PLANNING FOR IMPLEMENTATION OF E.O. 12065

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP86-00674R000300030001-3
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
54
Document Creation Date: 
December 19, 2016
Document Release Date: 
March 28, 2006
Sequence Number: 
1
Case Number: 
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP86-00674R000300030001-3.pdf2.24 MB
Body: 
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 MEMORANDUM FOR: Deputy Director for Operations (Attention: Eloise Page) Deputy Director for Science and Technology (Attention: Ernest J. Zellmer) Director, National f=or n Assessment Center (Attention: I (Attention: FROM . Michael J. Malanick Associate Deputy Director for Administration SUBJECT . Planning for Implementation of E.O. 12065 REFERENCE . Action Plan Approved 26 July 1978 for Implementation of E.O. 12065 Attached for your planning and guidance is a paper prepared by the Task Force concerned with implementing the provisions of E.O. 12065 concerning classification, declassification, and mandatory review. Because of the amount of work to be accomplished by 1 December 1978, it is hoped that the paper will prove useful to you in accomplishing; the tasks outlined. -lichael J. Malanick Attachment: a/s cc: D/Sec (Attention: DTR (Attention: Harry Fitzwater) Distribution: Ori 9A FoeRr Ke se 2096/04/19 : CIA-RDP86-00674R000300030001-3 P D rrono wo/att 1 - AI/DDA w/att 1 - Iarh Ar Irr*' Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 CIA Task Force, E.O. 120b5 Classifi-;.anion, Declassification, Mandatory Review Guidance 1. Introduction a. The recently issued Executive Order 12065 requires that CIA as an agency with original classification authority promulgate Clas- sification Guides (Sec.- 5-403) and Declassification Guidelines (Sec. 3-402), and that they develop procedures for mandatory review of information for declassification (Sec. 3-501). [he Order also requires that unclassified regulations establishing agency information security policy and unclassified guidelines for systematic declassifi- cation review shall be published in the Federal Register (Sec. 5-402). The Order further stipulates that Agency implementing regulations contain criteria explaining in narrative form the reason information needs to be protected beyond six years (Sec. 1-502). b. The NSC draft implementing directive for the Executive Order requires that Classification Guides contain categories and subcategories of information to be protected, the level of classification to apply to each, the duration of such specified classification, and the reason for any extension of classification beyond six years. c. The CIA Task Force concerned with implementing the classifi- cation, declassification, and mandatory review requirements noted above is currently drafting two basic papers and identifying tasks for the consideration of the three Directorates and NFAC. 2. Classification Guides Conceptually the [ask Force envisages three different levels of classification guides. a. Agency Classification Guide This Guide will set forth broad categories of intelligence information based upon the seven classification requirements a-g (Sec. 1-301). These categories will be generally common to all Directorates. The guide will be unclassified and require Deputy Director and DCI approval. It appears likely that it will have to be published in the Federal Register. Whether classification desig- nations and duration of classification have to be assigned to each category of information in the basic Agency guide remains to be resolved. If such assignment is required, a variable classification designation from Confidential to Top Secret for each category would seem appropriate combined with a duration of up to 20 years. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 These guides will establish subcategories of intelligence information based upon the Agency Classification Guide and will contain information generally corrunon to all components of a Directorate. They may be classified or unclassified and will be approved by the individual Deputy Directors. Each subcategory of information will require a deter- mination as to the level of classification, the duration of the classification, and the reason for any extension of classification beyond six years. c. Office (or equivalent) Classification Guides These will further expand upon the subcategories of information contained in the Directorate Classification Guides and will reflect the needs and concerns of individual components of each Directorate. They may be classified or unclassified and will be approved by the Office Directors or Chiefs of the individual components and ultimately by the pertinent Deputy Director. Each such subcategory of information will require a determination as to the level of classification, the duration of the classification, and the reason for any extension of classification beyond six years. 3. Draft of Agency Classification Guide and Task Force Comrrrents for Directorate Consideration a. A draft Agency Classification Guide will be distributed to Directorates o/a 1 September 1978 and Directorate comments are requested by 18 September 1978. This tight deadline is necessary because the Agency Classification Guide will serve as a starting point for Directorate and Office guides. b. It should be noted that E.C. 12065 recognizes that there may be national security categories of information other than those set forth in a-f of the E.O. which require protection against unauthorized disclosure. Directorates should carefully examine categories a-f to determine if additional (q) categories are needed to meet their requirements. Any such additional categories require DCI approval. c. As noted in paragraph 4 below, the Task Force is attempting to dovetail its draft Agency Classification Guide with Directorate guidelines for systematic declassification prepared in late 1977. It is therefore recommended that Directorates review their guides for declassification in conjunction with their review of the Task Force draft Agency Clas- sification Guide. d. In the preparation of Directorate and Office Classification Guides, information requiring protection must be categorized to the extent possible. The Classification Guides should state which of the classification designations (i.e., Top Secret, Secret, or Confidential) apply to each category of information. A statement covering the duration of classification when such duration is to exceed six years and the reason for such extension is also required. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 e. Although Directorate and Office Classification Guides may be classified to the level necessary, lower classifications are encouraged considering the intended wide use of the guides. f. Directorates are reminded that the significance in developing comprehensive Classification Guides lies in the authority extended by the E.O. to permit derivative classification to individuals not provided original classification authority (S(ec, 2 of the Order). Lvery original classification must include both a decision that the information concerns one or more of the criteria a-g described in Sec. 1-301 of the Order, and a decision that disclosure of the information reasonably could be expected to cause one of the three levels (grave, serious, identifiable) of damage described in Sec. 1-I of the Urder. the decision involved in each step must be considered separate and distinct from that of the other. 4. Guidelines for S stematic Declassification I:eview Each Directorate in late 1977 approved a guideline for syste- matic review for declassification. a. The Task Force is drawing from the four Directorate guidelines and preparing an unclassified Agency Declassification Guideline for publication in the Federal Register. the draft Agency guideline will be sent to Directorates for comment later in the year inasmuch as we have until 1 May 1979 to accomplish this objective. b. The guides for classification and declassification should dovetail. The Task Force is therefore drawing from the Directorate guidelines for declassification in its preparation of the basic guide for classification. It follows that Directorates may desire to review their guidelines for declassification when they review the basic clas- sification guide prepared by the Task Force. c. Directorate guidelines for declassification previously prepared as unclassified contain in some cases information that should be classified. Also if categories of information needing protection are not covered in the guides for declassification, documents containing such information are automatically declassified after 20 years or 30 years for foreign government information. It is recommended therefore that Directorates review their guidelines for declassification for both comprehensiveness and classification of content. Directorates may prepare classified supplementary guidelines for declassification as required. d. The Task Force will prepare a draft special systematic review guideline for foreign government information. e. Special procedures for systematic review and declassification of classified cryptologic information will be developed by the Secretary of Defense. The DCI is responsible for developing special procedures for systematic review and declassification of classified information concerning the identities of clandestine human agents. The Task Force will be looking to the DDO for input in developing the latter guideline which will be binding on the Intelligence Community. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 5. Mandatory Review Procedures It is anticipated that the current modus operandi between the Information and Privacy Staff and Agency components for handliny mandatory review requests along with FOIA and Privacy Act requests will be continued. The Task Force will be responsible for drafting a paper describing these procedures for mandatory review to conform with Sec. 3-5 of the Order. 6. Task Force Assistance Questions on this paper should be referred to Directorate Focal Point Officers who are available to provide assistance as may be required. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 -4- Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 ACTION PLAN FOR DDA ASSIGNED TASKS ASSOCIATED WITH THE IMPLEMENTATION OF EXECUTIVE ORDER 12065 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 The DDA assigned tasks associated with the implementation of the new Executive Order have been grouped under one of the following four general headings: Classification/Declassification/,Mandatory Review Markings Training Safeguarding TASK FORCES Individual task forces will be established to handle each of the four areas listed above. The first three task forces will be chaired by ISAS representatives while the fourth will be chaired by a represen- tative from the Office of Security. C/ISAS will function as the coordinator between all task forces. A representative from each of the four Directorates and OGC will be appointed to each task force to form the basic working group. Additional members can be requested by each Chairman if and when the need arises. Once formed, each task force will be organized internally to handle their individual program elements in the most efficient manner. DIRECTORATE SUPPORT To obtain and maintain the shortest possible response time from the four Directorates, it is reconu^ended that the job responsibilities for the four individuals who are currently functioning as the senior Declassification Focal Point Officers for each Directorate be expanded to include all coordiration activities associated with the development and implementation of this program. It is further reconrnended that where practical, those individuals within each Directorate that were tasked with helping to develop declassification guidelines, be designated to assist the Declassification Focal Point Officers with all coordination activities. The above structure worked extremely well in developing the declassification guidelines and should function equally as well in helping to develop and coordinate this program. ACTUAL PROGRAM IMPLEMENTATION Within the DDA, records management personnel will be playing an extremely important role in the actual implementation of the new E.O. This role will be to act as the means for transmitting to Agency personnel the actual instructions on what actions are required and how they are to Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 be done. In this role they will also serve as convenient points of contact for the multitude of questions that are sure to be raised as actual implementation efforts move forward. Involvement of those personnel will be through the Directorate Records Management Officer who will participate in and be kept fully informed on all aspects of the implementation program. How this program will be implemented within the other Directorates is something that should be decided upon at the earliest possible date. WORK ASSIGNMENTS 1. CLASSIFICATIOJ/DECLASSIFICATION/MANDATORY REVIEW A. TASK FORCE - Chairman - DDO - NFAC DDS&T DDA - OCC - IPS - OS RAB - B. Approach - Will be to combine classification with declassifi- cation and develop common guidelines covering both aspects. To meet known requirements of the new E.O. both classified and unclassified guidelines will have to be developed. Since the system established for the development and approval of the current Agency declassification. guidelines is still in existence, it is planned that this same system will be used to obtain overall coordination and approval for all guide- lines that will be developed. Applicable regulations will be written/ rewritten. C. Problems - No specific problems have been identified. D. Time Frame - In-house guidelines and regulations should be ready for formal coordination and approval by 1 October 1978. This will allow two months to complete this process so that they will be ready for use by the Agency on 1 December 1978. Unclassified guide- lines for outside approval and publication in the Fcderal Register must be completed by I June 1979. II. MARKINGS A. TASK FORCE - Chairman - Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 DDO - NFAC DDS&T DDA - GGC - OS - RAB - B. Approach - All classification markings and controls now in use throughout the Agency will have to be reviewed in light of the imple- menting order for the new E.O. to determine what changes will be required and how these changes should be implemented. Initial requirement will be to get OGC guidance on what markings and controls the implementing order for the new E.O. will probably allow so preliminary work can start as soon as possible. Applicable regulations will be written/rewritten. The initial instructions and procedures dealing with markings will have to be followed by a detailed handbook on how these general procedures are to work, i.e., size and position of markings. C. Problems - It is anticipated that due to the great number-of individual interests involved in this general area a significant number of problems may be encountered. D. Time Frame - All proposals ready for formal coordination and approval by 1 October 1978. All newly required stamps ready for dis- tribution by 1 November 1978. III. TRAINING A. TASK FORCE -? Chairman OGC RAB OS - OTR B. Approach - Identify those elements that the new E.O. requires must be addressed and work with OTR to develop the most effective means of getting required information to all levels of the Agency. Special emphasis should be placed on determining whether an audio-visual presentation would be the most effective way to inform all Agency personnel on the changes the new L.O. brings to the current classifi- cation process. Applicable regulations will be written/rewritten. C. Problems - No special problems have been identified as of this D. Time Frame - Programs and procedures ready for in-house formal approvals by 1 October 1978. Actual training of employees to start by I November 1978. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 IV. SAFEGUARDING A. TASK FORCE - Chairman - DDA DDO NFAC OS - B. Approach - Identify those elements of the new E.O. relating to the safeguarding of classified material that require implementation through revision of Agency regulations. The Office of Security has been preparing revised security regulations which will serve as a take- off point for the changes necessitated by the E.O. Specifically, new regulations will replace the extant HRI C. Problems - The principal problem associated with the implemen- tation of safeguarding policy is caused by the fact that Headquarters Regulations depend largely on the development of the implementation directive for E.O. 12065. As a result, the promulgation of the implementing directive will be the pacing item. D. Time Frame'- Initial drafts on which to build the revised Headquarters Regulations are already available. They will be modified to be consistent with the implementing directive as it is developed. Assuming promulgation of the implementing directive by 30 September, final drafts of the Headquarters Regulations should be submitted to the Regulations Control Branch by 31 October. V. APPROVALS FACTION REQUIRED 1. Approval of the attached Headquarters Notice describing what is being done within the Agency to prepare for the implementation of the new E.0. 2. Approval for the use of senior Directorate Declassification Focal Point Officers and supporting structures in implementing the new E.O. 3. Appointment of representatives to the various task forces and agreement that additional personnel will be made available if required. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 A proved FQr Release 2006/04{19 ? -Rf P86f0(~ j F(0(~ Q~0 0~0~ 4. Cpordination anC approva of e na c1 a , i a kage will be handled within the respective Directorates and independent offices by the below listed signatories. APPROVED: Michael J/ alanic Directorate of Administration Eloise Page 71 Directorate of uperati7 Directorate of Science and Technology 1 --1 Paul Walsh' National Foreign Assessment Center Office of Gte ,Counsel __ -Date ~J Date 1 2- -C;'- 7- Da to Approved For Release 2006/04/19-5CIA-RDP86-00674R000300030001-3 STAT Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Next 4 Page(s) In Document Exempt Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 CLASSIFICATION GUIDES ALTERNATIVE #1 Agency-wide guide. Directorate guides. Office guides. Agency-wide guide would cover general type information common to all offices within the Agency. Directorate guides would cover information unique to each directorate but common to all offices within each directorate. Office guides would cover information unique to each office. Agency-wide guide should be prepared by representatives from each directorate and approved by DCI. Directorate guides should be prepared by representatives from each office within the directorate and approved by DD's. Office guides should be prepared by representatives from each branch/ section within office and approved by office head. Decentralized system, but one office (AI/DDA?) should act as focal point and liaison between directorates. Each office would have to work from three guides, but would not be burdened by unnecessary information. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 ALTERNATIVE 4/2 Agency-wide guide. Office guides. Agency-wide guide would cover general type information common to all offices within the Agency. Office guides would cover information unique to each office, but also information common within each directorate. Agency-wide guide should be prepared by representatives from each directorate and approved by DCI. Office guides should be prepared by representatives from each branch/ section within office and approved by one person within each directorate (DD's?) to ensure consistency between offices in duplicative information. One office (AI/DDA?) should act as focal point and liaison between directorates. Each office would have two guides to work from, but duplication would exist between office guides. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 ALTERNATIVE #3 Directorate guides. Each directorate would have only one guide to cover both common type information and unique information within directorate/offices. One person in Agency would act as coordinator and also approve each guide to ensure consistency between directorates. Each office would have only one guide to work from, but would be burdened with unnecessary information. Duplication would exist between guides. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 ALTERNATIVE #4 Directorate guides. Office guides. Directorate guides would cover common-type information found within Agency, and information unique to each directorate but common to all offices within each directorate. Office guides would cover information unique to each office. Directorate guides should be coordinated and approved by one person to ensure consistency in duplicative information. Office guides should be approved by office heads (or DD's?). One office (AI/DDA?) should act as focal point. Offices would have to work from. two guides, but would not be burdened by unnecessary information. Duplication would exist between directorate guides. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 INFORMATION SECURITY OVERSIGHT OFFICE COMPARISON OF MAJOR FEATURES OF EXECUTIVE ORDERS GOVERNING THE INFORMATION SECURITY PROGRAM Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E.O. 10501, AS AMENDED E. 0. 11652 E. 0. 12065 CURRENT DRAFT THREE LEVELS: THREE LEVELS: THREE LEVELS: THREE LEVELS: TOP SECRET(TS)-EXCEPTIONALLY GRAVE TS-EXCEPTIONALLY GRAVE DAMAGE TS-EXCEPTIONALLY GRAVE DAMAGE TS-EXCEPTIONALLY GRAVE DAMAGE S-SERIOUS DAMAGE S-SERIOUS DAMAGE DAMAGE SECRET(S)-SERIOUS DAMAGE C-DAMAGE C-IDENTIFIABLE DAMAGE S-SERIOUS DAMAGE CONFIDENTIAL(C)-PREJUDICIAL TO C-DAMAGE DEFENSE COMMENT: THE TERM "IDENTIFIABLE" HAS BEEN OMITTED IN THE DRAFT ORDER TO OVERCOME LITIGATION PROBLEMS CONCERNING THE INTENT OF THE LANGUAGE OF E.O. 12065. IT IS NOT INTENDED NOR DOES EXPERIENCE INDICATE THAT ITS OMISSION WILL RESULT IN INFORMATION BEING CLASSIFIED UNDER THE DRAFT ORDER WHICH WOULD NOT BE CLASSIFIABLE UNDER E.O. 12065. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E.O. 10501, AS AMENDED E.O. 11652 E.O. 12065 CURRENT DRAFT TOP SECRET: 48 AGENCIES TOP SECRET: 17 AGENCIES TOP SECRET: 13 AGENCIES THE CURRENT DRAFT DOES -7,136 PERSONS -1597 PERSONS -1496 PERSONS NOT LIST THE AGENCIES SECRET: 48 AGENCIES SECRET: 30 AGENCIES SECRET: 17 AGENCIES WITH CLASSIFICATION -23,236 PERSONS -9986 PERSONS -4195 PERSONS AUTHORITY. THIS WILL BE CONFIDENTIAL; 48. AGENCIES CONFIDENTIAL; 30 AGENCIES CONFIDENTIAL: 19 AGENCIES ACCOMPLISHED BY AN ACCOM- -28,944 PERSONS -6043 PERSONS -153.8 PERSONS PANYING PRESIDENTIAL ORDER. PRESENT PLANS ANTICIPATE TOTAL ORIGINAL CLASSIFIERS: 59,316 TOTAL ORIGINAL CLASSIFIERS 17,626 TOTAL ORIGINAL CLASSIFIERS: 7229 NUMBERS COMPARABLE TO E.O. 12065 IN BOTH NU14BERS NOTE: AGENCY AUTHORITY CITED ON OF AGENCIES AND PERSONNEL. THIS PAGE IS CUMULATIVE: I.E., AGEN- CIES WITH SECRET AUTHORITY INCLUDE THOSE WITH TOP SECRET. THE SAME APPLIES FOR CONFIDENTIAL. COMMENT: THE CURRENT DRAFT REFLECTS COMMITMENT TO KEEP THE NUMBER OF CLASSIFIERS TO A NECESSARY MINIMUM, WHILE PROVIDING AN ADMINISTRATIVE REMEDY TO AVOID THE UNNECESSARY INVOLVEMENT OF THE HEAD OF THE AGENCY IN THE DELEGATION PROCESS. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 III. CLASSIFICATION CATEGORIES NO SPECIFIC CATEGORIES ARE GIVEN NO SPECIFIC CATEGORIES.-ARE GIVEN WHICH WHICH LIMIT SUBJECT MATTERS THAT MAY LIMIT SUBJECT MATTERS THAT MAY BE BE CLASSIFIED CLASSIFIED 1. MILITARY PLANS, WEAPONS, OR OPERA- 1. MILITARY PLANS, WEAPONS, OR TIONS; OPERATIONS; 2. FOREIGN GOVERNMENT INFORMATION; 2. THE VULNERABILITIES OR CAPA- 3. INTELLIGENCE ACTIVITIES, SOURCES OR BILITIES OF SYSTEMS, INSTALLA- METHODS; TIONS, PROJECTS, OR PLANS VITAL 4. FOREIGN RELATIONS OR FOREIGN ACTIVI- TO THE NATIONAL SECURITY; TIES OF THE UNITED STATES; 3. FOREIGN GOVERNMENT INFORMA- 5. SCIENTIFIC, TECHNOLOGICAL, OR ECONO- TION; MIC MATTERS RELATING TO THE NATIONAL 4. INTELLIGENCE ACTIVITIES (IN- SECURITY; CLUDING SPECIAL ACTIVITIES), OR 6. UNITED STATES GOVERNMENT PROGRAMS INTELLIGENCE SOURCES OR METHODS; FOR SAFEGUARDING NUCLEAR MATERIALS OR 5. FOREIGN RELATIONS OR FOREIGN FACILITIES; OR ACTIVITIES OF THE UNITED STATES; 7. OTHER CATEGORIES OF INFORMATION 6. SCIENTIFIC, TECHNOLOGICAL, WHICH ARE RELATED TO NATIONAL SECURITY OR ECONOMIC MATTERS RELATING TO AND WHICH REQUIRE PROTECTION AGAINST THE NATIONAL SECURITY; UNAUTHORIZED DISCLOSURE AS DETERMINED 7. UNITED STATES GOVERNMENT PRO- BY THE PRESIDENT, BY A PERSON DESIGNAT- GRAMS FOR SAFEGUARDING NUCLEAR ED BY THE PRESIDENT PURSUANT TO SEC. MATERIALS OR FACILITIES; 1-201, OR BY AN AGENCY HEAD. 8. CRYPTOLOGY; 9. A CONFIDENTIAL SOURCE; OR 10. OTHER CATEGORIES OF INFORMA- TION WHICH ARE RELATED TO THE NATIONAL SECURITY AND WHICH RE- QUIRE PROTECTION AGAINST UNAU- THORIZED DISCLOSURE AS DETER- MINED BY THE PRESIDENT OR BY COMMENT: THE THREE ADDITIONAL CATEGORIES ADDED TO THE CURRENT DRAFT REFLECT EXPERIENCE OF 3 YEARS UNDER E 12065 O AGENCY HEADS WHO HAVE ORIGINAL . . WHICH INDICATED THAT THE ELEMENTS ADDED WERE JEOPARDIZED IN THE CONTEXT OF LITIGATION IT IS NOT INTENDED CLASSIFICATION AUTHORITY. ANY . THAT ADDITIONAL MATERIAL WILL BE CLASSIFIED UNDER THESE CATEGORIES BEYOND THAT WHICH WAS SUBJECT TO CLASSI DETERMINATION MADE UNDER THIS - FICATION UNDER E.O. 12065. SUBSECTION SHALL BE REPORTED PROMPTLY TO THE DIRECTOR OF THE INFORMATION SECURITY OVERSIGHT OFFICE. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E.O. 10501, AS AMENDED E.O. 11652 E.O. 12065 CURRENT DRAFT FOUR GROUPS: THREE GROUPS: SIX YEARS UNLESS EXTENDED BY HEAD OF IF APPROPRIATE, A LIMIT SHALL AGENCY OR TOP SECRET AUTHORITY FOR BE ESTABLISHED AT TIME OF GROUP 1-NO LIMITATIONS ON DURATION 1. ADVANCED DECLASSIFICATION SCHEDULE- PERIODS UP TO 20 YEARS. FOLLOWING ORIGINAL CLASSIFICATION. GROUP 2-N0 LIMITATIONS ON DURATION (ADS): REVIEW, HEAD OF AGENCY MAY EXTEND BE- CLASSIFICATION SHALL CON- GROUP 3-NO LIMITATIONS ON DURATION TS-SOONER THAN 10 YEARS YOND 20 YEARS. TINUE AS LONG AS REQUIRED GROUP 4-12 YEARS S-SOONER THAN 8 YEARS BY NATIONAL SECURITY INTE- C-SOONER THAN 6 YEARS EXPERIENCE HAS SHOWN THAT THE OVER- REST. 2. GENERAL DECLASSIFICATION SCHEDULE WHELMING MAJORITY (IN EXCESS OF 90%) (GDS): NOT MARKED FOR AUTOMATIC DECLASSIFICA- TS-10 YEARS TION IN SIX YEARS. S-8 YEARS C-6 YEARS 3. EXTENDED DECLASSIFICATION SCHEDULE: (.XDS): TS-30 YEARS UNLESS EXTENDED S-30 YEARS UNLESS EXTENDED C-30 YEARS UNLESS EXTENDED COMMENT: THE DRAFT ORDER RECOGNIZES THAT AUTOMATIC DECLASSIFICATION DATES WHICH DO NOT RELATE TO A SPECIFIC OCCURRENCE ARE ARTIFICIAL DETERMINATIONS WHICH POSE A THREAT TO SECURITY OF THE INFORMATION. EXPERIENCE INDICATES THAT AGENCIES AVOID AFFIXING-AUTOMATIC DECLASSIFICATION DATES WHENEVER POSSIBLE. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 V. L IMITATIONS ON CLASSIFICATION E. 0. 10501, as amended E, 0, 11652 E. 0. 12065 Current draft NO SPECIFIC GROUP OF LIMITATIONS. CLASSIFICATION SOLELY ON BASIS OF CLASSIFICATION IMPROPER WHEN USED TO CLASSIFICATION SOLELY ON SOME REFERENCES TO AVOIDING VNNECr NATIONAL SECURITY CONSIDERATIONS. CONCEAL VIOLATIONS OF LAW, INEFFICIENCY BASIS OF NATIONAL SECURITY ESSARY OR INAPPROPRIATE NOT TO CONCEAL INEFFICIENCY OR OR ERROR, PREVENT EMBARRASSMENT, OR CONSIDERATIONS. NOT TO CLASSIFICATION, ERROR, TO PREVENT EMBARRASSMENT, RESTRAIN COMPETITION, OR LIMIT CONCEAL VIOLATIONS OF LAW, TO RESTRAIN COMPETITION OR TO DISSEMINATION OF INFORMATION. INEFFICIENCY OR ERROR, PREVENT THE RELEASE QF MATERIAL PREVENT EMBARRASSMENT, NOT REQUIRING NATIONAL SECURITY BASIC SCIENTIFIC RESEARCH NOT CLEARLY RESTRAIN COMPETITION, OR PROTECTION. RELATED TO NATIONAL SECURITY MAY NOT DELAY RELEASE OF INFORMATION. BE CLASSIFIED. CLASSIFICATION MAY UNDER VERY LIMITED CIRCUM- NOT BE RESTORED TO DOCUMENTS DECLASSI.- STANCES, DECLASSIFIED FIED AND RELEASED TO THE PUBLIC. INFORMATION WHICH REQUIRES UNDER VERY LIMITED CIRCUMSTANCES PROTECTION MAY BE RECLASSI- DOCUMENTS CAN BE CLASSIFIED AFTER FIED. UNDER LIMITED RECEIPT OF FOIA OR MANDATORY REVIEW CIRCUMSTANCES, DOCUMENTS REQUEST, CAN BE CLASSIFIED AFTER RECEIPT OF FOIA OR MANDATORY REVIEW REQUEST. COMMENTS: THE CURRENT DRAFT RETAINS THE CRITICAL LIMITATIONS OF THE EXISTING ORDER, IN ALLOWING THE VERY LIMITED RECLASSIFICATION OF MATERIAL PREVIOUSLY RELEASED, THE DRAFT RECOGNIZES INSTANCES IN WHICH THIS ACTION IS BOTH NECE$$AAY AND EPFECTIVE, Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E. 0. 10501, as amended E. 0. 11652 E. 0. 12065 Current draft NO RECOGNITION OF DISTINCTION NO SPECIFIC RECOGNITION OF DISTINCTION RECOGNIZES DERIVATIVE CLASSIFICATION RECOGNIZES DERIVATIVE CLASSI- BETWEEN ORIGINAL AND DERIVATIVE BETWEEN ORIGINAL AND DERIVATIVE AS A COMPLETELY DISTINCT PROCESS FROM FICATION AS A COMPLETELY CLASSIFICATION. CLASSIFICATION. HOLDERS OF CLASSIFIED ORIGINAL CLASSIFICATION, BUT DOES NOT DISTINCT PROCESS FROM INFORMATION ARE REQUIRED "TO OBSERVE DEFINE DERIVATIVE CLASSIFICATION. ANY ORIGINAL CLASSIFICATION, AND AND RESPECT" THE CLASSIFICATION AUTHORIZED HOLDER OF CLASSIFIED DEFINES THE TERM. ANY ASSIGNED BY THE ORIGINATOR. INFORMATION MAY DERIVATIVELY CLASSIFY, AUTHORIZED HOLDER OF EVEN PERSONS WITHOUT ORIGINAL CLASSI- CLASSIFIED INFORMATION MAY FICATION AUTHORITY. MANDATES CREATION DERIVATIVELY CLASSIFY, EVEN OF CLASSIFICATION GUIDES TO BE USED PERSONS WITHOUT ORIGINAL BY DERIVATIVE CLASSIFIERS. CLASSIFICATION AUTHORITY. MANDATES CREATION OF CLASSIFICATION GUIDES, BUT AGENCY HEAD MAY WAIVE REQUIREMENT FOR SPECIFIC CLASSES OF INFORMATION AND REPORT WAIVER TO ISOO, ISOO EXPERIENCE IN MONITORING THE PROGRAM SHOWS THAT APPROXIMATELY 951 OF ALL CLASSIFICATION ACTIONS ARE DERIVf~TIVE IN NATURE,, APPROPRIATE APPLICATION OF DERIVATIVE CLASSIFICATION PROMOTES UNIFORM CLASSIFICATION OF LIKE INFORMATION AND FACILITATES ITS SAFEGUARDING AND ULTIMATE DECLASSIFICATION. THE DRAFT ORDER REFLECTS 1500 EXPERIENCE THAT THERE ARE CERTAIN CLASSES OF INFORMATION FOR WHICH CLASSIFICATION GUIDES ARE INEFFECTUAL. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E.O. 10501, AS AMENDED E.O. 11652 E.O. 12065 CURRENT DRAFT HEAD OF AGENCY AND DESIGNEES MAY AUTHORITY TO DECLASSIFY OR DOWNGRADE AUTHORITY TO DECLASSIFY OR DOWNGRADE AUTHORITY TO DECLASSIFY OR DECLASSIFY OR DOWNGRADE INFORMATION RESTS WITH THE ORIGINATING OFFICIAL; A RESTS WITH THE ORIGINATING OFFICIAL; DOWNGRADE RESTS WITH THE ORIGINATED WITHIN THAT AGENCY. HEAD SUCCESSOR IN FUNCTION; A SUPERVISORY A SUCCESSOR IN FUNCTION; A SUPERVISORY ORIGINATING OFFICIAL; A OF AGENCY AND DESIGNEES MAY DECLAS- OFFICIAL OF EITHER; AND ANY OTHER OFFICIAL OF EITHER; OR OTHER OFFICIALS SUCCESSOR IN FUNCTION; A SIFY OR DOWNGRADE INFORMATION ORIGI- OFFICIAL WITH TOP SECRET OR SECRET DESIGNATED BY THE AGENCY HEAD. THE SUPERVISORY OFFICIAL OF EITHER; NATING IN ANOTHER AGENCY BUT IN THEIR CLASSIFICATION AUTHORITY WHO HAS BEEN DIRECTOR OF ISOO MAY ORDER AN AGENCY OR OTHER OFFICIALS DESIGNATED POSSESSION BASED ON REGULATIONS DESIGNATED BY ONE OF THE PRIOR LISTED HEAD TO DECLASSIFY INFORMATION DETER- BY THE AGENCY HEAD OR THE ISSUED BY ORIGINATING AGENCY. OFFICIALS. MINED TO BE CLASSIFIED IN VIOLATION OF SENIOR INFORMATION SECURITY THE ORDER. SUCH AN ORDER MAY BE PROGRAM OFFICIAL. APPEALED BY AGENCY HEAD TO NATIONAL SECURITY COUNCIL. COMMENT; THE DRAFT ORDER RETAINS THE DECLASSIFICATION PROCEDURES OF E.O. 12065 AS THEY PERTAIN TO AUTHORITY AND FACILITATES THE DECLASSIFICATION PROCESS BY ALLOWING THE AGENCY SENIOR OFFICIAL TO DESIGNATE DECLASSIFICATION AUTHORITIES. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E . 0. 10501, as amended E. 0. 11652 E, 0, 12065 Current draft NO PROVISIONS FOR SYSTEMATIC ALL INFORMATION CLASSIFIED UNDER PERMANENTLY VALUABLE CLASSIFIED SYSTEMATIC REVIEW TO BE REVIEW. PRIOR ORDERS TO BE REVIEWED FOR RECORDS SHALL BE SYSTEMATICALLY CARRIED OUT BY THE ARCHIVIST, DECLASSIFICATION BY THE ARCHIVIST REVIEWED FOR DECLASSIFICATION CONSISTENT WITH PROCEDURES OF THE UNITED STATES 30 YEARS FROM TWENTY YEARS FROM DATE OF ORIGIN. PRESCRIBED BY ISOO AND AGENCY DATE OF ORIGIN. AGENCIES TO PROVIDE AGENCY HEAD MAY EXTEND DECLASSI- GUIDELINES, ON ALL MATERIAL THE ARCHIVIST WITH GUIDELINES AND FICATION IN TEN YEAR INCREMENTS ACCESSIONED INTO THE NATIONAL SUPPORT AS NEEDED. CLASSIFICATION FOLLOWING REVIEW, FOREIGN ARCHIVES AND CLASSIFIED OF SPECIFIC CATEGORIES OF INFORMATION GOVERNMENT INFORMATION TO BE PRESIDENTIAL PAPERS IN THE MAY BE EXTENDED BEYOND 30 YEARS BY REVIEWED 30 YEARS FROM DATE OF ARCHIVIST'S CONTROL. TIME- THE HEAD OF THE ORIGINATING AGENCY. ORIGIN, ALL AGENCIES SHALL FRAMES TO BE ESTABLISHED DEVELOP GUIDELINES FOR USE IN THIS IN ACCORDANCE WITH ISOO PROGRAM, DIRECTIVES AND AGENCY GUIDELINES, AGENCY HEADS MAY CONDUCT SYSTEMATIC REVIEW PROGRAM ON PERMANENTLY VALU- ABLE RECORDS ORIGINATING IN THOSE AGENCIES, COMMENTS: THE CURRENT DRAFT REPRESENTS A COMPROMISE POSITION BETWEEN THE RECOMMENDATION OF THE GENERAL ACCOUNTING OFFICE THAT SYSTEMATIC REVIEW BE ABOLISHED ENTIRELY AND THE CURRENT SYSTEM WHICH IS BOTH COSTLY AND UNSUCCESSFUL IN MEETING THE ErEQUIREMENTS OF THE ORDER. THE MORE REALISTIC PROGRAM ENVISIONED UNDER THE DRAFT ORDER WILL BETTER BALANCE THE NEEDS OF RESEARCHERS WITH AVAILABLE RESOURCES. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 IX. MANDATORY REVIEW E.O. 10501, AS AMENDED E.O. 11652 E.O. 12065 CURRENT DRAFT NO PROVISION REGARDING MANDATORY ORIGINATOR SHALL REVIEW INFORMATION FOR A MEMBER OF THE PUBLIC OR GOVERNMENT ALL INFORMATION SUBJECT TO MAN- REVIEW. POSSIBLE DECLASSIFICATION UPON A REQUEST AGENCY MAY, AT ANY TIME, REQUEST DATORY REVIEW AT ANY TIME UPON BY AN AGENCY OR MEMBER OF THE GENERAL THAT CLASSIFIED INFORMATION BE REVIEWED REQUEST BY US CITIZEN, RESI- PUBLIC IF THE INFORMATION IS AT LEAST FOR DECLASSIFICATION AND RELEASE. DENT ALIEN, OR STATE OR LOCAL TEN YEARS OLD. PRESIDENTIAL MATERIALS LESS THAN TEN GOVERNMENT. REQUEST MUST BE YEARS OLD ARE EXEMPT FROM THIS REQUIRE- SPECIFIC ENOUGH THAT AGENCIES MENT. AGENCIES CANNOT REFUSE TO CON- CAN LOCATE THE INFORMATION WITH FIRM OR DENY THE EXISTENCE OF A DOCU- REASONABLE EFFORT. PRESIDENTIAL MENT UNLESS THAT FACT IS CLASSIFIABLE MATERIALS ARE SUBJECT TO MANDA- UNDER THIS ORDER. TORY REVIEW 12 YEARS AFTER CREATION. AGENCIES SHALL DEVE- IN MAKING DECLASSIFICATION DECISIONS THE LOP PROCEDURES FOR MANDATORY ORIGINATOR SHOULD BALANCE THE BENEFITS REVIEW, TO INCLUDE A METHOD OF TO THE PUBLIC FROM RELEASE OF INFORMA- APPEAL. INFORMATION SHALL BE TION AGAINST NATIONAL SECURITY CONSI- REVIEWED BY THE ORIGINATOR IF DERATIONS. IN THE CUSTODY OF ANOTHER AGENCY. COi1NENT: OMISSION OF THE "BALANCING TEST" IS DESIGNED TO PREVENT THE UNINTENDED JUDICIAL REVIEW OF EXECUTIVE BRANCH DISCRETION. BALANCING IS INHERENTLY A PART OF THE DECISION TO CLASSIFY AND DECLASSIFY INFORMATION. THE DELAY TO 12 YEARS FOR REVIEW OF PRESIDENTIAL RECORDS IS DESIGNED TO BE CONSISTENT WITH THE PRESIDENTIAL RECORDS ACT OF 1978. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E. 0. 10501, as amended E. 0. 11652 E. 0. 12065 Current draft SETS FORTH BASIC POLICIES CONCERNING PROVIDED ESSENTIALLY THE SAME BASIC IN ADDITION TO THE BASIC POLICIES RETAINS THE SAFEGUARDING ACCESS, STORAGE, LOCKS AND SECURITY POLICIES FOR THE PROTECTION OF SET FORTH IN PREDECESSOR ORDERS, POLICIES OF E. 0. 12065 CONTAINERS, DISSEMINATION, LOSS, NATIONAL SECURITY INFORMATION. IN INCLUDED DIRECTION FOR REPRODUCTION WITH THE EXCEPTION OF COMPROMISE, ACCOUNTABILITY, TRANS- ADDITION, REQUIRED THE NATIONAL CONTROLS AND FOR MONITORSHIP OF THOSE PORTIONS DEALING MISSION, DESTRUCTION, ETC. SECURITY COUNCIL TO ISSUE DIRECTIVES SPECIAL ACCESS PROGRAMS BY THE WITH REPRODUCTION CONTROLS. CONCERNING PROTECTION BASED ON THESE DIRECTOR OF THE INFORMATION SECURITY ADDS PROVISIONS PROHIBITING POLICIES. OVERSIGHT OFFICE (ISOO). PROVIDES DISTRIBUTION OR DISSEMINA- THAT THE ISOO PROMULGATE IMPLEMENTING TION OF INFORMATION TO A SAFEGUARDING DIRECTIVES, THIRD AGENCY WITHOUT THE AGREEMENT OF THE ORIGINATING AGENCY. COMMENTS: THE THIRD-AGENCY RULE CURRENTLY CONTAINED IN THE ISOO DIRECTIVE HAS BEEN PLACED IN THE DRAFT ORDER. THE IMPLEMENTING DIRECTIVE WILL REQUIRE AGENCIES TO ESTABLISH APPROPRIATE REPRODUCTION CONTROLS, Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 E.O. 10501, AS AMENDED E.O. 11652 E.O. 12065 CURRENT DRAFT MADE NO PROVISIONS FOR OVERSIGHT BY AN INDEPENDENT BODY EACH AGENCY WAS RE ESTABLISHED A SEVEN MEMBER INTERAGENCY CLASSIF A ESTABLISHES A SEPARATE AND INDEPENDENT THE CURRENT DRAFT ESSENTIALLY . - SPONSIBLE FOR MONITORING ITS OWN PRO- IC TION REVIEW COMMITTEE (ICRC) TO ASSIST THE NSC IN MONITORING IMPLEMENTA BODY, THE INFORMATION SECURITY OVER- RETAINS ALL AUTHORITY PROVID- GRAM. THE NATIONAL SECURITY COUNCIL - TION OF THE ORDER. THE ICRC WAS CHARGED SIGHT OFFICE (IS00), TO MONITOR THE PROGRAM. PROVIDES AUTHORITY FOR THE ED TO THE ISOO BY E.O. 12065. IN ADDITION IT PROVIDES THE (NSC) WAS RESPONSIBLE FOR CONDUCTING A CONTINUING REVIEW OF THE IMPLEMEN SPECIFICALLY TO OVERSEE AGENCY ACTIONS, TO I DIRECTOR, ISOO, TO OVERSEE AND ENSURE DIRECTOR THE AUTHORITY TO - TATION OF THE ORDER TO ENSURE THAT NCLUDE APPROVAL OF AGENCY IMPLEMENT- ING DIRECTIVES AND TO RECEIVE AND TAKE COMPLIANCE WITH THE ORDER THROUGH ON- S PRESCRIBE GOVERNMENT-W DE CLASSIFIED DEFENSE INFORMATION WAS , ACTION ON SUGGESTIONS AND COMPLAINTS ITE REVIEWS OF AGENCY PROGRAMS, AND REVIEW AND APPROVE AGENCY IMPLE- STANDARD SECURITY FORMS AND TPOINT MEMB PROPERLY SAFEGUARDED. REGARDING THE PROGRAM FROM PERSONS WITH- . MENTING REGULATIONS AND SYSTEMATIC ERS OF THE ISOO STAFF IN OR OUTSIDE THE GOVERNMENT. REVIEW GUIDELINES. REQUIRES THE . HEADS OF AGENCIES WERE CHARGED TO DESIG- DIRECTOR TO REPORT ANNUALLY TO THE PRESIDENT ON THE STATUS OF IMPLEMENTA- THE DRAFT CONTINUES TO PRO- VIDE THAT THE NSC SHALL PRO- NATE A SENIOR OFFICIAL RESPONSIBLE FOR TION OF THE ORDER. THE DIRECTOR, ISOO, VIDE OVERALL POLICY DIRECTION EFFECTIVE IMPLEMENTATION AND FOR ENSURING IS GIVEN THE AUTHORITY TO DEVELOP AND FOR THE PROGRAM THAT AGENCY PERSONNEL WERE FAMILIAR WITH PROMULGATE DIRECTIVES FOR IMPLEMENTING . THE REQUIREMENTS OF THE ORDER. THE ORDER THAT ARE BINDING ON AGENCIES. OVERALL POLICY DIRECTION FOR THE PROGRAM IS PROVIDED BY THE NATIONAL SECURITY COUNCIL. COMMENT: CURRENT DRAFT CONTINUES TO RECOGNIZE THE NEED FOR AN INDEPENDENT OVERSIGHT ORGANIZATION. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 XII. SANCTIONS E. 0. 10501, as amended E. 0. 11652 E. 0. 12065 Current draft PROVIDED FOR NO SPECIFIC SANCTIONS SANCTIONS WERE LIMITED TO CASES OF SANCTIONS WERE EXPANDED TO COVER THE SANCTION PROVISIONS OF EXCEPT THAT AGENCY HEADS WERE REPEATED UNNECESSARY CLASSIFICATION KNOWING AND WILLFUL (1) CI.ASSIFICA- E. 0. 12065 ARE CONTINUED DIRECTED TO TAKE PROMPT AND OR OVERCLASSIFICATION AND TO TION IN VIOLATION OF THE ORDER; (2) IN THE CURRENT DRAFT. THE STRINGENT ACTION AGAINST ANY UNAUTHORIZED DISCLOSURES OF NATIONAL UNAUTHORIZED DISCLOSURE; OR (3) ONE ADDITION IS PROVISION EMPLOYEE DETERMINED TO HAVE BEEN SECURITY INFORMATION. VIOLATION OF ANY OTHER PROVISION FOR "NEGLIGENT" UNAUTHORIZED KNOWINGLY RESPONSIBLE FOR THE OF THE ORDER OR IMPLEMENTING DISCLOSURE OR "NEGLIGENT" UNAUTHORIZED RELEASE OR DISCLOSURE DIRECTIVES. A RANGE OF SANCTIONS VIOLATION OF ANY OTHER OF CLASSIFIED DEFENSE INFORMATION. FROM REPRIMAND TO REMOVAL WAS ESTA- PROVISION OF THE ORDER OR BLISHED, THE DIRECTOR OF I800 IMPLEMENTING DIRECTIVES. MUST BE INFORMED OF ALL VIOLATIONS THE RANGE OF SANCTIONS AND CORRECTIVE ACTIONS TAKEN. PROVIDED BY E. 0. 12065 IS CONTINUED, AS WELL AS PROVISIONS FOR THE DIRECTOR, ISOO, TO BE NOTIFIED IN CASES OF UNAUTHORIZED DISCLOSURE OR CLASSIFICATION IN VIOLATION OF THE ORDER. COMMENTS: CURRENT DRAFT RETAINS AND STRENGTHENS THE SANCTION PROVISIONS OF E. 0, 12065, IT RELIEVES THE REQUIREMENT THAT AGENCIES MAKE ON-THE-SPOT REPORTS OF MINOR ADMINISTRATIVE VIOLATIONS TO THE ISOO, Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 COi1PARISON OE EXECUTIVE ORbLR 12065 AND 71111 LINALI`I' ORDER DRAFT ORDER E>tecuthe Order Dol. By the authority reamed In me n Rnidon, by the Conrdmlion and I.w4 of the United Sutea of .{,aerie.. In ceder 1o b.6... d.e p..biic, interest in a[[o1 to Govcrnotcm htfoanution with the need m prose.. censin national ..nnit. iufor,natlon born dtaclontre. a la hereby ordered a. fop4wc Hollanol Security MftnnaIlon TABLE OF CONTENTS PION 1:1 CLASSIFICATION LEVELS CLASSIFICATION AUTHORITY 3.rn.. !. 01.0.... C......ne.noa, 1-1 CNnt..aia. aa...,................. _ .................. _.................................. ........ 110041 SE. l1 CLASSIFICATION CATEGORIES OURATION OF CLASSIFICATION I-I 1.Ya...6,,nw w.nw deltl0 ?y"4R000 Section 4.1(0) of the proposed Order contains editorial changes. Section 4_ 102 of the present Order has been deleted. This subject is included under Sectlan 1.5 of the proposed Order. Section 4-104 of the present Order has been deleted. This subject will be addressed In more detail in the implementing directive. Section 4.1(c) of the proposed Order contains editorial changes. Section 4.1(d) of the proposed Order is presently addressed In 1500 Directive No. I, E.O. 12065. It more properly belongs In this section of the proposed Order. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 4-2. Speiiaf dross Proyraev. 4-201. Agency hods listed in Section 1-201 may create special acens programs to control access, distributiom and protection of particularly sensi. tive information dassiled pursuant to this Order or prior Orden. Such pro- grams may he created or continued only by written direction and only by those agency heads and. for matters pertaining to intelligence sources and methods, by the Director of Central Intelligence. Clasulled Information in such programs shall be declassified according to the provisions of Section 1. 4-rue. apccut access programs may be creates or concussion only on a specific showing than. . fat normal management and safeguarding procedures are not sufficient to limit need-to-know or access; Ib) the number of persona who will need access will be reasonably ,snap and commensuraee with the objective of providing extra protection for the, information involved; and Ic) the special access controls balance the need to protect the information against the full spectrum of needs to use the inforrhasion. 4-203. All special access programs shall be reviewed regularly and. ncept those required by treaty or international agreemens. shall terminate ausiGmati- rally every live years unless renewed in accordance with the procedures in Section 4-2. 1-104. within 180 dais alter the cifectiv^ date of this Order, agency heads shall review all existing special access propems under their jurisdiction and continue them only in accordance with the procedures in Section 4-2. Each of those agency finds shall also establish and maintain a Intern of ..accounting for special access prognms. The Director of the Information Secu. rity Oversight Office shall have nets-delegable access to all such accountings. COMPARISON Uf' EXCCUT I VE OWE[ I iOi. i APIIJ THE DRAFT OPULk SEC 4.2 Special Access Programs. (a) Agency heads designated pursuant to Section 1.2(a) may create special access programs to control access, distribution, and protection of particularly sensitive information classified pursuant to this Order or predecessor orders. Such programs may be created or continued only at the written direction of n elligagency ence activities For special access programs (including special activities pertaining but not to Intelligence Including military operational strategic and tactical programs), or intelligence sources or methods, this function will be exercised by the Director of Central Intelligence. For special access programs pertaining to cryptology, this function will be exercised by the Secretary of Defense. (b) Each agency head shall establish and maintain a system of accounting for special access programs. The Director of the information Security Oversight Office, consistent with the provisions of Section S.2(bX4) shall have non-delegable access to all scdn accountings. Section 4.2(a) of the proposed Order contains editorial changes. Section 4-202 of the present Order has been deleted. This section will be addressed in the implementing directive. Section 4-203 of the present Order has been deleted. Continuance of this requirement is an unnecessary and costly administrative. burden. Section 4.2(b) of the proposed order contains editorial changes. Appi )ved For Release 2006/04/19 : CIA-RDP86-00674R000P00030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 COMPAR I SUN CF EXECUi I VE Ol;DEH 1 U(.5 AF(t) I IIE I )RR/1F I' ORDER EXCCUTIVF ORDER 17045 4-1. Arias by Huronrul Rnmrrhm and Former Pr.w/anal.lppointn, 4-301. The requirement in Section 1-101 that access m classifed infor? motion may be granted only.a. is necessary for she performance of official duties may be waived as provided in Section 4-302 for persons who: Ia) are engaged in historicsl research project.. or IN previously have occupied policy-making positions to which they were appointed by the President. 4-302, waivers under S-coon 1-301 may be ;ranted only if the sgencv wuh jurisdicton over the informition: (a) makes a written determination that attest is consistent wish the Inter. tea of national security; tbl takes aopropsinte ceps to enure that teens is limited to specific casegerieu of information over which that agency has c!sanfcation jurisdiction: Ic) limits the access grunted to former IRnmoennal appointee, to item, that the person originated, reviewed, signed or received while serving a, a Presidential appointee. 4-101. Top Secret documents may not be reproduced without the consent of the originating agency unless otherwise marked by the originating office. 4-402. Reproduction of Secret and Contldendal documents may be to. tittered by the originating agency. 4-403. Reproduced copies of classified documents are subject to the same accountability and controls as the original documents. 4-104. Records 'hall be maintained by all agencies that reproduce paper copies of classified documenu to show the number and distribution of repro. duced copies of all Top Secret documents, of at documents covered by special access programs distributed outside the originating agency, and of all Secret and all Confldential documents which are marked with special di>emi? tudon and reproduction limitations in accordance with Section 1-506. 4-405. Sections 4-IOt and 4-402 shall not restrict the reproduction of documents for the purpose of facilitating review for declataification. However. sucn reproduced documents that remain davi0e4 alter review must be de srrol ed after they are used. Artrlr SEC 4.3 Access by Historical Researchers and Former Presidential utces. (a) The requirement in Section 4.1(a) that access to cltusified information may be granted only as is essential to the accomplishment of authorized end lawful Government purposes may be waived as provided in Section 4.3(b) for persons who; (1) are engaged In historical research projects, or (2) previously have occupied policy-making positions to which they were appointed by the President, (b) Waivers under Section 4.3(a) may be granted only if the originating agency; (I) determines In writing that access Is consistent with the Interest of national security; (2) takes appropriate steps to protect classified Information from unauthorized disclosure or compromise, and ensures that the Information is safeguarded in a manner consistent with this Order; and (3) limits the access granted to farmer presidential appointees to items that the person originated, reviewed, signed, or received while serving as a presidential appointee. Section 4-4 of the present Order has been deleted. This section will be addressed in the Implementing directive. P00030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 SECTION S. I.sruuctrsanoe.u.n Rn tcw. Oveenght. 5-101. The National Security Council may review all matters with respect to the implementation of this Order and shall provide overall policy direction for the information security program. 5-102. The Administeamr of General Services shall be responsible for implementing and monitoring the program established pursuant to this Order. This responsibility shall be delegated to an Information Security Oversight Office. 5-2. fefomranoa Srnmry Ovrrryht O//Re 5-201. The Information Security Oversight Office shall have a full-time Director appointed by the Administrator of General Services subject to ap. proval by the President, The Administrator also shall have authority to ap- point a stall for the Office. top develop. in consultation with the agencies, and promulgate. subject to the approval of the National Security Council. directives for the implements. (ion of this Order which shall be binding in the agencies; (41 oversee agency actions to ensure compliance with this Order and implementing directives; 11) review all avence implemenrtine regulations and agency guidelines for systematic dedassiGcat:on review. The Director shall require any regulation or guideline to be charged if it is not consistent with this order or implementing J directives. Any such decision by the Director may be appealed to die National Security Council, The agency regrdmion or guidelir.e shall remain in effect until the appeal is decided or until one year from the date of she Director's derision. whichever occurs first. 111) have the authority to conduct on-site reviews of the information security program of each agency that handles classified information and to require of each agency such reports. information, and other coopernion as necessary to fulfill his responsibilities. if such reports, inspection, or access to specific categories of classificd information would pose an exceptional national security risk, the affected agency head may deny cess. The Director may appeal denials to the National Security Council. The denial of access shall remain In effect until the appeal is decided or until one year from she date of the denial, whichever occur, first. Appr PART S IMPLEMENTATION AND REVIEW SEC 5.1 Policy Direction. (a) The National Security Council shall provide overall policy direction for the information security program. (b) The Administrator of General Services shall be responsible for Implementing and mars; luring the program established pursuant to this Order. The Administrator shall delegate the Implementation and manitorship functions of this program to the Director of the Information Security Oversight Office. SEC 5.2 Information Security Oversight Office. (a) The Information Security Oversight Office shall hove a full-time Director appointed by the Administrator of General Services subject to approval by the President. The Director shall have the authority to appoint a staff for the Office. (I) develop, in consultation with the agencies, an promulgate, subject to the approval of the National Security Council, directives for the Implementation of this Order which shall be binding on the agencies; (2) oversee agency actions to ensure compliance with this Order and implementing directives; (3) review all agency implementing regulations and agency guidelines for systematic declassification review. The Director shall require any regulation or guideline to be changed if it is not consistent with this Order or implementing directives. Any such decision by the Director may be appealed to the National Security Council. The agency regulation or guideline shall remain In effect until the appeal is decided; (4) have the authority to conduct on-site reviews of the information security program of each agency that generates or handles classified information and to require of each agency those reports, Information, and other cooperation that may be necessary to fulfill the Director's resparsibillties. If these reports, Inspections, or access to specific categories of classified information would pose an exceptional national security risk, the affected agency head or the senior official designated under Section 5.3(aXI) may deny access. The Director ma a al denials to the Notional Security Council. The For Release 2 ~/ICteaRE3P86 000>R000 2. d; Section 5.2(a) of the proposed Order contains editorial changes. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 ?g1 exercise casc?ov-ease classdtcation authority in accordance with Section I-205 and review requests for original clantflcasion authont? from agencies or officials no, granrod original dassillcation authority under Section 1-2 or this Order and iht consider and take action an complains and suggestions from persons within or outside the Government with respect to she adminisinsion of the information security program. including appeals from decisions on declassili. cation requests pursuant to Section 1-503: it report annually to the Presidttm -hrw:zh the Administrator rf General Services and the National Security Council on the implementation of this Order: tel exercise sae authority to declassuy mtormauon provided by Sections 3-104 and 3-503: 3-3. fetrragmty Insorxtsswn Security C.ces uW- 5-301. There is established an interagency Information Security Commit- ice which shall be chaired by the Director and shall he comprised of represent. macs of the Secretaries of State, Defense, Treasury, and Energy, the Attorney General. the Director of Centel Inrdligence. the National Security Council. the Domestic Policy Staff. and the Archivist of the United States. 3-302. Represenatiees of other agencies may be invited to meet with the committee on matten of panIcular interest to those agencies. 5-303. The Committee shall meet at the all of the Chairman or at the request of a member agency and shall advise the Chairman on implementation of this order. (5) review requests for original classification authority from agencies or officials not granted original classification authority and, if deemed appropriate, recommend presidential approval; (6) consider and take action an complaints and suggestions from persons within or outside the Government with respect to the administration of The Information security program; (7) have the authority to prescribe, after consultation with affected agencies, standard forms that will promote the Implementation of the Information security programs (8) exercise case-by-case classification authority In accordance with Section 1.2(0)1 (9) report of least annually to the President through the Ivlaticnal Security Council an the implementation of this Orders and (10) have the authority to convene and chair interagency meetings to discuss matters pertaining to the information security program. REASONS FOR CHANCE Section 5.2(6x7) of the proposed Order Fos been added to 1500 responsibiliifes in the interest of promoting standordtzatltan, security, and ecaamy in security farms. Section 5.2(bx10) of the proposed Order provides a more flexible means of discussing information security mutters with affected agencies through ad hoc cortxesittees. The inclusion of this subsection makes Section 5-3 of the present Order unnecessary. Section 5-3 of the present Order has been deleted. This subject Is incorporated in Section 5.2(6)( 10) of the proposed Order. Approved For Release 2006/04/19 : CIA-RDP86-00674R000P00030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 3-401. A copy of any information security regulation and a copy of any guideline for systematic dec4usificadoes review which has been adopted pursu. ant to this Order or implementing directives, shall be submitted to the Infor. madon Security Oversight Office. To she extent practicable. such regulations and guidelines should be unclassified. COMPARISON OF EXECUTIVE ORDER 12065 AND THE DRAFT ORDER SEC 5.3 General Responsibilities. (a) Agencies that originate or handle classified information shout 3-104. Agencies which originate or handle classified information shall: (al designate a senior agency official to conduct an active oversight pro. gram to ensure effective implementation of this Order, 3-102. Unclassified regulations that establish agency information security policy and undasaified quidefna'for systematic declassification review shall be published in the Feoen.ts. Recsaraa. l0 establish procedures to prevent unnecessary access to classified infor. mation. Including procedures which require that a demonstrable need for access to classified information is established before initiating administrative clearance procedure,, and which ensures that, the number of people granted access to classified information It reduced to and maintained at she minimum number that Is consistent wish operational requirements and needs; and (I) designate a senior agency official to direct and administer Its Information security program, which shall Include an active oversight and security education program to ensure effective Implementation of this Order; (2) promulgate implementing regulations. Any unclassified regulations that establish agency information security policy shall be published or Incorporated by reference in the Federal Register to the extent that these regulations feet mem s of the public; (3) establish procedures to prevent unnecessary access to classified Information, including procedures that (I) require that a demonstrable need for access to classified Information Is established before initiating administrative clearance procedures, and (Ii) ensure that the number of persons granted access to classified Information is limited to the minimum consistent with operational and security requirements and needs; and (4) develop special contingency plans for the protection of classified information used In or near hostile or potentially hostile areas. 5-403. Agencies with original classification authority shall promulgate guides for security classification that will facilitate the identification and uni. form classification of information requiring protection under the provisions of this Order. 3-101. lbl designate a senior agency official to chair an agency committee with suthnnta so act on all suggestions and cancpiama ?:uh respect to the agenc,'t administration of the ioformaton secunty program; App Section 5-401 of the present Order has been deleted. This section Is Incorporated in 5.2(bX3) of the proposed Order. Section 5-403 of the present Order has been deleted. This subject Is addressed In Section 2.2 of the proposed Order. Section 5-404(b) of the present Order has been deleted. This subject is Incorporated In 5.3(cX 1) of the proposed Order. 00030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 EXECUTIVE ORDER 12065 declassthcauon lei eslabhsh a process to decide appeals tram denwls at requau submitted pursuant to Section 1-S; id) establish a program to familiarise agency and other personnel who have access to classified information with the provisions of this Order and implementing directives. This program shall impress upon agency personnel their responsibility to exercise tigilancc in complying with this Order The program shall encourage agency personnel to challenge. through Mandatory Review and other appropriate procedures, those ctasifcusion decisions they believe to be improper, (e) promulgate guidelines for sysscntasic review in accordance with Sec. Lion 5-402; Igl ensure that practices for safeguarding information are systematical reviewed and that those which are duplicative or unnecessary are eliminate Section 5-404(c) of the present Order has been deleted. This subject Is incorporated in 3.4(d) of the proposed Order. Section 5-404(d) of the present Order has been deleted. This subject Is iricorporottsd In 5.3(aXl) of the proposed Order. Section 5-404(e) of the present Order has been deleted. This subject Is Incorporated in 3.3(o) of the proposed Order. Section 5-404(g) of the present Order has been deleted. This subject Is Incorporated in Part 4 of the proposed Order. 5-405. Agencies shall submit to the information Security Oversight Off, such infonnatfort or reports as the Director of the Office may find neesssary carry out the Office's responsibilities. S-3., ,tde,ctsoetor aaufioes. 5-501. If the Information Security Oversight Once finds that a violation of this Order or any implementing directives may have occurred, it shag make a report to the head of the agency concerned to that corrective steps may be taken. 5-502. Officer and employees of the United Stases Government shag be .object to appropriate administrative sanedons if they: (at knowingly and willfully classify or continue (he classification of Infor. notion in violation of this Order or any implementing directives: or (bi knowingly, willfully and without authorization disclose informadon properly classified under this Order or prior Orders or compromise property classified information through negligence. or (c) knowingly and willfully violate any other provision of this Order or Implementing directive. SEC 5,4 Sanctions. (a) I f the Director of the Information Security Oversight Office finds that a violation of this Order or Its Implementing directives may have occurred, the Director shall make a report to the head of the agency or to the senior official designated under Section 5.3(aX1)so that corrective steps, if appropriate, may be taken. Os) Officers and employees of the United States Government, and Its contractors, licensees, and grantees shall be subject to appropriate sanctions If they. (I) knowingly, willfully, or negligently'disclose to unauthorized persons information properly classified under this Order or predecessor orders; (2) knowingly and willfully classify or continue the classification of Information in violation of this Order or any implementing directive; or (3) knowingly and willfully violate any other provision of this Order or Implementing directive. Section 5-405 of the present Order has been deleted. This subject is Incorporated in Section 5.2 of the proposed Order. Approlved For Release 2006/04/19 : CIA-RDP86-00674R0003' 0030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 5-SOS. Sanction may include repnmand. suspension without pay. remov- al. termination of clanilkahioo authority, or other iancuon in accordance with applicable law and agency regulation. s-51W .Agency hods shall ensure that appropriate and prompt conceive asvnn is taken whenesera violation under Section 5-302 )crurs. The Director ,it Intormasion Secuniv Oversight Office shall be informed when such tnl.u Inns .)CCnf. a-a1a5. Agency heads shall report to the Attorney General evidence re. fI -r?ed in dassitied infonnation of possible ciol+anns of Federal criminal law b. an agents employee and of possible violations Sc an, other pertou of those federal criminal laws specified in guidelines adopted by the Attorney General. (c) Sanctions may Include reprimand, suspension without pay, removal, termination of classification authority, loss or denial of access to classified information or other sanction in accordance with applicable law and agency regulation. (d) Each agency head or the senior official designated under Section 5.3(oXI) shall ensure that appropriate and prompt corrective action Is taken whenever a violation under Section 5.4(b) occurs. Either shall ensure that the Director of the Information Security Oversight Office is promptly notified whenever a violation under Section 5.4(bX I) or (2) occurs. Section 5.4(d) of the proposed Order contains editorial changes. Section 5-505 of the present Order has been deleted. This subject is addressed in Attorney General guidelines making it redundant and inappropriate In the proposed Order. Approved For Release 2006/04/19 : CIA-RDP86-00674R000 00030001-3 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 Ci iI AR I SON OF i_XECU1 I VL OI;UER ) 2O(1t-i AND TIIL UkAF T OilDER d-102. "Classified intbrmation- means information or material. herein collectirclr termed information, that is owned by, produced for or by, or under the control of. the United States ro,e-. t,nt. and that has been ?1" rruaert o susnt to this Order or pnor Urrien to require xc.-enon .41 unauthoriacd disciosure, and that is so designated. 6-1119. "Foreign yorenrment infurmarion" means information that has i'??'[ pmudo t to he United Sates in :cmfif nee yr, or praiured be the L int'l Stare, pnnuant to a written jni[tt srranoemeni requiring coniidenrtalus +nh a lureign Tai enlmeot or itur^..atianal -rti ~mrtinn of ;o,ernmenn. n-141. ]atlonal seeumy means the national detente and foreign rela- nnns oldie United States. 6-1115. "Deelassiticatton even;" means an event which would eliminate the Iced for continued daasifintion. Appr PART 6 GENERAL PROVISIONS SEC 6.1 Definitions. (a) "Agency" has the meaning provided at S U.S.C. 552(e). (b) "Information" meow any information or material, regardless of Its physical form or characteristics, that is owned by, produced by, produced for, or is under the control of the United States Government. (c) "National security information" means Information that has been determined pursuant to this Order or any predecessor order to require protection against unauthorized disclosure and that is so designated. (d) "Foreign government information meansi (1) information provided by a foreign government or governments, on International organization of governments, or any element thereof with the expectation, expressed or implied, that the information, the source of the information, or both, are to be held in confidence; or (2) any information produced by the United States pursuant to or as a result of a joint arrangement with a foreign government or organization of governments, requiring that the information, the arrangement, or both, be held in confidence. This section of the proposed Order contains some editorial changes and Includes three new definitions and deletes one. New definitions: Proposed Order 6.1(b) Information 6.1(f) Confidential Source 6.I(g) Original Classification These definitions were added to insure consistent interpretation by affected agencies. Deleted definition: Present Order 6-105 DeclasslfIcation Event This definition is self explanatory, thus including it under definitions In Section 6 of the proposed Order is unnecessary. (e) "Notional security" means the notional defense and/or foreign relations of the United States. (f) "Confidential source" means any individual or organization that has provided, or that may reasonably be expected to provide, information to the United States on matters pertaining to the notional security with the expectation, expressed or Implied, that the Information or relationship, or both, be held In confidence. (g) "Original classification" means an initial determination that Information requires, in the Interest of notional security, protection against unauthorized disclosure, together with a classification designation signifying the level of protection required ved For Release 2006/04/19 : CIA-RDP86-00674R0001 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300030001-3 EXECUTIVE: MAR G-1 c,errnr. 6-201. Nothing in this Order shall supersede any requirement made by or umler the Atomic Energy Act of 190.1. as amended. "Restricted Data" and into rma,ion designated as "Formerly Restricted Data" shall be handled. pro- tected. elassilied. downgraded. and declassified in conformity nub she pmvj. smut of the Atomic Energy Act of 1939. as amended. and regulations issued pursuant thereto. 6-202. The Attorney General, upon request by the head of an agency. his duly designated represenutive, or the Director of the Information Security Oversight Office. shall personally or through authorized reprmenratives of the Department of Justice render an interpretation of this Order with respect to any question arising in the course of in admininntion. LLt1i,'l,ISCff (A-'- IV UiIiLtt I, iiu I Ai'lij II IL ld'.fll f Ultl)Lk (a) Nothing in this Order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended. "Restricted Data" and "Formerly Restricted Data" shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the Atomic Energy Act of 1954, as amended, and regulations issued under that Act. (b) The Attorney General, upon request by the head of on agency or the Director of the Information Security Oversight Office, shall personally or through authorized representatives of the Deportment of Justice render an interpretation of this Order with respect to any question arising in the course of its administration. (c) Executive Order No. 12065 of June 28, 1978; the accompanying presidential Order of June 28, 1978; Information Security Oversight Office Implementing Directive No. I of October 2, 19781 and Section 5-209 of Executive Order No. 12148 of July 20, 1979, are revoked as of the effective date of this Order. Appro