THE NEWS BLOG

 
Steve and Jen bring you this daily review of the news
Premium Advertiser

News Blog Sponsors

News Links

BBC World Service
The Guardian
Independent
Washington Post
Newsday
Iraq Order of Battle
Agonist
NY Times
LA Times
ABC News
CNN
Blogger

 
Blogs We Like

Daily Kos
Atrios
Digby's Blog
Skippy
Operation Yellow Elephant
Iraq Casualty Count
Uggabugga
Media Matters
Talking Points
Defense Tech
Intel Dump
Soldiers for the Truth
Margaret Cho
Juan Cole
Tbogg
Corrente
Gropinator
Just a Bump in the Beltway
Baghdad Burning
Wonkette
Howard Stern
Michael Moore
James Wolcott
Cooking for Engineers
There is No Crisis
Whiskey Bar
Rude Pundit
Driftglass
At-Largely
Crooks and Liars
Amazin' Avenue
DC Media Girl
The Server Logs

 
Blogger Credits

Powered by Blogger

Archives by
Publication Date
August 2003
September 2003
October 2003
November 2003
December 2003
January 2004
February 2004
March 2004
April 2004
May 2004
June 2004
July 2004
August 2004
September 2004
October 2004
November 2004
December 2004
January 2005
February 2005
March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
November 2006
December 2006
January 2007
February 2007
Comments Credits
Comments by YACCS
Monday, October 17, 2005

What is violating a security clearance?


Revealing information can lead to jail

Security Violations

A security violation or infraction is any breach of security regulations, requirements, procedures or guidelines, whether or not a compromise results. No matter how minor, any security infraction must be reported immediately to the security office so that the incident may be evaluated and any appropriate action taken.

The following are examples of security violations:

* Leaving a classified file or security container unlocked and unattended either during or after normal working hours.
* Keeping classified material in a desk or unauthorized cabinet, container, or area.
* Leaving classified material unsecured or unattended on desks, tables, cabinets, or elsewhere in an unsecured area, either during or after normal working hours.
* Reproducing or transmitting classified material without proper authorization.
* Losing your security badge.
* Removing classified material from the work area in order to work on it at home.
* Granting a visitor, contractor, employee or any other person access to classified information without verifying both the individual's clearance level and need-to-know.
* Discussing classified information over the telephone, other than a phone approved for classified discussion.
* Discussing classified information in lobbies, cafeterias, corridors, or any other public area where the discussion might be overheard.
* Carrying safe combinations or computer passwords (identifiable as such) on one's person, writing them on calendar pads, keeping them in desk drawers, or otherwise failing to protect the security of a safe or computer.
* Failure to mark classified documents properly.
* Failure to follow appropriate procedures for destruction of classified material.

Major Violations

The significance of a security violation does not depend upon whether information was actually compromised. It depends upon the intentions and attitudes of the individual who committed the violation.

Ability and willingness to follow the rules for protection of classified information is a prerequisite for maintaining your security clearance. Although accidental and infrequent minor violations are to be expected, deliberate or repeated failure to follow the rules is definitely not. It may be a symptom of underlying attitudes, emotional, or personality problems that are a serious security concern.

The following behaviors are of particular concern and may affect your security clearance:

* A pattern of routine security violations due to inattention, carelessness, or a cynical attitude toward security discipline.
* Taking classified information home, ostensibly to work on it at home, or carrying it while in a travel status without proper authorization.
* Prying into projects or activities for which the person does not have (or no longer has) a need to know. This includes requests for classified publications from reference libraries without a valid need to know, or any attempt to gain unauthorized access to computer systems, information, or data bases.
* Intoxication while carrying classified materials or that causes one to speak inappropriately about classified matters or to unauthorized persons.
* Deliberate revelation of classified information to unauthorized persons to impress them with one's self-importance.
* Copying classified information in a manner designed to obscure classification markings. This may indicate intent to misuse classified information.
* Making unauthorized or excessive copies of classified material. Going to another office to copy classified material when copier equipment is available in one’s own work area is a potential indicator of unauthorized copies being made.
* Failing to report requests for classified information from unauthorized individuals.

Failure to report a security violation is itself a security violation and may be a very serious concern. After the arrest of Navy spy Jerry Whitworth, who was part of the infamous John Walker spy ring, interviews with Whitworth's work colleagues identified one who had noticed classified papers in Whitworth's personal locker, another who had observed Whitworth monitoring and copying a sensitive communications line without authorization, and a third who knew Whitworth took classified materials home with him but believed he was doing it only to keep his work current. Failure to report these violations enabled Whitworth's espionage to continue.

Storing classified information at home is very serious concern as it may indicate current or potential future espionage. At the time of their arrest, many well-known spies were found to have large quantities of classified documents at their residences. CIA spy Aldrich Ames had 144 classified documents at his home, while Edward Moore had 10 boxes of CIA documents at home. Of various Navy spies, Jonathan Pollard had a suitcase full of classified materials, Michael Walker had 15 pounds of classified material, while Samuel Morison had two portions of Navy documents marked Secret.


What is the punishment for revealing classified information?

Title 18, United States Code

Section 798. Disclosure of classified information

(a) Whoever knowingly and willfully communicates, furnishes, transmits, or otherwise makes available to an unauthorized person, or publishes, or uses in any manner prejudicial to the safety or interest of the United States or for the benefit of any foreign government to the detriment of the United States any classified information--

(1) concerning the nature, preparation, or use of any code, cipher, or cryptographic system of the United States or any foreign government; or

(2) concerning the design, construction, use, maintenance, or repair of any device, apparatus, or appliance used or prepared or planned for use by the United States or any foreign government for cryptographic or communication intelligence purposes; or

(3) concerning the communication intelligence activities of the United States or any foreign government; or

(4) obtained by the process of communication intelligence from the communications of any foreign government, knowing the same to have been obtained by such processes--

Shall be fined not more than $10,000 or imprisoned not more than ten years, or both.

(b) As used in subsection (a) of this section--

The term "classified information" means information which, at the time of a violation of this section, is, for reasons of national security, specifically designated by a United States Government Agency for limited or restricted dissemination or distribution;

The terms "code," "cipher," and "cryptographic system" include in their meanings, in addition to their usual meanings, any method of secret writing and any mechanical or electrical device or method used for the purpose of disguising or concealing the contents, significance, or meanings of communications;

The term "foreign government" includes in its meaning any person or persons acting or purporting to act for or on behalf of any faction, party, department, agency, bureau, or military force of or within a foreign country, or for or on behalf of any government or any person or persons purporting to act as a government within a foreign country, whether or not such government is recognized by the United States;

The term "communication intelligence" means all procedures and methods used in the interception of communications and the obtaining of information such communications by other than the intended recipients;

The term "unauthorized person" means any person who, or agency which, is not authorized to receive information of the categories set forth in subsection (a) of this section, by the President, or by the head of a department or agency of the United States Government which is expressly designated by the President to engage in communication intelligence activities for the United States.

(c) Nothing in this section shall prohibit the furnishing, upon lawful demand, of information to any regularly constituted committee of the Senate or House of Representatives of the United States of America, or joint committee thereof.

posted by Steve @ 7:30:00 PM

7:30:00 PM

The News Blog home page





 

Editorial Staff
RSS-XML Feeds

Add to My AOL

Support The News Blog

Amazon Honor System Click Here to Pay Learn More
News Blog Food Blog
Visit the News Blog Food Blog
The News Blog Shops
 
 
 
Operation Yellow Elephant
Enlist, Young Republicans