HOME





United States Security Clearance
A United States security clearance is an official determination that an individual may access information classified by the United States Government. Security clearances are hierarchical; each level grants the holder access to information in that level and the levels below it. The US president can declassify previously classified information, following a detailed process. Gaining access For people that require a security clearance to get access to classified information, an in-depth background investigation is conducted primarily by the Defense Counterintelligence and Security Agency, and the recipient signs a nondisclosure agreement. As of 2017, certain government officials (but not their staff) are granted access to classified information needed to do their jobs without a background check: members of the U.S. Senate and House of Representatives for committee work, federal judges and state supreme court judges for adjudicating cases, and state governors. Attorneys representi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Classified Information In The United States
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic of classified information beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments. The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

President Of The United States
The president of the United States (POTUS) is the head of state and head of government of the United States. The president directs the Federal government of the United States#Executive branch, executive branch of the Federal government of the United States, federal government and is the Powers of the president of the United States#Commander-in-chief, commander-in-chief of the United States Armed Forces. The power of the presidency has grown since the first president, George Washington, took office in 1789. While presidential power has ebbed and flowed over time, the presidency has played an increasing role in American political life since the beginning of the 20th century, carrying over into the 21st century with some expansions during the presidencies of Presidency of Franklin D. Roosevelt, Franklin D. Roosevelt and Presidency of George W. Bush, George W. Bush. In modern times, the president is one of the world's most powerful political figures and the leader of the world's ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


L Clearance
An L clearance is a security clearance used by the United States Department of Energy (DOE) and Nuclear Regulatory Commission for civilian access relating to nuclear materials and information under the Atomic Energy Act of 1954. It is equivalent to a United States Department of Defense (DOD) Secret clearance. The DOE L clearance provides less access than the agency's Q clearance. L-cleared persons are allowed unescorted access to "limited" and "protected" areas, as well as access to Confidential Restricted Data, Confidential and Secret Formerly Restricted Data, Confidential and Secret National Security Information, and Category III special nuclear material. As of 1989, the NRC required the Q clearance for employees in the most important and sensitive positions, while most employees in positions deemed "noncritical-sensitive" held L clearances.Keith G. FultzWeaknesses in NRC's Security Clearance Program US General Accounting Office Testimony, March 15, 1989 See also *Classified ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Stealth Technology
Stealth technology, also termed low observable technology (LO technology), is a sub-discipline of military tactics and passive and active electronic countermeasures. The term covers a range of military technology, methods used to make personnel, Stealth aircraft, aircraft, Stealth ship, ships, submarines, missiles, satellites, and Stealth ground vehicle, ground vehicles less visible (ideally invisible) to radar, Thermographic camera, infrared, sonar and other detection methods. It corresponds to military camouflage for these parts of the electromagnetic spectrum (i.e., multi-spectral camouflage). Development of modern stealth technologies in the United States began in 1958, where earlier attempts to prevent radar tracking of its Lockheed U-2, U-2 spy planes during the Cold War by the Soviet Union had been unsuccessful. Designers turned to developing a specific shape for planes that tended to reduce detection by redirecting electromagnetic radiation waves from radars. Radiation-a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Special Access Program
Special access programs (SAPs) in the U.S. Federal Government are security protocols that provide highly classified information with safeguards and access restrictions that exceed those for regular (collateral) classified information. SAPs can range from black projects to routine but especially-sensitive operations, such as COMSEC maintenance or presidential transportation support. In addition to collateral controls, a SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special terminology or markings, exclusion from standard contract investigations (carve-outs), and centralized billet systems. Within the Department of Defense, SAP is better known as "SAR" by the mandatory Special Access Required (SAR) markings. History March 22, 1940 Shortly before America's involvement in World War II Franklin D. Roosevelt signs Executive Order 8381, creating the three security levels for his country's most important documents ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

COMINT
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmissions. Since the B ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for global intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget. Still, information available as of 2013 indicates that the C ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Nuclear Weapons
A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either nuclear fission, fission (fission or atomic bomb) or a combination of fission and nuclear fusion, fusion reactions (thermonuclear weapon), producing a nuclear explosion. Both bomb types release large quantities of energy from relatively small amounts of matter. Nuclear bombs have had Nuclear weapon yield, yields between 10 tons (the W54) and 50 megatons for the Tsar Bomba (see TNT equivalent). Yields in the low kilotons can devastate cities. A thermonuclear weapon weighing as little as can release energy equal to more than 1.2 megatons of TNT (5.0 Petajoule, PJ). Apart from the blast, Effects of nuclear explosions, effects of nuclear weapons include Firestorm, firestorms, extreme Thermal radiation, heat and ionizing radiation, radioactive nuclear fallout, an Nuclear electromagnetic pulse, electromagnetic pulse, and a radar blackout. The first nuclear weapons were deve ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

SIGINT
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmissions. Since the Bri ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Compartmentalization (intelligence)
Compartmentalization, in information security, whether public or private, is the limiting of access to information to persons or other entities on a need-to-know basis to perform certain tasks. It originated in the handling of classified information in military and intelligence applications. It dates back to antiquity, and was successfully used to keep the secret of Greek fire. The basis for compartmentalization is the idea that, if fewer people know the details of a mission or task, the risk or likelihood that such information will be compromised or fall into the hands of the opposition is decreased. Hence, varying levels of clearance within organizations exist. Yet, even if someone has the highest clearance, certain "compartmentalized" information, identified by codewords referring to particular types of secret information, may still be restricted to certain operators, even with a lower overall security clearance. Information marked this way is said to be codeword–classified. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Counterintelligence
Counterintelligence (counter-intelligence) or counterespionage (counter-espionage) is any activity aimed at protecting an agency's Intelligence agency, intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or other Intelligence field, intelligence activities conducted by, for, or on behalf of foreign powers, organizations or persons. Many countries will have multiple organizations focusing on a different aspect of counterintelligence, such as domestic, international, and counter-terrorism. Some states will formalize it as part of the police structure, such as the United States' Federal Bureau of Investigation (FBI). Others will establish independent bodies, such as the United Kingdom's MI5, others have both intelligence and counterintelligence grouped under the same agency, like the Canadian Security Intelligence Service (CSIS). History Modern tactics of espiona ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Counterterrorism
Counterterrorism (alternatively spelled: counter-terrorism), also known as anti-terrorism, relates to the practices, military tactics, techniques, and strategies that governments, law enforcement, businesses, and Intelligence agency, intelligence agencies use to combat or eliminate terrorism and violent extremism. If an act of terrorism occurs as part of a broader insurgency (and insurgency is included in the definition of terrorism) then counterterrorism may additionally employ counterinsurgency measures. The United States Armed Forces uses the term "foreign internal defense" for programs that support other countries' attempts to suppress insurgency, lawlessness, or subversion, or to reduce the conditions under which threats to national security may develop. History The first counterterrorism body to be formed was the Special Irish Branch of the Metropolitan Police, later renamed the Special Branch (Metropolitan Police), Special Branch after it expanded its scope beyond its or ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]