Security Classifications Explained (2024)

Most civilians never have to deal with classified information. It generally resides in the federal government and in the military. With that in mind, I thought some basics about security classifications would be an appropriate topic to cover.

My experience comes mostly from the U.S. Army. When officers are commissioned, they get a Secret Clearance as the base level for what material they can see. Confidential information in the Army, at the unit level, had to do with military readiness reports for individual battalions and also the code books used for sending coded radio messages. Most of all that is now done electronically.

Here’s a good primer for you: “List of U.S. security clearance terms.” I’ll highlight some sections below:


“Security clearances can be issued by many United States of America government agencies, including the Department of Defense (DoD), the Department of State (DOS), the Department of Homeland Security (DHS), the Department of Energy (DoE), the Department of Justice (DoJ), the National Security Agency (NSA), and the Central Intelligence Agency (CIA). DoD issues more than 80% of all clearances. There are three levels of DoD security clearances:[1]

  1. TOP SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security. This level of clearance is generally reserved for the President of the United States, United States Secretary of State, U.S. Speaker of the House, United States Secretary of Defense, United States Secretary of the Treasury, U.S. National Security Advisor, United States Attorney General, Director of the CIA, and a limited other United States government personnel.
  2. SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause serious damage to the national security.
  3. CONFIDENTIAL – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause damage to the national security.
  4. USAP: Unacknowledged SAP & "Waived USAP" - Made known only to authorized persons, including members of the appropriate committees of the US Congress. Waived USAP is a subset of USAP.
  5. ACCM: Alternative or Compensatory Control Measures - Security measures used to safeguard classified intelligence or operations and support information when normal measures are insufficient to achieve
    strict need-to-know controls and where SAP controls are not required”

My highest level of clearance was Top Secret/SCI, which is explained below:

“Information ‘above Top Secret,’ a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly ‘above’ Top Secret, since there is no clearance higher than Top Secret. SCI information may be either Secret or Top Secret, but in either case it has additional controls on dissemination beyond those associated with the classification level alone. In order to gain SCI Access, one would need to have a Single Scope Backgroud Investigation (SSBI). Compartments of information are identified by code words. This is one means by which the ‘need to know’ principle is formally and automatically enforced. In order to have access to material in a particular SCI ‘compartment,’ the person must first have the clearance level for the material. The SCI designation is an add-on, not a special clearance level.”

The reason I had a TS/SCI clearance was that I worked on a Code Word project that had to do with the continuity of government (COG) for our national command authorities. Later, in another assignment, because I had a Top Secret clearance I was part of a team of officers who could decode nuclear attack orders that were being sent to military units. This was years ago, but I’d have to go down to the SCIF, a sensitive compartmented information facility (SCIF; pronounced /skɪf/) to practice decoding messages to maintain my proficiency.

At one point in my career I had responsibility for the security of a SCIF. It is not just a simple safe or file safe. In my case it was a large concrete room built within a room that had a very heavy bank vault type door with a safe combination lock. Only someone with a TS/SCI clearance could enter it. The facility was used for the transmission of highly classified communications and the storage of Top Secret information. TS information cannot be just kept in a storage room with a padlock door.

People who have a TS/SCI clearance must undergo a Single Scope Background Investigation, a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI. It is governed by the U.S. Intelligence Community Policy Guidance Number 704.1. Standard elements include background checks of employment, education, organization affiliations and any local agency where the subject has lived, worked, traveled or attended school. These checks lead to interviews with persons who know the subject both personally and professionally. The investigation may include a National Agency Check with Local Agency Check and Credit Check (NACLC) of the subject’s spouse or cohabitant.

In my case, I recall a next door neighbor telling me he was visited by a federal agent inquiring as to my conduct, habits, etc., in and around the place where we lived. It is not just a simple records check.

Hopefully the above makes you a more informed consumer of national news.

Eric Holdeman

Eric Holdeman is a contributing writer for Emergency Management magazine and is the former director of the King County, Wash., Office of Emergency Management.

See More Stories by Eric Holdeman

Security Classifications Explained (2024)

FAQs

Security Classifications Explained? ›

The United States uses three classification levels: Top Secret, Secret and Confidential. Each level is defined in relation to the potential for damage to the national security. The OCA must look at the damage criteria and decide the appropriate level of classification.

What are the 4 levels of security? ›

A comprehensive security strategy involves understanding and implementing measures at each level to create a holistic defense against a diverse range of potential risks.
  • Level 1: Physical Security. ...
  • Level 2: Network Security. ...
  • Level 3: Application Security. ...
  • Level 4: Data Security. ...
  • Burstiness in Security Measures.
Nov 6, 2023

What are the three security classifications? ›

The Government Security Classification (GSC) system has three levels: Official, Secret, and Top Secret.

Is SCI higher than Secret? ›

Information "above Top Secret," a phrase used by the media, means either Sensitive Compartmented Information (SCI) or Special Access Program (SAP). It is not truly "above" Top Secret, since there is no clearance higher than Top Secret.

What are the 5 stages of security? ›

It involves the identification, protection, detection, response, and recovery stages to ensure effective cybersecurity measures. This holistic approach enables organizations to proactively assess and address potential risks and vulnerabilities, as well as respond and recover from cyber incidents.

What are the 5 A's of security? ›

This comprehensive guide to cloud identity management reveals the significance of the five A's: Authentication, Authorization, Account Management, Audit Logging, and Accountability.

What are the 4 C's security? ›

The 4 C's security refers to a framework comprising four essential elements: Concealment, Control, Communication, and Continuity. These elements collectively contribute to fortifying security measures and safeguarding assets, premises, and individuals against potential threats and risks.

What are the 4 P's in security? ›

In general, Information Security professionals suggest that protecting sensitive data requires a combination of people, processes, polices, and technologies.

What are the levels of security categorization? ›

These security objectives are assigned one of three impact levels: low , moderate , or high . This process is described in NIST's FIPS 199 publication. Once the potential impact on these three objectives is determined, the overall impact level of the system is determined based on the “high water mark” principle.

What are the DOD classification labels? ›

There are three levels of classification, “TOP SECRET”, “SECRET” and “CONFIDENTIAL.” Do not use other terms, such as “Official Use Only,” or “Administratively Confidential,” to identify classified national security information.

What are the main categories of security? ›

There are three primary categories of security controls that businesses must consider: management security, operational security, and physical security.

How do you classify security? ›

Securities can be broadly categorized into two distinct types: equity and debt.

What is a yankee white clearance? ›

Yankee White is an administrative nickname for a background check undertaken in the United States of America for Department of Defense personnel and contractor employees working with the president and vice president.

How much is a TS SCI clearance worth? ›

As of Jul 16, 2024, the average annual pay for a Ts Sci Clearance in the United States is $131,907 a year. Just in case you need a simple salary calculator, that works out to be approximately $63.42 an hour. This is the equivalent of $2,536/week or $10,992/month.

Can you have an SCI without a TS? ›

In some cases, an individual may be read into an SCI program, regardless of the clearance level, although additional vetting will be required. So, it is possible to have a secret clearance, and SCI access. Just like having a Top Secret clearance also doesn't mean you have a 'TS/SCI' clearance.

What are the 5 levels of data classification? ›

Data Classification Levels

Data Classification in Government organizations commonly includes five levels: Top Secret, Secret, Confidential, Sensitive, and Unclassified. These can be adopted by commercial organizations, but, most often, we find four levels, Restricted, Confidential, Internal, Public.

What are the security levels 1 2 and 3? ›

The ISPS Code employs an international system of three Security Levels: Security Level 1: Normal. Security Level 2: Heightened. Security Level 3: Exceptional.

What are the levels of classification in the CIA? ›

(S) There are three levels of classification – TOP SECRET, SECRET, and CONFIDENTIAL.

Top Articles
SOLUTION: An important factor in selling a residential property is the number of people who look through the home. A sample of 15 homes recently sold in the Buffalo, New York, area revealed
Strides of Heresy
Xre-02022
Bashas Elearning
Stretchmark Camouflage Highland Park
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Breaded Mushrooms
Paris 2024: Kellie Harrington has 'no more mountains' as double Olympic champion retires
Chase Bank Operating Hours
What is international trade and explain its types?
Www Thechristhospital Billpay
Becky Hudson Free
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Unit 1 Lesson 5 Practice Problems Answer Key
ExploreLearning on LinkedIn: This month's featured product is our ExploreLearning Gizmos Pen Pack, the…
Hell's Kitchen Valley Center Photos Menu
Mail.zsthost Change Password
U Arizona Phonebook
Apply for a credit card
Costco Great Oaks Gas Price
Hewn New Bedford
Lakers Game Summary
Putin advierte que si se permite a Ucrania usar misiles de largo alcance, los países de la OTAN estarán en guerra con Rusia - BBC News Mundo
Parc Soleil Drowning
3 2Nd Ave
Rs3 Ushabti
Dtm Urban Dictionary
Hdmovie2 Sbs
This Is How We Roll (Remix) - Florida Georgia Line, Jason Derulo, Luke Bryan - NhacCuaTui
Askhistorians Book List
Barbie Showtimes Near Lucas Cinemas Albertville
Salemhex ticket show3
Chris Provost Daughter Addie
How to Destroy Rule 34
Tmka-19829
Ewwwww Gif
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
Greater Keene Men's Softball
Myfxbook Historical Data
Body Surface Area (BSA) Calculator
Jail View Sumter
877-292-0545
T&Cs | Hollywood Bowl
Discover Wisconsin Season 16
Union Corners Obgyn
The Realreal Temporary Closure
Sound Of Freedom Showtimes Near Amc Mountainside 10
Breaking down the Stafford trade
Nearest Wintrust Bank
Sams Gas Price San Angelo
2000 Fortnite Symbols
Qvc Com Blogs
Latest Posts
Article information

Author: Duncan Muller

Last Updated:

Views: 6374

Rating: 4.9 / 5 (79 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Duncan Muller

Birthday: 1997-01-13

Address: Apt. 505 914 Phillip Crossroad, O'Konborough, NV 62411

Phone: +8555305800947

Job: Construction Agent

Hobby: Shopping, Table tennis, Snowboarding, Rafting, Motor sports, Homebrewing, Taxidermy

Introduction: My name is Duncan Muller, I am a enchanting, good, gentle, modern, tasty, nice, elegant person who loves writing and wants to share my knowledge and understanding with you.