Top Banner

of 43

DSS ClassifiedMarkings

Apr 04, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/29/2019 DSS ClassifiedMarkings

    1/43Marking Classifed In ormation DSS CDSE~ 1 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Center for Development of Security Excellence

    Learn. Perform. Protect.

    Marking Classifed In ormationDownloadable Supplement to Web Based Training Course

    Prepared By

    October 2012

    All classifcation markings within thispublication are unclassifed and are classifed

    or illustrative purposes only

  • 7/29/2019 DSS ClassifiedMarkings

    2/43Marking Classi ed In ormation DSS CDSE~ 2 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Table of Contents

    Section 1 - G eneral M arkinG r equireMentS 3

    Section 2 - M arkinG o riGinally c laSSified i nforMation 4Portion Markings 5Banner Markings 6

    Classi ed by and Reason for Classi cation Authority BoxDeclassify on Line / Options for Declassi cationClassi cation Extensions

    Section 3 - M arkinG d erivatively c laSSified i nforMation 11Classi ed by, Derived from and Declassify on Lines25X1 25X9 on the Declassify on LineObsolete Declassi cation InstructionsDerivatively Classifying from Multiple Sources

    Documentation of Classi ed Sources UsedDerivatively Classifying from a Security Classi cation Guide

    Section 4 - M arkinG Special t ypeS of i nforMation and M aterialS 19Working PapersElectronically Transmitted MessagesClassi ed Markings for EmailsForeign Government InformationLetters of TransmittalClassi cation by Compilation

    Section 5 - a toMic e nerGy i nforMation 24

    Commingling RD and FRD with NSISection 6 - S pecial a cceSS p roGraMS (Sap S) 26

    SAP NicknamesSAP Codewords

    Section 7 - i ntelliGence i nforMation 29

    Section 8 - M arkinG i nforMation o ther t han d ocuMentS 31Charts, Maps, Equipment, Drawings, and PhotographsHardware and EquipmentRolled DocumentsContinuous Form (Fan Folded) DocumentsPhotographic MediaComputer Media

    Section 9 - f or o fficial u Se o nly (fouo) 37Freedom of Information Act (FOIA) Exemptions

    Section 10 - t echnical d ocuMentS 40

    a ppendix a - r eferenceS 43

    On subsequent pages, click on the house icon to return to the Table of Contents.

  • 7/29/2019 DSS ClassifiedMarkings

    3/43Marking Classi ed In ormation DSS CDSE~ 3 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 1 - G eneral M arkinG r equireMentS

    Purpose

    Marking is the principal way of letting holders of information know the speci c protection requirementsfor that information. Markings and designations serve several purposes; speci cally, they:

    Alert holders to the presence of classi ed information, information protected under the Freedomof Information Act (FOIA), and technical information with restrictions on its dissemination

    Identify, as speci cally as possible, the exact information needing protection Indicate the level of classi cation and any other markings for control of the information Provide guidance on information sharing Provide guidance on downgrading (if any) and declassi cation Give information on the source(s) and reason(s) for classi cation or other restrictions Warn holders of special access, control, or safeguarding requirements

    This guide gives Department of Defense (DoD) staff and contractors an overview of the kinds of markrequired to protect classi ed and unclassi ed controlled information that cannot be disseminated to all audiences.The guide offers an integrated approach to the major requirements for marking and control of informatibrie y explaining the reasons for marking and providing examples of correctly marked information. To facilitateinformation sharing and declassi cation processes, whenever practicable a classi ed attachment, addendum,annex, enclosure, or similar section shall be used when classi ed information constitutes only a small portionan otherwise unclassi ed document.

    Background and Policy

    DoD policy is to maximize the availability of information consistent with the restraints necessary to protenational security, U.S. economic security, and the rights and interests of individuals, businesses, and foreiggovernments. To implement this policy, DoD personnel must be able to understand and balance the diverrequirements that guide their decisions about managing the ow of DoD information and data.

    All classi ed information needs to be identi ed clearly by: Electronic labeling Designation Marking

    Marking and designation of classi ed information are the speci c responsibility of original and derivativeclassi ers.

  • 7/29/2019 DSS ClassifiedMarkings

    4/43Marking Classi ed In ormation DSS CDSE~ 4 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Dec 31, 2007

    MEMORANDUM FOR XXXXXXXXX XXXXXXXXXXXX

    SUBJECT: (U) Delegation of SECRET Original Classi cation Authority (OCA)

    (U) You are hereby delegated authority to classify information up to SECRET for information under area of responsibility an accordance with Executive Order 13526,Classi ed National Security Information (the Order). (S) As an OCA, you are required to receive training in original classi cation as

    provided by the order and implementing directives prior to you exercising this authority. Your Security Manager will facilitate this training.

    (S//REL) The Order also provides that OCAs shall prepare classi cation guides tofacilitate the proper uniform derivative classi cation of information. Request that you providea copy of your guide(s) to the of ce by December 31, 2009.

    Classi ed by: OCA Name and Position TitleReason: 14(c)Downgrade to: CONFIDENTIAL on 20121231Declassify on: 20150930

    Section 2 - M arkinG o riGinally c laSSified i nforMation

    Original classi cation is an initial determination made by an original classi cation authority (OCA) thainformation requires, in the interest of national security, protection against unauthorized disclosure. Standard

    markings are required for all documents that contain originally classi ed information. The information is to bshown using these marking elements: banner lines, portion marks, agency, of ce of origin, date of origin, aclassi cation authority block (OCA or derivative).

    The overall process for properly marking a document requires the classi er to: Identify the classi cation level of each portion contained in the document Determine the overall classi cation of the document Identify the original classi cation authority on the Classi ed by line Identify the reason for classi cation. Every classi ed document shall show on the rst page, title pa

    or front cover, the originating agency and of ce and the date of the documents origin Annotate the declassi cation instructions on the Declassify on line (if applicable)

    SECRET//REL USA, GBROFFICE OF THE UNDER SECRETARY OF DEFENSE INTELLIGENCE

    SECRET//REL USA, GBR

    The date for declassi cation must be displayednumerically using the following format (20150930)

    Banner Line (overallclassi cation marking)

    PortionMarkings

    Classi cationauthority block

    Classi cation Separator Dissemination control

  • 7/29/2019 DSS ClassifiedMarkings

    5/43Marking Classi ed In ormation DSS CDSE~ 5 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Portion Markings

    A portion is ordinarily de ned as a paragraph, but also includes subjects, titles, graphics, tables, charts, bullestatements, sub-paragraphs, classi ed signature blocks, and other portions within slide presentations, and the like.

    Classi cation designations for portion markings are: (U) for Unclassi ed (C) for Con dential (S) for Secret (TS) for Top Secret

    These abbreviations are placed in parentheses before the portion to which they apply. Whenever possible, use an unclassi ed title or subject line.

    Portions include not only paragraphs, sub-paragraphs, and title, but also charts, tables, pictures and illustrations.

    SUBJECT: *(U) Portion Marking for Title or Subject Line

    1. (U) This paragraph contains unclassi ed information. Therefore, this paragraph will be markedwith the designation U in parenthesis.

    a. (C) This sub-paragraph contains Con dential information. Therefore, this paragraph

    will be marked with the designation C in parenthesis.b. (S) This sub-paragraph contains Secret information. Therefore this paragraph will bemarked with the designation S in parenthesis.

    2. (TS) This sub-paragraph contains Top Secret information. Therefore this paragraph will bemarked with the designation TS in parenthesis.

    (U) (C) (S) (TS) (U//FOUO) (S//NF/PROPIN)

    (C//FRD) (//GBR S) (TS//SI/TK) (S//RD)

    (S//REL) (TS//REL TO USA, AUS, CAN, GBR) (S//RD-N)

    *

    Examples of portion markings

  • 7/29/2019 DSS ClassifiedMarkings

    6/43Marking Classi ed In ormation DSS CDSE~ 6 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Banner Markings

    The second step in marking a classi ed document is determining the overall classi cation of the document. Onlby identifying the proper classi cation for each portion can the overall classi cation level be determined. Th

    banner line shall specify the highest level of classi cation (Con dential, Secret, or Top Secret) of informationcontained within the document and the most restrictive control markings applicable to the overall documen(hereafter referred to as banner markings).

    TOP SECRET

    DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DC

    October 18, 2005

    MEMORANDUM FOR USD(P) SUBJECT: (U) Banner Markings

    1. (U) This paragraph contains unclassi ed information.Therefore, this paragraph will be marked with the designationU in parenthesis.2. (C) This sub-paragraph contains Con dentialinformation. Therefore, this paragraph will be markedwith the designation C in parenthesis.3. (TS) This sub-paragraph contains Top Secretinformation. Therefore, this paragraph will be markedwith the designation TS in parenthesis.

    Classi ed by: Stephen A. CamboneUSD(I) Director

    Reason: 1.4(d)

    Declassify on: 20150930

    TOP SECRET

    Conspicuously place the overallclassi cation at the top and thebottom of the page.

    1) The highest level of classi cationis determined by the highest level ofany one portion within the document.

    (2) The classi cation level in thebanner line must be in English and

    spelled out completely. Only oneclassi cation level shall be used.

    (3) Any other control markings(e.g., dissemination controlmarkings) included may be spelledout or abbreviated as shown in thisexample.

    (4) Banner markings always useuppercase letters.

    Classi cation Authority Block

  • 7/29/2019 DSS ClassifiedMarkings

    7/43

  • 7/29/2019 DSS ClassifiedMarkings

    8/43Marking Classi ed In ormation DSS CDSE~ 8 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Classi ed by and Reason for Classi cation Authority Box

    SECRET

    DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DCAugust 31, 2004

    MEMORANDUM FOR USD(P) SUBJECT: (U) Classi cation Authority Box

    1. (S) The third step in properly marking a document is to annotate the original classi cationauthority on the document. This is accomplished by placing the original classi cation authorityon the Classifed by line. The Classi ed by line should include the name or personalidenti er of the actual classi er and their position. If the identi cation of the originating

    agency is not apparent on the face of the document, place it below the Classi ed by line.

    2. (U) Each original classi cation decision shall state areason for classifying. Classi cationmay be applied only to information described in the following categories as speci ed in section1.4 of Executive Order (E.O.) 13526, Classi ed National Security Information:

    a. (U) Military plans, weapons systems, or operationsb. (U) Foreign government informationc. (U) Intelligence activities (including special activities), intelligence sources or

    methods, or cryptologyd. (U) Foreign relations or foreign activities of the United States, including con dential

    sourcese. (U) Scienti c, technological, or economic matters relating to the national security,

    which includes defense against transnational terrorismf. (U) United States Government programs for safeguarding nuclear materials or

    facilitiesg. (U) Vulnerabilities or capabilities of systems, installations, infrastructures, projects,

    plans, or protection services relating to the national security, which includes defenseagainst transnational terrorism

    h. (U) Weapons of mass destruction

    3. (U) The original classi er shall identify a concise reason for classi cation which, at aminimum, cites the applicable classi cation categories in section 1.4 of E.O. 13526, as thebasis for classi cation.

    Classi ed by: Wilma Y. JonesDirector, NAAFMC

    Reason: 1.4(a) and (d) or Military Plans; Foreign RelationsDeclassify on: 20101231

    SECRET

  • 7/29/2019 DSS ClassifiedMarkings

    9/43Marking Classi ed In ormation DSS CDSE~ 9 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    The nal essential marking indicates the duration

    of classi cation. This information is placed on theDeclassify on line. When determining the durationof classi cation, choose one of the following threedeclassi cation instructions: (Whenever possible, selectthe declassi cation instruction that will result in theshortest duration of classi cation.)

    1. Date or EventWhen possible, identify the date or event fordeclassi cation which corresponds to the lapse ofthe informations national security sensitivity, which

    is equal to or less than 10 years from the date of theoriginal decision.

    OR

    2. Ten Year DurationWhen a speci c date or event cannot be determined,identify the date that is 10 years from the date of theoriginal classi cation.

    OR

    3. Twenty- ve Year DurationIf the sensitivity of the information warrants protectionbeyond 10 years, then the original classi cationauthority may assign a declassi cation date up to, butno more than twenty- ve years from the date of originalclassi cation.

    Note: The identity of a con dential human source or ahuman intelligence source is not subject to automatic

    declassi cation. The marking for the exemption of thisspeci c information is: 25X1

    Exceptions to this sequence: If the information shouldclearly and demonstrably be expected to reveal theidentity of a con dential human source or a humanintelligence source, the duration of classi cation shall beup to 75 years and shall be designated as 50X1-HUM.

    September 1, 2004(Date of original classi cation)

    Classi ed by: Keith M. Morris USD(R)

    Reason:1.4(a)Declassify on: 20290901

    September 1, 2004(Date of original classi cation)

    Classi ed by: Keith M. Morris USD(R)Reason:1.4(a)Declassify on: 20140901

    Classi ed by: Keith M. Morris USD(R)Reason:1.4(a)Declassify on: 20151231orCompletion of Operation

    Declassify on Line / Options for Declassi cation

  • 7/29/2019 DSS ClassifiedMarkings

    10/43Marking Classi ed In ormation DSS CDSE~ 10 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    If the information should clearly and demonstrably beexpected to reveal key design concepts of weapons of

    mass destruction, the duration shall be up to 75 yearsand shall be designated as 50X2-WMD.

    NOTE: When 50X1-HUM and 50X2-WMD areused, a speci c date or event for declassi cation ofthe information will not be used. Approval by theInteragency Security Classi cation Appeals Panel(ISCAP) is not required prior to agency use of 50X1-HUM or 50X2-WMD; however, it will need to be included in a classi cation guide with suf cientdetail to enable effective use.

    An OCA may extend the duration of classi cation upto 25 years from the date of origin of the document,change the level of classi cation, or reclassify speci cinformation.

    Revise the Declassify on line to include the newdeclassi cation instructions, the identity of theOCA authorizing the extension, and the date of theaction.

    An OCA with jurisdiction over the information mayextend the duration of classi cation for up to 25 yearsfrom the date of the informations origin.

    Reasonable attempts should be made to notify allholders of a classi cation extension.

    SECRETOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    June 3, 2000MEMORANDUM FOR DASD(I&S)

    SUBJECT: (U) Classi cation Extensions Markings

    1. (S) This paragraph contains Secretinformation. Therefore this paragraph will bemarked with the designation S in parenthesis.

    Jane G. WhiteDir, USNTL

    Classi ed by: Jane G. White, DirectorUSNTL

    Reason: 1.4(a)Declassify on: January 20050129Classi cation extended on 9/30/04 until20161221 by Brian Howard, Dir. ADHT

    SECRET

    Classi ed By: John E. Doe, ChiefDivision 5Derived From: SCG title and dateDeclassify On: 50X2-WMD

    Classi ed By: John E. Doe, ChiefDivision 5Derived From: SCG title and dateDeclassify On: 75X5, 20901231

    Classi cation Extensions

  • 7/29/2019 DSS ClassifiedMarkings

    11/43Marking Classi ed In ormation DSS CDSE~ 11 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 3 - M arkinG d erivatively c laSSified i nforMation

    Derivative classi cation is the act of incorporating, paraphrasing, restating, or generating in new form, informationthat is already classi ed, and marking the newly developed material consistent with the markings of the sour

    information. The source information ordinarily consists of a classi ed document or documents, or a classi cationguide issued by an original classi cation authority.

    When using a classi cation guide as the basis for derivative classi cation, the instructions provided by the guidare to be applied to the derivative document.

    The Classi ed by line is now a required part of a derivative document. List name and position title or peridenti er of the Derivative classi er and, if not otherwise evident, include the agency and of ce of origin. TReason line, as re ected in the source document(s) or classi cation guide, is not transferred to the derivatdocument.

    Overall classi cation markings for derivatively classi ed documents is applied in the same manner as for originallyclassi ed documents.

    SECRETOctober 31, 2005

    (U) ABC Battalion Report

    1. (S) Tis paragraph contains incorporated

    in ormation taken rom the second paragrapho a source document, a paragraph markedSecret. Tere ore, this paragraph is markedwith an S. Tis derivative documentcontains no other classi ed in ormation.Tere ore, portion mark all other portions witha U.

    2. (U) Tis paragraph contains unclassi edin ormation. Tere ore, this paragraph willbe marked with the designation U inparenthesis.

    Classi ed by: James Smith USD(I)Division Chie

    Derived rom: Special Report (U) ANX-128, dtd 2004091

    Declassi y on: 20131231

    SECRET

    SECRETSeptember 1, 2004

    (U) Special Report--ANX-128

    1. (U) Tis paragraph Unclassi edin ormation. Tis portion will there orebe marked with the designation U inparenthesis.

    2. (S) Tis paragraph contains Secretin ormation. Tis portion will there orebe marked with the designation S inparenthesis.

    Classi ed by: Keith M. Morris USD(I)

    DirectorReason: 1.4 (a) & (d)Declassi y on: 20131231

    SECRET

    Source Document Derivative Document

  • 7/29/2019 DSS ClassifiedMarkings

    12/43Marking Classi ed In ormation DSS CDSE~ 12 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Classi ed by, Derived from, and Declassify on Lines

    SECRET

    DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DC15 July 2004

    MEMORANDUM FOR USD(P) SUBJECT: (U) Classi ed by, Derived from and Declassify on Line

    1. (U) The face of each derivatively classi ed document shall include a classi cation authorityblock consisting of these elements: Classi ed by, Derived from, and Declassify on.

    2. (S) Declassi cation and downgrading instructions, which may be added to the classi cation

    authority block when applicable, shall be carried forward by the derivative classi er from thesource document(s), from instructions in the appropriate security classi cation guide(s), orfrom other classi cation guidance issued by the OCA.

    Classi ed By: Name and position or identi er

    Derived from: USD(I) MemorandumSubj: (U) Derivative Classi cation Marking,

    20020625

    Declassify on: 20110609

    Source Document

    SECRET

    SECRET

    June 25, 2002(Date of origin)

    Subject: (U) Derivative Classi cationMarkings

    Classi ed by: Mary Smith,Analyst USD(I)

    Reason: 1.4 (a) & (d)Declassify on: 20110609

    SECRET

  • 7/29/2019 DSS ClassifiedMarkings

    13/43Marking Classi ed In ormation DSS CDSE~ 13 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    The 25X___ exemptions may only be used on theDeclassify On line if an agency has identi ed

    permanently valuable information that needs to beexempted from automatic declassi cation at 25 yearsand has received approval from the Interagency SecurityClassi cation Appeals Panel (ISCAP) to exempt theinformation and to incorporate the exemption into aclassi cation guide. (See 32 C.F.R. Part 2001.26.) Whenusing an approved exemption, a date or event that hasbeen approved by the ISCAP must be included with themarking and shall not exceed 50 years from the date of thedocument.

    The identity of a con dential human source or a humanintelligence source is not subject to automaticdeclassi cation. The marking for the exemption of thisspeci c information is:

    Declassify on: 25X1-Human

    This 25X1-Human marking applies only to con dentialhuman sources or human intelligence sources, not allintelligence sources and methods. Except when the

    information within the le series almost invariablyidenti es a con dential human source or a humanintelligence source or key design concepts of weaponsof mass destruction, a speci c date or event fordeclassi cation of the information, not to exceed December31 of the year that is 50 years from the date of origin of therecords.

    Use of 50X and 75X exemptions:

    In extraordinary cases, agency heads may, within ve years

    of the onset of automatic declassi cation, propose to furtherexempt speci c information from declassi cation at 50years and at 75 years. These are subject to approval by theISCAP. ISCAP-approved exemptions at 50 and 75 yearswill include a date or event that has been approved by theISCAP.

    September 1, 2004(Date of original classi cation)

    Classi ed by: Keith M. Morris USD(I),Director

    Reason:1.4(a)Declassify on: 50X1-HUM

    September 1, 2004(Date of original classi cation)

    Classi ed by: Keith M. Morris USD(I),Director

    Reason:1.4(c)Declassify on: 25X3, 20540901dates are required with all other 25, 50,75X exemptions except 1 & 2

    Classi ed by: Keith M. Morris USD(I),Director

    Reason:1.4(a)Declassify on: 25X1-Human

    25X1 25X9 on the Declassify on Line

  • 7/29/2019 DSS ClassifiedMarkings

    14/43Marking Classi ed In ormation DSS CDSE~ 14 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Obsolete Declassi cation Instructions

    When a document is classi ed derivatively either from a source document(s) or a classi cation guide that contaione of the following obsolete declassi cation instructions, Originating Agencys Determination Required,

    OADR, Manual Review, MR, or any of the exemption markings X1, X2, X3, X4, X5, X6, X7,X8, the derivative classi er shall calculate a date that is 25 years from the date of the source document wdetermining a derivative documents date or event to be placed in the Declassify on line. If no source daavailable, then use the current date.

  • 7/29/2019 DSS ClassifiedMarkings

    15/43

  • 7/29/2019 DSS ClassifiedMarkings

    16/43Marking Classi ed In ormation DSS CDSE~ 16 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    (S)__________________ ___________________

    Classi ed by: Mary Poppins,Analyst USD(P)Reason: Foreign RelationsDeclassify on: 20210319

    Classi ed by Line / Derived from LineClassi ed by line with name and position or personal identi er required on all original and derivative documenIf not otherwise evident, include the agency and of ce of origin.

    Derived from LineEnter Multiple Sources on the Derived from line of the derivative document to indicate that more thone classi ed source was used. A document derivatively classi ed on the basis of a source document thaitself marked Multiple Sources shall cite the source document on its Derived From line rather than the teMultiple Sources.

    (S)__________________ ___________________

    (C)__________________ ___________________

    (U)__________________ ___________________

    Classi ed by:Paul James,DirectorDerived from: Multiple

    SourcesDeclassify on: 20210319 S

    o u r c e

    1

    D e r

    i v a t i v e

    Derivative Document used as a Source Derivative Document

    (C)__________________ ___________________

    Classi ed by: SECDEFReason: 1.4(a)Declassify on: 20190501

    S o u r c e

    2

    SECRETDEPARTMENT OF THE NAVY

    WASHINGTON, DC

    July 15, 2010MEMORANDUM FOR AGENCY OFFICIALS

    From: Joe Carver, DirectorSubject: (U) Examples

    1. (S) This is paragraph 1 which containsSecret information. This portion willtherefore be marked with the designation Sin parenthesis.

    Classi ed By: Joe Carver, DirectorDerived From: Department of Good WorksMemorandum dated June 27, 2010, Subj:ExamplesDeclassify on: 20240627

    SECRET

    SECRETDEPARTMENT OF DEFENSE

    DEFENSE PENTAGON, WASHINGTON, DC

    June 27, 2010MEMORANDUM FOR AGENCY OFFICIALS

    From: John E Doe, Chief DivisionSubject: (U) Examples

    1. (S) This is paragraph 1 which containsSecret information. This portion willtherefore be marked with the designation Sin parenthesis.2. (U) This is paragraph 2 which containsUnclassi ed information. This portion willtherefore be marked with the designation Uin parentheses.Classi ed By: John E. Doe, Chief DivisionDerived from: Multiple SourcesDeclassify on: 20240627

    SECRET

  • 7/29/2019 DSS ClassifiedMarkings

    17/43Marking Classi ed In ormation DSS CDSE~ 17 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    The list of multiple sources must be included with orannotated on the derivative document. If the document

    has a bibliography or reference list, this may be used asthe list of sources. Annotate it to distinguish the sourcesof classi cation from other references.

    SECRETDEPARTMENT OF DEFENSE

    DEFENSE PENT MEMORANDUM FOR DASD(I&S) Oct 9, 1993

    SUBJECT: Security Awareness

    Classi ed by: John Smith, SECDEFDeclassify on: 20181009

    SECRET

    Sources:1.MEMORANDUM FOR DASD(I&S)

    June 3, 2000SUBJECT: (U) Security Awareness ofClassi cation Markings

    Sources: 2.MEMORANDUM FOR DASD(I&S)

    Oct 9, 1993SUBJECT: (U)Security Awareness

    Declassify on LineSpecify the date or event for declassi cation, exemption category with date or event for declassi cation, or othedeclassi cation instruction corresponding to the longest period of classi cation among the source document(s),security classi cation guide(s), and other applicable classi cation guidance issued by the OCA.

    If the document is classi ed by MultipleSources and different declassi cation instructionsapply to information included, determine the MOSTRESTRICTIVE declassi cation instruction thatapplies to any of the source information (i.e., theone farthest in the future giving the longest periodfor classi cation) and place it on the Declassifyon: line. This will ensure all the information indocument is protected for as long as necessary.

    SECRETOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    1. (S) -----------------------------------------------------------------------------------------------------------------------------------------------

    2. (S) ----------------------------------------------------------------------------------------------------------------------------

    Classi ed by: Jane G. WhiteAnalyst , USNTL

    Derived from: Multiple SourcesDeclassify on: 20250603

    SECRET

    SECRET

    OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, DC

    MEMORANDUM FOR DASD(I&S) June 3, 2000 SUBJECT: (U) Security Awareness ofClassi cation Markings1. (S) This paragraph contains Secret information. This portion will therefore bemarked with the designation S in parenthesis.

    Classi ed by: Jane G. WhiteAnalyst, USNTL

    Reason: 1.4(a)Declassify on: 20250603

    SECRET

    Source 1

    Source 2

    Documentation of Classi ed Sources Used

  • 7/29/2019 DSS ClassifiedMarkings

    18/43Marking Classi ed In ormation DSS CDSE~ 18 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    A classi cation guide is a document issued by an originalclassi cation authority that provides derivative classi cation

    instructions. It describes the elements of information thatmust be protected and the level and duration of classi cation.When a security classi cation guide is used to determine thedeclassi cation date of a derivatively classi ed document,the date used shall not exceed 25 years from the date of theorigin of the document (not the classi cation guide), exceptfor information that would reveal the identity of a con dentialhuman source or a human intelligence source or key designconcepts of weapons of mass destruction, or for which theguide cites an authorized exemption category.

    Portion MarkingsParagraph 1 of this derivative document containsinformation that paragraph 3 of the classi cation guidespeci es shall be classi ed Con dential. Followingthe guidelines of the Classi cation Guide, the rstparagraph has been marked with a C. All otherportions are unclassi ed, as indicated in the Classi cationGuide, and are marked appropriately with a U.

    Banner LineConspicuously mark the overall classi cation at the topand bottom of the derivative document. As shown here,the highest classi cation level is Con dential.

    S a m p

    l e p a g e

    f r o m

    t h e s a m p

    l e g u

    i d e

    D e r

    i v a t

    i v e

    DEPARTMENT OF DEFENSE

    (U) Security Classi cationGuide 128

    20020414

    CONFIDENTIAL SCG - 128

    (C) This paragraph includesinformation about technical scope.(U) This paragraph includesinformation on program planning(U) This paragraph includesinformation on program progress.

    Classi ed by: Joe Blow, Director

    Derived from: Scty Class Guide #128Dtd: 4/14/02

    Declassify on: 20140415

    CONFIDENTIAL

    DEPARTMENT OF DEFENSE(U) Security Classi cation

    Guide 128Subject Level Reason DurationProgram Planning UProgram Progress UTechnical Scope C 1.4(a) 20140415

    Vulnerability S 1.4(g) 20140415

    Derivatively Classifying from a Security Classi cation Guide

  • 7/29/2019 DSS ClassifiedMarkings

    19/43Marking Classi ed In ormation DSS CDSE~ 19 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 4 - M arkinG Special t ypeS of i nforMation and M aterialS

    Working PapersWorking papers are documents and material accumulated or created in the preparation of nished documents andmaterial. Working papers containing classi ed information must be:

    Dated when created Annotated as working paper Marked with the highest level of classi cation of any information

    contained within Protected in accordance with the assigned classi cation Accounted for, controlled, and marked in the manner prescribed for a

    nished document of the same classi cation when retained more than 180 days from the date of origin or released by the originator outside the activity. Destroy when no longer needed. This requirement extends to all classi cation levels

    Electronically Transmitted MessagesClassi ed information resident in an electronic environment, and retained as permanent records, must be marked,as would any other classi ed document, with the following special provisions:

    1. Shall display the banner line at the top and bottom of the body of each message. Second Sentence: A silinear text string showing the overall classi cation, to include dissemination and control markings, shall beincluded as the rst line of text and at the end of the body of the message after the signature block. ThiSentence: The banner marking for the e-mail shall re ect the classi cation of the header and body of the

    message. This includes the subject line, the text of the e-mail, any classi ed signature block, attachments,included messages, and any other information conveyed in the body of the e-mail.

    2. Classi ed e-mail shall be portion marked. A text portion containing a uniform resource locator (URL) orreference (i.e., link) to another document shall be portion marked based on the classi cation of the contentof the URL or link text, not the content to which it points. For information printed by an automated systeoverall and page markings may be applied by the system, provided they stand out conspicuously from thetext. In older systems, this may be achieved by surrounding the markings with asterisks or other symbols.

    3. Properly completed Classi ed by and Reason lines or Derived from line, declassi cationinstructions, and downgrading instructions (when applicable) must be included in the classi cation authorityblock. Declassi cation and downgrading instructions will not be used for information containing Restricted

    Data or Formerly Restricted Data.4. The following abbreviations may be used:

    CLASS for Classi ed byRSN for Reason (only for originally classi ed information)DERV for Derived from (only for derivatively classi ed information)DNG for Downgrade toDECL for Declassify on

  • 7/29/2019 DSS ClassifiedMarkings

    20/43Marking Classi ed In ormation DSS CDSE~ 20 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Classi ed Markings for Emails

  • 7/29/2019 DSS ClassifiedMarkings

    21/43Marking Classi ed In ormation DSS CDSE~ 21 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Most foreign governments, as well as NATO, use threeclassi cation markings that generally equate to U.S.TOP SECRET, SECRET, and CONFIDENTIAL. Manyof the governments also have a fourth classi cationmarking, RESTRICTED, for which there is no U.S.equivalent. NATO has a fth category of controlledinformation, NATO UNCLASSIFIED. Somegovernments also have unclassi ed informationprotected by law or national regulations that is treated,and provided to, other governments as in con denceinformation.

    Mark portions that contain the Foreign GovernmentInformation to indicate the country of origin (trigraph)and the classi cation level. Substitute the wordsForeign Government Information or FGI wherethe identity of the speci c government must beconcealed. The identity of the concealed foreignsource in this example must be maintained with therecord copy and adequately protected.

    Note: If the fact that information is foreign governmentinformation must be concealed, the markings described

    here shall not be used and the document shall bemarked as if it were wholly of U.S. origin.

    Note on the Declassify on line: FGI must be markedwith a declassi cation date of up to 25 years, unlessthe originating agency has applied for and receivedapproval from the ISCAP to exempt the FGI fromdeclassi cation at 25 years. Upon receipt of ISCAPapproval, the 25X6 or 25X9 exemption markings,as appropriate, may be used in the Declassify online followed by a date that has been approved by theISCAP.

    SECRETOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    February 15, 2010MEMORANDUM FOR THE DIRECTOR

    From: John E. Doe, Chief Division 5SUBJECT: (U) Foreign Government Information

    1. (U) This paragraph contains unclassi ed informationbut the letter is classi ed based on a classi ed attachment

    2. (C) Paragraph 1 contains classi ed information froma U.S. source document. Therefore, this portion will bemarked with the designation C in parentheses.

    3. (S) (Country of Origin S) Paragraph 2 containsclassi ed information marked Secret by the country oforigin. Therefore, this portion will be marked to indicatethe country of origin and the level of classi cation.

    Classi ed By: John E. Doe, Chief Division 5Derived From: Multiple SourcesDeclassify On: 20350215

    THIS DOCUMENT CONTAINS (COUNTRY OFORIGIN) INFORMATION

    SECRET

    Foreign Government Information

  • 7/29/2019 DSS ClassifiedMarkings

    22/43Marking Classi ed In ormation DSS CDSE~ 22 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Information Determined Releasable to Foreign NationalsInformation that has been determined releasable throughestablished foreign disclosure procedures to foreign nationals,international organizations or multinational forces will be

    marked Releasable to USA with the applicable country trigraph,international organization or multinational forces tetragraph.

    REL TO shall only be used with Top Secret, Secret orCon dential information.

    Letters of Transmittal

    Transmittal documents are documents that have informationenclosed with or attached to them. An example is a letter,memo, or staff summary sheet with classi ed enclosures. Thetransmittal document itself may or may not contain classi edinformation.

    a. Mark the banner line of an unclassi ed transmittaldocument with the highest classi cation level of any informationtransmitted by it. Also mark the transmittal document with anappropriate instruction indicating that it is unclassi ed whenseparated from the classi ed enclosures (e.g., Unclassi edwhen separated from classi ed enclosures or Unclassi edwhen Attachment 2 is removed).

    1. If any dissemination control markings apply to the transmittaldocument or any enclosure, include them on the banner line ofthe transmittal document.

    2. Unclassi ed transmittal documents do not require portionmarking or a classi cation authority block.

    3. It is not necessary to use a banner line on interior pages of anunclassi ed transmittal document.

    4. All of the markings required herein, including a classi cationauthority block, shall appear on the classi ed enclosure(s) orattachment(s).

    5. If any special notice (e.g., NATO, RD, FRD, or exportcontrol) applies to the transmittal document or the enclosure(s),include a statement on the face of the transmittal documenthighlighting inclusion of the information. Unless directedotherwise by applicable policy or regulation, a statementsimilar to Document transmitted herewith contains [levelof classi cation] RESTRICTED DATA or This documentcontains NATO [level of classi cation] information will suf ce.

    SECRET Releasable to USA//CAN

    OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, DC

    June 23, 2005

    MEMORANDUM FOR DASD(I&S)

    SUBJECT: (U) Foreign Government Information

    1. Marking should re ect (S//REL TO USA, CAN) Thisparagraph contains information marked Secret by thegovernment of Canada. Therefore, this paragraph will bemarked with the trigraph of the country of origin and thdesignation S in parenthesis.

    USD(I)

    Classi ed by: Paul Smith, AnalysisDerived from: Multiple SourcesDeclassify on: 20130331

    SECRET Releasable to USA//CAN

    SECRETOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    June 3, 2005MEMORANDUM FOR DASD(I&S) SUBJECT: (U) Letters of Transmittal

    Document must be portion marked if classi ed and haveappropriate classi cation authority block instructions.

    Mary FrankChief, ASDG

    Attachment:1. Secret USD(I) Memorandum, 10/25/05, Subj:Markings

    Unclassi ed when separated from classi ed enclosures

    SECRET

  • 7/29/2019 DSS ClassifiedMarkings

    23/43

  • 7/29/2019 DSS ClassifiedMarkings

    24/43Marking Classi ed In ormation DSS CDSE~ 24 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    SECRET//RESTRICTED DATA-NOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC28 July 2005

    MEMORANDUM FOR DEPSECDEF SUBJECT: (U) Atomic Energy Act of 1954

    1. (S//RD) Documents containing Restricted Data or Formerly Restricted Data as de ned by theAtomic Energy Act of 1954, should have abbreviated markings (RD or FRD) included with theclassi cation marking (S//RD).

    a. (S//FRD) This paragraph contains Secret Formerly Restricted Data only. RD markings will not

    be applied.b. (S//RD-N) Critical Nuclear Weapon Design Information (CNWDI) shall be marked with an Ninside the parentheses following the RD portion marking.

    2. (U) Special warning notices are applied to RD, FRD, and CNWDI. If a document combines both asdepicted here, only the RD warning notice is af xed. No declassi cation instructions are used *.

    Albert StrangeloveUSD(I)

    Classi ed by: John E. Doe, Division ChiefDerived from: SCG title and dateDeclassify on:Not applicable to RD/FRD portions. See source list for NSI portions.

    SECRET//RESTRICTED DATA-N

    Section 5 - a toMic e nerGy i nforMation

    Warning Notices:

    RESTRICTED DATAThis document contains Restricted Data as de ned in the Atomic Energy Act of 1954. Unauthorizeddisclosure subject to administrative and criminal sanctions. RD and FRD are speci cally excluded fromthe provisions of the Executive Order, stating such information shall be handled, protected, classi ed,downgraded, and declassi ed as required by provisions of the Atomic Energy Act of 1954, as amendedand regulations issued under that Act.

    Only Department of Energy (DoE) may originally classify or declassify RD.

    RESTRICTED DATAThis document contains Restricted Data asde ned in the Atomic Energy Act of 1954.

    Unauthorized disclosure subject to

    administrative and criminal sanctions.

  • 7/29/2019 DSS ClassifiedMarkings

    25/43Marking Classi ed In ormation DSS CDSE~ 25 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Warning Notices:

    FORMERLY RESTRICTED DATA

    Unauthorized disclosure subject to administrative and criminal sanctions. Handle as Restricted Data in foreigndissemination. Section 144b, Atomic Energy Act of 1954.

    CNWDICritical Nuclear Weapon Design Information DoD Directive 5210.2 applies.CNWDI is the DoD designation for TOP SECRET RD or SECRET RD weapons data that reveals the theoryoperation or design of the components of a thermonuclear or ssion bomb, warhead, demolition munitions, or tdevice. The designation CNWDI speci cally excludes information concerning arming, fusing, and ring systems;limited-life components; and total contained quantities of ssionable, fusionable, and high-explosive materialsby type.

    Commingling RD and FRD with NSITo the extent practicable, the commingling in the same document of RD or FRD with information classi ed unthe Order should be avoided. When it is not practicable to avoid such commingling, the marking requirementsthe Order and the Directive, as well as the marking requirements in 10 C.F.R. Part 1045, Nuclear Classi caand Declassi cation, must be followed.For commingled documents, the Declassify on line shall not includedeclassi cation date or event and shall instead be annotated with Not Applicable (or N/A) to RD/FRD portionand See source list for NSI portions. The source list, as described in 32 C.F.R. Part 2001.22(c)(1)(ii), sinclude the declassi cation instruction for each of the source documents classi ed under the Order and shall nappear on the front page of the document.

    *E.O. 13526 does not apply to Restricted Data or Formerly Restricted Data. DoD does not originate RDFRD; therefore, all documents should re ect the Derived from: byline. For additional guidance, see your securiof cer.

  • 7/29/2019 DSS ClassifiedMarkings

    26/43Marking Classi ed In ormation DSS CDSE~ 26 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 6 - S pecial a cceSS p roGraMS

    Special Access Programs (SAPs) are established in accordance with Chapter 8, DoD 5200.1-R, InformationSecurity Program Regulation. SAPs are created only when absolutely necessary to protect the Nations most

    sensitive and critical information or when required by statutes. Establishment must be consistent with law, policyand regulations, and be based on a determination that the threat and/or vulnerability (e.g., sensitivity or valuethe information) warrants enhanced protection.

    Any DoD program or activity employing enhanced security measures exceeding those normally required forinformation at the same classi cation level must be established, approved, and managed as a DoD SAP. Examplof such enhanced security measures include:

    Use of any special terminology, including code words, other than an unclassi ed nickname, to identior control information dissemination

    Personnel security investigative or adjudicative requirements more stringent than those requiredfor a comparable level of classi ed information Specialized non-disclosure agreements Exclusion of a classi ed contract (use of a carve-out); or A central billet system to control the number of personnel authorized access

    Some DoD programs which operate under the above enhanced procedures are considered to be SAPs, including:(I) Programs managed under special delegation authorities previously approved by the Secretary of Defense oDeputy Secretary of Defense; (II) Programs sponsored by other departments or agencies, but for which Doparticipants manage internal DoD security controls (e.g., DoD-managed subcompartments of larger, non-DoD

    SAPs, etc.); and, (III) Programs conducted in support of, or in cooperation with, other departments, agenciebranches of government, or other governments. SAPs may only be approved by the Secretary of Defense orDeputy Secretary of Defense.

    To differentiate a nickname from a codeword, remember that: A nickname is a combination of two unassociated and unclassi ed words Nicknames are normally typed in ALL CAPS A codeword is a single word assigned a classi ed meaning by appropriate authority The codeword is classi ed Con dential or higher All nicknames and codewords are issued through the DoD Components (usually SAP channels)

    and strictly controlled

    The unclassi ed examples on the following two pages depict common markings for SAP documents.The examples are for illustrative use only. The format for markings should be adjusted to accommodatesoftware applications and production ef ciency. For instance, the examples show the overall classi cation andnickname/codeword in the header and the overall classi cation and special access requirement in the footer.

  • 7/29/2019 DSS ClassifiedMarkings

    27/43Marking Classi ed In ormation DSS CDSE~ 27 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    SAP Nicknames

    SAPs use nicknames for control of dissemination and need-to-know. Nicknames are assigned to the programwhen the SAP is approved. Nicknames are designated by two unassociated words, which are unclassi ed bthemselves (e.g., TWISTED FEATHER, etc.).

    TOP SECRET//TWISTED FEATHEROFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    July 28, 2005MEMORANDUM FOR SPECIAL ACCESS PROGRAM CENTRAL

    OFFICESSUBJECT: (U) Identi cation and Marking of Classi ed Documents

    1. (U) This paragraph contains Unclassi ed information.

    2. (C) This paragraph contains non-SAP national security information.

    3. (TS//TF) This paragraph contains TOP SECRET informationrelated to the special access program TWISTED FEATHER. Portionmarkings are the same as previously described in this marking guide.The exception is the addition of the nickname digraph following the TSdesignation.

    Maxwell SmartDirector, Special Programs

    USD(I)Attachment:Classi ed by: Maxwell Smart, Director, USD(I)Reason: 1.6(a) and (g)Declassify on: 20151231

    TOP SECRET//TWISTED FEATHER

    A SAP digraph or trigraph is a 2 or 3 letter designator given to each SAP. In this example, TF shown here repthe nickname TWISTED FEATHER. A nickname, codeword, trigraph, and/or digraph may be substituted forthe term SPECIAL ACCESS Channels. Refer to the SAP Security Procedure Guide for instructions.

    Highest classi cation andprogram nickname areconspicuously placed atthe top and bottom.

    Paragraph markings in SAPdocuments should containthe highest classi cationwithin the paragraph, andbe followed by the SAPdigraph.

  • 7/29/2019 DSS ClassifiedMarkings

    28/43Marking Classi ed In ormation DSS CDSE~ 28 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    SAP Codewords

    In addition to nicknames, SAPs also use codewords for control of dissemination and a need-to-know. Codewordlike nicknames, are assigned to the program when the SAP is approved. A codeword is a single word w

    classi ed meaning.

    TOP SECRET//CODEWORD(S)OFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    July 28, 2005MEMORANDUM FOR SPECIAL ACCESS PROGRAM CENTRAL

    OFFICESSUBJECT: (U) Identi cation and Marking of Classi ed Documents

    1. (U) This paragraph contains Unclassi ed information.

    2. (TS//CW) This paragraph re ects TOP SECRET information controlled in the CODE WORD classi ed program.

    Maxwell SmartDirector, Special Programs

    USD(I)

    Classi ed By: Maxwell Smart, Director USD (I)Derived from: CODEWORD SCG, dtd _____Declassify on: 20151231

    TOP SECRET//CODEWORD(S)

    Highest classi cation andprogram codeword areconspicuously placed at thetop and bottom.

    Paragraph markings in SAPdocuments should containthe highest classi cationwithin the paragraph, andbe followed by the SAPdigraph.

  • 7/29/2019 DSS ClassifiedMarkings

    29/43Marking Classi ed In ormation DSS CDSE~ 29 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 7 - i ntelliGence i nforMation

    Additional security controls and markings are established for intelligence information. The DoD Components ofthe IC and personnel working with intelligence information shall refer to IC Directive (ICD) 710, Classi catio

    and Control Markings System, issued by the Of ce of the Director of National Intelligence (ODNI); SpecialSecurity Center (SSC) Controlled Access Program Coordination Of ce (CAPCO); and the IC Classi cationand Control Markings Implementation Manual for guidance on marking and dissemination of classi ed and theunclassi ed intelligence information.

    TOP SECRET//NOFORN//ORCONOFFICE OF THE SECRETARY OF DEFENSE

    WASHINGTON, DC

    July 28, 2005MEMORANDUM FOR DIRECTOR, DEFENSE INTELLIGENCEAGENCY

    SUBJECT: (U) Marking of Classi ed Intelligence Information

    1. (S//NF) This paragraph contains Secret No ForeignDissemination information. Portion markings are the same aspreviously described in this marking guide. The exception isthe addition of the intelligence marking digraph following the Sdesignation.2. (TS//OC) This paragraph contains Top Secret OriginatorControlled information. Portion markings are the same as previously

    described in this marking guide. The exception is the addition of theintelligence marking digraph following the TS designation.3. (U) Conspicuously mark the top and bottom of the document withthe overall classi cation.

    James BondDirector, Intelligence Programs

    USD(I)

    Classi ed by: James Bond, DirectorDerived from: DNI SCG 259, 5/7/04Declassify on: 20151231

    TOP SECRET//NOFORN//ORCON

    The chart on the next pagewill identify several of themost common intelligencecaveat designations.

  • 7/29/2019 DSS ClassifiedMarkings

    30/43Marking Classi ed In ormation DSS CDSE~ 30 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Designation Abbreviation DigraphDISSEMINATION AND EXTRATION OF INFORMATIONCONTROLLED BY ORIGINATOR Tis marking is used only on classi ed intelligence that clearly identi es or wouldreasonably permit ready identi cation o intelligence sources or methods thatare particularly susceptible to countermeasures that would nulli y or measurably reduce their efectiveness. It is used to enable the originator to maintaincontinuing knowledge and supervision o distribution o the intelligence beyondits original dissemination.

    ORCON OC

    CAUTION-PROPRIETARY INFORMATION INVOLVEDTis marking is used with, or without, a security classi cation level marking,to identi y in ormation provided by a commercial rm or private source underan expressed or implied understanding that the in ormation shall be protected

    as a trade secret or proprietary data believed to have actual or potential value.Tis marking may be used on U.S. Government Proprietary data only whenthe U.S. Government proprietary in ormation can provide a contractor(s) anun air advantage such as U.S. Government budget or nancial in ormation.

    PROPIN PR

    NOT RELEASABLE TO FOREIGN NATIONALSTis marking is used to identi y intelligence that alls under the criteria o DCID 6/7, Foreign Disclosure, that the originator has determined may notbe disclosed or released, in any orm, to oreign governments, internationalorganizations, coalition partners, oreign nationals, or immigrant alienswithout originator approval. Tis marking is not authorized or use inconjunction with the AU HORIZED FOR RELEASE O (REL O)marking.

    NOFORN NF

    AUTHORIZED FOR RELEASE TO (name of country(ies)/internationalorganization)Within the DoD, the REL O control marking is authorized or use on ALLclassi ed de ense in ormation.REL O identi es classi ed in ormation that has been determined in accordancewith established oreign disclosure processes to be releasable, or that has beenreleased through established oreign disclosure procedures and channels, to the

    oreign country(ies) and/or international organization(s) indicated.REL O shall not be used with NOFORN or EYES ONLY in the banner line.

    REL O

    CONTROLLED IMAGERYTis control marking is used on Secret or above and is used to protect sourcesand analytic methods associated with the geospatial intelligence discipline thatare particularly vulnerable to countermeasures, and i disclosed or released couldnegate or measurably reduce the efectiveness o those methodologies.

    IMCON

  • 7/29/2019 DSS ClassifiedMarkings

    31/43Marking Classi ed In ormation DSS CDSE~ 31 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 8 - M arkinG i nforMation o ther t han d ocuMentS

    Charts, Maps, Equipment, Drawings, and PhotographsWhen classi ed information is contained in computer or other electronic media, audiovisual media, chart andmaps, or other media (including hardware, equipment, and facilities) not commonly thought of as documents,the requirement remains to identify as clearly as possible the information that requires protection, the level oprotection required, and its duration. The main concern is that holders and users of the material are clearly noof the presence of classi ed information. If it is not feasible to mark such information, an explanatory statemshall be included on or with the information that explains exactly what information is and is not classiOther markings normally required for classi ed documents shall also be made available, either on the item ordocumentation that accompanies it.

    Mark blueprints, engineering drawings, charts, maps, and similar items not contained in a classi ed documentwith the appropriate overall classi cation and dissemination control markings. The classi cation marking shall beunabbreviated, conspicuous, and applied top and bottom, if possible, in such a manner as to ensure reproduction any copies. The legend or title shall also be portion marked to show classi cation of the legend or titthe blueprints, maps, and other items are large enough that they are likely to be rolled or folded, the classi camarkings shall be placed to be visible when the item is rolled or folded.

    SECRET

    SECRET

  • 7/29/2019 DSS ClassifiedMarkings

    32/43Marking Classi ed In ormation DSS CDSE~ 32 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Hardware and EquipmentIf the required information is stored in readily accessible format on the device, it does not have to be markthe outside of the device. As an example, if classi ed les or documents prepared on an IT system areon a DVD or compact disc, and each le bears its own declassi cation instructions, the disc does not needmarked with declassi cation instruction. This is true with respect to most removable media containing classi edtext les and documents, even though a few of them may not have all of the prescribed markings. If the reinformation is not stored in readily accessible format on the device, it shall be marked on the outside of the d(normally with a sticker or tag) or placed on documents kept with the device.

  • 7/29/2019 DSS ClassifiedMarkings

    33/43Marking Classi ed In ormation DSS CDSE~ 33 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Rolled Documents

    If the blueprints, maps and other items are large enough that they are likely to be rolled or folded, classi cmarkings must be placed to be visible when the item is rolled or folded.

    Continuous Form (Fan Folded) Documents

    Due to the volume and nature of printed products of Automated Information Systems (AIS), there are specprovisions for marking some of these types of documents. These provisions include classi cation markings oninterior pages of fan folded printouts. The AIS equipment may apply these markings even though they maymeet the normal test of being conspicuous.

    Special control notices, identi cation of classi cation sources, and downgrading and declassi cation instructionsmust either be marked on the face of the document or be placed on a separate sheet of paper attached to theof the document.

  • 7/29/2019 DSS ClassifiedMarkings

    34/43Marking Classi ed In ormation DSS CDSE~ 34 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Photographic Media

    Slides must have markings on the slide cover and on the actual image so when the slide is displayed on screeclassi cation is clearly identi ed. Applicable associated markings should be applied to the lead slide.

    (1) Mark photographs and negatives with the overall classi cation and dissemination control markings applicablto information they contain. Mark photographs on the face, if possible. If this cannot be done, the classi cationdissemination control markings may be placed on the reverse side. Place other required markings on photograpalong with the classi cation marking, or include them in accompanying documentation. Digital photographs maybe edited to overlay markings on the face of the photograph.

    (2) Mark roll negatives and positives, and other lm containing classi ed information with their overclassi cation and any dissemination control markings. These markings shall be placed on the lm itself,possible, and on the canister, if one is used. If placed on the lm itself, the marking shall be placed at bbeginning and end of the roll.

    (3) Mark slides and transparencies with the overall classi cation and any control markings on the image arof the item and also on the border, holder, or frame. Place other required security markings on the rstor transparency in a set in the image area; on the border, holder, or frame; or in documentation accompanythe item. These additional markings are not needed on the other slides or transparencies; however, slidestransparencies that are permanently removed from a set shall be marked as a separate document. Information othe image area of each slide or transparency shall be portion marked.

    a. Digital Video Discs (DVDs), Video Tapes, and Motion Picture Film. Mark DVDs, video tapes,motion picture lms with their classi cation and any control markings at the beginning and end of the presentat

    (i.e., the played or projected portion). Other required security markings shall be placed at the beginning ofpresentation. Discs, reels and cassettes shall be marked with the overall classi cation of the item. When stin a container, the container shall be marked with the overall classi cation, applicable dissemination contromarkings, and other required markings.

    b. Sound Recordings. Place an audible statement of overall classi cation and dissemination contrrequirements at the beginning and end of sound recordings. Reels or cassettes shall be marked with the ovclassi cation and any required dissemination control markings and stored appropriately. When stored incontainer, the container shall be marked with the overall classi cation, applicable dissemination control markings,and other required markings.

    c. Micro lm, Micro che, and Similar Microform Media. Mark micro lm, micro che, and similmicroform media with their overall classi cation and applicable control markings in the image area that canread or copied. Such media shall have this marking applied so it is visible to the unaided eye. Other reqsecurity markings shall be placed on the item or included in accompanying documentation. Any containers shacontain all required markings, except no markings are required if the container is transparent and markings onmedia itself are clearly visible.

  • 7/29/2019 DSS ClassifiedMarkings

    35/43Marking Classi ed In ormation DSS CDSE~ 35 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Photographic Media Marking Examples

  • 7/29/2019 DSS ClassifiedMarkings

    36/43Marking Classi ed In ormation DSS CDSE~ 36 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Computer Media

    Basic document markings apply to all media.

    Computer discs must re ect the highest level of classi cation contained on the discs. Standard labels shouldused for all levels of classi cation.

    SF-706 - Top Secret SF-707 - Secret SF-708 - Con dential SF-709 - Classi ed SF-710 - Unclassi ed SF-711 - Data Descriptor SF-712 - Classi ed SCI

    If not otherwise marked, the SF classi cation labels listed above should be used to identify the highest lof classi ed information stored on information technology (IT) systems and removable electronic storagemedia. These labels may also be used on other forms of property to clearly identify the classi cation level oinformation contained in or on that item, when appropriate.

    In an environment in which both classi ed and unclassi ed information is processed or stored, the SF-71Unclassi ed label shall be used to identify unclassi ed media or equipment. There is no requirement to use a710 label in environments where no classi ed information is created or used.

    If the level of classi cation of the information on the medium changes (i.e., the information is declassi

    downgraded, or upgraded), the label shall be wholly covered by the appropriate label for the new levelclassi cation.

    If physical marking of the medium containingclassi ed information is not possible, then identi cationof classi ed information must be accomplished by othermeans (e.g., indelible marker, etc.).

  • 7/29/2019 DSS ClassifiedMarkings

    37/43Marking Classi ed In ormation DSS CDSE~ 37 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 9 - f or o fficial u Se o nly (fouo)

    If a document has no classi ed information, the information must still be reviewed to see if it meets the eightexemptions under the Freedom of Information Act (FOIA) that would make it ineligible for public release. Such

    information cannot be made public if or when the document is declassi ed. Mark unclassi ed portions applicablto FOIA exemptions with FOUO (For Of cial Use Only).

    OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, D.C.

    28 July 2005MEMORANDUM FOR DEPSECDEF SUBJECT: (U) Marking an Unclassi ed Document that Contains FOUO Information

    1. (U//FOUO) FOUO portions within a classi ed document shall be marked (U//FOUO);however, FOUO shall not appear in the overall classi cation banner because the classi cationadequately protects the unclassi ed information, except when page markings are used to re ectthe classi cation of information on that page instead of the overall document classi cation.In that case, the banner line for unclassi ed pages with FOUO information shall be:UNCLASSIFIED//FOR OFFICIAL USE ONLY or UNCLASSIFIED//FOUO.

    2. (U) Documents that are unclassi ed that contain FOUO information will be marked FOR

    OFFICIAL USE ONLY at the bottom of the front cover (if there is one), the title page (if thereis one), the rst page, and the outside of the back cover (if there is one).

    3. (U) FOUO documents and material transmitted outside of the Department of Defense mustbear an expanded marking on the face of the document so that non-DoD holders understand thestatus of the information. A statement similar to this one should be used:

    This document contains informationexempt from mandatory disclosure under

    the FOIA.Exemption(s) _____ apply.

    Gloria MillerUSD(I)

  • 7/29/2019 DSS ClassifiedMarkings

    38/43Marking Classi ed In ormation DSS CDSE~ 38 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Freedom of Information Act (FOIA) Exemptions

    Number Type of Information Exempted from Disclosure under FOIA

    1 Information properly and currently classi ed in the interest of national defense or foreign policy, asspeci cally authorized under the criteria established by Executive Order 13526 and implementedby regulations, such as DoD 5200.1-R.

    2 Information related solely to the internal personnel rules and practices of the Department ofDefense or any of its Components. This exemption is entirely discretionary. This exemption hastwo pro les: high and low.

    High: When release of the records would allow circumvention of the records and wouldsubstantially hinder the effective performance of a signi cant function of DoD.

    Low: When only a minimum Government interest would be affected (administrativeburden), there is a great potential for discretionary disclosure of the information.Consequently, DoD Components shall not invoke the low pro le.

    3 Information that a statute speci cally exempts from disclosure by terms that permit nodiscretion on the issue, or in accordance with criteria established by that statute forwithholding or referring to particular types of matters to be withheld. Examples include:Patent Secrecy, 35 U.S.C. 181-188

    Restricted Data and Formerly Restricted Data, 42 U.S.C. 2162 Communication Intelligence, 18 U.S.C. 798 Authority to Withhold From Public Disclosure Certain Technical Data, 10 U.S.C. 130 and

    DoD Directive 5230.25 Physical Protection of Special Nuclear Material: Limitation on Dissemination of

    Unclassi ed Information, 10 U.S.C. 128

    Protection of Contractor Submitted Proposals, 10 U.S.C. 2305(g) 4 Information such as trade secrets or commercial or nancial information received.4 Information such as trade secrets or commercial or nancial information received from a person or

    organization outside the Government on a privileged or con dential basis and when the disclosureof the information is likely to cause substantial harm to the competitive position of the sourceproviding the information; impair the Governments ability to obtain necessary information inthe future; or impair some other legitimate Government interest. If the information quali es asExemption 4 information, there is no discretion in its release.

    5 Information considered privileged in litigation, primarily under the deliberative process privilege.In order to meet the test of this exemption, the record must be both deliberative in nature, as wellas part of a decision-making process. Merely being an internal record is insuf cient basis forwithholding under this exemption. Also potentially exempted are records pertaining to the attorney-client privilege and the attorney work-product privilege. This exemption is entirely discretionary.

    6 Personal information (including personnel and medical les) that, if disclosed to a requester,other than the person about whom the information is about, would result in a clearly unwarrantedinvasion of personal privacy. Release of information about an individual contained in a Privacy ActSystem of records that would constitute a clearly unwarranted invasion of privacy is prohibited,and could subject the releaser to civil and criminal penalties. If the information quali es asExemption 6 information, there is no discretion in its release.

  • 7/29/2019 DSS ClassifiedMarkings

    39/43Marking Classi ed In ormation DSS CDSE~ 39 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    7 Records or information compiled for law enforcement purposes; i.e., civil, criminal, or militarylaw, including the implementation of Executive Orders or regulations issued pursuant to law. This

    exemption may be invoked to prevent disclosure of documents not originally created for, but latergathered for law enforcement purposes.

    With two exceptions, this exemption is discretionary. There is no discretion if release of theinformation could reasonably be expected to (I) to be an unwarranted invasion of the personalprivacy of a living person, including surviving family members of an individual identi ed insuch a record or (II) endanger the life or physical safety of any individual.

    8 Certain records related to examination, operation or condition reports prepared by, on behalf of, or for the use of any Agency responsible for the regulation or supervision of nancialinstitutions.

    9 Geological and geophysical information and data (including maps) concerning wells.

  • 7/29/2019 DSS ClassifiedMarkings

    40/43Marking Classi ed In ormation DSS CDSE~ 40 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Section 10 - t echnical d ocuMentS

    All DoD activities generating or responsible for DoD technical documents and other forms of data shall determithe appropriate distribution and mark these materials with a DoD Distribution Statement before they can b

    disseminated.

    Distribution statements are used on classi ed and unclassi ed scienti c and technical documents to identify thdocuments availability for distribution, release, and disclosure without additional approvals and authorizationsfrom the controlling DoD of ce (CDO). Each statement provides four pieces of information as illustrated belowto facilitate secondary distribution and release:

    Public U.S. individuals or U.S.

    companies DoD components and

    DoD contractors

    Foreign governmentinformation

    Property information

    Test evaluation

    Critical technology

    Premature dissemination

    Software documentation

    Contractor

    The DoD activity that sponsored thework that generated the technicaldata or received the technical data onbehalf of the Department of Defenseand, therefore, has the responsibilityfor determining the distribution of adocument containing such technicaldata. The CDO may be different thanthe originating of ce.

    Authorized audience

    Reason for restriction

    Identity of the CDO

    Date of Publication

  • 7/29/2019 DSS ClassifiedMarkings

    41/43Marking Classi ed In ormation DSS CDSE~ 41 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Distribution Statement AApproved for public release: distribution is unlimited

    Distribution Statement _____ (Fill in Level: B, C, D, or E)Distribution authorized to __________ (Fill in audience; see Note 1); __________ (Fill in reason; see

    Note 2); __________ ( ll in date of determination). Other requests for this document shall be referred to__________ (insert name of DoD Controlling Of ce).

    Note 1:B = U.S. Government Agencies onlyC = U.S. Government Agencies and their contractors onlyD = DoD and U.S. DoD contractors onlyE = DoD Components only

    Note 2:Reasons

    Foreign Government Information Proprietary Information Test and Evaluation Contractor Performance Evaluation Critical Technology Premature Dissemination Software Documentation Administrative/Operational Use

    Table 1. Authorized Distribution StatementsDISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited.

    DISTRIBUTION STATEMENT B. Distribution authorized to U.S. Government Agencies only ( ll inreason) (date of determination). Other requests for this document shallbe referred to (insert controlling DoD of ce).

    DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government Agencies and theircontractors ( ll in reason) (date of determination). Other requests forthis document shall be referred to (insert controlling DoD of ce).

    DISTRIBUTION STATEMENT D. Distribution authorized to the Department of Defense and U.S. DoDcontractors only ( ll in reason) (date of determination). Other requestsshall be referred to (insert controlling DoD of ce).

    DISTRIBUTION STATEMENT E. Distribution authorized to DoD Components only ( ll in reason) (date

    of determination). Other requests shall be referred to (insert controllingDoD of ce).

    DISTRIBUTION STATEMENT F. Further dissemination only as directed by (inserting controlling DoDof ce) (date of determination) or higher DoD authority.

    DISTRIBUTION STATEMENT X. Distribution authorized to U.S. Government Agencies and privateindividuals or enterprises eligible to obtain export controlled technicaldata in accordance with DoDD 5230.25, Withholding of Unclassi edTechnical Data From Public Disclosure, (date of determination).Controlling DoD of ce is (insert).

  • 7/29/2019 DSS ClassifiedMarkings

    42/43Marking Classi ed In ormation DSS CDSE~ 42 ~

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    Distribution Statement XDistribution authorized to U.S. Government Agencies and private individuals or enterprises eligible toobtain export-controlled technical data in accordance with __________ (Insert appropriate regulation);

    __________ ( ll in date of determination). DoD Controlling Of ce is __________ (insert name of DoDControlling Of ce). (See Note 3).

    Note 4:Distribution Statement F is normally used only on classi ed technical documents, but may beused on unclassi ed technical documents when speci c authority exists (e.g., designation asdirect military support as in Statement E). Distribution Statement F is also used when the DoDoriginator determines that information is subject to special dissemination limitation.

    Note 3:The audience(s) and reason(s) are inherent in the wording of the statement.

    Distribution Statement FFurther dissemination only as directed by __________ (insert name of DoD Controlling Of ce or higher

    DoD authority); __________ (Insert date of determination). (See Note 4).

  • 7/29/2019 DSS ClassifiedMarkings

    43/43

    D E F E N

    S E

    S E C U R I T Y S E R

    V I

    C E

    U N

    I T E D

    S T A T E S O F A M

    E R I C

    A

    Center for Development of Security Excellenc

    Learn. Perform. Protect.

    a ppendix a - r eferenceS

    The following directives, instructions, and other publications describe DoD policy and requirements for markinginformation and/or identify policy constraints on the dissemination of information created by or for DoD or und

    DoDs control.

    1. Executive Order 13526, Classi ed National Security Information, December 29, 2009

    2. National Archives and Records Administration Implementing Directive No. 1 to Executive Order 13526,June 28, 2010

    3. DoD Directive 3200.12, DoD Scienti c and Technical Information (STI) Program (STIP), February11, 1998

    4. DoD Directive 5205.07, Special Access Program (SAP) Policy, July 1, 2010

    5. DoD Directive 5210.2, Access to and Dissemination of Restricted Data, January 12, 1978; Change 1

    February 13, 1980; Change 2, April 3, 1981; Change 3, November 16, 19946. DoD Directive 5230.9, Clearance of DoD Information for Public Release, April 9, 1996; Change 1,

    July 15, 1999

    7. DoD Directive 5230.11, Disclosure of Classi ed Military Information to Foreign Governments andInternational Organizations, June 16, 1992

    8. DoD Directive 5230.24, Distribution Statements on Technical Documents, March 18, 1987

    9. DoD Directive 5230.25, Withholding of Unclassi ed Technical Data from Public Disclosure,November 6, 1984; Change 1, August 18, 1995

    10. DoD Directive 5400.07, DoD Freedom of Information Act (FOIA) Program, January 2, 2008

    11. DoD Directive 5400.11, DoD Privacy Program, May, 8, 2007

    12. DoD Directive 8910.1, Management and Control of Information Requirements, June 11, 1993

    13. DoD Instruction 3200.14, Principles and Operational Parameters of the DoD Scienti c and TechnicalProgram, May 13, 1997; Change 1, June 5, 1998; Change 2, March 20, 2000; Change 3, June 28, 20

    14. DoD Instruction 5200.1, DoD Information Security Program and Protection of SensitiveCompartmented Information, October 9, 2008

    15. DoD Instruction 5230.27, Presentation of DoD-Related Scienti c and Technical Papers at Meetings,October 6, 1987

    16. DoD Instruction 5230.29, Security and Policy Review of DoD Information for Public Release,January 8, 2009

    17. DoD Regulation 5200.1-R, Information Security Program Regulation, January 17, 1996

    18. DoD Regulation 5400.7-R, DoD Freedom of Information Act Program,