
PDF Version
Table of Contents
Figures and Tables
Summary of Findings and Recommendations
Chairman's Foreword
Vice Chairman's Foreword
I. Overview: Protecting Secrets and Reducing Secrecy
Commission Purposes and Objectives
Secrecy Issues Not Addressed by the Commission
Defining Government Secrecy
The Means for Protecting Government Secrets
The Importance of Protecting Secrets
The Intangible Costs of Secrecy
Efforts to Quantify the Costs of Secrecy
Evolving Concepts of National Security
A Statutory Basis for the Secrecy SystemThe Case for a Statutory Approach
Conclusion
A Proposed StatuteII. Rethinking Classification: Better Protection and Greater Openness
Toward a Life Cycle Approach to Classification Management
The Secrecy SystemBases for Classification
The ClassifiersA Half Century of Executive Orders
Living With Ambiguity: The Levels of Classification
Protection of Sources and Methods
Protection Under the Atomic Energy Act
Controlling Access to Secrets: The "Need-to-Know" Principle
Clarifying Security in Special Access Programs
Protecting Other Government InformationOriginal Classification Authorities: The Linchpin of Classification
The Key to Better Classification: The Initial Decision to Classify
Derivative Classifiers: Enhancing Accountability Where it Matters
Developing Better Classification Guides
Improving the Training and Education of ClassifiersThe Importance of the Initial Decision
Enhancing Implementation and Oversight
Improving the Initial DecisionA Greater Role for the Congress
Conclusion
The Focal Point: Executive Branch Policy Development and OversightPolicy Development: Who's in Charge?
Strengthening Implementation and Oversight Within Agencies
Oversight: The Critical Missing Link
A New Approach to Policy Development and Oversight
III. Common Sense Declassification and Public Access
Why Public Access Matters
Promising Developments: Declassification Success Stories
Continuing Barriers to Declassification and Public Access
Unnecessary Secrecy Persists
Sensible Risk ManagementDeclassification Under Past Executive Orders
Recommendations for Improving Declassification and Public Access
Executive Order 12958: A Renewed Focus on Declassification
Declassification and the Freedom of Information Act
How Much Is Still Classified?
How Long Does It Take Before Information Is Declassified?
How Much Does Declassification Cost?
The Impact of Agency Equities:
Multiple Agency Reviews Mean Multiple Delays
The Current State of Agency Records Management
Agency Attitudes Affect Public Access
Public Access in the Information Age
Adequate Oversight Is Crucial to Sensible Declassification PoliciesEstablishing A National Declassification Center to Coordinate Public Access Policy
Conclusion
Clarifying Protection of Sources and Methods Information
Improving Records Management and Other Agency Practices to Promote Public AccessIV. Personnel Security: Protection Through Detection
Overview of the Personnel Security Process
The Background Investigation
Improving the Current SystemTypes of Investigations
The Adjudication
Investigative CostsModernizing the System's Cold War Foundations
Conclusion
Increasing Clearance Reciprocity and Standardization
Enhancing Investigative Quality
Reducing Inefficiencies in the Processing of Cases
Addressing Transparency and Due Process Concerns
Allocating Resources More Effectively
Strengthening Employee Assistance Programs
Assessing the Value of Financial Disclosure
Advancing Polygraph Research
Making the Clearance Process More Efficient Through AutomationV. Information Age Insecurity
Federal Government Information Security and the National Information Infrastructure
The Growing Threat to Information Systems Security
Improving Oversight Mechanisms
The Improving Federal ResponseEnhancing Executive Branch Oversight and Policy Formulation
Addressing Current Problems
Enhancing Congressional Oversight and Policy FormulationPreventing Redundancies in Technology Development
Planning for the Future
Promoting Government-Industry Cooperation
Discouraging the Use of Classification as an Alternative to Effective Information Systems Security
Encouraging Greater Accountability and LeadershipDisseminating Threat Information
Conclusion
Increasing Awareness of Computer Attacks
Developing Auditing and Intrusion Detection Capabilities
Including Security in Automation Projects
Professionalizing Information Systems Security
Strengthening Information Technology Training and Awareness
VI. APPENDICES
A. Secrecy: A Brief Account of the American Experience
B. Commission's Authorizing Statute
C. Summary of Recommendations
D. Biographical Information
E. Acknowledgments
F. List of Commission Meetings and Programs
G. Major Reviews of the U.S. Secrecy System
H. Acronyms and Abbreviations
Figures and Tables
Figures
1. Where It Happens: Classification Activity By Agency
2. Agency Declassification at a Glance
3. Number of Federal and Contractor Employees with Clearances
4. Total Investigation Costs
5. Federal EAP Statistics
6. Trends in Hacker Tools
7. Percentage of Companies with Employees Educated on Computer Abuse Laws
Tables
1. Provisions in Past Executive Orders Promoting Public Access to Information
2. Major Personnel Security Authorities Since EO 10450
3. Potential Legislative Jurisdiction for Information Systems Security
Go Back to the Top Page of the Commission Report