DoD 5200.01, Vol. 1, February 24, 2012 - The Black Vault

3y ago
38 Views
2 Downloads
2.89 MB
318 Pages
Last View : 1m ago
Last Download : 3m ago
Upload by : Melina Bettis
Transcription

dom ://www.theblackvault.com

Department of DefenseMANUALNUMBER 5200.01, Volume 1February 24, 2012USD(I)SUBJECT:DoD Information Security Program: Overview, Classification, andDeclassificationReferences: See Enclosure 11. PURPOSEa. Manual. This Manual is composed of several volumes, each containing its own purpose.The purpose of the overall Manual, as authorized by DoD Directive (DoDD) 5143.01 (Reference(a)) and DoD Instruction (DoDI) 5200.01 (Reference (b)), is to reissue DoD 5200.1-R(Reference (c)) as a DoD Manual to implement policy, assign responsibilities, and provideprocedures for the designation, marking, protection, and dissemination of controlled unclassifiedinformation (CUI) and classified information, including information categorized as collateral,sensitive compartmented information (SCI), and Special Access Program (SAP). This guidanceis developed in accordance with Reference (b), Executive Order (E.O.) 13526 and E.O. 13556,and part 2001 of title 32, Code of Federal Regulations (References (d), (e), and (f)). Thiscombined guidance is known as the DoD Information Security Program.b. Volume. This Volume:(1) Describes the DoD Information Security Program.(2) Provides guidance for classification and declassification of DoD information thatrequires protection in the interest of the national security.(3) Cancels Reference (c) and DoD O-5200.1-I (Reference (g)).(4) Incorporates and cancels Directive-Type Memorandums 04-010 (Reference (h)) and11-004 (Reference (i)).2. APPLICABILITY. This Volume:

DoDM 5200.01-V1, February 24, 2012a. Applies to OSD, the Military Departments, the Office of the Chairman of the Joint Chiefsof Staff and the Joint Staff, the Combatant Commands, the Office of the Inspector General of theDepartment of Defense, the Defense Agencies, the DoD Field Activities, and all otherorganizational entities within the Department of Defense (hereinafter referred to collectively asthe “DoD Components”).b. Does NOT alter existing authorities and responsibilities of the Director of NationalIntelligence (DNI) or of the heads of elements of the Intelligence Community pursuant topolicies issued by the DNI. Consistent with Reference (b), SCI shall be safeguarded inaccordance with the policies and procedures issued by the DNI, as implemented by DoD5105.21-M-1 (Reference (j)) and other applicable guidance.3. DEFINITIONS. See Glossary.4. POLICY. It is DoD policy, in accordance with Reference (b), to:a. Identify and protect national security information and CUI in accordance with nationallevel policy issuances.b. Promote information sharing, facilitate judicious use of resources, and simplifymanagement through implementation of uniform and standardized processes.c. Classify and declassify national security information as required by References (d) and (f).5. RESPONSIBILITIES. See Enclosure 2.6. PROCEDURES. See Enclosures 3 through 6.7. INFORMATION COLLECTION REQUIREMENTSa. The Annual Report on Classified Information referenced in paragraph 7.m. of Enclosure 2of this Volume has been assigned Report Control Symbol (RCS) DD-INT(AR)1418 inaccordance with the procedures in DoD 8910.1-M (Reference (k)).b. The DoD Security Classification Guide Data Elements, DoD (DD) Form 2024, referencedin section 6 of Enclosure 6 of this Volume has been assigned RCS DD-INT(AR)1418 inaccordance with the procedures in Reference (k).8. RELEASABILITY. UNLIMITED. This Volume is approved for public release and isavailable on the Internet from the DoD Issuances Website at http://www.dtic.mil/whs/directives.2

DoDM 5200.01-V1, February 24, 20129. EFFECTIVE DATE. This Volume is effective upon its publication to the DoD IssuancesWebsite.Enclosures1. References2. Responsibilities3. DoD Information Security Program Overview4. Classifying Information5. Declassification and Changes in Classification6. Security Classification GuidesGlossary3

DoDM 5200.01-V1, February 24, 2012TABLE OF CONTENTSENCLOSURE 1: REFERENCES .8ENCLOSURE 2: RESPONSIBILITIES .11UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE (USD(I)) .11UNDER SECRETARY OF DEFENSE FOR POLICY (USD(P)) .11DoD CHIEF INFORMATION OFFICER (CIO) .12ADMINISTRATOR, DEFENSE TECHNICAL INFORMATION CENTER (DTIC).12DIRECTOR, WHS .12HEADS OF THE DoD COMPONENTS .12SENIOR AGENCY OFFICIALS .13HEADS OF DoD ACTIVITIES .16ACTIVITY SECURITY MANAGER .17TSCO .19SENIOR INTELLIGENCE OFFICIAL .19INFORMATION SYSTEMS SECURITY OFFICIALS .20ENCLOSURE 3: DoD INFORMATION SECURITY PROGRAM OVERVIEW .21PURPOSE .21SCOPE .21PERSONAL RESPONSIBILITY .21NATIONAL AUTHORITIES FOR SECURITY MATTERS .21President of the United States .21National Security Council (NSC) .21DNI .21ISOO .22CUI Office (CUIO) .22DoD INFORMATION SECURITY PROGRAM MANAGEMENT.22USD(I).22USD(P) .22DoD CIO .22National Security Agency/Central Security Service (NSA/CSS) .23DIA .23Defense Security Service (DSS) .23DTIC .23DoD Joint Referral Center (JRC) .23DoD COMPONENT INFORMATION SECURITY MANAGEMENT .23Head of the DoD Component .23Senior Agency Officials .24Activity Security Management .24TSCO .25Other Security Management Roles .254CONTENTS

DoDM 5200.01-V1, February 24, 2012USE OF CONTRACTORS IN SECURITY ADMINISTRATION .26CLASSIFICATION AUTHORITY .27CLASSIFICATION POLICY.27RECLASSIFICATION .27ACCESS TO CLASSIFIED INFORMATION .28Requirements for Access .28Nondisclosure Agreements .28NATO Briefing for Cleared Personnel .28Access By Individuals Outside the Executive Branch .29PROTECTION REQUIREMENTS .29Protection of Restricted Data (RD) and Formerly Restricted Data (FRD) .29Protection of SCI.30Protection of COMSEC Information .30Protection of SAP Information .30Protection of NATO and FGI .30Protection of Nuclear Command and Control-Extremely Sensitive Information(NC2-ESI) .30RETENTION .30PERMANENTLY VALUABLE RECORDS .30MILITARY OPERATIONS .31WAIVERS .31CORRECTIVE ACTIONS AND SANCTIONS .31Procedures .31Sanctions .31Reporting of Incidents.32ENCLOSURE 4: CLASSIFYING INFORMATION .33CLASSIFICATION POLICY.33CLASSIFICATION PROHIBITIONS .33LEVELS OF CLASSIFICATION .34Top Secret .34Secret.34Confidential.34ORIGINAL CLASSIFICATION .34REQUESTS FOR OCA .35ORIGINAL CLASSIFICATION PROCESS .36CHANGING THE LEVEL OF CLASSIFICATION .37SECURITY CLASSIFICATION GUIDANCE.38TENTATIVE CLASSIFICATION .38DERIVATIVE CLASSIFICATION .38RESPONSIBILITIES OF DERIVATIVE CLASSIFIERS .39PROCEDURES FOR DERIVATIVE CLASSIFICATION .39DURATION OF CLASSIFICATION .40Originally Classified Information .40Derivatively Classified Information .415CONTENTS

DoDM 5200.01-V1, February 24, 2012Extending the Duration of Classification.41FORMAT FOR DISSEMINATION .41COMPILATIONS .41CLASSIFICATION OF ACQUISITION INFORMATION .43CLASSIFICATION OF INFORMATION RELEASED TO THE PUBLIC .43Classified Information Released Without Proper Authority .43Reclassification of Information Declassified and Released to the Public UnderProper Authority .44Information Declassified and Released to the Public Without Proper Authority .46CLASSIFICATION OR RECLASSIFICATION FOLLOWING RECEIPT OF AREQUEST FOR INFORMATION .46CLASSIFYING NON-GOVERNMENT RESEARCH AND DEVELOPMENTINFORMATION.47THE PATENT SECRECY ACT OF 1952 .47REQUESTS FOR CLASSIFICATION DETERMINATION .48CHALLENGES TO CLASSIFICATION.49Principles.49Procedures .49ENCLOSURE 5: DECLASSIFICATION AND CHANGES IN CLASSIFICATION .51DECLASSIFICATION POLICY .51PROCESSES FOR DECLASSIFICATION .52AUTHORITY TO DECLASSIFY .52DECLASSIFICATION GUIDANCE .53DECLASSIFICATION OF INFORMATION.53CANCELING OR CHANGING CLASSIFICATION MARKINGS .54SPECIAL PROCEDURES FOR CRYPTOLOGIC INFORMATION.54PERMANENTLY VALUABLE RECORDS .54RECORDS DETERMINED NOT TO HAVE PERMANENT HISTORICAL VALUE .55EXTENDING CLASSIFICATION BEYOND 25 YEARS FOR UNSCHEDULEDRECORDS .55CLASSIFIED INFORMATION IN THE CUSTODY OF CONTRACTORS,LICENSEES, GRANTEES, OR OTHER AUTHORIZED PRIVATEORGANIZATIONS OR INDIVIDUALS .55AUTOMATIC DECLASSIFICATION .55Deadline .56Secretary of Defense Certification .56Public Release of Automatically Declassified Documents .56Basis for Exclusion or Exemption from Automatic Declassification .56Exclusion of RD and FRD .57Integral File Block .57Delays of Automatic Declassification .57Automatic Declassification of Backlogged Records at NARA .59Declassification Review Techniques .59EXEMPTIONS FROM AUTOMATIC DECLASSIFICATION .596CONTENTS

DoDM 5200.01-V1, February 24, 2012Exemption Types .59Exemption Criteria and Duration .60Exemption Requests.62When to Request an Exemption .63Who Identifies and Requests an Exemption .63ISCAP Authority.63Notice to Information Holders .63DECLASSIFICATION OF INFORMATION MARKED WITH OLDDECLASSIFICATION INSTRUCTIONS .64REFERRALS IN THE AUTOMATIC DECLASSIFICATION PROCESS .64Description .64Referral Responsibility .

DoDM 5200.01-V1, February 24, 2012 ENCLOSURE 1 REFERENCES (a) DoD Directive 5143.01, “Under Secretary of Defense for Intelligence (USD(I)),” November 23, 2005 (b) DoD Instruction 5200.01, “DoD Information Security Program and Protection of Sensitive Compartmented Information,” October 9, 2008

Related Documents:

(a)) and DoD Instruction (DoDI) 5200.01 (Reference (b)), is to reissue DoD 5200.1-R (Reference (c)) as a DoD manual (DoDM) to implement policy, assign responsibilities, and provide procedures for the designation, marking, protection, and dissemination of controlled

(a)) and DoD Instruction (DoDI) 5200.01 (Reference (b)), is to reissue DoD 5200.1-R (Reference (c)) as a DoD Manual to implement policy, assign responsibilities, and provide procedures for the designation, marking, protection, and dissemination of CUI and classified

The US DoD has two PKI: DoD PKI is their internal PKI; DoD ECA PKI is the PKI for people outside of the DoD [External Certification Authority] who need to communicate with the DoD [i.e. you]. Fortunately, the DoD has created a tool for Microsoft to Trust the DoD PKI and ECA PKI; the DoD PKE InstallRoot tool.File Size: 1MBPage Count: 10

The DoD PKI consists of the US DoD issuing certificates internally to US DoD end entities (like DoD employees and DoD web sites). The ECA PKI consists of vendors that are authorized by the US DoD to issue certificates to end entities outside of the US DoD that need to communicate with the DoD. You probably need to trust both the DoD PKI and ECA .

Menschen Pagina 20 Schritte international Neu Pagina 22 Motive Pagina 24 Akademie Deutsch Pagina 25 Starten wir! Pagina 26 Themen aktuell Pagina 28 em neu Pagina 29 Sicher! Pagina 30 Vol A1 1 Vol A1 Vol 1 Vol 1 2 Vol unico Vol 1 Volume 1 Volume 1 Vol 1 Vol 1 1 Vol A1 2 Vol 2 Vol 1 2 Vol A2 1 Vol A2 Vol 3 Vol

DoD NOTAM Manager User's Guide can be accessed by selecting the Help tab. (For details, see Page 45) 4 CHAPTER 2 OVERVIEW OF DOD NOTAM MANAGER 1. DoD NOTAM Manager . the policy and business rules outlined in Advisory Circular 150/5200-28D, Advisory Circular 150/5200-30C, and FAA Order 7930.2. 11. Digital Scenarios/Templates Concept

This Pamphlet is reissued under the authority of DoD Directive 5200.1, “Information Security Program,” December 13, 1996. It prescribes guidance through examples, on the markings for classified national security information. It supersedes the 1982, 5200.1-PH guide.

A.R. Paterson, A First Course in Fluid Dynamics, Cambridge University Press. (The recommended text to complement this course - costs ˇ 50 from Amazon; there are 6 copies in Queen’s building Library and 3 copies in the Physics Library) 2. D.J. Acheson, Elementary Fluid Dynamics. Oxford University Press 3. L.D. Landau and E.M. Lifshitz, Fluid Mechanics. Butterworth Heinemann Films There is a .