07 December 2012

US Declassification

From the Transforming the Security Classification System report to the US President by the Public Interest Declassification Board
As requested by the President, the Public Interest Declassification Board (the Board) researched and studied the security classification system in cooperation with the National Security Advisor to design a fundamental transformation of the security classification system. The Board sought to understand how classified records of every level of sensitivity are managed and how different users influence classification and declassification decisions at the front-end and the back-end of the system. The Board met extensively with stakeholders inside and out- side of government during its study: senior government officials, Executive departments and agencies (agencies), distinguished civil servants, the Congress, leading technologists, experts from public interest, civil society and transparency groups, historians, classifiers, declassifiers, and archival researchers. Its research led the Board to understand the challenges the system presents to all users and to solicit suggestions and ideas for its transformation. The findings of the Board are conclusive; present practices for classification and declassification of national security information are outmoded, unsustainable and keep too much information from the public. The prevalence of electronic records has made the current paper-based system of classification and declassification unworkable. Use of advanced information technology is crucial to achieving increases in efficiency and better balancing information security with government openness. However, there is little evidence that Executive departments and agencies (agencies) are employing or developing the technologies needed to meet these objectives. 
Reforms are essential if we expect to manage the increased volume of records, share critical information among agencies and live within available resources. Essential to such reforms must be improved integration of classification and declassification programs and better resolution of the inherent tension between keeping secrets and ensuring the openness required for an accurate historical record. 
This report describes the difficulties—both technical and cultural—we face in reforming the system and recommends practicable steps to overcome them and effect reform. The Board understands the many challenges facing agencies in today’s resource-constrained environment. Nonetheless, the measures in this report are critical to modernize a security classification program capable of protecting our nation and supporting fundamental democratic values and transparency. The Board recognizes there is disagreement among stakeholders with many of the recommendations in its report. Modernization is difficult and bureaucracies’ natural tendency is to maintain the status quo. These recommendations will succeed only with a determined implementation strategy and vigorous oversight backed by the President. The Board believes it will require a White House-led steering committee to drive reform, led by a chair who is carefully selected and appointed with specific authorities granted by the President. A White House-led Security Classification Reform Steering Committee, appointed by and accountable to the President, should manage the implementation of the reforms required to transform current classification and declassification guidance and practice. 
After extensive research and discussions with stakehold-ers in and outside Government, the Board has concluded that the current classification system is fraught with problems. In its mission to support national security, it keeps too many secrets, and keeps them too long; it is overly complex; it obstructs desirable information sharing inside of government and with the public. There are many explanations for over-classification: most classification occurs by rote; criteria and agency guidance have not kept pace with the information explosion; and despite the Presidential order to refrain from unwarranted classification, a culture persists that defaults to the avoidance of risk rather than its proper management. 
To address the concerns of excessive classification under present practice, the Board recommends:
• Classification should be simplified and rationalized by placing national security information in only two categories. This would align with the actual two-tiered practices existing throughout government, regarding security clearance investigations, physical safeguarding, and information systems domains. Top Secret would remain the Higher-Level category, retaining its current, high level of protection. All other classified in- formation would be categorized at a Lower-Level, which would follow standards for a lower level of protection. Both categories would include compartmented and special access information, as they do today. Newly established criteria for classifying information in the two tiers would identify the needed levels of protection against disclosure of the information. Using identifiable risk as the basis for classification criteria should help in deciding if classification is warranted and, if so, at what level and duration. 
• Classified national security information in the two tiered model would continue to be subject to declassification in accordance with the re- quirements of Executive Order 13526, “Classified National Security Information”. The two tiers should be defined and distinguished by the level of identifiable protection needed to safeguard and share information appropriately, and these protection levels would determine whether classification is warranted, at what level, and for how long. Classification guidance would clearly define levels of protection by identifying a specific consequence of release of the classified information and the potential harm to the national security of limiting the sharing of the information. The difficulty of applying the current concept of presumed “damage” during derivative classification would be replaced by a more concrete application of level of protection necessary for sharing and protecting. This change in guidance would reflect how classification is actually practiced by derivative classifiers—deciding how much protection is needed based on the sensitivity of the information to both protect and share appropriately. Determining a level of protection to facilitate or impede dissemination is more prescriptive in practice and would assist classifiers in making more accurate classification decisions. Applying this risk management practice by identifying the level of protection needed based on the sensitivity of the information, rather than potential damage if disclosed, should allow users to classify information at the lowest level of protection or to keep the information unclassified. Specific protections accorded intelligence and non-intelligence sources and methods should also be better-defined and -distinguished. 
• The Board recognizes that the adoption of a two-tiered model will pose greater challenges for those agencies whose internal practices are more dependent upon current distinctions between Secret and Confidential. 
• Classified information that is operational or based on a specific date or event should be automatically declassified without additional review or exemption when that operation or event passes. The records containing this perishable information should be marked as classified “Short-term” (or similar term) at the time of creation. 
• In order to effect the cultural shift implicit in these recommendations, guidance should assume that classification decisions are made in good faith and should afford a ‘safe harbor’ for classifiers who adhere to proper risk management practices and, when unsure, decide not to classify. Classification training should address the culture bias that favors classification, and often over-classification, through coordinated, consistent education that underscores the responsibility to not classify in the presence of doubt. 
As discussed in the technology section of this report, available technologies, such as context accumulation, predictive analytics and artificial intelligence, should be piloted to study their effectiveness on helping implement these recommendations and to engage users and garner their trust in a new system. 
Declassification is a complex and time-consuming process, typically performed in a culture of caution with- out much attention to efficiency and risk management. 
Sequential referral of classified records for review by each agency that claims an “equity” in the record takes a great deal of time. Agencies are reluctant to share their declassification guidelines, impeding efficiency that could be realized from greater interagency coordination and collaboration. Because declassification is not seen as a way to serve the national security mission, the public’s right to know what its government does is not well-served. 
The problem is growing. Agencies are currently creating petabytes of classified information annually, which quickly outpaces the amount of information the Government has declassified in total in the previous seventeen years since Executive Order 12958 established the policy of automatic declassification for 25 year old records. Without dramatic improvement in the declassification process, the rate at which classified records are being created will drive an exponential growth in the archival backlog of classified records awaiting declassification, and public access to the nation’s history will deteriorate further. 
To address this serious concern, the Board recommends streamlining the declassification process as follows:
• A process should be implemented for the systematic declassification review of historical Formerly Restricted Data (FRD) information. The Departments of Energy and Defense may choose to convert historical FRD information either to Restricted Data information or to classified national security information. FRD information concerns the military utilization of nuclear weapons, including storage locations and stockpile information and often dates from the end of World War II through the height of the Cold War. Although often no longer sensitive or cur- rent, this type of FRD information is of high in- terest to researchers yet remains largely unavail- able to the public, because there is no process for systematically reviewing it for declassification and release under the terms of the Executive Order for national security information. 
• Strengthen the National Declassification Center (NDC) to establish a more coordinated govern- ment-wide declassification system. 
• Executive Order 13526 should be revised to eliminate the additional three years now authorized to process multiple agency equities in all archival records (including those outside the NDC). 
• The declassification system should manage risk and better balance resource-intensive agency reviews with the democratic value of timely public release. Rules that govern declassification, including those concerning historical nuclear information, should tolerate greater risk. 
• Streamlined archival processing should expedite public release of declassified records, with such records automatically transferred to the National Archives and Records Administration (National Archives). 
• Public representatives, including experts from the Government Openness advocacy community, should be added to the inter- agency NDC Advisory Panel (NAP) advising the NDC Director. 
• Immediately require agencies to share declassification guidance and training and prioritize the review of historically significant records and ensure timely transfer to the National Archives. 
• Streamline activities of both the NDC and agencies to complement the modernization initiatives directed by the President in his Memorandum on Managing Government Records. 
• Classification and declassification program staffs should collaborate with agency historians and records officers to ensure that historically significant information is identified as early as possible in its “life” and then set aside for historical review and preserved for the long-term. Agency histories, both classified and unclassified, should serve policymakers and operational leaders with “lessons learned” as well as contributing to the historical record. Agency history programs should be promoted across Government and aligned in “centers” that bring declassification reviewers and historians together. Classified histories should be reviewed at a specified interval for declassification and release to the public. 
• Pilot projects should be identified to develop best practices and design a more streamlined system. 
Classification and declassification are not keeping pace with the myriad of challenges facing the system: digital information creation, access for cleared persons, existing backlogs of paper holdings awaiting declassification review, long-term storage requirements, or the rights of a democratic society to as much information as possible about its Government. Available technologies are rarely used to meet current needs; neither are agencies preparing to use these technologies to handle the enormous volume of digital records. As a result, the Government is currently unable to preserve or provide access to a great many important records. The challenge can be met only with determined efforts to modernize classification and declassification by employing existing technologies and developing new tools. Agencies should collaborate on policy, share technologies, promote best practices and develop common standards. Metadata are especially critical to future high-speed data manipulation in the digital era. Promising new technologies should be tested through a series of pilot projects, beginning with a declassification project at the NDC; once proven, they can be deployed at multiple agencies and then expanded to include pilot projects for classification. The ultimate goal of these pilots is to discover, develop and deploy technology that will: 
• Automate and streamline classification and declassification processes, and ensure integration with electronic records management systems. 
• Provide tools for preservation, search, storage, scalability, review for access, and security application. 
• Address cyber security concerns, especially when integrating open source information into classified systems. 
• Standardize metadata generation and tagging, creating a government-wide metadata registry. Lessons learned from the intelligence community will be helpful here. 
• Accommodate complex volumes of data (e.g. email, non-structured data, and video teleconferencing information). 
• Advance government-wide information management practices by supporting the President’s Memorandum on Managing Government Records. 
The President should hold the Steering Committee accountable for ensuring the interagency collaboration needed to employ existing technologies and develop new methods to modernize classification and declassification.