The Powers That Beat: Unauthorized Disclosures, Security Violations, and Other Compromises of Intelligence Information
Director of Central Intelligence Directive 6/8
- Central Intelligence Agency
- 10 pages
- For Official Use Only
This directive is issued pursuant to the authorities and responsibilities of the Director of Central Intelligence under the National Security Act of 1947, as amended, Executive Order 12333, Executive Order 12958, and other applicable authorities to protect intelligence sources, methods, and related information and activities from unauthorized disclosure, ensure programs are developed by the Intelligence Community to protect such information and activities, and to keep the President and Congress fully and currently informed of intelligence activities, including any significant intelligence failure. Applicable provisions cited in DCID 1/1 (19 November 1998) are included by reference. This directive rescinds DCID 3/18P.
III. Unauthorized Disclosures
Unauthorized disclosures of intelligence are a serious and recurring problem whose deterrence requires continuous security vigilance, thorough inquiry and investigation, and appropriately applied sanctions. The damage to US intelligence, foreign relations, national defense, and law enforcement interests caused by unauthorized disclosures, whether individual, cumulative, intentional, or unintentional, can be as great as that caused by espionage. SOICs must constantly take steps to vigorously deter unauthorized disclosures, to identify the persons responsible, and take appropriate corrective measures.
A. General Responsibilities. SOICs shall:
1. Take appropriate action to ensure that elements under their responsibility attack the problem of unauthorized disclosures from several perspectives. Such actions shall, at a minimum, ensure that:
a. Robust personnel security screening programs assist in hiring and retaining trustworthy people; b. Security and counterintelligence training and awareness programs emphasize and regularly reinforce security rules, procedures and objectives;
c. All personnel limit access to information to those who actually need to know; and
d. Within their IC elements and in conjunction with other agencies as appropriate, utilize a full range of security, analytic, and investigatory resources to identify those who intentionally disclose or otherwise jeopardize intelligence information, take appropriate steps to sanction such persons who violate applicable statutory, Executive Order, or regulatory provisions, and take such other corrective steps necessary to prevent a recurrence of such disclosures.
2. Periodically review security programs, policies, and procedures under their cognizance in order to strengthen safeguards and update programs, policies and procedures as necessary in light of events, including changes in personnel, expanded interactions with the public, or emerging technological developments.
3. Develop procedures to ensure the appropriate protection of intelligence information by personnel engaged in collection, analytic, public information activities, or other interactions with members of the general public. Such procedures shall provide for relevant and timely guidance to reduce the likelihood of inadvertent or otherwise unintentional disclosure of classified or other intelligence information that warrants continued protection.
B. Specific Responsibilities
1. Nondisclosure Agreements. SOICs shall review their respective policies and procedures to ensure that:
a. As a condition for access to classified intelligence information under their cognizance, all individuals prior to being granted such access to classified intelligence sign appropriate nondisclosure agreements in accordance with applicable law and presidential directive. The agreements must address the responsibility to safeguard intelligence information that is classified or that is in the process of a classification determination, pursuant to law or Executive Order.
b. Personnel are aware that the prohibition against unauthorized release or disclosure applies to individuals having former as well as current access to classified intelligence information.
c. Upon termination of access to classified intelligence information, individuals receive an exit briefing. The individual’s signature will be requested acknowledging his or her continuing obligation to protect classified intelligence information and materials and to return any such information and materials in his or her possession. Refusal to provide a signature will not relieve the individual from the obligation to abide by the conditions set forth in the original nondisclosure agreement. Any individual who refuses to do so shall be so advised. Any individual who refuses to return classified intelligence information and materials in his or her possession shall be advised of applicable sanctions and reported to appropriate investigating authorities.
Classified Intelligence. Intelligence information classified pursuant to Executive Order 12958, Executive Order 12951, or other applicable authority.
Intelligence Information, Sources and Methods (and Related Materials). Includes the following information whether written or in any other medium:
1. Foreign intelligence and counterintelligence, as defined in the National Security Act of 1947, as amended, and Executive Order 12333; 2. Information describing or otherwise revealing US foreign intelligence and counterintelligence activities, sources, methods, equipment, or methodology used for the acquisition, processing, or exploitation of such intelligence; foreign military hardware obtained through intelligence activities for exploitation and the results of the exploitation; and any other data resulting from US intelligence collection efforts; or 3. Information on Intelligence Community protective security programs (e.g., personnel, physical, technical, and information security). Responsible SOIC. SOIC with primary or sole authority to conduct an internal inquiry into the suspected violation or compromise. Senior Official of the Intelligence Community (SOIC). The head of an agency, office, bureau, or other intelligence element as identified in Section 3 of the National Security Act of 1947, as amended, and Executive Order 12333.
Significant security violation or compromise, whether actual or suspected, is an unauthorized disclosure, a security violation, or a compromise of intelligence information that is either extensive in scope, indicates pervasive breach of security procedures, or is otherwise likely to have a serious effect on national security interests. Examples include:
- Evidence of an unauthorized disclosure of classified intelligence information to an international organization, a foreign power, or an agent of a foreign power, or evidence indicating possible espionage;
- Loss or compromise of classified intelligence information that could pose a risk to human life;
- Loss or compromise of classified intelligence information on a scale or over such an extended period of time as to indicate the possibility of a systemic compromise;
- Loss or compromise of information storage media or equipment containing intelligence information of such quantity or sensitivity as to potentially jeopardize intelligence activities, sources or methods;
- Evidence of clandestine surveillance devices discovered in a sensitive area;
- Loss or compromise of information revealing covert or clandestine US or liaison partner’s intelligence operations or locations;
- Loss or compromise of classified intelligence information that could seriously impair foreign relations;
Original Page: http://pocket.co/sGgPy
Research & Policy Analyst