AGENCY SECURITY CLASSIFICATION COSTS ESTIMATES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
06810072
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
4
Document Creation Date: 
March 9, 2023
Document Release Date: 
April 15, 2021
Sequence Number: 
Case Number: 
F-2018-02000
Publication Date: 
January 1, 2017
File: 
AttachmentSize
PDF icon AGENCY SECURITY CLASSIFIC[15890402].pdf240.69 KB
Body: 
Approved for Release: 2021/04/06 C06810072 AGENCY SECURITY CLASSIFICATION COSTS ESTIMATES Department/Agency: Central Intelligence Agency Point of Contact: (Name and phone number) Fiscal Year: 2017 Reporting Categories 1. Personnel Security (include clearance program, initial investigations, national agency checks when used as basis for granting a clearance, adjudication, reinvestigation, polygraph associated with classification-related activities) Please use actual dollar figures. 2. Physical Security (include physical security equipment, protective forces, intrusion detection and assessment, barrier/controls, tamper-safe monitoring, access control/badging, visitor control associated with classification-related activities) 3. Classification Management (include resources used to identify, control, transfer, transmit, retrieve, inventory, archive, declassify, or destroy classified information) 4. Declassification (include resources used to identify and process information subject to the automatic, systematic, discretionary, or mandatory review programs authorized by Executive Order or Statute) 5. Protection and Maintenance for Classified Information Systems (include resources used to protect and maintain classified information systems from unauthorized access or modification of information, and against the denial of service to authorized users, including measures necessary to detect, document, and counter such threats) 6. Operations Security and Technical Surveillance Countermeasures (include personnel and operating expenses associated with OPSEC and TSCM) 7. Professional Education, Training, and Awareness (include resources used to establish, maintain, direct, support, and assess an information security training and awareness program; certification and approval of the training program; development, management, and maintenance of training records; training of personnel to perform tasks; and qualification and/or certification of personnel associated with classification-related activities) 8. Security Management, Oversight, and Planning (include resources associated with research, test, and evaluation; surveys, reviews, accreditation, and assessments; special access programs; security and investigative matters; industrial security; and foreign ownership, control, or influence (FOCI)) 9. Unique Items (include department/agency-specific activities not reported in any of the categories listed above, but are nonetheless significant and need to be included) TOTAL (sum of items 1-9) Narrative: Provide a brief explanation of any significant difference between last year's and this year's cost NATIONAL ARCHIVES AND RECORDS ADMINISTRATION AUTHORIZED FOR LOCAL REPRODUCTION Page 1 of 4 STANDARD FORM 716 (07-11) Prescribed by NARA/ISOO 32 CFR Part 2001.90 E.O. 13526 SECRE //NOFORN Approved for Release: 2021/04/06 C06810072 Approved for Release: 2021/04/06 C06810072 SECRET//NOFORN Instructions for Completing Form I. General: The data reported will be Government cost estimates only. The estimates of resource costs should be reported, in the aggregate, for the following categories: (1) Personnel Security; (2) Physical Security; (3) Classification Management; (4) Declassification; (5) Protection and Maintenance for Classified information Systems; (6) Operations Security and Technical Surveillance Countermeasures; (7) Professional Education, Training, and Awareness; (8) Security Management, Oversight, and Planning; and (9) Unique Items. In reporting cost estimates associated with the security and management of classified information, please exclude all costs related to broad areas of assets protection (i.e., protection of property and personnel not specifically related to classified information). Counterintelligence* resources should also not be included in this data collection. If 51% or more of a resource is devoted to a classification- related activity, it should be included in this estimate. For those resources used for classification-related activities on a part-time basis, the total time devoted to these activities over a year must be at least 51% in order to be included in this estimate. Even though we no longer ask for the number of FTEs, the cost of personnel associated with the security of classified information should be included in the overall cost estimate for each category. II. Definitions of data to be reported: The primary categories are defined below along with related functional areas to be considered for inclusion. Report only those cost estimates associated with classification-related activities (programs that affect the security of classified information). 1. Personnel Security: A series of interlocking and mutually supporting program elements that initially establish a Government or contractor employee's eligibility, and ensure suitability for the continued access to classified information. Clearance Program: Personnel and activities to determine eligibility and suitability for initial or continuing access to classified information or activities. Initial Investigations: Completing and reviewing Personnel Security Questionnaire, initial screening, filing data in Central Personnel Database, forwarding to appropriate investigative authority, and the investigation itself. National Agency Check: Include only when used for basis for granting a clearance. Adjudication: Screening and analysis of personnel security cases for determining eligibility for classified access authorizations and appeals process. Reinvestigations: Periodic recurring investigations of Government and contractor personnel. Polygraph: Substantive examinations in security screening process. 2. Physical Security: That portion of security concerned with physical measures designed to safeguard and protect classified facilities and information, domestic or foreign. Physical Security Equipment: Any item, device, or system that is used primarily for the protection of classified information and installations. Protective Forces: All personnel and operating costs associated with protective forces used to safeguard classified information or installations, to include but not limited to salaries, overtime, benefits, materials and supplies, equipment and facilities, vehicles, aircraft, training, communications equipment, and management. Intrusion Detection and Assessment: Alarms, sensors, protective lighting, and their control systems; and the assessment of the reliability, accuracy, timeliness, and effectiveness of those systems used to safeguard classified information or installations. Barrier/Controls: Walls, fences, barricades, or other fabricated or natural impediments to restrict, limit, delay, or deny entry into a classified installation. * Counterintelligence means information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations or persons or international terrorist activities, but not including personnel, physical, document, or communications security programs. (48 CFR 970.0404-1) NATIONAL ARCHIVES AND RECORDS ADMINISTRATION AUTHORIZED FOR LOCAL REPRODUCTION Page 2 of 4 STANDARD FORM 716 (07-11) Prescribed by NARA/ISOO 32 CFR Part 2001.90 E.O. 13526 SECRET//NOFORN pg. 2 Approved for Release: 2021/04/06 C06810072 Approved for Release: 2021/04/06 C06810072 SECRET//NOFORN Instructions for completing form, continued Vital Components and Tamper-Safe Monitoring: Personnel and operating activities associated with the monitoring of tamper indicating devices for containers, doors, fences, etc., which reveal violations of containment integrity and posting and monitoring of anti-tamper warnings or signs. Access Control/Badging: Personnel and hardware such as badging systems, card readers, turnstiles, metal detectors, cipher locks, CCTV, and other access control mechanisms to ensure that only authorized persons are allowed to enter or leave a classified facility. Visitor Control: Personnel and activities associated with processing visitors for access to facilities holding classified information. 3. Classification Management: The system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure, classified information, the protection of which is authorized by Executive Order or Statute. Classification management encompasses those resources used to identify, control, transfer, transmit, retrieve, inventory, archive, declassify, or destroy classified information. 4. Declassification: The authorized change in the status of information from classified information to unclassified information. It encompasses those resources used to identify and process information subject to the automatic, systematic, or mandatory review programs authorized by Executive Order or Statute. 5. Protection and Maintenance for Classified Information Systems: A classified information system is a set of information resources organized for the collection, storage, processing, maintenance, use, sharing, dissemination, disposition, display, or transmission of classified information. Security of these systems involves the protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denial of service to authorized users, including those measures necessary to detect, document and counter such threats. This includes TEMPEST (short name referring to investigation, study, and control of compromising emanations from information systems equipment) and Communications Security (COMSEC) (measures and controls taken to deny unauthorized individuals information derived from telecommunications and to ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material). 6. Operations Security (OPSEC) and Technical Surveillance Countermeasures (TSCM): Operations Security (OPSEC): Systematic and proven process by which potential adversaries can be denied information about capabilities and intentions by identifying, controlling, and protecting generally unclassified evidence of the planning and execution of sensitive activities. The process involves five steps: identification of critical information, analysis of threats, analysis of vulnerabilities, assessment of risks, and application of appropriate countermeasures. Technical Surveillance Countermeasures (TSCM): Personnel and operating expenses associated with the development, training, and application of technical security countermeasures such as non-destructive and destructive searches, electromagnetic energy searches, and telephone system searches. 7. Professional Education, Training, and Awareness: The establishment, maintenance, direction, support, and assessment of an information security training and awareness program; the certification and approval of the training program; the development, management, and maintenance of training records; the training of personnel to perform tasks associated with their duties; and qualification and/or certification of personnel before assignment of security responsibilities related to classified information. 8. Security Management, Oversight, and Planning: Development and implementation of plans, procedures, and actions to accomplish policy requirements, develop budget and resource requirements, oversee organizational activities, and respond to management requests related to classified information. Research, Test, and Evaluation: The development, management, and oversight of an acceptance and validation testing and evaluation program, corrective action reports and related documentation that addresses safeguards and security elements. The examination and testing of physical security systems (construction, facilities, and equipment) to ensure their effectiveness and operability and compliance with applicable directives. NATIONAL ARCHIVES AND RECORDS ADMINISTRATION AUTHORIZED FOR LOCAL REPRODUCTION Page 3 of 4 STANDARD FORM 716 (07-11) Prescribed by NARA/ISOO 32 CFR Part 2001.90 E.O. 13526 SECRET//NOFORN pg. 3 Approved for Release: 2021/04/06 C06810072 Approved for Release: 2021/04/06 C06810072 SECRET//NOFORN Instructions for completing form, continued Surveys, Reviews, Accreditation, and Assessments: Personnel and activities associated with surveys, reviews, accreditations, and assessments to determine the status of the security program and to evaluate its effectiveness; development and management of a facility survey and approval program; facility pre-survey; and information technology system accreditation. Special Access Programs (SAP): Programs established for a specific class of classified information that impose safeguarding and access requirements that exceed those normally required for information at the same classification level. Unless specifically authorized by the President, only the Secretaries of State, Defense, Energy, and the Director of National Intelligence may create an SAP. Sensitive Compartmented Information (SCI) programs are not included as SAPs for the purpose of these estimates; rather SCI security costs are integrated and estimated throughout all categories as appropriate. Do not include costs here that have been reported under the other primary categories. Security and Investigative Matters: The investigation of security incidents, infractions, and violations. Industrial Security (Non-Contractor Costs): Those measures and resources directly identifiable as Government activities performed for the protection of classified information to which contractors, subcontractors, vendors, or suppliers have access or possession. Examples of such activities are industrial security reviews, surveys, and the granting of facility clearances, and National Industrial Security Program management and administration. Foreign Ownership, Control, or Influence (FOCI): The development and management of a foreign ownership, control, or influence program; evaluation of FOCI submissions; the administration and monitoring of FOCI information and development of FOCI notifications. 9. Unique Items: Those department/agency-specific activities that are not reported in any of the primary categories but are nonetheless significant, and need to be included, should be noted in this category. Any unique item must include a narrative on why it should be included and how the figures were developed. Ill. How to complete the security costs estimates form. The form (page 1) should include estimates of resource costs in the aggregate for each of the nine categories. The cost estimates reported should not include costs associated with the broader area of assets protection. 1. Name of Department/Agency: Self-explanatory. 2. Reporting Categories: List cost estimates in dollar amounts. The cost of personnel associated with the security of classified information should be included in the overall cost estimate for each category. If there are no cost estimates to be reported for a particular category, indicate with a "0" in the appropriate block. 3. Totals: The totals for blocks 1-9 will automatically be placed in the appropriate block. 4. Narrative: In the narrative portion of the form, or in a separate attachment, provide a brief explanation of how cost estimates were determined. If there is a significant difference between the total figures for each fiscal year, explain the differences. Any figure reported within the Unique Items category should be clearly explained in the narrative portion. NATIONAL ARCHIVES AND RECORDS ADMINISTRATION AUTHORIZED FOR LOCAL REPRODUCTION Page 4 of 4 STANDARD FORM 716 (07-11) Prescribed by NARA/ISOO 32 CFR Part 2001.90 E.O. 13526 SECRET//NOFORN pg. 4 Approved for Release: 2021/04/06 C06810072