List Of U.S. Security Clearance Terms
This list covers security clearance terms used in the United States of America. Within the U.S. government, security clearance levels serve as a mechanism to ascertain which individuals are authorized to access sensitive or classified information. These levels often appear in employment postings for Defense related jobs and other jobs involving substantial amounts of responsibility, such as air traffic control or nuclear power, nuclear energy positions. The different organizations in the United States Federal Government use different terminology and lettering. Security clearances can be issued by many United States of America government agencies. The checks for clearances and the granting of clearances is carried out by the United States Office of Personnel Management, US Office of Personnel Management. Use Security clearance levels often appear in employment postings for Defense related jobs, and other jobs involving substantial amounts of responsibility, such as air traffic co ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Security Clearance
A security clearance is a status granted to individuals allowing them access to classified information (state or organizational secrets) or to restricted areas, after completion of a thorough background check. The term "security clearance" is also sometimes used in private organizations that have a formal process to vet employees for access to sensitive information. A clearance by itself is normally not sufficient to gain access; the organization must also determine that the cleared individual needs to know specific information. No individual is supposed to be granted automatic access to classified information solely because of rank, position, or a security clearance.(Abiodun, 2006) Canada United Kingdom National Security Clearance types National Security Clearances are a hierarchy of levels, depending on the classification of materials that can be accessed—Baseline Personnel Security Standard (BPSS), Counter-Terrorist Check (CTC), Enhanced Baseline Standard (EBS), Se ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Central Intelligence Agency
The Central Intelligence Agency (CIA; ) is a civilian foreign intelligence service of the federal government of the United States tasked with advancing national security through collecting and analyzing intelligence from around the world and conducting covert operations. The agency is headquartered in the George Bush Center for Intelligence in Langley, Virginia, and is sometimes metonymously called "Langley". A major member of the United States Intelligence Community (IC), the CIA has reported to the director of national intelligence since 2004, and is focused on providing intelligence for the president and the Cabinet. The CIA is headed by a director and is divided into various directorates, including a Directorate of Analysis and Directorate of Operations. Unlike the Federal Bureau of Investigation (FBI), the CIA has no law enforcement function and focuses on intelligence gathering overseas, with only limited domestic intelligence collection. The CIA is responsibl ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Moderate Risk Background Investigation
Moderate is an ideological category which entails centrist views on a liberal-conservative spectrum. It may also designate a rejection of radical or extreme views, especially in regard to politics and religion. Political position Canada At the federal level in Canada as of 2024, there are five active political parties who have seats in the House of Commons, for which most of them have a wide range of goals and political opinions, that differ between each others. Per definition, where "political moderate" is used, in a specific context to being far conservative, the Conservative Party of Canada could be used as a representation. However, we can now see that those beliefs might contain "inverted" or different effects-opinions. If we could measure them from a "political spectrum" point of view, the variations for instance, conservatism, who tend to be defined in the same way toward being resistant with the idea of future changes, is not always the case. In parallel, liberali ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Need To Know
The term "need to know" (alternatively spelled need-to-know), when used by governments and other organizations (particularly those related to military or intelligence), describes the restriction of data which is considered very confidential and sensitive. Under need-to-know restrictions, even if one has all the necessary official approvals (such as a security clearance) to access certain information, one would not be given access to such information, or read into a clandestine operation, unless one has a specific ''need to know''; that is, access to the information must be necessary for one to conduct one's official duties. This term also includes anyone that the people with the knowledge deemed necessary to share it with. As with most security mechanisms, the aim is to make it difficult for unauthorized access to occur, without inconveniencing legitimate access. Need-to-know also aims to discourage "browsing" of sensitive material by limiting access to the smallest possible n ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Unclassified
Classified information is confidential material that a government deems to be sensitive information which must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted by law or regulation to particular groups of individuals with the necessary security clearance with a need to know. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation. Documents and other information must be properly marked "by the author" with one of several (hierarchical) levels of sensitivity—e.g. Confidential (C), Secret (S), and Top Secret (S). All classified documents require designation markings on the technical file which is usually located either on the cover sheet, header and footer of page. The choice of level is based on an impact assessment; governments have their own criteria, including how to determine the classification of an informat ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Code Name
A code name, codename, call sign, or cryptonym is a code word or name used, sometimes clandestinely, to refer to another name, word, project, or person. Code names are often used for military purposes, or in espionage. They may also be used in industrial counter-espionage to protect secret projects and the like from business rivals, or to give names to projects whose marketing name has not yet been determined. Another reason for the use of names and phrases in the military is that they transmit with a lower level of cumulative errors over a walkie-talkie or radio link than actual names. Origins Achaemenid Empire The Achaemenid Empire under Darius I employed a network of spies called the King’s Eye or the King’s Ear. These agents operated under anonymity, and “King’s Eye” was not a specific person but rather a code name for the intelligence network that reported directly to the king. Punic Wars The Carthaginian general Hannibal Barca reportedly used coded re ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Single Scope Background Investigation
A Single Scope Background Investigation (SSBI), now called a Tier 5 (T5) investigation, is a type of United States security clearance investigation. It involves investigators or agents interviewing past employers, coworkers and other individuals associated with the subject of the SSBI. It is governed by the U.S. Intelligence Community Policy Guidance Number 704.1. The Tier 5 investigation is required in order to receive a Top Secret or Q clearance. It is required for positions designated as High Risk. Standard elements include background checks of employment, education, organization affiliations and any local agency where the subject has lived, worked, traveled or attended school. These checks lead to interviews with persons who know the subject both personally and professionally. The investigation may include a National Agency Check with Local Agency Check and Credit Check (NACLC) of the subject's spouse or cohabitant. Previous background investigations conducted on the subjec ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Special Access Program
Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings. History March 22, 1940 Shortly before America's involvement in World War II Franklin D. Roosevelt signs Executive Order 8381, creating the three security levels for his country's most important documents ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Common Misconception
Each entry on this list of common misconceptions is worded as a correction; the misconceptions themselves are implied rather than stated. These entries are concise summaries; the main subject articles can be consulted for more detail. Common misconceptions are viewpoints or factoids that are often accepted as true, but which are actually false. They generally arise from conventional wisdom (such as old wives' tales), stereotypes, superstitions, fallacies, a misunderstanding of science, or the popularization of pseudoscience. Some common misconceptions are also considered to be urban legends, and they are sometimes involved in moral panics. Arts and culture '' View full version with citations'' History '' View full version with citations'' Science, technology and mathematics '' View full version with citations'' See also * Legends and myths regarding the ''Titanic'' * List of cognitive biases * List of conspiracy theories * List of fallacies * List of topics characterized ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Formerly Restricted Data
Restricted Data (RD) is a category of classified information in the United States that is defined by the Atomic Energy Act of 1954 as: :''all data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the Restricted Data category pursuant to section 142 f the Act''Atomic Energy Act of 1954 Chapter 2, Section 11(y). The fact that its legal definition includes "all data" except that already specifically declassified has been interpreted to mean that atomic energy information in the United States is [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
L Clearance
An L clearance is a security clearance used by the United States Department of Energy (DOE) and Nuclear Regulatory Commission for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954. It is equivalent to a United States Department of Defense (DOD) Secret clearance. The DOE L clearance provides less access than the agency's Q clearance. L-cleared persons are allowed unescorted access to "limited" and "protected" areas, as well as access to Confidential Restricted Data, Confidential and Secret Formerly Restricted Data, Confidential and Secret National Security Information, and Category III special nuclear material. As of 1989, the NRC required the Q clearance for employees in the most important and sensitive positions, while most employees in positions deemed "noncritical-sensitive" held L clearances.Keith G. FultzWeaknesses in NRC's Security Clearance Program US General Accounting Office Testimony, March 15, 1989 See also *Classified ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |