In the past few hours many of us have watched the discussion regarding classified documents & their appropriate storage.
Since like most senior officers I had some experience in this area, I thought it would be helpful to provide some BASIC info.
So, this new 🧵is born! 1/21
1st, there are three levels of security classification for the US Government:
-Classified
-Secret
-Top Secret
Each one of those have increasing degree of sensativity.
I'll cover those first 3, but please know there are "additional" descriptors confusing levels we'll get to.2/
CLASSIFIED is the lowest classification level. It's information that might "damage or disclose" an element of national security.
Classified document may address particulars about a weapon system (e.g., max range of a missile) or #'s of soldiers deployed. 3/
SECRET documents have info if disclosed would cause "serious damage" to national security.
That damage may include disruption of foreign relations, description of plans or intelligence operations, or compromise of technologies.
Most contingency plans are marked SECRET. 4/
Executive Order 13526 say:
"TOP SECRET classification [is] applied to information, the unauthorized disclosure of which reasonably could be expected to cause exceptionally grave damage to the National Security that the original classification authority is able to identify" 5/
To get any clearance requires an increasingly difficult & personally intrusive vetting process.
It starts w filling out a very long form, called an SF 86, with your life story: jobs, schools, people you know, addresses, invasive questions.
You can find an example on line. 6/
For the highest security clearances, people come to your door - and the door of those you list on your form, and your bosses, your teachers, your friends - and ask a lot of questions. There's also a criminal background check.
The investigation can take months to complete. 7/
By the way, one must have a job that REQUIRES a specific clearance...you just can't afor one.
And every few years, the clearance needs renewal...which usually comes with another investigatory update and more checks, to ensure there's been no violations!
Seems ominous, right? 8/
Now, there are add-ons, which we're hearing about now. I'll address two:
SAPs or Special Access Programs.
-SCI or Sensitive Compartmented Information 9/
SAPs are "need to know" programs and equipment that if disclosed would critically damage the program or national security.
These are protected by employing dramatically enhanced security measures to strictly enforce programs where selected people have a need-to-know. /10
There are onerous access & security requirements, with only those who have a need to know gaining access. These programs are closely guarded with extreme measures of security, to include use of code words.
Even mentioning those code words to those not read on is a violation.11/
During my career, I was "read on" to several of programs, but I was one of few people in the organization who knew about the program.
The programs contribute to accomplishing the mission, but there are serious rules for even discussing w/ others who know about it. 12/
SCI is classified information that comes from sensitive intelligence sources (people or systems), methods, or analytical processes.
SCI is handled within formal access control systems established by the @ODNIgov .
Often, those with TOP SECRET Clearance also have TS-SCI. 13/
The U.S. specifies - in excruciating detail - procedures for protecting levels of classified information.
There are security managers who log the documents.
There are special rooms/buildings for holding and handling that must be cleared to hold the level of secret material. 14/
You'll often hear the word "SCIF" (Sensitive Compartmented Information Facility).
That's a secure place where sensitive information can be viewed & discussed to prevent surveillance or spying.
SCIFs are permanent or temporary & usually require special locks and/or guards. 15/
There are classified computers that use the Secure Internet Protocol Router Network (SIPRNet).
That system is an interconnected computer networks used by various government agencies to transmit classified information (but only up to and including SECRET). 16/
There are other network, too, (e.g., NATO secret), but I won't get into those.
(BTW, on my desk in Iraq, in a SCIF facility I had a regular computer & three other classified systems...and way too many emails to read late at night when I returned to the headquarters). 17/
But interestingly, not all documents come over computers. TS, TS-SCI, and other documents are passed in what is called a "Black Book" (brought by courier).
For the President, that info is contained in the PDB (President's Daily Brief).
Documents are scrupulously tracked. 18/
What does a classified document look like? Here's a sanitized one, with markings.
Red marks at top, each paragraph classified, each page numbered with the classification on top.
Note the "classification" and "declassification" block on the lower left. A bit on that...19/
Note the classification "authority." That's the person or office that determines the classification (usually an intelligence agency, though in combat I personally classified some documents).
Note the "declassification." Only the office that classifies can declassify...20/
The reason the classifier also declassifies is a "process" must notify all others who are involved with the information...or who may be endangered by its release.
Yes, technically, @potus can order declassification...but other people have to know & the date must be noted!!! 21/
I hope this information is helpful to those who are discussing this issue given what seems to be a lax approach to guarding our nation's secrets caused by some in the last administration.
This is serious business for our nation's security. 22/22
I wrote "Classified" when it should be "Confidential." My bad!
Sorry, typo...Confidential, not Classified.
*Sensitivity.* Sorry.
• • •
Missing some Tweet in this thread? You can try to
force a refresh
Lots of discussion about the documents. @BrynnTannehill thread is conjecture, but if true (likely as this is the kind of classified documents high level officials receive) is incredibly dangerous. She says “SAP.” Those Special Access Programs are known by very few…1/5
Even saying the “code word” associated with them to others not “read in” on the program is a security violation punishable by prison. Given @JaxAlemany’s report that written lists compiled at the scene could not include some documents seems to indicate SAP. 2/
To read SAP documents requires a Top Secret Clearance, to be “read on” regarding the details of the program, and understanding the special rules of safeguarding the particulars. How do I know this? I’ve been “read on” to many, couldn’t talk about it to anyone outside a SCIF…3/
Yes, RU had an initial plan in Feb. I did a brief for some folks showing my thoughts on original operational & strategic objectives.
See the 2 charts below.
RU assigned 190,000 forces on 9+ avenues of approaches on exterior lines...and were rebuffed for a variety of reasons. 2/
As noted in March, the myriad reasons for RU failure:
-Poor command & control
-lack of preparation (training & exercises) to the planned maneuver
-dysfunction logistics system
-practice not following doctrine
-ineffective combined arms maneuver & air support
-etc, etc, 3/
Last night I was w/ a group of sparkly-smart PMBA students.
During a break, one said: "Your 🧵s on Ukraine are understandable for those who don't normally study this stuff, could you do one on China?"
While admittedly not a China expert, here are some thoughts. 1/
As background, I was a LTC at the National War College in 1998. At the end of the course, the class separates and travels to different parts of the world for a few weeks to see analyze security challenges the US faces.
Having spent so much time in EU, I volunteered for China.2/
Six of us traveled to several cities to observe military, economic & diplomatic elements of PRC's national power.
One place we visited was the Chinese War College in Nanjing, where we received information about their emerging national security strategy & 20 year plan. 3/