Which of the Following are Authorized Sources for Derivative Classification?
Understanding authorized sources for derivative classification is critical for any government employee, contractor, or military member handling classified national security information. Derivative classification is not the act of creating new classified information from scratch (which is Original Classification), but rather the process of incorporating, paraphrasing, restating, or generating in a new form information that is already classified. To do this legally and securely, one must rely on specific, approved sources to see to it that the security level of the information remains consistent across all documents.
Introduction to Derivative Classification
In the realm of national security, information is categorized based on the level of damage its unauthorized disclosure could cause to the United States. While an Original Classification Authority (OCA) is the only person permitted to determine that a piece of information is classified for the first time, thousands of other individuals perform derivative classification.
Derivative classification occurs when a user takes information from an existing source and carries that classification over to a new document. Take this: if you are writing a briefing report and you pull a paragraph from a classified intelligence summary, you are derivatively classifying your report. The danger lies in "classification creep" or accidental "declassification" if the source used is not authorized. That's why, knowing exactly which sources are authorized is the foundation of information security.
This is the bit that actually matters in practice.
Authorized Sources for Derivative Classification
To ensure accuracy and legality, derivative classifiers must use only authorized sources. If a piece of information is not found in one of these sources, the classifier cannot simply "guess" the classification level; they must consult an OCA Turns out it matters..
1. Security Classification Guides (SCGs)
The Security Classification Guide (SCG) is the "gold standard" and the primary authorized source for derivative classification. An SCG is a document issued by an OCA that provides specific, detailed instructions on what elements of a program, project, or system are classified, at what level (Confidential, Secret, or Top Secret), and for how long Which is the point..
- Why it is essential: SCGs remove the guesswork. They provide a clear roadmap, stating, for example, "The specific range of this radar system is Secret, but the general purpose of the radar is Unclassified."
- Usage: When creating a new document, the classifier refers to the SCG to see if the specific data points they are mentioning are listed as classified.
2. Properly Marked Source Documents
A properly marked source document is any existing classified document that contains the necessary classification markings. This includes memos, reports, emails, and intelligence summaries And it works..
- The Requirement of Accuracy: For a source document to be authorized, it must be properly marked. This means it must have overall banner markings, portion markings (e.g., (S) for Secret), and a "Classified By" line.
- The Risk of Error: One of the biggest mistakes in derivative classification is relying on a source document that was incorrectly marked. If a source document is wrong, the error is propagated into every new document derived from it. This is why SCGs are preferred over source documents whenever possible.
3. Other Authorized Directives
In certain specialized environments, other formal directives or policy documents issued by the OCA may serve as authorized sources. These are typically high-level policy mandates that dictate the handling of specific types of sensitive information.
Sources That Are NOT Authorized
It is equally important to understand what does not constitute an authorized source. Using these can lead to security violations or the compromise of national secrets.
- Memory or "Tribal Knowledge": You cannot classify information based on what you "remember" being classified or what a colleague told you in a hallway conversation.
- Improperly Marked Documents: If a document contains sensitive information but lacks the required classification markings, it cannot be used as a source for derivative classification. In this case, the document must be reported as a security spill or marking error.
- General Assumptions: Assuming that "this seems like it should be Secret" is not a legal basis for classification. Only the OCA or an authorized guide can make that determination.
The Process of Applying Derivative Classification
Once an authorized source (like an SCG) is identified, the classifier must follow a strict set of steps to apply the markings to the new document.
- Identify the Information: Determine which specific facts, figures, or descriptions in the new document are derived from the authorized source.
- Determine the Level: Look at the SCG or source document to find the classification level (e.g., Top Secret).
- Apply Portion Markings: Every paragraph, bullet point, and title must be marked. To give you an idea, if a paragraph contains Secret information, it must begin with (S).
- Determine the Overall Classification: The highest level of classification found in any single portion becomes the overall classification of the document (the banner marking).
- Complete the "Derived From" Line: Every derivatively classified document must have a classification block. The "Derived From" line must explicitly state the source used (e.g., "Derived From: SCG for Project X, Version 2.0").
- Set the Declassification Date: The classifier must carry over the declassification instructions from the source. If the SCG says the information is classified for 10 years, the new document must reflect that same timeline.
Scientific and Legal Rationale for Strict Sourcing
The reason the U.S. government mandates specific authorized sources is to prevent two dangerous extremes: Over-classification and Under-classification Not complicated — just consistent. No workaround needed..
- Over-classification: When people classify information "just to be safe," it hinders the efficiency of government operations and wastes resources. By using SCGs, the government ensures that only truly sensitive information is protected.
- Under-classification: This is the more dangerous extreme. If a classifier uses an unauthorized or incorrect source and fails to mark a document as Secret, that document might be handled as Unclassified, leading to a catastrophic leak of national security data.
From a legal standpoint, derivative classification is a chain of custody for information. In real terms, by citing the source in the classification block, an audit trail is created. If a piece of information is later downgraded or declassified, the government can trace every document derived from that source and update them accordingly That's the whole idea..
FAQ: Common Questions on Derivative Classification
Q: What should I do if the SCG and a source document contradict each other? A: Always prioritize the Security Classification Guide (SCG). The SCG is the primary authority. If the SCG says information is Unclassified but a source document says it is Secret, the source document is likely incorrectly marked. You should contact the OCA for clarification.
Q: Can I use a document from another agency as an authorized source? A: Yes, provided it is a properly marked source document. On the flip side, you must also be mindful of dissemination controls (like NOFORN), which limit who can see the information regardless of its classification level.
Q: Do I need special training to perform derivative classification? A: Yes. Most organizations require a formal course on derivative classification before an individual is permitted to handle and mark classified materials.
Conclusion
Navigating the complexities of national security requires precision and discipline. To answer the core question: the authorized sources for derivative classification are Security Classification Guides (SCGs) and properly marked source documents.
By strictly adhering to these sources and avoiding the temptation to rely on memory or intuition, professionals confirm that sensitive information is protected while remaining accessible to those with the proper clearance. The integrity of the entire security system relies on the individual's commitment to using the correct authority, marking every portion accurately, and maintaining a clear trail of derivation. Accuracy in this process is not just a bureaucratic requirement—it is a fundamental component of national defense.
Worth pausing on this one It's one of those things that adds up..