Index



DEPARTMENT OF DEFENSE

WASHINGTON HEADQUARTERS SERVICES

1155 DEFENSE PENTAGON

WASHINGTON, DC 20301-1155

April 1, 1987

ADMINISTRATIVE INSTRUCTION NO. 26

SUBJECT:  INFORMATION SECURITY SUPPLEMENT TO DoD 5200.1-R


References:  (a)  Administrative Instruction No. 26,
"OSD Information Security Suppliment to DoD 5200.1-R,"
April 29, 1983 (hereby canceled)

(b)  Administrative Instruction No. 25, "OSD Automated
Information System Security," November 15, 1985 (hereby
canceled)

(c)  Administrative Instruction No. 61, "Door Locks,
Combination Locks, Access Control Devices, and Security
Containers," April 20, 1984 (hereby canceled)

(d)  Administrative Instruction No. 69, "Security Compromises
and Violations," November 3, 1983 (hereby canceled)

(e)  Administrative Instruction No. 84, "OSD Technical
Surveillance Countermeasures (TSCM) Program," July 18,
1983 (hereby canceled)

(f)  through (bbbb), see section C1.1., enclosure 1

1.  REISSUANCE AND PURPOSE 

This Instruction:

1.1.  Reissues and consolidates reference (a) with references
(b) through (e) into a single document.

1.2.  Establishes uniform compliance by supplementing
DoD 5200.1-R and related DoD security issuances.

2.  APPLICABILITY AND SCOPE 

2.1.  This Instruction applies to all organizations
of the Office of the Secretary of Defense (OSD) and
other organizations supported administratively by Washington
Headquarters Services (WHS) (hereafter referred to collectively
as "OSD Components").   It does not apply to the Organization
of the Joint Chiefs of Staff (OJCS).

2.2.  This Instruction applies to all personnel employed
by, assigned to, or attached for duty to OSD Components
and to all OSD Component contractors and consultants.

2.3.  The text of DoD 5200.1-R is printed in regular
type and the supplementary Instruction text is printed
in an all-capitalization type.   Further supplementation
of this Instruction may be issued by OSD Components.

3.  RESPONSIBILITIES 

3.1.  The Director, Washington Headquarters Services
(WHS), shall provide security services for OSD Components.

3.2.  The Heads of OSD Components shall ensure that
all employees within their organization read and comply
with this Instruction.

3.3.  The Director, Physical Security Division (PSD),
shall:

3.3.1.  Manage the Information Security Program.

3.3.2.  Submit reports to the Director, WHS, and to
the Head of the OSD Component concerned on Information
Security Program matters.

3.3.3.  Provide advice, assistance, guidance, and training
support to OSD Components on the Information Security
Program.

3.3.4.  Accredit automated information systems.

3.4.  Security Managers shall implement Security Procedures
and Information Security Programs.

3.5.  Employees shall comply with this Instruction and
keep their security managers informed of security matters.

5.  EFFECTIVE DATE 

This Instruction is effective immediately.

Enclosures - 1 

E1.  Department of Defense Information Security Program
Regulation with Instructions

 CONTENTS

CHAPTER 1.   GENERAL PROVISIONS

Section 1.   REFERENCES, CONTINUED

Sub-section

1-100.

References, continued

19

Section 2.   PURPOSE AND APPLICABILITY

1-200.

Purpose

23

1-201.

Applicability 

23

1-202.

Nongovernment Operations

24

1-203.

Combat Operations

24

1-204.

Atomic Energy Material

24

1-205.

Sensitive Compartmented and Communications Security
Information

24

1-206.

Automatic Data Processing Systems

25

1-207.

SUGGESTIONS FOR CHANGES

25

Section 3.   DEFINITIONS

1-300.

Access

25

1-301.

Applicable Associated Markings

25

1-302.

Carve-Out

25

1-303.

Classification Authority

25

1-304.

Classification Guide

25

1-305.

Classified Information

26

1-306.

Classifier

26

1-307.

Communications Security (COMSEC)

26

1-308.

Compromise

26

1-309.

Confidential Source

26

1-310.

Continental United States (CONUS)

26

1-311.

Controlled Cryptographic Item (CCI)

26

1-312.

Critical Nuclear Weapon Design Information

27

1-313.

Custodian

27

1-314.

Declassification

27

1-315.

Declassification Event

27

1-316.

Derivative Classification

27

1-317.

Document                                           
                                                   
                                                   
                                   

27

1-318.

DoD Component

27

1-319.

Downgrade

27

1-320.

Foreign Government Information

27

1-321.

Formerly Restricted Data

28

1-322.

Information

28

1-323.

Information Security

28

1-324.

Intelligence Activity

28

1-325.

Material

28

1-326.

National Security

28

1-327.

Need-to-know

28

1-328.

Original Classification

28

1-329.

Regrade

29

1-330.

Restricted Data

29

1-331.

Security Clearance

29

1-332.

Sensitive Compartmented Information

29

1-333.

Special Access Program

29

1-334.

Special Activity

29

1-335.

Unauthorized Disclosure

29

1-336.

United States and Its Territories, Possessions, Administrative,
and Commonwealth Areas 

30

1-337.

Upgrade

30

1-338.

FOR OFFICIAL USE ONLY

30

1-339.

VIDEO TAPE

30

1-340.

VIDEOTAPE

30

1-341.

VIDEOCASSETTE

30

1-342.

VIOLATION

30

Section 4.   POLICIES

1-400.

Classification

30

1-401.

Declassification

31

1-402.

Safeguarding

31

Section 5.   SECURITY CLASSIFICATION DESIGNATIONS

1-500.

General

31

1-501.

Top Secret

32

1-502.

Secret

32

1-503.

Confidential

32

Section 6.   AUTHORITY TO CLASSIFY, DOWNGRADE, AND DECLASSIFY

1-600.

Original Classification Authority

32

1-601.

Derivative Classification Responsibility

32

1-602.

Record and Report Requirements

35

1-603.

Declassification and Downgrading Authority

36

CHAPTER 2.   CLASSIFICATION

Section 1.   CLASSIFICATION RESPONSIBILITIES

2-100.

Accountability of Classifiers

39

2-101.

Classification Approval

39

2-102.

Classification Planning

39

2-103.

Challenges to Classification

40

2-104.

OSD CLASSIFICATION CHALLENGE PROCEDURES

40

Section 2.   CLASSIFICATION PRINCIPLES, CRITERIA, AND
CONSIDERATIONS

2-200.

Reasoned Judgment

42

2-201.

Identification of Specific Information

42

2-202.

Specific Classifying Criteria

42

2-203.

Presumption of Damage 

43

2-204.

Limitations on Classification 

43

2-205.

Classifying Scientific Research Data

44

2-206.

Classifying Documents

44

2-207.

Classifying Material Other Than Documents

45

2-208.

State of the Art and Intelligence

45

2-209.

Effect of Open Publication

45

2-210.

Reevaluation of Classification Because of Compromise

45

2-211.

Compilation of Information

46

2-212.

Extracts of Information

47

Section 3.   DURATION OF ORIGINAL CLASSIFICATION

2-300.

General

47

2-301.

Duration of Classification

47

2-302.

Subsequent Extension of Duration of Classification

47

Section 4.   CLASSIFICATION GUIDES

2-400.

General

48

2-401.

Multi-Service Interest

49

2-402.

Research, Development, Test, and Evaluation 

49

2-403.

Project Phases

49

2-404.

Review of Classification Guides

49

2-405.

Distribution of Classification Guides

50

2-406.

Index of Security Classification Guides

50

Section 5.   RESOLUTION OF CONFLICTS

2-500.

General

51

2-501.

Procedures

51 

2-502.

Final Decision

51

2-503.

Timing

51

Section 6.   OBTAINING CLASSIFICATION EVALUATIONS

2-600.

Procedures

51

Section 7.   INFORMATION DEVELOPED BY PRIVATE SOURCES

2-700.

General

52

2-701.

Patent Secrecy Act

52

2-702.

Independent Research and Development

53

2-703.

Other Private Information

54

Section 8.   REGRADING

2-800.

Raising to a Higher Level of Classification

54

2-801.

Classification of Information Previously Determined
to be Unclassified

54

2-802.

Notification

55

2-803.

Downgrading

55

Section 9.   INDUSTRIAL OPERATIONS

2-900.

Classification in Industrial Operations

55

2-901.

Contract Security Classification Specification

55

CHAPTER 3.   DECLASSIFICATION AND DOWNGRADING

Section 1.   GENERAL PROVISIONS

3-100.

Policy

56

3-101.

Responsibility of Officials

56

3-102.

Declassification Coordination

56

3-103.

Declassification by the Director of the ISOO

56

Section 2.   SYSTEMATIC REVIEW

3-200.

Assistance to the Archivist of the United States

56

3-201.

Systematic Review Guidelines

57

3-202.

Systematic Review Procedures

57

3-203.

Systematic Review of Classified Cryptologic Information

58

3-204.

Systematic Review of Intelligence Information

58

Section 3.   MANDATORY DECLASSIFICATION REVIEW

3-300.

Information Covered

58

3-301.

Presidential Information

58

3-302.

Crypologic Information

58

3-303.

Submission of Requests for Mandatory Declassification
Review

58

3-304.

Requirements for Processing

59

3-305.

Foreign Government Information

60

3-306.

Prohibition

60

3-307.

Restricted Data and Formerly Restricted Data

61

Section 4.   DECLASSIFICATION OF TRANSFERRED DOCUMENTS
OR MATERIAL

3-400.

Material Officially Transferred

61

3-401.

Material Not Officially Transferred

61

3-402.

Transfer for Storage or Retirement

61

Section 5.   DOWNGRADING

3-500.

Automatic Downgrading

62

3-501.

Downgrading Upon Reconsideration

62

Section 6.   MISCELLANEOUS

3-600.

Notification of Changes in Declassification

62

3-601.

Foreign Relations Series

62

3-602.

Reproduction for Declassification Review

62

SECTION 7.   SECURITY REVIEW AND PUBLIC RELEASE

3-700.

GENERAL

63

3-701.

PUBLIC RELEASE OF INFORMATION

64

3-702.

PUBLIC RELEASE OF CONTRACT INFORMATION

64

CHAPTER 4.   MARKING

Section 1.   GENERAL PROVISIONS

4-100.

Designation

65

4-101.

Purpose of Designation

65

4-102.

Exceptions

65

4-103.

Documents or Other Material in General

65

4-104.

Identification of Classification Authority

67

4-105.

Wholly Unclassified Material

68

Section 2.   SPECIFIC MARKINGS ON DOCUMENTS

4-200.

Overall and Page Marking

68

4-201.

Marking Components

69

4-202.

Portion Marking

69

4-203.

Compilations

71

4-204.

Subjects and Titles of Documents

71

4-205.

File, Folder, or Group of Documents

71

4-206.

Transmittal Documents

72

4-207.

Electronically Transmitted Messages

72

4-208.

Translations

73

Section 3.   MARKINGS ON SPECIAL CATEGORIES OF MATERIAL

4-300.

General Provisions

73

4-301.

Charts, Maps, and Drawings

73

4-302.

Photographs, Films, and Recordings

73

4-303.

Decks of ADP Punched Cards

75

4-304.

Removable ADP and Word Processing Storage Media

75

4-305.

Documents Produced by ADP Equipment

76

4-306.

Material for Training Purposes

76

4-307.

Miscellaneous Material

76

4-308.

Special Access Program Documents and Material

77

4-309.

Secure Telecommunications and Information Handling Equipment

77

4-310.

Associated Markings

77

Section 4.   CLASSIFICATION AUTHORITY, DURATION, AND
CHANGE IN CLASSIFICATION MARKINGS

4-400.

Declassification and Regrading Marking Procedures

77

4-401.

Applying Derivative Declassification Dates

77

4-402.

Commonly Used Markings

78

4-403.

Upgrading

80

4-404.

Limited Use of Posted Notice for Large Quantities of
Material

80

Section 5.   ADDITIONAL WARNING NOTICES

4-500.

General Provisions

81

4-501.

Restricted Data

81

4-502.

Formerly Restricted Data

81

4-503.

Intelligence Sources or Methods Information

82

4-504.

COMSEC Material

82

4-505.

Dissemination and Reproduction Notice

82

4-506.

Other Notations

82

Section 6.   REMARKING OLD MATERIAL

4-600.

General

83

4-601.

Earlier Declassification and Extension of Classification

83

CHAPTER 5.   SAFEKEEPING AND STORAGE

Section 1.   STORAGE AND STORAGE EQUIPMENT

5-100.

General Policy

84

5-101.

Standards for Storage Equipment

84

5-102.

Storage of Classified Information

84

5-103.

Procurement and Phase-In of New Storage Equipment

86

5-104.

Designations and Combinations

87

5-105.

Repair of Damaged Security Containers

90

5-106.

PROCEDURES FOR OPENING, CLOSING, AND CHECKING SECURITY
CONTAINERS

91

Section 2.   CUSTODIAL PRECAUTIONS

5-200.

Responsibilities of Custodians

95

5-201.

Care During Working Hours

96

5-202.

End-of-Day Security Checks

97

5-203.

Emergency Planning

99

5-204.

Telecommunications Conversations

104

5-205.

Security of Meetings and Conferences

104

5-206.

Safeguarding of U.S. Classified Information Located
in Foreign Countries

107

Section 3.   ACTIVITY ENTRY AND EXIT INSPECTION PROGRAM

5-300.

Policy

109

5-301.

Inspection Frequency

111

5-302.

Inspection Procedures and Identification

111

SECTION 4.   PHYSICAL SECURITY OF OSD OFFICES

5-400.

POLICY

112

5-401.

KEY CONTROL OFFICER

113

5-402.

HOLDERS OF OSD KEYS

113

5-403.

INSTALLATION OF DOOR LOCKS AND ACCESS CONTROL DEVICES
AND ISSUANCE OF DUPLICATE KEYS

114

5-404.

EMERGENCIES

114

SECTION 5.

5-500.

POLICY

117

5-501.

ESTABLISHMENT

117

5-502.

ADMINISTRATION

119

5-503.

OPENING AND CLOSING ALARMED AREAS

121

5-504.

EXTENDING THE HOURS OF A ZONE

123

5-505.

RESPONSE TO AN ALARM

123

5-506.

TESTING THE ALARM SYSTEM

123

5-507.

ALARM SYSTEM INQUIRES AND MAINTENANCE REQUESTS

124

5-508.

STOPPING INTRUSION DETECTION SYSTEM SERVICE

124

5-509.

INSTRUCTIONS FOR COMPLETING AFHQ FORM 91

124

5-510.

PROCEDURAL VIOLATIONS

126

SECTION 6.   SECURITY OF CLASSIFIED VIDIO TAPE

5-600.

POLICY

129

5-601.

PRODUCTION

129

5-602.


USE

130

5-603.

SECURITY OF EQUIPMENT

130

5-604.

MARKINGS

130

5-605.

ERASURE AND RECORDING OVER

131

5-606.

DECLASSIFICATION

132

5-607.

DESTRUCTION

132

CHAPTER 6.   

Section 1.   COMPROMISE OF CLASSIFIED INFORMATION

6-100.

Policy

133

6-101.

Cryptographic and Sensitive Compartmented Information

133

6-102.

Responsibility of Discoverer

133

6-103.

Preliminary Inquiry

134

6-104.

Investigation

135

6-105.

Responsibility of Authority Ordering Investigation

137

6-106.

Responsibility of Originator

138

6-107.

System of Control of Damage Assessments

138

6-108.

Compromises Involving More Than One Agency

138

6-109.

Espionage and Deliberate Compromise

139

6-110.

Unauthorized Absentees

139

6-111.

UNAUTHORIZED DISCLOSURE OF CLASSIFIED INFORMATION TO
THE PUBLIC

139

CHAPTER 7.   ACCESS, DISSEMINATION, AND ACCOUNTABILITY

Section 1.   ACCESS

7-100.

Policy

143

7-101.

Access by Persons Outside the Executive Branch

144

7-102.

Access by Foreign Nationals, Foreign Governments, and
International Organizations

147

7-103.

Other Situations

148

7-104.

Access Required by Other Executive Branch Investigative
and Law Enforcement Agents

148

7-105.

Access by Visitors

148

Section 2.   DISSEMINATION

7-200.

Policy

149

7-201.

Restraints on Special Access Requirements

150

7-202.

Information Originating in a Non-DoD Department or Agency

150

7-203.

Foreign Intelligence Information

150

7-204.

Restricted Data and Formerly Restricted Data

150

7-205.

NATO Information

150

7-206.

COMSEC Information

150

7-207.

Dissemination of Top Secret Information

150

7-208.

Dissemination of Secret and Confidential Information

151

7-209.

Code Words, Nicknames, and Exercise Terms

151

7-210.

Scientific and Technical Meetings

151

Section 3.   ACCOUNTABILITY AND CONTROL

7-300.

Top Secret Information

151

7-301.

Secret Information

154

7-302.

Confidential Information

154

7-303.

Receipt of Classified Material

154

7-304.

Working Papers

154

7-305.

Restraint on Reproduction

156

CHAPTER 8.   TRANSMISSION

Section 1.   METHODS OF TRANSMISSION OR TRANSPORTATION

8-100.

Policy

158

8-101.

Top Secret Information

158

8-102.

Secret Information

159

8-103.

Confidential Information

161

8-104.

Transmission of Classified Information to Foreign Governments

162

8-105.

Consignor-Consignee Responsibility for Shipment of Bulky
Material

166

8-106.

Transmission of COMSEC Information

167

8-107.

Transmission of Restricted Data

167

Section 2. PREPARATION OF MATERIAL FOR TRANSMISSION,
SHIPMENT, OR CONVEYANCE

8-200.

Envelopes or Containers

167

8-201.

Addressing

168

8-202.

Receipt Systems

172

8-203.

Exceptions

173

8-204.

TRACER SYSTEM

174

Section 3.   RESTRICTIONS, PROCEDURES, AND AUTHORIZATION
FOR ESCORT OR HAND-CARRYING OF CLASSIFIED INFORMATION

8-300.

General Restrictions

174

8-301.

Restrictions on Hand-carrying Classified Information
Aboard Commercial Passenger Aircraft

175

8-302.

Procedures for Hand-carrying Classified Information
Aboard Commercial Passenger Aircraft

176

8-303.

Authority to Approve Escort or Hand-carry of Classified
Information Aboard Commercial Passenger Aircraft

179

CHAPTER 9.   DISPOSAL AND DESTRUCTION

9-100.

Policy

183

9-101.

Methods of Destruction

183

9-102.

Destruction Procedures

183

9-103.

Records of Destruction

184

9-104.

Classified Waste

185

9-105.

Classified Document Retention

185

9-106.

DESTRUCTION PROCEDURES

185

CHAPTER 10.   SECURITY EDUCATION

10-100.

Responsibility and Objectives

187

10-101.

Scope and Principles

187

10-102.

Initial Briefings

189


10-103.

Refresher Briefings

189

10-104.

Foreign Travel Briefings

190

10-105.

Termination Briefings

190

CHAPTER 11.   FOREIGN GOVERNMENT INFORMATION

Section 1.   CLASSIFICATION

11-100.

Classification

192

11-101.

Duration of Classification

192

Section 2.   DECLASSIFICATION

11-200.

Policy

192

11-201.

Systematic Review

193

11-202.

Mandatory Review

193

Section 3.   MARKING

11-300.

Equivalent U.S. Classification Designations

193

11-301.

Marking NATO Documents

193

11-302.

Marking Other Foreign Government Documents

193

11-303.

Marking of DoD Classification Determinations

194

11-304.

Marking of Foreign Government Information in DoD Documents

194

Section 4.   PROTECTIVE MEASURES

11-400.

NATO Classified Information

195

11-401.

Other Foreign Government Information

195

CHAPTER 12.   SPECIAL ACCESS PROGRAMS

12-100.

Policy

197

12-101.

Establishment of Special Access Programs

197

12-102.

Review of Special Access Programs

198

12-103.

Control and Administration

198

12-104.

Codewords and Nicknames

199

12-105.

Reporting of Special Access Programs

199

12-106.

Accounting for Special Access Programs

200

12-107.

Limitations on Access

200

12-108.

"Carve-Out" Contracts

200

12-109.

Oversight Reviews

202

CHAPTER 13.   PROGRAM MANAGEMENT

Section 1.   EXECUTIVE BRANCH OVERSIGHT AND POLICY DIRECTION

13-100.

National Security Council

203

13-101.

Administrator of General Services

203

13-102.

Information Security Oversight Office

203

Section 2.   DEPARTMENT OF DEFENSE

13-200.

Management Responsibility

204

Section 3.   DoD COMPONENTS

13-300.

General

205

13-301.

Military Departments

205

13-302.

Other Components

205

13-303.

Program Monitorship

205

13-304.

Field Program Management

205

Section 4.   INFORMATION REQUIREMENTS

13-400.

Information Requirements

207

Section 5.   DEFENSE INFORMATION SECURITY COMMITTEE

13-500.

Purpose

207

13-501.

Direction and Membership

207

CHAPTER 14.   ADMINISTRATIVE SANCTIONS

14-100.

Individual Responsibility

209

14-101.

Violations Subject to Sanctions

209

14-102.

Corrective Action

211

14-103.

Administrative Discrepancies

212

14-104.

Reporting Violations

212

CHAPTER 15.   FOR OFFICIAL USE ONLY INFORMATION

Section 1.   GENERAL PROVISIONS

15-100.

BASIC POLICY

214

15-101.

LIMITATIONS AND RESTRICTIONS

214

Section 2.   MARKING

15-200.

RESPONSIBILITY

215

15-201.

DOCUMENTS

215

15-202.

TRANSMITTAL LETTERS, ENDORSEMENTS, ETC.

215

15-203.

PARAGRAPHS

215

15-204.

WORKING PAPERS

216

15-205.

MATERIAL OTHER THAN DOCUMENTS

216

15-206.

DOCUMENTS OR MATERIAL TRANSMITTED OUTSIDE OF THE DEPARTMENT
OF DEFENSE

216

Section 3.   DISSEMINATION AND TRANSMISSION

15-300.

GENERAL

216

15-301.

PUBLIC RELEASE

216

15-302.

RELEASE TO CONGRESS AND GAO

216

15-303.

RELEASE WITHIN THE DEPARTMENT OF DEFENSE

217

15-304.

RELEASE TO OTHER FEDERAL DEPARTMENTS AND AGENCIES

217

15-305.

TRANSMISSION

217

15-306.

MAIL

217

15-307.

RECEIPTS

218

Section 4.   SAFEGUARDING

15-401.

RESPONSIBILITY

218

15-402.

SAFEGUARDING DURING USE

218

15-403.

STORAGE

218

Section 5.   DISPOSITION AND DESTRUCTION

15-500.

TERMINATION, DISPOSAL, AND UNAUTHORIZATION DISCLOSURES

218

15-501.

DISPOSAL

219

15-502.

UNAUTHORIZED DISCLOSURE

219

CHAPTER 16.   SENSITIVE COMPARTMENTED INFORMATION FACILITIES
(SCIF)

Section 1.

16-100.

SCIF ESTABLISHMENT

220

16-101.

SCIF ADMINISTRATION

221

Section 2.   TECHNICAL SURVEILLANCE COUNTERMEASURES

16-200.

POLICY

222

16-201.

APPLICABILITY

223

16-202.

PROCEDURES

223

16-203.

DoD CLASSIFIED PRESENTATIONS AT CONGRESSIONAL ACTIVITIES

224

CHAPTER 17.   AUTOMATED INFORMATION SYSTEM SECURITY

Section 1.   POLICY STATEMENT

17-100.

POLICY

226

Section 2.   ESTABLISHMENT

17-200.

ACCREDITATION

226

Section 3.   ADMINISTRATION

17-300.

ADMINISTRATION RESPONSIBILITIES

228

17-301.

CLASSIFICATION LEVEL

228

17-302.

MARKING

229

17-303.

SAFEGUARDING THE INFORMATION

230

17-304.

DISPOSAL

231

17-305.

AUDIT TRAIL

233

CHAPTER 18.   TEMPEST

18-100.

BACKGROUND

234

18-101.

POLICY

234

18-102.

PROCEDURES

234

APPENDICES

Appendix 1.

Equivalent Foreign and International Pact Organization
Security Classifications                           
  

236

Appendix 2.

General Accounting Office Officials Authorized to Certify
Security Clearances

241

Appendix 3.

Instructions Governing Use of Code Words, Nicknames,
and Exercise Terms

243

Appendix 4.

Federal Aviation Administration Air Transportation Security
Field Offices

249

Appendix 5.

Transportation Plan

250

Appendix 6.

FOREIGN TRAVEL SECURITY BRIEFING

252

Appendix 7.

CROSS-REFERENCE INDEX

257

C1.  DEPARTMENT OF DEFENSE INFORMATION SECURITY PROGRAM
REGULATION

   

CHAPTER 1

GENERAL PROVISIONS

C1.1.  Section 1.   REFERENCES, CONTINUED 

1-100.  References, continued.

   

(f)  DoD Directive 5200.1, "DoD Information Security
Program," June 7, 1982

(g)  Executive Order (E.O.) 12356, "National Security
Information," April 2, 1982

(h)  Information Security Oversight Office (ISOO) Directive
No. 1, "National Security Information," June 23, 1982

(i)  DoD Directive 5220.22, "Department of Defense Industrial
Security Program," December 8, 1980

(j)  DoD 5220.22-R, "Industrial Security Regulation,"
December 1985 (or current edition)

(k)  DoD 5220.22-M, "Industrial Security Manual for
Safeguarding Classified Information," December 1985
(or current edition)

(l)  Public Law 83-703, "Atomic Energy Act of August
30, 1954," as amended

(m)  DoD Directive 5200.28, "Security Requirements for
Automatic Data Processing (ADP) Systems," December 18,
1972

(n)  DoD 5200.28-M, "ADP Security Manual:   Techniques
and Procedures for Implementing, Deactivating, Testing,
and Evaluating Secure Resource Sharing ADP Systems,"
January 1973

(o)  E.O. 12333, "United States Intelligence Activities,"
December 4, 1981

(p)  DoD Directive 5400.7, "DoD Freedom of Information
Act Program," March 24, 1980

(q)  Sections 181-188 of title 35, United States Code,
"The Patent Secrecy Act of 1952"

(r)  DoD Directive 5400.11, "Department of Defense Privacy
Program," June 9, 1982

(s)  DoD 5200.1-H, "Writing Security Classification
Guidance Handbook," October 1980

(t)  DoD 5200.1-I, "DoD Index of Security Classification
Guides" 1

(u)  DoD Directive 5535.2, "Delegations of Authority
to Secretaries of the Military Departments - Inventions
and Patents," October 16, 1980

(v)  DoD Directive 5200.30, "Guidelines for Systematic
Review of 20-Year Old Classified Information in Permanently
Valuable DoD Records," March 21, 1983

(w)  Section 483a of title 31, United States Code, (Title
5, Independent Offices Appropriation Act)

(x)  DoD Instruction 7230.7, "User Charges," June 12,
1979

(y)  DoD Directive 7920.1, "Life-Cycle Management of
Automated Information Systems (AIS)," October 17, 1978

(z)  DoD Instruction 5230.22, "Control of Dissemination
of Intelligence Information," April 1, 1982

(aa)  National COMSEC Instruction 4005, "Safeguarding
and Control of COMSEC Material," October 12, 1979

(bb)  National Communications Security Committee (NCSC)
Policy Directive 6, January 16, 1981

(cc)  DoD Directive C-5200.5, "Communications Security
(COMSEC) (U)," October 6, 1981

(dd)  DoD Directive 5210.2, "Access to and Dissemination
of Restricted Data," January 12, 1978

(ee)  DoD Directive 5100.55, "United States Security
Authority for North Atlantic Treaty Organization Affairs,"
April 21, 1982

(ff)  Joint Army-Navy-Air Force Publications (JANAP)
#119 and #299

(gg)  DoD Directive 5240.6, "Counterintelligence Awareness
and Briefing Program," February 26, 1986

(hh)  E.O. 12065, "National Security Information," June
28, 1978

(ii)  DoD Directive 5210.56, "Use of Force by Personnel
Engaged in Law Enforcement and Security Duties," May
10, 1969

(jj)  DoD Directive 5030.47, "National Supply System,"
May 27, 1971

(kk)  Memorandum by the Secretary, Joint Chiefs of Staff
(SM) 701-76, Volume II, "Peacetime Reconnaissance and
Certain Sensitive Operations," July 23, 1976

(ll)  DoD Directive 3224.3, "Physical Security Equipment:
  Assignment of Responsibility for Research, Engineering,
Procurement, Installation, and Maintenance," December
1, 1976

(mm)  National COMSEC Instruction 4009, "Protected Distribution
Systems," December 30, 1981

(nn)  DoD Directive 5200.12, "Policy on the Conduct
of Meetings Involving Access to Classified Information,"
September 24, 1984

(oo)  DoD Instruction 5240.4, "Reporting of Counterintelligence
and Criminal Violations," July 28, 1983

(pp)  DoD Directive 5210.50, "Unauthorized Disclosure
of Classified Information to the Public," October 18,
1982

(qq)  DoD 5200.2-R, "DoD Personnel Security Program,"
December 1979

(rr)  DoD Directive 5400.4, "Provision of Information
to Congress," January 30, 1978

(ss)  DoD Directive 7650.1, "General Accounting Office
Comprehensive Audits," July 9, 1958

(tt)  DoD Directive 5230.11, "Disclosure of Classified
Military Information to Foreign Governments and International
Organizations," December 31, 1984

(uu)  Section 403 of title 50, United States Code, "National
Security Act"

(vv)  DoD Directive 4540.1, "Use of Airspace for United
States Military Aircraft and Firings Over the High Seas,"
January 13, 1981

(ww)  DoD Directive 5210.41, "Security Criteria and
Standards for Protecting Nuclear Weapons," September
12, 1978

(xx)  DoD Instruction 1000.13, "Identification Cards
for Members of the Uniformed Services, Their Dependents,
and Other Eligible Personnel," July 16, 1979

(yy)  Public Law 76-443, "Espionage Act," March 28,
1940

(zz)  Section 801 et seq. of title 10, United States
Code, "Uniform Code of Military Justice"

(aaa)  Allied Communication Publication (ACP) #110

(bbb)  DoD Directive 5230.24, "Distribution Statements
on Technical Documents," November 20, 1984

(ccc)  DoD 5200.1-PH-1, "Classified Information Nondisclosure
Agreement (SF 189)," July 1985

(ddd)  DoD 5200.1-PH, "A Guide to Marking Classified
Documents," November 1982

(eee)  DoD Directive C-5230.23, "Intelligence Disclosure
Policy," November 18, 1983

(fff)  DoD Instruction 5230.20, "Control of Foreign
Representatives," June 25, 1984

(ggg)  DoD TS-5105-21-M-2, "SCI Security Manual Communications
Intelligence Policy," July 1985

(hhh)  DoD C-5105.21-M-1, "SCI Security Manual Administrative
Security," January 1985

(iii)  DoD TS-5105.21-M-3, "SCI Security Manual TK Policy,"
November 1985

(jjj)  National COMSEC Instruction 4003, "Classification
Guidelines for COMSEC Information," December 1, 1978

(kkk)  National COMSEC Instruction 4006, "Reporting
COMSEC Insecurities," October 20, 1983

(lll)  National Telecommunications and Information Systems
Security Instruction 4001, "Controlled Cryptographic
Items," March 25, 1985

(mmm)  National COMSEC Instruction 4008, "Safeguarding
COMSEC Facilities," March 4, 1983

(nnn)  DoD Directive 5405.2, "Release of Official Information
in Litigation and Testimony by DoD Personnel as Witnesses,"
July 23, 1985

(ooo)  DoD DIRECTIVE 5122.5, "ASSISTANT SECRETARY OF
DEFENSE (PUBLIC AFFAIRS)," JUNE 15, 1982

(ppp)  DoD DIRECTIVE 5230.9, "CLEARANCE OF DoD INFORMATION
FOR PUBLIC RELEASE," APRIL 2, 1982

(qqq)  DIA MANUAL 50-3, "PHYSICAL SECURITY STANDARDS
FOR SENSITIVE COMPARTMENTED INFORMATION FACILITIES,"
MAY 2, 1980

(rrr)  ADMINISTRATIVE INSTRUCTION NO- 15, "OSD RECORDS
MANAGEMENT PROGRAM," APRIL 28, 1981

(sss)  ADMINISTRATIVE INSTRUCTION NO- 23, "PERSONNEL
SECURITY PROGRAM AND CIVILIAN PERSONNEL SUITABILITY
PROGRAM," FEBRUARY 25, 1986

(ttt)  ARMY REGULATION 27-10, "MILITARY JUSTICE," June
1, 1984

(uuu)  AIR FORCE REGULATION 35-32, "UNFAVORABLE INFORMATION
FILES, CONTROL ROSTERS, ADMINISTRATIVE REPRIMANDS, AND
ADMONITIONS," February 12, 1982

(vvv)  THE NAVY AND MARINE CORPS, "JUDGE ADVOCATE MANUAL
5800.78," July 17, 1984

(www)  DIA MANUAL 50-1, "SENSITIVE COMPARTMENTED INFORMATION
(SCI) SECURITY MANAGEMENT," SEPTEMBER 10, 1984

(xxx)  "THE UNIFORM CODE OF MILITARY JUSTICE"

(yyy)  DoD 5400.7-R, "DoD FREEDOM OF INFORMATION ACT
PROGRAM," DECEMBER 1980

(zzz)  SECTION 552 OF TITLE 5, UNITED STATES CODE, "THE
FREEDOM OF INFORMATION ACT"

(aaaa)  DoD DIRECTIVE 5230.24, "DISTRIBUTION STATEMENTS
ON TECHNICAL DOCUMENTS," NOVEMBER 20, 1984

(bbbb)  DoD Directive 5240.5, "DoD Technical Surveillance
Countermeasures (TSCM) Survey Program," May 24, 1984

1    Published on an annual basis.

C1.2.  Section 2.   PURPOSE AND APPLICABILITY 

1-200.  Purpose.   Information of the Department of
Defense relating to national security shall be protected
against unauthorized disclosure as long as required
by national security considerations.   This Regulation
establishes a system for classification, downgrading
and declassification of information; sets forth policies
and procedures to safeguard such information; and provides
for oversight and administrative sanctions for violations.

1-201.  Applicability.   This Regulation governs the
DoD Information Security Program and takes precedence
over all DoD Component regulations that implement that
Program.   Under DoD Directive 5200.1, E.O. 12356, and
ISOO Directive No. 1 (references (f), (g), and (h)),
it establishes, for the Department of Defense, uniform
policies, standards, criteria, and procedures for the
security classification, downgrading, declassification,
and safeguarding of information that is owned by, produced
for or by, or under the control of the Department of
Defense or its Components.

1-202.  Nongovernment Operations.   Except as otherwise
provided herein, the provisions of this Regulation that
are relevant to operations of nongovernment personnel
entrusted with classified information shall be made
applicable thereto by contracts or other legally binding
instruments.   (See DoD Directive 5220.22, DoD 5220.22-R,
and DoD 5220.22-M, references (i), (j) and (k)).

1-203.  Combat Operations.   The provisions of this
Regulation relating to accountability, dissemination,
transmission, or safeguarding of classified information
may be modified by military commanders but only to the
extent necessary to meet local conditions in connection
with combat or combat-related operations.   Classified
information should be introduced into forward combat
areas or zones or areas of potential hostile activity
only when essential to accomplish the military mission.

1-204.  Atomic Energy Material.   Nothing in this Regulation
supersedes any requirement related to "Restricted Data"
in the Atomic Energy Act of August 30, 1954, as amended
(reference (l)), or the regulations of the Department
of Energy under that Act.   "Restricted Data" and material
designated as "Formerly Restricted Data," shall be handled,
protected, classified, downgraded, and declassified
to conform with reference (l) and the regulations issued
pursuant thereto.

1-205.  Sensitive Compartmented and Communications Security
Information 

1-205.1.  Sensitive Compartmented Information (SCI)
and Communications Security (COMSEC) Information shall
be handled and controlled in accordance with applicable
national directives and DoD Directives and Instructions.
  Other classified information, while in established
SCI or COMSEC areas, may be handled in the same manner
as SCI or COMSEC information.   Classification principles
and procedures, markings, downgrading, and declassification
actions prescribed in this Regulation apply to SCI and
COMSEC information.   (See also paragraph 13-200.3.).

1-205.2.  Pursuant to DoD Directive 5200.1 (reference
(f)), the Director, National Security Agency/Chief,
Central Security Service may prescribe special rules
and procedures for the handling, reporting of loss,
storage, and access to classified communications security
devices, equipments, and materials in mobile, hand-held
or transportable systems, or that are used in conjunction
with commercial telephone systems, or in similar circumstances
where operational demands preclude the application of
standard safeguards.   These special rules may include
procedures for safeguarding such devices and materials,
and penalties for the negligent loss of Government property.

1-206.  Automatic Data Processing Systems.   This Regulation
applies to protection of classified information processed,
stored or used in, or communicated, displayed or disseminated
by an automatic data processing (ADP) system.   Additional
security policy, responsibilities, and requirements
applicable specifically to ADP systems are contained
in DoD Directive 5200.28 and DoD 5200.28-M, references
(m) and (n).

1-207.  SUGGESTIONS FOR CHANGES.   USERS OF THIS INSTRUCTION
ARE ENCOURAGED TO SUBMIT SUGGESTIONS FOR IMPROVING OF
THIS INSTRUCTION TO THE PHYSICAL SECURITY DIVISION (PSD),
WHS COMMENTS SHOULD INDICATE THE SPECIFIC PAGE(S), PARAGRAPH(S)
AND LINE(S) OF THE TEXT TO BE CHANGED.   RATIONALE SHALL
ACCOMPANY EACH RECOMMENDED CHANGE.

C1.3  Section 3.   DEFINITIONS 

1-300.  Access.   The ability and opportunity to obtain
knowledge of classified information.

1-301.  Applicable Associated Markings.   The markings,
other than classification markings, and warning notices
listed or referred to in subsection 4-103.

1-302.  Carve-Out.   A classified contract issued in
connection with an approved Special Access Program in
which the Defense Investigative Service has been relieved
of inspection responsibility in whole or in part under
the Defense Industrial Security Program.

1-303.  Classification Authority.   The authority vested
in an official of the Department of Defense to make
an initial determination that information requires protection
against unauthorized disclosure in the interest of national
security.

1-304.  Classification Guide.   A document issued by
an authorized original classifier that prescribes the
level of classification and appropriate declassification
instructions for specified information to be classified
derivatively.   For purposes of this Regulation, this
term does not include DD Form 254, "Contract Security
Classification Specification."

1-305.  Classified Information.   Information or material
that is:

1-305.1.  Owned by, produced for or by, or under the
control of the U.S. Government; and

1-305.2.  Determined under E. O. 12356 (reference (g))
or prior orders and this Regulation to require protection
against unauthorized disclosure; and

1-305.3.  So designated.

1-306.  Classifier.   An individual who makes a classification
determination and applies a security classification
to information or material.   A classifier may be an
original classification authority or a person who derivatively
assigns a security classification based on a properly
classified source or a classification guide.

1-307.  Communications Security (COMSEC).   The protection
resulting from all measures designed to deny unauthorized
persons information of value which might be derived
from the possession and study of telecommunications
and to ensure the authenticity of such communications.
  COMSEC includes cryptosecurity, emission security,
transmission security, and physical security of COSMEC
material and information.

1-308.  Compromise.   The disclosure of classified information
to persons not authorized access thereto.

1-309.  Confidential Source.   Any individual or organization
that has provided, or that may reasonably be expected
to provide, information to the United States on matters
pertaining to the national security with the expectation,
expressed or implied, that the information or relationship,
or both, be held in confidence.

1-310.  Continental United States (CONUS).   United
States territory, including adjacent territorial waters,
located within the North American continent between
Canada and Mexico.

1-311.  Controlled Cryptographic Item (CCI).   A secure
telecommunications or information handling equipment
ancillary device, or associated cryptographic component,
which is unclassified but controlled.   (Note:   Equipments
and components so designated bear the designator "Controlled
Cryptographic Item" or "CCI.")

1-312.  Critical Nuclear Weapon Design Information.
  That Top Secret Restricted Data or Secret Restricted
Data revealing the theory of operation or design of
the components of a thermo-nuclear or implosion-type
fission bomb, warhead, demolition munition or test device.
  Specifically excluded is information concerning arming,
fuzing, and firing systems; limited life components;
and total contained quantities of fissionable, fusionable,
and high explosive materials by type.   Among these
excluded items are the components that DoD personnel
set, maintain, operate, test, or replace.

1-313.  Custodian.   An individual who has possession
of or is otherwise charged with the responsibility for
safeguarding or accounting for classified information.

1-314.  Declassification.   The determination that classified
information no longer requires, in the interest of national
security, any degree of protection against unauthorized
disclosure, together with a removal or cancellation
of the classification designation.

1-315.  Declassification Event.   An event that eliminates
the need for continued classification of information.

1-316.  Derivative Classification.   A determination
that information is in substance the same as information
currently classified, and the application of the classification
markings.

1-317.  Document.   Any recorded information regardless
of its physical form or characteristics, including,
without limitation, written or printed matter, data
processing cards and tapes, maps, charts, paintings,
drawings, engravings, sketches, working notes and papers,
or reproductions by any means or process, and sound,
voice, magnetic or electronic recordings in any form.

1-318.  DoD Component.   The Office of the Secretary
of Defense (OSD), the Military Departments, the Organization
of the Joint Chiefs of Staff (OJCS), the Unified and
Specified Commands, and the Defense Agencies.

1-319.  Downgrade.   A determination that classified
information requires, in the interest of national security,
a lower degree of protection against unauthorized disclosure
than currently provided, together with a changing of
the classification designation to reflect such lower
degree of protection.

1-320.  Foreign Government Information.   Information
that is:

1-320.1.  Provided to the United States by a foreign
government or governments, an international organization
of governments, or any element thereof with the expectation,
expressed or implied, that the information, the source
of the information, or both, are to be held in confidence;
or

1-320.2.  Produced by the United States pursuant to
or as a result of a joint arrangement with a foreign
government or governments or an international organization
of governments, or any element thereof, requiring that
the information, the arrangement, or both, are to be
held in confidence.

1-321.  Formerly Restricted Data.   Information removed
from the Restricted Data category upon a joint determination
by the Department of Energy (or antecedent Agencies)
and the Department of Defense that such information
relates primarily to the military utilization of atomic
weapons and that such information can be safeguarded
adequately as classified defense information.   For
purposes of foreign dissemination, however, such information
is treated in the same manner as Restricted Data.

1-322.  Information.   Knowledge that can be communicated
by any means.

1-323.  Information Security.   The result of any system
of policies and procedures for identifying, controlling,
and protecting from unauthorized disclosure, information
whose protection is authorized by executive order or
statute.

1-324.  Intelligence Activity.   An activity that an
Agency within the Intelligence Community is authorized
to conduct under E.O. 12333 (reference (o)).

1-325.  Material.   Any product or substance on, or
in which, information is embodied.

1-326.  National Security.   The national defense and
foreign relations of the United States.

1-327.  Need-to-know.   A determination made by a possessor
of classified information that a prospective recipient,
in the interest of national security, has a requirement
for access to, or knowledge, or possession of the classified
information in order to accomplish lawful and authorized
Government purposes.

1-328.  Original Classification.   An initial determination
that information requires, in the interest of national
security, protection against unauthorized disclosure,
together with a classification designation signifying
the level of protection required.

1-329.  Regrade.   A determination that classified information
requires a different degree of protection against unauthorized
disclosure than currently provided, together with a
change of classification designation that reflects such
different degree of protection.

1-330.  Restricted Data.   All data concerning:

1-330.1.  Design, manufacture or utilization of atomic
weapons;

1-330.2.  The production of special nuclear material;
or

1-330.3.  The use of special nuclear material in the
production of energy, but shall not include data declassified
or removed from the Restricted Data category under Section
142 of reference (l).   (See also reference 11y, "Atomic
Energy Act of 1954," as amended, and "Formerly Restricted
Data," subsection 1-321.)

1-331.  Security Clearance.   A determination that a
person is eligible under the standards of DoD 5200.2-R
(reference (qq)) for access to classified information.

1-332.  Sensitive Compartmented Information.   Information
and material that requires special controls for restricted
handling within compartmented intelligence systems and
for which compartmentation is established.

1-333.  Special Access Program.   Any program imposing
need-to-know or access controls beyond those normally
required for access to Confidential, Secret, or Top
Secret information.   Such a program includes, but is
not limited to, special clearance, adjudication, or
investigative requirements; special designation of officials
authorized to determine need-to-know; or special lists
of persons determined to have a need-to-know.

1-334.  Special Activity.   An activity, or functions
in support of such activity, conducted in support of
national foreign policy objectives abroad that is planned
and executed so that the role of the U.S. Government
is neither apparent nor acknowledged publicly; but that
is not intended to influence U.S. political processes,
public opinion, policies, or media, and does not include
diplomatic activities or the collection and production
of intelligence or related support functions.

1-335.  Unauthorized Disclosure.   A communication or
physical transfer of classified information to an unauthorized
recipient.

1-336.  United States and Its Territories, Possessions,
Administrative, and Commonwealth Areas.   The 50 States;
the District of Columbia; the Commonwealth of Puerto
Rico; the Territories of Guam, American Samoa, and the
Virgin Islands; the Trust Territory of the Pacific Islands;
and the Possessions, Midway and Wake Islands.

1-337.  Upgrade.   A determination that certain classified
information requires, in the interest of national security,
a higher degree of protection against un authorized
disclosure than currently provided, together with a
changing of the classification-designation to reflect
such higher degree.

1-338.  FOR OFFICIAL USE ONLY (FOUO).   INFORMATION
THAT HAS NOT BEEN GIVEN A SECURITY CLASSIFICATION UNDER
THE CRITERIA OF AN EXECUTIVE ORDER, BUT THAT MAY BE
WITHHELD FROM THE PUBLIC FOR ONE OR MORE OF THE REASONS
CITED IN FREEDOM OF INFORMATION ACT EXEMPTIONS 2 THROUGH
9 (REFERENCE (P)) SHALL BE CONSIDERED AS BEING FOUO.
  FOUO IS NOT AUTHORIZED AS A WEAK FORM OF CLASSIFICATION
TO PROTECT U.S. NATIONAL SECURITY INTERESTS.

1-339.  VIDEO TAPE (TWO WORDS).   A MAGNETIC TAPE USED
FOR THE ELECTRONIC RECORDING AND PLAYBACK OF MATERIAL
FOR TELEVISION APPLICATION.

1-340.  VIDEOTAPE (ONE WORD).   VIDEO TAPE ON AN OPEN
REEL.

1-341.  VIDEOCASSETTE.   VIDEO TAPE ON REELS IN A SEALED
CONTAINER THAT IS USED IN A RECORD OR PLAYBACK MODE
WITHOUT REMOVAL FROM THAT CONTAINER.

1-342.  VIOLATION.   A SECURITY VIOLATION IS CONSTITUTED
BY ANY FAILURE TO SAFEGUARD CLASSIFIED INFORMATION OR
ANY FAILURE, WITTING OR UNWITTING, TO COMPLY WITH THIS
INSTRUCTION.

C1.4.  Section 4.   POLICIES 

1-400.  Classification 

1-400.1.  Basic Policy.   Except as provided in the
Atomic Energy Act of 1954, as amended (reference (l)),
E.O. 12356 (reference (g)),as implemented by the ISOO
Directive No. 1 (reference (h)), and this Regulation,
provides the only basis for classifying information.
  It is the policy of the Department of Defense to make
available to the public as much information concerning
its activities as possible consistent with the need
to protect the national security.   Accordingly, security
classification shall be applied only to protect the
national security.

1-400.2.  Resolution of Doubts.   Unnecessary classification
and higher than necessary classification should be avoided.
  If there is reasonable doubt about the need to classify
information, it shall be safeguarded as if it were classified
"Confidential" pending a determination by an original
classification authority, who shall make this determination
within 30 days.   If there is reasonable doubt about
the appropriate level of classification, it shall be
safeguarded at the higher level of classification pending
a determination by an original classification authority,
who shall make this determination within 30 days.  
Upon a classification determination, markings shall
be applied in accordance with Chapter 4.

1-400.3.  Duration.   Information shall be classified
as long as required by national security considerations.
  Each decision to classify requires a simultaneous
determination of the duration such classification must
remain in force or that the duration of classification
cannot be determined.

1-401.  Declassification.   Decisions concerning declassification
shall be based on the loss of the information's sensitivity
with the passage of time or upon the occurrence of a
declassification event.

1-402.  Safeguarding.   Information classified under
this Regulation shall be afforded the level of protection
against unauthorized disclosure commensurate with the
level of classification assigned under the varying conditions
that may arise in connection with its use, dissemination,
storage, movement or transmission, and destruction.

C1.5.  Section 5.   SECURITY CLASSIFICATION DESIGNATIONS


1-500.  General.   Information or material that requires
protection against unauthorized disclosure in the interest
of national security shall be classified in one of three
designations, namely:   "Top Secret," "Secret," or "Confidential."
  The markings "For Official Use Only," and "Limited
Official Use," shall not be used to identify classified
information.   Moreover, no other term such as "Sensitive,"
"Conference," or

"Agency," shall be used in conjunction with the authorized
classification designations to identify classified information.
  SEE CHAPTER 15, BELOW, FOR POLICY ON THE USE OF THE
MARKING "FOR OFFICIAL USE ONLY."

1-501.  Top Secret.   "Top Secret" shall be applied
only to information or material the unauthorized disclosure
of which reasonably could be expected to cause exceptionally
grave damage to the national security.   Examples of
exceptionally grave damage include armed hostilities
against the United States or its allies; disruption
of foreign relations vitally affecting the national
security; the compromise of vital national defense plans
or complex cryptologic and communications intelligence
systems; the revelation of sensitive intelligence operations;
and the disclosure of scientific or technological developments
vital to national security.

1-502.  Secret.   "Secret" shall be applied only to
information or material the unauthorized disclosure
of which reasonably could be expected to cause serious
damage to the national security.   Examples of serious
damage include disruption of foreign relations significantly
affecting the national security; significant impairment
of a program or policy directly related to the national
security; revelation of significant military plans or
intelligence operations; compromise of significant military
plans or intelligence operations; and compromise of
significant scientific or technological developments
relating to national security.

1-503.  Confidential.   "Confidential" shall be applied
only to information or material the unauthorized disclosure
of which reasonably could be expected to cause damage
to the national security.   Examples of damage include
the compromise of information that indicates strength
of ground, air, and naval forces in the United States
and overseas areas; disclosure of technical information
used for training, maintenance, and inspection of classified
munitions of war; revelation of performance characteristics,
test data, design, and production data on munitions
of war.

C1.6.  Section 6.   AUTHORITY TO CLASSIFY, DOWNGRADE,
AND DECLASSIFY 

1-600.  Original Classification Authority 

1-600.1.  Control.   Authority for original classification
of information as Top Secret, Secret, or Confidential
may be exercised only by the Secretary of Defense, the
Secretaries of the Military Departments, and by officials
to whom such authority is specifically delegated in
accordance with and subject to the restrictions of this
section of the Regulation.   In the absence of an original
classification authority, the person designated to act
in his or her absence may exercise the classifier's
authority.

1-600.2.  Delegation of Classification Authority.  
Original classification authority shall not be delegated
to persons who only reproduce, extract, or summarize
classified information, or who only apply classification
markings derived from source material or as directed
by a classification guide.   Delegations of original
classification authority shall be limited to the minimum
number required for efficient administration and to
those officials whose duties involve the origination
and evaluation of information warranting classification
at the level stated in the delegation.

1-600.2.1.  Top Secret.   Only the Secretary of Defense,
the Secretaries of the Military Departments, and the
senior official designated by each under Section 5.3(a)
of E.O. 12356 (reference (g)), provided that official
has original Top Secret classification authority, may
delegate original Top Secret classification authority.
  Such delegation may only be made to officials who
are determined to have a demonstrable and continuing
need to exercise such authority.

1-600.2.2.  Secret and Confidential.   Only the Secretary
of Defense, the Secretaries of the Military Departments,
the senior official designated by each under Section
5.3(a) of reference (g), and officials with original
Top Secret classification authority, may delegate original
Secret and Confidential classification authority to
officials whom they determine respectively to have a
demonstrable and continuing need to exercise such authority.

1-600.2.3.  Each delegation of original classification
authority shall be in writing and shall specify the
title of the position held by the recipient.

1-600.3.  Requests for Classification Authority

1-600.3.1.  A request for the delegation of original
classification authority shall be made only when there
is a demonstrable and continuing need to exercise such
authority and the following conditions exist:

1-600.3.1.1.  The normal course of operations or missions
of the organization results in the origination of information
warranting classification;

1-600.3.1.2.  There is a substantial degree of local
autonomy in operations or missions as distinguished
from dependence upon a higher level of command or supervision
for relatively detailed guidance;

1-600.3.1.3.  There is adequate knowledge by the originating
level to make sound classification determinations as
distinguished from having to seek such knowledge from
a higher level of command or supervision; and

1-600.3.1.4.  There is a valid reason why already designated
classification authorities in the originator's chain
of command or supervision have not issued or cannot
issue classification guidance to meet the originator's
normal needs.

1-600.3.2.  Each request for a delegation of original
classification authority shall:

1-600.3.2.1.  Identify the title of the position held
by the nominee and the nominee's organization;

1-600.3.2.2.  Contain a description of the circumstances,
consistent with 1-600.3.2.1., above, that justify the
delegation of such authority; and

1-600.3.2.3.  Be submitted through established channels
to the Secretary of Defense, the Secretary of the Military
Department concerned, the senior official designated
by each under Section 5.3(a) of E.O. 12356 (reference
(g)), or the appropriate Top Secret classification authority.
(See subsection 1-602.)

1-600.4.  Training Requirements for Original Classification
Authorities.   Heads of DoD Component shall establish
procedures to ensure that all original classification
authorities in their Component, to include themselves,
are indoctrinated in the fundamentals of security classification,
limitations on their authority to classify information,
and their responsibilities as such.   This indoctrination
shall be a prerequisite to the exercise of such authority
and shall be a matter of record that is subject to audit.
  Heads of DoD Components shall ensure this indoctrination
is given to all present original classification authorities
within 12 months of the effective date of this Regulation.
  A VIDEO TAPE, PREPARED BY THE DEPUTY UNDER SECRETARY
OF DEFENSE (POLICY) (DUSD(P)), SHALL BE REVIEWED BY
EACH ORIGINAL CLASSIFICATION AUTHORITY.

1-601.  Derivative Classification Responsibility.  
Derivative application of classification markings is
a responsibility of those who incorporate, paraphrase,
restate, or generate in new form, information that is
already classified, or those who apply markings in accordance
with guidance from an original classification authority.
  Persons who apply derivative classifications should
take care to determine whether their paraphrasing, restating,
or summarizing of classified information has removed
all or part of the basis for classification.   Persons
who apply such derivative classification markings shall:

1-601.1.  Respect original classification decisions;

1-601.2.  Verify the information's current level of
classification as far as practicable before applying
the markings; and

1-601.3.  Carry forward to any newly created documents
the assigned dates or events for declassification and
any additional authorized markings.

1-602.  Record and Report Requirements 

1-602.1.  Records of designations of original classification
authority shall be maintained as follows:

1-602.1.1.  Top Secret Authorities.   A current listing
by title and organization of officials designated to
exercise original Top Secret classification authority
shall be maintained by:

1-602.1.1.1.  The Office of the Deputy Under Secretary
of Defense (Policy) (ODUSD(P)) for the Office of the
Secretary of Defense; the Organization of the Joint
Chiefs of Staff; the headquarters of each Unified Command
and the headquarters of subordinate Joint Commands;
and the Defense Agencies.

1-602.1.1.2.  The Offices of the Secretaries of the
Military Departments for the officials of their respective
Departments, including Specified Commands but excluding
officials from their respective Departments who are
serving in headquarters elements of Unified Commands
and headquarters of Joint Commands subordinate thereto.

1-602.1.2.  Secret and Confidential Authorities.   A
current listing by title and organization of officials
designated to exercise original Secret and Confidential
classification authority shall be maintained by:

1-602.1.2.1.  The ODUSD(P) for the Office of the Secretary
of Defense.

1-602.1.2.2.  The offices of the Secretaries of the
Military Departments for the officials of their respective
Departments, including Specified Commands but excluding
officials from their respective Departments who are
serving in headquarters elements of Unified Commands
and headquarters elements of Joint Commands subordinate
thereto.

1-602.1.2.3.  The Director, Joint Staff, for the OJCS.


1-602.1.2.4.  The Commanders-in-Chief of the Unified
Commands, for their respective headquarters and the
headquarters of subordinate Joint Commands.

1-602.1.2.5.  The Directors of the Defense Agencies,
for their respective agencies.

1-602.1.3.  If the listing of titles of positions and
organizations prescribed in subparagraphs 1-602.1.1.
and 1-602.1.2., above, discloses intelligence or other
information that either qualifies for security classification
protection or otherwise qualifies to be withheld from
public release under statute, some other means may be
recommended by the DoD Component by which original classification
authorities can be readily identified.   Such recommendations
shall be submitted to ODUSD(P) for approval.

1-602.1.4.  The listings prescribed in subparagraphs
1-602.1.1. and 1-602.1.2., above, shall be reviewed
at least annually by the senior official designated
in or pursuant to paragraph 13-200.1., or subsections
13-301. or 13-302. or designee to ensure that officials
so listed have demonstrated a continuing need to exercise
original classification authority.

1-602.2.  The DoD Components that maintain listings
of designated original classification authorities shall,
upon request, submit copies of such listings to ODUSD(P).

1-603.  Declassification and Downgrading Authority 

1-603.1.  Authority to declassify and downgrade information
classified under provisions of this Regulation shall
be exercised as follows:

1-603.1.1.  By the Secretary of Defense and the Secretaries
of the Military Departments, with respect to all information
over which their respective Departments exercise final
classification jurisdiction;

1-603.1.2.  By the official who authorized the original
classification, if that official is still serving in
the same position, by a successor, or by a supervisory
official of either; and

1-603.1.3.  By other officials designated for the purpose
in accordance with paragraph 1-603.2., below.

1-603.1.4.  WITHIN OSD COMPONENTS, DECLASSIFICATION
AND DOWNGRADING AUTHORITY SHALL BE EXERCISED BY THE
FOLLOWING:

1-603.1.4.1.  OFFICIAL IDENTIFIED ON THE "CLASSIFIED
BY" LINE OF A DOCUMENT OR OFFICIAL'S SUCCESSOR.

1-603.1.4.2.  OSD ORIGINAL CLASSIFICATION AUTHORITY
FOR THE OSD COMPONENT THAT HAS ASSUMED FUNCTIONAL INTEREST,
WHEN SUCH INTEREST FOR THE INFORMATION HAS CHANGED.

1-603.1.4.3.  OSD PRINCIPAL STAFF ASSISTANTS MAY DESIGNATE,
BY TITLE OF POSITION, SUBORDINATE OFFICIALS TO EXERCISE
GENERAL DECLASSIFICATION

1-603.1.4.4.  THE ASSISTANT SECRETARY OF DEFENSE (PUBLIC
AFFAIRS) (ASD(PA)) HAS DECLASSIFICATION AUTHORITY SPECIFICALLY
DELEGATED IN DoD DIRECTIVE 5122.5, (REFERENCE (ooo)).

1-603.1.5.  IN CASES OF DOCUMENTS CONTAINING INFORMATION
CLASSIFIED BY OR UNDER THE FUNCTIONAL RESPONSIBILITY
OF MORE THAN ONE OSD COMPONENT, DECLASSIFICATION AND
DOWNGRADING AUTHORITY CONTINUES TO RESIDE IN THE OFFICIALS
DESIGNATED IN PARAGRAPH 1-603.1.4., ABOVE.   DECLASSIFICATION
OR DOWNGRADING SHALL NOT BE TAKEN WITHOUT PRIOR COORDINATION
WITH OTHER OSD COMPONENTS.

1-603.1.6.  DOCUMENTS ORIGINATED AND CLASSIFIED BY OTHER
THEN OSD COMPONENTS SHALL NOT BE DECLASSIFIED BY AN
OSD COMPONENT WITHOUT PRIOR WRITTEN PERMISSION OF THE
ORIGINATING OFFICE OR AGENCY.

1-603.2.  The Secretary of Defense, the Secretaries
of the Military Departments, the Chairman of the Joint
Chiefs of Staff, the Directors of the Defense Agencies
or their senior officials designated under subsection
13-301. or 13-302. may designate additional officials
at the lowest practicable echelons of command and supervision
to exercise declassification and downgrading authority
over classified information in their functional areas
of interest.   Records of officials so designated shall
be maintained in the same manner as prescribed in paragraph
1-602.1.1. for records of designations of original classification
authority.

C2.  CHAPTER 2

CLASSIFICATION

C2.1.  Section 1.   CLASSIFICATION RESPONSIBILITIES


2-100.  Accountability of Classifiers 

2-100.1.  Classifiers are accountable for the propriety
of the classifications they assign, whether by exercise
of original classification authority or by derivative
classification.

2-100.2.  An official who classifies a document or other
material and is identified thereon as the classifier
is and continues to be an accountable classifier even
though the document or material is approved or signed
at a higher level in the same organization.   (See subsection
4-104.)

2-101.  Classification Approval 

2-101.1.  When an official signs or approves a document
or other material already marked to reflect a particular
level of classification, he or she shall review the
information contained therein to determine if the classification
markings are appropriate.   If, in his or her judgment,
the classification markings are not supportable, he
or she shall, at that time, cause such markings to be
removed or changed as appropriate to reflect accurately
the classification of the information involved.

2-101.2.  A higher level official through or to whom
a document or other material passes for signature or
approval becomes jointly responsible with the accountable
classifier for the classification assigned.   Such official
has discretion to decide whether a subordinate who has
classification authority shall be identified as the
accountable classifier when he or she has exercised
that authority.

2-102.  Classification Planning 

2-102.1.  Advance classification planning is an essential
part of the development of any plan, operation, program,
research and development project, or procurement action
that involves classified information.   Classification
must be considered from the outset to assure adequate
protection for the information and for the activity
itself, and to eliminate impediments to the execution
or implementation of the plan, operations order, program,
project or procurement action.

2-102.2.  The official charged with developing any plan,
program or project in which classification is a factor,
shall include under an identifiable title or heading,
classification guidance covering the information involved.
  The guidance shall conform to the requirements contained
in section C.2.4. of this Chapter.

2-103.  Challenges to Classification.   If holders of
classified information have substantial reason to believe
that the information is classified improperly or unnecessarily,
they shall communicate that belief to their security
manager (subsection 13-304.) or the classifier of the
information to bring about any necessary correction.

2-103.1.  Each DoD Component shall establish procedures
whereby holders of classified information may challenge
the decision of the classifier.

2-103.2.  Challenges to classification made under this
subsection shall include sufficient description of the
information being challenged to permit identification
of the information and its classifier with reasonable
effort.   Challenges to classification shall also include
the reason or reasons why the challenger believes that
the information is classified improperly or unnecessarily.

2-103.3.  Challenges received under this subsection
shall be acted upon within 30 days of receipt.   The
challenger shall be notified of any changes made as
a result of the challenge or the reasons why no change
is made.

2-103.4.  Pending final determination of a challenge
to classification, the information or document in question
shall be safeguarded as required for the level of classification
initially assigned.

2-103.5.  The fact that an employee or military member
of the Department of Defense has issued a challenge
to classification shall not in any way result in or
serve as a basis for adverse personnel action.

2-103.6.  The provisions of this paragraph do not apply
to or affect declassification review actions undertaken
under the mandatory review requirements of section C3.3.,
Chapter 3 of this Regulation or under the provisions
of DoD Directive 5400.7 (reference (p)).

2-104.  OSD CLASSIFICATION CHALLENGE PROCEDURES 

2-104.1.  THE PREFERRED METHOD OF CONDUCTING CLASSIFICATION
CHALLENGE ACTIONS IS FOR THE CHALLENGER AND CLASSIFIER
TO DISCUSS THE MATTER TOGETHER INFORMALLY.   THAT METHOD
EDUCATES BOTH PARTIES AND ENSURES OSD COMPLIANCE WITH
THIS INSTRUCTION WITHOUT FORMAL PROCEDURES.

2-104.2.  IF A HOLDER OF OSD CLASSIFIED INFORMATION
DESIRES TO PROCEED WITH A FORMAL AND WRITTEN CHALLENGE,
HE OR SHE SHALL ADDRESS THE CHALLENGE TO THE PSD.  
THE CHALLENGE SHALL CONTAIN THE INFORMATION REQUIRED
BY PARAGRAPH 2-103.2., ABOVE.   IF THE CHALLENGER DESIRES
TO HAVE HIS OR HER ANONYMITY PRESERVED FROM THE CLASSIFIER,
A STATEMENT TO THAT EFFECT SHALL BE INCLUDED IN THE
CHALLENGE.

2-104.3.  PSD SHALL FORWARD THE CHALLENGE THROUGH THE
OSD COMPONENT SECURITY MANAGER TO THE CLASSIFIER, PRESERVING
THE ANONYMITY OF THE CHALLENGER IF REQUESTED.

2-104.4.  UPON RECEIPT OF A CHALLENGE, THE CLASSIFIER
SHALL DO THE FOLLOWING:

2-104.4.1.  REVIEW THE CHALLENGED INFORMATION AND DETERMINE
EITHER:

2-104.4.1.1.  THAT THE CHALLENGE IS VALID.

2-104.4.1.2.  THAT THE CHALLENGE IS NOT VALID AND THE
INFORMATION IS CLASSIFIED PROPERLY UNDER THIS INSTRUCTION.

2-104.4.2.  IF THE CHALLENGE IS VALID:

2-104.4.2.1.  DECLASSIFY, UPGRADE, DOWNGRADE, OR REDUCE
THE DURATION OF CLASSIFICATION OF THE CHALLENGED INFORMATION.

2-104.4.2.2.  NOTIFY ALL HOLDERS OF THE INFORMATION
OF THE CHANGES.

2-104.4.2.3.  NOTIFY PSD OF THE CHANGES MADE AS A RESULT
OF THE CHALLENGE.

2-104.4.3.  IF THE CLASSIFIER DETERMINES THE CHALLENGE
IS NOT VALID, PSD SHALL BE NOTIFIED IN WRITING.   THE
RESPONSE SHALL INCLUDE THE CLASSIFIER'S RATIONALE FOR
DENYING THE CHALLENGE.

2-104.5.  THE PSD SHALL NOTIFY THE CHALLENGER OF THE
RESULTS OF THE CHALLENGE.

C2.2.  Section 2.   CLASSIFICATION PRINCIPLES, CRITERIA,
AND CONSIDERATIONS 

2-200.  Reasoned Judgment.   Reasoned judgment shall
be exercised in making classification decisions.   A
positive basis must exist for classification.   Both
advantages and disadvantages of classification must
be weighed.   If, after consideration of the provisions
of this section, there is reasonable doubt, the provisions
of paragraph 1-400.2. apply.

2-201.  Identification of Specific Information.   Before
a classification determination is made, each item of
information that may require protection shall be identified.
  This requires identification of that specific information
that comprises the basis for a particular national advantage
or advantages that, if the information were compromised,
would or could be damaged, minimized, or lost, thereby
adversely affecting national security.

2-202.  Specific Classifying Criteria.   A determination
to classify shall be made only by an original classification
authority when, first, the information is within categories
2-202.1. through 2-202.10., below; and second, the unauthorized
disclosure of the information, either by itself or in
the context of other information, reasonably could be
expected to cause damage to the national security. 
 The determination involved in the first step is separate
and distinct from that in the second.   Except as provided
in subsection 2-203., the fact that the information
falls under one or more of the criteria shall not mean
that the information automatically meets the damage
criteria. Information shall be considered for classification
if it concerns:

2-202.1.  Military plans, weapons, or operations;

2-202.2.  Vulnerabilities or capabilities of systems,
installations, projects, or plans relating to the national
security;

2-202.3.  Foreign government information;

2-202.4.  Intelligence activities including special
activities, or intelligence sources or methods;

2-202.5.  Foreign relations or foreign activities of
the United States;

2-202.6.  Scientific, technological, or economic matters
relating to the national security;

2-202.7.  U.S. Government programs for safeguarding
nuclear materials or facilities;

2-202.8.  Cryptology;

2-202.9.  A confidential source; or

2-202.10.  Other categories of information that are
related to national security and that require protection
against unauthorized disclosure as determined by the
Secretary of Defense or Secretaries of the Military
Departments.   Recommendations concerning the need to
designate additional categories of information that
may be considered for classification shall be forwarded
through channels to the appropriate Secretary for determination.
  Each such determination shall be reported promptly
to the Director of Security Plans and Programs, ODUSD(P),
for promulgation in an Appendix to this Regulation and
reporting to the Director, ISOO.

2-203.  Presumption of Damage.   Unauthorized disclosure
of foreign government information (see subsection 11-100.),
the identity of a confidential foreign source, or intelligence
sources or methods is presumed to cause damage to the
national security.

2-204.  Limitations on Classification 

2-204.1.  Classification may not be used to conceal
violations of law, inefficiency, or administrative error,
to prevent embarrassment to a person, organization or
Agency, or to restrain competition.

2-204.2.  Basic scientific research information not
clearly related to national security may not be classified.
  (See also subsection 2-205.)

2-204.3.  A product of nongovernment research and development
that does not incorporate or reveal classified information
to which the producer or developer was given prior access
may not be classified until and unless the Government
acquires a proprietary interest in the product.   This
prohibition does not affect the provisions of the Patent
Secrecy Act of 1952 (reference (q)).   (See section
C2.7., this Chapter.)

2-204.4.  References to classified documents that do
not reveal classified information may not be classified
or used as a basis for classification.

2-204.5.  Classification may not be used to limit dissemination
of information that is not classifiable under the provisions
of E.O. 12356 (reference (g)) or this Regulation or
to prevent or delay public release of such information.

2-204.6.  Information may be classified or reclassified
after receiving a request for it under the Freedom of
Information Act (reference (p)), the Privacy Act (reference
(r)), or the mandatory review provisions of this Regulation
(section C3.3., Chapter 3) if such classification is
consistent with this Regulation and is accomplished
personally and on a document-by-document basis, except
as provided in paragraph 2-204.7., below, by the Secretary
or Deputy Secretary of Defense, by the Secretaries or
Under Secretaries of the Military Departments, by the
senior official designated by each Secretary under Section
5.3(a) of reference (g), or by an official with original
Top Secret classification authority.   (See subsection
2-801.)

2-204.7.  The Secretary of Defense and the Secretaries
of the Military Departments may reclassify information
previously declassified and disclosed, and they may
classify unclassified information that has been disclosed,
if they determine in writing that the information requires
protection in the interest of national security and
the information may reasonably be recovered.   (See
subsection 2-801.)   Any such reclassification or classification
shall be reported to the DUSD(P) for subsequent reporting
to the Director, ISOO.

2-205.  Classifying Scientific Research Data.   Ordinarily,
except for information that meets the definition of
Restricted Data, basic scientific research or its results
shall not be classified.   However, classification would
be appropriate if the information concerns an unusually
significant scientific breakthrough and there is sound
reason to believe that it is not known or within the
state-of-the-art of other nations, and it supplies the
United States with an advantage directly related to
national security.

2-206.  Classifying Documents.   Each document and portion
thereof shall be classified on the basis of the information
it contains or reveals.   The fact that a document makes
reference to a classified document is not a basis for
classification unless the reference citation, standing
alone, reveals classified information.   (See paragraph
2-204.4.)   The overall classification of a document
or group of physically connected documents shall be
at least as high as that of the most highly classified
component.   The subject or title of a classified document
normally should be unclassified.   When the information
revealed by a subject or title warrants classification,
an unclassified short title should be added for reference
purposes.

2-207.  Classifying Material Other Than Documents 

2-207.1.  Items of equipment or other physical objects
shall be classified only when classified information
may be derived from them by visual observation of their
internal or external appearance or structure, or by
their operation, test, application, or use.   The overall
classification assigned to end items of equipment or
objects shall be at least as high as the highest classification
of any of its integrated parts.

2-207.2.  If mere knowledge of the existence of the
item of equipment or object would compromise or nullify
its national security advantage, its existence would
warrant classification.

2-208.  State-of-the-Art and Intelligence.   Classification
requires consideration of the information available
from intelligence sources concerning the extent to which
the same or similar information is known or is available
to others.   It is also important to consider whether
it is known, publicly or internationally, that the United
States has the information or even is interested in
the subject matter.   The state-of-the-art in other
nations may often be a vital consideration.

2-209.  Effect of Open Publication.   Classified information
shall not be declassified automatically as a result
of any unofficial publication or inadvertent or unauthorized
disclosure in the United States or abroad of identical
or similar information.   Appearance in the public domain
of information currently classified or being considered
for classification does not preclude initial or continued
classification.   However, such disclosures require
immediate determination of the degree of damage to the
national security and reevaluation of the information
to determine whether the publication has so compromised
the information that downgrading or declassification
is warranted.   (See also Chapter 6.)   Similar consideration
must be given to related items of information in all
programs, projects, or items incorporating or pertaining
to the compromised items of information.   Holders should
continue classification until advised to the contrary
by a competent Government authority.

2-210.  Reevaluation of Classification Because of Compromise.
  Classified information, and information related thereto,
that has been lost or possibly compromised, shall be
reevaluated and acted upon as follows:

2-210.1.  The original classifying authority, upon learning
that a loss or possible compromise of specific classified
information has occurred, shall prepare a written damage
assessment and:

2-210.1.1.  Reevaluate the information involved and
determine whether:

2-210.1.1.1.  Its classification should be continued
without change;

2-210.1.1.2.  The specific information, or parts thereof,
should be modified to minimize or nullify the effects
of the reported compromise and the classification retained;

2-210.1.1.3.  Declassification, downgrading, or upgrading
is warranted; and

2-210.1.1.4.  Countermeasures are appropriate and feasible
to negate or minimize the effect of the compromise.

2-210.1.2.  Give prompt notice to all holders of such
information when the determination is within categories
2-210.1.1.2., 2-210.1.1.3., or 2-210.1.1.4. of subparagraph
2-210.1.1., above.

2-210.2.  Upon learning that a compromise or probable
compromise has occurred, any official having original
classification jurisdiction over related information
shall reevaluate the related information and determine
whether one of the courses of action enumerated in subparagraph
2-2210.1.1., above, should be taken or, instead, whether
upgrading of the related information is warranted. 
 When such a determination is within categories 2-210.1.1.2.,
2-210.1.1.3., or 2-210.1.1.4. of subparagraph 2-210.1.1.,
above, or that upgrading of the related items is warranted,
prompt notice of the determination shall be given to
all holders of the related information.   (See Chapter
6.)

2-211.  Compilation of Information.   Certain information
that would otherwise be unclassified may require classification
when combined or associated with other unclassified
information.   However, a compilation of unclassified
items of information should normally not be classified.
  In unusual circumstances, classification may be required
if the combination of unclassified items of information
provides an added factor that warrants classification
under subsection 2-202.   Classification on this basis
shall be fully supported by a written explanation that
will be provided with the material so classified. (See
also subsection 4-203.)

2-212.  Extracts of Information.   Information extracted
from a classified source shall be derivatively classified
or not classified in accordance with the classification
markings shown in the source.   The overall and internal
markings of the source should supply adequate classification
guidance.   If internal markings or classification guidance
are not found in the source, and no reference is made
to an and available classification guide, the extracted
information shall be classified according either to
the overall marking of the source, or guidance obtained
from the classifier of the source material.

C2.3.  Section 3.   DURATION OF ORIGINAL CLASSIFICATION


2-300.  General.   When a determination is made by an
official with authority to classify originally information
as Top Secret, Secret, or Confidential, such official
must also determine how long the classification shall
remain in effect.

2-301.  Duration of Classification 

2-301.1.  Information shall be classified as long as
required by national security considerations.

2-301.2.  When it can be determined, a specific date
or event for declassification shall be set by the original
classification authority at the time the information
is classified originally.   Such dates or events shall
be consistent with national security.   Any event specified
for declassification shall be an event certain to occur.

2-301.3.  Original classification authorities may not
be able to predetermine a date or event for automatic
declassification in which case they shall provide for
the indefinite duration of classification (see Chapter
4 for the marking "Originating Agency's Determination
Required").

2-301.4.  Information classified under predecessor orders
and marked for declassification review shall remain
classified until reviewed for declassification under
the provisions of this Regulation (also see paragraph
4-600.2.).

2-302.  Subsequent Extension of Duration of Classification.
  The duration of classification specified at the time
of original classification may be extended only by officials
with requisite original classification authority and
only if all known holders of the information can be
notified of such action before the date or event previously
set for declassification.   Any decision to continue
classification of information designated for automatic
declassification under E.O. 12065 (reference (hh)) or
predecessor orders, other than on a document-by-document
basis, shall be reported to the DUSD(P) who shall, in
turn, report to the Director, ISOO.

C2.4.  Section 4.   CLASSIFICATION GUIDES 

2-400.  General 

2-400.1.  A classification guide shall be issued for
each classified system, program, plan, or project as
soon as practicable before the initial funding or implementation
of the system, program, plan or project.   Successive
operating echelons shall prescribe more detailed supplemental
guides that are considered essential to assure accurate
and consistent classification.   In preparing classification
guides, originators should review DoD 5200.1-H (reference
(s)).

2-400.2.  Classification guides shall:

2-400.2.1.  Identify the information elements to be
protected, using categorization to the extent necessary
to ensure that the information involved can be identified
readily and uniformly;

2-400.2.2.  State which of the classification designations
(that is, Top Secret, Secret, or Confidential) applies
to each element or category of information;

2-400.2.3.   4-2400.2.3.State declassification instructions
for each element or category of information in terms
of a period of time, the occurrence of an event, or
a notation that the information shall not be declassified
automatically without approval of the originating Agency;
and

2-400.2.4.  State any special public release procedures
and foreign disclosure considerations.

2-400.3.  Each classification guide shall be approved
personally and in writing by an official who:

2-400.3.1.  Has program or supervisory responsibility
over the information or is the senior Agency official
designated by the Secretary of Defense or Secretaries
of the Military Departments in accordance with Section
5.3(a) of E.O. 12356 (reference (g)); and

2-400.3.2.  Is authorized to classify information originally
at the highest level of classification prescribed in
the guide.

2-400.4.  THE OSD COMPONENT OFFICIAL HAVING PRIMARY
FUNCTIONAL AND MANAGEMENT RESPONSIBILITY FOR SYSTEMS,
PROGRAMS, PROJECTS, OR PLANS SHALL DEVELOP AND ISSUE
A SECURITY CLASSIFICATION GUIDE.

2-401.  Multi-Service Interest.   For each classified
system, program, project, plan, or item involving more
than one DoD Component, a classification guide shall
be issued by the:

2-401.1.  Element in the Office of the Secretary of
Defense that assumes or is expressly designated to exercise
overall cognizance over it; or

2-401.2.  DoD Component that is expressly designated
to serve as the executive or administrative agent for
the particular effort.   When there is doubt which Component
has cognizance of the information involved, the matter
shall be referred to the DUSD(P) for resolution.

2-402.  Research, Development, Test, and Evaluation.
  A program security classification guide shall be developed
for each system and equipment development program that
involves research, development, test, and evaluation
(RDT&E) of classified technical information.   For each
such program covered by an approved Decision Coordinating
Paper (DCP) or Program Objective Memorandum (POM), initial
basic classification guidance applicable to technical
characteristics of the system or equipment shall be
developed and submitted with the proposed DCP or POM
to the Under Secretary of Defense for Research and Engineering
for approval.   A detailed classification guide shall
be developed and issued as near in time as possible
to the approval of the DCP or POM.

2-403.  Project Phases.   Whenever possible, classification
guides shall cover specifically each phase of transition,
that is, RDT&E, procurement, production, Service use,
and obsolescence, with changes in assigned classifications
to reflect the changing sensitivity of the information
involved.

2-404.  Review of Classification Guides 

2-404.1.  Classification guides shall be reviewed by
the originator for currency and accuracy not less than
once every 2 years.   Changes shall be issued promptly.
  If no changes are made, the originator shall so annotate
the record copy and show the date of the review.

2-404.2.  Classification guides issued before August
1, 1982, that are in current use must be updated to
meet the requirements of paragraph 2-400.2.   Such updating
shall be accomplished by the next biennial review. 
 Converting previous declassification determinations
directed by classification guides shall be accomplished
in accordance with the following:

2-404.2.1.  Automatic declassification dates or events
remain in force unless changed by competent authority
in accordance with subsection 2-302.

2-404.2.2.  Dates for declassification review shall
be changed to automatic declassification dates or provide
for the indefinite duration of classification.

2-405.  Distribution of Classification Guides 

2-405.1.  A copy of each approved classification guide
and changes thereto other than those covering SCI shall
be sent to the Director of Freedom of Information and
Security Review, Office of the Assistant Secretary of
Defense (Public Affairs), and to the Director of Security
Plans and Programs, ODUSD(P).   A copy of each approved
classification guide covering SCI shall be submitted
to and maintained by the Senior Intelligence Officer
who has security cognizance over the issuing activity.

2-405.2.  Two copies of each approved classification
guide and its changes shall be sent by the originator
to the Administrator, Defense Technical Information
Center (DTIC), Defense Logistics Agency, unless such
guide is classified Top Secret, or covers SCI, or is
determined by the approval authority of the guide to
be too sensitive for automatic secondary distribution
to DoD Components.   Each classification guide forwarded
to DTIC must bear distribution statement B, C, D, E,
F, or X from DoD Directive 5230.24 (reference (bbb))
on its front cover or first page if there is no cover.

2-406.  Index of Security Classification Guides 

2-406.1.  All security classification guides, except
as provided in subparagraph 2-406.2., below, issued
under this Regulation shall be listed in DoD 5200.1-1
(reference (t)), on the basis of information provided
on DD Form 2024, "DoD Security Classification Guide
Data Elements."   The originator of each guide shall
execute DD Form 2024 when the guide is approved, changed,
revised, reissued, or canceled, and when its biennial
review is accomplished.   The original copy of each
executed DD Form 2024 shall be forwarded to the Director
of Security Plans and Programs, ODUSD(P) who will maintain
the Index.   Report Control Symbol DD-POL(B&AR)1418
applies to this information collection system.

2-406.2.  Any classification guide that because of classification
considerations is not listed in accordance with paragraph
2-406.1., above, shall be reported by the originator
to the Director of Security Plans and Programs, ODUSD(P).
  The report shall include the title of the guide, its
date, the classification of the guide, and identification
of the originating activity.   A separate classified
list of such guides will be maintained.   Report Control
Symbol DD-POL(B&AR)1418 applies to this information
collection system.

C2.5.  Section 5.   RESOLUTION OF CONFLICTS 

2-500.  General.   When two or more offices, headquarters,
or activities disagree concerning a classification,
declassification, or regrading action, the disagreement
must be resolved promptly.

2-501.  Procedures.   If agreement cannot be reached
by informal consultation, the matter shall be referred
for decision to the lowest superior common to the disagreeing
parties.   If agreement cannot be reached at the major
command (or equivalent) level, the matter shall be referred
for decision to the headquarters office having overall
classification management responsibilities for the Component.
  That office shall also be advised of any disagreement
at any echelon if prompt resolution is not likely to
occur.

2-502.  Final Decision.   Disagreements between DoD
Component headquarters, if not resolved promptly, shall
be referred for final resolution to the ODUSD(P).

2-503.  Timing.   Action under this section at each
level of consideration shall be completed within 30
days.   Failure to reach a decision within 30 days shall
be cause for referral to the next level for consideration.

C2.6.  Section 6.   OBTAINING CLASSIFICATION EVALUATIONS


2-600.  Procedures.   If a person not authorized to
classify originates or develops information that he
or she believes should be safeguarded, he or she shall:

2-600.1.  Safeguard the information in the manner prescribed
for the intended classification (see paragraph 1-400.2.);

2-600.2.  Mark the information (or cover sheet) with
the intended classification designation prescribed in
section C1.5., Chapter 1;

2-600.3.  Transmit the information under appropriate
safeguards to an appropriate classification authority
for evaluation.   The transmittal shall state that the
information is tentatively marked to protect it in transit.
  If such authority is not readily identifiable, the
information should be forwarded to a head quarters activity
of a DoD Component, to the headquarters office having
overall classification management responsibilities for
a DoD Component, or to the DUSD(P).   A determination
whether to classify the information shall be made within
30 days of receipt;

2-600.4.  Upon decision by the classifying authority,
the tentative marking shall be removed.   If a classification
is assigned, appropriate markings shall be applied;
but

2-600.5.  In an emergency requiring immediate communication
of the information, after taking the action prescribed
by paragraphs 2-600.1. and 2-600.2., above, transmit
the information and then proceed in accordance with
paragraph 2-600.3., above.

C2.7.  Section 7.   INFORMATION DEVELOPED BY PRIVATE
SOURCES 

2-700.  General.   There are some circumstances in which
information not meeting the definition in subsection
1-305. may warrant protection in the interest of national
security.

2-701.  Patent Secrecy Act.   The Patent Secrecy Act
of 1952 (reference (q)) provides that the Secretary
of Defense, among others, may determine that disclosure
of an invention by granting of a patent would be detrimental
to national security.   See DoD Directive 5535.2 (reference
(u)).   A patent application on which a secrecy order
has been imposed shall be handled as follows within
the Department of Defense:

2-701.1.  If the patent application contains information
that warrants classification, it shall be assigned a
classification and be marked and safeguarded accordingly.

2-701.2.  If the patent application does not contain
information that warrants classification, the following
procedures shall be followed:

2-701.2.1.  A cover sheet (or cover letter for transmittal)
shall be placed on the application with substantially
the following language:

   

 "The attached material contains information on which
secrecy orders have been issued by the U.S. Patent Office
after determination that disclosure would be detrimental
to national security (Patent Secrecy Act of 1952, 35
U.S.C. 181-188).   Its transmission or revelation in
any manner to an unauthorized person is prohibited by
law.   Handle as though classified CONFIDENTIAL (or
such other classification as would have been assigned
had the patent application been within the definition
provided in subsection 1-305.)."

2-701.2.2.  The information shall be withheld from public
release; its dissemination within the Department of
Defense shall be controlled; the applicant shall be
instructed not to disclose it to any unauthorized person;
and the patent application (or other document incorporating
the protected information) shall be safeguarded in the
manner prescribed for equivalent classified material.

2-701.3.  If filing of a patent application with a foreign
government is approved under provisions of the Patent
Secrecy Act of 1952 (reference (q)) and agreements on
interchange of patent information for defense purposes,
the copies of the patent application prepared for foreign
registration (but only those copies) shall be marked
at the bottom of each page as follows:

   

"Withheld under the Patent Secrecy Act of 1952 (35 U.S.C.
181-188)."

   

"Handle as CONFIDENTIAL (or such other level as has
been determined)."

2-702.  Independent Research and Development 

2-702.1.  Information in a document or material that
is a product of Government-sponsored independent research
and development conducted without access to classified
information may not be classified unless the Government
first acquires a proprietary interest in such product.

2-702.2.  If no prior access was given but the person
or company conducting the independent research or development
believes that protection may be warranted in the interest
of national security, the person or company should safeguard
the information in accordance with subsection 2-600.
and submit it to an appropriate DoD element for evaluation.
  The DoD element receiving such a request for evaluation
shall make or obtain a determination whether a classification
would be assigned if it were Government information.
  If the determination is negative, the originator shall
be advised that the information is unclassified.   If
the determination is affirmative, the DoD element shall
make or obtain a determination whether a proprietary
interest in the research and development will be acquired.
  If so, the information shall be assigned proper classification.
  If not, the originator shall be informed that there
is no basis for classification and the tentative classification
shall be canceled.

2-703.  Other Private Information.   The procedure specified
in subsection 2-600. shall apply in any case not specified
in subsection 2-702., such as an unsolicited contract
bid, in which private information is submitted to a
DoD element for a determination of classification.

C2.8.  Section 8.   REGRADING 

2-800.  Raising to a Higher Level of Classification.
  The upgrading of classified information to a higher
level than previously determined by officials with appropriate
classification authority and jurisdiction over the subject
matter is permitted only when all known holders of the
information:

2-800.1.  Can be notified promptly of such action; and

2-800.2.  Are authorized access to the higher level
of classification, or the information can be retrieved
from those not authorized access to information at the
contemplated higher level of classification.

2-801.  Classification of Information Previously Determined
to be Unclassified.   Unclassified information, once
communicated as such, may be classified only when the
classifying authority:

2-801.1.  Makes the determination required for upgrading
in subsection 2-800.;

2-801.2.  Determines that control of the information
has not been lost by such communication and can still
be prevented from being lost; and

2-801.3.  In the case of information released to secondary
distribution centers, such as the DTIC, determines that
no secondary distribution has been made and can still
be prevented (see also paragraphs 2-204.6. and 2-204.7.).

2-802.  Notification.   All known holders of information
that has been upgraded shall be notified promptly of
the upgrading action.

2-803.  Downgrading.   When it will serve a useful purpose,
original classification authorities may, at the time
of original classification, specify that downgrading
of the assigned classification will occur on a specified
date or upon the occurrence of a stated event.

C2.9.  Section 9.   INDUSTRIAL OPERATIONS 

2-900.  Classification in Industrial Operations.   Classification
of information in private industrial operations shall
be based only on guidance furnished by the Government.
  Industrial management may not make original classification
determinations and shall implement the classification
decisions of the U.S. Government contracting authority.

2-901.  Contract Security Classification Specification.
  DD Form 254, "Contract Security Classification Specification,"
shall be used to convey contractual security classification
guidance to industrial management.   DD Forms 254 shall
be changed by the originator to reflect changes in classification
guidance and reviewed for currency and accuracy not
less than once every 2 years.   Changes shall conform
with this Regulation and DoD 5220.22-R and DoD 5220.22-M
(references (j) and (k) and shall be provided to all
holders of the DD Form 254 as soon as possible.   When
no changes are made as a result of the biennial review,
the originator shall so notify all holders of the DD
Form 254 in writing.

C3.  CHAPTER 3

DECLASSIFICATION AND DOWNGRADING

C3.1.  Section 1.   GENERAL PROVISIONS 

3-100.  Policy.   Information classified under E.O.
12356 (reference (g)) and prior orders shall be declassified
or downgraded as soon as national security considerations
permit.   Decisions concerning declassification shall
be based on the loss of sensitivity of the information
with the passage of time or on the occurrence of an
event that permits declassification.   Information that
continues to meet the classification requirements of
subsection 2-202. despite the passage of time will continue
to be protected in accordance with this Regulation.

3-101.  Responsibility of Officials.   Officials authorized
under subsection 1-603. to declassify or downgrade information
that is under the final classification jurisdiction
of the Department of Defense shall take such action
in accordance with this Chapter.

3-102.  Declassification Coordination.   DoD Component
declassification review of classified information shall
be coordinated with any other DoD or non-DoD office,
Component, or Agency that has a direct interest in the
subject matter.

3-103.  Declassification by the Director of the ISOO.
   If the Director of the ISOO determines that information
is classified in violation of reference (b), the Director
may require the activity that originally classified
the information to declassify it.   Any such decision
by the Director may be appealed through the Director
of Security Plans and Programs, ODUSD(P), to the National
Security Council (NSC).   The information shall remain
classified pending a prompt decision on the appeal.

C3.2.  Section 2.   SYSTEMATIC REVIEW 

3-200.  Assistance to the Archivist of the United States.
   The Secretary of Defense and the Secretaries of the
Military Departments shall designate experienced personnel
to assist the Archivist of the United States in the
systematic review of classified information.   Such
personnel shall:

3-200.1.  Provide guidance and assistance to National
Archives and Records Administration (NARA) employees
in identifying and separating documents and specific
categories of information within documents that are
deemed to require continued classification; and

3-200.2.  Refer doubtful cases to the DoD Component
having classification jurisdiction over the information
or material for resolution.

3-201.  Systematic Review Guidelines.   The Director
of Security Plans and Programs, ODUSD(P), in coordination
with DoD Components, shall review, evaluate, and recommend
revisions of DoD Directive 5200.30 (reference (v)) at
least every 5 years.

3-202.  Systematic Review Procedures 

3-202.1.  Except as noted in this subsection, classified
information transferred to the NARA that is permanently
valuable will be reviewed systematically for declassification
by the Archivist of the United States with the assistance
of the DoD personnel designated for that purpose under
subsection 3-200. as it becomes 30 years old.   Information
concerning intelligence (including special activities),
sources, or methods created after 1945, and information
concerning cryptology created after 1945, accessioned
into the NARA will be reviewed systematically as it
becomes 50 years old.   Such information shall be downgraded
or declassified by the Archivist of the United States
under E.O.   12356, the directives of the ISOO, and
reference (v).

3-202.2.  All DoD classified information that is permanently
valuable and in the possession or control of DoD Components,
including that held in Federal Records Centers or other
storage areas, may be reviewed systematically for declassification
by the DoD Component exercising control of such information.
  Systematic declassification review conducted by DoD
Components and personnel designated under subsection
3-200. shall proceed as follows:

3-202.2.1.  Information over which the Department of
Defense exercises exclusive or final original classification
authority and that under reference (v), the responsible
reviewer determines is to be declassified, shall be
marked accordingly.

3-202.2.2.  Information over which the Department of
Defense exercises exclusive or final original classification
authority that, after review, is determined to warrant
continued protection shall remain classified as long
as required by national security considerations.

3-202.3.  Classified information over which the Department
of Defense does not exercise exclusive or final original
classification authority encountered during DoD systematic
review may not be declassified unless specifically authorized
by the Agency having classification jurisdiction over
it.

3-203.  Systematic Review of Classified Cryptologic
Information.   Notwithstanding any other provision of
this Regulation, systematic review and declassification
of classified cryptologic information shall be conducted
in accordance with special procedures developed in consultation
with affected Agencies by the Director, National Security
Agency/Chief, Central Security Service, and approved
by the Secretary of Defense under E.O. 12356 and DoD
Directive 5200.30 (references (g) and (v)).

3-204.  Systematic Review of Intelligence Information.
  Systematic review for declassification of classified
information pertaining to intelligence activities (including
special activities), or intelligence sources or methods
shall be in accordance with special procedures to be
established by the Director of Central Intelligence
after consultation with affected Agencies.

C3.3.  Section 3.   MANDATORY DECLASSIFICATION REVIEW


3-300.  Information Covered.   Upon request by a U.S.
citizen or permanent resident alien, a Federal Agency,
or a State or local government to declassify and release
such information, any classified information (except
as provided in subsection 3-301.) shall be subject to
review by the originating or responsible DoD Component
for declassification in accordance with this section.

3-301.  Presidential Information.   Information originated
by a President, the White House staff, committees, commissions,
or boards appointed by the President, or others specifically
providing advice and counsel to a President or acting
on behalf of a President is exempt from the provisions
of this section.

3-302.  Cryptologic Information.   Requests for the
declassification review of cryptologic information shall
be processed in accordance with the provisions of DoD
Directive 5200.30 (reference (v)).

3-303.  Submission of Requests for Mandatory Declassification
Review.   Requests for mandatory review of DoD classified
information shall be submitted as follows:

3-303.1.  Requests shall be in writing and reasonably
describe the information sought with sufficient particularity
to enable the Component to identify documents containing
that information, and be reasonable in scope; for example,
the request does not involve such a large number or
variety of documents as to leave uncertain the identity
of the particular information sought.

3-303.2.  Requests shall be submitted to the Office
of the Assistant Secretary of Defense (Public Affairs)
(ASD(PA)) (entry point for OSD records), the Military
Department, or other Component most concerned with the
subject matter that is designated under DoD Directive
5400.7 (reference (p)) to receive requests for records
under the Freedom of Information Act.   These offices
are identified in appropriate Parts of Title 32 of the
Code of Federal Regulations for each DoD Component.

3-304.  Requirements for Processing.   Unless otherwise
directed by the ASD(PA), requests for mandatory review
shall be processed as follows:

3-304.1.  The designated office shall acknowledge receipt
of the request.   When a request does not satisfy the
conditions of paragraph 3-303.1., the requester shall
be notified that unless additional information is provided
or the scope of the request narrowed, no further action
will be undertaken.

3-304.2.  DoD Component action upon the initial request
shall be completed within 60 days (45 working days).
  If no determination has been made within 60 days (45
working days) of receipt of the request, the requester
shall be notified of his right to appeal and of the
procedures for making such an appeal.

3-304.3.  The designated office shall determine whether,
under the declassification provisions of this Regulation,
the requested information may be declassified, and,
if so, make such information available to the requester,
unless withholding is otherwise warranted under applicable
law.   If the information may not be released in whole
or in part, the requester shall be given a brief statement
as to the reasons for denial, notice of the right to
appeal the determination within 60 days (45 working
days) to a designated appellate authority (including
name, title, and address of such authority), and the
procedures for such an appeal.

3-304.4.  When a request is received for information
classified by another DoD Component or an Agency outside
the Department of Defense, the designated office shall:

3-304.4.1.  Forward the request to such DoD Component
or outside Agency for review together with a copy of
the document containing the information requested, when
practicable and when appropriate, with its recommendation
to withhold any of the information;

3-304.4.2.  Notify the requester of the referral unless
the DoD Component or outside Agency to which the request
is referred objects to such notice on grounds that its
association with the information requires protection;
and

3-304.4.3.  Request, when appropriate, that the DoD
Component or outside Agency notify the referring office
of its determination.

3-304.5.  If the request requires the rendering of services
for which fees may be charged under Title 5 of the Independent
Offices Appropriation Act (reference (w)) in accordance
with DoD Instruction 7230.7 (reference (x)), the DoD
Component may calculate the anticipated amount of fees
to be charged and ascertain the requester's willingness
to pay the allowable charges as a precondition to taking
further action upon the request.

3-304.6.  A requester may appeal to the Head of a DoD
Component or designee whenever that DoD Component has
not acted on an initial request within 60 days or the
requester has been notified that requested information
may not be released in whole or in part.   Within 30
days after receipt, an appellate authority shall determine
whether continued classification of the requested information
is required in whole or in part, notify the requester
of its determination, and make available to the requester
any information determined to be releasable.   If continued
classification is required under this Regulation, the
requester shall be notified of the reasons therefore.
  If so requested, an appellate authority shall communicate
its determination to any referring DoD Component or
outside Agency.

3-304.7.  The ASD(PA) shall act as appellate authority
for all appeals regarding OSD, OJCS, and Unified Command
records.

3-305.  Foreign Government Information.   Requests for
mandatory review for the declassification of foreign
government information shall be processed and acted
upon under the provisions of this, section subject to
subsection 11-202.

3-306.  Prohibition.   No DoD Component in possession
of a document shall in response to a request under the
Freedom of Information Act or this section refuse to
confirm the existence or nonexistence of the document,
unless the fact of its existence or nonexistence would
itself be classifiable under this Regulation.

3-307.  Restricted Data and Formerly Restricted Data.
  Any proposed action on a request, including requests
from Presidential libraries, for DoD classified documents
that are marked "Restricted Data" or "Formerly Restricted
Data" must be coordinated with the Department of Energy.

C3.4.  Section 4.   DECLASSIFICATION OF TRANSFERRED
DOCUMENTS OR MATERIAL 

3-400.  Material Officially Transferred.   In the case
of classified information or material transferred under
statute, E.O., or Directive from one Department or Agency
or DoD Component to another in conjunction with a transfer
of functions, as distinguished from transfers merely
for purposes of storage, the receiving Department, Agency,
or DoD Component shall be deemed to be the original
classifying authority over such material for purposes
of downgrading and declassification.

3-401.  Material Not Officially Transferred.   When
a DoD Component has in its possession classified information
or material originated in an Agency outside the Department
of Defense that has ceased to exist and such information
or material has not been transferred to another Department
or Agency within the meaning of subsection 3-400., or
when it is impossible to identify the originating Agency,
the DoD Component shall be deemed to be the originating
Agency for the purpose of declassifying or downgrading
such information or material.   If it appears probable
that another Department, Agency, or DoD Component may
have a substantial interest in the classification of
such information, the DoD Component deemed to be the
originating Agency shall notify such other Department,
Agency, or DoD Component of the nature of the information
or material and any intention to downgrade or declassify
it.   Until 60 days after notification, the DoD Component
shall not declassify or downgrade such information or
material without consulting the other Department, Agency,
or DoD Component.   During this period, the other Department,
Agency, or DoD Component may express objections to downgrading
or declassifying such information or material.

3-402.  Transfer for Storage or Retirement.   Whenever
practicable, classified documents shall be reviewed
for downgrading or declassification before they are
forwarded to a Records Center for storage or to the
NARA for permanent preservation.   Any downgrading or
declassification determination shall be indicated on
each document by markings as required by Chapter 4.

C3.5.  Section 5.   DOWNGRADING 

3-500.  Automatic Downgrading.   Classified information
marked for automatic downgrading in accordance with
this or prior regulations or E.Os. is downgraded accordingly
without notification to holders.

3-501.  Downgrading Upon Reconsideration.   Classified
information not marked for automatic downgrading may
be assigned a lower classification designation by the
originator or by an official authorized to declassify
the same information (see subsection 1-603.).   Prompt
notice of such downgrading shall be provided to known
holders of the information.

C3.6.  Section 6.   MISCELLANEOUS 

3-600.  Notification of Changes in Declassification.
  When classified material has been properly marked
with specific dates or events for declassification,
it is not necessary to issue notices of declassification
to any holders.   However, when declassification action
is taken earlier than originally scheduled, or the duration
of classification is extended, the authority making
such changes shall ensure prompt notification of all
holders to whom the information was originally transmitted.
  The notification shall specify the marking action
to be taken, the authority therefore, and the effective
date.   Upon receipt of notification, recipients shall
effect the proper changes and shall notify holders to
whom they have transmitted the classified information.
  See subsections 4-400. and 4-404. for markings and
the use of posted notices.

3-601.  Foreign Relations Series.   In order to permit
the State Department editors of Foreign Relations of
the United States to meet their mandated goal of publishing
20 years after the event, DoD Components shall assist
the editors in the Department of State by easing access
to appropriate classified materials in their custody
and by expediting declassification review of items from
their files selected for possible publication.

3-602.  Reproduction for Declassification Review.  
The provisions of subsection 7-305. shall not restrict
the reproduction of documents for the purpose of facilitating
declassification review under the provisions of this
Chapter or the Freedom of Information Act, as amended
(DoD Directive 5400.7, reference (p)).   After review
for

declassification, however, those reproduced documents
that remain classified must be destroyed in accordance
with Chapter 9.

C3.7.  Section 7.   SECURITY REVIEW AND PUBLIC RELEASE


3-700.  GENERAL 

3-700.1.  THE SECTION IMPLEMENTS DoD DIRECTIVE 5230.9,
REFERENCE (PPP), FOR SECURITY REVIEW AND CLEARANCE OF
DoD AND OSD INFORMATION FOR PUBLIC RELEASE.

3-700.2.  DoD AND OSD POLICY IS FOR THE AMERICAN PEOPLE
TO BE PROVIDED WITH MAXIMUM INFORMATION, LIMITED ONLY
BY RESTRICTIONS NECESSARY TO SAFEGUARD INFORMATION REQUIRING
PROTECTION IN THE INTERESTS OF U.S. NATIONAL SECURITY
OR RESTRICTIONS ON RELEASE ESTABLISHED BY LAW.

3-700.3.  INFORMATION IN ANY FORM ON PLANS, POLICIES,
OR OPERATION OF THE DEPARTMENT OF DEFENSE, OSD, OR U.S.
GOVERNMENT PROPOSED FOR PUBLICATION OR FOR RELEASE TO
THE PUBLIC SHALL BE REVIEWED AND CLEARED BY THE OFFICE
OF THE ASSISTANT SECRETARY OF DEFENSE (PUBLIC AFFAIRS)
OASD(PA) BEFORE IT MEETS ANY OF THE CRITERIA LISTED
IN SUBPARAGRAPHS 3-700.3.1. THROUGH 3-700.3.5., BELOW.
  CASES OF DOUBT SHALL BE RESOLVED IN FAVOR OF SUBMISSION.

3-700.3.1.  INFORMATION OF U.S. NATIONAL INTEREST.

3-700.3.2.  INFORMATION ON SECURITY OF PERSONNEL AND
PROPERTY.

3-700.3.3.  INFORMATION ON U.S. OR FOREIGN NUCLEAR WEAPONS
AND TECHNOLOGY OR U.S. CHEMICAL OR BIOLOGICAL WARFARE
ACTIVITIES.

3-700.3.4.  INFORMATION ON SUBJECTS OF POTENTIAL CONTROVERSY
AMONG U.S. MILITARY SERVICES.

3-700.3.5.  OTHER INFORMATION SPECIFICALLY DESIGNATED
FROM TIME TO TIME BY OASD(PA).   

3-701.  PUBLIC RELEASE OF INFORMATION.   OSD PERSONNEL
WILL NOT MAKE A COMMITMENT TO FURNISH A MANUSCRIPT TO
ANY NON-DoD PUBLICATION OR ORGANIZATION UNTIL THE MANUSCRIPT
HAS BEEN CLEARED BY OR UNTIL APPROVAL FOR THE COMMITMENT
HAS BEEN OBTAINED FROM THE OFFICE OF THE ASSISTANT SECRETARY
OF DEFENSE (PUBLIC AFFAIRS).

3-702.  PUBLIC RELEASE OF CONTRACT INFORMATION.   OSD
COMPONENTS RESPONSIBLE FOR BEGINNING OR RENEWING CONTRACTUAL
AGREEMENTS, OR FOR EXERCISING OPERATIONAL CONTROL OVER
CONTRACTS ADMINISTERED BY OTHER DoD ORGANIZATIONS, SHALL
ENSURE THAT AN APPLICABLE SECURITY CLAUSE IS INCLUDED
IN THE CONTRACT.   THIS CLAUSE SHALL REQUIRE THE CONTRACTOR
TO SUBMIT ANY ARTICLES OR PAPERS, RELATED TO THE CONTRACT,
WHICH ARE PROPOSED FOR PUBLIC RELEASE THROUGH THE RESPONSIBLE
OSD COMPONENT FOR APPROVAL AND SUBSEQUENT DoD CLEARANCE.

C4.  CHAPTER 4

MARKING

C4.1.  Section 1.   GENERAL PROVISIONS 

4-100.  Designation.   Subject to the exceptions in
subsection 4-102., information determined to require
classification protection under this Regulation shall
be so designated.   Designation by means other than
physical marking may be used but shall be followed by
physical marking as soon as possible.

4-101.  Purpose of Designation.   Designation by physical
marking, notation, or other means serves to warn the
holder about the classification of the information involved;
to indicate the degree of protection against unauthorized
disclosure that is required for that particular level
of classification; and to facilitate downgrading and
declassification actions.

4-102.  Exceptions 

4-102.1.  No article that has appeared, in whole or
in part, in newspapers, magazines or elsewhere in the
public domain, or any copy thereof, that is being reviewed
and evaluated to compare its content with classified
information that is being safeguarded in the Department
of Defense by security classification, may be marked
with any security classification, control or other kind
of restrictive marking.   The results of the review
and evaluation, if classified, shall be separate from
the article in question.

4-102.2.  Classified documents and material shall be
marked in accordance with subsection 4-103. unless the
markings themselves would reveal a confidential source
or relationship not otherwise evident in the document,
material, or information.

4-102.3.  The marking requirements of subparagraphs
4-103.1.4. and 4-103.2.4. do not apply to documents
or other material that contain, in whole or in part,
Restricted Data or Formerly Restricted Data information.
  Such documents or other material or portions thereof
shall not be declassified without approval of the Department
of Energy with respect to Restricted Data or Formerly
Restricted Data Information, and with respect to any
other national security information contained therein,
the approval of the originating Agency.

4-103.  Documents or Other Material in General 

4-103.1.  At the time of original classification, the
following shall be shown on the face of all originally
classified documents (see subsection 4-402.) or clearly
associated with other forms of classified information
in a manner appropriate to the medium involved:

4-103.1.1.  The identity of the original classification
authority by position title, unless he or she is the
signer or approver of the document;

4-103.1.2.  The Agency and office of origin;

4-103.1.3.  The overall classification of the document
(see subsection 1-500.);

4-103.1.4.  The date or event for automatic declassification
or the notation "Originating Agency's Determination
Required" or "OADR"; and, if applicable,

4-103.1.5.  Any downgrading action to be taken and the
date or event thereof.

4-103.2.  At the time of derivative classification,
the following shall be shown on the face of all derivatively
classified documents (see subsection 4-402.) or clearly
associated with other forms of classified information
in a manner appropriate to the medium involved:

4-103.2.1.  The source of classification, that is, a
source document or classification guide.   If classification
is derived from more than one source, the phrase "Multiple
Sources" will be shown and the identification of each
source will be maintained with the file or record copy
of the document;

4-103.2.2.  The Agency and office of origin of the derivatively
classified document;

4-103.2.3.  The overall classification of the document
(see subsection 1-500.);

4-103.2.4.  The date or event for declassification or
the notation "Originating Agency's Determination Required"
or "OADR," carried forward from the classification source.
  If the classification is derived from multiple sources,
either the most remote date or event for declassification
marked on the sources or if required by any source,
the notation "Originating Agency's Determination Required"
or "OADR" shall be shown (also see subsection 4-401.);
and, if applicable,

4-103.2.5.  Any downgrading action to be taken and the
date or event thereof.

4-103.3.  In addition to the foregoing, classified documents
shall be marked as prescribed in section C4.2. of this
Chapter, Chapter 6, if the document contains foreign
government information, and with any applicable special
notation listed in section C4.5. of this Chapter.  
Such notations shall be carried forward from source
documents to derivatively classified documents when
appropriate.   (DoD 5200.1-PH (reference (ddd)) provides
illustrated guidance on the application of classification
and associated markings to documents prepared by the
Department of Defense).

4-103.4.  Material other than paper documents shall
show the required information on the material itself
or if that is not practical, in related or accompanying
documentation (see subsection 4-300.).

4-104.  Identification of Classification Authority 

4-104.1.  Identification of a classification authority
shall be shown on the "Classified by" line prescribed
under subsection 4-402. and shall be sufficient, standing
alone, to identify a particular official, source document
or classification guide.

4-104.1.1.  If all information in a document or material
is classified as an act of original classification,
the classification authority who made the determination
shall be identified on the "Classified by" line, unless
the classifier is also the signer or approver of the
document (see subsection 4-402.).

   

THE IDENTITY OF THE ORIGINAL CLASSIFICATION AUTHORITY
SHALL BE SHOWN, BY POSITION TITLE, REGARDLESS OF WHETHER
THE OFFICIAL IS THE SIGNER OR APPROVER TO THE DOCUMENT.

4-104.1.2.  If the classification of all information
in a document or material is derived from a single source
(for example, a source document or classification guide),
the "Classified by" line shall identify the source document
or classification guide, including its date when necessary
to insure positive identification (see subsection 4-402.).

4-104.1.3.  If the classification of information contained
in a document or material is derived from more than
one original classification authority, or an original
classification authority and another source, or from
more than one source document, classification guide,
or combination thereof, the "Classified by" line shall
be marked "Multiple Sources" and identification of all
such authorities and sources shall be maintained with
the file or record copy of the document (see subsection
4-402.).

4-104.1.4.  If an official with requisite classification
authority has been designated by the head of an activity
to approve security classifications assigned to all
information leaving the activity, the title of that
designated official shall be shown on the "Classified
by" line.   The designated official shall maintain records
adequate to support derivative classification actions
(see subsection 4-402.).

4-104.2.  Guidance concerning the identification of
the classification authority on electronically transmitted
messages is contained in subsection 4-207.

4-104.3.  Guidance concerning the identification of
the classification authority on DoD documents that contain
only foreign or NATO classified information is contained
in paragraph 11-304.3.

4-105.  Wholly Unclassified Material.   Normally, unclassified
material shall not be marked or stamped "Unclassified"
unless it is essential to convey to a recipient of such
material that it has been examined with a view to imposing
a security classification and that it has been determined
that it does not require classification.   However,
the marking "Unclassified" may be applied to formerly
classified material (see subsection 4-400.).

   

THIS PROVISION APPLIES ONLY TO DOCUMENTS AND MATERIAL
THAT ARE NOT CLASSIFIED IN THEIR ENTIRETY.   IT DOES
NOT AFFECT THE PAGE MARKING, COMPONENT MARKING, OR PORTION
MARKING REQUIREMENTS FOR CLASSIFIED DOCUMENTS.

C4.2.  Section 2.   SPECIFIC MARKINGS ON DOCUMENTS 

4-200.  Overall and Page Marking.   Except as otherwise
specified for working papers (see subsection 7-304.),
the overall classification of a document, whether or
not permanently bound, or any copy or reproduction thereof,
shall be conspicuously marked, stamped or affixed permanently
at the top and bottom on the outside of the front cover
(if any), on the title page (if any), on the first page,
and on the outside of the back cover (if any).   Each
interior page, except those that are blank, shall be
marked top and bottom according to its content, to include,
"Unclassified" when no classified information is contained
on such a page.   Alternatively, the overall classification
of the document may be conspicuously marked or stamped
at the top and bottom of each interior page when such
marking is necessary to achieve production efficiency
and the particular information to which classification
is assigned is otherwise sufficiently identified consistent
with the intent of subsection 4-202.   In any case,
the classification marking of a page shall not supplant
the classification marking of portions (subsection 4-202.)
of the page marked with lower levels of classification.

   

 EXCEPT AS PROVIDED IN PARAGRAPH 4-207.2. AND SUBSECTION
4-305., BELOW, CLASSIFICATION MARKINGS SHALL BE IN LETTERS
LARGER THAT THOSE ON THE REST OF THE PAGE.   WHERE EXCEPTIONALLY
LARGE LETTERS ARE USED IN THE BODY OF THE PAGE (E.G.,
COVERS OF DOCUMENTS OR GRAPHIC), IT MAY NOT BE PRACTICAL
TO USE LARGER LETTERS.   IN SUCH INSTANCES, THE MARKINGS
MUST BE APPLIED SO THAT THEY IMMEDIATELY ARE NOTICEABLE.
  PARTICULAR CARE MUST BE TAKEN WHEN REPRODUCING CLASSIFIED
DOCUMENTS TO ENSURE THAT CLASSIFICATION AND ASSOCIATED
MARKINGS ARE DISTINCT AND CONSPICUOUS ON THE REPRODUCED
COPIES.   TO FACILITATE REPRODUCIBILITY, SUCH MARKINGS
SHOULD BE APPLIED IN BLACK OR IN OTHER DARK INK.

4-201.  Marking Components.   The major components of
some complex documents are likely to be used separately.
  In such instances, each major component shall be marked
as a separate document in accordance with section C4.1.
of this Chapter.   Examples include each annex, appendix,
or similar component of a plan, program, or operations
order; attachments and appendices to a memorandum or
letter; and each major part of a report.   If an entire
major component is unclassified, the first page of the
component may be marked at the top and bottom with the
designation "UNCLASSIFIED" and a statement included,
such as, "All portions of this (annex, appendix, etc.)
are UNCLASSIFIED."   When this method of marking is
used, no further markings are required on the unclassified
major component.

4-202.  Portion Marking 

4-202.1.  Each section, part, paragraph, or similar
portion of a classified document shall be marked to
show the level of classification of the information
contained in or revealed by it, or that it is unclassified.
  Portions of documents shall be marked in a manner
that eliminates doubt as to which of its portions contains
or reveals classified information.   Classification
levels of portions of a document, except as provided
in subsection 4-204.,shall be shown by the appropriate
classification symbol placed immediately following the
portion's letter or number, or in the absence of letters
or numbers, immediately before the beginning of the
portion.   In marking sections, parts, paragraphs, or
similar portions, the parenthetical symbols "(TS)" for
Top Secret, "(S)" for Secret, "(C)" for Confidential,
and "(U)" for unclassified, shall be used.   When appropriate,
the symbols "RD" for Restricted Data and "FRD" for Formerly
Restricted Data shall be added, for example, "(S-RD)"
or "(C-FRD)."   In addition, portions that contain Critical
Nuclear Weapon Design Information (CNWDI) will be marked
"(N)" following the classification, for example, "(S-RD)(N)."

4-202.2.  Portion marking of DoD documents containing
foreign government information shall be in accordance
with subsection 11-304.

4-202.3.  Illustrations, photographs, figures, graphs,
drawings, charts and similar portions of classified
documents will be clearly marked to show their classification
or unclassified status.   Such markings shall not be
abbreviated and shall be prominent and placed within
or contiguous to the portion.   Captions of such portions
shall be marked on the basis of their content alone
by placing the symbol "(TS)," "(S)," "(C)," or "(U)"
immediately preceding the caption.

4-202.4.  If, in an exceptional situation, parenthetical
portion marking is determined to be impracticable, the
document shall contain a statement sufficient to identify
the information that is classified and the level of
such classification.   Thus, for example, each portion
of a classified document need not be marked separately
if all portions are classified at the same level, provided
a statement to that effect is included in the document.
  In the case of classified compilations, the explanations
required by subsection 4-203. meet this requirement.

4-202.5.  When elements of information in one portion
require different classifications, but segregation into
separate portions would destroy continuity or context,
the highest classification required for any item shall
be applied to that portion or paragraph.

4-202.6.  Waivers of the foregoing portion marking requirements
may be granted for good cause.   Any request by a DoD
Component senior official (see subsections 13-301.and
13-302.) for a waiver of portion marking requirements
shall be submitted to the DUSD(P) and include the following:

4-202.6.1.  Identification of the information or class
of documents for which such waiver is sought;

4-202.6.2.  Detailed explanation of why the waiver should
be granted;

4-202.6.3.  The Component's judgment of the anticipated
dissemination of the information or class of documents
for which the waiver is sought; and

4-202.6.4.  The extent to which such information subject
to the waiver may be a basis for derivative classification.
  Waivers shall be granted only upon a written determination
by the DUSD(P) as the designee of the Secretary of Defense,
that there will be minimal circulation of the specified
documents or information, and minimal potential usage
of these documents or information as a source for derivative
classification determinations; or there is some other
basis to conclude that the benefits of portion marking
are clearly outweighed by the increased administrative
burdens.   The granting and revocation of portion marking
waivers shall be reported to the Director of the ISOO
by the DUSD(P).

4-203.  Compilations 

4-203.1.  Documents.   When classification is required
to protect a compilation of unclassified information
pursuant to subsection 2-211., the overall classification
assigned to such documents shall be placed conspicuously
at the top and bottom of each page and on the outside
of the front and back covers, if any, and an explanation
of the basis for the assigned classification shall be
included on the document or in its text.

4-203.2.  Portions of Documents.   If a classified document
contains particular portions that are unclassified when
standing alone, but classified information will be revealed
when they are combined or associated, those portions
shall be marked as unclassified, the page shall be marked
with the highest classification of any information on
or revealed by the page, and an explanation shall be
added to the page, or to the document, to explain the
classification of the combination or association to
the holder.   This method of marking also may be used
if classified portions on a page, or within a document,
will reveal information of a higher classification when
they are combined or associated than when they are standing
alone.

4-204.  Subjects and Titles of Documents.   Subjects
or titles of classified documents shall be marked with
the appropriate symbol, "(TS)," "(S)," "(C)," or "(U)"
placed immediately following and to the right of the
item.   When applicable, other appropriate symbols,
for example, "(RD)" or "(FRD)," shall be added.   (Subjects
or titles of documents should be unclassified, if possible.)

4-205.  File, Folder, or Group of Documents.   When
a file, folder, or group of classified documents is
removed from secure storage it shall be marked conspicuously
with the highest classification of any classified document
included therein or shall have an appropriate classified
document cover sheet affixed.

4-206.  Transmittal Documents.   A transmittal document,
including endorsements and comments when such endorsements
and comments are added to the basic communication, shall
carry on its face a prominent notation of the highest
classification of the information transmitted by it,
and a legend showing the classification, if any, of
the transmittal document, endorsement, or comment standing
alone.   For example, an unclassified document that
transmits as an attachment a classified document shall
bear a notation substantially as follows:   "UNCLASSIFIED
WHEN SEPARATED FROM CLASSIFIED ENCLOSURE."   (See also
paragraph 4-500.1.)

4-207.  Electronically Transmitted Messages 

4-207.1.  The copy of a classified message (for example,
DD Form 173, "Joint Messageform") approved for electronic
transmission and maintained as the record copy shall
be marked as required by subsection 4-103. for other
documents.   Additionally, copies not electronically
transmitted (such as, mail and courier copies) shall
be marked as required by subsection 4-103.

4-207.2.  The first item of information in the text
of a classified electronically transmitted message shall
be its overall classification.   Paper copies of classified
electronically transmitted messages shall be marked
at the top and bottom with the assigned classification.
  Portions shall be marked as prescribed herein for
paper copies of documents.   When such messages are
printed by an automated system, classification markings
may be applied by that system, provided that page markings
so applied are clearly distinguishable on the face of
the document from the printed text.

4-207.3.  The originator of a classified electronically
transmitted message shall be considered the accountable
classifier under subsection 2-100.   The highest level
official identified on the message as the sender or,
in the absence of such identification, the head of the
organization originating the message, is deemed to be
the classifier of the message.   Thus, a "Classified
by" line is not required on such messages.   The originator
is responsible for maintaining adequate records as required
by paragraph 4-103.2. to show the source of an assigned
derivative classification.

4-207.4.  The last line of text of a classified electronically
transmitted message shall show the date or event for
downgrading, if appropriate, and the date or event for
automatic declassification or "Originating Agency's
Determination Required," by abbreviated markings from
subsection 4-402.   The foregoing is not required for
messages that contain information identified as Restricted
Data or Formerly Restricted Data.

4-207.5.  Any document, the classification of which
is based solely upon the classification of the content
of a classified electronically transmitted message,
shall cite the message on the "Classified by" line of
the newly created document.

4-208.  Translations.   Translations of U.S. classified
information into a language other than English shall
be marked to show the United States as the country of
origin, with the appropriate U.S. classification markings
and the foreign language equivalent thereof (see Appendix
1).

C4.3.  Section 3.   MARKINGS ON SPECIAL CATEGORIES OF
MATERIAL 

4-300.  General Provisions.   Security classification
and applicable associated markings (see subsections
4-103. and 4-310.) assigned by the classifier shall
be conspicuously stamped, printed, written, painted,
or affixed by means of a tag, sticker, decal, or similar
device, on classified material other than paper copies
of documents, and on containers of such material, if
possible.   If marking the material or container is
not practicable, written notification of the security
classification and applicable associated markings shall
be furnished to recipients.   The following procedures
for marking various kinds of material containing classified
information are not all inclusive and may be varied
to accommodate the physical characteristics of the material
containing the classified information and to accommodate
organizational and operational requirements.

4-301.  Charts, Maps, and Drawings.   Charts, maps,
and drawings shall bear the appropriate classification
marking for the legend, title, or scale blocks in a
manner that differentiates between the overall classification
of the document and the classification of the legend
or title itself.   The higher of these markings shall
be inscribed at the top and bottom of each such document.
  When folding or rolling charts, maps, or drawings
would cover the classification markings, additional
markings shall be applied that are clearly visible when
the document is folded or rolled.   Applicable associated
markings shall be included in or near the legend, title,
or scale blocks.

4-302.  Photographs, Films, and Recordings.   Photographs,
films (including negatives), recordings, and their containers
shall be marked to assure that a recipient or viewer
will know that classified information of a specified
level of classification is involved.

4-302.1.  Photographs.   Negatives and positives shall
be marked, whenever practicable, with the appropriate
classification designation and applicable associated
markings.   Roll negatives or positives may be so marked
at the beginning and end of each strip.   Negatives
and positives shall be kept in containers bearing conspicuous
classification markings.   All prints and reproductions
shall be conspicuously marked with the appropriate classification
designation and applicable associated markings on the
face side of the print if possible.   When such markings
cannot be applied to the face side, they may be stamped
on the reverse side or affixed by pressure tape label,
stapled strip, or other comparable means.   (NOTE: 
 When self-processing film or paper is used to photograph
or reproduce classified information, all parts of the
last exposure shall be removed from the camera and destroyed
as classified waste, or the camera shall be protected
as classified.)

4-302.2.  Transparencies and Slides.   Applicable classification
markings shall be shown clearly in the image area of
each transparency or slide, if possible.   In the case
of a 35mm or a similar size transparency or slide where
the classification markings are not conspicuous unless
projected on a screen, for example, the classification
markings also shall be marked on its border, holder,
or frame.   Duplicate classification markings in image
areas and on borders, holders, or frames are required
if there is any doubt that the image area markings are
not conspicuous enough to be seen when the transparencies
or slides are not being projected.   Other applicable
associated markings shall be shown in the image area,
or on the border, holder, or frame, or in accompanying
documentation.   It is not necessary that each transparency
or slide of a set of transparencies or slides bear applicable
associated markings when the set is controlled as a
single document.   In such cases, the first transparency
or slide shall bear the applicable associated markings.

4-302.3.  Motion Picture Films and Video Tapes.   Classified
motion picture films and video tapes shall be marked
at the beginning and end by titles bearing the appropriate
classification makings.   Applicable associated markings
shall be included at the beginning of such films or
tapes.   All such markings shall be visible when projected.
  Reels and cassettes shall be marked with the appropriate
classification and kept in containers bearing conspicuous
classification and applicable associated markings.

4-302.4.  Recordings.   Sound, magnetic, or electronic
recordings shall contain at the beginning and end a
clear statement of the assigned classification that
will provide adequate assurance that any listener or
viewer will know that classified information of a specified
level is involved.   Recordings shall be kept in containers
or on reels that bear conspicuous classification and
applicable associated markings.

4-302.5.  Microforms.   Microforms are images, usually
produced photographically on transparent or opaque materials,
in sizes too small to be read by the unaided eye.  
Accordingly, the assigned security classification and
abbreviated applicable associated markings shall be
conspicuously marked on the microform medium or its
container, so as to be readable by the unaided eye.
  These markings shall also be included on the image
so that when the image is enlarged and displayed or
printed, the markings will be conspicuous and readable.
  Such marking will be accomplished as appropriate for
the particular microform involved.   For example, roll
film microforms (or roll microfilm employing 16, 35,
70, or 105mm films) may generally be marked as provided
for roll motion picture film in paragraph 4-302.3. and
decks of "aperture cards" may be marked as provided
in subsection 4-303. for decks of automatic data processing
punched cards.   Whenever possible, microfiche, microfilm
strips, and microform chips shall be marked in accordance
with this paragraph.

4-303.  Decks of ADP Punched Cards.   When a deck of
classified ADP punched cards is handled and controlled
as a single document, only the first and last card require
classification markings.   An additional card shall
be added (or the job control card modified) to identify
the contents of the deck and the highest classification
therein.   Such additional card shall include applicable
associated markings.   Cards removed for separate processing
or use and not immediately returned to the deck shall
be protected to prevent compromise of any classified
information contained therein, and for this purpose
shall be marked individually as prescribed in subsection
4-200.

4-304.  Removable ADP and Word Processing Storage Media


4-304.1.  External.   Removable information storage
media and devices, used with ADP systems and typewriters
or word processing systems, shall bear external markings
clearly indicating the classification of the information
and applicable associated markings.   Included are media
and devices that store information recorded in analog
or digital form and that are generally mounted or removed
by the users or operators.   Examples include magnetic
tape reels, cartridges, and cassettes; removable disks,
disk cartridges, disk packs and diskettes; paper tape
reels; and magnetic cards.

4-304.2.  Internal.   ADP systems and word processing
systems employing such media shall provide for internal
classification marking to assure that classified information
contained therein that is reproduced or generated, will
bear applicable classification and associated markings.
  An exception may be made by the DoD Component head,
or designee, for the purpose of exempting existing word
processing systems when the internal classification
and applicable associated markings cannot be implemented
without extensive system modification, provided procedures
are established to ensure that users and recipients
of the media, or the information therein, are clearly
advised of the applicable classification and associated
markings.   For ADP systems, exceptions may be authorized
by the DoD Component Designated Approving Authority
or Authorities, designated under DoD Directive 5200.28
(reference (m)).   For purposes of these exemption provisions,
"existing systems" means word processing and ADP systems
already acquired, or, in the case of associated automated
information systems, those for which the life-cycle
management process has already progressed beyond the
"definition/design" phase as set forth in DoD Directive
7920.1 (reference (y)).   Requirements for the security
of non-removable ADP storage media and clearance or
declassification procedures for various ADP storage
media are contained in DoD 5200.28-M (reference (n)).

4-305.  Documents Produced bv ADP Equipment.   The first
page, and the front and back covers, if any, of documents
produced by ADP equipment shall be marked as prescribed
in subsection 4-200.   Interior pages also shall be
marked as prescribed in subsection 4-200. except that
the classification markings of interior pages of fan-folded
printouts may be applied by the ADP equipment.   When
the application of associated markings prescribed by
subsection 4-103. by the ADP equipment is not consistent
with economical and efficient use of such equipment,
such markings may be applied to a document produced
by ADP equipment by superimposing upon the first page
of such document a "Notice of Declassification Instructions
and Other Associated Markings."   Such notice shall
include the date or event for declassification or the
notation "Originating Agency's Determination Required"
or "OADR" and all other such applicable markings.  
If individual pages of a document produced by ADP equipment
are removed or reproduced for distribution to other
users, each such page or group of pages shall be marked
as prescribed in subsection 4-103. or by superimposing
upon each such page or group of pages, a copy of any
"Notice of Declassification Instructions and Other Associated
Markings" applicable to such page or group of pages.

4-306.  Material for Training Purposes.   In using unclassified
documents or material to simulate classified documents
or material for training purposes, such documents or
material shall be marked clearly to indicate the actual
unclassified status of the information, for example,
"(insert classification designation) for training, otherwise
unclassified" or "UNCLASSIFIED SAMPLE."

4-307.  Miscellaneous Material.   Documents and material
such as rejected copy, typewriter ribbons, carbons,
and similar items developed in connection with the handling,
processing, production, and of use classified information
shall be handled in a manner that assures adequate protection
of the classified information involved and destruction
at the earliest practicable time (see section C5.2.,Chapter
5).   Unless a requirement exists to retain this material
or documents for a specific purpose, there is no need
to mark, stamp, or otherwise indicate that the information
is classified.

4-308.  Special Access Program Documents and Material.
  Additional markings as prescribed in Directives, Regulations
and Instructions relating to an approved Special Access
Program shall be applied to documents and material containing
information subject to the special access program. 
 Such additional markings shall not serve as the sole
basis for continuing classification of the documents
or material to which the markings have been applied.
  When appropriate, such markings shall be excised to
ease timely declassification, downgrading, or removal
of the information from special control procedures.

4-309.  Secure Telecommunications and Information Handling
Equipment.   Applicable classification or Controlled
Cryptographic Item (CCI) markings shall be applied to
secure telecommunications and information handling equipment
or associated cryptographic components.   Safeguarding
and control procedures for classified and CCI equipment
and for safeguarding COMSEC facilities are contained
in references (aa), (bb),(cc), (jjj), (kkk), (lll),
and (mmm).

4-310.  Associated Markings.   Other applicable associated
markings required for documents by subsection 4-103.
shall be accomplished as prescribed in this section
or in any other appropriate manner.

C4.4.  Section 4.   CLASSIFICATION AUTHORITY, DURATION,
AND CHANGE IN CLASSIFICATION MARKINGS 

4-400.  Declassification and Regrading Marking Procedures.
  When classified information is downgraded or declassified
in accordance with the assigned downgrading or declassification
markings, such markings shall be a sufficient notation
of the authority for such action.   Whenever classified
information is downgraded or declassified earlier than
originally scheduled, or upgraded, the material shall
be marked promptly and conspicuously to indicate the
change, the authority for the action, the date of the
action and the identity of the person taking the action.
  In addition, except for upgrading (see subsection
4-403.), prior classification markings shall be canceled,
if practicable, but in any event those on the cover
(if any) and first page shall be canceled, and the new
classification markings, if any, shall be substituted.

4-401.  Applying Derivative Declassification Dates 

4-401.1.  New material that derives its classification
from information classified on or after August 1, 1982,
shall be marked with the declassification date, event,
or the notation "Originating Agency's Determination
Required" or "OADR" assigned to the source information.

4-401.2.  New material that derives its classification
from information classified prior to August 1, 1982,
shall be treated as follows:

4-401.2.1.  If the source material bears a declassification
date or event, that date or event shall be carried forward
to the new material;

4-401.2.2.  If the source material bears no declassification
date or event, or bears an indeterminate date or event
such as "Upon Notification by Originator," "Cannot Be
Determined," or "Impossible to Determine," or is marked
for declassification review, the new material shall
be marked with the notation "Originating Agency's Determination
Required" or "OADR"; or

4-401.2.3.  If the source material is foreign government
information bearing no date or event for declassification
or is marked for declassification review, the new material
shall be marked with the notation "Originating Agency's
Determination Required" or "OADR."

4-401.3.  New material that derives its classification
from a classification guide issued prior to August 1,
1982, that has not been updated to conform with this
Regulation shall be treated as follows:

4-401.3.1.  If the guide specifies a declassification
date or event, that date or event shall be applied to
the new material; or

4-401.3.2.  If the guide specifies a declassification
review date, the notation "Originating Agency's Determination
Required" or "OADR" shall be applied to the new material.

4-402.  Commonly Used Markings.   Each classified document
is marked on its face with one or more of the following
markings:

4-402.1.  Original Classification.   The following markings
are used in original classification (paragraph 4-103.1.):

   

          Classified by______________________(See Note
1)

   

          Declassify on______________________(See Note
2)

   

                    Message Abbreviation:

   

          DECL_____________________________(See Note
3)

4-402.2.  Derivative Classification.   The following
markings are used in derivative classification (paragraph
4-103.2.):

   

          Classified by______________________(See Note
4)

   

          Declassify on______________________(See Note
5)

   

                    Message Abbreviation:

   

          DECL_____________________________(See Note
3)

4-402.3.  Downgrading.   The following marking is used
to specify a downgrading (paragraphs 4-103.1. and 4-103.2.):

   

          Downgrade to___________on_____________(See
Note 6)

   

                    Message Abbreviation:

   

          DNG/___/_____________________________(See
Note 7)

4-402.4.  There is no requirement for adding declassification
instructions on documents with Restricted Data or Formerly
Restricted Data markings (see paragraph 4-102.3., and
subsections 4-501. and 4-502.).   Except for electronically
transmitted messages, only a completed "Classified by"
line is added to documents so marked.

4-402.5.  Electronically transmitted message do not
require a "classified by" line (see paragraph 4-207.3.).

4-402.6.  DoD 5200.1-PH (reference (ddd)) provides additional
marking guidance. 

   

   

Note 1:   Insert identification (position title) of
the original classification authority.   This line may
be omitted if the original classification authority
is also the signer or approver of the document.

   

 Note 2:   Insert the specific date, an event certain
to occur, or the notation "Originating Agency's Determination
Required" or "OADR." 

   

Note 3:   Insert day, month, and year for declassification;
for example, "6 Jun 90," an event certain to occur,
or "OADR."

   

 Note 4:   Insert identity of the single security classification
guide, source document, or other authority for the classification.
  If more than one such source is applicable, insert
the phrase "Multiple Sources."

   

 Note 5:   Insert the specific date or event for declassification
or the notation "Originating Agency's Determination
Required" or "OADR."   When multiple sources are used,
either the most remote date or event for declassification
marked on the sources or, if present on any source,
the notation "Originating Agency's Determination Required"
or "OADR" is applied to the new document.

   

 Note 6:   Insert Secret or Confidential and specific
date or event; for example, "Downgrade to CONFIDENTIAL
on 6 July 1988."

   

 Note 7:   Insert "S" or "C" to indicate the downgraded
classification and specific date or event; for example,
"DNG/C/6 Jun 87."

4-403.  Upgrading.   When material is upgraded it shall
be promptly and conspicuously marked as prescribed in
subsection 4-400. except that in all such cases the
old classification markings shall be canceled and new
markings substituted.

4-404.  Limited Use of Posted Notice for Large Quantities
of Material 

4-404.1.  When the volume of material is such that prompt
remarking of each classified item cannot be accomplished
without unduly interfering with operations, the custodian
may attach downgrading and declassification notices
to the storage unit instead of the remarking required
by subsection 4-400.   Each notice shall specify the
authority for the downgrading or declassification action,
the date of the action, and the storage unit to which
it applies.


4-404.2.  When individual documents or materials are
permanently withdrawn from storage units, they shall
be remarked promptly as prescribed by subsection 4-400.
  However, when documents or materials subject to a
downgrading or declassification notice are withdrawn
from one storage unit solely for transfer to another,
or a storage unit containing such documents or materials
is transferred from one place to another, the transfer
may be made without remarking if the notice is attached
to or remains with each shipment.

C4.5.  Section 5.   ADDITIONAL WARNING NOTICES 

4-500.  General Provisions 

4-500.1.  In addition to the marking requirements prescribed
in subsection 4-103., the warning notices prescribed
in this section shall be displayed prominently on classified
documents or materials, when applicable.   In the case
of documents, these warning notices shall be marked
conspicuously on the outside of the front cover, or
on the first page if there is no front cover.   Transmittal
documents, including those that are unclassified (subsection
4-206.), also shall bear these additional warning notices,
when applicable.   In addition, abbreviated forms of
the notices set forth in subsections 4-501., 4-502.,
and 4-503. shall be included in portion markings, as
applicable.   Further, the warning notice in subsection
4-503.,in its short form, shall be included at least
once on interior pages, as applicable.

4-500.2.  When display of warning notices on other materials
is not possible, their applicability to the information
shall be included in the written notification of the
assigned classification.

4-501.  Restricted Data.   Classified documents or material
containing Restricted Data as defined in the Atomic
Energy Act of 1954, as amended (reference (l)), shall
be marked as follows:

   

                     "RESTRICTED DATA"

   

 "This material contains Restricted Data as defined
in the Atomic Energy Act of 1954.   Unauthorized disclosure
subject to administrative and criminal sanctions."

4-502.  Formerly Restricted Data.   Classified documents
or material containing Formerly Restricted Data, as
defined in Section 142.d, Atomic Energy Act of 1954,
as amended (reference (l)), but no Restricted Data,
shall be marked as follows:

   

                     "FORMERLY RESTRICTED DATA"

   

"Unauthorized disclosure subject to administrative and
criminal sanctions.   Handle as Restricted Data in foreign
dissemination (Section 144.b, Atomic Energy Act, 1954.)"

4-503.  Intelligence Sources or Methods Information


4-503.1.  Documents that contain information relating
to intelligence sources or methods shall include the
following marking unless otherwise proscribed by DoD
Instruction 5230.22 (reference (z)):

   

                     "WARNING NOTICE--Intelligence Sources
or Methods Involved"

4-503.2.  Existing stamps or preprinted labels containing
the caveat "Warning Notice--Intelligence Sources and
Methods Involved" may be used on documents created on
or after the effective date of this Regulation until
replacement is required.   Any replacement or additional
stamps or labels purchased after the effective date
of this Regulation shall conform to the wording of paragraph
4-503.1., above.

4-504.  COMSEC Material.   Before release to contractors,
COMSEC documents will indicate on the title page, or
first page if no title page exists, the following notation:

   

                     "COMSEC Material Access by Contractor
Personnel Restricted to U.S. Citizens Holding Final
Government Clearance."

   

This notation shall be placed on COMSEC documents or
material when originated and when release to contractors
can be anticipated.   Other COMSEC documents or material
shall be marked in accordance with National COMSEC Instruction
(NACSI) 4003 (reference (eee)).   Foreign dissemination
of COMSEC information is governed by NCSC Policy Directive
6 (reference (bb)).

4-505.  Dissemination and Reproduction Notice.   Classified
information that the DoD originator has determined to
be subject to special dissemination or reproduction
limitations shall include, as applicable, a statement
or statements on its cover sheet, first page, or in
the text, substantially as follows:

   

                     "Reproduction requires approval
of originator or higher DoD authority."

   

                     "Further dissemination only as
directed by (insert appropriate office or official)
or higher DoD authority."

4-506.  Other Notations.   Other notations of restrictions
on reproduction, dissemination or extraction of classified
information may be used as authorized by DoD Directive
C-5200.5, DoD Instruction 5230.22, DoD Directive 5210.2,
DoD Directive 5100.55, DoD Directive 5200.30, Joint
Army-Navy-Air Force Publication 119, DoD Directive 5230.24,
and NACSI 4003 (references (cc), (z), (dd), (ee), (v),
(ff), (bbb), and (jjj) respectively).

C4.6.  Section 6.   REMARKING OLD MATERIAL 

4-600.  General 

4-600.1.  Documents and material classified under E.O.
12065 (reference (hh)) and predecessor E.Os. that are
marked for automatic downgrading or automatic declassification
on a specific date or event shall be downgraded and
declassified pursuant to such markings.   Declassification
instructions on such documents or material need not
be restated to conform with subsection 4-202.   (See
also subsection 4-400.).   Information extracted from
these documents or material for use in new documents
or material shall be marked for declassification on
the date specified in accordance with paragraph 4-103.2.

4-600.2.  Documents and material classified under reference
(hh) and predecessor E.Os. that are not marked for automatic
downgrading or automatic declassification on a specific
date or event shall not be downgraded or declassified
without authorization of the originator.   Declassification
instructions on such documents or material need not
be restated to conform with subsection 4-202.   Information
extracted from these documents or material for use in
new documents or material shall be marked for declassification
upon the determination of the originator, that is, the
"Declassify on" line shall be completed with the notation
"Originating Agency's Determination Required" or "OADR"
in accordance with paragraph 4-103.2.

4-601.  Earlier Declassification and Extension of Classification.
  Nothing in this section shall be construed to preclude
declassification under Chapter 3 or subsequent extension
of classification under subsection 2-302.

C5.  CHAPTER 5

SAFEKEEPING AND STORAGE

C5.1.  Section 1.   STORAGE AND STORAGE EQUIPMENT 

5-100.  General Policy.   Classified information shall
be stored only under conditions adequate to prevent
unauthorized persons from gaining access.   The requirements
specified in this Regulation represent the minimum acceptable
security standards.   DoD policy concerning the use
of force for the protection of property or information
is specified in DoD Directive 5210.56 (reference (ii)).

   

ITEMS ONLY HAVING MONETARY VALUE (SUCH AS CASH, PRECIOUS
METALS, JEWELRY, NARCOTICS, ETC.) SHALL NOT BE STORED
IN SECURITY CONTAINERS OR SECURE FACILITIES THAT ARE
DESIGNATED FOR STORAGE OF CLASSIFIED INFORMATION.

5-101.  Standards for Storage Equipment.   The GSA establishes
and publishes minimum standards, specifications, and
supply schedules for containers, vault doors, alarm
systems, and associated security devices suitable for
the storage and protection of classified information.
  Heads of DoD Components may establish additional controls
to prevent unauthorized access.   Security filing cabinets
conforming to Federal specifications bear a Test Certification
Label on the locking drawer, attesting to the security
capabilities of the container and lock.   (On some older
cabinets the label was affixed on the inside of the
locked drawer compartment).   Cabinets manufactured
after February 1962 indicate "General Services Administration
Approved Security Container" on the outside of the top
drawer.

5-102.  Storage of Classified Information.   Classified
information that is not under the personal control and
observation of an authorized person, will be guarded
or stored in a locked security container as prescribed
below:

5-102.1.  Top Secret.   Top Secret information shall
be stored in:

5-102.1.1.  A safe-type steel file container having
a built-in, three-position, dial-type combination lock
approved by the GSA or a Class A vault or vault type
room that meets the standards established by the Head
of the DoD Component concerned.   When located in buildings,
structural enclosures, or other areas not under U.S.
Government control, the storage container, vault, or
vault-type room must be protected by an alarm system
or guarded during nonoperating hours.

5-102.1.2.  An alarmed area, provided such facilities
are adjudged by the local responsible official to afford
protection equal to or better than that prescribed in
5-102.1.1., above.   When an alarmed area is used for
the storage of Top Secret material, the physical barrier
must be adequate to prevent:

5-102.1.2.1.  Surreptitious removal of the material;
and

5-102.1.2.2.  Observation that would result in the compromise
of the material.   The physical barrier must be such
that forcible attack will give evidence of attempted
entry into the area.   The alarm system must provide
immediate notice to a security force of attempted entry.
  Under field conditions, the field commander will prescribe
the measures deemed adequate to meet the storage standards
contained in 5-102.1.1. and 5-102.1.2., above.

5-102.2.  Secret and Confidential.   Secret and Confidential
information shall be stored in the manner prescribed
for Top Secret; or in a Class B vault, or a vault-type
room, strong room, or secure storage room that meets
the standards prescribed by the Head of the DoD Component;
or, until phased out, in a steel filing cabinet having
a built-in, three-position, dial-type combination lock;
or, as a last resort, an existing steel filing cabinet
equipped with a steel lock bar, provided it is secured
by a GSA-approved changeable combination padlock.  
In this latter instance, the keeper or keepers and staples
must be secured to the cabinet by welding, rivets, or
peened bolts and DoD Components must prescribe supplementary
controls to prevent unauthorized access.

5-102.3.  Specialized Security Equipment 

5-102.3.1.  Field Safe and One-drawer Container.   One-drawer
field safes, and GSA-approved security containers are
used primarily for storage of classified information
in the field and in transportable assemblages.   Such
containers must be securely fastened or guarded to prevent
their theft.

5-102.3.2.  Map and Plan File.   A GSA-approved map
and plan file has been developed for storage of odd-sized
items such as computer cards, maps, and charts.

5-102.4.  Other Storage Requirements.   Storage areas
for bulky material containing classified information,
other than Top Secret, shall have access openings secured
by GSA-approved changeable combination padlocks (Federal
specification FF-Pl10 series) or key-operated padlocks
with high security cylinders (exposed

shackle, military specification P-43951 series, or shrouded
shackle, military specification P-43607 series).

5-102.4.1.  When combination padlocks are used, the
provisions of subsection 5-104., apply.

5-102.4.2.  When key-operated high security padlocks
are used, keys shall be controlled as classified information
with classification equal to that of the information
being protected and:

5-102.4.2.1.  A key and lock custodian shall be appointed
to ensure proper custody and handling of keys and locks;

5-102.4.2.2.  A key and lock control register shall
be maintained to identify keys for each lock and their
current location and custody;

5-102.4.2.3.  Keys and locks shall be audited each month;

5-102.4.2.4.  Keys shall be inventoried with each change
of custodian;

5-102.4.2.5.  Keys shall not be removed from the premises;

5-102.4.2.6.  Keys and spare locks shall be protected
in a secure container;

5-102.4.2.7.  Locks shall be changed or rotated at least
annually, and shall be replaced upon loss or compromise
of their keys; and

5-102.4.2.8.  Master keying is prohibited.

5-103.  Procurement and Phase-In of New Storage Equipment


5-103.1.  Preliminary Survey.   DoD activities shall
not procure new storage equipment until:

5-103.1.1.  A current survey has been made of on-hand
security storage equipment and classified records; and

5-103.1.2.  Based upon the survey, it has been determined
that it is not feasible to use available equipment or
to retire, return, declassify or destroy enough records
on hand to make the needed security storage space available.

5-103.2.  Purchase of New Storage Equipment.   New security
storage equipment shall be procured from those items
listed on the GSA Federal Supply Schedule.   Exceptions
may be made by Heads of DoD Components, with notification
to the DUSD(P).

5-103.3.  Nothing in this Chapter shall be construed
to modify existing Federal Supply Class Management Assignments
made under DoD Directive 5030.47 (reference (ii)).

5-104.  Designations and Combinations 

5-104.1.  Numbering and Designating Storage Facilities.
  There shall be no external mark as to the level of
classified information authorized to be stored therein.
  For identification purposes each vault or container
shall bear externally an assigned number or symbol.

5-104.1.1.  EACH OSD SECURITY CONTAINER AND SECURE FACILITY
ENTRANCE SHALL BE AFFIXED WITH AN OSD IDENTIFICATION
STICKER.   STICKERS ARE ASSIGNED SOLELY BY THE PHYSICAL
SECURITY DIVISION.   THE STICKER WILL BE ATTACHED IN
THE UPPER LEFT HAND CORNER OF THE TOP DRAWER OR THE
CONTAINER FRAME.   FOR SECURE FACILITIES, TIHE NUMBER
WILL BE PLACED ON THE ENTRANCE DOOR ABOVE THE COMBINATION
LOCK DIAL.

5-104.1.2.  A RECORD OF THE OSD IDENTIFICATION STICKER
NUMBER SHALL BE MAINTAINED ON STANDARD FORM 700.

5-104.2.  Combinations to Containers 

5-104.2.1.  Changing.   Combinations to security containers
shall be changed only by individuals having that responsibility
and an appropriate security clearance.   Combinations
shall be changed:

5-104.2.1.1.  When placed in use;

5-104.2.1.2.  Whenever an individual knowing the combination
no longer requires access;

5-104.2.1.3.  When the combination has been subject
to possible compromise;

5-104.2.1.4.  At least annually; or

5-104.2.1.5.  When taken out of service.   Built-in
combination locks shall be reset to the standard combination
50-25-50; combination padlocks shall be reset to the
standard combination 10-20-30.

5-104.2.1.5.1.  SECURITY CONTAINERS SHALL NOT BE REMOVED
UNDER ANY CIRCUMSTANCES FROM ANY OFFICE OR SECURE FACILITY
UNTIL A PSD REPRESENTATIVE COMPLETELY HAS INSPECTED
THE CONTAINER FOR CLASSIFIED MATERIALS.   A SECURITY
CONTAINER INTENDED FOR TURN-IN IS OF PARTICULAR CONCERN.

5-104.2.1.5.2.  WHEN THE COMBINATION IS RESET, THE COMBINATION
SHALL BE MARKED ON A TAG AND FASTENED SECURELY TO THE
CONTROL DRAWER OF THE CONTAINER.

5-104.2.1.6.  REQUESTS FOR CHANGING COMBINATIONS OR
REPAIRING CONTAINERS SHALL BE ACCOMPLISHED TELEPHONICALLY
BETWEEN 0700 AND 1630 HOURS, MONDAY THROUGH FRIDAY,
EXCEPT HOLIDAYS, ON 697-0519.

5-104.2.1.7.  WHEN CHANGING A COMBINATION, THE SECURITY
CONTAINER CUSTODIAN SHALL SELECT THE COMBINATION NUMBERS.
  THE LOCKSMITH SHALL NOT SET NUMBERS THAT VIOLATE GOOD
SECURITY PRACTICES.   THE USE OF BIRTH DATES, ANNIVERSARY
DATES, TELEPHONE NUMBERS, OR NUMBERS IN SERIES OR PROGRESSION
ARE PROHIBITED.   IDENTICAL COMBINATIONS SHALL NOT BE
PLACED ON MORE THAN ONE SECURITY CONTAINER WITHIN THE
SAME OSD COMPONENT.

5-104.2.2.  Classifying Combinations.   The combination
of a vault or container used for the storage of classified
information shall be assigned a security classification
equal to the highest category of the classified information
authorized to be stored therein.

5-104.2.3.  Recording Storage Facility Data.   A record
shall be maintained for each vault, secure room, or
container used for storing classified information, showing
location of the container, the names, home addresses,
and home telephone numbers of the individuals having
knowledge of the combination.   Standard Form 700, "Security
Container Information," shall be used for this purpose.
  (Use of this Standard Form is required when existing
supplies of similar purpose forms are exhausted or by
September 30, 1986, whichever occurs earlier.)

5-104.2.3.1.  BLOCKS 2 THROUGH 10, PARTS 1 AND 2, STANDARD
FORM (SF) 700 SHALL BE COMPLETED BY THE OSD COMPONENT.
  THE OSD IDENTIFICATION STICKER NUMBER SHALL BE INCLUDED
IN BLOCK 5 OF PARTS 1 AND 2, AND AT THE TOP OF COPY
2A.

5-104.2.3.2.  PART 1, SF 700 SHALL BE POSTED ON THE
INSIDE OF THE SECURITY CONTAINER DRAWER CONTAINING THE
COMBINATION LOCK.

5-104.2.3.3.  PARTS 2 AND 2A OF COMPLETED SF 700 SHALL
BE CLASSIFIED AT THE HIGHEST LEVEL OF CLASSIFICATION
OF THE INFORMATION AUTHORIZED FOR STORAGE IN THE SECURITY
CONTAINER.

5-104.2.3.4.  PART 2A, SF 700 SHALL BE COMPLETED, DETACHED
AND INSERTED IN THE ENVELOPE (PART 2).   THE NUMBER
OF PERSONS HAVING KNOWLEDGE OF SECURITY COMBINATIONS
SHALL BE LIMITED TO THOSE NECESSARY FOR OPERATIONAL
EFFICIENCY AND SHOULD NOT EXCEED THREE.   AT LEAST TWO
PERSONS WHO ARE RESPONSIBLE FOR THE CONTENTS OF EACH
CONTAINER SHALL BE LISTED ON THE SF 700.   AFTER SEALING
THE ENVELOPE FLAP, ONE OF THE RESPONSIBLE OFFICIALS
SHALL AFFIX HIS OR HER SIGNATURE ACROSS THE EDGE OF
THE FLAP, OVER WHICH A STRIP OF CLEAR PLASTIC TAPE SHALL
BE PLACED.   AT LEAST ONE OF THE NAMED INDIVIDUALS SHALL
BE CONTACTED IF THE SECURITY CONTAINER TO WHICH THE
FORM PERTAINS IS FOUND OPEN AND UNATTENDED.

5-104.2.3.5.  THE SEALED SF 700 SHALL BE HAND-CARRIED
TO THE PSD LOCKSHOP, ROOM 1C255 PENTAGON, IMMEDIATELY
AFTER CHANGE OF COMBINATION.   PSD IS RESPONSIBLE FOR
ENSURING THAT CURRENT SF 700 ENVELOPES ARE STORED PROPERLY.

5-104.2.3.6.  ONCE A COMBINATION ENVELOPE HAS BEEN REMOVED
FROM STORAGE WITHIN THE PSD LOCKSHOP, A NEW SF 700 SHALL
BE PREPARED AND RETURNED TO PSD LOCKSHOP AS DESCRIBED
IN PARAGRAPHS 5-104.2.3.1. through 5-104.2.3.5., ABOVE.

5-104.2.4.  Dissemination.   Access to the combination
of a vault or container used for the storage of classified
information shall be granted only to those individuals
who are authorized access to the classified information
stored therein.

   

IN EMERGENCIES, COMBINATIONS ARE AVAILABLE TO OSD OFFICIALS
IDENTIFIED IN BLOCK 10, SF 700, WHEN THEY PRESENT VALID
PHOTOGRAPHIC IDENTIFICATION.   CALL ON EXTENSION 70519
TO OBTAIN THE ENVELOPE.   WRITTEN OR TELEPHONIC AUTHORIZATION
FROM RESPONSIBLE OFFICIALS FOR THIRD PARTIES TO GAIN
ACCESS TO COMBINATION ENVELOPES IS PROHIBITED.

5-104.3.  Electrically Actuated Locks.   Electrically
actuated locks (for example, cipher and magnetic strip
card locks) do not afford the required degree of protection
of classified information and may not be used as a substitute
for the locks prescribed in subsection 5-102.

5-105.  Repair of Damaged Security Containers.   Neutralization
of lock-outs or repair of any damage that affects the
integrity of a security container approved for storage
of classified information shall be accomplished only
by authorized persons who are cleared or continuously
escorted while so engaged.

5-105.1.  A GSA-approved security container is considered
to have been restored to its original state of security
integrity if:

5-105.1.1.  All damaged or altered parts (for example,
locking drawer, and drawer head) are replaced; or

5-105.1.2.  When a container has been drilled immediately
adjacent to or through the dial ring to neutralize a
lock-out, the replacement lock is equal to the original
equipment, and the drilled hole is repaired with a tapered,
hardened tool-steel pin, or a steel dowel, drill bit,
or bearing with a diameter slightly larger than the
hole and of such length that when driven into the hole
there shall remain at each end of the rod a shallow
recess not less than 1/8 inch nor more than 3/16 inch
deep to permit the acceptance of substantial welds,
and the rod is welded both on the inside and outside
surfaces.   The outside of the drawer head shall then
be puttied, sanded, and repainted in such a way that
no visible evidence of the hole or its repair remains
on the outer surface after replacement of the damaged
parts (for example, new lock).

5-105.2.  GSA-approved containers that have been drilled
in a location or repaired in a manner other than as
described in paragraph 5-105.1., above, will not be
considered to have been restored to their original state
of security integrity.   The Test Certification Label
on the inside of the locking drawer and the "General
Services Administration Approved Security Container"
label, if any, on the outside of the top drawer shall
be removed from such containers.

5-105.3.  If damage to a GSA-approved security container
is repaired with welds, rivets, or bolts that cannot
be removed and replaced without leaving evidence of
entry, the cabinet is limited thereafter to the storage
of Secret and Confidential material.

5-105.4.  If the damage is repaired using methods other
than those permitted in paragraphs 5-105.1. and 5-105.3.,
above, use of the container will be limited to unclassified
material and a notice to this effect will be permanently
marked on the front of the container.

5-106.  PROCEDURES FOR OPENING, CLOSING, AND CHECKING
SECURITY CONTAINERS 

5-106.1.  SF 702, "SECURITY CONTAINER CHECK SHEET" AND
REVERSIBLE "OPEN-CLOSED" OR "OPEN-LOCKED" SIGNS SHALL
BE AFFIXED TO EACH SECURITY CONTAINER.

5-106.2.  THE PERSON UNLOCKING A SECURITY CONTAINER
SHALL COMPLETE THE "OPENED BY" COLUMN OF THE SF 702
AND TURN THE REVERSIBLE SIGN TO "OPEN."

5-106.3.  THE PERSON RESPONSIBLE FOR CLOSING A SECURITY
CONTAINER SHALL:

5-106.3.1.  CLOSE ALL DRAWERS, CLOSING THE COMBINATION
DRAWER LAST.

5-106.3.2.  AFTER CLOSING THE COMBINATION DRAWER, ENGAGE
THE LOCKING MECHANISM.

5-106.3.3.  TURN GENTLY THE COMBINATION DIAL AT LEAST
FOUR COMPLETE TURNS IN ONE DIRECTION.

5-106.3.4.  ATTEMPT TO OPEN ALL DRAWERS, TO INCLUDE
DEPRESSING THE THUMB LEVER ON ALL DRAWERS.

5-106.3.5.  COMPLETE THE "LOCKED BY" COLUMN OF SF 702
AND TURN THE REVERSIBLE SIGN TO "CLOSED" OR "LOCKED."

5-106.3.6.  IF A PARTICULAR SECURITY CONTAINER WAS NOT
OPENED DURING A DUTY DAY, THE PERSON CHARGED WITH CLOSING
THE SECURITY CONTAINER SHALL COMPLETE THE STEPS IN SUBPARAGRAPHS
5-106.3.3. AND 5-106.3.4., ABOVE, WRITE "NOT OPENED"
IN THE "OPENED BY" COLUMN, AND COMPLETE THE "CLOSED
BY" COLUMN.   EACH SECURITY CONTAINER MUST BE CHECKED
AT THE END OF EACH DUTY DAY, REGARDLESS OF WHETHER THE
CONTAINER WAS OPENED ON THAT DAY.

5-106.4.  A PERSON OTHER THAN THE PERSON LOCKING THE
SECURITY CONTAINER SHALL DOUBLE CHECK IT TO ENSURE THAT
THE SECURITY CONTAINER IS LOCKED.   THE INDIVIDUAL CONDUCTING
THE DOUBLE CHECK SHALL:

5-106.4.1.  TURN GENTLY THE COMBINATION DIAL AT LEAST
FOUR COMPLETE TURNS IN ONE DIRECTION.

5-106.4.2.  ATTEMPT TO OPEN EACH DRAWER TO INCLUDE DEPRESSING
THE THUMB LEVER ON ALL DRAWERS.

5-106.4.3.  COMPLETE THE "CHECKED BY" COLUMN OF SF 702.

5-106.5.  IF, AT ANY TIME, A SECURITY CONTAINER MUST
BE LEFT UNATTENDED, IT SHALL BE LOCKED AND DOUBLE CHECKED.
  AS AN EXCEPTION TO THIS, A DOUBLE CHECK IS NOT REQUIRED
IN CASE OF FIRE, BOMB THREAT, OR OTHER SIMILAR EMERGENCY.

5-106.6.  DURING NON-DUTY HOURS, THE PERSON LOCKING
A SECURITY CONTAINER SHALL MAKE ALL REASONABLE ATTEMPTS
TO OBTAIN THE ASSISTANCE OF A SECOND PERSON TO DOUBLE
CHECK THE SECURITY CONTAINER.   IF SUCH ASSISTANCE IS
NOT AVAILABLE, THE PERSON LOCKING THE CONTAINER SHALL
WAIT 1 TO 2 MINUTES AND THEN SHALL PERFORM THE DOUBLE
CHECK PROCEDURES.

5-106.7.  SF 702 FORMS SHALL BE DESTROYED THE DAY FOLLOWING
THE LAST ENTRY ON THE FORM EXCEPT FOR THOSE FORMS THAT
MAY BE INVOLVED IN AN INVESTIGATION.

 FIGURE 1.  SF 700, "Security Container Information"

 FIGURE 2.  SF 702, "Security Container Check Sheet"

C5.2.  Section 2.   CUSTODIAL PRECAUTIONS 

5-200.  Responsibilities of Custodians 

5-200.1.  Custodians of classified information shall
be responsible for providing protection and accountability
for such information at all times and for locking classified
information in appropriate security equipment whenever
it is not in use or under direct supervision of authorized
persons.   Custodians shall follow procedures that ensure
that unauthorized persons do not gain access to classified
information.

5-200.2.  Only the Head of a DoD Component, or single
designee at the headquarters and major command levels,
may authorize removal of classified information from
designated working areas in off-duty hours, for work
at home or otherwise, provided that a GSA-approved security
container is furnished and appropriate regulations otherwise
provide for the maximum protection possible under the
circumstances.   (See also section C7.3., Chapter 7.)
  Any such arrangements approved before the effective
date of this Regulation shall be reevaluated and, if
continued approval is warranted, compliance with this
paragraph is necessary.

5-200.2.1.  INDIVIDUALS SHALL NOT BE AUTHORIZED UNDER
ANY CIRCUMSTANCES TO STORE CLASSIFIED INFORMATION, IN
CONTRAVENTION OF PARAGRAPH 5-102., I.E., IN RESIDENCES
WITHOUT THE PRIOR APPROVAL OF THE DEPUTY ASSISTANT SECRETARY
OF DEFENSE (ADMINISTRATION).

5-200.2.2.  THE FOLLOWING REQUIREMENTS APPLY:

5-200.2.2.1.  THE REQUEST SHALL BE A MEMORANDUM, SIGNED
BY AN OSD PRINCIPAL STAFF ASSISTANT, STATING THE LOCATION
AND JUSTIFICATION FOR THE PROPOSED STORAGE AREA.

5-200.2.2.2.  ONLY AN APPROVED SECURITY CONTAINER, PROPERLY
REGISTERED WITH THE PSD, WHS, SHALL BE INSTALLED AT
THE LOCATION.

5-200.2.2.3.  SIGNATURE ACCOUNTABILITY SHALL BE MAINTAINED
FOR INFORMATION REMOVED.   RECONCILIATION OF MATERIAL
IS REQUIRED WHEN THE INFORMATION IS RETURNED.

5-200.2.2.4.  PROCEDURES SHALL BE ESTABLISHED TO ENSURE
THE RETURN OF CLASSIFIED MATERIALS IN THE EVENT OF EMERGENCIES
SUCH AS DEATH, HOSPITALIZATION, OR ABSENCE FROM DUTY
FOR MORE THAN 30 DAYS.

5-200.2.2.5.  PSD SHALL MAINTAIN THE RECORDS OF INDIVIDUALS
SO AUTHORIZED.

5-200.2.2.6.  OSD COMPONENT SECURITY MANAGER FOR THESE
OFFICIALS SHALL EVALUATE THE NEED FOR THE ARRANGEMENTS
ANNUALLY OR UPON CHANGE OF POSITION OCCUPANCY.

5-200.3.  CLASSIFIED INFORMATION IS U.S. GOVERNMENT
PROPERTY AND UNDER NO CIRCUMSTANCES DOES IT BECOME THE
PERSONAL PROPERTY OF ANY INDIVIDUAL.

5-201.  Care During Working Hours.   DoD personnel shall
take precaution to prevent unauthorized access to classified
information.

5-201.1.  Classified documents removed from storage
shall be kept under constant surveillance and face down
or covered when not in use.   Cover sheets shall be
Standard Forms 703, 704, and 705 for, respectively,
Top Secret, Secret, and Confidential documents.   (Use
of these Standard Forms is required when existing supplies
of similar purpose forms are exhausted or by September
30, 1986, whichever occurs earlier.)

5-201.2.  Preliminary drafts, carbon sheets, plates,
stencils, stenographic notes, worksheets, typewriter
ribbons, and other items containing classified information
shall be either destroyed immediately after they have
served their purpose; or shall be given the same classification
and secure handling as the classified information they
contain.

5-201.3.  Destruction of typewriter ribbons from which
classified information can be obtained shall be accomplished
in the manner prescribed for classified working papers
of the same classification.   After the upper and lower
sections have been cycled through and overprinted five
times in all ribbon or typing positions, fabric ribbons
may be treated as unclassified regardless of their classified
use thereafter.   Carbon and plastic typewriter ribbons
and carbon paper that have been used in the production
of classified information shall be destroyed in the
manner prescribed for working papers of the same classification
after initial usage.   However, any ribbon in a typewriter
that uses technology that enables the ribbon to be struck
several times in the same area before it moves to the
next position may be treated as unclassified.

5-201.4.  ACCESS TO ALL OSD COMPONENT OFFICES SHALL
BE CONTROLLED AT ALL TIMES BY EMPLOYEES OR ELECTRO-MECHANICAL
DEVICES.   WHEN EMPLOYEES MUST LEAVE THEIR DESKS, IT
IS THEIR RESPONSIBILITY TO ARRANGE FOR REPLACEMENTS.

5-201.5.  ALL VISITORS, MESSENGERS, AND COURIERS SHALL
BE IDENTIFIED, THEIR BUSINESS STATED, NEED TO KNOW,
AND SECURITY CLEARANCE(S) VERIFIED BEFORE BEING PERMITTED
ACCESS TO CLASSIFIED INFORMATION OR DISCUSSIONS.   IDENTIFICATION
SHALL BE BY PERSONAL RECOGNITION OR BY PRESENTATION
OF CURRENT PHOTOGRAPHIC IDENTIFICATION OR CREDENTIALS.

5-201.6.  UNCLEARED VISITORS (INCLUDING CLEANING, MAINTENANCE,
AND TELEPHONE PERSONNEL) SHALL BE UNDER CONTINUOUS ESCORT
OR SURVEILLANCE.   WHEN UNCLEARED VISITORS ARE PRESENT,
A FACILITY REPRESENTATIVE SHALL COVER OR TURN FACE DOWN
SENSITIVE MATERIALS AND CAUSE SENSITIVE DISCUSSIONS
TO CEASE FOR THE DURATION OF THE VISIT.

5-201.7.  UNSECURED AND UNATTENDED CLASSIFIED MATERIAL
SHALL BE TURNED OVER TO THE DISCOVERER'S SECURITY MANAGER
WHO SHALL NOTIFY PSD OF THE INCIDENT.   UNSECURED AND
UNATTENDED CLASSIFIED MATERIAL SHALL BE INITIALED AND
DATED IN INK BY THE DISCOVERER AND SUBSEQUENT CUSTODIANS
FOR POSSIBLE FUTURE IDENTIFICATION UNTIL THE CASE IS
CLOSED.

5-202.  End-of-Day Security Checks.   Heads of activities
that process or store classified information shall establish
a system of security checks at the close of each working
day to ensure that the area is secure; Standard Form
701, "Activity Security Checklist" shall be used to
record such checks.   An integral part of the security
check system shall be the securing of all vaults, secure
rooms, and containers used for the storage of classified
material; Standard Form 702, "Security Container Check
Sheet" shall be used to record such actions.   In addition,
Standard Forms 701 and 702 shall be annotated to reflect
after-hours, weekend, and holiday activity.   (Use of
these Standard Forms is required when existing supplies
of similar purpose forms are exhausted or by September
30, 1986, whichever occurs earlier.)

5-202.1.  AT THE CLOSE OF EACH WORKING DAY, ALL PERSONNEL
SHALL:

5-202.1.1.  INSPECT THEIR IMMEDIATE WORK AREAS FOR CLASSIFIED
MATERIAL, PAYING PARTICULAR ATTENTION TO THE CONTENTS
OF DESKS, IN AND OUT TRAYS, AND WASTE CONTAINERS.

5-202.1.2.  SURVEY THE GENERAL WORK AREA TO ENSURE THAT
NO CLASSIFIED MATERIAL REMAINS UNSECURED.

5-202.1.3.  PLACE CLASSIFIED NOTES, CARBON PAPER, ROUGH
DRAFTS, AND SIMILAR CLASSIFIED PAPERS IN BAGS AND STORE
IN PROPER SECURITY CONTAINERS.

5-202.1.4.  REMOVE AND SECURE TYPEWRITER RIBBONS OR
PORTIONS OF TYPEWRITER RIBBONS THAT HAVE BEEN USED TO
PREPARE CLASSIFIED MATERIAL.   THIS PROVISION DOES NOT
APPLY WHEN USING IBM TECH III, BLUE, AND SPERRY REMINGTON
BEAUTYRITE III TYPEWRITER RIBBONS.   MINIATURE MEMORY
STORAGE (DISKS) UNITS SHALL BE REMOVED FROM TYPEWRITERS
AND WORD PROCESSORS SO EQUIPPED, AND SECURED.

5-202.1.5.  RETURN CLASSIFIED DOCUMENTS, CORRESPONDENCE,
OR RELATED CLASSIFIED INFORMATION TO PROPER SECURITY
CONTAINERS.

5-202.1.6.  SECURE SECURITY CONTAINERS WHEN THEIR CONTENTS
ARE NO LONGER NEEDED FOR THE DAY AND COMPLETE SF 701,
TO INCLUDE DOUBLECHECKER'S INITIALS.

5-202.2.  AT LEAST ONE INDIVIDUAL SHALL BE PESIGNATED
ON A ROTATING OR PERMANENT BASIS TO BE RESPONSIBLE FOR
DOUBLECHECKING EACH OSD COMPONENT TO ENSURE THAT CLASSIFIED
MATERIALS AND SECURITY EQUIPMENT HAVE BEEN SECURED PROPERLY
BEFORE LEAVING THE WORK AREA.   SF 701 SHALL BE PLACED
ON THE INSIDE OF THE ROOM AT THE PRIMARY EXIT AND COMPLETED
BY THE AREA DOUBLECHECKER DAILY.   WHEN THE OFFICE IS
OCCUPIED AFTER DUTY HOURS, THE LAST PERSON LEAVING THE
OFFICE SHALL ASSUME RESPONSIBILITY FOR DOUBLECHECKING
AND SECURING THE OFFICE AREA.

5-202.3.  WHEN NOTIFIED THAT A SECURITY CONTAINER OR
ROOM HAS BEEN LEFT UNATTENDED, THE COMPONENT SECURITY
MANAGER AND THE PSD SHALL BE NOTIFIED.   THOSE RESPONSIBLE
FOR THE CONTAINER OR THE ROOM SHALL BE REQUIRED TO CHECK
THE CONTENTS OF THE CONTAINER OR ROOM FOR INDICATIONS
OF REMOVAL OF MATERIALS.   THE COMBINATION TO THE SECURITY
CONTAINER OR ROOM SHALL BE CHANGED IMMEDIATELY, IN ACCORDANCE
WITH SUBPARAGRAPH 5-104.2.1.3., ABOVE.

5-202.4.  THE DIRECTOR, PSD, SHALL INSURE THAT END-OF-DAY
SECURITY CHECKS ARE PERFORMED BY CONDUCTING AFTER DUTY
HOURS SECURITY INSPECTIONS.   ALL VIOLATIONS DISCOVERED
DURING THESE INSPECTIONS SHALL BE REPORTED DIRECTLY
TO THE DIRECTOR, PSD.   AS A MINIMUM THE FOLLOWING SHALL
BE INSPECTED:

5-202.4.1.  DESK TOPS, CONTENTS OF ALL DESKS FOUND UNLOCKED,
IN AND OUT TRAYS, TYPEWRITERS, AND WASTE CONTAINERS.

5-202.4.2.  THE GENERAL WORK AREA TO ENSURE THAT NO
CLASSIFIED MATERIAL HAS BEEN LEFT UNSECURED.

5-202.4.3.  ALL SECURITY CONTAINERS TO ENSURE THAT THEY
ARE LOCKED AND THAT SF 702, "SECURITY CONTAINER CONTAINER
CHECK SHEET," IS BEING INITIALED AND COUNTERINITIALED.

5-202.4.4.  CHECK SF 701, "ACTIVITY SECURITY CHECKLIST,"
FOR INITIALS.

5-203.  Emergency Planning 

5-203.1.  Plans shall be developed for the protection,
removal, or destruction of classified material in case
of fire, natural disaster, civil disturbance, terrorist
activities, or enemy action.   Such plans shall establish
detailed procedures and responsibilities for the protection
of classified material to ensure that the material does
not come into the possession of unauthorized persons.
  These plans shall include the treatment of classified
information located in foreign countries.

5-203.2.  These emergency planning procedures do not
apply to material related to COMSEC.   Planning for
the emergency protection including emergency destruction
under no-notice conditions of classified COMSEC material
shall be developed in accordance with the requirements
of NSA KAG I-D (reference (gg)).

5-203.3.  Emergency plans shall provide for the protection
of classified material in a manner that will minimize
the risk of injury or loss of life to personnel. In
the case of fire or natural disaster, the immediate
placement of authorized personnel around the affected
area, pre-instructed and trained to prevent the removal
of classified material by unauthorized personnel, is
an acceptable means of protecting classified material
and reducing casualty risk.   Such plans shall provide
for emergency destruction to preclude capture of classified
material when determined to be required.   This determination
shall be based on an overall commonsense evaluation
of the following factors:

5-203.3.1.  Level and sensitivity of classified material
held by the activity;

5-203.3.2.  Proximity of land-based commands to hostile
or potentially hostile forces or to communist-controlled
countries;

5-203.3.3.  Flight schedules or ship deployments in
the proximity of hostile or potentially hostile forces
or near communist-controlled countries;

5-203.3.4.  Size and armament of land-based commands
and ships;

5-203.3.5.  Sensitivity of operational assignment; and

5-203.3.6.  Potential for aggressive action of hostile
forces.

5-203.4.  When preparing emergency destruction plans,
consideration shall be given to the following:

5-203.4.1.  Reduction of the amount of classified material
held by a command as the initial step toward planning
for emergency destruction;

5-203.4.2.  Storage of less frequently used classified
material at more secure commands in the same geographical
area (if available);

5-203.4.3.  Transfer of as much retained classified
material to microforms as possible, thereby reducing
the bulk that needs to be evacuated or destroyed;

5-203.4.4.  Emphasis on the priorities for destruction,
designation of personnel responsible for destruction,
and the designation of places and methods of destruction.
  Additionally, if any destruction site or any particular
piece of destruction equipment is to be used by more
than one activity or entity, the order or priority for
use of the site or equipment must be clearly delineated;

5-203.4.5.  Identification of the individual who is
authorized to make the final determination when emergency
destruction is to begin and the means by which this
determination is to be communicated to all subordinate
elements maintaining classified information;

5-203.4.6.  Authorization for the senior individual
present in an assigned space containing classified material
to deviate from established plans when circumstances
warrant; and

5-203.4.7.  Emphasis on the importance of beginning
destruction sufficiently early to preclude loss of material.
  The effect of premature destruction is considered
inconsequential when measured against the possibility
of compromise.

5-203.5.  The emergency plan shall require that classified
material holdings be assigned a priority for emergency
evacuation or destruction.   Priorities should be based
upon the potential effect on national security should
such holdings fall into hostile hands, in accordance
with the following general guidelines:

5-203.5.1.  Priority One.   Exceptionally grave damage
(Top Secret material);

5-203.5.2.  Priority Two.   Serious damage (Secret material);
and

5-203.5.3.  Priority Three.   Damage (Confidential material).

5-203.6.  If, as determined by appropriate threat analysis,
Priority One material cannot otherwise be afforded a
reasonable degree of protection from hostile elements
in a no-notice emergency situation, provisions shall
be made for installation of Anticompromise Emergency
Destruct (ACED) equipment to ensure timely initiation
and positive destruction of such material2 in accordance
with the following standard:   "With due regard for
personnel and structural safety, the ACED system shall
reach a stage in destruction sequences at which positive
destruction is irreversible within 60 minutes at shore
installations, 30 minutes in ships, and 3 minutes in
aircraft following activation of the ACED system."3

5-203.7.  An ACED requirement is presumed to exist and
provisions shall be made for an ACED system to protect
Priority One material in the following environments:

5-203.7.1.  Shore-based activities located in or within
50 miles of potentially hostile countries, or located
within or adjacent to countries with unstable governments;

5-203.7.2.  Reconnaissance aircraft, both manned and
unmanned, that operate within JCS-designated reconnaissance
reporting areas (see Memorandum by the Secretary, Joint
Chiefs of Staff (SM) 701-76, Volume II, "Peacetime Reconnaissance
and Certain Sensitive Operations" (reference (kk));4

5-203.7.3.  Naval surface noncombatant vessels operating
in hostile areas when not accompanied by a combatant
vessel;

5-203.7.4.  Naval subsurface vessels operating in hostile
areas; and

5-203.7.5.  U.S. Navy Special Project ships (Military
Sealift Command-operated) operating in hostile areas.

5-203.8.  Except in the most extraordinary circumstances,
ACED is not applicable to commands and activities located
within the United States.   Should there be reason to
believe that an ACED requirement exists in environments
other than in those listed in paragraph 5-203.7., above,
a threat and vulnerability study should be prepared
and submitted to the head of the DoD Component concerned
or his designee for approval.   The threat and vulnerability
study should include, at a minimum, the following data,
classified if appropriate:

   

   

2  Technological limitations, particularly as to personnel
and structural safety, place constraints on the amount
of material that can be accommodated in buildings, ships,
and aircraft by current ACED systems; therefore, only
Priority One material reasonably can be so protected
at this time.   Nevertheless, after processing Priority
One material in an emergency situation involving possible
loss to hostile forces, it is imperative that Priority
Two material and then Priority Three material be destroyed
insofar as is possible by whatever means available.

   

3  The time frames indicated above are those for the
initiation of irreversible destruction, not necessarily
for the completion of such destruction.

   

4  SM 701-76 is available on a strict need-to-know basis
from the Chief, Documents Division, Joint Secretariat,
OJCS.

5-203.8.1.  Volume and type of Priority One material
held by the activity, that is, paper products, microforms,
magnetic tape, and circuit boards;

5-203.8.2.  A statement certifying that the amount of
Priority One material held by the activity has been
reduced to the lowest possible level;

5-203.8.3.  An estimate of the time, beyond the time
frames cited above, required to initiate irreversible
destruction of Priority One material held by the activity,
and the methods by which destruction of that material
would be attempted in the absence of an ACED system;

5-203.8.4.  Size and composition of the activity;

5-203.8.5.  Location of the activity and the degree
of control it, or other United States authority, exercises
over security; and

5-203.8.6.  Proximity to potentially hostile forces
and potential for aggressive action by such forces.

5-203.9.  When a requirement is believed to exist for
ACED equipment not in the GSA or DoD inventories, the
potential requirement shall be submitted to the DUSD(P)
for validation n accordance with subsection 5.2. of
DoD Directive 3224.3 (reference (ll)).5

5-203.10.  In determining the method of destruction
of other than Priority One material, any method specified
for routine destruction or any other means that will
ensure positive destruction of the material may be used.
  Ideally, any destruction method should provide for
early attainment of a point at which the destruction
process is irreversible.   Additionally, classified
material may be jettisoned at sea to prevent its easy
capture.   It should be recognized that such disposal
may not prevent recovery of the material.   Where none
of the methods previously mentioned can be employed,
the use of other means, such as dousing the classified
material with a flammable liquid and igniting it, or
putting to use the facility garbage grinders, sewage
treatment plants, and boilers should be considered.


   

   

5  Information on ACED systems may be obtained from
the Office of the Chief of Naval Operations (OP-09N),
Navy Department, Washington, DC  20350.

5-203.11.  Under emergency destruction conditions, destruction
equipment may be operated at maximum capacity and without
regard to pollution, preventive maintenance, and other
constraints that might otherwise be observed.

5-203.12.  Commands and activities that are required
to maintain an ACED system pursuant to paragraph 5-203.7.,
above, shall conduct drills periodically to ensure that
responsible personnel are familiar with the emergency
plan.   Such drills should be used to evaluate the anticipated
effectiveness of the plan and the prescribed equipment
and should be the basis for improvements in planning
and equipment use.   Actual destruction should not be
initiated during drills. 

5-204.  Telecommunications Conversations.   Classified
information shall not be discussed in telephone conversations
except as authorized over approved secure communications
circuits, that is, cryptographically protected circuits
or protected distribution systems installed in accordance
with National COMSEC Instruction 4009 (reference (mm)).

   

CLASSIFIED INFORMATION SHALL NOT BE DISCUSSED ON UNSECURED,
STANDARD COMMERCIAL TELEPHONES.   THE USE OF CODES OR
ATTEMPT TO TALK AROUND CLASSIFIED SUBJECTS IS PROHIBITED.

5-205.  Security of Meetings and Conferences.   Security
requirements and procedures governing disclosure of
classified information at conferences, symposia, conventions,
and similar meetings, and those governing the sponsorship
and attendance of U.S. and foreign personnel at such
meetings, are set forth in DoD Directive 5200.12, DoD
Instruction 5230.20, DoD 5220.22-R, and DoD 5220.22-M
(references (nn), (fff), (j), and (k)), respectively).

5-205.1.  GENERAL.   CLASSIFIED MEETINGS SHALL BE CONDUCTED
TO BEST SERVE THE INTEREST OF U.S. NATIONAL SECURITY.
  SECURITY SAFEGUARDS AND PROCEDURES SHALL BE ESTABLISHED
TO CONTROL ACCESS AND PREVENT COMPROMISE OF CLASSIFIED
INFORMATION PRESENTED DURING SUCH MEETINGS.

5-205.2.  MEETINGS DISCLOSING CLASSIFIED INFORMATION


5-205.2.1.  SUCH MEETINGS SHALL BE SPONSORED BY AN OSD
COMPONENT HAVING SIGNIFICANT INTEREST IN THE SUBJECT
MATTER.   WITHIN THE OSD, A PRINCIPAL STAFF ASSISTANT,
A PRINCIPAL DEPUTY UNDER OR ASSISTANT SECRETARY OF DEFENSE,
OR A HIGHER-LEVEL

OFFICIAL MAY SPONSOR SUCH A MEETING AFTER DETERMINING,
THE FOLLOWING:

5-205.2.1.1.  THE CLASSIFIED SESSIONS OF THE MEETING
ARE IN THE BEST INTERESTS OF U.S. NATIONAL SECURITY.

5-205.2.1.2.  THE USE OF CONVENTIONAL CHANNELS FOR DISSEMINATION
OF CLASSIFIED SCIENTIFIC AND TECHNICAL INFORMATION DOES
NOT ACCOMPLISH THE PURPOSE OF THE MEETING.

5-205.2.1.3.  ADEQUATE SECURITY MEASURES AND ACCESS
PROCEDURES HAVE BEEN DEVELOPED AND SHALL BE IMPLEMENTED.

5-205.2.1.4.  THE LOCATION SELECTED FOR THE CLASSIFIED
SESSIONS OF THE MEETING ENSURES PROPER CONTROL AND DISSEMINATION
OF CLASSIFIED INFORMATION, AND ADEQUATE FACILITIES ARE
AVAILABLE FOR SECURE STORAGE AND PROTECTION.

5-205.2.2.  OSD COMPONENTS ACCEPTING SPONSORSHIP OF
A CLASSIFIED MEETING SHALL APPOINT A SECURITY MANAGER
WHO SHALL ENSURE COMPLIANCE WITH APPLICABLE SECURITY
DIRECTIVES, AND THAT:

5-205.2.2.1.  THE MEETING SITE IS PROPER FOR THE LEVEL
OF CLASSIFICATION INVOLVED.

5-205.2.2.2.  ADEQUATE STORAGE FACILITIES ARE AVAILABLE,
WHEN REQUIRED.

5-205.2.2.3.  ACCESS TO CLASSIFIED SESSIONS OF THE CONFERENCE
ARE LIMITED TO PERSONS WHOSE CLEARANCE AND NEED TO KNOW
HAVE BEEN ESTABLISHED POSITIVELY, AS FOLLOWS:

5-205.2.2.3.1.  MILITARY AND CIVILIAN PERSONNEL:   A
WRITTEN VISIT REQUEST OR SECURITY CLEARANCE CERTIFICATION
FURNISHED IN ADVANCE THAT CONTAINS FULL NAME OF THE
ATTENDEE, SOCIAL SECURITY NUMBER, DATE AND PLACE OF
BIRTH, CITIZENSHIP, SECURITY CLEARANCE LEVEL AND DATE
GRANTED, AND SECURITY MANAGER'S CERTIFICATION.

5-205.2.2.3.2.  CONTRACTOR PERSONNEL:   IN ADDITION
TO THE INFORMATION IN PARAGRAPHS 5-205.1. THROUGH 5-205.2.2.6.,
ABOVE, EACH CONTRACTOR VISIT REQUEST FURNISHED IN ADVANCE,
ALSO SHALL CONTAIN CONTRACT NUMBER, PROJECT OR PROGRAM
PERTAINING TO THE SUBJECT MATTER OF THE CLASSIFIED MEETING,
LEVEL OF CLASSIFIED ACCESS AUTHORIZED UNDER CONTRACT,
PURPOSE AND/OR JUSTIFICATION FOR ATTENDANCE AT CLASSIFIED
CONFERENCE, AND GOVERNMENT CONTRACTING OFFICER'S CERTIFICATION
OF THE INDIVIDUAL'S NEED TO ATTEND THE CONFERENCE.

5-205.2.2.3.3.  FOREIGN PERSONNEL:   THE OSD COMPONENT
SPONSORING THE CONFERENCE SHALL REQUEST APPROVAL FROM
DEFENSE INTELLIGENCE AGENCY (DIA) FOR THE DISCLOSURE
OF CLASSIFIED INFORMATION AND THE COUNTRIES OF THE FOREIGN
NATIONALS WHOSE PRESENCE IS ANTICIPATED.   ONLY FOREIGN
NATIONALS APPROVED BY DIA SHALL BE ALLOWED TO ATTEND
SUCH CONFERENCES.

5-205.2.2.4.  THE NAMES OF ALL CLEARED AND/OR CERTIFIED
PERSONNEL HAVING A NEED TO KNOW SHALL BE PLACED ON AN
ACCESS ROSTER.

5-205.2.2.5.  PHOTOGRAPHIC IDENTIFICATION SHALL BE REQUIRED
OF ALL ATTENDEES WHOSE IDENTITY IS NOT ESTABLISHED BY
PERSONAL RECOGNITION.

5-205.2.2.6.  AUTHORIZATION TO RELEASE CLASSIFIED INFORMATION
BY DOD PERSONNEL TO U.S. AUDIENCES MUST BE OBTAINED
FROM THE ORIGINATOR, AND CONTRACTOR PERSONNEL MUST COMPLY
WITH DOD 5220.22-M, PARAGRAPH 9.E., (REFERENCE (K)).

5-205.2.2.7.  ALL ANNOUNCEMENTS AND INVITATIONS SHALL
BE REVIEWED FOR ACCURACY AND FOR ENSURING THAT THEY
ARE UNCLASSIFIED.

5-205.2.2.8.  LOGS OF ALL CLASSIFIED MATERIAL DISTRIBUTED
DURING THE MEETING SHALL BE PREPARED AND AN ACCURATE
INVENTORY MADE OF THEIR COLLECTION AT THE CONCLUSION
OF THE MEETING.   ANY DISCREPANCY IN THESE INVENTORIES
SHALL BE REPORTED TO THE CONVENING OSD COMPONENT'S SECURITY
MANAGER FOR ACTION IMMEDIATELY UPON DISCOVERY.

5-205.2.2.9.  A RECEIPT, IF REQUIRED BY THE ORIGINATOR,
SHALL BE OBTAINED FOR CLASSIFIED MATERIAL DISTRIBUTED
AT MEETINGS THAT IS TO BE RETAINED BY PARTICIPANTS.
  RECEIPTS ALWAYS ARE REQUIRED FOR MATERIAL CLASSIFIED
SECRET AND ABOVE.   SECRETARY OF DEFENSE (SD) FORM 120,
"RECEIPT FOR CLASSIFIED MATERIAL" SHALL BE USED FOR
THIS PURPOSE.   APPLICABLE WRAPPING FOR ANY SUCH MATERIAL
SHALL BE PROVIDED.

5-205.2.2.10.  THE MEETING AREA SHALL BE INSPECTED BY
REPRESENTATIVES OF THE CONVENING OFFICIAL AT THE CONCLUSION
OF THE MEETING TO ENSURE THAT NO CLASSIFIED MATERIAL
OR NOTES HAVE BEEN LEFT BY ATTENDEES.

5-205.2.2.11.  PARTICIPANTS MAKING THEIR OWN NOTES SHALL
BE ADVISED OF CLASSIFICATION LEVEL OF THE DISCUSSION
AND OF THE CLASSIFIED NATURE OF SUCH NOTES AND CAUTIONED
TO STORE THE NOTES PROPERLY ON DEPARTURE.   ALL CLASSIFIED
MATERIAL SHALL BE PROPERLY WRAPPED AND PARTICIPANTS
HAVE PROPER COURIER AUTHORITY.   PARTICIPANTS SHALL
BE PROHIBITED FROM INTRODUCING INTO THE SECURE FACILITY
ANY ELECTRONIC OR OPTICAL DEVICE CAPABLE OF RECORDING
ACTIVITIES OR MATERIALS WITHIN THE FACILITY.

5-205.2.2.12.  THE LOSS OR COMPROMISE OF ANY CLASSIFIED
INFORMATION AT THE MEETING SHALL BE REPORTED PROMPTLY
TO ODUSD(P).   

5-206.  Safeguarding of U.S. Classified Information
Located in Foreign Countries.   Except for classified
information that has been authorized for release to
a foreign government or international organization pursuant
to DoD Directive 5230.11 (reference (tt)), and is under
the security control of such government or organization,
the retention of U.S. classified material in foreign
countries may be authorized only when that material
is necessary to satisfy specific U.S. Government requirements.
  This includes classified material temporarily transferred
into a foreign country via U.S. Government personnel
authorized to escort or handcarry such material pursuant
to Chapter 8, section C8.3., as applicable.   Whether
permanently or temporarily retained, the classified
materials shall be stored under U.S. Government control
as follows:

5-206.1.  At a U.S. military installation, or a location
where the United States enjoys extraterritorial status,
such as an embassy or consulate.

5-206.2.  At a U.S. Government activity located in a
building used exclusively by U.S. Government tenants,
provided the building is under 24-hour control by U.S.
Government personnel.

5-206.3.  At a U.S. Government activity located in a
building not used exclusively by U.S. Government tenants
nor under host government control, provided the classified
material is stored in security containers approved by
the GSA and is placed under 24-hour control by U.S.
Government personnel.

5-206.4.  At a U.S. Government activity located in a
building not used exclusively by U.S. Government tenants
but which is under host government control, provided
the classified material is stored in GSA-approved security
containers which are further secured in a locked room
or area to which only U.S. personnel have access.

5-206.5.  When host government and U.S. personnel are
co-located, U.S. classified material that has not been
authorized for release to the host government pursuant
to DoD Directive 5230.11 (reference (tt)), shall, to
the extent possible, be segregated from releasable classified
material to facilitate physical control and prevent
inadvertent compromise.   However, U.S. classified material
that is releasable to the host country need not be subject
to the 24-hour U.S. control requirement provided the
host government exercises its own control measures over
the pertinent areas or containers during non-duty hours.

5-206.6.  Foreign nationals shall be escorted while
in areas where non-releasable U.S. classified material
is handled or stored.   However, when required by operational
necessity, foreign nationals may be permitted, during
duty hours, unescorted entry to such areas provided
the non-releasable information is properly stored or
is under the direct personal supervision and control
of cleared U.S. personnel who can prevent unauthorized
access.

 FIGURE 3.  SF 701, "Activity Security Check List"

C5.3.  Section 3.   ACTIVITY ENTRY AND EXIT INSPECTION
PROGRAM 

5-300.  Policy 

5-300.1.  Commanders and heads of activities shall establish
and maintain an inspection program to deter and detect
unauthorized introduction or removal of classified material
from DoD-owned or -leased installations and facilities.
  This program does not replace existing programs for
facility and installation security and law enforcement
inspection requirements.

5-300.2.  The inspection program shall be implemented
in a manner that does not interfere unduly with the
performance of assigned missions.

5-300.3.  The inspection program shall be implemented
in a manner that does not significantly disrupt the
ingress and egress of persons who are employees of,
or visitors to, defense installations and facilities.

5-300.4.  Inspections carried out under this program
shall be limited to the extent feasible to areas where
classified work is being performed, and cover only persons
employed within, or visiting, such areas.

5-300.5.  Inspections carried out under this program
shall be performed at a sufficient frequency to provide
a credible deterrent to those who would be inclined
to remove classified materials without authority from
the installation or facility in question.

5-300.6.  The method and frequency of such inspections
at a given installation or facility is at the discretion
of the commander or head of the installation or facility,
or other designated official.   Such inspections shall
conform to the procedures set forth below.

5-300.7.  THE HEADS OF OSD COMPONENTS MAY IMPLEMENT
AN INSPECTION PROGRAM FOR THEIR AREAS.   OSD COMPONENTS
HOUSED OUTSIDE THE PENTAGON SHALL INSTITUTE THIS PROGRAM.
  ALL INDIVIDUALS, REGARDLESS OF POSITION OR RANK, ARE
SUBJECT TO THIS POLICY.

5-300.7.1.  A MEMORANDUM SIGNED BY THE HEAD OF THE OSD
COMPONENT, AUTHORIZING THE PROGRAM, SHALL BE SENT TO
THE DIRECTOR, PSD, FOR APPROVAL.

5-300.7.2.  A DETAILED OUTLINE OF THE INSPECTION PROCEDURES
SHALL ACCOMPANY THE AUTHORIZING MEMORANDUM.   IT SHALL
INCLUDE, AS A MINIMUM, THE FOLLOWING:

5-300.7.2.1.  THE EXIT AND/OR ENTRY LOCATION.

5-300.7.2.2.  WHO IS TO BE SEARCHED.

5-300.7.2.3.  WHAT TO LOOK FOR (CLASSIFIED DOCUMENTS
AND/OR ITEMS).

5-300.7.2.4.  WHAT IS TO BE SEARCHED (BRIEFCASES, HANDBAGS,
PACKAGES, OR SIMILAR CONTAINERS).

5-300.7.2.5.  PROCEDURES TO BE FOLLOWED IN THE EVENT
CLASSIFIED MATERIAL IS FOUND.

5-300.7.2.6.  WHEN AND HOW OFTEN INSPECTIONS SHALL BE
CONDUCTED.

5-300.7.3.  PERSONNEL, WHO SHALL BE INVOLVED IN CONDUCTING
THE SEARCHES, SHALL BE TRAINED IN THEIR RESPONSIBILITIES
AS OUTLINED IN THE WRITTEN INSPECTION PROGRAM.

5-300.7.4.  AN AFTER ACTION REPORT SHALL BE SUBMITTED
WITHIN 5 WORKING DAYS AFTER THE INSPECTION TO THE DIRECTOR,
PSD.   ALL VIOLATIONS AND UNUSUAL OCCURRENCES SHALL
BE INCLUDED IN THE REPORT.

5-301.  Inspection Frequency 

5-301.1.  Inspections may be periodic, that is, at irregular
intervals.

5-301.2.  Inspections may be accomplished at one or
more designated entry/exit points; they need not be
carried out at all entry/exit points at the same time.

5-301.3.  Inspections may be done on a random basis
using any standard that may be appropriate, for example,
every third person; every tenth person; every hundredth
person, at the entry/exit point(s) designated.

5-301.4.  Inspections at a particular entry/exit point(s)
may be limited as appropriate to various periods of
time, for example, one week, one day, or one hour.

5-301.5.  Inspections shall be conducted at all entry/exit
points after normal duty hours, including weekends and
holidays, on a continuous basis, if practicable.

5-302.  Inspection Procedures and Identification 

5-302.1.  Inspections shall be limited to that which
is necessary to determine whether classified material
is contained in briefcases, shoulder or handbags, luggage,
athletic bags, packages, or other similar containers
being removed from or taken into the premises.   Inspections
shall not be done of wallets, change purses, clothing,
cosmetics cases, or other objects of an unusually personal
nature.

5-302.2.  DoD Components shall provide employees who
have a legitimate need to remove classified material
from the installation or activity with written or printed
authorizations to pass through designated entry/exit
points.   (See paragraph 8-300.6.)   This may include:

5-302.2.1.  The authorization statements prescribed
in Chapter 8, section C8.3.

5-302.2.2.  If authorized in Component instructions,
wallet-size cards which describe in general terms the
purpose(s) for authorizing the employee to remove classified
material from the facility (for example, use at meetings
or transmission to authorized recipients).

5-302.2.3.  Inspectors are to ensure that personnel
are not removing classified material without authorization.
  Where inspectors determine that individuals do not
appear to have appropriate authorization to remove classified
material, they shall request such individual to obtain
appropriate authorization before exiting the premises.
  If, due to the circumstances, this is not feasible,
the inspector should attempt to verify by telephone
the authority of the individual in question to remove
the classified material with the employing office. 
 When such verification cannot be obtained, and if removal
cannot be prevented, the inspector shall advise the
employing office and appropriate security office as
soon as feasible that classified material was removed
by the named individual at a particular time and without
apparent authorization.

5-302.2.4.  If the employing office determines that
classified material was removed by one of its employees
without authority, it shall request an investigation
of the circumstances of the removal by appropriate investigative
authorities.   Where such investigation confirms a violation
of security procedures, other than espionage or deliberate
compromise, for which subsection 6-109. applies, appropriate
administrative, disciplinary, or legal action shall
be taken.

C5.4.  Section 4.   PHYSICAL SECURITY OF OSD OFFICES


5-400.  POLICY.   OFFICES AND OTIHER SPACES (LESS ALARMED
AREAS) SHALL BE SECURED PHYSICALLY AGAINST UNAUTHORIZED
ENTRY THROUGH THE USE OF KEY-OPERATED, HIGH SECURITY
DOOR CYLINDERS OR OTHER PSD AUTHORIZED ACCESS DEVICES.
  ALL LOCK WORK FOR OSD COMPONENTS, EXCEPT THAT FOR
DESK AND FILE CABINET KEY LOCKS, SHALL BE ACCOMPLISHED
BY OR UNDER THE

SUPERVISION OF THE PSD, WASHINGTON HEADQUARTERS SERVICES
(WHS), INCLUDING THE ISSUANCE OF KEYS.

5-401.  KEY CONTROL OFFICER 

5-401.1.  HEADS OF OSD COMPONENTS SHALL, DESIGNATE,
IN WRITING, A PRIMARY AND ALTERNATE KEY CONTROL OFFICER
BY SUBMITTING A DEPARTMENT OF DEFENSE (DD) FORM 577,
"SIGNATURE CARD," FOR EACH DESIGNEE TO THE PSD, WHS
(SEE FIGURE 4, BELOW).

5-401.2.  KEY CONTROL OFFICER SHALL:

5-401.2.1.  PROCESS REQUESTS FOR DOOR KEYS AND SPECIAL
LOCKS USING DD FORM 2251, "REQUEST FOR DOOR KEYS AND
SPECIAL LOCKS."

5-401.2.2.  REPORT ANY LOSS OR COMPROMISE OF KEYS IN
WRITING TO THE PSD, WHS, AND REQUEST THAT THE KEY LOCK
BE CHANGED.   A LOCK SHALL BE CONSIDERED COMPROMISED
IF THE KEY CONTROL OFFICER MAY NOT ACCOUNT FOR THE KEYS
OR IF UNAUTHORIZED DUPLICATE KEYS HAVE BEEN MADE FOR
A LOCK.

5-402.  HOLDERS OF OSD KEYS.   EMPLOYEES SHALL:

5-402.1.  RECEIPT FOR AND MAINTAIN CONTROL OF ALL ASSIGNED
KEYS.

5-402.2.  RETURN ASSIGNED KEYS TO THE PSD, WHS, ROOM
3C345, BEFORE REASSIGNMENT OR TERMINATION OF EMPLOYMENT
AS PART OF THE CLEARING PROCESS.

5-402.3.  PROVIDE WRITTEN REPORT TO THE KEY CONTROL
OFFICER ON THE CIRCUMSTANCES SURROUNDING LOST OR COMPROMISED
KEYS.

5-402.4.  OBTAIN A KEY FROM THE KEY CONTROL OFFICER
OR ANOTHER EMPLOYEE BEFORE REPORTING FOR DUTY WHEN REQUIRED
TO WORK OTHER THAN NORMAL DUTY HOURS AND WHEN NOT IN
POSSESSION OF A KEY.

5-402.5.  REPORT IMMEDIATELY TO THE PSD, WHS, ALL MALFUNCTIONING
COMBINATION LOCKS, KEY LOCKS, OR ACCESS CONTROL DEVICES.

5-403.  INSTALLATION OF DOOR LOCKS AND ACCESS CONTROL
DEVICES AND ISSUANCE OF DUPLICATE KEYS 

5-403.1.  REQUESTS FOR INSTALLATION OF DOOR LOCKS AND
ACCESS CONTROL DEVICES AND FOR DUPLICATE KEYS SHALL
BE SUBMITTED ON DD FORM 2251 (SEE FIGURE 5, BELOW).

5-403.1.1.  THE REQUESTOR SHALL COMPLETE LINES 1 THROUGH
6 OF THAT FORM.

5-403.1.2.  IF MORE THAN ONE KEY IS REQUESTED, THE NAMES
OF THE EMPLOYEES FOR WHOM ADDITIONAL KEYS ARE REQUIRED
SHALL BE LISTED IN LINE 6.

5-403.1.3.  LINE 5A SHALL BE COMPLETED BY ENTERING THE
ACRONYM OF THE OSD COMPONENT CONCERNED, SUCH AS USDP;
USDR&E; ASD(C); ASD(A&L); DUSD(P); GC; WHS(B&F), AND
WHS(C&D).

5-403.1.4.  LINES 5B, 5C, AND 5D SHALL BE DISREGARDED.

5-403.1.5.  LINES 7A AND 7B SHALL BE COMPLETED BY THE
KEY CONTROL OFFICER.

5-403.2.  A MAXIMUM OF ONE KEY PER OFFICE OCCUPANT OR
SIX KEYS, WHICHEVER IS LESS, SHALL BE ISSUED FOR ANY
ONE DOOR LOCK.   EXCEPTIONS TO THIS POLICY SHALL BE
JUSTIFIED IN WRITING, THROUGH THE COMPONENT KEY CONTROL
OFFICER.   FINAL APPROVAL REMAINS WITH THE DIRECTOR,
PSD, WHS.   ASSIGNMENT OF ADDITIONAL EMPLOYEES TO AN
OFFICE DOES NOT CONSTITUTE A VALID JUSTIFICATION FOR
ADDITIONAL KEYS.

5-403.3.  THE KEY CONTROL OFFICER SHALL FORWARD THE
COMPLETED REQUEST TO PSD FOR APPROVAL.   DISAPPROVED
REQUESTS SHALL BE RETURNED WITH APPLICABLE ANNOTATION.

5-404.  EMERGENCIES.   EMERGENCY REQUESTS FOR COMBINATION
CHANGES OR REPAIR OF ACCESS CONTROL DEVICES, SECURITY
CONTAINERS, AND LOCKS AFTER NORMAL DUTY HOURS AND ON
SATURDAYS, SUNDAYS, AND HOLIDAYS SHALL BE TELEPHONED
TO (202) 695-5052.   THIS PROCEDURE APPLIES TO OBTAINING
EMERGENCY ACCESS TO AREAS EQUIPPED WITH KEY LOCKS. 
 A SITUATION IN WHICH AN EMPLOYEE SCHEDULED TO WORK
DURING OTHER THAN NORMAL DUTY HOURS FORGETS HIS OR HER
KEY IS NOT CONSIDERED AN EMERGENCY.

 FIGURE 4.  DD Form 577, "Signature Card"

 FIGURE 5.  DD Form 2251, "Request for Door Keys and
Special Locks"

C5.5.  Section 5.   INTRUSION DETECTION (ALARM) SYSTEMS


5-500.  POLICY.   THE INSTALLATION OF ALARM EQUIPMENT
FOR DETECTING AN UNAUTHORIZED OR FORCED ENTRY SHALL
BE KEPT TO A MINIMUM CONSISTENT WITH THE OPERATIONAL
REQUIREMENTS OF THE OSD COMPONENT CONCERNED.   ALARM
EQUIPMENT SHALL BE USED TO PROTECT AREAS OR OFFICES
UNDER ONE OF THE FOLLOWING CONDITIONS:

5-500.1.  WHEN THE BULK OR VOLUME OF CLASSIFIED MATERIAL
MAKE IT IMPRACTICAL TO STORE CLASSIFIED MATERIAL IN
SECURITY CONTAINERS.   THIS IS FOR CENTRAL REPOSITORIES
ONLY AND REFERS TO OPEN OR SHELF STORAGE.

5-500.2.  WHEN DIA MANUAL 50-3 (REFERENCE QQQ) REQUIRES
PROTECTION BY AN ALARM SYSTEM.

5-501.  ESTABLISHMENT 

5-501.1.  A REQUEST TO ESTABLISH AN ALARMED AREA FOR
THE OPEN STORAGE OF TOP SECRET, SECRET, OR CONFIDENTIAL
MATERIAL SHALL BE SIGNED BY THE OSD COMPONENT HEAD.
  THE FOLLOWING INFORMATION SHALL BE INCLUDED IN THE
REQUEST:

5-501.1.1.  FULL JUSTIFICATION FOR THE ALARMED AREA
FOR STORAGE TO INCLUDE ESTIMATED VOLUME AND TYPE OF
MATERIAL.

5-501.1.2.  CLASSIFICATION LEVEL OF MATERIAL TO BE STORED
IN THE AREA.

5-501.1.3.  A DETAILED SKETCH OR FLOOR PLAN OF AREA,
INCLUDING LOCATION, SIZE, CONFIGURATION OF WALLS, AND
INTERNAL PHYSICAL ARRANGEMENTS OF THE OFFICES.

5-501.1.4.  THE NAME, ROOM, AND TELEPHONE NUMBER OF
THE PROJECT OFFICER ASSIGNED TO ESTABLISH THE ALARMED
AREA.

5-501.2.  THE OSD COMPONENT SECURITY MANAGER SHALL FORWARD
THE REQUEST THROUGH THE OSD RECORDS ADMINISTRATOR, RECORDS
MANAGEMENT DIVISION, CORRESPONDENCE AND DIRECTIVES (C&D),
WHS, FOR PERMISSION TO USE SHELF FILES IN ACCORDANCE
WITH PARAGRAPH 3.3.4., AI NO. 15 (REFERENCE RRR) TO
THE PSD.   SENSITIVE COMPARTMENTED INFORMATION FACILITIES
(SCIF) DO NOT REQUIRE THIS PERMISSION.

5-501.3.  THE DIRECTOR, PSD, SHALL COORDINATE AND APPROVE
ALL MATTERS IN ESTABLISHING AN ALARMED AREA AND SHALL:

5-501.3.1.  REVIEW ALL REQUESTS AND CONDUCT NECESSARY
SURVEYS.

5-501.3.2.  PROVIDE THE PROJECT OFFICER THE CONSTRUCTION
AND REQUISITION REQUIREMENTS.

5-501.3.3.  DESIGNATE PSD EMPLOYEE AS THE CONTRACTING
OFFICER'S TECHNICAL REPRESENTATIVE (COTR) WHO SHALL
OBTAIN APPLICABLE EQUIPMENT.

5-501.3.4.  COORDINATE WITH THE DEPARTMENT OF THE AIR
FORCE SECURITY OFFICE OR THE CIVILIAN MONITORING AGENCY,
AS APPLICABLE, ON ALL MATTERS FOR ALARM EQUIPMENT MONITORING.

5-501.3.5.  MONITOR THE INSTALLATION OF ALARM DEVICES,
ENSURE THAT ALL EQUIPMENT CONSIGNED HAS BEEN INSTALLED
AND IS OPERABLE, AND THAT PERIODIC INSPECTIONS ARE CONDUCTED
TO TEST THE EQUIPMENT AND THE SYSTEMS.

5-501.3.6.  MAINTAIN A RECORD OF ALL ALARMED AREAS TO
MONITOR THE ACCOUNTING OF FUNDS FOR PLANNING AND STATISTICAL
PURPOSES.

5-501.4.  THE PROJECT OFFICER SHALL:

5-501.4.1.  COORDINATE THE CONSTRUCTION AND REQUISITION
REQUIREMENTS.

5-501.4.2.  PROVIDE NECESSARY SECURITY OR PRECAUTIONARY
MEASURES TO PREVENT COMPROMISE OF CLASSIFIED INFORMATION
DURING ANY PHASE OF THE INSTALLATION AND MAINTENANCE
WORK IN THEIR AREAS.

5-501.4.3.  NOTIFY PSD BY TELEPHONE (695-5052) UPON
COMPLETION.

5-502.  ADMINISTRATION 

5-502.1.  THE OCCUPANTS SHALL:

5-502.1.1.  FOLLOW PROCEDURES FOR OPENING AND CLOSING
AN ALARMED AREA AND SECURE THE AREA WHENEVER AN ALARMED
AREA IS TO BE LEFT UNATTENDED AT OTHER THAN ESTABLISHED
SECURITY HOURS.

5-502.1.2.  TEST THE ALARM SYSTEM PERIODICALLY AND REPORT
PROMPTLY ALL MALFUNCTIONS TO PSD.

5-502.1.3.  COORDINATE WITH PSD BEFORE BEGINNING CONSTRUCTION
WORK THAT AFFECTS THE OPERATION OF ALARM EQUIPMENT INSTALLED
IN THE AREA.

5-502.2.  EACH COMPONENT SECURITY MANAGER AND ALTERNATE
SHALL SIGN A DD FORM 577, "SIGNATURE CARD."   SEE FIGURE
6, BELOW.   PSD SHALL SIGN IN THE THE BLOCK MARKED "SIGNATURE
OF COMMANDING OFFICER."   THIS APPOINTMENT DOES NOT
INCLUDE THE AUTHORITY TO PLACE A ZONE IN SERVICE OR
REMOVE IT FROM SERVICE.   ONLY THOSE INDIVIDUALS WITH
A CURRENT DD FORM 577 MAY SIGN AFHQ 91, "ALARMED AREA
ACCESS LIST" (AAAL).

5-502.3.  A COMPLETED AFHQ FORM 91, "ALARMED AREA ACCESS
LIST," (AAAL) SHALL BE FURNISHED TO HQ USAF SECURITY
FORCE.

5-502.3.1.  ONLY THE NAMES OF THOSE PERSONS ASSIGNED
TO THE ZONE WHO FREQUENTLY HAVE A NEED TO MAKE TEMPORARY
CHANGES TO THE DUTY HOURS AND WHO ARE ABLE TO RESPOND
TO THE ZONE DURING NONDUTY HOURS IF THERE IS AN EMERGENCY
SHALL BE LISTED ON THE AAAL.   A TOTAL OF 18 PERSONS
PER ZONE SHALL BE ASSIGNED.   ONLY THE ORIGINAL AFHQ
FORM 91 SHALL BE ACCEPTED FOR PROCESSING; A MACHINE
COPY SHALL NOT BE ACCEPTED.

5-502.3.2.  A NEW AAAL IS REQUIRED FOR ADDING OR DELETING
A PERSON'S NAME FROM THE AAAL, CHANGING THE DUTY HOURS,
OR CHANGING THE CODEWORD.   TELEPHONE CHANGES SHALL
NOT BE ACCEPTED.   SEE SUBSECTION 5-508. FOR INSTRUCTIONS
ON COMPLETING THE AAAL.

5-502.3.3.  TO ADD A PERSON'S NAME TO THE AAAL, ALL
THE REQUIRED INFORMATION EXCEPT THE PASSCARD NUMBER
MUST BE ADDED TO THE NEW AAAL.   IF THE PERSON WHOSE
NAME WAS ADDED ALREADY HAS A VALID PASSCARD FROM ANOTHER
AREA, THE NUMBER IS PLACED IN THE SPACE PROVIDED AND
THE NAME IS ASTERISKED.

5-502.3.4.  TO DELETE A PERSON'S NAME FROM THE AAAL,
THE INDIVIDUAL'S PASSCARD AND THE NEW AAAL SHALL BE
HAND-CARRIED TO DET 1, 1100SPS, ROOM 4D882, THE PENTAGON.
  THE CODEWORD IS CHANGED ON THE AAAL WHEN A PERSON'S
NAME IS REMOVED FROM THE LIST OR AUTOMATICALLY ONCE
A YEAR, WHICHEVER COMES FIRST.

5-502.3.5.  AFHQ FORM 91 MAY BE OBTAINED FROM USAF COUNTER
SERVICES, ROOM 4A1008C.

5-502.4.  DET 1, 11OOSPS SHALL ISSUE EACH PERSON WHO
IS AUTHORIZED TO MAKE TEMPORARY CHANGES TO THE ZONE
DUTY HOURS AN AFHQ FORM 93, "PASSCARD."   IT IS A WALLET-SIZED,
LAMINATED CARD BEARING A FIVE-DIGIT CONTROL NUMBER.
  THE CARD IDENTIFIES THE BEARER TO SECURITY PERSCNNEL
WHEN THE ZONE IS OPENED OR CLOSED AFTER THE ESTABLISHED
HOURS AND WHEN OCCUPANTS WISH TEMPORARILY TO EXTEND
THEIR HOURS OF OPERATION.   THE FOLLOWING RULES APPLY
TO EACH HOLDER OF A PASS CARD:

5-502.4.1.  THE PASS CARD IS A SENSITIVE, OFFICIAL DOCUMENT
AND MAY NOT BE EXPOSED TO PUBLIC VIEW OR ATTACHED TO
THE DOD BUILDING PASS OR BADGES.

5-502.4.2.  THE PASS CARD AND NUMBER SHALL BE USED ONLY
BY THE PERSON TO WHOM IT IS ISSUED.

5-502.4.3.  THE LOSS OR THEFT OF PASS CARDS MUST BE
REPORTED IMMEDIATELY TO AIR FORCE SECURITY 697-8291.

5-503.  OPENING AND CLOSING ALARMED AREAS 

5-503.1.  OPENING PROCEDURES 

5-503.1.1.  EACH ALARMED AREA SHALL BE PERMITTED ONE
UNCHALLENGED OPENING AND CLOSING DURING LISTED DUTY
HOURS, AS INDICATED ON THE AAAL.   AFTER THE DOOR IS
UNLOCKED AND THE AREA ENTERED, THE CONTROL SWITCH IMMEDIATELY
SHALL BE TURNED FROM THE "ON" TO THE "OFF" POSITION.

5-503.1.2.  IF THE AREA IS TO BE ENTERED BEFORE THE
ESTABLISHED HOURS OR AFTER THE ONE UNCHALLENGED OPENING,
AIR FORCE SECURITY SHALL BE CONTACTED BY TELEPHONE (697-8291)
FOR IDENTIFICATION.   THE INDIVIDUAL MUST PROVIDE THE
FOLLOWING:

5-503.1.2.1.  YOUR PASS CARD NUMBER AND THE NUMBER OF
THE ZONE YOU WANT TO ENTER.

5-503.1.2.2.  THE PERIOD OF TIME YOU SHALL REMAIN IN
THE ZONE.   IF YOU OPEN EARLY FOR A NORMAL DUTY DAY
AND REMAIN IN THE ZONE UNTIL NORAML DUTY HOURS BEGIN,
THIS INFORMATION IS NOT NEEDED.   IN ALL OTHER CASES,
AN ESTIMATED DEPARTURE TIME IS REQUIRED.

5-503.1.2.3.  AFTER ESTABLISHING YOUR SCHEDULE, THE
OPERATOR ASKS YOU THE CODEWORD FOR THE ZONE.

5-503.1.3.  AFTER THE OPERATOR ACKNOWLEDGES THE CODEWORD
AND CLEARS YOU TO PROCEED, YOU MAY ENTER THE ZONE. 
 IF YOU DON'T KNOW, OR YOU FORGET THE CODEWORD OR PASS
THE WRONG CODEWORD, YOUR ENTRY TO THE ZONE SHALL BE
DENIED.   YOU MUST THEN REPORT TO DET 1, 1100SPS, ROOM
4D882, FOR IDENTIFICATION.   YOU SHALL BE PERMITTED
TO ENTER THE ZONE ONLY AFTER YOU PROVIDE POSITIVE IDENTIFICATION.

5-503.1.4.  DURING NONDUTY HOURS, ANY ENTRY TO A SECURED
ZONE WITHOUT PRIOR CLEARANCE IS A PROCEDURAL VIOLATION.

5-503.2.  CLOSING PROCEDURES 

5-503.2.1.  THE AREA SHALL BE SECURED BY CLOSING ALL
OPENINGS TO THE ZONE AND ENSURING THAT ALL INTERCONNECTING
DOORS ARE CLOSED AND EMERGENCY EXITS ARE LOCKED.   IF
THE ALARM SYSTEM IS EQUIPPED WITH SMALL RED LIGHTS,
PUSH THE SWITCH TO "RESET" POSITION UNTIL THE RED LIGHTS
ARE EXTINGUISHED AND THEN TO "LATCH" POSITION.

5-503.2.2.  OPEN THE ENTRANCE DOOR AND TURN THE CONTROL
SWITCH FROM THE "OFF" TO THE "ON" POSITION.   EXIT THE
AREA AND SECURE THE COMBINATION LOCK BY TURNING THE
DIAL TO "O," DISENGAGING THE BUTTERFLY, IF APPLICABLE,
AND TURNING THE DIAL AT LEAST FOUR COMPLETE REVOLUTIONS
IN ONE DIRECTION.   ON NEWER COMBINATION LOCKS NOT EQUIPPED
WITH A BUTTERFLY, THE DIAL SHALL BE ROTATED AT LEAST
FIVE TURNS IN A COUNTERCLOCKWISE DIRECTION.

5-503.2.3.  IF THE DOOR IS EQUIPPED WITH AN ELECTRONIC
CYPHER OR MECHANICAL (PUSH BUTTON) SIMPLEX ACCESS CONTROL
DEVICE, OPERATE THE CYPHER SYSTEM TO VERIFY THAT THE
LOCK IS SECURE AND THE DOOR DOES NOT OPEN.

5-503.2.4.  ON SUCCESSFUL CLOSING, A BUZZER SHALL SOUND
FOR APPROXIMATELY 1 SECOND.   AN OCCASIONAL DELAY OF
UP TO 2 1/2 MINUTES FOR THE BUZZER TO SOUND DUE TO POWER
RECHARGING IS NOT UNUSUAL.   THE ALARMED AREA SHALL
NOT BE ABANDONED UNDER ANY CIRCUMSTANCES, UNTIL EITHER
THE BUZZER HAS SOUNDED OR, IN AREAS SO EQUIPPED, THE
RINGBACK LIGHT ILLUMINATES.   WHENEVER THERE IS NO AUDIO
OR VISUAL VERIFICATION SIGNAL, AIR FORCE SECURITY MUST
BE CONTACTED FOR INSTRUCTIONS.

5-503.2.5.  IF IT IS NECESSARY FOR ALL PERSONS TO EVACUATE
AN ALARMED FACILITY FOR ANY REASON, REGARDLESS OF HOW
BRIEFLY, THE ALARM SYSTEM AND THE COMBINATION LOCK SHALL
BE ACTIVATED BY THE LAST INDIVIDUAL DEPARTING THE AREA.
  IF RE-ENTRY TO THE AREA IS REQUIRED, THE PROCEDURES
FOR EARLY OPENING MUST BE FOLLOWED.

5-504.  EXTENDING THE HOURS OF A ZONE.   IF A ZONE MUST
REMAIN OPEN BEYOND THE SCHEDULED DUTY HOURS, A PERSON
WHOSE NAME IS ON THE AAAL MUST CALL AND TELL DET 1,
1100SPS, EXTENSION 78291, THAT THE ZONE WILL BE CLOSED
LATE.   THE CALL SHALL BE MADE AS SOON AS YOU KNOWN
SOMEONE MUST STAY LATE AND NOT UNTIL THE END OF THE
DAY.

5-504.1.  YOUR ZONE NUMBER, THE NEW CLOSING TIME DESIRED
(IN INTERVALS OF 15 MINUTES), PASSCARD NUMBER, AND THE
CODEWORD SHALL BE GIVEN TO THE COMPUTER OPERATOR.  
THE NEW SCHEDULE IS PLACED INTO THE COMPUTER.

5-504.2.  IF THE ZONE SHALL NOT BE CLOSED BY THE EXTENDED
TIME, DET 1, 1100SPS, SHALL BE CALLED AGAIN, FOLLOWING
THE SAME PROCEDURE.

5-504.3.  FAILURE TO CLOSE A ZONE BY THE SCHEDULED TIME
IS A PROCEDURAL VIOLATION.

5-505.  RESPONSE TO AN ALARM 

5-505.1.  WHEN AN ALARM IS SET OFF DURING "SECURITY
HOURS," THE HQ USAF SECURITY FORCE PERSONNEL RESPOND
TO INVESTIGATE THE CAUSE OF THE ALARM.

5-505.2.  IF DAMAGE TO THE ALARMED AREA IS DISCOVERED
OR IF THE ALARM DOES NOT RESET, THE COMPUTER OPERATOR
SHALL CALL EACH PERSON (IN ORDER LISTED ON THE AAAL)
UNTIL SOMEONE IS CONTACTED.

5-505.3.  THE PERSON CONTACTED EITHER MUST COME TO THE
ALARMED AREA IMMEDIATELY, OR CONTACT ANOTHER PERSON
(WHO IS ON THE AAAL) TO RESPOND SO EMERGENCY REPAIRS
MAY BE MADE AND ALARM PROTECTION RESTORED.   DET 1,
1100SPS, PERSONNEL GUARD THE ZONE UNTIL THE RESPONDING
PERSON ARRIVES.

5-506.  TESTING THE ALARM SYSTEM.   OCCUPANTS SHALL
CONDUCT A MONTHLY FUNCTIONAL PERFORMANCE TEST OF ALL
ALARM COMPONENTS AND RECORD THE RESULTS ON THE ALARM
TEST LOG MOUNTED ON THE CONTROL UNIT.   FAILURE TO PERFORM
THE MONTHLY TEST SHALL BE RECORDED AS A PROCEDURAL VIOLATION.
  A PERSON SHALL MONITOR THE METER ON THE CONTROL UNIT,
WHICH IS LOCATED NEAR THE ENTRANCE DOOR, FOR AN INDICATION
OF AN ALARM.   IT IS NOT NECESSARY TO ACTIVATE THE SYSTEM
TO ACCOMPLISH THIS TEST.   IT IS RECOMMENDED THAT THE
TESTS BE CONDUCTED IN THE MORNING SO MALFUNCTIONS DISCOVERED
DURING THE TEST MAY BE CORRECTED BEFORE CLOSE OF BUSINESS.
  THE FOLLOWING PROCEDURES SHALL BE FOLLOWED:

5-506.1.  EACH MOTION DETECTION SENSOR SHALL BE TESTED
BY WALKING THROUGH THE AREA AT THE RATE OF ONE STEP
PER SECOND FOR 4 SECONDS.

5-506.2.  DOORS SHALL BE TESTED BY OPENING THE DOOR
APPROXIMATELY 4 INCHES.

5-506.3.  THE ALARM TEST LOG, AF FORM 2530, SHALL BE
INITIALED, DATED, AND ANNOTATED WHETHER THE SYSTEM IS
OPERATIONAL.   SEE FIGURE 7, BELOW.   MALFUNCTIONS SHALL
BE REPORTED AS MAINTENANCE REQUESTS.   THE COMPLETED
FORMS SHALL BE FORWARDED TO PSD WITHIN 30 DAYS AT THE
END OF THE CALENDAR YEAR.

5-507.  ALARM SYSTEM INQUIRES AND MAINTENANCE REQUESTS.
  FROM 0730 TO 1630 HOURS, MONDAY THROUGH FRIDAY EXCEPT
HOLIDAYS, DET 1, 1100SPSSPOR, EXTENSION 78291, SHALL
BE CONTACTED FOR ALARM SYSTEM INQUIRIES AND MAINTENANCE
REQUESTS.   THE ALARM COMPUTER OPERATOR MAY BE CALLED
AT EXTENSION 78291 AT ANY TIME.   THE COMPUTER OPERATOR
COMPLETES A SERVICE RECORD TO REPORT ANY ALARM MALFUNCTION
FOR REPAIR.

5-508.  STOPPING INTRUSION DETECTION SYSTEM SERVICE.
  THE OSD COMPONENT SECURITY MANAGER SHAIL SUBMIT A
WRITTEN REQUEST TO PSD TO DISCONTINUE A ZONE.

5-509.  INSTRUCTIONS FOR COMPLETING AFHQ FORM 91.  
AFHQ FORM 91 IS FOR OFFICIAL USE ONLY WHEN FILLED IN.
  SEE FIGURE 8, BELOW.   THE INDIVIDUAL'S SOCIAL SECURITY
NUMBER AND HOME PHONE NUMEER ARE PROTECTED ACCORDING
TO THE PRIVACY ACT.   THESE INSTRUCTIONS PROVIDE GUIDANCE
FOR COMPLETING THE FORM:

5-509.1.  DATE PREPARED.   TYPE THE DATE THE FORM IS
PREPARED.

5-509.2.  PAGE OF PAGES.   COMPLETE THIS ITEM ON ALL
PAGES.

5-509.3.  PASSCARD NUMBER.   TYPE THE PASS CARD NUMBER
ASSIGNED TO EACH AUTHORIZED INDIVIDUAL.   IF AN INDIVIDUAL
IS BEING ADDED, LEAVE PASS CARD COLUMN BLANK.

5-509.4.  LAST NAME-FIRST NAME-MIDDLE INITIAL.   TYPE
THE LAST NAME, FIRST NAME, AND MIDDLE INITIAL OF THOSE
INDIVIDUALS AUTHORIZED TO MAKE TEMPORARY CHANGES TO
THE ZONE HOURS AND WHO MAY RESPOND TO THE ZONE IN CASE
OF AN EMERGENCY.   LIST THE NAMES IN THE ORDER THAT
DET 1, 1100SPS, IS TO CONTACT THE INDIVIDUALS.

5-509.5.  GRADE.   TYPE THE MILITARY RANK OR CIVILIAN
GRADE FOR EACH INDIVIDUAL.

5-509.6.  SOCIAL SECURITY NUMBER.   TYPE THE SOCIAL
SECURITY NUMBER FOR EACH INDIVIDUAL.

5-509.7.  DUTY PHONE.   TYPE THE OFFICE TELEPHONE NUMBER
FOR EACH INDIVIDUAL.

5-509.8.  HOME PHONE.   TYPE THE HOME TELEPHONE NUMBER
FOR EACH INDIVIDUAL TO INCLUDE THE AREA CODE IF THE
NUMBER IS A LONG DISTANCE CALL FROM THE PENTAGON.

5-509.9.  MAILING ADDRESS.   TYPE THE OSD COMPONENT.

5-509.10.  AUTHENTICATING OFFICIAL.   ENSURE THE OSD
COMPONENT SECURITY MANAGER OR ALTERNATE SIGN EACH PAGE
OF THE FORM.   THE SIGNATURES SHALL BE COMPARED WITH
THOSE ON DD FORM 577.

5-509.11.  ZONE NUMBER.   TYPE THE ASSIGNED ZONE NUMBER
USING ALL DASHES IN THE ZONE NUMBER.

5-509.12.  ROOM NUMBER.   TYPE THE ROOM NUMBER THAT
IS ON THE DOOR OF THE MAIN ENTRY TO THE ZONE.   IF THIS
ZONE IS AN INNER ROOM WITH A SUITE.   IF YOU CHANGE
ENTRY DOOR NUMBERS, CHANGE THE AAAL.

5-509.13.  PHONE NUMBER.   TYPE THE TELEPHONE NUMBER
OF THE SECURITY MANAGER.

5-509.14.  CODEWORD.   TYPE ONE CODEWORD THAT IS NOT
MORE THAN TWELVE LETTERS IN LENGTH.   CHANGE THIS WORD
EITHER WHEN A PERSON'S NAME IS DELETED FROM THE LIST
OR ANNUALLY, WHICHEVER COMES FIRST.   COMPLETE THIS
ITEM ON EACH PAGE OF THE AAAL.

5-509.15.  DUTY HOURS.   INDICATE THE PERIOD WHEN THE
ZONE SHALL BE OPENED AND SECURED ON NORMAL DUTY DAYS
(MONDAY THROUGH FRIDAY).   MAXIMALLY TO ACTUAL HOURS
WHEN DUTY IS PERFORMED IN THE ZONE TO ELIMINATE IRREGULAR
OPENINGS AND CLOSINGS AND TO PREVENT PROCEDURAL VIOLATIONS.
  IF THE ZONE IS NOT OPENED ON SATURDAYS, SUNDAYS, OR
HOLIDAYS, LEAVE THESE LINES BLANK.

5-510.  PROCEDURAL VIOLATIONS.   DET 1, 1100SPS SHALL
INFORM THE PSD OF ANY PROCEDURAL VIOLATIONS.   WHEN
A ZONE OBTAINS FIVE VIOLATIONS DURING THE CALENDAR YEAR,
THE DIRECTOR, PSD, SHALL INITIATE AN INVESTIGATION.
  THE OSD COMPONENT SECURITY MANAGER SHALL:

5-510.1.  CONDUCT AN INQUIRY INTO THE CIRCUMSTANCES
OF EACH OF THE FIVE VIOLATIONS.

5-510.2.  SUBMIT A WRITTEN REPORT OF THE INQUIRY TO
PSD WITHIN 20 DAYS OF THE DATE OF NOTIFICAITON.

5-510.3.  IMPOSE CORRECTIVE ACTIONS TO PREVENT ADDITIONAL
VIOLATIONS.

 FIGURE 6.  DD Form 577, "Signature Card"

 FIGURE 7.  Alarm System Test Record

 FIGURE 8.  AFHQ Form 91, "Alarmed Area Access List"

C5.6.  Section 6.   SECURITY OF CLASSIFIED VIDEO TAPE


5-600.  POLICY.   CLASSIFIED VIDEO TAPE SHALL BE AFFORDED
THE SAME MEASURES OF PROTECTION FROM UNAUTHORIZED DISCLOSURE
AS REQUIRED FOR OTHER MEDIA CONTAINING CLASSIFIED INFORMATION
OF THE SAME LEVEL.

5-601.  PRODUCTION.   CLASSIFIED VIDEO TAPES SHALL BE
PRODUCED ONLY IN AREAS THAT HAVE BEEN APPROVED FOR THE
HANDLING AND DISCUSSION OF AT LEAST THE LEVEL OF CLASSIFIED
INFORMATION INVOLVED IN THE PRODUCTION.   AS AN EXCEPTION
TO THIS, TOTALLY UNCLASSIFIED SEGMENTS OF A CLASSIFIED
VIDEO TAPE MAY BE FILMED OUTSIDE OF A SECURE AREA. 
 EDITING AND COMBINING SUCH SEGMENTS WITH CLASSIFIED
SEGMENTS OF THE PRODUCTION SHALL BE DONE IN A SECURE
AREA.

5-601.1.  ALL PERSONNEL ASSOCIATED WITH PRODUCING CLASSIFIED
SEGMENTS OF A CLASSIFIED VIDEO TAPE INCLUDING CAST,
CREW, TECHNICAL ADVISORS, OBSERVERS, AND ALL OTHERS
MUST BE CLEARED FOR ACCESS TO CLASSIFIED INFORMATION
OF AT LEAST THE LEVEL INVOLVED.

5-601.2.  OUTTAKES, FILM CUTTINGS, AND OTHER SIMILAR
TEMPORARY MATERIALS ASSOCIATED WITH THE PRODUCTION OF
A CLASSIFIED VIDEO TAPE SHALL BE PROTECTED UNTIL DESTROYED
AS CLASSIFIED WASTE.

5-601.3.  SHOOTING SCRIPTS AND OTHER PRODUCTION PAPERS
CONTAINING CLASSIFIED INFORMATION SHALL BE MARKED, SAFEGUARDED,
AND DESTROYED IN ACCORDANCE WITH THIS INSTRUCTION.

5-602.  USE.   CLASSIFIED VIDEO TAPES SHALL BE PLAYED
IN AREAS AND UNDER CONDITIONS THAT PROVIDE A LEVEL OF
SECURITY AT LEAST EQUAL TO THE CLASSIFICATION OF THE
VIDEO TAPE.

5-602.1.  THE INDIVIDUAL(S) PRESENTING AND/OR OPERATING
THE VIDEO EQUIPMENT ARE RESPONSIBLE FOR ENSURING THAT
ALL PERSONNEL WITHIN VIEWING OR HEARING RANGE OF THE
PROGRAM IN PROGRESS HAVE THE PROPER SECURITY CLEARANCE
AND NEED TO KNOW.   IF ADDITIONAL INDIVIDUALS COME WITHIN
HEARING OR VIEWING RANGE, THE PROGRAM SHALL BE TURNED
OFF UNTIL THE CLEARANCE AND NEED TO KNOW OF THE ADDITIONAL
INDIVIDUALS HAVE BEEN ESTABLISHED OR UNTIL THEY HAVE
LEFT THE AREA.

5-602.2.  TELEPHONES SHALL NOT BE USED DURING THE PLAYBACK
OF A CLASSIFIED VIDEO TAPE.   IF THE TELEPHONE IS USED,
THE PLAYBACK SHALL BE STOPPED (I.E., DO NOT JUST TURN
THE VOLUME DOWN).

5-603.  SECURITY OF EQUIPMENT.   VIDEO RECORDING OR
PLAYBACK EQUIPMENT, INCLUDING PURCHASED, LOANED, OR
OTHERWISE ACQUIRED EQUIPMENT SHALL NOT BE USED FOR RECORDING
OR PLAYING BACK CLASSIFIED VIDEO TAPE UNLESS PSD HAS
CLEARED THAT PARTICULAR EQUIPMENT AS MEETING NACSIM
5100A CRITERIA.

5-604.  MARKINGS 

5-604.1.  CLASSIFIED VIDEO TAPES SHALL BE MARKED AS
PRESCRIBED BY PARAGRAPH 4-302.3., ABOVE, TO INCLUDE
ANY NECESSARY CAVEATS OR DISSEMINATION CONTROL MARKINGS.

5-604.2.  VIDEO TAPE REELS, VIDEOCASSETTES, AND VIDEOCASSETTE
BOXES SHALL BE MARKED TO SHOW THE TITLE, CLASSIFICATION,
CAVEATS, AND CONTROL MARKINGS APPLICABLE TO THE VIDEO
TAPE THEY CONTAIN.   FOR TOP SECRET INFORMATION "COPY
OF COPIES" SHALL BE SHOWN.   THE VIDEOTAPE REEL OR VIDEOCASSETTE
SHALL BEAR THE DOWNGRADING (IF APPLICABLE) MARKINGS.

5-605.  ERASURE AND RECORDING OVER 

5-605.1.  ERASURE OF A VIDEO TAPE SHALL BE ACCOMPLISHED
BY RUNNING THE TAPE THROUGH A RECORDING DEVICE WITH
THE DEVICE IN THE RECORD MODE AND WITH THE VIDEO AND
AUDIO INPUTS DISCONNECTED.   THE ENTIRE LENGTH OF THE
VIDEO TAPE SHALL BE RUN THROUGH, REGARDLESS OF ANY ASSUMPTION
THAT ONLY A PORTION OF THE TAPE CONTAINS CLASSIFIED
INFORMATION.   ERASING OR RECORDING OVER A VIDEO TAPE
DOES NOT PROVIDE ENSURANCE THAT PREVIOUSLY RECORDED
INFORMATION IS NOT TECHNICALLY RECOVERABLE.   ERASED
TAPES SHALL CONTINUE TO BE PROTECTED IN THE MANNER REQUIRED
FOR THE CLASSIFICATION LEVEL OF PREVIOUSLY RECORDED
INFORMATION UNTIL THEY ARE DESTROYED IN ACCORDANCE WITH
SUBSECTION 5-607., BELOW.

5-605.1.1.  VIDEOTAPE REELS, VIDEO CASSETTES AND REEL
AND/OR CASSETTE BOXES CONTAINING ERASED TAPE SHALL BE
MARKED AS FOLLOWS:   "ERASED ON (DATE).   CONTAINS PREVIOUSLY
RECORDED (CLASSIFICATION AND/OR CAVEAT CONTROL MARKING)
MATERIAL."

5-605.1.2.  FOR ACCOUNTABLE MATERIAL, LOGS OR REGISTERS
SHALL BE ANNOTATED "ERASED ON (DATE)."   THESE RECORDS
SHALL BE MAINTAINED AS ACTIVE RECORDS UNTIL THE TAPE
IS RECORDED OVER, TRANSFERRED OR DESTROYED.   AT THE
TIME OF SUCH AN EVENT, THE RECORD OF ACCOUNTABILITY
SHALL BE ANNOTATED WITH THE CHANGE STATUS OF THE TAPE
AND PLACED IN THE INACTIVE FILE.

5-605.2.  ERASED VIDEO TAPES MAY BE USED FOR THE RECORDING
OF NEW MATERIAL OF THE SAME OR HIGHER CLASSIFICATION
AS THE ERASED MATERIAL.   THE "ERASED ON (DATE)....."
MARKING SHALL BE REMOVED AND THE REEL, CASSETTE, AND
BOX MARKED IN ACCORDANCE WITH PARAGRAPH 5-604., ABOVE.

5-606.  DECLASSIFICATION.   VIDEO TAPES MAY BE REGRADED
OR DECLASSIFIED BASED UPON A LOSS OF SENSITIVITY OF
THE INFORMATION, AS PROVIDED FOR IN CHAPTER 3 OF THIS
INSTRUCTION.   IF A VIDEO TAPE IS REGRADED OR DECLASSIFIED,
THE NOTIFICATION ACTIONS REQUIRED BY SUBSECTION 3-600.
AND THE REMARKING ACTIONS REQUIRED BY SUBSECTION 4-400.
  SHALL BE TAKEN.   IN DETERMINING WHETHER A PARTICULAR
VIDEO TAPE MAY BE DECLASSIFIED, CONSIDERATION MUST BE
GIVEN TO PREVIOUSLY RECORDED INFORMATION (IF ANY) AND
TO THE INFORMATION CURRENTLY RECORDED ON THE TAPE.

5-607.  DESTRUCTION.   VIDEO TAPE HAS A USABLE LIFE
OF APPROXIMATELY 2000 TOTAL RECORDING AND/OR PLAYBACK
RUNS.   TO KEEP COSTS DOWN, PHYSICAL DESTRUCTION OF
VIDEO TAPES SHOULD OCCUR ONLY WHEN THE TAPE IS UNSERVICEABLE
DUE TO DAMAGE, WEAR, OR DUE TO EMERGENCY DESTRUCTION
SITUATIONS.   DESTRUCTION OF DAMAGED TAPES AND OUTTAKES
SHALL BE ACCOMPLISHED BY REMOVING THE VIDEO TAPE FROM
THE REEL OR CASSETTE AND PLACING THE TAPE INTO A BURN
BAG (VIDEO TAPE SHOULD BE MIXED WITH OTHER CLASSIFIED
WASTE).   THE BURN BAG IS DISPOSED WITH BURN BAGS CONTAINING
CONVENTIONAL CLASSIFIED WASTE.   ONCE THE REEL OR CASSETTE
IS DIVESTED OF ALL LABELS AND/OR MARKINGS INDICATION
PREVIOUS USE OR CLASSIFICATION THEY MAY BE DISPOSED
OF AS UNCLASSIFIED TRASH.

C6.  CHAPTER 6

COMPROMISE OF CLASSIFIED INFORMATION

6-100.  Policy.   Compromise of classified information
presents a threat to the national security.   Once a
compromise is known to have occurred, the seriousness
of damage to U.S. interests must be determined and appropriate
measures taken to negate or minimize the adverse effect
of such compromise.   When possible, action also should
be taken to regain custody of the documents or material
that were compromised.   In all cases, however, appropriate
action must be taken to identify the source and reason
for the compromise and remedial action taken to ensure
further compromises do not occur.   The provisions of
DoD Instruction 5240.4 and DoD Directive 5210.50 (references
(oo) and (pp)) apply to compromises covered by this
Chapter.

6-101.  Cryptographic and Sensitive Compartmented Information


6-101.1.  The procedures for handling compromises of
cryptographic information are set forth in NACSI 4006
(reference (kkk)) and implementing instructions.

6-101.2.  The procedures for handling compromises of
SCI information are set forth in DoD TS-5105.21-M-2
(reference (ggg)) and DoD C-5105.21-M-1 (reference (hhh)).

6-101.3.  REPORTS OF SUSPECTED OR COMPROMISED CRYPTOGRAPHIC
AND SENSITIVE COMPARTMENTED INFORMATION SHALL BE COORDINATED
WITH THE DIRECTOR, PSD.

6-102.  Responsibility of Discoverer 

6-102.1.  Any person who has knowledge of the loss or
possible compromise of classified information shall
immediately report such fact to the security manager
of the person's activity (see subsection 13-304.) or
to the commanding officer or head of the activity in
the security manager's absence.

6-102.2.  Any person who discovers classified information
out of proper control shall take custody of such information
and safeguard it in an appropriate manner, and shall
notify immediately an appropriate security authority.

6-102.3.  HEADS OF OSD COMPONENTS SHALL REPORT TO PSD,
WHS, COMPROMISES OR VIOLATIONS DISCOVERED WITHIN THEIR
OFFICES AND IN THE MEDIA THAT INVOLVE CLASSIFIED INFORMATION
OR PROJECTS FOR WHICH THEY HAVE PRIMARY RESPONSIBILITY.
  FAILURE TO REPORT THE POSSIBLE COMPROMISE OF VIOLATION
SHALL BE CONSIDERED A VIOLATION OF SECURITY.

6-102.4.  THE DISCOVERER OF AN ACTUAL OR POSSIBLE COMPROMISE
OR VIOLATION SHALL:

6-102.4.1.  REPORT THE INCIDENT IMMEDIATELY TO THE SECURITY
MANAGER OF THE OSD COMPONENT CONCERNED OR TO PSD.

6-102.4.2.  PLACE HIS OR HER INITIALS, THE DATE, AND
THE TIME OF DISCOVERY ON THE PAGE OF THE UNSECURED CLASSIFIED
MATERIAL AND SUBMIT IT TO PSD.

6-103.  Preliminary Inquiry.   The immediate commander,
supervisor, security manager, or other authority shall
initiate a preliminary inquiry to determine the circumstances
surrounding the loss or possible compromise of classified
information.   The preliminary inquiry shall establish
one of the following:

6-103.1.  That a loss or compromise of classified information
did not occur;

6-103.2.  That a loss or compromise of classified information
did occur but the compromise reasonably could not be
expected to cause damage to the national security. 
 If, in such instances, the official finds no indication
of significant security weakness, the report of preliminary
inquiry will be sufficient to resolve the incident and,
when appropriate, support the administrative sanctions
under subsection 14-101.; or

6-103.3.  That the loss or compromise of classified
information did occur and that the compromise reasonably
could be expected to cause damage to the national security
or that the probability of damage to the national security
cannot be discounted.   Upon this determination, the
responsible official shall:

6-103.3.1.  Report the circumstances of the compromise
to an appropriate authority as specified in DoD Component
instructions;

6-103.3.2.  If the responsible official is the originator,
take the action prescribed in subsection 6-106.; and

6-103.3.3.  If the responsible official is not the originator,
notify the originator of the known details of the compromise,
including identification of the classified information.
  If the originator is unknown, notification will be
sent to the office specified in DoD Component instructions.

6-103.4.  THE DIRECTOR, PSD, SHALL:

6-103.4.1.  CONDUCT A PRELIMINARY INQUIRY TO DETERMINE
WHETHER A COMPROMISE OR VIOLATION DID OCCUR.

6-103.4.2.  DIRECT THAT AN INVESTIGATION OF A COMPROMISE
OR VIOLATION BE CONDUCTED.

6-104.  Investigation.   If it is determined that further
investigation is warranted, such investigation will
include the following:

6-104.1.  Identification of the source, date, and circumstances
of the compromise.

6-104.2.  Complete description and classification of
each item of classified information compromised;

6-104.3.  A thorough search for the classified information;

6-104.4.  Identification of any person or procedure
responsible for the compromise.   Any person so identified
shall be apprised of the nature and circumstances of
the compromise and be provided an opportunity to reply
to the violation charged.   If such person does not
choose to make a statement, this fact shall be included
in the report of investigation;

6-104.5.  An analysis and statement of the known or
probable damage to the national security that has resulted
or may result (see subsection 2-210.), and the cause
of the loss or compromise; or a statement that compromise
did not occur or that there is minimal risk of damage
to the national security;

6-104.6.  An assessment of the possible advantage to
foreign powers resulting from the compromise; and

6-104.7.  A compilation of the data in paragraphs 6-104.1.
through 6-104.6., above, in a report to the authority
ordering the investigation to include an assessment
of appropriate corrective, administrative, disciplinary,
or legal actions.   (Also see subsection 14-104.).

6-104.8.  THE DIRECTOR, PSD, SHALL INITIATE AN INVESTIGATION
BY TRANSMITTING A MEMORANDUM AND ATTACHED VIOLATION
REPORT TO THE SECURITY MANAGER OF THE OSD COMPONENT
CONCERNED.

6-104.9.  HEADS OF OSD COMPONENTS SHALL:

6-104.9.1.  APPOINT AN INVESTIGATING OFFICER TO CONDUCT
AN INVESTIGATION INTO THE CIRCUMSTANCES OF THE VIOLATION.

6-104.9.2.  SUBMIT THE COMPLETED REPORT OF INVESTIGATION
TO PSD WITHIN 20 DAYS OF THE DATE OF THE MEMORANDUM
STARTING THE INVESTIGATION.

6-104.9.3.  IMPOSE ADMINISTRATIVE SANCTIONS AS PRESCRIBED
IN THE REPORT OF INVESTIGATION.

6-104.9.4.  NOTIFY THE ORIGINATOR OF THE CLASSIFIED
MATERIAL THAT IT WAS COMPROMISED OR VIOLATED.

6-104.10.  THE INVESTIGATING OFFICER SHALL:

6-104.10.1.  FIX RESPONSIBILITY FOR THE COMPROMISE OR
VIOLATION AND IDENTIFY THE RESPONSIBLE PERSON OR PERSONS.
  RESPONSIBILITY FOR A COMPROMISE OR A VIOLATION ALWAYS
SHALL BE PLACED WITH A PERSON RATHER THAN WITH A POSITION
OR OFFICE.   WHEN RESPONSIBILITY MAY NOT BE PLACED WITH
A SPECIFIC PERSON, THE IMMEDIATE SUPERVISOR OF THE OFFICE
WHERE THE INCIDENT OCCURRED SHALL BE HELD RESPONSIBLE
FOR THE VIOLATION.

6-104.10.2.  OBTAIN A STATEMENT FROM THE PERSON OR PERSONS
RESPONSIBLE FOR THE COMPROMISE OR VIOLATION.   IF THE
PERSON CHOOSES NOT TO MAKE A STATEMENT, THIS FACT SHALL
BE INCLUDED IN THE INVESTIGATION REPORT.

6-104.10.3.  RECOMMEND THE APPLICABLE ADMINISTRATIVE
SANCTION AS PRESCRIBED IN CHAPTER 14, BELOW.

6-104.10.4.  IF THE ORIGINATOR, EVALUATE THE COMPROMISED
OR VIOLATED INFORMATION AND DETERMINE WHETHER THE SPECIFIC
INFORMATION, OR PARTS THEREOF, SHALL BE MODIFIED, DECLASSIFIED,
OR DOWNGRADED.   IF NOT THE ORIGINATOR, THE INVESTIGATING
OFFICER SHALL OBTAIN A WRITTEN DETERMINATION OF CLASSIFICATION
FROM THE ORIGINATOR.

6-104.10.5.  PREPARE A REPORT OF INVESTIGATION USING
THE FORMAT IN FIGURE 9, BELOW.

6-105.  Responsibility of Authority Ordering Investigation


6-105.1.  The report of investigation shall be reviewed
to ensure compliance with this Regulation and instructions
issued by DoD Components.

   

THE DIRECTOR, PSD, SHALL:

6-105.1.1.  REVIEW THE REPORT OF INVESTIGATION TO ENSURE
COMPLIANCE WITH THIS INSTRUCTION AND SUFFICIENCY OF
CORRECTIVE ACTION AND ADMINISTRATIVE SANCTIONS.

6-105.1.2.  MAINTAIN A RECORD OF COMPROMISES OR VIOLATIONS
BY THE PERSON AND OSD COMPONENT CONCERNED, CONSISTING
OF THE TYPE, CLASSIFICATION, SUMMARY OF KNOWN FACTS
AND CIRCUMSTANCES, IDENTIFICATION OF PERSON OR PERSONS
INVOLVED, AND SANCTION ADMINISTERED.   THIS RECORD SHALL
BE MAINTAINED FOR 2 YEARS AFTER REASSIGNMENT OR TERMINATION
OF THE VIOLATOR'S EMPLOYMENT.

6-105.1.3.  MAINTAIN THE REPORTS OF INVESTIGATION OF
A COMPROMISE OR VIOLATION FOR 2 YEARS FROM THE DATE
OF THE REPORT.

6-105.2.  The recommendations contained in the report
of investigation shall be reviewed to determine sufficiency
of remedial, administrative, disciplinary, or legal
action proposed and, if adequate, the report of investigation
shall be forwarded with recommendations through supervisory
channels.   See subsections 14-101. and 14-102.

6-105.3.  Whenever an action is contemplated against
any person believed responsible for the compromise of
classified information, damage assessments shall be
coordinated with the legal counsel of the DoD Component
where the individual responsible is assigned or employed.
  Whenever a violation of criminal law appears to have
occurred and a criminal prosecution is contemplated,
the DoD Component responsible for the damage assessment
shall apprise the General Counsel, Department of Defense.
  See subsection 14-104.

   

THE DIRECTOR, PSD, IN COORDINATION WITH THE CHIEF, PERSONNEL
SECURITY DIVISION, DIRECTORATE FOR PERSONNEL AND SECURITY,
WHS, SHALL INFORM THE DIRECTOR OF INFORMATION SECURITY,
ODUSD(P), OF A COMPROMISE OR VIOLATION THAT MEETS THE
CRITERIA CONTAINED IN PARAGRAPHS 14-104.1. THROUGH 14-104.3.,
BELOW.

6-106.  Responsibility of Originator.   The originator
or an official higher in the originator's supervisory
chain shall, upon receipt of notification of loss or
probable compromise of classified information, take
action as prescribed in subsection 2-210.

6-107.  System of Control of Damage Assessments.   Each
DoD Component shall establish a system of controls and
internal procedures to ensure that damage assessments
are conducted when required and that records are maintained
in a manner that facilitates their retrieval and use
within the Component.

6-108.  Compromises Involving More Than One Agency 

6-108.1.  Whenever a compromise involves the classified
information or interests of more than one DoD Component
or other Agency, each such activity undertaking a damage
assessment shall advise the others of the circumstances
and findings that affect their information and interests.
  Whenever a damage assessment incorporating the product
of two or more DoD Components or other Agencies is needed,
the affected activities shall agree upon the assignment
of responsibility for the assessment.

6-108.2.  Whenever a compromise of U.S. classified information
is the result of actions taken by foreign nationals,
by foreign government officials, or by U.S. nationals
employed by international organizations, the activity
performing the damage assessment shall ensure, through
appropriate intergovernmental liaison channels, that
information pertinent to the assessment is obtained.
  Whenever more than one activity is responsible for
the assessment, those activities shall coordinate the
request prior to transmittal through appropriate channels.

6-109.  Espionage and Deliberate Compromise.   Cases
of espionage and deliberate unauthorized disclosure
of classified information to the public shall be reported
in accordance with DoD Instruction 5240.4 and DoD Directive
5210.50 (references (oo) and (pp)) and implementing
issuances.

   

THE DIRECTOR, PSD, SHALL IN COORDINATION WITH CHIEF,
PERSONNEL SECURITY DIVISION, DIRECTORATE FOR PERSONNEL
AND SECURITY, WHS, SUBMIT A REPORT IN ACCORDANCE WITH
DOD DIRECTIVE 5210.50 (REFERENCE (PP)) AND DOD INSTRUCTION
5240.4 (REFERENCE (OO)) WHEN THE COMPROMISE OR VIOLATION
CONSTITUTES A VIOLATION OF THE CRIMINAL STATUTES OR
FEDERAL CRIMINAL LAWS.

6-110.  Unauthorized Absentees.   When an individual
who has had access to classified information is on unauthorized
absence, an inquiry as appropriate under the circumstances,
to include consideration of the length of absence and
the degree of sensitivity of the classified information
involved, shall be conducted to detect if there are
any indications of activities, behavior, or associations
that may be inimical to the interest of national security.
  When such indications are detected, a report shall
be made to the DoD Component counterintelligence organization.

6-111.  UNAUTHORIZED DISCLOSURE OF CLASSIFIED INFORMATION
TO THE PUBLIC 

6-111.1.  PERSONNEL SHALL REPORT INCIDENTS OF UNAUTHORIZED
APPEARANCES OF CLASSIFIED INFORMATION IN THE PUBLIC
MEDIA AND UNAUTHORIZED DISCLOSURES OF CLASSIFIED INFORMATION
TO A PERSON LIKELY TO RELEASE THE CLASSIFIED INFORMATION
TO THE PUBLIC, WHETHER OR NOT THE INFORMATION IS ACTUALLY
DISCLOSED TO THE PUBLIC, TO PSD.   THIS APPLIES TO SUCH
SUSPECTED INCIDENTS.

6-111.2.  THE DIRECTOR, PSD, SHALL:

6-111.2.1.  EVALUATE REPORTS OF INCIDENTS IN CONSULTATION
WITH THE ASD(PA) AND OFFICIALS HAVING PRIMARY SECURITY
CLASSIFICATION JURISDICTION OVER THE INFORMATION CONCERNED;

6-111.2.2.  IN CONSULTATION WITH CHIEF, PERSONNEL SECURITY
DIVISION, DIRECTORATE FOR PERSONNEL AND SECURITY, DETERMINE
WHETHER AN INVESTIGATION OF THE INCIDENT WOULD BE IN
THE INTEREST OF NATIONAL SECURITY; AND

6-111.2.3.  REFER THE INCIDENT, WITH A RECOMMEDED COURSE
OF ACTION, TO THE DIRECTOR, WHS.

 FIGURE 9.  Report of Investigation Format

C7.  CHAPTER 7

ACCESS, DISSEMINATION, AND ACCOUNTABILITY

C7.1.  Section 1.   ACCESS 

7-100.  Policy 

7-100.1.  Except as otherwise provided for in subsection
7-101., no person may have access to classified information
unless that person has been determined to be trustworthy
and unless access is essential to the accomplishment
of lawful and authorized Government purposes, that is,
the person has the appropriate security clearance and
a need-to-know.   Further, cleared personnel may not
have access until they have been given an initial security
briefing (see subsection 10-102.).   Procedures shall
be established by the head of each DoD Component to
prevent unnecessary access to classified information.
  There shall be a demonstrable need for access to classified
information before a request for a personnel security
clearance can be initiated.   The number of people cleared
and granted access to classified information shall be
maintained at the minimum number that is consistent
with operational requirements and needs.   No one has
a right to have access to classified information solely
by virtue of rank or position.   The final responsibility
for determining whether an individual's official duties
require possession of or access to any element or item
of classified information, and whether the individual
has been granted the appropriate security clearance
by proper authority, rests upon the individual who has
authorized possession, knowledge, or control of the
information and not upon the prospective recipient.
  These principles are equally applicable if the prospective
recipient is a DoD Component, including commands and
activities, other Federal Agencies, DoD contractors,
foreign governments, and others.

7-100.2.  Because of the extreme importance to the national
security of Top Secret information and information controlled
within approved Special Access Programs, employees shall
not be permitted to work alone in areas where such information
is in use or stored and accessible by those employees.
  This general policy is an extra safeguarding measure
for the nation's most vital classified information and
it is not intended to cast doubt on the integrity of
DoD employees.   The policy does not apply in those
situations where one employee with access is left alone
for brief periods during normal duty hours.   When compelling
operational requirements indicate the need, DoD Component
heads may waive this requirement in specific, limited
cases.   This waiver authority may be delegated to the
senior official (subsections 13-301. and 13-302.) of
the DoD Component who may redelegate the authority but
only if so authorized by the Head of the DoD Component.
  (Any waiver should include provisions for periodically
ensuring the health and welfare of individuals left
alone in vaults or secure areas).

7-101.  Access by Persons Outside the Executive Branch.
  Classified information may be made available to individuals
or Agencies outside the Executive Branch provided that
such information is necessary for performance of a function
from which the Government will derive a benefit or advantage,
and that such release is not prohibited by the originating
Department or Agency.   Heads of DoD Components shall
designate appropriate officials to determine, before
the release of classified information, the propriety
of such action in the interest of national security
and assurance of the recipient's trustworthiness and
need-to-know.

7-101.1.  Congress.   Access to classified information
or material by Congress, its committees, members, and
staff representatives shall be in accordance with DoD
Directive 5400.4 (reference (rr)).   Any DoD employee
testifying before a congressional committee in executive
session in relation to a classified matter shall obtain
the assurance of the committee that individuals present
have a security clearance commensurate with the highest
classification of the information that may be discussed.
  Members of Congress, by virtue of their elected positions,
are not investigated or cleared by the Department of
Defense.

7-101.1.1.  NATIONAL SECURITY INFORMATION REQUESTED
BY CONGRESSIONAL COMMITTEE OR A PROFESSIONAL STAFF MEMBER
MAY BE FURNISHED WHEN NEEDED IN THE PERFORMANCE OF OFFICIAL
COMMITTEE FUNCTIONS.   ALL REQUESTS FOR MATERIAL FROM
OSD COMPONENTS SHALL BE MADE THROUGH THE OFFICE OF THE
ASSISTANT SECRETARY OF DEFENSE, LEGISLATIVE AFFAIRS.
  CLASSIFIED INFORMATION ORIGINATED IN AN AGENCY OTHER
THAN OSD, BUT IN CUSTODY OF OSD STAFF, SHALL NOT BE
RELEASED WITHOUT THE CONSENT OF THE ORIGINATING AGENCY.
  ALL MATERIAL FURNISHED MUST BEAR CORRECT CLASSIFICATION;
I.E., DOWNGRADING OR DECLASSIFICATION MARKINGS.   RECEIPTS
SHALL BE OBTAINED.

7-101.1.2.  A PERSON PRESENTING ORAL TESTIMONY SHALL
ADVISE THE CONGRESSIONAL COMMITTEE OF THE CLASSIFICATION
AND THE NEED FOR PROTECTING THE NATIONAL SECURITY INFORMATION.
  IF DEFENSE INFORMATION REQUESTED BY THE COMMITTEE
IS UNKNOWN TO A WITNESS AND THE WITNESS MUST FURNISH
IT LATER IN WRITING, THE MATERIAL MUST BEAR THE CORRECT
CLASSIFICATION AND DECLASSIFICATION MARKINGS.   RECEIPTS
SHALL BE OBTAINED.

7-101.1.3.  CLASSIFIED INFORMATION REQUESTED BY CONGRESSIONAL
COMMITTEE THROUGH A MEMBER OF THE COMMITTEE OR PROFESSIONAL
STAFF MEMBER MAY BE FURNISHED WHEN NEEDED IN THE PERFORMANCE
OF OFFICIAL COMMITTEE FUNCTIONS.   CLASSIFIED SECURITY
INFORMATION ORIGINATED IN AN AGENCY OTHER THAN OSD,
BUT IN THE CUSTODY OF THE OSD, SHALL NOT BE RELEASED
WITHOUT THE CONSENT OF THE ORIGINATING AGENCY.   ALL
MATERIAL FURNISHED MUST BEAR CORRECT CLASSIFICATION
AND DECLASSIFICATION MARKINGS.   RECEIPTS SHALL BE OBTAINED.

7-101.2.  Government Printing Office (GPO).   Documents
and material of all classifications may be processed
by the GPO, which protects the information in accordance
with the DoD/GPO Security Agreement of February 20,
1981.

7-101.3.  Representatives of the General Accounting
Office (GAO).   Representatives of the GAO may be granted
access to classified information originated by and in
possession of the Department of Defense when such information
is relevant to the performance of the statutory responsibilities
of that office, as set forth in DoD Directive 7650.1
(reference (ss)).   Officials of the GAO, as designated
in Appendix 2, are authorized to certify security clearances,
and the basis therefor.   Certifications will be made
by these officials pursuant to arrangements with the
DoD Component concerned.   Personal recognition or presentation
of official GAO credential cards are acceptable for
identification purposes.

7-101.4.  Industrial, Educational, and Commercial Entities


7-101.4.1.  Bidders, contractors, grantees, educational,
scientific or industrial organizations may have access
to classified information only when such access is essential
to a function that is necessary in the interest of the
national security, and the recipients are cleared in
accordance with DoD 5220.22-R (reference (j)).

7-101.4.2.  Contractor employees whose duties do not
require access to classified information are not eligible
for personnel security clearance and cannot be investigated
under the DISP.   In exceptional situations, when a
military command is vulnerable to sabotage and its mission
is of critical importance to national security, National
Agency Checks may be conducted on such individuals with
the approval of the DUSD(P).

7-101.5.  Historical Researchers.   Persons outside
the Executive Branch who are engaged in historical research
projects may be authorized access to classified information
provided that an authorized official within the DoD
Component with classification jurisdiction over the
information:

7-101.5.1.  Makes a written determination that such
access is clearly consistent with the interests of national
security in view of the intended use of the material
to which access is granted by certifying that the requester
has been found to be trustworthy pursuant to paragraph
7-100.1.;

7-101.5.2.  Limits such access to specific categories
of information over which that DoD Component has classification
jurisdiction and to any other category of information
for which the researcher obtains the written consent
of a DoD Component or non-DoD Department or Agency that
has classification jurisdiction over information contained
in or revealed by documents within the scope of the
proposed historical research;

7-101.5.3.  Maintains custody of the classified material
at a DoD installation or activity or authorizes access
to documents in the custody of the NARS;

7-101.5.4.  Obtains the researcher's agreement to safeguard
the information and to submit any notes and manuscript
for review by all DoD Components or non-DoD Departments
or Agencies with classification jurisdiction for a determination
that no classified information is contained therein
by execution of a statement entitled, "Conditions Governing
Access to Official Records for Historical Research Purposes";
and

7-101.5.5.  Issues an authorization for access valid
for not more than 2 years from the date of issuance
that may be renewed under regulations of the issuing
DoD Component.

7-101.5.6.  REQUESTS FOR ACCESS TO OSD CLASSIFIED INFORMATION
BY HISTORICAL RESEARCHERS SHALL BE SUBMITTED TO THE
RECORDS MANAGEMENT DIVISION, DIRECTORATE FOR CORRESPONDENCE
AND DIRECTIVES, WHS.   SUCH REQUESTS SHALL BE APPROVED
OR DISAPPROVED BY THE DEPUTY ASSISTANT SECRETARY OF
DEFENSE (ADMINISTRATION) WHO SHALL MAKE THE DETERMINATION
WHETHER SUCH ACCESS CLEARLY IS CONSISTENT WITH THE INTEREST
OF NATIONAL SECURITY.   OASD(PA) SHALL

ACCOMPLISH THE FINAL SECURITY REVIEW OF ANY MANUSCRIPT
PROPOSED FOR PUBLICATION.

7-101.6.  Former Presidential Appointees.   Persons
who previously occupied policy making positions to which
they were appointed by the President may not remove
classified information upon departure from office as
all such material must remain under the security control
of the U.S. Goverriment.   Such persons may be authorized
access to classified information that they originated,
received, reviewed, signed, or that was addressed to
them while serving as such an appointee, provided that
an authorized official within the DoD Component with
classification jurisdiction for such information:

7-101.6.1.  Makes a written determination that such
access is clearly consistent with the interests of national
security in view of the intended use of the material
to which access is granted and by certifying that the
requester has been found to be trustworthy pursuant
to paragraph 7-100.1.;

7-101.6.2.  Limits such access to specific categories
of information over which that DoD Component has classification
jurisdiction and to any other category of information
for which the former appointee obtains the written consent
of a DoD Component or non-DoD Department or Agency that
has classification jurisdiction over information contained
in or revealed by documents with the scope of the proposed
access;

7-101.6.3.  Retains custody of the classified material
at a DoD installation or activity or authorizes access
to documents in the custody of the National Archives
and Records Service; and

7-101.6.4.  Obtains the former presidential appointee's
agreement to safeguard the information and to submit
any notes and manuscript for review by all DoD Components
or non-DoD Departments or Agencies with classification
jurisdiction for a determination that no classified
information is contained therein.

7-101.7.  Judicial Proceedings.   DoD Directive 5405.2
(reference (nnn)) governs the release of classified
information in litigation.

7-102.  Access by Foreign Nationals, Foreign Governments,
and International Organizations 

7-102.1.  Classified information may be released to
foreign nationals, foreign governments, and international
organizations only when authorized under the provisions
of the National Disclosure Policy and DoD Directive
5230.11 (reference (tt)); and

7-102.2.  Access to COMSEC information by foreign persons
and activities shall be in accordance with policy issuances
of the National Telecommunications and Information Systems
Security Committee (NTISSC).

7-103.  Other Situations.   When necessary in the interests
of national security, Heads of DoD Components, or their
single designee, may authorize access by persons outside
the Federal Government, other than those enumerated
in subsections 7-101. and 7-102.,to classified information
upon determining that the recipient is trustworthy for
the purpose of accomplishing a national security objective;
and that the recipient can and will safeguard the information
from unauthorized disclosure.

7-104.  Access Required by Other Executive Branch Investigative
and Law Enforcement Agents 

7-104.1.  Normally, investigative agents of other Departments
or Agencies may obtain access to DoD information through
established liaison or investigative channels.

7-104.2.  When the urgency or delicacy of a Federal
Bureau of Investigation (FBI), Drug Enforcement Administration
(DEA), or Secret Service investigation precludes use
of established liaison or investigative channels, FBI,
DEA, or Secret Service agents may obtain access to DoD
information as required.   However, this information
shall be protected as required by its classification.
  Before any public release of the information so obtained
the approval of the head of the activity or higher authority
shall be obtained.

7-105.  Access by Visitors.   Procedures shall be established
to control access to classified information by visitors.
  (DoD Instruction 5230.20 (reference (fff)) provides
further guidance regarding foreign visitors.)

7-105.1.  Except when a continuing, frequent working
relationship is established, through which current security
clearance and need-to-know are determined, DoD personnel
visiting other activities of the Department of Defense,
its contractors, and other Agencies shall provide advance
notification of the pending visit that establishes the
visitor's security clearance and the purpose of the
visit.   Visit requests shall be signed by an official
other than the visitor who is in a position to verify
the visitor's security clearance.

7-105.2.  Visit requests normally should include the
following:

7-105.2.1.  Full name, date and place of birth, social
security number, and rank or grade of visitor;

7-105.2.2.  Security clearance of the visitor;

7-105.2.3.  Employing activity of the visitor;

7-105.2.4.  Name and address of activity to be visited;

7-105.2.5.  Date and duration of proposed visit;

7-105.2.6.  Purpose of visit in sufficient detail to
establish need-to-know; and

7-105.2.7.  Names of persons to be contacted.

7-105.3.  Visit requests may remain valid for not more
than 1 year.

7-105.4.  EACH OSD COMPONENT SECURITY MANAGER SHALL
INSTITUTE A FILE SYSTEM FOR VISIT REQUESTS FOR PERSONNEL
VISITING THE NATIONAL CAPITAL REGION.   THE VISIT REQUEST
SHALL BE SENT TO THE OFFICE OF THE OSD COMPONENT THAT
SHALL SEE THE VISITOR(S).

7-105.5.  OSD PERSONNEL VISITING OTHER ACTIVITIES OF
THE DEPARTMENT OF DEFENSE, ITS CONTRACTORS, AND OTHER
AGENCIES, SHALL COMPLY WITH THE REQUIREMENTS OF THIS
INSTRUCTION AND ADMINISTRATIVE INSTRUCTION NO. 23 (REFERENCE
(SSS)).   

C7.2.  Section 2.   DISSEMINATION 

7-200.  Policy.   DoD Components shall establish procedures
consistent with this Instruction for the dissemination
of classified material.   The originating official or
activity may prescribe specific restrictions on dissemination
of classified information when necessary.   (See subsection
4-505.)

7-201.  Restraints on Special Access Requirements. 
 Special requirements with respect to access, distribution,
and protection of classified information shall require
prior approval in accordance with Chapter 12.

7-202.  Information Originating in-a Non-DoD Department
or Agency.   Except under rules established by the Secretary
of Defense, or as provided by Section 102 of the National
Security Act (reference (uu)), classified information
originating in a Department or Agency other than Department
of Defense shall not be disseminated outside the Department
of Defense without the consent of the originating Department
or Agency.

7-203.  Foreign Intelligence Information.   Dissemination
of foreign intelligence information shall be in accordance
with the provisions of DoD Instruction 5230.22 (reference
(z)) and DoD Directive C-5230.23 (reference (eee)).

7-204.  Restricted Data and Formerly Restricted Data.
  Information bearing the warning notices prescribed
in subsection 4-501. and 4-502. shall not be disseminated
outside authorized channels without the consent of the
originator.   Access to and dissemination of Restricted
Data by DoD personnel shall be subject to DoD Directive
5210.2 (reference (dd)).

7-205.  NATO Information.   Classified information originated
by NATO shall be safeguarded in accordance with DoD
Directive 5100.55 (reference (ee)).

7-206.  COMSEC Information.   COMSEC information shall
be disseminated in accordance with NACSI 4005 (reference
(aa)) and implementing instructions.

7-207.  Dissemination of Top Secret Information 

7-207.1.  Top Secret information, originated within
the Department of Defense, may not be disseminated outside
the Department of Defense without the consent of the
originating DoD Component, or higher authority.

7-207.2.  Top Secret information, whenever segregable
from classified portions bearing lower classifications,
shall be distributed separately.

7-207.3.  Standing distribution requirements for Top
Secret information and materials, such as distribution
lists, shall be reviewed at least annually to verify
the recipients' need-to-know.

7-207.4.  THE OSD COMPONENT TOP SECRET CONTROL OFFICER
SHALL COORDINATE THE DISSEMINATION OF EACH DOCUMENT
WITHIN OSD OFFICES.

7-208.  Dissemination of Secret and Confidential Information


7-208.1.  Secret and Confidential information, originated
within the Department of Defense, may be disseminated
within the Executive Branch, unless prohibited by the
originator.   (See subsection 4-505.)

7-208.2.  Standing distribution requirements for Secret
and Confidential information and materials, such as
distribution lists, shall be reviewed at least annually
to verify the recipients' need-to-know.

7-209.  Code Words, Nicknames, and Exercise Terms. 
 The use of code words, nicknames, and exercise terms
is subject to the provisions of Chapter 12 and Appendix
3.

7-210.  Scientific and Technical Meetings.   Use of
classified information in scientific and technical meetings
is subject to the provisions of DoD Directive 5200.12
(reference (nn)).

C7.3.  Section 3.   ACCOUNTABILITY AND CONTROL 

7-300.  Top Secret Information.   DoD activities shall
establish the following procedures:

7-300.1.  Control Officers.   Top Secret Control Officers
(TSCOs) and alternates shall be designated within offices
to be responsible for receiving, dispatching, and maintaining
accountability registers of Top Secret documents.  
Such individuals shall be selected on the basis of experience
and reliability, and shall have Top Secret security
clearances.   TSCOs need not be appointed in those instances
where there is no likelihood of processing Top Secret
documentation.

7-300.1.1.  THE HEAD OF THE OSD COMPONENT SHALL APPOINT
A PRIMARY TOP SECRET CONTROL OFFICER (TSCO) FOR THE
OSD COMPONENT AND AN ALTERNATE FOR THE PRIMARY ON SD
FORM 507, "TOP SECRET CONTROL OFFICER DESIGNATION FORM."
  THE ORIGINAL COPY SHALL BE FURNISHED TO PSD.

7-300.1.2.  THE TSCO CUSTODIAN MAY BE APPOINTED FOR
EACH ELEMENT OR OFFICE WITHIN OSD COMPONENTS TO APPROPRIATELY
CONTROL DOCUMENTS.   THE ORIGINAL COPY SHALL BE FURNISHED
TO THE OSD COMPONENT, TSCO.

7-300.2.  Accountability 

7-300.2.1.  Top Secret Registers.   Top Secret accountability
registers shall be maintained by each office originating
or receiving Top Secret information.   Such registers
shall be retained for 2 years and shall, as a minimum,
reflect the following:

7-300.2.1.1.  Sufficient information to identify adequately
the Top Secret document or material to include the title
or appropriate short title, date of the document, and
identification of the originator;

7-300.2.1.2.  The date the document or material was
received;

7-300.2.1.3.  The number of copies received or later
reproduced; and

7-300.2.1.4.  The disposition of the Top Secret document
or material and all copies of such documents or material.

7-300.2.2.  Serialization and Copy Numbering.   Top
Secret documents and material shall be numbered serially.
  In addition, each Top Secret document shall be marked
to indicate its copy number, for example, copy -1- of
-2- copies.

7-300.2.3.  Disclosure Records.   Each Top Secret document
or item of material shall have appended to it a Top
Secret disclosure record.   The name and title of all
individuals, including stenographic and clerical personnel
to whom information in such documents and materials
has been disclosed, and the date of such disclosure,
shall be recorded thereon.   Disclosures to individuals
who may have had access to containers in which Top Secret
information is stored, or who regularly handle a large
volume of such information need not be so recorded.
  Such individuals, when identified on a roster, are
deemed to have had access to such information.   Disclosure
records shall be retained for 2 years after the documents
or materials are transferred, downgraded, or destroyed.

   

 A TOP SECRET INFORMATION COVER SHEET (SD FORM 194)
SHALL BE ATTACHED AND REMAIN WITH THE TOP SECRET MATERIAL
OTHER THAN NATIONAL SECURITY COUNCIL (NSC) INFORMATION.
  SD FORM 194 SHALL BE UPDATED WHEN AN INDIVIDUAL GAINS
ACCESS TO THE DOCUMENTS AND SHALL INCLUDE THE DATES
OF SUCH ACCESS.   THE PROPER NSC COVER SHEET OF THE
DD FORM 2275 SERIES SHALL BE USED WITH NSC INFORMATION.

7-300.3.  Inventories.   All Top Secret documents and
material shall be inventoried at least once annually.
  The inventory shall reconcile the Top Secret accountability
register with the documents or material on hand.   At
such time, each document or material shall be examined
for completeness.   DoD Component senior officials (subsections
13-301. and 13-302.) may authorize the annual inventory
of Top Secret documents and material in repositories,
libraries, or activities that store large volumes of
Top Secret documents or material to be limited to documents
and material to which access has been granted within
the past year, and 10 percent of the remaining inventory.
  If a storage system contains large volumes of information
and security measures are adequate to prevent access
by unauthorized persons, a request for waiver of the
annual inventory requirement accompanied by full justification
may be submitted to the DUSD(P).

   

THE OSD COMPONENT TSCO SHALL FORWARD THE COMPLETED ANNUAL
INVENTORY CERTIFICATE TO PSD NO LATER THAN JULY 30 OF
EACH YEAR.   THIS ANNUAL CERTIFICATE SHALL LIST ANY
DOCUMENT THAT MIGHT NOT BE LOCATED.

7-300.4.  Retention.   Top Secret information shall
be retained only to the extent necessary to satisfy
current requirements.   Custodians shall destroy nonrecord
copies of Top Secret documents when no longer needed.
  Record copies of documents that cannot be destroyed
shall be reevaluated and, when appropriate, downgraded,
declassified, or retired to designated records centers.

7-300.5.  Receipts.   Top Secret documents and material
will be accounted for by a continuous chain of receipts.
  Receipts shall be maintained for 2 years.

   

RECEIPT FOR CLASSIFIED MATERIAL (SD FORM 120) IS THE
ONLY FORM APPROVED FOR TRANSMITTING OR TRANSFERRING
CLASSIFIED ACCOUNTABLE MATERIALS BY OSD COMPONENTS.
  (SEE FIGURE 10, BELOW.)   A SUPPLEMENTAL RECEIPT,
SUCH AS SD FORM 396, "CLASSIFIED DOCUMENT RECORD AND
RECEIPT," MAY BE USED WITH THE SD FORM 120 WHEN TRANSMISSION
INVOLVES MULTIPLE DOCUMENTS.

7-301.  Secret Information.   Administrative procedures
shall be established by each DoD Component for controlling
Secret information and material originated or received
by an activity; distributed or routed to a sub-element
of such activity; and disposed of by the activity by
transfer of custody or destruction.   The control system
for Secret information must be determined by a practical
balance of security and operating efficiency and must
meet the following minimum requirements:

7-301.1.  It must provide a means to ensure that Secret
material sent outside a major subordinate element (the
activity) of the DoD Component concerned has been delivered
to the intended recipient.   Such delivery may be presumed
where the material is sent electronically over secure
voice or data circuits.   Ensuring physical delivery
may be accomplished by use of a receipt as provided
in paragraph 8-202.2. or through hand-to-hand transfer
when the receiving party acknowledges responsibility
for the Secret material.

7-301.2.  It must provide a record of receipt and dispatch
of Secret material by each major subordinate element.
  The dispatch record requirement may be satisfied when
the distribution of Secret material is evident from
addressees or distribution lists for classified documentation.
  Records of receipt and dispatch are required regardless
of the means used to ensure delivery of the material
(see paragraph 7-301.1., above).

7-301.3.  Records of receipt and dispatch for Secret
material shall be retained for a minimum of 2 years.

7-302.  Confidential Information.   Administrative controls
shall be established to protect Confidential information
received, originated, transmitted, or stored by an activity.

7-303.  Receipt of Classified Material.   Procedures
shall be developed within DoD activities to protect
incoming mail, bulk shipments, and items delivered by
messenger until a determination is made whether classified
information is contained therein.   Screening points
shall be established to limit access to classified information
to cleared personnel.

7-304.  Working Papers 

7-304.1.  Working papers are documents and material
accumulated or created in the preparation of finished
documents and material.   Working papers containing
classified information shall be:

7-304.1.1.  Dated when created;

7-304.1.2.  Marked with the highest classification of
any information contained therein;

7-304.1.3.  Protected in accordance with the assigned
classification;

7-304.1.4.  Destroyed when no longer needed; and

7-304.1.5.  Accounted for, controlled, and marked in
the manner prescribed for a finished document of the
same classification when:

7-304.1.5.1.  Released by the originator outside the
activity or transmitted electrically or through message
center channels within the activity;

7-304.1.5.2.  Retained more than 90 days from date of
origin;

7-304.1.5.3.  Filed permanently; or

7-304.1.5.4.  Top Secret information is contained therein.

7-304.2.  Heads of DoD Components, or their single designees,
may approve waivers of accountability, control, and
marking requirements for working papers containing Top
Secret information for activities within their Components
on a case-by-case basis provided a determination is
made that:

7-304.2.1.  The conditions set forth in subparagraphs
7-304.1.5.1., 7-304.1.5.2., or 7-304.1.5.3., above,
will remain in effect;

7-304.2.2.  The activity seeking a waiver routinely
handles large volumes of Top Secret working papers and
compliance with prescribed accountability, control,
and marking requirements would have an adverse affect
on the activity's mission or operations; and

7-304.2.3.  Access to areas where Top Secret working
papers are handled is restricted to personnel who have
an appropriate level of clearance, and other safeguarding
measures are adequate to preclude the possibility of
unauthorized disclosure.

7-304.3.  In all cases in which a waiver is granted
under 7-304.2., above, the DUSD(P) shall be notified.

7-305.  Restraint on Reproduction.   Except for the
controlled initial distribution of information processed
or received electrically or as provided by subsections
1-205. and 3-602., portions of documents and materials
that contain Top Secret information shall not be reproduced
without the consent of the originator or higher authority.
  Any stated prohibition against reproduction shall
be observed strictly.   (See subsection 4-505.)   To
the extent possible, DoD Components shall establish
classified reproduction facilities where only designated
personnel can reproduce classified materials and institute
key control systems for reproduction areas.   Also,
when possible, two people shall be involved in the reproduction
process to help assure positive control and safeguarding
of all copies.   The following additional measures apply
to reproduction equipment and to the reproduction of
classified information:

7-305.1.  Copying of documents containing classified
information shall be minimized;

7-305.2.  Officials authorized to approve the reproduction
of Top Secret and Secret information shall be designated
by position title and shall review the need for reproduction
of classified documents and material with a view toward
minimizing reproduction.

7-305.3.  Specific reproduction equipment shall be designated
for the reproduction of classified information.   Rules
for reproduction of classified information shall be
posted on or near the designated equipment;

7-305.4.  Notices prohibiting reproduction of classified
information shall be posted on equipment used only for
the reproduction of unclassified information;

7-305.5.  DoD Components shall ensure that equipment
used for reproduction of classified information does
not leave latent images in the equipment or on other
material;

7-305.6.  All copies of classified documents reproduced
for any purpose including those incorporated in a working
paper are subject to the same controls prescribed for
the document from which the reproduction is made; and

7-305.7.  Records shall be maintained for 2 years to
show the number and distribution of reproduced copies
of all Top Secret documents, of all classified documents
covered by special access programs distributed outside
the originating Agency, and of all Secret and Confidential
documents that are marked with special dissemination
and reproduction limitations.   (See subsection 4-505.)

 FIGURE 10.  SD Form 120, "Receipt for Classified Material"

C8.  CHAPTER 8

TRANSMISSION

C8.1.  Section 1.   METHODS OF TRANSMISSION OR TRANSPORTATION


8-100.  Policy.   Classified information may be transmitted
or transported only as specified in this Chapter.

8-101.  Top Secret Information.   Transmission of Top
Secret information shall be effected only by:

8-101.1.  The Armed Forces Courier Service (ARFCOS);

8-101.2.  Authorized DoD Component Courier Services;

8-101.3.  If appropriate, the Department of State Courier
System;

8-101.4.  Cleared and designated U.S. Military personnel
and Government civilian employees traveling on a conveyance
owned, controlled, or chartered by the U.S. Government
or DoD contractors;

8-101.5.  Cleared and designated U.S. Military personnel
and Government civilian employees by surface transportation;

8-101.6.  Cleared and designated U.S. Military personnel
and Government civilian employees on scheduled commercial
passenger aircraft within and between the United States,
its Territories, and Canada, when approved in accordance
with paragraph 8-303.1.

8-101.7.  Cleared and designated U.S. Military personnel
and Government civilian employees on scheduled commercial
passenger aircraft on flights outside the United States,
its territories, and Canada, when approved in accordance
with paragraph 8-303.2.

8-101.8.  Cleared and designated DoD contractor employees
within and between the United States and its Territories
provided that the transmission has been authorized in
writing by the appropriate contracting officer or his
designated representative, and the designated employees
have been briefed on their responsibilities as couriers
or escorts for the protection of Top Secret material.
  Complete guidance for Top Secret transmission is specified
in DoD 5220.22-R and DoD 5220.22-M (references (j)and
(k)).

8-101.9.  A cryptographic system authorized by the Director,
NSA, or via a protected distribution system designed
and installed to meet the standards included in the
National COMSEC and Emanations Security (EMSEC) Issuance
System.

8-101.10.  DESIGNATION OF OSD PERSONNEL FOR TRANSMITTING
OR ESCORTING TOP SECRET INFORMATION SHALL BE MADE BY
THE OSD COMPONENT SECURITY MANAGER BASED ON THE DESIGNATED
INDIVIDUAL'S POSSESSION OF A FINAL TOP SECRET SECURITY
CLEARANCE; KNOWLEDGE OF PERTINENT SECURITY INSTRUCTIONS;
AND THE MATURITY, JUDGMENT, AND RELIABILITY OF THE DESIGNATED
INDIVIDUAL.

8-102.  Secret Information.   Transmission of Secret
information may be effected by:

8-102.1.  Any of the means approved for the transmission
of Top Secret information except that Secret information
may be introduced into the ARFCOS only when the control
of such information cannot be otherwise maintained in
U.S. custody.   This restriction does not apply to SCI
and COMSEC information;

8-102.2.  Appropriately cleared contractor employees
within and between the United States and its Territories
provided that:

8-102.2.1.  The designated employees have been briefed
in their responsibilities as couriers or escorts for
protecting Secret information;

8-102.2.2.  The classified information remains under
the constant custody and protection of the contractor
personnel at all times; and

8-102.2.3.  The transmission otherwise meets the requirements
specified in DoD 5220.22-R and DoD 5220.22-M (references
(j)and (k)).   In other areas, appropriately cleared
DoD contractor employees may transmit classified material
only as prescribed by references (j)and (k)).

8-102.3.  U.S. Postal Service registered mail within
and between the United States and its Territories;

8-102.4.  U.S. Postal Service registered mail through
Army, Navy, or Air Force Postal Service facilities outside
the United States and its Territories, provided that
the information does not at any time pass out of U.S.
citizen control and does not pass through a foreign
postal system or any foreign inspection;

8-102.5.  U.S. Postal Service and Canadian registered
mail with registered mail receipt between U.S. Government
and Canadian Government installations in the United
States and Canada;

8-102.6.  Carriers authorized to transport Secret information
by way of a Protective Security Service (PSS) under
the DoD Industrial Security Program.   This method is
authorized only within the U.S. boundaries and only
when the size, bulk, weight, and nature of the shipment,
or escort considerations make the use of other methods
impractical.   Routings for these shipments will be
obtained from the Military Traffic Management Command
(MTMC);

8-102.7.  The following carriers under appropriate escort:
  Government and Government contract vehicles including
aircraft, ships of the U.S. Navy, civil service-operated
U.S. Naval ships, and ships of U.S. registry.   Appropriately
cleared operators of vehicles, officers of ships or
pilots of aircraft who are U.S. citizens may be designated
as escorts provided the control of the carrier is maintained
on a 24-hour basis.   The escort shall protect the shipment
at all times, through personal observation or authorized
storage to prevent inspection, tampering, pilferage,
or unauthorized access.   However, observation of the
shipment is not required during the period it is stored
in an aircraft or ship in connection with flight or
sea transit, provided the shipment is loaded into a
compartment that is not accessible to any unauthorized
persons or in a specialized secure, safe-like container
that is:

8-102.7.1.  Constructed of solid building material that
provides a substantial resistance to forced entry;

8-102.7.2.  Constructed in a manner that precludes surreptitious
entry through disassembly or other means, and that attempts
at surreptitious entry would be readily discernible
through physical evidence of tampering; and

8-102.7.3.  Secured by a numbered cable seal lock affixed
to a substantial metal hasp in a manner that precludes
surreptitious removal and provides substantial resistance
to forced entry.

8-102.8.  Use of specialized containers aboard aircraft
requires that:

8-102.8.1.  Appropriately cleared personnel maintain
observation of the material as it is being loaded aboard
the aircraft and that observation of the aircraft continues
until it is airborne;

8-102.8.2.  Observation by appropriately cleared personnel
is maintained at the destination as the material is
being off-loaded and at any intermediate stops.   Observation
will be continuous until custody of the material is
assumed by appropriately cleared personnel.

8-103.  Confidential Information.   Transmission of
Confidential information may be effected by:

8-103.1.  Means approved for the transmission of Secret
information.   However, U.S. Postal Service registered
mail shall be used for Confidential only as indicated
in paragraph 8-103.2., below;

8-103.2.  U.S. Postal Service registered mail for:

8-103.2.1.  Confidential information of NATO;

8-103.2.2.  Other Confidential material to and from
FPO or APO addressees located outside the United States
and its Territories;

8-103.2.3.  Other addressees when the originator is
uncertain that their location is within U.S. boundaries.
  Use of return postal receipts on a case-by-case basis
is authorized.

8-103.3.  U.S. Postal Service first class mail between
DoD Component locations anywhere in the United States
and its Territories.   However, the outer envelope or
wrappers of such Confidential material shall be endorsed
"POSTMASTER:   Address Correction Requested/Do Not Forward."
  Certified or, if appropriate, registered mail shall
be used for material directed to DoD contractors and
to non-DoD Agencies of the Executive Branch.   U.S.
Postal Service Express Mail Service may be used between
DoD Component locations, between DoD contractors, and
between DoD Components and DoD contractors.

8-103.4.  Within U.S. boundaries, commercial carriers
that provide a Constant Surveillance Service (CSS).
  Information concerning commercial carriers that provide
CSS may be obtained from the MTMC.

8-103.5.  In the custody of commanders or masters of
ships of U.S. registry who are U.S. citizens.   Confidential
information shipped on ships of U.S. registry may not
pass out of U.S. Government control.   The commanders
or masters must give and receive classified information
receipts and agree to:

8-103.5.1.  Deny access to the Confidential material
by unauthorized persons, including customs inspectors,
with the understanding that Confidential cargo that
would be subject to customs inspection will not be unloaded;
and

8-103.5.2.  Maintain control of the cargo until a receipt
is obtained from an authorized representative of the
consignee.

8-103.6.  Such alternative or additional methods of
transmission as the Head of any DoD Component may establish
by rule or regulation, provided those methods afford
at least an equal degree of security.

8-104.  Transmission of Classified Material to Foreign
Governments.   After a determination by designated officials
pursuant to DoD Directive 5230.11 (reference tt)) that
classified information or material may be released to
a foreign government, the material shall be transferred
between authorized representatives of each government
in compliance with the provisions of this Chapter. 
 To assure compliance, each contract, agreement, or
other arrangement that involves the release of classified
material to foreign entities shall either contain transmission
instructions or require that a separate transportation
plan be approved by the appropriate DoD security and
transportation officials prior to release of the material.
  (See DoD TS-5105.21-M-3 (reference (iii)) for guidance
regarding SCI.)

8-104.1.  Classified material to be released directly
to a foreign government representative shall be delivered
or transmitted only to a person who has been designated
in writing by the recipient government as its officer,
agent, or employee (hereafter referred to as the designated
representative).   Foreign governments may designate
a freight forwarder as their agent.   This written designation
shall contain assurances that such person has a security
clearance at the appropriate level and that the person
will assume full security responsibility for the material
on behalf of the foreign government.   The recipient
will be required to execute a receipt for the material,
regardless of the level of classification.

8-104.2.  Classified material that is suitable for transfer
by courier or postal service, and which cannot be transferred
directly to a foreign government's designated representative
as specified in paragraph 8-104.1., above, shall be
transmitted by one of the methods specified in subsection
8-101., 8-102., or 8-103. for the designated classification
level to:

8-104.2.1.  An embassy, consulate, or other official
agency of the recipient government having extraterritorial
status in the United States, or to

8-104.2.2.  A U.S. Embassy or a U.S. Military organization
in the recipient country or in a third-party country,
if applicable, for delivery to a designated representative
of the intended recipient government.   In either case,
the assurance in paragraph 8-104.2.1., above, and a
receipt, must be obtained.

8-104.2.3.  The shipment of classified material as freight
via truck, rail, aircraft, or ship shall be in compliance
with the following:

8-104.2.3.1.  Shipments Resulting from Foreign Military
Sales (FMS):   DoD officials authorized to approve a
FMS transaction that involves the delivery of U.S. classified
material to a foreign purchaser shall, at the outset
of negotiation or consideration of proposal, consult
with DoD transportation authorities (Military Traffic
Management Command, Military Sealift Command, Military
Airlift Command, or other, as appropriate) to determine
whether secure shipment from the CONUS point of origin
to the ultimate foreign destination is feasible.   Normally,
the United States will use the Defense Transportation
System (DTS) to deliver classified material to the recipient
government.   If, in the course of FMS case processing,
the foreign purchaser proposes to take delivery and
custody of the classified material in the United States
and use it own facilities and transportation for onward
shipment to its territory, the foreign purchaser or
its designated representative shall be required to submit
a transportation plan for DoD review and approval. 
 This plan, as a minimum, shall specify the storage
facilities, delivery and transfer points, carriers,
couriers or escorts, and methods of handling to be used
from the CONUS point of origin to the final destination
and return shipment when applicable.   (See Appendix
5.)   Security officials of the DoD Component that initiates
the FMS transaction shall evaluate the transportation
plan to determine whether the plan adequately ensures
protection of the highest level of classified material
involved.   Unless the DoD Component initiating the
FMS transaction approves the transportation plan as
submitted, or it is modified to meet U.S. security standards,
shipment by other than DTS shall not be permitted. 
 Transmission instructions or the requirement for an
approved transportation plan shall be incorporated into
the security requirements of the United States Department
of Defense Offer and Acceptance (DD Form 1513).

8-104.2.3.2.  Shipments Resulting from Direct Commercial
Sales:   Classified shipments resulting from direct
commercial sales must comply with the same security
standards that apply to FMS shipments.   Defense contractors,
therefore, will consult, as appropriate, with the purchasing
government, the DIS Regional Security Office, and the
owning Military Department prior to consummation of
a commercial contract that will result in the shipment
of classified material to obtain approval of the transportation
plan.

8-104.2.3.3.  Delivery within the United States, Its
Territories, or Possessions:   Delivery of classified
material to a foreign government at a point within the
United States, its territories, or its possessions,
shall be made only to a person identified in writing
by the recipient government as its designated representative
as specified in paragraph 8-104.2.3.1., above.   The
only authorized delivery points are:

8-104.2.3.3.1.  An embassy, consulate, or other official
agency under the control of the recipient government.

8-104.2.3.3.2.  Point of origin.   When a designated
representative of the recipient government accepts delivery
of classified U.S. material at the point of origin (for
example, a manufacturing facility or depot), the DoD
official who transfers custody shall obtain a receipt
for the classified material and assure that the recipient
is cognizant of secure means of onward movement of the
classified material to its final destination, consistent
with the approved transportation plan.

8-104.2.3.3.3.  Military or commercial ports of embarkation
(POE) that are recognized points of departure from the
United States, its territories, or possessions, for
onloading aboard a ship, aircraft, or other carrier
authorized under subparagraph 8-104.2.3.5., below. 
 In these cases, the transportation plan shall provide
for U.S.-controlled secure shipment to the CONUS transshipment
point and the identification of a secure storage facility,
Government or commerical, at or in proximity to the
POE.   A DoD official authorized to transfer custody
is to supervise or observe the onloading of FMS material
being transported via the DTS and other onloading wherein
physical and security custody of the material has yet
to be transferred formally to the foreign recipient.
  In the event that transfer of physical and security
custody cannot be accomplished promptly, the DoD official
shall ensure that the classified material is either
returned to a secure storage facility of the U.S. shipper
(Government or contractor); or segregated and placed
under constant surveillance of a duly cleared U.S. security
force at the POE; or held in the secure storage facility
(Government or commerical) designated in the transportation
plan.

8-104.2.3.3.4.  Freight forwarder facility that is identified
by the recipient government as its designated representative
and that is cleared in accordance with subparagraph
8-104.2.3.6., below, to the level of the classified
material to be received.   In these cases, a person
identified as a designated representative must be present
to accept delivery of the classified material and receipt
for it, to include full acceptance of security responsiblity.

8-104.2.3.4.  Delivery Outside the United States, Its
Territories, or Possessions:

8-104.2.3.4.1.  Delivery within the recipient country.
  Classified U.S. material to be delivered to a foreign
government within the recipient country shall be delivered
on arrival in the recipient country to a U.S. Government
representative who shall arrange for its transfer to
a designated representative of the recipient government.
  If the shipment is escorted by a U.S. Government official
authorized to accomplish the transfer of custody, the
material may be delivered directly to the recipient
government's designated representative upon arrival.

8-104.2.3.4.2.  Delivery Within a Third Country.   Classified
material to be delivered to a foreign government representative
within a third country shall be delivered to an Agency
or installation of the United States, or of the recipient
government, that has extraterritorial status or otherwise
is exempt from the jurisdiction of the third country.
  Unless the material is accompanied by a U.S. Government
official authorized to accomplish the transfer of custody,
a U.S. Government official shall be designated locally
to receive the shipment upon arrival and be vested with
authority to effect delivery to the intended recipient
government's designated representative.

8-104.2.3.5.  Overseas Carriers:   Overseas shipments
of U.S. classified material shall be made only via ships,
aircraft, or other carriers that are:

8-104.2.3.5.1.  Owned or chartered by the U.S. Government
or under U.S. registry;

8-104.2.3.5.2.  Owned or chartered by or under the registry
of the recipient government; or

8-104.2.3.5.3.  Otherwise expressly authorized by the
Head of the DoD Component having classification jurisdiction
over the material involved.

   

Overseas shipments of classified material shall be escorted,
prepared for shipment, packaged, and stored onboard
as prescribed elsewhere in this Chapter and in DoD 5220.22-R
and DoD 5220.22-M (references (j) and (k)).

8-104.2.3.6.  Freight Forwarders:   Only freight forwarders
that have been granted an appropriate security clearance
by the Department of Defense or the recipient government
are eligible to receive, process, and store U.S. classified
material authorized for release to foreign governments.
  However, a freight forwarder that does not have access
to or custody of the classified material need not be
cleared.

8-105.  Consignor-Consignee Responsibility for Shipment
of Bulky Material .   The consignor of a bulk shipment
shall:

8-105.1.  Normally, select a carrier that will provide
a single line service from the point of origin to destination,
when such a service is available;

8-105.2.  Ship packages weighing less than 200 pounds
in closed vehicles only;

8-105.3.  Notify the consignee, and military transshipping
activities, of the nature of the shipment (including
level of classification), the means of shipment, the
number of seals, if used, and the anticipated time and
date of arrival by separate communication at least 24
hours in advance of arrival of the shipment.   Advise
the first military transshipping activity that, in the
event the material does not move on the conveyance originally
anticipated, the transshipping activity should so advise
the consignee with information of firm transshipping
date and estimated time of arrival.   Upon receipt of
the advance notice of a shipment of classified material,
consignees and transshipping activities shall take appropriate
steps to receive the classfied shipment and to protect
it upon arrival.

8-105.4.  Annotate the bills of lading to require the
carrier to notify the consignor immediately by the fastest
means if the shipment is unduly delayed enroute.   Such
annotations shall not under any circumstances disclose
the classified nature of the commodity.   When seals
are used, annotate substantially as follows:

   

DO NOT BREAK SEALS EXCEPT IN EMERGENCY OR ON AUTHORITY
OF CONSIGNOR OR CONSIGNEE.   IF BROKEN, EXPEDIENTLY
APPLY CARRIER'S SEALS AND IMMEDIATELY NOTIFY CONSIGNOR
AND CONSIGNEE.

8-105.5.  Require the consignee to advise the consignor
of any shipment not received more than 48 hours after
the estimated time of arrival furnished by the consignor
or transshipping activity.   Upon receipt of such notice,
the consignor shall immediately trace the shipment.
  If there is evidence that the classified material
was subjected to compromise, the procedures set forth
in Chapter 6 of this Regulation for reporting compromises
shall apply.

8-106.  Transmission of COMSEC Information.   COMSEC
information shall be transmitted in accordance with
National COMSEC Instruction 4005 (reference (aa)).

8-107.  Transmission of Restricted Data.   Restricted
Data shall be transmitted in the same manner as other
information of the same security classification.   The
transporting and handling of nuclear weapons or nuclear
components shall be in accordance with DoD Directives
4540.1 and 5210.41 (references (vv) and (ww)) and applicable
DoD Component directives and regulations.

C8.2.  Section 2.   PREPARATION OF MATERIAL FOR TRANSMISSION,
SHIPMENT, OR CONVEYANCE 

8-200.  Envelopes or Containers 

8-200.1.  Whenever classified information is transmitted,
it shall be enclosed in two opaque sealed envelopes
or similar wrappings when size permits, except as provided
below.

8-200.2.  Whenever classified material is transmitted
of a size not suitable for transmission in accordance
with paragraph 8-200.1., above, it shall be enclosed
in two opaque sealed containers, such as boxes or heavy
wrappings.

8-200.2.1.  If the classified information is an internal
component of a packageable item of equipment, the outside
shell or body may be considered as the inner enclosure
provided it does not reveal classified information.

8-200.2.2.  If the classified material is an inaccessible
internal component of a bulky item of equipment that
is not reasonably packageable, the outside or body of
the item may be considered to be a sufficient enclosure
provided the shell or body does not reveal classified
information.

8-200.2.3.  If the classified material is an item or
equipment that is not reasonably packageable and the
shell or body is classified, it shall be concealed with
an opaque covering that will hide all classified features.

8-200.2.4.  Specialized shipping containers, including
closed cargo transporters, may be used instead of the
above packaging requirements.   In such cases, the container
may be considered the outer wrapping or cover.

8-200.2.5.  MAGNETIC TAPE REELS WITH BINDERS, CASSETTE
CASES FOR VIDEO AND OTHER MAGNETIC TAPES, FLOPPY DISK
JACKETS, DISK PACK COVERS, AND SIMILAR COVERS FOR MAGNETIC
RECORDING MAY BE USED AS THE INNER ENCLOSURE.   LABELS
SHALL BE AFFIXED AND MARKINGS SHALL BE IN ACCORDANCE
WITH PARAGRAPH 8-201.3., BELOW.

8-200.3.  Material used for packaging shall be of such
strength and durability as to provide security protection
while in transit, prevent items from breaking out of
the container, and to facilitate the detection of any
tampering with the container.   The wrappings shall
conceal all classified characteristics.

8-200.4.  Closed and locked vehicles, compartments,
or cars shall be used for shipments of classified information
except when another method is authorized by the consignor.
  Alternative methods authorized by the consignor must
provide security equivalent to or better than the methods
specified herein.   In all instances, individual packages
weighing less than 200 pounds gross shall be shipped
only in a closed vehicle.

8-200.5.  To minimize the possibility of compromise
of classified material caused by improper or inadequate
packaging thereof, responsible officials shall ensure
that proper wrappings are used for mailable bulky packages.
  Responsible officials shall require the inspection
of bulky packages to determine whether the material
is suitable for mailing or whether it should be transmitted
by other approved means.

8-200.6.  When classified material is hand-carried outside
an activity, a locked briefcase may serve as the outer
wrapper.   In such cases, the addressing requirements
of paragraph 8-201.4. do not apply; however, the requirements
of paragraph 8-201.3. are applicable.

8-200.7.  A LOCKED BRIEFCASE SHALL NOT BE USED AS AN
OUTER WRAPPER WHEN CLASSIFIED MATERIAL IS HAND-CARRIED
ABOARD ANY AIRLINE FLIGHTS.

8-201.  Addressing 

8-201.1.  Classified information shall be addressed
to an official Government activity or DoD contractor
with a facility clearance and not to an individual.
  This is not intended, however, to prevent use of office
code numbers or such phrases in the address as "Attention:
  Research Department," or similar aids in expediting
internal routing, in addition to the organization address.

8-201.2.  Classified written information shall be folded
or packed in such a manner that the text will not be
in direct contact with the inner envelope or container.
  A receipt form shall be attached to or enclosed in
the inner envelope or container for all Secret and Top
Secret information; Confidential information will require
a receipt only if the originator deems it necessary.
  The mailing of written materials of different classifications
in a single package should be avoided.   However, when
written materials of different classifications are transmitted
in one package, they shall be wrapped in a single inner
envelope or container.   A receipt listing all classified
information for which a receipt is requested shall be
attached or enclosed.   The inner envelope or container
shall be marked with the highest classification of the
contents.

8-201.3.  The inner envelope or container shall show
the address of the receiving activity, classification,
including, where appropriate, the "Restricted Data"
marking, and any applicable special instructions.  
It shall be carefully sealed to minimize the possibility
of access without leaving evidence of tampering.

   

THE ADDRESS OF THE SENDER SHALL BE SHOWN ON THE INNER
ENVELOPE OR CONTAINER.

8-201.4.  An outer or single envelope or container shall
show the complete and correct address and the return
address of the sender.

8-201.5.  An outer cover or single envelope or container
shall not bear a classification marking, a listing of
the contents divulging classified information, or any
other unusual data or marks that might invite special
attention to the fact that the contents are classified.

8-201.6.  Care must be taken to ensure that classified
information intended only for U.S. elements of international
staffs or other organizations is addressed specifically
to those elements.

8-201.7.  PREPARATION OF MATERIAL FOR INTRODUCTION INTO
THE STATE DEPARTMENT DIPLOMATIC POUCH SYSTEM (SDDPS).

8-201.7.1.  MATERIAL DISPATCHED TO AN AMERICAN ADDRESSEE
IN A FOREIGN COUNTRY REQUIRES TWO ENVELOPES.   EXAMPLES
ARE DEFENSE ATTACHES AND U.S. EMBASSIES, CONSULATES,
AND MISSIONS.

8-201.7.1.1.  OUTER WRAPPER.   THE OUTER ENVELOPE OR
WRAPPER SHALL BE ADDRESSED "VIA STATE DEPARTMENT POUCH."
  OSD COMPONENTS MAY DELIVER PROPERLY WRAPPED AND RECEIPTED
MATERIAL FOR SDDPS TO THE CLASSIFIED CONTROL BRANCH,
CORRESPONDENCE CONTROL DIVISION, WHS (ROOM 3A924), FOR
TRANSMITTAL TO THE STATE DEPARTMENT.

8-201.7.1.2.  INNER WRAPPER.   ALL INNER WRAPPERS SHALL
BE ADDRESSED AND SHALL CONTAIN PROPER CLASSIFICATION
MARKINGS, INCLUDING CAVEATS, TO INDICATE CONTENTS. 
 THE SD FORM 120 SERIAL NUMBER SHALL BE ENTERED TO THE
LEFT AND BELOW THE ADDRESS ELEMENT OF BOTH THE INNER
AND OUTER WRAPPERS.   THE PACKAGE MUST BE ADDRESSED
DIRECTLY TO THE INTENDED RECIPIENT, WITH THE PINK COPY
AND ONLY YELLOW CARD COPY OF SD FORM 120 STAMPED, SIGNED,
AND RETURNED PROMPTLY TO ROOM 3A948, PENTAGON.   THE
CARD AND PINK COPIES OF THE RECEIPT ARE ATTACHED DIRECTLY
TO THE MATERIAL.   THE GREEN COPY OF THE RECEIPT SHALL
BE ANNOTATED TO INDICATE THE METHOD OF TRANSMISSION
SUCH AS ARFCOS, U.S. REGISTERED MAIL NUMBER, OR HAND-CARRY
NOTATION AND THEN FILED IN THE OSD COMPONENT RECEIPT
SUSPENSE FILE.

8-201.7.1.3.  A PROPERLY COMPLETED OPTIONAL FORM 120,
"DIPLOMATIC POUCH MAIL REGISTRATION," SHALL BE PREPARED
AND AFFIXED TO THE INNER ENVELOPE.   THE SENDING OSD
COMPONENT COMPLETES BOTH THE LONG AND SHORT PORTION
OF THE OPTIONAL FORM 120, LESS THE SIGNATURE BLOCK.
  THE LONG PORTION IS PAPER CLIPPED OR STAPLED TO THE
OUTER ENVELOPE AND THE SHORT PORTION PERMANENTLY AFFIXED
TO THE INNER ENVELOPE.

8-201.7.2.  MATERIAL DISPATCHED TO MEMBERS OF FOREIGN
GOVERNMENTS REQUIRES THREE ENVELOPES OR WRAPPERS, ADDRESSED
AND ANNOTATED AS FOLLOWS:

8-201.7.2.1.  ENVELOPE OR WRAPPER NUMBER ONE:   THE
INNERMOST PACKAGE WRAPPER SHALL BE ADDRESSED DIRECTLY
TO THE INTENDED RECIPIENT AND SHALL BEAR THE SAME CLASSIFICATION
MARKINGS AND CAVEATS AS THE CONTENTS.   THE SD FORM
120 SERIAL NUMBER SHALL BE MARKED ON THE LEFT AND BELOW
THE ADDRESS ELEMENT OF THE WRAPPER.   THE YELLOW CARD
AND PINK COPIES OF

THE RECEIPT ARE ATTACHED DIRECTLY TO THE MATERIAL WITHIN
THE WRAPPER.

8-201.7.2.2.  ENVELOPE OR WRAPPER NUMBER TWO.   THIS
WRAPPER IS ADDRESSED TO THE AMBASSADOR, AMERICAN EMBASSY,
CITY, AND COUNTRY.   THE SAME CLASSIFICATION MARKINGS
AND CAVEATS AS WRAPPER ONE ARE INCLUDED ON WRAPPER TWO.
  THE SD FORM 120 SERIAL NUMBER IS ADDED TO THE LOWER
LEFT QUADRANT OF THIS WRAPPER.   THE SHORT PORTION OF
A PROPERLY COMPLETED OPTIONAL FORM 120 IS AFFIXED PERMANENTLY
TO THIS ENVELOPE.

8-201.7.2.3.  ENVELOPE OR WRAPPER THREE.   THE OUTER
WRAPPER SHALL BE ADDRESSED TO THE:   SUPERINTENDENT,
POUCH ROOM DEPARTMENT OF STATE WASHINGTON, DC  20521

   

ABSOLUTELY NO CLASSIFICATION MARKINGS SHALL BE PLACED
ON THIS ENVELOPE.   THE LONG PORTION OF OPTIONAL FORM
20 AND THE GREEN COPY OF SD FORM 120 ARE ATTACHED TO
THIS WRAPPER.

8-201.8.  ALL CLASSIFIED MATERIAL TRANSMITTED THROUGH
ARFCOS, U.S. POSTAL SERVICE, OR PENTAGON-RECORDED MAIL
SHALL BE WRAPPED IN TWO ENVELOPES.

8-201.8.1.  ENVELOPES OR PACKAGES TRANSMITTED THROUGH
ARFCOS SHALL BE MARKED CLEARLY "VIA ARMED FORCES COURIER
SERVICE" IN THE UPPER RIGHT QUADRANT OF THE OUTER WRAPPER;
ONLY DRAFT PAPER ENVELOPES AND WRAPPING SHALL BE USED
FOR TRANSMISSION OF MATERIAL.   WHITE ENVELOPES SHALL
NOT BE ACCEPTED.   ENVELOPES OR ADDRESS LABELS THAT
HAVE POSTAGE AND FEES INDICIA SHALL NOT BE USED ON MATERIAL
TRANSMITTED VIA ARFCOS.

8-201.8.2.  THE SD FORM 120 SERIAL NUMBER SHALL BE TYPED
OR PRINTED IN THE LOWER LEFT QUADRANT OF THE ENVELOPE,
ADDRESS LABEL, OR PACKAGE.

8-201.8.3.  THE USE OF PLASTIC, CLOTH, CELLOPHANE, OR
SYNTHETIC TAPE TO SEAL THE OUTER ENVELOPE OR WRAPPER
IS PROHIBITED.   DRAFT PAPER TAPE SHALL BE APPLIED TO
PACKAGES.

8-202.  Receipt Systems 

8-202.1.  Top Secret information shall be transmitted
under a chain of receipts covering each individual who
gets custody.

8-202.2.  Secret information shall be covered by a receipt
when transmitted to a foreign government (including
foreign government embassies located in the United States)
and when transmitted between major subordinate elements
of DoD Components and other authorized addressees except
that a receipt is not required when there is a hand-to-hand
transfer between U.S. personnel and the recipient acknowledges
responsibility for the Secret information.

8-202.3.  Receipts for Confidential information are
not required except when the information is transmitted
to a foreign government (including foreign government
embassies located in the United States) or upon request.

8-202.4.  Receipts shall be provided by the transmitter
of the material and the forms shall be attached to the
inner cover.

8-202.4.1.  Postcard receipt forms may be used.

8-202.4.2.  Receipt forms shall be unclassified and
contain only such information as is necessary to identify
the material being transmitted.

8-202.4.3.  Receipts shall be retained for at least
2 years.

8-202.5.  In those instances where a fly-leaf (page
check) form is used with classified publications, the
postcard receipt will not be required.

8-202.6.  THE CUSTODIAN'S WHITE AND COURIER'S GREEN
COPIES OF SD FORM 120 SHALL BE ANNOTATED "SEALED ENVELOPE"
OR "SEALED PACKAGE," DEPENDING IF THE MATERIAL IS AN
ENVELOPE OR A PACKAGE.   THE SD FORM 120 SHALL BE ATTACHED
TO THE OUTER ENVELOPE OR WRAPPER.

8-202.7.  THE RECIPIENT'S PINK AND THE OSD COMPONENT'S
CARD COPIES OF SD FORM 120 SHALL BE INCLUDED IN THE
INNER ENVELOPE OR WRAPPER WITH THE CLASSIFIED MATERIAL.

8-202.8.  RECEIPTS FOR CLASSIFIED INFORMATION SHALL
NOT CONTAIN ANY CLASSIFIED INFORMATION.

8-203.  Exceptions.   Exceptions may be authorized to
the requirements contained in this Chapter by the Head
of the Component concerned or designee, provided the
exception affords equal protection and accountability
to that provided above.   Proposed exceptions that do
not meet these minimum standards shall be submitted
to the DUSD(P) for approval.

8-203.1.  WITHIN BUILDINGS, TRANSMISSION OF CLASSIFIED
DOCUMENTS AND MATERIAL DOES NOT REQUIRE THE USE OF SEALED
ENVELOPES.   IF THE FACE OF THE CLASSIFIED DOCUMENT
OR MATERIAL CONTAINS CLASSIFIED INFORMATION, THE APPLICABLE
COVER SHEET SHALL BE AFFIXED.

8-203.2.  BETWEEN BUILDINGS WITHIN THE NATIONAL CAPITAL
REGION, A SINGLE ENVELOPE, BRIEFCASE, OR SIMILAR OPAQUE
WRAPPING MAY BE USED AS AN OUTER WRAPPING TO HANDCARRY
CLASSIFIED DOCUMENTS OR MATERIAL.   THIS OUTER COVER
SHALL NOT DISPLAY ANY MARKING THAT SHOULD INDICATE THAT
CLASSIFIED INFORMATION IS BEING CARRIED.   A COVER SHEET,
ENVELOPE MARKED WITH THE CLASSIFICATION OF THE INFORMATION,
OR SIMILAR COVERING SHALL SERVE AS THE INNER ENVELOPE.
  THIS INNER COVERING SHALL NOT DISPLAY CLASSIFIED INFORMATION.

8-203.2.1.  THE PERSON CARRYING THE CLASSIFIED INFORMATION
WILL MAINTAIN IT UNDER PHYSICAL CONTROL AT ALL TIMES
UNTIL IT IS RETURNED TO A SECURE AREA OR PROPERLY DELIVERED
TO THE INTENDED RECIPIENT.

8-203.2.2.  PACKAGES CONTAINING CLASSIFIED MATERIAL
THAT ARE REMOVED FROM THE PENTAGON MUST BE ACCOMPANIED
BY A PROPERLY AUTHENTICATED PROPERTY PASS, OPTIONAL
FORM 7.   THE FOLLOWING CAVEAT SHALL BE TYPED IN ITEM
4:   "CONTENTS CLASSIFIED NOT SUBJECT TO INSPECTION.
  CONFIRMATION MAY BE OBTAINED BY CALLING _______________________."

8-203.2.3.  NOTWITHSTANDING THE ABOVE EXCEPTIONS, IF
THE PERSON CARRYING THE INFORMATION HAS NO OFFICIAL
REQUIREMENT FOR ACCESS TO ITS CONTENTS.   IT SHALL BE
ENCLOSED IN A SEALED INNER ENVELOPE OR WRAPPING.   THE
PERSON CARRYING THE INFORMATION MUST HAVE A SECURITY
CLEARANCE AT LEAST AS HIGH AS THE INFORMATION.

8-204.  TRACER SYSTEM 

8-204.1.  EACH OFFICE OR ACTIVITY THAT DISPATCHES CLASSIFIED
MATERIAL REQUIRING A RECEIPT SHALL ESTABLISH AN INTERNAL
SUSPENSE FOR RECEIVING THE RETURN RECEIPT.

8-204.2.  THE ORIGINATING OSD COMPONENT SHALL INITIATE
TRACER ACTION BY TELEPHONE OR IN WRITING.   THE FIRST
AND SECOND TRACERS SHALL BE ADDRESSED TO THE ADDRESSEE
OF THE MATERIAL.   IF THE ADDRESSEE CLAIMS THAT THE
MATERIAL WAS NOT RECEIVED OR IF THE SECOND TRACER IS
NOT ACKNOWLEDGED, THE SECURITY MANAGER OF THE OSD COMPONENT
IMMEDIATELY SHALL NOTIFY THE CORRESPONDENCE CONTROL
DIVISION AND REQUEST INVESTIGATIVE ACTION.   UPON COMPLETION
OF INVESTIGATION, THE CORRESPONDENCE CONTROL DIVISION
SHALL FORWARD THE RESULTS THEREOF TO THE ORIGINATING
OSD COMPONENT FOR PROPER ACTION.

8-204.3.  THE FOLLOWING TIME LIMITS SHALL BE OBSERVED:

8-204.3.1.  THE FIRST TRACER ACTION TIME LIMIT SHALL
BE 15 DAYS AFTER THE DATE THE MATERIAL WAS DISPATCHED
FOR U.S.-ADDRESSED MAIL AND 30 DAYS AFTER THE DATE THE
MATERIAL WAS DISPATCHED FOR OVERSEAS-ADDRESSED MAIL.

8-204.3.2.  THE SECOND TRACER ACTION TIME LIMIT SHALL
BE 30 DAYS AFTER THE DATE THE MATERIAL WAS DISPATCHED
FOR U.S.-ADDRESSED MAIL AND 45 DAYS AFTER THE DATE THE
MATERIAL WAS DISPATCHED FOR OVERSEAS-ADDRESSED MAIL.

C8.3.  Section 3.    RESTRICTIONS, PROCEDURES, AND AUTHORIZATION
FOR ESCORT OR HAND-CARRYING OF CLASSIFIED INFORMATION


8-300.  General Restrictions.   Appropriately cleared
personnel may be authorized to escort or hand-carry
classified material between their duty station and an
activity to be visited subject to the following conditions:

8-300.1.  The storage provisions of Section C8.1. and
subsection 5-206. of Chapter 5 of this Regulation shall
apply at all stops enroute to the destination, unless
the information is retained in the personal possession
and under constant surveillance of the individual at
all times.   The hand-carrying of classified information
on trips that involve an overnight stop is not permissible
without advance arrangements for proper overnight storage
in a U.S. Government facility or, if in the United States,
a cleared contractor's facility that has the requisite
storage capability.

8-300.2.  Classified material shall not be read, studied,
displayed, or used in any manner in public conveyances
or places.

8-300.3.  When classified material is carried in a private,
public, or Government conveyance, it shall not be placed
in any detachable storage compartment such as automobile
trailers, luggage racks, aircraft travel pods, or drop
tanks nor, under any circumstances, left unattended.

8-300.4.  Responsible officials shall provide a written
statement to all individuals escorting or carrying classified
material aboard commercial passenger aircraft authorizing
such transmission.   This authorization statement may
be included in official travel orders and should ordinarily
permit the individual to pass through passenger control
points without the need for subjecting the classified
material to inspection.   Specific procedures for carrying
classified documents aboard commercial aircraft are
contained in subsection 8-302.

8-300.5.  Each activity shall list all classified information
carried or escorted by traveling personnel.   All classified
information shall be accounted for.

8-300.6.  Individuals authorized to hand-carry or escort
classified material shall be fully informed of the provisions
of this Chapter, and shall sign a statement to that
effect prior to the issuance of written authorization
or identification media.   This statement shall be retained
for a minimum of 2 years; it need not be executed on
each occasion that the individual is authorized to transport
classified information provided a signed statement is
on file.

8-301.  Restrictions on Hand-carrying Classified Information
Aboard Commercial Passenger Aircraft.   Classified information
shall not be hand-carried aboard commercial passenger
aircraft unless:

8-301.1.  There is neither time nor means available
to move the information in the time required to accomplish
operational objectives or contract requirements.

8-301.2.  The hand-carry has been authorized by an appropriate
official in accordance with subsection 8-303.

8-301.3.  In the case of the hand-carry of classified
information across international borders, arrangements
have been made to ensure that such information will
not be opened by customs, border, postal, or other inspectors,
either U.S. or foreign.

8-301.4.  The hand-carry is accomplished aboard a U.S.
carrier.   Foreign carriers will be utilized only when
no U.S. carrier is available and then the approving
official must ensure that the information will remain
in the custody and physical control of the U.S. escort
at all times.

8-301.5.  HAND-CARRYING SHALL NOT BE DONE EXCEPT IN
TIME-CRITICAL OR EMERGENCY SITUATIONS AND UNTIL ALL
OTHER, MORE SECURE, METHODS OF TRANSMISSION HAVE BEEN
CONSIDERED AND DETERMINED TO BE IMPRACTICAL AND WHERE
THE MATERIAL IS NOT AVAILABLE OR MAY NOT BE OBTAINED
PROMPTLY AT THE TRAVELER'S DESTINATION.   PARAGRAPHS
8-101., 8-102., AND 8-103., ABOVE, PRESCRIBE THE PREFERRED
METHODS OF TRANSMITTING CLASSIFIED MATERIAL.   IT IS
PROHIBITED SPECIFICALLY TO DELAY PREPARING CLASSIFIED
INFORMATION FOR TRANSMITTAL OR TO NEGLECT USING ONE
OF THE PREFERRED METHODS OF TRANSMITTAL TO CREATE AN
ARTIFICIAL TIME-CRITICAL SITUATION WHEREIN HAND-CARRYING
ABOARD COMMERCIAL AIRCRAFT BECOMES NECESSARY.

8-302.  Procedures for Hand-carrying Classified Information
Aboard Commercial Passenger Aircraft 

8-302.1.  Basic requirements.

8-302.1.1.  Advance and continued coordination by the
DoD activity and contractor officials shall be made
with departure airline and terminal officials and, when
possible, with intermediate transfer terminals to develop
mutually satisfactory arrangements within the terms
of this issuance and Federal Aviation Administration
(FAA) guidance.   Specifically, a determination should
be made beforehand whether documentation described in
paragraph 8-302.4., below, will be required.   Local
FAA Security Officers can be of assistance in making
this determination.   To aid coordination and planning,
a listing of FAA field offices is at Appendix 4.

8-302.1.2.  The individual designated as courier shall
be in possession of either DD Form 2, "Armed (or Uniformed)
Services Identification Card" (any color), or other
DoD or contractor picture identification card and written
authorization to carry classified information.

8-302.2.  Procedures for carrying classified information
in envelopes.   Persons carrying classified information
should process through the airline ticketing and boarding
procedure the same as all other passengers except for
the following:

8-302.2.1.  The classified information being carried
shall contain no metal bindings and shall be contained
in sealed envelopes.   Should such envelopes be contained
in a briefcase or other carry-on luggage, the briefcase
or luggage shall be routinely offered for opening for
inspection for weapons.   The screening officials may
check envelopes by X-ray machine, flexing, feel, and
weight, without opening the envelopes themselves.

8-302.2.2.  Opening or reading of the classified document
by the screening official is not permitted.

8-302.3.  Procedures for transporting classified information
in packages.   Classified information in sealed or packaged
containers shall be processed as follows:

8-302.3.1.  The Government or contractor official who
has authorized the transport of the classified information
shall notify the appropriate air carrier in advance.

8-302.3.2.  The passenger carrying the information shall
report to the affected airline ticket counter before
boarding, present his documentation, and the package
or cartons to be exempt from screening.   The airline
representative will review the documentation and description
of the containers to be exempt.

8-302.3.3.  If satisfied with the identification of
the passenger and his documentation, the official will
provide the passenger with an escort to the screening
station and authorize the screening personnel to exempt
the container from physical or other type inspection.

8-302.3.4.  If the airline official is not satisfied
with the identification of the passenger or the authenticity
of his documentation, the passenger will not be permitted
to board, and not be subject to further screening for
boarding purposes.

8-302.3.5.  The actual loading and unloading of the
information will be under the supervision of a representative
of the air carrier; however, appropriately cleared personnel
shall accompany the material and keep it under surveillance
during loading and unloading operations.   In addition,
appropriately cleared personnel must be available to
conduct surveillance at any intermediate stops where
the cargo compartment is to be opened.

8-302.3.6.  DoD Components and contractor officials
shall establish and maintain appropriate liaison with
local FAA officials, airline representatives and airport
terminal administrative and security officials.   Prior
notification is emphasized to ensure that the airline
representative can make timely arrangements for courier
screening.

8-302.4.  Documentation.

8-302.4.1.  When authorized to carry sealed envelopes
or containers containing classified information, both
Government and contractor personnel shall present an
identification card carrying a photograph, descriptive
data, and signature of the individual.   (If the identification
card does not contain date of birth, height, weight,
and signature, these items must be included in the written
authorization.)

8-302.4.1.1.  DoD personnel shall present an official
identification issued by U.S. Government Agency.

8-302.4.1.2.  Contractor personnel shall present identification
issued by the contractor or the U.S. Government.   Contractors'
identification cards shall carry the name of the employing
contractor, or otherwise be marked to denote "contractor."

8-302.4.1.3.  The courier shall have the original of
the authorization letter.   A reproduced copy is not
acceptable; however, the traveler shall have sufficient
authenticated copies to provide a copy to each airline
involved.   The letter shall be prepared on letterhead
stationary of the Agency or contractor authorizing the
carrying of classified material.   In addition, the
letter shall:

8-302.4.1.3.1.  Give the full name of the individual
and his employing Agency or company;

8-302.4.1.3.2.  Describe the type of identification
the individual will present (for example, Naval Research
Laboratory Identification Card, No. 1234; ABC Corporation
Identification Card No. 1234);

8-302.4.1.3.3.  Describe the material being carried
(for example, three sealed packages, 9" x 8" x 24,"
addressee and addressor);

8-302.4.1.3.4.  Identify the point of departure, destination,
and known transfer points;

8-302.4.1.3.5.  Carry a date of issue and an expiration
date;

8-302.4.1.3.6.  Carry the name, title, and signature
of the official issuing the letter.   Each package or
carton to be exempt shall be signed on its face by the
official who signed the letter; and

8-302.4.1.3.7.  Carry the name of the Government Agency
designated to confirm the letter of authorization, and
its telephone number.   The telephone number of the
Agency designated shall be an official U.S. Government
number.

8-302.4.2.  Information relating to the issuance of
DoD identification cards is contained in DoD Instruction
1000.13 (reference (xx)).   The green, gray, and red
DD Forms 2 and other DoD and contractor picture ID card
are acceptable to FAA.

8-302.4.3.  The Director, DIS, shall establish standards
for the issuance of identification cards when required
by contractor employees selected as couriers or whose
duties will involve hand-carrying of classified material.

8-303.  Authority to Approve Escort or Hand-carry of
Classified Information Aboard Commercial Passenger Aircraft


8-303.1.  Within the United States, its Territories,
and Canada.

8-303.1.1.  DoD Component officials who have been authorized
to approve travel orders and designate couriers may
approve the escort or hand-carry of classified information
within the United States, its Territories, and Canada.

8-303.1.2.  The Director, DIS, may authorize contractor
personnel to hand-carry classified material in emergency
or time-sensitive situations subject to adherence with
the procedures and limitations specified in this section.

8-303.1.3.  OSD COMPONENT SECURITY MANAGER SHALL AUTHORIZE
ESCORT OR HAND CARRYING OF CLASSIFIED MATERIAL WITHIN
THE UNITED STATES, ITS TERRITORIES AND POSSESSIONS;
AND CANADA.

8-303.2.  Outside the United States, its Territories,
and Canada.   The Head of a DoD Component, or single
designee at the headquarters or major command level,
may authorize the escort or hand-carrying of classified
information outside the area encompassed by the boundaries
of United States, its Territories, and Canada upon certification
by the requestor that:

8-303.2.1.  The material is not present at the destination;

8-303.2.2.  The material is needed urgently for a specified
official purpose; and

8-303.2.3.  There is a specified reason that the material
could not be transmitted by other approved means to
the destination in sufficient time for the stated purpose.

8-303.2.4.  THE DIRECTOR, PSD, HAS SOLE AUTHORITY TO
PERMIT THE ESCORT OR HAND-CARRYING OF CLASSIFIED INFORMATION
OUTSIDE THE UNITED STATES, ITS TERRITORIES, AND CANADA.

8-303.2.5.  THE DIRECTOR, CORRESPONDENCE AND DIRECTIVES,
IS AUTHORIZED TO PROVIDE COURIER SUPPORT FOR THE SECRETARY
OF DEFENSE AND DEPUTY SECRETARY OF DEFENSE VISITS TO
FOREIGN COUNTRIES.   DESIGNATED COURIERS SHALL READ
AND COMPLY WITH APPENDIX 6, BELOW.

8-303.2.6.  THE REQUESTING OFFICIAL SHALL:

8-303.2.6.1.  PREPARE AND SIGN A MEMORANDUM REQUESTING
APPROVAL FOR HAND-CARRYING CLASSIFIED MATERIAL AS OUTLINED
IN FIGURE 11, BELOW.   ONLY THE ORIGINAL SIGNATURE OF
THE COURIER SHALL BE ACCEPTED FOR APPROVAL.

8-303.2.6.2.  PREPARE A LETTER OF AUTHORIZATION AS OUTLINED
IN FIGURE 12, BELOW.   THE EXPIRATION DATE OF THE LETTER
OF AUTHORIZATION SHALL NOT EXCEED 3 DAYS BEYOND THE
DATE THE TRAVEL IS COMPLETED:   RECURRING OR "BLANKET"
LETTERS OF AUTHORIZATION ARE PROHIBITED.

8-303.2.6.3.  THE MEMORANDUM AND AUTHORIZATION LETTER
SHALL BE SUBMITTED TO PSD FOR APPROVAL AS FAR IN ADVANCE
OF THE DEPARTURE DATE AS POSSIBLE.

 FIGURE 11.

 FIGURE 12.

C9.  CHAPTER 9

DISPOSAL AND DESTRUCTION

9-100.  Policy.   Documentary record information originated
or received by a DoD Component in connection with the
transaction of public business, and preserved as evidence
of the organization, functions, policies, operations,
decisions, procedures, or other activities of any U.S.
Government Department or Agency or because of the informational
value of the data contained therein, may be disposed
of or destroyed only in accordance with DoD Component
record management regulations.   Nonrecord classified
information, and other material of similar temporary
nature, shall be destroyed when no longer needed under
procedures established by the Head of the cognizant
DoD Component.   These procedures shall incorporate,
means of verifying the destruction of classified information
and material and be consistent with the following requirements.

9-101.  Methods of Destruction.   Classified documents
and material shall be destroyed by burning or, with
the approval of the cognizant DoD Component head or
designee, by melting, chemical decomposition, pulping,
pulverizing, cross-cut shredding, or mutilation sufficient
to preclude recognition or reconstruction of the classified
information.   (Strip shredders purchased prior to the
effective date of this Regulation may continue to be
used but only in circumstances where reconstruction
of the residue is precluded.   Shredding significant
amounts of unclassified material together with classified
material normally will meet this requirement.)

9-102.  Destruction Procedures 

9-102.1.  Procedures shall be instituted that ensure
all classified information intended for destruction
actually is destroyed.   Destruction records and imposition
of a two-person rule, that is, having two cleared persons
involved in the entire destruction process, will satisfy
this requirement for Top Secret information.   Imposition
of a two-person rule, without destruction records, will
satisfy this requirement for Secret information, as
will use of destruction records without imposition of
the two-person rule.   Only one cleared person needs
to be involved in the destruction process for Confidential
information.

9-102.2.  When burn bags are used for the collection
of classified material that is to be destroyed at central
destruction facilities, such bags shall be controlled
in a manner designed to minimize the possibility of
their unauthorized removal and the unauthorized removal
of their classified contents prior to actual destruction.
  When filled, burn bags shall be sealed in a manner
that will facilitate the detection of any tampering
with the bag.

9-102.3.  Procedures to ensure that all classified information
intended for destruction actually is destroyed, other
than those in paragraphs 9-102.1. and 9-102.2., above,
shall be submitted to the DoD Component's senior offical
(subsections 13-301. and 13-302.) for approval.

9-103.  Records of Destruction 

9-103.1.  Records of destruction are required for Top
Secret information.   The record shall be dated and
signed at the time of destruction by two persons cleared
for access to Top Secret information.   However, in
the case of Top Secret information placed in burn bags
for central disposal, the destruction record may be
signed by the officials when the information is so placed
and the bags are sealed.   Top Secret burn bags shall
be numbered serially and a record kept of all subsequent
handling of the bags until they are destroyed.   This
record may be in lieu of actual burn bag receipts and
shall be maintained for a minimum of 2 years.

9-103.1.1.  TOP SECRET DOCUMENTS, ENCLOSURES, AND ATTACHMENTS
SHALL BE RECORDED INDIVIDUALLY AND IDENTIFIED ON SD
FORM 188, "REQUEST FOR AND CERTIFICATION OF CLASSIFIED
MATERIAL."

9-103.1.2.  SD FORM 188 SHALL BE SERIAL NUMBERED IN
CALENDAR YEAR SERIES.   WHEN SEVERAL PAGES ARE PREPARED
AT ONE TIME, ONLY THE LAST PAGE NEEDS TO BE SIGNED BY
THE OFFICIALS CONCERNED WITH DESTRUCTION.   ALL PRECEDING
PAGES SHALL BE INITIALED BY THE OFFICIALS.   THE REMARK
"NOTHING FOLLOWS" SHALL BE ENTERED ON THE FIRST LINE
FOLLOWING THE LAST ENTRY ON THE CERTIFICATE.

9-103.1.3.  COMPLETION OF THE "SIGNATURE OF CUSTODIAN"
BLOCK OF SD FORM 188 SHALL BE ACCOMPLISHED BY THE PERSON
PLACING THE TOP SECRET DOCUMENT IN THE BURN BAG.   THE
"SIGNATURE OF DESTROYING OFFICER(S)" BLOCK SHALL BE
ACCOMPLISHED BY THE PERSON SEALING THE BURN BAG.

9-103.2.  Records of destruction of Secret and Confidential
information are not required except for NATO Secret
and some limited categories of specially controlled
Secret information.   When records of destruction are
used for Secret information, only one cleared person
has to sign such records.   (DoD Directive 5100.55 (reference
(ee)) provides guidance on the destruction of NATO classified
material.)

9-103.3.  Records of destruction shall be maintained
for 2 years.

9-104.  Classified Waste.   Waste material, such as
handwritten notes, carbon paper, typewriter ribbons,
and working papers that contains classified information
must be protected to prevent unauthorized disclosure
of the information.   Classified waste shall be destroyed
when no longer needed by a method described in subsection
9-101.   Destruction records are not required.

9-105.  Classified Document Retention 

9-105.1.  Classified documents that are not permanently
valuable records of the Government shall not be retained
more than 5 years from the date of origin, unless such
retention is authorized by and in accordance with DoD
Component record disposition schedules.

9-105.2.  Throughout the Department of Defense, the
head of each activity shall establish at least one clean-out
day each year where a portion of the work performed
in every office with classified information stored is
devoted to the destruction of unneeded classified holdings.

   

THE HEAD OF THE OSD COMPONENTS SHALL DETERMINE THE SPECIFIC
DATE(S) FOR ANNUAL REVIEWS OF CLASSIFIED DOCUMENTS.
  ALL CLASSIFIED FILES MUST BE REVIEWED BY THE END OF
THE CALENDAR YEAR.

9-106.  DESTRUCTION PROCEDURES 

9-106.1.  PREPRINTED RED AND WHITE STRIPED BAG SHALL
BE USED FOR THE PACKAGING OF CLASSIFIED MATERIAL FOR
DESTRUCTION.   IF THESE BAGS ARE UNAVAILABLE, PLAIN
BROWN BAGS SHALL BE MARKED WITH BOLD RED STRIPES AND
USED AS A SUBSTITUTE.   THESE BAGS SHALL NOT BE USED
TO PACKAGE CLASSIFIED MATERIAL NOT INTENDED FOR DELIVERY
TO A DESTRUCTION FACILITY OR TO CARRY PERSONAL ITEMS.

9-106.2.  WHEN PLACED IN USE, THE BAG SHALL BE MARKED
WITH THE ROOM NUMBER AND TELEPHONE NUMBER OF THE OSD
COMPONENT.   IF THE BAG CONTAINS TOP SECRET MATERIAL,
THE BAG SHALL BE MARKED WITH A SERIAL NUMBER.

9-106.3.  CLASSIFIED WASTE MATERIAL SHALL BE PLACED
IN A BAG.   THE CONTENTS OF THE BAG SHALL NOT EXCEED
10 POUNDS OR THREE-FOURTHS OF THE BAG'S CONTENT.   WASTE
MATERIALS SUCH AS UNCLASSIFIED PAPERS, DISCARDED FOOD
AND BEVERAGE CONTAINERS, GLASS, METAL, NEWSPAPERS, MAGAZINES,
OR SIMILAR ITEMS SHALL NOT BE PLACED IN THE BURN BAGS.

9-106.4.  THE FILLED BAG SHALL BE SEALED WITH I INCH
MASKING TAPE OR THE OPEN END FOLDED AT LEAST ONCE AND
STAPLED EVERY 2 INCHES.

9-106.5.  PERSONNEL SHALL COMPLETE THE DESTRUCTION CERTIFICATE
AS DESCRIBED IN PARAGRAPH 9-103.1., ABOVE.   THE BURN
BAGS SHALL BE DELIVERED TO DESIGNATED COLLECTION POINTS
AT SPECIFIED TIMES.   FOR INFORMATION ON THE COLLECTION
POINTS OR SPECIFIED TIMES, TELEPHONE THE PENTAGON DESTRUCTION
FACILITY AT 695-1828.

C10.  CHAPTER 10

SECURITY EDUCATION

10-100.  Responsibility and Objectives.    Heads of
DoD Components shall establish security education programs
for their personnel.   Such programs shall stress the
objectives of improving the protection of information
that requires it.   They shall also place emphasis on
the balance between the need to release the maximum
information appropriate under the Freedom of Information
Act (DoD Directive 5400.7, reference (p)) and the interest
of the Government in protecting the national security.

10-101.  Scope and Principles.   The security education
program shall include all personnel authorized or expected
to be authorized access to classified information. 
 Each DoD Component shall design its program to fit
the requirements of different groups of personnel. 
 Care must be exercised to assure that the program does
not evolve into a perfunctory compliance with formal
requirements without achieving the real goals of the
program.   The program shall, as a minimum, be designed
to:

10-101.1.  Advise personnel of the adverse effects to
the national security that could result from unauthorized
disclosure and of their personal, moral, and legal responsibility
to protect classified information within their knowledge,
possession, or control;

10-101.2.  Indoctrinate personnel in the principles,
criteria, and procedures for the classification, downgrading,
declassification, marking, control and accountability,
storage, destruction, and transmission of classified
information and material, as prescribed in this Regulation,
and alert them to the strict prohibitions against improper
use and abuse of the classification system;

10-101.3.  Familiarize personnel with procedures for
challenging classification decisions believed to be
improper;

10-101.4.  Familiarize personnel with the security requirements
of their particular assignment;

10-101.5.  Inform personnel of the techniques employed
by foreign intelligence activities in attempting to
obtain classified information, and their responsibility
to report such attempts;

10-101.6.  Advise personnel of the penalties for engaging
in espionage activities;

10-101.7.  Advise personnel of the strict prohibition
against discussing classified information over an unsecure
telephone or in any other manner that permits interception
by unauthorized persons;

10-101.8.  Inform personnel of the penalties for violation
or disregard of the provisions of this Regulation (see
paragraph 14-101.2.);

10-101.9.  Instruct personnel that individuals having
knowledge, possession, or control of classified information
must determine, before disseminating such information,
that the prospective recipient has been cleared for
access by competent authority; needs the information
in order to perform his or her official duties; and
can properly protect (or store) the information.

10-101.10.  INFORM NEWLY ASSIGNED PERSONNEL, INCLUDING
CONSULTANTS AND EXPERTS, AS TO THE PROPER PROCEDURES
FOR THE PROTECTION OF CLASSIFIED MATERIALS AND INFORMATION
DURING OFFICE ORIENTATIONS.   NEWLY ASSIGNED PERSONS
MAY NOT BE MADE SOLELY RESPONSIBLE FOR SECURING CLASSIFIED
MATERIALS OR OFFICES UNTIL THEY HAVE COMPLETED SECURITY
ORIENTATIONS AND TRAINING DESIGNED TO FAMILIARIZE THEM
WITH PROPER STORAGE AND OFFICE CLOSING PROCEDURES. 
 GENERAL KNOWLEDGE OF THE TOTAL CONTENT OF THIS REGULATION
MAY BE ACCOMPLISHED BEST BY INDIVIDUAL STUDY REINFORCED
BY DISCUSSION WITH THE OSD COMPONENT SECURITY MANAGER
ON SPECIFIC POLICY AND PROCEDURES RELATED TO THE INDIVIDUAL'S
ASSIGNMENT.

10-101.11.  ADVISE PERSONNEL OF THE REQUIREMENTS TO
REPORT SUCH MATTERS AS:

10-101.11.1.  PHYSICAL SECURITY DEFICIENCIES.

10-101.11.2.  POSSIBLE LOSS OR COMPROMISE OF CLASSIFIED
MATERIAL.

10-101.11.3.  INFORMATION THAT MIGHT REFLECT ADVERSELY
ON THE TRUSTWORTHINESS OF AN INDIVIDUAL WHO HAS ACCESS
TO CLASSIFIED INFORMATION.

10-101.11.3.1.  INFORM PERSONNEL OF THE PROPER METHODS
AND CHANNELS FOR REPORTING MATTERS OF SECURITY INTEREST.

10-102.  Initial Briefings.   DoD personnel granted
a security clearance (see subsection 7-100.) shall not
be permitted to have access to classified information
until they have received an initial security briefing
and have signed Standard Form 189, "Classified Information
Nondisclosure Agreement."   DoD 5200.1-PH-1 (reference
(ccc)) provides a sample briefing and additional information
regarding Standard Form 189.   Cleared personnel employed
prior to the effective date of this Regulation must
sign Standard Form 189 as soon as practicable but not
later than February 28, 1990.

10-102.1.  THE OSD COMPONENT OR ALTERNATE(S) SECURITY
MANAGERS SHALL PROVIDE THE INITIAL SECURITY BRIEFINGS
TO PERMANENT AND TEMPORARY ASSIGNED PERSONNEL.   THE
INITIAL SECURITY BRIEFING AND CLASSIFIED INFORMATION
NONDISCLOSURE AGREEMENT BRIEFING BOOKLET SHALL BE USED
TO SATISFY THE REQUIREMENT.   HOWEVER, THE INDOCTRINATION
SPECIFICALLY MUST ADDRESS THE SECURITY ASPECTS OF THE
ASSIGNMENT AND TAKE INTO ACCOUNT THE EXPERIENCE LEVEL
OF THE PERSON TO DETERMINE THEIR KNOWLEDGE OF THE REQUIREMENTS
FOR SAFEGUARDING CLASSIFIED INFORMATION.

10-102.2.  OSD COMPONENT SECURITY MANAGERS MAY OBTAIN
THE BRIEFING BOOKLET FROM PSD.

10-102.3.  THE STANDARD FORM 189 SHALL BE SIGNED AND
FORWARDED TO PERSONNEL SECURITY DIVISION, DIRECTORATE
OF PERSONNEL AND SECURITY, WHS.

10-103.  Refresher Briefings.   Programs shall be established
to provide, at a minimum, annual security training for
personnel having continued access to classified information.
  The elements outlined in subsection 10-101. shall
be tailored to fit the needs of experienced personnel.

10-103.1.  THE OSD COMPONENT OR ALTERNATES(S) SECURITY
MANAGERS SHALL PROVIDE THE REFRESHER SECURITY BRIEFING
FOR ALL PERSONNEL EACH CALENDAR YEAR.   ATTENDANCE IS
MANDATORY.   MATERIALS SUCH AS VIDEO TAPE RECORDINGS,

SECURITY POSTERS, HANDOUTS, AND OTHER RELATED INSTRUCTIONAL
MATERIAL MAY BE OBTAINED FROM PSD.

10-103.2.  A WRITTEN REPORT SHALL BE SUBMITTED TO PSD
GIVING THE NAMES OF THE INDIVIDUALS WHO ATTENDED THE
TRAINING AND THE MATERIAL AND/OR TOPICS COVERED.

10-104.  Foreign Travel Briefings 

10-104.1.  Personnel who have had access to classified
information shall be given a foreign travel briefing,
before travel, to alert them to their possible exploitation
under the following conditions:

10-104.1.1.  Travel to or through Communist-controlled
countries; and

10-104.1.2.  Attendance at international scientific,
technical, engineering or other professional meetings
in the United States or in any country outside the United
States where it can be anticipated that representatives
of Communist-controlled countries will participate or
be in attendance.   (See also DoD Directive 5240.6 (reference
(gg)).)

10-104.2.  Individuals who travel frequently, or attend
or host meetings of foreign visitors as described in
10-104.1.2., above, need not be briefed for each occasion,
but shall be provided a thorough briefing at least once
every 6 months and a general reminder of security responsibilities
before each such activity.

10-104.3.  ALL MILITARY AND CIVILIAN PERSONNEL ASSIGNED
TO OSD, HAVING ACCESS TO CLASSIFIED MATERIAL, SHALL
RECEIVE A FOREIGN TRAVEL BRIEFING FROM PERSONNEL SECURITY
DIVISION, DIRECTORATE OF PERSONNEL AND SECURITY, WHS.

10-105.  Termination Briefings 

10-105.1.  Upon termination of employment, administrative
withdrawal of security clearance, or contemplated absence
from duty or employment for 60 days or more, DoD military
personnel and civilian employees shall be given a termination
briefing, return all classified material, and execute
a Security Termination Statement.   This statement shall
include:

10-105.1.1.  An acknowledgment that the individual has
read the appropriate provisions of the Espionage Act
(reference (yy)), other criminal statutes, DoD regulations
applicable to the safeguarding of classified information
to which the individual has had access, and understands
the implications thereof;

10-105.1.2.  A declaration that the individual no longer
has any documents or material containing classified
information in his or her possession;

10-105.1.3.  An acknowledgement that the individual
will not communicate or transmit classified information
to any unauthorized person or Agency; and

10-105.1.4.  An acknowledgement that the individual
will report without delay to the FBI or the DoD Component
concerned any attempt by any unauthorized person to
solicit classified information.

10-105.2.  When an individual refuses to execute a Security
Termination Statement, that fact shall be reported immediately
to the security manager of the cognizant organization
concerned.   In any such case, the individual involved
shall be debriefed orally.   The fact of a refusal to
sign a Security Termination Statement shall be reported
to the Director, Defense Investigative Service who shall
ensure that it is recorded in the Defense Central Index
of Investigations.

10-105.3.  The security termination statement shall
be retained by the DoD Component that authorized the
individual access to classified information for the
period specified in the Component's record retention
schedules, but for a minimum of 2 years after the individual
is given a termination briefing.

10-105.4.  ALL MILITARY AND CIVILIAN PERSONNEL ASSIGNED
TO OSD SHALL RECEIVE A TERMINATION BRIEFING FROM PERSONNEL
SECURITY DIVISION, DIRECTORATE OF PERSONNEL AND SECURITY,
WHS.

C11.  CHAPTER 11

FOREIGN GOVERNMENT INFORMATION

C11.1.  Section 1.   CLASSIFICATION 

11-100.  Classification 

11-100.1.  Foreign government information classified
by a foreign government or international organization
of governments all retain its original classification
designation or be assigned a U.S. classification designation
that will ensure a degree of protection equivalent to
that required by the Government or organization that
furnished the information.   Original classification
authority is not required for this purpose.

11-100.2.  Foreign government information that was not
classified by a foreign entity but was provided with
the expectation, expressed or implied, that the information,
the source of the information, or both, are to be held
in confidence must be classified by an original classification
authority.   The two-step procedure for classification
prescribed in subsection 2-202. does not apply to the
classification of such foreign government information
because E.O. 12356 (reference (g)) states a presumption
of damage to the national security in the event of unauthorized
disclosure of such information.   Therefore, foreign
government information shall be classified at least
Confidential, but higher whenever the damage criteria
of subsections 1-501. or 1-502. are determined to be
met.

11-101.  Duration of Classification 

11-101.1.  Foreign government information shall not
be assigned a date or event for automatic declassification
unless specified or agreed to by the foreign entity.

11-101.2.  Foreign government information classified
by the Department of Defense under this or previous
Regulations shall be protected for an indefinite period
(see subsection 11-304.).

C11.2.  Section 2.   DECLASSIFICATION 

11-200.  Policy.   In considering the possibility of
declassification of foreign government information,
officials shall respect the intent of this Regulation
to protect foreign government information and confidential
foreign sources.

11-201.  Systematic Review.   When documents containing
foreign government information are encountered during
the systematic review process they shall be referred
to the originating Agency for a declassification determination.
  Consultation with the foreign originator through appropriate
channels may be necessary before final action can be
taken.

11-202.  Mandatory Review.   Requests for mandatory
review for declassification of foreign government information
shall be processed and acted upon in accordance with
the provisions of section C3.3. of Chapter 3, except
that foreign government information will be declassified
only in accordance with the guidelines developed for
such purpose and after necessary consultation with other
DoD Components or Government Agencies with subject matter
interest.   When these guidelines cannot be applied
to the foreign government information requested, or
in the absence of such guidelines, consultation with
the foreign originator through appropriate channels
normally should be effected prior to final action taken
on the request.   When the responsible DoD Component
is knowledgeable of the foreign originator's view toward
declassification or continued classification of the
types of information requested, consultation with the
foreign originator may not be necessary.

C11.3.  Section 3.   MARKING 

11-300.  Equivalent U.S. Classification Designations.
  Except for the foreign security classification designation
RESTRICTED, foreign classification designations, including
those of international organizations of governments,
that is, NATO, generally parallel U.S. classification
designations.   A table of equivalents is contained
in Appendix 1.

11-301.  Marking NATO Documents.   Classified documents
originated by NATO, if not already marked with the appropriate
classification in English, shall be so marked.   Markings
required under subsection 4-402. shall not be placed
on documents originated by NATO.   Documents originated
by NATO that are marked RESTRICTED shall be marked with
the following additional notation:   "To be safeguarded
in accordance with USSAN Instruction 1-69" (see DoD
Directive 5100.55 (reference (ee))).

11-302.  Marking Other Foreign Government Documents


11-302.1.  If the security classification designation
of foreign government documents is shown in English,
no other classification marking shall be applied.  
If the foreign classification designation is not shown
in English, the equivalent overall U.S. classification
designation (see Appendix 1) shall be marked conspicuously
on the document.   When foreign government documents
are marked with a classification designation having
no U.S. equivalent, as in the last column of Appendix
1, such documents shall be marked in accordance with
paragraph 11-302.2., below.

11-302.2.  Certain foreign governments use a fourth
classification designation as shown in the last column
of Appendix 1.   Such designations equate to the foreign
classification RESTRICTED.   If foreign government documents
are marked with any of the classification designations
listed in the last column of Appendix 1, no other classification
marking shall be applied.   In all such cases, the notation,
"This classified material is to be safeguarded in accordance
with DoD 5200.1-R or DoD 5220.22-M," shall be shown
on the face of the document.

11-302.3.  Other marking requirements prescribed by
this Regulation for U.S. classified documents are not
applicable to documents of foreign governments or international
organizations of governments.

11-303.  Marking of DoD Classification Determinations.
  Foreign documents containing foreign government information
not classified by the foreign government but provided
to the Department of Defense in confidence shall be
classified as prescribed in paragraph 11-100.2. and
marked with the appropriate U.S. classification.

11-304.  Marking of Foreign Government Information in
DoD Documents 

11-304.1.  Except where such markings would reveal that
information is foreign government information when that
fact must be concealed, or reveal a confidential source
or relationship not otherwise evident in the document
or information, foreign government information incorporated
in DoD documents shall be identified in a manner that
ensures that such information is not declassified prematurely
or made accessible to nationals of a third country without
consent of the originator.   This requirement may be
satisfied by marking the face of the document "FOREIGN
GOVERNMENT INFORMATION," or with another marking that
otherwise indicates that the information is foreign
government information, and by including the appropriate
identification in the portion or paragraph classification
markings, for example, (NS) or (U.K.-C).   All other
markings prescribed by subsection 4-103. are applicable
to these documents.   In addition, DoD classified documents
that contain extracts of NATO classified information
shall bear a marking

substantially as follows on the cover or first page:
  "THIS DOCUMENT CONTAINS NATO CLASSIFIED INFORMATION."

11-304.2.  When foreign RESTRICTED or NATO RESTRICTED
information is included in an otherwise unclassified
DoD document, the DoD document shall be marked CONFIDENTIAL.
  All requirements of subsection 4-103. apply to such
documents.   Portion markings on such a document include,
for example, "(U)," "(NR)," and "(FRG-R)."   In addition,
the appropriate caveat from paragraph 11-304.1., above,
shall be included on the face of the document.

11-304.3.  The "Classified by" line of DoD documents
containing only foreign government information normally
shall be completed with the identity of the foreign
government or international organization involved, for
example, "Classified by Government of Australia," or
"Classified by NATO," provided that other requirements
of subsection 4-104. do not pertain to such documents.

11-304.4.  The "Declassify on" line of DoD documents
containing foreign government information normally shall
be completed with the notation, "Originating Agency's
Determination Required," or "OADR" (see subsections
4-600. and 11-101.).

C11.4.  Section 4.   PROTECTIVE MEASURES 

11-400.  NATO Classified Information.   NATO classified
information shall be safeguarded in accordance with
the provisions of DoD Directive 5100.55 (reference (ee)).

   

QUESTIONS CONCERNING THE RELEASABILITY OF INFORMATION
TO NATO SHOULD BE REFERRED TO THE DIRECTORATE FOR INFORMATION
SECURITY (ODUSD/P), ROOM 3C260, TELEPHONE 695-2686.
  INFORMATION ON ANY OTHER PART OF THE PROGRAM MAY BE
OBTAINED FROM THE OSD SUB-REGISTRY, ROOM 3A948, TELEPHONE
697-9287.

11-401.  Other Foreign Government Information 

11-401.1.  Classified foreign government information
other than NATO information shall be protected as is
prescribed by this Regulation for U.S. classified information
of a comparable classification.

11-401.2.  Foreign government information, unless it
is NATO information, that is marked under paragraphs
11-302.2. or 11-304.2. shall be protected as U.S. CONFIDENTIAL,
except that such information may be stored in locked
filing cabinets, desks, or other similar closed spaces
that will prevent access by unauthorized persons.

C12.  CHAPTER 12

SPECIAL ACCESS PROGRAMS

12-100.  Policy.   It is the policy of the Department
of Defense to use the security classification categories
and the applicable sections of E.O. 12356 (reference
(g)) and its implementing ISOO Directive (reference
(h)), to limit access to classified information on a
"need-to-know" basis to personnel who have been determined
to be trustworthy.   It is further policy to apply the
"need-to-know" principle in the regular system so that
there will be no need to resort to formal Special Access
Programs.   In this context, Special Access Programs
may be created or continued only on a specific showing
that:

12-100.1.  Normal management and safeguarding procedures
are not sufficient to limit "need-to-know" or access;
and

12-100.2.  The number of persons who will need access
will be reasonably small and commensurate with the objective
of providing extra protection for the information involved.

12-101.  Establishment of Special Access Programs 

12-101.1.  Procedures for the establishment of Special
Access Programs involving NATO classified information
are based on international treaty requirements (see
DoD Directive 5100.55 (reference (ee)).

12-101.2.  The policies and procedures for access to
and dissemination of Restricted Data and Critical Nuclear
Weapon Design Information are contained in DoD Directive
5210.2 (reference (dd)).

12-101.3.  Special Access Programs for foreign intelligence
information under the cognizance of the Director of
Central Intelligence, or those of the National Telecommunications
and Information Systems Security Committee originate
outside the Department of Defense.   However, coordination
with the DUSD(P) and the Component's central point of
contact is necessary before the establishment or implementation
of any such Programs by any DoD Component.   The information
required by paragraph 12-105.1. will be provided.

12-101.4.  Excluding those Programs specified in paragraphs
12-101.1., 12-101.2., and 12-101.3., above, Special
Access Programs shall be established within the Military
Departments by:

12-101.4.1.  Submitting to the Secretary of the Department
the information required under paragraph 12-105.1.;

12-101.4.2.  Obtaining written approval from the Secretary
of the Department;

12-101.4.3.  Providing to the DUSD(P) a copy of the
approval; and

12-101.4.4.  Maintaining the information and rationale
upon which approval was granted within the Military
Department's central office.

12-101.5.  Special Access Programs, other than those
specified in paragraphs 12-101.1., 12-101.2., and 12-101.3.,
above, that are desired to be established in any DoD
Component other than the Military Departments shall
be submitted with the information referred to in paragraph
12-105.1. to the DUSD(P) for approval.

12-102.  Review of Special Access Programs 

12-102.1.  Excluding those Programs specified in paragraphs
12-101.1., 12-101.2., or 12-101.3., each Special Access
Program shall be reviewed annually by the DoD Component
responsible for establishment of the Program.   To accommodate
such reviews, DoD Components shall institute procedures
to ensure the conduct of annual security inspections
and regularly scheduled audits by security, contract
administration, and audit organizations.

12-102.2.  Special Access Programs, excluding those
specified in paragraphs 12-101.1., 12-101.2., or 12-101.3.,
or those required by treaty or international agreement,
shall terminate automatically every 5 years unless reestablished
in accordance with the procedures contained in subsection
12-101.

12-103.  Control and Administration 

12-103.1.  Each DoD Component shall appoint an official
to act as a single point of contact for information
concerning the establishment and security administration
of all Special Access Programs established by or existing
in the Component.   Such official shall report to the
DUSD(P):

12-103.1.1.  The establishment of a Special Access Program
as required by paragraph 12-101.4.3.; and

12-103.1.2.  Changes in Program status as required by
paragraphs 12-105.2. or 12-105.3.

12-103.2.  Officials serving as single points of contact,
as well as members of their respective staffs and other
persons providing support to Special Access Programs
who require access to multiple sets of particularly
sensitive information, shall be subject to a counterintelligence-scope
polygraph examination periodically but not less than
once every 5 years.   Additionally, such testing will
be subject to the limitations imposed by Congress. 
 The program for each DoD Component, as well as requests
for waiver, shall be submitted for approval by the DUSD(P).

12-104.  Codewords and Nicknames.   Excluding those
Programs specified in paragraphs 12-101.1., 12-101.2.,
or 12-101.3., each Special Access Program will be assigned
a codeword, a nickname, or both.   Codewords and nicknames
for Special Access Programs shall be allocated solely
by the DUSD(P) through the official appointed under
subsection 12-103.   DoD Components may request codewords
and nicknames individually or in block.   If codewords
or nicknames are obtained in block, however, the issuing
Component shall promptly notify the DUSD(P) upon activation
and assignment.

12-105.  Reporting of Special Access Programs 

12-105.1.  Report of Establishment.   Reports to the
Secretary of the Military Department or the DUSD(P)
required under subsection 12-101. for Special Access
Programs shall include:

12-105.1.1.  The responsible Department, Agency, or
DoD Component, including office identification;

12-105.1.2.  The codeword and/or nickname of the Program;

12-105.1.3.  The relationship, if any, to other Special
Access Programs in the Department of Defense or other
Government Agencies;

12-105.1.4.  The rationale for establishing the Special
Access Program including the reason why normal management
and safeguarding procedures for classified information
are inadequate;

12-105.1.5.  The estimated number of persons granted
special access in the responsible DoD Component; other
DoD Components; other Government Agencies; contractors;
and the total of such personnel;

12-105.1.6.  A summary statement pertaining to the Program
security requirements with particular emphasis upon
those personnel security requirements governing access
to Program information;

12-105.1.7.  The date of Program establishment;

12-105.1.8.  The estimated number and approximate dollar
value, if known, of carve-out contracts that will be
or are required to support the Program; and

12-105.1.9.  The DoD Component official who is the point
of contact (last name, first name, middle initial; position
or title; mailing address; and telephone number).

12-105.2.  Annual Reports.   Annual reports to the DUSD(P)
shall be submitted not later than January 31 of each
year, showing the changes in information provided under
paragraph 12-105.1., above, as well as the date of last
review.   Annual reports shall reflect actual rather
than estimated numbers of carve-out contracts and persons
granted access and shall summarize the results of the
inspections and audits required by paragraph 12-102.1.
  The effective date of information in the annual report
shall be December 31.

12-105.3.  Termination Reports.   The DUSD(P) shall
be notified immediately upon termination of a Special
Access Program.

12-106.  Accounting for Special Access Programs.   The
DUSD(P) shall maintain a listing of approved Special
Access Programs.

12-107.  Limitations on Access.   Access to data reported
under this Chapter shall be limited to the DUSD(P) and
the minimum number of properly indoctrinated staff necessary
to perform the functions assigned the DUSD(P) herein.
  Access may not be granted to any other person for
any purpose without the approval of the DoD Components
sponsoring the Special Access Programs concerned.

12-108.  "Carve-Out" Contracts 

12-108.1.  The Secretaries of the Military Departments
and the DUSD(P), or their designees, shall ensure that,
in those Special Access Programs involving contractors,
special access controls are made applicable by legally
binding instruments.

12-108.2.  To the extent necessary for DIS to execute
its security responsibilities with respect to Special
Access Programs under its security cognizance, DIS personnel
shall have access to all information relating to the
administration of these Programs.

12-108.3.  Excluding those Programs specified in paragraph
12-101.3., the use of "carve-out" contracts that relieve
the DIS from inspection responsibility under the Defense
Industrial Security Program is prohibited unless:

12-108.3.1.  Such contract supports a Special Access
Program approved and administered under subsection 12-101.;

12-108.3.2.  Mere knowledge of the existence of a contract
or of its affiliation with the Special Access Program
is classified information; and

12-108.3.3.  Carve-out status is approved for each contract
by the Secretary of a Military Department, the Director,
NSA, the DUSD(P), or their designees.

12-108.4.  Approval to establish a "carve-out" contract
must be requested from the Secretary of a Military Department,
or designee(s), the Director, NSA, or designee(s), or
in the case of other DoD Components, from the DUSD(P).
  Approved "carve-out" contracts shall be assured the
support necessary for the requisite protection of the
classified information involved.   The support shall
be specified through a system of controls that shall
provide for:

12-108.4.1.  A written security plan;

12-108.4.2.  Professional security personnel at the
sponsoring DoD Component performing security inspections
at each contractor's facility which shall be conducted,
at a minimum, with the frequency prescribed by paragraph
4-103 of DoD 5220.22-R (reference (i));

12-108.4.3.  "Carve-out" contracting procedures;

12-108.4.4.  A central office of record; and

12-108.4.5.  An official to be the single point of contact
for security control and administration.   DoD Components
other than the Military Departments and NSA shall submit
such appropriate rationale and security plan along with
requests for approval to the DUSD(P).

12-108.4.6.  An annual inventory of carve-out contracts
shall be conducted by each DoD Component that participates
in Special Access Programs.

12-108.4.7.  This subsection relates back to the date
of execution for each contract to which carve-out contracting
techniques are applied.   The carve-out status of any
contract expires upon termination of the Special Access
Program which it supports.

12-109.  Oversight Reviews 

12-109.1.  The DUSD(P) shall conduct oversight reviews,
as required, to determine compliance with this Chapter.

12-109.2.  Pursuant to statutory authority, the Inspector
General, Department of Defense, shall conduct oversight
of Special Access Programs.

C13.  CHAPTER 13

PROGRAM MANAGEMENT

C13.1.  Section 1.   EXECUTIVE BRANCH OVERSIGHT AND
POLICY DIRECTION 

13-100.  National Security Council.   Pursuant to the
provisions of E.O. 12356 (reference (g)), the NSC shall
provide overall policy direction for the Information
Security Program.

13-101.  Administrator of General Services.   The Administrator
of General Services is responsible for implementing
and monitoring the Information Security Program established
under reference (g).   In accordance with reference
(g), the Administrator delegates the implementation
and monitorship functions of the Program to the Director
of the ISOO.

13-102.  Information Security Oversight Office 

13-102.1.  Composition.   The ISOO has a full-time director
appointed by the Administrator of General Services with
approval of the President.   The Director has the authority
to appoint a staff for the office.

13-102.2.  Functions.   The Director of the ISOO is
charged with the following principal functions that
pertain to the Department of Defense:

13-102.2.1.  Oversee DoD actions to ensure compliance
with reference (g) and implementing directives, for
example, the ISOO Directive No.1 (reference (h)) and
this Regulation;

13-102.2.2.  Consider and take action on complaints
and suggestions from persons within or outside the Government
with respect to the administration of the Information
Security Program;

13-102.2.3.  Report annually to the President through
the NSC on the implementation of reference (g);

13-102.2.4.  Review this Regulation and DoD guidelines
for systematic declassification review; and

13-102.2.5.  Conduct on-site reviews of the Information
Security Program of each DoD Component that generates
or handles classified information.

13-103.  Information Requests.   The Director of the
ISOO is authorized to request information or material
concerning the Department of Defense, as needed by the
ISOO in carrying out its functions.

13-104.  Coordination.   Heads of DoD Components shall
ensure that any significant requirements levied directly
on the Component by the ISOO are brought to the attention
of the Director of Security Plans and Programs, ODUSD(P).

C13.2.  Section 2.   DEPARTMENT OF DEFENSE 

13-200.  Management Responsibility 

13-200.1.  The DUSD(P) is the senior DoD official having
DoD-wide authority and responsibility to ensure effective
and uniform compliance with and implementation of E.O.
12356 and its implementing ISOO Directive No. 1 (references
(g) and (h)).   As such, the DUSD(P) shall have primary
responsibility for providing guidance, oversight and
approval of policy and procedures governing the DoD
Information Security Program.   The DUSD(P) or his designee
may approve waivers or exceptions to the provisions
of this Regulation to the extent such action is consistent
with references (g) and (h).

   

REQUEST FOR WAIVERS SHALL BE PREPARED FOR THE SIGNATURE
OF THE DIRECTOR, WHS, AND ADDRESSED TO DUSD(P).   BEFORE
SUBMISSION FOR SIGNATURE, THE REQUEST SHALL BE COORDINATED
WITH DIRECTOR, PSD.

13-200.2.  The Heads of DoD Components may approve waivers
to the provisions of this Regulation only as specifically
provided for herein.

   

REQUESTS TO THE DIRECTOR, WHS, FOR WAIVERS SHALL BE
SIGNED BY THE HEAD OF THE OSD COMPONENT CONCERNED AND
ROUTED THROUGH THE DIRECTOR, PSD.

13-200.3.  The Director, NSA/Chief, Central Security
Service, under DoD Directive 5200.1 (reference (f)),
is authorized to impose special requirements with respect
to the marking, reproduction, distribution, accounting,
and protection of and access to classified cryptologic
information.   In this regard, the Director, NSA, may
approve waivers or exceptions to these special requirements.
  Except as provided in subsection 1-205., the authority
to lower any COMSEC security standards rests with the
Secretary of Defense.   Requests for approval of such
waivers or exceptions to established COMSEC security
standards which, if adopted, will have the effect of
lowering such standards, shall be submitted to the DUSD(P)
for approval by the Secretary of Defense.

C13.3.  Section 3.   DoD COMPONENTS 

13-300.  General.   The Head of each DoD Component shall
establish and maintain an Information Security Program
designed to ensure compliance with the provisions of
this Regulation throughout the Component.

13-301.  Military Departments.   In accordance with
DoD Directive 5200.1 (reference (f)), the Secretary
of each Military Department shall designate a senior
official who shall be responsible for complying with
and implementing this Regulation within the Department.

13-302.  Other Components.   In accordance with DoD
Directive 5200.1 (reference (f)), the Head of each other
DoD Component shall designate a senior official who
shall be responsible for complying with and implementing
this Regulation within their respective Component.

13-302.1.  THE DIRECTOR, WHS, IS THE SENIOR OFFICIAL
RESPONSIBLE FOR THE INFORMATION SECURITY PROGRAM WITHIN
OSD COMPONENTS.   THE OFFICIAL RESPONSIBLE FOR THE DAY
TO DAY IMPLEMENTATION OF THE INFORMATION SECURITY PROGRAM
WITHIN OSD COMPONENTS IS THE DIRECTOR, PSD.

13-303.  Program Monitorship.   The senior officials
designated under subsections 13-301. and 13-302. are
responsible within their respective jurisdictions for
monitoring, inspecting with or without prior announcement,
and reporting on the status of administration of the
DoD Information Security Program at all levels of activity
under their cognizance.

13-304.  Field Program Management 

13-304.1.  Throughout the Department of Defense, the
head of each activity shall appoint, in writing, an
official to serve as security manager for the activity.
  This official shall be responsible for the administration
of an effective Information Security Program in that
activity with particular emphasis on security education
and training, assigment of proper classifications, downgrading
and declassification, safeguarding, and monitorship,
to include sampling classified documents for the purpose
of Assuring compliance with this Regulation.

13-304.1.1.  IMPLEMENT THE SECURITY PROCEDURES AND INFORMATION
SECURITY PROGRAM.

13-304.1.2.  DESIGNATE, IN WRITING, PRIMARY AND ALTERNATE
OFFICIALS WHO ARE TO SERVE AS SECURITY MANAGERS WITHIN
THEIR RESPECTIVE COMPONENT AND PROVIDE A COPY OF THESE
DESIGNATIONS TO THE DIRECTOR, PSD.

13-304.1.3.  ENSURE THE SECURITY MANAGER IS EXPERIENCED
IN WORKING WITH CLASSIFIED MATERIAL.

13-304.1.4.  ASSIST THE SECURITY MANAGER IN COMPLYING
WITH THIS INSTRUCTION.

13-304.2.  Activity heads shall ensure that officials
appointed as security managers either possess, or obtain
within a reasonable time after appointment, knowledge
of and training in the Information Security Program
commensurate with the needs of their positions.   The
Director of Security Plans and Programs, ODUSD(P) shall,
with the assistance of the Director, Defense Security
Institute, develop minimum standards for training of
activity security managers.   Such training should result
in appropriate certifications to be recorded in the
personnel files of the individuals involved.

13-304.3.  Activity heads shall ensure that officials
appointed as security managers are authorized direct
and ready access to the appointing official on matters
concerning the Information Security Program.   They
also shall provide sufficient resources of time, staff,
and funds to permit accomplishment of the security manager's
responsibilities, to include meaningful oversight of
the Information Security Program at all levels of the
activity.

13-304.3.1.  ADVISE AND REPRESENT THE HEAD OF THE OSD
COMPONENT ON MATTERS RELATED TO THIS INSTRUCTION.

13-304.3.2.  ESTABLISH, IMPLEMENT, AND MAINTAIN AN EFFECTIVE
SECURITY EDUCATION PROGRAM.

13-304.3.3.  ESTABLISH PROCEDURES FOR ENSURING THAT
ALL PERSONS HANDLING CLASSIFIED MATERIAL ARE CLEARED
PROPERLY AND HAVE A NEED TO KNOW.

13-304.3.4.  ENSURE THAT RESPONSIBLE OFFICIALS CREATE,
REVIEW, AND UPDATE WHEN REQUIRED, CLASSIFICATION GUIDES
FOR CLASSIFIED PLANS, PROGRAMS, AND PROJECTS.

13-304.3.5.  ENSURE, IN COORDINATION WITH RECORDS MANAGEMENT
PERSONNEL, THE REVIEW AND CONTINUAL REDUCTION OF CLASSIFIED
INFORMATION WITH THE OSD COMPONENT BY DECLASSIFICATION,
DESTRUCTION, OR RETIREMENT.   RECORDS MANAGEMENT PERSONNEL
SHALL OVERSEE THE OSD COMPONENT ANNUAL CLEAN-OUT DAYS.

C13.4.  Section 4.   INFORMATION REQUIREMENTS 

13-400.  Information Requirements.   DoD Components
shall submit on a fiscal year basis a consolidated report
concerning the Information Security Program of the Component
on SF 311, "Agency Information Security Program Data,"
to reach the ODUSD(P) by October 20 of each year.  
SF 311 shall be completed in accordance with the instructions
thereon and augmenting instructions issued by the ODUSD(P).
  The ODUSD(P) shall submit the DoD report (SF 311)
to the ISOO by October 31 of each year.   Interagency
Report Control Number 0230-GSA-AN applies to this information
collection system as well as to that contained in subsection
1-602.

C13.5.  Section 5.   DEFENSE INFORMATION SECURITY COMMITTEE


13-500.  Purpose.   The Defense Information Security
Committee (DISC) is established to advise and assist
the DUSD(P) and the Director, Security Plans and Programs,
ODUSD(P) in the formulation of DoD Information Security
Program policy and procedures.

13-501.  Direction and Membership.   The DISC shall
meet at the call of the DUSD(P) or the Director, Security
Plans and Programs.   It is comprised of the DUSD(P)
as Chairman; the Director, Security Plans and Programs,
as Vice Chairman; and the senior officials (designated
in accordance with section 5.3.1., DoD Directive 5200.1,
reference (f)) (or their representatives) responsible
for directing and administering the Information Security
Program of the OJCS, the Departments of the Army, Navy,
and Air Force, the Defense Intelligence Agency, the
Defense Nuclear Agency, the National Security Agency,
and the Defense Investigative Service.   Other DoD Components
may be invited to attend meetings of particular interest
to them.

C14.  CHAPTER 14

ADMINISTRATIVE SANCTIONS

14-100.  Individual Responsibility.   All personnel,
civilian or military, of the Department of Defense are
responsible individually for complying with the provisions
of this Regulation.

14-101.  Violations Subject to Sanctions 

14-101.1.  DoD Military and civilian personnel are subject
to administrative sanctions if they:

14-101.1.1.  Knowingly and willfully classify or continue
the classification of information in violation of E.O.
12356 (reference (g)), any implementing issuances, or
this Regulation;

14-101.1.2.  Knowingly, willfully, or negligently disclose
to unauthorized persons information properly classified
under reference (g) or prior orders; or

14-101.1.3.  Knowingly and willfully violate any other
provision of reference (g), any implementing issuances
or this Regulation.

14-101.2.  Sanctions include but are not limited to
a warning notice, reprimand, termination of classification
authority, suspension without pay, forfeiture of pay,
removal or discharge, and will be imposed upon any person,
regardless of office or level of employment, who is
responsible for a violation specified under this paragraph
as determined appropriate under applicable law and DoD
Regulations.   Nothing in this Regulation prohibits
or limits action under the Uniform Code of Military
Justice (reference (zz)) based upon violations of that
Code.

14-101.3.  THE SANCTIONS IN RESPONSE TO COMPROMISES
OR VIOLATIONS OF CLASSIFIED INFORMATION SHALL BE AS
FOLLOWS:

14-101.3.1.  NONPUNITIVE MEASURES

14-101.3.1.1.  CIVILIAN PERSONNEL

14-101.3.1.1.1.  FIRST SANCTION.   WRITTEN ADMONITION
BY THE SUPERVISOR OR HIGHER AUTHORITY AND AN ORAL ADMONITION
OF THE CONSEQUENCES OF FURTHER VIOLATIONS.   BEFORE
GIVING THE ADMONISHMENT, THE SUPERVISOR SHALL ENSURE
THAT HE OR SHE IS IN POSSESSION OF ALL FACTS, SHALL
AFFORD THE PERSON AN OPPORTUNITY TO REBUT THE FACTS,
AND SHALL ENSURE THAT THE HEAD OF THE OSD COMPONENT
CONCERNED HAS APPROVED THE ADMONITION.   A COPY OF THE
ADMONISHMENT SHALL BE PROVIDED TO THE DIRECTOR, PSD.

14-101.3.1.1.2.  SECOND SANCTION.   LETTER OF REPRIMAND
BY THE HEAD OF THE OSD COMPONENT CONCERNED.   A COPY
OF THE PROPOSED LETTER SHALL BE PROVIDED TO THE PERSON
SO THAT HE OR SHE MAY REPLY TO THE MERITS AND ACCURACY
OF ITS CONTENT.   THE LETTER AND REPLY SHALL BE REVIEWED
BY THE HEAD OF THE OSD COMPONENT, WHO THEN SHALL NOTIFY
THE PERSON WHETHER THE LETTER HAS BEEN APPROVED OR DISAPPROVED.
  A COPY OF THIS LETTER SHALL BE PLACED IN THE PERSON'S
PERSONNEL FILE FOR A PERIOD OF 90 DAYS.

14-101.3.1.2.  MILITARY PERSONNEL.   ARMY REGULATION
27-10, "MILITARY JUSTICE," AND AIR FORCE REGULATION
35-32, "UNFAVORABLE INFORMATION FILES, CONTROL ROSTERS,
ADMINISTRATIVE REPRIMANDS AND ADMONITIONS," (REFERENCES
(TTT) and (UUU)), RECOGNIZE LETTERS OF ADMONITION AND
REPRIMAND.   THE NAVY AND MARINE CORPS "JUDGE ADVOCATE
GENERAL MANUAL" (REFERENCE (VVV)) REQUIRES THAT LETTERS
OF CENSURE BE CHARACTERIZED AS LETTERS OF CAUTION OR
INSTRUCTION AS OPPOSED TO LETTERS OF ADMONITION OR REPRIMAND.

14-101.3.1.2.1.  FIRST SANCTION.   THE SAME AS THAT
FOR CIVILIAN PERSONNEL.

14-101.3.1.2.2.  SECOND SANCTION.   THE SAME AS TRAT
FOR CIVILIAN PERSONNEL, EXCEPT THAT THE LETTER SHALL
BE PLACED IN THE PERSON'S PERSONNEL SECURITY FILE.

14-101.3.2.  PUNITIVE MEASURES

14-101.3.2.1.  CIVILIAN PERSONNEL

14-101.3.2.1.1.  THIRD SANCTION.   SUSPENSION WITHOUT
PAY FOR NOT LESS THAN 1 DAY AND NOT MORE THAN 5 DAYS.

14-101.3.2.1.2.  FOURTH SANCTION.   SUSPENSION WITHOUT
PAY FOR NOT LESS THAN 2 WEEKS AND CONSIDERATION OF THE
REVOCATION OF THE PERSON'S SECURITY CLEARANCE, OR TERMINATION
OF EMPLOYMENT OR AFFILIATION.

14-101.3.2.2.  MILITARY PERSONNEL

14-101.3.2.2.1.  THIRD SANCTION.   REFERRAL OF THE VIOLATION
TO THE PERSON'S PARENT MILITARY SERVICE FOR DISCIPLINARY
ACTION.

14-101.3.2.2.2.  FOURTH SANCTION.   REASSIGNMENT OF
THE PERSON TO HIS OR HER PARENT MILITARY SERVICE.

14-101.4.  OSD PERSONNEL DETAILED TO ANOTHER GOVERNMENT
AGENCY.   OSD CIVILIAN AND MILITARY PERSONNEL DETAILED
TO ANOTHER GOVERNMENT AGENCY SHALL BE SUBJECT TO THE
SECURITY REGULATIONS OF THAT AGENCY.   THE HEAD OF THE
AGENCY SHALL BE REQUESTED TO PROVIDE THE DIRECTOR, WHS,
WITH A REPORT ON THE VIOLATION AND ANY RECOMMENDATION
DEEMED PROPER.

14-101.5.  PERSONNEL DETAILED FROM ANOTHER AGENCY TO
AN OSD COMPONENT.   PERSONNEL DETAILED FROM ANOTHER
GOVERNMENT AGENCY SHALL BE SUBJECT TO THE ADMINISTRATIVE
SANCTIONS OF THIS INSTRUCTION.   THE DIRECTOR, PSD,
SHALL NOTIFY THE DIRECTOR, WHS, FOR PROPER ACTION.

14-101.6.  DISMISSAL.   ANY PERSON'S BREACH OF SECURITY
REGULATIONS MAY BE SERIOUS ENOUGH TO WARRANT GREATER
SANCTIONS THAN THE MINIMUM SANCTIONS PRESCRIBED IN THIS
ENCLOSURE UP TO AND INCLUDING THE SEPARATION OF A PERSON
FROM EMPLOYMENT, POSSIBLE CRIMINAL PROSECUTION, OR ACTION
UNDER THE UNIFORM CODE OF MILITARY JUSTICE (REFERENCE
(XXX)).

14-102.  Corrective Action.   The Secretary of Defense,
the Secretaries of the Military Departments, and the
Heads of other DoD Components shall ensure that appropriate
and prompt corrective action is taken whenever a violation
under paragraph 14-101.1. occurs or repeated administrative
discrepancies or repeated disregard of requirements
of this Regulation occur (see subsection 14-103.). 
 Commanders and supervisors, in consultation with appropriate
legal counsel, shall utilize all appropriate criminal,
civil, and administrative enforcement remedies against
employees who violate the law and security requirements
as set forth in this Regulation and other pertinent
DoD issuances.

14-103.  Administrative Discrepancies.   Repeated administrative
discrepancies in the marking and handling of classified
information and material such as failure to show classification
authority; failure to apply internal classification
markings; failure to adhere to the requirements of this
Regulation that pertain to dissemination, storage, accountability,
and destruction, and that are determined not to constitute
a violation under paragraph 14-101.1. may be grounds
for adverse administrative action including warning,
admonition, reprimand or termination of classification
authority as determined appropriate under applicable
policies and procedures.

14-104.  Reporting Violations 

14-101.1.  Whenever a violation under paragraph 14-101.1.2.
occurs, the Director of Counterintelligence and Investigative
Programs, ODUSD(P) shall be informed of the date and
general nature of the occurrence including the relevant
parts of this Regulation, the sanctions imposed, and
the corrective action taken.   Whenever a violation
under subparagraph 14-101.1.1. or 14-101.1.3. occurs,
the Director of Security Plans and Programs, ODUSD(P)
shall be provided the same information.   Notification
of such violations shall be furnished to the Director
of the ISOO in accordance with Section 5.4(d) of E.O.
12356 (reference (g)) by the ODUSD(P).

14-101.2.  Any action resulting in unauthorized disclosure
of properly classified information that constitutes
a violation of the criminal statutes and evidence reflected
in classified information of possible violations of
Federal criminal law by a DoD employee and of possible
violations by any other person of those Federal criminal
laws specified in guidelines adopted by the Attorney
General shall be the subject of a report processed in
accordance with DoD Directive 5210.50 (reference (pp))
and DoD Instruction 5240.4 (reference (oo)).

14-101.3.  Any action reported under paragraph 14-101.2.,
above, shall be reported to the Attorney General by
the General Counsel, Department of Defense.

14-101.4.  Reports shall be made to appropriate counterintelligence,
investigative, and personnel security authorities concerning
any employee who is known to have been responsible for
repeated security violations over a period of a year,
for appropriate evaluation, including readjudication
of the employee's security clearance.

C15.  CHAPTER 15

FOR OFFICIAL USE ONLY INFORMATION

C15.1.  Section 1.   GENERAL PROVISIONS 

15-100.  BASIC POLICY.   THIS CHAPTER IMPLEMENTS DOD
5400.7-R (REFERENCE (YYY)) AND PROVIDES POLICY AND PROCEDURES
FOR THE MARKING, CONTROL AND PROTECTION OF INFORMATION
OTHER THAN CLASSIFIED INFORMATION THAT PROPERLY MAY
BE WITHHELD FROM PUBLIC DISCLOSURE UNDER THE FREEDOM
OF INFORMATION ACT, 5 U.S.C. 552, REFERENCE (ZZZ) AS
AMENDED.

15-100.1.  UNCLASSIFIED RECORDS AND DOCUMENTS AUTHORIZED
BY EXEMPTIONS 2 THROUGH 9 OF DOD DIRECTIVE 5400.7 (REFERENCE
(P)) TO BE WITHHELD FROM GENERAL PUBLIC DISCLOSURE,
AND WHICH FOR A SIGNIFICANT AND LEGITIMATE U.S. GOVERNMENT
PURPOSE SHOULD NOT BE GIVEN GENERAL CIRCULATION, SHALL
BE MARKED "FOR OFFICIAL USE ONLY" AT THE TIME OF THEIR
CREATION.

15-100.2.  THE PRESENCE OR ABSENCE OF THE MARKING "FOR
OFFICIAL USE ONLY" DOES NOT ELIMINATE THE REQUIREMENT
THAT EVERY DOCUMENT SHALL BE REVIEWED IN CONNECTION
WITH A DETERMINATION AS TO ITS RELEASEABILITY.

15-101.  LIMITATIONS AND RESTRICTIONS

15-101.1.  THE MARKING "FOR OFFICIAL USE ONLY" SHALL
NOT BE APPLIED AS A LESS STRINGENT SECURITY DESIGNATION
UNDER CONDITIONS WHERE CLASSIFICATION UNDER CHAPTER
2, ABOVE, OF THIS INSTRUCTION IS NOT WARRANTED.

15-101.2.  THE MARKING MAY BE APPLIED TO INFORMATION
OR MATERIAL THAT HAS BEEN DECLASSIFIED IN ACCORDANCE
WITH CHAPTER 3, ABOVE, OF THIS INSTRUCTION.

15-101.3.  INFORMATION CONTAINED IN A TECHNICAL DOCUMENT
THAT REQUIRES A DISTRIBUTION STATEMENT UNDER DOD DIRECTIVE
5230.24 (REFERENCE (AAAA)) SHALL BEAR THAT STATEMENT
AND NOT BE MARKED "FOR OFFICIAL USE ONLY."

15-101.4.  THE MARKING "FOR OFFICIAL USE ONLY" SHALL
NOT BE USED AS A SUBSTITUTE FOR OR TRANSLATION OF THE
FOREIGN GOVERNMENT CLASSIFICATION OF "RESTRICTED."

C15.2.  Section 2.    MARKING 

15-200.  RESPONSIBILITY.   THE INDIVIDUAL ORIGINATING,
APPROVING, OR SIGNING THE MATERIAL IS RESPONSIBLE FOR
MARKING A DOCUMENT THAT IS DETERMINED TO BE "FOR OFFICIAL
USE ONLY."

15-201.  DOCUMENTS 

15-201.1.  THE MARKING "FOR OFFICIAL USE ONLY" SHALL
BE TYPED, STAMPED, OR PRINTED IN BOLD LETTERS AT THE
BOTTOM OF THE FRONT COVER (IF ANY); THE FIRST AND BACK
PAGE; AND THE OUTSIDE OF THE BACK COVER (IF ANY).  
THE ABBREVIATION "FOUO" SHALL NOT BE USED.

15-201.2.  FOR DOCUMENTS CONTAINING BOTH CLASSIFIED
AND "FOR OFFICIAL USE ONLY" INFORMATION, OVERALL DOCUMENT
AND PAGE MARKING SHALL BE IN ACCORDANCE WITH PARAGRAPH
4-200., ABOVE.

15-202.  TRANSMITTAL LETTERS, ENDORSEMENTS, ETC.   
UNCLASSIFIED PAPERS FORWARDING "FOR OFFICIAL USE ONLY"
ENCLOSURES, SHALL BE MARKED IN ACCORDANCE WITH PARAGRAPH
15-201.1., ABOVE.   IF THE FORWARDING PAPER DOES NOT
CONTAIN "FOR OFFICIAL USE ONLY" INFORMATION, IT SHALL
BE MARKED WITH A NOTATION STATING THAT THE PROTECTION
MARKING IS CANCELED WHEN THE ENCLOSURE(S) ARE REMOVED.

15-203.  PARAGRAPHS 

15-203.1.  WHEN NECESSARY TO ENSURE PROPER UNDERSTANDING
OR AS A MEANS OF FACILITATING SEGREGATION OF NON-RELEASABLE
INFORMATION IN A LENGTHY RECORD, INDIVIDUAL PARAGRAPHS,
SECTIONS, OR PORTIONS SHALL BE MARKED.   THE ABBREVIATED
MARKING "FOUO" MAY BE USED FOR THIS PURPOSE.

15-203.2.  IN CLASSIFIED DOCUMENTS, THE MARKING "FOUO"
SHALL BE APPLIED ONLY TO THOSE PARAGRAPHS CONTAINING
"FOR OFFICIAL USE ONLY" INFORMATION, BUT NOT CONTAINING
CLASSIFIED INFORMATION.

15-204.  WORKING PAPERS.   UNCLASSIFIED WORKING PAPERS,
NOTES, PRELIMINARY DRAFTS, CONTAINING INFORMATION PROTECTED
FROM RELEASE SHALL BE MARKED "FOR OFFICIAL USE ONLY."

15-205.  MATERIAL OTHER THAN DOCUMENTS.   UNCLASSIFIED
MATERIAL OTHER THAN DOCUMENTS CONTAINING "FOR OFFICIAL
USE ONLY" INFORMATION SHALL BE MARKED TO CALL ATTENTION
TO THE TYPE OF INFORMATION.

15-206.  DOCUMENTS OR MATERIAL TRANSMITTED OUTSIDE OF
THE DEPARTMENT OF DEFENSE.   DOCUMENTS OR MATERIAL TRANSMITTED
OUTSIDE THE DEPARTMENT OF DEFENSE SHALL BE STAMPED OR
TYPED WITH THE FOLLOWING STATEMENT ON THE FACE OF THE
DOCUMENT OR MATERIAL:   "THIS DOCUMENT CONTAINS INFORMATION
EXEMPT FROM MANDATORY DISCLOSURE UNDER FOIA.   EXEMPTIONS
(INSERT PROPER NUMBERS FROM DOD DIRECTIVE 5400.7, CHAPTER
3, (REFERENCE (P)) APPLY."

C15.3.  Section 3.    DISSEMINATION AND TRANSMISSION


15-300.  GENERAL.   THE PROVISIONS OF THIS SECTION ARE
SUBJECT TO ADDITIONAL RESTRICTIONS THAT MAY BE IMPOSED
BY EXECUTIVE ORDER, STATUTORY REQUIREMENTS, DIRECTIVES,
AND REGULATIONS GOVERNING THE RELEASE OF SPECIFIC TYPES
OF INFORMATION SUCH AS TECHNICAL MATERIAL, PERSONNEL
RECORDS, OR MEDICAL RECORDS.

15-301.  PUBLIC RELEASE.   PUBLIC RELEASE OF "FOR OFFICIAL
USE ONLY" INFORMATION SHALL BE IN ACCORDANCE WITH DOD
5220.22-M (REFERENCE (K)).

15-302.  RELEASE TO CONGRESS AND GAO 

15-302.1.  RELEASE OF "FOR OFFICIAL USE ONLY" INFORMATION
TO CONGRESS IS GOVERNED BY DOD DIRECTIVE 5400.4 (REFERENCE
(RR)).   RELEASE OF "FOR OFFICIAL USE ONLY" INFORMATION
TO THE GENERAL ACCOUNTING OFFICE (GAO) IS GOVERNED BY
DOD DIRECTIVE 7650.1 (REFERENCE (SS)).

15-302.2.  THE MARKING "FOR OFFICIAL USE ONLY" SHALL
EITHER BE REMOVED, IF A REVIEW OF THE MATERIAL DETERMINES
THAT THE INFORMATION NO LONGER REQUIRES THE MARKING,
OR THE STATEMENT IN PARAGRAPH 15-206., ABOVE, SHALL
BE STAMPED OR TYPED ON THE DOCUMENT.

15-303.  RELEASE WITHIN THE DEPARTMENT OF DEFENSE. 
 THIS INSTRUCTION DOES NOT PLACE ANY RESTRICTIONS ON
THE DISSEMINATION AND USE OF UNCLASSIFIED RECORDS OR
DOCUMENTS CONSIDERED TO BE "FOR OFFICIAL USE ONLY" BETWEEN
COMPONENTS AND INDIVIDUALS OF THE DEPARTMENT OF DEFENSE
AND DOD CONTRACTORS AND GRANTEES WHEN CONDUCTING OFFICIAL
BUSINESS FOR THE DEPARTMENT OF DEFENSE.   "FOR OFFICIAL
USE ONLY" RECORDS OR DOCUMENTS SHALL BE MARKED AND HANDLED
IN A MANNER AS TO PRECLUDE DISCLOSURE OF THE MATERIAL
TO THE PUBLIC.

15-304.  RELEASE TO OTHER FEDERAL DEPARTMENTS AND AGENCIES.
  EACH HOLDER OF "FOR OFFICIAL USE ONLY" INFORMATION
IS AUTHORIZED TO DISCLOSE SUCH INFORMATION TO OFFICIALS
IN OTHER DEPARTMENTS AND AGENCIES OF THE EXECUTIVE AND
JUDICIAL BRANCHES WHEN IT IS DETERMINED THAT INFORMATION
IS REQUIRED TO CARRY OUT A GOVERNMENTAL FUNCTION, IF
THAT RELEASE OF THE INFORMATION IS NOT PROHIBITED UNDER
THE PRIVACY ACT.

15-305.  TRANSMISSION.   "FOR OFFICIAL USE ONLY" INFORMATION
SHALL BE PROTECTED FROM UNAUTHORIZED DISCLOSURE THROUGHOUT
ITS PERIOD OF TRANSIT.   COVER SHEETS, SEALED ENVELOPES,
BRIEFCASES, ETC., SHALL BE USED AS NECESSARY TO ENSURE
THE PROTECTION OF THE INFORMATION.

15-306.  MAIL.   FIRST CLASS MAIL AND ORDINARY PARCEL
POST MAY BE USED FOR TRANSMISSION.   THE MATERIAL SHALL
BE PLACED IN A SINGLE SEALED ENVELOPE OR SEALED SINGLE
WRAPPING FOR TRANSMISSION.   TRANSPARENT ENVELOPES OR
WRAPPING MATERIAL, SUCH AS "SHOTGUN" ENVELOPES OR HEAT
SEALED PLASTIC CONTAINERS, WHICH MIGHT REVEAL THE CONTENTS,
SHALL NOT BE USED.   THE MARKING "FOR OFFICIAL USE ONLY"
SHALL NOT BE PLACED ON THE ENVELOPE OR WRAPPING.   BULKY
SHIPMENTS, WHICH QUALIFY UNDER POSTAL REGULATIONS, MAY
BE SENT BY FOURTH CLASS MAIL.

15-307.  RECEIPTS.   "FOR OFFICIAL USE ONLY" INFORMATION
SHALL NOT BE COVERED BY A RECEIPT.

C15.4.  Section 4.    SAFEGUARDING 

15-401.  RESPONSIBILITY.   THE SAFEGUARDING "FOR OFFICIAL
USE ONLY" INFORMATION RESTS WITH ALL INDIVIDUALS HANDLING,
IN POSSESSION OF, OR WITH KNOWLEDGE OF SUCH INFORMATION.

15-402.  SAFEGUARDING DURING USE.   WHILE IN USE, DOCUMENTS
SHALL NOT BE LEFT UNATTENDED, BUT SHALL BE IN THE PHYSICAL
POSSESSION OR UNDER SURVEILLANCE OF AN AUTHORIZED PERSON
AT ALL TIMES.

15-403.  STORAGE.   DOCUMENTS SHALL BE STORED TO PRECLUDE
UNAUTHORIZED ACCESS.   FILING SUCH MATERIAL IN UNLOCKED
FILES, DESKS OR SIMILAR CONTAINERS IS ADEQUATE IN ALARMED
AREAS OR AREAS PATROLLED BY GSA OR CONTRACT GUARDS AFTER
DUTY HOURS.   IN OTHER AREAS, THE MATERIAL SHALL BE
SECURED BEHIND LOCKED DOORS OR IN LOCKED CONTAINERS,
INCLUDING SECURITY CONTAINERS.   CONTAINERS AUTHORIZED
FOR STORAGE OF CLASSIFIED MATERIAL SHALL NOT BE REQUISITIONED
SOLELY FOR MAINTAINING "FOR OFFICIAL USE ONLY" MATERIAL.

C15.5.  Section 5.   DISPOSITION AND DESTRUCTION 

15-500.  TERMINATION, DISPOSAL, AND UNAUTHORIZED DISCLOSURES


15-500.1.  THE ORIGINATOR, OR HIGHER AUTHORITY, SHALL
TERMINATE THE "FOR OFFICIAL USE ONLY" MARKING WHEN THE
INFORMATION NO LONGER REQUIRES PROTECTION FROM DISCLOSURE.
  ALL KNOWN HOLDERS SHALL BE NOTIFIED, AS PRACTICAL,
AND THE MARKING SHALL BE EFFACED OR REMOVED.

15-500.2.  EXCEPT AS REQUIRED BY PARAGRAPH 15-202.,
ABOVE, "FOR OFFICIAL USE ONLY" INFORMATION SHALL NOT
BE MARKED WITH A DATE OR EVENT FOR REMOVAL OF THE PROTECTIVE
MARKING.

15-501.  DISPOSAL 

15-501.1.  "FOR OFFICIAL USE ONLY" INFORMATION SHALL
BE DESTROYED WHEN IT IS NO LONGER NEEDED FOR OFFICIAL
PURPOSES.

15-501.2.  "FOR OFFICIAL USE ONLY" INFORMATION SHALL
BE DESTROYED BY TEARING THE RECORD OR DOCUMENT INTO
PIECES TO PREVENT DISCLOSURE OF THE CONTENTS AND PLACING
THEM IN REGULAR TRASH CONTAINERS.   RECORDS OF DESTRUCTION
ARE NOT REQUIRED.

15-501.3.  "FOR OFFICIAL USE ONLY" MATERIAL, OTHER THAN
DOCUMENTS, SHALL BE DESTROYED BY BURNING IN THE PENTAGON
DESTRUCTION FACILITY.

15-502.  UNAUTHORIZED DISCLOSURE.   IF AN UNAUTHORIZED
DISCLOSURE OCCURS, THE PROCEDURES IN CHAPTER 6, ABOVE,
SHALL BE FOLLOWED BY THE DISCOVERER, HEAD OF OSD COMPONENT,
AND PSD.   UNAUTHORIZED DISCLOSURE OF "FOR OFFICIAL
USE ONLY" INFORMATION THAT IS PROTECTED BY THE PRIVACY
ACT MAY RESULT IN CRIMINAL SANCTIONS AGAINST THE RESPONSIBLE
PERSONS.

C16.  CHAPTER 16

SENSITIVE COMPARTMENTED INFORMATION FACILITIES (SCIF)

C16.1.  Section 1.   

16-100.  SCIF ESTABLISHMENT.   SENSITIVE COMPARTMENTED
INFORMATION (SCI) REQUIRES SPECIAL CONTROLS FOR RESTRICTED
HANDLING WITHIN COMPARTMENTED INTELLIGENCE SYSTEMS.
  SUCH MATERIAL SHALL BE HANDLED AND CONTROLLED IN ACCORDANCE
WITH DOD TS-5105.21-M-2, DOD C-5105.21-M-1, DOD TS-5105.22-M-3,
DIAM 50-1, and DIAM 50-3 (REFERENCES (GGG), (HHH), (III),
(WWW), and (QQQ).   THESE PUBLICATIONS ARE DESIGNED
TO RESTRICT DISCUSSION OF THESE SENSITIVE MATERIALS
TO SPECIALLY DESIGNATED AREAS THAT HAVE BEEN CONSTRUCTED
UNDER RIGID PHYSICAL SECURITY STANDARDS.   HEADS OF
OSD COMPONENTS WHO DETERMINE THAT THERE IS A REQUIREMENT
TO ESTABLISH A SCIF SHALL COORDINATE WITH PSD DURING
THE PLANNING STAGES.   THE FOLLOWING PROCEDURES SHALL
BE FOLLOWED:

16-100.1.  A REQUEST TO ESTABLISH A SCIF SHALL BE SIGNED
BY THE OSD COMPONENT HEAD.   THE FOLLOWING INFORMATION
SHALL BE INCLUDED IN THE REQUEST:

16-100.1.1.  FULL JUSTIFICATION FOR THE SCIF.

16-100.1.2.  CLASSIFICATION LEVEL AND VOLUME OF MATERIAL
TO BE STORED IN THE SCIF.

16-100.1.3.  A DETAILED SKETCH OR FLOOR PLAN OF AREA
INCLUDING LOCATION, SIZE, CONFIGURATION OF WALLS, AND
INTERNAL PHYSICAL ARRANGEMENTS OF THE OFFICES.

16-100.1.4.  THE NAME, ROOM, AND TELEPHONE NUMBER OF
THE PROJECT OFFICER ASSIGNED TO ESTABLISH THE SCIF.

16-100.2.  THE PSD SHALL PROVIDE THE CONSTRUCTION AND
REQUISITION REQUIREMENTS TO THE PROJECT OFFICER.

16-100.3.  THE PROJECT OFFICER SHALL COORDINATE THE
REQUIREMENTS AND NOTIFY BY TELEPHONE (697-6247) THE
PSD UPON COMPLETION.

16-100.4.  THE PSD SHALL COMPLETE AND SUBMIT THE ACCREDITATION
CHECKLIST.

16-101.  SCIF ADMINISTRATION.   UPON FAVORABLE ACCREDITATION
BY THE DIA, THE PSD SHALL PROVIDE THE OSD COMPONENT
WITH COPIES OF THE FACILITY ACCREDITATION AND ACCREDITATION
CHECKLIST.   THE FOLLOWING MINIMUM REQUIREMENTS FOR
THE SCIF ADMINISTRATION SHALL BE ADHERED TO BY THE OCCUPANTS:

16-101.1.  ACCESS TO THE SCIF SHALL BE LIMITED TO PERSONNEL
WHO HAVE BEEN GRANTED PROPER CLEARANCE AND SCI ACCESS.
  PART-TIME AND SUMMER-HIRE PERSONNEL WITHOUT CLEARANCES
AND SCI ACCESS SHALL NOT BE ALLOWED TO WORK IN THE SCIF.
  ACCESS CONTROL PROCEDURES SHALL BE ESTABLISHED BY
THE FACILITY PERSONNEL UTILIZING THE INSTALLED MECHANICAL
AND ELECTRICAL EQUIPMENT.

16-101.2.  EACH MULTI-LINE TELEPHONE INSTRUMENT IS EQUIPPED
WITH THE "HOLD" FEATURE.   THIS BUTTON SHALL BE DEPRESSED
WHENEVER THE HANDSET IS NOT IN THE CRADLE AND NOT IN
USE.

16-101.3.  SCI DOCUMENTS TO BE DESTROYED SHALL BE LISTED
ON SD FORM 188 OR DIA FORM 554.   BURN BAGS FOR SCI
DOCUMENTS SHALL BE STORED IN APPROVED SECURITY CONTAINERS.
  THE FILLED BURN BAGS SHALL BE DELIVERED TO DESIGNATED
COLLECTION POINTS AT SPECIFIED TIMES.   FOR INFORMATION
ON THE COLLECTION POINTS OR SPECIFIED TIMES, TELEPHONE
THE PENTAGON DESTRUCTION FACILITY AT 695-1828.

16-101.4.  ALL FACILITY PERSONNEL SHALL READ THE BOOKLET
TITLED, "PENTAGON OCCUPANT EMERGENCY PLAN."

16-101.5.  IN CASE OF EMERGENCY EVACUATION, SCI MATERIAL
SHALL BE SECURED BEFORE EVACUATION OF THE SCIF.

16-101.6.  ALL UNCLEARED PERSONNEL SHALL BE ESCORTED
CONTINUOUSLY BY AUTHORIZED PERSONNEL.

16-101.6.1.  ESCORT CLEANING AND MAINTENANCE.

16-101.6.2.  SANITIZE WORK SPACES BEFORE UNCLEARED PERSONNEL
HAVE ACCESS.

16-101.7.  ANY INTRODUCTION INTO THE SCIF OF GOVERNMENT-OWNED
FURNITURE, ELECTRONIC AND ELECTRICAL EQUIPMENT, AND
ARTIFACTS SHALL BE REPORTED BY TELEPHONE TO THE PSD;
697-6247.

16-101.8.  PRIVATELY OWNED RADIOS, TELEVISION SETS,
CAMERAS, RECORDING EQUIPMENT, AND OTHER SIMILAR EQUIPMENT
SHALL NOT BE PERMITTED WITHIN SCIFS.

16-101.9.  BEFORE ANY ADDITIONAL CONSTRUCTION OR MODIFICATION
IN THE SCIF, THE WORK ORDER OR REQUEST SHALL BE COORDINATED
WITH THE PSD.

16-101.10.  CREATE A FOLDER THAT SHALL BE STORED IN
A SECURITY CONTAINER AND CONTAIN THE FOLLOWING:

16-101.10.1.  ACCREDITATION LETTER FOR THE SCIF (AND
GAMMA SUBREGISTRY AUTHORIZATION LETTER, IF APPLICABLE).

16-101.10.2.  APPROVED ACCREDITATION CHECKLIST.

16-101.10.3.  PENTAGON OCCUPANT EMERGENCY PLAN.

C16.2.  Section 2.   TECHNICAL SURVEILLANCE COUNTERMEASURES


16-200.  POLICY.   DOD TS-5105.21-M-2, DOD C-5105.21-M-1,
DOD TS-5105.21-M-3, DOD DIRECTIVE 5220.22, and DOD 5220.22-R,
REFERENCES (GGG), (HHH), (III), (I), AND (J) ASSIGN
RESPONSIBILITIES AND PROVIDE PROCEDURES FOR CONDUCTING
TECHNICAL SURVEILLANCE COUNTERMEASURES (TSCM) SERVICES.

16-200.1.  TO ENSURE THE VALIDITY OF TSCM SERVICES,
THE SCIF SHALL BE ADMINISTERED ACCORDING TO PARAGRAPH
16-101., ABOVE.   FAILURE TO ESCORT UNCLEARED CLEANING
AND MAINTENANCE PERSONNEL OR INTRODUCTION INTO THE FACILITY
OF NEW FURNITURE, ELECTRONIC AND ELECTRICAL EQUIPMENT,
AND ARTIFACTS THAT HAVE NOT BEEN CHECKED BY TSCM PERSONNEL
MAY INVALIDATE THE RESULTS OF A TSCM SERVICE.

16-200.2.  THE PSD SHALL SCHEDULE AND CONDUCT TSCM SERVICES
OF SCIFS AND CONTRACTOR FACILITIES IN ACCORDANCE WITH
DOD DIRECTIVE 5240.5 (REFERENCE (BBBB)).   TO QUALIFY
FOR A TSCM SERVICE THE PHYSICAL SECURITY OF THE FACILITY
MUST MEET THE SECURITY STANDARDS PRESCRIBED IN DIA MANUAL
50-3 (REFERENCE QQQ).

16-201.  APPLICABILITY.   THIS GUIDANCE APPLIES TO OSD
SCIF AND TO OSD FIELD ACTIVITIES THAT ARE SUPPORTED
BY THE PSD WITHIN THE PENTAGON AND THE GENERAL SERVICES
ADMINISTRATION-CONTROLLED BUILDINGS IN THE NATIONAL
CAPITAL REGION (NCR).   OSD CONTRACTOR SCIF LOCATED
IN THE NCR ARE INCLUDED.

16-202.  PROCEDURES 

16-202.1.  THE PSD SHALL:

16-202.1.1.  PROVIDE A PRESERVICE INFORMATION LETTER
TO FACILITY PERSONNEL OF THE OSD SCIF OR A CONTRACTOR
SCIF.   SEE FIGURE 13, BELOW.

16-202.1.2.  REPORT ANY SECURITY WEAKNESS THAT PRECLUDES
THE INSPECTED FACILITY FROM MEETING THE STANDARDS ESTABLISHED
FOR THE FACILITY TO THE OSD COMPONENT.

16-202.1.3.  REPORT THE ACCOMPLISHMENT OF A TSCM SERVICE
OF A SCIF TO THE DIA.

16-202.2.  THE SCIF PERSONNEL SHALL:

16-202.2.1.  INITIATE WORK ORDERS OR REQUISITIONS, IF
NECESSARY, AND ENSURE THAT ALL SECURITY WEAKNESSES ARE
CORRECTED.

16-202.2.2.  REPORT TO THE PSD THE COMPLETION OF ALL
WORK ORDERS OR REQUISITIONS.

16-203.  DOD CLASSIFIED PRESENTATIONS AT CONGRESSIONAL
ACTIVITIES 

16-203.1.  THE DEPARTMENT OF THE ARMY SHALL PROVIDE
TSCM SUPPORT FOR DOD APPEARANCES BEFORE MEMBERS OF CONGRESS
AND CONGRESSIONAL STAFF WHEN CLASSIFIED PRESENTATIONS
ARE MADE.   REQUESTS FOR THIS SUPPORT SHALL BE MADE
DIRECTLY TO THE DEPARTMENT OF THE ARMY INTELLIGENCE
AND SECURITY COMMAND LEGISLATIVE SUPPORT OFFICE.   REQUESTS
SHALL BE MADE AS FAR IN ADVANCE AS POSSIBLE TO ALLOW
EFFECTIVE SCHEDULING OF TSCM ASSETS.   THE REQUESTS
MUST BE CLASSIFIED SECRET.

16-203.2.  IF A TECHNICAL HAZARD OR PENETRATION IS DISCOVERED
DURING SUCH A PRESENTATION, THE TSCM SPECIAL AGENT SHALL
INFORM THOSE CONCERNED AND RECOMMEND THAT THE PRESENTATION
BE SUSPENDED UNTIL THE HAZARD OR PENETRATION IS IDENTIFIED
AND ELIMINATED.

16-203.3.  THE DIRECTOR, PSD, SHALL BE NOTIFIED OF ANY
TECHNICAL HAZARDS OR PENETRATIONS DETECTED DURING A
DOD APPEARANCE BEFORE CONGRESS OR CONGRESSIONAL STAFF.
  THE RESULTS OF ROUTINE TSCM SERVICES ALSO SHALL BE
REPORTED.

 FIGURE 13.  Preservice Information Letter

C17.  CHAPTER 17

AUTOMATED INFORMATION SYSTEM SECURITY

C17.1.  Section 1.   POLICY STATEMENT 

17-100.  POLICY.   CLASSIFIED INFORMATION SHALL BE PROCESSED
ON ACCREDITED AUTOMATED INFORMATION SYSTEMS (AIS) ONLY.

17-100.1.  THE DIRECTOR, PSD, SHALL BE THE DESIGNATED
APPROVING AUTHORITY (DAA) THAT ACCREDITS AIS TO PROCESS
CLASSIFIED INFORMATION.

17-100.2.  THE OSD COMPONENT HEAD IS RESPONSIBLE FOR
ENSURING SECURITY COMPLIANCE THROUGHOUT THE LIFE CYCLE
OF AN AIS, FROM CONCEPT THROUGH DESIGN, DEVELOPMENT,
OPERATIONS, MAINTENANCE, AND DISPOSAL.

17-100.3.  BEFORE PROCURING AIS FOR CLASSIFIED PROCESSING,
A MEMORANDUM REQUESTING ACCREDITATION SHALL BE FORWARDED
TO DIRECTOR, PSD.

17-100.4.  AIS SHALL BE ACCREDITED EVERY 3 YEARS.

C17.2.  Section 2.   ESTABLISHMENT 

17-200.  ACCREDITATION 

17-200.1.  THE OSD COMPONENT HEAD SHALL SIGN THE MEMORANDUM
REQUESTING ACCREDIATATION OF AIS PROCESSING CLASSIFIED
INFORMATION.   INCLUDE THE FOLLOWING INFORMATION IN
THE REQUEST:

17-200.1.1.  THE SUBJECT OF THIS MEMORANDUM SHALL BE:
  "REQUEST FOR AIS AND/OR TEMPEST EVALUATION:"

17-200.1.2.  THE NAME AND TELEPHONE NUMBER OF THE PROJECT
OFFICER COORDINATING THE EVALUATION.

17-200.1.3.  THE MANUFACTURER, NOMENCLATURE, AND MODEL
NUMBER OF EACH EQUIPMENT COMPONENT.

17-200.1.4.  ESTIMATE THE AVERAGE AMOUNT OF HOURS PER
WEEK OF EACH CATEGORY OF UNCLASSIFIED, CONFIDENTIAL,
SECRET, AND TOP SECRET MATERIAL SHALL BE PROCESSED ON
EACH EQUIPMENT COMPONENT.

17-200.1.5.  THE BUILDING NAME OR ADDRESS AND ROOM NUMBER(S)
WHERE THE EQUIPMENT IS AND/OR SHALL BE LOCATED.

17-200.1.6.  ALL ADJACENT AREAS WITH A COMMON PERIMETER
(WALLS, CEILING, FLOORS), INDICATING IF ACCESS TO THE
AREAS REQUIRES ESCORT, WHO CONTROLS THE AREAS, AND IF
ACCESS TO THE AREAS IS RESTRICTED, AND IF SO, TO WHAT
CLASSIFICATION LEVEL.

17-200.1.7.  IF ONE AIS COMPONENT IS TO BE INTERCONNECTED
WITH ANOTHER AIS COMPONENT, A NETWORKING SCHEMATIC OR
DESCRIPTION SHALL BE PROVIDED.

17-200.2.  THE REQUEST SHALL BE FORWARDED THROUGH THE
OSD COMPONENT SECURITY MANAGER TO THE DIRECTOR, PSD.

17-200.3.  THE DIRECTOR, PSD, SHALL:

17-200.3.1.  REVIEW ALL REQUESTS FOR ACCREDITATION.

17-200.3.2.  CONDUCT SURVEYS.

17-200.3.2.1.  FOR AIS NOT MEETING SECURITY STANDARDS,
IDENTIFY SECURITY SAFEGUARDS REQUIRED TO ACHIEVE STANDARDS.

17-200.3.2.2.  FOR AIS MEETING SECURITY STANDARDS, ISSUE
MEMORANDA ACCREDITING AIS FOR PROCESSING CLASSIFIED
INFORMATION.

17-200.3.3.  MAINTAIN THE RECORD OF ALL ACCREDITED AIS.

17-200.4.  THE PROJECT OFFICER SHALL:

17-200.4.1.  ASSIST THE PSD IN CONDUCTING ACCREDITATION
SURVEYS BY ANSWERING QUESTIONS AND PROVIDING REQUESTED
DOCUMENTATION.

17-200.4.2.  INCORPORATE IDENTIFIED SECURITY SAFEGUARDS
INTO THE AIS.   IF PHYSICAL SECURITY SAFEGUARDS ARE
REQUIRED, A COST ANALYSIS JUSTIFYING THE SUBSTITUTION
MUST BE PROVIDED TO THE PSD.

17-200.4.3.  PROVIDE SECURITY OR PRECAUTIONARY MEASURES
TO PREVENT CLASSIFIED INFORMATION COMPROMISE DURING
ALL PHASES OF THE AIS INSTALLATION.

17-200.4.4.  TELEPHONICALLY NOTIFY (697-6247) THE PSD
AFTER INSTALLATION IS COMPLETED AND BEFORE THE AIS BECOMES
OPERATIONAL.

C17.3.  Section 3.   ADMINISTRATION 

17-300.  ADMINISTRATION RESPONSIBILITIES.   THE OSD
COMPONENT SECURITY MANAGER SHALL:

17-300.1.  VERIFY THE IDENTITY, NEED-TO-KNOW, AND SECURITY
CLEARANCE FOR INDIVIDUALS REGISTERING AS AIS USERS.

17-300.2.  BRIEF THE USERS ON THEIR RESPONSIBILITIES
FOR AIS SECURITY AND THE INFORMATION IT CONTAINS.  
THIS BRIEFING SHALL BE CONDUCTED ANNUALLY.

17-300.3.  NOTIFY, IN WRITING, THE DIRECTOR, PSD, OF
ANY CHANGES TO THE USE, LAYOUT, AND EQUIPMENT FROM THE
ACCREDITED CONFIGURATION.

17-301.  CLASSIFICATION LEVEL 

17-301.1.  THE CLASSIFICATION OF AN AIS IS THE HIGHER
OF THE INFORMATION BEING PROCESSED (ENTERED FROM THE
KEYBOARD) OR THE INFORMATION IN MEMORY OR ON MEDIA.
  THE CLASSIFICATION LEVEL INCREASES AS THE INFORMATION
ENTERED OR STORED INCREASES IN CLASSIFICATION.   THE
AIS AND THE MEDIA REMAIN

CLASSIFIED AT THE HIGHEST LEVEL UNTIL THEY ARE DECLASSIFIED
OR DESTROYED.

17-301.2.  EXAMPLE.  SUPPOSE THERE IS AN AIS WITH ONE
FIXED DISK AND ONE FLOPPY DRIVE.   THE SYSTEM AND ITS
MEDIA ARE CLASSIFIED SECRET.   A PREVIOUSLY UNCLASSIFIED
DISKETTE PLACED IN THE SYSTEM'S FLOPPY DRIVE BECOMES
CLASSIFIED SECRET.   IF A TOP SECRET DISKETTE IS PLACED
INTO THE FLOPPY DRIVE THEN THE ENTIRE AIS, INCLUDING
THE FIXED DISK, BECOMES CLASSIFIED TOP SECRET.

17-302.  MARKING 

17-302.1.  THE AIS AND THE MEDIA SHALL BE MARKED BOTH
INTERNALLY AND EXTERNALLY TO INDICATE THE CLASSIFICATION.

17-302.2.  EXTERNAL MARKING

17-302.2.1.  AIS.   THE LEVEL OF CLASSIFIED PROCESSING
AUTHORIZED BY THE DESIGNATED APPROVING AUTHORITY SHALL
BE POSTED CLEARLY ON OR NEAR THE AIS.   DURING CLASSIFIED
PROCESSING THERE SHALL BE A PROMINENT DISPLAY TO REMIND
THE USER AND INFORM OTHERS OF THE LEVEL OF PROCESSING
IN PROGRESS.   THE USE OF A COVER SHEET IS THE RECOMMENDED
METHOD OF EXTERNALLY MARKING AN AIS DURING CLASSIFIED
PROCESSING.   A COVER SHEET PLACED IN THE VICINITY OF
THE CATHODE RAY TUBE (CRT) DURING PROCESSING MAY BE
USED TO COVER THE SCREEN WHEN THE OPERATOR IS NOT USING
THE SYSTEM.   REMINDER:   AN AIS PROCESSING CLASSIFIED
INFORMATION SHALL NEVER BE LEFT UNATTENDED.

17-302.2.2.  MEDIA

17-302.2.2.1.  CLASSIFICATION MARKING.   MEDIA AND ITS
CONTAINER SHALL BE MARKED PHYSICALLY IN A PROMINENT
LOCATION TO REFLECT THE HIGHEST LEVEL OF CLASSIFIED
INFORMATION RECORDED.   THE USE OF A CLASSIFICATION
LABEL AFFIXED TO THE MEDIA IS REQUIRED.   A PLAIN WHITE
LABEL WITH THE CLASSIFICATION STAMPED OR WRITTEN IS
ACCEPTABLE.

17-302.2.2.2.  REGRADING AND/OR DECLASSIFICATION INSTRUCTIONS.
  THE REGRADING AND/OR DECLASSIFICATIONS INSTRUCTIONS
ARE TO BE PLACED ON THE MEDIA IN A MANNER SIMILAR TO
THE CLASSIFICATION LABEL.   A PLAIN WHITE LABEL WITH
THE INFORMATION REQUIRED BY PARAGRAPH 4-400., ABOVE,
TYPED OR PRINTED ON IT IS RECOMMENDED.

17-302.2.2.3.  OWNERSHIP INFORMATION.   AN EXTERNAL
LABEL WITH THE USERS NAME, OFFICE SYMBOL, ROOM NUMBER,
AND PHONE NUMBER SHALL BE AFFIXED.

17-302.2.2.4.  NOTE:   ANY AND ALL LABELS USED SHOULD
BE DESIGNED OF THE NONRESIDUE VARIETY, SPECIFICALLY
FOR USE IN MARKING MAGNETIC MEDIA.   RESIDUE LEFT ON
MEDIA CONTAINERS SUCH AS PARTICLES OF PAPER OR GLUE
MAY INTERFERE WITH THE PROPER OPERATION OF READ AND/OR
WRITE HEADS OR DRIVE MECHANISMS.

17-302.3.  INTERNAL MARKING

17-302.3.1.  OVERALL CLASSIFICATION.   A FILE ON THE
MEDIA SHALL INDICATE THE HIGHEST CLASSIFICATION OF INFORMATION
STORED.   THE FILE SHOULD BE CALLED "SECURITY DOC."
  AN MS-DOS BASIC PROGRAM THAT CREATES SUCH A FILE IS
AVAILABLE FROM PSD.

17-302.3.2.  DIRECTORY MARKING.   IF A DIRECTORY TO
THE FILES (INFORMATION STORED) ON THE MEDIA EXISTS,
IT SHALL BE ANNOTATED TO INDICATE THE CLASSIFICATION
OF EACH FILE.

17-302.3.3.  INDIVIDUAL FILES.

17-302.3.3.1.  DOCUMENTS.   EACH DOCUMENT WITHIN THE
MEDIA SHALL BE LABELED, MARKED AND ANNOTATED IN ACCORDANCE
WITH THE INSTRUCTIONS FOR THE MARKING OF CLASSIFIED
DOCUMENTS.   CHAPTER 4, SECTION C4.2., ABOVE, SHALL
BE FOLLOWED.

17-302.3.3.2.  DATA FILES.   DATA FILES SHALL BE MARKED
MAXIMALLY WITH THE CLASSIFICATION OF RECORDS, ENTRIES,
ELEMENTS, FIELDS, ETC.

17-303.  SAFEGUARDING THE INFORMATION 

17-303.1.  GENERAL.   CLASSIFIED AIS AND MEDIA NOT UNDER
THE PERSONAL CONTROL AND OBSERVATION OF AN AUTHORIZED
PERSON SHALL BE GUARDED OR STORED FOR THE CLASSIFICATION
LEVEL OF THE INFORMATION.

17-303.2.  AIS.   THE FOLLOWING PROCEDURES SHALL BE
USED TO SAFEGUARD THE AIS AND THE CLASSIFIED INFORMATION
THAT IT PROCESSES:

17-303.2.1.  BEFORE CLASSIFIED PROCESSING, SCREEN, PRINTERS,
AND OTHER DEVICES SHALL BE POSITIONED AWAY FROM DOORS
AND WINDOWS TO PRECLUDE CASUAL OBSERVERS FROM READING
THE DISPLAY AND/OR OUTPUT.

17-303.2.2.  DURING CLASSIFIED PROCESSING, THE AIS SHALL
NOT BE LEFT UNATTENDED.

17-303.2.3.  SCREENS, PRINTERS, AND OTHER OUTPUT DEVICES
SHALL BE COVERED TO PREVENT UNAUTHORIZED VIEWING WHEN
THEY ARE NOT BEING USED ACTIVELY.

17-303.2.4.  WHEN CLASSIFIED PROCESSING IS COMPLETED
THE AIS SHALL BE DECLASSIFIED BY REMOVING THE CLASSIFIED
MEDIA AND COMPLETELY REMOVING POWER FOR AT LEAST 1 MINUTE.

17-303.3.  MEDIA.   CLASSIFIED MEDIA, WHEN NOT UNDER
THE PERSONAL CONTROL AND OBSERVATION OF AN AUTHORIZED
INDIVIDUAL, SHALL BE STORED COMMENSURATE WITH THE LEVEL
OF CLASSIFIED INFORMATION ON THE MEDIA.   IF THE MEDIA
MAY NOT BE REMOVED FROM THE AIS, THE ENTIRE AIS SHALL
BE SECURED.

17-304.  DISPOSAL 

17-304.1.  GENERAL.   CLASSIFIED AIS AND MEDIA SHALL
BE PROTECTED UNTIL THE CLASSIFIED INFORMATION CONTAINED
THEREON IS DISPOSED OF PROPERLY.

17-304.2.  AIS DECLASSIFICATION.   TO DECLASSIFY AN
AIS REMOVE ALL MEDIA AND POWER OFF THE AIS FOR AT LEAST
1 MINUTE.

17-304.3.  MEDIA DESTRUCTION.   THESE PROCEDURES SHALL
BE FOLLOWED TO DESTROY CLASSIFIED MEDIA.

17-304.3.1.  MAGNETIC TAPE.   REMOVE MAGNETIC TAPE FROM
THE REEL AND PLACE THE TAPE INTO A BURN BAG (MAGNETIC
TAPE SHOULD BE MIXED WITH OTHER CLASSIFIED WASTE). 
 THE BURN BAG IS THEN DISPOSED OF WITH BURN BAGS CONTAINING
CONVENTIONAL CLASSIFIED WASTE.   ONCE THE REEL IS DIVESTED
OF LABELS AND/OR MARKINGS INDICATING PREVIOUS USE OR
CLASSIFICATION, THE REEL MAY BE DISPOSED AS UNCLASSIFIED
TRASH.

17-304.3.2.  FLOPPY DISKS.   PLACE DISKETTES TO BE DESTROYED
INTO A BURN BAG (MAGNETIC DISKETTES SHOULD BE MIXED
WITH OTHER CLASSIFIED WASTE).   THE BURN BAG IS THEN
DISPOSED OF WITH BURN BAGS CONTAINING CONVENTIONAL CLASSIFIED
WASTE.

17-304.3.3.  RIGID DISKS.   DISK PLATTERS ARE PLACED
INTO A BURN BAG (DO NOT MIX WITH OTHER CLASSIFIED WASTE).
  THE BURN BAG IS THEN DISPOSED OF WITH OTHER CLASSIFIED
WASTE BY BRINGING THE BAG AND ITS CONTENTS TO THE ATTENTION
OF THE DRIVER OF THE TRUCK ACCEPTING CLASSIFIED BURN
BAGS.   REMOVING THE PLATTERS FROM A SEALED DISK DRIVE
(WINCHESTER TECHNOLOGY) MAY POSE CONTRACTUAL AND/OR
OTHER PROBLEMS; THEREFORE, THE DESTRUCTION OF THE ENTIRE
UNIT MAY BE MOST PRACTICAL.   ONCE THE DISK CONTAINER
IS DIVESTED OF THE DISK PLATTERS AND LABELS AND/OR MARKINGS
INDICATING PREVIOUS USE OR CLASSIFICATION, THEN THE
CONTAINER MAY BE DISPOSED OF AS UNCLASSIFIED TRASH.

17-305.  AUDIT TRAIL.   THERE SHALL BE A DOCUMENTED
HISTORY OF AIS USE.   IF THE AIS IS NOT SELF-DOCUMENTING,
A MANUAL LOG SHALL BE USED.   THE LOG SHALL RECORD THE
USER, DATE, AND TIME OF USE AND ACTIVITY.   THE LOG
SHALL BE RETAINED FOR I YEAR.   AN EXAMPLE OF SUCH A
LOG IS AS FOLLOWS:

USER

DATE

STRT

STOP

ACTIVITY

JOHN DOE 

26AUG86 

0745 

0915 

WORD PROC, SPREAD SHEETS 

__________ 

__________ 

_____ 

_____ 

____________________ 

__________ 

__________ 

_____ 

_____ 

____________________ 

__________ 

__________ 

_____ 

_____ 

____________________ 

C18.  CHAPTER 18

TEMPEST

18-100.  BACKGROUND.   TEMPEST IS A NICKNAME FOR INFORMATION
BEARING EMANATIONS THAT EXIST IN ALL ELECTRONIC AND
ELECTRICAL EQUIPMENT.   THEY ARE MOST FAMILIAR AS NOISE
OR INTERFERENCE ON RADIO AND TELEVISION SETS.   COMPROMISING
EMANATIONS RELATE TO THE ORIGINAL MESSAGE OR INFORMATION
BEING PROCESSED SO THAT IT MAY LEAD TO RECOVERY OF PLAIN
TEXT.   POOR INSTALLATION OR POSITIONING OF EQUIPMENT
MAY AGGRAVATE EXPLOITABLE VULNERABILITIES OF A SYSTEM
OR FACILITY EVEN THOUGH ALL SYSTEM COMPONENTS ARE TEMPEST
COMPLIANT.

18-101.  POLICY.   THE PSD SHALL CONDUCT A RISK EVALUATION
OF EQUIPMENTS AND/OR SYSTEMS PROCESSING CLASSIFIED INFORMATION
BEFORE PURCHASE AND/OR USE.   THIS SHALL PRECLUDE EXPENDITURES
FOR COUNTERMEASURES BEYOND THOSE REQUIRED BY REGULATION
AND ENSURE PROPER SAFEGUARDS ARE IMPLEMENTED FOR EQUIPMENTS
AND/OR SYSTEMS THAT PROCESS CLASSIFIED INFORMATION.
  THE VULNERABILITIES OF TEMPEST EMANATIONS MAY BE CONTROLLED
BY LIMITING SENSITIVE INFORMATION PROCESSING AND CONTROLLING
ACCESS TO EQUIPMENT PROCESSING CLASSIFIED MATERIAL.
  SOME INSTALLATIONS MAY NOT REQUIRE TEMPEST-COMPLIANT
EQUIPMENT.

18-102.  PROCEDURES 

18-102.1.  TO PROCESS CLASSIFIED INFORMATION ON AUTOMATED
EQUIPMENT SUCH AS WORD PROCESSORS, PRINTERS, OR SIMILAR
APPARATUS AND ON NON-AUTOMATED EQUIPMENT SUCH AS FACSIMILE
MACHINES OR VIDEO TAPE PLAYERS, THE OSD COMPONENT SECURITY
MANAGER SHALL SUBMIT TO THE DIRECTOR, PSD, A MEMORANDUM
CONTAINING THE FOLLOWING INFORMATION:

18-102.1.1.  THE SUBJECT OF THIS MEMORANDUM SHALL BE:
  "REQUEST FOR TEMPEST EVALUATION."   IF THE REQUEST
IS FOR AUTOMATED INFORMATION SYSTEMS AND/OR EQUIPMENT,
THE SUBJECT SHALL BE:   "REQUEST FOR AIS AND/OR TEMPEST
EVALUATION."

18-102.1.2.  THE NAME AND TELEPHONE NUMBER OF THE PROJECT
OFFICER COORDINATING THE EVALUATION.

18-102.1.3.  THE MANUFACTURER, NOMENCLATURE, AND MODEL
NUMBER OF EACH EQUIPMENT COMPONENT.

18-102.1.4.  ESTIMATE THE AVERAGE AMOUNT OF HOURS PER
WEEK OF EACH CATEGORY OF UNCLASSIFIED, CONFIDENTIAL,
SECRET, AND TOP SECRET MATERIAL SHALL BE PROCESSED ON
EACH EQUIPMENT COMPONENT.

18-102.1.5.  THE BUILDING NAME OR ADDRESS AND ROOM NUMBER(S)
WHERE THE EQUIPMENT IS AND/OR SHALL BE LOCATED.

18-102.1.6.  WHO IS LOCATED ON THE OTHER SIDE OF EACH
WALL, CEILING AND FLOOR; AND IF ACCESS TO THE AREAS
REQUIRES AN ESCORT AND/OR THE LEVEL SECURITY CLASSIFICATION
LEVEL.

18-102.1.7.  IF ONE AIS COMPONENT IS TO BE INTERCONNECTED
WITH ANOTHER AIS COMPONENT, A NETWORKING SCHEMATIC OR
DESCRIPTION SHALL BE PROVIDED.

18-102.2.  THE DIRECTOR, PSD, SHALL:

18-102.2.1.  REVIEW REQUESTS FOR TEMPEST RISK EVALUATIONS.

18-102.2.2.  CONDUCT SURVEYS TO DETERMINE PROPER COUNTERMEASURES.

18-102.3.  THE PROJECT OFFICER SHALL:

18-102.3.1.  ASSIST THE PSD IN CONDUCTING SURVEYS.

18-102.3.2.  TELEPHONICALLY NOTIFY (697-6247) THE PSD
AFTER PURCHASE OR INSTALLATION OF EQUIPMENT IS COMPLETED.

AP1.  APPENDIX 1

Equivalent Foreign and International Pact Organization
Security Classifications

Country

TOP SECRET

SECRET

CONFIDENTIAL

________

Argentina

ESTRICTAMENTE SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Australia

TOP SECRET

SECRET

CONFIDENTIAL

Austria

STRENG GEHEIM

GEHEIM

VERSCHULUSS

Belgium

     (French)

TRES SECRET

SECRET

CONFIDENTIEL

DIFUSION RESTREINTS

Belgium

     (Flemish)

ZEER GEHEIM

GEHEIM

VERTROUWELIJK

BEPERTKE VERSPREIDING

Bolivia

SYOERSECRETO or MUY SECRETO

SECRETO

CONFIDENCIAL

RESEDRVADO

Brazil

ULTRA SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Cambodia

TRES SECRET

SECRET

SECRET/CONFIDENTIAL

Canada

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

Chile

SECRETO

SECRETO

RESERVADO

RESERVADO

Columbia

ULTRASECRETO

SECRETO

RESERVADO

CONFIDENCIAL RESTRINGIDO

Costa Rice

ALTO SECRETO

SECRETO

CONFIDENCIAL

Denmark

HOJST NIMMILIGT

HIMMILIGT

FORTROLIGT

TIL TJENESTEBRUG

Ecuador

SECRETISIMO

SECRETO

CONFIDENCIAL

RESERVADO

Country

TOP SECRET

SECRET

CONFIDENTIAL

________

El Salvador

ULTRA SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Ethiopia

YEMLAZ BIRTOU MISTIR

KILKIL

Finland

ERITTAIN SALAINEN

SALAINEN

France

TRES SECRET

SECRET DEFENSE

CONFIDENTIEL DEFENSE

DIFFUSION RESTREINTE

Germany

STRENG GEHEIM

GEHEIM

VA-VERTRAULICH

Greece

AKPRE ANOPPHTON

ANOPPHTON

EMILIETEYTIKON

MEPINPIEMENHE XPHEERE

Guatamla

ALTO SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Haiti

SECRET

CONDIFENTIAL

Honduras

SUPER SCERETO

SECRETO

CONFIDENCIAL

RESERVADO

Hong Kong

TOP SECRET

SECRET

CONDIFENTIAL

RESTRICTED

Hungary

SZIGORUAN TITKOS

TITKOS

BIZALMAS

India

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

Indonesia

SANGAT RAHASIA

RAHASIA

TERBATAS

Iran

BEKOLI SERRI

SERRI

KHEILI MAHRAMANEH

MAHRAMANEH

Iraq

(Absolutely secret)

(Secret)

(Limited)

Iceland

ALGJORTI

TRUNADARMAL

Country

TOP SECRET

SECRET

CONFIDENTIAL

________

Ireland

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

     Gaelic

AN-SICREIDEACH

SICREDEACH

RUNDA

SRIANTA

Israel

SODI BEYOTER

SODI

SHAMUR

MUGBAL

Italy

SEGRETISSIMO

SEGRETO

RISERVATISSIMO

RISERVATO

Japan

KIMITSU

GOKUHI

HI

TORIATSUKAICHUI

JORDAN

MAKTUM JIDDAN

MAKTUM

SIRRI

MAHDUD

Korea

Laos

TRES SECRET

SECRET

SECRET/CONFIDENTIAL

DIFUSION RESTREINTE

Lebanon

TRES SECRET

SECRET

CONFIDENTIEL

Mexico

ALRO SECRETO

SECRETO

CONFIDENCIAL

RESTRINGIDO

Netherlands

ZEER GEHEIM

GEHEIM

CONFIDENTIEEL or VERTROUWELIJK

DIENSTGEHEIM

New Zealand

TOP SECRET

SECRET

CONDIFENTIAL

DIENSTGEHEIM

Nicaragua

ALSO SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Norway

STRENGT HEMMELIG

HEMMELIG

KONFIDENEIELT

BEGRENSET

Pakistan

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

Paraguay

SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Country

TOP SECRET

SECRET

CONFIDENTIAL

________

Peru

ESTRICTAMENTE SECRETO

SECRETO

CONDIFENCIAL

RESERVADO

Philippines

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

Portugal

MUITO SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

Spain

MAXIMO SECRETO

SECRETO

CONPIDENCIAL

DIFFUSSION LIMITADA

Sweden

     (Red Borders)

HEMLIG

HEMLIG

HEMLIG

Switzerland

(Three languages. TOP SECRET has a registration number
to distinguish from SECRET and CONFIDENTIAL.)

     French

TRES SECRET

SECRET DEFENSE

CONFIDENTIEL DEFENSE

DIFFUSIOM RESREINTE

     German

STRENG GEHEIM

GEHEIM

VESTRAULICH

     Italian

SEGRETISSIMO

SEGRETO

RISERVATISSIMO

RISERVATO DI

Taiwan

Thailand

LUP TISUD

LUP MAAG

LUP

POX PID

Turkey

COK GIZLI

GIZLI

OZEL

HIZMETE OZEL

Union of South Africa

     English

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

     Afrikaana

UITERS GEHEIM

GEHEIM

VERTROULIK

REPERK

United Arab Republic

     (Egypt)

TOP SECRET

VERY SECRET

SECRET

OFFICIAL

United Kingdom

TOP SECRET

SECRET

CONFIDENTIAL

RESTRICTED

URUGUAY

ULTRA SECRETO

SECRETO

CONFIDENCIAL

RESERVADO

USSR

Viet Nam

     French

TRES SECRET

SECRET DEFENSE

CONFIDENTIEL DEFENSE

DIFFUSION RESTREINTE

     Vietnamese

TOI MAT

MAT

KIN

TU MAT

INTERNATIONAL ORGANIZATION

TOP SECRET

SECRET

CONFIDENTIAL

(SEE CHAPTER XI)

NATO

COSMIC TOP SECRET

NATO SECRET

NATO CONFIDENTIAL

NATO RESTRICTED

NOTES:

In all instances foreign security classification systems
are not exactly parallel to the U.S. system and exact
equivalent classifications cannot be stated. The classifications
given above represent the nearest comparable designations
that are used to signify degrees of protection and control
similar to those prescribed for the equivalent U.S.
classifications.

"ATOMAL" information is an exclusive designation used
by NATO to identify "Restricted Data" or "Formerly Restricted
Data" information released by the U.S. Government to
NATO.

AP2.  APPENDIX 2

General Acccounting Office Officials

Authorized to Certify Security Clearances

AP2.1.  GENERAL ACCOUNTING OFFICE OFFICIALS AUTHORIZED
TO CERTIFY SECURITY CLEARANCES 

(See paragraph 7-101.3.)

 

The Comptroller General, Deputy Comptroller General
and Assistant Comptroller General and Assistants to
the Comptroller General

The General Counsel and Deputy General Counsel

The Director and Deputy Director, Personnel; the Security
Officer

The Director and Deputy Director, Office of Internal
Review

The Director and Assistants to the Director of the Office
of Program Planning and the Office of Policy

The Director and Deputy Directors of the Community and
Economic Development Division

The Director, Deputy Directors, Associate Directors,
Deputy Associate Directors, Senior Group Directors,
and the Assistant to the Director for Planning and Administration
of the Energy and Minerals Division

The Director, Deputy Directors, Associate Directors
and Division Personnel Security Officer of the Human
Resources Division

The Directors, Deputy Directors, and Associate Directors,
of the following Divisions:

             Claims

             Field Operations

             Financial and General Management Studies

             General Government

             International

             Logistics and Communications

             Procurement and Systems Acquisition

             Program Analysis Division

Directors and Managers of International Division Overseas
Offices as follows:

             Director European Branch, Frankfurt, Germany

             Director Far East Branch, Honolulu, Hawaii

             Manager, Sub Office, Bangkok, Thailand

Regional Managers and Assistant Regional Managers of
the Field Operations Division's Regional Offices as
follows:

             Atlanta, Georgia

             Boston, Massachusetts

             Chicago, Illinois

             Cincinnati, Ohio

             Dallas, Texas

             Denver, Colorado

             Detroit, Michigan

             Kansas City, Missouri

             Los Angeles, California

             New York, New York

             Norfolk, Virginia

             Philadelphia, Pennsylvania

             San Francisco, California

             Seattle, Washington

             Washington, D.C.

AP3.  APPENDIX 3

Instructions Governing Use of Code Words, Nicknames,
and Exercise Terms

AP3.1.1.  Definitions 

AP3.1.1.1.  Using Component.   The DoD Component to
which a code word is allocated for use, and which assigns
to the word a classified meaning, or which originates
nicknames and exercise terms using the procedure established
by the Joint Chiefs of Staff.

AP3.1.1.2.  Code Word.   Word selected from those listed
in Joint Army-NavyAir Force Publication (JANAP) 299
(reference (ff)) and later volumes, and assigned a classified
meaning by appropriate authority to insure proper security
concerning intentions, and to safeguard information
pertaining to actual military plans or operations classified
as Confidential or higher.   A code word shall not be
assigned to test, drill or exercise activities.   A
code word is placed in one of three categories:

AP3.1.1.2.1.  Available.   Allocated to the using component.
  Available code words individually will be unclassified
until placed in the active category.

AP3.1.1.2.2.  Active.   Assigned a classified meaning
and current.

AP3.1.1.2.3.  Canceled.   Formerly active, but discontinued
due to compromise, suspected compromise, cessation,
or completion of the operation to which the code word
pertained.   Canceled code words individually will be
unclassified and remain so until returned to the active
category.

AP3.1.1.3.  Nickname.   A combination of two separate
unclassified words that is assigned an unclassified
meaning and is employed only for unclassified administrative,
morale, or public information purposes.

AP3.1.1.4.  Exercise Term.   A combination of two words,
normally unclassified, used exclusively to designate
a test, drill, or exercise.   An exercise term is employed
to preclude the possibility of confusing exercise directions
with actual operations directives.

AP3.1.2.  Policy and Procedure 

AP3.1.2.1.  Code Words.   The Joint Chiefs of Staff
are responsible for allocating words or blocks of code
words from JANAP 299 to DoD Components.   DoD Components
may request allocation of such code words as required
and may reallocate available code words within their
organizations, in accordance with individual policies
and procedures, subject to applicable rules set forth
herein.

AP3.1.2.1.1.  A permanent record of all code words shall
be maintained by the Joint Chiefs of Staff.

AP3.1.2.1.2.  The using Component shall account for
available code words and maintain a record of each active
code word.   Upon being canceled, the using component
shall remaintain the record for 2 years; thence the
record of each code word may be disposed of in accordance
with current practices, and the code word returned to
the available inventory.

AP3.1.2.2.  Nicknames 

AP3.1.2.2.1.  Nicknames may be assigned to actual events,
projects, movement of forces, or other nonexercise activities
involving elements of information of any classification
category, but the nickname, the description or meaning
it represents, and the relationship of the nickname
and its meaning must be unclassified.   A nickname is
not designed to achieve a security objective.

AP3.1.2.2.2.  Nicknames, improperly selected, can be
counterproductive.   A nickname must be chosen with
sufficient care to ensure that it does not:

AP3.1.2.2.2.1.  Express a degree of bellicosity inconsistent
with traditional American ideals or current foreign
policy;

AP3.1.2.2.2.2.  Convey connotations offensive to good
taste or derogatory to a particular group, sect, or
creed; or,

AP3.1.2.2.2.3.  Convey connotations offensive to our
allies or other Free World nations.

AP3.1.2.2.3.  The following shall not be used as nicknames:

AP3.1.2.2.3.1.  Any two-word combination voice call
sign found in JANAP 119 (reference (ff)) or ACP 110
(reference (aaa)).   (However, single words in JANAP
119 or ACP 110 may be used as part of a nickname if
the first word of the nickname does not appear in JANAP
299 (reference (ff)) and later volumes.)

AP3.1.2.2.3.2.  Combination of words including word
"project," "exercise," or "operation."

AP3.1.2.2.3.3.  Words that may be used correctly either
as a single word or as two words, such as "moonlight."

AP3.1.2.2.3.4.  Exotic words, trite expressions, or
well-known commercial trademarks.

AP3.1.2.2.4.  The Joint Chiefs of Staff shall:

AP3.1.2.2.4.1.  Establish a procedure by which nicknames
may be authorized for use by DoD Components.

AP3.1.2.2.4.2.  Prescribe a method for the using Components
to report nicknames used.

AP3.1.2.2.5.  The Heads of DoD Components shall:

AP3.1.2.2.5.1.  Establish controls within their Components
for the assignment of nicknames authorized under subparagraph
AP3.1.2.2.4.1., above.

AP3.1.2.2.5.2.  Under the procedures established, advise
the Joint Chiefs of Staff of nicknames as they are assigned.

AP3.1.2.3.  Exercise Term 

AP3.1.2.3.1.  Exercise terms may be assigned only to
tests, drills, or exercises for the purpose of emphasizing
that the event is a test, drill, or exercise and not
an actual operation.   The exercise term, the description
or meaning it represents, and the relationship of the
exercise term and its meaning can be classified or unclassified.
  A classified exercise term is designed to simulate
actual use of DoD code words and must be employed using
identical security procedures throughout the planning,
preparation, and execution of the test, drill, or exercise
to ensure realism.

AP3.1.2.3.2.  Selection of exercise terms will follow
the same guidance as contained in subparagraphs AP3.1.2.2.2.2.
and AP3.1.2.2.2.3., above.

AP3.1.2.3.3.  The Joint Chiefs of Staff shall:

AP3.1.2.3.3.1.  Establish a procedure by which exercise
terms may be authorized for use by DoD Components.

AP3.1.2.3.3.2.  Prescribe a method for using Components
to report exercise terms used.

AP3.1.2.3.4.  The Heads of DoD Components shall:

AP3.1.2.3.4.1.  Establish controls within their Component
for the assignment of exercise terms authorized under
subparagraph AP3.1.2.3.3., above.

AP3.1.2.3.4.2.  Under the procedures established, advise
the Joint Chiefs of Staff of exercise terms as they
are assigned.

AP3.1.3.  Assignment of Classified Meanings to Code
Words 

AP3.1.3.1.  The DoD Component responsible for the development
of a plan or the execution of an operation shall be
responsible for determining whether to assign a code
word.

AP3.1.3.2.  Code words shall be activated for the following
purposes only:

AP3.1.3.2.1.  To designate a classified military plan
or operation;

AP3.1.3.2.2.  To designate classified geographic locations
in conjunction with plans or operations referred to
in subparagraph AP3.1.3.2.1., above; or

AP3.1.3.2.3.  To conceal intentions in discussions and
messages or other documents pertaining to plans, operations,
or geographic locations referred to in subparagraphs
AP3.1.3.2.1. and AP3.1.3.2.2., above.

AP3.1.3.3.  The using Component shall assign to a code
word a specific meaning classified Top Secret, Secret,
or Confidential, commensurate with military security
requirements.   Code words shall not be used to cover
unclassified meanings.   The assigned meaning need not
in all cases be classified as high as the classification
assigned to the plan or operation as a whole.

AP3.1.3.4.  Code words shall be selected by each using
Component in such manner that the word used does not
suggest the nature of its meaning.

AP3.1.3.5.  A code word shall not be used repeatedly
for similar purposes; that is, if the initial phase
of an operation is designated "Meaning," succeeding
phases should not be designated "Meaning II" and "Meaning
III," but should have different code words.

AP3.1.3.6.  Each DoD Component shall establish policies
and procedures for the control and assignment of classified
meanings to code words, subject to applicable rules
set forth herein.

AP3.1.4.  Notice of Assignment, Dissemination, and Cancelation
of Code Words and Meanings 

AP3.1.4.1.  The using Component shall promptly notify
the Joint Chiefs of Staff when a code word is made active,
indicating the word, and its classification.   Similar
notice shall be made when any changes occur, such as
the substitution of a new word for one previously placed
in use.

AP3.1.4.2.  The using Component is responsible for further
dissemination of active code words and meanings to all
concerned activities, to include classification of each.

AP3.1.4.3.  The using Component is responsible for notifying
the Joint Chiefs of Staff of canceled code words.  
This cancellation report is considered final action,
and no further reporting or accounting of the status
of the canceled code word will be required.

AP3.1.5.  Classification and Downgrading Instructions


AP3.1.5.1.  During the development of a plan, or the
planning of an operation by the headquarters of the
using Component, the code word and its meaning shall
have the same classification.   When dissemination of
the plan to other DoD Components or to subordinate echelons
of the using Component is required, the using Component
may downgrade the code words assigned below the classification
assigned to their meanings in order to facilitate additional
planning implementation, and execution by such other
Components or echelons, but code words shall, at a minimum,
be classified Confidential.

AP3.1.5.2.  A code word that is replaced by another
code word due to a compromise or suspected compromise,
or for any other reason, shall be canceled, and classified
Confidential for a period of 2 years, after which the
code word will become unclassified.

AP3.1.5.3.  When a plan or operation is discontinued
or completed, and is not replaced by a similar plan
or operation but the meaning cannot be declassified,
the code word assigned thereto shall be canceled and
classified Confidential for a period of 2 years, or
until the meaning is declassified, whichever is sooner,
after which the code word will become unclassified.

AP3.1.5.4.  In every case, whenever a code word is referred
to in documents, the security classification of the
code word shall be placed in parentheses immediately
following the code word, for example, "Label (C)."

AP3.1.5.5.  When the meaning of a code word no longer
requires a classification, the using Component shall
declassify the meaning and the code word and return
the code word to the available inventory.

AP3.1.6.  Security Practices 

AP3.1.6.1.  The meaning of a code word may be used in
a message or other document, together with the code
word, only when it is essential to do so.   Active code
words may be used in correspondence or other documents
forwarded to addressees who may or may not have knowledge
of the meaning.   If the context of a document contains
detailed instructions or similar information that indicates
the purpose or nature of the related meaning, the active
code word shall not be used.

AP3.1.6.2.  In handling correspondence pertaining to
active code words, care shall be used to avoid bringing
the code words and their meanings together.   They should
be handled in separate card files, catalogs, indexes,
or lists, enveloped separately, and dispatched at different
times so they do not travel through mail or courier
channels together.

AP3.1.6.3.  Code words shall not be used for addresses,
return addresses, shipping designators, file indicators,
call signs, identification signals, or for other similar
purposes.

AP3.1.7.  All code words formerly categorized as "inactive"
or "obsolete" shall be placed in the current canceled
category and classified Confidential.   Unless otherwise
restricted, all code words formerly categorized as "canceled"
or "available" shall be individually declassified. 
 All records associated with such code words may be
disposed of in accordance with current practices, provided
such records have been retained at least 2 years after
the code words were placed in the former categories
of "inactive," "obsolete," or "canceled."

AP4.  APPENDIX 4

FEDERAL AVIATION ADMINISTRATION AIR TRANSPORTATION

SECURITY FIELD OFFICES

   

                                                   
               (See paragraph 8-3032.1.1.)

CITY

STATE

Anchorage

Alaska

Atlanta

Georgia

Baltimore

Maryland

Boston

Massachusetts

Chicago (O'Hare)

Illinois

Cleveland

Ohio

Dallas

Texas

Denver

Colorado

Detroit

Michigan

Honolulu

Hawaii

Houston

Texas

Kansas City

Missouri

Las Vegas

Nevada

Los Angeles

California

Miami

Florida

Minneapolis

Minnesota

Newark

New Jersey

New Orleans

Louisiana

New York (John F. Kennedy)

New York

New York (La Guardia)

New York

Philadelphia

Pennsylvania

Pittsburgh

Pennsylvania

Portland

Oregon

Saint Louis 

Missouri

San Antonio

Texas

San Diego

California

San Francisco

California

San Juan

Puerto Rico

Seattle

Washington

Tampa

Florida

Tucson

Arizona

Washington (Dulles)

Washington, DC

Washington (National)

Washington, DC

AP5.  APPENDIX 5

TRANSPORTATION PLAN

   

                                                   
     (See paragraph 8-104.)

   

AP5.1.   The provisions of subsection 8-104. of this
Regulation require that transmission instructions or
a separate transportation plan be included with any
contract, agreement or other arrangement involving the
release of classified material to foreign entities.
  The transportation plan is to be submitted to and
approved by applicable DoD authorities.   As a minimum,
the transportation plan shall include the following
provisions:

AP5.1.1.  A description of the classified material together
with a brief narrative as to where and under what circumstances
transfer of custody will occur:

AP5.1.2.  Identification, by name or title, of the designated
representative of the foreign recipient government or
international organization who will receipt for and
assume security responsibility for the U.S. classified
material (person(s) so identified must be cleared for
access to the level of the classified material to be
shipped);

AP5.1.3.  Identification and specific location of delivery
points and any transfer points;

AP5.1.4.  Identification of commercial carriers and
freight forwarders or transportation agents who will
be involved in the shipping process, the extent of their
involvement, and their security clearance status;

AP5.1.5.  Identification of any storage or processing
facilities to be used and, relative thereto, certification
that such facilities are authorized by competent Government
authority to receive, store, or process the level of
classified material to be shipped;

AP5.1.6.  When applicable, the identification, by name
or title, of couriers and escorts to be used and details
as to their responsibilities and security clearance
status;

AP5.1.7.  Description of shipping methods to be used
as authorized by the provisions of Chapter 8., together
with the identification of carriers (foreign and domestic);

AP5.1.8.  In those cases when it is anticipated that
the U.S. classified material or parts thereof may be
returned to the United States for repair, service, modification,
or other reasons, the plan must require that shipment
shall be via a carrier of U.S. or recipient government
registry, handled only by authorized personnel, and
that the applicable Military Department (for foreign
military sales (FMS)) or Defense Investigative Service
(for commercial sales) will be given advance notification
of estimated time and place of arrival and will be consulted
concerning inland shipment;

AP5.1.9.  The plan shall require the recipient government
or international organization to examine shipping documents
upon receipt of the classified material in its own territory
and advise the responsible Military Department in the
case of FMS, or Defense Investigative Service in the
case of commercial sales, if the material has been transferred
enroute to any carrier not authorized by the transportation
plan; and

AP5.1.10.  The recipient government or international
organization also will be required to inform the responsible
Military Department or the Defense Investigative Service
promptly and fully of any known or suspected compromise
of U.S. classified material while such material is in
its custody or under its cognizance during shipment.

AP6.  APPENDIX 6

FOREIGN TRAVEL SECURITY BRIEFING

   

                                                   
               (SEE SUBSECTION 8-300.)

AP6.1.  FOREIGN TRAVEL SECURITY BRIEFING 

EACH PERSON TRAVELING OUTSIDE OF THE UNITED STATES,
WHETHER IN A CIVILIAN OR MILITARY STATUS OR OTHERWISE
AFFILIATED WITH THE DEPARTMENT OF DEFENSE, BECOMES A
SECURITY OFFICER.   THE PURPOSE OF THE BRIEFING IS TO
PROVIDE SECURITY TIPS FOR THE TRAVELER AND GUIDANCE
IN SAFEGUARDING CLASSIFIED INFORMATION.

AP6.1.1.  THE PROVISIONS OF SECTION C8.3., CHAPTER 8.,
ABOVE, OF THIS INSTRUCTION SHALL BE COMPLIED WITH IF
IT IS ABSOLUTELY ESSENTIAL TO CARRY CLASSIFIED MATERIAL
OVERSEAS.   THE DIRECTOR, PSD, MAY AUTHORIZE THE CARRYING
OF SUCH MATERIAL ON COMMERCIAL AIRCRAFT OUTSIDE OF THE
UNITED STATES.   THE FOLLOWING PROCEDURES SHALL BE FOLLOWED
BY THE PERSON CARRYING THE MATERIAL:

AP6.1.1.1.  THE CLASSIFIED INFORMATION MUST REMAIN IN
YOUR PHYSICAL POSSESSION AT ALL TIMES, IF PROPER STORAGE
AT A U.S. GOVERNMENT ACTIVITY IS NOT AVAILABLE.

AP6.1.1.2.  THE CLASSIFIED INFORMATION SHALL NOT BE
EXPOSED, READ, STUDIED, DISPLAYED, OR USED IN PUBLIC
CONVEYANCES OR PLACES.

AP6.1.1.3.  YOU MUST OBTAIN DOCUMENTATION REQUIRED BY
PARAGRAPH 8-302., ABOVE, OF THIS INSTRUCTION.   THIS
MEMORANDUM SHALL BE PRESENTED AT AIRPORT SCREENINGS
AND CUSTOMS STATIONS.   IF SEALED PACKAGES CONTAINING
CLASSIFIED MATERIAL ARE CHALLENGED, YOU SHOULD SEEK
THE ASSISTANCE OF AN OFFICIAL OF THE AIRLINE INVOLVED,
THE AIRPORT MANAGER, OR THE LOCAL FEDERAL AVIATION ADMINISTRATION
(FAA) REPRESENTATIVE FOR INCIDENTS THAT OCCUR WITHIN
THE UNITED STATES.   IF SUCH A PROBLEM SHOULD OCCUR
AT POINTS OF ENTRY OR DEPARTURE OUTSIDE THE UNITED STATES,
YOU SHOULD CONTACT THE NEAREST U.S. MILITARY OR STATE
DEPARTMENT REPRESENTATIVE.

AP6.2.  DURING YOUR STAY IN A FOREIGN COUNTRY: 

AP6.2.1.  CARRY IDENTIFICATION.   TAKE ALL ESSENTIAL
PERSONAL AND MEDICAL IDENTIFICATION TO GET YOU SUCCESSFULLY
THROUGH YOUR TRIP.   DOCUMENT YOUR BLOOD TYPE AS WELL
AS ANY SPECIAL MEDICAL CONDITION OR MEDICAL REQUIREMENT
THAT YOU MIGHT HAVE.   STORE ESSENTIAL MEDICATIONS IN
ORIGINAL CONTAINERS; DO NOT LEAVE YOUR WALLET OR PURSE
UNATTENDED.

AP6.2.2.  ESTABLISH POINTS OF CONTACT.   SOMEONE SHOULD
KNOW YOUR WHEREABOUTS FROM THE TIME THAT YOU DEPART
THE UNITED STATES UNTIL YOU RETURN HOME.   PROVIDE YOUR
CONTACT WITH A COPY OF YOUR ITINERARY AND ADVISE HIM
AND/OR HER OF ANY CHANGES.

AP6.2.3.  KEEP A LOW PROFILE.   CLOTHES, AUTOMOBILES,
AND OTHER OUTWARD VESTIGES OF NATIONALITY SHOULD NOT
PROVIDE A STARK CONTRAST WITH THOSE OF THE COUNTRY IN
WHICH YOU ARE TRAVELING.   CLOTHING SHOULD NOT GIVE
THE IMPRESSION OF WEALTH OR IMPORTANCE.   IF MILITARY,
AVOID WEARING A MILITARY UNIFORM UNLESS REQUIRED; IT
MIGHT ATTRACT UNWANTED ATTENTION.

AP6.2.4.  SHUN PUBLICITY.   SHUN PUBLICITY AND INQUIRIES
BY THE LOCAL NEWS MEDIA.   IF APPROACHED BY THE MEDIA
REMEMBER NOT TO DISCLOSE THE ADDRESSES AND TELEPHONE
NUMBERS OF ANY CLEARED PERSONNEL.   PERSONAL AND BACKGROUND
INFORMATION CONCERNING FAMILY MEMBERS ALSO SHOULD BE
WITHHELD.

AP6.2.5.  AVOID CIVIL DISTURBANCES.   EVERY EFFORT SHOUTD
BE MADE TO AVOID CIVIL DISTURBANCES AND DISPUTES WITH
LOCAL CITIZENS.   USE CAUTION IF YOU COME UPON A DEMONSTRATION
OR A RALLY.   IF THE' SPEAKER IS DENOUNCING U.S. POLICY,
THE CROWD MIGHT BECOME HOSTILE TO ANY AMERICAN BYSTANDERS.
  SHOULD VIOLENCE BREAK OUT, ARRESTS ARE SOMETIMES MADE
INDISCRIMINATELY.   IN THE CONFUSION YOU COULD BE ARRESTED
OR DETAINED EVEN THOUGH YOU ARE ONLY AN "INNOCENT BYSTANDER."

AP6.2.6.  PRECAUTIONS WHEN WALKING.   WALK ONLY ON WELL
LIGHTED AND HEAVILY TRAVELED STREETS WHENEVER POSSIBLE.
  WALK IN THE MIDDLE OF THE SIDEWALK.   AVOID SHORTCUTS
THROUGH ALLEYS.   WHILE WALKING, IF YOU ARE THREATENED
BY THE OCCUPANTS OF A CAR, MOVE IN THE DIRECTION OPPOSITE
TO THAT IN WHICH THE CAR IS TRAVELING.   THEN SEEK HELP.
  IF APPROACHED BY A SUSPICIOUS LOOKING PERSON ON FOOT,
CROSS THE STREET OR CHANGE DIRECTION.

AP6.2.7.  DRIVING OVERSEAS.   DRIVE CAREFULLY WHILE
YOU ARE ABROAD!   MANY COUNTRIES DEAL HARSHLY WITH FOREIGNERS
WHO ARE INVOLVED IN TRAFFIC ACCIDENTS.   DRIVERS ARE
OFTEN DETAINED IN JAIL WHILE SUCH ACCIDENTS ARE INVESTIGATED.
  TAKE CARE NOT TO SPEED AS SOME COUNTRIES IMPOSE A
SPEEDING FINE THAT IS PAYABLE WHEN LEVIED.   ALSO, IN
SOME AREAS IT IS UNLAWFUL TO USE INSULTING LANGUAGE
TOWARD ANOTHER PERSON OR TO USE ABUSIVE GESTURES WHILE
DRIVING.   REMEMBER THAT WHAT IS A NORMAL GESTURE IN
ONE COUNTRY IS AN ABUSIVE ONE IN ANOTHER.   WHILE SOME
COUNTRIES DO NOT RECOGNIZE U.S. DRIVER'S LICENSES, MOST
DO ACCEPT INTERNATIONAL DRIVER'S LICENSES, AND THE LATTER
ARE OFTEN REQUIRED BY FOREIGN CAR RENTAL AGENCIES. 
 FOR A FEE, YOU MAY OBTAIN AN INTERNATIONAL DRIVERS
LICENSE FROM THE AMERICAN AUTOMOBILE ASSOCIATION.

AP6.2.8.  LOCAL LAWS.   REMEMBER THAT ALTHOUGH YOU ARE
AN AMERICAN CITIZEN, YOU ARE SUBJECT TO THE LAWS OF
THE COUNTRY IN WIFICH YOU ARE TRAVELING.   IN MOST OF
WESTERN EUROPE, THE LAWS ARE SIMILAR TO THOSE IN THE
UNITED STATES.   SOME OF THE LAWS IN COUNTRIES SUCH
AS TURKEY, TAIWAN, SPAIN, AND OTHERS DIFFER SIGNIFICANTLY.
  FOR EXAMPLE, IN THESE COUNTRIES, INDIVIDUALS ARE PROHIBITED
FROM MAKING DEROGATORY COMMENTS ABOUT THE GOVERNMENT
OR THE GOVERNMENT'S LEADERS.   FAMILIARIZE YOURSELF
WITH THE LAWS OF THE COUNTRY(IES) THAT YOU SHALL BE
VISITING AND OBSERVE THESE LAWS.   NEVER ENGAGE IN ANY
BLACK MARKET ACTIVITIES.

AP6.2.9.  EVADING TERRORISTS AND CRIMINALS.   THE TERRORIST
AND CRIMINAL THREAT VARIES FROM COUNTRY TO COUNTRY.
  IF YOU ARE TRAVELING TO A HIGH RISK AREA, GET AS MAXIMAL
INFORMATION ABOUT THE THREAT IN THAT AREA BEFORE YOU
LEAVE.   DEVELOP A SECURITY PLAN AND IMPLEMENT IT UPON
ARRIVAL IN THE COUNTRY.   IN LOW RISK AREAS DO NOT BECOME
COMPLACENT; SITUATIONS SOMETIMES CHANGE RAPIDLY.   IN
GENERAL, TERRORISTS AND CRIMINALS SIMILARLY STRIKE WHEN
AND WHERE THEY SENSE THEIR TARGETS TO BE MORE VULNERABLE,
AND THEY ARE MOST SUCCESSFUL WHEN SECURITY MEASURES
ARE LAX AND DAILY ROUTINES ARE PREDICTABLE.   VARY ARRIVAL
TIMES, DEPARTURE TIMES, AND ROUTES THAT YOU NORMALLY
TAKE.   BE ALERT TO THE POSSIBILITY OF SURVEILLANCE.
  IF YOU BELIEVE THAT YOU ARE BEING FOLLOWED, DO NOT
CHALLENGE YOUR FOLLOWER; INSTEAD, ATTEMPT TO MENTALLY
NOTE HIS AND/OR HER PHYSICAL CHARACTERISTICS, TYPE OF
CAR, LICENSE NUMBER, ETC.emsp; PROMPTLY REPORT SUCH
INCIDENTS TO SECURITY OFFICIALS AT THE SITE WHERE YOU
ARE VISITING OR AT THE NEAREST U.S. EMBASSY.

AP6.2.10.  ESPIONAGE.   A REPRESENTATIVE OF THE OFFICE
OF THE SECRETARY OF DEFENSE, YOU MAY BE TARGETED FOR
ATTEMPTED EXPLOITATION BY FOREIGN INTELLIGENCE AGENTS
IN ANY FOREIGN COUNTRY THAT YOU MAY BE TRAVELING THROUGH
OR VISITING.   DO NOT DISCUSS INFORMATION OUTSIDE SECURE
FACILITIES OR OVER TELEPHONES.   EXERCISE CAUTION IN
MAKING OR WRITING STATEMENTS THAT MIGHT BE EXPLOITED
FOR PROPAGANDA PURPOSES.   DO NOT SIGN PETITIONS, HOWEVER
HARMLESS THEY APPEAR.   BE EXTREMELY CAREFUL IN HANDLING
YOUR PASSPORT.   DO NOT PHOTOGRAPH ANY MILITARY INSTALLATION,
DEFENSE PLANT, OR OTHER OBVIOUSLY RESTRICTED AREAS.
  REFRAIN FROM PHOTOGRAPHING MILITARY EQUIPMENT AND
PERSONNEL.   BEWARE OF OVERLY FRIENDLY TOURIST GUIDES,
INTERPRETERS, MAIDS, CAB DRIVERS, ETC., TAKING UNDUE
INTEREST IN YOU.   BE PARTICULARLY SUSPICIOUS OF GUIDE
PERSONNEL WHO JUST "HAPPEN" TO KNOW YOUR SPECIAL INTERESTS
AND AVOCATIONS.   DO NOT SIGN ANY RECEIPTS FOR MONEY
OR SERVICES UNLESS YOU ARE FIRST ENSURED OF, AND FURNISHED
AN ON-THE-SPOT COPY THAT CLEARLY SPECIFIES AND ITEMIZES,
THE NATURE OF THE TRANSACTION.   IF YOU EVER SUSPECT
AN APPROACH HAS BEEN MADE IN A CONSPIRACY TO COMMIT
ESPIONAGE, REPORT TO THE NEAREST U.S. MILITARY COMMAND
OR EMBASSY SECURITY OFFICER.   ABOVE ALL, DO NOT ATTEMPT
TO GET OUT OF SUCH A SITUATION YOURSELF OR ASSUME THE
ROLE OF A SELF-APPOINTED AGENT.   IF AN INDISCRETION
IS INVOLVED OR YOU ARE THREATENED WITH A COMPROMISING
SITUATION, YOU MAY DISCUSS THE MATTER IN CONFIDENCE
WITH A U.S SECURITY REPRESENTATIVE.   HE AND/OR SHE
IS NOT INTERESTED IN RUINING A REPUTATION BUT IN PROTECTING
THE UNITED STATES, YOU, AND THE CLASSIFIED INFORMATION
YOU POSSESS.   DO NOT UNDERTAKE OR IN ANY MANNER CAUSE
ANYONE TO CONSIDER ANY PART OF YOUR OFFICIAL TRAVEL
AS AN INTELLIGENCE OPERATION.   CONDUCT ONLY THAT OFFICIAL
BUSINESS FOR WHICH THE TRAVEL WAS AUTHORIZED.

AP6.2.11.  A FINAL WORD.   NOW THAT YOU ARE AWARE OF
THE BASIC PRECAUTIONS THAT SHOULD BE TAKEN DURING YOUR
TRIP, TAKE SOME TIME TO PUT ALL OF THIS INFORMATION
INTO PERSPECTIVE.   IF YOU FOLLOW THESE PRECAUTIONS
YOU SHALL REDUCE THE RISK OF ENCOUNTERING PROBLEMS.

AP7.  APPENDIX 7

CROSS-REFERENCE INDEX

PARAGRAPH

ABSENCE

     UNAUTHORIZED, REPORTING OF

6-110.

ACCESS

     BASIC POLICY

7-100.

     CONGRESS

7-101.1.

     CONTRACTORS

7-101.4.

     COURTS

7-101.7.

     FEDERAL LAW ENFORCEMENT OFFICIALS.

7-104.

     FOREIGN NATIONALS AND GOVERNMENTS.

7-102.

     FORMER PRESIDENTIAL APPOINTEES

7-101.6.

     GENERAL ACCOUNTING OFFICE.

7-101.3.

     NEED TO KNOW REQUIREMENT

7-103.

     RESEARCHERS

7-101.5.

     VISITORS

7-105.

ACCOUNTABILITY

     CONFIDENTIAL

7-302.

     OF CLASSIFIERS

2-100.

     SECRET

7-301.

     TOP SECRET

7-300.

     WORKING PAPERS

7-304.1.

ADDRESSING

     FOR TRANSMISSION

8-201.

ADMINISTRATIVE SANCTIONS

     CORRECTIVE ACTION

         NON-PUNITIVE

14-101.3.1.

         PUNITIVE

14-101.3.2.

     VIOLATIONS SUBJECT TO SANCTIONS

14-101.

AIRCRAFT

     RESTRICTIONS ON HAND-CARRYING CLASSIFIED

8-300.4., 8-301. THROUGH 8-303.

ALARMED AREA

     ADMINISTRATION

5-502.

     ALARMED AREA ACCESS LIST

5-509.

     ALARM DURING SECURITY HOURS

5-505.

     CLOSING

5-503.

     ESTABLISHMENT OF

5-501.

     EXTENDING HOURS

5-504.

     OPENING

5-503.

     PROCEDURAL VIOLATIONS

5-506.

     TESTING

5-506.

APPEALS

     CLASSIFICATION CHALLENGE DENIAL

2-104.6.

     MANDATORY REVIEW DENIAL

3-304.6.

     PUBLIC RELEASE DENIAL

3-702.

BRIEFINGS

     FOREIGN TRAVEL

10-104.

     HAND-CARRYING ABOARD AIRCRAFT

8-303.2.

     INITIAL

10-102.

     REFRESHER

10-103.

BURN BAGS

     MARKING

9-105.

     SECURING

9-105.

     USE

9-104., 9-105.

CHALLENGES TO CLASSIFICATION

     AS PART OF SECURITY EDUCATION

10-101.3.

     POLICY AND PROCEDURES

2-103., 2-104.

CHANGES

     IN CLASSIFICATION

3-600.

     IN MARKINGS

4-400.

     SUGGESTIONS

1-207.

     UPGRADING

2-800. THROUGH 2-802.

CHARTS

     MARKING

4-301.

CLASSIFICATION

     BASIC POLICY

1-400.1.

     CRITERIA

2-202.

     DURATION

1-400.3.

     LIMITS

1-600.3.

     REASONS TO EXTEND

2-301.3.

     RESOLUTION OF DOUBTS

1-400.2.,2-200.

     RESPONSIBILITY FOR CORRECT

1-400.4., 2-100., 2-101.

     TWO STEP REQUIREMENT FOR

2-202.

CLASSIFICATION AUTHORITY

     DEFINITION

1-303.

     DELEGATION OF ORIGINAL AUTHORITY

1-600.2.

     IDENTIFICATION ON DOCUMENTS

4-104.

     LlMITS

1-600.2.

     REQUESTING

1-600.3.

CLASSIFICATION GUIDES

     APPROVAL BY TS CLASSIFICATION AUTHORITY

2-400.3.

     CONTENT

2-400.2.

     DD FORM 2024

2-406.1.

     DEFINITION

1-304.

     DISTRIBUTION

2-405.

     INDEX OF

2-406.

     REQUIREMENT TO ISSUE

2-400.

CLASSIFIED INFORMATION

     DEFINITION

1-305.

     DETERMINATION TO CLASSIFY

2-202.

     ORIGINATED OUTSIDE OF THE DEPARTMENT OF DEFENSE

7-202.

     RECEIPTING FOR

         CONFIDENTIAL

8-202.3.

         SECRET

8-202.2.

         TOP SECRET

8-202.1.

     RESPONSIBILITY FOR SAFEGUARDING

5-200., 5-201.

TRANSMISSION 

     CONFIDENTIAL

8-103.

     SECRET

8-102.

     TOP SECRET

8-101.

     BULKY MATERIAL

8-105.

     COMSEC

8-106.

     RESTRICTED DATA

8-107.

     TO FOREIGN GOVERNMENTS

8-104.

     WRAPPING

8-200.

         ADDRESSING

8-201.

CLASSIFIED WASTE

     DESTRUCTION

4-307., 5-201.2., 9-103.

     HANDLING

4-307., 5-201.2.

     MARKING

4-307., 5-201.2.

     STORAGE

9-106.

CLASSIFIER

     ACCOUNTABILITY

2-100.

     DEFINITION

1-306.

     DENTIFICATION

4-104.

CLASSIFYING CRITERIA

     SPECIFIC INFORMATION

2-202.

CODE WORDS

     ASSIGNMENT, USE, TERMINATION

APPENDIX 3.

COMBINATIONS

     CLASSIFICATION OF

5-104.2.2.

     NOT RETAINED BY INDIVIDUALS

5-104.2.4.

     RECORDING

5-104.1., 5-104.2.3.

     REPOSITORY

5-1042.3.

     WHEN TO CHANGE

5-104.2.1.

COMMUNICATIONS SECURITY (COMSEC) INFORMATION

     AREAS

1-205.

     DEFINITION

1-305.

     DISSEMINATION

7-206.

     HANDLING AND CONTROLLING

1-205.

     RELEASE TO CONTRACTORS

4-504.

     TRANSMISSION

8-106.

COMPILATIONS (OF UNCLASSIFIED)

     CLASSIFICATION OF

2-211.

     MARKING

4-203.

COMPROMISE

     ACTION UPON DISCOVERY

6-102.

     CRYPTOGRAPHIC INFORMATION

6-101.

     DAMAGE ASSESSMENT

6-111.

     DEFINITION

1-308.

     DELIBERATE

6-109.

     DISCIPLINARY ACTIONS

6-110., 14-102.

     ESPIONAGE

6-109.

     FIXING RESPONSIBILITY.

6-104.10.

     FORMAL INVESTIGATION

6-104.


     OPEN PUBLICATION

2-209.

     PRELIMINARY INQUIRY.

6-102.2., 6-102.4., 6-103.

     PRESS LEAKS

6-111.

     REEVALUATION OF CLASSIFICATION DUE TO

2-210.

CONFIDENTIAL

     DEFINITION

1-503.

     DISSEMINATION

7-208.

     METHODS OF TRANSMISSION

8-103.

     ORIGINAL CLASSIFICATION AUTHORITY

1-600.2.2., AND 1-600.2.5.

     RECEIPTS

8-202.3.

     RETIREMENT TO RECORDS CENTER

3-402.

     STORAGE REQUIREMENTS

5-102.2.

CONFLICT

     RESOLUTION OF CLASSIFICATION CONFLICTS

2-500. THROUGH 2-503.

CONGRESS

     RELEASE OF CLASSIFIED INFORMATION TO

7-101.1.

CONTRACTORS

     ACCESS TO SPECIAL ACCESS PROGRAM MATERIAL

12-104.

     RELEASE OF INTELLIGENCE TO

7-101.4.

CONTROL MARKINGS

     PORTION MARKING

4-202.

     PRESCRIBED MARKINGS.

4-200.

COURIER

     (ALSO SEE "ESCORTS" AND "HAND CARRYING")

     ARMED FORCES COURIER SYSTEM.

8-101.1., 8-102.

     DESIGNATION OF (TOP SECRET)

8-101.9.

     LETTER

8-302.

     RESPONSIBILITY FOR SAFEGUARDING

5-100.

COURTS

     RELEASE OF CLASSIFIED INFORMATION TO

7-101.7.

COVER SHEETS

     ON DOCUMENTS AND MATERIAL

5-201.1.

     ON FILE FOLDERS

4-205.

CRITICAL NUCLEAR WEAPON DESIGN INFORMATION (CNWDI) 

     DEFINITION

1-312.

     DOCUMENT MARKING

4-200.

     PORTION MARKING

4-202.

CRYPTOGRAPHIC INFORMATION

     COMPROMISE OF

6-101.

CUSTODIAN

     DEFINITION

1-313.

     INSTRUCTION OF

10-101.9.

     RESPONSIBILITIES

5-200.

CYPHER LOCKS

     NOT SUBSTITUTE FOR COMBINATION LOCK

5-104.3.

DAMAGE ASSESSMENT

     CLASSIFICATION REEVALUATION

2-210.

     CONDUCT OF

6-111.

DAMAGE TO NATIONAL SECURITY

     AS TEST FOR CLASSIFICATION

2-202.

     DEGREES OF DAMAGE

1-501. THROUGH 1-503.

DEBRlEFING

     EXTENDED ABSENCE

1-110.

     TERMINATION

10-105.

DECLASSIFICATION

     APPLYING DERIVATIVE DATES

4-401.

     AS EARLY AS POSSIBLE

3-100.

     AUTHORITY

1-603.

     BASIC POLICY

1-401.

     BEFORE STORAGE OR RETIREMENT

3-402.

     CHANGES IN ORIGINAL DATE

3-600.

     DEFINITION

1-314.

     EXAMPLES OF DECLASSIFICATION STAMPS

4-402.

     INFORMATION SECURITY OVERSIGHT OFFICE

3-103.

     MARKING LARGE QUANTITIES OF MATERIAL

4-404.

REMARKING

4-400.

RESPONSIBILITY FOR TRANSFERRED DOCUMENTS

3-400., 3-401.

SYSTEMATIC REVIEW FOR DECLASSIFICATION

     CRYPTOLOGIC INFORMATION

3-203.

     FOREIGN GOVERNMENT INFORMATION

11-201.

     GUIDELINES FOR REVIEW

3-201.

     NON-PERMANENT RECORDS

3-202.1.

     PERMANENT RECORDS

3-202.1.

     REVIEW PROCEDURES

3-202., 3-204.

DERIVATIVE CLASSIFICATION

     APPLYING DECLASSIFICATION DATES

4-401.

     DEFINITION

1-316.

     EXAMPLE OF CLASSIFICATION STAMP

4-402.2.

     EXTRACTS OF INFORMATION

2-212.

     MARKING DOCUMENTS

4-103.2.

     RECORDING MULTIPLE SOURCES

4-104.1.3.

     RECORDING SOURCE OF CLASSIFICATION

4-104.1.2.

     RESPONSIBILITY

1-601.

DESTRUCTION

     BASIC POLICY

9-100.

     BURN BAGS

9-102.2., 9-103.1.

     CLASSIFIED WASTE

4-307., 5-201.2., 9-104.

     FOUO INFORMATION.

15-501.

     PROCEDURES

9-106.

     RECORDS

9-103.

     VIDEO TAPE

5-607.

DISSEMINATION

     NOTICE OF LIMITATION

4-505.

DOCUMENT

    CLASSIFYING (BASIC POLICY)

2-206.

     DEFINITION

1-317.

DOUBLE CHECK

     DUTIES OF DOUBLE CHECK

5-106.4., 5-202.

DOWNGRADING

     AUTHORITY

1-603.

     DEFINITION

1-319.

     EXAMPLE OF DOWNGRADING STAMP

4-402.3.

     MARKING FOR AUTOMATIC DOWNGRADING

3-500.

     MARKING LARGE QUANTITIES OF MATERIAL

4-400.

DRAWINGS

     MARKING

4-301.

DURATION OF CLASSIFICATION

     BASIC POLICY

1-400.3., 2-300.

     LIMITS

1-600.3., 2-301.

     SUBSEQUENT EXTENSION

2-302.

ENVELOPES

     FOR COMBINATION

5-104.2.3.

     FOR TRANSMISSION OF CLASSIFIED MATERIAL

8-200.

ESCORTS

     FOR VISITORS; CLEANING CREWS; ETC.

5-403.1.

ESPIONAGE

     EDUCATION AGAINST

10-101.6.

     REPORTING

6-106.

EXERCISE TERMS

     ASSIGNMENT, USE, TERMINATION

APPENDIX 3.

EXTRACTS OF INFORMATION

     DETERMINING CLASSIFICATION OF

2-212.

     IN DERIVATIVE CLASSIFICATION

1-601., 2-212.

FILE FOLDERS

     COVER SHEETS ON

4-205.

     MARKING

4-205.

     OVERALL CLASSIFICATION

2-206., 4-205.

FILMS

     MARKING

4-302.3.

FOREIGN CLASSIFICATIONS

     HONORING

11-100.1.

     U.S. EQUIVALENTS

APPENDIX 1.

FOREIGN GOVERNMENT INFORMATION

     AS A CLASSIFYING CRITERON

2-202.3.

     DEFINITION

1-320.

     DURATION OF CLASSIFICATION

11-101.

     EQUIVALENT U.S. CLASSIFICATION

11-300.,APPENDIX 1.

     IN U.S. DOCUMENTS

11-304.

     MANDATORY REVIEW

3-304., 11-202.

     MARKING

11-301. THROUGH 11-304.

     NATO DOCUMENTS

11-301., 11-400.

     PRESUMPTION OF DAMAGE

2-203.

     PROTECTION OF

11-400., 11-401.

     "RESTRICTED"

11-300., 11-302.2., 11-401.2.

     SYSTEMATIC REVIEW

11-201.

FOREIGN GOVERNMENTS

     RELEASE OF FOREIGN INTELLIGENCE TO

7-102.

     RELEASE OF FORMERLY RESTRICTED DATA TO

7-204.

     RELEASE OF RESTRICTED DATA TO

7-204.

     TRANSMISSION OF CLASSIFIED INFORMATION TO

8-104.

FOREIGN INTELLIGENCE INFORMATION

     DISSEMINAITON

7-203.

     MARKING

4-203.

FOREIGN NATIONALS

     ATTENDANCE AT MEETINGS AND/OR CONFERENCES

5-205.

     RELEASE OF CLASSIFIED INFORMATION TO

7-102.

     RELEASE OF FORMERLY RESTRICTED DATA TO

7-204.

     RELEASE OF RESTRICTED DATA TO

7-204.

FOREIGN TRAVEL

     CONDITIONS OF BRIEFING

10-104.

     OFFICIAL TRAVEL.

10-104.

FORMERLY RESTRICTED DATA

     APPLICABILITY OF ATOMIC ENERGY ACT

1-204.

     DEFINITION

1-321.

     DISSEMINATION

7-204.

     DOCUMENT MARKING

4-500., 4-502.

     IN MESSAGES

4-207.4., 4-402.4.

     PORTION MARKING

4-202.1.

     SAFEGUARDING

7-400.

FORMER PRESIDENTIAL APPOINTEES

     RELEASE OF CLASSIFIED INFORMATION TO

7-101.6.

FORMS

     AF FORM 91

5-202., 5-509.

     AF FORM 93

5-502.4.

     DD FORM 173

4-207.2.

     DD FORM 577

5-401., 5-502.2.

     DD FORM 2251

5-403.

     DD FORM 2275

7-300.2.3.

     DIA FORM 554

16-101.3.

     OPTIONAL FORM 7

8-203.2.2.

     SD FORM 120

5-205.2.2.9., 7-300.5.

     SD FORM 188

9-103.1., 16-101.3.

     SD FORM 189

10-102.

     SD FORM 194

7-300.2.3.

     SD FORM 396

7-300.5.

     SD FORM 507

7-300.1.1.

     SF 700

5-104.2.3.

     SF 701

5-202.

     SF 702

5-106.

FOR OFFICIAL USE ONLY (FOUO)

     DESTRUCTION

15-501.

     DISSEMINATION

15-302.THROUGH 15-304.

     MARKING

15-200. THROUGH 15-206.

     PUBLIC RELEASE

15-301.

     SAFEGUARDING

15-402., 15-403.

     TERMINATION OF MARKING

15-500.

     TRANSMISSION

15-305.

     UNAUTHORIZED DISCLOSURE

15-502.

FREEDOM OF INFORMATION ACT (FOIA)

     MANDATORY REVIEW REQUEST

3-303.2.

GENERAL ACCOUNTING OFFICE

     RELEASE OF CLASSIFIED INFORMATION TO

7-101.3.

GENERAL DECLASSIFICATION SCHEDULE

     REMARKING DOCUMENTS CLASSIFIED UNDER

4-400.

GRAPHICS

     IN DOCUMENTS (MARKING)

4-202.1.

     RESPONSIBILITY FOR PROPER MARKING

4-301.

HAND-CARRYING

     ABOARD AIRCRAFT

8-302.

     INSTRUCTIONS FOR PERSONNEL

APPENDIX 6.

     RESTRICTIONS AND REQUIREMENTS

8-301.

INFORMATION SECURITY OVERSIGHT OFFICE (ISOO)

     DECLASSIFICATION AUTHORITY

3-103.

     FUNCTIONS

13-102.2.

     REQUESTS FROM

13-103., 

INVENTORY ANNUAL

     OF TOP SECRET DOCUMENTS

7-300.3.

INVESTIGATION, FORMAL

     OF ACTUAL OR PROBABLE COMPROMISE

6-104.

LOCKS

     EMERGENCIES

5-404.

     KEY CONTROL OFFICER

5-401.

     KEY REQUESTS

5-401.

MANDATORY REVIEW

     ALLOWABLE PERIOD TO ACT ON REQUEST

3-304.2.

     ANY CLASSIFIED INFORMATION

3-300.

     APPEALS

3-303.6.

     FOREIGN GOVERNMENT INFORMATION

3-304., 11-202.

     PRESIDENTIAL INFORMATION

3-301.

     PROCESSING REVIEW REQUEST ACTIONS

3-303.

     REQUESTS FOR REVIEW

3-302.

MAPS

     MARKING

4-301.

MEETINGS AND CONFERENCES

     CONTRACTORS AT

5-205.2.2.

     FOREIGN NATIONALS AT

5-205.2.2.

     LOCATION

5-205.2.

     SPONSORSHIP

5-205.2.2.

MESSAGES

     CITING AS DERIVATIVE SOURCE

4-207.5.

CONTAINING RD OR FRD

4-207.4., 4-402.5.

     DECLASSIFICATION OR REVIEW DATA

4-207.4.

     ORIGINATIOR AS ACCOUNTABLE CLASSIFIER

4-207.3.

     OVERALL MARKING

4-207.2.

     PORTION MARKING

4-207.2.

     RECORD COPY

4-207.1.

NATIONAL SECURITY COUNCIL

     OVERSIGHT AUTHORITY

13-100.

NATO INFORMATION

     DISSEMINATION

7-200.

     MARKING IN U.S. DOCUMENTS

11-304.

     MARKING NATO DOCUMENTS

11-301.

     PROTECTION OF

11-400.

     SPECIAL ACCESS PROGRAMS INVOLVING

12-101.1.

     U.S.-NATO EQUIVALENT CLASSIFICATIONS

APPENDIX 1.

NEED TO KNOW

     POLICY

7-100., 7-103.

NICKNAMES

     ASSIGNMENT, USE, TERMINATION

7-209., APPENDIX 3.

OFFICIAL RELEASES

     PROHIBITION ON CLASSIFICATION

2-204.2.

ORIGINAL CLASSIFICATION

     DEFINITION

1-328.

PACKAGING

     FOR TRANSMITTAL

8-200.

PATENT SECRECY ACT

     CLASSIFICATION UNDER

2-701.

PERMANENT RECORDS

     DISPOSITION

9-100.

     SYSTEMATIC REVIEW

3-202.

PERSONNEL RECORDS

     STORAGE

         CLASSIFIED

5-102.

         UNCLASSIFIED

15-402., 15-403.

PHOTOGRAPHS

     MARKING

4-302.

PHYSICAL SECURITY

     ALARM SYSTEMS

5-500. THROUGH 5-510.

     BASIC POLICY

5-100.

     BASIC SAFEGUARDS

5-200., 5-201.

     CHECKING SAFES AND DOORS

5-106.

     COMBINATIONS

5-104.

     CYPHER LOCKS

5-104.3.

     DOUBLE CHECKS

5-202.2.

     END OF DAY CHECK

5-202.

     LOCKING SAFES AND DOORS

5-106.

     STORAGE EQUIPMENT

5-101. THROUGH 5-103.

     TYPEWRITERS

5-201.3.

     UNLOCKING SAFES AND DOORS

5-106.

PRIVATE INFORMATION

     RESTRICTIONS ON CLASSIFYING

1-303., 2-204.2., 2-204.3., 2-600., 2-702., 2-703.

PROHIBITIONS

     CERTAIN CLASSIFICATION MARKINGS

1-500.

CLASSIFICATION OF CERTAIN INFORMATION

2-204.

     DISSEMINATION NOTICE

4-505.

     REPRODUCTION NOTICE

4-505.

     RETAINING COMBINATIONS

5-104.

     SECURITY MARKING ON ARTICLES IN PRESS

4-102.

     TAKING CLASSIFIED INFORMATION HOME

5-104.2.

PUBLIC DISCLOSURE

     REEVALUATION DUE TO

2-209.

RECEIPTS

     CONTINUOUS RECEIPTING FOR TOP SECRET

7-300.5.

     ONLY UNCLASSIFIED INFORMATION ON RECEIPTS

8-202.4.2., 8-202.7.

     RECEIPT SYSTEMS

         CONFIDENTIAL

8-202.3.

         SECRET

8-202.1.

         TOP SECRET

8-202.1.

     RETENTION PERIOD

8-202.4.3.

RECORDINGS

     MARKING

4-302.4.

RECORDS

     COMBINATIONS

5-104.2.

     DESTRUCTION

9-102.

     HAND-CARRYING CLASSIFIED MATERIAL

8-300.5.

     SECRET AND CONFIDENTIAL CLASSIFICATION

1-602.1.2.

     TOP SECRET ACCOUNTABILITY

7-300.2.

     TOP SECRET CLASSIFICATION AUTHORITIES

1-602.1.1.

     TOP SECRET INVENTORY

7-300.3.

REGRADING

     DEFINITION

1-329.

     DOWNGRADING

1-319.

     NOTIFICATION OF REGRADING ACTION

1-329.

     PREVIOUSLY UNCLASSIFIED INFORMATION

2-801.

     REMARKING

4-600.

     UPGRADING

1-337.

REPRODUCTION

     EQUIPMENT

7-305.3.

     LIMITATION NOTICE

4-505., 4-506.

     SECRET INFORMATION

7-209.2.

     TOP SECRET

7-305.7.

RESEARCHERS

     RELEASE OF CLASSIFIED INFORMATION TO

7-105.5., APPENDIX 7.

RESTRICTED DATA

     DEFINITION

1-323.

     DISSEMINATION

7-204.

     DOCUMENT MARKING

4-500., 4-501.

     MESSAGES CONTAINING

4-207.4., 4-402.5.

     PORTION MARKING

4-202.1.

     TRANSMISSION

8-107.

SECRET

     DEFINITION

1-502.

     DISSEMINATION

     ORIGINAL CLASSIFICATION AUTHORITY

1-600.2.

     STORAGE

5-102.2.

     TRANSMISSION

8-102.

SECURITY CHECKS

     DOUBLE CHECKS

5-202.

     END OF DAY

5-202.

     INDIVIDUAL AREA

5-202.

SECURITY CLEARANCES

     FOR GAO PERSONNEL

7-105.3.

     POLICY ON

7-101.

SECURITY CONTAINERS

     ALARMED AREA AS A SECURITY CONTAINER

5-102.1.

     CLOSING

5-106.

     COMBINATION CHANGE

5-104.2.

     FOR SECRET AND CONFIDENTIAL

5-102.2.

     FOR TOP SECRET


5-102.1.

     NEW CONTAINERS

5-103.

     NUMBERING

5-104.1.

     OPENING

5-106.

     REPAIR

5-105.

SECURITY EDUCATION

     ANNUAL REFRESHER TRAINING

10-103.

     INITIAL INDOCTRINATION OF NEW PERSONNEL

10-101.2.

     SCOPE

10-101.

SECURITY MANAGERS

     APPOINTMENT

13-304.1.

     BRIEFING NEW PERSONNEL

10-101.10., 10-102.

     DUTIES

13-304.3.

SECURITY MARKING

     ANNEXES, APPENDICES, ENCLOSURES

4-201.

     AUTHORIZED CLASSIFICATION MARKINGS

1-500.

     CHARTS, MAPS, DRAWINGS

4-301.

     CLASSIFIED WASTE

4-307.

     COMPILATIONS

4-203.

     COMPUTER PRINTOUTS

4-305.

     CONFIDENTIAL

1-503.

     CONTROL MARKINGS FOR FOREIGN INTELLIGENCE

4-202.8., 4-503.

     DERIVATIVE DECLASSIFICATION DATES

4-401.

     DISSEMINATION LIMITATION NOTICE

4-505.

     DOCUMENTS (DERIVATIVE CLASSIFICATION)

4-103.2.

     DOCUMENTS (ORIGINAL CLASSIFICATION)

4-103.1.

     FILES, FOLDERS, GROUPS OF DOCUMENTS

4-205.

     FORMERLY RESTRICTED DATA

4-500., 4-502., 4-202.1.

     FOR OFFICIAL USE ONLY

1-500.

     ILLUSTRATIONS, CHARTS

4-202.3.

     MESSAGES

4-207.

     MICROFICHE

4-302.5.

     MOTION PICTURE FILM

4-302.3.

     OVERALL DOCUMENT MARKINGS

4-103., 4-200.

     PAGE MARKINGS

4-200.

     PHOTOGRAPHS

4-302.

     PORTIONS AND/OR PARAGRAPHS

4-202.

     PROHIBITED MARKINGS

1-500.

     RECORDINGS

4-302.4.

     REPRODUCTION LIMITATION NOTICE

4-505.

     RESTRICTED DATA

4-500., 4-501., 4-202.1.

     SECRET

1-502.

     SLIDES

4-302.2.

     SPECIAL ACCESS PROGRAM DOCUMENTS

4-308.

     SUBJECTS AND TITLES

4-204.

     TOP SECRET

1-501.

     TRANSMITTAL DOCUMENTS

4-206.

     TRANSPARENCIES

4-302.2.

     VIDEO TAPE

5-604.

     WORD PROCESSING STORAGE MEDIA

4-304.

     WORKING PAPERS

7-304.

SENSITIVE COMPARTMENTED INFORMATION (SCI)

     ADMINISTRATION

16-101.

     CLASSIFICATION, MARKING, DOWNGRADING, DECLASSIFICATION

1-205.

     DEFINITION

1-332.

     ESTABLISHMENT OF SCI FACILITIES

16-100.

     HANDLING AND CONTROLLING

1-205.

     MARKING

4-508.

     TSCM

16-200.

SPECIAL ACCESS PROGRAMS

     BASIC POLICY

12-100.

     DEFINITION

1-333.

     ESTABLISHMENT OF

12-101.

     MARKING DOCUMENTS

4-308.

     NATIONAL FOREIGN INTELLIGENCE PROGRAM.

12-101.3.

     REPORTING

12-102.

SUBJECTS AND TITLES

     MARKING

4-204.

     NORMALLY UNCLASSIFIED

2-206.

     REQUIREMENT FOR UNCLASSIFIED SHORT TITLE

2-206.

TELEPHONES

     CLASSIFIED CONVERSATIONS

5-204.

TOP SECRET

     CONTROL OF

7-300.

         ACCOUNTABILITY

7-300.2.

         INVENTORIES

7-300.3.

         TOP SECRET CONTROL OFFICER

7-300.1.

         DEFINITION

1-501.

         DESTRUCTION OF EXCESS COPIES

7-300.4.

         DISSEMINATION OUTSIDE OF THE DEPARTMENT OF
DEFENSE

7-207.

         HAND-CARRYING

8-302.5.1.2.

         METHODS OF TRANSMISSION

8-101.

         OPENING TOP SECRET MAIL

8-204.2.

         ORIGINAL CLASSIFICATION AUTHORITY

1-600.2.1.

         REPRODUCTION

7-305.7.

         STORAGE REQUIREMENTS

5-102.1.

         WORKING PAPERS

7-304.

     TYPEWRITER RIBBONS

         DESTRUCTION

5-201.3.

         SECURITY OF

5-201.3.

     UNAUTHORIZED ABSENCE 

         REPORTING

6-110.

     VIDEO TAPE

         DECLASSIFICATION

5-606.

         DESTRUCTION

5-607.

         ERASURE

5-605.

         EQUIPMENT

5-603,

         MARKING

5-604.

         PRODUCTION

5-601.

         RECORDING OVER

5-605.

         USE

5-602.

     WORKING PAPERS

         DEFINITION

7-304.1.

         MARKING

7-304.1.

         RECEIVED IMPROPERLY MARKED

7-304.4.

         REQUIREMENTS

7-304.1.

         STORAGE OF TOP SECRET

5-102.1.