25X1 Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050103=6
N
Confidential
DIRECTOR
OF
CENTRAL
INTELLIGENCE
A Security Manual for Industry
D
RA
The APEX Special Access
Control System
Confidential
Copy
113
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
? Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
National Security Unauthorized Disclosure
Information Subject to Criminal Sanctions
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29: CIA-RDP85T00788R0001000Atiai
Contents
1. Introduction 1
II. Organizational Structure
III. Description of System 2
IV. Responsibilities of Contractor APEX Control and Security Officers 4
a. Duties of Contractor APEX Control Officers 4
b. Duties of Contractor APEX Security Officers 4
V. Security Standards for Access Approval 5
f. Contacts or Associations With and Marriages to Foreign 10
Nationals
VI. Factors Governing Contractor Access 12
b. Factors Considered in Selection of Contractor Firms 12
VII. Physical Security 14
a. Construction and Protection Standards 14
e. Emergency Destruction and Evacuation Planning 15
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
- Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
VIII. Technical Security
16
a. Technical Security Countermeasures Inspections
16
c. Compromising Emanations Control (TEMPEST Security)
16
IX. Access Approval Certifications
16
X. Security Classification and Control Guidelines
17
c. Challenges to Classification Levels and Control Restrictions
17
d. Pouching and Transmittal Requirements 19
XII. Procedures for Control of Specialized Hard-Copy Documents
22
b. Film/Photographic Materials
22
XIII. Security Violations/Compromises
23
Confidential vi
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R0001000e6tial
XIV. Security Education 24
a. General 24
b. Initial Indoctrination 24
c. Periodic Reindoctrination 25
d. Termination of Access 25
Glossary of Terms
B. USIB Policy Statement Establishing Physical Security Standards
for Sensitive Compartmented Information Facilities, 30 April 1973
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R00010005Q'09Ifd6ntial
The APEX Special Access
Control System
1. Introduction
This manual describes the Special Access Security Control System known as
APEX. The system was established to control and protect the Special Access
programs within the category of national security information called National
Foreign Intelligence.
This manual will serve as the authoritative guide for the security and control of
APEX material. Existing directives and regulations governing the protection and
control of Sensitive Compartmented Information (SCI) will be superseded or
revised, if necessary, to be in accordance with this manual. The manual is not,
however, intended to intrude on the activity of Senior Intelligence Officers (SIOs)
of the Intelligence Community, who will continue to prescribe basic direction and
classification guidance.
Certain terms used in this system are unclassified when standing alone or not
connected to the intelligence activities or intelligence information they designate.
The terms are: APEX; the APEX Security Control System; the codewords which
identify the categories of intelligence product within the sytem (that is, COMINT,
HUMINT, IMAGERY, and TECHNICAL); and the especially sensitive material
designators in the I icategory. The codewords which identify highly sensitive 25
collection projects may be used outside the APEX control system, but must be
protected by the standard classification level of CONFIDENTIAL. The nature of
individual contracts, however, may require that the connection of a contractor to
APEX activity be treated as classified by virtue of the association.
11. Organizational Structure
Senior Intelligence Officers of the Intelligence Community, government contract-
ing officers, and industrial contractors authorized access to APEX materials are
responsible for enforcing the policy and implementing the procedures outlined in
this manual.
To fulfill their responsibilities, government officials may provide, as necessary,
additional implementing guidance to contractors under their cognizance as long as
such guidance does not conflict with the provisions of this manual.
Although the government and industrial officials specified above must have the
overall responsibility for policy compliance and implementation of pertinent
procedures, adherence to the security and control procedures outlined in this
manual is also the personal responsibility of each person indoctrinated into the
APEX Security Control System.
1 Confidential
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
To assist in carrying out the precepts dictated by the APEX Security Control
System, the cognizant government security official will appoint or cause to be
appointed Contractor APEX Control Officers (CACOs) and Contractor APEX
Security Officers (CASOs), with alternates, to administer the system within
contracting firms. CACOs and CASOs shall be appointed within each firm at
whatever levels may be appropriate. Their responsibility is to actively administer the
APEX system within their firms and to ensure full compliance with the provisions of
this manual and any subsequent supplemental APEX directives that may be issued.
It is preferable that the CACO and CASO positions not be held by the same
individual unless management, operational, and organizational considerations
clearly dictate otherwise. In that case, the CACO may also be appointed to serve as
the CASO.
SIOs are responsible for the establishment of Contractor APEX Control Facilities
(CACFs) within industry for the control, storage, and use of APEX materials.
These facilities will be consolidated or decentralized within industrial firms,
depending on joint security-management concerns.
All APEX information will be transmitted and maintained within the APEX
Security Control System. Compartmentation within the system will be denoted by
the use of terms identifying categories of product information and by project
codewords which refer to collection activities.
III. Description of System
The APEX apparatus provides a single system for controlling access to, and
distribution and protection of, selected intelligence information and collection
programs requiring extra security measures. Within this unified system there are
distinct means of controlling access to operational data, as well as access to generic
sources of intelligence information and to finished product, by the establishment of
disciplined, balanced threshold criteria that allow only sensitive data to be placed
inside compartmented access control.
b. Access to APEX There are three basic requirements for individual access to the APEX Security
Security Control System Control System:
1. Certification by the SIO of a need-to-know for specific aspects of the system. In
the case of access to operational projects, a nominee's need-to-know must be
validated by the SIO and have the approval of the operational Program Manager or
director.
2. Favorable adjudication by the SIO that the nominee meets uniform personnel
security criteria and investigative requirements set forth in this manual.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29: CIA-RDP85T00788R0001000efitial
3. Security Indoctrination and execution of a nondisclosure agreement as a
condition of access to APEX material. The security indoctrination will provide the
individual with prescribed information so that he or she will know what is to be
protected, his or her responsibilities in doing so, and general information about the
APEX system. If additional access approvals are required, the processing steps
enumerated above will be repeated. Upon indoctrination for any access to APEX
material, the completed indoctrination agreement will be forwarded to the SIO.
c. Revalidation of Access It is the responsibility of each SIO to maintain a continuous review of access
approvals to ensure that only those personnel with documented need-to-know have
access at any time. In addition, in January of each year, SIOs and the DCI will
review all extant approvals under their cognizance and revalidate need-to-know
requirements. Those accesses no longer required will be formally terminated.
d. Termination of Access When it has been determined that certain accesses are no longer required, each
individual concerned will be notified that his/her access to specific types of
information is being terminated. The responsible SIO will be notified of all
terminations of access.
Personnel may, within need-to-know requirements, be authorized by responsible
SIOs to retain access approvals when they transfer internally within their industrial
firms. However, when an individual leaves one firm to join another, all his/her
approvals will automatically be canceled until a need-to-know is established by the
responsible SIO. Following approval by an SIO, those accesses deemed necessary
for the completion of assigned duties with the new employer will be granted or
reinstated and a new secrecy agreement will be signed.
e. Termination Secrecy At the time access is no longer required, the individuals concerned will be required
Agreement to account for and surrender all APEX documents under their cognizance and
control, and to execute a Termination Secrecy Agreement certifying that they
retain no material or documents in the APEX system and are aware of the
continuing obligation not to discuss or otherwise reveal APEX-controlled
information.
f. Access Approvals To control access to information within the APEX Security Control System, SIOs
will provide only those access approvals required to fulfill the needs of the
contract(s).
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
IV. Responsibilities of Contractor
APEX Control and Security Officers
a. Duties of Contractor Contractor APEX Control Officers will:
APEX Control Officers
1. Ensure that APEX materials are accounted for, controlled, disseminated,
destroyed, packaged, and otherwise safeguarded in accordance with provisions of
this manual.
2. Act as the control point within a Contractor APEX Control Facility for receiving
and dispatching APEX materials via electrical, courier, or other means approved for
the transmission of APEX materials.
3. Complete and return to the sender receipts attached to APEX documents
received. Ensure that all outgoing materials have properly prepared receipts and
send tracers as required for receipts not returned.
4. Ensure that APEX materials are disseminated only to those persons properly
indoctrinated and with a need-to-know.
5. Provide advice and guidance on the proper classification levels, codewords, and
caveats within the APEX Security Control System.
b. Duties of Contractor Contractor APEX Security Officers will:
APEX Security Officers
1. Coordinate and receive prior approval for accreditation and establishment of
APEX control facilities.
2. Maintain current listings of all APEX-accessed individuals within their
jurisdiction.
3. Process all APEX access approval requests for personnel within their jurisdiction.
4. Conduct required security indoctrinations and debriefings of personnel approved
for APEX access and obtain signed Nondisclosure and Termination Secrecy
Agreements as necessary.
5. Conduct reindoctrinations on a periodic basis, not to exceed two-year intervals.
6. Ensure periodic security inspections of Contractor APEX Control Facilities
under their jurisdiction; submit a report of this inspection, with any recommenda-
tions for corrective action, to the accrediting official, and conduct followup action on
recommended corrective measures.
Confidential 4
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R00010001Iae6tial
7. Ensure investigation of any possible security infractions involving APEX
information under their jurisdiction to determine if a compromise has occurred,
make appropriate recommendations, and prepare required reports. These reports
will be forwarded as soon as feasible to the responsible SIO.
8. Notify responsible SIOs of all additions and deletions of access approvals within
the APEX system on a timely basis.
V. Security Standards for Access Approval
a. Need-to-Know Policy Access to the APEX Security Control System is governed by the need-to-know
policy in conjunction with approval criteria established in this manual. The need-to-
know policy is defined as that determination made by competent authority which
attests to the bona fide need for access in order to perform official duties on behalf of
the US Government. Need-to-know approval rests with the responsible SIO.
b. Personnel Security Criteria for security approval of an individual on a need-to-know basis for access to
Standards the APEX Security Control System are as follows:
1. The individual shall be stable, of excellent character and
discretion, and of unquestioned loyalty to the United States.
2. Except where there is a compelling need and a determination has
been made by competent authority as described below that every
reasonable assurance has been obtained that under the circumstances
the security risk is negligible:
(a) Both the individual and the members of his/her
immediate family shall be citizens of the United
States. For these purposes "immediate family" is
defined as including the individual's spouse, parents,
brothers, sisters, and children.
(b) The members of the individual's immediate family
and persons to whom he/she is bound by affection or
obligation should neither be subject to physical, mental
or other forms of duress by a foreign power, nor
advocate the use of force or violence to overthrow the
Government of the United States or the alteration of
the form of Government of the United States by
unconstitutional means.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
In exceptional cases, the responsible SIO or his/her designee may determine that it
is necessary or advisable in the national interest to authorize access to APEX prior
to completion of the fully prescribed investigation. In this situation, such
investigative checks as are immediately possible will be made at once, and should
include a personal interview by trained security or counterintelligence personnel.
Access in such cases will be strictly controlled, and the fully prescribed investigation
and final evaluation will be completed at the earliest practicable moment.
Exceptions to 2(a)(b) above may be granted only by the responsible SIO or his/her
designee. All exceptions granted will be common sense determinations based on all
available information and will be recorded by the agency making the exception. In
those cases in which the individual has lived outside the United States for a
substantial period of his/her life, a thorough assessment of the adequacy of the
investigation in terms of fulfillment of the minimum investigative requirements and
judicious review of the information therein must be made before an exception is
considered.
c. Investigative The investigation conducted on an individual under consideration for access to the
Requirements APEX Security Control System will be thorough and will be designed to develop
information as to whether the individual clearly meets the Personnel Security
Standards specified above.
The investigation will be accomplished through record checks and personal
interviews of various sources by trained investigative personnel in order to establish
affirmatively to the adjudicating agency complete continuity of identity, to include
birth, residences, education, places of employment, and military service. Where the
circumstances of a case indicate, the investigation will exceed the basic require-
ments set out below to ensure that those responsible for adjudicating access
eligibility have in their possession all the relevant facts available.
The individual will furnish a signed personal history statement, fingerprints of a
quality acceptable to the Federal Bureau of Investigation, and a signed release, as
necessary, authorizing custodians of police, credit, educational, and medical records
to provide information to the investigative agency. Photographs of the individual
will also be obtained where additional corroboration of identity is required.
Minimum standards for the investigation are as follows:
1. Verification of date and place of birth and citizenship.
2. Check of the subversive and criminal files of the Federal Bureau of
Investigation, including submission of fingerprint charts, and of such
other national agencies as are appropriate to the individual's
background. An additional check of Immigration and Naturalization
Service records will be conducted on those members of the
individual's immediate family who are US citizens by reason other
than birth or who are resident aliens.
Confidential 6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29: CIA-RDP85T00788R00010005 9P d ntial
3. A check of appropriate police records covering all areas where the
individual has resided in the United States during the previous 15
years or since the age of 18, whichever is the shorter period.
4. Verification of the individual's financial status and credit habits
through checks of appropriate credit institutions and interviews with
knowledgeable sources covering the previous five years.
5. Interviews with neighbors in the vicinity of all the individual's
residences for periods of more than six months during the previous
five-year period. This coverage will be expanded where the investiga-
tion suggests the existence of some questionable behavioral pattern.
6. Confirmation of all employment during the previous 15 years or
since age 18, whichever is the shorter period, but in any event the
previous two years. This will include personal interviews with
supervisors and coworkers at places of employment over the previous
10 years if appropriate.
7. Verification of attendance at institutes of higher learning in all
instances and at the last secondary school attended within the
previous 15 years. Attendance at secondary schools may be verified
through qualified collateral sources. If attendance at educational
institutions occurred within the previous five years, investigators will
seek personal interviews with faculty members or other persons
acquainted with the individual during his/her attendance.
8. Review of appropriate military records.
9. Interviews with a sufficient number (a minimum of three) of
knowledgeable acquaintances to provide a continuity, to the extent
practicable, of the individual's activities and behavioral patterns over
the previous 15 years, with particular emphasis on the most recent
five.
10. When employment, education, or residence has occurred overseas
(except for a period of less than five years for personnel on US
Government assignment and less than 90 days for other purposes)
during the previous 15 years or since age 18, a check will be made of
records at the Department of State and other appropriate agencies.
Efforts will be made to develop sources, generally in the United
States, who knew the individual overseas in order to cover significant
employment, education, or residence and to attempt to determine if
any lasting foreign contacts or connections were established during
this period. However, in all cases where an individual has worked or
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
lived outside the United States continuously for more than five years,
the investigation will be expanded to cover fully this period in his/her
life through the use of such investigative assets and checks of record
sources as may be available to the US Government in the country or
countries in which the individual resided.
11. In those instances in which any of the situations described in
subparagraph b2(b), above, apply to the immediate family of an
individual under investigation or to a person to whom he/she is bound
by affection or obligation, the investigation will include an interview
of the individual by trained security, investigative, or counterintelli-
gence personnel to ascertain the facts as they may relate to the
individual's access eligibility.
12. In all cases, the individual's spouse will, at a minimum, be
checked through the subversives files of the Federal Bureau of
Investigation and other national agencies as appropriate. When
conditions indicate, additional investigation will be conducted on the
spouse of the individual and on members of the spouse's immediate
family to the extent necessary to permit a determination by the
adjudicating agency that the provisions in paragraph b, above,
concerning personnel security standards are met.
13. A personal interview of the individual will be conducted by
trained security, investigative, or counterintelligence personnel when
necessary to resolve any significant adverse information and/or
inconsistencies developed during the investigation.
If an earlier investigation conducted within the previous five years substantially
meets the minimum standards specified above, it may serve as a basis for granting
access approvals, provided a review of the personnel and security files does not
reveal substantive changes in the individual's security eligibility. If a previous
investigation does not substantially meet the minimum standards, or if it is more
than five years old, a current investigation will be required but may be limited to
that necessary to bring the individual's file up to date in accordance with the
investigative requirements set forth above. If new information developed during the
current investigation should bear unfavorably on activities of the individual that
were covered by the previous investigation, the current inquiries will be expanded as
necessary to develop full details of the new information.
The evaluation of the information developed by investigation of an individual's
loyalty and suitability will be accomplished under the cognizance of the SIO
concerned by analysts of broad knowledge, good judgment, and wide experience in
personnel security and/or counterintelligence.
Confidential 8
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R00010005 J tial
When all other information developed on an individual is favorable, a minor
investigative requirement which has not been met should not preclude favorable
adjudication. In all evaluations, the protection of the national interest is paramount.
Any doubt concerning personnel having access to APEX information will be
resolved in favor of protecting the national security. The ultimate determination
that national security is or is not endangered will be an overall common sense
decision based on all available information.
d. Reinvestigations Programs will be instituted requiring the periodic reinvestigation of personnel
provided access to APEX information. These reinvestigations will be conducted on a
five-year recurrent basis under normal circumstances, but on a more frequent basis
where the individual has shown some questionable behavioral pattern, where
his/her activities are otherwise suspect, or when deemed necessary by the SIO
concerned.
The scope of reinvestigations will be determined by the SIO concerned. His/her
decision will be based on such considerations as the potential damage that might
result from the individual's defection or willful compromise of APEX information
and the availability and probable effectiveness of other means to evaluate
continually the factors related to the individual's suitability for continued access. In
all cases, the reinvestigation will include, at a minimum, appropriate checks of
national or local agencies (including overseas checks where appropriate), credit
checks, and a personal discussion with the individual by trained investigative,
security, or counterintelligence personnel when necessary to resolve significant
adverse information or inconsistencies.
Whenever adverse or derogatory information is discovered or inconsistencies arise
which could impact on an individual's security status, appropriate investigations will
be conducted on a timely basis. The investigation will be of sufficient scope to
resolve the specific adverse or derogatory information or inconsistency in question so
that a determination can be made as to whether the individual's continued
utilization in activities requiring APEX access is clearly consistent with the interests
of the national security.
e. Changes in Personal The responsible SIO must take into consideration any change in personal status that
Status may have a bearing on the continuing eligibility of individuals approved for access to
APEX material. Name changes (resulting from marriage, divorce, or court decree)
must be reported to the SIO.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Confidential Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
f. Contacts or Associ- A close, continuing personal association with a foreign national is a matter of APEX
ations With and Mar- security concern if it is characterized by ties of kinship, affection, or obligation.
riages to Foreign APEX-indoctrinated personnel must protect themselves against cultivation and
Nationals possible exploitation by foreign nationals who are or may be working for foreign
intelligence services and to whom they might even unwittingly provide APEX
classified information. The following types of relationships must be reported to the
cognizant SIO through the Contractor APEX Security Officers:
1. All nonofficial contacts with citizens or representatives of
Communist-controlled countries, no matter how brief or apparently
trivial the contacts may be.
2. Close and continuing or any regular, frequent nonofficial contact
with any other foreign national.
Casual, inadvertent, or irregular contacts which arise from normal living and
working in a community need not be reported. However, if the person with whom
the casual contact occurs shows undue interest in employment, assignment, and so
forth, then the contact must be promptly reported. Whenever any doubt exists about
whether a situation should be reported or made a matter of record, the individual
should promptly make a report to the cognizant SIO through the Contractor APEX
Security Officer. Failure to report such contact may result in denial or withdrawal
of access to APEX material.
APEX-approved individuals who contemplate marriage to a foreign national must
report such plans to their APEX Security Officer along with, at a minimum, basic
biographic details about the intended spouse and his/her immediate family (name,
date and place of birth, country of origin and current citizenship, current residence,
present occupation, and any present or former employment on behalf of any foreign
government). A security evaluation will be undertaken by the cognizant SIO before
there is any determination that a waiver of standards might be made to continue the
approved person in APEX-indoctrinated status.
g. Travel Restrictions
1. Unofficial Travel. Persons granted authorization for access to
certain categories of extremely sensitive information on foreign
intelligence sources and methods protected by the APEX Security
Control System incur a special security obligation and are to be
alerted by their Contractor APEX Security Officer to risks associ-
ated with unofficial visits to, or travel through, certain designated
countries (appendix A). The Contractor APEX Security Officer
concerned should advise that unofficial travel in those countries
without cognizant SIO official approval may result in the withdrawal
of approval for continued access to APEX information for persons
with specific and extensive knowledge of any of the following
Confidential 10
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R00010005kJtial
categories of extremely sensitive information on foreign intelligence
sources and methods:
(a) Technological structure, function, and technique of
sensitive intelligence collection or exploitation
systems/methods.
(b) Designated system targets or sources.
(c) Method and purpose of target selection.
(d) Degree of success of collection or exploitation
system/method.
(e) Capabilities and vulnerabilities of collection or
exploitation system/method.
All persons having access to APEX information who plan unofficial
travel to or through designated countries must:
(a) Give advance notice of such planned travel to the
CASO.
(b) Obtain a defensive security briefing from a
Contractor APEX Security Officer before traveling to
such countries.
(c) Contact immediately the nearest US consular,
attache, or embassy official if they are detained or
subjected to significant harassment or provocation
while traveling.
(d) Report upon return from travel, to the cognizant
SIO through their Contractor APEX Security Officer,
any incidents of potential security concern that oc-
curred during the trip.
2. Official Assignment/ Travel. No contractor with access to APEX
information will be assigned to or directed to participate in hazardous
activities until he/she has been afforded a defensive security briefing
and/or risk-of-capture briefing as applicable.
3. Individuals With Previous Access. Persons whose access to APEX
information is being terminated will be officially reminded of the
risks associated with hazardous activities as defined herein and of
their obligation to ensure protection of APEX.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
VI. Factors Governing Contractor Access
a. General Guidelines Contractors and consultants dealing with participating government agencies or
departments will be furnished only that information which is essential to the
fulfillment of contractual obligations. This manual will serve as the principal
operating directive for the conduct of APEX activities within industry.
b. Factors Considered in The past record of a contractor or consultant in properly safeguarding material will
Selection of Contractor be taken into account when making contractor selections for work on APEX-related
Firms activities. In this regard, when an APEX facility is established in industry, the
responsible government APEX Security Officer will closely monitor its activities to
ensure that APEX procedures are followed completely and that APEX materials
are properly segregated from other classified or unclassified materials of the
contractor.
c. Restrictions on Access Contractor companies under foreign ownership, control, or influence will generally
be ineligible for access to APEX activities and information. However, a waiver of
this provision may be granted, after review by the responsible SIO, if the following
conditions apply: the foreign ownership, control, or influence does not involve a
Communist-controlled country; the foreign interests own less than 5 percent of the
contractor's voting stock; and such minority holdings do not enable the foreign
interest to control the appointment and tenure of the contractor's APEX-approved
managing officials. Before a waiver is granted, provision must be made to ensure
that security safeguards exist to prevent disclosure of APEX-controlled information
to any non-US owners and managing officials. Should foreign ownership increase
beyond 5 percent during the course of a contract, a review of the contractor's
eligibility for continued access will be made.
d. Types of Access Within the APEX Security Control System, there are various types of access in
industry. These types of access are identified as: APEX-GENERAL; APEX
(Operational); APEX-ALPHA (Operational Subcompartment); and APEX
(Product).
The Security criteria for indoctrination are the same for all categories in that all
must be in accord with the APEX security access standards of this manual and must
withstand strict need-to-know tests.
Confidential 12
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R0001000gg?d"tial
The extent of indoctrination for the various categories is as follows:
APEX-GENERAL. This category is intended for guard, protective, administrative,
and other support personnel who need only to know generally that the APEX system
exists and must be protected because of national security concerns. The APEX-
GENERAL access may be given in two phases:
Phase I accommodates persons who do not need
physical access to the substance of APEX materials.
These might include external guards, some switching
center personnel, computer technicians, communica-
tions personnel, and couriers of sealed pouches.
Phase II accommodates those personnel who do not
need APEX-protected materials for the performance
of their duties, but are in positions which would enable
them to have access to the substantive materials
protected by the system. These might include: some
couriers, registry personnel, document control person-
nel, file clerks, secretaries, internal guards, and some
switching center, communications, and computer
technicians.
Persons indoctrinated for APEX-GENERAL access will be instructed that their
industrial firm has a contract or contracts with US Government entities but may not
necessarily be told of the specific departments or agencies. They will not be briefed
on details of operational programs. They will be instructed in the rules for protecting
classified materials, in its proper storage, transport, and destruction, and in the need
for it to be disseminated only to appropriately indoctrinated individuals.
The Phase I and Phase II briefings will be identical, except that those briefed for
Phase II will be advised of the specific codeword relating to the particular project in
which they and their firm participate.
APEX (Operational Codeword) - Phase I. This level of access is intended for
industrial contractors whose personnel need to know about specific operational
parameters but have no need to know all aspects of the activity. Included within the
Phase I briefing would be the general purpose of the activity, those technical details
which are necessary to accomplish that portion of the engineering design,
development, fabrication, or installation that is directly within the individual's area
of assignment. Reference will not be made to the particular governmental sponsor
unless such identity is obvious from the nature of the contract. This category of
access should be considered for machinists, engineers not directly involved in total
program planning, and others not requiring full knowledge of the activity.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
APEX (Operational Codeword) - Phase IL This level of operational access is
reserved for those in industry who, by virtue of contractual necessity or other duties,
are required to have full knowledge of a particular operational activity. The Phase II
level of access will permit knowledge of all data released to the Phase I accessed
individuals and will allow detailed knowledge of the activity mission, sponsor,
financial arrangements, geographic operational bases, system vulnerabilities, and so
forth, as may be necessary. A need-to-know policy still exists despite approval for
Phase II access, and it should not be assumed that all details will be given to all
Phase II accessed individuals.
APEX (Operational Subcompartment) - ALPHA. In addition to the above-cited
phases of access, it is envisiond that under analytical contracts in industry and
academic circles, certain facts about operational compartments will be required by
industrial intelligence processors/analysts. To provide relevant operational details
to such personnel, a separate operational subcategory, designated by the collection
project codeword plus the term ALPHA, is to be used. The intent of this
subcompartment is to avoid disclosure of full operational details not considered
relevant to the contract. Generally this subcompartment will not allow access to
financial or funding details, information pertaining to international agreements,
details about governmental sponsorship, interagency arrangements, vulnerability
data, and such other operational parameters deemed nonreleasable by the
operational program manager or his designee.
APEX (Generic Product). The product resulting from operational collection
projects will be identified within the APEX Security Control System by its generic
term. Access to each of these generic products is not controlled by phases of access.
The APEX Product accesses will be reserved for personnel engaged in analytical
and research projects that produce finished intelligence and for those engaged in
developmental research projects requiring access to intelligence product.
VII. Physical Security
a. Construction and Pro- All materials within the APEX Security Control System must be stored in
tection Standards accredited Contractor APEX Control Facilities. These standards for construction
and protection of ' ` CFs will be as prescribed in appendix B (Physical Security
Standards for Sei,_ __,ve Compartmented Information Facilities, dated 30 April
1973) or other such guidelines that may supersede it.
b. Accreditation of Before an industrial facility is authorized to handle APEX material, it must be
CACFs accredited as having met the aforementioned construction and protection standards.
Confidential 14
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R00010005edjntial
c. Inspections Periodic inspection of CACFs is mandatory and must be done at least annually.
Inspections are to be performed by designated government APEX security
representatives experienced in conducting security inspections for the control and
storage of APEX materials and will assure that procedures and safeguards comply
with standards prescribed by this manual. Reports of inspection will note all
irregularities and will be forwarded to accrediting officials for review and necessary
corrective action. Inspections will include at least a spot inventory of sensitive
documents. Failure to locate any such documents will be reported on a priority basis.
d. Colocation Within When it is deemed economically desirable to colocate different APEX activities
Facilities within a single industrial CACF, a determination must first be made that such
sharing will not have an adverse effect on any of the compartmented activities
involved. When security considerations permit, a "Memorandum of Agreement To
Share Facilities" will be executed between the industrial contractor and the
government agencies sponsoring each separate APEX activity. The agreement will
delineate the spaces to be used, storage procedures, access limitations, security
responsibilities, and any other provisions considered germane to sharing the facility.
e. Emergency Destruction Each CACF must maintain an emergency plan approved by the responsible
And Evacuation Planning government APEX security representative. This plan will normally be part of an
overall facility or corporate plan. It will, however, be separately stated for the
CACF and will include provisions for the protection of APEX data as well as
protection of assigned personnel. Plans shall include provisions for the emergency
destruction of APEX materials as well as action to be taken in the event of fire or
other natural disaster. Emergency planning should ensure that adequate protection
and firefighting equipment is available, especially in vault areas, and that escape
and emergency exit plans are provided for and published. Updates of emergency
plans will be made annually and training provided to familiarize assigned personnel
with the plans.
f. Personnel Access Positive controls for personnel access must be established over all areas where
Controls APEX information is handled. In areas where only small groups of personnel are
involved, this control may be by means of personal identification. Where larger
numbers are involved, a system of identification badges may be required for
assigned personnel and cleared visitors. The industrial contractor will implement
whichever procedure is deemed appropriate by the cognizant APEX security
representative. Access to CACFs by uncleared visitors must be approved in advance
by the cognizant SIO except in those emergency situations where maintenance, fire,
or medical personnel may require access. Uncleared visitors will be escorted at all
times while in APEX areas.
g. Two-Person Rule To provide proper security and safety protection to APEX materials, all CACFs will
be staffed by at least two persons when in use. Persons selected to work in such areas
will be chosen on the basis of proven reliability and maturity. Waivers to the two-
person rule may be granted only by the responsible SIO.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
VIII. Technical Security*
a. Technical Security Technical Security Countermeasures Inspections will be conducted as part of the
Countermeasures accreditation process before the opening of a CACF and within six months following
Inspections major physical renovations. Reinspections are to be conducted every 18 months.
Such inspections will be scheduled by the cognizant SIO, who will also ensure that
personnel assigned to CACFs are briefed concerning the threat of technical
penetration.
b. Computer Security All automatic data-processing equipment used in CACFs will be operated in
compliance with standard requirements provided by the responsible SIO. No APEX
or APEX-related information is to be processed before approval by the responsible
SIO.
c. Compromising Emana- Before electronic processing of any APEX or APEX-related information, the
tions Control equipment to be used, including ADP equipment, must be certified from the
(TEMPEST Security) standpoint of controlling compromising emanations. Proper RED/BLACK engi-
neering measures must be taken to ensure that any such emanations are contained
within boundaries determined to be satisfactory by the cognizant SIO.
When new or modified equipment is brought into service in existing CACFs,
TEMPEST approval must be received. It is the responsibility of the responsible
government SIO to arrange for all required TEMPEST inspections and
instrumented tests and to schedule any required corrective measures.
IX. Access Approval Certifications
a. General Guidelines The responsible government SIO or contracting representative is the sole authority
empowered to certify APEX accesses held by a contractor to other government
departments and agencies or to other government contractors or consultants. Such
certification will be made only when need-to-know and the necessity of visit
requirements have been established.
b. Visits to/by APEX-related visits will not be undertaken to/by the contractor without the
Contractors approval of the cognizant government APEX program contract manager. Nor-
mally, certification for a visit will be made on a one-time basis only. In unusual
cases, however, when constant contact is required, term certifications for a period
*All requirements for technical security approvals are in addition to physical security approvals required
in Section VII.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R0001000itial
not exceeding one year may be authorized. Visit certifications are to be made in
writing, either by letter or secure communications circuits, as required by
circumstances; when time does not permit, such certifications may be made by
telephone but should be confirmed subsequently in writing.
c. Central APEX Access A Central APEX Access Registry has been established, as a service of common
Registry concern, to serve as the official central data base for the APEX Security Control
System. The names of all indoctrinated personnel within the APEX system will be
recorded in this data base.
d. Information Updates A critical need of the APEX Security Control System is to maintain an accurate
record of personnel currently indoctrinated for various compartments of the system.
To enable the system to function properly, all contractors must provide timely
information on changes in the status of their personnel to the responsible
government SIO. These updates will also ensure that all briefing or debriefing
actions are recorded as soon as possible.
On a quarterly basis, the Central APEX Access Registry will provide lists of
contractor personnel to the SIO who certified their need for access. These lists will
be used to certify those access approvals which are still required and to identify
those which are no longer needed.
X. Security Classification And Control Guidelines
a. Basic Guidance Only those government officials specifically authorized under EO 12065 may decide
security classifications. Compartmentation caveats will be used solely to provide
need-to-know or access protection where normal management and safeguarding
procedures are not, as protective measures, considered sufficient.
b. Decompartmentation/ Contractors are not authorized to decompartment or sanitize APEX materials
Sanitization except as specifically approved by cognizant SIOs. Authority to decompartment or
sanitize must be received in writing and must be kept with program records for the
duration of the contract. Secure electrically transmitted messages may function as
the required written authority.
c. Challenges to Classifi- Contractors with access to APEX may challenge either the classification level or the
cation Levels and Con- need for compartmented control of any APEX material. The challenger should
trol Restrictions submit the challenge to the originating component for consideration through his
CACO. Items which are irreconcilable will be forwarded through APEX control
channels for final review and resolution by the cognizant SIO.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Confidential Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
XI. Control Standards and Procedures
Information in the APEX Security Control System will be classified according to
potential damage to national security if the information is disclosed without
authority. Classification levels will be set in accordance with EO 12065, reserving
CONFIDENTIAL for "identifiable damage," SECRET for "serious damage," and
TOP SECRET for "exceptionally grave damage." No other classification levels are
authorized.
Contractors will be furnished classification guides by APEX government program
managers or contracting officers to assist in the marking and control of information,
hardware, or other items originating in contractor firms. These guides will be made
as specific as possible and will be the means by which contractor firms assign
classification categories. Responsible SIOs will provide individual guidance as
required.
c. Labeling The following labeling requirements are established for all written or graphic
materials that contain APEX information and are disseminated within the APEX
Security Control System:
1. Class cation. The overall classification of a document, whether or not
permanently bound, or any copy or reproduction thereof, will be conspicuously
marked or stamped at the top and bottom of the outside of the front cover (if any),
on the title page (if any), on the first page, on the back page, and on the outside of
the back cover (if any). Each interior page of a document will be conspicuously
marked or stamped at the top and bottom with the highest classification of the
document. Portions of documents, to include paragraphs, subparagraphs, and titles
will be marked to reflect the level of classification, codewords, caveats, and other
dissemination control markings or to state that the particular portion is unclassified.
Major components of some documents are likely to be used separately. In such
instances, each major component will be marked as a separate document. Examples
include each annex, appendix, or similar component of a plan, program, or
operations order; attachments and appendixes to a memorandum or letter; and each
chapter of a report or document.
2. Control System Caveats. All documents controlled within the system will be
marked "HANDLE VIA APEX SECURITY CONTROL SYSTEM" on the front
cover (if any), title page (if any), back page, and first page of all documents. Each
interior page that contains APEX information will bear the same markings.
3. Codewords and Indicators. Codewords for operational projects and product
indicators will be placed following the classification marking on the top and bottom
of the title page (if any), first page, and each page which contains information
requiring specific codeword/indicator protection.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R0001000kod% e%tial
4. Control Numbers. APEX document control numbers, which will be provided by
the responsible government agencies, will be placed immediately below the
classification in the upper right-hand corner of the front cover (if any), title page (if
any), and first page of each document. A sequential ("one up") series of six-digit
numbers, together with the last two digits of the current year, will be utilized (for
example, ACS-123456/79).
5. Declassification Review Notice. APEX materials are classified for a period of 20
years (except for information from foreign governments, which will remain
protected for 30 years). The following Declassification Review Notice will be used
on the cover (if any), title page (if any), or first page of typescript text, or inside
cover of formal publications:
CLASSIFIED BY: (designated authority)
REVIEW ON: (indicate date, 20 or 30 years
from date of issuance)
REASON FOR EXTENDED CLASSIFICATION:
APEX XI, c.5.
The abbreviation "REVW (date 20/30 YRS)" may be
substituted in electrically transmitted messages.
6. Marking Files, Folders, or Groups of Documents. Files, folders, or groups of
documents shall be conspicuously marked to assure the protection of all APEX
material contained therein. Such material should be marked on the file folder tab or
other prominent location, or the marking should be affixed to an appropriate APEX
cover sheet.
d. Pouching and Trans- APEX material to be transmitted from one CACF to another must be carried by
mittal Requirements two approved couriers, or by the Armed Forces Courier Service (ARFCOS).
Courier procedures will ensure that APEX materials are adequately protected
against the possibility of hijacking, unauthorized viewing, loss, or other form of
compromise during the transmission. Transmittal of APEX material via non-US-
Government-operated or chartered aircraft is prohibited.* The responsible SIO
must specifically approve all exceptions.
APEX couriers will be active-duty military or US Government civilian employees
meeting APEX access approval standards of this manual and be specifically
designated by the cognizant sponsoring agency. Couriering of APEX material by
contractor employees is prohibited except when specifically approved by the
responsible SIO.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
APEX materials will be enclosed for delivery in two opaque envelopes or otherwise
be suitably double-wrapped using canvas bags, cartons, crates, leather pouches, and
so forth. Containers will be secured with tape, lead seals, or tumbler padlocks, or by
other means which would reasonably protect against surreptitious access.
The inner and outer container will be annotated to show the pouch address and
package number of the sending APEX facility. The notation "TO BE OPENED BY
THE CACO" shall be placed above the pouch address of the receiving APEX
facility on both containers. The proper security classification and the caveat
"CONTAINS APEX-CONTROLLED MATERIAL" will be annotated on each
side of the inner wrapper only. The inner container will contain the document
receipt and should also reflect the name or office symbol of the person/activity for
whom the material is intended.
e. Electrical APEX material transmitted electrically will be controlled according to procedures
Transmissions prescribed below. Senders must assure that electrical transmissions are made only
to authorized recipients, who must provide procedures for the proper protection of
APEX material received in this manner. These procedures will include the
establishment of a recipient's need-to-know in circumstances where no hard copy or
record copy of the material will result.
The transmission of APEX material will be restricted to means specifically
approved and accredited for this purpose.
Electrical transmission of APEX material will be limited to specifically accredited
communications circuits secured by a government-approved cryptographic and/or
protected distribution system.
Material transmitted by accredited communications circuits or other specialized
means will be marked at the top and bottom with the assigned classification and
portion marked in the manner prescribed above for documents. Applicable
codewords, designators, caveats, and so forth, will be clearly shown, consistent with
the design of the message form or format being used.
The first item in the text of a message will be the overall classification of the
message, applicable codeword(s), the words "HANDLE VIA APEX CONTROL
SYSTEM ONLY," and such other markings as may be required to note
dissemination controls.
f. Cover Sheets To preclude unauthorized disclosure, an unclassified cover sheet will be used when
transmitting APEX materials outside a CACF. Publications need not have a
separate document cover sheet affixed if the publication cover includes all
prescribed markings and is unclassified standing alone.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R0001000509fl tial
g. Destruction As soon as possible after its purpose has been served, all APEX-controlled material
will be destroyed in a manner that will preclude reconstruction in any intelligible
form. However, only those items approved by the cognizant government agency may
be destroyed, by only those methods of destruction specifically authorized by the
responsible SIO. (These methods may include burning, pulping, pulverizing,
melting, or chemical decomposition, depending on the type of materials to be
destroyed.) All destruction shall be supervised and witnessed by at least two APEX-
indoctrinated individuals. Destruction certificates will be completed for all items
destroyed. APEX material contained within computer or automated data-
processing systems or other magnetic media will be erased by approved degaussing
equipment or destroyed by other approved means.
h. Reproduction Reproduction of APEX material will be kept to a minimum consistent with
operational necessity. Copies of documents are subject to the same controls as the
original. Adherence to stated prohibitions against reproduction is mandatory. Any
equipment used for APEX reproduction must be thoroughly inspected and sanitized
before removal from an APEX facility.
Reproduction of all hard-copy APEX materials within the APEX Security Control
System requires the consent of the responsible SIO.
i. Accountability All hard-copy APEX TOP SECRET documents will be inventoried at least
annually or when there is a termination of contract, a change of designated CACO,
or a change of authorized custodians of such material.
Random inventories will be conducted at'least annually for all APEX materials
classified SECRET or CONFIDENTIAL according to formulas provided by the
responsible SIO.
Should the random inventory of APEX material fail to locate a number of the
sampled documents, the CASO will order a complete inventory of all APEX
documents received by a CACF.
Reports of discrepancies will be provided to the responsible SIO, who will initiate a
search for an investigation of all missing documents.
CACOs will keep a record of all APEX-numbered materials that are received by or
dispatched outside their CACFs. This dissemination record will include for each
item a brief entry that identifies the nature of the APEX material and the specific
organizations-outside or within the CACF-for whom the material is intended.
Dissemination records of incoming APEX materials will be retained for as long as
the materials are held by the CACF. The dissemination record requirement for
dispatched materials may be satisfied by keeping copies of the envelope/
package/pouch receipt or other appropriate dissemination record maintained by the
dispatching CACF. Such receipts should be retained for a minimum of two years.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Working materials containing APEX-controlled information that are used and
retained exclusively within a CACF for less than 120 days-such as preliminary
drafts of reports or studies, film clips included in analysts' reference files, and waste
materials such as carbon sheets, carbon ribbons, reproduction plates, stencils,
composition tapes, masters, stenographic notes, and worksheets-do not require an
APEX number or dissemination record but must be safeguarded and marked as
"WORKING PAPERS" in accordance with the storage requirements for APEX-
controlled materials.
Contractors will not distribute APEX materials outside a CACF without the
permission of the responsible SIO.
XII. Procedures for Control of Specialized Hard-Copy Documents
a. Automatic Data All automatic processing of APEX-controlled information and material will be
Processing: conducted in accordance with instructions provided by the responsible SIO. To
facilitate identification, accounting, and control of APEX-controlled data in
magnetic form, each reel or casette of tape, and each magnetic card or disk pack
that contains APEX-controlled data will be prominently labeled with security
classifications, APEX Security Control System markings, and other required
APEX caveat designators.
b. Film/Photographic Roll film, slides, or other forms of photographic negatives or positives must be
Materials labeled as to security classification and controlled under APEX control procedures.
Labels on roll film placed in metal containers will be located as follows:
1. One on end of spool flange.
2. One on side of spool container.
3. One on container cover.
Film in transparent containers needs only one label placed visibly on the spool
flange. This procedure is intended to facilitate reuse of the containers.
The film itself will include all APEX control system markings on the heading and
tail identification.
c. Microfiche Each microfiche will have a heading whose elements are readable without
magnification. The heading elements will specify: the long and short titles of the
document; security classification and codewords, which will not be abbreviated; and
Confidential 22
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29: CIA-RDP85T00788R00010005000fiential
standard abbreviations or codes for handling caveats, dissemination control
markings, and distribution restrictions. The exact placement of the heading
elements will be as prescribed by the cognizant SIO. Individual microfiche are also
to be placed in separate envelopes that are color-coded to reflect the level of security
protection to be accorded them.
d. Microfilm Each roll of microfilm, whether mounted on an open reel or in a cartridge, will
contain security information which is readable without magnification. For
microfilm of an individual document, the information will be on a page target and
contain the security classification and codewords, which will not be abbreviated, as
well as standard abbreviations and codes for handling caveats, dissemination control
markings, and distribution restrictions. This page target will immediately precede
the first page of the document and will follow the last page of text preceding the
"END - date filmed" target frame. For film produced by a Computer Output
Microfilm (COM) recorder, the above-mentioned security information will be
recorded in human-readable format, when feasible, on one length of film
immediately preceding and on another immediately following the document text.
The boxes containing processed film in open reels and the film cartridges will be
labeled with the appropriate security information. In addition, the labeling will
include the document's long and short titles. Microfilms containing documents with
individual titles and APEX numbers too numerous to be included on the label may
be identified by a generalized composite title and a new APEX number.
XIII. Security Violations/ Compromises
a. Responsibility To Persons approved and briefed for APEX access are responsible for reporting any
Report possible security violations or compromises of APEX information to their CASO.
Such reporting must be done immediately to keep damage to an absolute minimum.
The cognizant government ASO is to be notified in a timely fashion of both the
incident and the results of the investigation of it.
b. Investigative CASOs and ASOs of cognizant government agencies are jointly responsible for the
Responsibility investigation of all security violations and possible compromises of APEX materials
within their jurisdiction. Investigations will attempt to develop full details of the
violation or compromise, determine whether and how much information was
exposed, the damage that resulted, and whether culpability was apparent in
allowing the violation or compromise to occur. Sanctions will be prescribed by the
responsible SIO. These sanctions will be administered by the ASO and the action
taken will be recorded in security files of the contractor and the cognizant
government agency.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Confidential Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
When it is determined that material has, in fact, been revealed inadvertently to an
unauthorized person, the contractor will immediately advise the responsible
government ASO of the incident and will secure an inadvertent-exposure
agreement, unless otherwise directed.
In all cases of inadvertent exposure a written report will be provided by the CASO to
the cognizant government ASO.
If personnel to whom inadvertent exposure has been made can be expected to
maintain absolute secrecy of the APEX material to which they have been exposed
and execute an inadvertent-exposure agreement, the cognizant government ASO
may make a finding that no compromise has occurred.
c. Corrective Action In the course of investigating security violations and compromises, it may become
clear that there are weaknesses in operating procedures in the affected components.
It is the responsibility of each CASO, when identifying such basic deficiencies, to
initiate corrective action. The corrective action recommended will be incorporated
in the investigative report to the ASO of the cognizant government agency.
XIV. Security Education
Security education is a continung process, which must be initiated at the time of
indoctrination, periodically reinforced, and emphasized when access is terminated.
ASOs as well as all indoctrinated personnel must continually maintain and increase
security awareness through day-to-day vigilance and reinforcement of basic
security principles.
b. Initial Indoctrination Personnel are to be indoctrinated by a designated ASO. The indoctrination will
cover:
1. The need for, purpose of, and structure of the APEX Security Control System
and the adverse effects on the national security that could result from unauthorized
disclosure of APEX information.
2. An explanation of the sensitivity of APEX information and its relationship to
other intelligence information processed by the the US Government.
3. The administrative, physical, and other procedural security requirements of the
APEX Security Control System.
4. Individual classification management responsibilities of personnel in the APEX
system, including classification/declassification, decompartmentation and
sanitization guidelines and marking requirements.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29: CIA-RDP85T00788R0001000k Q&Mtial
5. The criminal penalties for espionage and unauthorized disclosure.
6. The sanctions for violation or disregard of APEX security procedures.
7. The techniques employed by foreign intelligence organizations in attempting to
obtain national security information.
8. The security responsibilities of the individual, who must be made aware of:
(a) The prohibition against disclosing any classified
information over nonsecure telephones or in nonsecure
places.
(b) Procedures to determine that prospective recipients
are approved for access.
(c) The administrative reporting requirements involv-
ing such things as nonofficial foreign travel, contacts
with foreign nationals, attempts by unauthorized
persons to obtain APEX information, possible loss or
compromise of APEX material, physical security
deficiencies, and personnel security concerns that
would probably have an adverse effect on APEX
security.
9. Execution of a Nondisclosure Secrecy Agreement.
c. Periodic At intervals not to exceed two years, all APEX-indoctrinated personnel are to
Reindoctrination receive a formal reindoctrination. This reindoctrination should cover all the points
enumerated in paragraph b, above. Such reindoctrination should reinforce the
individual's understanding of his/her responsibilities. This opportunity should be
used, moreover, to encourage suggestions for better security within the system.
d. Termination of Access
When it has been determined that an individual no longer requires access to any
type of APEX information, he/she should be debriefed and provided with final
instructions and guidelines on the protection of APEX information and his/her
personal responsibilities. This debriefing will include:
1. A reminder of the appropriate sections of Titles 18 and 50 of the US Code, their
provisions, and criminal sanctions relative to espionage and unauthorized
disclosure.
2. The continuing obligation never to divulge, publish, or otherwise reveal to any
unauthorized person any APEX information without express permission of the
appropriate responsible officials.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
3. An acknowledgment of individual responsibility to report to appropriate US
Government officials any attempt by an unauthorized person to solicit APEX
information.
4. A declaration that the individual no longer has any APEX materials in his/her
possession.
5. A reminder of the risks associated with hazardous activities, as defined in chapter
V, and the need for a defensive security briefing.
6. Execution of a Termination Secrecy Agreement.
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6
Confidential
Confidential
Approved For Release 2004/01/29 : CIA-RDP85T00788R000100050003-6