Security Classifications Explained (2024)

Most civilians never have to deal with classified information. It generally resides in the federal government and in the military. With that in mind, I thought some basics about security classifications would be an appropriate topic to cover.

My experience comes mostly from the U.S. Army. When officers are commissioned, they get a Secret Clearance as the base level for what material they can see. Confidential information in the Army, at the unit level, had to do with military readiness reports for individual battalions and also the code books used for sending coded radio messages. Most of all that is now done electronically.

Here’s a good primer for you: “List of U.S. security clearance terms.” I’ll highlight some sections below:


“Security clearances can be issued by many United States of America government agencies, including the Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security (DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances. There are three levels of DoD security clearances:[1]

  1. TOP SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. This level of clearance is generally reserved for the President of the United States, United States Secretary of State, U.S. Speaker of the House, United States Secretary of Defense, United States Secretary of the Treasury, U.S. National Security Advisor, United States Attorney General, Director of the CIA, and a limited other United States government personnel.
  2. SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause serious damage to the national security.
  3. CONFIDENTIAL – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause damage to the national security.
  4. USAP: Unacknowledged SAP & "Waived USAP" - Made known only to authorized persons, including members of the appropriate committees of the US Congress. Waived USAP is a subset of USAP.
  5. ACCM: Alternative or Compensatory Control Measures - Security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve
    strict need-to-know controls and where SAP controls are not required”

My highest level of clearance was Top Secret/SCI, which is explained below:

“Information ‘above Top Secret,’ a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly ‘above’ Top Secret, since there is no clearance higher than Top Secret. SCI information may be either Secret or Top Secret, but in either case it has additional controls on dissemination beyond those associated with the classification level alone. In order to gain SCI Access, one would need to have a Single Scope Backgroud Investigation (SSBI). Compartments of information are identified by code words. This is one means by which the ‘need to know’ principle is formally and automatically enforced. In order to have access to material in a particular SCI ‘compartment,’ the person must first have the clearance level for the material. The SCI designation is an add-on, not a special clearance level.”

The reason I had a TS/SCI clearance was that I worked on a Code Word project that had to do with the continuity of government (COG) for our national command authorities. Later, in another assignment, because I had a Top Secret clearance I was part of a team of officers who could decode nuclear attack orders that were being sent to military units. This was years ago, but I’d have to go down to the SCIF, a sensitive compartmented information facility (SCIF; pronounced /skɪf/) to practice decoding messages to maintain my proficiency.

At one point in my career I had responsibility for the security of a SCIF. It is not just a simple safe or file safe. In my case it was a large concrete room built within a room that had a very heavy bank vault type door with a safe combination lock. Only someone with a TS/SCI clearance could enter it. The facility was used for the transmission of highly classified communications and the storage of Top Secret information. TS information cannot be just kept in a storage room with a padlock door.

People who have a TS/SCI clearance must undergo a Single Scope Background Investigation, a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI. It is governed by the U.S. Intelligence Community Policy Guidance Number 704.1. Standard elements include background checks of employment, education, organization affiliations and any local agency where the subject has lived, worked, traveled or attended school. These checks lead to interviews with persons who know the subject both personally and professionally. The investigation may include a National Agency Check with Local Agency Check and Credit Check (NACLC) of the subject’s spouse or cohabitant.

In my case, I recall a next door neighbor telling me he was visited by a federal agent inquiring as to my conduct, habits, etc., in and around the place where we lived. It is not just a simple records check.

Hopefully the above makes you a more informed consumer of national news.

Eric Holdeman

Eric Holdeman is a contributing writer for Emergency Management magazine and is the former director of the King County, Wash., Office of Emergency Management.

See More Stories by Eric Holdeman

Security Classifications Explained (2024)

FAQs

Security Classifications Explained? ›

The United States uses three classification levels: Top Secret, Secret and Confidential. Each level is defined in relation to the potential for damage to the national security. The OCA must look at the damage criteria and decide the appropriate level of classification.

What are the 4 levels of security? ›

A comprehensive security strategy involves understanding and implementing measures at each level to create a holistic defense against a diverse range of potential risks.
  • Level 1: Physical Security. ...
  • Level 2: Network Security. ...
  • Level 3: Application Security. ...
  • Level 4: Data Security. ...
  • Burstiness in Security Measures.
Nov 6, 2023

What are the three security classifications? ›

The Government Security Classification (GSC) system has three levels: Official, Secret, and Top Secret.

Is SCI higher than Secret? ›

Information "above Top Secret," a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly "above" Top Secret, since there is no clearance higher than Top Secret.

What are the 5 stages of security? ›

It involves the identification, protection, detection, response, and recovery stages to ensure effective cybersecurity measures. This holistic approach enables organizations to proactively assess and address potential risks and vulnerabilities, as well as respond and recover from cyber incidents.

What are the 5 A's of security? ›

This comprehensive guide to cloud identity management reveals the significance of the five A's: Authentication, Authorization, Account Management, Audit Logging, and Accountability.

What are the 4 C's security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What are the 4 P's in security? ›

In general, Information Security professionals suggest that protecting sensitive data requires a combination of people, processes, polices, and technologies.

What are the levels of security categorization? ›

These security objectives are assigned one of three impact levels: low , moderate , or high . This process is described in NIST's FIPS 199 publication. Once the potential impact on these three objectives is determined, the overall impact level of the system is determined based on the “high water mark” principle.

What are the DOD classification labels? ›

There are three levels of classification, “TOP SECRET”, “SECRET” and “CONFIDENTIAL.” Do not use other terms, such as “Official Use Only,” or “Administratively Confidential,” to identify classified national security information.

What are the main categories of security? ›

There are three primary categories of security controls that businesses must consider: management security, operational security, and physical security.

How do you classify security? ›

Securities can be broadly categorized into two distinct types: equity and debt.

What is a yankee white clearance? ›

Yankee White is an administrative nickname for a background check undertaken in the United States of America for Department of Defense personnel and contractor employees working with the president and vice president.

How much is a TS SCI clearance worth? ›

As of Jul 16, 2024, the average annual pay for a Ts Sci Clearance in the United States is $131,907 a year. Just in case you need a simple salary calculator, that works out to be approximately $63.42 an hour. This is the equivalent of $2,536/week or $10,992/month.

Can you have an SCI without a TS? ›

In some cases, an individual may be read into an SCI program, regardless of the clearance level, although additional vetting will be required. So, it is possible to have a secret clearance, and SCI access. Just like having a Top Secret clearance also doesn't mean you have a 'TS/SCI' clearance.

What are the 5 levels of data classification? ›

Data Classification Levels

Data Classification in Government organizations commonly includes five levels: Top Secret, Secret, Confidential, Sensitive, and Unclassified. These can be adopted by commercial organizations, but, most often, we find four levels, Restricted, Confidential, Internal, Public.

What are the security levels 1 2 and 3? ›

The ISPS Code employs an international system of three Security Levels: Security Level 1: Normal. Security Level 2: Heightened. Security Level 3: Exceptional.

What are the levels of classification in the CIA? ›

(S) There are three levels of classification – TOP SECRET, SECRET, and CONFIDENTIAL.

Top Articles
Top 10 Most Expensive Celebrity Houses In The world - CEOWORLD magazine
Men Born Before 1960 | Selective Service System
Dricxzyoki
Bin Stores in Wisconsin
Ati Capstone Orientation Video Quiz
Green Bay Press Gazette Obituary
Soap2Day Autoplay
Ou Class Nav
Employeeres Ual
World of White Sturgeon Caviar: Origins, Taste & Culinary Uses
Urban Dictionary Fov
Hssn Broadcasts
Sports Clips Plant City
Simon Montefiore artikelen kopen? Alle artikelen online
Burn Ban Map Oklahoma
Alexandria Van Starrenburg
iOS 18 Hadir, Tapi Mana Fitur AI Apple?
Char-Em Isd
25Cc To Tbsp
Craigslist In Visalia California
Missouri Highway Patrol Crash
Drift Boss 911
Catherine Christiane Cruz
Seeking Arrangements Boston
Sunset Time November 5 2022
Sadie Sink Reveals She Struggles With Imposter Syndrome
Unable to receive sms verification codes
Annapolis Md Craigslist
Gunsmoke Tv Series Wiki
Criglist Miami
Astro Seek Asteroid Chart
Our Leadership
Craigslistodessa
Ff14 Sage Stat Priority
Pixel Combat Unblocked
James Ingram | Biography, Songs, Hits, & Cause of Death
Melissa N. Comics
NIST Special Publication (SP) 800-37 Rev. 2 (Withdrawn), Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy
9781644854013
Mohave County Jobs Craigslist
Devotion Showtimes Near The Grand 16 - Pier Park
The Holdovers Showtimes Near Regal Huebner Oaks
Thelemagick Library - The New Comment to Liber AL vel Legis
התחבר/י או הירשם/הירשמי כדי לראות.
Sams Gas Price Sanford Fl
3 bis 4 Saison-Schlafsack - hier online kaufen bei Outwell
Valls family wants to build a hotel near Versailles Restaurant
Vérificateur De Billet Loto-Québec
Candise Yang Acupuncture
Professors Helpers Abbreviation
20 Mr. Miyagi Inspirational Quotes For Wisdom
Access to Delta Websites for Retirees
Latest Posts
Article information

Author: Duncan Muller

Last Updated:

Views: 6374

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.