Managing Sensitive Information
DOD Can More Effectively Reduce the Risk of Classification Errors
Gao ID: GAO-06-706 June 30, 2006
Misclassification of national security information impedes effective information sharing, can provide adversaries with information to harm the United States and its allies, and incurs millions of dollars in avoidable administrative costs. As requested, GAO examined (1) whether the implementation of the Department of Defense's (DOD) information security management program, effectively minimizes the risk of misclassification; (2) the extent to which DOD personnel follow established procedures for classifying information, to include correctly marking classified information; (3) the reliability of DOD's annual estimate of its number of classification decisions; and (4) the likelihood of DOD's meeting automatic declassification deadlines.
A lack of oversight and inconsistent implementation of DOD's information security program are increasing the risk of misclassification. DOD's information security program is decentralized to the DOD component level, and the Office of the Under Secretary of Defense for Intelligence (OUSD(I)), the DOD office responsible for DOD's information security program, has limited involvement with, or oversight of, components' information security programs. While some DOD components and their subordinate commands appear to manage effective programs, GAO identified weaknesses in others in the areas of classification management training, self-inspections, and classification guides. For example, training at 9 of the 19 components and subordinate commands reviewed did not cover fundamental classification management principles, such as how to properly mark classified information or the process for determining the duration of classification. Also, OUSD(I) does not have a process to confirm whether self-inspections have been performed or to evaluate their quality. Only 8 of the 19 components performed self-inspections. GAO also found that some of the DOD components and subordinate commands that were examined routinely do not submit copies of their security classification guides, documentation that identifies which information needs protection and the reason for classification, to a central library as required. Some did not track their classification guides to ensure they were reviewed at least every 5 years for currency as required. Because of the lack of oversight and weaknesses in training, self-inspection, and security classification guide management, the Secretary of Defense cannot be assured that the information security program is effectively limiting the risk of misclassification across the department. GAO's review of a nonprobability sample of 111 classified documents from five offices within the Office of the Secretary of Defense shows that, within these offices, DOD personnel are not uniformly following established procedures for classifying information, to include mismarking. In a document review, GAO questioned DOD officials' classification decisions for 29--that is, 26 percent of the sample. GAO also found that 92 of the 111 documents examined (83 percent) had at least one marking error, and more than half had multiple marking errors. While the results from this review cannot be generalized across DOD, they are consistent with the weaknesses GAO found in the way DOD implements its information security program. The accuracy of DOD's classification decision estimates is questionable because of the considerable variance in how these estimates are derived across the department, and from year to year. However, beginning with the fiscal year 2005 estimates, OUSD(I) will review estimates of DOD components. This additional review could improve the accuracy of DOD's classification decision estimates if methodological inconsistencies also are reduced.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-06-706, Managing Sensitive Information: DOD Can More Effectively Reduce the Risk of Classification Errors
This is the accessible text file for GAO report number GAO-06-706
entitled 'Managing Sensitive Information: DOD Can More Effectively
Reduce the Risk of Classification Errors' which was released on June
30, 2006.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Chairman, Subcommittee on National Security, Emerging
Threats, and International Relations, Committee on Government Reform,
House of Representatives:
United States Government Accountability Office:
GAO:
June 2006:
Managing Sensitive Information:
DOD Can More Effectively Reduce the Risk of Classification Errors:
GAO-06-706:
GAO Highlights:
Highlights of GAO-06-706, a report to the Chairman, Subcommittee on
National Security, Emerging Threats, and International Relations,
Committee on Government Reform, House of Representatives
Why GAO Did This Study:
Misclassification of national security information impedes effective
information sharing, can provide adversaries with information to harm
the United States and its allies, and incurs millions of dollars in
avoidable administrative costs. As requested, GAO examined (1) whether
the implementation of the Department of Defense‘s (DOD) information
security management program, effectively minimizes the risk of
misclassification; (2) the extent to which DOD personnel follow
established procedures for classifying information, to include
correctly marking classified information; (3) the reliability of DOD‘s
annual estimate of its number of classification decisions; and (4) the
likelihood of DOD‘s meeting automatic declassification deadlines.
What GAO Found:
A lack of oversight and inconsistent implementation of DOD‘s
information security program are increasing the risk of
misclassification. DOD‘s information security program is decentralized
to the DOD component level, and the Office of the Under Secretary of
Defense for Intelligence (OUSD(I)), the DOD office responsible for
DOD‘s information security program, has limited involvement with, or
oversight of, components‘ information security programs. While some DOD
components and their subordinate commands appear to manage effective
programs, GAO identified weaknesses in others in the areas of
classification management training, self-inspections, and
classification guides. For example, training at 9 of the 19 components
and subordinate commands reviewed did not cover fundamental
classification management principles, such as how to properly mark
classified information or the process for determining the duration of
classification. Also, OUSD(I) does not have a process to confirm
whether self-inspections have been performed or to evaluate their
quality. Only 8 of the 19 components performed self-inspections. GAO
also found that some of the DOD components and subordinate commands
that were examined routinely do not submit copies of their security
classification guides, documentation that identifies which information
needs protection and the reason for classification, to a central
library as required. Some did not track their classification guides to
ensure they were reviewed at least every 5 years for currency as
required. Because of the lack of oversight and weaknesses in training,
self-inspection, and security classification guide management, the
Secretary of Defense cannot be assured that the information security
program is effectively limiting the risk of misclassification across
the department.
GAO‘s review of a nonprobability sample of 111 classified documents
from five offices within the Office of the Secretary of Defense shows
that, within these offices, DOD personnel are not uniformly following
established procedures for classifying information, to include
mismarking. In a document review, GAO questioned DOD officials‘
classification decisions for 29”that is, 26 percent of the sample. GAO
also found that 92 of the 111 documents examined (83 percent) had at
least one marking error, and more than half had multiple marking
errors. While the results from this review cannot be generalized across
DOD, they are consistent with the weaknesses GAO found in the way DOD
implements its information security program.
The accuracy of DOD‘s classification decision estimates is questionable
because of the considerable variance in how these estimates are derived
across the department, and from year to year. However, beginning with
the fiscal year 2005 estimates, OUSD(I) will review estimates of DOD
components. This additional review could improve the accuracy of DOD‘s
classification decision estimates if methodological inconsistencies
also are reduced.
GAO also found that, without the involvement of other federal agencies,
DOD was unlikely to fully meet automatic declassification deadlines set
in Executive Order 12958, as amended. If DOD fails to complete its
review by the declassification deadlines, it risks inappropriately
declassifying information that should remain classified.
What GAO Recommends:
To reduce the risk of misclassification and improve DOD‘s information
security operations, GAO is recommending six actions, including several
to increase program oversight and accountability. In reviewing a draft
of this report, DOD concurred with GAO‘s recommendations. DOD also
provided technical comments, which we have included as appropriate.
[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-706].
To view the full product, including the scope and methodology, click on
the link above. For more information, contact Davi M. D'Agostino at
(202) 512-5431 or dagostinod@gao.gov.
[End of Section]
Contents:
Letter:
Results in Brief:
Background:
DOD'S Information Security Program Lacks Oversight and Consistent
Implementation:
Results of OSD Document Review Show Some Questionable Classification
Decisions and Numerous Marking Errors:
The Accuracy of DOD's Classification Decisions Estimate Is
Questionable:
DOD's Ability to Meet All of the Executive Order's Automatic
Declassification Deadlines Depends on the Actions of Other Federal
Agencies:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: Comments from the Department of Defense:
Appendix III: GAO Contact and Staff Acknowledgments:
Tables:
Table 1: Classification Level and the Expected Impact of Unauthorized
Disclosure:
Table 2: DOD Component Training Programs for Derivative Classifiers:
Table 3: Tracking of Security Classification Guides Varies among DOD
Components:
Table 4: Required Markings on Classified Records:
Table 5: Examples of Common Marking Errors in OSD Document Sample:
Figures:
Figure 1: DOD's Number of Classification Decisions Compared to Those of
Other Federal Agencies:
Figure 2: Distribution of Marking Errors Detected in OSD Document
Sample (n = 213 errors):
Figure 3: DOD Automatic Declassification Activity in Fiscal Year 2004,
as Measured by the Number of Pages Declassified:
Figure 4: Locations of Army, Navy, Air Force, and Marine Corps
Automatic Declassification Sites:
Abbreviations:
DOD: Department of Defense:
GAO: Government Accountability Office:
ISOO: Information Security Oversight Office:
OSD: Office of the Secretary of Defense:
OUSD(I): Office of the Under Secretary of Defense for Intelligence:
United States Government Accountability Office:
Washington, DC 20548:
June 30, 2006:
The Honorable Christopher Shays:
Chairman, Subcommittee on National Security, Emerging Threats, and
International Relations:
Committee on Government Reform:
House of Representatives:
Dear Mr. Chairman:
The U. S. Government classifies information as Confidential, Secret, or
Top Secret if its unauthorized disclosure could damage the national
security of the United States.[Footnote 1] Since 1940, the
classification, safeguarding, and declassification of national security
information have been prescribed in a series of presidential executive
orders. The current order in effect, Executive Order 12958, Classified
National Security Information, as amended, defines the different
security classification levels, lists the types of information that can
be protected, and describes how to identify and mark classified
information.[Footnote 2]
According to data compiled by the Information Security Oversight Office
(ISOO), the office responsible for overseeing the government's
information security program, the number of classified records in
existence is unknown because there is no requirement to account for the
majority of these records. However; during the last 5 fiscal years that
data are available (2000 through 2004), federal agencies reported that
they created about 110 million new classified records, of which the
Department of Defense (DOD) was responsible for more than half (66.8
million).[Footnote 3] The former DOD Deputy Under Secretary of Defense
for Counterintelligence and Security testified in 2004 in a
congressional hearing that she believed the department overclassified
information, and she estimated that 50 percent of information may be
overclassified, to include overclassification between the
classification levels. An example would be the classifying of
information as Top Secret instead of Secret. The Director of ISOO in
the same hearing testified that information that should not be
classified is increasing, in violation of the Executive Order.
According to the Director, too much classification impedes effective
information sharing, too little classification can provide adversaries
with information to harm the United States and its allies; and
misclassification in general causes the department to incur millions of
dollars in avoidable administrative costs.
The Under Secretary of Defense for Intelligence is the senior DOD
official responsible for the direction, administration, and oversight
of DOD's information security program.[Footnote 4] DOD's current
implementing regulation, Information Security Program, was issued in
January 1997 and augmented with interim guidance in April 2004 to
reflect changes required by Executive Order 12958, as amended. The
regulation has decentralized the management of the program to the heads
of the various DOD components.[Footnote 5] Officials from the Office of
the Under Secretary of Defense for Intelligence (OUSD(I)) told us that
they expect to publish an updated version of the Information Security
Program in 2007 to replace the 1997 edition and the interim guidance.
As requested, we examined (1) whether the implementation of DOD's
information security management program effectively minimizes the risk
of misclassification; (2) the extent to which DOD personnel follow
established procedures for classifying information, to include
correctly marking classified information; (3) the reliability of DOD's
annual estimate of its number of classification decisions; and (4) the
likelihood of DOD's meeting automatic declassification deadlines. As
part of your request that we report on DOD's information security
program, we also reported in March 2006 on the Department of Defense
and Department of Energy programs to safeguard unclassified yet
sensitive information and we will report on the status of the
Department of Energy's information security program later this
year.[Footnote 6] In similar work, we recently issued a report on the
designation of sensitive security information at the Transportation
Security Administration[Footnote 7] and a report on the executive
branch agencies' current efforts to share sensitive homeland security
information among federal and nonfederal entities, and the challenges
posed by such information sharing.[Footnote 8] Finally, we are
currently reviewing the management of both unclassified yet sensitive
information and national security information within the Department of
Justice.
To evaluate whether DOD's information security program effectively
minimizes the risk of misclassification, the reliability of DOD's
annual classification decision estimate, and the likelihood of DOD's
meeting automatic declassification deadlines, we reviewed documentation
and met with officials responsible for setting information security
policy and implementation (such as training and oversight) from the
OUSD(I) and nine DOD components and 10 of their subordinate commands.
Collectively, these nine components are responsible for about 83
percent of the department's classification decisions. We compared the
DOD components' and subordinate commands' information security policies
and practices with the Executive Order 12958, as amended; the ISOO
directive, Classified National Security Information Directive No. 1;
the DOD regulation 5200.1-R, Information Security Program; and other
DOD implementing guidance.
To assess adherence to procedures in the Executive Order for
classifying information, we reviewed a nonprobability sample of 111
recently classified documents prepared by five offices within the
Office of the Secretary of Defense (OSD). Because the total number of
classified documents held by DOD is unknown, we did not pursue a
probability sampling methodology to produce results that could be
generalized to OSD or DOD. [Footnote 9]
We conducted our work between March 2005 and February 2006 in
accordance with generally accepted government auditing standards. A
more thorough description of our scope and methodology is provided in
appendix I.
Results in Brief:
A lack of oversight and inconsistent implementation of DOD's
information security program increase the risk of misclassification.
DOD's information security program is decentralized to the DOD
component level, and the OUSD(I) has limited involvement in, and
oversight of, components' information security programs. This office
does little monitoring or evaluating of the DOD components' information
security actions. Also, while some DOD components and subordinate
commands appear to manage their programs effectively, we identified
weaknesses in other components' and subordinate commands' training,
self-inspection, and security classification guide management. For
example, all of the DOD components and subordinate commands that we
reviewed offered the compulsory initial and annual refresher training
for personnel eligible to classify documents. However, classification
management training at 8 of the 19 components and subordinate commands
we reviewed did not cover fundamental classification management
principles, such as the markings that must appear on classified
information and the process for determining the duration of
classification. Also, the OUSD(I) did not have a process to confirm
whether required self-inspections had been performed or to evaluate
their quality, and did not prescribe in detail what self-inspections
should cover. We found that only 8 of the 19 DOD components and
subordinate commands performed these required self-inspections.
Instead, more than half of the 19 performed less rigorous staff
assistance visits. We also found that some of the DOD components and
subordinate commands that we examined did not routinely submit copies
of their security classification guides, documentation which identifies
what information needs protection and the reason for classification, to
a central library as required. Some did not track their security
classification guides to ensure they were current and reviewed every 5
years as required. As a result, DOD personnel cannot be assured that
they are using the most current information to derivatively classify
documents. DOD is studying ways to improve its current approach to
making security classification guides readily available,
departmentwide. Because of the lack of oversight and weaknesses in
training, self-inspections, and classification guide management, the
Secretary of Defense cannot be assured that the information security
program is effectively limiting the risk of misclassification across
the department.
Our review of a nonprobability sample of 111 classified DOD documents
from five OSD offices shows that, within these offices, DOD personnel
are not uniformly following established procedures for classifying
information, to include correctly marking classified information.
Executive Order 12958, as amended, lists criteria for what information
can be classified, and which markings are required on classified
records. In our review of the OSD documents, we questioned DOD
officials' classification decisions for 29 documents--that is, 26
percent of the sample. The majority of our questions centered around
two problems: the inconsistent treatment of similar information within
the same document, and whether all of the information marked as
classified met established criteria for classification. We also found
that 93 of the 111 documents we examined (84 percent) had at least one
marking error, and about half had multiple marking errors. For example,
we found that 25 percent of the 111 documents had improper
declassification instructions, and 42 percent of the documents failed
to provide information about their data sources--such as the names and
dates--as required. While the results from this review cannot be
generalized across DOD, they are indications of the lack of oversight
and inconsistency that we found in DOD's implementation of its
information security program.
The accuracy of DOD's annual estimate of its number of classification
decisions is questionable. Although ISOO issues guidance on how
components should calculate their classification decisions estimate, we
found considerable variance across the department and from year to year
in how this guidance was implemented. For example, DOD components
differed in the types of information they included in the count, the
number and types of lower echelon units included in the count, and
decisions as to when to count and for how long. In fiscal year 2005,
OUSD(I) began scrutinizing the estimates of its components before
consolidating and submitting them to ISOO for inclusion in its annual
report to the President.
DOD's ability to meet all of the automatic declassification deadlines
in Executive Order 12958, as amended, depends on the actions of other
federal agencies. DOD components reported being on pace to review their
documents of permanent historical value by December 31, 2006; however,
they told us that they are unlikely to review all of the documents
referred to them by other DOD components and non-DOD agencies before
2010, and special media (such as audio and video recordings) before
2012, the dates on which these records are scheduled to be
automatically declassified. DOD's progress in reviewing records that
contain classified information belonging to other federal agencies is
hampered by the absence of a federal government standard for annotating
these records, a centralized location within DOD or the federal
government to store these records, and, a common database that federal
agencies can use to track the status of these records. DOD's ability to
remove these impediments without the involvement of other federal
agencies is limited. If DOD fails to complete its review by the
declassification deadlines, it risks inappropriately declassifying
information that should remain classified.
To reduce the risk of misclassification and improve DOD's information
security operations, we are recommending six actions, including several
to increase program oversight and accountability. In commenting on our
draft, DOD agreed with all of our recommendations. DOD also provided
technical comments, which we have included as appropriate. The
department's response is reprinted in appendix II.
Background:
Executive Order 12958, Classified National Security Information, as
amended, specifies three incremental levels of classification--
Confidential, Secret, and Top Secret--to safeguard information
pertaining to the following:
* military plans, weapons systems, or operations;
* foreign government information;
* intelligence activities (including special activities), intelligence
sources/methods, cryptology;
* foreign relations/activities of the United States, including
confidential sources;
* scientific, technological, or economic matters relating to national
security, which includes defense against transnational terrorism;
* United States government programs for safeguarding nuclear materials
or facilities;
* vulnerabilities or capabilities of systems, installations,
infrastructures, projects, plans, or protection services relating to
the national security, which includes defense against transnational
terrorism; or:
* weapons of mass destruction.
The requisite level of protection is determined by assessing the damage
to national security that could be expected if the information were
compromised (see table 1).
Table 1: Classification Level and the Expected Impact of Unauthorized
Disclosure:
Classification levels: Confidential;
Expected impact of unauthorized disclosure: Damage.
Classification levels: Secret;
Expected impact of unauthorized disclosure: Serious damage.
Classification levels: Top Secret;
Expected impact of unauthorized disclosure: Exceptionally grave
damage.
Source: Executive Order 12958, §1.2, as amended.
[End of table]
Executive Order 12958, as amended, prohibits classifying information so
as to conceal violations of law, inefficiency, or administrative error;
prevent embarrassment to a person, organization, or agency; restrain
competition; or prevent or delay the release of information, which does
not require protection in the interest of national security.
Classification decisions can be either original or derivative. Original
classification is the initial determination that information requires
protection against unauthorized disclosure in the interest of national
security. An original classification decision typically results in the
creation of a security classification guide, which is used by
derivative classifiers and identifies what information should be
protected, at what level, and for how long. Derivative classification
is the incorporation, paraphrasing, or generation of information in new
form that is already classified, and marking it accordingly.[Footnote
10] In 2004, 1,059 senior-level officials in DOD were designated
original classification authorities, and as such, they were the only
individuals permitted to classify information in the first
instance.[Footnote 11] But any of the more than 1.8 million DOD
personnel who possess security clearances potentially have the
authority to classify derivatively. According to DOD, less than 1
percent of the estimated 63.8 million classification decisions the
department made during fiscal years 2000 through 2004 were original;
however, ultimately, original classification decisions are the basis
for 100 percent of derivative classification decisions.
Executive Order 12958, as amended, assigns ISOO the responsibility for
overseeing agencies' compliance with the provisions of the Executive
Order.[Footnote 12] In this capacity, ISOO (1) performs on-site
inspections of agency information security operations, (2) conducts
document reviews, (3) monitors security education and training
programs, and (4) reports at least annually to the President on the
degree to which federal agencies are complying with the Executive
Order. ISOO also issued Classified National Security Information
Directive No. 1 to implement the Executive Order.[Footnote 13] The
Executive Order and the ISOO directive stipulate a number of specific
responsibilities expected of federal agencies, including DOD. Examples
of responsibilities are promulgating internal regulations; establishing
and maintaining security education and self-inspection programs;
conducting periodic declassification reviews; and committing sufficient
resources to facilitate effective information security operations. The
Executive Order and the ISOO directive also require classifiers to
apply standard markings to classified information. For example,
originally classified records must include the overall classification
as well as portion or paragraph marking, a "Classified by" line to
identify the original classifier, a reason for classification, and a
"Declassify on" date line.
Executive Order 12958, as amended, states that information shall be
declassified when it no longer meets the standards for
classification.[Footnote 14] The point at which information generally
becomes declassified is set when the decision is made to classify, and
it is either linked to the occurrence of an event, such as the
completion of a mission, or to the passage of time. Classified records
that are more than 25 years old and have permanent historical value are
automatically declassified unless an exemption is granted because their
contents could cause adverse national security repercussions.[Footnote
15]
The Defense Security Service Academy is responsible for providing
security training, education, and awareness to DOD components, DOD
contractors, and employees of other federal agencies and selected
foreign governments. The academy's 2005 course catalog includes more
than 40 courses in general security and in specific disciplines of
information, information systems, personnel, and industrial security,
and special access program security. These courses are free for DOD
employees and are delivered by subject matter experts at the academy's
facilities in Linthicum, Maryland, and at student sites worldwide via
mobile training teams. Some courses are available through video
teleconferencing and the Internet. In fiscal year 2004, more than
16,000 students completed academy courses, continuing an upward trend
over the past 4 years.[Footnote 16]
According to ISOO, DOD is one of the most prolific classifiers
(original and derivative combined) among federal government agencies.
From fiscal year 2000 to fiscal year 2004, DOD and the Central
Intelligence Agency had individual classification activity that were
each more than all other federal agencies combined. In 3 of these 5
years, DOD's classification activity was higher than that of the
Central Intelligence Agency's (see figure 1).
Figure 1: DOD's Number of Classification Decisions Compared to Those of
Other Federal Agencies:
[See PDF for image]
Source: GAO's analysis of ISOO data.
[End of figure]
During these same 5 years, DOD declassified more information than any
other federal agency, and it was responsible for more than three-
quarters of all declassification activity in the federal government.
DOD's Information Security Program Lacks Oversight and Consistent
Implementation:
A lack of oversight and inconsistent implementation of DOD's
information security program are increasing the risk of
misclassification. DOD's information security program is decentralized
to the DOD component level, and OUSD(I) involvement in, and oversight
of, components' information security programs is limited. Also, while
some DOD components and subordinate commands appear to manage their
programs effectively, we identified weaknesses in others' training,
self-inspections, and security classification guide management. As a
result, we found that many of the organizations we reviewed do not
fully satisfy federal and DOD classification management requirements,
which contributes to an increased risk of misclassification.
Specifically, most of the components and subordinate commands we
examined did not establish procedures to ensure that personnel
authorized to and actually performing classification actions are
adequately trained to do so, did not conduct rigorous self-inspections,
and did not take required actions to ensure that derivative
classification decisions are based on current, readily available
documentation. According to the ISOO Director, adequate training, self-
inspections, and documentation are essential elements of a robust
information security program and their absence can impede effective
information sharing and possibly endanger national security.[Footnote
17]
OUSD(I) Oversight of DOD Classification Management Program Is Limited:
As required by Executive Order 12958, OUSD(I) issued a regulation in
January 1997, Information Security Program, outlining DOD's information
security program. This regulation does not specifically identify
oversight responsibilities for OUSD(I), but instead decentralizes the
management of the information security program to the heads of DOD
components. Consequently, according to the DOD regulation, each DOD
component is responsible for establishing and maintaining security
training, conducting self-inspections, and issuing documentation to
implement OUSD(I) guidance and security classification guides. OUSD(I)
exercises little oversight over how the components manage their
programs. As a result, OUSD(I) does not directly monitor components'
compliance with federal and DOD training, self-inspection, and
documentation requirements stipulated in Executive Order 12958, as
amended; the ISOO directive; and the DOD regulation. For example,
OUSD(I) does not require components to report on any aspects of the
security management program. Also, OUSD(I) does not conduct or oversee
self-inspections, nor does it confirm whether self-inspections have
been performed or review self-inspection findings. At the time of our
review, OUSD(I)'s involvement consisted of accompanying ISOO on
periodic inspections of select DOD components and subordinate commands
that are not under the four military services. Additionally the DOD
implementing regulation does not describe what self-inspections should
cover, such as the recommended standards in the ISOO directive.
Based on our analysis, we believe that OUSD(I)'s decentralized
approach, coupled with the lack of specificity in the department's
implementing regulation on what components must do to satisfy the
Executive Order and ISOO directive self-inspection requirement, has
resulted in wide variance in the quality of components' information
security programs.
Classification Management Training Is Inadequate to Substantially
Reduce Improper Classification Practices:
Because all cleared personnel have the authority to derivatively
classify information, they are required to have annual refresher
training, whether or not they engaged in derivative classification
actions. All of the 19 DOD components and subordinate commands we
reviewed offer initial and annual refresher training for their
personnel who are involved with derivative classification activities,
and most track attendance to ensure that the training is received, as
required by the ISOO directive and the DOD regulation (see table 2).
However, from our analysis of the components' and subordinate commands'
initial and annual refresher training, we determined that only 11 of
the 19 components and subordinate commands cover the fundamental
classification principles cited in the ISOO directive, the DOD
regulation, and specifically defined as the minimum training that
classifiers must have in a November 2004 memorandum signed by the Under
Secretary of Defense for Intelligence.[Footnote 18] That is, the
training offered by 8 of the components and subordinate commands does
not describe the basic markings that must appear on classified
information, the difference between original and derivative
classification, the criteria that must be met to classify information,
and the process for determining the duration of classification.
Consequently, this training will not provide DOD with assurance that it
will reduce improper classification practices, as called for in the
ISOO directive. We also noted that 14 of the DOD components and
subordinate commands do not assess whether participants understand the
course material by administering a proficiency test.
Table 2: DOD Component Training Programs for Derivative Classifiers:
DOD components and subordinate commands: Department of the Army;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Army: Army
Intelligence and Security Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Army: Army
Materiel Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Army: Army
Research, Development, and Engineering Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Chief of Naval Operations;
Initial and annual refresher training: check;
Participant attendance tracked: [Empty];
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Chief of Naval Operations:
Naval Sea Systems Command;
Initial and annual refresher training: check;
Participant attendance tracked: [Empty];
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Chief of Naval Operations:
Naval Surface Warfare Center, Dahlgren Division;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: check.
DOD components and subordinate commands: Chief of Naval Operations:
Naval Air Systems Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Air Force;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Air Force:
Air Combat Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Air Force:
Air Force Materiel Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Department of the Air Force:
88th Air Base Wing;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: check.
DOD components and subordinate commands: Headquarters, Marine Corps;
Initial and annual refresher training: check;
Participant attendance tracked: [Empty];
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Headquarters, Marine Corps:
Marine Forces Atlantic;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: [Empty];
Proficiency tested: [Empty].
DOD components and subordinate commands: Central Command;
Initial and annual refresher training: check;
Participant attendance tracked: [Empty];
Classification principles adequately covered: check;
Proficiency tested: [Empty].
DOD components and subordinate commands: Special Operations Command;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: check.
DOD components and subordinate commands: National Geospatial-
Intelligence Agency;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: check.
DOD components and subordinate commands: Defense Intelligence Agency;
Initial and annual refresher training: check;
Participant attendance tracked: check;
Classification principles adequately covered: check;
Proficiency tested: check.
DOD components and subordinate commands: National Security Agency;
Initial and annual refresher training: check;
Participant attendance tracked: [Empty];
Classification principles adequately covered: check;
Proficiency tested: [Empty].
Source: GAO's analysis of DOD data.
[End of table]
Components and subordinate commands that cover the classification
principles cited in the ISOO directive and the DOD regulation include:
* the Army Intelligence and Security Command, which issues the
Command's A Users Guide to the Classification and Marking of Documents
to personnel;
* the Army Materiel Command, which uses information obtained from the
Defense Security Service Academy to develop its refresher training on
marking classified records;
* the Naval Surface Warfare Center, Dahlgren Division, which requires
personnel to complete an online refresher course and pass a proficiency
test before they can print out a certificate indicating a passing
score;
* the 88th Air Base Wing, which requires personnel to attend four
quarterly briefings each year on relevant classification management
topics;
* the Special Operations Command, which developed an online refresher
course, complete with a proficiency test that must be passed to receive
credit for attending;
* the National Geospatial-Intelligence Agency, which requires personnel
to sign an attendance card indicating that they completed initial and
annual refresher training, and issues them the agency's Guide to
Marking Documents; and:
* the Defense Intelligence Agency, which provides personnel a 13-page
reference guide that explains how to comply with Executive Order 12958,
as amended.
All of the components and subordinate commands that we examined provide
their original classification authorities with initial training,
frequently in one-on-one sessions with a security manager. However,
only about half of the components and subordinate commands we examined
provide the required annual refresher training to original
classification authorities.
DOD personnel could take better advantage of the information security
curriculum offered by the Defense Security Service Academy, including
Basic Information Security, Information Security Orientation,
Information Security Management, and Marking Classified Information.
For example, Marking Classified Information is a 2-3 hour no-cost,
online course that explains how to mark classified information in
accordance with Executive Order 12958, as amended, and requires the
person taking the course to complete and pass a proficiency test at the
end of the course. The Under Secretary's memorandum specifically
mentioned the academy and its courses as a way for the components to
facilitate their training. Our analysis of academy attendance data for
fiscal years 2003 through 2004 indicates that of the more than 1.8
million DOD personnel who possessed security clearances and potentially
had the authority to classify documents derivatively, 4,775 DOD
personnel completed an information security course, and 2,090 DOD
personnel completed the Marking Classified Information course.[Footnote
19],[Footnote 20]
Self-Inspections Lack Rigor:
Eleven of the 19 DOD components and subordinate commands we reviewed do
not perform required self-inspections as part of the oversight of their
information security programs. The ISOO directive requires agencies to
perform self-inspections at all organizational levels that originate or
handle classified information. Agencies have flexibility in determining
what to cover in their self-inspections, although ISOO lays out several
standards that it recommends DOD and other agencies consider including,
such as:
* reviewing a sample of records for appropriate classification and
proper markings;
* assessing familiarity with the use of security classification guides;
* reviewing the declassification program;
* evaluating the effectiveness of security training; and:
* assessing senior management's commitment to the success of the
program.
In its Information Security Program regulation, DOD components are
directed to conduct self-inspections based on program needs and the
degree of involvement with classified information; components and
subordinate commands that generate significant amounts of classified
information should be inspected at least annually. "Program needs,"
"degree of involvement," and "significant amounts" are not quantified,
and components and subordinate commands have interpreted these phrases
differently. For example, the Marine Corps performs self-inspections
annually; the Naval Sea Systems Command performs self-inspections every
3 years; and Headquarters, Department of the Army, does not perform
them. Navy and Army officials with whom we spoke cited resource
constraints, and, in particular, staffing shortages, as the reason why
inspections were not performed more often.
The DOD regulation's chapter on training requires DOD components to
evaluate the quality and effectiveness of security training during self-
inspections; however, none of the 19 components and subordinate
commands we examined does so. Evaluating the quality of training during
self-inspections can identify gaps in personnel's skill and
competencies, and focus efforts to improve existing training.[Footnote
21]
Ten of the 19 DOD components and subordinate commands we reviewed
perform staff assistance visits of their lower echelon units in lieu of
more rigorous self-inspections. Staff assistance visits, which
typically are not staffed by inspectors, train the visited organization
on how to meet inspection requirements, and any noted deficiencies are
informally briefed to the local command staff. However, no official
report is created for tracking and resolving deficiencies. According to
ISOO officials, staff assistance visits do not fulfill the inspection
requirement specified in Executive Order 12958, as amended. However, in
commenting on a draft of this report, DOD officials stated that they
were unaware of ISOO's position on staff assistance visits.
Of the 19 DOD components and subordinate commands we reviewed, only 7
conduct periodic document reviews as part of their self-inspections,
although they are required to do so. In addition to revealing the types
and extent of classification and marking errors, a document review can
offer insight into the effectiveness of annual refresher training.
DOD Has Not Taken Sufficient Action to Ensure That Derivative
Classification Decisions Are Based on Current Documentation:
DOD has no assurance that personnel who derivatively classify
information are using up-to-date security classification guides;
however, our review showed that more than half of the estimated number
of guides at the 17 organizations that could identify the number of
guides they had were tracked for currency and updated at least every 5
years. DOD's approach to providing personnel access to up-to-date
classification guides through a central library at its Defense
Technical Information Center has been ineffective. OUSD(I) is studying
ways to improve the centralized availability of up-to-date
classification guides.
Executive Order 12958, as amended, directs agencies with original
classification authority, such as DOD, to prepare security
classification guides to facilitate accurate and consistent derivative
classification decisions. Security classification guides identify what
information needs protection and the level of classification; the
reason for classification, to include citing the applicable categories
in the Executive Order; and the duration of classification. The ISOO
directive and DOD regulation also require agencies to review their
classification guides for currency and accuracy at least once every 5
years, and to update them as necessary. As table 3 shows, some DOD
components and subordinate commands did not manage their classification
guides to facilitate accurate derivative classification decisions.
Since 2 of the 19 organizations were unable to provide us with the
number of classification guides that they are responsible for, we could
not determine the total number of classification guides belonging to
the components and subordinate commands we reviewed. However, the
remaining 17 organizations estimated their combined total to be 2,243
classification guides.
Table 3: Tracking of Security Classification Guides Varies among DOD
Components:
DOD component and subordinate commands: Army;
Estimated number of guides: Unknown;
Process to track guides: Not tracked at this organizational level.
DOD component and subordinate commands: Army: Intelligence and Security
Command;
Estimated number of guides: 3;
Process to track guides: Currency of guides is tracked centrally.
Centralized library has paper and electronic copies.
DOD component and subordinate commands: Army: Army Materiel Command;
Estimated number of guides: Unknown;
Process to track guides: Not tracked at this organizational level.
DOD component and subordinate commands: Army: Research, Development,
and Engineering Command;
Estimated number of guides: 65;
Process to track guides: Currency of guides is tracked centrally in an
automated database. Some guides are available online to authorized
users.
DOD component and subordinate commands: Navy/Marine Corps[A]; Estimated
number of guides: 1,100; Process to track guides: Centralized library
has a paper copy of each guide. Currency of guides is not tracked
centrally. Automated database is under development.
DOD component and subordinate commands: Naval Sea Systems Command;
Estimated number of guides: 300;
Process to track guides: Centralized library has a paper copy of each
guide. Currency of guides is not tracked centrally. Automated database
is under development.
DOD component and subordinate commands:Navy/Marine Corps[A]: Naval
Surface Warfare Center, Dahlgren Division;
Estimated number of guides: 0;
Process to track guides: Not applicable.
DOD component and subordinate commands: Navy/Marine Corps[A]: Naval Air
Systems Command;
Estimated number of guides: 200;
Process to track guides: Currency of guides is tracked centrally in an
automated database. Centralized library has a paper copy of each guide.
DOD component and subordinate commands: Navy/Marine Corps[A]: Marine
Forces, Atlantic;
Estimated number of guides: 0;
Process to track guides: Not applicable.
DOD component and subordinate commands: Air Force;
Estimated number of guides: 525;
Process to track guides: Effort to create electronic versions of guides
that will allow authorized users' access is ongoing. Currency of guides
is tracked centrally.
DOD component and subordinate commands: Air Force: Air Combat Command;
Estimated number of guides: 0;
Process to track guides: Not applicable.
DOD component and subordinate commands: Air Force: Air Force Materiel
Command;
Estimated number of guides: 416;
Process to track guides: Centralized library has a paper copy of each
guide. Guides are tracked centrally in an automated database. Currency
of guides not tracked.
DOD component and subordinate commands: Air Force: 88th Air Base Wing;
Estimated number of guides: 36;
Process to track guides: Currency of guides is tracked centrally in an
automated database. Centralized library has a paper or electronic copy
of each guide.
DOD component and subordinate commands: Central Command;
Estimated number of guides: 1;
Process to track guides: Electronic version of guide available to
authorized users. Currency of guide is tracked centrally.
DOD component and subordinate commands: Special Operations Command;
Estimated number of guides: 30;
Process to track guides: Centralized library has a paper copy of each
guide. Automated database is under development that will allow
authorized users to access electronic version of guides. Currency of
guides tracked centrally.
DOD component and subordinate commands: National Geospatial-
Intelligence Agency;
Estimated number of guides: 10;
Process to track guides: Currency of guides is tracked, many of which
are program specific and require less frequent updating.
DOD component and subordinate commands: Defense Intelligence Agency;
Estimated number of guides: 9;
Process to track guides: Currency of guides is tracked centrally. Plan
is to create electronic version of each guide for authorized users to
access.
DOD component and subordinate commands: National Security Agency;
Estimated number of guides: 500;
Process to track guides: Currency of guides is tracked centrally. Paper
index of guides maintained.
Source: GAO analysis.
[A] Marine Corps security classification guides are managed by the
Navy.
[End of table]
Of the 13 components and subordinate commands we reviewed that possess
multiple classification guides:
* 10 maintain paper or electronic copies of classification guides in a
central location, or are in the process of doing so;
* 8 track the currency of more than half of their combined
classification guides to facilitate their review, to ensure that they
are updated at least every 5 years, in accordance with the ISOO
directive; and:
* 8 either have made or are in the process of making their
classification guides available to authorized users electronically.
These 8 components and subordinate commands represent over 1,700--more
than 75 percent--of the classification guides belonging to the DOD
organizations that we reviewed.
DOD's strategy for providing personnel ready access to up-to-date
security classification guides to use in making derivative
classification decisions has been ineffective for two reasons.
Officials at some of the DOD components and subordinate commands we
examined told us that they routinely submit copies of their
classification guides to the Defense Technical Information Center, as
required, while others told us they do not.[Footnote 22] However,
because of the way in which the Defense Technical Information Center
catalogs its classification guide holdings, center officials could not
tell us the names and the number of classification guides it possesses
or is missing. In addition, center officials told us that they cannot
compel original classification authorities to submit updated versions
of their classification guides or report a change in status, such as a
classification guide's cancellation. When the center receives a new
classification guide, it enters up to three independent search terms in
an electronic database to create a security classification guide index.
As of October 2005, the center had in excess of 4,000 index citations
for an estimated 1,400 classification guides, which is considerably
fewer than the estimated 2,234 classification guides that 17 of the 19
components and subordinate commands reported possessing.
The absence of a comprehensive central library of up-to-date
classification guides increases the potential for misclassification,
because DOD personnel may be relying on insufficient, outdated
reference material to make derivative classification decisions. Navy
and Air Force officials showed us evidence of classification guides
that had not been reviewed in more than five years, as the ISOO
directive and DOD regulation require. As table 3 shows, several
components and subordinate commands have taken or are taking action to
improve derivative classifiers' access to security classification
guides; however, except for the Air Force, there is no coordination
among these initiatives, and neither the Defense Technical Information
Center nor the OUSD(I) is involved. During our review, OUSD(I)
officials told us that the department is studying how to improve its
current approach to making up-to-date classification guides readily
available, departmentwide.
Results of OSD Document Review Show Some Questionable Classification
Decisions and Numerous Marking Errors:
In our review of a nonprobability sample of 111 classified OSD
documents we questioned DOD officials' classification decisions for 29
documents--that is, 26 percent of the sample. We also found that 93 of
the 111 documents we examined (84 percent) had at least one marking
error, and about half had multiple marking errors. Executive Order
12958, as amended, lists criteria for what information can be
classified, and for markings that are required to be placed on
classified records. While the results from this review cannot be
generalized across DOD, they are indications of the lack of oversight
and inconsistency that we found in DOD's implementation of its
information security program.
To determine the extent to which personnel in five OSD offices followed
established procedures for classifying information, we reviewed 111
documents recently classified by OSD, which revealed several
questionable classification decisions and a large number of marking
errors. In all, we questioned the classification decisions in 29,
comprising 26 percent of the documents in the OSD sample. The majority
of our questions pertained to whether all of the information marked as
classified met established criteria for classification (16
occurrences), the seemingly inconsistent treatment of similar
information within the same document (10 occurrences), and the apparent
mismatch between the reason for classification and the document's
content (5 occurrences). We gave the OSD offices that classified the
documents an opportunity to respond to our questions, and we received
written responses from the Offices of the Under Secretaries of Defense
for Policy; Comptroller/Chief Financial Officer; and for Acquisition,
Technology, and Logistics; regarding 17 of the 29 documents. In
general, they agreed that several of the documents in question
contained errors of misclassification. For example, we questioned the
need to classify all of the information marked Confidential or Secret
in 13 of the 17 documents. In their written responses, the three OSD
offices agreed that, in 5 of the 13 documents, the information was
unclassified, and in a sixth document the information should be
downgraded from Secret to Confidential. The OSD offices did not state
an opinion on 3 documents. We did not receive responses to our
questions from the other two OSD offices on the remaining 12 documents.
The Executive Order, ISOO directive, and DOD's regulation together
establish criteria for the markings that are required on classified
records (see table 4).
Table 4: Required Markings on Classified Records:
Marking requirement: Overall classification level of record cited;
Originally classified record: x;
Derivatively classified record: x.
Marking requirement: Portion markings present;
Originally classified record: x;
Derivatively classified record: x.
Marking requirement: "Declassify on" line completed;
Originally classified record: x;
Derivatively classified record: x.
Marking requirement: "Classified by" line completed;
Originally classified record: x;
Derivatively classified record: [Empty].
Marking requirement: Executive Order authorized "reason for"
classification cited;
Originally classified record: ; x;
Derivatively classified record: [Empty].
Marking requirement: "Derived from" line completed;
Originally classified record: [Empty];
Derivatively classified record: x.
Source: GAO analysis.
[End of table]
The documents included in our document review were created after
September 22, 2003, which is the effective date of ISOO's Classified
National Security Information Directive No. 1 and almost 6 months after
Executive Order 12958 was last amended. The ISOO directive prescribes a
standardized format for marking classified information that, according
to the directive, is binding except in extraordinary circumstances or
as approved by the ISOO Director.[Footnote 23] To implement
classification marking changes that resulted from the Executive Order
and directive, DOD issued its own interim guidance on April 16, 2004.
Our review revealed that 93 of the 111 OSD documents (84 percent) had
at least one marking error and about half of the documents had multiple
marking errors, resulting in 1.9 errors per document we reviewed. As
figure 2 shows, the marking errors that occurred most frequently
pertained to declassification, the sources used in derivative
classification decisions, and portion marking.
Figure 2: Distribution of Marking Errors Detected in OSD Document
Sample (n = 213 errors):
[See PDF for image]
Source: GAO analysis.
[End of figure]
The most common marking errors that we found in the OSD document
sample, by type of marking error, are listed in table 5.
Table 5: Examples of Common Marking Errors in OSD Document Sample:
Types of marking errors: Inaccurate or incomplete declassification
instructions;
Examples of marking errors:
* source not provided; therefore, unable to determine;
* discontinued exemption codes;
* formerly restricted data exempt;
* originating agency's determination required.
Types of marking errors: Inaccurate or incomplete "derived from" line;
Examples of marking errors:
* title of source document omitted;
* date of source document omitted;
* "classified by" line incorrectly inserted.
Types of marking errors: Inaccurate or incomplete portion marking;
Examples of marking errors:
* entire pages not marked;
* individual paragraphs not marked;
* section titles not marked;
* subject line not marked.
Types of marking errors: Inaccurate "reason for" classification cited;
Examples of marking errors:
* section 1.6., not section 1.4. of Executive Order cited;
* section 1.6. without a subsection cited.
Types of marking errors: Inaccurate overall classification level;
Examples of marking errors:
* not releasable to foreign nationals caveat not included in portion
markings;
* releasable to the United States of America, Canada, and the United
Kingdom caveat present in portion marking, but not included in page
marking.
Source: GAO analysis.
[End of table]
Since ISOO issued its directive in September 2003, it has completed 19
classified document reviews of DOD components and subordinate
commands.[Footnote 24] The types of marking errors that ISOO reported
finding were similar to what we found among the OSD documents.
Specifically, marking errors associated with declassification, source,
and portion marking represented more than 60 percent of the errors in
both document samples.
The Accuracy Of DOD's Classification Decisions Estimate Is
Questionable:
DOD's estimate of how many classification decisions it makes each year
is of questionable accuracy. Although ISOO provides DOD components with
guidance as to how they should calculate classification decisions, we
found considerable variance within the department in how this guidance
was implemented. For example, there was inconsistency regarding which
records are included in the estimate, the number and types of lower
echelon units that are included, when to estimate, and for how long to
estimate.
ISOO requires federal agencies to estimate the number of original and
derivative classification decisions they made during the previous
fiscal year, which ISOO includes in its annual report to the President.
Agency estimates are based on counting the number of Confidential,
Secret, and Top Secret original and derivative classification decisions
during a designated time period and extrapolating an annual rate from
them. According to ISOO guidance, agencies typically count their
classification decisions during a consecutive 2-week period in each of
the four quarters of the fiscal year, for a combined total of 8 weeks.
OUSD(I) officials told us that two highly classified categories of
information, sensitive compartmented information and special access
programs, are included in the count; however, several components and
subordinate commands we examined omit these categories from their
totals. In addition, some components and subordinate commands--such as
the Army's Research, Development, and Engineering Command and the
National Geospatial-Intelligence Agency--include e-mails in their
count, while others--such as the Defense Intelligence Agency and the
Central Command--do not. Whether or not to include e-mails can
dramatically affect counts. For example, the National Security Agency's
classification estimate declined from 12.5 million in fiscal year 2002
to only 7 in fiscal year 2003. Agency officials attributed this
dramatic drop to e-mails being included in the totals for fiscal year
2002 and not for fiscal year 2003.
Some DOD components and subordinate commands do not query their entire
organization, to encompass all personnel who may be classifying
information. For example, the Defense Intelligence Agency randomly
selects four of its eight directorates to participate, and the National
Security Agency and the Naval Air Systems Command selects only lower
echelon organizations that have an original classification authority.
As a result, these locations omit an unknown number of derivative
classification decisions. The Navy bases its annual estimate on data
covering a 2-week period from each of its major commands once per year
rather than from all of its commands, four times per year as suggested
in ISOO guidance. For example, during the first quarter, the Marine
Corps is queried, and during the second quarter, the fleet commands are
queried. Also, some of the combatant commands' service components are
not queried at all, such as the Army's component to the European
Command, the Navy's component to the Transportation Command, the Air
Force's component to the Southern Command, and the Marine Corps'
component to the Central Command. In commenting on a draft of this
report, the department correctly points out that guidance issued by
ISOO allows each component to decide who to include in its
classification decisions estimate.
The Special Operations Command and the Central Command both schedule
their counts at the end of the fiscal year; 4 consecutive weeks at the
former, and 8 consecutive weeks at the latter. Special Operations
Command officials told us that the end of the fiscal year tends to be a
slower operational period, thereby allowing more time to conduct the
data collection.
DOD components and subordinate commands convert their estimates in
different ways to project an entire year. Those that conform to the
suggested ISOO format of four 2-week counting periods a year (that is,
8 weeks) multiply their counts by 6.5 (that is, 8 weeks x 6.5 = 52
weeks). The Navy, however, multiplies each of its four separate counts
by 429 to account for all of the lower echelon units not represented in
the estimate.[Footnote 25]
Our review of DOD's submissions to ISOO of its estimated number of
classification decisions for fiscal years 2000 through 2004, revealed
several anomalies. For example, the National Reconnaissance Office
reported making more than 6 million derivative and zero original
classification decisions during this 5-year period, and the Marine
Forces, Atlantic, reported zero derivative and zero original
classification decisions during fiscal years 2003 and 2004. Subsequent
conversations with Marine Forces, Atlantic, officials indicated that a
misunderstanding as to what constitutes a derivative classification
decision resulted in an underreporting for those 2 years.
Other examples of DOD component data submissions during this 5-year
time period that had either a disproportionate reporting of original
versus derivative classification decisions or a significant change in
counts from 1 year to the next include:
* DOD reported in fiscal year 2004 that, departmentwide, about 4
percent of its classification decisions were original, yet the Defense
Advanced Research Projects Agency and the Joint Forces Command both
reported that more than 70 percent of their classification decisions
were original.
* DOD reported in fiscal year 2003, that departmentwide, less than 2
percent of its classification decisions were original, yet the Joint
Staff and the European Command both reported more than 50 percent of
their classification decisions were original.
* DOD reported in fiscal year 2002 that, departmentwide, less than 1
percent of its classification decisions were original, yet the Office
of the Secretary of Defense and the Southern Command both reported more
than 20 percent of their classification decisions were original.
* DOD reported an increase in the number of original classification
decisions during the fiscal year 2002 through 2004 period, from 37,320
to 47,238 (about a 27 percent increase), to 198,354 (about a 300
percent increase). However, during this same 3-year period, the Navy's
trend for original classification decisions was from 1,628 to 16,938
(about a 900 percent increase) to 1,898 (about a 90 percent decrease);
and the Army's trend was from 10,417 to 2,056 (about an 80 percent
decrease) to 133,791 (about a 6,400 percent increase).
DOD reported a 75 percent decrease in the total number of
classification decisions (that is, original and derivative) from fiscal
year 2002 to fiscal year 2004, yet several DOD components reported a
significant increase in overall classification decisions during this
same time period, including the Defense Threat Reduction Agency (a
20,107 percent increase), the Southern Command (1,998 percent
increase), Defense Intelligence Agency (a 1,202 percent increase), and
the National Geospatial-Intelligence Agency (a 354 percent increase).
OUSD(I) has decided to discontinue the practice of DOD components
submitting their classification decisions estimates directly to ISOO.
Beginning with the fiscal year 2005 estimates, OUSD(I) will scrutinize
the classification decision estimates of its components before
consolidating and submitting them to ISOO. Properly conducted,
OUSD(I)'s review could improve the accuracy of these estimates, if
methodological inconsistencies are reduced.
DOD's Ability to Meet All of the Executive Order's Automatic
Declassification Deadlines Depends on the Actions of Other Federal
Agencies:
Army, Navy, and Air Force classification officials told us that the
military services are on pace to meet the target date of 2006 for
reviewing their own classified documents that qualify for automatic
declassification, and for referring records that contain classified
information belonging to other agencies to those agencies--an assertion
endorsed by ISOO in its 2004 report to the President. However, these
officials told us that they are less likely to meet the target date of
2009 for reviewing records referred to them, and of 2011 for reviewing
special media (such as audio and video recordings). DOD's ability to
satisfy the 2009 and 2011 target dates depends, to a great extent, on
the actions of other federal agencies.
We limited our review of DOD's automatic declassification program to
the four military services because, as figure 3 shows, they performed
85 percent of all the declassification within DOD in fiscal year 2004.
Figure 3: DOD Automatic Declassification Activity in Fiscal Year 2004,
as Measured by the Number of Pages Declassified:
[See PDF for image]
Source: GAO's analysis of ISOO data.
[End of figure]
Executive Order 12958, as amended, stipulates that on December 31,
2006, and on December 31 of every year thereafter, classified records
that are (1) at least 25 years old and (2) of permanent historical
value shall in general be automatically declassified, whether or not
they have been reviewed. The Executive Order sets a record's date of
origination as the time of original classification, and it also exempts
certain types of information from automatic declassification, such as
information related to the application of intelligence sources and
methods. The automatic declassification deadline for records containing
information classified by more than one agency, such as the Army and
the Air Force or the Army and the Central Intelligence Agency, is
December 31, 2009, and for special media it is December 31, 2011. For
the most part, only the originating agency can declassify its own
information. Consequently, if the Army discovers classified information
that was originated by the U.S. State Department, the Army must alert
the State Department and refer the information to the State Department
for resolution. The Executive Order describes special media as
microforms, motion pictures, audiotapes, videotapes, or comparable
media that make its review for possible declassification exemptions
"more difficult or costly."[Footnote 26] The ISOO directive mirrors
these requirements and directs ISOO, in conjunction with its parent
organization, the National Archives and Records Administration, and
other concerned agencies to develop a standardized process for
referring records containing information classified by more than one
agency across the federal government.
Army, Navy/Marine Corps, and Air Force classification officials told us
that they face a variety of challenges impacting their ability to meet
the target dates of 2009 for reviewing records referred to them, and of
2011 for reviewing special media. Based on information provided by
officials from the military services and the National Archives and
Records Administration who are responsible for the automatic
declassification effort, it appears that three obstacles hinder their
progress toward meeting these deadlines. DOD's ability to remove these
obstacles without the involvement of other federal agencies is limited.
First, there is no federal government standard for annotating
classified records that contain information classified by more than one
agency. For example, two non-DOD agencies both annotate their records
with a "D" and an "R," but for opposite purposes. That is, one of the
agencies uses a "D" to denote "deny automatic declassification" and an
"R" to denote "release," while the other agency uses a "D" to denote
"declassify" and an "R" to denote "retain." The National Archives and
Records Administration and various interagency working groups and task
forces have sought a federal government standard, but National Archives
officials told us that they were not optimistic that agencies would
reach agreement soon. According to these officials, the lack of a
federal government standard has contributed to the inadvertent release
of classified information.
Second, there is no central location within DOD or the federal
government for storing records eligible for automatic declassification
that contain information classified by multiple DOD components or non-
DOD agencies. To review records originated by the four military
services, agencies must send personnel trained to evaluate information
for declassification suitability to as many as 14 different sites where
the records are stored. For example, the Air Force has records eligible
for automatic declassification at storage sites located in Ohio,
Alabama, and Texas (see figure 4). National Archives officials pointed
out that consolidating the records at fewer sites may be more
efficient, and likely more cost-effective.
Figure 4: Locations of Army, Navy, Air Force, and Marine Corps
Automatic Declassification Sites:
[See PDF for image]
Sources: DOD; Copyright Corel Corp. All rights reserved (map).
[End of figure]
A third factor that may cause DOD to miss meeting the Executive Order
deadlines is the lack of a common database that federal government
agencies can use to track the status of records containing information
classified by more than one agency. The ISOO directive allows federal
government agencies to utilize electronic databases to notify other
agencies of their referrals; however, agencies have created their own
databases that operate independently of one another. In commenting on a
draft of this report, DOD officials stated that, despite the lack of
federal government standards, the department has been a leading
proponent of working collaboratively with other federal agencies to
meet automatic declassification deadlines. We cannot confirm the
accuracy of DOD's characterization because DOD's relationship with
other agencies involved in automatic declassification was not part of
our review.
Conclusions:
The Under Secretary of Defense for Intelligence has delegated the
execution and oversight of information security to the DOD component
level. This decentralized approach, coupled with inconsistency in the
implementation of components' information security programs, has
resulted in wide variance in the quality of these programs. For
example, the OUSD(I) does not directly monitor components' compliance
with federal and DOD training, self-inspection, and documentation
requirements stipulated in Executive Order 12958, as amended; the ISOO
directive; and the DOD regulation. Inadequate classification management
training, self-inspections, and security classification guide
documentation among the various DOD components increase the risk of (1)
poor classification decisions and marking errors, similar to what we
observed in our OSD document review; (2) restricting access to
information that does not pose a threat to national security; and (3)
releasing information to the general public that should still be
safeguarded.
OUSD(I) oversight could reduce the likelihood of classification errors.
For example, if OUSD(I) ensured that components evaluated the quality
and effectiveness of training and periodically included document
reviews in their self-inspections, prevalent classification errors
could be addressed through annual refresher training that derivative
classifiers complete. Evaluating the quality of training can assist
components in targeting scarce resources on coursework that promotes
learning and reduces misclassification. Although the results of our
review of a sample of OSD documents cannot be generalized
departmentwide, we believe these results coupled with the weaknesses in
training, self-inspections, and documentation that we found at numerous
components and subordinate commands increases the likelihood that
documents are not being classified in accordance with established
procedures.
DOD's estimate of how many original and derivative classification
decisions it makes annually is unreliable because it is based on data
from the DOD components that were derived using different assumptions
about what should be included and about data collection and estimating
techniques. Still, this estimate is reported to the President and to
the public, and it is routinely cited in congressional testimony by DOD
officials and freedom of information advocates as authoritative. During
our review, OUSD(I) decided to resume its practice of reviewing
components' classification estimates before they are submitted to ISOO.
If properly implemented, this review could improve data reliability to
some extent, but only if it addresses the underlying lack of uniformity
in how the individual DOD components are collecting and manipulating
their data to arrive at their estimates.
The automatic declassification provision in Executive Order 12958, as
amended, requires agencies generally to declassify records that are 25
years old or more and that no longer require protection. The Army,
Navy/Marine Corps, and Air Force reported they are on track to review
all of the documents they classified before the deadline; however, they
are less likely to complete their review of the untold number of
records containing information classified by other DOD components and
non-DOD agencies by the deadlines set in the Executive Order. As the
deadlines pass and these records are automatically declassified,
information that could still contain national security information
becomes more vulnerable to disclosure. DOD's ability to meet these
deadlines is jeopardized both by conditions beyond and conditions
within its direct control. For example, DOD cannot require non-DOD
agencies to adopt a national standard for annotating classified
records, but it can take action to streamline the process of reviewing
records containing information classified by more than one DOD
component.
Recommendations for Executive Action:
To reduce the risk of misclassification and create greater
accountability across the department, we recommend that the Secretary
of Defense direct the Under Secretary of Defense for Intelligence to:
* establish a centralized oversight process for monitoring components'
information security programs to ensure that they satisfy federal and
DOD requirements. This oversight could include requiring components to
report on the results of self-inspections or other actions, targeted
document reviews, and/or reviews by the DOD Inspector General and
component audit agencies.
* to issue a revised Information Security Program regulation to ensure
that:
- those personnel who are authorized to and who actually perform
classification actions, receive training that covers the fundamental
classification principles as defined in the Under Secretary's
memorandum of November 30, 2004 and that completion of such training is
a prerequisite for these personnel to exercise this authority;
- the frequency, applicability, and coverage of self-inspections, and
the reporting of inspection results are based on explicit criteria;
and:
- authorized individuals can access up-to-date security classification
guides necessary to derivatively classify information accurately.
To support informed decision making with regard to information
security, we recommend that the Secretary of Defense direct the Under
Secretary of Defense for Intelligence to institute quality assurance
measures to ensure that components implement consistently the DOD
guidance on estimating the number of classification decisions, thereby
increasing the accuracy and reliability of these estimates.
To assist DOD in its efforts to meet automatic declassification
deadlines, we recommend that the Secretary of Defense direct the Under
Secretary of Defense for Intelligence to evaluate the merits of
consolidating records eligible for automatic declassification that
contain information classified by multiple DOD components at fewer than
the current 14 geographically dispersed sites.
Agency Comments and Our Evaluation:
In commenting on a draft of this report, DOD concurred with all six
recommendations; however, the department expressed concern that we did
not accurately portray the Navy's program for managing its security
classification guides. Upon further review, we modified table 3 in the
report and accompanying narrative to indicate that the Navy (1) does
have a centralized library containing paper copies of its security
classification guides, and (2) is developing an automated database to
make its classification guides available to authorized users
electronically. We disagree with the department's assertion that the
Navy is tracking its classification guides to ensure that they are
reviewed at least once every 5 years for currency and are updated
accordingly. Based on our discussions with Navy information security
officials, including the Retrieval and Analysis of Navy (K)lassified
Information (RANKIN) Program Manager, and observing a demonstration of
the spreadsheet used to catalog security classification guide holdings,
we saw no evidence to suggest that currency of guides is being
systematically tracked. With respect to our fifth recommendation that
focuses on how DOD estimates the number of classification decisions it
makes each year, we endorsed the department's decision to continue
scrutinizing its components' estimates before consolidating and
submitting them to ISOO. However, we continue to believe that OUSD(I)
should augment its after-the-fact review with measures to ensure that
components follow a similar process to derive their classification
decisions estimates, such as standardizing the types of records to be
included. Adopting a consistent methodology across the department and
from year to year should improve the reliability and accuracy of this
estimate that is reported to the President.
DOD also provided technical comments for our consideration in the final
report, which we incorporated as appropriate. DOD's formal comments are
reprinted in appendix II.
We are sending copies of this report to the Secretaries of Defense, the
Army, the Navy, and the Air Force; the Commandant of the Marine Corps;
and the Directors of the Defense Intelligence Agency, the National
Geospatial-Intelligence Agency, and the National Security Agency. We
will also make copies available to others upon request. In addition,
this report will be available at no charge on the GAO Web site at
[Hyperlink, http://www.gao.gov]. If you or your staff have any
questions concerning this report, please contact me at (202) 512-5431
or dagostinod@gao.gov. Contact points for our Offices of Congressional
Relations and Public Affairs may be found on the last page of this
report. GAO staff who made major contributions to this report are
listed in appendix III.
Sincerely yours,
Signed by:
Davi M. D'Agostino:
Director, Defense Capabilities and Management:
[End of section]
Appendix I Scope and Methodology:
To conduct our review of the Department of Defense's (DOD's)
information security program, we met with officials and obtained
relevant documentation from the following DOD components and
subordinate commands:
* Department of the Army, Office of the Deputy Chief of Staff for
Intelligence, Arlington, Virginia;
- U.S. Army Intelligence and Security Command, Fort Belvoir, Virginia;
- U.S. Army Materiel Command, Fort Belvoir, Virginia;
- U.S. Army Research, Development and Engineering Command, Aberdeen
Proving Ground, Maryland;
* Department of the Navy, Office of the Chief of Naval Operations,
Arlington, Virginia;
- Naval Sea Systems Command, Washington, D.C;
- Naval Surface Warfare Center Dahlgren Division, Dahlgren, Virginia;
- Naval Air Systems Command, Patuxent River, Maryland;
* Department of the Air Force Air and Space Operations, Directorate of
Security Forces, Information Security Division, Rosslyn, Virginia;
- Air Force Air Combat Command, Langley Air Force Base, Virginia;
- Air Force Materiel Command, Wright-Patterson Air Force Base, Ohio;
- 88th Security Forces Squadron, Wright-Patterson Air Force Base, Ohio;
* Headquarters, U.S. Marine Corps, Arlington, Virginia;
- U.S. Marine Forces, Atlantic, Norfolk Naval Base, Virginia;
* Headquarters, U.S. Central Command, MacDill Air Force Base, Florida;
* Headquarters, U.S. Special Operations Command, MacDill Air Force
Base, Florida;
* National Geospatial-Intelligence Agency, multiple sites in the
Washington, D.C. metropolitan area;
* Defense Intelligence Agency, Washington, D.C;
* National Security Agency, Fort Meade, Maryland; and:
* Headquarters, Defense Technical Information Center, Fort Belvoir,
Virginia.
The information security programs of these nine components,
collectively, were responsible for about 83 percent of the department's
classification decisions each of the last 3 fiscal years that data are
available (2002 through 2004). We selected the information security
programs of three Army, three Navy, three Air Force, and one Marine
Corps subordinate command because they had among the largest number of
classification decisions for their component during the fiscal year
2002 through 2004 time period.
To examine whether DOD's implementation of its information security
management program in the areas of training, self-inspections, and
security classification guide management effectively minimizes the risk
of misclassification, we compared the DOD components' and subordinate
commands' policies and practices with federal and DOD requirements,
including Executive Order 12958, Classified National Security
Information, as amended; Information Security Oversight Office (ISOO)
Directive 1, Classified National Security Information; and DOD
Information Security Program regulation 5200.1-R. Additionally, we
visited the Defense Security Service Academy in Linthicum, Maryland, to
discuss DOD training issues, and the Defense Technical Information
Center at Fort Belvoir, Virginia, to discuss the availability of
current security classification guides. We also met with officials from
the Congressional Research Service, the Federation of American
Scientists, and the National Classification Management Society to
obtain their perspectives on DOD's information security program and on
misclassification of information in general.
To assess the extent to which DOD personnel in five offices of the
Office of the Secretary of Defense (OSD) followed established
procedures for classifying information, to include correctly marking
classified information, we examined 111 documents classified from
September 22, 2003 to June 30, 2005. Because the total number of
classified documents held by DOD is unknown, we could not pursue a
probability sampling methodology to produce results that could be
generalized to either OSD or DOD. The September 22, 2003 start date was
selected because it coincides with when the ISOO directive that
implements the Executive Order went into effect. OSD was selected among
the DOD components because it has been the recipient of fewer ISOO
inspections than most of the other DOD components, and we expected
comparatively greater compliance with the Executive Order since DOD's
implementing regulation, DOD 5200.1-R, was published by an OSD office.
We selected the following five OSD offices located in Washington, D.C.
to sample:
* Office of the Director of Program Analysis and Evaluation;
* Office of the Under Secretary of Defense for Policy;
* Office of the Under Secretary of Defense for Acquisition, Technology
and Logistics;
* Office of the Assistant Secretary of Defense for Networks and
Information Integration/Chief Information Officer; and:
* Office of the Under Secretary of Defense Comptroller/Chief Financial
Officer.
These five offices were responsible for 84 percent of OSD's reported
classification decisions (original and derivative combined) during
fiscal year 2004. According to the Pentagon Force Protection Agency,
the office responsible for collecting data on classification activity
for OSD, we obtained 100 percent of these five office's classification
decisions during the 21-month time period. Two GAO analysts
independently reviewed each document using a 16-item checklist that we
developed based on information in the Executive Order, and feedback
from ISOO classification management experts. [Footnote 27] GAO analysts
who participated in the document review completed the Defense Security
Service Academy's online Marking Classified Information course and
passed the embedded proficiency test.
Each document was examined for compliance with classification
procedures and marking requirements in the Executive Order. The two
analysts' responses matched in more than 90 percent of the checklist
items. On those infrequent occasions where the analysts' responses were
dissimilar, a third GAO analyst conducted a final review. We examined
the rationale cited by the classifier for classifying the information,
and whether similar information within the same document and across
multiple documents was marked in the same manner. We also performed
Internet searches on official U.S. Government Web sites to determine if
the information had been treated as unclassified. For those documents
that we identified as containing questionable classification decisions,
we met with security officials from the applicable OSD offices to
obtain additional information and documentation.
To assess the reliability of DOD's annual classification decisions
estimate and the existence of material inconsistencies, we compared the
guidance issued by ISOO and the Office of the Under Secretary of
Defense for Intelligence on methods to derive this estimate with how
DOD components and subordinate commands implemented this guidance. We
also scrutinized the data to look for substantial changes in the data
estimates reported by DOD components during fiscal years 2002 through
2004.
To determine the likelihood of DOD's meeting automatic declassification
deadlines contained in Executive Order 12958, as amended, we met with
officials from the Army, Navy/Marine Corps, and Air Force
declassification offices. We decided to focus exclusively on the four
military services, because, collectively they were responsible for more
than 85 percent of the department's declassification activity during
fiscal year 2004. We also met with ISOO officials to discuss their
evaluation of DOD's progress towards meeting the Executive Order
deadlines. To increase our understanding of the impediments that
federal agencies in general, and DOD in particular, face with regard to
satisfying automatic declassification deadlines, we met with
declassification officials from the National Archives and Records
Administration in College Park, Maryland.
We met with ISOO officials to discuss the assignment's objectives and
methodology, and received documents on relevant information security
topics, including inspection reports.
We conducted our work from March 2005 through February 2006 in
accordance with generally accepted government auditing standards.
[End of section]
Appendix II: Comments from the Department of Defense:
Office Of The Under Secretary Of Defense 5000 Defense Pentagon
Washington, DC 20301-5000:
JUN 12 2006:
Ms. Davi M. D'Agostino:
Director, Defense Capabilities and Management: U.S. Government
Accountability Office: 441 G Street, N.W.:
Washington, DC 20548:
Dear Ms. D'Agostino,
Enclosed is the Department of Defense (DoD) response to the GAO draft
report, "Managing Sensitive Information: DoD Can More Effectively
Reduce the Risk of Classification Errors," dated May 11, 2006, (GAO
Code 350684/GAO-06-706).
The Department concurs with the GAO recommendations and has provided
comments pertaining to the technical aspects discussed in the report.
We appreciate the courtesies extended by your staff during this audit
and their willingness to work with the Department on these matters. If
you have any questions, please contact Mrs. Debbie Ross, Acting Deputy
Director for Information Security Policy, at 703-571-0261.
Sincerely,
Signed by:
Robert Andrews:
Deputy Under Secretary of Defense: (Counterintelligence and Security):
Enclosure:
As stated:
cc:
DoD OIG:
GAO Draft Report - Dated May 11, 2006 GAO CODE 350684/GAO-06-706:
"Managing Sensitive Information: DoD Can More Effectively Reduce the
Risk of Classification Errors"
Department Of Defense Comments To The Recommendations:
Recommendation 1: We recommend the Secretary of Defense direct the
Under Secretary of Defense for Intelligence to establish a centralized
oversight process for monitoring components' information security
programs to ensure that they satisfy federal and DoD requirements. This
oversight could include requiring components to report on the results
of self-inspections or other actions, targeted document reviews, and/or
reviews by the DoD Inspector General and component audit agencies.
DOD Response: Concur based on the findings of the GAO audit and the
Department's own observations on these matters when accompanying the
Information Security Oversight Office on oversight visits to some of
the Defense components.
Recommendations 2-4: We recommend the Secretary of Defense direct the
Under Secretary of Defense for Intelligence to issue a revised
Information Security Program regulation to ensure that:
* Those personnel who are authorized to and who actually perform
classification actions, receive training that covers the fundamental
classification principles as defined in the Under Secretary's
memorandum of November 30, 2004 and that completion of such training is
a prerequisite for these personnel to exercise this authority;
* The frequency, applicability, and coverage of self-inspections, and
the reporting of inspection results are based on explicit criteria;
and,
* Authorized individuals can access up-to-date security classification
guides necessary to derivatively classify information accurately.
DOD Response: Concur. The Department has a requirement for all
classifiers to receive training prior to exercising classification
authority. However, we are concerned that the report does not
accurately portray the overall Navy program for managing security
classification guidance. The report only indicates the results of how
some Department of Navy (DON) commands maintain their Security
Classification Guides (SCGs). It does not address the DON's centralized
repository of SCGs, which is maintained by the Chief of Naval
Operations (CNO (N09N2)), Retrieval and Analysis of Navy (K)lassified
Information (RANKIN) Program Manager. The RANKIN Program Manager also
tracks SCGs for currency. Technical accuracy is the responsibility of
the Original Classification Authority (OCA). The DON issues SCGs via
the OPNAVINST 5513 series. This program was described in detail to the
GAO Auditor team, by the RANKIN Program Manager and the recently
departed CNO (N09N2), Information Security Policy Branch Head, yet
there is no mention of it in the report. Also, the RANKIN Program
Manager is working on an automated solution, to post the DON's SCGs on
a secure network. This site will be restricted to those personnel with
a valid need-to-know, and will be centrally managed by the RANKIN
Program Manager. The benefit of automating the SCGs is to reduce the
amount of time spent by derivative classifiers to obtain current SCGs,
better facilitate currency of SCGs via the OCA, increase protection of
information, and aid derivative classifiers in the proper
classification of information. It is appropriate and necessary to
include this information in the report as well.
Recommendation 5: We recommend the Secretary of Defense direct the
Under Secretary of Defense for intelligence to institute quality
assurance measures to ensure that components implement the DoD guidance
consistently, thereby increasing the accuracy and reliability of these
estimates.
DOD Response: Concur. The Department is already doing it with this
iteration of data collection.
Recommendation 6: We recommend the Secretary of Defense direct the
Under Secretary of Defense for Intelligence to evaluate the merits of
consolidating records eligible for automatic declassification that
contain information classified by multiple DoD components at fewer than
the current I4 geographically dispersed sites.
DOD Response: Concur. The Department has advised the Information
Security Oversight Office that we agree with this concept in theory at
the national level. Also, the Military Departments are looking into the
feasibility of setting up a DoD Declassification Referral Center to
facilitate declassification reviews of records containing multiple DoD
component equities.
Technical Comments:
GAO Highlights Page, 3rd Para. Replace everything after the first line
with "of the considerable variance in how ISOO's guidance is
implemented across the Department, and from year to year. Since 2002,
responsibility for monitoring and assessing DoD component's data
submission has passed between DoD and ISOO. OUSD(I) resumed
consolidating the DoD response in 2005 to aid in identifying potential
oversight issues. Reason: Provides correct background on this issue.
Also, the data is not used by DoD to make resource decisions because
DoD does not think the report provides sufficient information to do so.
Page 6, 2nd Para, 3rd Sentence. Delete 3rd sentence and replace
everything after the 5th sentence with "However, it has been DoD's
practice to implement ISOO's guidance which allows each DoD component
to determine who they should sample within their organization. This was
also ISOO's practice when they were collecting data direct from DoD
components during Fiscal Years 2002-2004. In fiscal year 2005, OUSD(I)
resumed responsibility for scrutinizing the estimates of its components
before consolidating and submitting them to ISOO for inclusion in its
annual report to the President. Reason: Correctness.
Page 7, 1st Para, 2nd Sentence. Add before last sentence, "It was noted
that DoD has been one of the leading proponents in working
collaboratively with other federal agencies to facilitate this process
inspite of the lack of federal standards." Reason: Correct.
Page 16, 1st Para, Last 2 Sentences. Delete. Reason: This information
is irrelevant since these DoD components have their own training which
may be just as adequate as the DSSA training.
Page 20, Table 3. Last Column. For the Naval Sea Systems Command entry,
change to "Currency of guides tracked centrally. Centralized paper
index of paper guides maintained. Automated database being implemented
by CNO." Reason: While they maybe behind in tracking the guides, they
still have a system in place for central tracking and are working to
get it current.
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
GAO Contact:
Davi M. D'Agostino (202) 512-5431 or dagostinod@gao.gov.
Acknowledgments:
Ann Borseth, Mattias Fenton, Adam Hatton, Barbara Hills, David Keefer,
David Mayfield, Jim Reid, Terry Richardson, Marc Schwartz, Cheryl
Weissman, and Jena Whitley made key contributions to this report.
FOOTNOTES
[1] National security signifies the national defense or foreign
relations of the United States.
[2] Executive Order 12958, Classified National Security Information
(1995) with its last amendment, Executive Order 13292, Further
Amendment to Executive Order 12958, as Amended, Classified National
Security Information (2003).
[3] See title 44 United States Code, which generally defines a record
as a book, paper, map, photograph, sound or video recording, machine
readable material, computerized, digitized, or electronic information,
regardless of the medium on which it is stored, or other documentary
material, regardless of its physical form or characteristics.
[4] The Under Secretary of Defense for Intelligence position was
established by the Bob Stump National Defense Authorization Act for
Fiscal Year 2003 (Pub. L. No. 107-314 §901 (Dec. 2, 2002)).
[5] DOD components include the Office of the Secretary of Defense, the
military departments, the Chairman of the Joint Chiefs of Staff, the
Combatant Commands, the Office of the Inspector General, the Defense
Agencies, the DOD Field Activities, and all other organizational
entities within DOD.
[6] Managing Sensitive Information: Departments of Energy and Defense
Policies and Oversight Could Be Improved, GAO-06-369 (Washington, D.C.:
Mar. 7, 2006); Managing Sensitive Information: DOE and DOD Could
Improve Their Policies and Oversight, GAO-06-531T (Washington, D.C.:
Mar. 14, 2006).
[7] Transportation Security Administration: Clear Policies and
Oversight Needed for Designation of Sensitive Security Information, GAO-
05-677 (Washington, D.C.: June 29, 2005).
[8] Information Sharing: The Federal Government Needs to Establish
Policies and Processes for Sharing Terrorism-Related and Sensitive but
Unclassified Information, GAO-06-385 (Washington, D.C.: Mar. 17, 2006).
[9] Results from nonprobability samples cannot be used to make
inferences about a population, because the chance of being selected as
part of a nonprobability sample cannot be predicted.
[10] The duplication or reproduction of existing classified information
is not derivative classification.
[11] Information may be originally classified only by the Secretary of
Defense, the secretaries of the military departments, and other
officials who have been specifically designated this authority in
writing. By DOD regulation, delegation of original classification
authority shall be limited to the minimum required for DOD to operate
effectively, and to those officials who have a demonstrable and
continuing need to exercise it.
[12] ISOO is a component of the National Archives and Records
Administration and receives its policy and program guidance from the
National Security Council.
[13] 32 C.F.R. Part 2001 (2003).
[14] Executive Order 12958, as amended, defines declassification as the
authorized change in the status of information from classified to
unclassified.
[15] Records of permanent historical value are Presidential records and
agency records that the U.S. Archivist determines should be maintained
permanently in accordance with title 44 United States Code.
[16] The actual number of students completing academy courses in fiscal
year 2004 is less than 16,000 because some students completed multiple
courses.
[17] J. William Leonard, Director, ISOO. "The Importance of Basics,"
remarks delivered at the National Classification Management Society's
Annual Training Seminar, Reno, Nevada, June 15, 2004.
[18] Memorandum from Stephen A. Cambone, Under Secretary of Defense for
Intelligence, "Minimum Training Requirements for Original
Classification Authorities and Derivative Classifiers," Nov. 30, 2004.
[19] Based on information provided by OUSD(I) for end of fiscal year
2003.
[20] The actual number of DOD personnel who completed an academy
information security course in fiscal years 2003 and 2004 is less than
4,775 because some personnel completed multiple courses.
[21] GAO Human Capital: A Guide for Assessing Strategic Training and
Development Efforts in the Federal Government, GAO-04-546G (Washington,
D.C.: Mar. 1, 2004).
[22] Section C2.5.3.4 of DOD 5200.1-R, Information Security Program,
January 1997 requires original classification authorities to submit two
copies of each approved security classification guide to the center,
except for guides containing highly sensitive information. According to
DOD declassification officials, less than 5 percent of the department's
classification guides are classified at the Top Secret level, or
contain Sensitive Compartmented Information or Special Access Program
information.
[23] 32 C.F.R. §2001.20 (2003).
[24] The five OSD offices that participated in our document review did
not participate in any of the ISOO document reviews.
[25] 429 is derived from the formula 26 x 33 ÷ 2 = 429, where 26
represents the number of 2-week counting periods in a year, 33 is a
multiplier to account for those commands among the Navy's 3,960
commands that are not counted, and 2 is a divisor to account for those
commands that have no classification activity, such as dental clinics
and commissaries.
[26] Executive Order 12958, as amended, §3.3.(e)(2).
[27] 12 of the 16 checklist items applied to originally classified
documents, and 13 of the 16 checklist items applied to derivatively
classified documents.
GAO's Mission:
The Government Accountability Office, the investigative arm of
Congress, exists to support Congress in meeting its constitutional
responsibilities and to help improve the performance and accountability
of the federal government for the American people. GAO examines the use
of public funds; evaluates federal programs and policies; and provides
analyses, recommendations, and other assistance to help Congress make
informed oversight, policy, and funding decisions. GAO's commitment to
good government is reflected in its core values of accountability,
integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains
abstracts and full-text files of current reports and testimony and an
expanding archive of older products. The Web site features a search
engine to help you locate documents using key words and phrases. You
can print these documents in their entirety, including charts and other
graphics.
Each day, GAO issues a list of newly released reports, testimony, and
correspondence. GAO posts this list, known as "Today's Reports," on its
Web site daily. The list contains links to the full-text document
files. To have GAO e-mail this list to you every afternoon, go to
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order
GAO Products" heading.
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office
441 G Street NW, Room LM
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: www.gao.gov/fraudnet/fraudnet.htm
E-mail: fraudnet@gao.gov
Automated answering system: (800) 424-5454 or (202) 512-7470:
Public Affairs:
Jeff Nelligan, managing director,
NelliganJ@gao.gov
(202) 512-4800
U.S. Government Accountability Office,
441 G Street NW, Room 7149
Washington, D.C. 20548: