SENSITIVE COMPARTMENTED INFORMATION: CHARACTERISTICS AND SECURITY REQUIREMENTS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP91B00390R000400380023-0
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
7
Document Creation Date:
December 27, 2016
Document Release Date:
September 12, 2013
Sequence Number:
23
Case Number:
Publication Date:
June 1, 1984
Content Type:
MISC
File:
Attachment | Size |
---|---|
![]() | 257.45 KB |
Body:
Central
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Sensitive Compartmented Information:
Characteristics and Security
Requirements
Prepared b)
The
Security
Committee
June 084
EXHIBIT AIN SUPPORT OF THE DECLARATION OF WILLIAM H. WEBS1ER
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Sensitive Compartmented
Information:
Characteristics and Security
Requirements
June 1984
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Preface
This paper on the nature of sensitive Compartmented Information (SC I)
and pertinent security controls was originally produced at the CON FIDEN-
TIAL level in March 1984. It was intended for background use by legislative
liasion officers responding to Congressional inquiries about SCI security
requirements. It has been redrafted for issuance as an unclassified text
because SCI security recently has become a matter of interest to all three
branches of Government. The concept of providing special systems of
compartmented protection to entire programs of intelligence collection and
production is not widely known or understood. This paper is intended to assist
those who must officially consider various aspects of SCI without the benefit
of extensive experience with these programs.
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 CIA-RDP91B00390R000400380023-0
In the continuing discussions of the appropriate security measures ior
protecting Sensitive Compartmented Information (SC I I. including polygraph
examinations and nondisclosure agreements. there has been little or no
attention to what SCI is. These discussions raise issues about SCI which
include:
Does the nature of SCI lend itself to varying le\ els and kinds of
security protection? Is the SCI accessed by "consumers.' essentially
different from the SCI dealt with by "producers"? Should some
individuals be subject to stricter security screening for SCI access than
others? Should the personnel of agencies not engaged in collecting or
producing intelligence meet the same security standards for SCI
access as those of intelligence agencies? ShOuld political appointees be
required to protect SCI from disclosure in the same manner as career
federal employees? Are those who are granted access to SCI required
to meet a higher standard of personnel security than those cleared for
non-compartmented Confidential. Secret or Top Secret information?
Is there a different assessment of acceptable risk in the SCI systems
than for other classified information?
This report attempts to describe what SCI is. why it is sensitive. why- the
revelation of SC that an unwary individual might consider insignificant or
trival can be damaging to an entire program for SCI collection, and whv we
should not be willing to accept any perceptible level of risk in decisions on per-
sonnel being granted access to SCI.
Sensitive Compartmented Information is data about sophisticated tech-
nical systems for collecting intelligence and the information collected by those
systems. The characteristics of the systems that necessitated the development
of SCI programs are (a) that compared to conventional intelligence activities
employing human. sources, many more people normally must know sensitive
information in order to develop. build. and operate the systems and to analyze
the material they collect: (b) that they generally produce large quantities of
.accurate. detailed intelligence, which is needed and relied upon by senior
planners and policymakers, and which. by- its nature. is extremelY fragile, in
that it reveals the characteristics of the systems that collect it: and (c) that
they are extremely vulnerable to adversary countermeasures. i.e.. denial or
deception.
Most people can easily understand the need for tight security in classic
espionage operations employing live agents. The need for strong security is
dictated by the need for source protection and, of course. it is clear that the
apprehension of an agent results in the loss of valuable intelligence. The
neutralization of a technical collection system is more akin to the loss of a
whole agent network than to the loss of a single agent and the loss of such sys-
tems has severe consequences. These include the loss of valuable intelligence
1
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
??....???....,... ?,., til
'developing and producing. new technical collection s\ steins. \%hich.' are
extremely expensive, state-of-the-art programs, and the risks io the national
security attendant to a lack of knowledge of what our adversaries are up to.
Communications intelligence, as defined by 18 U.S.C. 798. is the classic
example of SCI. and normally is derived from intercepted communik.?ations.
The unauthorized disclosure of such intelligence can reveal to the target
country which of its messages are being intercepted and which ones are being
read. If the targeted country takes the clearly indicated countermeasures, no
further intelligence can be expected from that source and by that method.
Similarly, the compromise of other technical collection systems, or intelli-
gence derived from them, can tell our 'adversaries the capabilities of the
systems and how to take countermeasures. Even worse, once the target
country's government knows what the systems collect and how it is collected,
it has the option of conducting deception operations. i.e., providing misleading
data which may result in defective U.S. foreign and defense policies.
To guard against these risks. SCI security control systems have been
evolved in the years since World War II. when the Japanese and German.
cryptographic systems were broken by. the Allies, furnishing intelligence
which was vital to victory over the Axis Powers. In structuring these systems.
the lessons of Pearl Harbor have been borne in mind ... the systems must
permit timely dissemination of sensitive intelligence to those who need it to
guide and carry out U.S. defense.and foreign policy. Over the years. it has
been demonstrated that the recipients' confidence in intelligence reporting
has a direct relationship to the recipients' knowledge of the source or method
producing it. Because of the amount of intelligence produced by the SCI
systems and its broad utility, those with ?access to SCI number in the
thousands.
The authority for SCI control systems is based upon the statutor%
responsibility of the Director of Central Intelligence (DCI). under the
National Security Act of 1947, for the protection of intelligence sources and
methods, and upon Executive Order 12356, which authorizes him to create
special access programs for especially sensitive intelligence activities.
SCI systems, therefore, cover activities and information of extraordinary
sensitivity and fragility from a security standpoint. They serve to restrict
access to the protected information to persons who (a) have a clearly
established official need for that information, and (b) who meet more rigorous
and stringent personnel security criteria. Persons cleared for Confidential.
Secret, or even Top Secret information are not automaticalk eligible by
virtue of those clearances for access to SCI.
The personnel security criteria for access to all SCI are established by
the DCI and are peoMulgated in Director of Central Intelligence Directive
1/14. Comparatively, the criteria for TS clearance require that denial be
based upon a well-defined character or personality defect posing a threat to
the national security. Because of the vulnerabilities and susceptibilities of SCI
programs, special judgments must be made. In effect, no risk is tolerable
where SCI is involved, and individuals who have been granted Top Secret
Declassified and Approved For Release 2013/09/12 CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
4.60 top Secret does not automatically guarantee ti( I .1C12C \\ ;11111r111,11, I he denial
of SCI approval does not net:essarily mean denial or roocation fl'S
clearance. This reflects the difference in the way S('I eLlint i manAged.
and that it involves a higher order of security than non-S( I security.
SCI security control system.s depend upon distinctive markings and
restricted handling of material. stricter personnel security processing for
access, and holding SCI material in "control centers" with physical and
procedural barriers to preclude access by those who have not been formath
approved. The SC1 control systems provide an organized program for
predetermining a generalized need-to-know regarding specific categories of
intelligence and/or the sources and methods employed in their collection.
Everyone authorized access to SC1, regardless of that person's function.
receives information that. if revealed to an unauthorized person. can compro-
mise the system and reveal ways of countering it. Because the intelligence in-
herently is source-revealing, the reader of an SCI intelligence report is just as
capable of revealing compromising data about a system as the builder or
operator of the system. Material collected by SC1 systems which does not
reveal the characteristics and vulnerabilities of the source is considered to be
sanitized and is disseminated outside compartmented channels.
In accepting sensitive compartmented information, the recipient accepts
the accompanying responsibilities and restrictions in a most explicit way.
Each individual approved for access is indoctrinated on the extreme vulnera-
bilities of the collection systems. the risk to the sx stems of the unauthorized
disclosure of the intelligence they collect, and the rules for safeguarding SC!.
As a condition of access, the newly approved individual signs an agreement to
abide by the security rules for SCI.
To summarize, the rationale for SCI control systems includes the
following concepts:
? Sources and methods producing quantities of high quality intelli-
gence. which are extremely vulnerable to countermeasures. require an
extraordinary degree of security protection.
? Extraordinary protection can be afforded by restricting knowledge of
these sources and methods and, where necessary. the intelligence they
produce. to persons who have been subjected to especially thorough
security screening. whose knowledge of such information is required
for the performance of functions essential to the national security, and
who have entered into an agreement requiring that they protect these
sources and methods in the manner prescribed by the U.S.
Government.
? Because of the extreme vulnerability to countermeasures of the
operations covered by SCI control systems, persons granted access to
SCI must be determined by thorough investigation to be reliable and
trustworthy. The objective of personnel security determinations for
SC1 access should be a risk-free population of approved individuals.
Therefore, a substantially more vigorous personnel screening process
3
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0
1.,t ,I1 Ilt:1
IS rleieSS;11" arta a iCriiiii1.tili1 ,i,muilru
classified in forma
Lon must be used
Especially restricted channels are required for
the transmission and
use of data revealing the sensitive nature of thee soil rt:c. and
methods. and of derived intelligence having
tae innate caoabilit
compromise such data.
-- Regardless of how carefully the security system is structured. the
security of our secrets depends. in the final analysis. upon ever\
person granted access. If any one of those entrusted with these secrets
has vulnerabilities or susceptibilities which may be exploited. then our
security can be breached. Every effort must be expended to avoid
such an occurrence.
4
Declassified and Approved For Release 2013/09/12 : CIA-RDP91B00390R000400380023-0