In the past few hours many of us have watched the discussion regarding classified documents & their appropriate storage.
Since like most senior officers I had some experience in this area, I thought it would be helpful to provide some BASIC info.
So, this new 🧵is born! 1/21
1st, there are three levels of security classification for the US Government:
-Classified
-Secret
-Top Secret
Each one of those have increasing degree of sensativity.
I'll cover those first 3, but please know there are "additional" descriptors confusing levels we'll get to.2/
CLASSIFIED is the lowest classification level. It's information that might "damage or disclose" an element of national security.
Classified document may address particulars about a weapon system (e.g., max range of a missile) or #'s of soldiers deployed. 3/
SECRET documents have info if disclosed would cause "serious damage" to national security.
That damage may include disruption of foreign relations, description of plans or intelligence operations, or compromise of technologies.
Most contingency plans are marked SECRET. 4/
Executive Order 13526 say:
"TOP SECRET classification [is] applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the National Security that the original classification authority is able to identify" 5/
To get any clearance requires an increasingly difficult & personally intrusive vetting process.
It starts w filling out a very long form, called an SF 86, with your life story: jobs, schools, people you know, addresses, invasive questions.
You can find an example on line. 6/
For the highest security clearances, people come to your door - and the door of those you list on your form, and your bosses, your teachers, your friends - and ask a lot of questions. There's also a criminal background check.
The investigation can take months to complete. 7/
By the way, one must have a job that REQUIRES a specific clearance...you just can't afor one.
And every few years, the clearance needs renewal...which usually comes with another investigatory update and more checks, to ensure there's been no violations!
Seems ominous, right? 8/
Now, there are add-ons, which we're hearing about now. I'll address two:
SAPs or Special Access Programs.
-SCI or Sensitive Compartmented Information 9/
SAPs are "need to know" programs and equipment that if disclosed would critically damage the program or national security.
These are protected by employing dramatically enhanced security measures to strictly enforce programs where selected people have a need-to-know. /10
There are onerous access & security requirements, with only those who have a need to know gaining access. These programs are closely guarded with extreme measures of security, to include use of code words.
Even mentioning those code words to those not read on is a violation.11/
During my career, I was "read on" to several of programs, but I was one of few people in the organization who knew about the program.
The programs contribute to accomplishing the mission, but there are serious rules for even discussing w/ others who know about it. 12/
SCI is classified information that comes from sensitive intelligence sources (people or systems), methods, or analytical processes.
SCI is handled within formal access control systems established by the @ODNIgov .
Often, those with TOP SECRET Clearance also have TS-SCI. 13/
The U.S. specifies - in excruciating detail - procedures for protecting levels of classified information.
There are security managers who log the documents.
There are special rooms/buildings for holding and handling that must be cleared to hold the level of secret material. 14/
You'll often hear the word "SCIF" (Sensitive Compartmented Information Facility).
That's a secure place where sensitive information can be viewed & discussed to prevent surveillance or spying.
SCIFs are permanent or temporary & usually require special locks and/or guards. 15/
There are classified computers that use the Secure Internet Protocol Router Network (SIPRNet).
That system is an interconnected computer networks used by various government agencies to transmit classified information (but only up to and including SECRET). 16/
There are other network, too, (e.g., NATO secret), but I won't get into those.
(BTW, on my desk in Iraq, in a SCIF facility I had a regular computer & three other classified systems...and way too many emails to read late at night when I returned to the headquarters). 17/
But interestingly, not all documents come over computers. TS, TS-SCI, and other documents are passed in what is called a "Black Book" (brought by courier).
For the President, that info is contained in the PDB (President's Daily Brief).
Documents are scrupulously tracked. 18/
What does a classified document look like? Here's a sanitized one, with markings.
Red marks at top, each paragraph classified, each page numbered with the classification on top.
Note the "classification" and "declassification" block on the lower left. A bit on that...19/
Note the classification "authority." That's the person or office that determines the classification (usually an intelligence agency, though in combat I personally classified some documents).
Note the "declassification." Only the office that classifies can declassify...20/
The reason the classifier also declassifies is a "process" must notify all others who are involved with the information...or who may be endangered by its release.
Yes, technically, @potus can order declassification...but other people have to know & the date must be noted!!! 21/
I hope this information is helpful to those who are discussing this issue given what seems to be a lax approach to guarding our nation's secrets caused by some in the last administration.
This is serious business for our nation's security. 22/22
I wrote "Classified" when it should be "Confidential." My bad!
Sorry, typo...Confidential, not Classified.
*Sensitivity.* Sorry.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
WRT national security & global threats, an extremely dangerous time re US "foes." -Massive Russian strikes in Ukraine -Georgia's "frozen conflict" heating up. -Moldova dealing with Russian troops in Transnistria -Russian economy collapsing...due to Putin's wars --Assad flees to Russia 1/4
-China intimidates Philippines, assaults Hong Kong's autonomy, represses Tibet & Xinjiang, threatens Taiwan, blocks international trade routes -N. Korea troops & weapons in Russia, increases missile capabilities -Hamas destroyed, but Hezbollah, IJ, MB & the Africa terror groups still active. 2/4
-Piracy increases in Persian Gulf and Red Sea regions -US, Mexico & Philippines rated as most active human trafficking countries -Draughts, famine & other climate change factors + outcome of conflicts causes increased migration into US & Europe. -Domestic terrorism indicators rising. 3/4
Watching the Israeli operations in S. Lebanon today, as the IDF releases numerous photos of arms caches found in & near homes. 1/7
These are similar to what US forces found throughout Iraq when we were there.
Using civilian locations provides terror organizations w/ unique advantages:
- difficult to find
- difficult to target
- when found, striking/destroying results in civilian casualties. 2/
This morning, the IAF also struck a 3.5 km tunnel complex between Syria & Lebanon that provided a means of bringing those weapons to Hezbollah.
Between 0900-1100 hrs local time today, Hezbollah launched over 100 rockets & drones into N. Israel. 3/
A few thoughts on what occurred in two different conflicts yesterday...the use of "killer pagers" by Israel and Ukraine's attack on the large ammo cache at Toropets military base 300+ miles inside Russia.
A short 🧵 1/12
First, the pagers.
In this article (gifted) from the @nytimes, the author claims there "no clear strategy" for this coordinated attack.
I disagree. Having used electronic & signals countermeasures in Iraq, the strategy is clear. 2/
Terrorist organizations - unlike conventional militaries who have encrypted signal capabilities - must find ways to communiate. It is important to continue to disrupt & counter this ability.
In Iraq, terrorist use of cell phones allowed US and ISF to glean valuable information & disrupt their networks. 3/