Security classifications in our government: a primer


Understanding Security Classifications

By John R. Schindler, Aug 16, 2015, from: his article on The XX Committee blog available HERE.

Before reading this lengthy discussion of how our government’s security works, you should know that the writer, Mr. Schindler is an expert in the field. Following is a brief resume that will attest to that fact:

John R. Schindler is a strategist, author, and commentator whose security-focused career includes decades of experience as both a scholar and practitioner. He was a professor of national security affairs at the U.S. Naval War College, (NWC) where he taught courses on security, strategy, intelligence, terrorism, and military history. Before joining the NWC faculty, he spent nearly a decade with the super-secret National Security Agency (NSA) as an intelligence analyst and counterintelligence officer. He is a historian by background, with a B.A. and M.A. from the University of Massachusetts and a Ph.D. from McMaster University.

He certainly has the credentials to be called an expert in security matters. The following primer was taken from his article titled, Hillary’s Emailgate: Understanding Security Classification.


The rising scandal surrounding Hillary Clinton regarding her apparent misuse of unclassified email during her tenure as Secretary of State gets worse for the Presidential hopeful with each passing day. During the week now ending, I’ve explained in writing and in radio and TV appearances how Americans ought to look at this touchy matter.

As an aside, if you want more real “down and dirty” discussions that are directly related to Hillary’s email troubles, check out those links above, especially the radio interview with Ed Morrissey of HotAir.

Few Americans have ever dealt with Top Secret materials and understandably they are left perplexed by this complicated and mysterious subject. This is not helped by the fact that Clinton backers seek to blow off this scandal as “no big deal.” Obfuscation does not change the fact that the placing of highly classified information on an unclassified and unencrypted network is a very serious matter indeed, not to mention very likely a criminal act to boot.

To aid understanding of how security classification works in the real world of the Intelligence Community, I’m giving you a sample intelligence assessment which I will walk you through to illustrate how this plays out every day in Washington, DC.

Everything I’m presenting you is fake — Zendia for decades was used by the National Security Agency as its preferred made-up country in training exercises — but corresponds exactly to how the IC actually writes “finished” intelligence assessments based on multiple information sources, then classifies them.

Such assessments are authored every day by multiple American intelligence agencies and offices, then shared with senior leadership. The Secretary of State is always a top consumer of such intelligence. Moreover, the State Department has its own in-house intelligence analysis shop, termed the Bureau of Intelligence and Research (INR) to meet their department’s need for additional classified assessments and reporting.

What follows is a short intelligence assessment of the kind U.S. Government officials read every single day, made up by me but adhering to the style and substance of what I used to do at work when I was an IC analyst.


(S) Economic, Political Problems for Zendia Ahead

(TS//SI) The Zendian Ambassador to Dirtbagistan believes it is increasingly likely that his country will fail to make its next International Monetary Fund (IMF) payment, scheduled for mid-September. This IMF payment of 475 billion Zendian wangos ($8.4 billion) is beyond his government’s ability to pay, Ambassador Abu Travolta explained to a senior member of his country’s Ministry of Finance (believed to be Deputy Finance Minister Abu Nugent) on 12 August. The ambassador further opined that, in the event of this likely default, the government of Prime Minister Barack Dukakis would not last long, politically. For this reason the Zendian government is going to great lengths to prevent word of the impending IMF default from reaching the media, according to Ambassador Travolta.

(TS//SI//TK) This information was supported by Zendian Deputy Foreign Minister Abu Bon Jovi, who last week informed the Ministry of Foreign Affairs (MFA) that budget constraints, which he expected to get significantly worse in mid-September, meant that MFA payrolls may not be met upon “something big” happening then. This is believed to be a reference to a possible default on Zendia’s IMF loan.

(S//NF) According to U.S. Government information obtained from multiple agencies, Ambassador Travolta is a well-connected member of the ruling party and is close to Prime Minister Dukakis. He has a track record of accurate predictions about forthcoming events in his country.

(FOUO) According to media reports, Ambassador Travolta has been experiencing health problems (NFI) which may indicate his willingness to be unusually frank with fellow members of the Zendian ruling party.

(U) This situation will be updated as soon as additional information becomes available.


Off the bat, you’ll notice the report’s overall classification, TOPSECRET//SI//TK//NOFORN, in big and bold letters at the top and bottom, which reflects the highest classification levels of anything incorporated in the assessment. Only people cleared to that level — here a very high one — can read this report.

Like any report, this has a title slug reflecting what it’s about. It’s classified S for SECRET: notice that each paragraph has its classification stated in parentheses at the beginning. This is called “portion marking” by the IC.

The first paragraph is classified TOPSECRET, the highest “official” classification in the U.S. Government, while the addition of SI, meaning Special Intelligence, indicates this is very sensitive stuff. SI is a security caveat that falls under the rubric of Sensitive Compartmented Information or SCI. Not everybody cleared for TOPSECRET also has access to SCI, that’s a separate matter and all SCI materials require special handling to protect them from compromise.

Here, SI indicates that the paragraph is based on information from signals intelligence or SIGINT from NSA — in this case an intercepted phone call between two senior Zendian officials. Although the report never states that this is SIGINT, the kind of information provided plus the SI caveat indicate this is based on NSA reporting, as anybody experienced with intelligence would immediately recognize.

The following paragraph is also based on NSA SIGINT, albeit from a different, even more sensitive source: the TK in its classification stands for TALENT KEYHOLE and indicates that information is derived from foreign communications intercepted by an intelligence satellite. This, again, is a conversation between top Zendian officials, so it’s valuable “horse’s mouth” information. Here two senior bureaucrats seem to corroborate each other, which is an important revelation.

The third paragraph has a lower classification, SECRET, is not based on SIGINT, and has the NOFORN caveat, meaning it cannot be shared with non-Americans (a good deal of NSA SIGINT, even at the TS/SI level, is shared with close foreign partners such as the Anglosphere Five Eyes* countries). This paragraph is based on local classified assessments — probably from the US Embassy to Zendia as well as the CIA Station there — that are sent back as regular reports to Washington, DC about the political lay of the land in that country.

* The “Five Eyes”, often abbreviated as “FVEY”, refer to an intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States.

The last substantive paragraph isn’t classified at all but has the For Official Use Only marking, meaning it cannot be released to the public without official approval. It’s based on media reports, which represent an important source of information for the IC and the State Department. CIA’s Open Source Center is the IC’s hub for translating foreign media in many languages and, pound for pound, represents the best value in the Intelligence Community, in my opinion. Here, unclassified media (termed Open Source Intelligence or OSINT) by some, is used to round out the assessment, and how the analyst has reached a tentative conclusion based on that media is considered to be FOUO. NFI means No Further Information.

The last line is entirely unclassified, as indicated by the U at the beginning, and states simply that more information will be forthcoming on this issue as the analyst gets it.

That last line is the only part of the assessment that is wholly unclassified and, in theory, could be released to the public without a cumbersome approval process: of course, taken alone it says nothing of interest, which perhaps is the point.

The larger point, however, is that, save that last line, absolutely none of the information in this assessment could be released to the public, or placed on any unclassified information system, by anybody, not even a cabinet secretary, without specific approval from outside agencies. The SIGINT, in particular, is highly sensitive and could only be placed in unclassified channels with an explicit NSA (and probably Director of National Intelligence) go-ahead, which is rare.

Even “talking around” such information, especially in written fashion, is unwise and usually represents a serious security breach, not to mention it may be illegal. For example, this is how a top official who read that Zendian intelligence assessment might proceed:

  1. “We’re hearing Zendia will probably default on its IMF loan.” (Marginally acceptable because there’s no attribution, no sources and methods are mentioned, though even so it’s really at least FOUO if it’s a cabinet secretary putting it in an unclassified email.)
  2. “We’re getting intel that Zendia will probably default on its IMF loan.” (Unacceptable, a security violation, but not classified higher than SECRET due to lack of source attribution.)
  3. “NSA says Zendia will default on its IMF loan in September.” (Absolutely unacceptable in any unclassified format, a compromise of TS//SI sources and methods….call the FBI.)

What exactly happened in the case of Hillary Clinton’s classified emails we don’t know yet, but the FBI is now on the case, and I’m sure the Bureau will eventually find out. What happens after that? It’s too soon to tell ….


At long last, Karma is about to have its way with Hillary Clinton.

At last, the virtual embodiment of her coronation as POTUS is about to be walked up the scaffold, a blindfold tied on, the noose placed around her neck while we wait breathlessly for the trapdoor to open, her political ambitions to drop, coming to an abrupt stop at the end of the rope, killing her presidential aspirations, instantly and permanently.

And afterwards, we can offer up prayers, not for Hillary, but in thanks for the unforced error in judgement that caused her to implement that secret personal server. Without that, we might be in danger of seeing President Hillary Clinton inaugurated in January of 2017.

Thanks God.



Tagged , . Bookmark the permalink.

5 Responses to Security classifications in our government: a primer

  1. Buck says:

    The FVEY consists of FIVE English speaking nations? HOW RACIST!!!!!

    I had a Top Secret Crypto clearance when in the Navy and 10 years after discharge they were STILL checking on me.

  2. Kathy says:

    Interesting and very enlightening, Garnet. It makes it easier to see that Hillary’s political persuasions affected her decision making when handed various pieces of top secret information. She used her position, money and power to nudge, push or shove other countries in the direction that benefitted her the most. She did this with several countries, primarily Libya and Syria, and fumbled big time when it came to Benghazi.

    She knew she was going to play outside the box from the beginning, so set up her own server to keep those actions out of the records. There’s not a doubt in my mind that she’s committed treason and all those people involved in the State Dept are complicit.

    That Gowdy’s committee has wasted so much time waiting for her to volunteer information is beyond asinine and we should have a better method in place to police these departments. No doubt the FBI’s investigation will be long and drawn out too, but at least they’ve been more aggressive than Gowdy’s permitted to be.

  3. Uriel says:

    Very informative Thanks Garnet. So not only is it flagged in title line but every paragraph has specific notations. May Hillary and Hopefully Bill and friends enjoy prison accommodations and designer suits in GITMO. With the current POTUS.. I am keeping this in my prayer request list Marked “Bucket List for Judgement and Sentencing”.

  4. I.R. Wayright says:

    I will bet you all that there was enough crap in her “personal” emails that she deleted first, that would have kept her out of the White House. They probably reveal what kind of “person” she truly is. Can’t have that now, can we?

  5. Hardnox says:

    Excellent post!

    I can’t help but wonder how many other admin officials have private servers and accounts.