7/29/2019 DSS ClassifiedMarkings
1/43Marking Classifed In ormation DSS CDSE~ 1 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Center for Development of Security Excellence
Learn. Perform. Protect.
Marking Classifed In ormationDownloadable Supplement to Web Based Training Course
Prepared By
October 2012
All classifcation markings within thispublication are unclassifed and are classifed
or illustrative purposes only
7/29/2019 DSS ClassifiedMarkings
2/43Marking Classi ed In ormation DSS CDSE~ 2 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Table of Contents
Section 1 - G eneral M arkinG r equireMentS 3
Section 2 - M arkinG o riGinally c laSSified i nforMation 4Portion Markings 5Banner Markings 6
Classi ed by and Reason for Classi cation Authority BoxDeclassify on Line / Options for Declassi cationClassi cation Extensions
Section 3 - M arkinG d erivatively c laSSified i nforMation 11Classi ed by, Derived from and Declassify on Lines25X1 25X9 on the Declassify on LineObsolete Declassi cation InstructionsDerivatively Classifying from Multiple Sources
Documentation of Classi ed Sources UsedDerivatively Classifying from a Security Classi cation Guide
Section 4 - M arkinG Special t ypeS of i nforMation and M aterialS 19Working PapersElectronically Transmitted MessagesClassi ed Markings for EmailsForeign Government InformationLetters of TransmittalClassi cation by Compilation
Section 5 - a toMic e nerGy i nforMation 24
Commingling RD and FRD with NSISection 6 - S pecial a cceSS p roGraMS (Sap S) 26
SAP NicknamesSAP Codewords
Section 7 - i ntelliGence i nforMation 29
Section 8 - M arkinG i nforMation o ther t han d ocuMentS 31Charts, Maps, Equipment, Drawings, and PhotographsHardware and EquipmentRolled DocumentsContinuous Form (Fan Folded) DocumentsPhotographic MediaComputer Media
Section 9 - f or o fficial u Se o nly (fouo) 37Freedom of Information Act (FOIA) Exemptions
Section 10 - t echnical d ocuMentS 40
a ppendix a - r eferenceS 43
On subsequent pages, click on the house icon to return to the Table of Contents.
7/29/2019 DSS ClassifiedMarkings
3/43Marking Classi ed In ormation DSS CDSE~ 3 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 1 - G eneral M arkinG r equireMentS
Purpose
Marking is the principal way of letting holders of information know the speci c protection requirementsfor that information. Markings and designations serve several purposes; speci cally, they:
Alert holders to the presence of classi ed information, information protected under the Freedomof Information Act (FOIA), and technical information with restrictions on its dissemination
Identify, as speci cally as possible, the exact information needing protection Indicate the level of classi cation and any other markings for control of the information Provide guidance on information sharing Provide guidance on downgrading (if any) and declassi cation Give information on the source(s) and reason(s) for classi cation or other restrictions Warn holders of special access, control, or safeguarding requirements
This guide gives Department of Defense (DoD) staff and contractors an overview of the kinds of markrequired to protect classi ed and unclassi ed controlled information that cannot be disseminated to all audiences.The guide offers an integrated approach to the major requirements for marking and control of informatibrie y explaining the reasons for marking and providing examples of correctly marked information. To facilitateinformation sharing and declassi cation processes, whenever practicable a classi ed attachment, addendum,annex, enclosure, or similar section shall be used when classi ed information constitutes only a small portionan otherwise unclassi ed document.
Background and Policy
DoD policy is to maximize the availability of information consistent with the restraints necessary to protenational security, U.S. economic security, and the rights and interests of individuals, businesses, and foreiggovernments. To implement this policy, DoD personnel must be able to understand and balance the diverrequirements that guide their decisions about managing the ow of DoD information and data.
All classi ed information needs to be identi ed clearly by: Electronic labeling Designation Marking
Marking and designation of classi ed information are the speci c responsibility of original and derivativeclassi ers.
7/29/2019 DSS ClassifiedMarkings
4/43Marking Classi ed In ormation DSS CDSE~ 4 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Dec 31, 2007
MEMORANDUM FOR XXXXXXXXX XXXXXXXXXXXX
SUBJECT: (U) Delegation of SECRET Original Classi cation Authority (OCA)
(U) You are hereby delegated authority to classify information up to SECRET for information under area of responsibility an accordance with Executive Order 13526,Classi ed National Security Information (the Order). (S) As an OCA, you are required to receive training in original classi cation as
provided by the order and implementing directives prior to you exercising this authority. Your Security Manager will facilitate this training.
(S//REL) The Order also provides that OCAs shall prepare classi cation guides tofacilitate the proper uniform derivative classi cation of information. Request that you providea copy of your guide(s) to the of ce by December 31, 2009.
Classi ed by: OCA Name and Position TitleReason: 14(c)Downgrade to: CONFIDENTIAL on 20121231Declassify on: 20150930
Section 2 - M arkinG o riGinally c laSSified i nforMation
Original classi cation is an initial determination made by an original classi cation authority (OCA) thainformation requires, in the interest of national security, protection against unauthorized disclosure. Standard
markings are required for all documents that contain originally classi ed information. The information is to bshown using these marking elements: banner lines, portion marks, agency, of ce of origin, date of origin, aclassi cation authority block (OCA or derivative).
The overall process for properly marking a document requires the classi er to: Identify the classi cation level of each portion contained in the document Determine the overall classi cation of the document Identify the original classi cation authority on the Classi ed by line Identify the reason for classi cation. Every classi ed document shall show on the rst page, title pa
or front cover, the originating agency and of ce and the date of the documents origin Annotate the declassi cation instructions on the Declassify on line (if applicable)
SECRET//REL USA, GBROFFICE OF THE UNDER SECRETARY OF DEFENSE INTELLIGENCE
SECRET//REL USA, GBR
The date for declassi cation must be displayednumerically using the following format (20150930)
Banner Line (overallclassi cation marking)
PortionMarkings
Classi cationauthority block
Classi cation Separator Dissemination control
7/29/2019 DSS ClassifiedMarkings
5/43Marking Classi ed In ormation DSS CDSE~ 5 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Portion Markings
A portion is ordinarily de ned as a paragraph, but also includes subjects, titles, graphics, tables, charts, bullestatements, sub-paragraphs, classi ed signature blocks, and other portions within slide presentations, and the like.
Classi cation designations for portion markings are: (U) for Unclassi ed (C) for Con dential (S) for Secret (TS) for Top Secret
These abbreviations are placed in parentheses before the portion to which they apply. Whenever possible, use an unclassi ed title or subject line.
Portions include not only paragraphs, sub-paragraphs, and title, but also charts, tables, pictures and illustrations.
SUBJECT: *(U) Portion Marking for Title or Subject Line
1. (U) This paragraph contains unclassi ed information. Therefore, this paragraph will be markedwith the designation U in parenthesis.
a. (C) This sub-paragraph contains Con dential information. Therefore, this paragraph
will be marked with the designation C in parenthesis.b. (S) This sub-paragraph contains Secret information. Therefore this paragraph will bemarked with the designation S in parenthesis.
2. (TS) This sub-paragraph contains Top Secret information. Therefore this paragraph will bemarked with the designation TS in parenthesis.
(U) (C) (S) (TS) (U//FOUO) (S//NF/PROPIN)
(C//FRD) (//GBR S) (TS//SI/TK) (S//RD)
(S//REL) (TS//REL TO USA, AUS, CAN, GBR) (S//RD-N)
*
Examples of portion markings
7/29/2019 DSS ClassifiedMarkings
6/43Marking Classi ed In ormation DSS CDSE~ 6 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Banner Markings
The second step in marking a classi ed document is determining the overall classi cation of the document. Onlby identifying the proper classi cation for each portion can the overall classi cation level be determined. Th
banner line shall specify the highest level of classi cation (Con dential, Secret, or Top Secret) of informationcontained within the document and the most restrictive control markings applicable to the overall documen(hereafter referred to as banner markings).
TOP SECRET
DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DC
October 18, 2005
MEMORANDUM FOR USD(P) SUBJECT: (U) Banner Markings
1. (U) This paragraph contains unclassi ed information.Therefore, this paragraph will be marked with the designationU in parenthesis.2. (C) This sub-paragraph contains Con dentialinformation. Therefore, this paragraph will be markedwith the designation C in parenthesis.3. (TS) This sub-paragraph contains Top Secretinformation. Therefore, this paragraph will be markedwith the designation TS in parenthesis.
Classi ed by: Stephen A. CamboneUSD(I) Director
Reason: 1.4(d)
Declassify on: 20150930
TOP SECRET
Conspicuously place the overallclassi cation at the top and thebottom of the page.
1) The highest level of classi cationis determined by the highest level ofany one portion within the document.
(2) The classi cation level in thebanner line must be in English and
spelled out completely. Only oneclassi cation level shall be used.
(3) Any other control markings(e.g., dissemination controlmarkings) included may be spelledout or abbreviated as shown in thisexample.
(4) Banner markings always useuppercase letters.
Classi cation Authority Block
7/29/2019 DSS ClassifiedMarkings
7/43
7/29/2019 DSS ClassifiedMarkings
8/43Marking Classi ed In ormation DSS CDSE~ 8 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Classi ed by and Reason for Classi cation Authority Box
SECRET
DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DCAugust 31, 2004
MEMORANDUM FOR USD(P) SUBJECT: (U) Classi cation Authority Box
1. (S) The third step in properly marking a document is to annotate the original classi cationauthority on the document. This is accomplished by placing the original classi cation authorityon the Classifed by line. The Classi ed by line should include the name or personalidenti er of the actual classi er and their position. If the identi cation of the originating
agency is not apparent on the face of the document, place it below the Classi ed by line.
2. (U) Each original classi cation decision shall state areason for classifying. Classi cationmay be applied only to information described in the following categories as speci ed in section1.4 of Executive Order (E.O.) 13526, Classi ed National Security Information:
a. (U) Military plans, weapons systems, or operationsb. (U) Foreign government informationc. (U) Intelligence activities (including special activities), intelligence sources or
methods, or cryptologyd. (U) Foreign relations or foreign activities of the United States, including con dential
sourcese. (U) Scienti c, technological, or economic matters relating to the national security,
which includes defense against transnational terrorismf. (U) United States Government programs for safeguarding nuclear materials or
facilitiesg. (U) Vulnerabilities or capabilities of systems, installations, infrastructures, projects,
plans, or protection services relating to the national security, which includes defenseagainst transnational terrorism
h. (U) Weapons of mass destruction
3. (U) The original classi er shall identify a concise reason for classi cation which, at aminimum, cites the applicable classi cation categories in section 1.4 of E.O. 13526, as thebasis for classi cation.
Classi ed by: Wilma Y. JonesDirector, NAAFMC
Reason: 1.4(a) and (d) or Military Plans; Foreign RelationsDeclassify on: 20101231
SECRET
7/29/2019 DSS ClassifiedMarkings
9/43Marking Classi ed In ormation DSS CDSE~ 9 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
The nal essential marking indicates the duration
of classi cation. This information is placed on theDeclassify on line. When determining the durationof classi cation, choose one of the following threedeclassi cation instructions: (Whenever possible, selectthe declassi cation instruction that will result in theshortest duration of classi cation.)
1. Date or EventWhen possible, identify the date or event fordeclassi cation which corresponds to the lapse ofthe informations national security sensitivity, which
is equal to or less than 10 years from the date of theoriginal decision.
OR
2. Ten Year DurationWhen a speci c date or event cannot be determined,identify the date that is 10 years from the date of theoriginal classi cation.
OR
3. Twenty- ve Year DurationIf the sensitivity of the information warrants protectionbeyond 10 years, then the original classi cationauthority may assign a declassi cation date up to, butno more than twenty- ve years from the date of originalclassi cation.
Note: The identity of a con dential human source or ahuman intelligence source is not subject to automatic
declassi cation. The marking for the exemption of thisspeci c information is: 25X1
Exceptions to this sequence: If the information shouldclearly and demonstrably be expected to reveal theidentity of a con dential human source or a humanintelligence source, the duration of classi cation shall beup to 75 years and shall be designated as 50X1-HUM.
September 1, 2004(Date of original classi cation)
Classi ed by: Keith M. Morris USD(R)
Reason:1.4(a)Declassify on: 20290901
September 1, 2004(Date of original classi cation)
Classi ed by: Keith M. Morris USD(R)Reason:1.4(a)Declassify on: 20140901
Classi ed by: Keith M. Morris USD(R)Reason:1.4(a)Declassify on: 20151231orCompletion of Operation
Declassify on Line / Options for Declassi cation
7/29/2019 DSS ClassifiedMarkings
10/43Marking Classi ed In ormation DSS CDSE~ 10 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
If the information should clearly and demonstrably beexpected to reveal key design concepts of weapons of
mass destruction, the duration shall be up to 75 yearsand shall be designated as 50X2-WMD.
NOTE: When 50X1-HUM and 50X2-WMD areused, a speci c date or event for declassi cation ofthe information will not be used. Approval by theInteragency Security Classi cation Appeals Panel(ISCAP) is not required prior to agency use of 50X1-HUM or 50X2-WMD; however, it will need to be included in a classi cation guide with suf cientdetail to enable effective use.
An OCA may extend the duration of classi cation upto 25 years from the date of origin of the document,change the level of classi cation, or reclassify speci cinformation.
Revise the Declassify on line to include the newdeclassi cation instructions, the identity of theOCA authorizing the extension, and the date of theaction.
An OCA with jurisdiction over the information mayextend the duration of classi cation for up to 25 yearsfrom the date of the informations origin.
Reasonable attempts should be made to notify allholders of a classi cation extension.
SECRETOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
June 3, 2000MEMORANDUM FOR DASD(I&S)
SUBJECT: (U) Classi cation Extensions Markings
1. (S) This paragraph contains Secretinformation. Therefore this paragraph will bemarked with the designation S in parenthesis.
Jane G. WhiteDir, USNTL
Classi ed by: Jane G. White, DirectorUSNTL
Reason: 1.4(a)Declassify on: January 20050129Classi cation extended on 9/30/04 until20161221 by Brian Howard, Dir. ADHT
SECRET
Classi ed By: John E. Doe, ChiefDivision 5Derived From: SCG title and dateDeclassify On: 50X2-WMD
Classi ed By: John E. Doe, ChiefDivision 5Derived From: SCG title and dateDeclassify On: 75X5, 20901231
Classi cation Extensions
7/29/2019 DSS ClassifiedMarkings
11/43Marking Classi ed In ormation DSS CDSE~ 11 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 3 - M arkinG d erivatively c laSSified i nforMation
Derivative classi cation is the act of incorporating, paraphrasing, restating, or generating in new form, informationthat is already classi ed, and marking the newly developed material consistent with the markings of the sour
information. The source information ordinarily consists of a classi ed document or documents, or a classi cationguide issued by an original classi cation authority.
When using a classi cation guide as the basis for derivative classi cation, the instructions provided by the guidare to be applied to the derivative document.
The Classi ed by line is now a required part of a derivative document. List name and position title or peridenti er of the Derivative classi er and, if not otherwise evident, include the agency and of ce of origin. TReason line, as re ected in the source document(s) or classi cation guide, is not transferred to the derivatdocument.
Overall classi cation markings for derivatively classi ed documents is applied in the same manner as for originallyclassi ed documents.
SECRETOctober 31, 2005
(U) ABC Battalion Report
1. (S) Tis paragraph contains incorporated
in ormation taken rom the second paragrapho a source document, a paragraph markedSecret. Tere ore, this paragraph is markedwith an S. Tis derivative documentcontains no other classi ed in ormation.Tere ore, portion mark all other portions witha U.
2. (U) Tis paragraph contains unclassi edin ormation. Tere ore, this paragraph willbe marked with the designation U inparenthesis.
Classi ed by: James Smith USD(I)Division Chie
Derived rom: Special Report (U) ANX-128, dtd 2004091
Declassi y on: 20131231
SECRET
SECRETSeptember 1, 2004
(U) Special Report--ANX-128
1. (U) Tis paragraph Unclassi edin ormation. Tis portion will there orebe marked with the designation U inparenthesis.
2. (S) Tis paragraph contains Secretin ormation. Tis portion will there orebe marked with the designation S inparenthesis.
Classi ed by: Keith M. Morris USD(I)
DirectorReason: 1.4 (a) & (d)Declassi y on: 20131231
SECRET
Source Document Derivative Document
7/29/2019 DSS ClassifiedMarkings
12/43Marking Classi ed In ormation DSS CDSE~ 12 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Classi ed by, Derived from, and Declassify on Lines
SECRET
DEPARTMENT OF DEFENSEDEFENSE PENTAGON, WASHINGTON, DC15 July 2004
MEMORANDUM FOR USD(P) SUBJECT: (U) Classi ed by, Derived from and Declassify on Line
1. (U) The face of each derivatively classi ed document shall include a classi cation authorityblock consisting of these elements: Classi ed by, Derived from, and Declassify on.
2. (S) Declassi cation and downgrading instructions, which may be added to the classi cation
authority block when applicable, shall be carried forward by the derivative classi er from thesource document(s), from instructions in the appropriate security classi cation guide(s), orfrom other classi cation guidance issued by the OCA.
Classi ed By: Name and position or identi er
Derived from: USD(I) MemorandumSubj: (U) Derivative Classi cation Marking,
20020625
Declassify on: 20110609
Source Document
SECRET
SECRET
June 25, 2002(Date of origin)
Subject: (U) Derivative Classi cationMarkings
Classi ed by: Mary Smith,Analyst USD(I)
Reason: 1.4 (a) & (d)Declassify on: 20110609
SECRET
7/29/2019 DSS ClassifiedMarkings
13/43Marking Classi ed In ormation DSS CDSE~ 13 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
The 25X___ exemptions may only be used on theDeclassify On line if an agency has identi ed
permanently valuable information that needs to beexempted from automatic declassi cation at 25 yearsand has received approval from the Interagency SecurityClassi cation Appeals Panel (ISCAP) to exempt theinformation and to incorporate the exemption into aclassi cation guide. (See 32 C.F.R. Part 2001.26.) Whenusing an approved exemption, a date or event that hasbeen approved by the ISCAP must be included with themarking and shall not exceed 50 years from the date of thedocument.
The identity of a con dential human source or a humanintelligence source is not subject to automaticdeclassi cation. The marking for the exemption of thisspeci c information is:
Declassify on: 25X1-Human
This 25X1-Human marking applies only to con dentialhuman sources or human intelligence sources, not allintelligence sources and methods. Except when the
information within the le series almost invariablyidenti es a con dential human source or a humanintelligence source or key design concepts of weaponsof mass destruction, a speci c date or event fordeclassi cation of the information, not to exceed December31 of the year that is 50 years from the date of origin of therecords.
Use of 50X and 75X exemptions:
In extraordinary cases, agency heads may, within ve years
of the onset of automatic declassi cation, propose to furtherexempt speci c information from declassi cation at 50years and at 75 years. These are subject to approval by theISCAP. ISCAP-approved exemptions at 50 and 75 yearswill include a date or event that has been approved by theISCAP.
September 1, 2004(Date of original classi cation)
Classi ed by: Keith M. Morris USD(I),Director
Reason:1.4(a)Declassify on: 50X1-HUM
September 1, 2004(Date of original classi cation)
Classi ed by: Keith M. Morris USD(I),Director
Reason:1.4(c)Declassify on: 25X3, 20540901dates are required with all other 25, 50,75X exemptions except 1 & 2
Classi ed by: Keith M. Morris USD(I),Director
Reason:1.4(a)Declassify on: 25X1-Human
25X1 25X9 on the Declassify on Line
7/29/2019 DSS ClassifiedMarkings
14/43Marking Classi ed In ormation DSS CDSE~ 14 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Obsolete Declassi cation Instructions
When a document is classi ed derivatively either from a source document(s) or a classi cation guide that contaione of the following obsolete declassi cation instructions, Originating Agencys Determination Required,
OADR, Manual Review, MR, or any of the exemption markings X1, X2, X3, X4, X5, X6, X7,X8, the derivative classi er shall calculate a date that is 25 years from the date of the source document wdetermining a derivative documents date or event to be placed in the Declassify on line. If no source daavailable, then use the current date.
7/29/2019 DSS ClassifiedMarkings
15/43
7/29/2019 DSS ClassifiedMarkings
16/43Marking Classi ed In ormation DSS CDSE~ 16 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
(S)__________________ ___________________
Classi ed by: Mary Poppins,Analyst USD(P)Reason: Foreign RelationsDeclassify on: 20210319
Classi ed by Line / Derived from LineClassi ed by line with name and position or personal identi er required on all original and derivative documenIf not otherwise evident, include the agency and of ce of origin.
Derived from LineEnter Multiple Sources on the Derived from line of the derivative document to indicate that more thone classi ed source was used. A document derivatively classi ed on the basis of a source document thaitself marked Multiple Sources shall cite the source document on its Derived From line rather than the teMultiple Sources.
(S)__________________ ___________________
(C)__________________ ___________________
(U)__________________ ___________________
Classi ed by:Paul James,DirectorDerived from: Multiple
SourcesDeclassify on: 20210319 S
o u r c e
1
D e r
i v a t i v e
Derivative Document used as a Source Derivative Document
(C)__________________ ___________________
Classi ed by: SECDEFReason: 1.4(a)Declassify on: 20190501
S o u r c e
2
SECRETDEPARTMENT OF THE NAVY
WASHINGTON, DC
July 15, 2010MEMORANDUM FOR AGENCY OFFICIALS
From: Joe Carver, DirectorSubject: (U) Examples
1. (S) This is paragraph 1 which containsSecret information. This portion willtherefore be marked with the designation Sin parenthesis.
Classi ed By: Joe Carver, DirectorDerived From: Department of Good WorksMemorandum dated June 27, 2010, Subj:ExamplesDeclassify on: 20240627
SECRET
SECRETDEPARTMENT OF DEFENSE
DEFENSE PENTAGON, WASHINGTON, DC
June 27, 2010MEMORANDUM FOR AGENCY OFFICIALS
From: John E Doe, Chief DivisionSubject: (U) Examples
1. (S) This is paragraph 1 which containsSecret information. This portion willtherefore be marked with the designation Sin parenthesis.2. (U) This is paragraph 2 which containsUnclassi ed information. This portion willtherefore be marked with the designation Uin parentheses.Classi ed By: John E. Doe, Chief DivisionDerived from: Multiple SourcesDeclassify on: 20240627
SECRET
7/29/2019 DSS ClassifiedMarkings
17/43Marking Classi ed In ormation DSS CDSE~ 17 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
The list of multiple sources must be included with orannotated on the derivative document. If the document
has a bibliography or reference list, this may be used asthe list of sources. Annotate it to distinguish the sourcesof classi cation from other references.
SECRETDEPARTMENT OF DEFENSE
DEFENSE PENT MEMORANDUM FOR DASD(I&S) Oct 9, 1993
SUBJECT: Security Awareness
Classi ed by: John Smith, SECDEFDeclassify on: 20181009
SECRET
Sources:1.MEMORANDUM FOR DASD(I&S)
June 3, 2000SUBJECT: (U) Security Awareness ofClassi cation Markings
Sources: 2.MEMORANDUM FOR DASD(I&S)
Oct 9, 1993SUBJECT: (U)Security Awareness
Declassify on LineSpecify the date or event for declassi cation, exemption category with date or event for declassi cation, or othedeclassi cation instruction corresponding to the longest period of classi cation among the source document(s),security classi cation guide(s), and other applicable classi cation guidance issued by the OCA.
If the document is classi ed by MultipleSources and different declassi cation instructionsapply to information included, determine the MOSTRESTRICTIVE declassi cation instruction thatapplies to any of the source information (i.e., theone farthest in the future giving the longest periodfor classi cation) and place it on the Declassifyon: line. This will ensure all the information indocument is protected for as long as necessary.
SECRETOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
1. (S) -----------------------------------------------------------------------------------------------------------------------------------------------
2. (S) ----------------------------------------------------------------------------------------------------------------------------
Classi ed by: Jane G. WhiteAnalyst , USNTL
Derived from: Multiple SourcesDeclassify on: 20250603
SECRET
SECRET
OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, DC
MEMORANDUM FOR DASD(I&S) June 3, 2000 SUBJECT: (U) Security Awareness ofClassi cation Markings1. (S) This paragraph contains Secret information. This portion will therefore bemarked with the designation S in parenthesis.
Classi ed by: Jane G. WhiteAnalyst, USNTL
Reason: 1.4(a)Declassify on: 20250603
SECRET
Source 1
Source 2
Documentation of Classi ed Sources Used
7/29/2019 DSS ClassifiedMarkings
18/43Marking Classi ed In ormation DSS CDSE~ 18 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
A classi cation guide is a document issued by an originalclassi cation authority that provides derivative classi cation
instructions. It describes the elements of information thatmust be protected and the level and duration of classi cation.When a security classi cation guide is used to determine thedeclassi cation date of a derivatively classi ed document,the date used shall not exceed 25 years from the date of theorigin of the document (not the classi cation guide), exceptfor information that would reveal the identity of a con dentialhuman source or a human intelligence source or key designconcepts of weapons of mass destruction, or for which theguide cites an authorized exemption category.
Portion MarkingsParagraph 1 of this derivative document containsinformation that paragraph 3 of the classi cation guidespeci es shall be classi ed Con dential. Followingthe guidelines of the Classi cation Guide, the rstparagraph has been marked with a C. All otherportions are unclassi ed, as indicated in the Classi cationGuide, and are marked appropriately with a U.
Banner LineConspicuously mark the overall classi cation at the topand bottom of the derivative document. As shown here,the highest classi cation level is Con dential.
S a m p
l e p a g e
f r o m
t h e s a m p
l e g u
i d e
D e r
i v a t
i v e
DEPARTMENT OF DEFENSE
(U) Security Classi cationGuide 128
20020414
CONFIDENTIAL SCG - 128
(C) This paragraph includesinformation about technical scope.(U) This paragraph includesinformation on program planning(U) This paragraph includesinformation on program progress.
Classi ed by: Joe Blow, Director
Derived from: Scty Class Guide #128Dtd: 4/14/02
Declassify on: 20140415
CONFIDENTIAL
DEPARTMENT OF DEFENSE(U) Security Classi cation
Guide 128Subject Level Reason DurationProgram Planning UProgram Progress UTechnical Scope C 1.4(a) 20140415
Vulnerability S 1.4(g) 20140415
Derivatively Classifying from a Security Classi cation Guide
7/29/2019 DSS ClassifiedMarkings
19/43Marking Classi ed In ormation DSS CDSE~ 19 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 4 - M arkinG Special t ypeS of i nforMation and M aterialS
Working PapersWorking papers are documents and material accumulated or created in the preparation of nished documents andmaterial. Working papers containing classi ed information must be:
Dated when created Annotated as working paper Marked with the highest level of classi cation of any information
contained within Protected in accordance with the assigned classi cation Accounted for, controlled, and marked in the manner prescribed for a
nished document of the same classi cation when retained more than 180 days from the date of origin or released by the originator outside the activity. Destroy when no longer needed. This requirement extends to all classi cation levels
Electronically Transmitted MessagesClassi ed information resident in an electronic environment, and retained as permanent records, must be marked,as would any other classi ed document, with the following special provisions:
1. Shall display the banner line at the top and bottom of the body of each message. Second Sentence: A silinear text string showing the overall classi cation, to include dissemination and control markings, shall beincluded as the rst line of text and at the end of the body of the message after the signature block. ThiSentence: The banner marking for the e-mail shall re ect the classi cation of the header and body of the
message. This includes the subject line, the text of the e-mail, any classi ed signature block, attachments,included messages, and any other information conveyed in the body of the e-mail.
2. Classi ed e-mail shall be portion marked. A text portion containing a uniform resource locator (URL) orreference (i.e., link) to another document shall be portion marked based on the classi cation of the contentof the URL or link text, not the content to which it points. For information printed by an automated systeoverall and page markings may be applied by the system, provided they stand out conspicuously from thetext. In older systems, this may be achieved by surrounding the markings with asterisks or other symbols.
3. Properly completed Classi ed by and Reason lines or Derived from line, declassi cationinstructions, and downgrading instructions (when applicable) must be included in the classi cation authorityblock. Declassi cation and downgrading instructions will not be used for information containing Restricted
Data or Formerly Restricted Data.4. The following abbreviations may be used:
CLASS for Classi ed byRSN for Reason (only for originally classi ed information)DERV for Derived from (only for derivatively classi ed information)DNG for Downgrade toDECL for Declassify on
7/29/2019 DSS ClassifiedMarkings
20/43Marking Classi ed In ormation DSS CDSE~ 20 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Classi ed Markings for Emails
7/29/2019 DSS ClassifiedMarkings
21/43Marking Classi ed In ormation DSS CDSE~ 21 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Most foreign governments, as well as NATO, use threeclassi cation markings that generally equate to U.S.TOP SECRET, SECRET, and CONFIDENTIAL. Manyof the governments also have a fourth classi cationmarking, RESTRICTED, for which there is no U.S.equivalent. NATO has a fth category of controlledinformation, NATO UNCLASSIFIED. Somegovernments also have unclassi ed informationprotected by law or national regulations that is treated,and provided to, other governments as in con denceinformation.
Mark portions that contain the Foreign GovernmentInformation to indicate the country of origin (trigraph)and the classi cation level. Substitute the wordsForeign Government Information or FGI wherethe identity of the speci c government must beconcealed. The identity of the concealed foreignsource in this example must be maintained with therecord copy and adequately protected.
Note: If the fact that information is foreign governmentinformation must be concealed, the markings described
here shall not be used and the document shall bemarked as if it were wholly of U.S. origin.
Note on the Declassify on line: FGI must be markedwith a declassi cation date of up to 25 years, unlessthe originating agency has applied for and receivedapproval from the ISCAP to exempt the FGI fromdeclassi cation at 25 years. Upon receipt of ISCAPapproval, the 25X6 or 25X9 exemption markings,as appropriate, may be used in the Declassify online followed by a date that has been approved by theISCAP.
SECRETOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
February 15, 2010MEMORANDUM FOR THE DIRECTOR
From: John E. Doe, Chief Division 5SUBJECT: (U) Foreign Government Information
1. (U) This paragraph contains unclassi ed informationbut the letter is classi ed based on a classi ed attachment
2. (C) Paragraph 1 contains classi ed information froma U.S. source document. Therefore, this portion will bemarked with the designation C in parentheses.
3. (S) (Country of Origin S) Paragraph 2 containsclassi ed information marked Secret by the country oforigin. Therefore, this portion will be marked to indicatethe country of origin and the level of classi cation.
Classi ed By: John E. Doe, Chief Division 5Derived From: Multiple SourcesDeclassify On: 20350215
THIS DOCUMENT CONTAINS (COUNTRY OFORIGIN) INFORMATION
SECRET
Foreign Government Information
7/29/2019 DSS ClassifiedMarkings
22/43Marking Classi ed In ormation DSS CDSE~ 22 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Information Determined Releasable to Foreign NationalsInformation that has been determined releasable throughestablished foreign disclosure procedures to foreign nationals,international organizations or multinational forces will be
marked Releasable to USA with the applicable country trigraph,international organization or multinational forces tetragraph.
REL TO shall only be used with Top Secret, Secret orCon dential information.
Letters of Transmittal
Transmittal documents are documents that have informationenclosed with or attached to them. An example is a letter,memo, or staff summary sheet with classi ed enclosures. Thetransmittal document itself may or may not contain classi edinformation.
a. Mark the banner line of an unclassi ed transmittaldocument with the highest classi cation level of any informationtransmitted by it. Also mark the transmittal document with anappropriate instruction indicating that it is unclassi ed whenseparated from the classi ed enclosures (e.g., Unclassi edwhen separated from classi ed enclosures or Unclassi edwhen Attachment 2 is removed).
1. If any dissemination control markings apply to the transmittaldocument or any enclosure, include them on the banner line ofthe transmittal document.
2. Unclassi ed transmittal documents do not require portionmarking or a classi cation authority block.
3. It is not necessary to use a banner line on interior pages of anunclassi ed transmittal document.
4. All of the markings required herein, including a classi cationauthority block, shall appear on the classi ed enclosure(s) orattachment(s).
5. If any special notice (e.g., NATO, RD, FRD, or exportcontrol) applies to the transmittal document or the enclosure(s),include a statement on the face of the transmittal documenthighlighting inclusion of the information. Unless directedotherwise by applicable policy or regulation, a statementsimilar to Document transmitted herewith contains [levelof classi cation] RESTRICTED DATA or This documentcontains NATO [level of classi cation] information will suf ce.
SECRET Releasable to USA//CAN
OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, DC
June 23, 2005
MEMORANDUM FOR DASD(I&S)
SUBJECT: (U) Foreign Government Information
1. Marking should re ect (S//REL TO USA, CAN) Thisparagraph contains information marked Secret by thegovernment of Canada. Therefore, this paragraph will bemarked with the trigraph of the country of origin and thdesignation S in parenthesis.
USD(I)
Classi ed by: Paul Smith, AnalysisDerived from: Multiple SourcesDeclassify on: 20130331
SECRET Releasable to USA//CAN
SECRETOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
June 3, 2005MEMORANDUM FOR DASD(I&S) SUBJECT: (U) Letters of Transmittal
Document must be portion marked if classi ed and haveappropriate classi cation authority block instructions.
Mary FrankChief, ASDG
Attachment:1. Secret USD(I) Memorandum, 10/25/05, Subj:Markings
Unclassi ed when separated from classi ed enclosures
SECRET
7/29/2019 DSS ClassifiedMarkings
23/43
7/29/2019 DSS ClassifiedMarkings
24/43Marking Classi ed In ormation DSS CDSE~ 24 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
SECRET//RESTRICTED DATA-NOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC28 July 2005
MEMORANDUM FOR DEPSECDEF SUBJECT: (U) Atomic Energy Act of 1954
1. (S//RD) Documents containing Restricted Data or Formerly Restricted Data as de ned by theAtomic Energy Act of 1954, should have abbreviated markings (RD or FRD) included with theclassi cation marking (S//RD).
a. (S//FRD) This paragraph contains Secret Formerly Restricted Data only. RD markings will not
be applied.b. (S//RD-N) Critical Nuclear Weapon Design Information (CNWDI) shall be marked with an Ninside the parentheses following the RD portion marking.
2. (U) Special warning notices are applied to RD, FRD, and CNWDI. If a document combines both asdepicted here, only the RD warning notice is af xed. No declassi cation instructions are used *.
Albert StrangeloveUSD(I)
Classi ed by: John E. Doe, Division ChiefDerived from: SCG title and dateDeclassify on:Not applicable to RD/FRD portions. See source list for NSI portions.
SECRET//RESTRICTED DATA-N
Section 5 - a toMic e nerGy i nforMation
Warning Notices:
RESTRICTED DATAThis document contains Restricted Data as de ned in the Atomic Energy Act of 1954. Unauthorizeddisclosure subject to administrative and criminal sanctions. RD and FRD are speci cally excluded fromthe provisions of the Executive Order, stating such information shall be handled, protected, classi ed,downgraded, and declassi ed as required by provisions of the Atomic Energy Act of 1954, as amendedand regulations issued under that Act.
Only Department of Energy (DoE) may originally classify or declassify RD.
RESTRICTED DATAThis document contains Restricted Data asde ned in the Atomic Energy Act of 1954.
Unauthorized disclosure subject to
administrative and criminal sanctions.
7/29/2019 DSS ClassifiedMarkings
25/43Marking Classi ed In ormation DSS CDSE~ 25 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Warning Notices:
FORMERLY RESTRICTED DATA
Unauthorized disclosure subject to administrative and criminal sanctions. Handle as Restricted Data in foreigndissemination. Section 144b, Atomic Energy Act of 1954.
CNWDICritical Nuclear Weapon Design Information DoD Directive 5210.2 applies.CNWDI is the DoD designation for TOP SECRET RD or SECRET RD weapons data that reveals the theoryoperation or design of the components of a thermonuclear or ssion bomb, warhead, demolition munitions, or tdevice. The designation CNWDI speci cally excludes information concerning arming, fusing, and ring systems;limited-life components; and total contained quantities of ssionable, fusionable, and high-explosive materialsby type.
Commingling RD and FRD with NSITo the extent practicable, the commingling in the same document of RD or FRD with information classi ed unthe Order should be avoided. When it is not practicable to avoid such commingling, the marking requirementsthe Order and the Directive, as well as the marking requirements in 10 C.F.R. Part 1045, Nuclear Classi caand Declassi cation, must be followed.For commingled documents, the Declassify on line shall not includedeclassi cation date or event and shall instead be annotated with Not Applicable (or N/A) to RD/FRD portionand See source list for NSI portions. The source list, as described in 32 C.F.R. Part 2001.22(c)(1)(ii), sinclude the declassi cation instruction for each of the source documents classi ed under the Order and shall nappear on the front page of the document.
*E.O. 13526 does not apply to Restricted Data or Formerly Restricted Data. DoD does not originate RDFRD; therefore, all documents should re ect the Derived from: byline. For additional guidance, see your securiof cer.
7/29/2019 DSS ClassifiedMarkings
26/43Marking Classi ed In ormation DSS CDSE~ 26 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 6 - S pecial a cceSS p roGraMS
Special Access Programs (SAPs) are established in accordance with Chapter 8, DoD 5200.1-R, InformationSecurity Program Regulation. SAPs are created only when absolutely necessary to protect the Nations most
sensitive and critical information or when required by statutes. Establishment must be consistent with law, policyand regulations, and be based on a determination that the threat and/or vulnerability (e.g., sensitivity or valuethe information) warrants enhanced protection.
Any DoD program or activity employing enhanced security measures exceeding those normally required forinformation at the same classi cation level must be established, approved, and managed as a DoD SAP. Examplof such enhanced security measures include:
Use of any special terminology, including code words, other than an unclassi ed nickname, to identior control information dissemination
Personnel security investigative or adjudicative requirements more stringent than those requiredfor a comparable level of classi ed information Specialized non-disclosure agreements Exclusion of a classi ed contract (use of a carve-out); or A central billet system to control the number of personnel authorized access
Some DoD programs which operate under the above enhanced procedures are considered to be SAPs, including:(I) Programs managed under special delegation authorities previously approved by the Secretary of Defense oDeputy Secretary of Defense; (II) Programs sponsored by other departments or agencies, but for which Doparticipants manage internal DoD security controls (e.g., DoD-managed subcompartments of larger, non-DoD
SAPs, etc.); and, (III) Programs conducted in support of, or in cooperation with, other departments, agenciebranches of government, or other governments. SAPs may only be approved by the Secretary of Defense orDeputy Secretary of Defense.
To differentiate a nickname from a codeword, remember that: A nickname is a combination of two unassociated and unclassi ed words Nicknames are normally typed in ALL CAPS A codeword is a single word assigned a classi ed meaning by appropriate authority The codeword is classi ed Con dential or higher All nicknames and codewords are issued through the DoD Components (usually SAP channels)
and strictly controlled
The unclassi ed examples on the following two pages depict common markings for SAP documents.The examples are for illustrative use only. The format for markings should be adjusted to accommodatesoftware applications and production ef ciency. For instance, the examples show the overall classi cation andnickname/codeword in the header and the overall classi cation and special access requirement in the footer.
7/29/2019 DSS ClassifiedMarkings
27/43Marking Classi ed In ormation DSS CDSE~ 27 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
SAP Nicknames
SAPs use nicknames for control of dissemination and need-to-know. Nicknames are assigned to the programwhen the SAP is approved. Nicknames are designated by two unassociated words, which are unclassi ed bthemselves (e.g., TWISTED FEATHER, etc.).
TOP SECRET//TWISTED FEATHEROFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
July 28, 2005MEMORANDUM FOR SPECIAL ACCESS PROGRAM CENTRAL
OFFICESSUBJECT: (U) Identi cation and Marking of Classi ed Documents
1. (U) This paragraph contains Unclassi ed information.
2. (C) This paragraph contains non-SAP national security information.
3. (TS//TF) This paragraph contains TOP SECRET informationrelated to the special access program TWISTED FEATHER. Portionmarkings are the same as previously described in this marking guide.The exception is the addition of the nickname digraph following the TSdesignation.
Maxwell SmartDirector, Special Programs
USD(I)Attachment:Classi ed by: Maxwell Smart, Director, USD(I)Reason: 1.6(a) and (g)Declassify on: 20151231
TOP SECRET//TWISTED FEATHER
A SAP digraph or trigraph is a 2 or 3 letter designator given to each SAP. In this example, TF shown here repthe nickname TWISTED FEATHER. A nickname, codeword, trigraph, and/or digraph may be substituted forthe term SPECIAL ACCESS Channels. Refer to the SAP Security Procedure Guide for instructions.
Highest classi cation andprogram nickname areconspicuously placed atthe top and bottom.
Paragraph markings in SAPdocuments should containthe highest classi cationwithin the paragraph, andbe followed by the SAPdigraph.
7/29/2019 DSS ClassifiedMarkings
28/43Marking Classi ed In ormation DSS CDSE~ 28 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
SAP Codewords
In addition to nicknames, SAPs also use codewords for control of dissemination and a need-to-know. Codewordlike nicknames, are assigned to the program when the SAP is approved. A codeword is a single word w
classi ed meaning.
TOP SECRET//CODEWORD(S)OFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
July 28, 2005MEMORANDUM FOR SPECIAL ACCESS PROGRAM CENTRAL
OFFICESSUBJECT: (U) Identi cation and Marking of Classi ed Documents
1. (U) This paragraph contains Unclassi ed information.
2. (TS//CW) This paragraph re ects TOP SECRET information controlled in the CODE WORD classi ed program.
Maxwell SmartDirector, Special Programs
USD(I)
Classi ed By: Maxwell Smart, Director USD (I)Derived from: CODEWORD SCG, dtd _____Declassify on: 20151231
TOP SECRET//CODEWORD(S)
Highest classi cation andprogram codeword areconspicuously placed at thetop and bottom.
Paragraph markings in SAPdocuments should containthe highest classi cationwithin the paragraph, andbe followed by the SAPdigraph.
7/29/2019 DSS ClassifiedMarkings
29/43Marking Classi ed In ormation DSS CDSE~ 29 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 7 - i ntelliGence i nforMation
Additional security controls and markings are established for intelligence information. The DoD Components ofthe IC and personnel working with intelligence information shall refer to IC Directive (ICD) 710, Classi catio
and Control Markings System, issued by the Of ce of the Director of National Intelligence (ODNI); SpecialSecurity Center (SSC) Controlled Access Program Coordination Of ce (CAPCO); and the IC Classi cationand Control Markings Implementation Manual for guidance on marking and dissemination of classi ed and theunclassi ed intelligence information.
TOP SECRET//NOFORN//ORCONOFFICE OF THE SECRETARY OF DEFENSE
WASHINGTON, DC
July 28, 2005MEMORANDUM FOR DIRECTOR, DEFENSE INTELLIGENCEAGENCY
SUBJECT: (U) Marking of Classi ed Intelligence Information
1. (S//NF) This paragraph contains Secret No ForeignDissemination information. Portion markings are the same aspreviously described in this marking guide. The exception isthe addition of the intelligence marking digraph following the Sdesignation.2. (TS//OC) This paragraph contains Top Secret OriginatorControlled information. Portion markings are the same as previously
described in this marking guide. The exception is the addition of theintelligence marking digraph following the TS designation.3. (U) Conspicuously mark the top and bottom of the document withthe overall classi cation.
James BondDirector, Intelligence Programs
USD(I)
Classi ed by: James Bond, DirectorDerived from: DNI SCG 259, 5/7/04Declassify on: 20151231
TOP SECRET//NOFORN//ORCON
The chart on the next pagewill identify several of themost common intelligencecaveat designations.
7/29/2019 DSS ClassifiedMarkings
30/43Marking Classi ed In ormation DSS CDSE~ 30 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Designation Abbreviation DigraphDISSEMINATION AND EXTRATION OF INFORMATIONCONTROLLED BY ORIGINATOR Tis marking is used only on classi ed intelligence that clearly identi es or wouldreasonably permit ready identi cation o intelligence sources or methods thatare particularly susceptible to countermeasures that would nulli y or measurably reduce their efectiveness. It is used to enable the originator to maintaincontinuing knowledge and supervision o distribution o the intelligence beyondits original dissemination.
ORCON OC
CAUTION-PROPRIETARY INFORMATION INVOLVEDTis marking is used with, or without, a security classi cation level marking,to identi y in ormation provided by a commercial rm or private source underan expressed or implied understanding that the in ormation shall be protected
as a trade secret or proprietary data believed to have actual or potential value.Tis marking may be used on U.S. Government Proprietary data only whenthe U.S. Government proprietary in ormation can provide a contractor(s) anun air advantage such as U.S. Government budget or nancial in ormation.
PROPIN PR
NOT RELEASABLE TO FOREIGN NATIONALSTis marking is used to identi y intelligence that alls under the criteria o DCID 6/7, Foreign Disclosure, that the originator has determined may notbe disclosed or released, in any orm, to oreign governments, internationalorganizations, coalition partners, oreign nationals, or immigrant alienswithout originator approval. Tis marking is not authorized or use inconjunction with the AU HORIZED FOR RELEASE O (REL O)marking.
NOFORN NF
AUTHORIZED FOR RELEASE TO (name of country(ies)/internationalorganization)Within the DoD, the REL O control marking is authorized or use on ALLclassi ed de ense in ormation.REL O identi es classi ed in ormation that has been determined in accordancewith established oreign disclosure processes to be releasable, or that has beenreleased through established oreign disclosure procedures and channels, to the
oreign country(ies) and/or international organization(s) indicated.REL O shall not be used with NOFORN or EYES ONLY in the banner line.
REL O
CONTROLLED IMAGERYTis control marking is used on Secret or above and is used to protect sourcesand analytic methods associated with the geospatial intelligence discipline thatare particularly vulnerable to countermeasures, and i disclosed or released couldnegate or measurably reduce the efectiveness o those methodologies.
IMCON
7/29/2019 DSS ClassifiedMarkings
31/43Marking Classi ed In ormation DSS CDSE~ 31 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 8 - M arkinG i nforMation o ther t han d ocuMentS
Charts, Maps, Equipment, Drawings, and PhotographsWhen classi ed information is contained in computer or other electronic media, audiovisual media, chart andmaps, or other media (including hardware, equipment, and facilities) not commonly thought of as documents,the requirement remains to identify as clearly as possible the information that requires protection, the level oprotection required, and its duration. The main concern is that holders and users of the material are clearly noof the presence of classi ed information. If it is not feasible to mark such information, an explanatory statemshall be included on or with the information that explains exactly what information is and is not classiOther markings normally required for classi ed documents shall also be made available, either on the item ordocumentation that accompanies it.
Mark blueprints, engineering drawings, charts, maps, and similar items not contained in a classi ed documentwith the appropriate overall classi cation and dissemination control markings. The classi cation marking shall beunabbreviated, conspicuous, and applied top and bottom, if possible, in such a manner as to ensure reproduction any copies. The legend or title shall also be portion marked to show classi cation of the legend or titthe blueprints, maps, and other items are large enough that they are likely to be rolled or folded, the classi camarkings shall be placed to be visible when the item is rolled or folded.
SECRET
SECRET
7/29/2019 DSS ClassifiedMarkings
32/43Marking Classi ed In ormation DSS CDSE~ 32 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Hardware and EquipmentIf the required information is stored in readily accessible format on the device, it does not have to be markthe outside of the device. As an example, if classi ed les or documents prepared on an IT system areon a DVD or compact disc, and each le bears its own declassi cation instructions, the disc does not needmarked with declassi cation instruction. This is true with respect to most removable media containing classi edtext les and documents, even though a few of them may not have all of the prescribed markings. If the reinformation is not stored in readily accessible format on the device, it shall be marked on the outside of the d(normally with a sticker or tag) or placed on documents kept with the device.
7/29/2019 DSS ClassifiedMarkings
33/43Marking Classi ed In ormation DSS CDSE~ 33 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Rolled Documents
If the blueprints, maps and other items are large enough that they are likely to be rolled or folded, classi cmarkings must be placed to be visible when the item is rolled or folded.
Continuous Form (Fan Folded) Documents
Due to the volume and nature of printed products of Automated Information Systems (AIS), there are specprovisions for marking some of these types of documents. These provisions include classi cation markings oninterior pages of fan folded printouts. The AIS equipment may apply these markings even though they maymeet the normal test of being conspicuous.
Special control notices, identi cation of classi cation sources, and downgrading and declassi cation instructionsmust either be marked on the face of the document or be placed on a separate sheet of paper attached to theof the document.
7/29/2019 DSS ClassifiedMarkings
34/43Marking Classi ed In ormation DSS CDSE~ 34 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Photographic Media
Slides must have markings on the slide cover and on the actual image so when the slide is displayed on screeclassi cation is clearly identi ed. Applicable associated markings should be applied to the lead slide.
(1) Mark photographs and negatives with the overall classi cation and dissemination control markings applicablto information they contain. Mark photographs on the face, if possible. If this cannot be done, the classi cationdissemination control markings may be placed on the reverse side. Place other required markings on photograpalong with the classi cation marking, or include them in accompanying documentation. Digital photographs maybe edited to overlay markings on the face of the photograph.
(2) Mark roll negatives and positives, and other lm containing classi ed information with their overclassi cation and any dissemination control markings. These markings shall be placed on the lm itself,possible, and on the canister, if one is used. If placed on the lm itself, the marking shall be placed at bbeginning and end of the roll.
(3) Mark slides and transparencies with the overall classi cation and any control markings on the image arof the item and also on the border, holder, or frame. Place other required security markings on the rstor transparency in a set in the image area; on the border, holder, or frame; or in documentation accompanythe item. These additional markings are not needed on the other slides or transparencies; however, slidestransparencies that are permanently removed from a set shall be marked as a separate document. Information othe image area of each slide or transparency shall be portion marked.
a. Digital Video Discs (DVDs), Video Tapes, and Motion Picture Film. Mark DVDs, video tapes,motion picture lms with their classi cation and any control markings at the beginning and end of the presentat
(i.e., the played or projected portion). Other required security markings shall be placed at the beginning ofpresentation. Discs, reels and cassettes shall be marked with the overall classi cation of the item. When stin a container, the container shall be marked with the overall classi cation, applicable dissemination contromarkings, and other required markings.
b. Sound Recordings. Place an audible statement of overall classi cation and dissemination contrrequirements at the beginning and end of sound recordings. Reels or cassettes shall be marked with the ovclassi cation and any required dissemination control markings and stored appropriately. When stored incontainer, the container shall be marked with the overall classi cation, applicable dissemination control markings,and other required markings.
c. Micro lm, Micro che, and Similar Microform Media. Mark micro lm, micro che, and similmicroform media with their overall classi cation and applicable control markings in the image area that canread or copied. Such media shall have this marking applied so it is visible to the unaided eye. Other reqsecurity markings shall be placed on the item or included in accompanying documentation. Any containers shacontain all required markings, except no markings are required if the container is transparent and markings onmedia itself are clearly visible.
7/29/2019 DSS ClassifiedMarkings
35/43Marking Classi ed In ormation DSS CDSE~ 35 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Photographic Media Marking Examples
7/29/2019 DSS ClassifiedMarkings
36/43Marking Classi ed In ormation DSS CDSE~ 36 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Computer Media
Basic document markings apply to all media.
Computer discs must re ect the highest level of classi cation contained on the discs. Standard labels shouldused for all levels of classi cation.
SF-706 - Top Secret SF-707 - Secret SF-708 - Con dential SF-709 - Classi ed SF-710 - Unclassi ed SF-711 - Data Descriptor SF-712 - Classi ed SCI
If not otherwise marked, the SF classi cation labels listed above should be used to identify the highest lof classi ed information stored on information technology (IT) systems and removable electronic storagemedia. These labels may also be used on other forms of property to clearly identify the classi cation level oinformation contained in or on that item, when appropriate.
In an environment in which both classi ed and unclassi ed information is processed or stored, the SF-71Unclassi ed label shall be used to identify unclassi ed media or equipment. There is no requirement to use a710 label in environments where no classi ed information is created or used.
If the level of classi cation of the information on the medium changes (i.e., the information is declassi
downgraded, or upgraded), the label shall be wholly covered by the appropriate label for the new levelclassi cation.
If physical marking of the medium containingclassi ed information is not possible, then identi cationof classi ed information must be accomplished by othermeans (e.g., indelible marker, etc.).
7/29/2019 DSS ClassifiedMarkings
37/43Marking Classi ed In ormation DSS CDSE~ 37 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 9 - f or o fficial u Se o nly (fouo)
If a document has no classi ed information, the information must still be reviewed to see if it meets the eightexemptions under the Freedom of Information Act (FOIA) that would make it ineligible for public release. Such
information cannot be made public if or when the document is declassi ed. Mark unclassi ed portions applicablto FOIA exemptions with FOUO (For Of cial Use Only).
OFFICE OF THE SECRETARY OF DEFENSEWASHINGTON, D.C.
28 July 2005MEMORANDUM FOR DEPSECDEF SUBJECT: (U) Marking an Unclassi ed Document that Contains FOUO Information
1. (U//FOUO) FOUO portions within a classi ed document shall be marked (U//FOUO);however, FOUO shall not appear in the overall classi cation banner because the classi cationadequately protects the unclassi ed information, except when page markings are used to re ectthe classi cation of information on that page instead of the overall document classi cation.In that case, the banner line for unclassi ed pages with FOUO information shall be:UNCLASSIFIED//FOR OFFICIAL USE ONLY or UNCLASSIFIED//FOUO.
2. (U) Documents that are unclassi ed that contain FOUO information will be marked FOR
OFFICIAL USE ONLY at the bottom of the front cover (if there is one), the title page (if thereis one), the rst page, and the outside of the back cover (if there is one).
3. (U) FOUO documents and material transmitted outside of the Department of Defense mustbear an expanded marking on the face of the document so that non-DoD holders understand thestatus of the information. A statement similar to this one should be used:
This document contains informationexempt from mandatory disclosure under
the FOIA.Exemption(s) _____ apply.
Gloria MillerUSD(I)
7/29/2019 DSS ClassifiedMarkings
38/43Marking Classi ed In ormation DSS CDSE~ 38 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Freedom of Information Act (FOIA) Exemptions
Number Type of Information Exempted from Disclosure under FOIA
1 Information properly and currently classi ed in the interest of national defense or foreign policy, asspeci cally authorized under the criteria established by Executive Order 13526 and implementedby regulations, such as DoD 5200.1-R.
2 Information related solely to the internal personnel rules and practices of the Department ofDefense or any of its Components. This exemption is entirely discretionary. This exemption hastwo pro les: high and low.
High: When release of the records would allow circumvention of the records and wouldsubstantially hinder the effective performance of a signi cant function of DoD.
Low: When only a minimum Government interest would be affected (administrativeburden), there is a great potential for discretionary disclosure of the information.Consequently, DoD Components shall not invoke the low pro le.
3 Information that a statute speci cally exempts from disclosure by terms that permit nodiscretion on the issue, or in accordance with criteria established by that statute forwithholding or referring to particular types of matters to be withheld. Examples include:Patent Secrecy, 35 U.S.C. 181-188
Restricted Data and Formerly Restricted Data, 42 U.S.C. 2162 Communication Intelligence, 18 U.S.C. 798 Authority to Withhold From Public Disclosure Certain Technical Data, 10 U.S.C. 130 and
DoD Directive 5230.25 Physical Protection of Special Nuclear Material: Limitation on Dissemination of
Unclassi ed Information, 10 U.S.C. 128
Protection of Contractor Submitted Proposals, 10 U.S.C. 2305(g) 4 Information such as trade secrets or commercial or nancial information received.4 Information such as trade secrets or commercial or nancial information received from a person or
organization outside the Government on a privileged or con dential basis and when the disclosureof the information is likely to cause substantial harm to the competitive position of the sourceproviding the information; impair the Governments ability to obtain necessary information inthe future; or impair some other legitimate Government interest. If the information quali es asExemption 4 information, there is no discretion in its release.
5 Information considered privileged in litigation, primarily under the deliberative process privilege.In order to meet the test of this exemption, the record must be both deliberative in nature, as wellas part of a decision-making process. Merely being an internal record is insuf cient basis forwithholding under this exemption. Also potentially exempted are records pertaining to the attorney-client privilege and the attorney work-product privilege. This exemption is entirely discretionary.
6 Personal information (including personnel and medical les) that, if disclosed to a requester,other than the person about whom the information is about, would result in a clearly unwarrantedinvasion of personal privacy. Release of information about an individual contained in a Privacy ActSystem of records that would constitute a clearly unwarranted invasion of privacy is prohibited,and could subject the releaser to civil and criminal penalties. If the information quali es asExemption 6 information, there is no discretion in its release.
7/29/2019 DSS ClassifiedMarkings
39/43Marking Classi ed In ormation DSS CDSE~ 39 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
7 Records or information compiled for law enforcement purposes; i.e., civil, criminal, or militarylaw, including the implementation of Executive Orders or regulations issued pursuant to law. This
exemption may be invoked to prevent disclosure of documents not originally created for, but latergathered for law enforcement purposes.
With two exceptions, this exemption is discretionary. There is no discretion if release of theinformation could reasonably be expected to (I) to be an unwarranted invasion of the personalprivacy of a living person, including surviving family members of an individual identi ed insuch a record or (II) endanger the life or physical safety of any individual.
8 Certain records related to examination, operation or condition reports prepared by, on behalf of, or for the use of any Agency responsible for the regulation or supervision of nancialinstitutions.
9 Geological and geophysical information and data (including maps) concerning wells.
7/29/2019 DSS ClassifiedMarkings
40/43Marking Classi ed In ormation DSS CDSE~ 40 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Section 10 - t echnical d ocuMentS
All DoD activities generating or responsible for DoD technical documents and other forms of data shall determithe appropriate distribution and mark these materials with a DoD Distribution Statement before they can b
disseminated.
Distribution statements are used on classi ed and unclassi ed scienti c and technical documents to identify thdocuments availability for distribution, release, and disclosure without additional approvals and authorizationsfrom the controlling DoD of ce (CDO). Each statement provides four pieces of information as illustrated belowto facilitate secondary distribution and release:
Public U.S. individuals or U.S.
companies DoD components and
DoD contractors
Foreign governmentinformation
Property information
Test evaluation
Critical technology
Premature dissemination
Software documentation
Contractor
The DoD activity that sponsored thework that generated the technicaldata or received the technical data onbehalf of the Department of Defenseand, therefore, has the responsibilityfor determining the distribution of adocument containing such technicaldata. The CDO may be different thanthe originating of ce.
Authorized audience
Reason for restriction
Identity of the CDO
Date of Publication
7/29/2019 DSS ClassifiedMarkings
41/43Marking Classi ed In ormation DSS CDSE~ 41 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Distribution Statement AApproved for public release: distribution is unlimited
Distribution Statement _____ (Fill in Level: B, C, D, or E)Distribution authorized to __________ (Fill in audience; see Note 1); __________ (Fill in reason; see
Note 2); __________ ( ll in date of determination). Other requests for this document shall be referred to__________ (insert name of DoD Controlling Of ce).
Note 1:B = U.S. Government Agencies onlyC = U.S. Government Agencies and their contractors onlyD = DoD and U.S. DoD contractors onlyE = DoD Components only
Note 2:Reasons
Foreign Government Information Proprietary Information Test and Evaluation Contractor Performance Evaluation Critical Technology Premature Dissemination Software Documentation Administrative/Operational Use
Table 1. Authorized Distribution StatementsDISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited.
DISTRIBUTION STATEMENT B. Distribution authorized to U.S. Government Agencies only ( ll inreason) (date of determination). Other requests for this document shallbe referred to (insert controlling DoD of ce).
DISTRIBUTION STATEMENT C. Distribution authorized to U.S. Government Agencies and theircontractors ( ll in reason) (date of determination). Other requests forthis document shall be referred to (insert controlling DoD of ce).
DISTRIBUTION STATEMENT D. Distribution authorized to the Department of Defense and U.S. DoDcontractors only ( ll in reason) (date of determination). Other requestsshall be referred to (insert controlling DoD of ce).
DISTRIBUTION STATEMENT E. Distribution authorized to DoD Components only ( ll in reason) (date
of determination). Other requests shall be referred to (insert controllingDoD of ce).
DISTRIBUTION STATEMENT F. Further dissemination only as directed by (inserting controlling DoDof ce) (date of determination) or higher DoD authority.
DISTRIBUTION STATEMENT X. Distribution authorized to U.S. Government Agencies and privateindividuals or enterprises eligible to obtain export controlled technicaldata in accordance with DoDD 5230.25, Withholding of Unclassi edTechnical Data From Public Disclosure, (date of determination).Controlling DoD of ce is (insert).
7/29/2019 DSS ClassifiedMarkings
42/43Marking Classi ed In ormation DSS CDSE~ 42 ~
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
Distribution Statement XDistribution authorized to U.S. Government Agencies and private individuals or enterprises eligible toobtain export-controlled technical data in accordance with __________ (Insert appropriate regulation);
__________ ( ll in date of determination). DoD Controlling Of ce is __________ (insert name of DoDControlling Of ce). (See Note 3).
Note 4:Distribution Statement F is normally used only on classi ed technical documents, but may beused on unclassi ed technical documents when speci c authority exists (e.g., designation asdirect military support as in Statement E). Distribution Statement F is also used when the DoDoriginator determines that information is subject to special dissemination limitation.
Note 3:The audience(s) and reason(s) are inherent in the wording of the statement.
Distribution Statement FFurther dissemination only as directed by __________ (insert name of DoD Controlling Of ce or higher
DoD authority); __________ (Insert date of determination). (See Note 4).
7/29/2019 DSS ClassifiedMarkings
43/43
D E F E N
S E
S E C U R I T Y S E R
V I
C E
U N
I T E D
S T A T E S O F A M
E R I C
A
Center for Development of Security Excellenc
Learn. Perform. Protect.
a ppendix a - r eferenceS
The following directives, instructions, and other publications describe DoD policy and requirements for markinginformation and/or identify policy constraints on the dissemination of information created by or for DoD or und
DoDs control.
1. Executive Order 13526, Classi ed National Security Information, December 29, 2009
2. National Archives and Records Administration Implementing Directive No. 1 to Executive Order 13526,June 28, 2010
3. DoD Directive 3200.12, DoD Scienti c and Technical Information (STI) Program (STIP), February11, 1998
4. DoD Directive 5205.07, Special Access Program (SAP) Policy, July 1, 2010
5. DoD Directive 5210.2, Access to and Dissemination of Restricted Data, January 12, 1978; Change 1
February 13, 1980; Change 2, April 3, 1981; Change 3, November 16, 19946. DoD Directive 5230.9, Clearance of DoD Information for Public Release, April 9, 1996; Change 1,
July 15, 1999
7. DoD Directive 5230.11, Disclosure of Classi ed Military Information to Foreign Governments andInternational Organizations, June 16, 1992
8. DoD Directive 5230.24, Distribution Statements on Technical Documents, March 18, 1987
9. DoD Directive 5230.25, Withholding of Unclassi ed Technical Data from Public Disclosure,November 6, 1984; Change 1, August 18, 1995
10. DoD Directive 5400.07, DoD Freedom of Information Act (FOIA) Program, January 2, 2008
11. DoD Directive 5400.11, DoD Privacy Program, May, 8, 2007
12. DoD Directive 8910.1, Management and Control of Information Requirements, June 11, 1993
13. DoD Instruction 3200.14, Principles and Operational Parameters of the DoD Scienti c and TechnicalProgram, May 13, 1997; Change 1, June 5, 1998; Change 2, March 20, 2000; Change 3, June 28, 20
14. DoD Instruction 5200.1, DoD Information Security Program and Protection of SensitiveCompartmented Information, October 9, 2008
15. DoD Instruction 5230.27, Presentation of DoD-Related Scienti c and Technical Papers at Meetings,October 6, 1987
16. DoD Instruction 5230.29, Security and Policy Review of DoD Information for Public Release,January 8, 2009
17. DoD Regulation 5200.1-R, Information Security Program Regulation, January 17, 1996
18. DoD Regulation 5400.7-R, DoD Freedom of Information Act Program,