Free Essay

Classified Information Required

In:

Submitted By DFallon
Words 1241
Pages 5
ABSTRACT
This article expounds upon the reasons and requirements for classification of information in modern governments. It cites the reasons societies, governments, and leaders keep state secrets, along with historical examples of such activity. Spying – the attempt to steal such information – is discussed in context along with more recent cultural demands for more transparency from governments as to what sort of information they are keeping from their citizens. The article weighs the pros and cons of keeping classified information, and explains the requirement for keeping state secrets.

Governments have existed since mankind began forming societies thousands of years ago. Humans have always, in one form or another, gathered in groups and chosen leadership – or have been dominated by the strongest among them. Not long after people formed governments, they reasoned that information was power, and the nascent concept of classification became relevant. In our modern age, with concepts of “freedom of information”, there are those who believe that no government should keep any secrets. However, history refutes this argument strongly. Governments have an inherent need to safeguard certain types of information. Classification is, and always has been, a requirement of governments.

Some of the earliest records of government and state secrets come from Roman times. The Roman emperor Caesar was well known during his campaigns against the Celtic peoples of Europe, called Gallia by the Romans, for protecting information regarding troop size and movements from the Celts as he conquered their lands (Helm, 1976). At the same time, the Celtic tribes concealed information from the Romans regarding the locations and richness of their lead, gold, and salt mines. These are two different examples of early classified information: one of tactical importance, and one of strategic importance.

From the times of these early examples onward, people have always endeavored to protect information important to their safety and well-being, and to steal that same sort of information from their neighbors. Information, people learned very quickly, was power. In the article “Espionage”, the author stated, "political espionage is the most valuable and most difficult form…” (Gale, 2002). Political information is often classified or kept confidential. It may be for the purpose of gaining a small advantage at a negotiation, or it may be a major embarrassment to a government. Most modern countries keep detailed dossiers on other countries’ political leaders and heads of state, in hopes of gaining advantage in negotiations and treaties. In this modern age of electronic information available literally in the blink of an eye, new methods, and new entities, such as the National Security Agency, carry on the tradition of obtaining and classifying information. How those agencies are used and what is done with the information is often a matter of some controversy, and opponents such as the American Civil Liberties Union frequently lash out at them, demanding more transparency and accountability (Schoenfeld, 2006).

Along with classified information comes the art of espionage, or spying. Essentially, stealing information from one group for the benefit of another. Perhaps the most infamous American case is Robert Hanssen, an FBI agent who spied on the United States for the former Soviet Union in the 1980’s. His treachery cost several American lives, and spanned 22 of his 25 years as an FBI agent (Ragavan, 2004). His tale is a cautionary one, demonstrating the importance of protecting a nation’s sensitive information. There are of course many stories of spying, from the fictional James Bond to the factual Enigma Code of World War II. Spies and spying are often romanticized in popular culture and film, but the fact of the matter is that they serve only one true purpose in the lens of history: to retrieve secret information for their employer.

The newest threat to classified information is a very recent phenomenon stemming from a relatively new concept of “freedom of information”. Societies with an unprecedented level of individual freedoms have produced individuals or groups who have interpreted freedom of information to mean “access to any and all information, whenever, wherever, regardless of whether it is useful to me or may hurt my country”. After abuses by US soldiers at the Iraqi prison in Abu Ghraib came to light, various groups began demanding the classified information obtained by interrogation of prisoners (Davidson, 2004). However, no laws in any modern industrialized country have ever been interpreted to give such unfettered access, and access was denied. To the contrary, there are many precedents wherein courts uphold the government’s need for classification of information. In the federal case “Snepp v United States”, the ruling states, “the [Supreme] Court held the government could use employment agreements to bind its employees to vows of secrecy” (Gale, 1980). There are no countries today which do not keep some sort of information classified for their own protection or purposes.

Governments and individuals have, of course, abused classified information in the past. Possibly the single most infamous incident in the United States ended up with the resignation of a sitting President, Richard Nixon. In June of 1972, the Watergate Scandal brought abuses of power and secrets out into the public eye and forever changed America’s perspective on government secretiveness, as information obtained by illegal FBI break-ins, and then classified by the Nixon administration, was brought to light (Williams, 2005). Such abuses of classified information and the methods used to obtain, conceal, and safeguard it are, some would argue, inevitable due to human nature. However, abuses of a system do not inherently make that system “bad” or “expendable”. As of the writing of this paper, no one system of government has ever been deemed flawless.

Societies, governments, and leaders have a vested interest in protecting their way of life. Classifying information – making it secret – is an essential way to preserve a nation. Many countries, like the United States, have elaborate legal systems in place to control what is classified and how it may be obtained. The United States’ governing document for this is Executive Order 12333. Since its creation in 1981, all presidential administrations have made modifications to it, including most recently the Obama administration, which created a clearinghouse for the declassification of information called the National Declassification Center (“Obama Takes on…”, 2010). Classifying certain information protects specific activities and helps to ensure the continued success of a government or country. Human nature has not changed since people began recording history and is not likely to change now nor in the future. As long as there are groups, societies, cultures, et cetera, there will be competition and therefore a need to protect information.

References:
Williams, Armstrong (2005) There are no heroes here. New York Amsterdam News, 2005-06-0996:24, 13(0)

Davidson, Osha Gray (2004) THE SECRET FILE OF ABU GHRAIB. Rolling Stone, 2004-08-19955, |48(4)

Gale (1980). Snepp v. United States, Great American Court Cases,; Snepp v. United States Legal Citation: 444 U.S. 507

Schoenfeld, Gabriel (2006). Has the "New York Times" Violated the Espionage Act? Commentary; Mar2006, Vol. 121 Issue 3, p23-31, 9p, Retrieved from MasterFILE Premier database on 3 September 2006

Gale (2002). "Espionage." World of Criminal Justice, Credo Reference. 11 May 2004. Web. 3 Sept. 2010. http://www.credoreference.com/entry/worldcrims/espionage. (2010). “Obama takes on overclassification”. Information Management, 44(2), 20.

Ragavan, C. (2004). KINGS OF COLD WAR TREACHERY. Spy Stories, 60. Retrieved from MasterFILE Premier database

Helm, Gerhard (1976). The Celts, New York: St Martin’s Press

Similar Documents

Free Essay

Administrative Controls

...controls consist of the procedures that are implemented to define the roles, responsibilities, policies and various administrative functions that are required to manage the control environment as well as necessary to oversee and manage the confidentiality, integrity and availability of the organizations information assets. Administrative controls can range from very specific to very broad and can vary depending on the organizational needs, particular industry, and legal implications. Administrative controls can generally be broken down into six major categories which include operational policies and procedures, personnel security, evaluation, and clearances, security policies, monitoring, user management, and privilege management. Ultimately, the senior management within an organization must decide what role security will play within the organization and define the security goals and directives. Due care by definition is the care that an ordinary and reasonable person would take over their own property or information. An example of this would for a person to place documents that contain sensitive information such as social security cards, passports, etc. in a locked safe within their home. This measure is taken to ensure that only those individuals with authorized access can obtain those documents and view the sensitive information. Due care is a legal concept that is used to assist in determining the level of liability in a court of law. If it is determined that due care was taken...

Words: 1204 - Pages: 5

Free Essay

Security Notes

...Week 1: Lecture 1: Information * Information * Information is things that are or can be known about a topic. It is also known as communicable knowledge, which is something you can impart to someone else. It is an unambiguous abstraction of data. Now in the digital sense, the smallest unit of information is a single bit; is the bit on or is the bit off? Now if we go back to the days of landline telephone service, you would call information which would give you a phone number for a subscriber if you describe enough detail who the describer might be. The difference between data and information is that information is knowledge that you get or abstract through processing of data. What I do with those 1’s and 0’s, and how I would apply application software to it, transitions data and turns it into knowledge. * The other thing about information is that information depends on the context around it. For example, lets take numbers….10 digits, well 10 digits by themselves can just be 10 digits, but if I put a semicolon in between them (:), it can now be assumed that it is a time or a duration or a track record. Now if I would put a $ in front of those numbers, it could be the price of something or the amount of money in my wallet. Now if I add another meaning to those numbers lets say, I make the first 3 digits an area or a region assignment, the next 2 digits a group and the last 4 a serial number….I will then have the coding for a social security number. Now they...

Words: 1168 - Pages: 5

Free Essay

Security Plan

...ensures that only those with the rights and privileges to access information are able to do so. When unauthorized individuals or systems can view information, confidentiality is breached.” (http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf) “In an organization, the value of confidentiality of information is especially high when it involves personal information about employees, customers, or patients. Individuals who deal with an organization expect that their personal information will remain confidential, whether the organization is a federal agency, such as the Internal Revenue Service, or a business.” ((http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf.) This is a concept true in the Army there are two different levels of security clearances for everyone. There is the secret and the top secret each requires a vigorous investigation into a person’s past to make sure they should have the level of clearance they are requesting. If a person doesn’t have at least a secret clearance they are not allowed to access the SIPRnet, which is the Secret Internet Protocol Router Network. This network protocol holds all of the units secure data and can only be accessed by personnel with the proper clearance. Integrity “Information has integrity when it is whole, complete, and uncorrupted.” (http://arapaho.nsuok.edu/~hutchisd/IS_4853/C6572_01.pdf.) “The integrity of information is threatened when the information is exposed to corruption, damage, destruction, or other disruption...

Words: 889 - Pages: 4

Free Essay

Self Inspection

...ACCESS AUTHORIZATIONS ..................................................................................................3 SECURITY EDUCATION.........................................................................................................4 CONSULTANTS ......................................................................................................................5 STANDARD PRACTICE PROCEDURES (SPP) .....................................................................5 SUBCONTRACTING ...............................................................................................................5 VISIT CONTROL .....................................................................................................................6 CLASSIFIED MEETINGS ........................................................................................................6 CLASSIFICATION...

Words: 10033 - Pages: 41

Free Essay

Alc 1st Module

...is being honest, reporting the lack of security for classified documents, and dishonesty within my section. 2. Employ applicable laws and regulations. Each unit has s Standard Operation Procedure. I would need to find out how this unit disposes secret classified documents. According to Army Regulation 380-5 chapter IX Disposal and Destruction of secret classified documents. Records of destruction of Secret and Confidential information are not required except for NATO Secret and some limited categories of specially controlled Secret information. 3. Reflect on the ethical values and their ramifications. I find the army values very important in this situation. SGT Day he showed his loyalty to SFC Sharp by stating, “As far as I’m concerned SFC Sharp destroyed them two weeks ago.” In my opinion this isn’t the ethical way business should be done in my section. My obligation as a leader is to refuse to take shortcuts that could undermine the integrity of my unit. Army values are trusting that all people have done their jobs and fulfilled their duty. 4. Consider other applicable moral principles. Remaining loyal to the overall mission of safeguarding the nations security from enemies both foreign and domestic. Fulfilling my duties as an NCO by remaining professional and ensuring proper attention is brought to this situation. Respecting the men and women that could be in potential danger if classified information got into the wrong hands. Not compromising my integrity...

Words: 298 - Pages: 2

Premium Essay

Edward Snowden: Hero Or Hero?

...job on a classified program back at the NSA (Edward Snowden Biography, n.d.). Accordingly, to gain access to clandestine programs and highly classified information, Snowden was granted...

Words: 2005 - Pages: 9

Premium Essay

What Makes an Leader

...* What Makes an Army Leader Practical Exercise * Student Handout 1. Clearly define the ethical problem. a. The ethical problem in this situation is Whether or not I should be honest and do the right thing by turning in SFC Sharp for possibly destroying some “Secret” documents. 2. Employ applicable laws and regulations. a. Each Unit is responsible for coming up with their own SOP’s from Tactical movements to situations such as this one (Security breach), which should state proper disposal of documents that are considered Secret. SOP’s along with the unit’s regulations should also have Army regulations, so I would check my SOP to determine if proper disposal of classified information was conducted and what steps I need to take to ratify this situation. 3. Reflect on the ethical values and their ramifications. a. When I signed on that dotted line I also swore to live by the Army Values. Some Values that I think go with this situation are Loyalty, Duty, and Integrity. I need to be loyal to my country, unit and myself to do the right thing and report this situation. Not doing so is not showing my loyalty to my country and unit. It is also my duty to fulfill my obligations fully and report anything that could hurt my unit in any way, especially in a security breach situation. Never know if it may be some type of terrorist act. By choosing not to report this, it is undermining my Integrity. There should be no...

Words: 701 - Pages: 3

Premium Essay

Tech

...Project for IS4550 Shurleen E. Wilson-Fye ITT-Duluth Ms. Brown Contents Coversheet ……………………………………………………………………………… 1 Glossary…………………………………………………………………………………….2-3 Overview, Purpose, Scope……………………..4-5 Training………………………………………………….5-6 Procedure………………………………………………….6 Policy……………….………………………………….….6-9 Policy 1: Information Systems Policy..…..10-13 Policy 2: Security of Laptop…………………..14-16 Policy 3: Clean Desk policy…….……………..17-18 Policy 4: Workstation Policy………………………19 Policy 6: Email Policy………………………..….20-21 Policy 7: Personnel policy………………….…22-23 Policy 9: Data Breach Policy………………...24-27 Policy 10: Software policy………………………29-31 Policy 11: Data and information classification……32 Policy 12: Internal Treats…………………………………….33 Policy 13: Policies and Procedures for Electronic Protected Health Information (ePHI) and Personally Identifiable Information (PII)...34-35 Policy 14: Wireless LAN Security Policy……………………..36 IS security Awareness policy…………………………………..37-38 Conclusion……………………………………………………………………39 References……………………………………………………………………40 Overview: DSA contractors has been awarded a contract with the Department of Defense. Our next task is to revamp the companies’ policy to ensure compliance with DOD policy. All employees have to be retrained on new policy to ensure that DSA medicate violations. The attitudes and atmosphere of change will also be needed to ensure compliance with DOD standards. Training sessions is scheduled for all employees...

Words: 9781 - Pages: 40

Free Essay

Ethical Decision Making

...SFC Sharp’s desk and the wall that had been certified by him as being destroyed. This is classified as a security violation. When I had confronted SGT Day, his reaction was to pretend that the situation did not exist and ignore the problem stating “as far as I know those documents were destroyed two weeks ago”. In this particular instance, the first thing that I would do is review the unit SOP and Army regulations pertinent to the safe guarding and destruction of classified documents. AR 380-5, paragraph 6-22 states “Commands will establish procedures to control all “SECRET” and “CONFIDENTIAL” information and material originated, received, distributed, or routed to sub–elements within the command, and all information disposed of by the command by transfer of custody or destruction.” AR 380-5, paragraph 6-29 states “Records of destruction are not required for “SECRET” material”. Since the Army Regulation states that it is up to the command on how to destroy “SECRET” and “CONFIDENTIAL” documents, I would review my Unit SOP. Depending upon what the Unit SOP stated would then govern what steps were required to take next. Some of the ethical values that are being compromised in this situation are Loyalty, Integrity and Duty. Loyalty towards your supervisor is always good as long the supervisor is living by the Army Standards and Regulations. You should not, however, forget that you are required to have Loyalty to your Country, the Army and your Unit as well. As a Non-Commissioned Officer...

Words: 532 - Pages: 3

Premium Essay

Chicken Head

...the extracted material from the General Dennis J. Reimer Training and Doctrine Digital Library (https://atiam.train.army.mil). The text may contain passive voice, misspellings, grammatical errors, etc., and may not be in compliance with the Army Writing Style Program. Clearly define the problem: SFC Sharp has violated AR 380-5 Department of the Army Information Security Program by not destroying the secret document scheduled to be destroyed. SGT Day implied that SFC Sharp was the only one present when destroying the classified material. AR 380-5 states that there must be two witnesses present at the destruction of any material classified higher than confidential. SFC Sharp has also violated Article 107 of the UCMJ (False Official Statements). SFC Sharp may have become complacent and in-turn allowed his soldiers to become complacent in the proper procedures in the handling of classified material. As a result of the mishandling of classified documents not one person in the section could be sure the document was not copied in anyway. The mission of the section could halted just on the speculation of leaked classified documents. Employ the applicable laws and regulations: The laws and regulations violated were Article 107 of UCMJ and AR 380-5. Reflect on ethical values and ramification: It is possible that SFC Sharp may have made a mistake by not destroying the document or possibly destroying a document he thought was the proper document. Regardless of SFC Sharp’s...

Words: 566 - Pages: 3

Premium Essay

Analysis of Intelligence

...gathering, there is an assumption that other countries are gathering intelligence in similar ways. The only way to combat intelligence gathering against the United States is to know what technological intelligence collection resources are being used for gathering information. This is the job of Multidisciplinary Counterintelligence (MDCI). How does the government know that lines are secure from signals intelligence of foreign adversaries? One of the main tasks of MDCI is the "communication line" of the American Government. Radio waves can easily be detected with the right equipment anywhere within the area, and even microwaves can be detected with a receiver in the right place. MDCI combats these problems with encryption for messages and secure lines for voice communication. The encryption process is found on the governments SIPRnet web, which is used for the transfer of classified information only. For voice communications, the government uses secured lines that will scramble communications into meaningless sounds or scratches. The only problem with these types of devices is that they cannot be located just anywhere and can be very expensive to maintain; furthermore, facilities must be able to support these classified mediums. With all of this in mind, many of the nation's government officials may not be using these secured lines and opt to take a chance with telephone lines. This problem became apparent when the Soviet (now Russian) Embassy was placed in Washington. With the...

Words: 290 - Pages: 2

Premium Essay

Similarities Between Hanssen And Gowadia

...There have been a number of times in the United States history where there have been secret and top secret information has been disclosed or sold to another nation. Two of these occasions, unrelated, were because of Robert Philip Hanssen and Noshir Sheriarji Gowadia. Hanssen was an FBI agent who decided to sell top foreign intelligence and laundry list of other top secret information to Soviet Russian intelligence agencies. Hanssen’s actions are considered espionage because he was purposefully hiding what he was doing while employed by the FBI and using his clearance for his personal gain. Gowadia sold his own work in which he developed while working for Northrop Corp, which was actually selling military secrets. Gowadia sold these military secrets to China which resulted in the development of similar aircraft. The result of the actions of these two men was great damage to national security and putting at risk the safety of many, many people of not only the United States, but many people across the globe....

Words: 1634 - Pages: 7

Premium Essay

Can Wikileaks Be Found Guilty of a Crime for Its Release of the Iraq War Materials?

...Can WikiLeaks be Found Guilty of a Crime for Its Release Of the Iraq War Materials, Afghanistan War Materials and Diplomatic Cables? In 2010, WikiLeaks released three large groups of information – classified documents concerning the Iraqi war, classified Pentagon documents concerning the conflict in Afghanistan, and U.S. State Department diplomatic cables. There was an outcry from members in the U.S. government, U.S. lawmakers, and U.S. citizens as they questioned how WikiLeaks could have legally obtained and released this information. There were also those who applauded WikiLeaks and saw them as part of the new media, simply carrying on the struggle between the people’s right to know versus national security. In this new Internet age, where data can be immediately published to an enormous audience from anywhere in the world with the simple push of a button, and where wars are no longer declared on a country but on generalized “terror,” is a site like WikiLeaks protected? WikiLeaks Background WikiLeaks states on its website: WikiLeaks is a non-profit media organization dedicated to bringing important news and information to the public. We provide an innovative, secure and anonymous way for independent sources around the world to leak information to our journalists. We publish material of ethical, political and historical significance while keeping the identity of our sources anonymous, thus providing a universal way for revealing of supposed and censored injustices. WikiLeaks...

Words: 5807 - Pages: 24

Free Essay

Models of Helping

...Skip to NavigationSkip to Content TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Search Home Page »Philosophy and Psychology Personal Model of Helping In: Philosophy and Psychology Personal Model of Helping PERSONAL MODEL OF HELPING Karen Carr January 10, 2010 BSHS312 – Effective Models of Helping Dr. Princess Clarke \ How and why you formed this viewpoint In growing up I always wanted to help other people. I was the child who other children confided in or came to when they wanted to talk or needed help with a problem. When growing up it was not common for black people to go to counseling. Families kept secrets among themselves and sometimes those secrets came back to haunt people many years later. When faced with problems people relied on their spiritual beliefs, the support of the family, and sometimes close friends. If a girl had gotten pregnant and not married that would have been kept top secret. Usually a family member would raise the baby and no one would ever speak openly about it. My family had to deal with the death of two of my brothers at young ages. It hurt my mother deeply having to deal with the loss of two children because of violence. These tragedies were never discussed even as we became adults. As I became older I realized that my mother and our entire family should have gotten counseling. It was not until after my mother passed that my uncle shared...

Words: 379 - Pages: 2

Free Essay

Sfc Sharp

...SFC Sharp failed to report the security issue that the documents were lost. A lack of honesty on his part? Or was all this legit? Was it intentional or not? How should I go about handling this situation? Army Regulation 380–5 covers the safeguarding of classified materials. It states that in discovery of this type of security breach that any person, who discovers classified information out of proper control will, take custody of the information, safeguard it, and immediately report to their security manager, S2, or CO. The mishandling of secret information can cause serious damage to our national security. At this moment I am looking at myself and where do my values take me. First is Duty, how do I do what is right though under this pressure? My loyalty is with my fellow NCO’s and also my unit, and above all my country. This guy is about move forward in his career, and of I destroy that, how does that look on me? Yes it is the hard right vs. the easy wrong situation. What I choose to do can affect my professional relationship with other in this unit in so many ways. If I report this directly to the CO, I will be in the right but what will that do to SFC Sharp? Do I go along with the response that I received from SGT Day, thus making me just as wrong and guilty of what SFC Sharp did intentionally or unintentionally? Then if this comes up later I can be charged as an accessory to the fact. I could take this issue directly to SFC Sharp first and see what he wants to do about the...

Words: 430 - Pages: 2