personnel are working under the contractor's direction
and control on the using contractor's classified programs or contracts, to
notify the contractor immediately if either or both of the events in
paragraphs (a) and (b) above should occur. In such a case, contractors shall
then take action to ensure that the temporary help suppliers are notified so
that they can take action to submit reports to DISCO in accordance with
paragraph 6b(4).
w. Emergency Procedure. Contractors shall include in their SPP general
instructions for safeguarding classified material in emergency situations,
such as natural disasters or any civil disturbances. The procedure shall be
as simple and practical as possible and should be adaptable to any type of
emergency that may arise. A procedure shall be incorporated in the SPP to
provide for the submission of a report to the CSO and contracting officer,
by the most expeditious means, of any emergency situation which renders the
facility incapable of safeguarding the classified material (see paragraph
6a(16)). Courses of action, not necessarily limited to the following, are
available to contractors to safeguard the classified material in their
possession.
(1) Secure the classified material in authorized storage containers
or controlled areas. If feasible, a guard(s) should remain with material
secured in controlled areas. The storage containers and controlled areas
shall be examined on return to the facility to determine whether the clas-
sified information has been compromised or if any classified material is
missing. A report shall be submitted in accordance with paragraph 6a(1) or
(2), if appropriate.
(2) Request assistance from appropriate civil authorities including
local and state law enforcement agencies.
(3) Seek legal remedies such as the issuance of a court restraining
order or injunction against interference with the contractor in the exercise
of his or her property rights or in the discharge of his or her contractual
obligation to safeguard classified information.
(4) Request, when necessary, the assistance of the CSO; for
example: (i) in obtaining the legal remedies described in paragraph (3)
5. 28
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
above, and (ii>.in -arranging for the removal and safekeeping of the classified
material by either the CSO, contracting activity, or a military activity
located at or near the facility.
x. Release or Transmission Outside Contractor's Facility. The
contractor shall obtain the approval of the contracting officer in every
instance prior to release or transmission of TOP SECRET information outside a
contractor's facility. With respect to SECRET and CONFIDENTIAL information,
the contractor shall obtain the contracting officer's approval for release or
transmission outside the contractor's facility except in the following
instances:
(1) when release is required by the specific terms of the contract;
(2) when it is necessary in the performance of the contract;
(3) in connection with precontract negotiations with prospective
subcontractors, vendors, or suppliers;
(4) in prime contractor-subcontractor, MFO, and parent-subsidiary
relationships as authorized by sections VI and VIII, respectively; and
(5) during visits among prime contractors which are participating
under U.S. Government direction in contracts pertaining to research, develop-
ment, or production of a weapon system (see paragraph 3ct).
When a contract requires classified material to be disseminated by a con-
tractor to another contractor in accordance with a standard mailing or
distribution list, and there is no current contractual relationship of a
classified nature between the contractor and a designated recipient, the
releasing contractor shall verify the FCL and safeguarding ability of the
recipient prior to making the first release of any material, except when
advised by the contracting activity supplying the distribution list that it
will retain the responsibility for these determinations. If appropriate,
the CSO of the recipient shall be advised by the releasing contractor that
classified material will continue to be disseminated to the recipient under
terms of the contract (identify the contracting activity and contract number)
for a specified period (not to exceed the estimated date of contract com-
pletion or renegotiation), unless advised by the CSO of a change adversely
affecting the recipient's FCL or safeguarding capability. When the mailing or
distribution list requires dissemination of the material to a UA installation,
the foregoing requirements do not apply, but the material shall be transmitted
in accordance with paragraph 17.
y. DoD Technical Information Dissemination Activities. The contractor
shall forward the DD Form 1541, "Facility Clearance Register," to the CSO when
making the first application for access to classified scientific and technical
information in the possession of the DTIC (Cameron Station, Alexandria,
Virginia 22314), its field extensions, a DoD information analysis center, or
the Redstone Scientific Information Center (U.S. Army Missile Command,
Redstone Arsenal, Alabama). This form is used to obtain certification of the
category of classified material that an applicant (contractor) is cleared to
receive and is capable of safeguarding. A DD Form 1541 shall be submitted
only when requesting approval of the first "Registration for Scientific and
29 5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
IV JIIIIJ I_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Technical Information Services" (DD Form 1540). When certified, the DD Form
1541 remains in effect for all future registrations and until the contractor's
FCL is suspended, revoked, or terminated, or until the contractor is no longer
able to safeguard classified material at the specified category. The DD Form
1540 shall be submitted to the sponsoring UA contracting officer, in accord-
ance with guidance provided by DTIC. Scientific and technical information
acquired from DTIC, its field extensions, a DoD information analysis center,
or the Redstone Scientific Information Center shall be safeguarded in
accordance with the requirements of this manual and the restrictions on the
use, disclosure, and dissemination of the information, which are marked on the
documents. When the contract to which the DD Form 1540 applies is completed
or terminated, the contractor shall either destroy the material in the manner
prescribed in paragraph 19 or obtain authorization to retain the documents
from the sponsoring UA in accordance with paragraph 5m. The placing of an
appropriate notation on each document, indicating the specific contract to
which it pertains, will assist in achieving compliance with this requirement.
z. List of Classified Contracts. The contractor shall, after receiving
notice of a forthcoming security inspection, prepare a listing of all classi-
fied contracts on which the facility is currently performing.
aa. Investigative Assistance and Cooperation. The contractor shall
cooperate fully with representatives of DIS or other federal investigative
agencies during official investigations concerning the unauthorized dis-
closure of classified information or during the conduct of investigations
related to determining the eligibility of past or present employees or
other personnel requiring a security clearance. This includes, but is not
limited to, providing suitable arrangements within the facility for conducting
private interviews with employees during normal working hours, making
employment and security records available for review on request by such
representatives, and otherwise rendering assistance as necessary.
ab. Temporary Help Supplier Personnel. The contractor shall orient
temporary help supplier personnel in the security practices and procedures
of the facility, which will enable such personnel to understand and comply
with the procedures applicable to the duties they are to perform. Using
contractors will also submit, as appropriate, reports pertaining to such
personnel while they are actually working at their facilities under their
direction and control. This action by the using contractor in no way relieves
the temporary help suppliers from complying with the requirement for security
indoctrination and training of their employees or other concurrent require-
ments of this manual.
ac. Self-Inspections. Contractors shall conduct their own self-
inspection program for the purpose of evaluating all security procedures
applicable to the facility's operation. Contractors shall review their
security system on a continuing basis and shall also conduct a formal
self-inspection to occur midway between inspections conducted by the CSO.
At the discretion of management, the inspection may be conducted by a
security representative(s) from the facility, HOF, Me, or cleared parent.
In any event, management shall establish, at an appropriate organizational
level, a procedure for evaluating the effectiveness of the self-inspection
- program. Self-inspecLion shall consist of An audit of all the ficility's
operations in light of its SPP and the requirements of this manual. As a
5.
30
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
minimum, self-inspections shell include.ell elements normally inspected by
the CSO. The guidelines used by U.S. Government inspectors are outlined in
Appendix XIII. These guidelines will change from time to time to reflect
changes in ISM requirements. Not all of the items listed in Appendix XIII
are intended to be covered during any one inspection, but over a reasonable
period of time those items that pertain to a facility shall be covered
during the self-inspections. Deficiencies identified as a result of
self-inspections shall be corrected as expeditiously as possible. If
difficulty is encountered in resolving a deficiency, the CSO will provide
assistance on request. The contractor shall maintain a record of the date
on which the self-inspection was accomplished, and this record must be
available for review during the next scheduled inspection by the CSO.
ad. Classification Responsibilities of Contractors. The contractor is
responsible to implement the classification decisions of the U.S. Government
contracting authority. Contractor implementation shall be based on classified
source material or a DD Form 254 with its enclosed or referenced classifi-
cation guides.
ae. Verification of U.S. Citizenship. The contractor shall require
each employee who is an applicant for a PCL (including the "CONFIDENTIAL"
level) and who claims U.S. citizenship to produce evidence which will
verify such citizenship. Documents which are acceptable evidence of U.S.
citizenship are listed at appendix XII. Unless the form has a verification
block, a statement as follows will be typed or stamped by the contractor in
the "Remarks" portion of the appropriate DoD clearance forms: "Authorized
evidence of U.S. citizenship has been reviewed by the certifying official and
the name, date, and place of birth therein are as stated on this form." (The
recent revisions of DD Forms 48 and 49 have included verification blocks added
to the forms.) In the case of PCL's by the DoD, if the required documentary
evidence is not immediately obtainable prior to submission on the application
to DISCO, a statement as follows will be typed or stamped in the "Remarks"
portion of the appropriate DoD clearance form: "Applicant has applied to
(insert name of agency organization) for authorized evidence of citizenship
(insert acceptable document from appendix XII)." On receipt of evidence of
citizenship, the contractor will notify DISCO that authorized evidence of
U.S. citizenship has been reviewed and that the name and date and place of
birth are as stated in the previously submitted clearance form. DISCO will
not forward an LOC until the contractor has certified the applicant's U.S.
citizenship. CONFIDENTIAL clearances by the contractor shall be granted in
accordance with paragraph 24b.
af. Supervisory and Managerial Responsibility for Reporting Adverse
Information. Supervisory and managerial personnel shall be reminded of their
responsibilities for advising the FSO of the existence of any information
coming to their attention concerning any employee who has been cleared or is
in the process of being cleared for access to classified information, when
information indicates that such access may be questionable or not in the
interest of national security.
ag. Security Inspections. As provided for in Section II of the
"Department of Defense Security Agreement," security inspections shall be
conducted by the CSO for all cleared contractor facilities in order to
ensure that the procedures, methods, and physical safeguards employed by
31 5.
, . Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 1.1.1 1 1 H.I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
contractors are adequate for the protection of classified information which
may be entrusted to them. The frequency of such inspections is normally
determined by the highest level of classified material possessed at the
facility. However, security inspections may be conducted on an announced
or unannounced basis. On a random basis, the CSO will also conduct periodic
inspections of uncleared locations of MFO's at which cleared employees are
located.
ah. Contacts With Nationals or Representatives of Designated
Countries. Such contact shall require all cleared employees, including
those in the process of being cleared by the DoD, to notify the contractor
immediately of all questionable or suspicious contacts with nationals or
representatives of Designated countries. A questionable or suspicious con-
tact in this regard is any personal exchange, encounter, or relationship which
is determined to consist of an actual, probable, or possible hostile intelli-
gence collection effort (see paragraph B, appendix VII, for assistance in
recognizing a reportable contact).
ai. Operations Security. The contractor shall comply with OPSEC
requirements when such requirements are contractually imposed by UA's. In
meeting OPSEC requirements, contractors shall identify implementation costs to
UA's and shall assist UA's in determining existing ISM measures which address
particular UA vulnerability concerns in order to preclude the imposition of
duplicate OPSEC measures. Additional costs for OPSEC provisions required by
the UA shall be properly charged to specific contracts. See Section XV of
this manual for further discussion.
aj. Administrative Measures Regarding Security Violations. The con-
tractor shall establish and enforce policies which provide for appropriate
administrative actions against employees who violate requirements of this
manual. The SPP shall include a graduated scale of disciplinary actions
which would be applied by the contractor in the event of such employee vio-
lations or negligence. When contractors submit reports in accordance with
paragraphs 6b(1) or 7(e) with regard to culpable individuals responsible
for a security violation, a statement as to the administrative actions
taken against the individual shall be included. If the action is different
from that specified in the SPP, an explanation shall also be included.
ak. Defense Hotline. The Defense Hotline provides an unconstrained
avenue for DoD personnel and contractor employees to report, without fear
or reprisal, known or suspected instances of serious security
irregularities and infractions concerning defense affiliated contracts,
programs, or projects. The Defense Hotline does not supplant contractor
responsibility to facilitate reporting and timely investigation of security
matters concerning its operations or personnel, and contractor personnel are *
encouraged to furnish information through established company channels.
However, the Hotline may be used as an alternate means to report this type
of information when considered prudent or necessary. The Defense Hotline is *
organized and administered by the Office of the Inspector General, DoD. That
office initiates investigative action regarding information received through
the Hotline system and has primary responsibility for ensuring the confi-
dentiality of all system users. The contractor shall conspicuously post
5. 32
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD Yl2U.ZZ-m
, publicity media provided by DIS regarding the-Defense Hotline and shall
inform all employees that the Hotline may be used, if necessary, for reporting
matters of national security significance. The address, telephone number, and
purpose of the Defense Hotline shall be included in the SPP.
al. TEMPEST Requirements. TEMPEST protective measures may be
required for certain contracts which involve processing classified informa-
tion by information processing equipments. Contractors are required to
comply with TEMPEST requirements, such as providing data to a User Agency
for a TEMPEST Vulnerability Assessment and/or Instrumented TEMPEST Survey,
or taking specific TEMPEST countermeasures, only when these special
security requirements are specifically incorporated into the contract.
These requirements are above and beyond those normally called for in this
manual and may be cause for renegotiation in accordance with the "Security
Requirements Clause" of the contract. Contractors shall not implement
specific TEMPEST countermeasures nor shall they impose any TEMPEST
requirements on a subcontractor without prior approval of the UA contract-
ing office. The CSO may be contacted for advice and assistance when
questions or problems arise.
6. Reports.
a. The contractor shall immediately submit in writing to the CSO a
report of any of the following 10/.
(1) Espionage, Sabotage, or Subversive Activities. The contractor
shall submit an information copy of any report filed under paragraph 6c with
the FBI.
10/ When reports are submitted or information is provided pursuant to these *
requirements, either classified if qualified, or offered in confidence,
and so marked by the contractor, applicable exemptions to the Freedom of
Information Act will be invoked as a matter of policy to withhold the
information contained in such reports from public disclosure. When any of
the reports submitted pursuant to these requirements contain unclassified
information pertaining to an individual, the Privacy Act of 1974 permits
the withholding of that information from that individual only to the
extent that the disclosure of the information would reveal the identity of
a source who furnished the information to the U.S. Government under an
express promise that the identity of the source would be held in confi-
dence, or, prior to September 27, 1975, under an implied promise that the
identity of the source would be held in confidence. In appropriate cases,
the DoD will entertain a request from a defense contractor or its employees
for such assistance as may be necessary against legal action based on the
reporting of information in accordance with the requirements of this manual.
Such assistance may include support for a claim by the contractor or the
employees concerned that the information was reported under an absolute or
qualifying privilege. In such cases, the DoD will request appropriate
assistance from the Department of Justice.
33 6.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) Loss, Compromise, or Suspected Compromise. The contractor
shall submit a report, classified if appropriate, of any loss, compromise
(including deliberate compromise), or suspected compromise of classified
information 11/ 12/.
(3) Other Security Violations. The contractor shall submit a
report, in addition to the requirement of paragraph (2) above, classified if
appropriate, of each violation of the requirements of this manual involving
TOP SECRET or special access information, RESTRICTED DATA, or COMSEC
information, regardless of classification, which the contractor possesses in
connection with UA contracts or programs 11/ 12/.
(4) Changed Conditions.
(a) The contractor shall submit a report of any change of
ownership, including stock transfers that affect control of a corporation.
(b) The contractor shall submit a report of change of
operating name or address of the facility(s) covered by the DD Form 441.
(c) The contractor shall submit a report of any change (that
is, additions, deletions, or any change relative to the information which was
previously submitted) in officers, directors, partners, regents, trustees, or
executive personnel, including, as appropriate, the names of the individuals
they are replacing. In addition, a statement shall be made indicating: (i)
whether the new officers, directors, partners, regents, trustees, or executive
personnel are cleared, and if so, to what level and when, their date and place
of birth, social security number, and their citizenship; (ii) whether they
have been excluded from access in accordance with the provisions of 22e; (iii)
or whether they have been temporarily excluded from access pending the grant-
ing of their PCL's. A new complete listing of OODEPs need only be submitted
at the discretion of the contractor and/or when requested in writing by the
CSO.
(d) The contractor shall submit a report about any OODEP who
becomes an RFI, as defined in paragraph 3bw, or whose status as an RFI changes
in a manner that would make the OODEP ineligible for a PCL pursuant to
paragraph 20k.
(e) The contractor shall submit a report of action to terminate
business for any reason, imminent adjudication or reorganization in
bankruptcy, or any change that might affect the validity of the DD Form 441.
11/ When the facility or contractor is located on a UA installation, and the *
?????????
Commander or Head of that installation is. performing certain prescribed
functions of a CSO, the original copy of the reportshall be furnished to
the Commander or Head of the installation with an information copy of the
report furnished to the CSO.
12/ The contractor's preliminary and final reports shall contain the
information required by paragraphs 7c and 7e, respectively.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(f) The contractor shall submit a report of any change which
affects the information previously reported by the contractor on the DD Form
441s, "Certificate Pertaining to Foreign Interests." This report will be made
by the submission of a revised DD Form 441s. Moreover, when entering into
discussions or consultations with foreign interests which may reasonably be
expected to lead to the-introduction or increase of FOCI and necessitate the
submission of a revised DD Form 441s, the contractor shall report the details
by letter. Additionally, when the contractor becomes aware of negotiations
for the sale or transfer of securities to a foreign interest and such sale or
transfer would necessitate the submission of a revised DD Form 441s, the
details will be reported by letter. Reports made pursuant to the foregoing
are presumptively proprietary and will be protected from unauthorized
disclosure and handled on a strict need-to-know basis. When such reports are
submitted in confidence, and so marked, applicable exemptions to the Freedom
of Information Act will be invoked to withhold them from public disclosure.
In cases where the contractor considers the information to be particularly
sensitive or delicate and wishes to further restrict dissemination, the
foregoing report may be appropriately marked and submitted to the Director,
DIS, ATTN: Deputy Director (Industrial Security), 1900 Half Street, S.W.,
Washington, D.C. 20324-1700.
(5) Change in Closed or Restricted Areas, Vaults, and Strongrooms.
The contractor shall submit a report of any change in the extent or location
of closed areas, restricted areas, vaults, or strongrooms created under the
provisions of section IV and appendix IV, respectively, including the
establishment of such areas.
(6) Change in Storage Capability. The contractor shall submit a
report of any change in the storage capability that would raise or lower the
level of classified information the contractor is able to safeguard.
(This provision does not require the contractor to report the acquisition
of additional containers approved for storage at the same level as that
previously reported to the CSO.)
(7) Employee Information in Compromise Cases. The contractor shall
submit a report, on the written request of the CSO, of information concerning
any employee working in any of his or her plants, factories, or sites where
work for a UA is being performed, when the information is needed in connection
with the loss, compromise, or suspected compromise of classified information.
(8) Category of Classified Information. The contractor shall
submit a report of the highest classification category of classified material
received or generated at the facility. However, when the classification of
the material received or generated is no higher than that of the material in
possession of the facility during the last inspection or previously reported
pursuant to this paragraph since the last inspection, an additional report
need not be submitted.
(9) Reserved.
(10) Delay in Shipment. The contractor shall submit a report, in
accordance with paragraphs 17c(5)(d) and 17d(3)(d), of the delay in the
35 6.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I] 1 _1.11
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
movement of classified material by commercial carriers of more than 48 hours
after the expected time of arrival.
(11) Evidence of Tampering. The contractor shall submit a report,
in accordance with paragraph 12e(2), of evidence of tampering with a ship-
ment containing classified material. If the material was received through
the U.S. Postal System, the contractor shall also promptly notify the
appropriate U.S. Postal Inspector.
(12) Improper Shipment. The contractor shall submit a report when a
classified shipment is received by other than an approved method prescribed by
paragraph 17.
(13) Badges and Identification Cards. The contractor shall submit a
report, in accordance with paragraph 8c, which will inform the CSO of the
adoption of a new or revised employee badge or identification card system.
(14) Authorization to Apply Classifications. On request, the con-
tractor shall submit a report, in accordance with paragraph 10f(4), of the
number of individuals currently authorized by the contractor to apply a
classification to information at each of the following categories: TOP
SECRET, SECRET, and CONFIDENTIAL.
(15) Location or Disposition of Classified Material Terminated From
Accountability. The contractor shall submit a report, in accordance with
paragraph 12h(2), when the whereabouts or disposition of classified material
previously terminated from accountability is subsequently determined.
(16) Inability to Safeguard Classified Material. The contractor shall
submit a report, by the most expeditious means, of any emergency situation, such
as a natural disaster or civil disturbance, which renders the facility incapable
of safeguarding all classified material (see paragraph 5w). A report shall also
be provided to all contracting officers concerned. This requirement of the DoD
does not preclude similar reporting of the incident to appropriate local, state,
and federal civil authorities, as the situation warrants.
(17) Foreign Classified Contracts. The contractor shall submit a
report of any precontract negotiation or award of a foreign or NATO contract
for a foreign firm or government involving either U.S. or foreign classified
information which is not placed through a UA.
(18) Receipt of Classified Material Not Related to a Classified
Contract, Project, or Program. The contractor shall submit a report of
the receipt of any classified material, which is not related to a contract,
project, or program and for which no specific safeguarding and disposition
instructions have been received; further, if the contractor has been unable
to obtain classification guidance or disposition instructions from the .
government originator, or the government activity releasing the material,
the report shall state so. The report should identify the material by
source, originator, quantity, subject or title, date, and classification
category.
(19) Visits by Designated Country Representatives or Nationals.
The contractor shall submit a report, as soon as the visit arrangements are
6.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
known, of the intent to host an unclassified visit by representatives or
nationals of a Designated country. The report shall include the name and
address of the contractor to be visited, the name(s) of the visitor(s) and the
foreign firm or government agency and country represented, and the date and
purpose of the visit. If access to information which relates to a classified
contract or project is involved, the report shall include a description of "
the information and any other information concerning the visit which may be
pertinent. In preparation for the visit, the contractor, in accordance with
paragraph 5u, shall provide a defensive security briefing and a counterin-
telligence awareness briefing to cleared personnel hosting the visitor(s), as
well as employees expected to engage in marketing activities. Disclosure of
unclassified information pertaining to classified contracts or projects is
governed by the provisions of paragraph 5o. The contractor shall include in
the report a statement as to whether paragraph 5o is applicable or an export
license 8/ is required.
b. For all cleared personnel, the contractor shall submit the following
reports immediately to the DISCO, Columbus, Ohio 43216-5006, unless the
individual involved is or was required to be cleared in connection with the
FCL pursuant to paragraph 22, in which case the report will be submitted to
the CSO 10/ 11/.
(1) Adverse Information 13/. Contractors shall submit reports,
classified, if appropriate, of any information coming to their attention
concerning any of their employees who have been cleared or who are in the
13/ As a general rule, any information that reflects adversely on the
integrity or character of the employee, which suggests that his or her
ability to safeguard classified information may be impaired, should be
reported to DISCO. In turn, DISCO will evaluate the information and
decide whether further action is warranted. The following are some
examples of the types of information (that is, based on incidents which
may occur within or outside the contractor facility), which should be
reported to DISCO: criminal activities; bizarre or notoriously dis-
graceful conduct; treatment for mental or emotional disorders; excessive
use of intoxicants; use of illegal, controlled substances such as
marijuana, heroin, cocaine, and hashish; and excessive indebtedness or
recurring financial difficulties. These examples are not all inclusive,
but are intended only to serve as a sample of the types of information
which should be reported. Only information which has been confirmed by
the contractor as fact need be reported. Reports based on rumor or in-
nuendo should not be made under this paragraph. If there is doubt
whether information should be reported, furnish the information to DISCO
for evaluation. In two court cases, Becker vs. Philco and Taglia vs.
Philco (389 U.S. 979), the U.S. Court of Appeals for the 4th Circuit
decided on February 6, 1967, that a contractor is not liable for defama-
tion of an employee because of reports made to the government pursuant
to the requirements of the ISM. Culpability for a security violation,
regardless of whether classified information is found to have been
compromised, is a matter which is presumptively reportable pursuant to
this paragraph.
17 6_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
IL dl I I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
process of being cleared for access to classified information, which indicate
that such access or determination may not be clearly consistent with the
national interest. The subsequent discharge of an individual by the contractor
who receives this information does not obviate the requirement to submit this
report. In addition, if the individual is employed on a UA installation, a
copy of such report shall be furnished to the Commander or Head of the UA
installation. Where the employee concerned had been granted a CONFIDENTIAL
clearance by the contractor, in accordance with paragraph 24b, and is not in
process for a U.S. Government granted PCL, the PCL forms specified in para-
graph 26b shall accompany the report of adverse information. This require-
ment to submit information reports also applies to cleared temporary help
supplier personnel or Type A Consultants utilized by the contractor. This
requirement in no way affects the temporary help supplier's responsibility for
submission of such reports when adverse information regarding his or her
employee is brought to his or her attention. The report shall be on company
letterhead or identified by typing the contractor's name and address, and
addressed to DISCO, ATTN: Chief, Special Programs Branch. The report shall
include: date of submission; subject's last name, first name and middle name;
social security number; date and place of birth; clearance level and date of
clearance; home address; facility code where the clearance is held; reporting
facility's code; subject's physical worksite; employment status (if
terminated, add terminate date); the adverse information being reported
(if a garnishment, please list date of garnishment, court, amount and
complainant, or attach a copy of the garnishment order); the name and
telephone number, including extension, of the individual to contact for
further information regarding the matter; and the signature, typed name
and title of the individual submitting the report.
(2) Change in Employee's Status. The contractor shall report (i)
the death; (ii) the change in name; (iii) the termination of employment;
(iv) a layoff or leave of absence for an indefinite period, or for a
prescribed period in excess of 120 days; and (v) residence or assignment
outside the U.S., Puerto Rico, Guam, or the Virgin Islands for a period in
excess of 90 consecutive days during any 12-month period of those employees
who are cleared, or who are in the process of being cleared. Such changes
shall be reported by submission of a DISCO Form 562, "Personnel Security
Clearance Change Notification."
(3) Official Investigation. Contractors shall submit reports, on
the written request of DISCO, of information concerning any employees working
in any of their plants, factories, or sites where work for a UA is being
performed, when the information is needed in connection with an official
investigation.
(4) Relationships in Designated Countries. The contractor shall
submit a report, in accordance with paragraph 5v, of the establishment of a
relationship between a cleared employee, or one who is in the process of
being cleared by the DoD, and a citizen or resident of a Designated country.
(5) Representative of a Foreign Interest. The contractor shall
submit a report of any cleared employee (including those in the process of
being cleared by the DoD), except those covered by paragraph 6a(4), who
becomes an RFI, as defined in paragraph 3bw, or whose status as an RFI changes
in a manner that would make him or her ineligible for a PCL pursuant to
paragraph 20k.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VOD )LLU.LL-M
(6) Changed Intentions and Foreign Residence or Assignment of -
Immigrant Aliens. The contractor shall submit a report of: (i) residence or
the assignment of a cleared immigrant alien outside the U.S. -- such individuals
on visits of 90 consecutive days or less to foreign areas are not considered
to be assigned outside the U.S., or (ii) a change in the intention of a
cleared immigrant alien to reside permanently in the U.S. An immigrant
alien's change of intent to reside permanently in the U.S., and residence or
assignment of an immigrant alien outside the U.S., negates the basis (see
paragraph 25) on which the LOC was issued, and the LOC will be adminis-
tratively terminated without prejudice by DISCO on receipt of contractor
notification. Except in connection with visits of 90 consecutive days or
less, immigrant aliens may not be authorized access to classified information
when visiting outside the U.S. Visits in excess of 90 consecutive days
duration, shall invalidate any existing clearance.
(7) Citizenship by Naturalization. The contractor shall submit a
report of a cleared immigrant alien who becomes a citizen through naturaliza-
tion. This report will be made by the "Personnel Security Clearance Change
Notification" (DISCO Form 562), setting forth in the "Remarks" block: (i) city,
county, and state where naturalized; (ii) date naturalized; (iii) court; and
(iv) certificate number. On receipt of such a report, DISCO will issue a new
LOC (DISCO Form 560).
(8) Reserved.
(9) Travel or Attendance at Meeting. The contractor shall submit a
report, in accordance with paragraph 5u, on completion of travel to or through
a Designated country, or attendance at an international meeting where Designated
country representatives participated or attended. The report shall include
the employee's full name, clearance status, date and place of birth, a brief
description of the projects, including the category of classified information,
to which he or she had access during the past 2 years (depending on the period
of employment or utilization by the contractor in the case of temporary help
supplier personnel), the countries visited or the meeting attended, the dates
of the travel, and the employee's statement of the purpose and objective of
the travel. The report shall include, if appropriate, a narrative statement
of the circumstances surrounding all hostile intelligence efforts to obtain
information from or to compromise the traveler, or any endeavor by an
unfriendly interest to establish a continuing relationship with the employee.
(10) Employees Desiring Not to Perform on Classified Work or Accept
Security Responsibility or Requests to Terminate Clearance or Clearance
Processing. The contractor shall submit a report on notification by an
employee that he or she no longer wishes to be processed for a PCL, pursuant
to paragraph 26, or to continue an existing PCL.
(11) Standard Form (SF) 189-A. The contractor shall submit a
report in accordance with paragraph 5g, when an employee refuses to execute *
the SF 189-A.
39 6.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 V 1.1 1 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. The contractor shall submit immediately, in writing 14/, to the
nearest field office of the FBI a report, classified, if appropriate,
regarding the following events:
(1) information coming to his or her attention concerning existing
or threatened espionage, sabotage, or subversive activities at any of his or
her plants, factories, laboratories, or other sites, at which work for any UA
is performed, or at which related material is acquired, stored, fabricated, or
manufactured, or is in process of research or development, and
(2) information coming to his or her attention concerning employee
contacts with nationals or representatives of Designated countries (see
paragraph 5ah).
7. Loss, Compromise, or Suspected Compromise of Classified Information 15/.*
a. The contractor shall establish a procedure to ensure that each
loss, compromise, or suspected compromise of classified information and each
failure to comply with a requirement of this manual is immediately reported to
the FSO. Classified material which is out of the control of its custodian or
which cannot be located shall be presumed to be lost until an investigation
determines otherwise.
b. The contractor shall establish such procedures as are necessary to
ensure that any employee discovering the loss, compromise, or suspected
compromise of classified information outside a facility promptly reports
such a fact to:
(1) the nearest office of the FBI, and furnishes sufficient
information to assist in identification of the information -- if the loss,
compromise, or suspected compromise occurs outside the U.S., the nearest
U.S. authorities shall be notified in lieu of the FBI; and
(2) the FSO, by the fastest means of communication, who will then
comply with paragraph c below.
c. Immediately on receipt of a report, in accordance with paragraphs
a or b above, the contractor shall initiate a preliminary inquiry to ascertain
all of the circumstances surrounding the reported loss, compromise, suspected
compromise, or failure to comply with a requirement of this manual. To obtain
the required information, it may be necessary to check records, review the
SPP, examine material evidence, and interview persons having direct knowledge
of the facts of an incident. The preliminary inquiry should include the
following:
14/ If time is of the essence and the initial report is made via phone to
the FBI, it must be followed in writing, regardless of disposition made of
the report by the FBI.
15/ In addition to the reporting requirements outlined in this paragraph the *
. contractor shall promptly notify the appropriate U.S. PoStal Inspector
of any loss, compromise or suspected compromise of classified informa-
tion that occurred while such information was in the U.S. Postal System.
7. 40
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) What is alleged to have happened, where, and when did the
violation occur?
(2) Who reported the violation, to whom, and when?
(3) What classified information was involved? (Attach a list of
the classified material, if appropriate.)
(4) What was the classification of the information involved?
(5) Who are the originators of the information involved?
Identify the procurement activity (PCO & ACO) and prime contract number.
(6) When, for. how long, and under what circumstances was classified
information vulnerable to unauthorized disclosure? Determine identity of
unauthorized persons likely to have had access to the classified information.
(7) What actions were taken to secure the classified information
and/or limit the damage before the inquiry began, and when and by whom were
they taken (inventories, securing of material, changing of combinations, and
so forth)?
(8) Is any classified material lost or unaccounted for? (In
the event of a loss, a thorough search shall be conducted for the classi-
fied material.)
d. If the contractor's preliminary inquiry prescribed in paragraph c
above confirms: (i) that a loss, compromise, or suspected compromise of any
classified information occurred; or (ii) that a violation of a requirement
of this manual involving TOP SECRET, COMSEC, special access information, or
RESTRICTED DATA occurred, the contractor immediately shall submit a report
of the incident to the CSO in accordance with paragraph 6a(2) or 6a(3), as
appropriate, and conduct a complete investigation of the incident unless
otherwise notified by the CSO. The initial report shall include as much of
the information specified in c(1) through c(8) above, as possible. Submis-
sion of the initial report shall not be deferred pending completion of the
contractor's investigation. In those instances when the contractor's
preliminary inquiry does not confirm a violation that requires a report to
the CSO, the contractor shall make a written record of the results of the
inquiry that includes the specific reasons for reaching the conclusion
that compromise did not occur. This record will be kept available for
review during the next government security inspection by the CSO. When
the individual culpability is established, a report shall be submitted in
accordance with paragraph 6b(1).
e. On completion of the investigation prescribed in paragraph d above,
a final report shall be submitted to the CSO referencing the preceding
preliminary report, and containing the following:
(1) any of the information required by paragraphs c(1) through
c(8) above that was not included in the initial report;
(2) the name and position of the.individual(s) who was primarily
responsible for the incident, including a record of prior loss, compromise,
41 7.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VII
I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
suspected compromise, or failure to comply with the requirements of this
manual for which the individual had been determined responsible;
(3) a statement as to the corrective action taken to preclude a
recurrence of similar incidents and the disciplinary action taken against the
responsible individual(s), if any; and
(4) specific reasons for reaching the conclusion that: (i) loss or
compromise occurred, (ii) compromise is suspected, (iii) the probability of
compromise is considered remote, or (iv) compromise did not occur.
8. Badges and Identification Cards.
a. Employee Badges and/or Identification Cards. Provided the con-
tractor deems it necessary, he or she may use color or symbol coded identifi-
cation badges or cards, or a combination of the two to assist in identifying
the level of security clearance of the holder and/or to indicate that the
holder is authorized to enter specified closed or restricted areas. However,
coded badges and cards shall be considered only as an aid in determining the
current level of PCL of the holder or the closed or restricted areas to which
the holder may have access. Release of classified information or entrance to
a closed or restricted area, on the sole basis of an identification badge or
card, is not authorized. Further, whenever a combination of badges or cards
is used, both must bear correlating data such as the same registration number
or the name of the holder. If identification cards or badges are used for
such purposes, the following shall apply.
(1) The minimum identifying information to be shown on an
employee's identification badge or card shall be the name and photograph of
the holder. Other descriptive information to identify the authorized holder
may be included on badges and/or cards at the option of the contractor.
(2) The words TOP SECRET, SECRET, or CONFIDENTIAL, or abbreviations
thereof, shall not appear on the badges or identification cards.
(3) For entry into a closed or restricted area or access to
classified information the contractor must establish some additional method
for verifying clearance and need-to-know to be used in collaboration with the
identification badge or card system. To the maximum extent possible, personal
recognition should be the basis for ensuring that the holder of the badge or
identification card has an appropriate PCL and need-to-know. When personal
recognition is not possible, the individual responsible for the security of
the closed or restricted area or holder of the classified information shall
verify the identity of the individual and determine whether the individual has
the appropriate PCL and need-to-know. This can be accomplished in a number of
ways, including access lists, verification of clearance status through the
office of the FSO, and the need-to-know through the prospective recipient's
supervisor. Where cipher or similar locks are used in closed or restricted
areas, the individual's knowledge of the cipher-lock combination, coupled with
his or her badge, would establish the individual's authority for entry into
the area.
(4) The make-up and construction of badges and identification dards
shall be designed to minimize the possibility of tampering or unauthorized
use.
0
42
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LOU DLLV.LL-M
(5) Badges and identification cards coded to indicate the level of
security clearance or access to closed or restricted areas, shall be rigidly
controlled and accounted for by the contractor by use of a numbering system.
Such controls shall apply equally to permanent and temporary cards and badges.
Badges and identification cards shall be promptly recovered or, when appro-
priate, recoded whenever an employee's requirement for entry to a closed or
restricted area no longer exists due to an internal transfer, termination of
employment, revocation of PCL, or for other appropriate reasons.
(6) Coded badges and cards shall be considered only as an aid in
determining the current level of PCL of the holder or the areas to which the
holder may have access. The clearance status of a person who holds such a
badge or identification card shall be verified when there is doubt as to the
validity of the badge or card.
(7) An employee badge and/or identification card may be issued to
persons referred to in paragraphs 37h and 41a.
b. Visitor Badges. A badge of such design as the contractor considers suit-
able may be issued to assist in identifying visitors who are authorized to be
present in closed or restricted areas. Visitors' badges, except for those issued
in accordance with paragraph a(7) above, shall not be used to indicate a visitor's
PCL status. Visitors' badges shall be recovered at the conclusion of their
visit, and they shall be rigidly controlled and accounted for by the
contractor.
c. Reporting. The procedure for use of badges or identification cards,
as authorized in paragraphs a and b above, shall be incorporated in the SPP.
In addition, the adoption of a new employee badge or identification card
system or any change in an existing badge or identification card system shall
be reported to the CSO in accordance with paragraph 6a(13).
d. Use on User Agency Installations. The use of badges or identification
cards to indicate the level of PCL of individuals performing duties within a
UA installation shall be subject to regulations which apply to the installation.
9. DoD Sponsorship of Meetings. Meetings described in paragraph 5q(3) which
serve a government purpose and at which adequate security measures have been
provided for in advance may be sponsored. As used herein, sponsorship shall
refer only to sponsorship for security purposes which shall require a DoD
Component to undertake all security responsibility and administration of the
meeting. However, in the case of a meeting as described in paragraph 5q(3),
the DoD Component having primary responsibility for the information involved
may designate a cleared DoD contractor to undertake overall responsibility for
security and administration.
a. Requests for Sponsorship. Contractors desiring to conduct meetings
requiring DoD sponsorship shall submit their requests to the DoD activity
having principal interest in the subject matter of each meeting. Only one
activity may sponsor a meeting on behalf of the DoD. Therefore, a request
shall be sent only to one DoD activity at a time. If that activity declines
to accept sponsorship, or if it is appropriate to change the sponsoring
agency, the request may be sent to another DoD activity having a principal
interest in the subject matter of the meeting. Such requests shall include
43 9.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
9
the details,concerning all prior requests. Approval and sponsorship by the
DoD will normally be granted only for a meeting conducted by a cleared DoD
contractor. However, a meeting conducted by an association, contractor,
institute, or society, whose membership is comprised primarily of cleared DoD
contractors, contractor employees, or DoD personnel, may be sponsored for
security purposes by the DoD, provided that a cleared contractor is designated
and accepts overall security responsibility for the meeting on behalf of the
association, society, or group. The request shall explain how the interests
of national defense will be served by disclosing classified information at the
meeting, and why the use of conventional channels for release of the
information will not accomplish the purpose of those interests. The request
shall also include a list of any foreign nationals or RFI's (including the
names of the individuals, firms, or governments) whose attendance at the
meeting is required.
b. Attendance of Foreign Nationals or RFI 16/. No invitation,
written or oral, shall be tendered to a foreign national, or to an RFI, to
attend any session of a meeting sponsored by a DoD activity, until approval
for his or her attendance has been received from the sponsoring activity. If
the attendance of a foreign national or RFI is required, a written request in
advance of the meeting shall be submitted and shall include:
(1) identification of the foreign national or RFI by name,
nationality, and government, for the individual or firm represented;
(2) sessions or subject matter for which access authorization is
desired (nationals or representatives of Designated countries shall be
excluded without exception, from attendance at any classified session); and
(3) subject titles of scientific, technical, and other papers
scheduled for presentation by any foreign national or representative of a
foreign national or RFI.
c. Location of Meetings. The sponsoring activity is responsible for
evaluating and approving the location proposed for the meeting.
(1) Meetings at which TOP SECRET or SECRET information is to be
disclosed shall be held only at a U.S. Government installation or at an
appropriately cleared facility of a contractor, which has adequate means for
safeguarding classified presentations. Under this criteria, the proposed site
would have to be located within the physical boundaries of a cleared facility
as indicated on the DD Form 374, "Facility Security Clearance Survey." An
auditorium, assembly hall, or gymnasium which is used primarily for campus
activities and public gatherings will not be approved for a classified meeting
at which TOP SECRET or SECRET information would be disclosed, even though it
is located on the campus of a college or university, portions of which are a
cleared facility.
16/ Foreign nationals granted LAA's, and RFI's cleared for access to
classified information under the DoD Industrial Security Program, are
-not subject to the limitation of paragraph 9b. However., persons
granted LAA's clearances are subject to the access limitations
prescribed in paragraph 31.3.
44
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
(2) Meetings at which information classified no higher than
CONFIDENTIAL is to be disclosed shall normally be held at a U.S. Government
installation or a cleared facility. However, if suitable facilities are not
available at a U.S. Government installation or contractor facility, the use of
other locations may be approved, provided adequate security can be maintained.
Contractor requests to use a location other than a U.S. Government
installation or contractor facility shall include:
(a) a justification of the proposed location;
(b) an explanation why a U.S. Government installation or
cleared facility cannot be used; and
(c) an explanation why separate classified and unclassified
sessions cannot be scheduled, thereby permitting the use of a U.S. Government
installation or a cleared facility for the classified portions of the meeting.
d. Security Procedures. When sponsorship of a meeting has been
accepted by a DoD activity, the contractor shall develop the security measures
and procedures to be used, and obtain the sponsoring activity's approval
thereof. The security measures shall include adequate arrangements for the
following.
(1) Security measures shall include strictly limiting attendance at
classified meetings to those persons whose presence is necessary in the
interest of national defense and who are otherwise eligible. This shall
include measures for the following.
(a) Security measures shall include determining and ensuring
that all persons selected and approved to attend classified sessions have been
granted a PCL for access to classified information equal to or higher than the
category of information to be disclosed, and have duties in connection with a
classified contract or program that requires such access in promoting the
interests of national defense. For contractor personnel, the certification of
PCL and need-to-know shall be accomplished as provided in paragraph f below.
(b) Security measures shall include review and approval by the
sponsoring activity of all announcements and invitations related to the
meetings and lists of attendees pertaining thereto. Announcements and
invitations shall be unclassified, and shall include the name of the
sponsoring activity and the date of the approval.
1 Notices and announcements of meetings, whether
classified, unclassified, or mixed, and not amounting to invitations to
attend, may be published publicly, provided classified information is not
included in such notices or announcements.
2 In the case of classified meetings, invitations to
attend (whether on an individual or class basis) shall not be sent to a person
known to be a national from or a representative of a Designated country.
3 In the case of mixed meetings, that is, those having
both classified and unclissified sessions, the restrictions as to invitations
to persons known to be nationals from, or representatives of, a Designated
45 9.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I V LI 1 I I
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
DOD 5ZZU.ZZ-M
country to attend are applicable to the classified session. As to the
unclassified session, such notice or invitation to attend shall not be sent
to persons known to be nationals from, or representatives of, a Designated
country, unless and until specific authorization, on an individual name basis,
has been made in advance by the Secretary or Head of the DoD Component.
(2) Security measures shall include safeguarding and controlling
the distribution of notes, minutes, summaries, recordings, proceedings, and
reports on the classified portions of the meeting. Such material shall
normally be sent only to those approved for attendance at the classified
sessions. However, the sponsoring activity may also authorize distribution to
others who are determined to be eligible for, and require access to, the
classified information involved. In any event, the material shall only be
sent to a U.S. Government activity or cleared contractor facility and marked
for the attention of the intended recipient, as provided for in paragraph 17k.
(3) Security measures shall include notifying each person who
presents or discloses classified information at the meeting of the security
limitations on disclosures for such reasons as the level of clearance or
need-to-know of members of the audience or other limitations established by
the U.S. Government.
(4) Security measures shall include ensuring the physical security
of the meeting site and the area used for classified sessions or displays.
This shall include provisions for guards, entrance controls, personnel
identification, storage facilities, and adequate security against unauthorized
access to, or illicit acquisition of, the classified information.
(5) Security measures shall include ensuring that attendance at a
meeting or session at which classified information is to be disclosed is
limited to persons whose names appear on an approved access list, and then
only on proper identification.
(6) Security measures shall include submitting the minutes,
summaries, recordings, proceedings, and reports of the meeting to the
sponsoring activity for security review and for approval of the proposed
distribution.
(7) Security measures shall include ensuring that individuals
making oral presentations at meetings provide classification guidance
sufficient to enable attendees to identify what information is classified or
unclassified and, if classified, at what category or categories of
classification.
e. Request for Disclosure Authority. A contractor desiring to disclose
classified information at a meeting as provided in paragraph 5q(3) or 5q(4)
shall:
(1) obtain prior written authorization for each proposed disclosure
of classified information from the contracting officer having jurisdiction
over the information involved -- if authorization for foreign nationals to
attend the meeting has been requested from the sponsor, that fact shall be
stated in the request for disclosure authority;
9. 46
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
.(2) furnish a copy-of the disclosure authorization to the U.S.
Government activity conducting or sponsoring the meeting; and
(3) furnish a written copy of the presentation, as made, to the
contracting officer and to the conducting or sponsoring activity, if they are
not one and the same.
f. Requests to Attend Classified Meetings. A contractor desiring to
have an employee attend a classified meeting shall:
(1) certify to the PCL status and need-to-know of the employee who
will attend the classified meeting, and
(2) forward the application or request to attend the meeting,
together with the necessary justification (see paragraph d(1)(a) above), to
the contracting officer for the classified contract under which access is
being justified, requesting that it be forwarded to the sponsoring activity.
However, where access is being justified under a UA program, rather than a
contract, the request shall be forwarded to the official of the UA activity
who is monitoring the contractor's participation in the program.
47 9.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section II. HANDLING OF CLASSIFIED INFORMATION
10. Classification.
a. The security classification (TOP SECRET, SECRET, or CONFIDENTIAL) *
to be applied to information involved in a UA classified contract will be
supplied to the contractor by the contracting officer or the designated
representative of the UA concerned. The DD Form 254 is the basic document *
used to convey the classification, regrading, downgrading, and declassifica- *
tion specifications for a classified contract. The DD Form 254, with any
necessary attachments or supplements, as appropriate (hereinafter referred
to only as the DD Form 254), provides the guidance to be used for this
purpose. The DD Form 254 identifies the specific items of classified
information involved in the contract that require security classification
protection. Contractors shall, to the extent practicable, advise and assist *
in the development of the original DD Form 254 and the security classifica- *
tion guide in order that their technical expertise may be utilized. By so *
doing, contractors are also in a better position to anticipate the security *
costs and requirements under the contract and may organize attendant
procedural aspects and physical plant layout accordingly. It is the
contractor's responsibility to understand and apply all aspects of the
classification guidance. Contractors may submit recommended changes for a
revised DD Form 254 if they encounter difficulty in applying or interpreting *
the DD Form 254 during any phase of the contract. Classification guidance *
is, notwithstanding the contractor's input, the exclusive responsibility of *
the User Agency, and the final determination of the appropriate classifies- *
tion rests with that agency. The DD Form 254 is a contractual specification *
necessary for performance on a classified contract. If a classified
contract is received without a DD Form 254, the contractor shall advise the *
UA concerned. The CSO may be requested to provide assistance, if desired. *
b. An original DD Form 254, which sets forth the classification
specifications or cites the classification guidance in item 15, is provided
to the contractor by the UA with an RFP, RFQ, IFS, or other solicitation and
with the award of a contract which will necessitate access to classified
information. A revised DD Form 254 will be issued at any time a change or
additional classification guidance is necessary. The UA reviews the existing
classification specifications periodically during the contract and at least
once every 2 years. When the biennial review establishes that no change
is necessary in the existing guidance, the prime contractor is advised in
writing. A final DD Form 254 is issued on final delivery of goods or
services or on termination of the contract when authority is granted under
paragraph 5m for the contractor to retain classified material originated by
the UA or generated by the contractor in the performance of the contract, or
when all classified material, for which retention authority would be required,
is ordered immediately declassified. A final DD Form 254 is not issued,
however, when authority is granted under paragraph 5m for the contractor to
retain only reference material (see paragraph 3bt).
49 O.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II V _1 II 1I ...
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. At the end of a retention period authorized under paragraph 5m, if
the contractor requests an extension of the retention period, the UA will
conduct a review to ensure that the contractor has a continued requirement for
possessing the classified material and to revise the existing classification
specifications as necessary to cover the classified material for which an
extension of retention authority is authorized.
d. The application of a security classification to information devel-
oped by the contractor shall be based on: (i) the classification guidance
furnished by the the contracting officer of the UA, in accordance with
paragraph a above, or (ii) the contractor's knowledge that such information
is in substance the same as, or would reveal, other information known to be
currently classified. Material developed by the contractor containing
classified information, or from which classified information could be
obtained, shall be marked in the manner prescribed in paragraph 11.
e. Contractors who have reason to believe that information is class-
ified improperly or unnecessarily, or believe that current security
considerations justify downgrading to a lower classification or upgrading to
a higher classification, or believe that the security classification guidance
provided is improper or inadequate, are required to discuss such problems
with the User Agency involved with a view to bring about correction. If a
solution is not forthcoming, and the contractor believes that corrective
action is still required, a formal challenge shall be made to the User Agency
that originally classified the information. Such challenges shall include a
description sufficient to identify the problem, the reasons why the
contractor believes that corrective action is required, and any recommenda-
tions for appropriate corrective action. In any case, the information in
question shall be safeguarded as required by this manual for its assigned or
proposed level of classification, whichever is higher, until action is
completed. If no answer is received within 45 days, the CSO may be requested
to provide assistance in obtaining a response. The fact that a contractor
has initiated such a challenge shall not in any way result in or serve as a
basis for any adverse action by the UA involved.
f. The contractor shall establish a procedure to ensure the following:
(1) In the case of a document, and except as specified in para-
graph (3) below, the manager or supervisor, whose signature or other form of
approval is required before the document may be issued, transmitted, or
referred outside of the facility, determines the necessity, currency, and
accuracy of the classification applied to that document.
(2) In the case of material other than a document, and except as
specified in paragraph (3) below, the manager or supervisor in charge at the
operational level where the material is being produced or assembled determines
the necessity, currency, and accuracy of the classification applied to that
material.
(3) In those situations involving the copying or extracting of
classified information from another document, or involving the reproduction
or translation of a whole clasiified document, the individual responsible
for such copying, extracting, reproduction, or translation marks the new
document or copy with the same classification as that applied to the
In SA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
information or document-fro t which the uew document or copy was prepared. -
However, if the contractor believes the classification marking is improper
in any respect, such marking shall be in accordance with a final disposition
of the contractor's action under paragraph 10e.
(4) Employees responsible for the currency, necessity, and accuracy
of the classification applied to information, under paragraphs (1) and (2)
above, are held to a minimum number consistent with operational requirements.
The number of such employees shall be reported to the CSO on request in
accordance with paragraph 6a(14).
(5) Questions on the currency of the classification of reference
material are referred as indicated in paragraph 60i.
g. Whenever a contractor develops an unsolicited proposal or originates
information not in the performance of a UA contract or program, the following
rules shall apply:
(1) If information is included in the proposal or other material
which the contractor identifies as already being classified, the proposal or
other material shall be marked with the appropriate classification in accord-
ance with paragraph 11.
(2) If the case does not fall within paragraph (1) above, and the
contractor believes that the proposal or other material contains information
which may or should be safeguarded, the contractor is requested to protect the
information as though classified at the appropriate level, until an advisory
classification opinion is obtained from a UA which has an interest in the
subject matter. In any such case, the following protective marking, or a
similar marking which clearly conveys the same meaning, will be used:
Classification determination pending.
Protect as though classified
(CONFIDENTIAL, SECRET, or TOP SECRET)
This marking shall appear conspicuously at least once on the material, but it
is not necessary to mark the material further in accordance with paragraph 11
until the advisory classification opinion is received. In addition, if appli-
cable, contractors are not precluded from designating such information as
company private or proprietary information.
(a) Pending determination by the UA, the following
precautionary measures should be taken in regard to safeguarding such
information:
minimum number
1 Access to the information
of personnel practical.
should be limited to the
2 Persons selected to have access to the information
should be limited to U.S. citizens or immigrant aliens who are known to be
trustworthy. They should be advised of the importance of the information.
3 When not in use, documents containing the information
should be stored in a secure container.
51 10.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H I III 1 J I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
4 In forwarding the information between persons or loca-
tions, a secure method of transmission should be used.
5 Reproduction of the information should be kept to a
minimum.
(b) It is the policy of the U.S. Government not to classify
information over which it has no jurisdiction. The proposal or other material
shall not be classified by the UA: (i) unless it incorporates classified
information to which the contractor was given prior access, or (ii) unless the
government first acquires a proprietary interest in the information.
h. The contractor shall provide security classification guidance to
employees performing in a sales or technical capacity and under a classi-
fied contract outside of the U.S.
i. The fact that information currently classified by a UA has been
disseminated by a public medium of communication does not automatically mean
that it has been declassified. Classification shall be continued until
advised to the contrary by the UA. Questions as to the propriety of continued
classification in these cases should be brought to the immediate attention of
the contracting officer.
11. Marking.
a. General. Classification designation by physical marking, notation,
or other means serves to warn and to inform the holder what degree of protec-
tion against unauthorized disclosure is required for that information or
material. Other notations facilitate downgrading, declassification, and aid
in derivative classification actions. Therefore, it is essential that all
classified information and material be marked in such a manner that it is clear
to the holder what level of classification is assigned to the informa-
tion or material, exactly what portions of the information or material contain
or reveal classified information, how long the protection is required, and any
other additional markings required for protection of the information or
material.
b. Marking Requirements for Information and Material. The markings
shown in.paragraphs (1) through (8) below are required for all classified
information, regardless of the form in which it appears. Some material, such
as documents, letters, and reports, can be marked easily with the appropriate
markings. Marking other material, such as equipments, ADP media, and slides,
will be more difficult due to size or other physical characteristics. Since
the purpose of the markings is to warn the holder that the information
requires special protection, it is necessary that all classified material be
marked with the appropriate markings to the fullest extent possible to ensure
that it is afforded the necessary safeguards.
(1) Identification Markings. All classified material shall be
marked to show: (i) the name and address of the facility responsible for its
preparation, and (ii) the date of preparation. These markings are required on
the face of all classified documents.
11. 52
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
. (2) Overall -Markings,- The-overall classification of a document, Or
any copy or reproduction thereof, shall be conspicuously marked or stamped at
the top and bottom on the outside of the front cover (if any), on the title
page (if any), on the first page, and on the outside of the back cover (if
any). If the document does not have a back cover, the outside of the back or
last page, which may serve as a cover, may also be marked at the top-and
bottom with the overall classification of the document. The markings shall be
stamped, printed, etched, written, engraved, painted, or affixed by means of a
tag, sticker, decal, or similar device on classified material, other than
documents, and on containers of such material, if possible. If marking the
material or container is not practical, written notification of the appro-
priate markings shall be furnished to recipients. Copies of documents shall
include the appropriate markings on the documents themselves.
(3) Page Markings. Interior pages of classified documents shall be
conspicuously marked or stamped at the top and bottom with the highest classi-
fication of the information appearing thereon, or the designation UNCLASSI-
FIED, if all the portions on the page are UNCLASSIFIED. Alternatively, the
overall classification of the document may be conspicuously marked or stamped
at the top and bottom of each interior page, when necessary to achieve produc-
tion efficiency and so that the particular information to which classification
is assigned is adequately identified, in accordance with paragraph b(5) below.
In any case, the classification marking of a page shall not supersede a lower
level of classification indicated by a portion marking applicable to informa-
tion on that page.
(4) Component Markings. The major components of complex documents
are likely to be used separately. In such instances, each major component
shall be marked as a separate document utilizing the classification marking
requirements of this manual. Examples include: (i) each annex, appendix,
or similar component of a plan, program, or project description; (ii)
attachments and appendices to a letter; and (iii) each major part of a report.
If an entire major component is UNCLASSIFIED, the first page of
the component may be marked at the top and bottom with the designation
"UNCLASSIFIED" and a statement included, such as, "All portions of this
(annex, appendix, etc.) are UNCLASSIFIED." When this method of marking is
used, no further markings are required on the unclassified major component.
(5) Portion Markings. Each section, part, paragraph, or similar
portion of a classified document shall be marked to show the highest level
of its classification, or that such portion is unclassified. Portions of
documents shall be marked in a manner that eliminates doubt as to which of
its portions contain or reveal classified information. For the purpose of
applying these markings, a portion or paragraph shall be considered a distinct
section or subdivision of a chapter, letter, or document dealing with a
particular point or idea which begins on a new line and is often indented.
Classification levels of portions of a document shall be shown by the
appropriate classification symbol placed immediately following the portion's
letter or number, or in the absence of letters or numbers, immediately before
the beginning of the portion. In marking portions, the parenthetical symbols
"(TS)" for TOP SECRET, "(S)" for SECRET, "(C)" for CONFIDENTIAL, and "(U)" for
UNCLASSIFIED shall be used. When appropriate, the symbols "RD" for RESTRICTED
DATA and "FBI)" for FORMERLY RESTRICTED DATA shall be added, for example,
"(S-RD)" or "(C-FBI))." In addition, portions that contain Critical Nuclear
53
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 V 111 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M ,
Weapon Design Information (CNWDI) will be marked "(N)" following the
classification, for example, "(TS-RD)(N)."
(a) Portions of U.S. documents containing foreign government
information shall be marked to reflect the country or international organiza-
tions of governments of origin as well as the appropriate classification, (for
example, "(NATO-S)" or "(U.K.-C)," or "(NATO-R)" for NATO-RESTRICTED), except
where such markings would reveal that the information is foreign government
information, when that fact must be concealed, or if a confidential source or
relationship not otherwise evident in the document is revealed. Where a UA
determines that this information would be revealed, the classification
specifications and source documents furnished to contractors will not bear
this information, and in these cases contractors will not identify the foreign
governments in any classified material generated. See paragraph e below for
other marking requirements for foreign government information.
(b) When illustrations, photographs, figures, graphs,
drawings, charts, or similar portions are contained in classified documents
they shall be marked clearly to show their classified or unclassified status.
In this instance, such markings shall not be abbreviated and shall be
prominent and placed within or contiguous (touching or near) to such a
portion. Captions of such portions shall be marked on the basis of their
content alone by placing the symbol "(TS)," "(S)," "(C)," or "(U)" immediately
preceding the caption.
(c) If, in an exceptional situation, parenthetical marking in
the portions is determined to be impractical, the classified document shall
contain a description sufficient to identify the exact information that is
classified and the classification level(s) assigned to it. For example, each
portion of a document need not be separately marked if all portions are
classified at the same level, provided a full explanation is included in the
document.
(d) When elements of information in one portion or paragraph
require different classifications, but segregation into separate portions or
paragraphs would destroy continuity or context, the highest classification
required for any item shall be applied to that portion or paragraph.
(6) Subject and Title Markings. Subjects and titles of documents
shall be selected, if possible, so as not to require classification. A
classified subject or title shall be marked with the appropriate symbol (TS),
(S), or (C) placed immediately following and to the right of the item. An
unclassified subject or title shall be marked with a (U) placed immediately
following and to the right of the item. When applicable, other appropriate
symbols, for example, "(RD)," "(FRD)," "(N)," or "(NATO)" shall be added.
(7) Downgrading/Declassification and "Classified by" Markings.
Procedures for marking downgrading and declassification instructions, and for
completion of the "Classified by" line are prescribed in appendix II. These
markings shall be placed either on the cover, first page, title page, or in a
similarly prominent position on classified documents.
(8) Additional Markings. In addition to the markings specified
above, classified material shall be marked, if applicable, with one or more
11. SLL
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
of the notations prescribed below, or other markings specified by a UA. The
appropriate notation shall be printed, stamped, typed, or otherwise affixed
conspicuously at least once on classified material possessed 1/, prepared, or
reproduced by the contractor. In addition, when a copy, extract, or
paraphrase of a document contains classified information, or when a page,
chapter,-or other component is separated from such a document, the extract or
component shall also be conspicuously marked at least once with the
appropriate notation. In the case of documents, these warning notices shall
be conspicuously marked on the outside of the front cover (if any) or on the
first page if there is no front cover. When display of warning notices on
other materials is not feasible, the warnings shall be included in the written
notification provided to recipients.
(a) RESTRICTED DATA Notation. The following notation shall be
affixed on all material which contains "RESTRICTED DATA":
RESTRICTED DATA
This material contains RESTRICTED DATA as defined
in the Atomic Energy Act of 1954. Unauthorized disclosure
subject to administrative and criminal sanctions.
(b) FORMERLY RESTRICTED DATA Notation. Except when the
"RESTRICTED DATA" notation is used, all material containing information in
the "FORMERLY RESTRICTED DATA" category shall be marked with the following
notation:
FORMERLY RESTRICTED DATA
Unauthorized disclosure subject to administrative
and criminal sanctions. Handle as RESTRICTED DATA in foreign dissemination.
Section 144 b, Atomic Energy Act 1954.
(c) INTELLIGENCE SOURCES OR METHODS Notation. Classified
information or material involving intelligence sources or methods and subject
to specific dissemination controls shall be marked with the following warning
notice 2/:
WARNING NOTICE
INTELLIGENCE SOURCES OR
METHODS INVOLVED
(d) DISSEMINATION AND REPRODUCTION NOTICES. From time to time
certain UA's may promulgate certain classified information, which the govern-
ment agency originating the material has determined should be subject to
special dissemination or reproduction limitations or both. Statements sub-
stantially as follows will be included on the front cover of such documents:
1/ Classified material that is already marked with officially prescribed
additional warning notices that convey in substance the same meanings as
those prescribed in paragraph b(8) need not be re-marked.
2/ Existing stamps and preprinted labels containing the caveat, "Warning
Notice -- Intelligence Sources and Methods Involved," may be used until
a replacement stamp is obtained or the supply of labels is exhausted.
ce 11.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000200350006-4
H 1. I.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
REPRODUCTION REQUIRES APPROVAL OF
ORIGINATOR OR HIGHER GOVERNMENT AUTHORITY
(Reproduction of all portions of the information contained in such documents is
absolutely prohibited without the permission of the originating office or higher
government authority.)
FURTHER DISSEMINATION ONLY AS
AUTHORIZED BY CONTRACTING
OFFICER
(Further dissemination within the receiving contractor facility is restricted to
persons authorized by the addressee. Dissemination outside the facility is
prohibited without the permission of the contracting officer.)
(e) FOREIGN GOVERNMENT INFORMATION. This marking is used on
U.S. documents containing "FOREIGN GOVERNMENT INFORMATION" to ensure that such
information is not declassified prematurely or made accessible to nationals of
a third country without the consent of the originator.
(f) THIS DOCUMENT CONTAINS NATO INFORMATION. This marking is
used on U.S. documents which contain extracts from NATO documents to ensure
that such information is not declassified or made accessible to nationals of
non-NATO countries without NATO approval.
c. Marking Specific Types of Material. The following procedures for
marking specific types of material are not all inclusive. Due to the many
variations that may occur in the preparation of classified materials, every
possible marking situation cannot be addressed. These procedures are for
marking various types of material, which are most often encountered by
contractors, and may be varied to accommodate the physical characteristics
of the material and organizational and operational requirements.
(1) Artwork. Original artwork shall have the overall security
classification stamped or conspicuously marked in the top and bottom margins
of the mounting board and on all overlays and cover sheets. Other markings
specified in paragraphs b(1) through (8) above also shall be included on such
documents, as applicable.
(2) Charts, Maps, Drawings, and Tracings. The appropriate
classification markings for the legend, title, or scale block shall be shown
in the legend, title, or scale block itself, or in such a manner as to
differentiate between the overall classification assigned to the document and
any classification assigned to the legend or title itself. The overall
classification of the document shall be marked or stamped at the top and
bottom of each document. Any identifiable portions of such documents shall be
marked in the manner prescribed in paragraph b(5) above, if possible. When
the customary method of folding or rolling charts, maps, drawings, or tracings
would cover the classification markings, additional classification markings
shall be placed so as to be clearly visible when the document is folded or
rolled. Other markings specified in paragraphs b(1) through (8) above also
shall be included on such documents, as applicable.
11 r.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
? (3)- Decks of Automatic Data Processing Punched Cards. When a
deck of classified AIS punched cards is handled and controlled as a single
document, only the first and last cards of the deck require the overall
classification markings as specified in paragraph b(2) above. An additional
card shall be added (or the job control card modified) to identify the
contents of the deck, and to show the appropriate markings specified in
paragraphs b(1) through (8) above. Individual cards removed for separate
processing or use, and not immediately returned to the deck, shall be
protected to prevent compromise of any classified information contained
therein, and shall be individually marked to show the appropriate markings
specified in paragraphs b(1) through (8) above. Alternatively, a grouping
of cards removed for separate processing or use, and not immediately
returned to the deck, may be handled, controlled, and marked as a separate
deck of cards.
(4) Continuous Form (fan folded or rolled) Documents Produced
by AIS Equipment. When a continuous form document is handled and con-
trolled as a single document, that is, its pages are connected, the
following minimum markings are allowable:
(a) Conspicuously mark the overall classification at the
top and bottom of the first and last page and on the front and back cover,
if any.
(b) Internal pages (those between the first and last page
in a continuous form document) do not require any classification markings.
(c) Other appropriate markings as required by paragraph
b(1), (5), (6), (7), and (8) above shall be shown on the document and may
be applied by the equipment or by other comparable means.
When a continuous form document is broken by removal of a single
page(s), each page(s) removed shall be marked with all the appropriate
markings specified by paragraphs b(1) through (8) above.
When separate continuous form documents are created as a result of
removing a single page(s), or otherwise breaking the continuous form, each
document created shall be handled, controlled, and marked as a single
document.
(5) Files, Folders, or Groups of Documents. Files, folders,
binders, envelopes, and other items, containing classified documents, when
not in secure storage, shall be conspicuously marked according to the highest
classification of any classified document included therein. Classified
document cover sheets may be used for this purpose.
(6) Messages.. Electronically transmitted messages (that is, those
transmitted via authorized CRYPTOSYSTEME) shall bear appropriate markings as
specified in paragraphs b(1) through (8) above, except as noted herein. The
first item of information in the text shall be the overall classification of
57 11.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
j.LH1I.L I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
the message. The message also shall show the date or event for declassifica-
tion or the notation "Originating Agency's Determination Required" or "OADR,"
and downgrading action, if applicable. The "Classified by" line information
is not required. Portions shall be marked in the manner required for other
documents. When messages are printed by an automated system, all markings may
be applied by that system, provided that the classification markings are
clearly distinguished from the printed text. (NOTE: The highest level
official identified on the message as the sender, or in the absence of such
identification, the highest level official at the facility originating the
message, is deemed to be the classifier of the message. The originator is
responsible for maintaining adequate records to show the source of an assigned
derivative classification.)
(7) Microforms. Microforms are copies usually produced on trans-
parent or opaque materials in sizes too small to be read by the unaided
eye. Accordingly, the appropriate markings as specified in paragraphs b(1)
through (8) above shall be conspicuously marked on the microform medium or
its container, so as to be readable by the unaided eye. These markings shall
also be included on the image so that when the image is enlarged and displayed
or printed, the markings will be conspicuous and readable. The markings
specified in paragraph b(7) above may be abbreviated. Further markings and
handling shall be as appropriate for the particular microform involved. For
example, roll film microforms (or roll microfilm employing 16, 35, 70, or 105
mm films) may generally be handled as provided for roll motion picture films,
and decks of "aperture cards" may be handled as decks of automatic data
processing punched cards. Whenever possible, microfiche, microfilm strips, and
microform chips shall be handled in accordance with this paragraph.
(8) Motion Picture Films. Classified motion picture films and
video tapes shall be marked at the beginning and end of each reel by titles
bearing the appropriate classification and applicable associated markings.
Such markings shall be visible when projected. Motion picture film and video
tape containers shall bear conspicuous classification, declassification, and
if applicable, downgrading markings. Other markings specified in paragraphs
b(1) through (8) above shall also be applied, if applicable.
(9) Photographs. Photographs shall be marked in such a manner so
that a recipient or viewer will know that information of a specified level of
classification is involved. Negatives and positives shall be marked, whenever
practical, with the appropriate classification and applicable associated
markings. Roll negatives or positives may be so marked at the beginning and
end of each strip. Containers for negatives and positives shall be
conspicuously marked with the highest level of classification of their
contents. Other markings specified in paragraphs b(1) through (8) above shall
also be applied, if applicable. All prints and reproductions shall be
conspicuously marked with the appropriate markings, as specified in paragraphs
b(1) through (8) above, on the face side of the print, if possible. Where
such markings cannot be applied to the face side, they may be stamped or
marked on the reverse side, or affixed by pressure tape label, stapled strip,
or other comparable means. (NOTE: When self-processing film or paper is used
11. SR
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
to .photograph or reproduce classified information, all parts of the last -
exposure shall be removed from the camera and destroyed as classified waste,
or the camera shall be protected as classified information.)
(10) Recordings. Magnetic, electronic, or sound recordings shall
contain a clear statement of the overall classification at the, beginning and
end of the recording which will provide adequate assurance that any listener
or receiver will know that classified information is involved. Containers for
recordings shall be conspicuously marked with the appropriate classification
and applicable associated markings, as specified in paragraphs b(1) through
(8) above.
(11) Removable Automatic Data Processing and Word Processing
Storage Media.
(a) External. Removable information storage media and
devices, employed with AIS's shall bear external markings clearly indicat-
ing the appropriate markings as specified in paragraphs b(1) through (8)
above. Included are media and devices that store recorded information in
analog or digital form, and are generally mounted or removed by the users or
operators. Examples include magnetic tape reels, cartridges, and cassettes;
removable disks, disk cartridges, disk packs, and diskettes; paper tape
reels; and magnetic cards.
(b) Internal. In addition, AIS's employing such media
shall provide for internally recorded security markings to ensure that
classified information contained therein, when reproduced or generated,
will bear appropriate markings as specified in paragraphs b(1) through (8)
above. (Existing AIS's previously approved by the CSO shall provide this
internal classification identification where the capability exists for
implementation without extensive system modification. Alternately, where
extensive system modification would be required for existing systems, an
exception may be made by the CSO, provided procedures are established to
ensure that users and recipients of the media, or the information therein,
are clearly advised as to the appropriate markings for the contents.
Requirements for the security of nonremovable AIS storage media and
clearance or declassification procedures for various AIS storage media
are contained in section XIII.)
(12) Translations. Translations of U.S. classified information
into a language other than English shall be marked to show the U.S. as the
country of origin, with the appropriate U.S. markings as specified in
paragraph b(1) through (8) above, and the foreign language equivalent thereof
(see appendix XIV of this manual).
(13) Transmittal Documents. A transmittal document, including
endorsements and comments when such are added to the basic communication,
shall carry on its face a prominent notation as to the highest classification
of information transmitted by it and a legend showing the classification, if
any, of the transmittal document, endorsement, or comment standing alone. For
example, an unclassified document that transmits as an attachment a classified
59 H.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H. H.L. ,Jjt11 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
document shall bear a notation substantially as follows: "Unclassified when
Separated from Classified Enclosures."
(14) Transparencies and Slides. Applicable classification markings
shall be shown clearly on the image of each transparency or slide, and on its
border, holder, or frame. Other applicable markings as specified in para-
graphs b(1) through (8) above shall be shown on the border, holder, or frame,
if possible, or in the image area, in accompanying documentation, or other
written notification. When a set of transparencies or slides is handled and
controlled as a single document, only the title slide or transparency requires
the other applicable markings. Slide and transparency storage containers
shall also be marked with the appropriate markings as specified in paragraph
b(1) through (8) above.
(15) Working Papers. Working papers and material such as notes,
drafts, and drawings accumulated or created in the preparation of a finished
document, shall be dated when created and marked in the same manner as
prescribed in paragraphs b(2) and (3) above. The remainder of the markings
required by paragraphs b(1) through (8) above need not be affixed to the
material, until it is entered into the accountability records in accordance
with paragraph 12, made a part of a permanent record, or dispatched outside
the facility.
(16) Miscellaneous Material. Unless a requirement exists to retain
material such as rejects, typewriter ribbons, carbons, and similar items for a
specific purpose, there is no need to mark, stamp, or otherwise indicate that
the information is classified. (NOTE: Such material developed in connection
with the handling, processing, production, and utilization of classified
information shall be handled in a manner that ensures adequate protection of
the classified information involved and destruction at the earliest practical
moment.)
d. Marking of Regraded Documents and Material. Whenever classified
information is downgraded, declassified, or upgraded, the material shall be
promptly and conspicuously marked to indicate the change 3/.
3/ In the interest of providing quick and efficient service on requests for
classified documents, DTIC re-marks downgraded or declassified documents to
reflect such action only on the front and back covers and the title, first,
and back pages. A notice will be affixed by DTIC to the front cover or the,
title page of such documents indicating that it is the responsibility of the
recipient (the contractor who requested the document) to complete the
re-marking of the regraded document in accordance with this paragraph.
Documents originally marked under the provisions of previous E.O.'s may
contain pages which do not bear any classification markings. Before
extracting or reproducing the information from these pages, recipients
should direct any questions they may have concerning the classification of
an individual page, chapter, section, and the like, to the originator of
the document. ?
11 An
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
. (1) Automatic Downgrading or Declassification Actions. Holders
of classified material may take automatic downgrading or declassification
actions, as specified by the markings on the material, without further
authority for the action. All old classification markings shall be canceled
and the new markings substituted, whenever practical 4/. In the case of
documents, as a minimum, the outside of the front cover (if any), the title
page (if any), the first page, and the outside of the back cover (if any),
must reflect the new classification markings, or the designation UNCLASSIFIED.
Other material shall be re-marked by the most practical method for the type of
material involved to ensure that it is clear to the holder what level of
classification is assigned to the material. Old markings shall be canceled,
if possible, on the material itself. If not practical, the material may be
marked by affixing new decals, tags, stickers, and the like to the material
or its container.
(2) Other than Automatic Downgrading or Declassification Actions.
When contractors are notified of downgrading or declassification actions
that are contrary to the markings shown on the material, the material shall
be re-marked to indicate the change. All old classification markings shall
be canceled and the new markings substituted, whenever practical 4/. In the
case of documents, as a minimum, the outside of the front cover (if any), the
title page (if any), the first page, and the outside of the back cover (if
any) shall reflect the new classification markings or the designation
UNCLASSIFIED. In addition, the material shall be marked to indicate the
authority for the action, the date of the action, and the identity of the
person or contractor taking the action. Other holders shall be notified if
further dissemination has been made by the contractor.
(3) Upgrading Action. When a notice is received to upgrade
material to a higher level, for example from CONFIDENTIAL to SECRET, or from
UNCLASSIFIED to CONFIDENTIAL, the new markings shall be immediately entered on
the material, in accordance with the notice to upgrade, and all the superseded
markings should be canceled, if applicable. Other holders shall be notified,
if further dissemination of the material has been made by the contractor. If
contractor-generated material is inadvertently distributed outside the
facility without the proper classification assigned to it, or without any
markings to identify the material as classified, the following procedures
shall apply.
4/ When the volume of material is such that prompt re-marking of each
classified item cannot be accomplished without unduly interfering with
operations, the custodian may attach downgrading and declassification
notices to the inside of the file drawers or other storage container in
lieu of the re-marking otherwise required. Each such notice shall specify
the authority for the downgrading or declassification action, the date of
the action, and the storage container to which it applies. When documents
or other material subject to downgrading or declassification are withdrawn
from the container solely for transfer to another, or when the container is
transferred from one place to another, the transfer may be made without
re-marking, if the notice is attached to the new container or remains with
each shipment. When the documents or material are withdrawn for use or for
transmittal outside the facility, they shall be re-marked in accordance
with paragraph d(1) or d(2) above.
61 11.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I] _I 11 1 1. I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(a) Determine that all holders of the material are authorized
access to it.
(b) Determine that control of the material has not been lost
by the communication. (NOTE: When both these conditions are determined to
exist, then promptly notify 5/ all holders of the proper classification and
markings applicable to the material. If it is found that control of the
material has been lost or that unauthorized personnel have had access to it,
a report of the compromise to the CSO under the provisions of paragraph 7d is
required.)
e. Marking of Foreign Classified Material. Foreign classified material
shall be marked in accordance with instructions received from the foreign
contracting authority, the CSO, or the UA. In any case, if the classifica-
tion and the country of origin are in a language other than English, the
appropriate equivalent U.S. classification and the country of origin will be
marked on the foreign classified material. Except for the foreign security
classification designation RESTRICTED, foreign security classification
designations, including those of international organizations of governments,
such as NATO, generally parallel U.S. classification designations. A table of
equivalent classifications is contained in appendix XIV. Many foreign govern-
ments and international organizations, such as NATO, use a fourth security
designation identified as RESTRICTED to denote a foreign requirement for
security protection of a lesser degree than CONFIDENTIAL. Documents received
by contractors that are marked with any of the classification designations
listed in the last column of appendix XIV shall be marked RESTRICTED together
with the country of origin and protected in all respects in the same manner as
U.S. CONFIDENTIAL, except that foreign RESTRICTED material may be stored in
locked filing cabinets, desks, or other similarly closed spaces that will
prevent access by unauthorized persons.
(1) When foreign government information is incorporated in a
contractor-generated document, that document shall be identified in a
manner to ensure that such information is not declassified prematurely or
made accessible to nationals of a third country without consent of the
originator. This requirement may be satisfied by marking the face of the
document with the notation "FOREIGN GOVERNMENT INFORMATION" or with another
marking that otherwise indicates that the information is foreign government
information. Portions of documents containing foreign government information
shall be marked as specified in paragraph b(5)(a) above. All such documents
5/ In the case of material being upgraded, the contractor's written notice
shall not be classified, unless the notice contains additional information
warranting classification. In the case of material which was inadvertently
released as UNCLASSIFIED, the contractor's written notice shall be classi-
fied CONFIDENTIAL, unless the notice contains additional information war-
ranting a higher classification. The notice should cite the applicable
DD Form 254 or other classification guide on the "Classified by" line and
be marked with a declassification instruction such as, "UNCLASSIFIED WHEN
UPGRADING ACTION IS COMPLETED."
1 1 . 62
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD LLU.LZ?Ln
containing foreign government information shall include on the "Declassify on"
line the following notation, "ORIGINATING AGENCY'S DETERMINATION REQUIRED," or
"OADR," unless the foreign entity has specified or agreed to a date or event
for declassification.
(2) U.S. documents which contain extracts of NATO classified
information shall be marked on the face of the document with the following
notation: "THIS DOCUMENT CONTAINS NATO CLASSIFIED INFORMATION." This
notation is required to ensure that NATO information is not declassified or
made accessible to nationals of non-NATO countries without NATO approval.
Portions of such documents shall be marked "NATO" with the appropriate
classification, for example, (NATO-S) or (NATO-C). The "Declassify on" line
shall be completed with the notation, "ORIGINATING AGENCY'S DETERMINATION
REQUIRED," or "OADR," unless the foreign entity has specified or agreed to
a date or event for declassification. The marking "FOREIGN GOVERNMENT
INFORMATION" is not required on these documents.
f, Marking Wholly Unclassified Material. Normally, wholly UNCLASSIFIED
material will not be marked or stamped "UNCLASSIFIED," unless it is essential
to convey to a recipient of such material that: (i) the material has been
examined specifically with a view to impose a security classification and has
been determined not to require classification, or (ii) the material has been
reviewed and has been determined to no longer require classification and it is
declassified.
g ?
Marking Compilations.
(1) Documents. In some instances, certain information that would
otherwise be unclassified when standing alone may require classification when
combined or associated with other unclassified information. When classifica-
tion is required to protect a compilation of such information, the overall
classification assigned to the document shall be conspicuously marked or
stamped at the top and bottom of each page and on the outside of the front
and back covers, if any. The reason for classifying the compilation shall be
stated at an appropriate location at or near the beginning of the document.
In this instance, the portions of a document classified in this manner need
not be marked.
(2) Portions of a Document. If a classified document contains
certain portions that are unclassified when standing alone, but classified
information will be revealed when they are combined or associated, those
portions shall be marked as unclassified, the page shall be marked with
the highest classification of any information on the page, and a statement
shall be added to the page, or to the document, to explain the classifi-
cation of the combination or association to the holder. This method of
marking may also be used if classified portions on a page, or within a
document, will reveal a higher classification when they are combined or
associated than when they are standing alone.
12. Record of Classified Material.
a. Accountability Records. The contractor shall maintain, at one
or more control stations, an accountability record of all TOP SECRET and
63 12.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
SECRET material, and CRYPTO, regardless of classification. The record
shall include all such classified material received or produced by, or in
the possession or custody of, the contractor and shall reflect as a minimum:
(i) the date of receipt or origin, (ii) the activity from which received or
by which originated, (iii) the classification of the material, (iv) a brief,
unclassified description of the material and (v) the disposition of the
material and the date thereof (that is, destroyed, downgraded to CONFIDENTIAL,
declassified, or dispatched outside the facility). These records shall be
retained by the contractor for a minimum of 3 years for TOP SECRET material,
special access material, and CRYPTO, regardless of classification; and for
SECRET material for 2 years from the date the last item recorded thereon was
destroyed, downgraded to CONFIDENTIAL, declassified, dispatched outside the
facility, or transferred to another accountability record.
b. Inventory/Accounting of Classified Material. When directed by a
Director of Industrial Security, the contractor shall make an inventory and
accounting of all TOP SECRET and SECRET material, and CRYPTO, regardless of
classification, and shall submit a report of all unresolved discrepancies to
the CSO. The inventory and accounting shall consist of the actual sighting of
each item listed in the accountability records or an examination of the
evidence of its proper disposition (the receipt, certificate of destruction,
authorization to terminate from accountability, or record of downgrading or
declassification); and an examination of the contents of all containers
authorized for storage of classified material to ensure that all TOP SECRET
and SECRET material, and CRYPTO, regardless of classification, has been
entered into the accountability records.
c. Receipt and Dispatch Records. In addition to the accountability
records required in paragraph a above, the contractor shall maintain a record
at one or more control stations of all nonaccountable classified material
received by, or dispatched from, the facility. This record shall reflect as a
minimum: (i) the date of receipt or dispatch, (ii) the activity from which
received or to which dispatched, (iii) the classification of the material, and
(iv) a brief, unclassified description of the material. These records shall
be retained by the contractor for a minimum of 2 years from the date of the
last entry. However, if the contractor combines this record of receipt and
dispatch with the accountability records prescribed in paragraph a above for
TOP SECRET material, special access material, and CRYPTO, regardless of
classification, the 3-year retention period shall apply.
d. Control Station Personnel. Employees designated by the contractor
to operate a control station shall be cleared at the same level as the
facility at which they are assigned. However, such personnel will be required
to have a TOP SECRET clearance only if the person's duties afford him or her
access to, possession of, or custody of TOP SECRET material.
e. Receipt of Classified Material. When classified material is received
at the facility, either by mail, bulk Shipment, or messenger, the following
controls shall apply.
(1) All classified material shall be delivered unopened to person-
nel designated by the contractor to receive it at the control station(s). In
addition, when U.S. Registered Mail, U.S. Express Mail, U.S. Certified Mail,
or classified material delivered by messenger is not received directly by the
12. 64
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
designated control station personnel, procedures shall be established to
ensure that such mail is received by appropriately cleared and authorized
personnel, for delivery with the inner container unopened to the control
station(s). In effect, all contractor personnel who handle U.S. RegisterAd
Mail, U.S. Express Mail, or U.S. Certified Mail shall be appropriately
cleared.
(2) The package shall be examined for any evidence of tampering and
the classified contents shall be checked against the receipt. Evidence of
tampering shall be reported immediately to the CSO, in accordance with para-
graph 6a(11). Discrepancies in the contents of a package or absence of a
receipt for TOP SECRET or SECRET material, and CRYPTO, regardless of classifi-
cation, shall be reported immediately to the sender. If the shipment is in
order, the receipt shall be signed and returned to the sender. For purposes
of positive identification, the name of the employee signing the receipt shall
be printed, stamped, or typed on the receipt. In those special cases where
the sender includes a receipt form with CONFIDENTIAL material, the receiver
shall execute the receipt and return it to the sender, if the contents of the
package are in order.
f. Production of Classified Material. When a contractor produces
TOP SECRET or SECRET material, and CRYPTO, regardless of classification,
accountability shall be established, as follows.
(1) TOP SECRET Documents and CRYPTO Documents, Regardless of
Classification. Such documents shall be entered into the control station
accountability records when the first of any of the following events occurs:
(i) the document is retained after the next successive stage in its develop-
ment is completed (for example notes converted to draft, final draft placed on
masters, or photographic prints developed from negatives); (ii) the document,
including classified working papers and drafts, is retained for more than 30
days from the date of origination; (iii) the document is reproduced for
internal purposes (for example, draft review or coordination prior to
preparation of final copy); or (iv) the document, regardless of its stage of
development, is transmitted outside of the facility on a temporary or
permanent basis.
(2) SECRET Documents. Such documents shall be entered into the
control station accountability records, when the first of any of the following
events occurs: (i) the document is retained as a completed document (includ-
ing working papers) in excess of 30 days from the date of completion; (ii) the
document is reproduced for internal purposes; (iii) the document is retained
as a partially completed document on discontinuance of the work; or (iv) the
document, regardless of its stage of development, is transmitted outside of
the facility on a temporary or permanent basis.
(3) Other Material. TOP SECRET and SECRET material, and CRYPTO,
regardless of classification, in other than documentary form, shall be entered
into the control station accountability records, when the first of any of the
following events occurs: (i) the material reaches the final stage in the
fabrication or manufacturing process; (ii) the material is retained for more
than 30 days from the date of origination; or (iii) the material, regardless
of its stage of development, is transmitted outside of the facility on a
temporary or permanent basis.
65
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
12.
11 1 _I LI L_L I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(4) Incorporation of Classified Material. When a classified
document or other material is joined to, incorporated in, or otherwise made
a part of another classified document or item of material, accountability
for the incorporated document or item of material shall be terminated, and
accountability for the document or item of material in which it was incor-
porated shall be established. The control station records shall be posted
accordingly. Similarly, when a classified document is disassembled for the
purpose of creating a new document or an item of material is removed from a
classified assembly or end item (for example, for testing or replacement),
accountability for the new material, if classified, shall be established or
adjusted, as appropriate, in the control station accountability records, and
the accountability for the basic document or end item shall be terminated,
provided the residue is unclassified.
g. Dispatch of Classified Material. When classified material is to be
dispatched from the facility, the following rules shall apply.
(1) The proposed transmittal shall be examined to ensure compliance
with the preparation for transmission requirements of paragraph 17.
(2) Receipts, when required by paragraph 17a(1), shall identify
the classified contents, the control station, and the name and address of
both sending and receiving facilities. Receipts shall not contain classi-
fied information. A short title or abbreviation shall be substituted for
a classified title.
(3) A duplicate copy of the receipt shall be retained in a suspense
file until the signed copy is returned. A suspense date (normally not to exceed
30 days) shall be established, and follow-up action shall be initiated, if the
signed receipt is not received within that period. If after the follow-up
action a signed receipt is not returned or the addressee indicates nonreceipt
of the classified material, an inquiry shall be conducted, in accordance with
paragraph 7. Copies of signed receipts for classified material shall be
retained at the control station for a minimum of 2 years.
h. Termination of Accountability.
(1) On notice from the CSO that accountability may be terminated for
classified material determined to be lost after completion of the inquiries
prescribed in paragraph 7, the contractor shall annotate the accountability
records to show the date, reason, and authority for terminating accountability
for the lost material.
(2) If the location or disposition of the material should subse-
quently be determined, the contractor shall immediately submit a report to the
CSO in accordance with paragraph 6a(15), and shall reestablish accountability
for, or indicate correct disposition of, the material on the control station
accountability records.
13. Special Requirements for TOP SECRET.
a. It is mandatory that an up-to-date record be maintained of all
persons who are afforded access to TOP SECRET information. A record shall
be maintained that identifies each item of TOP SECRET material, and shows the
13.
66
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.Z2?M
names of all individuals given access to the-item and the date (or inclusive
dates) on which access by each individual occurred. In the case of employees
whose duties require knowledge of the combination of containers of TOP SECRET
material, the record need only identify the material, the employee(s), and the
period of time during which access was available. Such records shall be
retained in the appropriate control station for a period of 3 years from the
date the material was destroyed, dispatched outside the facility, declassi-
fied, or downgraded. This record requirement also shall apply to those
employees to whom the contractor affords visual or aural access to TOP SECRET
information.
b. The number of persons afforded access to TOP SECRET information
shall be kept to an absolute minimum, and each person shall be individually
warned against disclosing such information to persons whose duties do not
'require knowledge thereof.
c. The contractor shall establish a system to preclude access to TOP
SECRET material by employees working alone. Individuals who require access
to TOP SECRET material shall be accompanied by another TOP SECRET cleared
person, or SECRET cleared person if access to the TOP SECRET material can
realistically be denied, who can ensure that unauthorized access does not
occur, and that the material is not photographed, improperly reproduced,
or removed prior to its return to an approved storage container. This
requirement does not apply to situations when an employee is left alone
briefly during normal working hours. Moreover, when adherence to the
two-person rule would be impractical based on compelling operational
requirements, the CSO is authorized to grant relief on a case-by-case
basis.
d. The dissemination of TOP SECRET information should be effected
orally whenever practical, without the physical transmittal of material.
e. The transmittal of TOP SECRET material shall be covered by a
continuous receipt system both within and outside of the facility.
f. Each copy of a TOP SECRET document shall be numbered in series.
The copy number shall be placed on accountability records and on the
distribution record and receipt for each TOP SECRET document transmitted.
g. Only designated employees in the control station, cleared for
access to TOP SECRET information, shall open incoming TOP SECRET trans-
mittals. Deliveries of TOP SECRET material within the facility shall
be accomplished in accordance with paragraph 17f.
h. An annual inventory and accounting of all TOP SECRET material
shall be conducted in the manner prescribed by paragraph 12b.
i. TOP SECRET material shall be reproduced only with the prior
written authorization of the contracting officer (see paragraph 18a).
j. Transmission of TOP SECRET material outside of the facility
requires the written authorization of the contracting officer (see
paragraph 17b).
67 13.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L L
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
k. Written approval of the contracting officer is required before
disclosing TOP SECRET information to a subcontractor, vendor, or supplier
(see paragraph 59a).
14. Storage.
a. Containers. Contractors shall not be eligible to receive, nor have
possession of, classified material at their cleared facilities, until they
have adequate storage capability. Classified material, when not in actual use
and safeguarded as prescribed in paragraph 16, shall be stored as follows.
(1) TOP SECRET -- Cabinets and Vaults. When not in use, TOP SECRET
material shall be stored in a GSA approved security filing cabinet originally
procured from a FSS supplier 6/ 7/, and bearing a GSA Test Certification Label
or in a Class A vault constructed in accordance with the requirements of
appendix IV 8/.
(2) TOP SECRET -- Supplemental Controls. In addition to the
cabinets and vaults specified in paragraph (1) above, during nonworking hours
the following area controls are required 9/.
6/ Cabinets, contractors, and prices are listed in the FSS (FSC Group 71-Part
III of the GSA, Federal Supply Service). Copies of specifications and sched-
ules may be obtained from any regional office of the GSA.
7/ Security file cabinets conforming to federal specifications bear a Test
Certification Label on the locking drawer attesting to the security
capabilities of the cabinet and lock. Such cabinets manufactured after
February 1962 will also be marked "General Services Administration Approved
Security Container" on the outside of the top drawer. Acceptable tests of
the cabinets shall be performed only by a testing facility specifically
approved by GSA.
8/ When authorized vaults or strongrooms are used for the storage of
classified material, bin or shelf storage methods may be employed
inside the vault or strongroom. In addition, any type of file cabinet
or locking container may be used in the vault or strongroom to provide
internal control over dissemination of the classified information.
9/ Working hours shall, for purposes of this paragraph, be considered as that
period of time when: (i) there is present in the specific area in which
the container is located, a work force on a regularly scheduled shift,
as contrasted with employees working within an area on an overtime basis
outside of the scheduled work shift; and (ii) the number of employees
in the scheduled work force is sufficient in number and so positioned as to
be able tc detect and challenge the presence of unauthorized personnel.
This would, therefore, exclude custodians, maintenance personnel, and other
individuals whose duties require movement throughout the facility.
1L AR
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
? (a) Entry to the room; building,-or structure in which the con-
tainer is located shall be controlled by a properly cleared, authorized employee
or guard stationed so as to control admittance to the room, building, or struc-
ture, or by a lock which provides reasonable protection against surreptitious
entry. and
(b) For the purpose of detecting unauthorized personnel or
attempted illegal entry to the container, the interior of the room, building,
or structure (whichever is controlled in accordance with paragraph (a) above)
in which the container is located shall be patrolled and each container
inspected at least once during each 2-hour period by a guard, one of whose
principal duties is safeguarding classified information, and who is supervised
by a system that provides a written record of the coverage of key points
within the area. or
(c) The room, building, or structure in which the container is
located, or the container itself, shall be equipped with an alarm system as
prescribed in paragraph 35. The response time to an activated alarm shall not
exceed 15 minutes.
(3) SECRET -- Cabinets, Strongrooms, and Vaults. When not in use,
SECRET material shall be stored in a cabinet or vault authorized for the
storage of TOP SECRET, or in a security cabinet, strongroom, or vault as
specified in paragraphs (a) through (g) below.
(a) A GSA approved cabinet originally procured from an FSS
supplier and bearing a GSA Test Certification Label ?f V may be used.
(b) A Class B Vault constructed, in accordance with .the
requirements outlined in appendix IV may be used.
(c) A safe, steel file cabinet, or safe-type steel file
container having an automatic unit locking mechanism and a built-in three-
position dial-type changeable combination lock may be used. (See subparagraph
(4) below.)
(d) A steel file cabinet secured by a steel bar 10/ and a
three-position dial-type changeable combination padlock, listed on the GSA
Qualified Products List as meeting the requirements of Federal Specification
FF-P-110 may be used. Non-FSS three-position dial-type changeable combina-
tion padlocks in use at the present time may remain in use until replacement
is necessary, or additional padlocks are required. (See subparagraph (4)
below.)
(e) A Class C Vault constructed in accordance with the
requirements of appendix IV 8/. (See subparagraph (4) below.)
10/ The keep
welding,
without
be held
open the
ers of the steel lock bar shall be secured to the cabinet by
rivets, or bolts, so that it cannot be removed and replaced
leaving evidence of the entry. The drawers of the container shall
securely, so that their contents cannot be removed without forcing
drawer.
69
4.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.11 1 JJJH1 HI
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(f) A strongroom maybe used, provided the strongroom is
supplementally controlled by a regularly scheduled 2-hour guard patrol, or is
equipped with an alarm system as prescribed in paragraph 35, and response time
to an activated alarm shall not exceed 15 minutes. (See paragraph F, appendix
IV, for construction requirements.)
(g) A steel container in a desk pedestal, which encloses the
container on five sides and is riveted or bolted to the desk may be used, pro-
vided the exposed face of the container is secured by a steel bar and a three-
position dial-type changeable combination padlock 10/. (See subparagraph (4)
below.)
(4) SECRET -- Supplemental Controls. In addition to the cabinets
and vaults specified in paragraphs (3)(c), (d), (e), and (g) above, during
nonworking hours the following area controls are required 9/.
(a) Entry to the room, building, or structure in which the
container is located shall be controlled by a properly cleared, authorized
employee or guard stationed so as to control admittance to the room, building,
or structure, or by a lock that provides reasonable protection against sur-
reptitious entry; or by a properly cleared guard stationed at each unsecured
perimeter entrance to a complex 11/ that is enclosed by a physical barrier,
and provided further that the area is patrolled adequately to provide
reasonable opportunity to detect unauthorized personnel. and
(b) For the purpose of detecting unauthorized personnel or
attempted illegal entry into the room, building, or structure (whichever
is controlled in accordance with paragraph (a) above) in which the container
is located, the area shall be patrolled at least once during each 4-hour
period by a properly cleared, authorized employee or guard. One of this
employee's or guard's duties must be safeguarding classified information and
he or she must be supervised by a system that provides a written record of the
coverage of key points within the area. or
(c) The room, building, or structure in which the container
is located, or the container itself, shall be equipped with an alarm system,
as prescribed in paragraph 35, and the response time to an activated alarm
shall not exceed 15 minutes.
(5) CONFIDENTIAL -- Cabinets, Strongrooms, and Vaults. When not in
use, CONFIDENTIAL material shall be stored in the same manner as TOP SECRET or
SECRET material; however, supplemental controls are not required.
b. Bulky Material. When it is impractical to store classified material
because of its nature, size, or unique characteristics, in accordance with
paragraph a above, the contractor shall safeguard such material by control of
11/ A complex is a facility or any element thereof which consists of one or
more buildings or structures physically enclosed within a common perimeter
barrier supplemented by protective measures, which prevent unauthorized
access and control authorized access.
14. 70
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.ZZ-m
the area in which it is-located, to the extent required by section IV. If
it is impractical to safeguard the material in accordance with Section IV,
the contractor shall develop appropriate alternative control procedures and
provide them to the cognizant security office for approval.
c. Supervision of Storage Containers. Only a minimum number of
authorized persons shall possess the combinations to the storage containers or
have access to the information stored therein. To facilitate investigation of
a container found open and unattended, a record shall be maintained of the
names and addresses of persons having knowledge of the combination. Cabinets,
vaults, and other containers in which classified material is stored shall be
kept locked, when not under the direct supervision of an authorized person
entrusted with the combination or the contents. In the case of a one-person
facility, the management official shall inform the CSO of the combination of
the container. The combination shall be classified, in accordance with
paragraph 5i, shall be placed in a sealed envelope marked, "to be opened upon
death or incapacitation of (name of management official)," and shall be
transmitted to the CSO, in accordance with paragraph 17. In addition,
conspicuously displayed on the outside of the container shall be a notice to
contact the CSO, prior to opening or moving the container. This notice shall
contain the mailing address of and an appropriate telephone number at the CSO.
The above provisions pertaining to one-person facilities do not apply to
cleared one-person facilities of an MFO. For such facilities, provisions
should be made in the HOF SPP for affixing an appropriate notice on the
outside of the cabinet, and for furnishing the combination to the FSO of the
HOF who shall be identified as the official to contact rather than the CSO.
d. Protection During Nonworking Hours. Unless specified in a UA con-
tract, a contractor shall not be required to establish additional controls
over classified material stored in accordance with paragraph a above.
e. Removal to Residence. Although the contractor may have provided for
adequate storage facilities at the respective residences of his officers,
directors, and other employees, removal of classified materials to such dwell-
ings for "after hours" work as a convenience to such persons is not authorized.
These facilities, provided they meet the requirements of this manual, may be
utilized for temporary storage purposes only in connection with authorized
travel when the individual, in order to accomplish the objectives of the trip,
is authorized to carry classified material as prescribed in paragraph 17h, or
in other cases of necessity on approval by an official of the facility who
was cleared in connection with the granting of the FCL. In no case will TOP
SECRET material be removed to a private residence without: (i) the written
authorization of the contracting officer in accordance with paragraph 17b, and
(ii) approval of the CSO as to the security controls to be maintained over the
TOP SECRET material while it remains outside of the facility.
f. Repair of Damaged Security File Cabinets. Neutralization of lock-
outs or repair of any damage which affects the integrity of a security file
cabinet approved for storage of classified information shall be accomplished
only by appropriately cleared or continuously escorted personnel specifically
trained in approved methods of maintenance, neutralization of lockouts, and
repair of perforations.
71 14.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 ....., ,J11 1 1 ?L. I I.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) A GSA approved security file cabinet is considered to have been
restored to its original state of security integrity if:
(a) all damaged or altered parts (for example locking drawer and
drawer head) are replaced with manufacturer's replacement or identical canni-
balized parts, or
(b) when a container has been drilled immediately adjacent to
or through the dial ring to neutralize a lockout, the replacement lock is
equal to the original equipment and the drilled hole is repaired with a tapered
casm-hardened steel rod (for example, dowel and drill bit) with a diameter
slightly larger than the hole, and of such a length that when driven into the
hole there shall remain at each end of the rod a shallow recess of not less
than 1/8 inch deep, nor more than 3/16 inch, to permit the acceptance of
substantial welds, and be welded both on the inside and outside surfaces. The
outside of the drawer head shall then be puttied, sanded, and repainted in
such a way that no visible evidence of the hole or its repair remains on the
outer surface after replacement of the damaged part (for example, new lock.)
(2) If damage to a GSA approved or other approved security file
cabinet is repaired with welds, rivets, or bolts, which cannot be removed and
replaced without leaving evidence of entry, the cabinet thereafter may be used
for storage of CONFIDENTIAL material or SECRET material with supplemental
controls as outlined in paragraph 14(a)4. If the damage is repaired using
methods other than those specified in paragraph (1) above or this paragraph,
use of the cabinet shall be limited to unclassified material.
g. Damage to Approved File Cabinets 7/. A list shall be maintained
by the FSO of all approved file cabinets which have sustained damage other
than normal marring or scratching from use. Each cabinet listed shall be
identified by giving its location and a description of the damage. There
shall also be on file a signed and dated certification, provided by the
repairer, setting forth the method of repair used. The list and certification
shall be retained for the life of the file cabinet and shall be available for
review during recurring security inspections. Each such cabinet shall have a
label posted on the inside of the top drawer to indicate the highest category
of classified material which may be stored therein. If the damage affects the
integrity of a GSA approved cabinet, the GSA Approved Security Container Label
and the GSA Test Certification Label shall be removed. However, these labels
may be retained by the FSO for a period of 30 days for those GSA approved
cabinets designated for repair to restore their original integrity. If
integrity is not restored within 30 days, the labels shall be destroyed.
When a GSA approved cabinet is repaired in accordance with --
(1) Paragraph f(1)(a) above, the replacement locking drawer will
have its GSA Test Certification Label affixed. In this case the retained GSA
Approved Security Container Label shall be affixed to the outside of the top
drawer and the retained GSA Test Certification Label shall be destroyed.
(2) Paragraph f(1)(b) above, the retained GSA Approved Security
Container Label shall be affixed to the outside of the top drawer, and the
GSA Test Certification Label shall be affixed to the inside of the locking
drawer.
14. 72
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD YLZU.-LL-M
15. Alternate Storage Locations.
a. General. Material classified no higher than SECRET, requiring
protection in the interest of national defense and essential to continuity of
production operations, may be duplicated and stored in an alternate location,
provided the contracting officer approves the use of such storage for informa-
tion pertaining to the contract. The provisions of section VI shall apply to
the procurement of this service. Acceptable alternate storage locations are
cleared facilities of: (i) a parent, a subsidiary, or another facility of a
MFO; (ii) a bank offering safe deposit box/vault facilities; or (iii) a
company providing a protective storage service.
b. Security Clearance Requirements. The alternate storage location
shall be a cleared facility. PCL requirements will depend on the type of
service provided. Where the alternate storage facility is required to provide
both secure storage and other services requiring access to the classified
information, PCL's are required for employees whose duties will involve access
to the classified material or responsibility for providing security protection
for the classified material. When the facility is to provide only secure
storage space, PCL's are required only for those personnel whose duties
involve responsibility for security protection of the classified material.
c. Records. When the alternate storage facility provides both secure
storage and file service for the classified information, all of the security
requirements prescribed in this manual shall apply. When the alternate storage
facility provides only secure storage service, accountability for the alternate
files shall be maintained on a separate record by the facility which deposits
the material.
d. Containers. When the services of a bank are utilized, safe deposit
boxes will be considered equivalent to FSS security cabinets, provided the
prime contractor:
(1) controls the keys to the safe deposit box in the same manner
that combinations to storage containers are safeguarded, in accordance with
paragraph 5i;
(2) utilizes only cleared employees, whose signatures are on file
with the bank, to deposit and remove classified material; and
(3) ensures that established procedures preclude access to the
classified information by employees of the bank.
16. Safeguards During Use. Classified materials, when not safeguarded as
provided for in paragraphs 14a or b, or 34, and when in actual use by author-
ized personnel, shall be protected as follows:
a. kept under the constant surveillance of an authorized person, who is
in a physical position to exercise direct security controls over the material;
b. covered, turned face down, placed in storage containers, or
otherwise protected, when unauthorized persons are present; and
73 6.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
_111 1 1 1 1 I
4 4.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. returned to storage containers as soon as practical after use.
17. Transmission.
a. Preparation for Transmission of TOP SECRET, SECRET, and CONFIDENTIAL
Material.
(1) Outside of a Facility. TOP SECRET, SECRET, and CONFIDENTIAL
material to be transmitted outside of a facility shall be enclosed in opaque
inner and outer containers, except as provided for in paragraph (b), (c), or
(d) below. If the classified material is printed or written, and is of
such size as to permit the use of envelopes for wrapping, the classified
information shall be protected from direct contact with the inner container by
a cover sheet or by folding inward. Except as indicated in paragraph (e)
below, the inner container shall be addressed, return addressed, carefully
sealed, and shall be plainly and conspicuously marked with the classification
of the contents and, if appropriate, with the notations required by paragraphs
11b(8), 88a, and 123. The outer container shall be addressed, return addressed,
and carefully sealed with no markings or notations to indicate that the contents
are classified. If the outer container is not sufficiently opaque to prevent
the classification markings on the inner cover from being visible, the inner
container shall be wrapped with sufficient paper to conceal the markings. If
the classified material is of a size, bulk, weight, or nature which precludes
wrapping as described above, materials used for the packaging shall be of
such strength and durability as to provide protection while in transit. To
prevent items from breaking out and to facilitate the detection of tampering
with the container, the following will be used, whenever practical: seals,
kraft paper, kraft tape laminated with asphalt and containing rayon fibers
(snake type) or nylon sensitive tape, puncture resistant material, wire mesh,
or other knife-slash resistant material. As long as the material is enclosed
in a double container, the material may be wrapped or boxed in paper, wood,
metal, or a combination thereof. When transmitting TOP SECRET and SECRET
material the inner container shall contain a receipt form which identifies
the addressor, the addressee, and the contents by unclassified or short
title. Where this is not practical, the receipt shall be sent to the pro-
posed recipient with the advance notice of shipment required by paragraphs
c(5)(c) and d(3)(d) below, or hand-carried by a responsible employee
designated to accompany the classified shipment to its destination. When
transmitting CONFIDENTIAL material, a receipt form is not required. Special
provisions for the packaging of classified material are as follows.
(a) The transmission of written materials of different classi-
fications, for example, the inclusion of CONFIDENTIAL and UNCLASSIFIED with
SECRET in a single package, should be avoided. However, when written
materials of different classifications are transmitted in one package, they
shall be wrapped in a single inner envelope or container, and the receipt
required by paragraph (1) above, shall be enclosed. The inner envelope or
container shall be marked with the highest classification of its contents.
(b) If the classified material is an internal component of a
packageable item of equipment with an outside shell or body, which is not
classified and which completely shields the classified aspects of the item
from view, the shell or body may be considered as the inner container.
17. 74
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
(c) If the classified material is an inaccessible internal com-
ponent of a bulky item of equipment that is not reasonably packageable, such
as a missile, the outside shell or body of the item may be considered as the
outer container, provided the shell or body is not classified.
(d) If the classified material is an item of equipment that is
not reasonably packageable and the shell or body is classified, it shall be
draped with an opaque covering that will conceal all classified features. Such
coverings must be capable of being secured so as to prevent inadvertent expo-
sure of the item.
(e) Specialized shipping containers, including closed cargo
transporters, may be used in lieu of the above packaging requirements. In
such cases the container may be considered to constitute the outer container.
(f) The address may be omitted from the inner and outer
container for shipment in full truckload lots, when such an exception is
contained in the provisions of the contract. The DAR requires that complete
consignment and marking instructions, to the extent known at the time the
contract is awarded, be included in the contract to assist in ensuring
delivery of items to proper destinations without delay. It further requires
that additional consignment instructions be furnished to the contractor as
soon as they became known. Under no circumstances will the outer container,
or the shipping document attached to the outer container, reflect the
classification of the contents or the fact that the contents are classified.
(2) Additional Requirements for SECRET Material to be Shipped by
Commercial Carrier 12/. SECRET material to be transmitted outside a facility
by commercial carrier shall be prepared for transmission to afford additional
protection against pilferage, theft, and compromise. Specific provisions for
shipment of SECRET material are as follows.
(a) Except as authorized in paragraph 17a(1), SECRET material
shall be shipped in hardened containers (see paragraph 3as), unless specifi-
cally authorized otherwise by the contracting officer or his or her designated
representative.
at his or
exclusive
carrier's
indicated
annotated
(b) Carrier equipment shall be sealed by the shipper, or
her direction, when there is a full carload, a full truckload,
use of the vehicle, or a closed and locked compartment of the
equipment is used. The seals shall be numbered and the number
on all copies of the BL. When seals are used, the BL shall be
substantially as follows:
12/ Commercial carriers have been issued instructions in the "Carrier
Supplement to Industrial Security Manual for Safeguarding Classified
Information," DoD 5220.22-C applicable to their responsibilities for
transmissions of SECRET controlled shipments.
75 17 .
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
N 1 .J LI I 1 I 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
DO NOT BREAK SEALS EXCEPT IN CASE OF EMERGENCY OR UPON PRIOR
AUTHORITY OF THE CONSIGNOR OR CONSIGNEE. IF FOUND BROKEN OR
IF BROKEN FOR EMERGENCY REASONS, APPLY CARRIER'S SEALS AS SOON
AS POSSIBLE AND IMMEDIATELY NOTIFY BOTH THE CONSIGNOR AND THE
CONSIGNEE.
(c) The notation "Protective Security Service Required" 13/
shall be reflected on all copies of the BL. The BL will be maintained in a
suspense file to follow up on overdue or delayed shipments.
(3) Within a Facility. TOP SECRET, SECRET, and CONFIDENTIAL
material shall be prepared for transmission within a facility in such manner
as to ensure a degree of security protection adequate for the method of trans-
mission to be used, using guidance contained in paragraph (1) above. Material
does not require double wrapping for intraplant transmission. However, in all
cases, adequate measures shall be taken to protect against unauthorized
disclosure of classified information.
b. Method of Transmission of TOP SECRET Material Outside a Facility.
When a contractor is authorized in writing, by the contracting officer or his
or her designated representative, TOP SECRET material may be transmitted by:
(i) specifically designated escort or courier cleared for access to TOP SECRET
information (military, U.S. civilian employee, or a responsible employee desig-
nated by the contractor, except that the contractor employee shall not carry
classified material across international boundaries); (ii) Armed Forces Courier
Service, in accordance with the instructions of the contracting officer; and
(iii) by electrical means in a CRYPTOSYSTEM approved for encryption of TOP
SECRET information. Under no circumstances shall TOP SECRET material be
transmitted through the U.S. or company mail channels.
c. Method of Transmission of SECRET Material Outside a Facility.
SECRET material shall be transmitted by one of the following means within and
between the U.S., Puerto Rico, or a U.S. possession or trust territory.
(1) SECRET material shall be transmitted by one of the means
established for TOP SECRET.
(2) SECRET material shall be transmitted by U.S. Registered Mail,
including U.S. Registered Airmail, through U.S. civil postal facilities or
Army, Navy, or Air Force postal facilities. Addresses may be obtained from
the "DoD Activity Address Directory," DoD 4000.25-0 (a reference copy is
located at the CSO), or from the ACO/PCO. A copy of DoD 4000.25-D may also be
tiurchased from the GPO.
(3) SECRET material shall be transmitted by appropriately cleared
employees of the contractor who have been designated as couriers or escorts
13/ In such cases the SECRET shipment shall be routed via a cleared commercial
carrier under a tariff, tender, or contract that provides PSS in accord-
ance with the DoD 5220.22-C.
17 74
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LJWJ JLLU.1.4-1.1.
and briefed in their responsibilities by a responsible official delegated
authority in such matters in the facility SPP. When couriers or escorts are
used, the SECRET material must remain in their personal custody and control
at all times (see paragraph 17h). The commercial conveyance used by the
courier or escort is not required to have an FCL. (See Appendix IX for use
of escorts for classified shipments and Appendix X for hand-carrying of
classified material aboard commercial passenger aircraft).
(4) SECRET material shall be transmitted by electrical means over
approved CRYPTOGRAPHIC communication circuits (telephone, wire, radio,
or an intercommunication system), including computer data, but only with the
prior written approval and in accordance with the instructions of the con-
tracting officer.
(5) SECRET material shall be transmitted by commercial carriers 14/
(air or surface) only when the size, bulk, weight, nature of the shipment,
shipping costs, or escort considerations make the use of the foregoing methods
impractical. Only qualified carriers (see paragraph 3bs) will be used for the
transmission of SECRET material. When the services of a commercial carrier
are required, the contractor as consignor shall be responsible for the fol-
lowing.
(a) The contractor shall utilize a qualified carrier selected by
the U.S. Government that will provide a single line service from point of origin
to destination, when such service is available, or by such transshipping pro-
cedures as may be specified by the U.S. Government. and
(b) The contractor shall request routing instructions, including
designation of a qualified carrier, from the contracting officer or designated
representative (normally the government transportation officer.) The request
shall specify that the routing instructions are required for the shipment of
SECRET material via Protective Security Service (D0 NOT ABBREVIATE THIS) and
include the point of origin and point of destination. or
(c) As an exception to the general requirements enunciated
above, if time is of the essence and the total shipment weighs less than 200
pounds gross, the contractor, as consignor, may make arrangements directly
with a cleared commercial carrier to provide PSS for the transporting of
the SECRET shipment when a CBL is to be used. This exception may not be
utilized for COMSEC or SENSITIVE COMPARTMENTED INFORMATION material without
the approval of the PCO. Under this exception the contractor must specify
to the commercial carrier that SECRET material is to be shipped and that PSS
is required. The points of origin and destination must also be provided.
Verifications of the clearance of the commercial carrier and the fact that it
provides PSS are to be obtained from the CSO of the HOF of the carrier prior
to release of any classified material. and
14/ Commercial carriers may be used only within and between the 48 contiguous
States and the District of Columbia or wholly within Alaska, Hawaii, Puerto
Rico, or a U.S. possession or trust territory.
77 17.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(d) The contractor shall notify the consignee (including
U.S. Government transshipping activity) of the nature of the shipment, the
means of the shipment, numbers of the seals, if used, and the anticipated
time and date of arrival by separate communication at least 24 hours in
advance (or immediately on dispatch if transit time is less than 24 hours)
of the arrival of the shipment, in order that the consignee may take
appropriate steps to receive and protect the shipment. This notification
shall be addressed to the appropriate organizational entity in the same
manner as provided in paragraph 17k and not to an individual. Request the
consignee activity (including a military transshipping activity) to notify
the consignor of any shipment not received within 48 hours after the
estimated time of arrival indicated by the consignor. In addition, the
consignor shall annotate the BL: "CARRIER TO NOTIFY THE CONSIGNOR AND
CONSIGNEE (Telephone Numbers) IMMEDIATELY IF SHIPMENT IS DELAYED BECAUSE
OF AN ACCIDENT OR INCIDENT. IF NEITHER CAN BE REACHED, CONTACT (Enter
appropriate HOTLINE Number from Appendix XV). USE HOTLINE NUMBER TO
OBTAIN SAFE HAVEN OR REFUGE INSTRUCTIONS IN THE EVENT OF A CIVIL DISORDER,
NATURAL DISASTER, CARRIER STRIKE OR OTHER EMERGENCY." On receipt of a
report from either the consignor or the carrier, the consignor shall
immediately request the carrier to trace the shipment and shall notify his
or her CSO of the delay in the delivery of the classified material and the
circumstances as known to the consignor. Subsequent developments concern-
ing the delayed shipment shall also be reported to the CSO. A copy of the
report shall be submitted to the contracting officer concerned or his or
her designated representative. The consignee, consignor, and carrier are
required to take similar inquiry and reporting action if a shipment is
received with broken seals, or the numbers on the seals do not match those
on the advance notice of shipment.
(6) SECRET material shall be transmitted by a commercial messenger
service which has been granted a SECRET FCL and is engaged in the intra-
city/local area delivery (same day delivery only) of classified material
between cleared contractors, or between cleared contractors and a UA and/or
the U.S. Post Office. Transmission of COMSEC information and SENSITIVE
COMPARTMENTED INFORMATION will not be released to a commercial messenger
service without contracting officer approval.
(7) SECRET material shall be transmitted by such other methods
directed through specific instructions from the contracting officer or his or
her designated representative, because of special considerations or the nature
of the shipment (for example, explosives, high priority items, nuclear weapons
or direct shipments between military installations) 15/.
d. Method of Transmission of CONFIDENTIAL Material Outside a Facility
15/. Such material shall be transmitted by one of the following means within
and between the U.S., Puerto Rico, or a U.S. possession or trust territory.
15/ When a shipment by truck is contemplated for classified CM (CONFIDENTIAL
or SECRET), the contracting officer Will issue specific shipping
instructions requiring a driver holding a final SECRET clearance in
. addition to the military escorL normally provided for such shipments.
17. 78
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD YlZU.ZZ-M
(1) One of the means established for SECRET in paragraphs c(1),
(2), (3), (4), (6), and (7) above 14/ may be used.
(2) U.S. Express Mail 16/ or U.S. Certified Mail for CONFIDENTIAL
material may be used. However, U.S. Registered Mail shall be used for trans-
mittal of such material between any of the following points: the CONUS,
Alaska, Hawaii, Puerto Rico, or a U.S. possession or trust territory.
Addresses may be obtained from the "Department of Defense Activity Address
Directory," DoD 4000.25-D (a reference copy is located at the CSO), or from
the ACO/PCO. A copy of the DoD 4000.25-D may be purchased from the GPO.
(3) A commercial carrier 14/ (air or surface) may be used only
when the size, bulk, weight, nature of the shipment, shipping costs, or
escort considerations make the use of the foregoing methods impractical.
The commercial carrier must be authorized by law, regulatory body, or
regulation to provide the required transportation service and a determina-
tion must be made by MTMC that the carrier has a tariff, government tender,
agreement, or contract that provides a CSS. A FCL is not a requirement.
The foregoing information may be obtained from the contracting officers
or their designated representatives. In addition to the aforementioned
coordination with the contracting officers or their designated represen-
tatives, the contractor, as consignor shall:
(a) utilize containers of such strength and durability as
to provide security protection to prevent items from breaking out of the
container and to facilitate the detection of any tampering with the container
while in transit;
(b) indicate on the BL, "Constant Surveillance Service
Required" -- in addition, the consignor shall annotate the BL: "CARRIER
TO NOTIFY THE CONSIGNOR AND CONSIGNEE (Telephone Numbers) IMMEDIATELY IF
SHIPMENT IS DELAYED BECAUSE OF AN ACCIDENT OR INCIDENT. IF NEITHER CAN BE
REACHED CONTACT (Enter appropriate HOTLINE number from Appendix XV). USE
HOTLINE NUMBER TO OBTAIN SAFE HAVEN OR REFUGE INSTRUCTIONS IN THE EVENT OF
A CIVIL DISORDER, NATURAL DISASTER, CARRIER STRIKE OR OTHER EMERGENCY;"
(c) instruct the carrier to ship packages weighing less than
200 pounds gross in a closed vehicle or a closed portion of the carrier's
equipment; and
(d) notify the consignee (including a U.S. Government trans-
shipping activity) of the nature of the shipment, the means of shipment, and
the anticipated date and time of arrival by separate communication at least 24
16/ U.S. Express Mail is a premium mail service consisting
and regular service. The service is intended for, but
by, the business mailer or other large volume users of
service is a high-speed intercity delivery system that
the requirement to hand-carry CONFIDENTIAL material in
notice. Additional information is available through a
customer service representative regarding the specific
available.
of both programmed
not limited to use
the mails. The
usually can negate
cases of short
local postal
options that are
79 17.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V 1 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
hours in advance (or immediately on dispatch if transit time is less than 24
hours) of the arrival of the shipment in order that the consignee may take
appropriate steps to receive and protect the shipment. This notification
shall be addressed to the appropriate entity in the same manner as provided
in paragraph 17k and not to an individual. Request the consignee (including
a military transshipping activity) to notify the consignor of any shipment
not received within 48 hours after the estimated time of arrival indicated by
the consignor. On receipt of such notice, the consignor shall immediately
request the carrier to trace the shipment and shall notify his or her CSO, in
accordance with paragraph 6a(10), of the delay in the delivery of the classi-
fied material and the circumstances as known to the consignor. Subsequent
developments concerning the delayed shipment shall also be reported to the
CSO. A copy of the report shall also be submitted to the contracting officer
concerned or his or her designated representative, for forwarding to the MTMC.
e. Method of Transmission of SECRET and CONFIDENTIAL Material Outside
of Areas Enumerated in Paragraphs 17c and d. SECRET and CONFIDENTIAL material
shall be transmitted only under the provisions of the contract or with the
written authorization of the contracting officer. However, when the classified
material had previously been authorized for export under a State Department
license or letter, the contractor shall notify the contracting officer of the
classified material to be transmitted outside of the areas enumerated in para-
graphs c and d above. A'contractor shall not transmit classified material
directly to a foreign government or firm. The only exception to this would be
when a foreign government, with whom the U.S. has entered into a reciprocal
agreement pertaining to the filing of classified patent applications in the
respective countries, has authorized its U.S. patent agent to return its
foreign classified information directly to that foreign government. Except
as noted above, transmission shall take place between the contractor and a
designated U.S. Government representative for forwarding to the foreign
activity. This is known as transmission by government-to-government channels.
Transmittal arrangements shall be made by the CSO, when the foreign firm or
government has awarded a contract to the U.S. contractor. When authorized,
SECRET and CONFIDENTIAL material shall be transmitted by one of the following
means.
(1) SECRET and CONFIDENTIAL material shall be accompanied by a
contractor employee, courier or escort, who is cleared for access to the
classified information involved and who has been designated by the contractor,
provided: (i) the classified material is not transported across international
borders (this does not preclude use of regularly scheduled nonstop flights on
U.S. carriers between the U.S. mainland and Alaska, Hawaii, Puerto Rico, or
U.S. possessions or trust territories); (ii) time limitations do not permit
the use of U.S. Government channels; (iii) an appropriate courier or escort
authorization is issued to the employee; (iv) the transmission is begun and
completed during normal daytime duty hours of the same day and is by surface
means only and within the national borders of the country within which the
transmission takes place; and (v) the employee can comply with the specific
security instructions for the safeguarding of classified material involved;
that is, storage at a U.S. Government installation within the country
concerned.
17. 80
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) SECRET.and CONFIDENTIAL material shall be accompanied by a
U.S. Government civil service employee or military person who is cleared for
access to the level of the classified information involved and who has been
designated by the contracting officer. (Appropriately cleared officers of
the Department of Navy, Military Sea Transportation Service Civilian Marine
Personnel, may also be designated as escorts by the contracting officer.)
Foreign carriers may not be utilized, unless the designated escort has con-
tinuous physical control of the material being transported.
(3) SECRET and CONFIDENTIAL material shall be transmitted by
registered mail through U.S. Army, Navy, or Air Force postal facilities. If
the intended recipient is not authorized to receive classified material through
APO channels, arrangements shall be made with an activity which is so authorized
to receive and hold the classified material pending pickup by the intended
recipient.
(4) SECRET and CONFIDENTIAL material shall be transmitted by U.S.
and Canadian registered mail with registered mail receipt to and from Canada
in accordance with instructions from the contracting officer and via a U.S. or
a Canadian government activity.
(5) SECRET and CONFIDENTIAL material shall be transmitted by Armed
Forces Courier Service in accordance with specific instructions from the
contracting officer.
(6) SECRET and CONFIDENTIAL material shall be transmitted in
accordance with specific instructions from the contracting officer, whenever
the nature of the classified shipment does not lend itself to transmission by
any of the above methods. In such cases, the procedures for advance notice to
consignee, reporting of delayed receipt, and so on set forth in paragraph
c(5)(d) above apply.
f. Method of Transmission of TOP SECRET, SECRET, and CONFIDENTIAL
Material Within a Facility. This material shall be transmitted within a
facility by a responsible employee designated by the contractor who has been
cleared for access to the category of classified information involved. Also,
a responsible subcontractor guard who is employed on a full-time basis at the
facility, possesses an appropriate PCL, and has been designated and briefed by
the contractor, may be utilized to transmit SECRET and CONFIDENTIAL material.
The classified material shall remain under the direct surveillance of the
designated individual at all times. This material may be transmitted by
electrical means over approved CRYPTOGRAPHIC communications circuits with the
prior written approval and in accordance with instructions of the contracting
officer, or other approved circuits with the prior written approval of the CSO.
g. Reserved.
h. Protection En Route by Contractor Employees. When employees desig-
nated by the contractor are used to transmit or carry classified material, the
storage provisions of paragraph 14 shall apply at all stops en route to
destination, unless the material is retained in the personal possession of the
employee at all times. This involves constant surveillance by the employee
81 17.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II _ _ 1_11 ' I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
who is in a physical position to exercise direct security controls over the
material. The hand-carrying of classified material on trips that involve
an overnight stopover is not permissible, unless arrangements are made in
advance of departure for overnight storage of the hand-carried classified
material at a U.S. Government installation or a cleared contractor facility.
The hand-carrying of classified material shall not be authorized when there
is doubt as to whether the material can be properly handled and protected.
Additional special requirements for hand-carrying classified material aboard
commercial passenger aircraft are contained in Appendix X.
i. Additional Protection in Connection With Visits. When classified
material, other than TOP SECRET, is required on a visit, such material shall
be addressed by the contractor to his or her employee making the visit and
shall be transmitted to the destination being visited, to be held for the
employee, in accordance with paragraphs c(2) or d(2) above. This method
also shall be used for the return of the material. However, if contractors
determine that time limitations do not permit mailing materials required during
visits, they may authorize the employees concerned to carry the classified
material, subject to the provisions of paragraph h above. An inventory of the
material shall be made prior to departure and retained at the control station.
A copy of the 'inventory shall be carried by the employee. Only that
classified material absolutely essential to the purpose of the visit may be
carried by the employee. On the employee's return from the visit, an
inventory shall be made of the material for which he or she is charged. If,
in connection with the purpose of the visit, classified material is not
returned to the facility, a receipt shall be obtained and the transaction
shall be recorded in the records of the control station, in accordance with
paragraph 12. However, should there be a need to leave CONFIDENTIAL material
at the facility visited, a receipt is not necessary, except if otherwise
required in accordance with paragraph 12.
j. COMSEC Information. Classified COMSEC information shall be
transmitted as prescribed in the "COMSEC Supplement to Industrial Security
Manual for Safeguarding Classified Information" (CSISM), DoD 5220.22-S-1.
k. Addressing Mail or Shipments of Classified Material. Except as
provided below, mail or shipments containing classified material shall be
addressed to the Commander or Head of the UA activity or installation
(Commander, Commanding Officer, Director, TO, or similar designation) or
to the cleared facility concerned, using the appropriate business name and
address, and not to an individual. This does not prevent use of office code
letters or numbers, or such phrases in addition to the address as, "ATTN:
Research Dept.," or similar aids in expediting internal routing.
(1) When it is considered desirable or appropriate to direct SECRET
or CONFIDENTAL material to the attention of a particular employee of a facility
or UA, other than to a consultant as prescribed below, the identity of the
intended recipient shall be indicated on an attention line on the inner con-
tainer or on an attention line placed in the letter of transmittal. If such
mail is to be delivered directly to the specified employee, a procedure shall
be established to ensure that all classified enclosures are promptly entered
into the facility's document control system in accordance with paragraph 12.
17_ 82
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) When transmitting SECRET or CONFIDENTIAL material to an
individual operating as a cleared facility or engaged as a Type B or C
Consultant, or to any facility at which only one employee is assigned, the
contractor shall specify on the outer container: "TO BE OPENED BY ADDRESSEE
ONLY." Further, the outer container shall be annotated: "Postmaster -- Do
Not Forward. If undeliverable .to Addressee, Return to Sender." Postal
regulations allow "Restricted Delivery" mail to be delivered to the addressee
or to an agent the addressee has authorized in writing to receive "Restricted
Delivery" mail. In all such instances, only appropriately cleared personnel
shall be designated as agents for the addressee. Type C Consultants shall
make arrangements to ensure that all incoming U.S. Certified Mail, U.S.
Registered Mail, and U.S. Express Mail addressed to them in their capacity as
independent consultants is delivered unopened to them personally through their
employer's mail distribution system before entering it into their employer's
document control system.
1. RESTRICTED DATA and FORMERLY RESTRICTED DATA. RESTRICTED DATA and
FORMERLY RESTRICTED DATA shall not be transmitted or otherwise made available
to any regional defense organization or foreign government, except under the
provisions of the Atomic Energy Act of 1954, as amended, and in accordance
with instructions issued by the contracting officer concerned.
18. Reproduction. All reproductions of classified material shall be marked
or stamped with the same classification as the original. Only sufficient
copies necessary to meet operational requirements shall be prepared, and
reproductions shall be destroyed, if otherwise proper, as soon as they have
served their purposes. Reproduction of classified material shall be made only
on equipment specifically designated for the reproduction of classified
material. Rules governing the use of such designated equipment will be
conspicuously posted on or near the equipment. Further, appropriate warning
notices prohibiting reproduction of classified material shall be posted on or
near equipment used only for the reproduction of unclassified material.
a. Reproduction by Authorization Only. The contractor shall not make
nor permit to be made without prior written authorization of the contracting
officer, or his or her designated representative, any photograph or other
reproduction of TOP SECRET information, SECRET information (when specifically
prohibited), or CRYPTO information, regardless of classification, for any
purpose. However, if the contract is for a TOP SECRET, SECRET, or CRYPTO
report, then additional reproduction authority is not necessary. (See
paragraph 87a regarding restrictions on the reproduction of COSMIC TOP SECRET
information.) In addition, TOP SECRET and SECRET material originated by the
DOE or its contractors may be reproduced only with the consent of the
originator or higher authority within the responsible DOE activity.
b. Reproduction Not Requiring Authorization. The contractor may
reproduce, without prior authorization of the contracting officer, non-
CRYPTO information classified SECRET (unless specifically prohibited) or
CONFIDENTIAL, when such reproduction is essential to the:
83 18.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
? IJ 1 I 11 - I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220 . 22-M
(1) performance of the contract,
(2) preparation of a solicited or unsolicited bid, quotation, or
proposal to a UA of the U.S. Government or another authorized contractor for
U.S. Government work,
(3) correspondence in connection with the contract, and
(4) preparation of patent application to be filed in the U.S.
Patent Office. (This paragraph shall not be deemed to authorize the filing of
patent applications, and such applications shall not be filed, except as
specifically provided in the contract).
c. Records. The contractor shall maintain a record of the number of
copies of all TOP SECRET, SECRET, and CRYPTO material, regardless of classifi-
cation, that is reproduced. Reproduction records shall be retained by the
contractor, for a minimum of 3 years for TOP SECRET, CRYPTO, or other special
access material and for a minimum of 2 years for SECRET, and shall be incor-
porated in the control station records required by paragraph 12.
d. Additional Markings. When reproducing classified material, any
additional marking shown on the original shall be shown on all reproductions.
19. Destruction.
a. Requirement for Destruction. The contractor shall establish a
program for the review of classified material for the purpose of reducing
to an absolute minimum the quantity on hand at any given time. With the
exception of information listed in paragraph b below, contractors shall
destroy classified material in their possession as soon as practical, after
it.has served the purpose for which it was:
(1) released by the government,
(2) developed or prepared by the contractor, and
(3) retained after completion or termination of the contract.
b. Disposition by Specific Authorization. COSMIC TOP SECRET
material (see paragraph 85c(2)) shall not be destroyed, but shall be
returned to the contracting officer or his or her designated representa-
tive. Accountable COMSEC classified material shall be destroyed only when
destruction is authorized in writing by an appropriate government official.
In all instances where specific instructions have been issued by the
contracting officer, such instructions will dictate the disposition to be
accomplished.
- c. Methods of Destruction. Classified material shall be destroyed by
burning or, with the written approval of the CSO, by shredding, pulping,
melting, chemical decomposition, mutilation, or pulverizing (for example,
hammer mills, choppers, and hybridized disintegrating equipment). The
destruction process must be sufficient to preclude recognition or recon-
struction of the classified information. The SPP shall: include specific
19. 84
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
instructions which apply to the method .of destruction, and Shall incorporate
instructions provided by the CSO. As applicable, the following additional
requirements must be satisfied when classified material is destroyed.
(1) Public incinerators may be used only with the prior approval
of, and under conditions prescribed by, the CSO.
(2) If the classified material is removed from the facility for
destruction, it shall be destroyed on the same day it is removed.
(3) Ash residue produced by burning is to be examined and reduced
by physical disturbance. If unburned material is found, the material shall be
reprocessed for destruction.
(4) Only crosscut shredders producing residue particle size not
exceeding 1/32 inch in width (with a 1/64 inch tolerance) by 1/2 inch in
length, shall be used for destruction of classified paper and non-paper
products except microform material (see (7) below). Classified material
shall be shredded in sufficient quantity and type of material to preclude
reconstruction or recognition of the material being destroyed. When TOP
SECRET material is shredded, a minimum of 20 pages of similar type, media, and
print shall be destroyed at one time and the residue mixed in one container.
(5) Only paper-based products may be destroyed by pulping. High
wet strength paper, paper mylar, durable-medium paper substitute, or similar
water repellent type papers are not sufficiently destroyed by pulping; other
methods such as disintegration, shredding, or burning shall be used to destroy
these types of papers.
(6) When classified material is destroyed by either pulping or
pulverizing, the equipment shall be equipped with security screens that do
not exceed the following specifications:
(a) The security screen for pulping equipment shall have
perforations of 1/4 inch or smaller.
(b) Security screens for pulverizers shall meet the following
specifications:
1 shall not exceed 3/16 inch in diameter for hammer
mills.
2 shall not exceed 3/32 inch in diameter for choppers and
hybridized disintegrators.
(7) Classified material in microform: that is, microfilm,
microfiche or similar high data density material shall be destroyed by
burning, chemical decomposition or other methods as approved by the CSO.
(8) Procedures shall be established to ensure compliance with the
manufacturer's instructions for operating the destruction equipment and to
ensure its continuing effectiveness. These procedures shall include an
inspection of the equipment after each time it is used to destroy classified
material to assure effectiveness of the destruction process.
85 19.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
d. Witness to Destruction. The destruction of classified material
shall be accomplished by, or in the presence of, two employees of the
contractor who possess appropriate security clearances. One shall be a
responsible employee who has been briefed in the destruction provisions of
this paragraph, and who has been designated by the contractor to perform
the destruction. The other shall be a responsible employee or a subcontract
employee who is working on the premises of the contractor and who has been
designated to witness the destruction of the classified material. However,
CONFIDENTIAL material, other than accountable COMSEC material, may be
destroyed at the facility and witnessed by: (i) one responsible employee, or
(ii) one responsible subcontractor guard who is employed on a full-time basis
at the facility, is under the supervision and direction of the FSO, possesses
an appropriate PCL, has been briefed in the destruction procedures, and has
been designated to perform and witness the destruction.
e. Destruction Records and Certificates for TOP SECRET, SECRET, or
CRYPTO Material. When TOP SECRET, SECRET, or CRYPTO material, regardless of
classification, is destroyed, the contractor, in addition to maintaining
accountability records reflecting the destruction of such material, shall
execute a destruction certificate indicating the date of destruction and
identifying the material destroyed. The certificate shall be signed by both
the individual designated to destroy and the individual designated as a
witness at the time the material is destroyed. Both individuals shall be
required to know, through their personal knowledge, that such material was
destroyed. The contractor may, at his or her discretion, combine the
information required in the destruction certificate with the accountability
records maintained in accordance with paragraph 12a. On request, a copy of
the destruction certificate shall be sent to the contracting officer at the
time of destruction. Destruction records and destruction certificates shall
be maintained at the control stations established under paragraph 12, and
shall be retained by the contractor for a minimum of 3 years for TOP SECRET,
special access, or CRYPTO material, regardless of classification, and for 2
years for SECRET material.
f. Classified Waste. Classified waste shall be destroyed as soon as
practical, in accordance with the provisions of paragraph c above. This
applies to all waste material containing classified information, such as pre-
liminary drafts, carbon sheets, carbon ribbons, plates, stencils, masters,
stenographic notes, worksheets, and similar items. Typewriter and ADP
equipment ribbons used in transcribing classified material shall be
safeguarded in the manner appropriate for the classification category
involved, until the ribbon is cycled through the typewriter or printer a suf-
ficient number of times to obliterate information contained thereon. Normally
this can be accomplished if the ribbon is completely overprinted five times in
all ribbon typing or printing positions. Any ribbon which remains substan-
tially stationary (that is, receives at least five consecutive impressions)
shall be treated as unclassified. CONFIDENTIAL waste, except waste containing
CRYPTO or other special access information, may be destroyed by one employee
or one responsible subcontractor guard pursuant to the provisions of paragraph
d above. Pending destruction, classified waste shall be safeguarded in accord-
ance with paragraph 14. Receptacles utilized to accumulate classified waste
shall be clearly identified. If not promptly destroyed, accountability shall
be established over that material containing information classified SECRET or
10 AA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
arcess information, ar.CRYPTO, regardless of clascification,
in accordance with paragraph 12f. When destruction does take place, the
provisions of paragraph e above are applicable.
g. Alternate Procedure. Where there is only one employee assigned at a
facility and there is a need to destroy material, one or more of the following
alternate procedures shall be used for disposal of the classified material:
(1) Return all classified material eligible for destruction,
including classified waste, to the contractor or UA for whom the classified
work is being performed, or to another facility of the same MFO.
(2) Utilize the destruction facilities of another DoD contractor
or UA, provided that the individual granted use of such facilities retains
physical custody of the classified material and personally ensures its
complete destruction. To satisfy the requirements of paragraphs d and e
above, an appropriately cleared employee of the contractor or UA providing
the destruction service may serve as a witness to the destruction and sign
the destruction certificate.
(3) Employ the destruction services of a subcontractor, vendor, or
supplier specializing in the destruction of classified material, provided that
the controls set forth in paragraph c above are observed and an appropriately
cleared employee of another DoD contractor or UA is present to witness the
destruction, when required pursuant to paragraph d and e above.
87
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
19
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1.101)
_Section III. _SECURITY CLEARANCES_
20. General.
a. An individual shall be permitted to have access to classified
information only when cleared by the U.S. Government or by the contractor,
as specified in this section, and the contractor determines that access
is necessary in the performance of tasks or services essential to the
fulfillment of a contract or program; that is, the individual has a need-
to-know (see paragraph 3bg). The contractor shall limit the number of
personnel processed for clearance to the maximum extent possible consistent
with contractual obligations. The contractor must have a system, detailed in
the SPP, for limiting personnel security clearances. The system must identify
those required to make the deliberate decision as to a particular individual's
need for a clearance and those who review the decision. The supervisor
must certify that an employee will require access at a certain level of
classification. Requests on DD Form 49 shall be reviewed for justification
by designated official(s) at the executive management level and must be
signed by the FSO or another cleared OODEP. The Secretary of Defense,
through the Defense Investigative Service, reserves the right to limit the
number of individual clearances issued to any cleared facility. The numbers
and levels of security clearances possessed by a facility is regulated by a
system administered by the CSO. Each contractor will be limited to a specific
number of clearances consistent with the needs of the UA concerned.
b. As a general rule, only U.S. citizens are eligible to be granted
a standard PCL. Naturalized U.S. citizens, whose country of origin has
been determined to have interests adverse to the United States (a "Desig-
nated country"), or who have resided in such countries for a significant
period, shall be eligible for a security clearance only (i) if they have
been s_U-S. citizen for 5 years or longer, or (ii) if a citizen for less
than 5 years, they_lunEx_staidaiLAL-the U.S. for the past 10 years. Eich
year of active service in the U.S. military may be counted to sitisfy the
foregoing residency requirements. Under special circumstances and condi-
tions, immigrant aliens and foreign nationals may be authorized access to
classified information at the SECRET level and below, with limitations,
provided they are determined eligible and have been granted a Limited Access
Authorization (LAA). To be eligible for a PCL, the following age must have
been attained.
For CONFIDENTIAL
For SECRET or TOP SECRET
All non-U.S. citizens
16 years old
18 years old
21 years old
c. A PCL granted by the DoD, or by a contractor as specified in this
section, is valid for access on a need-to-know basis to all classified defense
information at the same or lower category except for the following:
89
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
20.
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
UOU DLLU.LL-M
(i) Contractor-granted CONFIDENTIAL PCL's are not valid for
access to classified foreign government information; RESTRICTED DATA;
FORMERLY RESTRICTED DATA; COMSEC information (see DoD 5220.22-S-1);
SENSITIVE COMPARTMENTED INFORMATION; ACDA classified information; NATO
information (except for NATO RESTRICTED information); to meet the PCL
requirement as a prior condition for certification to fill a Critical or
Controlled Position under the Nuclear Weapon PRP; or for assignment to duty
stations outside the U.S.
(ii) Interim SECRET or interim CONFIDENTIAL PCL's are not valid
for access to RESTRICTED DATA; FORMERLY RESTRICTED DATA; NATO; or COMSEC;
and SENSITIVE COMPARTMENTED INFORMATION. Interim TOP SECRET PCL's are
valid for access to RESTRICTED DATA; FORMERLY RESTRICTED DATA; NATO;
COMSEC; and SENSITIVE COMPARTMENTED INFORMATION at the SECRET level and
below.
(iii) Access by foreign nationals and immigrant aliens under an
LAA is limited as set forth in paragraph 31.3 and by the terms under which
each LAA is granted.
d. Personnel shall not be cleared for access to classified infor-
mation of a higher level than the clearance of the facility at which they
are employed except for: (i) Type A Consultants whose services are being
utilized by another contractor or a User Agency; and (ii) certain cleared
employees of an MPO who are employed or physically located at a subordinate
facility with a lower level of clearance or at an uncleared facility within
the MFO.
e. A personnel security clearance under the Defense Industrial
Security Program (DISP) is neither a license for access to classified
information, nor a substitute for security measures designed to prevent
unauthorized access. Therefore, security clearances under the DISP are
to be granted when there is a bona fide requirement for access to
classified information in performance of duty assignment, and when other-
wise required by the terms of this manual.
f. The fact that a contractor has qualified for and has been granted
an FCL shall not be used for advertising, promotional purposes, or in the
recruitment of employees. Employment advertisements shall not state nor
imply that a PCL is a condition or prerequisite for employment. Reproduc-
tion in any manner of the DIS FL 381-R, furnished to the contractor by the
U.S. Government, shall not be made except for the necessary records of the
contractor or unless requested by a competent U.S. Government authority.
Further, the reproduction in any manner of a DISCO Form 560 (Letter of
Consent (LOC)) furnished by the government to the contractor shall not be
made, except for necessary records of the contractor, or unless requested
by competent U.S. Government authority. A copy of the LOC shall not be
furnished the employee named on the form for any purpose whatsoever, nor
20. 90
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
shall the employee be given any other written notification of the granting
of a clearance or access authorization. However, this does not preclude
the issuance of a color-coded identification card or badge to reflect the
level of access authorized pursuant to paragraph 8.
g. When determined that full investigative coverage or other
required assurances cannot be satisfied for the level of PCL or LAA
requested, the contractor shall be so advised by DISCO and all related
investigative action will be discontinued.
h. Unless administratively terminated, suspended, or revoked by the
DoD, the LOC issued for an employee shall be effective so long as he or she
is continuously employed by the contractor. If the employee no longer
requires access to classified information and no bona fide need for such
access.is anticipated within the next 120 days, the PCL shall be admin-
istratively terminated. In addition, if an employee has been placed in
layoff status or is granted a temporary leave of absence for 120 days or
less, it shall not be considered as an interruption or discontinuance of
employment. If the employee does not return to active employment within
120 days, he or she shall be reported terminated, effective the first day
of the absentee period.
i. In all cases in which a contractor furnishes copies of board
minutes, certificates, or other records, such records shall be on company
letterhead or identified by typing the contractor's name and address and,
in addition, they shall indicate the date of submission.
J. As a general rule, a contractor may be issued only one LOC for
each cleared employee. However, in the case of an individual who is
required to be cleared in connection with the HOF FCL and who has his or
her primary place of work at another facility of the MFO, an LOC may be
issued to both facilities.
k. Requests for PCL's of personnel required to be cleared in connec-
tion with an FCL, who are also RFI's, shall be submitted to the CSO. All
other requests for PCL's of employees who are RFI's shall be submitted to
DISCO. RFI's are not eligible for PCL's if:
(1) the foreign interest involves a "Designated country" or a
citizen, firm, or other entity of a "Designated country;" or
(2) their work as RFI's could create a potential conflict of
interest situation vis-a-vis their work for the contractor. By way of
example, a potential conflict of interest situation is considered to exist
when an individual represents a foreign government, or is in the employ of
a foreign government, or an individual's technical or scientific endeavors
on behalf of a foreign interest are similar to his or her technical or
scientific endeavors on behalf of the U.S. contractor; or
(3) they are not U.S. citizens or U.S. nationals.
Decisions as to whether an individual is eligible for a PCL pursuant to
paragraph (1), (2), or (3) above are made by DIS. With the exception of
the foregoing, RFI's are eligible for consideration for PCL's provided
91 20.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VOL 7,4Z.V.G.L-M
they submit statements explaining fully their foreign connections. The
statement shall identify the foreign entity. If it is a business enterprise,
the statement shall explain the nature of the business and to the extent
possible, details as to its ownership, including the citizenship of the
principal owners or blocks of owners. The statement shall fully explain the
nature of the relationship between the applicant and the foreign entity and
indicate the approximate percentage of the applicant's time devoted to the
interest cf the foreign entity. In addition, the statement shall incorporate
the provision that the applicant recognizes his or her special responsibility
to protect classified information from disclosure to any unauthorized person,
foreign or domestic. Two copies of the statement described above shall be
included with each request for an initial PCL, transfer of PCL, concurrent
PCL, or conversion of clearance. In those cases where an employee who is
cleared (or is in the process of being cleared) becomes an RFI, the contractor
shall submit a written report which shall include the statement described
above. In those cases where an RFI is required to be cleared in connection
with an FCL, the provisions of paragraph 22f also apply.
1. Persons not eligible for a PCL under the provisions of this
section may be granted access to classified information only as speci-
fically authorized in writing by a UA. The granting of such access is
beyond the scope of the DoD Industrial Security Program, and all necessary
instructions will be provided by the UA concerned.
m. When an interim PCL has been granted and derogatory information
is subsequently developed, DISCO may withdraw the interim PCL pending
completion of the processing which is a prerequisite to the issuance of a
final PCL. When an interim PCL for an individual who is required to be
cleared in connection with the FCL is withdrawn, the interim FCL will
also be withdrawn unless action is taken to remove the individual from
the position requiring a PCL. Withdrawal action is not a denial or
revocation of a PCL and is not appealable.
n. Periodically, the need arises for DISCO to reconcile its personnel
security clearance records with those of the contractor. When furnished
with a list of cleared personnel by DISCO, the contractor shall annotate the
listing with any corrections or adjustments and return it at the earliest
practical time. In addition, the reply shall include a statement by the
facility FSO certifying whether the individuals listed remain employed in
positions requiring access to classified information.
20.1. Emergency Higher Level Access. Periodically, contractors may
experience circumstances where an urgent operational need or a contract-
ual exigency exists for one or more of its employees to have one-time or
short duration access to classified information at a higher level than
is authorized by the pertinent PCL in effect. In many instances, the
processing time required to upgrade the PCL would preclude timely access
to the information.
20.1 92
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
In such situations, and only for compelling reasons 11 in support of the
national interest, contractors are authorized to grant higher level access
on a temporary basis subject to advance approval (verbal, if necessary, but
later confirmed in writing) from the CSO and adherence to the terms and
conditions prescribed below. Thisrauthority may be revoked by the CSO for
abuse, inadequate record keeping, or improper security oversight. These
procedures do not apply when circumstances exist which would permit the
routine processing of an individual for the higher level PCL. Additional
procedures and conditions for effecting emergency access to information
at a classification level above that reflected on a current LOC are as
follows:
a. The employee must be a U.S. citizen and possess a current
government-granted clearance, and the access required shall be limited
to classified information one level higher than the classification level
reflected on the PCL in effect.
b. Justification for the higher level access shall be approved, in
writing, by the facility FSO or his or her single designee for this purpose.
Emergency access, once granted, shall be canceled promptly when no longer
required, at the conclusion of the authorized period of access, or upon
notification from the CSO.
c. The employee to be afforded the higher level access shall have
been continuously employed by the contractor for the preceeding 24-month
period. Higher level access is not authorized for part-time employees or
consultants for any period of time without the written approval of the UA
contracting officer concerned.
d. Pertinent facility records concerning the affected employee shall
be reviewed and no significant adverse information concerning that person
shall be known to the contractor, that is, adverse information reportable
pursuant to paragraph 6b(1).
e. Whenever possible, access shall be confined to a single instance
or a few occasions. The duration of access shall not normally extend
beyond 30 calendar days from date of access inception. Exceptionally, if
the need for access is expected to continue for a period in excess of 30
days, written authority of the UA contracting officer is required. If the
need for access is expected to extend beyond 90 days, the facility shall
promptly place the affected employee in process for the higher level PCL
concurrent with the granting of emergency access. When extended access
is approved by the UA, such access shall be canceled at or before 90 days
from original date of access inception. The exercise of emergency access
shall be used sparingly, and repeat use of this unique arrangement within
any 12-month period on behalf of the same individual is prohibited.
1/ A "compelling reason" as used herein, is expressly limited to
circumstances concerning a paramount matter that would permit the
avoidance of an unacceptable delay in contract performance, precon-
tract activity or in special cases to overcame a critical technical or
engineering problem, the time-sensitive solution to which is deemed
essential to fulfill a crucial contract performance criterion.
93 20.1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V I .1.1_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5ZZU.ZZ-11
f. Access at the higher. level shall be limited to information
under the control and custody of authorizing contractor and shall be
afforded under the general supervision of a properly cleared employee.
The employee charged with providing such supervision shall be responsible
for recording the higher-level information actually revealed along with
each date such access is afforded, and for daily termination of higher-
level access and retrieval of pertinent material for proper safekeeping.
g. Access at the next higher level shall not be authorized for
COMSEC, SCI, NATO, or foreign government information.
h. The contractor shall document the need for affording the
employee a higher-level access and maintain all related documentation
for 5 years. A copy of the documentation shall be forwarded to the CSO
and the government contracting officer concerned. As a minimum, this
documentation shall include:
(1) The name and SSN of the employee afforded higher level
access and the level of access authorized.
(2) Justification for the access, to include a full explanation
of the compelling reason to grant the higher level access and precisely
how the national interest would be served to do so. This justification
shall include the signature of the FSO and the name of the CSO official
who approved access and the date thereof.
(3) An unclassified description of the specific information
to which access was authorized and granted, and the duration of access
along with the date(s) access was afforded.
(4) A listing of the facility records reviewed and a statement
that no significant adverse information concerning the employee is known
to the contractor.
(5) Copies of any pertinent briefings/debriefings administered
to the employee.
21. Facility Security Clearances.
a. Procedures for Processing. An FCL is an administrative
determination that a facility is eligible from a security viewpoint for access
to classified information of the same or lower classification level as the
clearance being granted. FCL's shall not be granted to contractor activities
located outside the U.S., Puerto Rico, or a U.S. possession or trust
territory. FCL's may be granted only to contractors organized and existing
under the laws of any of the fifty states and Puerto Rico. Contractors
organized and existing under the laws of U.S. possession or trust territory
may not be processed for or granted an FCL unless prior approval is received
from the Deputy Director (Industrial Security), HQ DIS. The CSO assigned
responsibility for the geographic area in which the facility is located (see
appendix VIII) will advise the prospective contractor of the actions required
for the processing, the issuance, and the continuation of an FCL. In
connection with the issuance of an FCL, PCL's must be granted to certain
management personnel as prescribed in paragraph 22. In addition, the
21. 94
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
contractor shall execute .a DD Form 441,,or, where appropriate, an "Appendage
to Department of Defense Security Agreement" (DD Form 441-1) and a
"Certificate Pertaining to Foreign Interests" (DD Form 441s). In the case of
a MFO, where more than one facility is covered by the DD Form 441 or DD Form
441-1, the contractor shall furnish a copy of the DD Form 441 with DD Form
441-1, when appropriate to each facility covered under the agreement and to
the CSO of each covered facility. Before a contractor is eligible for custody
of classified information, the contractor, in addition to having an FCL, shall
have appropriate storage capability and be prepared to apply such other
safeguards as prescribed by this manual. Classified information which is of a
higher security classification than the contractor's FCL shall not be
disclosed to the contractor.
b. Licensing, Patent, and Trade Secret Agreements. Licensing,
patent, and trade secret agreements with a foreign entity may render a
contractor ineligible for an FCL, unless appropriate procedures are
established in the facility's SPP to ensure that such agreements will not
jeopardize the security of classified information, which is entrusted to
the contractor. In this connection, attention is directed to the State
Department's ITAR, in particular, parts 124 and 125 thereof. This regu-
lation provides, inter alia, that before the execution of any license
agreement envisaging the transmittal abroad of classified U.S. military
information, it must first be submitted to the Department of State for
review and approval, and that prior to any approval of such agreement,
the release of the classified information involved must be approved by
the cognizant U.S. military department and the DoD under established
procedures.
c. Foreign Ownership, Control, or Influence (FOCI). Facilities
which are determined to be under FOCI are not eligible for an FCL.
Agreements with .a foreign interest may make a contractor ineligible
for an FCL. Execution of a DD Form 441s (see appendix I, paragraph L)
is required in connection with a determination of the degree, if any,
of FOCI. The contractor must execute a new DD Form 441s whenever there
is any change in the information previously submitted (it is not necessary
to repeat answers on the new DD Form 441s which have not changed). In
addition, when any question on the DD Form 441s has been answered
affirmatively, a new complete DD Form 441s must be submitted every 5
years from the date of the last change submitted. If no changes have
occurred, a statement to this effect is necessary. Any investor who has
acquired a direct or indirect beneficial ownership interest of 5 percent
or more of any class of stock of a registered company, or any investor
who plans to make a tender offer to purchase securities, which is reason-
ably expected to result in such an ownership interest, is required to file
a Schedule 13D report with the SEC, with the company whose securities are
involved, and with any national exchange on which the securities may be
traded. If the acquisition will result in the submission of a revised
DD Form 441s, and the contractor has received Schedule 13D from the
investor, a copy of the Schedule 13D will be forwarded with the DD Form
441s or, if appropriate, with the report (notification letter) required by
paragraph 6a(4)(f). A new DD Form 441s shall also be executed by the
contractor whenever advised that the form is required for an official
purpose. It is the contractor's responsibility to provide complete
95 21.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-_4
1 Li_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
information to ensure that the degree of FOCI to which the facility may
be subjected is fully explained to enable the U.S. Government to ascertain
whether classified information entrusted to the contractor is, or could be,
jeopardized.
22. Personnel Clearances Required in Connection with Facility Clearances.
Certain individuals, as described below, must be processed for clearance in
connection with FCL's. As a related matter, unless notified by the CSO that
such determinations are not required, individuals other than those described
below, who exercise control over the management of the facility through stock
ownership, proxy voting rights, majority ownership of securities, or by some
other method control the management of the facility and affect the appointment
and tenure of officers, directors, or principal supervisory management
personnel of the facility, shall be processed for a determination of clearance
eligibility by the CSO in connection with the FCL.
a. Corporations, Associations, and Nonprofit Organizations. Except
as provided for below, the following individuals are required to be cleared
in connection with, and at the 'revel of, the FCL.
(1) The chairman of the board and all principal officers must be
cleared.
(a) Other officers 2/, who shall not require access to
classified information in the conduct of the organization's business and
who do not occupy positions that would enable them to affect adversely
the organization's policies or practices in the performance of classified
contracts, are not required to be cleared, provided the organization
complies with the provisions of paragraph e below (exclusion action is not
required for assistant secretaries, assistant treasurers, and assistant vice
presidents who do not have management responsibilities related to perfor-
mance on classified contractors); or
(b) Other officers who require access to classified infor-
mation in the conduct of the organization's business, but at a lower level
than that of the FCL, may be cleared with a U.S. Government granted PCL at the
lower level, provided they do not occupy positions that would enable them to
affect adversely the organization's policies and practices in the performance
of the higher level classified contracts, and the organization complies with
the provisions of paragraph e below.
(2) Directors who require access to classified information must
be cleared. Directors who do not require access to classified information
in the conduct of the organization's business, and who do not occupy
positions that would enable them to affect adversely the organization's
policies or practices in the performance of classified contracts, are not
required to be cleared. A director who also serves as a principal officer
shall be cleared. If the corporation or association conducts meetiugs with a
ag tem chairman or by a rotating chairmanship, all board members who
2/ All officers, as defined by paragraph 3bj, are considered OODEPs of an
organization, but not all OODEPs occupy positions required to be cleared
in connection with an FCL.
QA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
are eligible for or who could sit as board chairman shall be cleared, and,
with respect to all uncleared directors, the organization shall comply
with the provisions of paragraph e below. If the board has seen fit
to delegate certain of its duties and responsibilities to a legally
constituted executive committee, only the members of this committee who
require access to classified information shall be cleared. Other directors
shall be excluded in accordance with the provisions of paragraph e below.
Two copies of the instrument establishing the executive committee shall be
furnished to the CSO.
(3) The management official in charge at the facility and the
FSO shall always be cleared in connection with the FCL.
(4) A current list of all OODEPs shall be maintained by the
facility, with a copy furnished to the CSO. The list shall designate by
name those individuals granted an LOC, those who are being processed for
a PCL, and those who have been excluded from access to classified infor-
mation pursuant to the provisions of paragraph e below. Such lists shall
be signed by an OODEP of the corporation.
b. Sole Proprietorships. The following individuals are required to
be cleared in connection with, and at the level of, the FCL:
(1) The owner must be cleared.
(2) All officers, if applicable, must be cleared.
(3) The management official in charge of the facility and the
FSO shall always be cleared in connection with the FCL.
(4) A current list of all OODEPs shall be maintained by the
sole proprietorship and the CSO. The list shall designate by name those
individuals granted an LOC, those who are being processed for a PCL, and
those who have been excluded from access to classified information pursuant
to the provisions of paragraph e below. Such lists shall be signed by an
OODEP of the sole proprietorship.
c. Partnerships. Except as provided for below, the following
individuals are required to be cleared in connection with, and at the
level of, the FCL:
(1) All general partners must be cleared.
(2) All other partners:
(a) Partners, other than general partners, who do not require
access to classified information in the conduct of the organization's busi-
ness and do not occupy positions that would enable them to affect adversely
the organization's policies or practices in the performance of classified
contracts, are not required to be cleared and the organization by offi-
cial action of the general partners shall comply with the provisions of
paragraph e below. or
97 22.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
i 1,1 1 i 1 ? 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220 . 22-M
(b) Partners, other than general partners, who require access
to classified information in the conduct of the organization's business, but
at a lower level than that of the FCL, shall be cleared at the lower level
provided they do not occupy positions that would enable them to affect
adversely the organization's policies and practices in the performance of
higher-level classified contracts, and the partnership, by official action
of the general partners, complies with the provisions of paragraph e below.
(3) If the partnership has seen fit to delegate certain of its
duties and responsibilities to a legally constituted executive committee, all
members of this committee shall be cleared in connection with the FCL. Other
nonexecutive committee member general partners shall be excluded, provided the
committee has full executive authority to exercise management control and
supervision for the partnership, and, with respect to these other partners,
the organization complies with the provisions of paragraph e below. Two
copies of the partnership's resolution delegating this authority to the
committee shall be furnished to the CSO. The resolution shall specify which
partners are excluded from access to all classified information, and which
partners are excluded from access to higher-level classified information, as
appropriate.
(4) The management official in charge of the facility and the
FSO shall always be cleared in connection with the FCL.
(5) A current list of all OODEPs shall be maintained by the
partnership, with a copy furnished to the CSO. The list shall designate
by name those individuals granted an LOC, those who are being processed
for a PCL, and those who have been excluded from access to classified
information, pursuant to the provisions of paragraph e below. Such lists
shall be signed by a partner or executive personnel of the partnership.
d. Colleges and Universities. Except as provided for below, the
following individuals are required to be cleared in connection with, and
at the level of, the FCL:
(1) The chief executive officer must be cleared.
(2) Those other officers or officials who are specifically and
properly designated by action of the board of regents, board of trustees,
board of directors, or similar executive body, in accordance with the
institution's requirement, as the managerial group having the authority
and responsibility for the negotiation, execution, and administration of
UA contracts, shall be cleared. The institution shall furnish the CSO a
copy of such designation of authority, from which the particular officers
who are to be processed in connection with an FCL can be determined, and
thereafter, changes shall be furnished as they occur. If this requirement
is not met, all officers shall be processed for PCL's in connection with the
Feld.
(3) Regents, trustees, or directors:
(a) Regents, trustees, or directors, who shall not require
access to classified- information in the-conduct of the institution's business
and who do not occupy positions that would enable them to affect adversely
22. 98
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
the institution's policies or practices in the performance of classified _
contracts shall be excluded. If the college or university conducts meetings
with a na tem chairman or by a rotating chairmanship, all board members who
are eligible for, or could sit as, board chairman shall be cleared. With
respect to all uncleared regents, trustees, or directors, the institution
shall comply with the provisions of paragraph e below.
(b) If the board has seen fit to delegate certain of its
duties and responsibilities to a legally constituted executive committee
or managerial group, only the members of this committee or group who
require access to classified information shall be cleared. Other regents,
trustees, or directors shall be excluded in accordance with the provisions
of paragraph e below. Two copies of the instrument establishing the execu-
tive committee shall be furnished to the CSO.
(4) The management official in charge of the facility and the
FSO shall always be cleared in connection with the FCL.
(5) A list of OODEPs shall be maintained by the college or
university and the CSO. The list shall designate by name those indivi-
duals granted LOC's, those who are being processed for PCL's, and those
who have been excluded from access to classified information, pursuant to
the provisions of paragraph e below. Such lists shall be signed by an
OODEP of the college or university.
e. Exclusion Procedures. This paragraph applies to those officers,
directors, partners, regents, and trustees who, pursuant to the provisions
set forth above, can be excluded altogether from the requirement for a PCL,
or who can be excluded from higher-level access by virtue of possessing a
PCL at a level below that of the FCL. In order to invoke these exclusion
procedures, the organization by formal action of the board of directors,
all general partners, or similar executive body, shall affirm the
following, as appropriate.
(1) Such officers, directors, partners, regents, or trustees
(designated by name) shall not require, shall not have, and can be
effectively excluded from access to all classified information in the
possession of the organization. They also do not occupy positions
that would enable them to affect adversely the organization's policies
or practices in the performance of classified contracts or programs for
the UA's. This action shall be made a matter of record in the organiza-
tion's minutes of the board of directors, partnership, board of regents,
or trustees, or similar executive body. Two copies of such minutes, dated
and identified by the name and address of the facility, shall be furnished
to the CSO.
(2) Such officers or partners (designated by name) shall not
require, shall not have, and can be effectively denied access to higher-
level classified information (specify which higher level(s)) and do not
occupy positions that would enable them to affect adversely the organization's
policies or practices in the performance of higher-level classified contracts
(specify higher level(s)) or programs for the UA's. This action shall be made
a matter of record in the organization's minutes of the board of directors,
partnership, board of regents, or trustees, or similar executive body. Two
copies of such minutes, dated and identified by the name and address of the
facility, shall be furnished to the CSO.
99 22.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H -ill I L
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
f. Representative of a Foreign Interest. When an RFI is required to
be cleared in connection with an FCL, and the RFI has not been excluded in
accordance with paragraph e above, the following procedures shall apply:
(1) When the statement required by paragraph 20k has been
executed, official notice of its execution shall be made a matter of
record in the organization's minutes by the board of directors or similar
executive body. Two copies of the minutes shall be furnished the CSO.
(2) Failure to obtain a PCL for, or to exclude an RFI, shall
make the facility ineligible for clearance and any existing FCL shall be
administratively terminated by the CSO. Such action is not appealable.
(3) In those cases where an
connection with the FCL becomes an RFI,
report required by paragraph 6a(4)(d),
in this paragraph.
individual who is cleared in
the contractor shall submit the
in addition to the actions prescribed
23. Security Clearance of Negotiators. Negotiators designated by the
contractor as being required to participate in the preparation of a bid or
quotation may be processed for PCL's concurrent with, but not as a part of,
the FCL. An FCL is not dependent on the granting of a PCL to negotiators,
and changes in negotiators shall not affect the status of an FCL.
24. Security Clearance of Additional Personnel. Except in the case of
personnel who are required to be cleared in connection with an FCL, and
negotiators, the contractor shall not initiate PCL action on employees
until an FCL has been granted. Contractor employees, other than those
cleared in accordance with the provisions of paragraphs 22, 23, 27, or 31,
whose access to classified information is essential in the performance of a
classified contract, shall be cleared as specified below.
a. Clearance by the DoD.
(1) DoD shall grant PCL's for U.S. citizen employees of the
contractor who:
(a) require access to information classified TOP SECRET 3/
or SECRET, or to any COMSEC information, regardless of classification,
SENSITIVE COMPARTMENTED INFORMATION, RESTRICTED DATA or FORMERLY RESTRICTED
DATA, and classified foreign government information;
(b) are employed by a college or university;
(c) require access to NATO information classified CONFIDENTIAL
or higher as described in section XI;
3/ When a TOP SECRET clearance is requested, DISCO will automatically
issue an LOC for SECRET when the investigation necessary for PCL at
the SECRET level has been completed with satisfactory results. That
LOC will subsequently be superseded by an LOC -for TOP SECRET when the
required additional investigation is completed.
24.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
100
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(d), require access Lo ACDA classified information;
(e) make determinations to grant access authorizations, in
accordance with paragraph b below;
(f) are RFI's;
(g) require security clearances as a condition of the
Nuclear Weapon PRP for duties in Critical and Controlled positions under
the Nuclear Weapon Security Program (see paragraph 3bi); or
(h) are naturalized U.S. citizens from Designated
countries.
(2) DoD shall grant PCL's for employees of contractors whose
applications for clearances are required to be referred to DISCO, pursuant
to paragraph b below.
(3) DoD shall grant Limited Access Authorizations (LAA's) for
non-U.S. citizen employees of the contractor who require access to class-
ified information (see paragraph 31).
b. Clearance by the Contractor. Contractors are delegated authority
to act for and on behalf of the DoD to grant clearances at the CONFIDENTIAL
level to qualified U.S. citizen employees who have a fully justified and
bona fide requirement for access to CONFIDENTIAL information. Contractors
are not authorized and shall not grant CONFIDENTIAL clearances to employees
for any other purpose. CONFIDENTIAL clearances granted by the contractor
shall remain valid, unless otherwise revoked by the DoD, within any facility
of the same organization, so long as the individual continues in the
contractor's employment. A contractor is not authorized to revoke such a
clearance. However, if the employee no longer has or requires access to
classified information in the forseeable future, the clearance shall be
administratively terminated. The contractor is not authorized to grant an
interim CONFIDENTIAL clearance. Contractor-granted CONFIDENTIAL clearances
are not valid for access to RESTRICTED DATA; FORMERLY RESTRICTED DATA; any
COMSEC information; SENSITIVE COMPARTMENTED INFORMATION; ACDA classified
information; NATO information (except for NATO RESTRICTED information); to
meet the PCL requirement as a prior condition for certification to fill a
Critical or Controlled Position under the Nuclear Weapon Security Program;
classified foreign government information; or for assignment to duty
stations outside the U.S. Moreover, contractor-granted CONFIDENTIAL
clearances granted to employees who are subsequently assigned to duty
stations outside the U.S. shall be administratively terminated.
(1) A contractor is authorized to grant a CONFIDENTIAL clearance
to a U.S. citizen employee for access to classified information at the
CONFIDENTIAL level provided that the contractor makes a determination of
trustworthiness prior to granting the clearance and provided further that
such access is essential to the accomplishment of lawful and authorized
Government purposes. The contractor shall make the determination of
trustworthiness based on a favorable review of the following:
101 24.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H j 1.t I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(a) Personnel records and related screening procedures
used to evaluate initial and continuing eligibility and suitability for
employment and all of the records maintained on the employee that might be
materially significant to PCL consideration. As a minimum, verification of
prior employment and contact with listed references shall be accomplished.
(b) The "Application and Authorization for Access to
Confidential Information (Industrial)," DD Form 48-2, executed by the
employee indicates that: (i) the employee is a U.S. citizen; (ii) the
employee is not a naturalized U.S. citizen from a Designated country; (iii)
the employee is not an RFI; (iv) the information furnished in item 8 of the
form, if any, does not reflect that a PCL has been suspended, denied, or
revoked; and (v) the certification section of the form has been signed and
witnessed.
(c) Documents indicating that the individual is a U.S.
citizen. Verification of U.S. citizenship shall be accomplished by
the contractor by sighting documents described in appendix XII. If the
required documentary evidence is not immediately obtainable, the
contractor may grant the CONFIDENTIAL clearance after having explained
to the employee that the clearance is conditional, based on submission of
the necessary documentary evidence as soon as possible, but, in any event,
no later than 90 days. If the employee does not produce the necessary
proof of U.S. citizenship within 90 days, the contractor shall adminis-
tratively terminate the CONFIDENTIAL clearance which may be reinstated
immediately upon presentation of proof of citizenship.
(2) When the contractor is satisfied with the trustworthiness
of the employee, the contractor, acting for ?and on behalf of the DoD, is
authorized to complete Part II of the DD Form 48-2 indicating that the
employee is granted a clearance for access to CONFIDENTIAL information. A
copy of the completed DD Form 48-2 shall be submitted to DISCO for record
purposes and review.
(3) In situations where an employee indicates in item 7 of the
DD Form 48-2 of having applied for or having received a previous PCL but
gives no indication in item 8 of the form that a prior PCL has ever been
suspended, denied, or revoked, the contractor is authorized to make a
favorable determination, if otherwise appropriate.
(4) When circumstances are such that the contractor is unable to *
make the required determination of trustworthiness, because the employee
(i) is a naturalized citizen from a Designated country; (ii) responds
affirmatively to item 11 of the DD Form 48-2; (iii) lists relatives under
item 12; or, (iv) indicates being an RFI under item 13, the contractor shall *
not grant the employee a clearance for access to CONFIDENTIAL information.
Instead, the contractor shall complete Part II of the DD Form 48-2 as
appropriate, and submit co DISCO one copy of the completed DD Form 48-2
together with the forms prescribed in paragraph 26b, for further evaluation *
and determination of eligibility for a security clearance for access to
CONFIDENTIAL information. The contractor shall include a statement explaining
the basis for referral.
(5) In the event the employee refuses to complete the certifica-
tion portion of the DD Form 48-2 by signature as required, the form will
11.
102
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
be considered incomplete and the contractor shall take no further action
pending completion of the form as required.
(6) The authority to grant clearances at the CONFIDENTIAL level
to qualified U.S. citizen employees, may be rescinded by the CSO if abuse
becomes evident or if the contractor is unable to comply with the provi-
sions set forth above. When such occurs, the contractor shall be required
to submit requests for such clearances to DISCO in accordance with paragraph
26b. The privilege may be restored by the CSO only upon a showing of good
cause.
25. Preemployment Clearance Application -- Prohibited. The contractor
shall not initiate any preemployment clearance action. An applicant for
employment in a position which requires access to classified information
may be informed that a PCL will be required. A DD Form 48, "DoD Personnel
Security Questionnaire (Industrial-NAC);" DD Form 48-2, "Application
and Authorization for Access to Confidential Information;" DD Form 48-3,
"DoD Personnel Security Questionnaire (Updating);" or DD Form 49, "DoD
Personnel Security Questionnaire (Industrial)" shall not be offered to,
or be required to be completed by, an individual until he or she is
employed by the contractor in a position requiring access to classified
information and placed on the payroll. However, in exceptional cases the
PCL application forms may be furnished prior to the date of entry on duty.
This exception is limited to cases in which a written contract for future
employment in a position that requires access to classified information
has been executed between the prospective employee and the employer which
prescribes a fixed date of entry on the payroll within a reasonable and
justifiable period of time, normally not to exceed 120 days from the
effective date of the employment contract.
26. Application for Personnel Security Clearance.
a. General.
(1) Contractors shall make application for DoD PCL's in
accordance with the provisions of this section. For PCL's required in
connection with an FCL, applications shall be submitted to the CSO. Appli-
cations for all other PCL's shall be submitted to DISCO, P.O. Box 2499,
Columbus, Ohio 43216. In addition to the forms and related documentation
required in connection with the application for a PCL, the contractor
shall compile and submit other information when requested by DISCO or the
CSO to satisfy an official U.S. Government requirement. Failure by any
employee to furnish PCL application forms, when requested or when required
by this manual, shall preclude the granting of any new PCL to the appli-
cant, and shall constitute sufficient basis for the DoD to administratively
suspend any outstanding PCL of the employee concerned and discontinue all
processing action. Resumption of case processing will only be approved
upon showing of good cause by the applicant. Whenever a contractor
employee has submitted forms prescribed by this paragraph to DISCO but
subsequently objects, for any reason, to being processed for a PCL or to
have an existing PCL continued, the contractor shall report all relevant
facts to DISCO. Verification of such objections shall be made by the U.S.
Government. On verification, any pending PCL processing action shall be
discontinued, and any PCL then held by the employee shall be adminis-
tratively terminated by the U.S. Government without prejudice to the
employee.
103 26.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.j1li11W4 4? I _
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
(2) The contractor shall establish procedures for completing the *
Privacy Sections of DD Form 48, DD Form 49 and DD Form 48-3 as follows: *
(a) When providing an employee with a personnel security *
questionnaire, the contractor will inform the employee that information *
regarding privacy procedures and preaddressed envelopes does not apply. *
(b) Each employee will be advised that if they believe there
is a significant personal matter which they desire not to disclose to their
employer, they may request an interview with a Defense Investigative Service
agent by entering "DIS Interview Requested" rather than completing the
specific item.
(3) The employee shall be advised that, prior to affixing his or
her signature to the respective privacy section, the form may be folded or
covered, so that the witness to his or her signature will not see the
prescribed portion.
(4) The employee shall be further advised that, on completion
of the privacy section, the PSQ together with the "Applicant Fingerprint
Card" (FD Fora 258) shall be returned to his or her employer for mailing.
(The FD Form 258 is not required when a DD Form 48-2 or DD Form 48-3 is
submitted. It is required in connection with all other submissions.)
(5) The employer shall ensure that the "Applicant Fingerprint
Card," if required, is properly completed. In addition, the contractor
shall establish procedures to ensure that an employee of the contractor
will witness the taking of the employee's fingerprints on the card to
ensure that the person fingerprinted is, in fact, the same as the employee
being processed for the clearance, and ensure that substitutions do not occur.
(6) The completed personnel security forms shall be forwarded to
DISCO, or the CSO, as specified in paragraph (1).
(7) All forms required by this section in connection with PCL's
may be obtained from DISCO. Instructions for completion of such forms
are contained in pamphlets, which are also obtainable from DISCO. These
pamphlets are entitled: (i) *Detailed Instructions for Completion of DD
Fora 48, Personnel Security Questionnaire (Industrial - NAC)," (ii)
"Detailed Instructions for Completion of DD Form 49, Personnel Security
Questionnaire Industrial (BI/SBI)," and (iii) "Instructions for Completion
of DD Form 48-3."
b. New clearances. Application for an initial PCL, for upgrading
an existing PCL, or for requesting a PCL in situations where other provi-
sions of this manual are not applicable, shall be made by the contractor by
submission of the following forms:
1
26. 04
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
POP JLLU.L4?M
(1) DD Form 48 4/, completed and executed by U.S. citizens who
are to be processed for a DoD issued CONFIDENTIAL or SECRET clearance
unless paragraph (2) below applies;
(2) DD Form 49 5/, completed and executed in the following
cases:
(a) immigrant aliens and foreign nationals who are to be
processed for a SECRET or CONFIDENTIAL LAA,
(b) U.S. citizens who are to be processed for TOP SECRET
clearance,
(c) Naturalized U.S. citizens from Designated countries
who are to be processed for any level of PCL,
(d) U.S. citizens who are to be processed for any level of
PCL when the applicant lists relatives or relatives of his or her spouse
who are residing in Designated countries, and
(e) U.S. citizens who are to be processed for any level
of clearance when the applicant advises he or she is a RFI.
(3) A properly completed and executed FD Form 258 with each
request submitted pursuant to paragraphs (1) or (2) above. Care shall
be exercised to ensure that fingerprints are authentic, legible, and
complete. Those which do not meet prescribed standards shall be returned
for reexecution, which will result in clearance delays. The employee shall
deliver the completed forms to the designated company representative who
will ensure mailing.
c. Interim Clearances. Except as authorized below, requests for an
interim TOP SECRET PCL shall be forwarded to the contracting officer for
approval by the head of the contracting activity or his or her designated
representative. Approval will be given only in an emergency situation
in order to avoid crucial delays in precontract negotiation, or in the
award or performance on a contract. The contractor shall: (i) obtain
such approval and submit it with the application for the interim TOP
SECRET PCL, or (ii) forward the application for interim TOP SECRET PCL
through the contracting officer. The words "Interim TOP SECRET" shall be
placed in bold letters in the lower right-hand corner of the "Job Title"
block of the DD Form 49. The approval letter from the contracting officer
shall be attached behind the FD Form 258. As an exception to the fore-
* going procedures, when an emergency situation exists which would render
the facility incapable of adequately safeguarding classified material in
4/ The DD Form 48 packet consists of an original and 1 copy of the PSQ and
the privacy section.
5/ The DD Form 49 packet consists of two sections: section I -- a DD
Form 49 worksheet printed on the reverse of the instructions, aad
the DD Form 49 packaged as a 5-copy carbon set; and section II -- a
DD Form 2221, and an original and one copy of the privacy section.
Inc
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200"3-50006-4
H V .1.. 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
its possession and no contracting officer is available to approve the
interim TOP SECRET PCL request within the time required to negate the
threat, the CSO is authorized to approve such requests prior to dispatch
of the pertinent forms to DISCO. There is no need to pursue interim
clearance action below the TOP SECRET level. Applicants for SECRET and
CONFIDENTIAL PCL's will be summarily granted interim SECRET or interim
CONFIDENTIAL PCL's, as appropriate, provided initial investigative
coverage fails to uncover adverse information of material significance.
If results are favorable following completion of full investigative
requirements, a subsequent LOC will be issued by DISCO to remove the
interim status of the outstanding PCL. Access limitations for interim
PCL's are set forth in paragraph 20c. Interim action for non-U.S.
citizen employees under consideration for an LAA is not authorized.
Further, naturalized U.S. citizens from Designated countries are not
eligible for an interim PCL.
d. Clearance Transfers. Application for a PCL may be made by the
contractor for an employee for whom an LOC was previously issued while
the individual was employed by another contractor, provided there has not
been a lapse of more than 12 months since termination of the employment
for which the LOC was issued. Application is made by submitting one copy
of an executed DD Form 48-3. As an exception, when transfers are between
collocated cleared facilities, which have a common security services
agreement, the FSO need only forward the DISCO Form 562. If there is a
break in employment of more than 3 working days during the transfer process,
then this exception will not apply. An LAA granted to a non-U.S. citizen is
not transferrable, except in the case of an MFO.
e. Clearance Transfers in an MFO. Clearance transfer action under
this paragraph shall be initiated after a determination to reassign has
been made, but prior to the actual transfer.
(1) When a cleared employee is transferred from one cleared
facility to another with the same or higher level FCL, the contractor
shall:
(a) forward the original LOC 6/ or the DD Form 48-2, as
appropriate, to the gaining facility; and
(b) promptly submit a DISCO Form 562 to DISCO as notifi-
cation of the transfer and forward a copy of the DISCO Form 562 to the
gaining facility if the clearance was government-granted;
(2) When a cleared employee is transferred to an uncleared
facility or to a facility with a lower level FCL than the employee's
clearance, and the employee will continue to require access at the higher
level at another cleared facility or at a U.S. Government installation,
the contractor shall:
6/ If the LOC contains more than one name, a certified true copy identi-
_
fyiug the employee being transferred shall be forwarded. All other
names listed shall be lined through.
26. 106
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD -L-LU.LL-M
(a) forward the original LOC 6/ or the DD Form 48-2, as
appropriate, to the HOF or the appropriate Pg rather than to the gaining
facility, and
(b) submit a DISCO Form 562 to DISCO identifying the HOF or
PMF holding the employee's PCL.
(3) When a cleared employee is transferred to a cleared facility
with a lower level FCL than the employee's clearance and the contractor
desires to retain the LOC only at the lower level, the contractor shall:
(a) amend the employee's LOC to reflect the lower level of
clearance; and
(b) add a statement regarding the change in level of
clearance to the "Remarks" block of the DISCO Form 562 and promptly
submit the form to DISCO.
f. Concurrent Clearances.
(1) When a contractor hires an individual or engages a consultant
on a temporary or part-time basis, who is also employed by or acting as a
consultant to another contractor, and who has a current LOC, an additional
LOC shall be requested, if the individual requires access to classified
information. Application for this LOC will be made by the submission to
DISCO of one copy of an executed DD Form 48-3 (with the "Concurrent"
clearance block marked on part I).
(2) An exception to the requirement for submission of a DD Form
48-3 to obtain a concurrent clearance can be made when an OODEP of a parent
company becomes concurrently an OODEP of a subsidiary, or when an OODEP of a
subsidiary becomes concurrently an OODEP of the parent company, provided the
new clearance being requested is not at a higher level than the existing
clearance. In these cases the contractor (parent or subsidiary) to whom the
existing clearance has been issued, will submit a letter to the CSO of the
facility (parent or subsidiary) to which the new clearance is to be issued
setting forth full name, date and place of birth, social security number, date
and level of clearance of the OODEP, and request a concurrent clearance at the
parent or subsidiary, as the case may be. After issuance of the concurrent
clearance, the facility (parent or subsidiary) to which the new clearance has
been issued will furnish a copy to the facility to which the initial PCL was
issued. That facility, in turn, will furnish to the other facility a
reproduction of part I of the DISCO Form 482. If the OODEP employment is
terminated at either facility, the CSO of that facility will be advised in
accordance with established procedures. In addition, part II of the DISCO
Form 482 will be completed and maintained in the records of that facility.
If employment with the parent and subsidiary is terminated, their respective
CSO's will be notified, in accordance with established procedures. Only one
debriefing statement (part II of DISCO Form 482) need be completed, but a
reproduction will be furnished to the other facility.
(3) Any action by the U.S. Government to suspend or revoke a
cicarancc will be equally applicIable to all concurrent t..leurancee iseued
107 26.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H I 1
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
Dol,DZZU.LL-M
for the consultant or OODEP. Concurrent notices of such action will be
provided to each employer by the U.S. Government.
g. Reemployment of Cleared Personnel. When, within a period of 12
months, a contractor reemploys an individual for whom he or she had pre-
viously been issued an LOC, the contractor may reactivate the LOC by
submitting a notice of reemployment on a DISCO Form 562 to DISCO.
Contractor-granted CONFIDENTIAL clearances of individuals who are reemployed
within a period of 12 months may be reinstated by the contractor provided a
copy of the completed DD Form 48-2 is furnished to DISCO.
h. Formerly Cleared Personnel. In cases involving U.S. citizens
where a clearance cannot be transferred or cannot be reactivated because
there has been a lapse of more than 12 months since termination of the
employment for which the LOC had been issued, the contractor shall make
application for clearance using the procedures required for new clearance
actions.
i. Reserved.
j. Letters of Consent (LOC) (DISCO Form 560). The LOC is issued by
DoD (DISCO) to notify the contractor that one of its employees may be
authorized access to classified information at the classification level
indicated thereon. The LOC's must be maintained by the contractor to
facilitate review by the CSO during on-site inspections.
(1) Issuance of LOC's (General).
(a) LOC's are issued to the facility where the individual
is principally employed.
(b) LOC's may not be issued for a higher level of access
than the FCL of the facility where the employee is principally employed.
(c) LOC's may not be reproduced except for the necessary
records of the contractor or unless requested by competent U.S. Government
authority.
(d) LOC's may not be released, nor copies provided, to the
employee.
(e) Whenever there is a change in the legal name of an
employee for whom an LOC has been issued, the contractor shall submit one
copy of DISCO Form 562 to DISCO. DISCO will issue a new LOC.
(f) The LOC shall be returned to DISCO upon death of an
employee, or whenever return is requested by the U.S. Government.
(2) Issuance of LOC's in an NFO. The contractor (home office
facility) may elect to establish a PN F at other cleared facilities within
the MFO to be responsible for personnel security administration in a
specific geographic or functional area as prescribed by paragraph 73. In
such cases, the LOC may be issued to either the home office or the FMF.
However, it may not be at a higher level that the FCL of the facility to
which issued.
26.
108
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LW, JLLV.LL"M
,111?? ? ?
(a) When a cleared employee's duties at another facility
or a U.S. Government installation require access to classified information
at a higher level than the clearance of the facility where the employee
is employed or physically located, or if the employee is employed at an
uncleared facility, the LOC may be issued to the home office or to an
appropriate PMF.
(b) When an employee is cleared in connection with the
home office FCL, and the employee's principal place of work is at another
facility of the MFO, the LOC is issued to both the home office and the
facility where the employee is employed or physically located or to an
appropriate PMF. The contractor shall submit a DISCO Form 562 to explain
and justify the reason for requesting an additional LOC.
(c) On the DD Forms 48, 49, 48-3, or DISCO Form 562
submitted pursuant to (a) or (b) above, the name and address of the
facility at which the employee is employed or physically located shall be
shown in the "Name and Address of Employer" block of the form. The name and
address of the facility to which the LOC is to be mailed shall be placed in
the "REMARKS" block of the form preceded by the words "MAIL TO" in bold
letters.
k. DOE (Previously ERDA) and NRC Clearances. The "Q" and "L"
clearances granted by DOE and NRC are considered acceptable for con-
version to a DoD industrial PCL. The "Q" clearance is considered an
authoritative basis for a DoD clearance at the TOP SECRET level, and the
"L" clearance is considered an authoritative basis for a DoD clearance at
the SECRET level. A contractor may request a DoD industrial PCL for an
employee who currently has a "Q" or "L" clearance or previously held
such a PCL when there has not been a lapse of more than 12 months since
termination of the PCL. Application for conversion of the "Q" or
clearance to a DoD industrial PCL may be made by submitting one copy of
the DD Form 48-3 to DISCO. The "Job Title" block in part I of the DD Form
48-3 will be annotated: "DOE (or NRC) 'Q' (or 'L') Conversion Requested."
The "Q" or "L" number if known will be indicated. Following verification of
the clearance information with DOE or NRC, DISCO will issue a LOC to the
contractor.
27. Clearance of Present and Former Civilian and Military Personnel of the
DoD and Certain Other Government Agencies.
a. PCL's issued by a UA to civilian or military personnel who are
U.S. citizens may be converted to industrial PCL's as follows:
(1) top-level civilian or military personnel -- 18 months from
the time of separation from active federal service;
(2) retired civilian and military personnel of any grade with
19 years or more of federal service -- 18 months from the date of retire-
ment from active federal service;
(3) for other civilian or military personnel separated or
retired from active federal serwice 12 months from the time-of
separation or retirement from active federal service; and
109 27.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. II L.__ 1 II Li L.__ L. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
)OU 744U.LL-M
(4) National Guard and Reserve military personnel who actively
participate in the Ready Reserve Program and have been granted security
clearances by the Military Departments may have such clearance converted
to industrial PCL's. Clearances granted to such personnel who have
transferred to the standby or retired Reserve also may be converted to
industrial PCL's within 12 months of a person's being placed in the standby
or retired Reserve.
b. PCL's issued by other departments or agencies of the executive
branch of government to personnel who are U.S. citizens may be converted
to industrial PCL's, when:
(1) a determination can be made, based on a review of the prior
investigation, that the investigation meets standards prescribed by the DoD
for such clearances;
(2) the service of the employee, in a cleared status, has been
continuous since the investigation with no break in service longer than 12
months; and
(3) an inquiry to the employee's previous employer or employers
discloses no reason for expanding or updating the investigation.
c. Top-level civilian personnel are defined as presidential
appointees, civil service appointees of the supergrades (GS-16 and above),
anemembete of industry advisory committees who have been duly appointed by
secretarial levels of the UA. Top-level military personnel are those of
the general and flag officer grades.
d. Contractors employing personnel eligible for conversion of
clearance, under the provisions of this paragraph, may request clearance
to the level of access required by submitting the following information to
DISCO or the CSO, as appropriate.
(1) one signed copy of DD Form 48-3;
(2) for former civilian personnel -- a copy of the "Notification
of Personnel Action" (Standard Form 50), which terminated his or her
employment with the U.S. Government;
(3) for former military personnel -- a copy of the DD Form 214,
"Certificate of Release or Discharge From Active Duty;"
(4) for civilian or military personnel presently employed by or
on active duty with a UA, the forms prescribed by paragraphs (3) or (4)
above are not required. However, in the case of military personnel, the
individual's service number shall be placed in the REMARKS section of the
DD Form 48-3; and
(5) for National Guard and Reserve military personnel actively
participating in the Ready Reserve Program and for those who have trans-
ferred to the standby or retired Reserve within the past 12 months, the
forms prescribed by paragraphs (3) or (4) above are not required. However,
the individual's service number, the identity and exact address of the
27. 110
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Doll .5ZZU.LZ-M
unit to which assigned, and the date such participation commenced, shall
be placed in the REMARKS section of the DD Form 48-3. In addition, for
those individuals who have transferred to the standby or retired Reserve,
a copy of the order effecting such a transfer shall be attached to the
DD Form 48-3.
e. The-complete set of forms required by paragraph 26b shall be
accomplished when:
(1) the clearance requirement is for a higher level than is
reflected in the clearance records;
(2) there has been greater lapse of time than that set forth in
paragraph a above; or
(3) requested by DISCO. (The request will state that the forms
are needed to satisfy an official requirement.)
28. Contractor's Clearance Record. The contractor shall maintain a
current record at each facility (to include uncleared locations) of all
employees and consultants located at the facility/location who have been
authorized access to classified information. The record shall indicate the
level of access authorized and the date of the applicable LOC or other
authority. The record shall also reflect the issuing authority, that is, a
specific military department, DISCO, or the contractor. Moreover, the
records maintained by a HOF and/or PMF for employees located at subordinate
facilities (cleared and uncleared locations) shall include the name and
address at which the employee is assigned. In addition, contractors shall
maintain the original DIS FL 381-R, the DD Form 441 or DD Form 441-1, for
the duration of their facility security clearance. In the event the
Security Agreement is terminated for any reasons by either party, the DIS
FL 381-R and the contractor's copy of the DD Form 441, or the DD Form
441-1, shall be returned to the CSO.
29. Administrative Termination of Personnel Security Clearances.
a. The contractor, under the conditions stated below, must request the
administrative termination of U.S. Government granted PCL's which are no
longer required. If a cleared employee no longer has or requires access to
classified information, and no requirement for such access is anticipated in
the foreseeable future, administrative termination of a U.S. Government issued
clearance is accomplished by submission of a properly completed DISCO Form 562
to DISCO. Contractor-granted CONFIDENTIAL clearances must be administratively
terminated by the contractor in accordance with the procedures and criteria
of this paragraph. The administrative termination of a contractor granted
CONFIDENTIAL clearance is completed at the time the FSO signs the DISCO
Form 562 and forwards it to DISCO. The contractor shall process, for
administrative termination or downgrading to a lower level, all TOP SECRET
clearances which are no longer required. When an individual with a TOP
SECRET clearance has not had access to TOP SECRET information in the previous
18 months, but the contractor anticipates a requirement for access to TOP
SECRET information in the foreseeable future, justification for retention of a
TOP SECRET PCL shall be provided to the CSO. If a contractor fails Lc) take
action to terminate a TOP SECRET PCL under the conditions described above, and
111
29.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I] V 1..1.1 i..1 .1_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
fails to submit justification for retention of the clearance, the CSO shall
submit a recommendation to the Deputy Director (Industrial Security), HQ DIS,
for processing pursuant to the provisions of paragraph f below.
b. If the contractor determines that an individual previously
cleared in connection with the FCL no longer requires clearance and can
be excluded from access, a recommendation for administrative termination
of the clearance must be submitted to the CSO by submission of a properly
completed DISCO Form 562 and two copies of the organization's minutes
attesting that the exclusion action required by paragraph 22e has been
completed.
c. In connection with the preparation of the DISCO Form 562, the
contractor shall advise the employee as follows:
(1) the PCL is being processed for administrative termination
since there is no current or foreseeable future requirement for access to
classified information;
(2) the proposed action in no way reflects adversely an the
employee's PCL eligibility;
(3) the employee may be processed for a new PCL, with a minimum
of delay, when the occasion and need arises for the employee to require
access to classified information; and
(4) the employee's signature on the Security Debriefing
Acknowledgement portion of the SF 189-A will attest to the fact that he or
she understands and acknowledges this action.
d. The completed DISCO Form 562 will be forwarded to DISCO. (In the
case of an OODEP, the DISCO Form 562 shall be forwarded to the CSO.) The
completed SF 189-A will be retained by the contractor, in accordance with
paragraph 5g. If it becomes necessary to revalidate the clearance, a new SF
189-A shall be executed prior to the employee having access to classified
information.
e. Reserved.
f. In those rare and exceptional cases where DUSD(P), or higher
authority, determines that PCL's were granted in error or are not required,
he or she may opt to administratively terminate the PCL or clearance action
in process without prejudice to the individuals concerned or jeopardy to
their employer's operations.
g. In the event a need arises for an employee to have access to
classified information subsequent to the administrative termination of
the employee's clearance, and such need occurs within 5 years from the
date of the notice from the U.S. Government that the previous clearance
was administratively terminated, the previous clearance may be reinstated
promptly provided: (i) the employee has been continually employed by the
same contractor during the 5-year period, (ii) no adverse information
-concerning the employee is known to the contractor, and (iii) the
29. 112
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOU )1ZU.2L-M
reinstatement is fully justified. Upon reinstatement by the contractor
of such clearances, the contractor shall submit a DISCO Form 562 to DISCO
with certification, in "Remarks," that no break in employment has occurred
since the employee's previous clearance was administratively terminated, nor
is any adverse information known to the contractor about his/her employee.
If the clearance is not eligible for reinstatement in accordance with this
procedure, an application for new clearance shall be submitted in accordance
with paragraph 26b.
h. Reserved.
i. Reserved.
j. If the administratively terminated clearance had been a
contractor-granted CONFIDENTIAL clearance, and the need arises again for
the individual to have access to CONFIDENTIAL information, the actions
required by paragraph 24b shall be accomplished as a new clearance action.
30. Administrative Downgrading of TOP SECRET Personnel Security Clearances.
a. When an employee cleared at the TOP SECRET level does not
require access to TOP SECRET information, and a requirement for such access
is not anticipated, but access to a lower level of classified information
is required, the PCL shall be downgraded without prejudice to the lower
level by submission of a DISCO Form 562 to DISCO. The properly completed
form shall set forth in the "Remarks" block of the form a request to down-
grade the TOP SECRET clearance without prejudice to the appropriate level.
On notification of completed action by DISCO, the contractor shall annotate
the previously issued LOC to reflect the new level of access and the date
such action was taken by DISCO. The LOC retains the original date of
issuance.
b. PCL's downgraded in accordance with paragraph a above, can be
reinstated by the contractor when a requirement for higher level access
exists provided that: (i) there has not been a lapse of more than 5
years from the date of the downgrading or termination action, (ii) the
individual has been continuously employed by the same contractor/MFO, (iii)
the contractor knows of no adverse information concerning the employee, and
(iv) a justified need exists for the upgrade action. Upon reinstatement of
a TOP SECRET or SECRET PCL, the contractor shall notify DISCO by submission
of a DISCO Form 562. The "Remarks" section of tfie DISCO Form 562 shall
include the date of reinstatement, the level of clearance and a request for
a new LOC. On receipt of the LOC from DISCO reflecting the upgrading action,
the previously issued LOC will be destroyed by the contractor. The LOC
will bear a new date of clearance because of the upgrading action. When
there has been a lapse of more than 5 years from the date the TOP SECRET
clearance was downgraded to a lower level clearance, application for a
TOP SECRET or SECRET PCL shall be made by submitting one copy of DD
Form 49 or DD Form 48, as appropriate, to DISCO.
31. Access to Classified Information by Non-U.S.Citizens. Only U.S.
citizens are eligible for a security clearance and every effort shall be
113 31.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H L _ L. L [
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
WWI .14.410.1?46L-1-1
made to ensure that non-U.S. citizens are not employed in duties that may
require access to classified information. However, immigrant aliens or
foreign nationals may be granted a "Limited Access Authorization" (LAA) at
the SECRET or CONFIDENTIAL level, if qualified, as described below.
31.1 Immigrant Aliens.
a. An immigrant alien may be eligible for an LAA when all of the
following conditions are met:
(1) access is limited to a specific government contract;
(2) the individual possesses a rare or unusual expertise;
(3) a qualified U.S. citizen cannot be hired in sufficient
time to meet a contractual requirement;
(4) the individual resides permanently in the United States
and presents for verification an "Alien Registration Receipt Card" (Form
No. 1-151 or 1-551 7/); and
(5) the individual certifies in writing the intent to
become a U.S. citizen as soon as eligible.
b. Prior to requesting DISCO processing of an LAA, the proposal
shall be endorsed, in writing, by the UA authority with jurisdiction over
the contract for which access is proposed.
c. After endorsement has been obtained from the contracting officer,
the request for LAA shall be submitted as provided for in paragraph 26.
The endorsement must include a statement or evidence that a favorable
foreign disclosure decision has been rendered. If determined eligible by
the Government, an LOC will be issued by DISCO to record the LAA and to
reflect the level of access authorized. LOC's issued to immigrant aliens
pursuant to previous DoD policy will be reissued by DISCO to reflect LAA
status when it becomes practical to do so. The new LOC's will include the
words 'Limited Access Authorization - Immigrant Alien."
d. Record Keeping. In each case where an LAA has been granted to an
iimigrant alien, the contractor shall maintain, for as long as the LAA is
in effect, a record of the following information:
7/ This card is issued only to aliens who have been lawfully admitted to
the U.S. under an immigration visa for permanent residence. Pending
issuance of the new Form 1-551, the Immigration and Naturalization
Service has authorized the following notation to be stamped on offici-
ally issued documentation as evidence of immigrant alien registration:
PROCESSED FOR 1-551. TEMPORARY EVIDENCE OF LAWFUL ADMISSION FOR
PERMANENT RESIDENCE VALID UNTIL EMPLOYMENT AUTHORIZED.
31.1 114
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) the identity (including current citizenship) of the individ-
ual to whom the LAA is granted, to include, name, and date and place of
birth;
(2) date of LAA, the issuing authority, and a copy of the
correspondence from the UA authority who endorsed the LAA;
(3) the nature of the specific program material(s) to which
access is authorized and expressly limited (delineated as precisely as
possible);
(4) the classification level to which access is authorized;
(5) the compelling reasons for granting access (a copy of
the justification request forwarded to the contracting officer may be
sufficient);
(6) evidence of favorable decision from designated U.S.
Government foreign disclosure authority concerning the releasability
of the information approved for disclosure; and
(7) period of time for which access is authorized or anticipated.
31.2 Foreign Nationals.
a. Foreign nationals may be eligible for an LAA only when:
(1) access to classified information is proposed in connection
with the granting of a facility security clearance to a firm in the United
States under foreign ownership, control, or influence by a country source
of which the individual is a citizen; or
(2) access to classified information is required at a contractor
facility for performance on a contract or subcontract involving the govern-
ment of the individual's country of citizenship; and
(3) there is a bilateral security agreement containing provi-
sions for the exchange of security assurances between the U.S. Government
and the government of which the individual is a citizen.
b. Application shall be made to DISCO or the CSO, as appropriate.
DISCO may be contacted for advice concerning the documentation required to
be submitted. Upon receipt of the appropriate level security assurance
from the foreign government, a new LOC will be issued by DISCO to record
the LAA status and reflect the level of access authorized. The LOC will
include the words "Limited Access Authorization - Foreign National."
Foreign national access approvals granted pursuant to previous DoD policy
will be evaluated for continuing eligibility;
31.3 Access Limitations for Immigrant Aliens, Foreign Nationals, and
Firms Granted a Reciprocal Facility Security Clearance. Reciprocal
FCL's and all LAA's granted under the provisions of this manual are not
valid for access to:
115 31.3
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD 5220.22-m
a. TOP SECRET information;
b. information that has not been determined releasable by designated
U.S. Government disclosure authorities to the country of which the individ-
ual is a citizen or, in the case of a reciprocal FCL, to the country from
which the FOCI is derived;
c. RESTRICTED DATA, as defined in the U.S. Atomic Energy Act of 1954,
as amended;
d. FORMERLY RESTRICTED DATA removed from the RESTRICTED DATA
category pursuant to Section 142(d), Atomic Energy Act of 1954, as amended;
e. COMSEC information;
f. ACDA classified information;
g. information for which foreign dissemination has been prohibited
in whole or in part;
h. information for which a special access authorization is required;
and
i. information provided to the U.S. Government in confidence by a
third party government and classified information furnished by a third
party government.
31.3 116
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-m
Section IV. CONTROL OF AREAS
32. purpose. Normally, the contractor shall protect classified material in
the manner prescribed in paragraphs 14, 15, and 16. If, however, because of
the nature, size, or unique characteristics of the classified materials,
unauthorized personnel cannot be effectively denied access to such material
by the safeguards set forth in the above paragraphs, the material shall be
safeguarded by controlling the area in which it is located 1/. Controlled
areas shall consist of closed and restricted areas as defined in paragraphs
3m and 3bx, respectively.
33. General.
a. A controlled area shall not be established for the sole purpose of
storing classified documents (see paragraph 14a(3)(f) for guidance on use of
"other vaults and strongrooms" for the storage of classified documents).
b. Area Approval. The CSO and the contractor shall agree on the need
to establish, and the extent of, the controlled area prior to the award of the
contract, when possible, or at such subsequent times as the need for such
areas becomes apparent during the performance on the contract.
c. Reports. The CSO shall be advised, in accordance with paragraph
6a(5), of the establishment of any new controlled areas or of any change in
the location or extent of any existing controlled areas. Controlled areas
which have been temporarily deactivated, in accordance with e below, and
subsequently reactivated within 180 days need not be reported.
d. A controlled area shall be disestablished when the original or
existing need for the creation of the area no longer exists (for example,
all classified material is removed from the area for delivery to the
customer), and there is no anticipated need to reactivate the area within
180 days. Area designations shall be promptly removed when controlled
areas have been disestablished. If a disestablished controlled area is
subsequently reestablished, it must be approved as a new area in accordance
with b and c above.
e. Controlled areas shall be considered temporarily deactivated when a
controlled area environment is no longer required (see paragraph 32), and
there exists a known or anticipated need to reactivate such areas within
180 days. The area controls specified in paragraphs 34a and b are optional, *
except that posted area designations shall be promptly removed or covered.
Temporarily deactivated controlled areas shall be considered disestablished if
the need to reactivate fails to materialize within the above 180-day time
frame.
1/ The entry into a controlled area, per se, will not constitute access to
classified information if the security measures that are in force prevent
the gaining of knowledge of the classified information. Therefore, the
entry into a controlled area under conditions that prevent the gaining of
knowledge of classified information will not necessitate a PCL.
117 33.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I] V JLL.LL.. I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD 5220.22-M
34. Area Controls.
a. Closed Areas.
(1) General. Closed areas shall be separated from adjacent areas
by a physical barrier capable of preventing unauthorized entry and, when
visual access to classified materials is a factor, observation by unauthorized
persons. The physical barrier shall be substantially constructed of materials
that provide protection against surreptitious entry or removal of classified
material, and offer visual evidence of attempted surreptitious or forced
entry (see appendix V for construction requirements). Closed areas shall
be physically configured, in conjunction with internal personnel controls
and procedures, in a manner that reasonably forecloses the possibility
that unauthorized personnel can transgress the area undetected. Personnel
within the area shall be responsible for challenging all persons who may
lack appropriate access authority, regardless of the nature of perimeter
controls in use.
(2) During Working Hours.
(a) Open or unlocked entrance -- if the material within the
area is classified no higher than CONFIDENTIAL, admittance shall be controlled
by a properly cleared contractor-authorized employee or guard stationed so as
to supervise the entrance to the area. If the material is classified TOP
SECRET or SECRET, admittance shall be under the direct and continuous
supervision of a properly cleared guard posted at the entrance.
(b) Locked entrance -- if the material within the area is
classified no higher than SECRET, admittance shall be under the direct and
continuous supervision of a properly cleared contractor-authorized employee
or guard, except as may be provided for by complying with paragraph 36.
The employee or guard designated to control the entrance shall be required
to unlock and open the entrance, remain at the entrance while it remains
open, supervise the passage of material or authorized personnel through the
entrance, and to lock the entrance immediately thereafter. If the material
is classified TOP SECRET, admittance shall be under the direct and continuous
supervision of a properly cleared guard posted at the entrance, except as
may be provided for by complying with paragraph 36.
(3) During Nonworking Hours.
(a) Admittance shall be controlled by locked entrances and
exits, secured with either a built-in three-position dial-type changeable
combination lock or a three-position dial-type changeable combination padlock
as described in paragraph 14a(3)(d). However, doors secured from the inside
with a panic bolt (that is, actuated by a panic bar), a dead bolt, a rigid
wood or metal bar, or other means approved by the CSO, will not require
additional locking devices.
(b) If TOP SECRET or SECRET, information is stored in the area,
supplemental controls are required, as follows:
(1) the area is alarmed, in accordance with the
requirements in paragraph 35; or
34. 118
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) the area is patrolled by guards or other properly
cleared and authorized personnel supervised by a system which provides a
written record of the coverage of key points of the area. The patrol shall be
once hourly for TOP SECRET areas and once every two hours for SECRET areas.
The guard shall view both the inside and outside of the area to determine the
presence of unauthorized persons. Guards are not required to enter the closed
area, if substantially all of the interior space can be viewed from outside
the area through windows, peepholes, or expanded metal/wire-mesh walls.
(Drapes, curtains, or similar window coverings may be utilized during working
hours and tarpaulins over hardware during nonworking hours to protect
classified external configuration from visual access.) If the contractor
elects to have the guard enter the closed area, an approved key-operated
padlock 2/ with high-security cylinder may be used to secure the area. If the
contractor does not want to have the guard enter the closed area and if
windows, peepholes, or expanded metal/wire-mesh walls cannot be used, because
exterior configuration of hardware is classified and the use of tarpaulins to
prevent visual access is not practical, the contractor may elect to utilize
the following alternative procedure:
The area will be thoroughly checked at the end of
the working hour period by the last person leaving
to ensure area integrity and that no individual
remains within. A written record, to include the
signature of the person securing the area and the
time secured, will be posted on the interior side
at the door. Additionally, a log will be posted
at the exterior of each door and the guard will
2/ Approved key-operated padlocks shall meet the requirements of: Military
Specification P-43607 (shrouded shackle), National Stock Number
5340-00-799-8248, and Military Specification P-43951 (regular shackle),
National Stock Number 5340-00-799-8016. The keys shall be safeguarded as
classified material of a classification equal to the highest level of the
classified material being protected. On initial receipt, or when not in
use, high security key locks shall be stored consistent with the level of
the facility's authorized safeguarding capability. Use of key-operated
padlocks are subject to the following requirements: (i) a key and lock
custodian shall be appointed to ensure proper custody and handling of keys
and locks used for protection of classified material; (ii) a key and lock
control register shall be maintained to identify keys for each lock and
their current location and custody; (iii) keys and locks shall be audited
each month; (iv) keys shall be inventoried with each change of custody;
(v) keys shall not be removed from the premises; (vi) keys and spare locks
shall be protected in a secure container; (vii) locks shall be changed or
rotated at least annually, and shall be replaced after loss or compromise
of their operable keys; and (viii) making master keys is prohibited. A
?secure container" as used herein is any cabinet or vault specified in
paragraph 14a(3), including supplemental controls when required. However,
at no time shall a key(s) be afforded less protection than that accorded
the highest level of the classified material protected by its corresponding
lock(s).
119
34.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 I 1 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
be required to sign and indicate the time checked,
certifying that the door was checked and found to
be locked during the course of each patrol.
The SPP shall specify which of the above options has been elected by the con-
tractor and shall describe the procedures for implementing this requirement.
(c) No patrol or alarm systems are required for CONFIDENTIAL
material stored in closed areas.
(4) Areas shall be designated and marked "CLOSED AREA."
(5) Employees assigned to the area shall challenge the presence of
any unknown persons. The need-to-know principle shall be adhered to at all
times within the closed area.
b. Restricted Area.
(1) During working hours, the same controls as prescribed for
closed areas during working hours shall be applied.
(2) During nonworking hours, the same controls as prescribed by
paragraph 14 shall be applied.
(3) Areas shall be designated and marked "RESTRICTED AREA."
c. Area Approval. The CSO and the contractor shall agree on the extent
of the controlled area prior to the award of the contract, when possible, or
at such subsequent times as the need for such areas becomes apparent during
the performance on the contract. When the costs of construction and/or
maintenance of the controlled areas are to be charged against a UA contract,
the CSO shall obtain and furnish to the contractor written authorization from
the contracting officer concerned for the expenditure of necessary funds.
This authorization shall only be required when the contractor is performing an
cost-reimbursement contracts as opposed to fixed-price contracts in which such
security costs would be included in the initial contract price.
d. Reports. The CSO shall be advised, in accordance with paragraph
6a(5), of the creation of any new controlled areas or of any change in the
location of any existing controlled areas.
35. Supplemental or Supplanting Alarm Systems.
a. Alarm systems may be divided into those that supplant the use of
guards required under paragraph 34a(3), and those that supplement and extend
the capability of guards.
(1) When used to supplant guards, the electrical protective alarm
system shall be connected to a central control station.
35. 120
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(a) The central control station may be located at the contrac-
tor's facility or at the facility of a subcontractor who maintains and
operates the electrical protective alarm system and responds to alarms 3/ 4/.
(b) Such a subcontractor and its employees shall have FCL's
and PCL's, as prescribed in paragraph 20e.
(c) Additional requirements for a central control station are
as follows.
1 Trained and appropriately cleared operators shall be in
attendance at the central station at all times when the electrical protective
alarm system is in operation. The device which signals alarms shall be
continuously monitored.
3/ A direct-connect or remote station alarm system (that is, a system connected by
direct wire to alarm receiving equipment located in a local police depart-
ment headquarters, which is activated and deactivated by the using contrac-
tor and responded to by personnel of the local police department), may be
utilized when: (i) the contractor's facility is located in an area where
the central station services of a subcontractor are not available; (ii) it
is impractical for the contractor to establish a proprietary or in-plant
alarm system, in accordance with the provisions of paragraph 35a(1)(c);
(iii) the material and installation standards prescribed by paragraph
35b(1) or (2) are observed; (iv) response time to an activated alarm by
local police personnel does not exceed 15 minutes from the time the alarm
was first registered, and arrangements shall have been made with the police
department to immediately notify a representative of the contractor (pre-
ferably the FSO) on receipt of an alarm; and (v) the representative of
the contractor shall be required to report immediately to the facility to
ascertain the nature of the alarm and to take appropriate measures to
ensure the security of the area concerned. Approval of the CSO is required
before a contractor may utilize a direct-connect system as an alternative
to the use of a central station system. The proposed plan explaining how
the system would operate should be submitted in duplicate to the CSO,
including sufficient justification for the granting of an exception and the
full name and address of the police department that will monitor the
system and provide required response. The name, address, and clearance
level of the subcontractor who installed the system and who will inspect,
maintain, and repair the equipment shall also be furnished, if applicable.
4/ Central station burglar alarm systems classified by the UL, Inc. as Grade A
shall satisfy the requirements of this paragraph. Evidence of compliance
with the UL standards may take the form of a UL certificate or a letter
issued by the installing company (see UL 611, Central Station Burglar Alarm
Units and Systems, and the list relating to authorized burglary protection
equipment and installing companies in UL publication, "Automotive, Burglary
Protection, Mechanical Equipment Directory").
121 35.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. .11 [
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
you Y2zu.zz-m
2 Trained and appropriately cleared guards, sufficient in
number to dispatch immediately a guard to investigate each alarm, shall be in
attendance at the central station at all times when the electrical protective
alarm system is in operation.
3 A signal shall be maintained at the central station to
show whether or not the system is in working order and to indicate any
tampering with the system. Necessary repairs shall be effected immediately.
4 Response time to an activated alarm (that is, the time
required for guards to reach the area) shall not exceed 15 minutes from the
time the alarm was first registered.
5 Records shall be maintained indicating time of receipt
of alarm, name of guards, time dispatched to area, time guards checked in, and
nature of alarm. Such records shall be kept for a minimum of 1 year.
(2) When used to supplement guards required by paragraph 34a(3),
electrical protective alarm systems of the central station type, described in
paragraph a(1) above, and systems not connected to a central control station
may be used. However, if a central control station is not employed, the
system shall provide an audible or visible alarm signal, which shall be
capable of attracting the immediate attention of guards on patrol in the area
and directing them to the location of the alarm. In any event, the time
required to respond to an activated alarm shall not exceed 15 minutes.
(3) When such systems are used, they shall be activated immediately
at the close of business.
b. Material and Installation Standards.
(1) Where electrical protective systems are applied to an area to
supplant or supplement guards, all material and equipment used in the system
shall equal or exceed the standards prescribed in and shall be installed in
accordance with: (i) the provisions of Interim Federal Specification W-A-00450
(GSA-FSS), "Alarm Systems, Protective, Interior (Security)," February 16,
1973, or (ii) Underwriters' Laboratories Standards for Intrusion-Detection
Units, UL-639, and Underwriters' Laboratories Standards for Installation and
Classification of Mercantile and Bank Burglar Alarm Systems, UL-681 5/ 6/.
(2) When individual alarms are installed on classified storage con-
tainers, in accordance with paragraph 14a(2)(c) or 14a(4)(c), the installation
shall provide "complete" protection of the top, bottom, sides, and outer
5/ .The minimum required standard for installation on premises shall be Instal-
lation No. 3 (see UL-681). New installations shall conform to Interim
Federal Specification W-A-00450 to the maximum extent permitted by avail-
ability of qualified equipment.
6/ Copies of the Interim Federal Specification may be obtained from any
regional office of the GSA. Copies of the UL Standards may be obtained
from Underwriters Laboratories, Inc., 333 Pfingsten Road, Northbrook,
Illinois 60062.
35. 122
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
drawers or doors of the container (see Interim Federal Specification W-A-00450
and UL Standards 681 and 639). In addition, the requirements for a central
station or direct-connect alarm system shall also apply (see paragraph a(1)
above).
c. Approval by the CSO is required before the installation of either a
supplanting or supplemental alarm system to meet a requirement of this manual
(see paragraph 34c regarding cost considerations).
36. Supplanting Access Control System Devices.
a. Automated Access Control Systems. Automated access control
systems which meet the criteria stated below are authorized to supplant
contractor-authorized employees or guards required by paragraph 34a(2)(b)
for controlling admittance to controlled areas during working hours 7/.
(1) The automated access control system must be capable of
identifying the individual entering the area and authenticating that
person's authority to enter the area.
(2) Identification of individuals entering the area can be
obtained by an identification (ID) badge or card, or by personal identity
verification.
(a) ID badge or card. The ID badge or card must use
embedded sensors, integrated circuits, magnetic stripes or other means of
encoding data that identifies the facility and the individual to whom the
card is issued.
(b) Personal identity verification. Personal identity
verification identifies the individual requesting access by some unique
personal characteristic, such as:
1 fingerprint,
2 hand geometry,
3 handwriting,
4 retina, or
5 voice recognition.
(3). In conjunction with (2)(a) or (b) above, a personal
identification number (PIN) is required. The PIN must be separately
entered into the system by each individual using a keypad device. The PIN
7/ Manufacturers of automated access control equipment or devices must
assure in writing that their system will meet the following standards
before CSO's may favorably consider such systems for protection of
classified information:
Chances of an unauthorized individual gaining access through normal
operation of the equipment are no more than one in ten thousand.
Chances of an authorized individual being rejected for access through
normal operation of the equipment are no more than one in one thousand.
123 36.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II II
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
shall consist of four or more digits, randomly selected with no known or
logical association with the individual. The PIN must be changed when it
is believed to have been compromised or subjected to compromise.
(4) Authentication of the individual's authorization to enter
the area must be accomplished within the system by comparing the inputs
from the ID badge/card or the personal identity verification device and the
keypad with an electronic database of individuals authorized into the area.
A procedure must be established for removal of the individual's authoriza-
tion to enter the area upon reassignment, transfer or termination, or when
the individual's PCL is suspended, revoked, or downgraded to a level lower
than required.
(5) Physical security protection must be established and
continuously maintained for all devices/equipment that constitute the
system. The level of protection may vary depending upon the type of
devices/equipment being protected with the basic intent of utilizing the
security controls already in effect within the contractor's facility.
(a) Locations where access transactions are, or can be
displayed, and where authorization data, card encoded data and personal
identification or verification data is input, stored, displayed, or
recorded must be protected. This protection may be accomplished by
continuous surveillance by authorized personnel, structural safeguards as
described by Appendix V, or a level of collective controls developed by the
contractor keyed to the prevention or detection of unauthorized access or
system modification.
(b) Control panels, card readers, keypads, communication or
interface devices located outside the entrance to a controlled area shall
have tamper resistant enclosures, be securely fastened to a wall or other
structure, be protected by a tamper alarm or secured with a three-position
dial-type changeable combination padlock. Control panels located within a
controlled area shall require only a minimal degree of physical security
protection sufficient to preclude unauthorized access to the mechanism.
Where areas containing TOP SECRET information are involved, tamper alarm
protection is mandatory.
(c) Keypad devices shall be installed in such a manner,
have a shielding device mounted, so that an unauthorized person in the
immediate vicinity cannot observe the selection of push buttons.
or
(d) Systems that utilize transmission lines to carry
access authorization, personal identification, or verification data between
devices/equipment located outside the controlled area shall receive circuit
protection equal to or greater than that specified as Grade A by Under-
writers' Laboratories, Inc.
(6) Access to records and information concerning encoded ID
data and PINs shall be restricted to individuals cleared at the same level
as the highest classified information contained within the specific area or
areas in which ID data or PINs are utilized. Access to identification or
authorization data, operating system software or any identifying data .
36. 124
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
associated with the access control system shall be limited to the fewest
number personnel as possible. Such data or software shall be kept secured
when unattended.
(7) Records reflecting active assignments of ID badges/cards,
PINs, levels of access, PCL's, and similar system related records shall be
maintained indefinitely. Records concerning personnel removed from the
system shall be retained for one year. Records of entries to controlled
areas containing TOP SECRET material shall be retained for at least 6
months or until investigations of system violations and incidents have been
successfully resolved and recorded.
(8) Personnel entering or leaving an area shall be required to
immediately secure the entrance or exit point. Authorized personnel who
permit another individual entrance into the area are responsible for
confirming the individual's PCL and need-to-know.
(9) During shift changes and emergency situations, if the door
remains open, admittance shall be controlled by a contractor-authorized
employee or guard stationed to supervise the entrance to the area.
b. Electric, Mechanical, or Electromechanical Devices.
Provided that the material within the controlled area is classified no
higher than SECRET, electronic, mechanical, or electromechanical devices
which meet the criteria stated below may be used to supplant contractor-
authorized employees or guards to control admittance to controlled areas
during working hours. Devices may be used that operate by either a
push-button combination which activates the locking device or by a control
card used in conjunction with a push-button combination, thereby excluding
any system that operates solely by the use of a control card.
(1) The electronic control panel containing the mechanical
mechanism by which the combination is set may be located inside or outside
the controlled area. When located outside the controlled area, the control
panel shall be securely fastened or attached to the perimeter barrier of the
area and secured by an approved three-position dial-type changeable
combination padlock. If the control panel is located within the controlled
area, it shall require only a minimal degree of physical security designed
to preclude unauthorized access to the mechanism.
(2) The control panel shall be installed in such a manner, or have *
a shielding device mounted, so that an unauthorized person in the immediate *
vicinity cannot observe the selection of the correct combination of the push *
buttons. *
(3) The selection and setting of the combination shall be *
accomplished by an employee of the contractor who is authorized to enter *
the area in his or her duties or by the FSO or his or her designated *
representative who is authorized to enter the area. The combination shall
*
be changed at least once every three months.
*
(4) The combination shall be classified in accordance with the
*
classification of the highest classified material within the controlled
*
area (see paragraph 8 for control of cards).
*
125 36.
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
11 1 11 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(5) Electrical gear, wiring included, or mechanical links (cables,
rods and so on) shall be accessible only from inside the area, or shall be
secured within a protecting covering to preclude surreptitious manipulation
of components.
(6) Personnel entering or leaving the area shall be required to
immediately lock the entrance or exit point. Authorized personnel who
permit another individual entrance into the area are responsible for
confirming the individual's PCL and need-to-know.
(7) During shift changes and emergency situations, if the door
remains open, admittance shall be controlled by a contractor-authorized
employee or guard stationed to supervise the entrance to the area.
c. Approval by the CSO is required before effecting the installation
of a supplanting access control device to meet a requirement of this manual
(see paragraph 34c regarding cost considerations).
36. 126
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5ZZO.ZZ-M
Section V. VISITOR CONTROL PROCEDURES
Part 1. VISITS TO USER AGENCY CONTRACTORS
37. General.
a. The provisions of this section, except paragraphs 45 and 48, apply
only to persons who will have access to classified information. Access to
information classified higher than the level in the visit authorization will
not be granted, regardless of the level of the visitor's PCL. The contractor
or activity being visited shall take such security measures as may be required
to preclude visitors from having unauthorized access to classified
information. Nothing in this section will limit the requirements of paragraph
Sc.
b. The number of visitors requiring access to classified information
shall be held to a minimum and the following requirements must be established:
(1) that the visit is necessary, and
(2) that the purpose of the visit cannot be achieved without access
to classified information by the visitor.
c. In the event the visit is disapproved, the requester shall be
promptly notified by the contractor or activity which made the decision.
d. Requests for visits shall be furnished in writing (mail or teletype)
to the contractor or UA activity being visited in advance of the proposed
visit. In exceptional cases, the telephone may be used, provided the visit
request is confirmed in writing. Under no circumstances, however, may
employees hand-carry their own visit requests to the place being visited. All
Category 1 and 2 requests shall contain the following information:
(1) name and address of the contractor or UA activity to be
visited;
(2) name and title of person(s) to be visited, if known;
(3) name of the proposed visitor, his or her date and place of
birth, and citizenship (if immigrant alien, so indicate);
(4) job title or position of the proposed visitor;
(5) requesting contractor's or UA activity's certification of
the level of clearance of the proposed visitor (see paragraph 38). If
the visitor possesses an interim PCL, a contractor granted CONFIDENTIAL
PCL, or an LAA, so indicate. See paragraph e below for special access
requirements;
(6) purpose and justification for the visit in sufficient detail
to allow for a determination on the necessity of the visit -- including the
37 .
127
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V 1111 I I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
contract., project, or program number or name will assist the recipient in
making this determination 1/;
(7) date or period during which the request is to be valid;
(8) name and address of requesting contractor or UA activity; and
(9) requesting contractor's certification of his or her FCL (not
required for representatives of the U.S. Government, see paragraph 38); if
the contractor has a reciprocal FCL, so indicate.
e. When visits involve access to classified information requiring a
special access authorization (for example, CRYPTO, NATO, military space
project, or other special or limited access programs), the request will, in
addition to the other required information:
(1) specify the program or project,
(2) specify the level of information to be released,
(3) certify that the visitor has been authorized access to such
information, and
(4) identify the office or UA activity granting such authorization.
f. When appropriate, the visit request shall ask for approval for
subsequent visits within a 12-month period. The contractor or UA activity
initiating the visit request shall immediately notify the contractor or
activity being visited of any change in the visitor's status, such as, the
termination of employment, suspension, leave of absence, and the revocation or
termination of clearance, which will require the visit authorization to be
canceled prior to its normal termination date. In the event the initiating
contractor's FCL, as indicated in paragraph d(9) above, changes to a
reciprocal clearance, the initiating contractor shall immediately notify
contractors or UA's honoring current visit requests, so as to preclude the
visitor's access to certain types of classified information as set forth in
paragraph 31c. A downgrading of the FCL also requires an immediate
notification to contractors and UA's honoring current visit requests.
g. Machine-run or other rosters of employees, limited to those personnel
who are authorized access to particular levels of classified information and
who occupy positions which require classified visits, may be used for estab-
1/ To avoid delay in processing or rejection of visit requests, contractors
should exercise care in using nicknames, abbreviations, and acronyms which
may be unfamiliar to the recipient. Where repeated use of short terms is
desirable for brevity, an explanation should be provided.
37 128
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
lishing visit request and approval authorizations as required by this section,
provided the machine-run (or other roster) or a covering letter furnishes the
essential information required by paragraphs d, e, and f above, and adequate
procedures are in effect to notify the visited facility of changes in employ-
ees' status, which will affect his or her visit authorization. Use of such
procedures must be acceptable to the facility being visited and such records
and controls shall be maintained in a current status at all times.
h. Industrial Security Representatives of the DoD and other UA's,
when acting in their official capacities, and representatives of the fol-
lowing U.S. Government agencies may visit contractor facilities without
having furnished advance notification of their intent to visit:
(DoD)
(1) Defense Investigative Service
(2) Inspector General, Defense Criminal Investigative Service
(3) U.S. Army Intelligence Command (Army)
(4) Naval Investigative Service (Navy)
(5) U.S. Air Force, Office of Special Investigations (Air Force)
(6) Secret Service (Treasury Department)
(7) Federal Bureau of Investigation
The contractor shall grant access to classified information to the minimum
required upon presentation of proper credentials by the representative.
In case of doubt as to identity or level of access authorized, such cre-
dentials and level of clearance shall be verified by contact with the
agency or activity concerned.
38. Identification and Control of Visitors.
a. Contractors being visited by representatives of another contractor
are responsible for determining that the requesting contractor has been
granted an appropriate FCL. This determination is based either on an exist-
ing contractual relationship involving classified information of the same or
higher category or by verification from the PIC-CVA. When the requesting
contractor's FCL status has been determined, his or her certification as to
the proposed visitor's PCL status may be accepted. The visitor's identity
shall be verified prior to any disclosure of classified information. If,
however, there is any question as to the validity of a visit request or
identity of the visitor, appropriate confirmation shall be obtained from the
contractor or UA activity that initiated the visit request.
b. The contractor shall establish such controls over the movement of
approved visitors as are necessary to ensure that the visitors are only
afforded access to classified information consistent with the authorized
purpose of the visit. Particular care shall be taken to ensure that his or
her procedures for the control of Category 4 (foreign national) visitors are
129 38.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H 1 ? 1 LL; I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
sufficient to prevent any access not provided for by the terms of the visit
authorization. Such procedures shall provide for an escort while access is
being afforded in accordance with the terms of the foreign national's visit
authorization and when such a visitor is in areas where classified information
may be accessible. The escort, when required, shall be a responsible,
appropriately cleared employee who has been informed regarding the visitor's
access limitations or restrictions on the visitor's movements.
c. Visitors shall be prohibited from making records of classified dis-
cussions and taking photographs in areas where classified information might be
recorded on the film, without the express permission of the contractor being
visited.
d. Classified material shall not be released to the visitor for
removal from the contractor's facility, except as provided for by this
manual.
39. Visitor Record.
a. The contractor shall maintain a record of all visitors to the
facility for the purpose of having access to classified information. The
record shall indicate: (i) the visitor's full name, (ii) the name of the
contractor or activity he or she represents, and (iii) the date(s) of his
or her arrival at and departure from the facility. The visitor record
need not indicate whether the visitor actually did or did not gain access
to classified information, but it must distinguish between classified and
unclassified visits. Records of authorized visit requests for visits
actually consummated shall be maintained by the contractor for a minimum
of 2 years.
b. The contractor shall maintain a separate set of visitor records
for NATO visits. A NATO visit shall be considered to be: (i) a visit by a
person from a NATO country to a contractor in connection with precontract
negotiations or contract performance on a NATO classified contract, (ii) a
visit between a U.S. prime contractor and a subcontractor performing a NATO
classified contract, and (iii) other visits in which access to NATO classi-
fied information has been specifically authorized. Representatives of the
CSO, whose requirement for access to NATO classified information is only
incidental to the accomplishment of the security inspections at the
contractor's facility, shall not be considered to be "NATO visitors" nor
be required to enter their names on NATO visit records.
40. Long-Term Visitors. When employees of one contractor are temporarily
stationed at a facility of another contractor, the security procedures of the
facility visited will govern. However, when such visits are on a continuing
basis and it is found impractical for such visitors to comply with the
security procedures of the host facility, the respective cnntractors shall
prepare an agreement delineating theirrespective responsibilities and ,
encompassing the procedures to be followed. This agreement must conform to
the provisions of this manual and a copy shall be furnished to the CSO of the
host contractor. The CSO of the host contractor is responsible for conducting
periodic inspections to ensure that classified information in the possession
of the visiting employees is properly safeguarded, and for notifying the host
contractor of security deficiencies.
40.
130
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
41. Visitor Categories and Procedures.
a. Category 1. This category applies: (i) when a contractual or
prospective contractual relationship exists between contractors or between a
contractor and a UA, and visits to a contractor by representatives of the GAO
for auditing purposes, authorized representatives of the Department of Labor,
and other agencies of the executive branch of the government when acting in
their official capacities; (ii) to visits among prime contractors who are
participating under government direction in contracts pertaining to research,
development, or production of a weapon system; (iii) to employees of
contractors producing items furnished to assembling contractors (GFP) for
purposes pertaining to such assembly; and (iv) to employees of a cleared
facility, which had previously been furnished a classified report directly by
the contractor being visited under the specific terms of a contract (excluded
from this category are facilities that receive only abstracts of classified
reports or reports from sources other than the preparing contractor). Such
visit requests will, in addition to the information required in paragraph 37,
also contain a statement identifying the specific report that the visitor is
authorized to discuss.
(1) The above visit requests will be submitted directly to the
contractor to be visited.
(2) The contractor to be visited has approval authority, provided
such visits meet the provisions of paragraph 37.
(3) The prime contractor or assembling contractor, as the case may
be, may initiate visit requests for employees of a subcontractor or contractor
supplying GFP, in accordance with paragraph 37, when he or she is in
possession of the information required by paragraph 37d.
(4) Employees of a temporary help supplier working for contractors
at their facilities shall be treated as regular employees of the using
contractors for the purpose of security orientation in facility practices,
procedures, and pertinent reports, while working under the contractors
direction and control (see paragraphs 5u, v, ab, and 6b(1)). This action by
the using contractor in no way relieves the temporary help supplier from
complying with these and other requirements of this manual.
b. Category 2. This category applies to visits between contractors who
have been granted FCL's, but do not have a contractual relationship, and
visits that do not otherwise meet the requirements of Category 1.
(1) The requesting contractor will obtain in writing a verification
of the visitor's need-to-know from his or her contracting officer and include
it with the visit request.
(2) The contractor to be visited will approve the request, if he or
she desires the visit.
131 41.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II I - I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(3) The visiting contractor may substitute another cleared employee
to make the visit without additional verification of the need-to-know, if this
is acceptable to the contractor being visited. Information about the
substitution shall be furnished to the contractor being visited, as required
in paragraph 37d.
c. Category 3. This category applies to representatives or employees
of the DOE and its contractors whose visits require access to other than
RESTRICTED DATA.
(1) The activity requesting the visit will furnish the required
information to the contracting officer of the UA whose information is
involved, using DOE F 5631.20.
(2) If approved, the contracting officer will notify the contractor
of the scheduled visit, including required information concerning the visit
(DOE F 5631.20).
d. Category 4. This category applies to foreign representatives.
Except as authorized in subparagraph 41d(8) below, visits to contractor
facilities by foreign nationals (see paragraph 3ap) and persons acting as
representatives of a foreign interest (see paragraph 3bw), hereafter referred
to collectively as foreign representatives, must be officially sponsored by a
foreign government. Foreign sponsorship is normally reflected in an official
request for visit from the embassy of the nation concerned to the cognizant UA
foreign disclosure office 2/. The cognizant UA may then sponsor, deny, or
elect not to sponsor the visit. UA sponsored visits shall not be used to
avoid the licensing requirements of the ITAR published by the Department of
State, or the Export Administration Regulations, published by the Department
2/ The Defense Intelligence Agency is responsible for processing requests
to visit elements of the OSD, the Office of the Joint Chiefs of Staff
(OJCS) the Unified and Specified Commands, the Defense Agencies, and
activities administratively supported by the OSD. The following offices
are responsible for processing other visit requests:
Department of the Army
Assistant Chief of Staff
for Intelligence
ATTN: Foreign Liaison
Directorate (DAMI-FL)
Washington, D.C. 20310
Department of the Navy
Foreign Disclosure and Policy
Control Branch
Office of Chief of Naval
Operations (0P-622E)
Washington, D.C. 20350
Department of the Air Force
International Affairs Division
Information Branch (CVAII)
Office of the Vice Chief of Staff
Washington, D.C. 20330
Defense Intelligence Agency
Foreign Liaison Branch (DI-4A)
Washington, D.C. 20301
Al_ 132
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
of Commerce. The contractor shall be responsible for ensuring that both
sponsored and unsponsored visits by foreign representatives are effectively
denied unauthorized access to: (i) classified information, (ii) unclassified
technical data governed by the Export Administration Act, administered by the
Secretary of Commerce, and the Arms Export Control Act, administered by the
Secretary of State through the ITAR,and (iii) other unclassified information
for which the DOE, NRC, or other government department or agency has
prescribed dissemination limitations.
(1) Foreign nationals shall not be afforded access to classified
information, unless specifically authorized in writing by a UA.
(2) The UA sponsorship of a visit is based on the existence of a
specific or potential program or project with the foreign government
concerned. UA notification of sponsorship will contain the level and scope of
classified information authorized for disclosure (visual and/or oral only), as
well as any limitations, and will be transmitted to the CSO for review and
retransmittal to the contractor facility to be visited. Final acceptance of
the visit will be subject to the concurrence of the contractor. The
contractor shall notify the UA when the visit is not desired. The contractor
may not change the level or scope of classified information to be released, or
modify any limitations, without the approval of the UA that approved the
visit.
(3) The contractor shall not inform the foreign representatives, or
their employers, of the scope of access authorized or of the limitations
imposed by the UA, nor shall the foreign representatives be induced to seek a
higher access level than previously approved by the UA.
(4) The fact that a foreign representative may possess a PCL at a
particular level does not automatically entitle the individual to receive U.S.
classified information at that level.
(5) Prior to disclosure of classified information to foreign
representatives, the contractor being visited shall advise such visitors of
their continuing responsibilities to safeguard the information to be
disclosed. The contractor shall also inform the visitors that the information
affects the national defense of the U.S. within the meaning of the espionage
laws of the U.S., and that unauthorized disclosure violates international
agreements and is harmful to the interests of national security.
(6) If the UA declines to sponsor a visit, a declination notice
will be furnished to the requesting embassy with an information copy to the
security office of the contractor facility(ies) to be visited. A copy of
the visit request will accompany the declination notice. Lack of sponsor-
ship does not equate to disapproval nor does it preclude accomplishment of
the visit, provided the contractor has, or obtains, a munitions license for
the specific technical information proposed for release, or the information
is otherwise exempt from the licensing requirements of the ITAR. Unspon-
Bored visits may be arranged between the foreign activity proposing the
133 41.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 , 1.11 i
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
visit and the contractor. Disclosure of classified information during
unsponsored visits is prohibited: (i) without specific written authorization
from the cognizant Military Department, or (ii) without a previously approved
and current munitions license issued by the Department of State. It is the
contractor's responsibility to consult applicable Department of State and
Department of Commerce regulations to determine export licensing requirements
or exceptions regarding the disclosure of unclassified technical data during
visits by foreign representatives.
(7) In the event a UA denies a request to visit, the requesting
embassy and the contractor(s) involved will be advised of the reasons(s) for
it by means of the distribution channels prescribed in paragraph (6) above.
(8) The following rules apply to reciprocally cleared contractors:
(a) Visit requests involving U.S. citizen employees of
reciprocally cleared contractors (see paragraph 31.3) that require access to
classified information or unclassified information related to a classified
program or project, and all visit requests involving foreign national
employees of such firms, shall be processed to the UA foreign disclosure
office having jurisdiction over the information involved. To reduce
administrative burden and facilitate the timely conduct of visits associated
with current or potential classified prime contractual or subcontractual
relationships, contractors are encouraged to include as many activities to be
visited as possible on each such request and propose that such visit request
be approved on a recurring basis, preferably for the duration of the contract
or subcontract involved. Copies of approved requests will be furnished by the
cognizant UA foreign disclosure office to the requesting contractor and to
each contractor and UA activity approved for visitation. All subsequent
changes to the list of visitors may be communicated by the requesting
contractor directly to the activities to be visited, ATTN: Security Officer,
making reference to the pertinent approved visit request on file. However,
requests to visit activities not previously approved must be submitted
separately to the cognizant foreign disclosure office for approval.
(b) Visits by U.S. citizen employees for unclassified
commercial purposes may be arranged directly with the security office of the
contractor or UA activity to be visited.
e. Category 5. This is a special purpose category which is to be
applied in rare situations and only with the knowledge and authorization
of the UA whose classified information is involved. It pertains to persons
who do not qualify under any of the other categories, and whose visits to a
contractor's facility are considered necessary and essential by the con-
tractor who states in writing that the visitor cannot be denied access to
classified information by escort or other security measures. Only U.S.
citizens are eligible to make visits in this category. Under no condition,
shall a visitor in this category be permitted physical custody or personal
possession of classified information. Access to classified information at
the TOP SECRET level is prohibited and shall not be authorized.
41. 134
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) Contractors are required to deny access to classified
information by escorting visitors or by other security measures. However,
under certain circumstances, contractors may be unable to effectively
prevent aural and or visual access to classified information by a visitor.
In these situations, the contractor shall advise the UA and obtain authori-
zation before allowing the visit to take place by submitting the following
information to the UA:
(a) Name of the visitor, date and place of birth.
(b) Name of company or agency of employment and address.
(If self-employed, so indicate.)
(c) Purpose and justification for the visit in sufficient
detail to allow the UA to determine the necessity for the visit. Numbers
or names of programs, projects, or contracts which are involved, should be
provided for identification purposes. Level of the classified information
involved must be specified.
(d) A complete and detailed explanation of the reasons
escort or other security measures cannot be provided by the contractor
effectively prevent aural and or visual access to classified information
by the visitor.
(e) Date of proposed visit and anticipated duration of time
required for the visit.
(f) Completed DD Form 48 and FD Form 258, as specified
in paragraph 26, or forms as directed by the UA. The contractor to be
visited shall act as a sponsor instead of an employer in the completion
of forms and shall act as a witness wherever required on the forms. Veri-
fication of U.S. citizenship shall be accomplished in the same manner as
required by paragraph Sae.
(2) Visit renewals may be authorized at the discretion of the
UA.
(3) Personnel Security Clearances under the DISP are not
authorized for a visitor in this category.
42. Visits Involving Access to RESTRICTED DATA.
a. Visits to a DoD or NASA contractor by a DoD or NASA representative
or contractor shall be processed as prescribed in paragraph 37.
b. Visits to a DoD or NASA contractor by representatives of UA's, other
than DoD and NASA and their contractors, require prior approval of the DOE.
The DOE F 5631.20 shall reflect this approval in part B of the form. Contrac-
tors submitting visit requests in this category shall, after certifying to the
clearance status of the proposed visitor(s) in part A of the DOE F 5631.20,
forward the form to the contracting officer for certification of the visitor's
need-to-know and further processing, in accordance with the UA's regulations.
135 42.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
The contractor receiving a visit request in this category shall ensure that
the required certifications have been made and that the visit has received DOE
approval.
c. Visits to a UA contractor, other than to a DoD or NASA contractor by
representatives of the contracting UA and between a prime contractor and his
or her subcontractor on such a UA contract, shall be processed as prescribed
in paragraph 41.
d. Visits to a UA contractor, other than to a DoD or NASA contractor by
representatives of UA's other than the contracting UA and by contractors other
than under a prime-subcontractual relationship, require prior approval of the
DOE and shall be processed in the manner prescribed in paragraph b above.
Part 2. VISITS TO USER AGENCY ACTIVITIES
43. General Rules -- In Addition to Paragraph 37.
a. Contractors shall comply with any requests received from the
Commander or Head of UA activities for additional information needed in the
processing of visit requests.
b. The contractor is encouraged at the time of the initial visit to
request approval for subsequent visits within a period of 12 months, when
necessary and consistent with the purpose of the initial visit. Arrangements
for continuing visits will be made between the contractor and the Commander or
Head of the UA activity. Final approval is the prerogative of the Commander
or Head of the UA activity.
c. Visits to DoD or NASA activities by DoD or NASA contractors,
involving access to RESTRICTED DATA, shall be processed as prescribed in
paragraph 42a. Visits to other UA's involving access to RESTRICTrA) DATA shall
be processed in the manner prescribed in paragraph 42b.
d. Contractor employees shall comply with written regulations and
operating instructions issued by UA activities concerning visitors to such
activities.
44. Visits to User Agency Activities in the United States.
a. Visits to Field Activities. Contractors desiring to have an
employee or consultant visit a UA activity involving access to classified
information shall address a request in writing to the Commander or Head of the
activity to be visited. Visit requests shall be accompanied by a statement
from the contracting officer that the release of classified information is
required in connection with a specified classified contract or program.
(Visit requests normally will be sent via the contracting officer.)
b. Visits to UA Activities in the Washington, D.C. Area. Requests to
visit offices of headquarters activities of the UA's in the Washington, D.C.
area shall be submitted in writing and addressed to the specific office to be
visited. Whenever possible, the exact code number, division, branch, and so
44. 136
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
on, of the activity or office to be visited shall be included in the address
of the request. Visit requests shall be accompanied by a statement from the
contracting officer that the release of classified information is required in
connection with a specified classified contract or program. (Visit requests
normally will be sent via the contracting officer.)
c. As an exception to paragraphs a and b above, a visit request may be
submitted directly to the activity or office to be visited without a statement
from the contracting officer, when the classified information to be disclosed
and the determination as to the contractor's need for such access is known to
be a responsibility of the activity or office to be visited. This exception
does not apply to visits involving access to classified intelligence
information as set forth in paragraph e below.
d. The contractor's request shall contain the information specified in
paragraph 37d.
e. If a contractor contemplates discussion or viewing of classified
intelligence in the custody of a UA activity, the contractor's visit request
shall be forwarded in all cases to the contracting officer of the UA activity
authorized to release classified intelligence to contractors for the required
need-to-know verification and routing to the UA to be visited. In addition to
the information specified in paragraph 37d, the visit request shall contain
the following:
(1) the contractor's certification that: (i) access to classified
intelligence is required for contract performance, and (ii) the contract is a
classified contract (see paragraph 3i), and
(2) sufficient additional information concerning classified
intelligence required to permit the agency or activity receiving the visit
request to assess:
(a) applicability of available classified intelligence to the
contractor's needs, and
(b) whether available intelligence may be released to the
contractor without permission of the originator and/or sanitation of the
material.
45. Visits to User Agency Activities Outside the United States. This
paragraph is applicable when a contractor desires to have an employee make a
classified or unclassified visit to a UA activity outside the U.S. The
information required by paragraph 37d shall be furnished for the visits
enumerated in this paragraph.
a. Contractor Sponsored Visits. A contractor shall process a request
for his or her employee to visit a UA activity outside the U.S. through DISCO
to the UA activity concerned, if the visit is on the initiative of the con-
tractor. The Commander or Head of the activity to be visited will notify the
contractor of the approval or disapproval of the visit request. (See para-
graph 50 for an employee based in Europe.)
137 45.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L. .11 1 _liiill.1 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
b. UA Sponsored Visits. A visit request for a contractor employee
sponsored by a UA and traveling on the UA's orders will be processed by the
UA, in accordance with the regulations of such agency. The traveler's orders
shall reflect the traveler's level of security clearance, if required, in
connection with the travel. The contractor shall submit the request for such
visit directly to the UA activity concerned.
Part 3. VISITS TO GOVERNMENT ACTIVITIES OTHER THAN USER AGENCIES
46. Visits to DOE Installations or DOE Contractors. Requests for visits to
DOE installations or to DOE contractors, which will require access to DOE
classified information, shall be prepared utilizing DOE F 5631.20. (Copies of
this form may be obtained from any DOE installation.) (In addition to
completing the appropriate portions of the DOE F 5631.20), the contractor
(usually the FSO) shall include in the first block of the form immediately
after the personnel clearance data, a certification of the prospective
visitor's PCL. The DOE F 5631.20 shall then be forwarded, for the required
official certification, to the contracting officer of the UA who signed the DD
Form 254 that was issued in connection with the contract for which the DOE
classified information is required.
47. Visits to Activities Other Than DOE. Requests for visits to government
activities, other than UA's and the DOE, which involve the release of
classified information to such activities in connection with a UA contract,
require the approval of the contracting officer and, if the classified
information to be released includes RESTRICTED DATA, the approval of the DOE.
Such requests shall be submitted by the contractor to his or her contracting
officer who will process the request. The contractor shall provide evidence
of the fact that the activity to be visited had either requested the proposed
visit or consented to the contractor's request for the visit. In addition, a
statement shall be included explaining: (i) the purpose of the visit in
detail, (ii) a description of the classified information to be divulged during
the visit either to or by the activity being visited, and (iii) the direct or
indirect effect the visit may have on the performance of the classified
contract involved.
Part 4. VISITS TO FOREIGN GOVERNMENTS AND ACTIVITIES
48. General.
a. Contractor visits to foreign governments or activities or to inter-
national bodies fall into three categories.
(1) The first includes visits that involve the disclosure of U.S.
classified information:
(a) in connection with a government-to-government agreement to
furnish U.S. military equipment to the foreign government (that is, the
purchase of the equipment is under a U.S., not a foreign government contract);
48. 138
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(b) in connection with exploratory sales visits, precontract
negotiations, or contract performance, other than those covered under
paragraph (a) above (that is, the purchase of the U.S. military equipment or
services when and if consummated will be or is under a foreign government
contract); or
(c) in connection with U.S. Government presentations to
foreign governments and international pact organizations, when the U.S.
Government has requested the contractor's participation.
(2) The second includes visits that do not involve disclosure of
U.S. classified information, but where the foreign government or activity
requires a U.S. security assurance on the visitor:
(a) which involve disclosure of unclassified technical data on
the "U.S. Munitions List;" or
(b) which will not involve disclosure of technical data on the
"U.S. Munitions List."
(3) The third includes visits on a commercial basis (that is, the
visits do not involve disclosure of U.S. classified information and do not
require a U.S. security assurance on the visitor). These visits may or may
not involve disclosure of unclassified data on the "U.S. Munitions List."
Visits in this category are not processed under the provisions of this manual.
However, the contractor is responsible for compliance with the ITAR and for
obtaining a State Department export license or letter, if required.
b. The following information concerning the requirements of the ITAR is
furnished for the guidance of the contractor:
(1) Disclosure of classified information, in connection with visits
in the category described in paragraphs a(1)(a) and (c) above, does not
require an export license.
(2) Except as specified in paragraph (3) below, disclosure of
unclassified technical data related to "U.S. Munitions List" items requires an
export license.
(3) An export license is not required if the visit has been
approved on an unclassified basis by the UA concerned, and (i) the technical
data to be disclosed is information covered by a manufacturing license or
technical assistance agreement approved by the Department of State, or (ii)
the technical data to be disclosed is exempt from the provision of the ITAR.
c. Requests for visits to foreign governments or activities shall be
processed only for an employee who is the subject of an LOC. Contractor-
issued CONFIDENTIAL clearances are not valid for such visits.
d. Visit requests shall be processed as follows:
(1) Visit requests in the categories described in paragraphs
a(1)(b) and a(2)(a) and (b) above shall be processed by ale contractor through
DISCO.
139 48
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 L ] LL_LL 1.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) Visits in the categories described in paragraphs a(1) (a) and (c)
above shall be processed by the contractor, in accordance with the regulations
of the UA that is dealing with the foreign government. The contractor shall
certify visit clearance information directly to the UA concerned. If the UA
is unable to process such requests, they will so endorse the contractor's
request and refer it to DISCO for processing. Such endorsement will
constitute approval of the visit and reference to an export license will
not normally be required on the visit request.
e. Visit requests processed through DISCO shall be submitted in
duplicate with one extra copy for each additional country to be visited, and
shall contain the information required in paragraph 37d, as well as proposed
visitor's passport or identification card number, and date and place of
issuance. In addition, the contractor shall specify the category of visit
that is involved (see paragraph a above) and, for a visit of the type
described in paragraphs a(1)(b) or a(2)(a) above, will certify the export
license number and license expiration date within the visit request. For
visits to the Swiss Government and contractor facilities, the legal residence
address of each visitor must also be shown.
49. Processing Time. Visit requests should be received by DISCO at least 45
days in advance of the proposed travel date for all countries and U.S.
overseas commands. Exceptions are for travel to Switzerland, which requires
70 days advance notice. Requests for visits in France must be for specific
dates, as France will not approve visits for indefinite periods.
50. Use of OISI. If the U.S. contractor employee making the visit is based
in Europe, or in an adjacent non-European country, the visit request may be
submitted through OISI rather than through DISCO. The information required in
paragraph 48e shall be included with the request. The OISI will verify the
proposed visitor's security status. In addition to furnishing a copy of the
export license or letter, when required in accordance with paragraph 48e, the
contractor is responsible for compliance with the ITAR, if applicable, in the
same manner as though the visit were arranged through DISCO.
Part 5. VISITS IN CONNECTION WITH BILATERAL INDUSTRIAL SECURITY AGREEMENTS
AND NATO VISITS PROCEDURES
51. Visits in Connection With Bilateral Industrial Security Agreements.
a. The following procedures apply to visits pertaining to precontract
negotiations or contract performance under approved bilateral agreements
involving a foreign classified contract in the U.S. or a U.S. classified
contract in a foreign country.
(1) Authorization for visitors or those visited to have access to
classified information shall be limited to that necessary for official pur-
poses in connection with precontract negotiatiors or contract performance.
51 140
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
When requested, the authority to visit the facility of the prime contractor
may include authorization to have access to or to disclose classified infor-
mation at the facility of a subcontractor engaged in performance of work in
connection with the same contract.
(2) A list may be developed to indicate those individuals who are
authorized to visit the facility for extended periods of time, not to exceed 6
months, as may be necessary in the performance of the contract. This
authorization may be renewed for additional periods of 6 months as may be
necessary in the performance of the contract.
(3) Visits shall be approved only for persons possessing U.S.
Government granted security clearances.
b. U.S. contractor visits in connection with foreign classified
contracts shall be processed in accordance with the provisions of paragraph
48.
c. Representatives of foreign governments visiting U.S. activities
shall be processed as Category 4 visitors, in accordance with paragraph 41d,
if the U.S. classified information is involved in the foreign government's
contract. If only foreign classified information is involved, the visit shall
be processed by DISCO.
52. NATO Visit Procedures. The following visitor control procedures apply to
a NATO precontract negotiation or to a NATO contract awarded to a U.S.
contractor by a NATO government other than the U.S., a contractor of such NATO
country, or a NATO international body:
a. Visits by Representatives of a U.S. Contractor to the NATO Contract-
ing Officer, a NATO Management Office, or a Contractor of a NATO Country Other
Than the U.S. The visit request, in quadruplicate, will be directed through
DISCO to the NATO contracting office or to the NATO management office and will
be processed together with a Certificate of Security Clearance (see paragraph
55). The Certificate of Security Clearance shall indicate whether or not the
visitor has received a NATO security briefing. Whenever possible, the NATO
security briefing will be accomplished prior to the submission of the visit
request and the certificate will state so. When this is not practical, the
visit request will include a statement as to when and by whom the NATO
security briefing will be conducted. The visit request shall include the
information specified in paragraph 37d, the visitor's passport or identity
card number, date and place of issuance, and the NATO contract or program an
which he or she is engaged.
b. Visits by Representatives of NATO Contracting Officer, a NATO Manage-
ment Office, or of a Contractor of a NATO Country to the U.S. Contractor.
Such requests shall be processed by the NATO activity concerned as a Category
4 visit (see paragraph 41d) through the appropriate UA activity. Such visit
requests will contain the information specified in paragraph a above.
c. Visits in Connection with NATO Contracts by Representatives of a
U.S. Contractor to Another U.S. Contractor in the U.S.
(1) Such visits shall be processed as Category 1 visits (see paragraph
41a), if both contractors are performing on the same NATO contract in a prime
141
52.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 ii j I ,
I I44-4.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
contractor to subcontractor or subcontractor to subcontractor relationship. A
statement on NATO security briefing shall be included in the visit request.
(2) If no contractual relationship exists between the contractors,
the visit request shall be processed as a Category 2 visit (see paragraph 41b)
requiring the approval of the NATO contracting officer whose information is
involved. Supporting information on NATO briefing and the Certificate of
Security Clearance shall be included in such visit requests. The visit
request, together with two copies of the Certificate of Security Clearance,
will be processed through DISCO to the NATO Contracting Officer.
d. Recurring Visits. Subsequent visits shall be processed in accordance
with paragraph 37f. Authorization for subsequent visits shall not exceed a period
of 12 months, but may be subject to renewal for succeeding periods of 12 months,
if required (see paragraph 53b for NPLO visit requests).
53. NPLO Programs Clearance and Visit Procedures. Clearance and visit
control procedures in effect for contractors performing on specific NPLO
programs are different from other NATO visit procedures. Current NPLO
programs are HAWK, F-104G, NAMSA, and NISCO. As an aid to simplifying visit
procedures, it is necessary to establish the visiting contractor employee's
clearance in connection with a specific NPLO program. This may be accomplished
prior to the initial or concurrently with the request for such visit.
a. Initial Visits.
(1) The visit request, in quadruplicate, will be directed through
DISCO to the NPLO Management Office with a copy to the NATO activity to be
visited and will be processed together with a Certificate of Security Clearance
(see paragraph 55). The visit request shall include the information specified
in paragraph 37d, the visitor's passport or identity card number, date and
place of issuance, and the NPLO program with which he or she is concerned.
(2) The DISCO will forward the visit request to the NPLO Management
Office, which will inform appropriate NATO and foreign activities of its
action; that is, approval or disapproval.
(3) The Certificate of Security Clearance will be forwarded by
DISCO to the NATO Office of Security, Industrial Security Section, for
recording and dissemination of the information to the NATO member countries
and NPLO Management Offices concerned.
(4) In case of urgency when a Certificate of Security Clearance has
not been forwarded to the NATO Office of Security, Industrial Security
Section, in advance, DISCO will attach a copy of the Certificate of Security
Clearance to the visit request for transmission to the NPLO Management Office.
b. Recurring Visits. If the initial visit is approved, subsequent
visits, not to exceed 6 months to the same NPLO activity for the same U.S.
contractor employee, will be processed by the U.S. contractor directly to the
NPLO activity to be visited. That activity will notify the contractor of the
approval of the visit. These subiequent visit requests will contain the
information required by paragraph 37d and will include the visitor's passport
or identity card number, and date and place of issuance.
53. 142
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
54. Records of NATO Visits. The contractor shall keep a separate set of
visitor records for NATO visitors containing the information specified in
paragraph 39.
55. Certificate of Security Clearance.
a. A standard format Certificate of Security Clearance has been adopted
for use within the NATO community in connection with visits from one NATO
country to another, or to a NATO office, agency, command, or to or between
contractors when a visit will involve access to NATO classified information.
b. The Certificate of Security Clearance shall be completed on plain
bond paper by the contractor for his or her employees desiring to make a
visit, and submitted in duplicate for certification to DISCO. The employee's
name shall be listed in the following order: last name, first name, middle
name.
c. This certificate shall be sent sufficiently in advance by the con-
tractor through DISCO so as to ensure receipt by the foreign officials of the
NATO offices, agencies, commands, or contractors before arrival. In excep-
tional circumstances, the information required by the certificate may be
supplied by other means of communication, but must be confirmed in writing.
Normally, a copy of this certificate should not be given to the traveler.
143
S5.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Issued by
(Sample)
DEFENSE INDUSTRIAL SECURITY
CLEARANCE OFFICE
Certificate of Security Clearance
(Authorizing Access to NATO Classified Information)
Date and place of issue
Valid until
(If issued to an individual, this certificate should be returned to the
granting authority on the termination of the mission for which issued.)
This to certify that
Date of birth
Place of birth
Nationality
Last name, first name, middle name
Where employed
Programme(s)
Holder of passport/identity card No.
Issued at
Military rank and number
(where applicable) has been cleared for access to information classified
up to and including
in accordance with current NATO Security Regulations.
(Has)(Has not) received a NATO Security briefing.
Date of briefing:
Signature and Title of Granting Authority
(seal or stamp)
144
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section VI. SUBCONTRACTORS, VENDORS, AND SUPPLIERS
56. Application to Subcontractors. The provisions of this manual apply to
subcontractors, vendors, or suppliers of prime contractors (hereafter referred
to as a subcontractor). A subcontractor shall submit requests through the
prime contractor to the contracting officer for an authorization or approval
requiring action by the contracting officer under the provisions of this
manual. However, if any such request is clearly encompassed in an
authorization previously given in writing to the prime contractor by the
contracting officer, in relation to a specific contract, the prime contractor,
acting within the scope of such authorization, may approve or disapprove such
request. Requests involving release of U.S. classified information to foreign
subcontractors must be forwarded to the UA for authorization.
57. Application to Sub-Subcontractors. For the purposes of this manual, each
subcontractor shall be considered as a prime contractor in relation to his or
her subcontractors.
58. Determination of Clearance Status.
a. The prime contractor shall determine from the Personnel Investiga-
tions Center (PIC)-Clearance Verifications Activity (CVA), mailing address:
Defense Investigative Service
PIC-CVA
P.O. Box 1211
Baltimore, MD 21203-1211
Telephone Number (301)633-4820
that the prospective subcontractor has been granted an appropriate FCL prior
to disclosure of any classified information, unless there is an existing con-
tractual relationship between the parties involving classified information of
the same or higher category. (An FCL is not prima facie evidence that a
facility has the capability to physically safeguard classified material.) If
physical possession of any classified material is to be granted to the
prospective subcontractor, the procedures outlined in paragraph 59 shall be
followed.
b. If the prospective subcontractor does not have an appropriate
FCL, the prime contractor may request the CSO of the subcontractor to
initiate clearance action. The term "prospective subcontractor," as used
herein, means a subcontractor whose services are required for the perfor-
mance of an existing classified contract or subcontract. Requests will
include, as a minimum, the full name, address and telephone number of the
requester; the full name, address, and telephone number of a contact at the
facility to be cleared; the level of clearance and safeguarding capability
required; and full justification for the request.
c. Requests to process a prospective subcontractor for an FCL must
be based on a bona fide procurement need for the prospective subcontractor
to have access to, or possession of, classified information during con-
tract activity, such as preparation of bids and proposals and precontract
negotiations, the performance of the subcontract, and all aspects of post-
contract activity. Requesting cleared contractors shall allow sufficient
145 58.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V 1 II
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LOU 7.4[U.LL-M
lead time in connection with the award of a classified subcontract to
enable an uncleared bidder to be processed for the necessary FCL. When
the FCL cannot be granted in sufficient time to qualify the prospective
subcontractor for participation in the current contract activity, the CSO
will continue the clearance processing action to qualify the prospective
subcontractor for future classified contract consideration provided:
(1) The delay in processing the FCL was not occasioned by a
lack of cooperation on the part of the prospective subcontractor;
(2) Future classified contract negotiations may likely occur
within 12 months; and
(3) There is a reasonable likelihood the contractor may be
awarded a classified subcontract.
59. Safeguarding Ability.
a. Prime contractors, having complied with paragraph 58a, shall obtain
written approval from the contracting officer, or his or her designated repre-
sentative, prior to the disclosure of TOP SECRET information to prospective
subcontractors.
b. Prime contractors, having complied with paragraph 58a, shall deter-
mine that prospective subcontractors meet the requirements of this manual for
safeguarding TOP SECRET, SECRET, and CONFIDENTAL material prior to granting
physical possession of such material to prospective subcontractors. (This
determination may be made at the same time as the FCL determination is made
under paragraph 58a.) 1/ Such determination shall be based on the following:
(1). the prime contractor's knowledge of the ability of the pro-
spective subcontractor to safeguard adequately the material to be released
and produced under the subcontract based on a current contractual relation-
ship involving classified material of the same or higher category as that to
be released or produced under the new subcontract, or
(2) the written authorization of the PIC-CVA or, if appropriate,
the CSO of the prospective subcontractor. In this connection, the prime con-
tractor shall provide the PIC-CVA or the CSO of the prospective subcontractor
with available information, such as description, quantity, end-item, and
classification of information related to the proposed subcontract and any
other factors, in order to assist the PIC-CVA or the CSO in determining
whether the prospective subcontractor meets the safeguarding requirements
of this manual.
1/ Under the following circumstances, the PIC-CVA will not be able to
respond and requesters shall make inquiries to the appropriate CSO:
(i) requests involving the transfer of material that would require
more than two cubic feet of storage, (ii) requests involving commercial
carriers under the provision of paragraph 17c5(c), Industrial Security
Manual, and (iii) requestb for certification of securicrclearance and -
safeguarding ability to the DTIC.
59. 146
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(3) The PIC-CVA or, if appropriate, the CSO of the prospective
subcontractor shall advise the prime contractor in writing that the pro-
spective subcontractor is or is not physically equipped to safeguard the
classified material involved. When necessary action is taken by the
prospective subcontractor to provide adequate safeguards, the CSO of the
prospective subcontractor shall immediately inform the prime contractor.
(4) Verifications may be requested from the PIC-CVA by telephone
or letter and from the CSO, if appropriate, by message, telephone, or letter.
Should the foregoing verifications be requested via telephone, oral confirma-
tion will (normally) be immediately provided. In any event, under normal
circumstances written confirmation will be furnished to the requester within
5 working days from receipt of inquiry, regardless of mode. Unless otherwise
notified (superseded) in writing by the PIC-CVA or the CSO, if appropriate,
each verification furnished in accordance with this paragraph shall remain
valid for a period of 1 calendar year from the date of issuance. (Note: In
most instances the confirmation will be on the CSO's letterhead.)
(5) Clearance status and safeguarding capabilities of facilities
shall be obtained only when a specific procurement need exists.
60. Classification Guidance.
a. Prime contractors have a requirement to inform prospective subcon-
tractors of the category of classification to be assigned the various elements
in a subcontract, RFQ, RFP, IFB, or other solicitation. The prime contractor
in preparing the DD Form 254 for his or her subcontracts may extract pertinent
data from the DD Form 254 pertaining to the prime contract. The DD Form 254
prepared by the prime contractor shall be submitted to the official shown in
item 16e of the prime contract's DD Form 254 for approval and distribution, or
authorization and instructions for distribution, by the prime contractor. In
the absence of exceptional circumstances which clearly support classification,
the DD Form 254 will not be classified. If classified supplements are required
as part of the security guidance, they shall be identified in item 15 of the
DD Form 254 and forwarded by separate correspondence. Classified information
shall be so furnished after verifying clearance status and safeguarding
ability, in compliance with paragraphs 58 and 59. The provisions of this
paragraph do not waive the requirements of paragraph 62.
b. After selection of a subcontractor, the prime contractor shall
prepare a DD Form 254 for the subcontract and shall request the official
designated in item 16e of the DD Form 254 for the prime contract to approve
and sign the DD Form 254 for the subcontract and to make the required distri-
bution. However, with the agreement of the contracting activity, the prime
contractor may accomplish the required distribution of the approved DD Form
254. The distribution schedule of the DD Form 254 is included as paragraph
61.
c. When the prime contractor receives a revised DD Form 254 providing
additional guidance or a change in guidance, he or she shall prepare a revised
DD Form 254 for each subcontractor whose DD Form 254 requires a related
change. An ACO/PCO authenticating signature and distribution, or instructions
for distribution, of the contractor's DD Form 254 are required. When prime
147
60.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H L - .1.11 1 I 1
.I?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
contractors receive notices that reviews have reaffirmed their existing
guidance, or receive revised DD Forms 254 that do not require related changes
in any subcontractors' DD Forms 254, they shall promptly give written notices
of reaffirmation of guidance to each subcontractor involved. This notice of
reaffirmation to subcontractors does not require ACO/PCO authenticating
signature. Instead, a true copy of the notice of reaffirmation received by
the prime contractor, or, when applicable, a true copy of pages 1 and 2 of the
revised DD Form 254 received by the prime contractor, annotated by the prime
contractor with the statement, "This revised DD Form 254 does not affect your
current DD Form 254 dated ," will suffice. In either
of the above cases, a signed transmittal letter from the prime contractor
shall be attached. Distribution of this written notice of reaffirmation to
subcontractors shall be in accordance with paragraph b above. With respect to
a MPO, the HOF shall provide the guidance for the revised DD Form 254, or the
written notice of reaffirmation of the existing guidance described above, as
applicable, to each of its operating facilities affected by the revised
guidance or involved in the notice, as the case may be.
d. The prime contractor will receive from the UA a DD Form 254 for each
classified item of GFP or GFE issued or authorized for purchase, when such
material is not covered by the classification specification issued with the
contract. The contractor shall furnish a DD Form 254 providing the classifi-
cation specification necessary for each of the subcontractors requiring use of
classified GFP or GFE in connection with their contracts or negotiations for
contracts with the prime contractor.
e. A new DD Form 254 is not required for a follow-on contract or sub-
contract when the procurement is of a recurring nature, or the end item is not
changed and there is no change in the security classification requirements of
the contract. However, a copy of the currently valid DD Form 254 for the
preceding subcontract shall be furnished and distributed with the follow-on
subcontract and annotated in items 3 and 4 to show the contract number and
date of the follow-on prime contract and subcontract. Item 6 will also be
completed, as appropriate.
f. There is no authorized substitute for the DD Form 254. There are
exceptional conditions in which a prime contractor has a serious time limita-
tion in preparing his or her response to a RFP, IFB, or similar solicitation
to a UA. In such cases the prime contractor, concurrent with dispatching the
DD Form 254 for official U.S. Government approval and signature, may supply an
unofficial copy of the same guidance to a prospective subcontractor for the
latter's use pending receipt of the approved and signed DD Form 254.
g. A single DD Form 254 may be used to provide the classification speci-
fication for an open-end or call type subcontract, except when the individual
call, purchase order, or request for services or products requires a different
classification specification from that provided for the overall subcontract.
h. The following special provisions are applicable to service, graphic
arts, research, or commercial carrier classified contracts:
60 148
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) A DD Form 254, which specifies the highest level of
classification involved, but does not provide detailed classification
guidance, will be issued under the following circumstances:
(a) The total requirement of the contract is the performance
of a service, all of which takes place at a cleared contractor's facility or
U.S. Government activity which has and makes available, for use by the con-
tractor performing the service, a currently valid Contract Security Classifi-
cation Specification, which includes complete guidance for the service to be
performed. In such cases, item 15 of the DD Form 254 will be annotated:
"Using contractor or activity will furnish complete classification guidance
for the service to be performed. The highest level of classification for the
contract is (TOP SECRET, SECRET, or CONFIDENTIAL). Contract performance is
restricted to (name of facility or location)."
(b) The contractor has no performance requirement involving
actual knowledge of, generation, or production of classified information, but
has only a requirement to be physically present in an area where classified
information is located. Examples include, but are not limited to, contracts
calling for guard, alarm, alternate storage, or equipment maintenance services.
In these cases, item 15 of the DD Form 254 will be annotated: "Actual knowledge
of, generation, or production of classified information is NOT REQUIRED. This
document serves as written notice of the letting of a classified service con-
tract. The highest level of classification for the contract is (TOP SECRET,
SECRET, or CONFIDENTIAL)."
(c) The contract requirement is limited to graphic arts
reproduction and classification markings appearing on the material to be
reproduced. These classification markings constitute the required Contract
Security Classification Specification. In these cases, item 15 of the DD Form
254 will be annotated: "Reproduction service only. The highest level of
classification for the contract is (TOP SECRET, SECRET, or CONFIDENTIAL).
Classification markings on material to be reproduced specify the required
security guidance."
(2) When a cleared commercial carrier enters into a classified
service subcontract with a cleared facility, within the meaning of paragraph
(1)(b) above, the carrier, serving as a prime contractor for such purpose, will
issue a DD Form 254 to that cleared facility. In any such case, the require-
ments of paragraphs (1)(b) above and (3) below will apply.
(3) In each of the cases described in paragraphs (1) and (2) above,
if a subcontract at any tier is involved, the DD Form 254 for the subcontract
will not require authentication by the signature of an ACO/PCO. Instead, the
contractor who is the principal prime, or who serves as a prime contractor in
relation to a subcontractor in the particular case, will complete and sign
item 16. Further, in all cases distribution of the DD Form 254 will be made
to the subcontractor involved, his or her CSO, and the contract administration
office(s), if designated, of the immediate prime contractor and subcontractor
involved.
149 60.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 , 1 1 1 ' 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOU DZLU."1-1-M
(4) Where a contract involves research services requiring detailed
classification guidance, but it is too early to determine these detailed
requirements, item 15 of the DD Form 254 will be annotated: "This is a
research contract. The highest level of classificatiOn for the contract as a
whole is (TOP SECRET, SECRET, or CONFIDENTIAL). A revised DD Form 254 will be
issued as soon as possible, to provide detailed security classification
guidance."
i. In the case of a subcontract, which is expected to require access
only to classified reference material (see paragraph 3bt), an original DD Form
254 will be issued to describe the highest category or various categories of
classification of such material to which access will be required and to provide
other instructions, as appropriate, for example, the protection of information
extracted from such material. Classification guidance concerning reference
material is the responsibility of the department or agency having classification
jurisdiction over such material at the time it was prepared, or of the current
successor in interest of that department or agency. When the prime contractor
requires classification guidance for reference material in order to prepare a
DD Form 254 for the subcontractor, or for other reasons and needs assistance
in identifying the responsible department or agency, he or she shall, by
direct communication, seek assistance from the following:
(1) The secondary distribution source from which the material was
received. Examples of secondary distribution sources are: DTIC, Alexandria,
Virginia 22314 and its field extensions; DoD Information Analysis Centers; and
the Redstone Scientific Information Center, U.S. Army Missile Command, Redstone
Arsenal, Alabama 35808.
(2) The UA contracting office last involved with the contractor
concerning the subject matter of the material.
(3) If unsuccessful in identifying the responsible department or
agency by communication with (1) and (2) above, the contractor shall seek
assistance from:
(a) the UA which awarded the prime contract, or
(b) the Director for Information Security, OUSD(P).
61. Required Distribution. Original, final, and revised DD Forms 254,
supplements, attachments, and written confirmation of existing classification
specifications are to be distributed as follows 2/:
2/ Reflect the distribution in the "Required Distribution" block of the DD
Form 254. For SENSITIVE COMPARTMENTED INFORMATION contracts, distribution
of the-DD Form 254 and attachments will be as prescribed by the procuring
contracting agency concerned.
61. 150
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
a. For prime contracts:
(1) Prime contractor
(2) CSO of prime contractor
(3) Appropriate ACO
(4) Quality assurance representative
(5) Official identified in item 12b, DD Form 254
(6) Others as necessary
b. For subcontractors:
(1) Prime contractor
(2) Appropriate ACO
(3) Subcontractor
(4) CSO of subcontractor
(5) Quality assurance representative
(6) Official identified in Item 12b, DD Form 254
(7) Others as necessary
c. For sub-subcontracts:
(1) Prime contractor
(2) Appropriate ACO
(3) Subcontractor
(4) Sub-subcontractor
(5) CSO sub-subcontractor
(6) Quality assurance representative
(7) Official identified in Item 12b, DD Form 254
(8) Others as necessary
d. For solicitations (IFB, RFQ, RFP), distribution of DD Form 254 for
IFB, RFQ, or RFP, will be the same as for the prime contract, subcontract, or
sub-subcontract to which the solicitation is related, except that none is to
be sent to the quality assurance representative.
62. Notification of Selection. The prime contractor shall immediately
furnish in writing to the contracting officer, or his or her designated
representative, the names and addresses of each of the subcontractors to
be engaged on classified work under a prime contract, and the highest
classification of information that shall be released or developed thereunder.
63. Unsatisfactory Security Conditions. If notified by a CSO of unsatisfac-
tory security conditions within a subcontractor's facility, contractors shall
follow the instructions they receive from the contracting officer relative to
what action, if any, should be taken in order to safeguard classified material
relating to their subcontract.
64. Disposition of Classified Information. The subcontractor shall destroy
classified material, as provided by paragraph 19, unless the prime contractor
requests return or authorizes retention. However, the prime contractor shall
obtain the approval of the contracting officer, or his or her designated
representative, authorizing a subcontractor to retain classified information.
151
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
64.
Ii V 1..1.1 I I I I.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOV DLLU.LL-M
65. Subcontracting With Foreign Industry.
a. The U.S. has entered into bilateral security agreements with
several foreign governments to establish the intent of both parties to
protect each others classified information. The U.S. negotiates two basic
types of security agreements, the General Security of Information Agreement
(GSOIA) and the Industrial Security Protocol. The CSO should be contacted
concerning whether a particular country has entered into either type of
bilateral agreement.
(1) The General Security of Information Agreement (GSOIA). The
GSOIA is a government-to-government agreement, negotiated through diplomatic
channels. It states, in substance, that each party to the agreement will
afford to the classified information provided by the other the degree of
security protection afforded it by the releasing government. It contains
provisions concerning the use of each government's information, third party
transfers, and proprietary rights. It specifies that transfers of informa-
tion will be on a government-to-government basis. It provides that both
parties agree to report any compromise, or possible compromise, of classi-
fied information furnished by the other party. Moreover, the GSOIA states
that both parties will permit visits by security experts of the other party
for the purpose of conducting reciprocal security surveys. The purpose
of such surveys is to determine whether the foreign government has the
capability to protect U.S. classified information in a manner that is
substantially equivalent to the protection afforded to it by the U.S.
(2) The Industrial Security Protocol. The Industrial Security
Protocol is negotiated by the DoD as an annex to the GSOIA, with those
foreign governments with which DoD has entered into coproduction, codevelop-
ment, and/or reciprocal procurement arrangements, involving industry. It
includes provisions for clearance of facilities and personnel, the handling
and transmission of classified material, and procedures for visits.
b. The above-cited security agreements apply only when a contract,
subcontract, or other such government approved arrangement, is awarded to a
foreign or U.S. contractor by or on behalf of the U.S. Government or the
signatory foreign government, as applicable. They do not apply in the case
of an industry-to-industry arrangement, unless it is in furtherance of a
documented government-to-government cooperative program, for example, a co-
production memorandum of understanding. In such instances, the government-
to-government arrangement will stipulate that all classified military in-
formation approved for release under the program will be safeguarded, in
accordance with the applicable GSOIA and Industrial Security Protocol. If
such agreements do not exist with the foreign government concerned, the
necessary security provisions are incorporated in the documentation estab-
lishing the government-to-government program. Consequently, subcontracts,
which require the release of U.S. classified military information, may be
awarded to foreign industry only when: (i) the subcontract is in
furtherance of a specific government-to-government arrangement, or (ii)
assurances are obtained through government channels that the government of
the country in which the foreign industry resides will assume responsibility
for ensuring the security protection of the U.S. classified information
involved. All such subcontracts require the approval of the UA having
jurisdiction over the classified information involved.
65. 152
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
66. Subcontracts Arising From Foreign Classified Contracts. Unless
specifically prohibited in the contract, a U.S. contractor awarded a foreign
classified contract by a government with which the DoD has entered into a
bilateral industrial security agreement may subcontract within the U.S., in
accordance with the provisions of this manual, within the country of the con-
tracting foreign government, in accordance with instructions furnished by the
designated agency of that government, through the Deputy Director (Industrial
Security), HQ DIS. In addition, a U.S. contractor may subcontract within any
other country only with the permission of, and under conditions agreed to by,
the contracting government, and the government of the country of the subcon-
tractor. These conditions shall be furnished to the contractor through the
Deputy Director (Industrial Security), HQ DIS. In those cases where U.S.
classified information is involved in the subcontract, the contractor or
foreign government, shall, prior to its release to the foreign government,
obtain an export letter/license authorization from the Department of State or
specific approval of the U.S. UA that originated the information.
Icq 66.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1
1 .11__I 1 1 I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5ZZU.22-M
DUMMY PAGE
154
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22.41
Section VII. CONSULTANTS
67. General. PCL and/or FCL requirements for self-employed consultants
to UA activities and contractors shall be determined in accordance with
this section. In all cases, self-employed consultants shall have valid
PCL's issued in accordance with the requirements of this manual. Consul-
tants are not eligible for access to classified information outside the
U.S. and its trust territories and possessions, unless in official travel
status of not more than 90 days in any 12-month period. Consulting firms
and Type B Consultants shall be processed for an FCL. As a general rule,
however, self-employed consultants will not require an FCL, regardless of
the business structure involved. The CSO will provide advice regarding the
need for a particular consulting firm to be cleared.
68. Consultant -- Type A. The consultant does not possess classified
material, except at the using contractor's cleared facility, on the pre-
mises of a UA activity, or while on visits authorized under section V.
All requirements of this manual apply to the consultant who, for security
administration purposes only, shall be considered to be an employee of the
UA.
a. Should an FCL for the consultant not be required, the using
contractor or UA activity and the consultant shall jointly execute a
certificate as follows:
(1) Except in connection with authorized visits: classified
material shall not be possessed by the consultant off the premises of the
using contractor or UA; the using contractor or UA shall not furnish classi-
fied material to the consultant at any other location than the premises of
the using contractor or UA, and performance of the consulting services by the
consultant shall be accomplished at the activity of the using contractor or
UA; and classification guidance will be provided by the using contractor or
UA.
(2) The consultant shall not disclose classified information to
unauthorized persons.
(3) The using contractor or UA shall brief the consultant as to the
security controls and procedures applicable to the consultant's performance.
b. One copy of such certificate shall be furnished by the using con-
tractor to his or her CSO. In the case of a consultant to a UA activity,
the certificate shall be retained by the Commander or Head of that activity.
c. The consultant shall complete the forms required by paragraph 26.
These forms shall be submitted to DISCO through the UA activity or the
contractor for which the consulting service is to be performed. Each
application for clearance shall be accompanied by a copy of the certif-
icate prescribed by paragraph a above. The LOC shall be issued to the
using contractor or UA activity, as appropriate.
155 68.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
d. Failure to accomplish the certification described above shall
require the processing of an FCL, as prescribed by paragraph 21.
69. Consultant -- Type B. The consultant possesses classified material at
his or her place of business or residence, the consultant having full
responsibility for security of the classified material.
a. An FCL is required for the consultant to cover the premises at which
he or she will possess the classified material and perform the consulting
services.
b. Consultants of this type shall be considered to be prime contractors
to the UA activity, or Subcontractors to the using contractor.
c. The provisions of this manual pertaining to contractors or subcon-
tractors, as appropriate, shall apply.
70. Consultant -- Type C. Consultants possess classified material at their
regular employer's cleared facility, the consultants and their employer having
agreed as to their respective responsibilities for security of the classified
material. The clearance status and safeguarding ability of the consultants'
regular employer shall be obtained from the employer's CSO, prior to the
disclosure or release of any classified information to the consultant.
a. No requirement exists for a separate FCL for the consultant (including
execution of the DD Form 441 and the DD Form 441s) or to have an existing
FCL raised, provided that the employing facility, and the employee who is
acting as a consultant to another contractor or to a UA activity, are both
cleared for access to at least the category of classified information as that
to which the consultant will require access, and provided the employing
facility and the employee jointly execute a letter agreement to safeguard
classified information for an employee performing consultant services (see
appendix I, paragraph U) by which the employing facility and the employee
agree to the following:
(1) Both agree to place classified material, which the consultant-
employee must have in his or her possession, into the employing facility's
accountability system.
(2) Both agree to incorporate procedures in the employing facility's
SPP, which prohibit the dissemination of the classified material within the
facility, except that appropriately cleared personnel of the facility may be
designated in writing on a strict need-to-know basis to provide the consulting
employee clerical, destruction, and reproduction services necessary to his or her
performance as a consultant.
(3) .Both agree to furnish the employee, who is acting as a consultant,
a Storage container, so that the classified material may be stored under his
or her control. Access to the storage container shall be limited to the
employee who is acting as a consultant and the minimum number of employees
designated in accordance with paragraph (2) above, which are essential to
support the consultant.
70. 156
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
(4) Both agree to advise its CSO immediately on any change in the
consultant's status as an employee of the facility.
b. One copy of the letter agreement described in paragraph a above,
shall be furnished by the employing facility to its CSO, and one copy to the
contractor or UA employing the consultant.
c. In the event it is necessary to raise the consultant's PCL to
a higher level (not above that of the employing facility), the consultant
shall complete the forms required by paragraph 26 and submit them through the
employing facility to DISCO with a copy of the letter agreement prescribed in
paragraph a above. (If required to be cleared to a higher level than that of
the employing facility, the consultant shall be processed for a separate FCL,
in accordance with paragraph 69, and required to maintain a security program
fully independent of that of his or her employer.)
71. Consultants to User Agencies Employed Under Civil Service Procedures.
Security clearances for persons employed as consultants to UA's under civil
service procedures normally will be issued under the separate regulations of
the UA concerned. However, UA's may process such a consultant for a PCL
and/or an FCL under the provisions of paragraph 68-70, when deemed desirable.
1S7 71
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.1.1. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
DUMMY PAGE
158
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section VIII. PARENT-SUBSIDIARY AND MULTIPLE FACILITY ORGANIZATIONS
72. Parent-Subsidiary Relationships.
a. When a parent-subsidiary relationship exists between two companies,
the parent company must have an FCL of the same or higher classification level
as the subsidiary company, unless by formal action of its board of directors
or similar executive body: (i) it is excluded from access to all classified
information held by the subsidiary company, or (ii) it is excluded from access
to classified information held by the subsidiary company, which is of a higher
classification level than the parent company's FCL. However, if the parent
company is under FOCI, exclusion action may not be taken. In such circumstances,
the subsidiary company is ineligible for an FCL. (Certain exceptions to this
rule can be made when the foreign ownership or control is exercised by a
Canadian or U.K. interest. Consult the CSO for details.) Each exclusion action
shall be made a matter of record in the minutes of the executive body of both
the parent company and the subsidiary company. Two copies of both sets of
minutes shall be furnished to the CSO of each cleared subsidiary company, along
with a copy of the DD Form 441s, executed independently by the excluded parent
company and the subsidiary company. In addition, when officers or directors
of a subsidiary hold similar positions with the excluded parent company, they
shall execute one of the following certificates, as appropriate: (i) "I under-
stand that the (name of parent company) is not cleared for access to classi-
fied information and I certify that I shall not disclose classified information
to the (name of parent company) or any of its agents, regardless of my official
business or personal association therewith," or (ii) "I understand that (appro-
priate classification level) is the highest level of classified information
which may be disclosed to the (name of parent company) or any of its agents,
regardless of my official business or personal association therewith." Official
notice of the execution of each such certificate shall be made a matter of
record in the minutes of the executive body of the subsidiary company and two
copies of the minutes shall be furnished to the CSO of the subsidiary. Two
copies of each certificate, executed in accordance with the requirements of
this paragraph, shall be furnished to the CSO of the subsidiary.
b. Interchange of classified information and visits between a parent and
its subsidiaries, or between the subsidiaries, shall be accomplished in the
same manner as an interchange between a prime contractor and a subcontractor.
However, in the case of a classified contract awarded to a subsidiary, the
subsidiary, as necessary in the performance of the contract, may release
classified information to the parent, when required, provided the parent
company has an appropriate FCL and safeguarding ability. Moreover, where the
parent organization is owned or controlled by a foreign interest, the U.S.
subsidiary shall not release U.S. classified information to the parent, except
with the express written authority of the contracting UA. In such cases
visits between the subsidiary and the parent shall be considered as Category 1
visits, as defined in paragraph 41a. Neither the subsidiary nor the parent
may release or disclose classified information, pertaining to the contract of
the subsidiary, to other subsidiaries of the parent without specific approval
of the contracting officer or his or her designated representative, or unless
within the provisions for exceptions set forth in paragraph 5x.
159 72.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. In case the parent corporation or its subsidiaries have cleared
facilities which are collocated with each other (occupying the same office
space or located side by side), the collocated facilities may request CSO
approval of a formal written agreement between the facilities to utilize
common security services for: (i) personnel security administration, (ii)
document control (to include storage), (iii) reproduction, (iv) visitor
control, and (v) other similar administrative services. In all cases, the
agreement shall be incorporated into the SPP (or appropriate supplement to an
SPP) applicable to the facilities involved. The proposed SPP shall be
submitted to the CSO as part of the request. The SPP shall establish workable
security procedures and clearly fix responsibility for security administration
within the collocated facilities. The procedures shall be structured (for
example, separate accountability systems) to ensure that the need-to-know
principles outlined in the previous paragraph are not violated. One FSO shall
be designated for all facilities; the designee shall be considered an OODEP of
these facilities and shall require a concurrent clearance at each facility.
Appropriately authorized (cleared with a need-to-know) personnel rendering
security services shall be designated in the agreement by job title to provide
the specific services agreed to. Additionally, procedures may be incorporated
into the SPP whereby a machine run or other roster (for example, record of
clearance) may be used in lieu of a visit letter, provided such records are
maintained in a current status at all times. When combined, the SPP and the
roster shall provide the essential information required in paragraph 37d.
73. Multiple Facility Organizations (MFO). The home office facility
(HOF) of an MFO is responsible for ensuring compliance with the terms of
the Security Agreement (DD Form 441) and with the security requirements
for each classified contract being performed by all elements and locations
within the MFO, to include all cleared and uncleared subordinate locations
at which cleared personnel are located. A copy of the DD Form 441, with
Appendage (DD Form 441-1) shall be furnished to each facility listed in
the Appendage and to each CSO concerned. The HOF shall have a facility
security clearance at the same, or higher, level as any cleared facility
within the MFO. Following are special procedures and requirements appli-
cable to an MFO:
73
a. Standard Practice Procedure (SPP). The SPP of an MFO shall
include security instructions which provide the controls necessary to
protect classified information within the organization. As a minimum,
the SPP shall include instructions for (i) maintaining clearance records/
briefings, (ii) the transmission of classified information between the
cleared facilities, and (iii) for visits of employees between the cleared
facilities if. Within each cleared facility, the SPP shall then be adapted,
as necessary, to meet the local conditions. When a contractor elects to
have the LOC's issued to the HOF or to a PMP, the subordinate cleared
facility remains responsible for complying with all provisions of this
manual applicable to a cleared facility unless specific allowable excep-
tions are identified in the HOF/PMF, and the cleared subordinate facility's
1/ Visits by cleared employees between facilities of an MFO are considered
Category 1 visits and paragraph 41a applies.
160
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
approved SPP. If cleared employees are employed or physically located at
uncleared locations, the SPP for the HOF/PNP that holds their personnel
security clearances shall reflect that the HOF/PNP, as appropriate, is
responsible for personnel security administration.
b. Interchange of Classified Information. Classified information
may be interchanged among the cleared facilities of the MFO when essential
for contract negotiations and performance. The releasing facility is
responsible for determining that the proposed recipient facility has an
appropriate facility security clearance and the necessary safeguarding
capability.
c. Security Classification Guidance. Security classification guid-
ance, commensurate with the involvement of the receiving facility, shall
be provided by the releasing facility. This guidance does not have to be a
DD Form 254 but it shall be written guidance tailored to the performance of
the receiving facility and shall include the prime contract number. A
copy of the DD Form 254 received by the releasing facility may be used,
if applicable, or guidance may be extracted from a DD Form 254 or from
an appropriate classification guide(s). Regardless of the form of the
guidance, it can be signed by the contractor. A copy shall be provided
to the CSO of the receiving facility. If only classified documents are
provided to another facility, and the documents themselves provide the
necessary guidance, no further classification guidance need be provided.
If the receiving facility's performance will involve any special security
requirements, such as, special access briefings, prohibitions against
subcontracting, reproduction, or transmission, it is essential that
appropriate guidance be provided to the facility and its CSO.
d. MFO/PMF Security Clearances. Normally a cleared employee's
personnel security clearance is required to be at the same, or at a lower
level, as that of the facility's security clearance where the employee is
principally employed and the employee's LOC is retained by that facility.
However, there are exceptions allowed to these requirements in an MFO or
PMF with specifically defined geographical or functional areas for subordi-
nate cleared or uncleared locations where cleared employees are physically
cally located. The contractor may, with the prior approval of the CSO,
elect to have all LOC's issued to the HOF, or to one or more PMF's. Prior
to requesting DISCO to send LOC's to a HOF or PMF, the contractor shall
develop procedures for inclusion in its SPP and submit it to the CSO of
the HOF or the FMF for review. As a part of the SPP, the contractor shall
submit an initial listing of the name and location of subordinate facilities
(cleared and uncleared) for which the HOF and/or PMF will hold the LOC's.
The SPP shall specify the security responsibilities of these subordinate
facilities and must have CSO approval prior to requesting DISCO to issue
LOC's to the HOF or PNP.
e. Personnel Security Administration Responsibilities in an MFO.
The following requirements are applicable when cleared employees are
employed or physically located at uncleared locations: .
161 73
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II I I LL I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) the contractor shall designate a properly cleared management
official at the uncleared location who shall:
(a) conduct recurring security briefings for all cleared
employees;
(b) provide written confirmation of the briefings to the
HOF or PMF that is holding the LOC's;
(c) implement the reporting requirements of paragraph 6
concerning all cleared employees at the uncleared locations and furnish
the reports to the appropriate HOF/PMF for further submittal as required;
and
(d) in situations when there is no suitably cleared manage-
ment official available at the uncleared location, the recurring security
briefings may be conducted by the FSO of the HOF/PMF or their appropriate
cleared representative. These briefings may be conducted during visits by
the FSO to the uncleared locations or during visits by the employees to the
cleared facility. The FS0 shall retain a record of the briefings until
after the next security inspection by the CSO. Such procedures shall be
set forth, as appropriate, in the HOF/PMF SPP.
(2) The HOF or PMF shall provide appropriate reports to its CSO
listing all uncleared locations where cleared employees are located.
(3) All classified visit requests shall be dispatched by the HOF
or PMF.
(4) Procedures applicable to briefing cleared employees who are
assigned to locations outside the U.S. are contained in paragraph 97.
74. Temporary Help Suppliers.
a. General. A temporary help supplier is a subcontractor who dispatches
personnel on his or her payroll to perform work on the premises of the using
contractor or UA (see paragraph 5ab). A temporary help supplier and his or her
field, branch, or associate offices having a valid parent-subsidiary or MFO
relationship are covered in paragraphs 72 and 73 respectively. The following
paragraphs are concerned with:
(1) a temporary help supply licensor (hereinafter referred to as
the licensor) who grants licenses or franchises to other individuals or firms
to use the name, administrative support, methods of operation, or style of the
licensor in a specific geographic area; and
(2) a license or franchise holder (hereinafter referred to as a ii-
and operates a legal entity separate and distinct from- the
licensed or franchised to do business under the name, method
style of the licensor.
the temporary help personnel are actually employees, and on
the licensee, the licensee may be granted an FCL as provided
-
censee) who owns
licensor, and is
of operation, or
b. Where
the payroll, of
for in this manual.
7h 162
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. Where the temporary help personnel are employees, and on the payroll,
of the licensor, normally there would be no valid basis for the licensee to be
granted an FCL. As an alternative, an FCL may be granted in the name of the
licensor at the address of the licensee, if there is a valid requirement for
employees of the licensor to have access to classified information at a con-
tractor facility or UA activity, provided that:
(1) the licensor has an FCL at its HOF; and
(2) an employee of the licensor located on the premises of the
licensee is appointed as FSO for the licensor; or
(3) an employer-employee relationship is established between the
licensor and at least one or more employees of the licensee through execution
of a separate written agreement between the parties, or by the insertion of a
clause in the franchise or license agreement. The agreement or clause shall
specifically provide that, for a consideration, one or more employees of the
licensee will act as FSO for the licensor in the territory covered by the
license or franchise. One signed copy or certified true copy of the agreement
or clause shall be furnished by the licensor to the CSO concerned.
d. If the provisions of paragraphs c(1) and (2), or c(1) and (3), above
are followed, an FCL may be granted to the licensor at the address of the
licensee. This location will, for industrial security purposes, be considered
as an operating facility of an MFO. Among other things, the SPP of the
operating facility shall specify the functions and responsibilities of the FSO
and the procedures for:
(1) processing PCL's including the granting of company CONFIDENTIAL
clearances by
(2)
relate to its
(3)
sonnel to the
5ab and 41a).
the FSO;
accomplishing the requirements of paragraphs 5 and 6 which
(temporary help) personnel; and
processing visit requests dispatching its temporary help per-
using contractor's facility as Category 1 visits (see paragraph
e. When a licensee has a license or franchise agreement with more than
one licensor, an FCL may be issued in the name of each licensor. Similarly,
if a contractor is engaged in a business which requires an FCL in connection
with such business and, in addition, is a licensee for .a temporary help
supplier, an FCL may be issued in his or her own firm's name and one in the
name of the licensor.
f. Temporary help suppliers shall not engage Type A Consultants for
dispatch elsewhere. Each temporary help supplier shall be the user of the
services offered by the Type A Consultant it sponsors for a PCL.
163 74 .
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VOL) )LLU.L.C.,,TI
Section IX. SENSITIVE CaMPARTMENTED INFORMATION AND COMSEC INFORMATION
75. SENSITIVE COMPARTMENTED INFORMATION.
a. The provisions of this manual apply to research, development, and
production of SENSITIVE COMPARTMENTED INFORMATION. In addition, special
security requirements supplementing this manual will be prescribed by the
contracting department for SENSITIVE COMPARTMENTED INFORMATION contracts,
except that, for SENSITIVE COMPARTMENTED INFORMATION contracts awarded by
military department procurement activities for the NSA, the NSA will prescribe
the special security requirements.
b. In the case of SENSITIVE COMPARTMENTED INFORMATION contracts awarded
by military department procurement activities for the NSA, the NSA shall be
responsible for exercising security controls over the contract.
c. In the case of SENSITIVE COMPARTMENTED INFORMATION contracts awarded
by and for a military department or DoD Agency, an activity designated by the
contracting military department or DoD Agency shall be responsible for exercis-
ing security controls over the contract.
d. Access to SENSITIVE COMPARTMENTED INFORMATION will be granted to
contractor employees requiring access by the activity designated to exercise
security controls over the contract as provided above.
e. Denial or revocation of authorization for access to SENSITIVE
COMPARTMENTED INFORMATION is not appealable.
76. COMSEC Information. The contractor shall protect COMSEC information in
accordance with the requirements of the DoD 5220.22-S-1 (CSISM).
76.
165
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UUM JL4V?LA.-171
Section X. GRAPHIC ARTS
77. Special Requirements for Graphic Arts. This section of the manual
provides specific security measures for the safeguarding of classified
information during the development stages, performance of service, or
production of material by the graphic arts industry. The security measures
apply whether the work is performed by the prime contractor on his or her
premises or subcontracted to a graphic arts facility.
78. Production Control Records. While the production control records remain
with the classified job to which they relate, they shall be: (i) plainly and
conspicuously marked or stamped at the top and bottom with the same classifi-
cation as the material being produced, or (ii) unless the production control
record itself contains classified information, covered over with a cover sheet
conspicuously marked or stamped at the top and bottom with the same classifi-
cation as the material being produced. In either case, the additional markings
required by paragraph 11b(8) shall be applied, as appropriate. Production
control records or cover sheets shall be marked with a notation indicating
that they are unclassified when separated from the classified material being
produced, unless they contain or have attached thereto classified information.
The contractor may, at his or her discretion, use the production control
records as the records required by paragraphs 12 and 18, provided they contain
the required information and are retained for the period of time specified in
paragraph 12.
79. Area Controls -- Additional Requirements. During the layout, composition,
platemaking, presswork, and bindery stages of the production of classified
material, controls shall be established to deny unauthorized personnel access
to the immediate area in which such work is being performed. In the event the
safeguarding requirements prescribed in paragraph 16 are insufficient for this
purpose, such areas shall be designated as restricted areas and shall be
controlled in accordance with the provisions of paragraph 34b. Additional
requirements are as follows:
a. Pressrooms. While the press is being made ready or being run, the
press itself shall be identified and marked the same as the classified informa-
tion being run. The press shall remain so identified until the run has been
completed and all classified material removed. Marking and identification of
the press is not required for press runs of short duration, provided the run
is completed prior to the end of the workday. Plates, blankets, chases, and
the like, need not be removed from the press at close of working hours, when
the press run is incomplete, provided the area meets the requirements of
paragraph 34a(3).
b. Composition Areas. Linecasting (for example, intertype and
linotype) and photocomposition machines shall be identified and marked the
same as the classified information being set in type, except for jobs of short
duration completed prior to the end of the working day. Slugs (that is, lines
cast on a linecasting machine), coded tapes, ribbons, negatives, and so on,
need not be removed from the machines at the close of the workday when the
composition is not completed, provided the area meets the requirements of
paragraph 34a(3).
167
79.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.11 11. I 1 1
1 1.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
idWad d=&,./ ?
c. Bindery Area. Bindery areas shall be secured by the same method as
pressroom areas.
d. Darkrooms. Admittance to all film processing units shall be re-
stricted to cleared personnel who are assigned to the particular job or jobs
involving classified information.
e. Proofreading Areas. Proofreading areas shall be controlled by physical
barriers capable of preventing visual or audio access and entrance by unauthorized
persons.
f. Shipping Entrances. Shipping entrances shall be secured when classi-
fied information is in the area. Loading and unloading operations shall be
performed under the supervision of a cleared employee of the contractor.
80. Special Conditions.
a. Overruns. All assembled copies of printed material not spoiled during
a printing operation, which are in excess of the number of copies ordered, shall
be designated as overruns. Overruns shall be held to a minimum. An exact count
of the overruns shall be maintained and they shall be accounted for as pre-
scribed in paragraph 12. Overruns shall be transmitted to the customer with
the balance of the job or promptly destroyed in compliance with the provisions
of paragraph 19a through e if.
b. Proofs. A record shall be kept of the number and disposition of
proofs. Galley or page proofs approved by the customer shall be retained until
the product is delivered, and shall be returned to the customer along with the
original manuscripts if.
c. Waste Disposal. The contractor shall provide properly identified
waste containers at each production point at which waste, spoilage, trimmings,
or cuttings accumulate. Waste shall include paper stock used for press make-
ready, spoilage during running, printed copies spoiled during bindery
make-ready, or excess copies of individual pages that are not to be assembled
to form a complete product. Waste containers shall be adequately safeguarded
and the waste promptly destroyed, in accordance with paragraph 19f. Waste
shall not be retained in production areas during nonworking hours.
d. Return of Samples. All graphic arts samples (that is, classified
material furnished by the customer for reproduction) shall be returned to the
customer immediately after the completion of the work 1/.
80.
1/ Where the classified production has been accomplished on the premises of the
contractor, as opposed to being done by a graphic arts subcontractor, the
disposition of overruns, proofs, samples, and other material, except for
waste used in the production of the job, may be delayed until the completion
or termination of the contract concerned.
168
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
/OWL
e. Bulk Shipment. Graphic arts products that are shipped in bulk in
double containers will be stacked in the inner container face up. A cover
sheet shall be placed on top of the material before sealing the inner container.
The contractor shall maintain a record of the quantity shipped in each con-
tainer, and when copies are serially numbered, the contractor shall number the
inner containers, and the record shall show which serial numbers were packed
in each container. Such records shall be incorporated into the control station
records maintained in accordance with paragraph 12. The classification mark-
ings and, if appropriate, the notations prescribed in paragraph 11b(8), shall
be applied on all outside surfaces of the inner container. Outer containers
shall be sealed by wire stapling or by tape, so that tampering will be
evident. No markings shall be made on the outer containers, which will in any
way indicate that the package contains classified material. Address labels
will be placed on the top surface of both containers, and receipts will be
placed inside the inner container.
f. Materials Used in Production.
(1) All materials used in production, which contain classified
information (that is, negative flats, layouts, masters, dummies, vellums,
stencils, composition tapes, proofs, tympan sheets, negatives, type, plates,
and so on), shall be safeguarded, in accordance with paragraphs 14 and 16, and
immediately after completion of the work, destroyed in accordance with para-
graph 81, or returned to the customer along with the job on which they were
used 1/ (see paragraph 12f for accountability requirements).
(2) Rubber blankets, after use in a classified production, may be
reused on classified and unclassified production, provided they are properly
washed and safeguarded, in accordance with paragraph 16. The rubber blankets
shall be identified as required in paragraph Ilc and the classification shall
at all times reflect the highest category of classified information for which
the rubber blanket has been used (see paragraph 12f for accountability require-
ments). When no longer serviceable, or reuse is not desired, rubber blankets
used for classified productions shall be destroyed as prescribed in paragraph
19c.
(3) Plates and other than rubber blankets used on a classified pro-
duction shall not be reused, and shall be destroyed as prescribed in paragraph
81. A contractor is not authorized to turn over classified plates to a
subcontractor for the sole purpose of regraining such plates. Moreover, the
regraining of plates shall not be considered as an authorized method of
destruction under paragraph 81.
(4) "Rollers" and other parts of presses, which retain impressions
of classified information during the printing stages, shall be cleaned to
remove the classified information on completion of the run.
81. Destruction -- Special Requirements. Classified7material used in the
reproduction process shall be destroyed, in accordance with paragraph 19c,
except that:
a. classified information on metal foundry and wooden type shall be
considered as having been destroyed whenthe-type is redistributed in the type
case; and
169
81.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II I jlliIl I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
b. classified information on glass negatives shall be destroyed by
dissolving the emulsion or by pulverizing.
82. Mailing Lists.
a. Classified. When a mailing list used for the distribution of unclas-
sified material is classified, the material shall be protected as though clas-
sified (markings not required), until separated from the classified mailing
list during the production process or at the point of mailing or shipping.
b. Unclassified. When a mailing list used for the distribution of
classified material is unclassified, the list shall be protected as though
classified (markings not required), until separated from the classified
material during the production process or at the point of mailing or shipping.
c. Related Material. When classified mailing lists are prepared or
maintained by a contractor, all material which retains an impression of the
addresses, such as carbons, addressing plates, identification strips, and
verification lists, shall be classified and safeguarded accordingly.
82. 170
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
MUM J.ILLV.A.Ln
?????? ? %a.
Section XI. NATO INFORMATION
83. Application. This section of the manual provides for the additional
security measures that have been established for the safeguarding of NATO
classified information. The provisions contained in this section supplement
the provisions of sections I through X of this manual. These additional
security measures apply whether the NATO classified information is in the
possession of the prime contractor or in the possession of his or her sub-
contractor(s). The provisions of this section do not apply to U.S. documents
which contain NATO information (see paragraphs 11b(8)f and lle(2)).
84. Authority. The requirements of this section reflect the security
procedures established by the U.S. Security Authority for NATO for the
safeguarding of NATO classified information in the possession of U.S.
industry.
85. Supervision and Orientation Requirements.
a. The FSO is responsible for supervising and directing security
measures for safeguarding NATO classified information.
b. The contractor shall maintain a separate record of all employees
located at the facility who have been authorized access to NATO classified
information, in addition to the clearance record required by paragraph 28.
c. The contractor shall notify all employees who will have access to
NATO classified information of the following:
(1) The term "NATO classified information" used in this section
applies to classified information circulated within and by NATO, including
information released by member nations into the NATO security system, as well
as information originated in the organization itself. However, classified
information contributed by a member nation remains the property of the
originating nation, even though it is circulated in a document belonging to
NATO.
(2) The marking "NATO" on a document is used to signify that
the document is the property of NATO. This marking will be applied to all
copies of documents classified SECRET, CONFIDENTIAL, and RESTRICTED that are
circulated within NATO. The marking of "COSMIC" also signifies that the
document is the property of NATO, and is applied exclusively to all copies of
TOP SECRET documents circulated within NATO.
(3) COSMIC TOP SECRET documents, NATO SECRET documents, and NATO
CONFIDENTIAL documents shall be protected according to the rules in other
sections for TOP SECRET, SECRET, and CONFIDENTIAL material and the additional
rtles prescribed in this section. NATO documents marked "RESMICTtb," which
are furnished to the contractor, shall be marked and protected as prescribed
in paragraph lie.
171
85.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 11 I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UUM JA.L.V.LL-171.
d. The contractor shall bring to the attention of all employees, who
will be authorized access to NATO classified information, their continuing
individual responsibilities for safeguarding NATO classified information;
further, they shall be advised that when they are in other NATO countries
they may be subject to the laws of those countries that pertain to the
handling of classified information. When access to COSMIC TOP SECRET
information is involved, employees shall sign certificates to the effect
that they have been briefed on their responsibilities for safeguarding
COSMIC TOP SECRET information.
86. Security Clearances.
a. A final PCL granted by DISCO for a U.S. citizen is valid for access
to NATO information of the same or lesser security classification, provided the
individual has been given a security briefing, in accordance with paragraph
85d above. Immigrant aliens or aliens issued reciprocal PCL's are not
authorized access to NATO classified information (see paragraph 20c, 24a(2),
and 31c).
b. All contractor employees who require access to NATO information
classified CONFIDENTIAL or higher shall be cleared by DISCO (see paragraph
24a(1) Cc)).
c. Applications for PCL's for employees who are U.S. citizens and
require access to NATO CONFIDENTIAL information or higher shall be made by
the contractor, in accordance with paragraphs 24, 26, and 27.
d. An interim CONFIDENTIAL or interim SECRET clearance granted by DISCO
is not valid for access to NATO information classified CONFIDENTIAL, or above.
e. Contractor employees who require access to NATO RESTRICTED information
shall be cleared by the contractor, in accordance with paragraph 24b.
87. Reproduction, Preparation, and Marking.
'a. Requirements in paragraph 18 and section X apply equally to the
reproduction of NATO classified documents. In the case of COSMIC TOP SECRET
information, reproduction requests shall be forwarded to the Central U.S.
Registry (CUSR) for authorization. (Address: Chief, CUSR, Room 1B889, The
Pentagon, Washington, D.C. 20310).
b. Except for COSMIC TOP SECRET material, special permission is
not needed to include references to, extracts from, or paraphrases of NATO
classified documents in other documents, which the contractor must prepare
in performance of the NATO contract.
c. Requirements in paragraph 11 apply equally to the marking of NATO
classified documents. A stcarr, CONFIDENTIAL, or RESTRICTED'document that
is reproduced from a NATO document shall be marked NATO at the top and bottom,
in addition to the classification markings. A TOP SECRET document that is
reproduced from a NATO document shall be marked COSMIC at the top and bottom,
in addition to the TOP SECRET marking.
87. 172
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LOU DLL.V.4L"M
d. When NATO classified information is included in other documents, the
NATO classified information shall be identified within the document by marking
each paragraph with the appropriate NATO marking. Moreover, a statement will
be included on the cover or first page, as applicable, that the document contains
NATO classified information.
88. Transmission of NATO Material.
a. When NATO SECRET or CONFIDENTIAL material is prepared for transmis-
sion and an inner container is required by paragraph 17a, that container shall
be marked NATO, in addition to the classification marking. When transmitting
NATO TOP SECRET material the inner container shall be marked "COSMIC TOP SECRET,"
in addition to the "TOP SECRET."
b. The transmission of NATO classified information within the U.S.
shall be in accordance with the procedures set forth in paragraphs 17b, c,
and d, except that the minimum requirement for mailing NATO CONFIDENTAL
information is U.S. Registered Mail.
c. All NATO classified information furnished to a U.S. contractor in
connection with a U.S. classified contract shall be transmitted to destinations
outside the U.S. only with the authority of the contracting officer. If such
information is to be returned to the U.S., approval of the contracting officer
is not required.
(1) COSMIC TOP SECRET transmitted to or from the U.S. shall be
transmitted to the Chief, CUSR, Room 18889, The Pentagon, Washington, D.C.
20310, by one of the methods authorized by paragraph 17b for forwarding to
the intended destination.
(2) NATO SECRET and NATO CONFIDENTIAL information transmitted to
or from the U.S. shall be transmitted by the contractor via one of the means
authorized in paragraph 17e, with the following exceptions: Canadian postal
channels cannot be used to transmit NATO classified material; information
transmitted to a NATO activity outside the U.S. shall be transmitted to an
appropriate U.S. activity for forwarding to the NATO activity; NATO classified
information coming to the U.S. shall be transmitted through an appropriate
U.S. Government activity to the U.S. contractor.
d. NATO classified information furnished to a U.S. contractor in
connection with a NATO command or agency, or NATO member nation's classified
contract or project, shall be transmitted to destinations outside the U.S.
only with the authority of the contracting officer. Hand-carrying of NATO
RESTRICTED, CONFIDENTIAL, and SECRET material across international borders
may be authorized by the CSO, provided an urgent situation exists, such as
a need exists for personnel to travel on short notice, time does not allow
documents to be sent ahead by approved secure means, and copies cannot be
made available locally at the travelers destination. The contractor shall
notify the CSO of the urgent situation, which necessitates the need to hand-
carry the material, and request the CSO to approve this exception. The CSO
may issue a NATO "Courier Certificate" for the appropriate cleared contractor
employee to hand-carry the NATO material, provided: (i) the employee is to be
173 88.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
DoD 52ZU.LL-M
routed via U.S. flag or other NATO member nation air carrier, (ii) the route
taken to the NATO country destination is not to be over a Designated country,
nor will the aircraft land in a Designated country, and (iii) if travel will
be taken by surface means, it will not be through a non-NATO member nation.
The CSO will affix a proper stamp to the certificate, as well as the
authorizing signature of a designated official of the CSO.
(1) Pre-Travel Procedures. Prior to issuing a NATO "Courier
Certificate," the contractor shall ensure that the following steps are
taken:
(a) All reasonable steps have been taken to make other
arrangements for delivery of the NATO material to its destination; that
is, the existing availability of the information at the destination.
(b) The employee designated to carry the material is cleared
to the level of the classification of the information to be hand-carried.
(c) The employee has been provided the location of secure
storage facilities on the premises of NATO commands or agencies, or a NATO
member nation including U.S. Government installations.
(d) A suitable container, which can be retained in the
employee's possession at all times, will be used to secure the material in
transit.
(e) The package is properly sealed, and an accounting has been
made of the contents.
(f) The details of itinerary with a specimen of the seal used
will be completed by the government.
(g) The employee has been properly briefed by the U.S. Government
on his or her responsibilities, as well as on emergency safeguard procedures and
has read and signed the NATO "Briefing Certificate." The briefing certificate
shall be retained for 1 year.
(2) Packaging. Each package to be hand-carried shall contain
only NATO classified material through NATO SECRET. The FSO or designee
shall personally inspect each proposed shipment to verify its contents.
The material shall be packaged, as provided for in paragraph 17, and shall
bear an appropriate seal on the exterior of the package. The seal shall also
be affixed to the details of itinerary column adjacent to each stage of the
trip listed on the itinerary sheet. The seal will be placed under the line
"Specimen of Seal Used." The name and address on the package must be that
of the sender and addressee, if different from that of the employee hand-
carrying the material.
(3) Seals. The contractor will have a NATO, U.S. Government, or
company seal affixed by a representative of the CSO or other authorized U.S.
Government official approved by the CSO.
88. 174
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
(4) Custody. In the event it is necessary to store the package,
as provided for in 1.c. above, a receipt shall be obtained for the material.
On arrival at the destination and delivery of the package, a receipt shall
also be obtained. It will be the responsibility of the recipient to sign
the receipt for the contents of the package. The receipt for the contents
of the package may be returned to the sender by mail or turned over to the
contractor employee who hand-carried the package.
(5) Customs Search. If a official insists that the package be
opened regardless of the NATO "Courier Certificate" and the employee's claim
to exemption, the employee should open the package, but only to the extent
that the customs official can confirm that NATO classified documents are
contained therein. The employee shall request that the customs official both
reseal the package in his or her presence and provide written evidence of the
incident. The courier shall make a full report of the incident to the FSO on
returning to the facility.
(6) Return Travel. Should the employee be authorized to carry
the same documents on the return journey, the NATO "Courier Certificate"
shall so state and an accounting shall be made by the contractor on the
employee's return. In the event a NATO command or agency, or a NATO member
nation or one of its contractors, wishes to have the employee hand-carry
NATO classified material back to the U.S., the employee will follow the
procedures established by the requesting NATO command, agency, government
activity, or contractor. Procedures for hand-carrying NATO classified
material across international borders are similar, since they are based on
requirements established for all member nations by NATO.
e. All NATO classified bulky material, of any category, shall be
sent through channels established by the CSO on instructions from the
Deputy Director (Industrial Security), HQ DIS.
89. Functions of the Contracting Officer.
a. When a U.S. contractor enters into precontract negotiations
involving NATO classified information with a U.S. contracting officer, the
contractor shall obtain his/her instructions from the contracting officer
concerned, as prescribed in this manual.
b. When a U.S. contractor enters into precontract negotiations with a
NATO government other than the U.S., a contractor of such NATO country, or a
NATO international body requiring that the contractor have possession and
access to NATO classified information in the U.S., the U.S. contractor shall
request the necessary instructions from the contracting officer of such NATO
country or international body.
90. NATO Reporting Requirements. The contractor shall immediately report,
through the CS() to the Chief CUSR, Room 1B889, The Pentagon, Washington, D.C.
20310, receipt of COSMIC TOP SECRET information from a source outside the
U.S., when the information has not been transmitted via the CUSR. A copy of
the report shall be sent to the Deputy Director (Industrial Security), HQ DIS.
The contractor shall report to the CSO receipt of NATO SECRET or CONFIDENTIAL
175
90.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 .
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
information from any source other than through a U.S. Government activity,
unless the information is received in connection with approved visits (for
example, attendance at a bidders' conference).
91. Subcontracting. Prior to negotiating a NATO classified subcontract in
the U.S. or in another NATO country, a U.S. prime contractor shall obtain
permission to negotiate such a subcontract from the contracting officer who
let the prime contract or his or her designated representative.
9 I . 176
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VOL 7LLV.LLM
Section XII. OVERSEAS OPERATIONS
Part 1. ACCESS TO U.S. CLASSIFIED INFORMATION
92. General.
a. This part sets forth access, safeguarding, and notification
requirements for cleared U.S. citizen employees of U.S. contractors
assigned to duty stations outside the U.S. These requirements also
apply to U.S. citizens who, in addition to being cleared as employees
of cleared U.S. contractors, are also dual-status employees of foreign
subsidiaries, which are wholly owned and controlled by cleared U.S.
facilities.
b. This part does not apply to:
(1) uncleared employees of cleared U.S. contractors who are
stationed outside the U.S.;
(2) U.S. citizens who are RFI's or employees of foreign
subsidiaries of cleared U.S. facilities, but do not hold dual-status
employment with the owning or controlling U.S. facility; and
(3) representatives (not employees) of cleared U.S. contractors.
c. Cleared employees of U.S. contractors stationed overseas are
encouraged to attend periodically scheduled security briefings conducted
by the OISI. These briefings are designed to familiarize the employees
with the international aspects of the DoD Industrial Security Program and
the security requirements unique to the foreign countries in which the
contractor does business.
93. Access to Classified Information. Contractors are authorized to grant
access to U.S. classified information to their cleared employees who are
assigned overseas, subject to the following rules:
a. Access to U.S. classified information identified in this paragraph
shall be granted only with the prior written approval of the UA having primary
interest if the information concerned is:
(1) TOP SECRET information,
(2) RESTRICTED DATA or FORMERLY RESTRICTED DATA,
(3) COMSEC and SENSITIVE COMPARTMENTED INFORMATION (see paragraph
6, CSISM and section IX, ISM,
(4) special access programs information (see paragraph 50, and
(5) information for which foreign dissemination has been prohibited
in whole or in part.
177 93.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V ....L._ ?IL I L L I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
uvu
b. Access shall be limited strictly to that information required by the
employee for performance of the specific duties or contracts for which he or
she is assigned overseas. Further, access to U.S. classified information
under this section shall be made, to the maximum extent practical, on an
oral or visual basis. When physical access is to be granted to an employee,
the appropriate safeguarding provisions set forth in paragraph 94 shall be
strictly complied with.
c. Access to U.S. classified information for cleared employees assigned
overseas may be granted both in the U.S. and overseas.
d. Access to U.S. classified information granted to a cleared employee
of a cleared U.S. facility, who is also an employee of a U.S. wholly owned and
controlled foreign subsidiary of such a facility, is granted only in his or
her capacity as an employee of the cleared U.S. facility. The contractor
granting the access is responsible for ensuring that the employee provides
adequate safeguards for any classified information disclosed to such employee.
In addition, the contractor shall take action, as appropriate, to ensure that
U.S. classified information entrusted to the employee is not further released
or made available to other employees of the foreign subsidiary.
94. Safeguarding U.S. Classified Information. The following additional
safeguards are prescribed in connection with U.S. contractors' overseas
operations:
a. Security Classification Guidance. The contractor shall provide
security classification guidance, commensurate with the actual performance
requirements, to employees performing outside of the U.S. on a classified
contract, project, or mission. This guidance may be a DD Form 254, extracts
from a DD Form 254, a classification guide, or other guidance as appropriate.
If classified documents themselves will provide the necessary guidance, no
further guidance is necessary.
b. Transmission. Transmission of classified material to a cleared con-
tractor employee located outside the U.S. shall be strictly in accordance with
paragraph 17e. The material shall be addressed to a U.S. military activity
or other U.S. Government activity, and shall be marked for the attention of
the contractor or the employee for wham it is intended. The U.S Government
activity will notify the contractor or contractor employee of the receipt
of the material. Classified material will be transmitted only through U.S.
Government channels. Normally, transmission will be by Registered Mail
through the U.S. Military Postal Service, or by the AMOS. However, the
contracting officer may authorize any of the other approved methods of
transmission described in paragraph 17e. If disclosure authorization is
required and has been obtained, it should be cited in the transmission
document with the effective dates and any other limitations. The contractor
shall make prior arrangements for the storage of U.S. classified material with
a U.S. military installation, the OISI, a military attache, a MAAG, an ODC, or
a U.S. diplomatic or consular officer prior to transmitting U.S. classified
material overseas.
94. 178
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. Custody and Storage.
(1) Personnel authorized access to U.S. classified material
overseas will normally be permitted such access at a U.S. Government activity
only. The storage of U.S. classified material overseas at any location other
than a U.S. military installation or U.S. Government controlled installation
is prohibited.
(2) If in the performance of a contract, project, or mission it is
necessary for a contractor employee to physically require temporary custody of
U.S. classified material, authorization for removal shall be obtained from the
U.S. Government activity. When such custody is authorized, the employee is
responsible for personal possession and surveillance of the material at all
times. Immediately following the purpose for which the material was needed
and the removal was authorized, but in all cases prior to the end of the
workday, the material is to be returned to the U.S. Government activity for
storage purposes. Movement of the material while in the employee's custody
shall be governed by the provisions of paragraph 17h.
d. Disclosure. Except as provided for in paragraph 48, contractor
personnel are not authorized to disclose classified information to any
foreign government, commercial activity, or entity, or to an international
pact organization or its representatives. Cleared contractor personnel
overseas may, however, disclose classified information:
(1) to another cleared employee within their company who has been
granted an LOC at the required level and who has a need-to-know for access to
the information concerned;
(2) to any appropriately cleared military or civilian member of a
U.S. UA who has a valid need-to-know; and
(3) outside the contractor's organization within the U.S. only in
accordance with this manual, and outside the U.S. only in accordance with
instructions from the contracting office of the UA.
95. Overseas Assistance.
a. The DoD has established the OISI to provide administrative assistance
for industrial security purposes to U.S. industry in their marketing, liaison,
and technical assistance activities outside the U.S. The OISI operates under
the supervision and direction of the Deputy Director (Industrial Security), HQ
DIS. The OISI acts as a central file for information pertaining to security
clearances and security assurances for U.S. contractor employees located
outside the U.S. Such information from the file is available for official use
by agencies and activities of the U.S. Government, foreign government, NATO,
and U.S. contractors. OISI conducts inspections of contractor operations on
U.S. installations outside the U.S., when authorized by the Deputy Director
(Industrial Security), HQ DIS.
179 95.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-41
b. The OISI assists U.S. industry by: (i) arranging classified visits
for U.S. contractor employees; (ii) providing storage for classified material;
(iii) providing mail channels for transmission of classified material between
a contractor in the U.S. and an approved destination outside the U.S., when
specifically authorized by the Deputy Director (Industrial Security), HQ DIS;
(iv) providing security briefings and security certificates, as appropriate;
and (v) providing assistance on security matters, such as visits to military
activities or contractors outside the U.S.
c. The civilian street address of OISI is: Office of Industrial
Security, International, Steenweg Op Leuven 13, 1940 St. Stevens-Woluwe,
Brussels, Belgium; the telephone number is 0-322-720-8259. The APO address
is: OISI, APO New York 09667. U.S. Government cable address is: OISI,
BRUSSELS, BELGIUM; other cables: OISI, American Embassy, Brussels, Belgium.
TELEX address is OISI: American Embassy, 21336 Brussels, Belgium. (See page
285 for address of Mannheim, West Germany Field Office, and Yokohama, Japan,
Office of Industrial Security, International - Far East.)
96. Notification of Overseas Assignment.
a. Whenever a contractor assigns a cleared employee to an overseas
duty station, the contractor shall furnish the following information to
DISCO on DISCO Form 562:
(1) Full name, social security number, date and place of birth,
passport or ID number;
(2) Name and address of the overseas duty station to which the
employee has, or will, be assigned;
(3) Notice that the briefing required by paragraph 97 has been
accomplished;
(4) The highest level of access to classified information
required overseas; and
(5) A detailed justification as to why the employee will
require access to classified information overseas in performance of his
or her assigned duties, to include identification of the contract or
program under which such access is necessary.
b. Subsequent to the overseas assignment of an employee whose PCL
has been properly transferred, the contractor shall:
(1) Rejustify to DISCO the employee's continuing need for a
security clearance 2 years from date of initial assignment and every 2
years thereafter;
(2) Advise DISCO of any change in the overseas mailing address
or physical address of the affected employee; and
(3) Advise DISCO of the termination of the employee's overseas
assignment.
96. 180
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. Residence or assignment of cleared immigrant aliens outside the
U.S. for a period of 90 consecutive days or more in any 12-month period
negates the basis on which the LOC was issued, and the LOC will be adminis-
tratively terminated without prejudice by DISCO on receipt of the contractor
notification as outlined in paragraph 6b(6).
97. Security Briefings and Certificates.
a. Cleared employees who are to be assigned to duty stations outside
the U.S. are to be briefed on the security aspects of their new positions.
These briefings are the responsibility of the contractor. If access to NATO
classified information is or may be involved, the briefing shall also cover
NATO security requirements as described in section XI.
b. Each cleared employee assigned overseas shall execute and have
witnessed a certificate attesting to the following:
(1) The employee has received a security briefing and understands
his or her responsibilities.
(2) The employee will safeguard classified information, in accord-
ance with prescribed security standards.
(3) The classified information to which he or she has been
granted access will be used only for the purpose for which released.
(4) The employee understands and accepts the fact that his or
her LOC may be suspended or revoked for violation of security regulations or
improper use of classified information.
(5) The employee understands that he or she may be subject to
action under the espionage statutes of the U.S., with respeet to the
classified information to which access is granted.
(6) The employee also understands that on termination of the
purpose for which he or she has been granted access, the employee's
responsibilities for safeguarding the classified information continue unabated
until the security classification is removed by appropriate government
authority. The executed and witnessed briefing certificate shall be retained
by the contractor for the duration of the overseas assignment.
c. Subsequent to the initial security briefing, each individual shall be
given an annual refresher briefing. A certificate similar to that described
above shall be executed annually and maintained as long as the individual is
assigned overseas. The certificate shall be modified as necessary to reflect
any change in the nature and extent of the classified information to which the
individual requires access, and the scope and nature of the threat to which the
overseas activity may expose the individual.
d. Normally, refresher briefings should be accomplished on the temporary
return of employees to the U.S., or by a security representative of the con-
tractor stationed overseas or on visits overseas. When this is not practical,
181
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
97.
I I I 1 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
the briefing and execution of the certificate may be accomplished by OISI
at the request of the contractor. Outside of areas serviced by OISI,
the contractor may obtain a written briefing statement by mail from the
employee.
e. The contractor shall ensure that a company SPP, or supplement
thereto, is prepared to cover security procedures at the contractor's
overseas locations.
Part 2. ACCESS TO CLASSIFIED INFORMATION OF FOREIGN GOVERNMENTS AND
INTERNATIONAL PACT ORGANIZATIONS UNDER A SECURITY ASSURANCE
98. General. In its relations with friendly and allied foreign governments,
the U.S. has entered into various treaties and agreements whereby each signa-
tory government agrees to safeguard the classified information released to
it by the other government. These range from simple bilateral agreements
providing that each government will safeguard, in accordance with mutually
agreed procedures, the classified information released to it by the other
government, and that the information will not be disclosed to a third country
without the consent of the originating government, to multilateral treaties
establishing international organizations for concerted defense. Such treaties
usually contain either a technical annex establishing the detailed procedures
and standards for safeguarding classified information originated or disseminated
by the organization, or provisions authorizing the organization to establish
mutually agreeable regulations for safeguarding such information.
a. Access to classified information of a foreign government or
international pact organization (for example, NATO) is granted by the
activity possessing the information, and the scope of access is governed by
the regulations of the activity possessing and disclosing the information.
Hence, this part prescribes no specific limitations on the access to classi-
fied information of foreign governments or international pact organizations,
which may be afforded an individual under a security assurance determination.
The responsibility for release of the information rests with the foreign
activity or international pact organization, or with the contractor, if the
information had previously been released to him or her directly by the foreign
government, the prima contractor, or an international pact organization
without going through government channels.
b. A contractor, or contractor employee, granted access to foreign
or international pact organization classified information must take note of
the limitations prescribed relative to the further dissemination of such
information. For example, NATO classified information cannot be stored in
non-NATO countries or released to nationals of non-NATO countries, nor can
NATO classified subcontracts be let to contractors of non-NATO countries.
Foreign countries normally have restrictions on the disclosure and
dissemination of their classified information to nationals of a third
country.
98. 182
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
99. Security Assurance. This paragraph establishes the procedures to assist
U.S. cleared contractors in meeting personnel security requirements imposed by
friendly and allied foreign governments and international pact organizations
with whom the U.S. has entered into either a bilateral or multilateral security
agreement for access by U.S. citizens to foreign classified material, which is
under the control of the foreign government or organization.
a. The contractor may make application for a security assurance by
submitting a written request containing the information required by paragraph
(3) below. On application by the U.S. contractor, DISCO will issue a security
assurance for currently cleared contractor employees. If the employee does
not have a valid LOC, the contractor will submit the following to DISCO:
(1) the forms prescribed in paragraph 26c 1/; or
(2) two copies of DD Form 48-3 1/, if there has been less than a
12-month lapse in a prior employment at which time the employee was granted a
LOC; and
(3) a written request containing the following information:
(a) the title of the position and summary of the duties of the
individual for whom the request is made;
(b) the name and location of the overseas office or activity
to which the individual is assigned or attached for duty;
(c) the employee's passport or ID card number, if available;
(d) a justification 2/ for the request, which identifies the
activity or the subject matter of the proposed visit, sales activity, or
contract that will require a security assurance; and
1/ Under Item 11 of DD Form 48 or 49, or Item 7 of DD Form 48-3, the applicant
shall list both his or her overseas residence and permanent U.S. residence, if
one is maintained. In addition, under Item 12 of DD Form 48-3, the applicant
shall list all previous overseas residences. Under Item 16b of DD Form 48,
Item 16 of DD Form 49, or Item 11 of DD Form 48-3, the applicant shall show
the names and addresses of all firms or foreign government activities with
which the applicant is associated, the relationships and duties in connection
therewith, and the nationality of the controlling interests of the firms
involved.
2/ The need and justification may be stated in general terms. For example: "In
order to participate in the negotiation of contracts with foreign governments
or international pact organizations, it will be necessary for him or her to
have access to classified information of those countries and organizations
(identify countries and/or organizations)," or, "As our overseas electronics
engineer, it will be necessary for him or her to have access to foreign
classified information in order to service equipment sold by our company to
(identify country or countries concerned)."
183 99.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V IL 1 I I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(e) a statement providing the name and address of the foreign
government activity or international pact organization, requesting the U.S.
security assurance and the level of access required. If access to U.S. origi-
nated, and appropriately marked, classified information will be granted to the
employee by the foreign requester, the contractor will execute and maintain
one copy of the briefing certificate prescribed by paragraph 97.
(4) In the case of persons who are employees of foreign subsidiaries,
the application shall be sent through the parent organization or the PMP.
(5) On termination of employment or assignment overseas, the
security assurance determination is void and the contractor shall immediately
notify DISCO of the individual's changed status by means of DISCO Form 562,
and return the individual's security assurance determination to DISCO.
(6) Requests for reinstatement of a security assurance determination
will be processed in the same manner as an original request.
(7) If an individual on whom a security assurance has been given
is subsequently employed by a cleared contractor and requires a U.S. security
clearance, the contractor may make application within 12 months for a security
clearance for the individual under section III by submission of a DD Form 48-3
(see paragraph 26e). If the time lapse is more than 12 months, the forms pre-
scribed by paragraph 26c shall be submitted.
b. Normally, requests for a security assurance determination will
be limited by the foreign government or international pact organization
to CONFIDENTIAL or SECRET access. In exceptional cases, a request for a
TOP SECRET security assurance, received from a foreign government or
international pact organization, will signify that access to TOP SECRET
information is necessary for the consummation of a specific contract,
project, or activity. TOP SECRET security assurance determinations shall
be limited to the specific contract, project, or activity for which they
are granted.
99. 184
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section XIII. SECURITY REQUIREMENTS FOR AUTOMATED INFORMATION SYSTEMS
Part 1. GENERAL
100. Reserved.
101. Applicability.
a. This section establishes special security measures for the
safeguarding of classified information and material processed by or
in automated information systems (AIS) in the custody and control of
contractors, including organizations that provide contractual computing
services to UA's or their contractors. Classified information processed by
or contained in an AIS shall be safeguarded by the employment of collective
security measures, controls and constraints which will provide an acceptable
level of protection.
b. Security measures for AIS's located on UA installations, that are
operated by the contractor, are prescribed by the controlling UA. However,
the Commander or Head of the installation may elect to declare the con-
tractor activity a facility and request the CSO to assume security
cognizance, in which case the provisions of this section will be applicable.
c. Security measures for computers which are embedded as an integral
element of a larger system to perform or control a function, such as in test
stands, simulators, control systems or weapons systems, should be estab-
lished concurrently with the design and development of the system, using the
fundamental security concepts outlined in this section. If the security
requirements for such systems are not provided with the contract, con-
tractors should request them from contracting officers. In the absence
of such requirements from contracting officers, the security requirements
and procedures of this section will be applied to the extent appropriate
to the situation, as determined by the CSO.
d. This section prescribes the requirements for the protection of
information classified in one of the three classification levels, namely:
TOP SECRET, SECRET or CONFIDENTIAL. Special access programs may impose
additional security requirements, or limitations, for specified types of
classified information which are beyond the requirements prescribed herein.
Contractors shall implement special access program requirements when
included in a DD Form 254, or other appropriate contract-related document.
102. Objectives.
a. The collective security measures and controls employed must ensure
that an AIS which handles classified information will, with reasonable
dependability, prevent: (i) unauthorized access to classified information
during, or resulting from, the processing of such information, and (ii)
unauthorized manipulation of the AIS which could result in the compromise
of classified information.
185 102.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
b. To accomplish the foregoing, collective security controls shall,
to the maximum extent possible, provide the following:
(1) Individual Accountability. The identity of each user of the
AIS shall be positively established, with access to the system and to
information contained in the system controlled and open to scrutiny.
(2) Physical Control. The AIS shall be externally protected to
minimize the likelihood of: (i) unauthorized access to system entry points
and to classified information in the system, and (ii) unauthorized
modification of the computer hardware.
(3) System Stability. All elements and components of the AIS
shall function in a cohesive, identifiable, predictable and reliable
manner such that malfunctions can be detected and reported so as to
maximize security control.
(4) Data Continuity. Each file or collection of classified
information in the AIS shall have an identifiable origin and use. Access,
to maintenance, movement and disposition of classified information shall be
governed on the basis of security classification, PCL and need-to-know.
(5) Least Privilege. The AIS shall function so as to provide
each user access to all of the information to which entitled, but no more.
(6) Communications Security. Communications lines and links
shall be secured in a manner appropriate for the classified information
being transmitted through the lines and links.
(7) Classified Information Control. Classified information
handled and produced by the AIS, and stored in or on recording media,
shall be safeguarded as appropriate for the classification level of the
information.
Part 2. REQUIREMENTS
103. General.
a. AIS security shall consist of the employment of appropriate
administrative, procedural, physical, personnel and communications security
measures and controls, along with protective features in the system's
hardware and software. The procedures and methods necessary to safe-
guard classified information depend on the nature of the AIS, the uses
to which it is put, and the mode of operation as set forth in paragraph
104. It is the contractor's responsibility to safeguard all classified
information processed by or contained in an AIS and ensure that approved
security controls are in place and are effective.
b. Approval, in writing, of the CSO is required prior to processing
any classified information in an AIS. To obtain approval, the contractor
103. 186
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
shall prepare an SPP describing the AIS and the security controls
implemented for that AIS in accordance with paragraph 112d. The SPP
will provide the basis from which the CSO will approve and inspect the
AIS for the proper safeguarding of classified information. If changes are
made to the AIS subsequent to approval, or to approved security measures
and controls, reapproval by the CSO May be required prior to processing
classified information. Reapprovals are required because of: (i) major
changes in personnel access requirements, (ii) relocation or structural
modification of the computer facility or remote terminal areas, (iii)
additions, deletions or changes to computer hardware that impact approved
security controls, (iv) software changes that impact security protection
features, and (v) changes in clearance, declassification, audit trail or
hardware/software maintenance procedures.
c. The contractor shall appoint an employee as the system security
officer (SSO) for each facility with an AIS approved for the processing of
classified information. The SSO, where different from the FSO, shall be
responsible to the FSO for implementation of procedures and practices
prescribed for the safeguarding and control of the AIS and for the
processing of classified information. Where there are multiple AIS's in
a facility, or multiple shifts of classified operation, and the contractor?
deems that the SSO cannot effectively discharge that responsibility, then
one or more system security custodians, working under the guidance of the
SSO, may be designated to accomplish security responsibilities for the
separate systems or different shifts.
d. The establishment and maintenance of hardware and software
integrity is essential to ensuring continued safeguarding of classified
information in an approved AIS. Integrity of the hardware is attained
through the provisions of paragraph 106. All software and data used
during classified processing periods must be safeguarded and handled
as prescribed in paragraph 108.1.
104. AIS Security Modes of Operation.
a. System security modes are authorized variations in security
environments and methods of operating AIS's that handle classified
information. The modes are primarily defined by the manner in which
basic access requirements for user PCL and need-to-know are implemented
for the AIS. The modes involve a varying mix of automated (that is,
hardware/software) and conventional (that is, personnel, physical,
administrative, procedural and, where appropriate, communications)
security measures and techniques in discharging these basic access
requirements. In all modes, the total integrated set of automated and
conventional security measures applied to the AIS shall be based on the
objectives set forth in paragraph 102. A contractor may accordingly
process, store; use and produce classified information in an AIS that is
operating in one of the following modes:
b. Dedicated Security Mode -- All users with access to the AIS must
have both a PCL and the need-to-know for all information then contained in
the system.
187 104.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II V
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) The objectives of paragraph 102, are normally fulfilled by
the collective security controls established for: (i) the computer
facility, (ii) all peripheral devices and input/output terminals, (iii)
areas containing remote devices and terminals connected to the system,
and (iv) the interconnecting communication lines and links.
(2) These controls shall conform to those required for the
protection of the highest classification level and most restrictive type
of information then contained in the system.
c. System High Security Mode -- All users with access to the AIS
must have a PCL, but not necessarily the need-to-know, for all information
then contained in the system.
(1) The objectives of paragraph 102, are normally fulfilled
by application of the controls enumerated in paragraph b(1) above. The
process of identifying, separating and controlling users and classified
material on the basis of PCL and need-to-know, and classification level,
respectively, shall be provided by operationally acceptable controls that
include passwords, add-on software packages and identification devices
such as fingerprint, hand or retinal scanners, and voice or signature
comparison devices. A trusted computer system listed on the EPL 1/ with
an evaluation rating of at least C2 is considered to provide an acceptable
level of control for this mode of operation.
(2) Controls shall conform to those required for the protection
of the highest classification level and most restrictive type of information
then being handled by the system.
d. Multilevel Security Mode -- Some users with access to the AIS
do not have a PCL for all classified information then contained in the
system. This mode of operation provides a limited capability for con-
current processing by users with different PCL's and need-to-know in a
system that may contain more than one level of -classified information.
Concurrent access to the AIS is restricted to users with two adjacent
PCL levels, that is, CONFIDENTIAL and SECRET, or SECRET and TOP SECRET.
(1) The objectives of paragraph 102 are normally fulfilled by
application of the controls enumerated in paragraphs b(1) and c(1) above,
104
1/ The EPL (Evaluated Products List for Trusted Computer Systems) is
published in conjunction with the National Computer Security Center's
commercial product evaluation program - in which commercially available
systems are formally evaluated against the DoD Trusted Computer System
Evaluation Criteria (DoD 5200.28-STD) and assigned an overall class
rating based on the system's ability to meet the requirements of the
Criteria. The EPL and DoD 5200.28-STD are available at the CSO and
from the DoD Computer Security Center, 9800 Savage Road, Fort George G.
Meade, Maryland 20755.
188 ?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
with the exception that for this mode of operation, a trusted computer
system listed on the EPL 1/ must have an evaluation rating of at least 81
if the system contains SECRET information; and at least B2 if the system
contains TOP SECRET information. In addition, the multilevel security
mode requires fulfillment of the requirements of paragraph 104.1 for the
concurrent processing of multiple levels of classified information.
(2) Controls for the computer facility shall conform to those
required for the highest classification level and most restrictive type of
information then being handled by the system. Controls for remote terminal
areas shall conform to those required for the highest classification level
and most restrictive type of information accessed through the terminal
under system constraints, including unclassified.
(3) A request for approval to operate an AIS in multilevel
security mode shall clearly explain why this mode of operation is required
at the contractor facility. The SPP describing the AIS and its security
measures should be as complete as possible and specifically enumerate the
augmenting measures that remove or substantially reduce system software
and/or hardware vulnerabilities and associated risks. Methods and techni-
ques that may be used to augment or enhance the AIS security include:
(a) the employment of hardware, software and/or firmware,
alterable only at the computer facility, for critical AIS security func-
tions such as identification and authentication of individual users,
separation of users and data, data labeling, identification and segrega-
tion of output and labeling of all human-readable output;
(b) the employment of system architectures, stringent
configuration management controls, and facility management procedures that
assure: (i) separation of files and processes, (ii) access limitations to
physical devices, and (iii) trusted recovery in the event of system failure
or malfunction;
(c) audit trails of identification/authentication events,
individual user actions, accesses to data, and other security-relevant
events that signal potential violations of security policy;
(d) interconnection of remote terminals via one-way
information communication links, wherein substantive information can be
transmitted only in one direction. (Circuits that require two-way
communication for specific control functions in order to properly receive
substantive information may be considered one-way circuits when it is
determined that only control information can be transmitted in both
directions);
(e) assignment of terminal security officers in remote
terminal areas that are not protected for the highest classification level
of information then being handled by the AIS, wherein the terminal security
officer has a PCL for that highest classification level;
(f) system splitting via hardware/software that is alterable
only at the computer facility; and
189 O4.1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(g) limitations on user capabilities, such as restriction to
fixed-query access only, and prohibition of assembler and machine language
programming.
104.1. Concurrent Processing of Multiple Classification Levels. The
concurrent processing and storage of more than one level of classified
information, together with unclassified information, is authorized in any
of the foregoing system security modes. All information output from, or
stored in, the AIS must be handled as the highest classification level of
information being processed until reviewed, correctly identified and
segregated by properly cleared and responsible personnel. The process of
identifying, segregating and marking the different levels of information
may be by automated means provided that: (i) the AIS is a trusted computer
system listed on the EPL 1/ with an evaluation rating of at least 31, or
(ii) the following minimum conditions are met:
a. The contractor and the CSO have determined that the design and
operation of the AIS will, with reasonable dependability, automatically
provide for consistent and correct identification and segregation of: (i)
information of different security classification levels, (ii) certain
additionally restrictive types of classified information, when such
concurrent processing is authorized by special access program directives,
and (iii) unclassified information.
b. Measures have been implemented to monitor the AIS for malfunc-
tions and occurrences that may adversely affect the dependability of such
automated identification and segregation.
c. Procedures have been instituted which will, in the event of
such malfunction or occurrence, control all system output as the highest
classification level and most restrictive type of information in the
system, pending a determination of actual classification levels. These
procedures shall remain in effect until the cause of the malfunction is
determined and corrected.
d. All users of the system have been advised that this automated
identification and segregation option has been implemented and instructed
to return to the SSO any system output that is either incorrectly labeled
as to classification level or was not requested by that user. A determina-
tion shall be made of the cause of the incorrect system action. A record
of each instance, and the corrective action taken, shall be maintained for
at least one Government inspection cycle.
105. Personnel Security.
a. As provided below, access to an AIS processing classified
information shall be limited to authorized persons who have a PCL and
need-to-know for the highest classification level and most restrictive
type of information they will access under system constraints.
b. System Users. Users are authorized persons with the ability and
means to approach, communicate with (input to or receive output from) or
otherwise make use of any information or component in the AIS. Personnel
105.
190
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
who code, test or maintain application programs used to produce a service
or product are considered to be users. Those authorized persons who make
use of application programs via over-the-counter or remote means, and who
have the ability and means to create, destroy, change or retrieve data or
program instructions in the system, are also considered to be users. All
users shall have a PCL and need-to-know as required for the security mode
of operation (paragraph 104). The following personnel are not considered
to be users:
(1) Personnel who only receive computer output products from
the AIS and do not input to or otherwise interact with the system (that is,
no "hands on" or other direct input or inquiry capability) are not consi-
dered to be users. Accordingly, they are not subject to the PCL require-
ments of this section. Such output products, however, shall either be
reviewed by appropriately cleared and responsible personnel prior to
dissemination, or otherwise determined to be properly identified and
segregated as to content and classification, as prescribed in paragraph
104.1.
(2) Personnel who produce application programs and changes
thereto, or prepare data that may be input to the AIS during classified
processing periods, may be excepted from PCL requirements provided they do
not receive unreviewed output products from the AIS, or otherwise directly
interact with the AIS during classified processing. Such software or data
must be introduced into the system as prescribed in paragraphs 108.1c(4)
and d, respectively.
c. System Support Personnel. Personnel who administer and operate
the AIS are considered to be system support personnel. They shall have a
PCL for the highest classification level and most restrictive type of
information contained in the system or its areas at the time of their
access. This category includes all persons in the immediate vicinity of
the system attending to the operation, control and functioning of the
system, as well as those persons who design, program, modify, test or
install system software used during classified processing periods.
Access to specific classified material shall be governed by need-to-know
in relation to individual duties and responsibilities.
d. Maintenance Personnel. All persons involved in hardware
maintenance or repairs requiring entry to the computer facility, or access
to any parts or components of the AIS, where: (i) the complexity of the
AIS, (ii) the nature of maintenance/repairs to be performed, (iii) the
frequency of visits, (iv) the amount and classification level of informa-
tion processed, or (v) the availability of knowledgeable escorts makes
escorting impractical, shall have a PCL at least to the classification
level for which the AIS is approved to process. Maintenance personnel who
do not have the appropriate clearance must be accompanied by an escort duly
designated by the SSO. Escorts must be cleared at least to the classifi-
cation level of the system approval, and take all reasonable measures to
control the activities of the individual being escorted so that the
integrity of the AIS is maintained.
. e. Visitors. Persons visiting the area on a one-time or infrequent
basis, and who will not have access to classified information or to the
system hardware or software, may be admitted to the area when accompanied
by a duly designated escort who will control visitor access and be
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
boD 5220.22-M
responsible for visitor activities while in the area. For other persons
requiring entry into the computer facility or remote terminal areas who
will have access to classified information or to the computer hardware or
software, the visitor control procedures of the ISM are applicable.
f. Security Training and Awareness. In furtherance of the require-
ments of paragraph 5f, ISM, it is the responsibility of the SSO to
indoctrinate all system users and support personnel in: (i) the need for
sound security practices in protecting information handled by the AIS,
including all output products, (ii) the specific security requirements
associated with the AIS in terms of system security mode of operation and
user access requirements, (iii) the security reporting procedures in the
event of system malfunctions or security incidents, and (iv) what consti-
tutes unauthorized actions with regard to system utilization. System
users shall be indoctrinated prior to being granted system access, and
reindoctrinated on a recurring basis. System support personnel shall
also be indoctrinated in appropriate operational security procedures
for the particular AIS and facility before they assume their duties.
Additional briefidg specifics for AIS's approved to concurrently process
multiple levels of classified information are identified in paragraph 104.1.
106. Physical Security.
a. Physical security safeguards and access controls must be
established and continuously maintained for AIS's approved for the
processing of classified information.
b. When the AIS is used for classified processing, physical security
safeguards and access controls for the computer facility, areas housing
remote terminals connected to the system, and the communications lines and
links shall conform to those required for the highest classification level
and most restrictive type of information being processed.
(1) Where two or more AIS's are located in the same area, and
the equipment comprising each AIS is located and controlled so that direct
physical access is effectively limited to that system, the area limited to
each system may be considered that system's "computer facility." The
measures and techniques for so "isolating" that system shall be reflected
in the SPP.
(2) Remote terminals not used during classified processing
periods shall be disconnected at the computer facility by: (i) physically
disconnecting the device, (ii) use of channel or transmission line hard-
ware switches, or (iii) use of software disconnect routines. Software
disconnect routines may be used only for AIS's which handle information
classified no higher than SECRET. Such routines must be documented to
clearly indicate physical actions and logic processes used, and be verified
in writing by the contractor at least every 90 days to ensure continued
effectiveness. These provisions are not applicable to specifically
designated remote terminals connected to systems approved to operate in
the multilevel security mode (paragraph 104d(3)(d)).
106. 192
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
c. When the AIS is used to process classified information unattended,
or when classified information is left in the system or elsewhere unsecured
within the computer facility or remote terminal areas, closed areas in full
compliance with paragraph 34, ISM, must be established.
d. During unclassified processing periods, controls must be main-
tained to prevent unauthorized modification of the computer hardware.
Continuous physical protection can be attained through one or a
combination of the provisions of paragraphs e(1)-(4) below.
e. When the AIS is not in use, and all classified information has
been removed from the system and properly secured, continuous physical
protection to prevent or detect unauthorized modification of the computer
hardware can be attained through one or a combination of the following:
(1) Closed areas, in full compliance with paragraph 34, ISM,
may be established for the computer facility and remote terminal areas.
Supplemental controls (that is, patrol or alarm systems) are not required
for closed areas used solely for the physical protection of computer
hardware.
(2) Computer hardware and associated media may be stored in
approved cabinets, strongrooms and vaults in accordance with paragraph 14,
ISM. Supplemental controls are not required for approved containers used
solely for the physical protection of computer hardware.
(3) Continuous supervision may be maintained by cleared and
specifically designated personnel who are in a physical position to exer-
cise direct security controls over the AIS (for example, guard station or
closed circuit TV monitor). Use of supplemental or supplanting alarm
systems is authorized in accordance with the provisions of paragraph 35,
ISM.
(4) This last alternative is not authorized for the protection
of AIS's approved to process TOP SECRET information. Protected areas can
be established and maintained for the computer facility and areas housing
remote terminals. A protected area is continuously protected by a collec-
tive level of physical security safeguards and personnel access controls
keyed to the prevention or detection of unauthorized modification of the
computer hardware. The specific security measures established by the
contractor will vary depending on: (i) the overall physical security
controls already in effect at the facility, (ii) the environment in which
the AIS is employed, the relative potential for unauthorized access, and
the effectiveness of safeguards in reducing the risks of identified
threats, (iii) the classification level and volume of the information to
be processed, and (iv) the consistency, reliability, and auditability of
the safeguards to be employed. Appropriate physical safeguards may
include: (i) locks on doors to buildings and rooms which provide
reasonable protection against surreptitious entry into the area, (ii)
authorized guards or employees stationed so as to control entry into the
immediate area housing the computer hardware, (iii) alarm systems, and
(iv) the use of equipment covers, enclosures, seals or locks to prevent
or detect unauthorized access to the inside of the equipment. When
surreptitious entry and/or modification of system hardware is suspected,
193 106.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I i LI I1 1?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
a thorough inspection of the protected area and equipment must be conducted
by the SSO (or designee) prior to classified processing. Such incidents
must be recorded in the audit trail system.
107. Reserved.
108. Reserved.
108.1. Protection of Software and Data.
a. System Software. When system software used during classified
processing periods is not in the system, it must be safeguarded commen-
surate with the requirements for the highest level of classified informa-
tion processed. System software may be retained in the AIS on nonremovable
storage media when the AIS is not in use, provided that continuous physical
protection of the hardware (and the system software) is maintained as set
forth in paragraph 106e. System software, whether obtained from sources
outside the facility or developed by the contractor, shall be safeguarded
from the earliest feasible time that it is in the custody and control of the
contractor and is identified for use during classified processing periods.
System software and modifications thereto shall be developed by contractor
personnel who meet the PCL requirements of paragraph 105c.
b. Classified Application Software. Application software which in
itself contains classified data or comments, or implements classified
processes or algorithms (as specified in the contract), shall be produced,
marked and protected as any other classified material in compliance with the
provisions of the ISM. These provisions are applicable to both human and
machine readable versions of the software, as well as to supporting and
related documentation. Changes to classified software shall be made only
by appropriately cleared contractor personnel.
c. Unclassified (or Lower Classified) Application Software.
(1) Unclassified application software to be used during class-
ified processing periods: (i) may be produced as an end item for delivery
to the UA, (ii) may be produced for use in a classified end item or weapon
system during performance of the contract, (iii) may be developed inci-
dental to the performance of the contract, (iv) may have been developed
previously by contractor personnel for other purposes or another contract,
or (v) may be obtained from sources outside the facility.
(2) When application software is contractually produced for
delivery as an end item, or for use in a classified end item or weapon
system, the contract should specify whether it is classified or unclassi-
fied. If the security requirements for contractual software are not
provided with the contract, contractors should request them from
contracting officers. In the absence of such requirements from
contracting officers, the requirements and procedures of this section
will be applied as appropriate.
110 1 10A
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(3) Application software that will be used during classified
processing periods shall normally be produced and maintained by appro-
priately cleared personnel (paragraph 105b) under accepted software
configuration management controls that provide reasonable assurance that
the integrity of the software will be maintained throughout its development
and operational life-cycle. Such software must be safeguarded commensurate
with the requirements for the highest level of classified processing with
which it will be used. The primary objective is to prevent unauthorized
access to classified information during, or resulting from, the processing
of such information because of malicious logic introduced into the applica-
tion software. Unauthorized disclosure of classified information can also be
prevented by ensuring that uncleared (or lower cleared) application
programmers do not receive unreviewed output products from classified
processing periods or otherwise interact directly with the system during
classified processing (paragraph 105b(2)). It should be noted that the
prevention of unauthorized destruction or modification of classified
information is not expressly provided for in this section.
(4) It is recognized that application software may have been
produced for other purposes by contractor personnel without the requisite
PCL or obtained from other unprotected sources. Before such software can
be used in classified processing periods, it must be reviewed, approved and
authorized for use by appropriately cleared and knowledgeable contractor
personnel who understand the security implications of the software being
reviewed. The software must then be introduced into the system in a
read-only or write-protected manner during the classified processing period.
This is to prevent possible unauthorized disclosure of classified informa-
tion by precluding the ability to write (intentionally or accidently)
classified information to media associated with the unclassified (or
lower classified) software. The software should be copied to dedicated
and previously protected media for use during subsequent classified
processing periods, or it may be executed during the classified processing
period in which loaded. Subsequent changes to the safeguarded software
must be authorized, made by appropriately cleared personnel, fully tested
and implemented in a controlled manner.
(5) Unclassified application software used during classified
processing periods may be retained in the AIS on nonremovable storage media
when the AIS is not in use, provided that continuous physical protection of
the hardware (and the application software) is maintained as set forth in
paragraph 106e.
d. Data. During classified processing periods, unclassified (or
lower classified) input data shall be introduced into the system in a
read-only or write-protected manner. Unclassified data may be retained in
the AIS on nonremovable storage media when the AIS is not in use provided
that continuous physical protection of the hardware (and the data) is
maintained as set forth in paragraph 106e.
195 108.1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I] V 1 .11 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
e. Media Control. Protection requirements for storage media on
which classified software and data reside will be attained by marking,
recording (that is, an accountability record) and storing the media in
accordance with provisions of the ISM. Safeguarding controls shall be
commensurate with the requirements for the highest classification level of
software or data ever contained thereon, and shall be maintained until the
media are declassified pursuant to paragraph 116. Selective overwriting for
the clearance or declassification of storage media (paragraphs 115c and
116c(6)(b), respectively) is not authorized for AIS' employing unclassified
(or lower classified) application software/data under the provisions of
paragraphs c and d above. In such instances, there is not complete assur-
ance that the areas being overwritten are the only areas of the storage
media where information was recorded during the classified processing
period.
109. Transmission Controls.
a. Transmission and communication lines and links between the
components of an AIS (for example, the computer facility and remote
terminals) may be used to transmit classified information as follows.
b. Inter-Complex. Transmission of classified information between
contractor facility complexes must be over approved CRYPTOGRAPHIC
communication circuits, and only with the prior written approval, and
in accordance with the instructions, of the contracting officer.
c. Intra-Complex. Transmission within a contractor's complex may be
over approved CRYPTOGRAPHIC communication circuits or over wire or fiber
optic circuits. Such circuits shall be protected by an in-depth physical
security system to include the following:
(1) Dedicated Lines. Transmission lines must be dedicated to
the computer and the remote terminals which are approved for the handling
of classified information. Transmission lines shall be separated from,
and not included in, cables that contain other lines not dedicated to the
transmission of classified data, nor be connected to, or go through,
telephone frames, switching equipment or any other telephone equipment.
(2) Line Protection. In the event transmission lines cannot be
contained entirely within areas secured for the highest level of classified
information transmitted, continual protection/surveillance of the lines
shall be accomplished by: (i) alarming the transmission lines and con-
ducting periodic checks of the lines and alarm integrity, (ii) constant
surveillance of the lines by appropriately cleared and designated personnel,
or (iii) a combination of physical protection of the transmission lines in
conjunction with periodic inspections or guard patrols. Specific criteria
for the physical protection, alarming and surveillance of transmission
lines will be provided by the CSO.
110. Subcontracting Controls.
a. A contractor may subcontract to use the approved AIS of another
contractor for the processing of classified material. Approval by the
110. 196
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD LLU.LL-11
CSO(s) will be based on the security measures and procedures described in
the SPP of both the using contractor and the subcontractor providing the
AIS (that is, the lessor).
(1) The lessor is responsible for ensuring that the integrity
of the AIS is maintained at all times in accordance with the provisions of
this section. Audit trail records shall identify classified processing
periods of the using contractor(s) and the level of classified processing.
(2) The using contractor shall maintain adequate administrative,
procedural, physical and personnel security controls during classified
processing periods and assure that residual classified information is not
retained in the AIS when physical control is relinquished back to the
lessor. If a representative of the lessor remains in the computer facility
for equipment maintenance or other purposes during the classified process-
ing period, the lessor is responsible for ensuring that the representative
has the appropriate PCL. All classified information and material belonging
to the using contractor, including processing audit trails, shall be
removed from the lessor's premises at the end of the classified processing
period.
b. A contractor may have a subcontractor process classified material
provided that the subcontractor's AIS has been approved pursuant to this
section. The subcontractor shall maintain audit trails of all classified
processing and ensure that the integrity and separation of classified
material is maintained at all times.
111. Audit Trails.
a. Audit trails provide a chronological record of the use of the AIS
and system support activities related to classified processing. Approved
audit trails will provide detailed records of system activities to facili-
tate reconstruction, review and examination of events surrounding or lead-
ing to possible compromise should a security malfunction occur. The audit
trail system must record significant events occurring in the following
areas of concern: (i) interactivity between users of the system and system
support personnel who operate the system (for example, preparation of input
data and dissemination of output products), (ii) activity within the AIS
environment (for example, modification of operational security-related
controls), and (iii) internal computer activity (for example, user accesses
to the system and classified files).
b. Audit trail records may be manual, automated or a combination of
both, and may be stylized to the particular facility, AIS and security mode
of operation. Systems approved to process classified information should
utilize most, if not all, of the audit trail records and logs listed below.
The contractor's SPP must identify and describe those audit trails that are
applicable to the particular system and mode of operation:
(1) Personnel access to the computer facility and remote terminal
areas.
197 111.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H V 1 LI I 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) Start and stop of classified processing periods.
(3) Initiation and termination of pertinent system security-
related events (for example, upgrading and downgrading actions, discon-
necting and reconnecting remote terminals/devices, and application/
reapplication of seals to equipment/device covers).
(4) Actions to open, close, create and destroy classified files.
(5) System aborts and anomalies during classified processing
periods (to include time of the incident, identification of users, programs
and classified files involved, and corrective actions taken).
(6) Maintenance and repair of computer hardware (to include
adding, changing and removing equipment and devices). Systems and
equipment sent outside the facility for maintenance or repair shall be
declassified in accordance with paragraph 116.
(7) Functions initiated by console operators during classified
processing periods.
(8) Logon and logoff of users during classified processing
periods.
(9) Attempts to access programs or classified files by
unauthorized users.
(10) Generation, modification and implementation of system and
application software used during classified processing periods.
c. The SSO or custodian shall review the audit trail logs at least
weekly to ensure that all pertinent activity is properly recorded and that
appropriate action has been taken to correct any anomalies. Records of the
weekly reviews must be maintained and retained by the reviewer(s).
d. Audit trails in accord with the above may not be applicable to
computers embedded in test stands, simulators, control systems or weapons
systems. Such systems may require individualized consideration by the CSO.
e. Audit trail records shall be retained for at least 6 months and
through one Government inspection cycle.
Part 3. PROCEDURES
112. AIS Security Approval.
a. The approval (or reapproval) of an AIS to process classified
information commences when a formal written request, accompanied by an
SPP describing the AIS and its security measures, is received at the CSO.
The SPP may be an addendum or supplement to the facility SPP. The SPP
submitted by the contractor will be safeguarded and available only to
authorized Government personnel.
112. 198
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOU DLL.U.LL-M
b. System Reapproval. A request for reapproval of an AIS shall be
submitted as required in paragraph 103b. Revisions to the SPP reflecting
changes in the AIS and/or its security measures and controls must accompany
the request.
c. Withdrawal of Approval. If the security measures and controls
established and approved for an AIS do not remain in place and effective,
approval of the AIS can be withdrawn by the CSO. Approval may also be
withdrawn if the AIS has not processed classified data during the previous 9
months, provided no valid requirement exists for the AIS to remain
approved.
d. Standard Practice Procedure. The contractor shall prepare and
maintain an SPP to provide the basis for the CSO to approve and inspect the
AIS. Therefore, the SPP must contain complete and accurate descriptive
information about the AIS, its classified usage, and the security controls
and procedures to be implemented for that AIS. Where similar systems are
located within the contractor's facility, a single SPP covering the repet-
itive features, safeguards and controls of all the systems is permissible.
Addendums to this SPP will be used to identify the location of each AIS, as
well as any nonstandard features or procedures associated with a particular
system. The following specific areas shall be addressed in the SPP.
(1) Identification. Identify the AIS used for classified
processing, its physical location, the AIS security mode of operation,
the level of classified information to be processed, and the SSO and
custodian(s), if any.
(2) Summary of System Usage. Describe the classified use or
purpose of the AIS, indicating local and remote capabilities, hours of
operation, when classified processing will occur, and percentage of
utilization for classified processing. In the case of multiprocessing
systems, indicate the mixture of programs/applications during classified
processing. Also describe storage media and input/output devices used
during classified processing and the highest classification level of
information on, or processed through, each.
(3) Hardware. List and describe all equipment comprising the
AIS, including the size and type of internal memory and other storage media.
Include diagrams, schematics and/or floor plans as appropriate. Describe
disconnect methods and switching devices for disabling equipments not to be
used during classified processing periods.
(4) Software. Identify system software used during classified
processing, how maintained and how safeguarded. Describe security/protec-
tive features available in system software and/or coded into application
programs, how they are used during classified processing, and the means to
ensure that they are functioning effectively. (See paragraph 108.1.)
(5) Teleprocessing. Identify all teleprocessing equipments
and transmission lines employed with the AIS and indicate methods of
disconnecting those not used during classified processing. Describe
199 112.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
teleprocessing configurations and interfaces during classified processing,
general usage of remote devices, protection procedures for transmitted data,
and physical controls to protect transmission lines. (See paragraph 109.)
(6) Personnel. Describe the security responsibilities of per-
sonnel, controls to restrict personnel access to the computer facility and
remote terminal areas during working and non-working hours, security indoc-
trination of personnel, and control of visitors and maintenance personnel.
(See paragraph 105.)
(7) Physical. Describe physical characteristics and safeguards
to control access to the computer facility and remote terminal areas during
working and non-working hours. (See paragraph 106.)
(8) General Access Controls. Describe controls which restrict
access into the AIS and to classified information in the AIS during
classified processing periods (such as passwords, isolation of users,
sign-on/sign-off procedures and terminal identification techniques). For
example, if passwords are used, describe the issuance, length, control and
protection of the passwords, frequency of changing passwords, how passwords
are used and their access privileges, and detection and reporting of
unauthorized access attempts. Passwords should be: (i) at least six
alphanumeric characters, (ii) classified the same as the highest
classification level of information for which the user is authorized to
access in the AIS, and (iii) changed at least every 3 months, on termina-
tion of employment or reassignment of any user possessing knowledge of the
password, or when the password is believed to have been compromised or
subjected to compromise.
(9) Operating Procedures. Describe start-up procedures for
classified processing (such as clearing the area, physical safeguards,
disconnections and loading the system), procedures during classified
processing (such as handling of input/output, audit trails and emergency
procedures), and procedures for shut-down of classified processing (such as
clearing or declassifying storage, removal of classified media, unloading
the system and reconnections).
(10) General Storage, Protection and Control. Describe the
control, handling, marking, storage and accountability of classified
materials such as software, input data, output products and storage media,
and procedures for the clearance, declassification and destruction of
storage media containing classified information.
(11) Audit Trails. List, describe and provide exhibits of all
automatic and manual audit trail records which provide a documented history
of the use of the AIS for classified processing. (See paragraph 111.)
(12) Subcontracting. Identify cleared subcontractor(s) used to
process classified information. Describe the arrangements and procedures
for the classified processing. (See paragraph 110.)
111 7nn
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
VOL 74LU.LL"'n
(13) Emergency Plan. Describe additional procedures not covered
above to be employed in case of security violations, system crashes or other
emergencies during classified processing (such as personnel to notify,
protection of hardware and classified material, and control of uncleared
emergency personnel).
113. AIS Security Level Upgrading.
a. To adjust the AIS to a higher security level for: (i) initiating
a classified processing period after the AIS has not been in use, (ii)
changing from an unclassified to a classified processing period, or (iii)
processing a higher level or more restrictive type of classified informa-
tion, the following procedures shall be implemented.
b. If the AIS has not been in use or has been processing unclassi-
fied information unattended, and continuous physical protection has been
provided in accordance with the provisions of paragraph 106e(4), the
immediate area shall be inspected for signs of unauthorized entry and/or
the equipment shall be inspected for signs of unauthorized access to the
interior (for example, loose covers, broken seals, missing screws, pry
marks or scratches). If signs are found that unauthorized persons may have
gained entry into the area or access inside the equipment, the SSO shall be
notified immediately. Before using the AIS for classified processing, the
computer hardware shall be inspected and/or tested to reveal any hardware
modifications. Appropriate software diagnostic routines may be used in
this process.
c. All remote terminals that are not secured to the higher level
of classified processing to be accomplished shall be disconnected in
accordance with the provisions of paragraph 106b(2).
d. All storage media of a lower classification level shall be
disabled, disconnected or dismounted, and either removed from the area
or otherwise segregated within the area.
e. All internal memory, buffer storage and other reusable storage
devices not disabled, disconnected or dismounted shall be appropriately
cleared, as set forth in paragraph 115.
f.
connected
controls,
imposed.
Higher level security controls for the computer facility and
remote terminal areas, including the implementation of access
personnel clearance and physical security requirements, shall be
g. A dedicated and previously protected copy of the system software
shall be loaded into the AIS. However, if the system software has been
retained in the AIS on nonremovable storage media in consonance with
paragraph 108.1a, the system software need nut be reloaded if: (i) the
AIS has not been used since the last classified processing period, (ii)
the security level of the last processing period was not lower than the
security level of the processing period being established, (iii) continuous
physical protection of the AIS has been maintained in accordance with the
provisions of paragraph 106e, end (iv) there are no signs of unauthorized
entry into the area and/or access to the AIS.
201 113.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
u ? I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
you yzzu.zz-ri
h. Lower classified or unclassified application software and data
shall be loaded into the AIS in accordance with the provisions of para-
graph 108.1c(4) and d, respectively. However, if unclassified application
software or data was retained in the AIS on nonremovable storage media in
consonance with paragraph 108.1c(5) and d, respectively, the application
software or data need not be reloaded under the same conditions as speci-
fied in paragraph g above for system software.
i. A final security check shall be made of the foregoing prior to
initiation of the higher level processing. Audit trail records will be
maintained indicating what actions were taken, when and by wham.
114. AIS Security Level Downgrading.
a. To adjust the AIS to a lower security level for: (i) processing a
lower level or less restrictive type of classified information, (ii)
changing from a classified to an unclassified processing period, or (iii)
establishing a level of continuous physical protection when the AIS is
not to be used (in accordance with the provisions of paragraph 106e), the
following procedures shall be implemented.
b. All removable storage media (including that containing the safe-
guarded higher level software), listings, ribbons, cards, classified waste
and so on, associated with the higher level of classified processing, shall
be dismounted, collected, marked, removed and appropriately secured. Where
area controls for the computer facility or remote terminal areas are
continuously maintained at the higher classification level, the removable
storage media may be segregated within, rather than removed from, the area,
provided the higher level classified information is not online or otherwise
accessible through the AIS.
c. All internal memory, buffer storage and other reusable storage
devices remaining on the AIS shall be cleared in accordance with the
procedures in paragraph 115.
d. A security check shall be made of the foregoing and audit trail
records maintained indicating what actions were taken, when and by whom.
115. Media and Equipment Clearance.
a. To preclude unauthorized disclosure of classified information
when either upgrading or downgrading the security level of the AIS, all
internal memory, buffer storage and other reusable storage devices used
during the prior processing period must be cleared before reutilization of
the AIS. The CSO will advise the contractor of authorized procedures for
clearing and verifying specific memories, storage media, devices and
equipment.
b. Internal Memory. Internal memory, registers, buffers and
circuitry of most systems and devices can be cleared by overwriting each
memory position at least once with unclassified information, by clear
switch action, or by removal of power. Specific guidance for clearing
115. 202
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD nz.m.zz?m.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
special types of semiconductor (electronic) memories will be provided by
the CSO. Clearance actions will be verified, where feasible, to ensure
that all applicable portions of memory have been cleared.
c. Other Storage Media. Other storage media such as magnetic tapes,
disks and drums on which classified information have been recorded may be
cleared by overwriting once with unclassified information. Clearance
actions will be appropriately verified, where feasible, and recorded.
Selective overwriting of storage media is permissible only when the exact
storage locations of classified information are known, those locations can
be overwritten, that action can be verified, and the restriction of para-
graph 108.1e is not applicable. Media which have been cleared may be used
for recording information with a lower classification level, but such
media shall continue to be safeguarded as required for the highest level
of classified information ever recorded thereon, until appropriately
declassified pursuant to paragraph 116.
d. Equipment. Any equipment or device physically handling classi-
fied media or material shall be visually examined as a part of the process
of clearing the equipment. This provision is applicable, but not limited,
to such devices as card readers and punches, optical and magnetic-ink
character recognition systems, paper tape readers and punches, computer
output microfilmers, printers, plotters and so on. This will require ?
appropriate physical and visual examination of the normal media path through
the particular equipment to detect the possible presence of media. An
examination of the equipment must include a search of the locations where
media or material may have become lodged. Equipment access panels and/or
other removable components may have to be removed or opened to perform the
inspection. Where the equipment contains internal memory or other storage
media which have been used to store information, these media shall be
cleared as in paragraph b or c above.
116. Media and Equipment Declassification.
a. Special precautions must be taken before systems, storage media
or equipment and devices containing storage media can be released from
classified material safeguarding controls. To release such media or
computer hardware, appropriate actions must be taken to ensure that all
classified information has been totally eradicated, that is, the storage
media must be declassified. After the storage media have been properly
declassified, the media, or the hardware containing the media, may be
handled as unclassified material provided that all markings indicating
its use for classified processing are removed. Where feasible, each
declassification action must be verified (at least randomly) to ensure
that all classified information contained on the media has been destroyed.
When media are declassified, a record of media declassification must be
completed. In the case of accountable media, this requirement can be met
by completing the accountability record to indicate the Aeclasstfication
action taken, the date and the persons taking the action. For other
storage media and computer hardware containing storage media for which
there is no accountability record, declassification and release records
203 116.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. LI LL I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
must be created for the particular media, device or equipment are retained
by the contractor for a period of 3 years if previously used for TOP
SECRET, 2 years if previously used for SECRET, and 1 year if previously
used for CONFIDENTIAL.
b. Most magnetic storage media can be declassified by the use of
approved degaussing equipment and devices. The CSO will advise the con-
tractor of currently approved: (i) electrical magnetic tape degaussers to
declassify reels of magnetic tape, (ii) adapters for electrical tape
degaussers to declassify flexible (floppy) disks, tape cassettes and
magnetic cards, (iii) floppy disk degaussers, and (iv) hand-held perma-
nent magnetic devices for declassifying disk and drum surfaces. The
contractor will establish procedures to ensure strict compliance with the
manufacturer's instructions for operating the degaussing equipment and to
ensure continuing effectiveness of the equipment. It should be noted that
tape degaussers are not authorized for declassifying "high-energy" magnetic
recording tape (that is, magnetic tape with a coercivity greater than 325
oersteds). High-energy magnetic tape which is more commonly used to
record analog, audio, video and other non-digital information shall have
a distinguishing label applied to the reel to identify it as "high-energy"
and must be safeguarded until its physical destruction.
c. Specific guidance for declassification and verification of
particular types of memory and storage media is available from the CSO.
Instructions regarding the declassification and/or disposition of media
containing COMSEC or special access program material should be provided
by the contracting activity. Authorized procedures for declassification
of the most commonly used memories and storage media are as follows:
(1) Most semiconductor memory can be declassified by overwriting
each memory location with any character pattern, or by the removal of main
and any backup power from the system. Non-volatile read/write semicon-
ductor memory may be declassified in accordance with the procedures for
magnetic core memory.
(2) Magnetic core memory used in the processing of information
classified no higher than SECRET can be declassified by overwriting each
addressable memory location alternately with any pattern of bits and then
with its complementary or opposite bit pattern (for example, binary ones
and then binary zeros) for 100 cycles. The same procedure applies for the
declassification of core memory used for processing TOP SECRET information,
except that the memory must be overwritten for 1000 cycles.
(3) Reels of magnetic tape can be declassified by the use of an
approved electrical tape degausser.
(4) Tape cassettes can be declassified by using an approved
electrical tape degausser with the appropriate adapter.
(5) Flexible (floppy) disks and diskettes can be declassified by:
(a) using an approved floppy disk degausser,
116. 204
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(b) using an approved electrical tape degausser with the
appropriate adapter, or
(c) exposing the recording surfaces to an approved hand-
held permanent magnet.
(6) Disk packs, disk platters, drums and similar rigid magnetic
storage devices can be declassified by:
(a) exposing the recording surfaces to an approved hand-
held permanent magnet, or
(b) overwriting all data storage locations alternately
with any pattern of bits and then with its complementary or opposite bit
pattern (for example, binary ones and then binary zeros) for three cycles,
and then overwriting once again with any other characters or bit pattern.
Unclassified information used in the final overwrite shall be left on the
device. Selective overwriting of storage media is authorized only when
the exact storage locations of classified information are known, those
locations can be overwritten as required, that action can be verified,
and the restriction of paragraph 108.1e, is not applicable.
(7) Magnetic cards can be declassified by using an approved
electrical tape degausser with the appropriate adapter.
(8) Cathode ray tube (CRT) screen surfaces shall be inspected
and/or tested to detect evidence of burned-in information. If the in-
spection reveals classified information etched into the phosphor, the CRT
device shall be retained within the appropriate security environment, or
the screen itself shall be destroyed. In the absence of burned-in classi-
fied information, the CRT may be handled as unclassified.
205
116.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Section XIV. CRITICAL NUCLEAR WEAPON DESIGN INFORMATION
117. Policy. The sensitivity of CNWDI is such that it is in the national
interest to ensure that access is granted to the absolute minimum number of
employees who require it for the accomplishment of assigned responsibilities
on the strictest need-to-know basis. The FS0 shall be responsible for ensuring
that access to CNWDI is limited on a strict need-to-know basis within the
facility. The top management official shall ensure that the need-to-know
principle is strictly enforced. Management personnel at all levels will be
responsible for ensuring that requests for access to CNWDI are not auto-
matically approved. Full and complete justification must be made before any
employee is authorized for access to CNWDI. Because of the importance of such
information to our national policies, special procedures have been established
for its control.
118. Access Requirement. A final TOP SECRET or SECRET PCL, granted in
accordance with paragraph 24a(1), is valid for access to CNWDI of the same
or lesser security classification, provided the employee has been given a
security briefing, in accordance with paragraph 119. In rare instances, an
immigrant alien who possesses a unique or very unusual talent or skill that
is essential to the U.S. Government, and is not possessed to a comparable
degree by an available U.S. citizen, may be authorized for access to CNWDI
only. In such cases a request with full justification shall be forwarded to
the contracting officer. If access to CNWDI is approved for the immigrant
alien, such approval is limited to the specific contract of the UA, and is not
valid for access to CNWDI on other contracts.
119. Briefings. Employees having a need for access to CNWDI shall be briefed
on its sensitivity by the FSO or his or her alternate. The briefing shall
include the definition of CNWDI, a reminder as to the extreme sensitivity of
the information, and an explanation of the individual's continuing responsi-
bility for properly safeguarding CNWDI and for ensuring that dissemination is
strictly limited to other personnel who have been authorized for access and
have a specific need-to-know for the particular, information. The briefing
shall also be tailored to cover any local special requirements.
120. Records. The contractor shall maintain a record of all employees
who have been authorized access to CNWDI, and the date on which such
employees were briefed. These records will be maintained in a manner that
will facilitate verification, and shall be retained for 3 years following
the termination of employment and/or the termination of the individual's
clearance, as applicable.
121. Marking. In addition to other markings required by this manual, docu-
ments, including working papers, sound, voice, or electronic records, and any
other media, which contain CNWDI and are generated after September 1, 1978,
shall be clearly marked, "Critical Nuclear Weapon Design Information -- DoD
Directive 5210.2 Applies." Documents shall be marked on the cover, title
page, lead page, and the back cover. Similar documents and other media
published before September 1, 1978 that are in working files will be
similarly marked (substantially as provided above) to indicate they contain
CNWDI information. In addition, paragraphs of documents generated after.
September 1, 1978 that contain CNWDI will be so marked. (Example: (SRD)(N).)
207 121.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H 1 1..1_
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
An (N) following the classification denotes that the classified material is
additionally identified as CNWDI.)
122. Subcontracting and Consultants. The contractor shall not award a
subcontract which would necessitate access to CNWDI without the prior written
approval of the contracting officer. This approval may be included on the
DD Form 254. Type A Consultants may be briefed and afforded access to CNWDI,
but such access may be permitted only at the facility of the contractor who
engaged the Type A Consultant or at the government contracting activity. Type
B and C Consultants shall not be briefed or afforded access to CNWDI without
the prior approval of the contracting officer.
123. Transmission Outside the Facility. Transmission outside the facility
is authorized only to the contracting activity, a prime contractor, or a
subcontractor approved pursuant to paragraph 122. Any other transmission must
be approved by the contracting officer. In addition, prior to transmission to
another. cleared facility, the contractor shall verify from the CSO of the
recipient facility that the facility has been authorized for access to CNWDI.
When CNWDI is transmitted to another facility, the inner wrapping will be
addressed to the personal attention of the FSO or his or her alternate, and in
addition to any other prescribed markings on the inner wrapping will be the
marking, "Critical Nuclear Weapon Design Information -- DoD Directive 5210.2
Applies." Similarly, transmissions addressed to the contracting activity or
other U.S. Government agency shall bear on the inner wrapper the marking,
"Critical Nuclear Weapon Design Information -- DoD Directive 5210.2 Applies."
123. 208
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
. Section XV. OPERATIONS SECURITY (OPSEC)
124. Purpose. This section of the manual provides information and guidance
for uniform implementation of the DoD OPSEC program when contractually imposed
an contractors participating in the Defense Industrial Security Program.
125. General. OPSEC is a DoD directed effort. Its principal objective is to
preclude the disclosure of classified information by denying or reducing the
opportunity of hostile intelligence services (BOIS) to gain access by directly
observing/analyzing/evaluating our activities and operations, the awareness of
which may lead to the compromise of classified information. Stated another
way, OPSEC is the process of denying adversaries information about friendly
intentions, capabilities, plans and programs by identifying, controlling, and
protecting intelligence information and indicators associated with planning and
conducting military operations as well as other defense activities not already
afforded adequate protection as classified information.
a. The general aim of OPSEC is to promote mission effectiveness by
preserving essential secrecy about U.S. intentions, capabilities, and
current activities when the DISP procedures for safeguarding classified
material and information require enhancement. Secrecy essential to
defense activities may be compromised whenever open sources (such as
technical articles, press releases, National Technical Information
Service publications, the Congressional Record, Commerce Business Daily,
or contract awards) and detectable activities (such as communications,
logistics actions, research, development and test activities, or radar
emissions) provide information that hostile intelligence can piece together
or analyze, resulting in adversary actions harmful to U.S. interests. In
some instances, such information or indicators/activities are unprotected or
not addressed by the DISP requirements for classified material and require
case-by-case planning to identify them. The fundamental goal of the OPSEC
process is to minimize or eliminate such indicators. OPSEC thus encompasses
activities which are unique to the OPSEC process, i.e., (a) determining,
through threat/vulnerability analysis, whether there are unacceptable/
undesirable intelligence indicators and what they are; (b) developing and
implementing countermeasures to best eliminate or minimize them.
b. OPSEC uses the same security measures that have been used to protect
government information for years under the DISP but adds a new dimension.
This new dimension or emphasis is the security of unclassified intelligence
indicators. It is the protection of things we do, our operations, tests,
and activities. As such, OPSEC is intended to complement the DISP.
126. Applicability. The DoD OPSEC program is applicable only to Defense
contractors participating in the DISP when the contracting User Agency
determines that additional OPSEC measures are essential to protect
classified information for specific classified contracts and imposes OPSEC
as a contractual requirement. OPSEC is concerned with all sources of
exploitable information. The DISP generally covers only the classified
209 126.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II V , Jill 1 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
information disclosure problem, while OPSEC covers the total problem by
addressing vulnerabilities and countermeasures for a specific program.
OPSEC is principally oriented to those instances in which evaluations
indicate program weaknesses which could lead to the disclosure of
classified information.
a. OPSEC will be directed to the protection of unclassified intelligence
indicators on classified programs of such a nature that the disclosure of the
indicators may lead to the compromise of classified information. OPSEC is not
intended as a vehicle to protect unclassified technology; other programs exist
to protect this information (DoD Directive 5230.25).
b. Specific detailed UA requirements for OPSEC shall be included in
appropriate requisition documentation and resultant contract or addendum
thereto in sufficient detail to ensure complete contractor understanding of
exactly what special OPSEC provisions or measures are required by the UA.
Full disclosure of these requirements is essential so that contractors can
comply and charge attendant costs to the specific contracts which have OPSEC
provisions. In providing such measures, UAs shall not solely refer to their
internal regulations when imposing OPSEC requirements, but shall fully specify
the particulars in the contract proper and shall provide necessary information
to fully explain internal regulations. Additionally, applicable DD 254s will
be annotated to indicate that OPSEC requirements are contained in the contract
or addendum thereto.
c. Contractual OPSEC requirements shall be strictly limited to those
sensitive projects which clearly justify extraordinary security measures
beyond those embodied in the DISP as outlined in the ISM. If the ISM provides
a countermeasure or safeguard for a particular identified vulnerability concern,
the ISM will be allowed to address it and redundant countermeasures will not be
added as contractual OPSEC requirements (e.g. physical, information or personnel
security). UAs will make this determination prior to imposing OPSEC measures.
d. Full and detailed OPSEC contract and subcontract requirements to
include DD 254s will be provided to DIS CSOs by UAs or prime contractors as
appropriate.
e. When requested by the installation commander, DIS will perform OPSEC
inspections of contractor facilities located on military installations. At
contractor facilities not located on military installations, DIS has principal
responsibility for inspecting contractor compliance with OPSEC requirements.
Cognizant UA representatives may accompany DIS if requested. OPSEC inspections
will be accomplished:
(1) As part of a regularly scheduled industrial security inspection.
(2) As part of an unannounced industrial security inspection.
127. Procedures for Self-Inspecting OPSEC Programs.
As will be the case with CS0s, contractors shall use the detailed
information provided them by the contracting activity as the basis for OPSEC
self-inspections.
127. 210
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-h
Appendix I. INDUSTRIAL SECURITY FORMS
A. Application. The purpose of this appendix is to describe the forms used
by DoD contractors in industrial security matters, and to provide instructions
for the use and completion of each of these forms. A sample of each form is
included. These forms shall not be used for any purposes or in any other
manner, except as provided for in this manual or for training purposes.
B. Special Privacy Section Instructions. The privacy section instructions
on DD Forms 48, 49 and 48-3 are no longer applicable. (New personnel
security questionnaires, when published, will contain no special privacy
instructions.) Each employee will be advised that if they believe there is
a significant personal matter which they desire not to disclose to their
employer, they may request an interview with a Defense Investigative Service *
agent by entering "DIS Interview Requested" rather than completing the
specific item.
C. "Department of Defense Personnel Security Questionnaire (Industrial-NAC)"
(DD Form 48). This form is used to obtain personal data from a U.S. citizen
being considered for a DoD CONFIDENTIAL or SECRET PCL. The form is prepared
jointly by management and the person being considered for the clearance. The
submission of this form shall not be required, except when the person con-
cerned is being processed for a clearance. The completed form should be for-
warded to the DISCO, P.O. Box 2499, Columbus, Ohio 43216. However, forms that
pertain to OODEPs and are submitted in conjunction with the FCL application,
or as a change thereto, shall be mailed to the CSO.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 48
SAMPLE
PERSONNEL SECURITY QUESTIONNAIRE
INDUSTRIAL -NAC
DO FORM a
PRIVACY ACT STATEMENT
A TI_SUSMM: internal Security Act of 1950 and Executive Order 10865, as amended by Executive Order 10909;
Executive Order 9397, November 1943 (SSW
PRINCIPAL PURPOSES: To obtain background information for personnel security investigative and evaluative purposes in order to determine
the security eligibility of Department of Defense contractors and employees of Department of Defense contractors for
(1) access to classified information, or (2) assignment to a sensitive position.
ROUTINE USES: (1) Determine the scope of a personnel security investigation.
(2) Provide evaluators or adjudicators with personal history information relevant to personnel security determinations.
The information may be disclosed to other Federal agencies that are authonzed under specific statutory or Executive
authority to make personnel security determinations.
A copy of the report of personnel security investigation will be maintained by the Personnel investigations Center of
the Defense Investigative Service and may be used in future security clearance determinations. You have the right to
obtain a copy of the report of investigation and/or request amendment to the file.
cataajj : Voluntary; however, failure to furnish all or part of the information requested may result in (1) denial of access to
classified information, or (2) non-selection for assignment to a sensitive position. Disclosure of your Social Security
Number is necessary to fulfill requirements of the above cited authorities. It is intended that this notice be retained
for personal records.
GENERAL INSTRUCTIONS
THE PERSONNEL SECURITY QUESTIONNAIRE (PSQ) IS AN IMPORTANT DOCUMENT AND MUST BE COMPLETED WITHOUT MISSTATEMENT OR
OMISSION OF IMPORTANT FACTS. ALL ENTRIES ARE SUBJECT TO VERIFICATION BY INVESTIGATION
? THE FORM MUST BE TYPED OR PRINTED
? COMPLETE ITEMS 1-13, SIGN THE FORM AT THE eorrorA. AND THEN PROVIDE THE FORM TO YOUR EMPLOYER WHO WiLL REVIEW IT
TO ASSURE THAT ENTRIES ARE COMPLETE AND CORRECT AFTER THE FORM IS RETURNED TO YOU, PROCEED TO COMPLETE 14-18 OF
THE PRIVACY SECTION
? IF ADDITIONAL SPACE IS REQUIRED FOR ANY ITEM, ATTACH ADDITIONAL SHEETS OF PLAIN WHITE PAPER, WHEN ATTACHING
ADDITIONAL SHEETS ALWAYS IDENTIFY THE ITEM NUMBER BEING CONTINUED ANO FOLLOW THE FORMAT FOR ENTERING
INFORMATION PRESCRIBED ON THE FORM AND IN THE DETAILED INSTRUCTIONS.
? ALL QUESTIONS MUST BE ANSWERED IF AN ITEM IS NOT APPLICABLE INDICATE NOT APPLICABLE" OR "N/A " DO NOT USE THE
TERM 'UNKNOWN" FOR DATES OF EMPLOYMENT OR RESIDENCE. IF THIS INFORMATION IS NOT KNOWN PRECISELY, GIVE THE DATE
AS BEST YOU CAN RECALL FOLLOWED BY APPROPRIATE QUALIFYING LANGUAGE. E.G.. 'DATE ESTIMATED" OR "APPROX.
? UNLESS OTHERWISE SPECIFIED:
? AU. DATES SHOULD BE ENTERED IN TERMS OF YEAR AND MONTH USING THE LAST TWO DIGITS OF THE YEAR AND A TWO DIGIT
NUMBER REPRESENTING THE MONTH. E.G., JANUARY 1987 WOULD BE ENTERED AS 87-01 AND DECEMBER 1987 WOULD BE
ENTERED AS 87-12.
? NAMES OF PERSONS SHOULD BE ENTERED IN THE FOLLOWING ORDER: LAST NAME, FIRST NAME AND MIDDLE INITIAL
? ADDRESSES SHOULD INCLUDE THE NUMBER AND STREET, CITY, STATE OR COUNTRY, AND ZIP CODE.
? BEFORE ENTERING ANY INFORMATION ON THE FORM. READ CAREFULLY THE DETAILED INSTRUCTIONS PROVIDED WITH THE FORM IF
AT ANY TIME DURING COMPLETION OF THE FORM. A QUESTION ARISES THAT DOES NOT APPEAR TO BE COVERED BY THE DETAILED
INSTRUCTIONS, CONTACT THE INDIVIDUAL OR OFFICE THAT PROVIDED YOU WITH THE FORM
? ONCE THE FORM HAS BEEN COMPLETED, PLACE IT IN THE PRE-ADDRESSED ENVELOPE THAT HAS BEEN PROVIDED, TOGETHER WITH
THE COMPLETED FD 258 (FINGERPRINT CARD). SEAL THE ENVELOPE, SIGN ACROSS THE ENVELOPE FLAP ON THE LINE PROVIDED AND
AFFIX THE DATE OF SIGNATURE. DELIVER THE SEALED ENVELOPE TO YOUR EMPLOYER IMMEDIATELY
DO Form 48 Instructions, JUL 87
2 1 2
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 48
Page two
SAMPLE
I DEPARTMENT OF DEFENSE
PERSONNEL SECURITY QUESTIONNAIRE (Industrial-NAC)
..,,,
ow mo. 004400S
from Map IT raw
NAME
b MAIDEN NAME al any).
DATE
1. a. LAST NAME?FIRST NAME?MIDDLE
FOR ON USE ONLY
2. ALIASES
3,a. SEX
b. RACE
4 SOCIAL SECURITY NUMBER
Male
Female
S. DATE OF BIRTH
6. PLACE OF BIRTH
(Year-Month-Day)
a. Cm,
b. COUNTY
c. STATE
d. COUNTRY
7 a. U.S. CITIZEN
YIDS n No
b. NATIVE
1 7 Yesr
C. IF NATURALIZED,
CERTIFICATE NO(S)
d. IF DERIVED. PARENT(s)
CERTIFICATE NO(S)7
e . DATE
f PLACE
g. COURT
illilo
h. DUAL CITIZEN Yes 1 I No (If 'Yes see DETAILED INSTRUCTIONS.)
8. MILITARY SERVICE (MOW, iNslowINOP200 Guard)
FROM
b. TO
c. BRANCH
d. RANK
e. SERVICE NO(S)
f COUNTRY
a.
9. PREVIOUS
CLEARANCE DATA
Yes
No
Have ever been granted a security clearance? at 'Yes' give details below.)
a. you
LEVEL
DATE GRANTED
GRANTED BY
NAME OF EMPLOYER
b Have you ever terminated employment while request for security clearance was pending? (Yes' answer must be explained in
accordance with the DETAILED INSTRUCTIONS.)
Yes
NO
10. FAMILY/ASSOCIATES (See DETAILED INSTRUCTIONS for persons to be listed.)
a. RELATIONSHIP AND NAME
b. DATE OF BIRTH
c. PLACE OF BIRTH
d. ADDRESS
e. CITIZENSHIP
FATHER
MOTHER (Malden Name)
SPOUSE (Maiden Novo)
FORMER SPOUSE
11 RESIDENCES (Begin with current address-Sae DETAILED INSTRUCTIONS.)
a. DATES (Yr & Me)
b.
AND STREET
c.
CITY
d.
STATE
e.
ZIP CODE
FROM
TO
NUMBER
Present
12. EMPLOYMENT
(Indy* self-employment, part-time employment andlor unompioyment) (See DETAILED INSTRUCTIONS.)
a. DATES (Yr ? MO)
b.
EMPLOYER
C.
ADDRESS
d.
ZIP CODE
e. SUPER-
VISOR
FROM
TO
NAME OF
Present
13. FEDERAL
SERVICE. FOREIGN TRAVEL/CONNECT1ONS (If 'Yes' see DETAILED INSTRUCTIONS.)
Y es
No
Have ever been in the Federal Civil Service?
a. you
b. Have traveled or resided abroad for other than the U.S. Government?
you
c. Do you have any foreign property or business Connections or have you ever been employed by or acted as a consultant or
representative for a foreign government, firm, or agency?
111. TO BE COMPUTED SY EMPLOYER
'a. LEVEL OF CLEARANCE I I Secret I I Confidential
b. CITIZENSHIP VERIFIED I I Yes
I No I c. 1013 TITLE
d. COMMERCIAL AND GOVERNMENT ENTITY CODE le. CONTRACT NUMBER
I . CERTIFICATION -i certify that the above named individual is employed by this company and hes the need for the clearance indicated to
perform on classified contracts.
DATE SIGNED
SIGNATI IRE OF EMI?' OYER OR DESIGNATED REPRESENTATIVE
TELEPHONE NO
Dana 1 ni 2 P2/101
DD Form 48, JUL 87
Previous esonz are
213
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. .1.1 V IIII I I nl? I.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 48
Page Throe
SAMPLE
PRIVACY SECTION
ENTRIES I51 THIS SECTION ARE NOT SUBJECT TO REVIEW BY YOUR EMPLOYER. When your responses to items 1-13 on the first page of the
00 Form 44 have been reviewed by your employer and returned to you, you should proceed to complete items 14013 in this section. sign
where indicated at the bottom of the page, and follow the instructions contained in the DETAILED INSTRUCTIONS.
14. ARRESTS (?Yes AMAMM MYR be explained in,. through i. below in accordance with the DETAILED INSTRUCTIONS.)
yes
No
(Attach additional sheets, if necessary)
a. Have you ever been arrested. charged, cited. or held by Federal, state, or local law enforcement or juvenile authorities
regardless of whether the citation was dropped or dismissed, or you were found not guilty? (Include aN courts-mental or non-
j?nel
punishment while in military service. (You may exclude minor traffic violations for which. fine or forfeiture of POO
or du was imposed. unless alcohol related)
b. As a result Of being arrested, charged, cited, or held by law enforcement or juvenile authorities, have you ever been
convicted, fined by or forfeited bond to a Federal. state, or other judicial authority or adjudicated a youthful offender or
juvenile delinquent (regartiBess of whether the record in your case hes been 'sealed' or otherwise stncken from the court
record)?
C. Have you ever been detained, held in, or served WM! in any jail or prison, or reform or industrial school or any juvenile
facility or institution under the jurisdiction of any city, county. state. Federal or foreign country?
d. Have you ever been, or are you now under suspended sentence, parole, or probation or awaiting any action on charges
against you?
is
DATE
V. OFFENSE OR
VIOLATION
II* NAME ANO LOCATION
OF POUCE AGENCY
Is. NAME ANO LOCATION
OF COURT
I. PENALTY IMPOSED OR
OTHER DISPOSITION
15.
MEDICAL/ FINANCIAL ("Yiss- MIMEO must be explained in accordance with the DETAILED INSTRUCTIONS.)
Yes
No
(Attach additional sheen if necessary.)
a. Have you ever used any narcotic, depressant, stimulant. hallucinogen (to include LSO or PCP) or Cannabis (to include minivan+
or hashish) except as prescribed by a licensed physician?
b. Have you ever been involved in the illegal purchase, possession, or sale of any narcotic, depressant, stimulant, hallucinogen, or
Cannabis?
C. Has your use of alcoholic beverages (such as liquor, beer, wine) ever resulted in the loss of a job, arrest by police, treatment
for alcoholism or resulted in disciplinary action?
d. Have you ever had or been treated for a mental, emotional, psychological, Or personality disordertconditoMproblem?
e. Have you ever petitioned to be declared bankrupt or experienced other financial difficulties?
16. ORGANIZATIONS
a. (List a* organizations, except labor unions, and those referred to in b. below, to which you Wong or previously belonged.)
(1) NAME
(2) , ADDRESS
(3) TYPE
(4) FROM
(5) TO
b. (Yes ' 11111111011 must be explained in accordance with the DETAILED INSTRUCTIONS.) (Attach additional
Yes
No
sheen, if necessary)
(1) Are you nowor have you ever been a member of the Communist Party or any Communist organization?
(2) Are you now or have you ever been affiliated with any organization, association, movement, group, or combination of persons?,
which advocates the
overthrow of our constitutional form of government, or which has adopted the policy of advocating or
approving the commission of acts of force or violence to deny other persons their rights under the Constitution of the United
States or which seeks to alter the form of government of the United States by unconstitutional means?
17.
SECURITY
CLEARANCE (Yes " answer must be explained in accordance with the DETAILED INSTRUCTIONS.)
Yes
No
(Attach additional sheets. if MICRiiir)t)
Have you ever had a security clearance denied or revoked?
111. DISCHARGE FROM THE ARMED FORCES ("Yes' be in
Yes
No
answer must explained accordance with the DETAILED INSTRUCTIONS.)
(Attach additional sheets if necessary.)
Hake yoq ever been discharged from the Armed Forces under other than honorable conditions?
awriFICATION
I certify that the entries made by me are true. complete, and accurate to the best of my knowledge and
belief and are made in good faith. I understand that a knowing and willful false statement on this form can
be punished by fine or imprisonment or both (See U.S. Cod*, Title 18, Section 1001).
TYPED OR PRINTED NAME OF PERSON COMPLETING FORM
DATE
SIGNATURE OF PERSON COMPLETING FORM
Page 2 of I Pages
214
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
D. "Application and Authorization for Access to Confidential Information
(Industrial)" (DD Form 48-2). This form is used to obtain personal data from
a U.S. citizen being considered for a CONFIDENTIAL PCL by a contractor. The
form is prepared jointly by the person being considered for the clearance and
by the contractor. Completion of this form is a prerequisite to the granting
of a CONFIDENTIAL clearance by a contractor. The use of this form is not
retroactive in the case of employees who previously were granted CONFIDENTIAL
clearances by the contractor, so long as they are continuously employed by the
same contractor, or there has been no break in employment in excess of 12
months.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 48-2
SAMPLE
APPLICATION AND AUTHORIZATION FOR
ACCESS TO CONFIDENTIAL INFORMATION (INDUSTRIAL)
TYPE OR PRINT
ALL ANSWERS
FORM A
ONO NO. 07114-003
EXP. DATE DEC l,5
NOTE: PENALTY- Failure to answer all questions, or any misreprisentation (by ?Minion or coneealmrnt, or by misleading.
false. or partial answers) may serve as a basis for denial of clearance for access to classified Department of Defense infor-
mation. In addition. Title 18 United States Code 1001 makes it a criminal offense. punishable by a maximum of 5 years'
insprisonrnent, mow fine, or both, knowingly and willfully to make a false statement or representation to any Department
or Agency of the United States as to any matter within the jurisdietion of any Department or Agency of the United States.
This includes any statement knowingly and willfully made by employer or employee herein which is knowingly incorrret.
incomplete or misleading in any important particular - Title 18 United States Code 911 states "whoever falsely and willfully
represents himself to be a citizen of the United States shall be fined not more than 51.000 or imprisoned not more than three
years. or both'.
PURPOSE: The completion of this form is required in the national interest prior to an individual being granted ? security
clearance for classified information.
INSTRUCTIONS - This is a three-part form. Part I is an application for access and shall be executed by U.S. citicen employees
provided their employer determines that as to Confidential information is required in the performance of the employee's
assigned dudes. Part II is the employee's authorleation for acmes to Confidential information and shall be completed by the
employer. Copy of this form shall be maintained by the contractor for all employees granted a security clearance for Confidential
Information. Part III Is a listing of Communist countries which the employee should refer to when completing Item 11.
PART I- APPLICATION FOR ACCESS TO CONFIDENTIAL INFORMATION
TO BE COMPLETED BY EMPLOYEE
NAME AND ADDRESS OF EMPLOYER
1. LAST Rung - FIRST mama - moot& Nasal"
a. ANY OTHER NAME NY WHICH KNOWN 1114111411 Or former
lfra name)
a. DATE OF I45TO4 (MoistA. Day & Year)
A. PLACE OF WITH (City, County, Safe)
S. SOCIAL /LAITY NUMBER
7. HAVE YOU EVER APPLIED FOR OR reaceiveo A secuierry CLEARANCE?
YES
S. IF THE AN/wan TO MOM 7 IS ''YES-. INDICATE nimovi THE LEVEL OP CLEARANC.L. WHEN APPLIED PO*. WHEN GRANTED. SY visiOls. ANO whIESM
EMPLOYED AT THAT TIME,
5. OfitANIZATiONS WITH line04 AFFILIATED (pall cued present) OTHER THAN RELIGIOUS On POLITICAL ORGANIZATIONS OR THOSE WHICH SHOW
RELIGIOUS ow Pourscat. APPluATION. (If Rook so ware)
10. ARE YOU A CITIZEN OF THU UNITED STATES? c3 YES NO. (If answer is "Yes", complete the foilowseed: d answer ? No MUT
this form te year eneployer.)
CI I Am A CITIZEN Or TMS UNITID STATES ST REASON OF my SiliTH IN THE UNITED STATES MY PIATuRALLZED
co MY MIRTH IN A FONEIGN COUNTRY OF UNIT= STATES PARENTS MY DERIVATIVE CITIZENSHIP ?
*If ensatead ample!. Winer .C.insesuisip by Naboalitaaon? or 'Citisenalup by Dertuosion? Section Wow.
crracramir ST NATURALIZATKINS
WHERE NATURALIZED (City. Corm% Sittg
DAT( NATURALIZED
COURT
CERTIFICATE NO.
CITIZENSHIP ST DERIVATION *
PARENT'S NAME
PARENT'S CERTIFICATE NO.
Fold
Line
II. HAVE YOU MOO= AT ANY TIME THE PAST IS YEARS OR SINCE YOUR t 5734 MRTHDAy. WHICHEVER IS LATER. IN COMMUNIST COUNTRIES
Lamm UNDER PART III? (If anwer a Yos", indieste city and comely, dates of nimidenee, man' gem 14 -Rentaelta,
DYES D No
Ia. LIST RELATIVES AND RELATIVES OF SPOUSE ICNOwN TO St LIVING IN COMMUNIST COUNTRIES LISTED UNDER PART
RELATION
NAME
ADDRESS
PLACE g DATE
Or MIRTH
PRESENT
CITIZENSHIP
IS. ARE YOU A REPRESENTATIVE OF A FOREIGN INTEREST?
A. RIDAARICS
216
Fold
Luse
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 48-2
Pop Two
Feld
Late
JAM r LL
r
1
INSTRUCTIONS: Read every sentence of the Certification before signing in the presence of a witness who may be a member of
your flrrn. If you cannot sign the certlftcation for any reason, return this form to your employer who will have you complete a
different form.
I certify that I have never been, past or present, a member
of persons, (1) which advocates the overthrow of our
the of acts of force
CERTIFICATION
in any organization, association, movement, group, or combination
constitutional form of government, (2) or which had adopted a policy of
or violence to deny other persons their rights under the Constitution
of Government of the United States by unconstitutional means.
advocating or approving commission
United States, which seeks to aker the form
alike (3) or
I certify that I know that any misrepresentation or false
by herein may subject me to
I certify that.I have read and understand each sentence of this
Certification.
I certify that the entries made by me on this form are true,
complete, and correct to the best of my knowledge and
belief, and are made in good faith.
statement made me prosecution
under Tide 18, United Stales Criminal Code, Sections 911
and 1001, with penalties up to five (5) years imprisonment
and $10,000 fine.
I certify that I am a citizen of the United States.
SIGNATURE OF WITNESS
SIGNATURE OF PERSON MAKING CERTIFICATION
DATE OF SIGNATURS
A0051155 OF WITNESS (City, County, State)
PART II. AUTHORIZATION FOR ACCESS TO CONFIDENTIAL INFORMATION
TO BE COMPLETED BY EMPLOYER
Whereas the Department of Defense has delegated
for access to Confidential information to his employees
duties; the undersigned, a duly authorized representative
form and the employment records pertaining to the
(Check the appropriate block(s)
I. The employee is a United
to its contractors (employers) authority to grant access
who require access in the performance of the employee's
of the contractor, certifies that he has examined
employee executing Part I of this form, and has determined
States citizen; and that
a security clearance for Confidential
with the provisions of paragraph 24b,
for Safeguarding Classified Information and
granted this date; and/or
to be referred to the military cognizant security
authorization
assigned
Part I of this
that: -
.
2. The employee may be granted
information in accordance
Industrial Security Manual
such authorization is hereby
3. The application is required
office for determination.
Date ?
By
(Signature)
( Name of Contractor)
.
(Typed name and tale of outhoraced represcntattue)
PART III - LIST OF COMMUNIST COUNTRIES
Albania
Bulgaria
Chinese Peoples Republic (Commwtist China) (including Tibet)
Cuba
Czechoslovakia
Democratic Peoples Republic of Korea ( North Korea)
Democratic Republic of Vietnam ( North Vietnam)
German Democratic Republic (GDR) (East Ocrmany, including the Soule, Sector of Berlin)
Hungary
Mongolian Peoples Republic (Outer Mongolia)
Poland
Rumania
Yugoslavia
Kurile Islands
South Sakhalin (Karafuto)
Union of Soviet Socialist Republics (USSR) (including Estonia, Latvia, Lithuania, and all , ,th .. r constituent republics)
DO eog... 48-2
I APR 74
EDITION OF I JAN 611 MAY BE USED UNTIL EXHAUSTED
217
Old
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
E. "Department of Defense Personnel Security Questionnaire (Updating)" (DD
Form 48-3). This form is used to obtain current personal data to process a
clearance action, when an individual with a security clearance is transferring
employment from one contractor to another contractor within a 12-month period
and requires a PCL in his or her new employment. It is also used in
converting a UA clearance to an industrial security clearance. This form is
prepared jointly by management and the individual being processed for the new
clearance. In the section to be completed by the employer, the form is
addressed to the DISCO, P.O. Box 2499, Columbus, Ohio 43216. However, forms
that pertain to OODEPs, which are submitted in conjunction with the FCL
application, or as a change thereto, shall be mailed to the CSO.
Declassified in Part - Sanitized Copy Approved for Release. 2012/08/17: CIA-RDP89B01356R000200350006-4
I..1.1.1 ! I . ,
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 48-3
SAMPLE
?
DEPARTMENT OF DEFENSE
PERSONNEL SECURITY QUESTIONNAIRE (Updating)
1 DATE FORM COMPLETED
(YYMMOO)
Form Approved
OMB No. 0704-000S
Expires May 31, 1990
Man: Failure to answer all quotient or any moretwesontation (by qmission or concealment. or by misleading, false, or partial answers) may
servo /pia basis for dental of clearance for act= tO classified Department of Defense information. In addition, Title 18. United States
Co4,1001, makes it a criminal offense. punishable by a maximum of 5 years imprisonment, 510.000 fine, or both, knowingly and
willfully a false statement Or representation to any Department or Agency of the United States as to any matter within the
Jurist of any Department or Agog) of the United States. This includes any statement made herein which is knowingly and
willfully incorrect, incomplete or misleading in any important particular.
INSTRUCTION* One (1) copy of
Safeguarding
cam?letely and
not apply will
INSTRUCTIONS TO EMPLOYEE:
completed form will be submitted by the contractor when prescribed by the industrial Security Manual for
Classified InfOrmatiOn to request transfer of clearance. Type or print all answers; form will not be accepted unless
properly executes. Use blank sheets for additional information, identifying by item number. Questions which do
be marked 'None.
This form is in three parts. Part I must be completed by your employer lofore you complete the other parts. You
must complete Part ill in private. Before filling in any part, you should familiarise yourself with all questions. Do not
sign this form without first reading the instructions in Part Ill.
PART l? TO BE COMPUTED BY EMPLOYER
i . TO:
DEFENSE INVESTIGATIVE SERVICE
DEFENSE INOUSTRIAL SECURITY CLEARANCE OfFKI
110X MR
C0LUMNS. 01110 4321111-313011
2. NAME OF EMPLOYER (if a subsidiary, include none of parent company)
3. ADDRESS OF EMPLOYER (Street, City, State. Zip Cod.)
4. COMMERCIAL AND GOVERNMENT ENTITY CODE
5. 1011 TITLE
6. CLEARANCE REQUESTED
c2 TRANSFER
IS
(X one)
CONVERSION
CONCURRENT
IN
1.1
7 DESCRIPTION OF EMPLOYEE'S DUTIES WHICH REQUIRE ACCESS TO CLASSIFIED
INFORMATION
8. CONTRACT NUMBER, WHEN APPLICABLE
9. SECURITY CLASSIFICATION OF MATERIALS OR IN-
FORMATION EMPLOYEE WILL HAVE ACCESS TO
I CERTIFY THAT THE ENTRIES MADE BY ME ABOVE ARE
TRUE, COMPLETE. ANO CORRECT TO THE /EST OF MY
KNOWLEDGE ANO BEUEF AND ARE MADE IN GOOD FAITH.
10a. SIGNATURE OF EMPLOYER OR DESIGNATED REPRESENTATIVE
b TELEPHONE NO.
PART II TO RI COMPLETED ST EMPLOYEE
1 NAME (Last, First &fiddle)
2. OTHER NAMES (Indicate alias, maiden name, (firrnar 4911 name, ete)
3 DATE OF BIRTH (YYMMOD)
4. SOCIAL SECURITY NUMBER
S SEX
6. PLACE OF 8 RTH (City, State, Country)
7 . COUNTRY OF CITIZENSHIP
Ba CURRENT RESIDENCE
ADDRESS (Street. City, State, or Other Political Subdivision, and Country)
b FROM (Oat. ? YYM141130,
9. LAST EMPLOYMENT AT WisiCH CLEARANCE WAS GRANTED
a. POSMON HELD
b. DATES OF EMPLOYMENT (YYMMOO)
(1) FROM (2) To
c. EMPLOYER NAME
d. EMPLOYER ADDRESS (Street, City, State, Zip Cede)
10. CLEARANCE
a. LEVEL
b. DATE GRANTED (YYMMOO)
c. GRANTED BY
11 LIST EACH FOREIGN GOVERNMENT, FIRM, CORPORATION. OR PERSON FOR WHOM You ACT OR HAVE ACTED AS A REPRESENTATIVE,
OFFICIAL OR EMPLOYEE IN THE PAST S YEARS. LIST ALL COMMUNIST GOVERNMENTS, FIRMS, OR CORPORATIONS FOR WHOM You
HAVE EVER ACTED IN SUCH CAPACITY ATTACH A STATEMENT FOR EACH AFFILIATION, AS REQUIRED BY PARAGRAPH 20 OF THE ISM
12. REMARKS
FURTHER INSTRUCTIONS: Do not complete PART III or the Certification at this time After completing PART II return the form to your
employer who will review it to assure that all entries are complete end the form is filled out properly. After your employer returns the forms to
you. then start PART III and follow instructions on reorse.side.
00 Form 416-3, JUL $7
Previous editions are obsolete.
219
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 48-3
Pogo Two
SAMPLE
PART ill ? PRIVACY SECTION
ENTRIES IN THIS SECTION ARE NOT SUBJECT TO REVIEW BY YOUR EMPLOYER.
When your responses to items 1-13 on page) of this form have been reviewed by your employer and returned to you.
proceed to complete items 13-18 in this section, sign where indicated at the bottom of the page, and follow the
instructions on page?. ,
13 ARRESTS ("Yes ' answers mum be explarned we ft. through r. Wow. Attach addationar Owees. it necessary.)
YES
NO
a. Have you ever been
whether the citation
in etalitary
arrested, charget crted. or mind
was drooped or dammed. or you
You may 'WWI moor traffic
by federal. state, or iocai law enforcement
found
Or juvenile authorities
all courWirtartiaf or non palm'
of SIO0 0,1w was
regardless of
were not guilty, (Mckide
visitations for which a hi'. or forternere
pranrstintent
impend units 'Nebel
nohile service.
miaow)
b As ? result of being
by or forfeited bond to
begarilksts of whether
arrested. charged.
federal.
cited. or Wild
other judicial
case has been
by law enforcement or juvenile
authority or adjudicated a youthful
'mired tron
authontnis. have you ever been cOnincted. fined
offender or juvenile detingsient
the court record)?
a nate, or
the record in your
or othenstse stricken
c. Nave you ever been detained, held in. or served time in any pia or prison. reform or industrial scnool, or any juvenile facility Or
institution under federal jurisdiction or The jurisdiction Of any city, county. state. possession. or foreign country?
d. Have you ever been. or are you now under suspended sentence, parole, or probation or awaiting any action on triages
against you?
e DATE
(yYM14001
f Off ERSE OR
VIOLATION
g. NAME AND LOCATION
Of POLICE AGENCY
h NAME AND LOCATION
Of COURT
PENALTY IMPOSED OR
OTHER DISPOSITION
la MEDICAUFINANCIAL (-Yes ' anSWOrf That be explained. Attach additional Mem if necessary.)
Y ES
NO
a Have you ever used any narcotic. depressant, stimulant. hallucinogen (including I-SO and PCP)or cannabis
Itatttash), incept as MfMnbed by a licensed tinirsialan'
and
(mending POSOnriena
b. have you ever been involved in the illegal purchase. possession. or sal* of any narcotic, delerlieseint, stimulant, nallusin09en? or
Cannabis?
c. Has your use of elephant beverages (has liquor, beer or wine) ever resulted in the loss of a fob, arrest by police, or treatment for
alcoholism Or resulted in 'Mclennan/ action'
d. Have you ever had
for
a mental, emotional. psychological, or personality disordiencondittorirproblern ?
or been treated
Have be declared
bankrupt or experienced other financial difficulty's?
e. you ever petitioned to
IS. ORGANIZATIONS
a. List allorgenizeaord except labor imam. and Mum referred to in b. Wow, to wrench you belong or prevrously belonged
(I) NAME
(2) ADDRESS
(3) TYPE
(I) FROM
(5) To
,
b. rhos' maven moot be improrsed rifted, acklinonal Mem it necessary.)
YES
NO
Are you now or have you ever been a member of the Communist Party or any Communist organization'
,(1)
(2) Me you now or hew
advocates the overthrow
comnimites Of act, of
alter the form of government
you ever been affiliated
of our commartionel
force
with
form of
deny other persons
States by unconstitutional
any organization. association, movement. group, or combination
has
of pemorn which
or approving the
States or which seeks to
government. or which adopted the policy of advocating
their ngfrls under the Constitution of the United
means?
or violence to
of the United
IC. SECURITY mithstmta ("Yoe anciheill meet be explained. arced, add/trona( sheets. it necessary)
YES
NO
hod denied.
Nave 'mover a security clearance revoked.
or suspended,
17 DISCHARGE ROM TIN ARMED FORCES (-Yes' answers must be explained. Attach midttronal sheets. it necessary)
YES
NO
discharged from
Armed forces under other than honorable conditions?
Have you INN been the
?
III. EMPLOYEE CERIIFICATION
I certify that the entries made by me are true, complete, and accurate to the best of my knowledge and belief
and are made in good faith. I understand that a knowing and willful false statement on this form can be
punished by fine, imprisonment, or both. (Ste Title IS. U.S. Code. Section 10001)
a. TYPED OR PRINTED NAME
b. SIGNATURE
c SOCIAL Stamm,
NUMSER
d DATE SIGNED
(YYMMOO)
DO Farm 411-3, JUL 87
Page 2 of 2 Pages
PRIVACY ACT STATEMENT FOR DO FORM 45-3
AUTI40111TY: Erecutive Order IONS, as amended by Executive Order 1090S, Safeguarding Information Within industry, Executive Order 9397,
November 1913 (SPI).
PRINOPAL PURPOIg: To determine the individual's eligibility for an Industrial Personnel Security Clearance.
ROUTINE LISEI: Used by DISCO to establish and maintain records of Industrial Personnel Security Clemente actions The Social Security Number is used
as the primary identifying factor in the system of records Access to or use of the personal information furnished is generally limited to authorized
federal Government employees, law enforcement and investigative agencies for official personnel security investigative and clearance functions and to
euthented contractor Personnel performing dement* processing duties interim notification to contractor leerbennin that a security clearance has
been issued may be transmitted over a Government Or Commercial telecommunicatiOns network. Thit interim notification will mtltiCle Me inclividuer
name and Social Security Number and the level and date of the security clearance Contractor access to privacy portions of all thersonniti Security
Questionnaires remains prohibited In the case of a Canadian or United Kingdom reciprocal personnel security clearance, or security assurance required
by any other foreign government. minimal information will be provided. as r?ClunttO
MOM: Voluntary; however, if the requested information is not provided further processing for a personnel security clearance will be
discontinued or action inniatod to withdraw any clearance presently in existence
Detached from DO Form 48-3, JUL $7
220
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 H,
, 1 .1.1 1 I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
F. "Department of Defense Personnel Security Questionnaire (Industrial)"
(DD Form 49). This form shall be used in making application for:
1. a U.S. citizen being considered for a TOP SECRET PCL,
2. a U.S. citizen being considered for any level of clearance, when the
individual advises that he or she is an RFI,
3. a U.S. citizen who has relatives or relatives of his or her
spouse who are residing in Designated countries,
4. an immigrant alien being considered for an LAA,
5. a citizen of a signatory country being processed for an LAA, and
6. a naturalized U.S. citizen from a Designated country being
considered for any level of PCL.
The form is prepared jointly by management and the person being considered for
clearance. In the section to be completed by the employer, the form should be
addressed to the DISCO, P.O. Box 2499, Columbus, Ohio 43216. However, forms
that pertain to OODEPs, which are submitted in conjunction with the FCL
application, or as a change thereto, shall be mailed to the CSO.
221
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 49
SAMPLE
SECTION I
PERSONNEL SECURITY QUESTIONNAIRE
INDUSTRIAL
DD FORM 49
DATA REQUIRED BY THE PRIVACY ACT OF 1974 (5 U.S.C. ?51521)
AUTHORITY: Internal Security Act of 1950 and Executive Order 101365, as amended by Executive Order 10909.
PRINCIPAL PURPOSES: To obtain background information for personnel security investigative and evaluative purposes in order to detenninwihe security eligi-
bility of Department of Defense contractors and employees of Department of Defense contractors for (1) acceu to classified information, or (2) assipunent to a
sensitive position.
ROUTINE USES: (I)Determine the scope of a personnel security investigation.
(2) Provide evaluators or adjudicators with personal history information relevant to personnel security determinations.
The information may be disclosed to other Federal agencies that are authorized under specific statutory or Executive authority to make personnel security
determinations.
A copy of the upon of personnel security investigation will be maintained by the Personnel Investigations Center of the Defense Investigative Service and may be
used in future security clearance determinations. You have the right to obtain a copy of the report of investigation and/or request amendment to the file.
MANDATORY OR VOLUNTARY DISCLOSURE AND EFFECT ON INDIVIDUAL OF NOT PROVIDING INFORMATION:
Voluntary. Failure, however, to furnish all or part of the information requested may result in (1) denial of access to classified information, or (2) non-selection for
asaipment to a sensitive position. Disclaim of your Social Security Number is necessary to fulfill requirements of the above cited authorities. It is intended that
this notice be retained for personal records.
GENERAL INSTRUCTIONS
THE ATTACHED PACKET OF MATERIAL CONSISTS OF TWO SECTIONS; SECTION I?A DD FORM 49 WORKSHEET PRINTED ON THE REVERSE OF
THESE INSTRUCTIONS AND THE DD FORM 49 PACKAGED AS A 5-COPY CARBON INTERLEAF SET; SECTION II ? A DD FORM 2221 AND AN
ORIGINAL AND ONE COPY OF THE PRIVACY SECTION. DETACH THE WORKSHEET AND COMPLETE ITEMS 116. WHEN YOU ARE SATISFIED THAT
ALL ITEMS ARE CORRECT AND COMPLETE IN ACCORDANCE WITH THE DETAILED INSTRUCTIONS WHICH YOU HAVE BEEN FURNISHED, TURN
THE WORKSHEET OVER TO YOUR EMPLOYER WHO WILL REVIEW IT TO ASSURE THAT ALL ENTIRES ARE COMPLETE AND ACCURATE. AT THIS
POINT ENTER THE ENTRIES FROM THE WORKSHEET ONTO THE DD FORM 49 5-COPY CARBON INTERLEAF SET USING A BALL-POINT PEN OR
TYPEWRITER (YOUR EMPLOYER MAY HAVE THE FORM TYPED FOR YOU). BE SURE YOU SIGN THE FORM AT THE Borrom UNDER THE
REMARKS SECTION. WHEN THE DD FORM 49 HAS BEEN COMPLETED AND SIGNED, COMPLETE SECTION II ? THE PRIVACY SECTION TO INCLUDE
ENTRY OF YOUR SIGNATURE. AND THEN SIGN AND DATE THE DD FORM 2221. PLACE ALL COMPLETED MATERIAL, TOGETHER WITH A
COMPLETED FD FORM 2513 (FINGERPRINT CARD) IN THE PRE-ADDRESSED ENVELOPE THAT HAS BEEN PROVIDED. SEAL THE ENVELOPE, SIGN
ACROSS THE ENVELOPE FLAP ON THE LINE PROVIDED AND AFFIX THE DATE OF SIGNATURE. DELIVER THE SEALED ENVELOPE TO YOUR
EMPLOYER IMMEDIATELY. IN COMPLETING THE PACKET OF MATERIAL, THE FOLLOWING APPLY:
? THE PERSONNEL SECURITY QUESTIONNAIRE (PSQ) IS AN IMPORTANT DOCUMENT AND MUST BE COMPLETED wrniour MISSTATE-
MENT OR OMISSION OF IMPORTANT FACTS. ALL ENTRIES ARE SUBJECT TO VERIFICATION BY INVESTIGATION.
? ENTRIES MUST BE TYPED OR PRINTED.
? IF ADDITIONAL SPACE IS REQUIRED FOR ANY ITEM, USE ITEM 16, "REMARKS." IF SPACE PROVIDED IN ITEM 16 IS INSUFFICIENT,
USE SEPARATE SHEET(S) OF PLAIN WHITE PAPER. WHEN ATTACHING ADDITIONAL SHEETS ALWAYS IDENTIFY THE ITEM NUMBER
BEING CONTINUED AND FOLLOW THE FORMAT FOR ENTERING INFORMATION PRESCRIBED ON THE FORM AND IN THE DETAILED
INSTRUCTIONS.
? ALL QUESTIONS MUST BE ANSWERED. IF AN ITEM IS NOT APPLICABLE INDICATE "NOT APPLICABLE." OR "N/A." DO NOT USE THE
TERM "UNKNOWN" FOR DATE OF EMPLOYMENT OR RESIDENCE. IF THIS INFORMATION IS NOT KNOWN PRECISELY, GIVE THE DATE
AS BEST YOU CAN RECALL FOLLOWED BY APPROPRIATE QUALIFYING LANGUAGE, E.G., "DATE ESTIMATED" OR "APPROX."
? UNLESS OTHERWISE SPECIFIED:
? ALL DATES SHOULD BE ENTERED IN TERMS OF YEAR AND MONTH USING THE LAST TWO DIGITS OF THE YEAR AND A TWO DIGIT
NUMBER REPRESENTING THE MONTH, E.G., JANUARY 1979 WOULD BE ENTERED AS 79-01 AND DECEMBER 1979 WOULD BE
ENTERED AS 79-12.
? ,NAMES OF PERSONS SHOULD BE ENTERED IN THE FOLLOWING ORDER: LAST NAME, FIRST NAME AND MIDDLE INITIAL.
? ADDRESSES SHOULD INCLUDE THE NUMBER AND STREET, CITY, STATE OR COUNTRY. AND ZIP CODE.
? BEFORE ENTERING ANY INFORMATION, READ CAREFULLY THE DETAILED INSTRUCTIONS PROVIDED WITH THE PACKET. IF AT ANY
TIME DURING COMPLETION OF THE MATERIAL, A QUESTION ARISES THAT DOES NOT APPEAR TO BE COVERED BY THE DETAILED
INSTRUCTIONS, CONTACT THE INDIVIDUAL OR OFFICE THAT PROVIDED YOU WITH THE MATERIAL.
222
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I]
I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 49
Page two
SAMPLE
DEPARTMENT OF DEFENSE
Personnel Security Questionnaire (INDUSTRIAL)
FORM APPROVED
ORM NO. 0704-0002
EXP. DATEs APR 30. 14013
b. MAIDEN NAME (If any)
DATE
1.a. LAST NAME?FIRST NAME?MIDDLE NAME
FOR DIS USE ONLY
2. ALIASES
3. a. SEX
b. RACE
4. SOCIAL SECURITY NUMBER
mpg
Female
5. DATE OF BIRTH
6. PLACE OF BIRTH
(Yeer?MOnth?Day)
a. CITY
b. COUNTY
c. STATE
d. COUNTRY
b.
7.a. U.S. CITIZENk
7 Yes 17 No
NATIVE
Yell No
c. IF NATURALIZED.
CERTIFICATE NO(s)d.
IF DERIVED. PARENT(S)
CERTIFICATE NO.(1)
a. DATE
f. PLACE
9. COURT
h. DUAL CITIZEN Yes I I No (If "Yes" we DETAILED INSTRUCTIONS.)
8. MILITARY SERVICE (Melnik ReserrelNational Gaterci.)
a. FROM
b. TO
c. BRANCH
d. RANK
e. SERVICE NO.(s)
f. COUNTRY
9. PREVIOUS
CLEARANCE DATA
Yos
NO
a. Have you ever been granted a security clearance?
If "Yes" give details below.)
LEVEL
DATE GRANTED
GRANTED BY
NAME OF EMPLOYER
for security clearance was pending? ("Yes" answer Mgt be explained in accordance with the
YeS
No
b. Have you ever terminated employment while request
DETAILED INSTRUCTIONS.)
10. FAMILY/ASSOCIATES (See DETAILED INSTRUCTIONS for persons to be listed.)
a. RELATIONSHIP AND NAME
b. DATE OF BIRTH
c. PLACE OF BIRTH
d. ADDRESS
e. CITIZENSHIP ..
FATHER
MOTHER (Maiden Nemo)
SPOUSE (Maiden Name)
FORMER SPOUSE
11. RESIDENCES (Nebo with current address?See DETAILED INSTRUCTIONS.)
a. DATES (Yr & Mo)
b.
STREET
c.
CITY
d.
STATE
s.
ZIP CODE
FROM
TO
NUMBER AND
Present
12. EMPLOYMENT
(ltectude selpernployntent, parstinee employment andlor unernployment.) (See DETAILED INSTRUC77ONS.)
a. DATES (Yr & ifo)
b.
NAME OF EMPLOYER
C.
ADDRESS
d.
ZIP CODE
?? SUPER-
VISOR
FROM
TO
'
Present
13. FEDERAL
SERVICE. FOREIGN TRAVEL/CONNECTIONS (If "Ya" sett DETAILED INSTRUCTIONS.)
Yin
NO
a. Have you ever been in the Federal Civil Service?
b. Have you traveled or resided abroad for other than the U.S. Government?
c. Do you have any foreign property or busing's connections or have you ever been employed by or actod see consultant or representative for a
foreign government, firm, or allollor?
To se COMPLETED BY EMPLOYER I a. LEVEL OF CLEARANCE I Too Secret SCI I I Other (Specify)
b. CITIZENSHIP VERIFIED I I Yet 1 I No I c. JOE TITLE
d. FEDERAL SUPPLY CODE I a. CONTRACT NUMBER
f. CERTIFICATION ? I certify that the above named individue is employed by this company and he. the need for the clearance indicated to perform on
classified contracts.
DATE
SIGNATURE OF EMPLOYER OR DESIGNATED REPRESENTATIVE
DDFORM 49
$s ion
Edition ef I FEB 74 May Bs Used Until Exhausted.
223
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 49
Page three
SAMPLE
14. EDUCATION Okra wIM kat school 4efended-34w DETAILED INSTRUCI7ONSJ
s. DATES (Tr& Mel
b.
NAME OF SCHOOL
e.
ADDRESS
d.
ZIP CODE
e.
DEGREE
P ROM
'to
111. CHARACTER REFERENCES (Lin 5 prod frIereds, co-workers. etc. -Sft DETAILED INSTRUCTIONS.)
a.
NAME
13. PER100
KNOWN
c.
ADDRESS
d.
TELEPHONE
1
II. REMARKS (A rade miernows, sisettg. Or neesallorY? )
.. -
-
DATE
SIGNATURE OF PERSON COMPLETING FORM
224
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. 1.1. I I hi- 1 ? I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 49
Pogo Four
SAMPLE
SECTION II
DEPARTMENT OF DEFENSE
AUTHORITY FOR RELEASE OF INFORMATION AND RECORDS
In accordance with the Privacy Act of 1974, I have been provided with
a copy of a statement advising me that certain information is required to assist the
Department of Defense in making a security determination concerning me and that
execution of this form is voluntary.
I hereby authorize and consent to the release of information and records
bearing on my posonal history, academic record, job performance and arrests and
convictions, if any, to Special Agents of the Department of Defense. The information
will be used for the purpose of determining my qualifications for employment with
the Federal Government, service in the Armed Forces, or access to classified infor-
mation. (Strike clauses not applicable.)
This authorization is valid for one year after my signing. Upon request,
a copy of this signed statement may be furnished to the school, present or former
employer, present or former landlord, criminal justice agency, or other person furnish-
ing such information or record.
DATE (Your. Mo. Davi
NAME MI)
SIGNATURE
DD ,:tr,? 2221
225
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 49
Page Five
SAMPLE
PRIVACY SECTION
ENTRIES IN THIS SECTION ARE NOT SUBJECT TO REVIEW BY YOUR EMPLOYER.
DO Form 40 have been reviewed by your evatalOYer and returned to you, you should proceed
at the bottom of the throe. and fallen the instructions contained in the DETAILED INSTRUCTION&
When your responses to items
items 17-21 in
1-16 on pages 1 and 2 of the
this section, sign where indicated
to complete
17. ARRESTS
mon be explained in e. through 1, below in 'mordancy with the DETAILED INSTRUCTIONS.) (Attach additional sheets,
('Yes" answers
I
Yea
No
if teimemery.
a. Have you ever been arrested, charted, cited, or held by Federal, state, or kcal
citation was dropped or dismissed, Or you were found not guilty? (Include
(Yost may exclude minor ree)Ic notations for which a fine or forfeiture of $100
leer enforcement or juvenile authorities
all courtemeartial or nos-judicial pmifelement
lest Unposed.)
the
service.
regardless of whether
Wide Minutia',
or was
b. Asa
bond
your
result of being wrested, charged, cited,
Federal,
or held by law enforcement or juvenile
authority or adjudicated a youthful
from Me court record)?
authorities, have you ever been
convicted, fined by or forfeited
(repudiate of whether the record he
to.
cose hes been "sealed"
stage, or other Peeler
offender or juvenile delinquent
or otherwise stricken
c. Have you ever been detained, held in,
the jurisdiction of any city, county, state.
in
reform or industrial school or any juvenile facility or institution under
or served time any jail or prison, or
Federal foreign
or country?
d. Have you ever been awarded, or are you
you?
parole, or probation or awaiting any action on charges against
now under suspended sentence,
0.
DATE
f. OFFENSE OR
VIOLATION
Ill? NAME AND LOCATION
OF POLICE AGENCY
h. NAME AND LOCATION
OF COURT
i? PENALTY IMPOSED OR
OTHER DISPOSITION
18. M ED
MAU F 1NANC IAL ("Yes" answers must be explained
in DETAILED
INSTRUCTIONS.) (Attach additional sheets, if necessary.)
accordance with the
Yes
No
a. Hoe you ever used
except as Proscribed
depressant, hallucinogen
include LSD or PCP) or Cannabis (to include
Imetelah )
any narcotic,
by licensed
stimulant, (to
marquis= or
a physician?
b. Have you ever been involved in the Mega
deprogram,
hallucinogen,
Cannabis?
purchase, siothession, or sale of any narcotic, stimulant,
or
e. Has your use of alcoholic
as liquor. bees wine) ever resulted in the las of a job, arrest by police,
treatment for
beverages (such
or alcoholism?
el. Have you ever had or been treated for ? mental, emotion., psychological, or personality disorder?
a. Have you ever petitioned to be declared bankrupt?
19. ORGANIZATIONS
a. (List all organisations, except labor unions and those referred to In b. below, to which you belong or previously belonged.)
i. NAME
ii. ADDRESS
ii. TYPE
W. FROM
v. TO
thews, If
b. ("Yes"
answers man be explained in accadance with the DETAILED INSTRUCTIONS.)
necessary.) '
(Attach additional
Yea
No
i. Are you now Or have you ever been a member of the COMMUMM Party Or any Convnunist organization?
is. Are you now or have you ever been affiliated
the overthrow of our constitutional form
force or violence to deny other persons
of the United States by unconstitutional
of
their
with any organization, association,
has
movement, group, or combination
the policy of advocating or approving
of the United States or which seeks
advocstes
of pen of
of persons which
the commission
to after the form of government
government, or which adopted
rights under the Constitution
means?
20. SECURITY
CLEARANCE ("Yes" answer must be explained in accordance with the DETAILED INSTRUCTIONS%) (Attach additional ~ets, if
necessary. )
Yea
No
Have you ever had a security clearance denied Or revoked?
21. DISCHARGE
FROM THE ARMED FORCES- ("Yes"
sheets If necemery.)
be In
with the DETAILED INSTRUCTIONS.) (Attach additional
anlIWI Matt explained accordance
Yoe
No
Have you ever been discharged from the Armed Forces under other than honorable conditions?
CERTIFICATION
I certify that the entries Made by me are true, complete, and at:curate to the best of my knowledge and belief and are made in good faith. I understand
that a knowing and wilful false statement on this form can be punished by line or imprisonment or both (See U.S. Cade. Title 18. Section 1001).
TYPED OR PRINTED NAME OF PERSON COMPLETING FORM
DATE
SIGNATURE OF PERSON COMPLETING FORM
226
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
G. "Department of Defense Contract Security Classification Specification"
(DD Form 254).
1. The completed DD Form 254, with attachments and supplements, as
applicable, is the basicdocument by which classification, regrading, and
declassification specifications are documented and provided to prime con-
tractors and subcontractors. It is designed to identify the specific items of
classified information involved in the contract that require security classi-
fication protection. Responsibility for preparation of the prime contract's
DD Form 254 rests with the contracting officer or the designated representa-
tive of the NA concerned, but the assistance of the contractor is encour-
aged. Based on the classification guidance received, each contractor is
responsible for developing the DD Form 254 for each classified subcontract,
request for proposal, or other solicitation let to subcontractor facilities.
The contractor shall submit the recommended DD Forms 254 for each classified
subcontract, other than service, graphic arts, or commercial carrier subcon-
tracts (see paragraph 60h) to the ACO for approval and distribution. When the
prime contractor receives a revised DD Form 254 that does not require a related
change in the subcontractor's DD Form 254, or receives written notice that the
biennial review has resulted in no change in the existing specification, he or
she shall reaffirm guidance to each subcontractor. The prime contractor does
this by providing a true copy of the notice of reaffirmation received by the
prime contractor or a true copy of pages 1 and 2 of the revised DD Form 254
received by the prime contractor annotated, "This revised DD Form 254 does not
affect your current DD Form 254 dated ." In either of
these cases, ACO/PCO authentication is not required.
2. The DD Form 254 embodies the concept that the sensitive information
itself shall be identified and assigned a proper classification, rather than
assigning a classification to media by which classified information could be,
or would likely be, conveyed. This method of classifying information rather
than media is intended to identify most precisely the functional matter that
is to be protected; thus providing, for example, the answer to the question:
"What is there about a specific item of hardware which causes it to be
classified?"
3. Whenever the prima contractor will be required to use classified GFE
or GFP in the performance of the contract, the contracting officer or the
designated representative shall inform the prime contractor what information
requires protection by furnishing a DD Form 254 or other appropriate notifi-
cation for each item of classified GFE or GFP to be used. The same procedure
shall be followed in those instances where previously classified equipment is
not government-furnished and the prime contractor is authorized to purchase
such classified equipment for use in the performance of his or her contract.
4. Items 1 through 14 and item 16 of the DD Form 254 provide the general
administrative and contractual information pertaining to the classification
specification of the classified effort. Item 15 of DD Form 254, with any
supplements and attachments, is used to provide the specified classification
downgrading and declassification information. Each item of the DD Form 254 is
to be completed; N/A shall be shown for items that are not applicable.
Classified information should not be entered on the DD Form 254. Classi-
fied information should be transmitted separately and appropriate reference
227
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
entered in item 15 of the DD Form 254. The following numbered instructions
correspond to the numbered items on the DD Form 254.
a. Item 1. Insert highest level of clearance required for access
to classified effort. If the facility requires a clearance higher than the
current clearance, the prime contractor may request the appropriate CSO to
upgrade the subcontractor's FCL.
b. Item 2. Check item a, b, or c, as applicable.
c. Item 3. In item 3a, enter the UA prime contract identification
number. In addition, if this DD Form 254 is for a subcontract of the first
tier, enter in item 3b the identification number of the first tier subcontract.
For second tier and beyond subcontracts, enter in item 9a or 15, as applic-
able, the identification number, and estimated date of completion or termina-
tion of the subcontract. If item 3c is used, enter appropriate data identify-
ing the RFP, RFQ, or IFB. If the solicitation is unclassified and the DD Form
254 is being used only to reflect access requirements of the contract/subcon-
tract to be awarded, annotate item lb o "Remarks" to indicate that preaward
access is not required and the DD Form 254 indicates classification guidance
for the contract/subcontract to be awarded. When reissuing a currently valid
subcontract DD Form 254 for a follow-on subcontract, indicate the new
subcontract number in item 3b.
d. Item 4. Furnish date for a, b, or c, as applicable.
e. Item 5. Check item a, b, or c, as applicable, and provide
complete data. For item b, also show revision number.
f. Item 6. Check "yes" or "no", as applicable. If "yes,"
complete items a and b, and in item c, indicate whether accountability is or
is not transferred.
g. Item 7. If there is a prime contract, complete items a, b, and
c, to show the complete name, address, FSC number, and the CSO of the prime
contractor's facility that will receive classified information in the perfor-
mance of the prime contract listed in item 3a. If there is no prime contract
and item 3c is completed, enter instead in items a, b, and 6, the name,
address, and FSC number of the contractor's facility to which this DD Form 254
is to be sent in connection with the RFP, RFQ, or IFB, and the CSO of that
facility.
h. Item 8. If there is a first tier subcontract, complete items
a, b, and c, to show the complete name, address, and FSC number of the subcon-
tractor's facility that will receive classified information in the performance
of the subcontract listed in item 3b. If there is no first tier subcontract
and item 3c is completed, enter instead the name, address, and FSC number of
the subcontractor's facility to which this DD Form 254 is to be sent in
connection with the RFP, RFQ, or IFB, and CSO of that facility.
i. Item 9. If there is a second tier subcontract, complete items
a, b, and c to show the complete name, address, FSC number, and CSO of the
subcontracror's facility that will receive classified .information in perfor-
mance of the subcontract listed in item 3b. In item 9a, also provide the
228
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 1 L. [ I I 1I I
A A..
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
second tier subcontract number and estimated date of completion. If there is
no second tier subcontract and item 3c is completed, enter instead the name,
address, FSC number, and the CSO of the facility to which this DD Form 254 is
to be sent in connection with the RFP, RFQ, or IFB. For subcontracting beyond
the second tier, enter in item 15, or furnish on an attached sheet, the
information specified above for that tier subcontractor and the CSO of that
facility.
j. Item 10. Under item a, provide a brief, yet sufficiently
complete, unclassified statement to identify the nature of the procurement.
If an unclassified statement cannot be made, enter the word "classified."
Under item b, furnish the DoD AAD number of the U.S. Government procuring
activity (identified in item 16d). For all subcontractors and first and
second tier RFPs, RFQs, and IFBs enter "N/A." Under item c, check appropriate
block to indicate whether or not contract prescribes security requirements
that are additional to those described in the DD Form 441 and this manual. If
applicable, the UA shall furnish a copy of the special security requirements
to the contractor, the ACO, if any, and the CSO. Under item d, check appro-
priate box to indicate if any elements of the contract are outside the inspec-
tion responsibility of the CSO. If "Yes," explain in item 15 and identify
specific areas or elements. However, discretion must be used in identifying
other "specific areas or elements," so that disclosure restrictions are
respected.
k. Item 11. Check appropriate box for each item listed. Use the
"Remarks" block to elaborate as necessary 1/. If DTIC or Defense Information
Analysis Center services are requested, the DD Form 1540 and DD Form 1541
should be prepared and processed, in accordance with component implementations
of DoD Instruction 5200.21. Whenever possible, the DD Form 1540 should be
prepared and forwarded simultaneously with the DD Form 254.
1. Item 12. In subcontracting situations, item b will contain the
signature and typed name and title of the FSO or the designated repre-
sentative issuing the subcontract. Inquiries pertaining to classification
guidance, determinations, or interpretations shall be directed to this
official.
m. Item 13. Subcontractors of all tiers shall be instructed, via
item b, to submit proposed public releases through the prime contractor listed
in item 7a who will then process the release in accordance with the guidance
provided in the DD Form 254 for the prime contract.
n. Item 14. Read and closely observe the instructions presented
at the top half of the item. Check applicable block(s) to indicate the manner
in which the security classification guidance is conveyed for this classified
effort. Classified narratives or guides shall always be transmitted under
1/ The entry into a controlled area, per se, will not constitute access to
classified information, if the security measures which are in force prevent
the gaining of knowledge of the classified information. Therefore, the entry
into a controlled area under conditions that prevent the gaining of knowledge
of classified information will not necessitate a PCL.
229
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
separate cover. When item b is checked, list guide(s) under item 15 or in an
attached list. When item c is checked, enter in item 15 the appropriate in-
structions from paragraph 60h. (See paragraph 5 below for an explanation of
commonly used terms.) Check item d if this is a final DD Form 254 and item 6
has a "No" answer. Check item e and provide date for review when biennial
review of DD Form 254 is required.
o. Item 15. Should be used for remarks, as appropriate.
p. Item 16. The contracting officer or authorized designee, after
reviewing the DD Form 254 to ensure adequacy, will affix his or her signature
in item c, and items b, d, and e, will be completed to furnish appropriate
identifying information concerning the approving official.
5. Narratives or classification guides used to provide the security
classification specifications and the downgrading and declassification
instructions should clearly identify the specific details of information that
warrant security protection against unauthorized disclosure. It is important
to ensure that statements of classification are clear enough to be easily
understood and applied readily in determining which items of information in
the contractual effort require a security classification. To assist the writer
and user of the security classification specification, there are listed below
several terms, which are commonly used in the description of that information
which may require classification, together with their generally accepted
meanings. However, this does not preclude inclusion of terms devoted to a
particular classified effort or an additional page(s) of the narrative/guide.
a. Accuracy. This refers to the precision with which the designed
function is performed.
b. Altitude. The vertical distance of a level, a point, or an
object considered as a point that is measured from mean sea level is the
altitude.
not possible.
not possible.
(1) Maximum. This is the altitude beyond which performance is
(2) Minimum. This is the altitude below which performance is
(3) Optimum. This is the altitude spread at which performance
is most satisfactory or effective.
c. Blast Effect. This refers to the destruction of, or damage to,
structures and personnel by the force of an explosion on or above the surface
of the ground. Blast effect may be contrasted with the cratering and ground
shock effects of a projectile or charge that goes off beneath the surface.
d. Circular Error Probability. An indicator of the delivery accu-
racy of a weapon system that is used as a factor in determining probable
damage to a target is the circular error probability. It is the radius of a
circle within which half of the missiles/projectiles are expected to fall.
230
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 'J1IiI .
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOD )Z.1(3.-11-11
e. Command and Control System. This refers to the facilities,
equipment, communications, procedures, and personnel essential to a commander
for planning, directing, and controlling operations of assigned forces pursuant
to the missions assigned.
f. Counter-Countermeasures Capability. Design features of the end
item that are intended specifically to overcome enemy interference make up the
counter-countermeasures capability. (Electronic counter-countermeasures is
that division of electronic warfare involving actions taken to ensure friendly
effective use of the electromagnetic spectrum despite the enemy's use of
electronic warfare. Electronic countermeasures is that division of electronic
warfare involving actions taken to prevent or reduce an enemy's effective use
of the electromagnetic spectrum.)
g. Depth. Depth is the vertical distance from the plane of the
hydrographic surface to a level, a point, or an object considered as a point
below the surface.
(I) Maximum. This is the depth below which performance is not
(2) Minimum. This is the depth above which performance is not
(3) Optimum. This is the depth spread at which performance is
most satisfactory or effective.
h. Design Information. This refers to a technique, principle, or
design feature, or the unique application thereof, which in and of itself
requires classification. The design information that requires protection must
be specified.
i. End Item. This refers to a final combination of end products,
component parts, ;a757 materials that is ready for its intended use, for
example, ships, tanks, mobile machine shops, and aircraft.
j. Endurance. Endurance is the time an aircraft can continue
flying or a ground vehicle or ship can continue operating under specified
conditions, for example, without refueling.
k. Formula or Material. The chemical or physical nature of the
ingredient(s) and its proportions make up a formula or material of which all,
or part of, the end item is composed.
1. Fuel or Propellant. Source of energy. Type. Identification of
fuel/propellant.
m. Initial Operational Capability. This is the first attainment
of the capability to employ effectively a weapon, item of equipment, or system
of approved specific characteristics, which is manned or operated by an ade-
quately trained, equipped, and supported military unit or force.
possible.
possible.
231
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
n. Lethality/Critical Effects. The ability to cause a specified
degree of damage to the target or to incapacitate personnel (including physical,
physiological, and psychological effects) is described as lethality/critical
effects.
o. Maneuverability. This is the ability to change position or
direction.
p. Military Application. The military application is the use or
purpose for which the end item is intended in sufficient detail that perform-
ance and/or tactical application is revealed or implied.
q. Military Characteristics. Those characteristics of equipment
which reflect its ability to perform desired military functions are military
characteristics. Military characteristics include physical and operational
characteristics, but not technical characteristics.
r. Mission. A mission is the task, together with the purpose,
which clearly indicates the action to be taken and the reason therefor.
s. Operational Characteristics. Those military characteristics
which pertain primarily to the functions to be performed by equipment, either
alone or in conjunction with other equipment, are operational characteristics.
For example, for electronic equipment, operational characteristics include
such items as frequency coverage, channeling, type of modulation, and
character of emission.
t. Operational Readiness (Alert) Time/Time Cycle. This refers to
the sequence and duration of important operations to be performed on or by the
end items or specified component thereof during a normal cycle of function
such as emplacement, loading and firing/launching, and warm-up prior to
operation.
u. Orbit/Trajectory. The path of travel is the orbit/trajectory.
v. Range. The distance between any given point and an object or
target is the range. This also refers to the extent or distance limiting the
operation or action of something, such as the range of an aircraft, ship, or
gun.
(1) Maximum. This is the greatest distance attainable.
(2) Minimum. This is the shortest distance attainable or
allowable.
(3) Optimum. This is the range spread at which performance is
most satisfactory or effective.
w. Reliability. This is the probability that the design function
will be performed at or for a specified time and/or within specified limits.
x. Resolutions. This refers to the ability to analyze
characteristics of a complex nature (such-as signals and target signature
characteristics) and to distinguish between them.
212
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
uou chu.zz-ri
y. Signature Characteristics. Acoustic, magnetic, thermal, radio-
logical, mechanical, electromagnetic, and similar phenomena that are critical
to the operation of the end item or a component thereof, or that identify or
reveal its presence are signature characteristics.
z. Speed/Velocity. This is the rate of movement or motion.
(1) Maximum. This is the greatest speed/velocity attainable.
(2) Cruising. This is the speed/velocity at which greatest
efficiency is attained.
(3) Take-off or Launching. This is the speed/velocity needed
to initiate flight.
(4) Landing. This is the speed/velocity needed in terminating
flight.
(5) Acceleration and/or Deceleration. This is the rate of
change of speed/velocity.
aa. System Capability. This refers to the maximum number of
operations that the end item can perform simultaneously in carrying out its
design function.
ab. Technical Characteristics. Those characteristics of equipment
that pertain primarily to the engineering principles involved in producing
equipment possessing desired military characteristics are technical character-
istics. For example, for electronic equipment, technical characteristics
include such items as circuitry and types and arrangement of components.
ac. Terminal Ballistics. Terminal ballistics are the effects and
actions of a missile or projectile when it impacts or bursts at the target.
ad. Thrust. Thrust refers to the impelling force delivered.
(1) Classes -- maximum thrust expressed as an approximation or
within a grouping
(2) Specific -- exact maximum thrust
(3) Specific Impulse -- amount of thrust in pounds that can be
. maintained for one second by one pound of fuel
ae. Vulnerability. Vulnerability refers to the susceptibility to
defeat by the enemy.
233
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 254
SAMPLE
?
DEPARTMENT OP DEFENSE
CONTRACT SECURITY CLASSIFICATION SPECIFICATION
I. THE REQUIREMENTS OF THE 000 INDUSTRIAL SECURITY MANUAL
APPLY TO ALL SECURITY ASPECTS OF THIS
EFFORT. THE FACILITY CLEARANCE REQUIRED IS:
2.
THIS SPECIFICATION
IS FOR:
3. CONTRACT MUMMER OR OTHER
IDENTIFICATION HUMMER
(Prime centract? must as siomen
to. all essicontracts)
4.
DATE TO SE
COMPLETED
(Estimated)
S. THIS SPECIFICATION IS:
See "NOTE.' below. If item ho. e Is ..X?61...
oleo enter date for item ?)
a.
Pomp: CONTRACT
a. PRIME CONTRACT NUMIER
a.
a.
OniGisi?L (Ceraohnii
dme: in all etteem)
DATE
b. 'UDC AAAAA CT(Uee iss.
15 for animentracling
beyond eocand NW)
A. FIRST TIER SUSS AAAAA CT NO.
b.
S. REVISED 1ilV1StON
(imPermedee NO.
Weiglivoldrene
DATE
?? mcoucsr FOR oto.
REQUEST FOR SAL
OR REG FOR QUOTATION
C. IDENTifrit?Ttoot
C. DUE DATE
C.
FINAL
OATS
S. Is this a lellomen contract) ci Yes 0 Ne. If TES. couplet* the following:
a. b. e. Accountability for classified matmial on preceding canine'
PRECEDING CONTRACT NUM?Ele DATE COMPLETED
L-1 Is c:] Is net. Pensioned to this felleenen ceramist.
7s. Nemo. Address a Zip Cede of Prism CoNtracter ?
A. ?SC Number
C. Name. Address it Zip Cow. of Cognisant Security Offic?
S. Nemo. Addros? li Zip Cads of Firet Ti., Stelicestrectes ?
A. PSC Ninebet
c. Name, Address a Zip Cede of Cognisant Security Office
Sa. Name. Adams. It Zip Cede ef Seceined Tier Saleamitneeter. Sr
facility Esseciated with IFIL RI?P OR RPQ ?
IL ?SC Number
e. N. Addams A Zip Cede of Cegnimal Security Office
..
? "hes astual performance Is at ? latetien Miser Masi that specified. Identify such ether lerain311 in nem IS.
10a. Goseral Itietatifieatioe ef the Procuromewt fear eritich this specification impale*
A. DeDAAD Number of Procuring Activity
Identified in Item I6d.
1-114 Sr 1.113. 1111? 0 Yes (D No. If YES. Idemify Me
C. Are there sdditimial security naggiressent? milablished is sccardame with paragraph
penistest e?Mrsetuni doeunteMs in It.. IS.
d. Are any element? of this commit outside the issapecties respellsibil IY 114 ii?? e?feisION eecINNY "'IWO 7-1 yes C.73 Ne. If YES. mallein in
It. IS and identify epecific anies et elements.
11. ACCESS ItE01.11 5
YES
_
NO
ACCESS REQUIREMENTS (Continsiod)
YES
NO
a. Access te Classified lidarmatien OW, at ether
,
i. Access te SENSITIVI COMPARTMENTED INFORMATION.
k. Assess 10 MINN Special Aceoss Program Misnliellein
(SINielly in Nem IS).
eentracter/Ciemnimeat activities.
S. R?neili1 of sielisMod desumests Sr ether material
fro 4...
L Assess to U. S. claosified infonnetien eutaid? the U. S.
Patinas Casa& Zane. Puerta Rice. U. S. Pessessiess
end Trust Territories.
lefertellef "sly t Preeraries)
C. Reaelpt mid gesersties el classified dasammits
er eihkr einterial.
us. Defesas Chinuinenlatien Center or Defeam infonaisies
Awalysis Center Services may be requested.
d. Fabricatien/Medifie?Hen/lhorage ef classified Itanbesn.
?. Graphic en? services eall:.
a. Classified ADP processing will be Prreived.
I. Access to IPO Isiennallea.
a. REMARKS:
g. Accems to RESTRICTED DATA.
It. Access Is classified COMSEC Infermatioa.
I. Cryptegraphie Access Autlierisatimi required.
12. Refer all questions penalising le mentrect security classification specification te the efficiel named below (NORMALLY. Hwy ACO (ltm. 100):
EMERGENCY, direst atilt eiritten reseed of hapoiry mml response to ACO) Mau whim cantracter i'm einicannacta).
a. The classification gullanc? committed In this specificalles amid attachments referenced herein is complete and edeimene.
Typed Mies,
Activity name. address. Zip Cede. telephone number and office ?yiebul
A. IMMO, tills Innd ?Ignalum of simpala/pmMei manierir Sr
designated official
C.
,td= (Madinat Spec, ficetion atom 5.) I. metttarify Mr CORSTOCINO to men* classified inkinitatien. Reeised end Pine, Specifications Monte Sb and c) mil
for to It redrodest classified Infermotion &mil actions by contractors shall be taken in accordance with the provisions
eatherity contractor. mow*
at Ike Industrial Security Manuel.
/
DD I Fjr475254
234
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DO Form 254
Pogo Two
SAMPLE
13... tratenaeiton serialising to clissifled contracts or projects. even though such antermstion is considered unclessitled. shall not be Messed ter public
a dlasentinstior curets as provided by the Industrie' Security Noma" (Perairella So end APPerafte IX).
b. Premised public rel shall be submitted for appeoval prier to release .
to the Directorme Per Freedom et Information arid Security Review. Office
So the Industrial Security Manual.
- 1 Direct 1-... 3 Through (lmetty):
of the Assistant Secretary if Defense (Public Aliment) ? fee f?flOO1 Is
Security Mmeired.
ectoderm* utak parogreph of
? In the came et non?CMD Clem Atomslee, see teetneie. Dereermin Se. Industrial
IS. Secturity Classification Syseificatimis In. Otis solleitatiort,coatract as. idemified
Amy narrative or classificaties guide(*) tiansialted shall be anaotated as have
is
below (Pro eppilseate tiox(vm) end supply atfashosote es mgelred).
to Priieieei7 lifeelif, **eh "PPP? if
inforstatieet egOiladed chrerlY sea
utilised. that Portion of the IlliiMMe) Pertsielieli is the speed** eeeffeefeel
is *Weed. each invilividual mirth's of tbe guidit(s) oltieh MIMMIte le the
inteematioa ideatifited
11110/11.1111106 which requires ? sloosificallois. Rhea a cisesificatisa geld*
Ohms
effort sum be eatratetod and biemishod the cavorester. a total guide(*)
coatrastual effort shall be clearly Identified la BOO lab. The toiletries lakevastioa
lass Imams' es guides
(I) Category of classificatioa. (II) Date or event for declassification et rewire
(If OPPIIceithP).
The official named In hem 12b. Is responsible ter turaisisimi the contrasts,
asset be provided ter sash item of elassified
fa
for deolaseilleatlea. sal am The dune Of avoid defOOSIMIlai
copies of all guides sod cheeses thereto that as emit* ? part of this
comer.
cover sod Peas ? Pert of this OPOOlti?Oti?O?
specification. Classified infemaation num be Sloshed or furnished coder meerate
El.. A completed narrative le (I) 0 attached. or (2) 0 trifOOMMO111 matier sePerste
IT.. The follserinS elessifiestioe guide(*) is made ? pert of this sive?Ificeilea end Is (I) p attached. or (2) 0 tramemitted under separate
awl data).
fOO?f. ((.1st iltanikee uneler Item IS or in ms rittechesens by into. reference ~nem
elrfewfiefelm).
Lla. Service-type ceetract/subeeatract. (SMircify inetructiene in OCOOFISOOCO
rid. "X" only It this Is ? :Iasi speciflemloo sad Nes 6 is ? PNO"
relegation of the identified classified material Is auliserised
0 tv. Ammitil maim, of this DO Farm 254 is required. It Prd??? provide
with iSR/ISat so
In meponse to the emstreatees molest doled .
eveserer.
ter ? period of
date swell review Is due: ?
Itheeteato cheseincetlea. deeleeeffleartan.
and It appIlerirbe, ibmweermilin. inernieneitit).
IS. Reesselis (Riteverver poimiNpfe. proper
IS.. Contract Security Classification Sposilleatlovie tor Subcontracts issuing
as mithortsod. ml. Centres* Security Clessiticatioa
treat Ode cormem will be appeased by the *Mee named la It lee below, sr
herein are appresed by the User
Specification sad attachemat? 1.1???????
by the prima coatrector.
Sammy Covered:Oa, Off leer or his Represmitstive named In It. lab below.
RILQUIRRD DISTRIBUTIONS
0 Prime Coatrotter Mom 7a)
0 Co...lama Smolt, Office (Item 75)
El Administrative Cestresting Office Moo 160
0 cloolity Assurasece Ilearesentative
0 Subcoatrastor Mem fa)
El Comtism's Security Office (Dem Sc)
0 Program/Prejeet Manager Mem 1210 -
= U. S. Activity Respormible tee Chnffil??? Security Admialeustioa
ADDITIONAL. DISTRIMITION:
0
C1
b. Typed name sad title of respresiag official
c. Signature
4. Approving ottlitlees ...than, address emi Zip Cede
e. Nam. eddress and Zip Code of Adatististrallso CastreetIng Office
235
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
H. "Applicant Fingerprint Card" (FD Form 258). This form is completed for
all personnel being considered by DISCO for a PCL or a reciprocal clearance.
Completion of the form is a prerequisite to the granting of such actions.
Care shall be exercised to ensure that fingerprints are authentic, legible,
and complete, as forms that do not meet prescribed standards shall be returned
for reexecution, which will result in clearance delays.
236
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
FD Form 258
SAMPLE
1. LOOP
FEDERAL BUREAU OF INVESTIGATION
UNITED STATES DEPARTMENT OF JUSTICE
WASHINGTON, D.C. 20537
CENTER
OF LOOP
DELTA
THE LINES BETWEEN CENTER OF I
LOOP AND DELTA MUST SHOW
2. WHORL
MESE LINES RUNNING SEIWEEN
DELTAS MUST SE CLEAR
3. ARCH
ARCHES HAVE NO DELTAS
APPLICANT
To CONN CLASSOIMIS C174011MONTS.
1. LIU 111A01 PONTOS INK
2 OSMIUM INK SWOT ON INKONS UN.
3. WAIN AND OUT MOOS 1140110UGHLy
? eau PINGIOS 111040 Niko TO NAN. ANO Av010 ALLOWING MOOS 10 SUP.
S. OS SUM IMPOSSIONS Alt INC011010 IN COMO One.
? IP AN AMPUTATION 00 011101401Ty MMUS IT 1000611111 TO WONT A P01011. MAKI A NOTATION TO TWAT IIPPICT
IN T1411 INDIVIDUAL PINGO KOCK
7 0 sopa ONTSICAL CONDITION MAIM IT MPOS1I111 TO OBTA04 POMO DOMINIONS. SUMMIT HO INV /NM CA01 SO
COTA10410 wins AMINO STAKED 101111CM? IXPLAIMPO Till cocumsTmon.
S. SWAIM Till COMPUTE, POINTS TO sal If nary CAN SI CLASSINIO. NAMPOL IN Awe imat MOST rammammara
PALL INTO TI41 FATIMA 11408414 ON TINS CARO MONO 'array., cccua amalommotv ADO AM NOT IMMO NM.
THIS CARD FOR USE BY:
I. LAW ItOOKIMINT AGINCIES IN FINCOWIIINTING AMU-
CANTS POO LALT0 INFOIKINENT POSMONIL ?
2 OPPICIMS OP STATE AND LOCAL oovemammos POO
poSIS Of IMPLOTTAINT. LOMOND ATM marmn, AS NITTA&
Imo av STATE STATUTES AND APP102040 irf 1111 MN:NNW
6110111AL OP T141 UNITIO %TAM IOCAL ANO COUNTY ow
mamas, IMMO SPICIPKAUT SAM ON APPLICATIO
s7Aolos DO NOT SATINY THIS INCIWINTIONT ?
U.S. DOVOTINMINT AGENCIES *01 0101 01118111 110101111
IV RONA (Ars ??
4 23212ffiLlaugagouLoommiwejim
uutiumages TO MOWN Co iwortioN 110 DICIOITY
01 111011 INSTITUTIONS.
INSTSUCTIONe
?1. Men KNOT POST N 0001110 111110U011 1111 PPM&
mom STAN. marmacanom Ou111AU. m40 ONLY 1110.1101018.
01001S POO 10000 NO DISCIUMMYING NKOMO NAS OWN POMO
LOCALLY SHOULD SI MAMORU PC* Oil SIMICII.
2. rowacy ACT Of 1114 (P.1.. 034701 WARM THAT MOW.
STATS 0111 LOCAl ACIMPOIS magam moramums 114011 SOCIAL
WWI,/ MOANS IS 11110WIST10 m4871401 SUCH DISCLOSUIll IS
NANDATOWT OR vOlUNTAry, sAMS Of P411140.11TY POI 0(04
8:Welland& AND ISIS weN04 WILL II kmal OP IT.
??3. ornor OP NINA" CONWIACT0118 SHOULD 111 SHOWN
WACI -INPLOYINI AHD A00411W Till CONT111104311 IS TO
NAmil Of MI AGENCY SUOMITTING TNT araommean CA10 TO
1141 MIL
4. TEl 1001111, if KNOWN. SNOOD 4flN 1110110100 1*
Till APPOOPINATh SPACE.
ToTSCIRLAMIOUS NO. ? NICOOD: 011410 ADAM KAM= NO-
'moron No. (002 MON INIGASTIATION NO. (AO). PONT 118
Cum,/ CA110 NO. (PS). Waive SOTHICE NO. OM. TOWNS'
AGNANDWATION moms NO. NAI.
nowt Isms u.s. Govsstosasrr nu worms OFFICE: maio ? 401.318
?
J*HEflUWE ILAN
237
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
FD Form 258
Page Two
/APPUCANT
SAMPLE
111014AMIN MINN 144104111MMIM
{RAVE 11~
IMMO OP MIMI 1111401IMMO
Mfl
5.041MUlli OP WICK TMINS MONIIMMITS
IMPLOMII MO MOMS
bum wiameraw
TYPE OR PRINT AU INFORMATION IN SLACK
UM mem mem MST 44^441 MOW 4.1M4
ALIASti
0MINERIP
0
USDISOCIOZ
DIS NACC
FT HOLABIRD MD
LEAVE KANK
DATE 01,11M14
Mosill Oft Tim
min NO. tacji
MUSD MM. M. mu
166111151114-4511E-1
triewAssoimmet.
IMO
CLAN
lea
NAL 1:011:11
vs
.1.40 PERTH ea
II. MUM
IL L. 1141M1
11. NOV
I.
IMMIJI
LL
?
LEFT FOUR FINGERS TRION IIIMATAIREOUSLY
L. THUM
4. L. Mit
?
11 I.linip
N. I. 1"41
MONT Mult 41446/11$ Tmeta IMATIMOM.v
238
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 V I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I.. "Request for Visit or Access Approval" (DOE F 5631.20). This form is
included for information purposes. It is used for processing visits involving
access to RESTRICTED DATA. Copies of this form may be obtained from the DOE.
Insert the office
and address of DOE
Manager having
operational control
over the installation
to be visited.
Insert contracting
activity and addres
SAMPLE
0011P111111 PP MIIIINff
ISSN IIIKWOOT POO VISIT OM AMMO APPROVAL
Iftromig 0/14171
NM eft am/ swam W aa/somm,
1.
of User Agency no_
supporting the
visit request.
Enter the full nameft.....m.m...01..
of each proposed
visitor and his
social security
number.
State the purpose
of the visit in
sufficient detail
to enable the
addressee to ascer-
tain the subject
area involved, and
to determine the
level and scope of
access required.
Classified informa-
tion will not be dis-
closed in this item.
PUT A
ONN
irepr
Spam . .04
41MON
"*.Z.=.111.1"="41.1.="""?
???? eV
1101111Ineall..4:11MMONO
FT6
???? Or
-MO
rem ammo
Mr*" 4 >4>4 04
O 0 44
00 t.) 44
O410
Q 23
00
ct
O 44 hi
I. 4?1 0 Nfe41.-41
1 ?r4 U
0 hi 0 ?rt >4 04 04 04 04 04 04 04 04 04 >4
44 0 14 94
0 14 44 44
?t31 g ?
???1
.4 ...
hi 0 ?-?
0 44 )4
04 hi 14 4.) CA
4./ U 4.1 44 41
O V oi 44 A o4 o4
41 ? ?r4 10 U
01 1:3 13 0
04 U3 . . . ? ? ? ? ? ? . ?
...., . . . . ? ? ? ? ? ? ?
. ? . . ? ? ? ? . . .
. . . ? ? ? ? ? ? . .
. ? ? ? ? ? ? ? . . .
. ? . ? ? ? ? ? . . ?
N .
. .
. .
. ? ? ? ?
? ? ? ? .
. .
. .
41 ? . . ? ? ? ? . . ?
? . . ? ? ? ? . ? .
? ? . ? ? ? ? ? . . .
U3 ? Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix IV. REQUIREMENTS FOR THE CONSTRUCTION OF
STORAGE VAULTS AND STRONGROOMS
A. Application. This appendix specifies the minimum standards required
for the construction of vaults and strongrooms used as storage facilities
for classified material, in accordance with paragraph 14 of this manual.
These standards apply to all new construction and reconstruction, altera-
tions, modifications, and repairs of existing vaults or strongrooms. They
will also be used for evaluating the adequacy of existing vaults and
strongrooms.
B. Class A Vault.
1. Floor and Walls. The thickness of the floor and walls must be
determined by structural requirements, but may not be less than 8-inch-thick
reinforced concrete. Walls are to extend to the underside of the roof/ceiling
slab above.
2. Roof/Ceiling. The roof or ceiling must be a monolithic reinforced
concrete slab of a thickness to be determined by structural requirements, but
not less thick than the walls and floors.
3. Vault Door and Frame Unit. The vault door and frame unit shall be
one that was originally procured from the FSS if.
4. Lock and Locking Parts. The lock shall conform to Underwriters'
Standard No. 768 Group I-R. It shall be equipped with a "top-reading, spy-
proof type dial." The UL label is considered adequate evidence of compliance
with these requirements. Axial play on the level handle spindle shall not
exceed 1/16 inch. The locks, lock bolt, door bolt operating cam, and bolt
operating linkage connected thereto shall be protected by a tempered steel
alloy hardplate located in front of the parts to be protected. Such hardplate
to be at least 1/4 inch in thickness and to be in the Rockwell hardness range
of C-63 to C-65. The front plate, edge plates, back plates, and cap sheet
shall be of manufacturers' standard construction. The cap sheet of the door
will have an inspection plate of such size that its removal will permit
examination and inspection of the combination lock and operating cam area
without removal of entire back cap sheet of the door.
5. Miscellaneous Opening. Omission of all miscellaneous openings is
desirable, but not mandatory. However, in all instances openings for heating
and ventilating ducts, pipes, and conduits shall not exceed 96 square inches
in size. Pipes and conduits entering the vault shall enter through walls
1/ Vault doors are listed in the FSS (FSC Group 71, Part III, Section E,
FSC Class 7110). Vaults equipped with doors that do not meet these
specifications may qualify as strongrooms, if the construction meets the
minimum requirements outlined in paragraph F of this appendix.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
u
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
that are not common to the vault and the structure housing the vault.
Preferably such pipes and conduits should be installed when the vault is
constructed. If this is not practical, they shall be carried through
snug-fitting pipe sleeves cast in the concrete. After installation, the
annular space between the sleeve and the pipe or conduit shall be caulked
solid with lead, wood, waterproof (silicone) caulking, or similar material,
which will give evidence of surreptitious removal. The construction standards
for man-safe barriers outlined in paragraph F-5 shall be followed when
securing openings.
C. Class B Vault.
I. Floor. The floor should be a monolithic concrete construction of
the thickness of adjacent concrete floor construction, but not less than 4
inches thick.
2. Walls. The walls should be not less than 8-inch-thick brick,
concrete block, or other masonry units. Hollow masonry units shall be the
vertical cell type (load bearing) filled with concrete and steel reinforcement
bars. Monolithic steel-reinforced concrete walls at least 4 inches thick may
also be used, and shall be used in seismic areas. Walls are to extend to the
underside of the roof or ceiling above.
3. Roof/Ceiling. The roof or ceiling must be a monolithic reinforced
concrete slab of a thickness to be determined by structural requirements.
4. Vault Door and Frame Unit. See paragraph B3.
5. Lock. See paragraph B4.
6. Miscellaneous Openings. See paragraph B5.
D. Class C Vault.
1. Floor. See paragraph Cl.
2. Walls. Walls must be not less than 8-inch-thick hollow clay tile
(vertical cell double shells) or concrete blocks (thick shells). Monolithic
steel-reinforced concrete walls at least 4 inches thick may also be used.
Where hollow clay tiles are used and such masonry units are flush, or in
contact with, facility exterior walls, they shall be filled with concrete and
steel-reinforced bars. Walls are to extend to the underside of the
roof or ceiling above.
3. Roof/Ceiling. See paragraph C3.
4. Vault Door and Frame Unit. See paragraph B3.
5. Lock. See paragraph B4.
6. Miscellaneous Openings. See paragraph B5.
276
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
E. Structural Design. In addition to the requirements given above, the
wall, floor, and roof construction shall be in accordance with nationally
recognized standards of structural practice. For the vaults described above,
the concrete shall be poured in place, and will have a minimum 28-day
compressive strength of 2,500 pounds per square inch.
F. Strongrooms. A strongroom, as referred to in paragraph 14a(3)(f), shall
be considered to be an interior space of the cleared facility or complex (see
paragraph 3t) enclosed by, or separated from, other facility spaces by four
walls, a ceiling, and a floor, all of which are constructed of solid building
materials. Under this criterion, rooms having a false ceiling, and walls
constructed of fabrics, wire mesh, or similar materials, shall not qualify
as a strongroom. For strongrooms not located within a complex, the floor,
ceiling, or wall(s) that is an exterior part of the building and less than
18 feet from the ground or from an access point, or adjoining another
firm's space, shall be constructed as outlined in paragraphs Cl, C3, and
D2, respectively. Advise regarding use of solid building materials in
strongroom construction may be provided by the CSO. Specific construction
standards are as follows.
1. Hardware. Heavy-duty builder's hardware shall be used in con-
struction. Al]. screws, nuts, bolts, hasps, clamps, bars, 2-inch square
mesh of No. 11 gage wire (hereinafter referred to as "wire mesh"), 18 gauge
expanded metal, hinges, pins, and the like, shall be securely fastened to
preclude surreptitious entry and ensure visual evidence of tampering.
Hardware accessible from outside the area shall be peened, brazed, or
spot-welded to preclude removal.
2. Walls and Ceilings. Construction shall be of plaster, gypsum board,
metal, hardboard, wood, plywood, or other materials offering similar resistance
to, and evidence of, unauthorized entry into the area. Insert-type panels
shall not be used.
3. Floors. Floors shall be of solid construction, utilizing materials
such as concrete, ceramic tile, and wood.
4. Windows. Window openings less than 18 feet from an access point
(such as, another window outside the area, roof, ledge, or door) shall be
fitted with 1/2 inch bars (separated by no more than 6 inches), plus cross-
bars to prevent spreading, 18 gauge expanded metal, or wire mesh securely
fastened on the inside to preclude surreptitious removal. In addition to
being kept closed at all times, the window shall be translucent or opaqued by
any practical method, such as painting or covering the inside of the window.
5. Miscellaneous Openings. Openings for ducts, pipes, registers, sewers
and tunnels of such size and shape as to permit unauthorized entry, for example,
in excess of 96 square inches, shall be equipped with man-safe barriers such
as wire mesh, 18 gauge expanded metal, or steel bars of at least 1/2 inch in
diameter extending across their width with a maximum space of 6 inches between
the bars. The steel bars shall be securely fastened at both ends to preclude
removal, with crossbars to prevent spreading. Where wire mash, expanded
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
metal, or steel bars are used, care shall be exercised to ensure that classi-
fied material within the room cannot be removed with the aid of any type of
instrument.
6. Doors. Doors shall be substantially constructed of wood or metal.
When windows, panels, or similar openings are used they shall be secured with
18 gauge expanded metal or wire mash securely fastened on the inside. The
windows shall be translucent or opaqued. When doors are used in pairs, an
astragal (overlapping molding) shall be installed where the doors meet.
7. Door Louvers and Baffle Plates. When used, they shall be reinforced
with wire mesh fastened inside the room.
8. Door Locking Devices. Doors shall be secured by either a built-in
three-position dial-type changeable combination lock or a three-position
dial-type changeable combination padlock, as specified in paragraph 14a(3)(d),
which is secured to the door by a solid metal hasp.
G. Approvals,. The CSO and the contractor shall agree on the need to
establish, and tho extent of, the vault or strongroom prior to the award of
the contract, when possible, or subsequently when the need for such areas
become apparent during the performance on the contract.
278
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix V. REQUIREMENTS FOR THE CONSTRUCTION OF CLOSED AREAS
A. Application. This appendix specifies the minimum safeguards and standards
required for the construction of closed areas that are used for safeguarding
classified material, in accordance with the provisions of section IV of this
manual. These criteria and standards apply to all new construction and
reconstruction, alterations, modifications, and repairs of existing areas.
They will also be used for evaluating the adequacy of existing areas.
B. Requirements.
1. Hardware. Heavy duty builder's hardware shall be used in con-
struction, and all screws, nuts, bolts, hasps, clamps, bars, 2-inch square
mesh of No. 11 gage wire (hereinafter referred to as "wire mesh"), 18 gauge
expanded metal, hinges, pins, and so on, shall be securely fastened to
preclude surreptitious removal and ensure visual evidence of tampering.
Hardware accessible from outside the area shall be peened, pinned, brazed,
or spot-welded to preclude removal.
2. Walls. Construction shall be of plaster, gypsum wallboard, metal
panels, hardboard, wood, plywood, or other opaque materials offering similar
resistance to, and evidence of, unauthorized entry into the area. If insert-
type panels are used, a method shall be devised to prevent the removal of such
panels without leaving visual evidence of tampering. Area barriers up to a
height of 8 feet shall be of opaque or translucent construction, where visual
access is a factor. If visual access is not a factor, the area barrier walls
may be of wire mesh, or other non-opaque material offering similar resistance
to, and evidence of, unauthorized entry into the area.
3. Windows. Window openings less than 18 feet from an access point
(for example, another window outside the area, roof, ledge, or door,) shall be
fitted with 1/2-inch bars (separated by no more than 6 inches), plus cross-
bars to prevent spreading, 18 gauge expanded metal, or wire mesh securely
fastened on the inside. When visual access is a factor, the windows shall be
kept closed and locked at all times, and shall also be made translucent or
opaque by any practical method, such as painting or covering the inside of the
glass. During non-duty hours, the windows shall be closed and securely
fastened to preclude surreptitious removal of classified material.
4. Doors. Doors shall be substantially constructed of wood or metal.
When windows, panels, or similar openings are used, they shall be secured with
18 gauge expanded metal or with wire mash securely fastened on the inside. If
visual access is a factor, the windows shall be translucent or opaqued. When
doors are used in pairs, an astragal (overlapping molding) shall be installed
where the doors meet.
5. Door Louvers or Baffle Plates. When used, they shall be reinforced
with 18 gauge expanded metal or with wire mesh fastened inside the area.
279
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I 11 1 i Lt 1 i 1 1 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
6. Door Locking Devices. Entrance doors shall be secured with either
a built-in three-position dial-type changeable combination lock, a three-
position dial-type changeable combination padlock, as specified in paragraph
14a(3)(g), or with one of the key-operated padlocks with high security cylin-
ders as described in paragraph 34a(3). Other doors shall be secured from the
inside with a panic bolt (for example, actuated by a panic bar); a dead bolt;
a rigid wood or metal bar (which shall preclude "springing"), which extends
across the width of the door and is held in position by solid clamps,
preferably on the door casing; or by other means approved by the CSO.
7. Ceilings. Ceilings shall be constructed of plaster, gypsum
wallboard material, panels, hardboard, wood, plywood, ceiling tile, or other
material offering similar resistance to and detection of unauthorized entry.
Wire mesh, or other non-opaque material offering similar resistance to, and
evidence of, unauthorized entry into the area may be used if visual access to
classified material is not a factor. When wall barriers do not extend to the
ceiling and a false ceiling is used it shall be reinforced with wire mesh, 18
gauge expanded metal, alarmed as outlined in paragraph 35, or otherwise
secured with heavy-duty builder's hardware. (This feature also applies when
panels are removable and entry can be gained into the area without visible
detection.) When wire mesh or expanded metal are used, they must overlap the
adjoining walls and be secured in a manner which precludes removal without
leaving evidence of tampering. In those instances where barrier walls of an
area extend to a solid ceiling, there is no necessity for reinforcing a false
ceiling.
8. Ceilings (Unusual Cases). It is recognized that instances arise so
that contractors may have a valid justification for not erecting a solid sus?
pended ceiling as part of the areas, especially in high-ceilinged hangars. The
contractor may state that it is impractical to use a suspended ceiling because
of his or her production methods, such as the use of overhead cranes for the move-
ment of bulky equipment within the area. There are also cases wherein the air
conditioning system may be impeded by the construction of a solid suspended
ceiling (for example, AIS Centers). At times, even the height of the
classified material may make a suspended ceiling impractical. In such cases,
special provisions shall be made to ensure that surreptitious entry to the
area cannot be obtained by entering the area over the top of the barrier walls
(such as, approved motion detection devices). Areas of this type should be
closely scrutinized to ensure that the structural safeguards are adequate to
preclude entry via adjacent pipes, catwalks, ladders, and the like, or
observation, if visual access in a factor.
9. Miscellaneous Openings. Where ducts, pipes, registers, sewers, and
tunnels are of such size and shape as to permit unauthorized entry, for example,
in excess of 96 square inches, they shall be secured by 18 gauge expanded metal
or wire mesh, or, where more practical, by steel bars at least 1/2-inch in
diameter extending across their width, with a maximum space of 6 inches
between the bars. The steel bars shall be securely fastened at both ends to
preclude removal and shall have crossbars to prevent spreading. When wire
mesh, expanded metal, or steel bars are used, care must be exercised to ensure
that classified material cannot be removed through the openings with the aid
of any type instrument. Care shall be taken to ensure that a barrier placed
across any waterway (sewer or tunnel) will not cause clogging or offer
obstruction to the free flow of water sewage.
280
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix VI. EXTRACTS OF THE ESPIONAGE AND SABOTAGE ACTS, OTHER
FEDERAL CRIMINAL STATUTES, AND EXECUTIVE ORDER 12356
U.S.C. 18 ? 371. Conspiracy to commit offense or to defraud the United States
If two or more persons conspire either to commit any offense against the
United States, or to defraud the United States, or any agency thereof in any
manner or for any purpose, and one or more of such persons do any act to
effect the object of the conspiracy, each shall be fined not more than $10,000
or imprisoned not more than five years, or both.
U.S.C. 18 ? 641. Public money, property or records
Whoever embezzles, steals, purloins or knowingly converts to his use
or the use of another, or without authority, sells conveys or disposes of
any records, voucher, money or thing of value of the United States or of any
department or agency thereof, or any property made or being made under
contract for the United States or any department or agency thereof or;
Whoever receives, conceals, or retains the same with intent to convert
it to his use or gain, knowing it to have been embezzled, stolen, purloined
or converted
Shall be fined not more than $10,000 or imprisoned not more than ten
years, or both; but if the value of such property does not exceed the sum
of $100, he shall be fined not more than $1,000 or imprisoned not more
than one year, or both.
The word "value" means face, par, or market value, or cost price,
either wholesale or retail, whichever is greater.
U.S.C. 18 ? 793. Gathering, transmitting, or losing defense information
(a) Whoever, for the purpose of obtaining information respecting the
national defense with intent or reason to believe that the information is to
be used to the injury of the United States, or to the advantage of any foreign
nation, goes upon, enters, flies over, or otherwise obtains information con-
cerning any vessel, aircraft, work of defense, navy yard, naval station, sub-
marine base, fueling station, fort, battery, torpedo station, dockyard, canal,
railroad, arsenal, camp, factory, mine, telegraph, telephone, wireless, or
signal station, building, office, research laboratory or station or other place
connected with the national defense owned or constructed, or in progress of
construction by the United States or under the control of the United States, or
of any of its officers, departments, or agencies, or within the exclusive
jurisdiction of the United States, or any place in which any vessel, aircraft,
arms, munitions, or other materials or instruments for use in time of war are
being made, prepared, repaired, stored, or are the subject of research or
development, under any contract or agreement with the United States or any
department or agency thereof, or with any person on behalf of the United
States, or otherwise on behalf of the United States, or any prohibited place
so designated by the President by proclamation in time of war or in case of
national emergency in which anything for the use of the Army, Navy, or Air
Force is being prepared or constructed or stored, information as to which
281
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. 11 1 IIIII I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
prohibited place the President has determined would be prejudicial to the
national defense; or
(b) Whoever, for the purpose aforesaid, and with like intent or reason to
believe, copies, takes, makes, or obtains, or attempts to copy, take, make, or
obtain, any sketch, photograph, photographic negative, blueprint, plan, map,
model, instrument, appliance, document, writing, or note of anything connected
with the national defense; or
(c) Whoever, for the purpose aforesaid, receives or obtains or agrees or
attempts to receive or obtain from any person, or from any source whatever, any
document, writing, code book, signal book, sketch, photograph, photographic
negative, blueprint, plan, map, model, instrument, appliance, or note of any-
thing connected with the national defense, knowing or having reason to believe,
at the time he receives or obtains, or agrees or attempts to receive or obtain
it, that it has been or will be obtained, taken, made, or disposed of by any
person contrary to the provisions of this chapter; or
(d) Whoever, lawfully having possession of, access to, control over, or
being entrusted with any document, writing, code book, signal book, sketch,
photograph, photographic negative, blueprint, plan, map, model, instrument,
appliance, or note relating to the national defense, or information relating to
the national defense which information the possessor has reason to believe
could be used to the injury of the United States or the advantage of any
foreign nation, willfully communicates, delivers, transmits or causes to be
communicated, delivered, or transmitted or attempts to communicate, deliver,
transmit or cause to be communicated, delivered or transmitted, the same to any
person not entitled to receive it, or willfully retains the same and fails to
deliver it on demand to the officer or employee of the United States entitled
to receive it; or
(e) Whoever, having unauthorized possession of, access to, or control
over any document, writing, code book, signal book, sketch, photograph, photo-
graphic negative, blueprint, plan, map, model, instrument, appliance, or note
relating to the national defense or information relating to the national
defense which information the possessor has reason to believe could be used to
the injury of the United States or to the advantage of any foreign nation,
willfully communicates, delivers, transmits or causes to be communicated,
delivered, or transmitted, or attempts to communicate, deliver, transmit or
cause to be communicated, delivered, or transmitted the same to any person not
entitled to receive it, or willfully retains the same and fails to deliver it
to the officer or employee of the United States entitled to receive it; or
(f) Whoever, being entrusted with or having lawful possession or control
of any document, writing, code book, signal book, sketch, photograph, photo-
graphic negative, blueprint, plan, map, model, instrument, appliance, note,
or information, relating to the national defense, (1) through gross negligence
permits the same to be removed from its proper place of custody or delivered
to anyone in violation of his trust, or to be lost, stolen, abstracted, or de-
stroyed, or (2) having knowledge that the same has been illegally removed from
its proper place of custody or delivered to anyone in violation of his trust,
or lost, or stolen, abstracted, or destroyed, and fails to make prompt report
of such loss; theft, abstraction, or destruction to his superior officer --
282
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Shall be fined not more than $10,000 or imprisoned not more
than ten years, or both.
(g) If two or more persons conspire to violate any of the foregoing pro-
visions of this section, and one or more of such persons do any act to effect
the object of the conspiracy, each of the parties to such conspiracy shall be
subject to the punishment provided for the offense which is the object of such
conspiracy.
U.S.C. 18 f 794. Gathering or delivering defense information to aid foreign
governments
(a) Whoever, with intent or reason to believe that. it is to be used to
the injury of the United States or to the advantage of a foreign nation, com-
municates, delivers, or transmits, or attempts to communicate, deliver, or
transmit, to any foreign government, or to any faction or party or military or
naval force within a foreign country, whether recognized or unrecognized by
the United States, or to any representative, officer, agent, employee,
subject, or citizen thereof, either directly or indirectly, any document,
writing, code book, signal book, sketch, photograph, photographic negative,
blueprint, plan, map, model, note, instrument, appliance, or information
relating to the national defense, shall be punished by death or by imprison-
ment for any term of years or for life.
(b) Whoever, in time of war, with intent that the same shall be communi-
cated to the enemy, collects, records, publishes, or communicates, or attempts
to elicit any information with respect to the movement, numbers, description,
condition, or disposition of any of the Armed Forces, ships, aircraft, or war
material of the United States, or with respect to the plans or conduct, or
supposed plans or conduct of any naval or military operations, or with respect
to any works or measures undertaken for or connected with, or intended for the
fortification of defense of any place, or any other information relating to
the public defense, which might be useful to the enemy, shall be punished by
death or by imprisonment for any term of years or for life.
(c) If two or more persons conspire to violate this section, and one or
more of such persons do any act to effect the object of the conspiracy, each
of the parties to such conspiracy shall be subject to the punishment provided
for the offense which is the object of such conspiracy.
U.S.C. 18 ? 795. Photographing and sketching defense installations
(a) Whenever, in the interests of national defense, the President defines
certain vital military or naval installations or equipments as requiring pro-
tection against the general dissemination of information relative thereto, it
shall be unlawful to make any photograph, sketch, picture, drawing, map, or
graphical representation of such vital military and naval installations or
equipment without first obtaining permission of the commanding officer of the
military or naval post, camp, or station, or naval vessels, military and naval
aircraft, and any separate military or naval command concerned, or higher
authority, and promptly submitting the product obtained to such commanding
officer or higher authority for censorship or such other action as he may deem
necessary.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(b) Whoever violates this section shall be fined not more than $1,000 or
imprisoned not more than one year, or both.
U.S.C. 18 5 796. Use of aircraft for photographing defense installations
Whoever uses or permits the use of an aircraft or any contrivance used,
or designed for navigation or flight in the air, for the purpose of making a
photograph, sketch, picture, drawing, map, or graphical representation of vital
military or naval installations or equipment, in violation of section 795 of
this title, shall be fined not more than $1,000 or imprisoned not more than
one year, or both.
U.S.C. 18 f 797. Publication and sale of photographs of defense installations
On and after thirty days from the date upon which the President defines
any vital military or naval installation or equipment as being within the
category contemplated under section 795 of this title, whoever reproduces,
publishes, sells, or gives away any photograph, sketch, picture, drawing, map,
or graphical representation of the vital military or naval installations or
equipment so defined, without first Obtaining permission of the commanding
officer of the military or naval post, camp, or station concerned, or higher
authority, unless such photograph, sketch, picture, drawing, map, or graphical
representation has clearly indicated thereon that it has been censored by the
proper military or naval authority, shall be fined not more than $1,000 or
imprisoned not more than one year, or both.
U.S.C. 18 5 798. Disclosure of classified information
(a) Whoever knowingly and willfully communicates, furnishes, transmits,
or otherwise makes available to an unauthorized person, or publishes, or uses
in any manner prejudicial to the safety or interest of the United States or
for the benefit of any foreign government to the detriment of the United
States any classified information --
(1) concerning the nature, preparation, or use of any code, cipher,
or cryptographic system of the United States or any foreign government; or
(2) concerning the design, construction, use, maintenance, or repair
of any device, apparatus, or appliance used or prepared or planned for use by
the United States or any foreign government for cryptographic or communication
intelligence purposes; or
(3) concerning the communication intelligence activities of the
United States or any foreign government; or
(4) obtained by the processes of communication intelligence from the
communications of any foreign government, knowing the same to have been obtained
by such processes --
Shall be fined not more than $10,000 or imprisoned not more
than ten years, or both.
(b) As used in subsection (a) of this section --
284
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
The term "classified information" means information which, at the
time of a violation of this section, is, for reasons of national security,
specifically designated by a United States Government Agency for limited or
restricted dissemination or distribution;
The terms "code," "cipher," and "cryptographic system" include in
their meanings, in addition to their usual meanings, any method of secret writ-
ing and any mechanical or electrical device or method used for the purpose of
disguising or concealing the contents, significance, or meanings of communi-
cations;
The term "foreign government" includes in its meaning any person or
persons acting or purporting to act for or on behalf of any faction, party,
department, agency, bureau, or military force of or within a foreign country,
or for or on behalf of any government or any person or persons purporting to
act as a government within a foreign country, whether or not such government
is recognized by the United States;
The term "communication intelligence" means all procedures and
methods used in the interception of communications and the obtaining of infor-
mation from such communications by other than the intended recipients;
The term "unauthorized person" means any person who, or agency which,
is not authorized to receive information of the categories set forth in subsec-
tion (a) of this section, by the President, or by the head of a department or
agency of the United States Government which is expressly designated by the
President to engage in communication intelligence activities for the United
States.
(c) Nothing in this section shall prohibit the furnishing, upon lawful
demand, of information to any regularly constituted committee of the Senate or
House of Representatives of the United States of America, or joint committee
thereof.
U.S.C. 18 6 799. Violation of regulations of the National Aeronautics and
Space Administration
Whoever willfully shall violate, attempt to violate, or conspire to vio-
late any regulation or order promulgated by the Administrator of the National
Aeronautics and Space Administration for the protection of security of any
laboratory, station, base or other facility, or part thereof, or any aircraft,
missile, spacecraft, or similar vehicle, or part thereof, or other property or
equipment in the custody of the Administration, or any real or personal prop-
erty or equipment in the custody of any contractor under any contract with the
Administration or any subcontractor of any such contractor, shall be fined not
more than $5,000, or imprisoned not more than one year, or both.
U.S.d. 18 f 2153. Destruction of war material, war premises, or war utilities
(a) Whoever, when the United States is at war, or in times of national
emergency as declared by the President or by the Congress, with intent to in-
jure, interfere with, or obstruct the United States or any associate nation in
preparing for or carrying on the war or defense activities, or, with reason to
believe that his act may injure, interfere with, or obstruct the United States
?RS
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LI. I.
1111 I I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
or any associate nation in preparing for or carrying on the war or defense
activities, willfully injures, destroys, contaminates or infects or attempts to
so injure, destroy, contaminate or infect so any war material, war premises,
or war utilities, shall be fined not more than $10,000 or imprisoned not more
than thirty years, or both.
(b) If two or more persons conspire to violate this section, and one or
more of such persons do any act to effect the object of the conspiracy, each
of the parties to such conspiracy, shall be punished as provided in subsection
(a) of this section.
U.S.C. 18 5 2154. Production of defective war material, war premises, or war
utilities
(a) Whoever, when the United States is at war, or in times of national
emergency as declared by the President or by the Congress, with intent to in-
jure, interfere with, or obstruct the United States or any associate nation in
preparing for or carrying on the war or defense activities, or, with reason to
believe that his act may injure, interfere with, or obstruct the United States
or any associate nation in preparing for or carrying on the war or defense
activities, willfully makes, constructs, or causes to be made or constructed in
a defective manner, or attempts to make, construct, or cause to be made or con-
structed in a defective manner any war material, war premises or war utilities,
or any tool, implement, machine, utensil, or receptacle used or employed in
making, producing, manufacturing, or repairing any such war material, war
premises or war utilities, shall be fined not more than $10,000 or imprisoned
not more than thirty years, or both.
(b) If two or more persons conspire to violate this section, and one or
more of such persons do any act to effect the object of the conspiracy, each
of the parties to such conspiracy shall be punished as provided in subsection
(a) of this section.
U.S.C. 18 5 2155. Destruction of national-defense materials, national-defense
premises or national-defense utilities
(a) Whoever, with intent to injure, interfere with, or obstruct the
national defense of the United States, willfully injures, destroys, contam-
inates or infects, or attempts to so injure, destroy, contaminate or infect
any national-defense material, national-defense premises, or national-defense
utilities, shall be fined not more than $10,000 or imprisoned not more than
ten years, or both.
(b) If two or more persons conspire to violate this section, and one or
more of such persons do any act to effect the object of the conspiracy, each of
the parties to such conspiracy shall be punished as provided in subsection (a)
of this section.
U.S.C. 18 f 2156. Production of defective national-defense material,
national-defense premises or national-defense utilities
(a) Whoever, with intent to injure, interfere with, or obstruct the
national defense of the United States, willfully makes, constructs, or
attempts to make or construct in a defective manner, any national-defense
286
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
material, national-defense premises or national-defense utilities, or any
tool, implement, machine, utensil, or receptacle used or employed in making,
producing, manufacturing, or repairing any such national-defense material,
national-defense premises or national-defense utilities, shall be fined not
more than $10,000 or imprisoned not more than ten years, or both.
(b) If two or more persons conspire to violate this section, and one or
more of such persons do any act to effect the object of the conspiracy, each
of the parties to such conspiracy shall be punished as provided in subsection
(a) of this section.
U.S.C. 50 ? 421. Protection of indentities of certain United States
Undercover Intelligence Officers, Agents, Informants, and Sources
(a) Whoever, having or having had authorized access to classified
information that identifies a covert agent, intentionally discloses any
information identifyingsuch covert agent to any individual not authorized
to receive classified information, knowing that the information disclosed so
identifies such covert agent and that the United States is taking affirma-
tive measures to conceal such covert agent's intelligence relationship to
the United States, shall be fined not more than $50,000 or imprisoned not
more than ten years, or both.
(b) Whoever, as a result of having authorized access to classified
information, learns the identity of a covert agency and intentionally
discloses any information identifying such covert agent to any individual
not authorized to receive classified information knowing that the informa-
tion disclosed so identifies such covert agent and that the United States is
taking affirmative measures to conceal such covert agent's intelligence
relationship to the United States, shall be fined not more than $25,000 or
imprisoned not more than five years, or both.
(c) Whoever, in the course of a pattern of activities intended to
identify and expose covert agents and with reason to believe that such
activities would impair or impede the foreign intelligence activities of
the United States, discloses any information that identifies an individual
as a covert agent to any individual not authorized to receive' classified
information, knowing that the information disclosed so identifies such
individual and that the United States is taking affirmative measures to
conceal such individual's classified intelligence relationship to the
United States, shall be fined not more than $15,000 or imprisoned not more
than three years, or both.
As used in this Section --
(1) The term "classified information" means information or material
designated and clearly marked or clearly represented, pursuant to the
provisions of a statute or Executive order (or g regulation or order issued
pursuant to a statute or Executive order), as requiring a specific degree of *
protection against unauthorized disclosure for reasons of national security. *
(2) The term "authorized," when used with respect to access to
classified information, means having authority, right, ur permission
pursuant to the provisions of a statute, Executive order, directive of the
287
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H j LI Li_ 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
head of any department or agency engaged in foreign intelligence or
counterintelligence activities, order of any United States court, or
provisions of any Rule of the House of Representatives or resolution of the
Senate which assigns responsibility within the respective House of Congress
for the oversight of intelligence activities.
(3) The term "disclose" means to communicate, provide, impart,
transmit, transfer, convey, publish, or otherwise make available.
(4) The term "covert agent" means --
(A) an officer or employee of an intelligence agency or a member
of the Armed Forces assigned to duty with an intelligence agency --
(i) whose identity as such an officer, employee, or a
member is classified information, and
(ii) who is serving outside the United States or has within
the last five years served outside the United States; or
(B) a United States citizen whose intelligence relationship to
the United States is classified information, and --
(i) who resides and acts outside the United States as an
agent of, or informant or source of operational assistance to, an
intelligence agency, or
(ii) who is at the time of the disclosure acting as an agent
of, or informant to, the foreign counterintelligence or foreign
counterterrorism components of the Federal Bureau of Investigation; or
(C) an individual, other than a United States citizen, whose past *
or present intelligence relationship to the United States is classified
information and who is a present or former agent of, or a present or former
informant or source of operational assistance to, an intelligence agency.
(5) The term "intelligence agency" means the Central Intelligence
Agency, a foreign intelligence component of the Department of Defense, or
the foreign counterintelligence or foreign counterterrorism components of
the Federal Bureau of Investigation.
(6) The term "informant" means any individual who furnishes informs- *
tion to an intelligence agency in the course of a confidential relationship
protecting the identity of such individual from public disclosure.
(7) The terms "officer" and "employee" have the meanings given such
terms by section 2104 and 2105, respectively, of title 5, United States
Code.
(8) The term "Armed Forces" means the Army, Navy, Air Force, Marine
Corps, and Coast Guard.
(9) The term "United States," when used in a geographic sense, means *
all areas under the territorial sovereignty of the United States and the
Trust Territory of the Pacific Islands.
288
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(10) The term "pattern of activities" requires a series of acts with a
common purpose or objective.
U.S.C. 50 ? 797. Security regulations and orders; ipenalty for violation
(a) Whoever willfully shall violate any such regulation or order as,
pursuant to lawful authority, shall be or has been promulgated or approved by
the Secretary of Defense, or by any military commander designated by the
Secretary of Defense, or by the Director of the National Advisory Committee
for Aeronautics, for the protection or security of military or naval aircraft,
airports, airport facilities, vessels, harbors, ports, piers, waterfront
facilities, bases, forts, posts, laboratories, stations, vehicles, equipment,
explosives, or other property or places subject to the jurisdiction, admin-
istration, or in the custody of the Department of Defense, any Department or
agency of which said Department consists, or any officer or employee of said
Department or agency, or of the National Advisory Committee for Aeronautics or
any officer or employee thereof, relating to fire hazards, fire protection,
lighting, machinery, guard service, disrepair, disuse or other unsatisfactory
conditions thereon, or the ingress thereto or egress or removal of persons
therefrom, or otherwise providing for safeguarding the same against destruc-
tion, loss, or injury by accident or by enemy action, sabotage or other
subversive actions, shall be guilty of a misdemeanor and upon conviction
thereof shall be liable to a fine of not to exceed $5,000 or to imprisonment
for not more than one year, or both.
(b) Every such regulation or order shall be posted in conspicuous and
appropriate places.
288.1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
_? 1..1.t
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
PRESIDENTIAL DOCUMENTS
Title 3-- Executive Order 12356 of April 2, 1982
The President National Security Information
TABLE OF CONTENTS [FR
Page]
Preamble [
Part 1. ORIGINAL CLASSIFICATION
1.1
Classification Levels
[
]
1.2
Classification Authority
[
]
1.3
Classification Categories
[
]
1.4
Duration of Classification
[
]
1.5
Identification and Markings
[
]
1.6
Limitations on Classification
[
1
Part 2. DERIVATIVE CLASSIFICATION
2.1
Use of Derivative Classification
[
]
2.2
Classification Guides
[
Part 3. DECLASSIFICATION AND DOWNGRADING
3.1
Declassification Authority
[
]
3.2
Transferred Information
[
]
3.3
Systematic Review for Declassification
[
]
3.4
Mandatory Review for Declassification
[
]
Part 4. SAFEGUARDING
4.1
General Restrictions on Access
[
4.2
Special Access Programs
[
]
4.3
Access by Historical Researchers and Former Presidential Appointees.[
I
Part 5. IMPLEMENTATION AND REVIEW
5.1
Policy Direction
[
]
5.2
Information Security Oversight Office
[
]
5.3
General Responsibilities
[
]
5.4
Sanctions
[
]
Part 6. GENERAL PROVISIONS
6.1
Definitions
[
6.2
General
[
288.2
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
This Order prescribes a uniform system for classifying, declassifying, and
safeguarding national security information. It recognizes that it is
essential that the public be informed concerning the activities of its
Government, but that the interests of the United States and its citizens
require that certain information concerning the national defense and foreign
relations be protected against unauthorized disclosure. Information may not
be classified under this Order unless its disclosure reasonably could be
expected to cause damage to the national security.
NOW, by the authority vested in me as President by the Constitution and laws
of the United States of America, it is hereby ordered as follows:
Part 1
ORIGINAL CLASSIFICATION
SECTION 1.1 CLASSIFICATION LEVELS
(a) National security information (hereinafter "classified
information") shall be classified at one of the following three levels:
(1) "Top Secret" shall be applied to information, the unauthorized
disclosure of which reasonably could be expected to cause exceptionally grave
damage to the national security.
(2) "Secret" shall be applied to information, the unauthorized
disclosure of which reasonably could be expected to cause serious damage to
the national security.
(3) "Confidential" shall be applied to information, the
unauthorized disclosure of which reasonably could be expected to cause damage
to the national security.
(b) Except as otherwise provided by statute, no other terms shall be
used to identify classified information.
(c) If there is reasonable doubt about the need to classify
information, it shall be safeguarded as if it were classified pending a
determination by an original classification authority, who shall make this
determination within thirty (30) days. If there is reasonable doubt about
the appropriate level of classification, it shall be safeguarded at the
higher level of classification pending a determination by an original
classification authority, who shall make this determination within thirty
(30) days.
SEC. 1.2 CLASSIFICATION AUTHORITY.
(a) Top Secret. The authority to classify information originally as
Top Secret may be exercised only by:
(1) the President;
(2) agency heads And officials designated by the President in the
Federal Register; and
288.3
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.1.1.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
(3) officials delegated this authority pursuant to Section 1.2(d).
(b) Secret. The authority to classify information originally as Secret
may be exercised only by:
(1) agency heads and officials designated by the President in the
Federal Register;
and
(2) officials with original Top Secret classification authority;
(3) officials delegated such authority pursuant to Section 1.2(d).
(c) Confidential. The authority to classify information originally as
Confidential may be exercised only by:
(1) agency heads and officials designated by the President in the
Federal Register;
(2) officials with original Top Secret or Secret classification
authority; and
(3) officials delegated such authority pursuant to Section 1.2(d).
(d) Delegation of Original Classification Authority.
(1) Delegations of original classification authority shall be
limited to the minimum required to administer this Order. Agency heads are
responsible for ensuring that designated subordinate officials have a
demonstrable and continuing need to exercise this authority.
(2) Original Top Secret classification authority may be delegated
only by the President; an agency head or official designated pursuant to
Section 1.2(a)(2); and the senior official designated under Section 5.3(a),
provided that official has been delegated original Top Secret classification
authority by the agency head.
(3) Original Secret classification authority may be delegated only
by the President; an agency head or official designated pursuant to Sections
1.2(a)(2) and 1.2(b)(1); an official with original Top Secret classification
authority; and the senior official designated under Section 5.3(a), provided
that official has been delegated original Secret classification authority by
the agency head.
(4) Original Confidential classification authority may be delegated
only by the President; an agency head or official designated pursuant to
Sections 1.2(a)(2), 1.2(b)(1) and 1.2(c)(1); an official with original Top
Secret classification authority; and the senior official designated under
Section 5.3(a), provided that official has been delegated original
classification authority by the agency head.
(5) Each delegation of original classification authority shall be
in writing and the authority shall not be redelegated except as provided in
this Order. It shall identify the official delegated the authority by name
or position title. Delegated classification authority includes the authority
to classify information at the level granted and lower levels of classification.
288.4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(e) Exceptional Cases. When an employee, contractor, licensee, or
grantee of an agency that does not have original classification authority
originates information believed by that person to require classification, the
information shall be protected in a manner consistent with this Order and its
implementing directives. The information shall be transmitted promptly as
provided under this Order or its implementing directives to the agency that
has appropriate subject matter interest and classification authority with
respect to this information. That agency shall decide within thirty (30)
days whether to classify this information. If it is not clear which agency
has classification responsibility for this information, it shall be sent to
the Director of the Information Security Oversight Office. The Director
shall determine the agency having primary subject matter interest and forward
the information, with appropriate recommendations, to that agency for a
classification determination.
SEC. 1.3 CLASSIFICATION CATEGORIES.
(a) Information shall be considered for classification if it concerns:
(1) military plans, weapons, or operations;
(2) the vulnerabilities or capabilities of systems, installations,
projects, or plans relating to the national security;
(3) foreign government information;
(4) intelligence activities (including special activities), or
intelligence sources or methods;
(5) foreign relations or foreign activities of the United States;
(6) scientific, technological, or economic matters relating to the
national security;
(7) United States Government programs for safeguarding nuclear
materials or facilities;
(8) cryptology;
(9) a confidential source; or
(10) other categories of information that are related to the
national security and that require protection against unauthorized disclosure
as determined by the President or by agency heads or other Officials who have
been delegated original classification authority by the President. Any
determination made under this subsection shall be reported promptly to the
Director of the Information Security Oversight Office.
(b) Information that is determined to concern one or more of the
categories in Section 1.3(a) shall be classified when an original
classification authority also determines that its unauthorized disclosure,.
either by itself or in the context of other information, reasonably would be
expected to cause damage to the national security.
288.5
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
II IIII I I
,
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Dob 5220.22-M
(c) Unauthorized disclosure of foreign government information, the
identity of a confidential foreign source, or intelligence sources or methods
is presumed to cause damage to the national security.
(d) Information classified in accordance with Section 1.3 shall not be
declassified automatically as a result of any unofficial publication or
inadvertent or unauthorized disclosure in the United States or abroad of
identical or similar informationi
SEC. 1.4 DURATION OF CLASSIFICATION.
(a) Information shall be classified as long as required by national
security considerations. When it can be determined, a specific date or event
for declassification shall be set by the original classification authority at
the time the information is originally classified.
(b) Automatic declassification determinations under predecessor orders
shall remain valid unless the classification is extended by an authorized
official of the originating agency. These extensions may be by individual
documents or categories of information. The agency shall be responsible for
notifying holders of the information of such extensions.
(c) Information classified under predecessor orders and marked for
declassification review shall remain classified until reviewed for
declassification under the provisions of this Order.
SEC. 1.5 IDENTIFICATION AND MARKINGS.
(a) At the time of original classification, the following information
shall be shown on the face of all classified documents, or clearly associated
wlth other forms of classified information in a manner appropriate to the
medium involved, unless this information itself would reveal a confidential
source or relationship not otherwise evident in the document or information:
(1) one of the three classification levels defined in Section 1.1;
(2) the identity of the original classification authority if other
than the person whose name appears as the approving or signing official;
(3) the agency and office of origin; and
(4) the date or event for declassification, or the notation
'Originating Agency's Determination Required."
(b) Each classified document shall, by marking or other means, indicate
which portions are classified, with the applicable classification level, and
which portions are not classified. Agency heads may, for good cause, grant
and revoke waivers of this requirement for specified classes of documents or
information. The Director of the Information Security Oversight Office shall
be notified of any waivers.
(c) Marking designations implementing the provisions of this Order,
including abbreviations, shall conform to the standards prescribed in
implementing directives issued by the Information Security Oversight Office.
288.6
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(d) Foreign government information shall either retain its original
classification or be assigned a United States classification that shall ensure
a degree of protection at least equivalent to that required by the entity that
furnished the information.
(e) Information assigned a level of classification under predecessor
orders shall be considered as classified at that level of classification
despite the omission of other required markings. Omitted markings may be
inserted on a document by the officials specified in Section 3.1(b).
SEC. 1.6 LIMITATIONS ON CLASSIFICATION.
(a) In no case shall information be classified in order to conceal
violations of law, inefficiency, or administrative error; to prevent
embarrassment to a person, organization, or agency; to restrain competition;
or to prevent or delay the release of information that does not require
protection in the interest of national security.
(b) Basic scientific research information not clearly related to the
national security may not be classified.
(c) The President or an agency head or official designated under
Sections 1.2(a)(2), 1.2(b)(1), or 1.2(c)(1) may reclassify information
previously declassified and disclosed if it is determined in writing that (1)
the information requires protection in the interest of national security; and
(2) the information may reasonably be recovered. These reclassification
actions shall be reported promptly to the Director of the Information Security
Oversight Office.
(d) Information may be classified or reclassified after an agency has
received a request for it under the Freedom of Information Act (5 U.S.C. 552)
or the Privacy Act of 1974 (5 U.S.C. 552a), or the mandatory review provisions
of this Order (Section 3.4) if such classification meets the requirements of
this Order and is accomplished personally and on a document-by-document basis
by the agency head, the deputy agency head, the senior agency official
designated under Section 5.3(a)(1), or an official with original Top Secret
classification authority.
Part 2
DERIVATIVE CLASSIFICATION
SEC. 2.1 USE OF DERIVATIVE CLASSIFICATION.
(a) Derivative classification is (1) the determination that information
is in substance the same as information currently classified, and (2) the
application of the same classification markings. Persons who only reproduce,
extract, or summarize classified information, or who only apply
classification markings derived from source material or as directed by a
classification guide, need not possess original classification authority.
(b) Persons who apply derivative classification markings shall:
(1) observe and respect original classification decisions; and
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
LI. I 1 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22M
(2) carry forward to any newly created documents any assigned
authorized markings. The declassification date or event that provides the
longest period of classification shall be used for documents classified on
the basis of multiple sources.
SECTION 2.2. CLASSIFICATION GUIDES.
(a) Agencies with original classification authority shall prepare
classification guides to facilitate the proper and uniform derivative
classification of information.
(b) Each guide shall be approved personally and in writing by an
official who:
(1) has program or supervisory responsibility over the information
or is the senior agency official designated under Section 5.3(a); and
(2) is authorized to classify information originally at the
highest level of classification prescribed in the guide.
(c) Agency heads may, for good cause, grant and revoke waivers of the
requirements to prepare classification guides for specified classes of
documents or information. The Director of the Information Security Oversight
Office shall be notified of any waivers.
Part 3
DECLASSIFICATION AND DOWNGRADING
SEC. 3.1 DECLASSIFICATION AUTHORITY
(a) Information shall be declassified or downgraded as soon as national
security considerations permit. Agencies shall coordinate their review of
classified information with other agencies that have a direct interest in the
subject matter. Information that continues to meet the classification
requirements prescribed by Section 1.3 despite the passage of time will
continue to be protected in accordance with this Order.
(b) Information shall be declassified or downgraded by the official who
authorized the original classification, if that official is still serving in
the same position; the originator's successor; a supervisory official of
either; or officials delegated such authority in writing by the agency head or
the senior agency official designated pursuant to Section 5.3(a).
(c) If the Director of the Information Security Oversight Office
determines that information is classified in violation of this Order, the
Director may require the information to be declassified by the agency that
originated the classification. Any such decision by the Director may be
appealed to the National Security Council. The information shall remain
classified, pending a prompt decision on the appeal.
(d) The provisions of this Section shall also apply to agencies that,
under the terms of this Order, do not have original classification authority,
but that had such authority under predecessor orders.
288.8
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-h
SEC. 3.2 TRANSFERRED INFORMATION.
(a) In the case of classified information transferred in conjunction
with a transfer of functions, and not merely for. storage purposes, the
receiving agency shall be deemed to be the originating agency for purposes of
this Order.
(b) In the case of classified information that is not officially
transferred as described in Section 3.2(a), but that originated in an agency
that has ceased to exist and for which there is no successor agency, each
agency in possession of such information shall be deemed to be the
originating agency for purposes of this Order. Such information may be
declassified or downgraded by the agency in possession after consultation with
any other agency that has an interest in the subject matter of the
information.
(c) Classified information accessioned into the National Archives of
the United States shall be declassified or downgraded by the Archivist of the
United States in accordance with this Order, the directives of the
Information Security Oversight Office, and agency guidelines.
Sec. 3.3 Systematic Review for Declassification.
(a) The Archivist of the United States shall, in accordance with
procedures and time frames prescribed in the Information Security Oversight
Office's directives implementing this Order, systematically review for
declassification or downgrading (1) classified records accessioned into the
National Archives of the United States, and (2) classified presidential papers
or records under the Archivist's control. Such information shall be reviewed
by the Archivist for declassification or downgrading in accordance with
systematic review guidelines that shall be provided by the head of the agency
that originated the information, or in the case of foreign government
information, by the Director of the Information Security Oversight Office ir
consultation with interested agency heads.
(b) Agency heads may conduct internal systematic review programs for
classified information originated by their agencies contained in records
determined by the Archivist to be permanently valuable but that have not
been accessioned into the National Archives of the United States.
(c) After consultation with affected agencies, the Secretary of Defense
may establish special procedures for systematic review for declassification
of classified cryptologic information, and the Director of Central
Intelligence may establish special procedures for systematic review for
declassification of classified information pertaining to intelligence
activities (including special activities), or intelligence sources or
methods.
SEC. 3.4. MANDATORY REVIEW FOR DECLASSIFICATION
(a) Except as provided in Section 3.4(b), all information classified
under this Order or predecessor orders shall be subject to a review for
declassification by the originating agency, if:
288.9
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H jjl, I I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220 . 22-41
(1) the request is made by United States citizen or permanent
resident alien, a federal agency, or a State or local government; and
(2) the request describes the document or material containing the
information with sufficient specificity to enable the agency to locate it
with a reasonable amount of effort.
(b) Information originated by a President, the White House Staff, by
committees, commissions, or boards appointed by the President, or others
specifically providing advice and counsel to a President or acting on behalf
of a President is exempted from the provisions of Section 3.4(a). The
Archivist of the United States shall have the authority to review, downgrade
and declassify information under the control of the Administrator of General
Services or the Archivist pursuant to sections 2107, 2107 note, or 2203 of
title 44, United States Code. Review procedures developed by the Archivist
shall provide for consultation with agencies having primary subject matter
interest and shall be consistent with the provisions of applicable laws or
lawful agreements that pertain to the respective presidential papers or
records. Any decision by the Archivist may be appealed to the Director of
the Information Security Oversight Office. Agencies with primary subject
matter interest shall be notified promptly of the Director's decision on such
appeals And may further appeal to the National Security Council. The
information shall remain classified pending a prompt decision on the appeal.
(c) Agencies conducting a mandatory review for declassification shall
declassify information no longer requiring protection under this Order. They
shall release this information unless withholding is otherwise authorized
under applicable law.
(d) Agency heads shall develop procedures to process requests for the
mandatory review of classified information. These procedures shall apply to
information classified under this or predecessor orders. They shall also
provide a means for administratively appealing a denial of a mandatory review
request.
(e) The Secretary of Defense shall develop special procedures for the
review of cryptologic information, and the Director of Central Intelligence
shall develop special procedures for the review of information pertaining to
intelligence activities (including special activities), or intelligence
sources or methods, after consultation with affected agencies. The Archivist
shall develop special procedures for the review of information accessioned
into the National Archives of the United States.
(f) In response to a request for information under the Freedom of
Information Act, the Privacy Act of 1974, or the mandatory review provisions
of this Order.
(1) An agency shall refuse to confirm or deny the existence or
non-existence of requested information whenever the fact of its existence or
non-existence is itself classifiable under this Order.
(2) When an agency receives any request for documents in its
custody that were classified by another agency, it shall refer copies of the
request and the requested documents to the originating agency for processing,
288.10
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
and may, after consultation with the originating agency, inform the requester
of the referral. In cases in which the originating agency determines in
writing that a response under Section 3.4(f)(1) is required, the referring
agency shall respond to the requester in accordance with that Section.
Part 4
SAFEGUARDING
SEC. 4.1 GENERAL RESTRICTIONS ON ACCESS.
(a) A person is eligible for access to classified information provided
that a determination of trustworthiness has been made by agency heads or
designated officials and provided that such access is essential to the
accomplishment of lawful and authorized Government purposes.
(b) Controls shall be established by each agency to ensure that
classified information is used, processed, stored, reproduced, transmitted,
and destroyed only under conditions that will provide adequate protection and
prevent access by unauthorized persons.
(c) Classified information shall not be disseminated outside the
executive branch except under conditions that ensure that the information will
be given protection equivalent to that afforded within the executive branch.
(d) Except as provided by directives issued by the President through
the National Security Council, classified information originating in one
agency may not be disseminated outside any other agency to which it has been
made available without the consent of the originating agency. For purposes
of this Section, the Department of Defense shall be considered one agency.
SEC. 4.2 SPECIAL ACCESS PROGRAMS.
(a) Agency heads designated pursuant to Section 1.2(a) may create
special access programs to control access, distribution, and protection of
particularly sensitive information classified pursuant to this Order or
predecessor orders. Such programs may be created or continued only at the
written direction of these agency heads. For special access programs
pertaining to intelligence activities (including special activities but not
including military operational, strategic and tactical programs), or
intelligence sources or methods, this function will be exercised by the
Director of Central Intelligence.
(b) Each agency head shall establish and maintain a system of
accounting for special access programs. The Director of the Information
Security Oversight Office, consistent with the provisions of Section
5.2(b)(4), shall have non-delegable access to all such accountings.
SEC. 4.3. ACCESS BY HISTORICAL RESEARCHERS AND FORMER PRESIDENTIAL
APPOINTEES.
(a) The requirement in Section 4.1(a) that access to classified
information may be granted only as is-essential to-the accomplishment of
authorized and lawful Government purposes may be waived as provided in
Section 4.3(b) for persons who:
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000200350006-4
L. 11
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(1) are engaged in historical research projects, or
(2) previously have occupied policy-making positions to which they
were appointed by the President.
(b) Waivers under Section 4.3(a) may be granted only if the originating
agency:
(1) determines in writing that access is consistent with the
interest of national security;
(2) takes appropriate steps to protect classified information from
unauthorized disclosure or compromise, and ensures that the information is
safeguarded in a manner consistent with this Order, and
(3) limits the access granted to former presidential appointees to
items that the person originated, reviewed, signed, or received while serving
as a presidential appointee.
Part 5
rMPLEMENTATION AND REVIEW
SEC. 5.1 POLICY DIRECTION
(a) The National Security Council shall provide overall policy
direction for the information security program.
(b) The Administrator of General Services shall be responsible for
implementing and monitoring the program established pursuant to this Order.
The Administrator shall delegate the implementation and monitorship functions
of this program to the Director of the Information Security Oversight Office.
SEC. 5.2 INFORMATION SECURITY OVERSIGHT OFFICE.
(a) The Information Security Oversight Office shall have a full-time
Director appointed by the Administrator of General Services subject to
approval by the President. The Director shall have the authority to appoint
a staff for the Office.
(b) The Director shall:
(1) develop, in consultation with the agencies, and promulgate,
subject to the approval of the National Security Council, directives for the
implementation of this Order, which shall be binding on the agencies.
(2) oversee agency actions to ensure compliance with this Order
and implementing directives;
(3) review all agency implementing regulations and agency guide-
lines for systematic declassification review. The Director shall require any
regulation or guideline to be changed if it is not consistent with this Order
or implementing directives. Any such decision by the Director may be
appealed to the National Security Council. The agency regulation or
guideline shall remain in effect pending a prompt decision on the appeal;
288.12
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(4) have the authority to conduct on-site reviews of the
information security program of each agency that generates or handles
classified information and to require of each agency those reports,
information, and other cooperation that may be necessary to fulfill the
Director's responsibilities, If these reports, inspections, or access to
specific categories of classified information would pose an exceptional
national security risk, the affected agency head or the senior official
designated under Section 5.3(a) may deny access. The Director may appeal
denials to the National Security Council. The denial of access shall remain
in effect pending a prompt decision on the appeal;
(5) review requests for original classification authority from
agencies or officials not granted original classification authority and, if
deemed appropriate, recommend presidential approval;
(6) consider and take action on complaints and suggestions from
persons within or outside the Government with respect to the administration
of the information security program;
(7) have the authority to prescribe, after consultation with
affected agencies, standard forms that will promote the implementation of the
information security program;
(8) report at least annually to the President through the National
Security Council on the implementation of this Order; and
(9) have the authority to convene and chair interagency meetings
to discuss matters pertaining to the information security program.
SEC. 5.3 GENERAL RESPONSIBILITIES.
Agencies that originate or handle classified information shall:
(a) designate a senior agency official to direct and administer its
information security program, which shall include an active oversight and
security education program to ensure effective implementation of this Order;
(b) promulgate implementing regulations. Any unclassified regulations
that establish agency information security policy shall be published in the
Federal Register to the extent that these regulations affect members -of the
public;
(c) establish procedures to prevent unnecessary access to classified
information including procedures that (i) require that a demonstrable need
for access to classified information is established before initiating
administrative clearance procedures, and (ii) ensure that the number of
persons granted access to classified information is limited to the minimum
consistent with operational and security requirements and needs; and
(d) develop special contingency plans for the protection of classified
information used in or near hostile or potentially hostile areas.
288.13
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
, 11. ..1..1.1 1 I 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
SEC. 5.4 SANCTIONS.
(a) If the Director of the Information Security Oversight Office finds
that a violation of this Order or its implementing directives may have
occurred, the Director shall make a report to the head of the agency or to
the senior official designated under Section 5.3(a) so that corrective steps,
if appropriate, may be taken.
(b) Officers and employees of the United States Government, and its
contractors, licensees, and grantees shall be subject to appropriate sanctions
if they:
(1) knowingly, willfully, or negligently disclose to unauthorized
persons information properly classified under this Order or predecessor
orders;
(2) knowingly and willfully classify or continue the
classification of information in violation of this Order or any implementing
directive; or
(3) knowingly and willfully violate any other provision of this
Order or implementing directive.
(c) Sanctions may include reprimand, suspension without pay, removal,
termination of classification authority, loss or denial of access to
classified information, or other sanctions in accordance with applicable law
and agency regulation.
(d) Each agency head or the senior official designated under Section
5.3(a) shall ensure that appropriate and prompt corrective action is taken
whenever a violation under Section 5.4(b) occurs. Either shall ensure that
the Director of the Information Security Oversight Office is promptly
notified whenever a violation under Section 5.4(b)(1) or (2) occurs.
Part 6
GENERAL PROVISIONS
SEC. 6.1 DEFINITIONS
?
(a) "Agency" has the meaning provided at 5 U.S.C. 552(e).
(b) "Information" means any information or material, regardless of its
physical fora or characteristics, that is owned by, produced by or for, or is
under the control of the United States Government.
(c) "National security information" means information that has been
determined pursuant to this Order or any predecessor order to require
protection against unauthorized disclosure and that is so designated.
(d) "Foreign government information" means:
(1) information provided by a foreign government or governments,
an international organization of governments, or any element .thereof with the
expectation, expressed or implied, that the information, the source of the
information, or both, are to be held in confidence; or
288.14
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(2) information produced by the United States pursuant to or as a
result of a joint arrangement with a foreign government or governments or an
international organization of governments, or any element thereof, requiring
that the information, the arrangement, or both, are to be held in confidence.
(e) "National security" means the national defense or foreign relations
of the United States.
(0 "Confidential source" means individual or organization that has
provided, or that may reasonably be expected to provide, information to the
United States on matters pertaining to the national security with the
expectation, expressed or implied, that the information or relationship, or
both, be held in confidence.
(g) "Original classification" means an initial determination that
information requires, in the interest of national security, protection
against unauthorized disclosure, together with a classification designation
signifying the level of protection required.
SEC. 6.2 GENERAL.
(a) Nothing in this Order shall supersede any requirement made by or
under the Atomic Energy Agency of 1954, as amended. "Restricted Data" and
"Formerly Restricted Data" shall be handled, protected, classified,
downgraded, and declassified in conformity with the provisions of the Atomic
Energy Act of 1954, as amended, and regulations issued under that Act.
(b) The Attorney General, upon request by the head of an agency or the
Director of the Information Security Oversight Office, shall render an
interpretation of this Order with respect to any question arising in the
course of its administration.
(c) Nothing in this Order limits the protection afforded any
information by other provisions of law.
(d) Executive Order No. 12065 of June 28, 1978, as amended is revoked
as of the effective date of this Order.
(e) This Order shall become effective on August 1, 1982.
p Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I I
De-classified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix VII. GUIDANCE FOR PREPARATION OF SECURITY BRIEFINGS
A. Defensive Security Briefings.
1. General. A defensive security briefing containing elements of the
following outline shall be given to those individuals or employees so
identified in paragraph 5u.
2. Introduction. National policy over the past several years has
encouraged the expansion of cultural, trade, and commercial ties with
Designated countries. As a result, an increasing number of representatives
from Designated countries are coming to the U.S. on trade visits, cultural
visits, East-West exchange visits, and the like. Similarly, representatives
of U.S. industry have been with increasing regularity making reciprocal visits
to Designated countries. These expanding marketing opportunities carry with
them a parallel responsibility for ensuring that certain categories of
information are not released, and, where appropriate, proper authorization is
obtained prior to release.
a. U.S. citizens who have had access to classified defense
information are important targets for hostile intelligence services. It is
common practice for hostile intelligence services to establish and maintain
dossiers an personnel of intelligence interest, particularly of personnel
whose jobs afford them access to vital defense information in any area of
special interest. These services are constantly on the alert for opportuni-
ties to gain any kind of advantage that can be exploited, regardless of
the country visited.
b. The intelligence network of the Designated counties is world-
wide and ever present. These intelligence agencies have concentrated on
those fields which involve scientific and military knowledge possessed by
the Western powers. A key source of technical and scientific information
is the numerous conventions, seminars, conferences, and symposia held
throughout the world each year. Other means of obtaining information is
through the tight, police-like controls over the movements of all personnel
visiting Designated countries. Travelers may be "targeted" the moment they
apply for a visa. Under such controlled conditions, there is little that
can be done to prevent espionage efforts and harassments directed against
selected individuals.
c. It must be remembered that Designated country intelligence and
security services carry espionage activities to fantastic lengths. While
the techniques that are employ4d may seem far-fetched or illicit, they are
in fact used in day-to-day activities and operations. Travelers must recog-
nize them as a part of the Designated system, so that they may successfully
counter such practices. "A Study of Harassments and Provocations," pub-
lished in DIS Security Awareness Bulletin No. 1-83, November 1982, illus-
trates procedures used by Designated country intelligence and security
services. This bulletin is intended to support official defensive security
A.
289
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
briefings for persons with authorized access to classified information who
are traveling to such countries. 1/
3. Export Controls. The U.S. Government, by statute, E.O., and admin-
istrative policy, has established a number of procedures designed to control
the export of certain categories of information. One of its primary objec-
tives is the control of the export of scientific and technical information to
ensure that information made available to Designated countries does not work to
the detriment of the U.S. national interest. Among the existing controls are:
a. a system for classifying national security information and
strictly controlling its dissemination (E.O. 12356);
b. a system to control the export of arms, ammunition, and imple-
ments of war, including unclassified technical data and information relating
thereto (see the ITAR issued by the Department of State); and
c. a system to control the export of U.S. commodities and unclassi-
fied technical data which would make a significant contribution to the mili-
tary potential of any other nation or nations which would prove detrimental to
the national security of the U.S. (see the Export Administration Regulations
issued by the Department of Commerce).
4. Marketing Activities With Designated Countries. It must be recog-
nized that marketing personnel are in a particularly difficult role. On the
one hand they must be in a position to knowledgeably discuss their products
and employ all of the attributes of good salesmanship to promote a free
exchange of information in order to successfully conclude marketing endeavors.
On the other hand, a clear understanding of, and strict adherence to, the
controlling regulations are necessary for those categories of information
which can not be disclosed, or which require prior U.S. Government approval in
order to be disclosed. Marketing personnel, who meet with representatives
from Designated countries, should be thoroughly versed and totally
knowledgeable with respect to what information may be released. Meticulous
preplanning is essential if U.S. security interests and responsibilities are
to be properly met. The following categories of information merit special
consideration before planning a meeting with representatives from Designated
countries.
a. Disclosure of Classified Information. Obviously, classified in-
formation may not under any circumstances be disclosed to representatives from
Designated countries. It cannot be assumed that all personnel are thoroughly
familiar with respect to what is and what is not classified. A thorough re-
assessment and evaluation of pertinent information should be undertaken to
ensure a complete and unequivocal understanding as to what is and what is not
classified.
1/ "Study of Harassments and Provocations," is marked "FOR OFFICIAL USE
ONLY" and appears in DIS Security Awareness Bulletin Number 1-83,
November 1982, published by the Defense Security Institute, Richmond,
Virginia. Copies of the bulletin may be obtained from the CSO.
9QA
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
b. Unclassified Information Relating to Classified Contracts. Before
a contractor may disclose any information that pertains to a classified contract
or project, the contractor must obtain the approval of DoD as provided for in
section 1, paragraph 5o. It is essential to ensure that all personnel who will
participate in visits by representatives of Designated countries are thoroughly
knowledgeable with respect to that information which relates to classified con-
tracts, and which therefore may not be released without prior approval of DoD.
c. Information That Comes Within the Purview of the International
Traffic in Arms Regulations. The ITAR applies not only to the export of arms,
ammunition, and implements of war, but also to both classified and unclassified
technical data related thereto. Disclosure to a representative of a Designated
country within the U.S. or abroad constitutes an export under the provisions
of these regulations. Further information concerning these requirements may be
obtained from the Office of Munitions Control, Department of State, Washington,
D.C. 20520.
d. Technical Data Subject to Export Control. Unclassified techni-
cal data, pertaining to items on the "Commodity Control List" may require
approval by the Department of Commerce prior to release to a representative of
a Designated country. Part 379, Technical Data, Export Administration Regula-
tions, issued by the Department of Commerce pursuant to the Export Adminis-
tration Act of 1969, as amended, sets forth the rules applicable to the export
of technical data. Release of such information to a representative of a
Designated country within this country or abroad constitutes an export under
these regulations. For further information in this connection, inquiries
should be addressed to the local U.S. Department of Commerce District Office,
or to the Office of Export Administration, Department of Commerce, Washington,
D.C. 20230.
5. Conclusion. Attention to this very difficult and complex area is
essential if U.S. national interests are to be properly safeguarded, and if
the contractor is to abide by this DD Form 441 with DoD and with the applic-
able U.S. statutes, as enumerated above. In the case of any information which
may be classified or any information relating to a classified contract, the
contractor should initiate appropriate consultation with his or her contracting
officer. Whenever there is any doubt or question with respect to other infor-
mation, consultation may be necessary with the Office of Munitions Control,
Department of State and/or the Office of Export Administration, Department of
Commerce. If there is any doubt, or if there are further questions, ask the
CSO. In all situations, be sure that information disclosed to representatives
of Designated countries is appropriate for release to these countries. If in
doubt, do not provide the information.
Although the emphasis in this guide has been placed on the procedures to be
followed when engaged in marketing activities with representatives of
Designated countries, generally, these same procedures are applicable when
dealing with representatives of any other foreign countries.
B. Counterintelligence Awareness Briefings.
1. General. A counterintelligence awareness briefing containing
elements of the following material, or updated information, shall be given
to appropriate individuals or employees.
291
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
2. Introduction. The following elements of information are intended to
be neither all-inclusive nor all-exclusive, but should be used as source
material in the preparation of counterintelligence awareness briefings and as
a guide for the type of information to be included in this type of briefing.
Routine, stereotyped briefings not only fail to meet intended objectives, but
could actually weaken security by giving the recipient a false sense of secu-
rity. Only the use of thoughtfully prepared briefings, based on authoritative
information and related to the duties performed, and the sensitivity of the
classified information to which exposed and manner of presentation, will
accomplish the purpose. The following information has been extracted, with
permission, from a pamphlet published by the Federal Bureau of Investigation,
"Secrets, Spies and Citizens." Copies of the pamphlet may be requested from
the local FBI office. Additional current topical material may be requested
from these offices or from local military intelligence activities.
3. The Threat. Intelligence collection -- the world of espionage and
counterespionage, spies, and spy catchers -- is a popular subject of fiction.
It has been the topic of countless books, short stories, TV serials, and movies.
The role of the spy, the "Secret Agent," has become so sensationalized and
exaggerated that it is very easy to think that spies exist only in the minds
of fiction writers -- that spying belongs in the same category as science
fiction and westerns. Do not believe it. Spies do exist, and literally
thousands of spies, or intelligence officers, as they are officially known,
and their agents are at this moment plying their treacherous trade within the
U.S. The principal source of these intelligence officers is the Soviet Union,
but the USSR's allied nations in Eastern Europe, as well as Cuba, the People's
Republic of China, and smaller Asian Designated nations such as North Korea and
Vietnam, also dispatch spies to U.S. shores.
a. The Objectives and Techniques of Spies. Their main objective
is. the wholesale collection of data. The most prized type of intelligence
data is the classified government document, but unclassified material -- even
material which appears to be trivial -- can also be of inestimable value. In
their task of gathering intelligence data, the foreign intelligence services
have a large array of tools. Satellites miles above the earth's surface
gather photographic data. Aircraft and vessels gather electronic intelligence.
But a further source of data, and potentially the most valuable to a hostile
nation, is that acquired through the use of actual spies. (Here the briefer
may wish to identify the type of classified projects or work being performed
by the facility which lends credence to possibility of its being an espionage
target.) Intelligence services may gather their information through the use
of several different techniques. Probably the greatest achievement and
intelligence organization can have is the placement or recruitment of an agent
directly in a sensitive position in a national defense or intelligence element
of an opposing government. The penetration by live or electronic sources of
private institutions involved in sensitive, national defense-related research
and development work can also be of tremendous value.
(1) Hostile intelligence collectors ply Washington and other
locations where strategic data can be collected. They gain their desired in-
formation wherever, whenever, and from whomever it can be had. Hostile intel-
ligence officers employ various tactics in their campaigns to enlist target
employees. They =ruse a honeyed, seemingly guileless approach. They befriend
targets, treat them to gifts and money, wine and dine them. Many Soviet and
292
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I II I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22M
other Designated agents believe that Americans are hopeless materialists, and
can be easily swayed by appeals to their alleged greed.
(2) In another maneuver, a hostile intelligence officer
misrepresents him or herself as a citizen of a country friendly to the
U.S. Thus a targeted American may be duped into handing over sensitive
information by being led to believe that he or she is aiding an ally to
the U.S. In variation of this tactic, an intelligence officer poses as a
representative of a non-Designated country towards which a targeted American
is particularly sympathetic. Also, if a hostile agent believes that an
individual has Designated or similar sympathies, he or she may make an
appeal for information based on ideology. A "pitch" for information may
also be geared to take advantage of an American's desire for international
harmony and world peace.
(3) Another favored appeal exploits the American belief
in freedom of speech and the free exchange of information. A hostile
intelligence officer in the role of a scientist may, for example, tell
an American scientist that science has no political boundaries. Therefore,
in the interest of science, the American is encouraged to share his or her
knowledge with a fellow "member" of the international scientific community.
Intelligence agents can also play rough in their ceaseless quest for strategic
information. To such people espionage is a business. If they feel coercion
and blackmail will serve their purpose, they will not hesitate to employ those
methods. The honeyed approach can readily turn sour if an agent determines
that a targeted employee has personal inadequacies which that employee does
not wish to have exposed.
(4) Correspondingly, another tactic is the exploitation of
a "hostage situation." If, for example, a foreign intelligence service
learns that a target employee has relatives in Eastern Europe or the USSR,
that employee is in an extremely vulnerable position. First will come gentle
persuasion (an agent may produce "letters" from so-called relatives calling
for the American to "cooperate"). If that does not work, the agent may
suggest that harsh measures could be applied to the relatives.
b. Recognizing the Approach.
(1) One should therefore be wary of glad-handing strangers who
make an intensive effort at forming a friendship, and then slowly but surely
begin to use that friendship to learn where one works, the nature of one's
assignment, and who one works with. A generous and inquisitive stranger could
very well be the proverbial wolf in sheep's clothing.
(2) One should also be wary of strangers who ask for informa-
tion not related to their professed area of interest or do not seem to be
particularly knowledgeable in their field. Thus, if "scientists" request data
not related to their fields, or do not seem to know much about their supposed
areas of expertise, then they could very well be impostors.
(3) The operative of a foreign intelligence service need not
be a foreigner, nor need the occasion of encountering him or her be in any
way extraordinary. The neighbor one might meet at a PTA meeting could be a
foreign diplomat who lives down the block, or he or she could be a fellow
293
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
American who has been recruited as an agent by a hostile service. The spy
could be a "spotter," who reports to an intelligence service on persons he or
she meets who appear to be susceptible to recruitment and, sometimes, arranges
for intelligence officers to meet them. Do not expect either intelligence
officers or agents to expose their roles in any dramatic and sudden fashion.
Usually there is a long period of cultivation during which conversations with
the individual could be completely normal and innocuous. However, at any
point where someone begins to inquire into aspects of one's knowledge or
activity which are classified or otherwise private, one should certainly stop
to consider whether the inquiry is normal innocent curiosity, or whether it
might be the beginning of an attempt to secure intelligence information for
the benefit of another country.
c. Protecting the Bits & Pieces. It cannot be overemphasized that
unclassified material may be just as valuable to a foreign intelligence service
as classified material. In formulating their estimations of U.S. strengths
and weaknesses, and in the quest for data that will enhance their own nation's
strength, foreign intelligence services seek all types of material. A small
bit of information could represent a very important piece in a much larger
puzzle. Therefore, all data should be protected from the probing hands of for-
eign agents. A stolen industrial process can save thousands of dollars in
research and development cost. The most trivial document could be the missing
link of a hostile nation's problem.
d. Reporting the Threat. In the effort to protect America's secrets,
the role of the facility must be emphasized. Each U.S. Government agency and
private industry which deals with classified material has a specified official
in charge of security matters. This security officer should be recognized as
an ally and not an adversary. If approached by a suspicious stranger in the
manner described above, the security officer should be informed immediately of
the encounter. Even if a friendship has been established, even if the
individual has been able to pry loose some information, the security officer
should be consulted. A major aspect of the security officer's job is to pro-
tect employees from getting involved in compromising situations and, if neces-
sary, to extricate them from such situations. Such assistance cannot be
rendered if the employee remains silent. Of course, it is much better for an
employee to reveal a suspect relationship voluntarily, rather than have it
came to light in the course of a security investigation, or through some other
means. Then, it may be too late for anyone to assist the indiscreet employee.
Basically, it cannot be overemphasized that, if involved in a compromising
situation, the sooner the employee consults his or her facility security
officer, the better. Of course, sometimes one will be in a place or situation
where one cannot, or for some reason does not want to, contact the security
officer. Remember that in the U.S., the FBI is as close as the nearest tele-
phone. Directions for contacting FBI offices appear in the front of all U.S.
telephone books. Abroad, the nearest U.S. diplomatic establishment can arrange
to put one in touch with the FBI or other appropriate U.S. Government security
officials. Once again, it must be stressed that the best course of action in
any of the questionable situations mentioned herein is to immediately relate
the facts to a counterintelligence professional who will be able to analyze
the situation and propose a course of action. Effective counterintelligence
is a demanding and professional discipline, and any attempts by untrained or
294
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I V 1111 I I I.. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
uninformed amateurs to handle hostile efforts on their own could not only
result in personal disaster, but also could interfere with the FBI's
coordinated counterattack.
e. Summary of Threat. Finally, it must be stressed that the
threat posed by foreign intelligence agencies cannot be underestimated.
History is replete with situations in which a nation's security was greatly
damaged by the efforts of a hostile nation's intelligence services. In
American history, the breaking of the Japanese secret code helped to bring
U.S. victory in the Pacific during World War II. On the other hand, the theft
of some key U.S. atomic secrets greatly abetted the interests of the Soviet
Union. The craft of spies is by no means a game. The very fate of nations
can be damaged or enhanced by their enterprises.
4. Summary Counterintelligence Awareness is Critical. The Soviet
Union and its surrogates have established a long standing, well-organized,
deliberate, and quite successful effort to acquire and utilize Western
state-of-the-art technology by both overt and covert means. Unquestionably,
this acquisition of Western technology has played, and will continue to play,
an extremely important role in the development of industrial and military
capabilities of Designated countries, particularly the Soviet Union. A
philosopher once said, "Knowledge itself is power." This maxim most certainly
applies to national power, for one gauge of national power is the amount and
quality of scientific, technological, and military-related knowledge possessed
by a nation. A nation such as the U.S. can be weakened by the theft of its
vital knowledge, and its enemies can be strengthened by the acquisition of
that knowledge, whether it be classified or unclassified. It is the responsi-
bility of each individual who has been entrusted with sensitive data to do his
or her share in protecting America's strategic knowledge, whether it be classi-
fied TOP SECRET or seemingly unimportant, unclassified material. For if Ameri-
cans do not conduct themselves in a responsible and patriotic manner, do not
recognize that this country's national security is based essentially on the
loyalty and efforts of its citizens, then the tightest document classification
system, the most efficient security organizations, and the mightiest Armed
Forces may be utterly valueless.
295
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
Appendix VIII. INFORMATION REGARDING COGNIZANT SECURITY OFFICES,
DISCO, DSI, AND OISI
297
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11 1 1 jj I 1. 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
OPERATIONAL AREAS OF DIS COGNIZANT SECURITY OFFICES
Capital Region (S1510) -- formerly known as the Washington Region
The Capital Region includes: the state of Virginia; Washington, D.C.; and
the following counties in Maryland: Anne Arundel, Baltimore, Calvert,
Charles, Harford, Howard, Montgomery, Prince Georges, and St. Marys.
Mid-Atlantic Region (S1410) -- formerly known as the Philadelphia Region
The Mid-Atlantic Region includes: the states of Delaware, New Jersey,
Pennsylvania, West Virginia, Maryland (less the counties of Anne Arundel,
Baltimore, Calvert, Charles, Harford, Howard, Montgomery, Prince Georges, and
St. Marys); and the following counties in New York:
Bronx Queens
Kings (Brooklyn) Richmond
Nassau Rockland
New York (Manhattan) Suffolk
Orange Westchester
Putnam
Mid-Western Region (S3210) -- formerly known as the Cleveland Region
The Mid-Western Region includes: the states of Indiana, Iowa, Kentucky,
Michigan, Minnesota, Nebraska, North Dakota, Ohio, South Dakota, and
Wisconsin; and the following counties in Illinois:
Adams Hancock
Boone Henderson
Brown Henry
Bureau Iroquois
Carroll Jasper
Cass Jo Daviess
Champaign Kane
Christian Kankakee
Clark Kendall
Coles Knox
Cook Lake
Crawford La Salle
Cumberland Lee
De Kalb Livingston
De Witt Logan
Douglas Macon
Du Page Marshall
Edgar Mason
Effingham McDonough
Ford McHenry
Fulton McLean
Grundy Menard
298
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Mercer Scott
Moultrie Shelby
Morgan Stark
Ogle Stephenson
Peoria Tazewell
Pike Vermilion
Piatt Waren
Putnam Whiteside
Rock Island Will
Sangamon Winnebago
Schuyler Woodford
New England Region (S1110) -- formerly known as the Boston Region
The New England Region includes: the states of Connecticut, Maine,
Massachusetts, New Hampshire, Rhode Island, and Vermont; and the following
counties in New York:
Albany Montgomery
Allegany Niagara
Broome Oneida
Cattaraugus Onandaga
Cayuga Ontario
Chautauqua Orleans
Chemung Oswego
Chenango Otsego
Clinton Rensselaer
Columbia St. Lawrence
Cortland Saratoga
Delaware Schenectady
Dutchess Schoharie
Erie Schulyer
Essex Seneca
Franklin Steuben
Fulton Sullivan
Genesee Tioga
Greene Tompkins
Hamilton Ulster
Jefferson Warren
Kerkimer Washington
Lewis Wayne
Livingston Wyoming
Monroe Yates
Northwestern Region (S5210) -- formerly known as the San Francisco Region
The Northwestern Region includes: the states of Alaska, Idaho, Montana,
Nevada, Oregon, Utah, Washington, and Wyoming; and the following counties in
California:
Alameda Amador
Alpine Butte
299
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
1 i..1 1 ' _Intl 1 , i I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Calaveras Placer
Colusa Plumas
Contra Costa Sacramento
Del Norte San Benito
El Dorado San Francisco
Fresno San Joaquin
Glenn San Mateo
Humbolt Santa Clara
Inyo Santa Cruz
Kings Shasta
Lake Sierra
Lassen Siskiyou
Madera Solano
Marin Sonoma
Mariposa Stanislaus
Mendocino Sutter
Merced Tehama
Modoc Trinity
Mono Tulare
Monterey Tuolumne
Napa Yolo
Nevada Yuba
Pacific Region (S5310) -- formerly known as the Los Angeles Region
The Pacific Region includes: the state of Hawaii, U.S. possessions and
trust territories in the Pacific area, and the following counties in
California:
Imperial San Bernadino
Kern San Diego
Los Angeles San Luis Obispo
Orange Santa Barbara
Riverside Ventura
Southeastern Region (S4110) -- formerly known as the Atlanta Region
The Southeastern Region includes: the states of Alabama, Arkansas, Florida,
Georgia, Louisiana, Mississippi, North Carolina, South Carolina, and
Tennessee; Puerto Rico, and U.S possessions in the Atlantic and Caribbean
areas.
Southwestern Region (S4210) -- formerly known as the St. Louis Region
The Southwestern Region includes: states of Arizona, Colorado, Kansas,
Missouri, New Mexico, Oklahoma, Texas; and the following counties in Illinois:
Alexander Clinton
Bond Edwards
Calhoun Fayette
Clay Franklin
300
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Gallatin Montgomery
Greene Perry
Hamilton Pope
Hardin Pulaski
Jackson Randolph
Jefferson Richland
Jersey St. Clair
Johnson Saline
Lawrence Union
Macoupin Wabash
Madison Washington
Marion Wayne
Massac White
Monroe Williamson
301
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
4C 41 DoD 5220.22-M
CO
?0 CO
4) 4/
4)14
O 'CI
4)41
4)
co
1:1
4 1
JO ? 0
a
40 ?
01
O la
E-I ?-I
? to
4.44)
?r4 C.)
hi
U
O 44
CA TS
14
'-.441
O 0
.pt
1441
1.49.4
4) 41
O al
-c)
O '0
P4 0
CO
9.4
04)
0
0
14 0
010
4.414
010
4) 41
14 r-1
U
U, u
-.4.4
44
O 0
4 0
43 44
14 44
O0
44
0 0
140
? ,4
1 4.,
4-1 ?
44.4
41 ?r1
cl $4 0
O 4).0.
>41
O 0 ?0
?-) al 0
O 1.1
4.) 4J co
.r4
O 14 r.4
4 C0
? 4.11
1.1
111 0.
14 /4
104)
01
00 41 0
4-1
14 441 43
21 0 a.
O8 co
,-4
O1-4 0
44 4).
4.4
4114
.0 0 40
? 14.1 .r4
and OISI.
a
VI Ul 40 WD PA
.,s ..... .... ...L... V)
.7 C/ .7 .7 VI ,0?1 40 00 A
on cD en ..4 en un e4 Ch
40 Ul 01 Ch C.1 C4 OD .3. a
ON VD VI .41. el r. c) ul CD
111111 c!) ,1) t)
in e4 c.4 .-1 .4 111 C/3
ry co 44 un .c) ch en 4D P4
el .7 VI -0 VI V1 .7 eg A
10 41
41' C.1 Ch 40 P. Ul en .7 .7
IA 0 0 CD ^4 .4 .4 .4 CD .4
4d eq .0 PI 41 .7 C4 .1 el
CSO Region
44
to
al
0
0
0.
pi
a)
4.)
to
a)
.14
u
0
a)
al
4
. . en ...1 en en
04.11 CI Ch 4, C)
Z .. 1.4 co in N
>, PI .7 CO *4
Z 0 I I I I
0 0 0 in 0 In
> in Ch CO in
014 co0 MD CI 0,1
140
= fa?
4C ???? ?????
?????? ?
? 0
4) 14
14 03
Z
F4
?? 414
.4313
g
..... ...... 1
...1 .ri
VI 00 Ch 00
el kin co ?-1
-i0 4/ CI
C.1 e4 I 00
4) 1 1 In
?-1 CO CO N. ..
41 CI el C.4 M
E4 C.4 C4 r4
0
M
4C C.) 4? 41 00
0) 01 1
4).0 -0..-..1 4'
14 0 .4 .4 CD
AO0
0
14
hone Number
al
.0
).)
City & State
0-322-720-8259
(49621) 472582
045-441-0378
0
in a)
in CD 0.
in rs 03
Ch At f.,
O CD CD el
4-I ? n4 4 `.. C4 al
ul 4.) 00 I-I Fl 44 CD 4-
t-4 V) r4 01
0
C) 4)4-4 (44 411
1 0
cD 01 CD 14 1;ii 09 ig
a ...t ) CI 1 Ch Ad
140' ? ? 0 1-4 .-4Q
ch 0 ., 0 14 Z 0W
ch 43 '-40 1-1 PI
.1. C./ . 4/ 41 4)0 -u ^
C4 C.) 0 in w 0 0 0.1 4.1 43 0 AL
.4.44)
GD 14 0 Fa %4 4i) 410 8 8
.
c) g) g4 0 w -,4 rs 44 . 4 vD mg gD
? 0 42 al 4, cp 0 C.
0
O. 4D Ad 0 .0 4 )c) 0 N.
1-4 --a 0) ?? 0 . ON "C/ C.) t ?? 43a e4 0C-1 M 0 0 ? ? 0 ,-44) .. 02 1.1
0?'-) C91 0 .-1 ) 10 4114 0 4)0
Q-1 .,. Cs1 01 0 03 ..0 4.1 34 CO a 0 Z
ciD 4-4 i..1 4.1 1.'1 40 SA 1a4 03 4)414
I-1 Z 'V 0 0 hi 0 aa )4 ? a
? 1-1
1:3
05410
44V ) :1 x .-1 ,T1 7. c)
AA Aft
1440 kV I-I 3 0 0 00 i ! Cl
O 0 00 0 0 al 00 Z
1./ JO 130 c.) 0 > 0 a80 00 0 ?
v4 t/3 .r4 ?
0 ?0 00
0
2 1 08. 44 CD 0 4.4 0 4.4
O 0 4.i 4,+ ,1 0,1 CD r-1 1.4 40 r..1
3.4 ..4 140 0.? CA rA ?el A
9.4 0 .4.1 ?r4 4 31
A c..) CA g 114 A A
CD ODeclassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B61356R000200350006-4
DoD 5220.22-M
TELEPHONE NUMBERS AND ADDRESSES
The followi
address as
A
of the PIC-CVA and the
0 03
0
0.
A.) co
CO 1.1
C.) 001.1
4-4
1--1
4.1
?0 Ca 0
C/3 1.1 1-4
CO 0
0) 0 1.11.1
0.0 C.)
WJV
k
0 al
V )4 A
V. 4-1
0 A./ 0 ??
0 OW
40OU
?1-1 4 "-I
a) al
).) a) 14
V.0
4.) 0 rn
1:1 000)
4-4
u
CO CU 03
CU CO J 00
CO 0U ?4
4-)
0)
1-1 4 1.1 CD
"0 CO
1.4
1-1
03
?0
E-1
Area Code
111 4 13)
.0 CO CO
1.)
CO 4-1
03 V U 9-4
0 03 1:0 11)
0.4:3
CO CU CO
1-1 14 0 CD
0 V 1.1 4
O.0 0.
U
4-40
00 "0 0 4.1
0 0
4-4 Cb>01:1
1.1 4.1 03)
CO 03 .1-1 03
.-I 1.4
CO 13/
4 4 1-1
00 a CO "0
al al
0 "1:11 CU
I-1 al 00 .0
4.)
0 01 .4-4
4.4 U?0 ???1
.1.1 $.1 0
CU .0 0 0
E-1 9-1 00 CO
cited below).
482-6500 (ask for clearance verification)
580-5338/9
955-4927/3052
451-4927/3052
CV
4:3
co
n
595-7644/52
V tv't
40
C??1
ct,
cr)
693-6581/2/3
263-6581/2/3
0 0 1-1 0
CN.1 C?4 re)
..-1 C 4 --1
,-? 4.) I
CV WI 1-1 ...I'
kl 0 0 eel
I 0m Z 0 ? 4.1
en 0) c0 00 a)
0 > ?, 0 "a cu
C?J ?1"4 u 4 = ?.1 4-1
-x 0 = . ?r4 4-I 0 "0 CO
CV 4 - ,-I 44 a% ,-.1
-4ca . 4-i - 4-1 1.1 44
0 al ,-.1
CU 0-v-1 b0-4 0 "0 0 CU Z
X 1.1 CO 1.1 0 = 0 Pa 8
00 4.4 V 4-1 1-4
-,4 al $4 14 a) a) ci) 0
? J.J -4 X O1.- WO 1.1
0 14
0 1k1 q) CU...1 a) ?0 a) 14 In a)
? ?33 ...1' r?-I 0 4 01 .-I CC ON 0
c?sl d 1"?4 C..../ 4? C...)
C
02210-2192
Capital Region
Mid-Atlantic Region
New England Region
63188-1900
Presidio of
Northwestern Region
San Francisco,
Pacific Region
Southeastern Region
Southwestern Region
302
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix IX. USE OF ESCORTS FOR CLASSIFIED SHIPMENTS
(also applies to carrier custodians)
A. General. Escorts must be cleared to the level of the information
involved. A sufficient number of escorts shall be assigned to the classified
shipment .to ensure continuous surveillance and control over the shipment while
it is in their custody.
B. Instructions and Operating Procedures. Specific written instructions and
operating procedures will be furnished escorts prior to the shipment and
should include, but not necessarily be limited to, the following:
1. general unclassified outline of the mission;
2. name and address of persons, including alternates, to wham the clas-
sified matter is to be delivered;
3. receipting procedures;
4. means of transportation to be used and route to be used;
5. duties of each escort during movement, during stops en route, and
during loading and unloading operations; and
6. emergency and communication procedures.
C. Functions of An Escort. Escorts assigned for the protection of security
shipments shall do the following:
1. Escorts shall conduct themselves throughout each security shipment
operation in such manner that the security of matter entrusted to them will not
be prejudiced through carelessness, inadvertence, or lack of vigilance. Intoxi-
cants or drugs, which may impair their judgment, may not be used by escorts
while assigned to a security shipment.
2. Escorts shall possess identification cards as prescribed in paragraph 8
and carry them at all times, while having custody of security shipments.
These cards will be safeguarded, and the loss of a card will be reported
immediately to their company security supervisors.
3. Escorts shall accept custody for the shipment by signing a receipt
and release custody of the shipment to the consignee, after obtaining a receipt
from one of the consignee's employees who has been positively identified and who
is cleared to at least the same level as the classified shipment.
4. Escorts shall carry packages on their person, or in hand-carried
containers, until they are delivered to the consignee, whenever practical.
Such packages shall be kept under the constant surveillance of the escort who
shall be in a physical position to exercise direct security controls over the
material.
305
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
- Al. L 1 LI I I I.. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
5. When accompanying classified material in an express or freight car,
escorts shall provide continuous observation of the containers and observe
adjacent areas during stops or layovers.
6. When traveling in an escort car accompanying a security shipment via
rail, escorts shall keep the shipment cars under observation and detrain at
stops, when practical and time permits, in order to guard the shipment cars
and check the cars or containers locks and seals. The escort car (after
appropriate arrangements with the railroad) should be prepositioned immediately
behind the car used for the classified shipment, in order to enable the escort
to keep the shipment car under observation.
7. Escorts shall maintain liaison, as required, with train crews, other
railroad personnel, special police, and law enforcement agencies.
8. When escorting security shipments via motor vehicles, escorts shall
maintain continuous vigilance for the presence of conditions or situations which
might threaten the security of the cargo, take such action as circumstances might
require to avoid interference with continuous safe passage of the vehicle, check
seals and locks at each stop where time permits, and observe vehicles and adjacent
areas during stops or layovers.
9. When escorting shipments via aircraft, escorts shall provide continuous
observation of plane and cargo during ground stops and of cargo during loading
and unloading operations. The escort shall not enplane until after the cargo
area is secured. Furthermore, the escort should preferably be the first person
to deplane in order to observe the opening of the cargo area. Advance arrange-
ments with the airline are required.
10. Escorts shall notify the consignor by the fastest means available if
there is an unforeseen delay en route, an alternate route is used, or an
emergency occurs. If appropriate and the security of the shipment is
involved, also notify the nearest office of the FBI.
306
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix X. REQUIREMENTS APPLICABLE TO THE HAND-CARRYING OF
CLASSIFIED MATERIAL ABOARD COMMERCIAL PASSENGER AIRCRAFT
A. General. The following requirements apply to the hand-carrying of
classified material aboard commercial passenger aircraft (also see paragraph
17). The hand-carrying of classified material aboard commercial passenger
aircraft shall only be authorized after a determination has been made that:
(i) a rare and unusual situation warrants such consideration, (ii) the
essential classified material is not available at the destination point of
the employee traveler, (iii) the material cannot be transmitted in suffi-
cient time by other authorized means essential to accomplish the purpose of
the visit, and (iv) the relative size, weight and physical configuration are
such that the material may be carried on the traveler's person or otherwise
qualify as carry-on baggage. Classified material shall not be hand-carried
across international boundaries except on regularly scheduled nonstop
flights on U.S. carriers between the U.S. Mainland and Alaska, Hawaii,
Puerto Rico, or U.S. possessions or as otherwise provided for by this
Manual.
B. Background. Federal Aviation Regulations require that all passengers
and their carry-on items be screened prior to boarding scheduled passenger
aircraft. The Department of Transportation, Federal Aviation Administration
(FAA) Advisory Circular (AC 108-3), titled "Screening of Persons Carrying
U.S. Classified Material," prescribes that individuals carrying classified
materials shall be screened in the same manner as other passengers except
when routine processing could subject the materials to compromise. If
routine processing is not feasible, special processing procedures must be
observed or the classified material may not be taken aboard the aircraft.
C. Routine Processing. Hand-held packages are normally screened by x-ray
examination. Items concealed on the person are subject to other electronic
screening devices. If by x-ray analysis, or any other method of security
screening, an airline security agent suspects that a parcel or envelope may
contain a weapon, explosive, incendiary, or dangerous object, the item must
undergo further scrutiny or the prospective passenger will be denied the
privilege of boarding with the material. As a general rule, however,
contractor personnel hand-carrying classified material in sealed envelopes
or small packages can be successfully processed by air carrier personnel at
a screening station. To avoid unforeseen problems, it would be prudent if
the employee carrying classified material possessed the identification and
travel documentation described in paragraph E, below. Sound judgment should
dictate whether such documentation need be prepared. When visual examina-
tion is or may be required to successfully screen a classified package,
when routine x-ray examination could subject classified material to damage
or compromise, or when other unusual circumstances exist, the special
processing procedures of paragraph G, below, apply. However, under no
circumstances may the classified material be opened by the employee traveler
or air carrier personnel.
D. Approval. Classified material shall not be hand-carried aboard
commercial passenger aircraft by contractor employees except as specified
by paragraph 17c(3). Each approval to hand-carry shall be recorded and
307
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
maintained by the FSO for a period of 2 years. However, the special
authorization letter and company identification prescribed in paragraph E,
below, is not required if the contractor has reason to believe that classi-
fied material can be routinely processed successfully through air carrier
screening stations.
E. Authorization Letter and Identification Card. All contractor personnel
utilizing the special screening procedures of paragraph G, below, must
have written authorization to hand-carry classified material and possess a
picture identification card or badge meeting the requirements of paragraph 8.
If the traveler is the only employee assigned to a facility, or an air
carrier has cause to authenticate the traveler's courier authorization, the
CSO may be contacted to verify the authorization.
1. Traveling employees shall have the original written authorization
(a reproduced copy is not acceptable). However, a sufficient number of
authenticated copies must be available to provide a copy to each air carrier
involved. The written authorization may contain a printed (or typed)
endorsement for signature by the host security official at the destination
if a round trip with classified material is foreseen. In addition, the
written authorization shall:
a. be on letterhead stationery of the contractor authorizing the
hand-carrying of classified material;
b. provide the full name, date of birth, height, weight, and
signature of the traveler;
c. describe the type of identification the traveler will present
on request (for example, ABC Corporation picture badge, No. 1234);
d. Describe the material being hand-carried which is re-
quested to be exempt from opening (for example, three sealed packages,
9 1/2" x 12 1/2" x 2");
e. identify the points of departure, destination, and known
transfer points;
f. be dated and have an expiration date which may not exceed 7
days from the date of issuance; and
g. carry the name, telephone number, title, and signature of the
authorizing official and the name and telephone number of the facility's CSO.
2. The personal identification medium shall be an identification
card badge, or credential issued by the contractor showing, as a minimum,
the name and photograph of the employee traveler. The identification medium
shall also carry the name of the employing contractor or otherwise be marked
to denote "contractor."
3. When it appears an employee may be required to hand-carry classi-
fied material via commercial passenger aircraft on a return trip, and no
endorsable letter of authorization from the employing contractor exists, it
308
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
will be necessary for an authorized security official at the activity being
visited to determine whether further hand-carrying is essential. Depending
on this determination, the host security official will: (i) provide a
letter of authorization on the host's letterhead stationery, (ii) comply
with the approval criteria prescribed in paragraph D, and (iii) make all
other arrangements necessary for the hand-carry mission.
F. Preparation for Transmission. Classified material to be hand-carried
shall be packaged as specified in paragraph 17 for material of the same
level of classification except as follows:
1. The packaging, together with the classified material contained
therein, shall, if possible, be of a thickness which facilitates physical
inspection at the airport's passenger screening station by flexing, feeling,
and weighing to preclude the need to visually examine the contents.
2. The packaging shall contain no bindings, paper clips, or other
metal which would inhibit processing through detection devices at the
airport.
3. Caution should be used in carrying film because x-ray equipment
used to inspect carry-on items will damage certain types of high speed and
sensitive film.
4. Any bulky item that requires screening will have a company ship-
ping label affixed to the outer casing, shell, wrapper, or other covering.
The label shall be signed by the same official who signed the letter of
authorization.
G. Special Processing. Travelers carrying classified material aboard
commercial passenger aircraft shall be processed through the air carrier
ticketing and boarding procedure in the same manner as all other passengers
except as follows:
1. If routine x-ray examination could subject the material to com-
promise or damage, perhaps by exposing film or revealing a classified
configuration, the contractor shall notify an official of the appropriate
air carrier in advance of the intended flight to explain the particular
circumstances and obtain instructions as to the special screening procedures
to be followed. The contractor should, if necessary, refer the air carrier
official to FAA Advisory Circular 108-3. The employee will be required to
produce company identification and proper authorization pursuant to para- ?
graph E, above. If satisfied with identification and letter of authoriza-
tion, the carrier representative should provide the employee passenger with
an escort to the screening station to authorize exemption of the classified
material from inspection.
2. If during routine screening of classified carry-on baggage air
carrier personnel are not satisfied with the results of the inspection, and
the prospective passenger is requested to open a classified package for
visual examination to overcome the impasse, the passenger shall: (i)
inform the person conducting the screening that the pertinent carry-on
items contain U.S. Government classified information and cannot be opened,
309
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.11.iii I I,4 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
(ii) present company identification and proper authorization pursuant to
paragraph E., above, (iii) refer the screening official to FAA Advisory
Circular 108-3, and (iv) request special dispensation from the advance
notification stipulation and ask that air carrier personnel telephonically
contact the contractor or the CSO to verify the hand-carry authorization.
The air carrier decision on such matters is final.
3. In rare instances, classified material may be in specialized con-
tainers which because of size, weight, or other physical characteristics may
require special processing consideration. Under such unique circumstances,
the procedures contained in paragraph 1, above, shall be followed.
4. On those occasions when a traveler does not have an authorization
letter or company identification, and there is sufficient time prior to
departure, the passenger may: (i) contact an air carrier ticket counter
agent, (ii) explain the circumstances, (iii) produce acceptable alternative
identification, and (iv) request special dispensation from the advance
notification stipulation and ask that the air carrier telephonically contact
the contractor authorizing official to verify the traveler's authorization
to hand-carry classified material.
5. If the special processing procedures of paragraphs 1 thru 4, above,
do not permit boarding with the classified package, the employee shall not
proceed further and shall arrange with the facility for alternate means of
transmitting the material. The passenger may not open or authorize the
opening of these carry-on items under any circumstances. Any instances in
which carry-on items have been opened shall be reported promptly to the FSO
who shall report the matter to the CSO.
H. Incident Situations. Pursuant to this appendix, and in the event a
contractor passenger is aboard a commercial passenger aircraft that is
hijacked to a foreign country, the employee shall adhere to the following
instructions:
1. Show appropriate civilian identification.
2. The employee shall not voluntarily reveal the existence of classi-
fied material nor draw attention to it.
3. If questioned or interrogated in a foreign country, common sense
and judgment will be used in making any response. If prudent under the
circumstances, the traveler shall attempt to maintain physical possession of
the classified material at all times.
4. If, at any time, a classified package could not be maintained
under the personal custody and control of the traveler, the package shall
be provided, unopened, to the FSO upon return to the U.S.
5. On return to the U.S., the traveler shall immediately report the
entire incident to the FSO who will report the matter to the CSO.
310
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DOU
I. Briefing. The employees hand-carrying classified material aboard
commercial passenger aircraft shall be briefed on their overall responsi-
bility to safeguard classified material, on the contents of this appendix,
and on the applicable portions of the contractor's SPP.
?
311
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix XI. RESERVED
313
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix XII. DOCUMENTS ACCEPTABLE FOR PROOF OF U.S. CITIZENSHIP
A. A BIRTH CERTIFICATE indicating the individual was BORN IN THE UNITED
STATES
B. A U.S. PASSPORT
C. A CERTIFICATE OF NATURALIZATION if the individual claims CITIZENSHIP BY
NATURALIZATION
D. "A Report of Birth Abroad of a Citizen of the United States of America"
(Form FS-240), a Certification of Birth (Form FS-545 or DS-1350), or a
CERTIFICATE OF CITIZENSHIP if CITIZENSHIP WAS ACQUIRED BY BIRTH ABROAD TO U.S.
CITIZEN PARENT OR PARENTS
E. If primary evidence of U.S. citizenship is not obtainable, then the best
available secondary evidence, showing that the individual was born in the
U.S., is required. Such evidence may include a combination of at least two of
the following: a baptismal certificate; a hospital birth record; evidence of
persons having personal knowledge of the facts of birth; or other documentary
evidence, such as U.S. military records, early census, school or family Bible
records, insurance papers, or newspaper files. The secondary evidence must be
adequate to support a "good faith" determination that the individual is in
fact a U.S. citizen. Secondary evidence submitted as proof of birth in the
U.S. shall be original or certified documents. Noncertified copies are not
acceptable.
The contractor will maintain a record as to which of the above documents were
sighted as proof of citizenship.
315
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix XIII. GUIDANCE FOR CONTRACTOR SELF-INSPECTIONS
Each contractor is required to conduct a self-inspection program for eval-
uating all 3ecurity procedures applicable to the facility's operation, in
accordance with paragraph Sac. As a minimum, a contractor self-inspection
should include all elements normally inspected by the CSO. In order to assist
the contractor in assessing the security posture of his or her facility, the
following guideline questions used in part by CSO industrial security
representatives are provided:
A. Facility Clearance.
1. Are the appropriate DD Forms 441, 441-1, and 441s on file (see
paragraphs 21 and 73)?
2. Is the HOF/parent of the facility cleared or properly excluded (see
paragraphs 72 and 73)?
3. Are all necessary OODEPs and a legal quorum of the board of directors
or all members of an executive committee cleared (see paragraph 22)?
4. If all OODEPs are not cleared, have appropriate resolutions been
furnished to the CSO (see paragraph 22e)?
5. Have changes in the information previously reported on DD Forms 441s
been reported? (List changes which have occurred since the last inspection;
see paragraph 6a(4)f.)
6. Have all changes affecting the FCL been reported to the CSO, for
example, stock control, exclusion resolutions and changes of OODEPs (see
paragraph 6a(4)f)?
7. Has a statement been submitted by each RFI (see paragraphs 6a(4),
6b(5), and 20k)?
B. Access Authorizations.
1. Are records maintained of clearances issued by the DoD and the
facility, for example, records of DISCO Forms 560 and DD Forms 48-2 (see DISCO
Form 560, DD Form 48-2, and paragraph 28)?
2. Are the number of clearances held to the minimum consistent with
facility requirements (see paragraph 20)?
25)?
3. Are clearance applications made only after employment (see paragraph
4. Are interim clearance requests properly authorized and held to a
minimum (see paragraph 26c)?
5. Are all required information and forms furnished to DISCO (such as,
adverse information, DISCO Form 562, DD Form 48-2; as applicable)? (Explain
system and procedures for ensuring that adverse information is reported as
required; see paragraphs 6b and 24b.)
317
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I I I 1 1 I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
6. Are personnel transfers in an MFO reported to DISCO (see paragraph
26e)?
7. Are contractor CONFIDENTIAL clearances granted by a contractor's
employee who is cleared by DoD (see paragraph 24a(1)(g))?
8. Have adequate procedures been established for the granting of
CONFIDENTIAL clearances by the contractor (see paragraph 24b)?
9. Are review procedures in effect to preclude errors/omissions on
clearance applications to DISCO (see paragraph 26a)?
10. Has the contractor elected to have LOC's issued to the HOF or to a
PMF (see paragraph 26j(2)?
II. Has the election to have LOC's issued to the HOF or PMF been included
in the SPP and approved by the CSO (see paragraph 26j(1)(2))?
12. Are cleared immigrant alien employees assigned overseas for more than
90 consecutive days during any 12-month period? Is a report of such assignment
submitted to DISCO (see paragraph 6b(6))?
C. Security Education.
1. Are procedures established for administering security briefings to
cleared employees prior to granting access to classified information (see
paragraph 5g)?
2. Are parts I and II of DISCO Form 482 or SF 189A been executed as
required (see paragraph 5g)?
3. Are refusals of employees to sign part II of DISCO Form 482 or SF
189A reported to the CSO (see paragraph 6b)?
4. Does the facility have an industrial security education program which
includes recurring security indoctrination of its cleared employees? (Briefly
explain how this program works; see paragraph 5f).
5. Does the contractor have a procedure for the conduct of a self-
inspection of its complete security program (see paragraph Sac)?
6. Has a procedure been established for evaluating the effectiveness of
the self-inspection program? (Describe in the narrative the procedures used
by the facility; see paragraph 5ac).
7. Is there an adequate procedure for ensuring personnel security admin-
istration and education for cleared personnel assigned to uncleared locations?
(Describe in narrative the procedure used; see paragraphs 26j and 73).
8. Are special security briefings and debriefings given, and are
records kept as required, for example, records pertaining to NATO and CNWDI
(see paragraphs 85 and 119)?
9. Does management support the facility's security program (see
paragraph 5s)?
318
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
D. Standard Practice Procedure.
1. Is the SPP current and does it adequately implement ISM requirements
as they apply to the facility operations? Has a copy been given to the CSO?
(Provide date of SPP or of latest revision; see paragraph 5s).
2. Is the MPO or PMF SPP adapted to apply at operating locations (see
paragraph 73)?
E. Subcontracting.
1. Is the clearance status and safeguarding capability of the
subcontractor determined as required (see paragraphs 58a and 59b)?
2. Is notification of selection of the subcontractor furnished to the
contracting officer (see paragraph 62)?
3. Is written authority to disclose TOP SECRET information obtained from
the contracting officer (see paragraph 59a)?
4. Is adequate classification guidance applicable to subcontracts
extracted from the prime contract DD Form 254 and properly distributed to
prospective or actual subcontractors (see paragraph 60a)?
5. Are DD Forms 254 pertaining to subcontractors approved by the
contracting officer or, in the case of service contracts, by the prime
contractor (see paragraph 60b)?
6. Is retention of classified information by subcontractors approved by
the contracting officer (see paragraph 64)?
7. Are foreign classified subcontracts approved as required (see
paragraph 65)?
F. Visit Control. .
1. Is positive identification of visitors required and number of classi-
fied visitors held to a minimum (see paragraph 38a)?
2. Has action been taken to determine that the visiting contractor has
been granted the appropriate FCL (see paragraph 38a)?
3. Are visitor records maintained, and do they contain required
information (see paragraph 39)?
4. Are visitors escorted as required (see paragraph 38b)?
5. Are classified recordings, photos, and removal of classified
material authorized as required (see paragraph 38c)?
6. Are classified visits by Category 4 visitors specifically approved by
the UA (see paragraph 41d(1))?
7. Does the facility have proper procedures regarding Category 5
visitors; that is, briefings, debriefings, and reporting requirements (see
paragraph 41e)?
Declassified in Part - Sanitized Copy Approved for Rele-a.se 2012/08/17: CIA-RDP89B01356R000200350006-4
L. Il I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22.-M
8. Does the facility have long-term visitors? (If so, list by company
those abiding by the host SPP and those using the SPP of their HOF's; see
paragraph 40)
9. Are requests submitted in advance of visits and promptly canceled
when required (see paragraph 37f)?
10. Is immediate notification regarding any change of individual or
facility clearance status furnished to those activities which have received
current visit requests (see paragraph 370?
11. Are requests to visit U.S. Government activities routed via the
contracting officer when required (see paragraph 44)?
12. Are visit requests submitted to DISCO or OISI in connection with
foreign visits as appropriate, and is sufficient lead time allowed (see
paragraphs 48 and 49)?
13. Are NATO security clearance certificates furnished as requested (see
paragraphs 52 and 55)?
G. Classification.
1. Is the facility furnished adequate classification guidance and noti-
fication of biannual review (see paragraphs 10a and b)?
2. Are security classifications, including downgrading and declassifica-
tion instructions, applied to information in accordance with the applicable
classification guidance (see paragraph 10f)?
3. Does the contractor challenge classification and marking guidance
believed by him or her to be inadequate or erroneous (see paragraph 10e)?
4. Is security classification marking by the contractor supported by
adequate records (see paragraph 10f)?
5. Is the number of employees authorized to be responsible for the currency,
necessity, and accuracy of applied security classifications held to a minimum
(see paragraph 10f(4))?
6. Are security classification guidance and marking instructions ade-
quately disseminated within the facility (see paragraphs 10f and h)?
7. Are downgrading and declassification actions taken in accordance
with established schedules (see Appendix II)?
8. Are adequate classification guidance and marking instructions fur-
nished in connection with foreign classified contracts (see paragraph Ile)?
H. Employee Identification.
1. Are badges and identification cards properly controlled; do they
contain the required data (see paragraph 8a)?
320
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
DOD 7LLU.ZZ-M
2. Are badges and/or cards designed to minimize tampering; are they
properly constructed (see paragraph 8a(4))?
3. Are new or revised badge or card systems reported to the CSO (see
paragraph 8c)?
4. Are visitor badges properly controlled (see paragraph 8b)?
5. How many badges and identification cards are lost or out of control?
What percent of the total issued? How long has current system been in effect
(no reference)?
6. Are badges and/or cards recovered as required (see paragraph 8a(5))?
I. Foreign Travel.
1. Are reports of foreign travel or attendance at international meetings
submitted to DISCO and/or the CSO (see paragraph 6b(9))?
2. How many reports were submitted since the last inspection (see
paragraph 5u)?
3. Are briefings given as required, and briefing forms retained for
required period of time (see paragraph 5u(2))?
4. Is classified information accounted for prior to each employee's
departure (see paragraph 5u)?
5. Have representatives of Designated countries visited the facility
since the last inspection, and what special security measures and briefings
were utilized in preparation? Were any problems encountered? (Explain.fully
in narrative; see paragraphs 5o, 5u, and 6a(19)).
J. Public Release.
1. Is public release of information pertaining to classified contracts
approved by the appropriate U.S. Government activity? (Indicate the number of
approved releases since last inspection, including contract number, nature of
release, and identification of approving authority; see paragraph 5o).
2. Is classified sales literature approved by contracting officer prior
to publication and distribution (see paragraph 5p)?
3. Is authorization for publication and distribution indicated on the
cover or the first page of document (see paragraph 5p)?
K. Classified Storage.
1. Are containers kept locked, when not under direct and continuous
surveillance by an authorized person (see paragraph 14c)?
2. Are the number of persons possessing knowledge of the combinations or
having access to contents cf containers held to a minimum (see paragraph 14)?
321
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
III
? Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
UOi)D-L-LU.ZZ-M
3. When combinations to classified containers are placed in written
form, are they properly marked, stored, and accounted for .(see paragraph 5i)?
4. Are combinations changed by an authorized person (see paragraph 51)?
5. Are combination padlocks properly protected when the container is
open (see paragraph 5i)?
6. Are steel bars affixed to file cabinets in such a manner to preclude
surreptitious removal of classified information (see paragraph 14a(3)(d),
footnote 10)?
7. Are adequate supplemental controls established where required?
(Completely describe supplemental controls in effect at the time of
inspection. Fully identify those controls that are established for security
containers and those established for controlled areas. See question 9 below;
see paragraphs 14a(2) and (4)).
8. Are vaults and strongrooms properly constructed (see Appendix IV)?
9. Is classified waste properly protected (see paragraph 19f)?
10. Does the facility use alternate storage locations? (If so, give
full details, to include contracting officer's approval and location; see
paragraph 15).
11. Are security checks performed to ensure that classified material is
protected at all times (see paragraph 5j)?
12. Does the CSO have inspection responsibility for all classified material
and areas? (If not, give particulars as to how the CSO was relieved of
inspection responsibility and for what specific areas.)
L. Markings.
1. Are classified hardware and documents
properly marked (see paragraph
2. Is the date of origin, name, and address of facility placed on
documents (see paragraph 11b(1))?
5.
fication
6.
11c(2))?
Are portions of classified documents properly marked (see paragraph.
Are all additional markings applied as required (see paragraph
Is foreign classified information marked with U.S. equivalent classi-
marking (see paragraph 11e)?
Are rolled and/or folded documents marked as required (see paragraph
7. Are downgrading/declassification notations properly assigned and
completed (see paragraph 11b(7) and Appendix II)?
322
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006:4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
M. Transmissions.
1. Is classified information properly prepared and transmitted outside
and within the facility (see paragraph 17)?
2. Is the FCL and safeguarding capability determined prior to dispatch
of classified information to other contractors (see paragraphs 58 and 59)?
3. Are messengers that handle classified material properly cleared (see
paragraph 17c(3))?
4. If vehicles are used for the delivery of classified material, is the
material kept under the constant surveillance of an appropriately cleared
employee (see paragraph 17h)?
5. Are procedures established and implemented for the proper receipt of
classified material by the facility (see paragraph 12e)?
6. Is written authorization for the transmittal of TOP SECRET informa-
tion obtained from the contracting officer (see paragraph 17b)?
7. Is export of U.S. classified material approved and accomplished on a
government-to-government basis (see paragraph 17e)?
8. Is the transmittal of classified information outside the U.S.,
Puerto Rico, or a U.S. possession or trust territory properly accomplished
(see paragraph 17e)?
9. Are classified shipmerfts made only in accordance with the ISM or
instructions from the contracting officer (see paragraph 17c(5))?
10. Is consignee given advance notice of classified shipment (see
paragraphs 17d(3)(d) and 17c(5)(d))?
11. Is the CSO notified of overdue classified shipments (see paragraphs
17d(3)(d) and 17c(5)(d))?
12. Are classified shipments properly inspected on receipt (see
paragraphs 12 and 17)?
13. Is classified information, which is hand-carried in connection with
visits, properly approved in advance, accounted for, and stored (see paragraph
17i)?
14. Are procedures established to preclude transmission of classified
information via unapproved communication circuits (see paragraph 17c(4))?
15. Is a suspense system maintained of receipts for classified trans-
mittals, and is adequate follow-up action taken, if receipts are not returned
(see paragraph 12g(3))?
16. Are procedures established for the hand-carrying of classified mate-
rial, for example, by commercial aircraft, (see paragraph 17 and Appendix X)?
323
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
_U. 11111 I L _
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
N. Classified Material Controls.
1. Have control stations been established? Indicate the number of
master stations and substations (see paragraph 12a).
2. Are complete records kept for classified material received and dis-
patched outside of the facility (see paragraphs 12a and c)?
3. Is accountability maintained for all TOP SECRET, SECRET, and CRYPTO
materials, including documents, hardware, and mock-ups, to permit their prompt
location (see paragraphs 12a and 12f(3))?
4. Are accountability and receipt and dispatch records retained for the
required time (see paragraphs 12a, 12c, and 19e)?
5. Are procedures established for accountability of TOP SECRET and
SECRET working material that is not promptly destroyed as classified waste
(see paragraph 12f)?
6. Are control station personnel cleared to the appropriate level and
knowledgeable of their responsibilities (see paragraph 5f and 12d)?
7. Are procedures established to ensure prompt reporting to the FSO and
investigation of each loss, compromise, or suspected compromise of classified
material and other security violations. (Indicate number of occurrences since
last inspection; tee paragraph 7.)
8. Is annual inventory and accounting made of TOP SECRET material?
(Indicate date of last inventory; see paragraphs 12b and 13g):
9. Are TOP SECRET documents controlled by access records, continuous
receipt system, number series, and copy numbers (see paragraph 13)?
10. Is access to classified material controlled on a need-to-know basis
(see paragraph 3bg and 5c)?
11. Are adequate procedures implemented to fully ensure the safeguarding
of classified material during its use (see paragraphs Sc, 5d, and 16)?
O. Controlled Areas.
1. Are closed areas properly constructed (see paragraph 34a)?
2. Are areas properly posted and approved by the CSO (see paragraphs
34a(4), 34b(3), and 34c)?
3. Are area entrances properly controlled, and is admittance granted on
a need-to-know basis (see paragraph 34)?
4. Are employees assigned to areas instructed to challenge unknown per-
sons in areas (see paragraph 34a(5))?
5. Is movement of classified material to and from areas properly
supervised (see paragraph 34a(2))?
324
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
6. Are employee badges, cards, or access lists properly controlled and
kept current (see paragraphs 8a(5) and 34)?
7. Are visitors to areas properly controlled (see paragraphs 8b, 32,
and 34a)?
8. Are supplanting electromechanical access control devices properly
regulated (see paragraph 36a)?
9. Are guard patrols or supplanting alarm systems adequate for closed
areas during nonworking hours (see K-7 above and paragraphs 33b, 34a(3),-35,
and 36)?
10. Do subcontractors and their employees who operate and maintain alarm
systems have required personnel clearances? (List such subcontractors; see
paragraph 35a(1)(b))
11. Are alarm dispatch records properly executed and maintained (see
paragraph 35a(1)(c)5)?
12. Is the response time to an activated alarm 15 minutes or less (see
paragraph 35a(1)(c)4 and 35a(2))?
13. Does material, equipment, and installation meet federal and/or
Underwriter Lab's specifications (see paragraph 35b(1))?
14. If key-operated padlocks are used, have adequate procedures been
established for control of keys and locks (see paragraph 34a(3))?
P. Disposition.
1. Is a program established for the reduction of classified holdings
(see paragraph 19a)?
2. Is classified material (including waste) destroyed as soon as
practical (see paragraph 19a and 19c)?
3. Is classified material properly destroyed (that is, does destruction
process preclude reconstruction; see paragraphs 19c and 19f)?
4. Is burning the only approved method of destruction used by the facility?
(List methods of destruction, other than burning, which have been approved by
CSO; see paragraph 19c).
5. Are destruction records and certificates maintained as required (see
paragraph 19e)?
6. Is destruction authority obtained when required (see paragraph 19b)?
7. Is destruction performed and witnessed by appropriately cleared
personnel who are knowledgeable of their responsibilities (see paragraph 19d)?
8. Is destruction equipment leased or rented (see paragraph 19c)?
325
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
WVW J44V.44V1
9. If the answer to 8 is "yes," who operates the equipment, and how is
control of the material maintained (see paragraph 19c)?
10. Are procedures in effect to prevent access by uncleared employees
who operate equipment (see paragraph 10c)?
11. Is retention authority requested on final delivery of goods or
services or on complete termination of contract? (Explain how procedures are
verified and how facility accomplishes this; see paragraph 5m.)
Q. Reproduction.
1. Is reproduction held to the minimum required? Are reproduction facilities
properly designated, identified, and controlled (see paragraph 18)?
2. Are procedures in effect to restrict use of office reproduction
equipment for classified productions? (If so, explain; see paragraph 18.)
3. Has the facility developed a procedure for the use of office copy
machines in the reproduction of classified material (see paragraph 18)?
4. Are personnel thoroughly familiar with and following established
procedures when using office copy machines for reproduction of classified
material (see paragraphs 5f and 18)?
5.
18a)?
Is reproduction authorization obtained when required (see paragraph
6. Are reproduction records properly maintained (see paragraph 18c)?
7.
78)?
? 8.
originals
9.
paragraph
Are production control records properly maintained (see paragraph
Are copies or extracts of classified material marked the same as
(see paragraphs 18 and 18d)?
Do reproduction area controls prevent unauthorized access (see
79)?
10. Are overruns held
paragraph
11.
products
80a)?
to a minimum and properly accounted for (see
Are proofs and samples returned to the customer with finished
(see paragraphs 80b and 80d)?
12. Are classified waste containers identified and emptied at completion
of working hours (see paragraph 80c)?
13. Are plates and rubber blankets reused only on classified production
and safeguarded when not in use (see paragraph 80f)?
14. Are press rollers, and similar devices, properly cleaned after
classified run (see paragraph 80f)?
15. Are mailing lists properly protected (see paragraph 82)?
326
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
R. Classified Meetings.
1. Are meetings sponsored when required? Indicate the number of
meetings since last inspection (see paragraphs 5q(2), 5q(3), and 9).
2. Is attendance of foreign nationals or RFI's approved by sponsoring
activity (see paragraph 9b)?
3. Are classified meetings held at approved locations (see paragraph
9c)?
4. Has the contractor developed complete security procedures for the
safeguarding of classified material at the meeting (see paragraph 9d)?
5. Have the security procedures been submitted to the sponsoring
activity for approval (see paragraph 9d)?
6. Is attendance limited to persons properly cleared and having a need-
to-know (see paragraph 9d(1)(a))?
7. Is disclosure authority obtained from the contracting officer when
required, and is disclosure authority furnished to sponsoring activity (see
paragraph 9e)?
8. Is a copy of the classified presentation furnished to sponsoring and
contracting activity (see paragraph 9e)?
9. Are unsponsored contractor-conducted meetings properly controlled
(see paragraph 5q(1))?
10. Are requests to attend meetings properly certified and submitted to
contracting officer UA activity for certification of the employee's
need-to-know (see paragraph 9f)?
S. Consultants.
1. Are Type A Consultants properly briefed and certificates furnished
to CSO? Are all necessary reports including adverse information reports, made
as necessary, and on a timely basis (see paragraph 68)?
2. Are Type C Consultants properly briefed, and are controls stated in
letter agreements observed (see paragraph 70)?
T. AIS.
1. Does the facility process classified information an an AIS system?
(If so, what level?)
2. Has an AIS system security supervisor been appointed? (If so,
identify by name; see paragraph 103c.)
3. Has written approval been given by the CSO to operate the system?
(If "yes," list date of approval; see paragraph 103b.)
327
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
MOM DLLU.LL-M
4. Have AIS hardware configurations, system software, or operating
procedures/mode changed or been modified since the last inspection? (If
"yes," give detailed explanation; see paragraphs 103b and 106a.)
5. Is the AIS SPP current? (If "yes," give date of issue; see
paragraph 112d.)
6. Have the following provisions of section XIII, ISM, been satisfac-
torily implemented in the operation of the AIS?
a. Personnel controls (see paragraph 105)?
b. Physical controls (see paragraph 106)?
c. Clearance/declassification/destruction of all storage media
(see paragraphs 114, 115, and 116)?
d. Transmission line protection (see paragraph 109)?
e. Subcontracting provisions (see paragraph 110)?
f. Audit trails, logs, and activity and maintenance records (see
paragraph 111)?
U. COMSEC/CRYPTO.
1. Has a COMSEC custodian been appointed? (If so, list name and tele-
phone number; see paragraph 10a(1), CSISM.)
2. Has an alternate COMSEC custodian been appointed? (If so, list name
and telephone number; see paragraph 10a(1), CSISM.))
3. If appointed, are the COMSEC custodian and the alternate thoroughly
familiar with and performing the duties outlined for them in the CSISM (see
paragraph 12a, CSISM)?
4. Has a COMSEC account number been assigned? (If so, list the account
number.)
5. What is the highest level of COMSEC access required? (Check one:
TS S C)
6. Is COMSEC access required at the facility? (Briefly describe the
type of access, for example, install, maintain, or operate COMSEC or CRYPTO
equipments for the U.S. Government; operate communications link with the U.S.
Government; have access to the operational keying variables; and manufacture
or installation of keying material for COMSEC equipments.)
7. Does the facility have access to classified COMSEC information at
another location (see paragraph 16, CSISM)?
8. List the number of employees who are briefed for access to COMSEC
information (see paragraphs 16a aid 16c, CSISM).
328
Declassified in Part -Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
9. Have employees authorized access to classified COMSEC information
been properly briefed by U.S. Government representatives and/or contractor
personnel (see paragraph 16, CSISM)?
10. Does the facility have copies of the CSISM, UA accounting instruc-
tion, and equipment operation manuals (see paragraph 2, CSISM)?
11. Does the facility SPP contain adequate procedures relative to COMSEC
requirements (see paragraph 3, CSISM)?
12. Are all COMSEC related reports submitted (see paragraph 24, CSISM)?
13. Has a COMSEC emergency plan been developed, which has the approval
of the CSO (see paragraph 23, CSISM)?
14. Has adequate classification guidance been furnished regarding COMSEC
information via a DD Form 254 (see paragraph le, CSISM)?
15. Have all disclosures of COMSEC information, whether to a subcontrac-
tor or other persons, been made only with the specific written approval of the
contracting officer (see paragraph 5, CSISM)?
16. Is all COMSEC information in the custody of the facility properly
marked and accounted for (see paragraph 2, ISM, and paragraph 17, CSISM)?
17. Are COMSEC and keying materials marked CRYPTO properly stored?
(Describe the type of storage facilities used whether GSA container, vault,
or other; see paragraph 18, CSISM.)
18. Are COMSEC and keying materials marked CRYPTO properly handled in
the work processing area(s)? (If areas are utilized, briefly describe the
characteristics of the area(s); see paragraph 19, CSISM.)
19. Are access lists properly posted (see paragraph 19, CSISM)?
20. Are adequate supplemental controls utilized, if necessary?
(Describe them; see paragraphs 18 and 20, CSISM.)
21. Is COMSEC and CRYPTO material properly disposed of? (Describe what
methods of destruction and disposition are used; see paragraph 19, ISM, and
22, CSISM.)
22. Does the facility operate a communications center for the U.S.
Government? Does it secure a communications circuit with the U.S. Government,
or between itself and another contractor (see paragraph 1, CSISM)?
23. Are COMSEC and keying materials marked "CRYPTO" properly trans-
mitted outside the facility (see paragraph 21, CSISM)?
V. International Operations.
1. Does the contractor have any cleared personnel assigned overseas?
If so, are they doing any of the follcving?
329
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
-1-20.-1-1?M
a. Are they performing on a UA contract involving access to classi-
fied information overseas? (If "yes," include the number of personnel, the
location of their work, and a list of contract number(s).)
b. Are they performing on an FMS contract involving access to U.S.
classified information? (If "yes," indicate whether the access is provided
directly to contractor personnel overseas by a U.S. Government activity, or if
it is provided directly to contractor personnel by the foreign government for
whom the FMS contract was awarded.)
c. Are they performing on a purely commercial contract awarded directly
by the foreign government or one of its contractors, and access to either
foreign classified or U.S. classified information is involved? (If "yes" and
access is to U.S. classified information, determine how the U.S. classified
information was released to the foreign government, such as, released directly
by result of an export license, released by a third country with U.S. Govern-
ment approval, and the like.)
d. Are they engaged exclusively in sales and marketing activities?
(If "yes," identify what programs involve access to U.S. classified information
and what the authority is for discussing such classified sales and marketing
efforts with foreign nationals, such as U.S. Government approval, export
licenses, and trade agreements.)
2. Has the contractor developed an SPP sufficient to cover its overseas
operations when engaged in: (a) sales and marketing efforts involving U.S.
classified information, and/or (b) performance on a UA awarded classified
contract, including those contracts awarded under FMS? Does the SPP state the
prohibition against contractors transporting classified material across
international borders (see paragraph 5s)?
3. How many cleared employees are assigned overseas, and have they re-
ceived the required security briefing prior to overseas assignment? Are there
provisions for ensuring that employees receive an annual refresher briefing?
(Explain the procedures established for ensuring that an annual refresher
briefing is given; see paragraph 97.)
4. Has the contractor established a program for self-inspection of its
Overseas locations when the overseas location is engaged in work requiring
access to either U.S. classified information or foreign classified information
released to the contractor through U.S. Government channels? (Explain fully
in the narrative the procedures established; see paragraph 97.)
330
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
OD Form 696
SAMPLE
FOR OFFICIAL USE ONLY When filled in
INDUSTRIAL SECURITY INSPECTION REPORT
DATE PREPARED tr Vnimee,
P-0
al
?1",l,. 070440114
honey Oct IF IMP
I. FACIUTY
NOME OFFICE lankly Organizaeonl
3. PARENT HOLDING COMPANY
....0a
ta.... o..)
.44....
12. fahilfrote
a. Name
a. Name
a. Name
b ADDRESS nem. cop. same a* came
b. ADDRESS (Strew. City. SW,. bit COW
b. ADDRESS anew. 0a. um. za cam
c. FSC NO.
4. FAOUTY SECURITY SUPERVISOR
S. FAOUTY CLEARANCE
a. NAME Wet Feu. ?AWN Mihail
b. TELEPHONE NO
liaidsafe sow ceile)
a. LEVEL
b. CLEARANCE DATE
(v vit".00)
C. CATEGORY OF
FACILITY
6. Rtat_Rs.H a PREVIOUS
(rrhoh.001
b CURRENT
C. NEXT
7. TYPE OF BUSINESS
S. TIME EXPENDED m.....1
9. ACCESS TO CLASSIFIED
MATERIAL SINCE
LAST INSPECTION
YES
NO
LEVEL DATE
(7. S. 0. Cl r??????oof
a.
TRAVEL
b
RESEARCH AND
PREPARATION
c.
INSPECTION
d
POST INSPECTION
(?...n. low eft )
1. POSSESSING
b. ACCESS ELSEWHERE
c. GRAPHIC ARTS
10. TOTAL
11. NUMBER Of U.S. EMPLOYEES CLEARED
d. NO ACCESS toe....)
NUMBER OF
EMPLOYEES
a. TOP
b. SECRET
c. CONFIDENTIAL
e. NO ACCESS wear office)
SECRET
(1) Government
(2) COm Indy
f NO ACCESS (Frew
9-
12. NUMBER
13. NUMBER OF IMMIGRANT AUENS CLEARED
14. SPECIFY NUMBER AND COUNTRY REPRESENTED BY EMPLOYEES
GRANTED REOPROCAL CLEARANCES.
_
OF AUENS
a SECRET
b CONFIDENTIAL
IS. INSPECTION ?
a SCOPE
b. RATING ASIGNED
C. RESULTS
NO DEF COS LOR MAJOR
SATISFACTORY UNSATISFACTORY
COMPLETE PARTIAL
16. ELEMENTS Of INSPECTION AND RATINGS ASSIGNED ?
MO. Mot Appkce**)
17. SAFEGUARDING ASIIJTY ?
(roe Pratt Seruet. Cenbilential or Newel
(5. Sorefactery, CI ? Unsabst way.
ALPHA
CODE
AREAS INSPECTED
RATINGSPREVIOUS
? RATING
a FOR DOCUMENTS
b. FOR HARDWARE
A .,
FACILITY CLEARANCE
IS.
APPROVED STORAGE FACIUTIES
NUFASER
II
ACCESS AUTHORIZATIONS
C
SECURITY EDUCATION
a. FSS CABINETS
0
STANDARD PRACTICE PROCEDURES
b. VAULTS
(1) CLASS A
E
SUBCONTRACTING
F
VISIT CONTROL
(2) CLASS B
G
CLASSIFICATION
(3) CLASS C
H
EMPLOYEE IDENTIFICATION
C. OTHER VAULTS
I
FOREIGN TRAVEL
d. STRONGROOMS
1
PUBLIC RELEASES
e. CABINET WITH BUILT-IN COMBINATION LOCK
K
CLASSIFIED STORAGE
I. CABINET WITH BAR AND PADLOCK
L
MARKINGS
g. DESK PEDESTAL INSERT
M
TRANSMISSION
a. RESTRICTED AREAS
N
CLASSIFIED MATERIAL CONTROLS
1. CLOSED AREAS
0
CONTROLLED AREAS
111. OTHER 000 PROGRAMS
P
DISPOSITION
I a. *AS& I___ j 0 DIFPP c. OTHER dna
Q
REPRODUCTION
R
CLASSIFIED MEETINGS
d. NO OF COMSEC ACCTS
S
CONSULTANTS
(1) NSA 1(2) AF
T
ADP
e. SPECIAL ACCESS PROGRAMS (hone)
U
COMSEC/CRYPTO
1(1) NATO 1 1(2) CNWDI 1 1(3) COMSEC
V
INTERNATIONAL OPERATIONS
f mumeift UNCLASSAiof D LOCATIOUS WITH CLE?klIf 0 CS1PlOvEES
g ISR NUMBER
? ? narrative type report *leen kr000ril rile ening., in ,terros /3 lii. and II Mall be accerneenned by tamp the -Reesares ' block on revere, tide. end .7 nesessery. cOMIntot C. ? separate sheet
Of Paver ahal attach to rho repOre the narrative re00, Mould be tennatteil tolnst.ae the Alen* Code NO MO are*
DO Form 696, JAN 87
eteinous *dawns are obsolete
331
I IAL USE ONLY (When filled on
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DD Form 696
Page Two
SAMPLE
FOR OFFICIAL USE ONLY (When filled in)
22. REMARKS 40.K.04.14.8.01, Ph. ,SM token. to deeoencoes
bel we tvereosseen of
'NOM. 10 4010410f Ofoff?f
mernmshed chow" hihechhh
0.04, hh^h? *how*. ihohfh
Me
E?fih?hh,.NI IlaWie Meseseerent end act?en .1 inv. owner
to Mlideren. ? steessesof "woe me hodthenew et the seetracteel Weeny pelteSe .
thduale homy Oho, 10,
hIPIChlin whole cerrechw melee Seeee 00 00.0.011 elPeOfer.seS
OullWasileng
ROSA ewe ast MOM*, theadd ime ROOM. e ? nvoweng pow/ow. eesserssef nerele it, If ROWE se ram howl .1 hehonhvi
Whoop laurdses lir )
wont kirampa ? wag* Wilily chw(rae)tf?at ropy movililell Confonwe en ? seasem Ant amps, whet. Perefides
?
21. SECURITY SPECIAUST(S)
a. NAME(S) bac own. Mosblb mean trot 4, 0,..FF
4
b SIGNATURE(S)
c TEAM INSPECTION
wax)
YES
?
= NO
22. REVIEWING OFFICIAL
a. NAME rwn. maw. mow,
b SIGNATURE
c DATE OF REVIEW
1004144001
runt try?????nwo
DO Form 696 Reverse, JAN 87
Previous 'batons are obsolete.
332
FOR OFFICIAL USE ONLY (When filled in)
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
endix XIV
to
N-1
CU
-pt
144
co
ai
4.1
?ro
C.;
0
4.1
CU
CU
00
0
4.)
CU
44 0
0
41.1
CU
$44
1-4
CU
00
?r1
110
0
gi4
4.J
CU
333
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Continuation
334
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Continuation
335
I Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
H
_111,11
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
336 1
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
NOTES:
In all instances foreign security classification systems are not exactly parallel to the U.S.
system and exact equivalent classifications can not be stated. The classifications given above
represent the nearest comparable designations that are used to signify degrees of protection and
control similar to those prescribed for the equivalent U.S. classifications.
"ATONAL" information is an exclusive designation used by NATO to identify RESTRICTED DATA or
FORMERLY RESTRICTED DATA information released by the U.S. Government to NATO.
There is no Swedish security classification equivalent to U.S. CONFIDENTIAL. Accordingly, all
Swedish information or material received by the U.S. Government and classified HEMLIG will
be safeguarded as U.S. SECRET; U.S. information or material received by the Swedish Government
and classified CONFIDENTIAL will be safeguarded as HEMLIG.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.III
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
DUMMY PAGE
338
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Appendix XV. AREAS COVERED BY MTMC AND HOTLINE
NUMBERS TO BE USED FOR EMERGENCIES
The Bill of Lading of each shipment of classified material by a Commercial
Carrier must contain the HOTLINE telephone number for the appropriate MTMC
area. The areas covered and the HOTLINE numbers for the two commands are as
follows:
EASTERN AREA
Alabama, Arkansas, Connecticut, Delaware, District of Columbia, Florida,
Georgia, Illinois, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Maryland,
Massachusetts, Michigan, Minnesota, Mississippi, Missouri, New Hampshire, New
Jersey, New York, North Carolina, Ohio, Oklahoma, Pennsylvania, Rhode Island,
South Carolina, Tennessee, Texas, Vermont, Virginia, West Virginia, and
Wisconsin.
Address Telephone No.
Commander, Military Traffic Commercial No: 201-858-6566
Management Command
Eastern Area ATTN: MTE-IN HOTLINE No: 800-524-0331
Bayonne, NJ 07002
New Jersey only: 800-624-1361
WESTERN AREA
Arizona, California, Colorado, Idaho, Montana, Nebraska, Nevada, New Mexico,
North Dakota, Oregon, South Dakota, Utah, Washington, and Wyoming.
Address Telephone No.
Commander, Military Traffic Commercial No: 415-466-3413
Management Command
Western Area ATTN: MTW-IN HOTLINE No: 800-331-1822
Oakland Army Base
Oakland, CA 94626 California only: 800-348-4639
339
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.1.. I I ' I i .
i
Declassified n Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
DUMMY PAGE
340
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?K
Appendix XVI. INDEX
Access, 3a, 20c, 31
Accountability records, 12a
For AIS storage media, 116a
ACDA:
Access Limited, 31.3
Classified information, 20c
Addressing mail and shipments, 17k
Administrative measures regarding security violations, 5aj
ADP System: (See "Automated Information System (AIS)")
Advance shipping notice, 17c(5)(d), 17d(3)(d)
Adverse clearance actions, 5e
Adverse information:
Reporting of, 5af, 6b(1)
Agreement, long-term visits, 40
AIS Security, definition of, 3c
Alarm systems:
Approval, 35c, 36c
Central control station, requirements for 35a(1)(c)
Direct connect, 35a(1)(a)
Material and installation, standards for, 35b
Purpose, 35a
Records, 35a(1)(c)5
Response time, 35a(1)(c)4, 35a(2)
Supplanting, 35a(1), 36a
Supplemental, 14a(2)(c), 14a(4)(c), 35a(2), 36b
Alien, 3d (see "Immigrant Alien," 3av)
Alternate storage locations:
Containers, 15d
General, 15a
Records, 15c
Security clearance requirements, 15b
APO mail channels, 17c(2), 17e(3)
Application software, definition of, 3d.1
Armed Forces Courier Sexvice, 17b, 17e(5)
341
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I_ I] 1 i.N
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Assistance and cooperation, 5aa
Atomic Energy RESTRICTED DATA (see "RESTRICTED DATA")
Authority, authorization for:
Alarm system, 35c
Alternate storage, 15a
Applying classification, 10d
Armed Forces Courier Service, 17b, 17e(5)
Classification guidance, subcontractors, 60b
Clearance Limitations, 20a
Controlled areas, 34c
Destruction, 19b
Disclosure at meetings, 5q, 9e
Electromechanical devices, 36c
Interim clearances, 26c
Licensing agreements, 21b
Methods of destruction, 19c
Public releases, 5o
Regrading of documents, lid
Releases:
between subsidiaries, 72b
intelligence information, 5c,
to foreign governments, 48a
Removal of material to residences, 14e
Reproduction, 18a
Retention of classified material, 51, 5m, 64
Sales literature, publishing of, 5p
Secure electrical transmissions, 17c(4), 17d(1)
Subcontracts:
from foreign contracts, 66
involving TOP SECRET, 59a
with foreign industry, 65
Termination of accountability, 12h
Transmitting:
material outside U.S., 17e
NATO material, 88c
TOP SECRET material, 5x, 13i, 17b
Use of special features of design on foreign contracts, 5h
Visits:
involving NATO information, 52
involving RESTRICTED DATA, 42
to contractors, 41
to User Agency activities, 43, 44, 45
Authorized persons,
Definition of, 3e
Automated Information System (AIS):
AIS security, definition, 3c
Applicability, 101
Application software, definition, 3d.1
342
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Approval, 5b, 103b, 112
Audit trails, 111
Clearance of media and equipment, 115
Computer facility, definition, 3u.1
Computer hardware, definition, 3u.2
Concurrent processing, 104.1
Declassification of media and equipment, 116
Definition of, 3b
Downgrading,. 114
Firmware definition, 3am
General requirements, 103
Modes of operation, 104
Objectives, 102
Personnel security, 105
Physical security, 106
Protected area, 3bp, 106e(4)
Protection of software and data, 108.1
Remote terminal, definition, 3bv
SPP, 103b, 112d
Standard Practice Procedure, 103b, 112d
Storage media controls, 108.1e
Subcontracting controls, 110
System Security Officer (SSO), 103c
definition, 3cj.1
System software, definition, 3ck
Transmission controls, 109
Upgrading, 113
Badges:
Clearance, color coding, 8a, 20f
Employees, 8a
Reporting, 8c
User Agency installations, 8d
Visitors, 8b
Bank, use of for storage, 15
Bankruptcy, reporting of, 6a(4)(e)
Bid material:
Destruction, 19a and b
Disposition of, 51
Publication and distribution of, 5p(2)
Unsolicited, lOg
Briefings (see "Security briefings")
Candidate Material, definition of, 3e
Carrier:
Custodian, 3ac, app. IX
Qualified, 3bs
343
I Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
.11 1 1 1 .
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Carve-out definition, 3f.1
Central station alarm system, 35a(1), 35(b)(2)
Certificates:
Consultant, Type A, 68a
Destruction, 19e
Excluded parent, 72a
NATO briefing, 85d
NATO clearance, 55
Representatives of foreign interest statement, 20k
Charts, marking, 11c(2)
Citizenship, proof of, 5ae, app. XII
Classification authority, 3h, 10d
Classification equivalents, foreign, app. XIV
Classification guidance:
Biennial Review, 10b
Dissemination outside, CONUS, 10h
Distribution, required, 61
For subcontracts, 60
General, 10a
Responsibilities, Sad
Retention, 10c
Unsolicited bids, lOg
When issued, 10b
Classified contracts:
Definition of, 3i
Listing of, 5z
Reporting of unrelated material, 6a(18)
Classified information:
Access to:
ACDA, 24a(1)(d)
By non-U.S. citizens, 31
CNWDI, 118
Definition of, 3a
Emergency Higher Level Access, 20.1
Limitations, 31.3
Requirements for, 20
TOP SECRET, 13c
Definition of, 3k:
Evidence of mail tampering, 6a(11), 7
Loss, compromise, or suspected compromise, 7
Hand-carrying aboard commercial passenger aircraft, App. X
344
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Classified waste, 19f, 80c
Clearance (facility):
Additional Personnel, 24
Advertising, 20f
Associations, 22a
Certificate, foreign interests, 21a, app. I (para. L)
Colleges and Universities, 22d
Consultants, Type B, 69
Corporations, 22a
Definition, 3a1
Exclusion procedures, 22e
Executive committees, 22a(2), 22c(3), 22d(3)(b)
FOCI, 21c,
Licensing, patent, and trade secret agreements, 21b
Multiple facility, 73
Negotiators, 23
Non-profit organizations, 22a
OODEPS, 6a(4)(c), 22a(4), 22b(4), 22c(5), 22d(5)
Parent-subsidiary, 72
Partnerships, 22c
Personnel clearances required in connection with, 22
Processing Procedures, 21a
Records, 20i
Representatives of a foreign interest, 22f
Sole proprietorships, 22b
Security agreement, 21a
Temporary help suppliers, 74
Termination of, 5n
Verification of, 58a
Clearance (individuals):
Access, 20c, 31
Access limitations, 31.3
Additional personnel, 24
Administrative downgrading of TOP SECRET, 30
Administrative termination, 29
Adverse clearance actions, 5e
Advertising, 20f
Age limitations, 20b
Application for, 26a, 26c
Assurance, security:
application for, 99a
issuance of, 99a
termination of, 99a(5)
Concurrent, 26f
Contractor clearances, 24b
Conversion of, 27
DoD clearance, 24a
DOE, 26k
Emergency higher level access, 20.1
Foreign nationals, 31.2, 31.3
Formerly cleared, 261, 27
345
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
?...11.. .1.. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Full investigative coverage, 20h
General information, 20, 26a
Granted by:
contractor, 24b
DoD, 24a
Guards, 20e
Immigrant aliens, 26b(2)(a), 31.1, 31.3
Interim clearances, 26c
Letter of Consent:
definition of, 3az.1
issuance of, 20j, 26j
overseas assignment, 96
reproduction of, 20f, 26j(1)(c)
Multiple facility, 20d, 20j, 26e
Name change, 6b(2),
Negotiators, 23
New clearances, 26b
Non-United States citizens, 31
Preemployment clearance action prohibited, 25
Reciprocal, 31.3
Records, 28
Reemployment, of cleared personnel, 26g
Reinstatement of TOP SECRET, 30
Representatives of foreign interest, 3bw, 20k, 22f
Required for:
colleges and universities, 22d
corporations, 22a
partnerships, 22c
sole proprietorships, 22b
Transfers, 26d, 26e
Withdrawal, interim clearances, 20m
Closed areas, 3m (also see "Controlled areas")
Closed vehicle, 3n
Cognizant security office, 3p, 4
Colleges and Universities, 3q
Combinations:
Access to, 14c
Changing, schedule for, 5i
Classifying, 5i
Door devices, 36b
Knowledge of, 14c
Padlocks, security, Si
Personnel authorized to change, 5i
Security enclosures, 36a(1)
Commercial Carrier, 17c(5), 17d(3)
Communications Intelligence, 3r
346
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
COMMUNICATIONS SECURITY (COMSEC):
Access limited, 31.3
Briefing and debriefing, 5g
Clearances, 24a(2),
COMSEC supplement, 76
Definition, 38
Destruction, 19b
Transmission, 17j
Violations:
investigation of, 7d
reporting, 6a(3)
Complex, definition of, 3t
Compromise or suspected compromise:
Definition, 3u
Investigation of, 7
Reporting, 6a(2)
Computer Facility, definition of, 3u.1
Computer tapes, magnetic:
Declassification, 116a, 116b, 116c(3), 116c(4)
Marking, 11c(11)
CONFIDENTIAL material:
Claarances for access to, 24b,
Definition, 3v
Destroying, 19d
Preparation for transmission, 17a
Receipts, 12e(2)
Records, 12c
Release or transmission outside contractor's facility, 5x
Storage, 14a(5)
Supplemental controls, 14a(5)
Transmission outside a facility, 5x, 17d,
Transmission within a facility, 17a(3)
Consignee, 3w
Consignor, 3x
Constant Surveillance Service (CSS), 3x.1, 3cg, 3cm.1, 17d(3)(b)
Consultants:
Access to CNWDI, 122
Letter agreement, 70a, app. I(u)
Temporary help suppliers, 74f
Type A, 68
Type B, 69
Type C, 70
Under civil service procedures, 71
Containers (see "Storage")
347
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Continued classification after public release, 10i
Continental United States, definition of, 3y
Contract Security Classification Specification, 10a, 10b, 60, 61
Contracting officer, 3z
Contractor, definition of, 3aa
Contractor-granted clearances, 24b:
Administrative Termination of, 29a, 29b, 29j
Control station personnel, 12d
Control station records:
Accountability, 12a
Destruction, 19e
Inventory lists, 17i
Production, 12f
Production control, 78
Receipts, 12g
Receipts and dispatch, 12c
Reproduction, 18c
Controlled areas, 5r:
AIS protected area, 3bp, 10e(4)
Approval for, 34c
ADP system area controls, 107
Basis for, 33
Closed areas:
construction, 34a, app. V
definition, 3m
identifying, 34a(4)
nonworking hours, 34a(3)
working hours, 34a(2)
Reports, 6a(5), 34d
Restricted areas:
definition, 3bx
marking, 34b(3)
nonworking hours, 34b(2)
working hours, 34b(1)
Supplemental or supplanting controls (see "Alarm systems")
Cooperation, 5aa
Courier, 17c(3), app. X
Cover sheets, 11c(1), 11c(5)
Covering:
Documents in use, 16b
Equipment, 17a(1) Cc)
348
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
Credentials:
Recovery of, 8a(5)
Verifying, 8a(6)
Critical Nuclear Weapons Design Information (CNWDI):
Access requirement, 118
Briefings, 119
Definition, 3o
Marking, 121
Policy, 117
Records, 120
Subcontracting and consultants, 122
Transmission outside facility, 123
CRYPTOGRAPHIC (CRYPTO):
Accounting for, 12a
Definition, 3ab
Inventory and accounting, 12b
Production of, 12f
Reproduction, 18a
Dates, required on classified material, 11b(1), 11c(15)
Declassification, definition of, 3ad, app. II
agit12221.ag, 116b
Delay in shipment, 6a(10), 17c(5)(d), 17d(3)(d)
DoD technical information dissemination activities, 5y
Design features, incorporation of, 5h
Designated countries, 5u(1)
Designated country relationships, 5v, 6b(14)
Designated country visits, 6a(19)
Destruction:
Authorization, 19b
Certificates, request for, 19e
Classified waste, 19f
Destroying official, 19d
Equipment approval, 19c
Inspection of equipment, 19c
Methods, 19c Records and certificates, 19e Rented or leased equipment,
.19c Reproduction materials, 80, 81 Requirement of, 19a Ribbons,
typewriter and ADP, 19f
Subcontractor employee, use of, 19d
Witness, 19d
349
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
... 1.. . 1.I.. _1 11 1 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Determining need-to-know, 5f
Disclosures:
At meetings, 5q, 9e
Limitations on, 5c
Public, 5o
To subcontractors, 58a, 59
Disk and drum, declassifyinli, 116c(4)
Dispatch records, 12g
Disposition of classified material, 51
Documents:
Definition of, 3ah
Marking of, 11
Downgrade, definition, 3ai, app. II:
Clearances, TOP SECRET, 30
Electrical transmission, 17b, 17c(4), 17d(1), 109
Electromechanical devices:
Approval, 36c
Door devices, 36a(2)
Security enclosures, 36a(1)
Supplemental, 36b
Electronic devices:
Approval, 36c
Door devices, 36a(2)
Security enclosures, 36a(1)
Emergency Higher Level Access, 20.1
Emergency procedures, 5w
Employee badges, 8a
Energy Department (DOE) facilities, visits to, 46
Escorts:
For AIS maintenance, 105d
For transmission, 17c(3), app. IX
For visitors, 38b
Espionage and Sabotage Acts, app. VI
Evidence of tampered mail, 6a(11), 7
Exclusion of personnel:
From clearance requirement, 22e
350
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Executive committee, 22a(2), 22c(3), 22d(3)(b)
Executive personnel, 3aj
Export Licenses:
Unclassified technical data, 41d(3)
3ak
Facility security clearance, al, (see "Clearance")
Facility security supervisor, 5a
FBI, reporting to, 7b(1)
File folders, marking of, 11c(5)
Files, classified, 11c(5)
Fingerprints, 26a(4), 26a(5),
Firmware, definition of, 3am
Foreign:
Classification equivalents, app. XIV
Classified contracts, app. III
Government information, definition of,
Interest, 3ao
Marking foreign classified material,
Nationals, 3ap, 31,2, 31.3
Ownership, control, and influence, 21c, 72a,
Representatives of foreign interest, 3bw
Travel, 5u, 6b(9)
3an
lie, 11b(5)(a), 11b(8)(e), 11b(8)(f)
FORMERLY RESTRICTED DATA:
Access limited, 31.3
Definition, 3aq
Dissemination, 171
Marking, 11b(8)(b)
General requirements, 5
Graphic arts, definition of,
Groups of documents, 11c(5)
Guards:
Clearance of, 20e
Emergencies, use of
Entry Control:
closed areas, 34a
facility complex,
meetings, 9d(4)
3ar (also
app. I (para. L)
see "Reproduction")
351
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L ii
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
room, building, structure, 14a(2)(a), 14a(4)(a)
' safe deposits area, 15d
Patrols:
of closed areas, 34a(3)
of room, building, structure, 14a(2)(b), 14a(4)(b)
of strongrooms, 14a(3)(f)
Response to alarms, 35a(1), 35a(2)
Subcontract:
Destruction of CONFIDENTIAL waste, 19f
Witness to destruction, 19d
Guidance for contractor self-inspections, app. XIII
Guides, classification, 10a, 58
Hand-Carrying Classified Material Aboard Commercial Passenger
Aircraft, App. X
Hardened container, 3as, 17a(2)(a)
Hardware, Computer, definition of, 3u.2
Home office (HOF), 3au
Immigrant alien:
Access Limitations, 31.3
Clearance of, 31.1
Definition of, 3av
Justification and approval for clearance, 31.1
Limitations, 118
Visiting overseas, 6b(6)
Identifying facility of origin, 11b(1)
Individual responsibility for safeguarding, 5f
Information, definition of, 3ax
Inspections, Sac, 5ag
Intelligence, 3az
"International Traffic in Arms Regulation", 21b, 41d, 48a(3), 48b, 50, app.
VII
Interpretations, requests for, 4
Inventory, in connection with visits, 17i
Inventory and accounting of classified material, 12b
352
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Investigations:
By contractors, 7
By U.S. Government representatives, 5aa
Investigative assistance, 5aa
Justification for Personnel Security Clearance:
Additional LOCs, 26j(2)(b)
Clearance conversions, 27d(2)
Clearance transfers, 26d:
MFO, 26e(1)(b), 29e(2)(b), 26e(3)(b)
Concurrent clearances, 26f(1)
Contractor granted, 24b(2), 24b(4)
DOE and NRC clearances, 26k
Example of form, App. I, para. J
New clearances, 26b(4)
Reemployment, 26g, 29i
Reinstatement, 30b
Requirements:
management review, 20a
completion of form, 26a(6)
Retention, 20a
Termination:
subsequent access, 29g
Legends, markings, 11c(2)
Letter of Consent (LOC), 3az.1, 20f, 20h, 20j, 20.1, 26f, 26g, 26j
Letters of transmittal, 11c(13)
Limitations on:
Access to classified information, 20c, 31.3
Destruction, 19b
PCL's, 20a
Reproduction, 18a, 87a
Limited Access Authorization (LAA)
Definition, 3az.2
Immigrant Alien processing, 31.1
Foreign national processing, 31.2
List of classified contracts, 5z
List of OODEPs, 6a(4)(c), 22a(4), 22b(4), 22c(5), 22d(5)
Location of meeting!, 9c
Locked Entrance:
Closed areas, 34a(2)(b), 34a(3)
Definition, 3ba
Room, building, structure, 14a(2)(a), 14a(4)(a)
353
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
. I . 1 [ 1 I 1 .1 1 1
. . L
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
J)OL344V.44-M
Long-term visitors, 40
Machine accounting cards, marking of, 11c(3)
Machine listings, marking of, 11c(4)
Magnetic tapes, degaussing, 116b, 116c(3), 116c(4)
Maps, marking of, 11c(2)
Markings:
Artwork, 11c(1)
ADP produced document, 11c(4)
ADP punched cards, 11c(3)
Automatic downgrading or declassification actions, 11d(1)
Blankets, 80f(2)
Charts, 11c(2)
Compilations, hg
Components, 11b(4)
Containers (transmission), 17a(1)(e), 17a(2)(b)
CNWDI, 121
DTIC documents, lid
Dissemination and reproduction notices, 11b(8)(d)
Downgrading and declassification, "Classified by" notice, 11b(7), app. II B2
Drawings, 11c(2)
Files, folders, or groups of documents, 11c(5)
Foreign classified material, 11b(5)(a), 11b(8)(e), Ile
Foreign government information, 11b(8)(e)
FORMERLY RESTRICTED DATA notation, 11b(8)(b), app. II
General, Ila
Identification, 11b(1)
Intelligence sources or methods of notation, 11b(8)(c)
Linecasting machines, 79b
Maps, 11c(2)
Messages, 11c(6), app. II
Microforms, 11c(7)
Miscellaneous material, 11c(16)
Motion picture films, 11c(8)
NATO extracts, Ilb(8)(f)
Origination date, 11b(1),'
Other than automatic downgrading or declassification action, 11d(2)
Overall, 11b(2)
Overlays, 11c(1)
Pages, 11b(3)
Photocomposition machines, 79b
Photographs, 11c(9)
Plates, reproduction, 80f(3)
Portions, 11b(5)
Presses, reproduction, 79a
Production control records, 78
Punched cards, 11c(3).
Recordings (sound, magnetic, electronic, and other), 11c(10)
Regraded documents and material, lid
354
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Removable ADP and word processing storage media, 11c(11)
RESTRICTED DATA notation, 11b(8)(a), app. II
Rolled or folded documents, 11c(2)
Subjects and titles, 11b(6)
Tentative, 10g(2)
Titles, 11b(6)
Tracings, 11c(2)
Translations, 11c(12)
Transmittals, 11c(13)
Transparencies and slides, 11c(14)
Upgrading, 11d(3)
Wholly unclassified material, llf
Working papers, 11c(15)
Material, 3bb
Mechanical Devices:
Approval, 36c
Door Devices, 36a(2)
Security enclosures, 36a(1)
Meetings:
Disclosure at:
Contractor facilities, 5q(1), 5q(3)
DoD, 5q(2)
Other User Agencies, 5q(4)
DoD sponsorship:
attendance of foreign nationals or representatives of a foreign
interest, 9b
location, 9c
requests for, 9a
requests for disclosure authority, 9e
requests to attend, 9f
security procedures, 9d
Multiple facility organizations:
Classification guidance, 73c
Clearance records, 28
Collocated facilities, 72c
Concurrent clearances, 20j, 26f
Definition of, 3bc
Exchange of employee rosters, 37g
Interchange of classified information, 72c, 73b
Insurance of LOC's, 26j(2)
Personnel clearances, 20d, 73d
Principal Management Facility (PMP), 3bo
Security clearance administration, 73e
SPP, 5s(1), 72c, 73a
Transfers, 26e
Visits between, 72c, 73
355
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
I.1 1 I . I.
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
JA.I.VAIGLM
National of U.S., 3bd
NATO
classified information:
Access record, 85b
Authority, 84
Briefing, 85c, 85d
Certificate of security clearance, 55
Clearances, 24a(1)(c), 86
Combination, changing of, 5i
Contracting officer functions, 89
Definition of, 3bf
Disposition, 19b, 19c
Marking, 87b
Reporting receipt of, 90
Reproduction, 87a
Security supervisor, 85a
Subcontracting, 91
Transmission:
outside U.S., 88c, 88d
within U.S., 88b
Visits involving, 52, 53
Visits records, 54
Need-to-know, definition of, 3bg
Negotiator, definition of, 3bh
Notations:
Dissemination and reproduction,
Downgrading or declassification,
Foreign government information,
FORMERLY RESTRICTED DATA, 11b(8)
Intelligence sources and methods
NATO information, 11b(8)(f)
RESTRICTED DATA, 11b(8)(a), app.
11b(8) (d)
11b(7), app. II
11b(8)(e), lie
(b), app. II
, 11b(8)(c)
II
Notification of Postal Authorities, 6a(11), 7
Nuclear Weapon Security Program, 3bi, 20c,
Office of Industrial Security, International, 95
Officers, definition of, 3bj
Operations Security (OPSEC):
Applicability, 126
Contractor requirements, 5ai
Definition, 3bk.1
EEFI, 3ai.1
General, 125
Indicators, 3bk.2
Purpose, 124
Scope, lh
Self-inspecting procedures, 127
356
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
&PULP al.A.VoLL?Ja
Orientation of personnel, 5f, 5g
Overseas operations,
Access to U.S. classified information:
general, 92, 93
notification of overseas assignment, 96
overseas assistance, 95
Safeguarding U.S. classified information, 96:
custody and storage, 94c
disclosure, 94d
security classification guidance, 94a
transmission, 94b
Security briefings and certificates, 97
Access to classified information of foreign governments and international
pact organizations under a security assurance:
general, 98
security assurance, 99
Parent, definition of, 3b1.1
Parent-subsidiary:
Clearance requirements, 72a
Collocation of facilities, 72c
Exclusion action, 72a
Interchange of classified information, 72b
Patentable material, 5m(1)(b)
Patrols, patrolling:
Closed areas, 34a(3)
Facility complex, 14a(4)(b)
Rooms, buildings, structures, 14a(2)(b), 14a(4)(b)
Strongrooms, 14a(3)(f)
Personnel:
Clearance (see "Clearance (individuals)")
Exclusion, 5e
Identification, 8
Suspected compromise, investigation of, 7
Personnel Security Clearance (PCL), 3bm
Possessions, 3bn
Preemployment Clearance Application -- Prohibited, 25
Principal management facility (PMF), 3bo, 73
Printing (see "reproduction")
Production of classified materials:
Incorporation of, 12f(4)
Other material, 12f(3)
357
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
LAW aLLVIDLL?gl
SECRET documents, 12f(2)
TOP SECRET, CRYPTO, and special access documents, 12f(1)
Protected area, definition, 3bp
Protective Security Service, 3bq, 3cq, 3cm.1, 17a(2)(b), 17a(2)(d), 17c(5)(b)
Public disclosure, 5o (also see "Disclosure")
Pulping (for destruction), 19c
Qualified carrier, 3bs, 17c(5)
Receipts:
? Inner containers, inclusion, 12g(2), 17a(1)
Obtained during visits, 17i
Retention of, 12g(3)
Signing and return of, 12e(2)
Suspense file and follow-up, 12g(3)
Within a facility, 13d
Receipt and dispatch records, 12c
Receipt and classified material, 12e
Reciprocal Clearance
Access limitations, 31.3
Record of:
Accountability, 12a
Alternate storage facilities, 15c
Badges and identification cards, 8a(5)
Citizenship, app. XII
Clearances, 28
Combinations, knowledge of, 14c
Control cards, electronic, 36a(1)(a), 36b
Control station personnel, 12d
CNWDI, personnel having access to, 120
Destruction, 19e
Discussions and photographs, 38c
Dispatch of classified material, 12g
Inventory and accounting, 12b
Inventory, visits, 171
NATO access, 85b
NATO visits, 54
Production control, 78
Production of classified material, 12f
Receipt and dispatch, 12c
Receipt of classified material, 12e
Reproduction, 18c
Retention of, 5m
Termination of accountability, 12h
TOP SECRET access, 13a
Visitors, 39
358
?I?
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Reference material, 3bt
Registry, central, 87a, 90
Regrading:
Authority, app. II
Definition of, 3bu
Marking, lid
Release of classified information, 5x
Removal of classified material to residence, 14e
Reports, reporting:
Adverse information, 6b(1)
Assignment of immigrant aliens, 6b(6)
Attendance at meetings, 5u(1), 6b(9)
Authorization to apply classifications, 6a(14)
Badges and identification cards, 6a(13)
Category of classified information, 6a(8)
Changed conditions, 6a(4)
Change in closed or restricted area, 6a(5)
Change in employee's status, 6b(2)
Change in storage capability, 6a(6)
Citizenship by naturalization, 6b(7)
Delay in shipment, 6a(10)
Employee information in compromise cases, 6a(7)
Employees desiring not to perform on classified work, 6b(10)
Espionage, sabotage, or subversive activities, 6a(1), 6c
Evidence of tampering, 6a(11)
Foreign classified contracts, 6a(17)
Improper shipment, 6a(12)
Inability to safeguard classified material, 6a(16)
Location or disposition of classified material, terminated from
accountability, 6a(15)
Loss, compromise, or suspected compromise, 6a(2), 6a, 7
Official investigation, 6b(3)
Other security violations, 6a(3)
Preliminary inquiry, 7d
Receipt of classified information not related to a classified
contract, 6a(18)
Relationships in Designated countries, 5v, 6b(4)
Representative of a foreign interest, 6a(4)(d), 6b(5)
Termination of business, 6a(4)(e)
Termination statement, 6a(9)
Travel or attendance at meetings, 5u(1), 6b(9)
Visits by Designated country representatives or nationals, 6a(19)
Representatives of a foreign interest, 3bw, 20k, 22f
Reproduction:
Area controls:
bindery areas, 79c
composition areas, 79b
359
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part- Sanitized Copy Approved forRelease2012/08/17 : CIA-RDP89B01356R000200350006-4
)LLU.LL-M
darkrooms, 79d
pressrooms, 79a
proofreading areas, 79e
shipping entrances, 79f
Authorizations for, 18a
Blankets, rubber, 80f(2)
Blankets, other than rubber, 80f(3)
Bulk shipments, 80e
Designation of equipment, 18
Destruction, special requirements, 81
Identification of:
linecasting machines, 79b
photocomposition machines, 79b
presses, 79a
Mailing lists:
classified, 82a
related material, 82a
unclassified, 82b
Overruns, 80a
Plates, 80f(3)
Press, parts of, 80f(4)
Production material, 80f(1)
Proofs, 80b
Records:
control stations, 18c
production control, 78
Regraining of plates, 80f(3)
Samples, return of, 80d
Waste, disposal of, 80c
Restricted Area, bx (see "Controlled areas")
RESTRICTED DATA:
Access limited, 31.3
Clearance for access to, 24a(1)(a)
Definition of, 3by
Dissemination, 171
Marking, 11b(8)(a), app. II
Violations involving, 7d
Visits involving, 42, 46, 47
Retention of classified material:
By subcontractors, 64
General, 5m, 10c
Return of classified material, 51, 64,
Return of samples, 80d
Safeguarding:
General, 5d
Individual responsibility, 5f
Verification of, 59b
360
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Safeguarding U.S. information overseas:
Custody, 94c
Disclosure, 94d
Storage, 94c
Transmissions, 94b
Safeguards during use, 16
Sales literature,.
SECRET
SECRET material/information:
Accounting for, 12a
Authority for:
disclosure at meetings, 9e
removal to residence, 14e
reproduction, 18a
transmission, 17e
Clearance for access to, 24a, 26c
Definition, 3bz
Destruction of, 19d, 19e
Inventory and accounting, 12b
Preparation for transmission, 17a
Production of, 12f
Receipts for, 12g, 17a
Release or transmission outside contractor's facility, 5x
Storage:
containers, 14a(3)
supplemental controls, 14a(4)
Transmission:
by commercial carrier, 17a(2)
outside a facility, 17c
outside U.S., 17e
preparation for, 17a(1)
within a facility, 17f
Security, agreement:
Execution of, 21
Termination of, 5n
Security briefings and debriefings:
COMSEC, 5g
CNWDI, 119
Defensive, 5u, app. VII
Destruction, official, 19d
Individual responsibilities, 5f, app. VII
NATO, 85c
Overseas assignment, 96
Refresher, 97c, 97d
Security briefing and certificates, overseas, 97
Security briefing and termination, 5g
TOP SECRET, 5g, 13b
Visitors, Category 5, 41e
Visitor escorts, 38b
361
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
11I L. 1 I I
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Security checks, 5j
Security cognizance, id, 3cc
Security, definition of, 3cb
Security education, 5f
Security enclosures, 36a(1)
Security inspections, 5ac, 5ag
Security of combinations, 51
Security supervisor (see "Facility security supervisor"), 5a
Security violations, 5aj, 6b(1)
Self-inspection, Sac
SENSITIVE COMPARTMENTED INFORMATION:
Clearances, 24a(1)(a), 75d
Contracts, 75b, 75c
Definition of, 3cd
Shipments:
Bulk, 80e
Notification of consignee, 17c(5)(d)
SECRET, controlled, 3ca
Shipper, 3ce
Short title, 3cf
Shredders, 19c
Signature and Tally Record, definition of, 3cg
Single line service, 3ch
Special access programs, 3ci, 5t
Special features of design, 5h
Standard Practice Procedures,
AIS, 112d
Annual visits at uncleared locations, 73a
Collocated facilities, 72a
Destruction procedures, 19c(4)
Emergency procedures, 5w
Limiting PCL's, 20a
Security controls in multiple facility organizations, 73
Security procedures of overseas locations, 97e
362
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Standards, Underwriters' Laboratories, 35b
Storage:
Alternate storage locations, 15
Bulky material, 14b
Classified waste, 19f
CONFIDENTIAL material, 14a(5)
Desk pedestals, 14a(3)(g)
En route to destination, 17h
GSA approved cabinets, 14a(1), 14a(3)(a)
Lock bar, security of, 14a(3)(g)
Overseas, 94c
Private residence, 14e
Protection during nonworking hours, 14d
SECRET material, 14a(3), I4a(4)
Steel file cabinets, 14a(3)(d)
Supervision of containers, 14c
Supplemental controls for:
SECRET material, 14a(4)
TOP SECRET material, 14a(2)
TOP SECRET material, 14a(1)
Vaults:
Class A, 14a(1), app. IV
Class B, 14a(3)(b), app. IV
Class C, 14a(3)(e), app. IV
Strongrooms, 14a(3)(f), app. IV (para. F)
Subcontractors, vendors and suppliers:
Approval of requests from, 56
Badging of, 8a(7)
Classification guidance, 60
Clearance status of, 58
CNWDI access, 122
Disclosure of TOP SECRET material to, 59a
Disposition of classified information, 64
Distribution of guidance, 61
NATO access, 91
Safeguarding ability of, 59
Selection, notification of, 62
Subcontracting on foreign contracts, 66
Subcontracting with foreign industry, 65
Telephone requests, regarding, 59b(4)
Unsatisfactory conditions at, 63
Visit requests for, 41a(3)
Subsidiary, 3cj
Supplanting alarm systems, 35a(1)
Supplemental alarm systems, 35a(2)
363
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
L 11 1 1 Il
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-M
Symposium involving classified material, 5m(2)
System Security Officer (SSO), 3cj.1
System Software, 3ck
Temporary help suppliers, 5ab, 74
Tentative markings, 10g(2)
Termination of accountability, 12h
TOP SECRET:
Access, general, 113b, 13g
Access by employees working alone, 13c
Access records, 13a
Accounting for, 12a, 13f
Authority for:
disclosure at meetings, 9e
disclosure to subcontractors, 59a, 13k
removal to residence, 14e
reproduction, 13i, 18a,
transmission, 13j, 17b Clearance for access to, 26b
Control station personnel, 12d
Definition of, 3c1
Deliveries, 13g
Destruction of, 19e
Dissemination, 13d
Inventory and accounting, 12b, 13f, 13h
Preparation for transmission, 17a
Production of, 12f
Receipts for, 12g(2), 13e, 17a
Release or transmission outside contractor's facility, 5x
Reproduction, 13i
Security assurance, issuance of, 99b
Special requirements, 13
Storage:
containers, 14a(1)
supplemental controls, 14a(2)
Transmission:
method, 17b
preparation for, 17a(1)
within a facility, 17f
Violation, involving, 7b
Transmission:
Aboard aircraft, 17h, app. X
Additional protection during visits, 171
Additional requirements, commercial carriers, 17a(2)
364
Declassified in Part -Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
Addressing mail or shipment, 17k
Commercial carrier, 17d(3)
Definition of, 3cm
Electrical, 17b, 17c(4), 17d(1), 109
Inspection of classified mail and shipments, 12e,
Method of transmitting:
COMSEC material, 17j
CONFIDENTIAL material outside facility, 17d
CNWDI, 123
NATO material, 88
outside U.S. and possessions, 17e, 94b
SECRET material outside of facility, 17c
SECRET and CONFIDENTIAL material within a facility, 17f
TOP SECRET material outside facility, 17b
TOP SECRET material within facility, 17f
Notification of consignee, 17c(5)(d)
Preparation for:
CNWDI, 123
outside a facility, 17a(1)
within a facility, 17a(3)
Protection en route, 17h Procedures for, 5k
Report of evidence of tampering, 6a(11)
Restriction for RESTRICTED DATA, 171
Transportation Protection Service (TPS), 3cm.1
Transshipping, 3cn, 17c(5)(d)
Trust territory, definition of, 3co
Type A Consultants, 68
Type B Consultants, 69
Type C Consultant's, 70
Unauthorized persons, 3cp
United States, definition of, 3cq
Upgrade, definition of, 3cr
User Agencies, 3cs
Vaults and strongrooms:
Class A, 14a(1), app. IV
Class B, 14a(3)(b), app. IV
Class C, 14a(3)(e), app. IV
Verification of facility clearances, 58
lAS
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22-14
Verification of facility safeguarding and storage, 59b(4)
Visitor badges, 8b
Visits:
Advance notice, 37d
Authority for, 37e(4)
Carrying classified material on, 17e, 17f
Category 1, 41a
Category 2, 41b
Category 3, 41c
Category 4, 41d
Category 5, 41e
Control of, 38b
Criteria for approval, 37b
Disapproval notice, 37c
Escorts, 38b
Export license, 41d(3)
Facility clearance, verification of, 38a
Identification of visitor, 38a
Industrial security representatives, 37h
Involving RESTRICTED DATA, 42
Long-term, 40
Multiple facility organization, 73
NATO visits:
clearance certificate, 55
definition of, 39b
records of, 54
recurring, 52d
NPLO programs; 53
Processing time, 49
Recordings and discussion, 38c
Records of, 39
Recurring, 37f
Removal of classified material, 38d
Reporting Designated country visits, 6a(19)
Requests, contents of, 37d, 41
Telephone requests regarding, 37d
Under bilateral agreements, 51
Use of OISI for, 50
Visits to:
DOE and its contractors, 46
Foreign government and activities, 48
Government activities other than DOE, 47
User Agencies in the U.S., 44
User Agencies outside the U.S., 45
Waste material, 19f, 80c
Weapon system, definition of, 3ct
366
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17: CIA-RDP89B01356R000200350006-4
DoD 5220.22?M
Witnesses for destruction, 19d
Word processing system, definition of, 3cu, section XIII
Working hours, definition of, 14a(2)
Working papers, 11c(15), 12f
367
Declassified in Part - Sanitized Copy Approved for Release 2012/08/17 : CIA-RDP89B01356R000206350006-4