Nixed News, Hidden Headlines, Suppressed Stories
ARCHIVES   |   NEWS DESKS   |   SYNDICATE (XML)   |  

"History teaches that grave threats to liberty often come in times of urgency, when constitutional rights seem too extravagant to endure."
— Justice Thurgood Marshall (1989)

CURRENT HOT ZONES:
Vote Fraud: Internal Documents from Diebold Election Systems
De-BS: A Guide to 'Senior Administration Officials'
Space: NASA Mars Exploration Project
The Junta: Bush Admin

Movable Type
Powered by
Movable Type 2.63


RECOMMENDED SITES:
(not paid advertising)

Click for NameBase

The National Security Archive at George Washington University

CONSORTIUM NEWS - Edited by Robert Parry


 

March 25, 2003

Bush Orders Halt to Document Declassifications Required by Law, Will Re-classify Many Others Already Released

'Bush Delays Release of Classified Papers' (3/25/03 - AP via ABC News)

President Bush signed an Executive Order today that delays the release of millions of documents that were due to be automatically declassified, as required by a 1975 law. What's more, he announced the government would actually re-classify documents already released if such would be in the interest of "national security" -- whatever that means.

What many have already noted is the absurdity of reclassifying documents that have already been in circulation for some time. Even funnier, of course, that many of the documents to be released would have included stuff having to do with the Ford Administration. Of course, many in GW's cabinet (including President Cheney and Reichsminister of Offense Donald Rumsfeld) cut their teeth in the Ford Admin., a period notable for such things as the CIA-sponsored fascist coup in Chile. Surely GW isn't trying to hide anything, no is he?

This isn't the first time GW has pulled a secrecy stunt like this. Back in November 2001, while everyone was distracted by freaking out over the 9-11 attacks, he quietly signed an order barring the required declassification of presidential and vice-presidential papers that included the Reagan and Bush I periods -- notable for such fun as the October Surprise, the Iran-Contra scandal, and CIA support for coke-dealing Contras.

For it's part, the current Administration says they are "just" going back to secrecy policies like those during the Cold War. Those who remember their history will tell you those very secrecy policies tended more to cover-up high crimes and misdemeanors than to protect vital state secrets. The more puckish might claim those would be one and the same things -- uh, but you didn't hear it here, okay?

[Read the source...]

Related Links:




DRAFT VERSION OF THE REVISIONS:

Source: http://www.fas.org/sgp/bush/drafteo.html

FAS Note: The following is a draft Bush Administration revision of Executive Order (EO) 12958 on national security information policy. When finalized, the new executive order will define information classification and declassification policy. This draft document was circulated among executive branch agencies for comment in March 2003. Deletions from EO 12958 are indicated in this way, while proposed new additions are underlined.


EXECUTIVE ORDER 12958



CLASSIFIED NATIONAL SECURITY INFORMATION


This order prescribes a uniform system for classifying,
safeguarding, and declassifying national security information. Our
democratic principles require that the American people be informed of
the activities of their Government. Also, our Nation's progress
depends on the free flow of information. Nevertheless, throughout our
history, the national interest has required that certain information be
maintained in confidence in order to protect our citizens, our
democratic institutions, and our participation within the community of
nations. Protecting information critical to our Nation's security
remains a priority. In recent years, however, dramatic changes have
altered, although not eliminated, the national security threats that we
confront. These changes provide a greater opportunity to emphasize our
commitment to open Government.


NOW, THEREFORE, by the authority vested in me as President by the
Constitution and the laws of the United States of America, it is hereby
ordered as follows:

PART 1 -- ORIGINAL CLASSIFICATION

Sec. 1.1. Classification Standards. (a) Information may be
originally classified under the terms of this order only if all of the
following conditions are met:

    (1) an original classification authority
    is classifying the information;

    (2) the information is owned by, produced
    by or for, or is under the control of the
    United States Government;

    (3) the information falls within one or
    more of the categories of information
    listed in section 1.5 1.4 of this order; and

    (4) the original classification authority
    determines that the unauthorized disclosure
    of the information reasonably could be
    expected to result in damage to the
    national security and the original
    classification authority is able to
    identify or describe the damage.

(b) If there is significant doubt about the need to classify
information, it shall not be classified. This provision does not:

    (1) amplify or modify the substantive
    criteria or procedures for classification;
    or

    (2) create any substantive or procedural
    rights subject to judicial review.

(b) Classified information shall not be declassified automatically
as a result of any unauthorized disclosure of identical or similar
information.

(c) The unauthorized disclosure of foreign government information is presumed to cause damage to the national security.

Sec. 1.2. Classification Levels. (a) Information may be
classified at one of the following three levels:

    (1) "Top Secret" shall be applied to
    information, the unauthorized disclosure of
    which reasonably could be expected to cause
    exceptionally grave damage to the national
    security that the original classification
    authority is able to identify or describe.

    (2) "Secret" shall be applied to
    information, the unauthorized disclosure of
    which reasonably could be expected to cause
    serious damage to the national security
    that the original classification authority
    is able to identify or describe.

    (3) "Confidential" shall be applied to
    information, the unauthorized disclosure of
    which reasonably could be expected to cause
    damage to the national security that the
    original classification authority is able
    to identify or describe.

(b) Except as otherwise provided by statute, no other terms shall
be used to identify United States classified information.

(c) If there is significant doubt about the appropriate level of
classification, it shall be classified at the lower level.

Sec. 1.3. Classification Authority. (a) The authority to classify
information originally may be exercised only by:

    (1) the President;



    (2) agency heads and officials designated
    by the President in the Federal Register;
    or

    (3) United States Government officials delegated this
    authority pursuant to paragraph (c), below.

(b) Officials authorized to classify information at a specified
level are also authorized to classify information at a lower level.

(c) Delegation of original classification authority.

    (1) Delegations of original classification
    authority shall be limited to the minimum
    required to administer this order. Agency
    heads are responsible for ensuring that
    designated subordinate officials have a
    demonstrable and continuing need
    to exercise this authority.

    (2) "Top Secret" original classification
    authority may be delegated only by the
    President or by an agency head or official
    designated pursuant to paragraph (a)(2),
    above.

    (3) "Secret" or "Confidential" original
    classification authority may be delegated
    only by the President; an agency head or
    official designated pursuant to
    paragraph (a)(2), above; or the senior
    agency official, provided that official has
    been delegated "Top Secret" original
    classification authority by the agency
    head.

    (4) Each delegation of original
    classification authority shall be in
    writing and the authority shall not be
    redelegated except as provided in this
    order. Each delegation shall identify the
    official by name or position title.

(d) Original classification authorities must receive training in
original classification as provided in this order and its implementing
directives. Such training must include instruction on the proper safeguarding of classified information and of the criminal, civil, and administrative sanctions that may be brought against an individual who fails to protect classified information from unauthorized disclosures.

(e) Exceptional cases. When an employee, contractor, licensee,
certificate holder, or grantee of an agency that does not have original
classification authority originates information believed by that person
to require classification, the information shall be protected in a
manner consistent with this order and its implementing directives. The
information shall be transmitted promptly as provided under this order
or its implementing directives to the agency that has appropriate
subject matter interest and classification authority with respect to
this information. That agency shall decide within 30 days whether to
classify this information. If it is not clear which agency has
classification responsibility for this information, it shall be sent to
the Director of the Information Security Oversight Office. The Director
shall determine the agency having primary subject matter interest and
forward the information, with appropriate recommendations, to that
agency for a classification determination.

Sec. 1.4. Classification Categories. Information may not be considered for classification unless it concerns:

    (a) military plans, weapons systems, or operations;

    (b) foreign government information;

    (c) intelligence activities (including special activities),
    intelligence sources or methods, or cryptology;

    (d) foreign relations or foreign activities of the United States,
    including confidential sources;

    (e) scientific, technological, or economic matters relating to the
    national security;

    (f) United States Government programs for safeguarding nuclear
    materials or facilities; or

    (g) vulnerabilities or capabilities of systems, installations, infrastructures,
    projects, plans, or protection services relating to the national security.

Sec. 1.5. Duration of Classification. (a) At the time of original
classification, the original classification authority shall attempt to
establish a specific date or event for declassification based upon the
duration of the national security sensitivity of the information. The
date or event shall not exceed the time frame in paragraph (b), below.

(b) If the original classification authority cannot determine an
earlier specific date or event for declassification, information shall
be marked for declassification 10 years from the date of the original
decision, except as provided in paragraph (d), below unless the original classification authority otherwise determines that the sensitivity of the information requires that it shall be marked for declassification 25 years from the date of the original decision. All information classified under this section shall be subject to section 3.3 of this Order if it is contained in records of permanent historical value.

(c) An original classification authority may extend the duration of
classification, change the level of classification, or reclassify specific information for successive periods
not to exceed 10 years at a time if such action is consistent with
only when the
standards and procedures for classifying information established under this order are followed. An original classification authority may extend the duration of classification for information contained in non-permanent records beyond 25 years in accordance with the standards and procedures for classifying information under this order, but, except for information that identifies a confidential human source or a human intelligence source, shall identify a specific date or event for declassification of the information. This provision
does not apply to information contained in records that are more than 25
years old and have been determined to have permanent historical value
under title 44, United States Code.

(d) At the time of original classification, the original
classification authority may exempt from declassification within 10
years specific information, the unauthorized disclosure of which could
reasonably be expected to cause damage to the national security for a
period greater than that provided in paragraph (b), above, and the
release of which could reasonably be expected to:

    (1) reveal an intelligence source, method,
    or activity, or a cryptologic system or
    activity;

    (2) reveal information that would assist
    in the development or use of weapons of
    mass destruction;

    (3) reveal information that would impair
    the development or use of technology within
    a United States weapons system;

    (4) reveal United States military plans,
    or national security emergency preparedness
    plans;

    (5) reveal foreign government information;

    (6) damage relations between the
    United States and a foreign government,
    reveal a confidential source, or seriously
    undermine diplomatic activities that are
    reasonably expected to be ongoing for a
    period greater than that provided in
    paragraph (b), above;

    (7) impair the ability of responsible
    United States Government officials to
    protect the President, the Vice President,
    and other individuals for whom protection
    services, in the interest of national
    security, are authorized; or

    (8) violate a statute, treaty, or
    international agreement.

(d) Information marked for an indefinite duration of
classification under predecessor orders, for example, "Originating
Agency's Determination Required," or information classified under
predecessor orders that contains no declassification instructions shall
be declassified in accordance with part 3 of this order.

Sec. 1.6. Identification and Markings. (a) At the time of
original classification, the following shall appear on the face of each
classified document, or shall be applied to other classified media in an
appropriate manner:

    (1) one of the three classification levels
    defined in section 1.2 of this order;

    (2) the identity, by name or personal
    identifier and position, of the original
    classification authority;

    (3) the agency and office of origin, if
    not otherwise evident;

    (4) declassification instructions, which
    shall indicate one of the following:

      (A) the date or event for
      declassification, as prescribed in
      section 1.5(a) or section 1.5(c); or

      (B) the date that is 10 years from
      the date of original classification,
      as prescribed in section 1.5(b); or

      (C) the date that is 25 years from the date of original classification, as prescribed in section 1.5(b); and

    (5) a concise reason for classification
    which, at a minimum, cites the applicable
    classification categories in section 1.4 of
    this order.

(b) Specific information contained in paragraph (a), above, may be
excluded if it would reveal additional classified information.

(c) Each classified document shall, by marking or other means,
indicate which portions are classified, with the applicable
classification level, and which portions are unclassified.
In accordance with standards prescribed in directives issued under this
order, the Director of the Information Security Oversight Office may
grant waivers of this requirement. The Director shall revoke any waiver upon a finding of
abuse.

(d) Markings implementing the provisions of this order, including
abbreviations and requirements to safeguard classified working papers,
shall conform to the standards prescribed in implementing directives
issued pursuant to this order.

(e) Foreign government information shall retain its original
classification markings or shall be assigned a U.S. classification that
provides a degree of protection at least equivalent to that required by
the entity that furnished the information.

(f) Information assigned a level of
classification under this or predecessor orders shall
be considered as classified at that level of
classification despite the omission of other required
markings. Whenever such information is used in the
derivative classification process or is reviewed for
possible declassification, holders of such
information shall coordinate with an appropriate
classification authority for the application of
omitted markings.

(g) The classification authority shall, whenever practicable, use a
classified addendum whenever classified information constitutes a small
portion of an otherwise unclassified document.

(h) Prior to public release, all declassified records will be appropriately marked to reflect their declassification.

Sec. 1.7. Classification Prohibitions and Limitations. (a) In no case shall information be classified in order to:

    (1) conceal violations of law,
    inefficiency, or administrative error;

    (2) prevent embarrassment to a person,
    organization, or agency;

    (3) restrain competition; or

    (4) prevent or delay the release of
    information that does not require
    protection in the interest of national
    security.

(b) Basic scientific research information not clearly related to
the national security may not be classified.

(c) Information may not be reclassified after it has been
declassified
declassification and release to the public under proper authority only in accordance with the following conditions:

    (1) the reclassification action is taken under the personal authority of the agency head or deputy agency head, who determines in writing that the reclassification of the information or documents is necessary in the interest of the national security;

    (2) the information or documents may be reasonably recovered; and

    (3) the reclassification action is reported promptly to the Director of the Information Security Oversight Office.


(d) Information that has not previously been disclosed to the
public under proper authority may be classified or reclassified after an
agency has received a request for it under the Freedom of Information
Act (5 U.S.C. 552) or the Privacy Act of 1974 (5 U.S.C. 552a), or the
mandatory review provisions of section 3.5 of this order only if such
classification meets the requirements of this order and is accomplished
on a document-by-document basis with the personal participation or under
the direction of the agency head, the deputy agency head, or the senior
agency official designated under section 5.4 of this order. This
provision does not apply to classified information contained in records
that are more than 25 years old and have been determined to have
permanent historical value under title 44, United States Code.

(e) Compilations of items of information which are individually
unclassified may be classified if the compiled information reveals an
additional association or relationship that: (1) meets the standards for classification
under this order; and (2) is not otherwise revealed in the individual items of information.
As used in this order, "compilation" means an aggregation of
pre-existing unclassified items of information.

Sec. 1.8. Classification Challenges. (a)
Authorized holders of information who, in good faith,
believe that its classification status is improper
are encouraged and expected to challenge the
classification status of the information in
accordance with agency procedures established under
paragraph (b), below.

(b) In accordance with implementing directives issued pursuant to
this order, an agency head or senior agency official shall establish
procedures under which authorized holders of information are encouraged
and expected to challenge the classification of information that they
believe is improperly classified or unclassified. These procedures
shall assure that:

    (1) individuals are not subject to
    retribution for bringing such actions;

    (2) an opportunity is provided for review
    by an impartial official or panel; and

    (3) individuals are advised of their right
    to appeal agency decisions to the
    Interagency Security Classification Appeals
    Panel established by section 5.3 of this
    order.

PART 2 -- DERIVATIVE CLASSIFICATION

Sec. 2.1. Use of Derivative Classification. (a) Persons who only
reproduce, extract, or summarize classified information, or who only
apply classification markings derived from source material or as
directed by a classification guide, need not possess original
classification authority.

(b) Persons who apply derivative classification
markings shall:

    (1) observe and respect original
    classification decisions; and

    (2) carry forward to any newly created
    documents the pertinent classification
    markings. For information derivatively
    classified based on multiple sources, the
    derivative classifier shall carry forward:

      (A) the date or event for
      declassification that corresponds to
      the longest period of classification
      among the sources; and

      (B) a listing of these sources on or
      attached to the official file or
      record copy.

Sec. 2.2. Classification Guides. (a) Agencies with original
classification authority shall prepare classification guides to
facilitate the proper and uniform derivative classification of
information. These guides shall conform to standards contained in
directives issued under this order.

(b) Each guide shall be approved personally and in writing by an
official who:

    (1) has program or supervisory
    responsibility over the information or is
    the senior agency official; and

    (2) is authorized to classify information
    originally at the highest level of
    classification prescribed in the guide.

(c) Agencies shall establish procedures to assure that
classification guides are reviewed and updated as provided in directives
issued under this order.

PART 3 -- DECLASSIFICATION AND DOWNGRADING

Sec. 3.1. Authority for Declassification. (a) Information shall
be declassified as soon as it no longer meets the standards for
classification under this order.

(b) It is presumed that information that continues to meet the
classification requirements under this order requires continued
protection. In some exceptional cases, however, the need to protect
such information may be outweighed by the public interest in disclosure
of the information, and in these cases the information should be
declassified. When such questions arise, they shall be referred to the
agency head or the senior agency official. That official will
determine, as an exercise of discretion, whether the public interest in
disclosure outweighs the damage to national security that might
reasonably be expected from disclosure. This provision does not:

    (1) amplify or modify the substantive
    criteria or procedures for classification;
    or

    (2) create any substantive or procedural
    rights subject to judicial review.

(c) If the Director of the Information Security Oversight Office
determines that information is classified in violation of this order,
the Director may require the information to be declassified by the
agency that originated the classification. Any such decision by the
Director may be appealed to the President through the Assistant to the
President for National Security Affairs. The information shall remain
classified pending a prompt decision on the appeal.

(d) The provisions of this section shall also apply to agencies
that, under the terms of this order, do not have original classification
authority, but had such authority under predecessor orders.

Sec. 3.2. Transferred Information Records. (a) In the case of classified information records transferred in conjunction with a transfer of functions,
and not merely for storage purposes, the receiving agency shall be
deemed to be the originating agency for purposes of this order.

(b) In the case of classified information records that is are not officially
transferred as described in paragraph (a), above, but that originated
in an agency that has ceased to exist and for which there is no
successor agency, each agency in possession of such information records shall
be deemed to be the originating agency for purposes of this order.
Such information records may be declassified or downgraded by the agency in
possession after consultation with any other agency that has an
interest in the subject matter of the information records.

(c) Classified information records accessioned into the National Archives
and Records Administration ("National Archives") as of the effective
date of this order shall be declassified or downgraded by the Archivist
in accordance with this order, the directives issued pursuant to this
order, agency declassification guides, and any existing procedural
agreement between the Archivist and the relevant agency head.

(d) The originating agency shall take all reasonable steps to
declassify classified information records contained in records determined to
have permanent historical value before they are accessioned into the
National Archives. However, the Archivist may require that classified records
containing classified information be accessioned into the National
Archives when necessary to comply with the provisions of the Federal
Records Act. This provision does not apply to information records being
transferred to the Archivist pursuant to section 2203 of title 44,
United States Code, or information records for which the National Archives and
Records Administration serves as the custodian of the records of an
agency or organization that goes out of existence.

(e) To the extent practicable, agencies shall adopt a system of
records management that will facilitate the public release of documents
at the time such documents are declassified pursuant to the provisions
for automatic declassification in section 3.3 of this order.

Sec. 3.3. Automatic Declassification. (a) Subject to paragraph
(b)-(e), below, within 5 years from the date of this order, on December 31, 2006 all classified
information contained in records that (1) are more than 25 years old,
and (2) have been determined to have permanent historical value under
title 44, United States Code, shall be automatically declassified
whether or not the records have been reviewed. Subsequently, all
classified information in such records shall be automatically
declassified no longer than on December 31 of the year that is 25 years from the date of its original
classification, except as provided in paragraph (b)-(e), below. For records otherwise subject to this paragraph for which a review or assessment conducted by the agency and confirmed by the Information Security Oversight Office has determined that they: (1) contain information that was created by or is under the control of more than one agency, or (2) are within file series containing information that almost invariably pertains to intelligence sources or methods, all classified
information in such records shall be automatically declassified, whether or not the records have been reviewed, within 8 years from the date of this order, except as provided in paragraph (b), below. For records that contain information that becomes subject to automatic declassification after the dates otherwise established in this paragraph, all classified information in such records shall be automatically declassified, whether or not the records have been reviewed on December 31 of the year that
is 25 years from the origin of the information, except as provided in paragraph (b), below.

(b) An agency head may exempt from automatic declassification under
paragraph (a), above, specific information, the release of which should
be expected to:

    (1) reveal the identity of a confidential
    human source, or a human intelligence source, or reveal information about
    the application of an intelligence source
    or method; or reveal the identity of a
    human intelligence source when the
    unauthorized disclosure of that source
    would clearly and demonstrably damage the
    national security interests of the
    United States;

    (2) reveal information that would assist
    in the development or use of weapons of
    mass destruction;

    (3) reveal information that would impair
    U.S. cryptologic systems or activities;

    (4) reveal information that would impair
    the application of state of the art
    technology within a U.S. weapon system;

    (5) reveal actual U.S. military war plans
    that remain in effect;

    (6) reveal information, including foreign government information, that would
    seriously and demonstrably impair relations
    between the United States and a foreign
    government, or seriously and demonstrably
    undermine ongoing diplomatic activities of
    the United States;

    (7) reveal information that would clearly
    and demonstrably impair the current ability
    of United States Government officials to
    protect the President, Vice President, and
    other officials for whom protection
    services, in the interest of national
    security, are authorized;

    (8) reveal information that would
    seriously and demonstrably impair current
    national security emergency preparedness
    plans or reveal current vulnerabilities of systems, installations, infrastructures, or projects relating to the national security; or

    (9) violate a statute, treaty, or
    international agreement.

(c) No later than the effective date of this order, An agency head
shall notify the President through the Assistant to the President for
National Security Affairs of any specific file series of records for
which a review or assessment has determined that the information within
those file series almost invariably falls within one or more of the
exemption categories listed in paragraph (b), above, and which the
agency proposes to exempt from automatic declassification. The
notification shall include:

    (1) a description of the file series;

    (2) an explanation of why the information
    within the file series is almost invariably
    exempt from automatic declassification and
    why the information must remain classified
    for a longer period of time; and

    (3) except for the identity of a
    confidential human source or a human
    intelligence source, as provided in
    paragraph (b), above, a specific date or
    event for declassification of the
    information.

The President may direct the agency head not to exempt the file series
or to declassify the information within that series at an earlier date
than recommended.

(d) At least 180 days before information is automatically
declassified under this section, an agency head or senior agency
official shall notify the Director of the Information Security Oversight
Office, serving as Executive Secretary of the Interagency Security
Classification Appeals Panel, of any specific information beyond that
included in a notification to the President under paragraph (c), above,
that the agency proposes to exempt from automatic declassification. The
notification shall include:

    (1) a description of the information, either by reference to information in specific records or in the form of a declassification guide;

    (2) an explanation of why the information
    is exempt from automatic declassification
    and must remain classified for a longer
    period of time; and

    (3) except for the identity of a
    confidential human source or a human
    intelligence source, as provided in
    paragraph (b), above, a specific date or
    event for declassification of the
    information. The Panel may direct the
    agency not to exempt the information or to
    declassify it at an earlier date than
    recommended. The agency head may appeal
    such a decision to the President through
    the Assistant to the President for National
    Security Affairs. The information will
    remain classified while such an appeal is
    pending.



(e) The following provisions shall apply to the onset of automatic declassification:



    (1) Classified records within an integral file block, as defined below, that are otherwise subject to automatic declassification under this section, shall not be automatically declassified until December 31 of the year that is 25 years from the date of the most recent record within the file block.

    (2) By notification to the Director of the Information Security Oversight Office, before the records are subject to automatic declassification, an agency head or senior agency official designated under section 5.4 of this order, may delay automatic declassification for up to five additional years for classified information contained in microforms, motion pictures, audiotapes, videotapes or comparable media that make a review for possible declassification exemptions more difficult or costly.

    (3) By notification to the Director of the Information Security Oversight Office, before the records are subject to automatic declassification, an agency head or senior agency official designated under section 5.4 of this order, may delay automatic declassification for up to three years for classified records that have been referred or transferred to that agency by another agency less than three years before automatic declassification would otherwise be required.

    (4) By notification to the Director of the Information Security Oversight Office, an agency head or senior agency official designated under section 5.4 of this order, may delay automatic declassification for up to three years from the date of discovery of classified records that were inadvertently not reviewed prior to the effective date of automatic declassification.

(e) No later than the effective date of this order, the agency head
or senior agency official shall provide the Director of the Information
Security Oversight Office with a plan for compliance with the
requirements of this section, including the establishment of interim
target dates. Each such plan shall include the requirement that the
agency declassify at least 15 percent of the records affected by this
section no later than 1 year from the effective date of this order, and
similar commitments for subsequent years until the effective date for
automatic declassification.

(f) Information exempted from automatic declassification under this
section shall remain subject to the mandatory and systematic
declassification review provisions of this order.

(g) The Secretary of State shall determine when the United States
should commence negotiations with the appropriate officials of a foreign
government or international organization of governments to modify any
treaty or international agreement that requires the classification of
information contained in records affected by this section for a period
longer than 25 years from the date of its creation, unless the treaty or
international agreement pertains to information that may otherwise
remain classified beyond 25 years under this section.

(h) Records containing information the disclosure of which would affect other agencies' equities shall be referred for review to those agencies and the information of concern shall only be subject to automatic declassification by those agencies, consistent with the provisions of subparagraphs (e)(3) and (e)(4) of this section.

Sec. 3.4. Systematic Declassification Review. (a) Each agency
that has originated classified information under this order or its
predecessors shall establish and conduct a program for systematic
declassification review. This program shall apply to historically
valuable records exempted from automatic declassification under section
3.3 of this order. Agencies shall prioritize the systematic review of
records based upon:

    (1) recommendations of the Information
    Security Policy Advisory Council,
    established in section 5.5 of this order,
    on specific subject areas for systematic
    review concentration; or

    (2) the degree of researcher interest and
    the likelihood of declassification upon
    review.

(b) The Archivist of the shall conduct a systematic
declassification review program for classified information records: (1)
accessioned into the National Archives as of the effective date of this
order; (2) information records transferred to the Archivist pursuant to section
2203 of title 44, United States Code; and (3) information records for which the
National Archives and Records Administration serves as the custodian of the records of for an agency or organization that has gone out of existence.
This program shall apply to pertinent records no later than 25 years
from the date of their creation. The Archivist shall establish
priorities for the systematic review of these records based upon the
recommendations of the Information Security Policy Advisory Council; or

the degree of researcher interest and the likelihood of declassification
upon review. These records shall be reviewed in accordance with the
standards of this order, its implementing directives, and
declassification guides provided to the Archivist by each agency that
originated the records. The Director of the Information Security
Oversight Office shall assure that agencies provide the Archivist with
adequate and current declassification guides.

(c) After consultation with affected agencies, the Secretary of
Defense may establish special procedures for systematic review for
declassification of classified cryptologic information, and the Director
of Central Intelligence may establish special procedures for systematic
review for declassification of classified information pertaining to
intelligence activities (including special activities), or intelligence
sources or methods.

Sec. 3.5. Mandatory Declassification Review. (a) Except as
provided in paragraph (b), below, all information classified under this
order or predecessor orders shall be subject to a review for
declassification by the originating agency if:

    (1) the request for a review describes the
    document or material containing the
    information with sufficient specificity to
    enable the agency to locate it with a
    reasonable amount of effort;

    (2) the information is not exempted from
    search and review under the Central
    Intelligence Agency Information Act; and

    (3) the information has not been reviewed
    for declassification within the past
    2 years. If the agency has reviewed the
    information within the past 2 years, or the
    information is the subject of pending
    litigation, the agency shall inform the
    requester of this fact and of the
    requester's appeal rights.

(b) Information originated by:

    (1) the incumbent President;

    (2) the incumbent President's White House
    Staff;

    (3) committees, commissions, or boards
    appointed by the incumbent President; or

    (4) other entities within the Executive
    Office of the President that solely advise
    and assist the incumbent President is
    exempted from the provisions of
    paragraph (a), above. However, the
    Archivist shall have the authority to
    review, downgrade, and declassify
    information papers or records of former Presidents under the
    control of the Archivist pursuant to
    sections 2107, 2111, 2111 note, or 2203 of
    title 44, United States Code. Review
    procedures developed by the Archivist shall
    provide for consultation with agencies
    having primary subject matter interest and
    shall be consistent with the provisions of
    applicable laws or lawful agreements that
    pertain to the respective Presidential
    papers or records. Agencies with primary
    subject matter interest shall be notified
    promptly of the Archivist's decision. Any
    final decision by the Archivist may be
    appealed by the requester or an agency to
    the Interagency Security Classification
    Appeals Panel. The information shall
    remain classified pending a prompt decision
    on the appeal.

(c) Agencies conducting a mandatory review for declassification
shall declassify information that no longer meets the standards for
classification under this order. They shall release this information
unless withholding is otherwise authorized and warranted under
applicable law.

(d) In accordance with directives issued pursuant to this order,
agency heads shall develop procedures to process requests for the
mandatory review of classified information. These procedures shall
apply to information classified under this or predecessor orders. They
also shall provide a means for administratively appealing a denial of a
mandatory review request, and for notifying the requester of the right
to appeal a final agency decision to the Interagency Security
Classification Appeals Panel.

(e) After consultation with affected agencies, the Secretary of
Defense shall develop special procedures for the review of cryptologic
information, the Director of Central Intelligence shall develop special
procedures for the review of information pertaining to intelligence
activities (including special activities), or intelligence sources or
methods, and the Archivist shall develop special procedures for the
review of information accessioned into the National Archives.

Sec. 3.6. Processing Requests and Reviews. In response to a
request for information under the Freedom of Information Act, the
Privacy Act of 1974, or the mandatory review provisions of this order,
or pursuant to the automatic declassification or systematic review
provisions of this order:

(a) An agency may refuse to confirm or deny the existence or
nonexistence of requested information whenever the fact of its existence
or nonexistence is itself classified under this order.

(b) When an agency receives any request for documents in its
custody that contain information that was originally classified by
another agency, or comes across such documents in the process of the
automatic declassification or systematic review provisions of this
order, it shall refer copies of any request and the pertinent documents
to the originating agency for processing, and may, after consultation
with the originating agency, inform any requester of the referral unless
such association is itself classified under this order. In cases in
which the originating agency determines in writing that a response under
paragraph (a), above, is required, the referring agency shall respond to
the requester in accordance with that paragraph.

Sec. 3.7. Declassification Database. (a) The Director of the Information Security Oversight
Office in conjunction with those agencies that originate classified information, shall
coordinate the linkage and effective utilization of existing agency databases of records that have been
declassified and publicly released.

(b) Agency heads shall fully cooperate with the Director of the Information Security Oversight Office in these efforts.

(c) Except as otherwise authorized and warranted by law, all
declassified information contained within the database established under
paragraph (a), above, shall be available to the public.


PART 4 -- SAFEGUARDING

Sec. 4.1. General Restrictions on Access. (a) A person may have
access to classified information provided that:

    (1) a favorable determination of
    eligibility for access has been made by an
    agency head or the agency head's designee;

    (2) the person has signed an approved
    nondisclosure agreement; and

    (3) the person has a need-to-know the
    information.



(b) Every person who has met the standards for access to classified information in paragraph (a), above, shall receive contemporaneous training on the proper safeguarding of classified information and of the criminal, civil, and administrative sanctions that may be imposed on an individual who fails to protect classified information from unauthorized disclosure.

(c) Classified information shall remain under the control of the
originating agency or its successor in function. An agency shall not
disclose information originally classified by another agency without its
authorization. An official or employee leaving agency service may not
remove classified information from the agency's control.

(d) Classified information may not be removed from official
premises without proper authorization.

(e) Persons authorized to disseminate classified information
outside the executive branch shall assure the protection of the
information in a manner equivalent to that provided within the executive
branch.

(f) Consistent with law, directives, and regulation, an agency head
or senior agency official shall establish uniform procedures to ensure
that automated information systems, including networks and
telecommunications systems, that collect, create, communicate, compute,
disseminate, process, or store classified information have controls
that:

    (1) prevent access by unauthorized
    persons; and

    (2) ensure the integrity of the
    information.

(g) Consistent with law, directives, and regulation, each agency
head or senior agency official shall establish controls to ensure that
classified information is used, processed, stored, reproduced,
transmitted, and destroyed under conditions that provide adequate
protection and prevent access by unauthorized persons.

(h) Consistent with directives issued pursuant to this order, an
agency shall safeguard foreign government information under standards
that provide a degree of protection at least equivalent to that required
by the government or international organization of governments that
furnished the information. When adequate to achieve equivalency, these
standards may be less restrictive than the safeguarding standards that
ordinarily apply to United States "Confidential" information, including
allowing access to individuals with a need-to-know who have not
otherwise been cleared for access to classified information or executed
an approved nondisclosure agreement.

(i) Except as otherwise provided by statute or by this order, or its implementing directives issued pursuant to
this order
, classified information originating in one agency may not shall not be
disseminated outside any other agency to which it has been made
available without the consent of the originating agency. An agency head
or senior agency official may waive this requirement for specific
information originated within that agency. For purposes of this
section, the Department of Defense shall be considered one agency. Prior consent is not required when referring records for declassification review that contain information originating in several agencies.

Sec. 4.2. Distribution Controls. (a) Each agency shall establish
controls over the distribution of classified information to assure that
it is distributed only to organizations or individuals eligible for
access who also have a need-to-know the information.

(b) In an emergency, when necessary to respond to an imminent threat to life or in defense of the homeland, the agency head or a designee(s) may authorize the disclosure of classified information to an individual or individuals who are otherwise not eligible for access. Such actions shall be taken only in accordance with the directives implementing this order and any procedures issued by agencies governing the classified information, which shall be designed to minimize the classified information that is disclosed under these circumstances and the number of individuals who receive it. Information disclosed under this provision or implementing directives and procedures shall not be deemed declassified as a result of such disclosure or subsequent use by a recipient. Such disclosures shall be reported promptly to the originator of the classified information. For purposes of this section, the Director of Central Intelligence may issue an implementing directive governing the emergency disclosure of classified intelligence information.

(c) Each agency shall update, at least annually, the automatic,
routine, or recurring distribution of classified information that they
distribute. Recipients shall cooperate fully with distributors who are
updating distribution lists and shall notify distributors whenever a
relevant change in status occurs.

Sec. 4.3. Special Access Programs. (a) Establishment of special
access programs. Unless otherwise authorized by the President, only the
Secretaries of State, Defense and Energy, and the Director of Central
Intelligence, or the principal deputy of each, may create a special
access program. For special access programs pertaining to intelligence
activities (including special activities, but not including military
operational, strategic and tactical programs), or intelligence sources
or methods, this function will be exercised by the Director of Central
Intelligence. These officials shall keep the number of these programs
at an absolute minimum, and shall establish them only upon a specific
finding that:


    (1) the vulnerability of, or threat to,
    specific information is exceptional; and

    (2) the normal criteria for determining
    eligibility for access applicable to
    information classified at the same level
    are not deemed sufficient to protect the
    information from unauthorized disclosure;
    or

    (3) the program is required by statute.

(b) Requirements and Limitations.

    (1) Special access programs
    shall be limited to programs in which the number of persons who will
    have access ordinarily will be reasonably small and commensurate with
    the objective of providing enhanced protection for the information
    involved.

    (2) Each agency head shall establish and
    maintain a system of accounting for special
    access programs consistent with directives
    issued pursuant to this order.

    (3) Special access programs shall be
    subject to the oversight program
    established under section 5.4(d) of this
    order. In addition, the Director of the
    Information Security Oversight Office shall
    be afforded access to these programs,
    in accordance with the security
    requirements of each program, in order to
    perform the functions assigned to the
    Information Security Oversight Office under
    this order. An agency head may limit
    access to a special access program to the
    Director and no more than one other
    employee of the Information Security
    Oversight Office; or, for special access
    programs that are extraordinarily sensitive
    and vulnerable, to the Director only.

    (4) The agency head or principal deputy
    shall review annually each special access
    program to determine whether it continues
    to meet the requirements of this order.

    (5) Upon request, an agency shall brief
    the Assistant to the President for National
    Security Affairs, or his or her designee,
    on any or all of the agency's special
    access programs.

(c) Within 180 days after the effective date of this order, each
agency head or principal deputy shall review all existing special access
programs under the agency's jurisdiction. These officials shall
terminate any special access programs that do not clearly meet the
provisions of this order. Each existing special access program that an
agency head or principal deputy validates shall be treated as if it were
established on the effective date of this order.

(d) Nothing in this order shall supersede any requirement made by
or under 10 U.S.C. 119.

Sec. 4.5. Access by Historical Researchers and Former Presidential
Appointees. (a) The requirement in section 4.1(a)(3) of this order that
access to classified information may be granted only to individuals who
have a need-to-know the information may be waived for persons who:

    (1) are engaged in historical research
    projects; or

    (2) previously have occupied policy-making
    positions to which they were appointed by
    the President.

(b) Waivers under this section may be granted only if the agency
head or senior agency official of the originating agency:

    (1) determines in writing that access is
    consistent with the interest of national
    security;

    (2) takes appropriate steps to protect
    classified information from unauthorized
    disclosure or compromise, and ensures that
    the information is safeguarded in a manner
    consistent with this order; and

    (3) limits the access granted to former
    Presidential appointees to items that the
    person originated, reviewed, signed, or
    received while serving as a Presidential
    appointee.


PART 5 -- IMPLEMENTATION AND REVIEW

Sec. 5.1. Program Direction. (a) The Director of the Information Security Oversight Office, under the direction of
the Archivist of the United States and in consultation with the Assistant to the
President for National Security Affairs and the co-chairs of the
Security Policy Board
, shall issue such directives as are necessary to
implement this order. These directives shall be binding upon the
agencies. Directives issued by the Director of the Information Security Oversight Office shall establish standards for:

    (1) classification and marking principles;



    (2) safeguarding classified information, which shall pertain to the handling, storage, distribution, transmittal, and destruction of and accounting for classified information;

    (3) agency security education and training
    programs;

    (4) agency self-inspection programs; and

    (5) classification and declassification
    guides.

(b) The Archivist of the United States shall
delegate the implementation and monitorship functions of this program to
the Director of the Information Security Oversight Office.

(c) The Security Policy Board, established by a Presidential
Decision Directive, shall make a recommendation to the President
through the Assistant to the President for National Security Affairs
with respect to the issuance of a Presidential directive on
safeguarding classified information. The Presidential directive shall
pertain to the handling, storage, distribution, transmittal, and
destruction of and accounting for classified information.

Sec. 5.2. Information Security Oversight Office. (a) There is
established within the National Archives and Records Administration an Information
Security Oversight Office. The Archivist of the United States shall appoint the Director of the Information Security Oversight
Office, subject to the approval of the President.

(b) Under the direction of the Archivist of the United States, acting in consultation with the Assistant to the President
for National Security Affairs, the Director of the Information Security
Oversight Office shall:

    (1) develop directives for the
    implementation of this order;

    (2) oversee agency actions to ensure
    compliance with this order and its
    implementing directives;

    (3) review and approve agency implementing
    regulations and agency guides for
    systematic declassification review prior to
    their issuance by the agency;

    (4) have the authority to conduct on-site
    reviews of each agency's program
    established under this order, and to
    require of each agency those reports,
    information, and other cooperation that may
    be necessary to fulfill its
    responsibilities. If granting access to
    specific categories of classified
    information would pose an exceptional
    national security risk, the affected agency
    head or the senior agency official shall
    submit a written justification recommending
    the denial of access to the President through the Assistant to the President for National Security Affairs within
    60 days of the request for access. Access
    shall be denied pending the response;



    (5) review requests for original
    classification authority from agencies or
    officials not granted original
    classification authority and, if deemed
    appropriate, recommend Presidential
    approval through the Assistant to the President for National Security Affairs;

    (6) consider and take action on complaints
    and suggestions from persons within or
    outside the Government with respect to the
    administration of the program established
    under this order;


    (7) have the authority to prescribe, after
    consultation with affected agencies,
    standardization of forms or procedures that
    will promote the implementation of the
    program established under this order;

    (8) report at least annually to the
    President on the implementation of this
    order; and

    (9) convene and chair interagency meetings
    to discuss matters pertaining to the
    program established by this order.


Sec. 5.3. Interagency Security Classification Appeals Panel.



(a)
Establishment and Administration.

    (1) There is established an Interagency
    Security Classification Appeals Panel
    ("Panel"). The Secretaries of State and
    Defense, the Attorney General, the Director
    of Central Intelligence, the Archivist of
    the United States, and the Assistant to the
    President for National Security Affairs
    shall each appoint a senior level
    representative to serve as a member of the
    Panel. The President shall select the
    Chair of the Panel from among the Panel
    members.

    (2) A vacancy on the Panel shall be filled
    as quickly as possible as provided in
    paragraph (1), above.

    (3) The Director of the Information
    Security Oversight Office shall serve as
    the Executive Secretary. The staff of the
    Information Security Oversight Office shall
    provide program and administrative support
    for the Panel.

    (4) The members and staff of the Panel
    shall be required to meet eligibility for
    access standards in order to fulfill the
    Panel's functions.

    (5) The Panel shall meet at the call of
    the Chair. The Chair shall schedule
    meetings as may be necessary for the Panel
    to fulfill its functions in a timely
    manner.

    (6) The Information Security Oversight
    Office shall include in its reports to the
    President a summary of the
    Panel's activities.

(b) Functions. The Panel shall:

    (1) decide on appeals by persons who have
    filed classification challenges under
    section 1.8 of this order;

    (2) approve, deny, or amend agency
    exemptions from automatic declassification
    as provided in section 3.3 of this order;
    and

    (3) decide on appeals by persons or
    entities who have filed requests for
    mandatory declassification review under
    section 3.5 of this order.

(c) Rules and Procedures. The Panel shall issue bylaws, which
shall be published in the Federal Register no later than 120 days from
the effective date of this order. The bylaws shall establish the rules
and procedures that the Panel will follow in accepting, considering, and
issuing decisions on appeals. The rules and procedures of the Panel
shall provide that the Panel will consider appeals only on actions in
which: (1) the appellant has exhausted his or her administrative
remedies within the responsible agency; (2) there is no current action
pending on the issue within the federal courts; and (3) the information
has not been the subject of review by the federal courts or the Panel
within the past 2 years.


(d) Agency heads will cooperate fully with the Panel so that it
can fulfill its functions in a timely and fully informed manner. An
agency head may appeal a decision of the Panel to the President
through the Assistant to the President for National Security Affairs.
The Panel will report to the President through the Assistant to the
President for National Security Affairs any instance in which it
believes that an agency head is not cooperating fully with the Panel.

(e) The Appeals Panel is established for the sole purpose of
advising and assisting the President in the discharge of his
constitutional and discretionary authority to protect the national
security of the United States. Panel decisions are committed to the
discretion of the Panel, unless reversed by the President.

(f) Notwithstanding paragraphs (a) through (e) above, whenever the Panel decides to declassify information owned or


COMMENTS
 


All original content copyright © 2003 by subliminal media inc. unless otherwise noted. All rights reserved.
Subliminal News compiles news and information from a variety of Internet-based sources. This web site is provided as a public educational and research resource on a wholly non-commercial basis, without payment or profit. No claim of copyright is made, intended or implied by Subliminal News for any materials that we link to or quote from. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in Title 17 USC section 107 of the US Copyright Law.