Unless you’ve been living under a rock or haven’t turned on one electronic device all day long, you’re aware of the big security shake-up where a journalist was accidentally included in a Signal message between the Secretary of Defense, the National Security Advisor, the Vice President, the Director of National Intelligence and other high ranking government officials. For the record, it was National Security Advisor Waltz who convened the chat. He admits that inviting the journalist to that party was unintentional and I’m sure he regrets the hell out of it right about now.
The journalist in the woodpile was none other than Jeffery Goldberg, editor-in-chief of The Atlantic. I’ve written about the hows and whys of the mixup here. If you haven’t done so already, please check it out. It will help you understand this piece a little better.
If you listen to the talking heads in the press for a while, you’ll hear all kinds of allegations that classified material was shared through the Signal app. During a Senate Intelligence Committee hearing held today, Director of National Intelligence Tulsi Gabbard and CIA Director John Ratcliffe both repeatedly denied classified material was shared in the controversial Signal group chat. Were sensitive topics discussed? I can’t say for sure; I wasn’t in on that particular Signal chat. But they probably were. Remember, however, that sensitive does not necessarily equal classified.
The Meaning of Classified
The problem we keep running into is a misunderstanding of the word “classified.” Just because the group was discussing national security doesn’t mean the contents of the chat were classified. Remember when Bill Clinton was being deposed for the whole Monica Lewinsky scandal, and he uttered the famous line, “That depends on what the meaning of ‘is’, ”is'”. It’s kind of like that.
“Classified” has become a generic, catch-all word much like “Velcro” or “Kleenex.” In military circles, “classified” has a very specific meaning and that is what I am going to get into today. It is not as cut and dried as one may think, but I am going to do my best to explain it today.
In the wild world of national security, safeguarding sensitive information is paramount. Real life and death stuff. The United States employs a structured classification system to protect data that, if disclosed without authorization, could jeopardize national interests. At the heart of this system are individuals known as Original Classification Authorities (OCAs), who are entrusted with the initial determination of what information requires classification. You see, for something to be classified, there has to be a classifier, and that’s the OCA.
Make sense? Great, let’s move on.
This article aims to demystify the classification process and show you the six critical steps undertaken by OCAs while keeping things as clear as possible.
What Is Classification?
Classification is the formal process of identifying information that necessitates protection due to its potential impact on national security if exposed. This process assigns a specific level of confidentiality to information, dictating how it should be handled and who may access it.
The primary classification levels are Confidential, Secret, and Top Secret, each reflecting the severity of potential damage unauthorized disclosure could inflict.
Who Are Original Classification Authorities (OCAs)?
OCAs are senior officials within the U.S. government who have been granted the authority to classify information originally. This means they make the initial decision that certain information requires protection. Positions such as the President, Vice President, Secretary of Defense, and the Secretaries of the Military Departments inherently possess this authority. Additionally, other officials may be delegated OCA status in writing, provided there is a demonstrable and continuing need. Before exercising this authority, OCAs must undergo rigorous training in proper classification procedures, including strategies to avoid over-classification and to understand declassification protocols.
The Six Steps of the Original Classification Process
To ensure consistency and appropriateness in classification decisions, OCAs adhere to a standardized six-step process:
Step 1: Determine if the Information Is Official Government Information
The OCA must first ascertain whether the information in question is official government material. This encompasses information that is owned by, produced by for, or under the control of the U.S. government. If the information doesn’t meet these criteria, it is ineligible for classification, and the process halts here.
Step 2: Assess Eligibility for Classification
Next, the OCA evaluates whether the information falls into one of the categories deemed classifiable under Executive Order 13526. These categories include, but are not limited to:
- Military plans, weapons systems, or operations
- Foreign government information
- Intelligence activities, sources, or methods
- Foreign relations or foreign activities of the U.S.
- Scientific, technological, or economic matters related to national security
- U.S. government programs for safeguarding nuclear materials or facilities
- Vulnerabilities or capabilities of systems, installations, infrastructures, projects, plans, or protection services related to national security
- Development, production, or use of weapons of mass destruction
If the information doesn’t align with any of these categories, it cannot be classified.
Step 3: Evaluate the Potential Impact on National Security
The OCA must then determine the potential damage to national security that could result from unauthorized disclosure of the information. If it’s assessed that no harm would occur, the information should not be classified. Conversely, if disclosure could reasonably be expected to cause damage, the OCA proceeds to classify the information appropriately.
Step 4: Assign the Appropriate Classification Level
Based on the severity of potential damage identified in the previous step, the OCA assigns a classification level:
- Confidential: Unauthorized disclosure could cause damage to national security.
- Secret: Unauthorized disclosure could cause serious damage to national security.
- Top Secret: Unauthorized disclosure could cause exceptionally grave damage to national security.
This tiered system ensures that information receives protection commensurate with its sensitivity.
Step 5: Determine the Duration of Classification
The OCA decides how long the information should remain classified. Whenever possible, a specific declassification date or event is identified, ensuring that information isn’t kept classified indefinitely without justification. If no such date or event can be determined, the OCA may set a duration of up to 25 years, with certain exemptions allowing for longer periods in specific cases.
Step 6: Communicate Classification Guidance
Finally, the OCA must effectively communicate the classification decision to ensure proper handling and protection. This is typically achieved through:
- Security Classification Guides (SCGs): Comprehensive documents that provide detailed classification instructions for specific programs or projects.
- Properly Marked Source Documents: Documents that clearly indicate their classification status, guiding derivative classifiers in their work.
Clear communication ensures that all personnel understand the sensitivity of the information and handle it accordingly.
Why This Process Matters
The meticulous six-step process followed by OCAs is designed to balance the need for national security with the public’s right to information. By ensuring that only information truly requiring protection is classified and by specifying the duration of the classification, the system tries to prevent unnecessary secrecy and promote transparency wherever possible.
Understanding this process is crucial, not just for those within the government but for all citizens.
It allows people to have meaningful discussions rather than screaming at each other that someone just sent a classified text message.
So the next time someone throws around the word “classified” like it’s confetti, you’ll know better—and maybe even be able to shut down the noise with a little hard truth.
COMMENTS
There are
on this article.
You must become a subscriber or login to view or post comments on this article.