Table of Contents


CHAPTER 9




Special Requirements







Section 1. Restricted Data and Formerly Restricted Data







9-100. General.







This Section contains information and the requirements for



safeguarding atomic energy information that is designated



"Restricted Data" and "Formerly Restricted Data." Such information



is classified under the authority of the Atomic Energy Act of 1954



and is under the jurisdiction and control of the Department of



Energy (DOE). For purposes of this Section, a distinction is made



between National Security Information and atomic energy information



as explained below.











9-101. Authority and Responsibilities.







a.   The Atomic Energy Act of 1954, as amended, provides for the



development, use, and control of atomic energy. The Act establishes



policy for handling atomic energy-related classified information



designated as Restricted Data (RD) and Formerly Restricted Data



(FRD). The Act provides responsibility to DOE to "control the



dissemination and declassification of Restricted Data." In Section



143 of the Act, the Secretary of Defense has the responsibility to



establish personnel and other security procedures and standards



that are in reasonable conformity to the standards established by



the Department of Energy. This Section is intended to ensure



reasonable conformity in policy and procedures used by contractors



for the control of RD and FRD.







b.   The Secretary of Energy and the Chairman of the Nuclear



Regulatory Commission retain authority over access to information



which is under their respective cognizance as directed by the



Atomic Energy Act of 1954. The Secretary or the Commission may



inspect and monitor contractor programs or facilities that involve



access to such information or may enter into written agreement with



the DOD to inspect and monitor these programs or facilities.











9-102. Background Information.







a.   The Atomic Energy Act is the basis for classification of



atomic energy information as Restricted Data and Formerly



Restricted Data. In accordance with the Atomic Energy Act, all



atomic energy information is classified unless a positive action is



taken to declassify it. This is directly opposite to procedures



used for information classified by E.O. 12356. This is a



significant difference that should be clearly understood. By the



Act, Congress has decreed that atomic energy information is



different -- it is "born classified," it remains classified until



a positive action is taken to declassify it, and it may be



declassified only by the Department of Energy. No other



organization can declassify atomic energy information, and once it



is declassified, it cannot be reclassified.







b.   "Restricted Data" (RD) is defined in the Atomic Energy Act as



follows:



     "The term Restricted Data means all data concerning, (1)



design, manufacture, or utilization of atomic weapons; (2) the



production of special nuclear material; or (3) the use of special



nuclear material in the production of energy, but shall not include



data declassified or removed from the Restricted Data category



pursuant to Section 142."







c.   "Formerly Restricted Data" (FRD) is information which has been



removed from the Restricted Data category after the DOE and the DOD



have jointly determined that the information relates primarily to



the military utilization of atomic weapons and can be adequately



safeguarded as National Security Information in the United States.



Such data may not be given to any other nation except under



specially approved agreements and with the authorization of DOE.



FRD is identified and handled as Restricted Data when sent outside



the United States.











9-103. Unauthorized Disclosures.







Contractors shall report all unauthorized disclosures involving RD 



and FRD to the DOE or NRC through their CSA.











9-104. International Requirements.







The Act provides for a program of international cooperation to



promote common defense and security and to make available to



cooperating nations the benefits of peaceful applications of atomic



energy as widely as expanding technology and considerations of the



common defense and security will permit. Information controlled by



the Act may be shared with another nation only under the terms of



an agreement for cooperation. The disclosure by a contractor of RD



and FRD shall not be permitted until an agreement is signed by the



United States and participating governments and disclosure guidance



and security arrangements are established. RD and FRD shall not be



transmitted to a foreign national or regional defense organization



unless such action is approved and undertaken pursuant to an



agreement for cooperation between the United States and the



cooperating entity and supporting statutory determinations as



prescribed in the Act.







9-105. Personnel Security Clearances.







Only DOE, NRC, DoD, and NASA can grant access to RD and FRD.



Contractors of all other federal agencies must be processed for



PCLs by the DOE. The minimum investigative requirements and



standards for access to RD and FRD are set forth below.







a.   Top Secret RD-A favorable Single Scope Background



Investigation (SSBI).







b.   Secret RD-A favorable SSBI. (SRD as defined pursuant to the



NISPOMSUP).







c.   Confidential RD-A favorable NACC.







d.   Top Secret FRD-A favorable SSBI.







e.   Secret FRD-A favorable NACC.







f.   Confidential FRD-A favorable NACC.



DOE and NRC use the designation Q when a favorable access



authorization determination has been conducted based on an SSBI and



L when a favorable access authorization determination has been made



based on an NACC.











9-106. Classification.







a.   Since RD is born classified, no classification category



determination by a person with original classification authority is



ever required for RD or FRD; however, an authorized classifier must



determine the classification level. No date or event for automatic



declassification ever applies to RD or FRD.







b.   Only RD Classifiers appointed and trained under Government



Agency procedures may derivatively classify material that contains



RD. Any contractor employee authorized to derivatively classify NSI



material may also derivatively classify FRD material. Such



derivative classification determinations shall be based on



classification guidance approved by the DOE or NRC and not on



portion markings in a source document. If such classification



guidance is not available and the information in the document meets



the definition of RD, then the classifier shall, as an interim



measure, mark the document as Confidential RD or, if the



sensitivity of the information in the document so warrants, as



Secret RD. Such document shall be promptly referred to the CSA who



shall provide the contractor with the final determination based



upon official published classification guidance.







c.   RD and FRD are not limited to U.S. Government information.



Contractors who develop RD, FRD, or an invention or discovery



useful in the production or utilization of special nuclear material



or atomic energy shall file a report with a complete description



thereof with the DOE or the Commissioner of Patents as prescribed



by the Act. Documents thought to contain RD or FRD shall be marked



temporarily as such. Such documents shall be promptly referred to



the CSA for a final determination based upon official published



classification guidance.











9-107. Declassification.







Documents marked as containing RD and FRD remain classified until



a positive action by an authorized person is taken to declassify



them; no date or event for automatic declassification ever applies



to RD and FRD documents. Only the DOE may declassify contractor



documents marked as RD. Only the DOE or the DOD may declassify



contractor documents marked as FRD. These authorities may be



delegated on a case-by-case basis. Contractors shall send any



document marked as RD or FRD that must be declassified or sanitized



to the appropriate government contracting office.











9-108. Transclassification. 







Transclassification occurs when information is removed from the RD



category by a joint determination of DOE and DOD and placed in the



FRD category in accordance with section 142d of the Atomic Energy



Act. This information is primarily related to the military



utilization of atomic weapons and can be adequately safeguarded as



NSI. This authority is severely restricted and cannot be exercised



by RD Classifiers. Contact the DOE for information.











9-109. Marking.







In addition to the markings specified in Chapter 4 for NSI,



classified material containing RD and FRD shall be marked as



indicated below:







a.   Restricted Data. The following notice shall be affixed on



material that contains Restricted Data. This may be abbreviated RD.



Restricted Data



This material contains Restricted Data as defined in the Atomic



Energy Act of 1954. Unauthorized disclosure subject to



administrative and criminal sanctions.



Material classified as RD must indicate the classification guide



and the authorized RD classifier. The following marking shall be



applied:



          Classified by:          (guide)        



          Classifier:         (name and title)     







b.   Formerly Restricted Data. The following notice shall be



affixed on material which contains Formerly Restricted Data. This



may be abbreviated FRD.



     Formerly Restricted Data



     Unauthorized disclosure subject to administrative and criminal



     sanctions. Handle as Restricted Data in foreign dissemination.



     Section 144b, AEA 1954.







Material classified as FRD must indicate the classification guide.



The following marking shall be applied:



     Classified by:          (guide)         



 



c.   Documents shall be marked to indicate CNWDI, Sigmas, and NNPI,



as applicable.











9-110. Automated Information Systems.







See the NISPOMSUP for AIS requirements for TSRD and SRD.











9-111. Physical Security.







See the NISPOMSUP for physical security requirements for TSRD and



SRD.











Section 2. DOD Critical Nuclear Weapon Design Information











9-200. General.







This Section contains the special requirements for protection of



Critical Nuclear Weapon Design Information (CNWDI).











9-201. Background.







CNWDI is a DoD category of TOP SECRET Restricted Data or SECRET



Restricted Data that reveals the theory of operation or design of



the components of a thermonuclear or fission bomb, warhead,



demolition munition, or test device. Specifically excluded is



information concerning arming, fuzing, and firing systems; limited



life components; and total contained quantities of fissionable,



fusionable, and high explosive materials by type. Among these



excluded items are the components that DoD personnel set, maintain,



operate, test or replace. The sensitivity of DoD CNWDI is such that



access shall be granted to the absolute minimum number of employees



who require it for the accomplishment of assigned responsibilities



on a classified contract. Because of the importance of such



information, special requirements have been established for its



control. (DoD Directive 5210.2 establishes these controls in the



DoD).







9-202. Briefings.







Prior to having access to DoD CNWDI, employees shall be briefed on



its sensitivity by the FSO or his or her alternate. (The FSO will



be initially briefed by a Government representative.) The briefing



shall include the definition of DoD CNWDI, a reminder of the



extreme sensitivity of the information, and an explanation of the



individual's continuing responsibility for properly safeguarding



DoD CNWDI and for ensuring that dissemination is strictly limited



to other personnel who have been authorized for access and have a



need-to-know for the particular information. The briefing shall



also be tailored to cover any special local requirements. Upon



termination of access to DoD CNWDI, the employee shall be given an



oral debriefing that shall include a statement of: a. The purpose



of the debriefing; b. The serious nature of the subject matter that



requires protection in the national interest; and c. The need for



caution and discretion.











9-203. Markings.







In addition to other markings required by this Manual, CNWDI



material shall be clearly marked, "Critical Nuclear Weapon Design



Information-DoD Directive 5210.2 Applies." As a minimum, CNWDI



documents shall show such markings on the cover or first page.



Portions of documents that contain CNWDI shall be marked with an



(N) or (CNWDI) following the classification of the portion. For



example, TS(RD)(N) or TS(RD)(CNWDI).











9-204. Subcontractors.







Contractors shall not disclose CNWDI to subcontractors without the



prior written approval of the GCA. This approval may be included in



a Contract Security Classification Specification, other



contract-related document, or by separate correspondence.







9-205. Transmission Outside the Facility.







Transmission outside the contractor's facility is authorized only



to the GCA, or to a subcontractor as approved by 9-204 above. Any



other transmission must be approved by the GCA. Prior to



transmission to another cleared facility, the contractor shall



verify from the CSA that the facility has been authorized access to



CNWDI. When CNWDI is transmitted to another facility, the inner



wrapping shall be addressed to the personal attention of the FSO or



his or her alternate, and in addition to any other prescribed



markings, the inner wrapping shall be marked: "Critical Nuclear



Weapon Design Information-DoD Directive 5210.2 Applies." Similarly,



transmissions addressed to the GCA or other U.S. Government agency



shall bear on the inner wrapper the marking, "Critical Nuclear



Weapon Design Information-DoD Directive 5210.2 Applies."











9-206. Records.







Contractors shall maintain a record of all employees who have been



authorized access to CNWDI, and the date of the special



briefing(s). These records shall be retained for 2 years following



the termination of employment and/or the termination of the



individual's clearance or access, as applicable.











9-207. Weapon Data.







That portion of RD or FRD that concerns the design, manufacture, or



utilization (including theory, development, storage,



characteristics, performance, and effects) of atomic weapons or



atomic weapon components and nuclear explosive devices is called



Weapon Data and it has special protection provisions. Weapon Data



is divided into eight Sigma categories the protection of which is



prescribed by DOE Order 5610.2, CONTROL OF WEAPON DATA. However,



certain Weapon Data has been re-categorized as CNWDI and is



protected as described in this Section.



Section 3. Intelligence Information











9-300. General. 







This Section contains general information on safeguarding



Intelligence Information. Intelligence Information is under the



jurisdiction and control of the Director of Central Intelligence



(DCI) pursuant to Executive Order (E.O.) 12333, "United States



Intelligence Activities."











9-301. Definitions. 







The following definitions are extracts from E.O. 12333, DCI



Directives (DCIDs), and DoD Directives pertaining to Intelligence



Information. 



 



a.   Foreign Intelligence. Information relating to the



capabilities, intentions, and activities of foreign powers,



organizations, or persons, but not including counterintelligence



except for information on international terrorist activities.



 



b.   Counterintelligence. Those activities that are concerned with



identifying and counteracting the threat to security posed by



foreign intelligence services or organizations or by individuals



engaged in espionage, sabotage, or subversion.



 



c.   Intelligence Information. Intelligence Information includes



the following classified information: (1) Foreign intelligence and



counterintelligence as defined in E.O. 12333; (2) Information



describing U.S. foreign intelligence and counterintelligence



activities, sources, methods, equipment, or methodology used for



the acquisition, processing, or exploitation of such intelligence;



foreign military hardware obtained for exploitation; and



photography or recordings resulting from U.S. intelligence



collection efforts; and (3) Information on Intelligence Community



protective security programs (e.g., personnel, physical, technical,



and information security). (Such information is collected,



processed, produced or disseminated by the Director of Central



Intelligence and other agencies of the Intelligence Community under



the authority of E.O. 12333.)



 



d.   Intelligence Community. As identified in E.O. 12333, the



Central Intelligence Agency (CIA); the National Security Agency



(NSA); the Defense Intelligence Agency (DIA); offices within the



DoD for the collection of specialized national foreign intelligence



through reconnaissance programs; the Bureau of Intelligence and



Research (INR) of the Department of State; the intelligence



elements of the Army, Navy, Air Force, and Marine Corps, the



Federal Bureau of Investigation (FBI), the Department of the



Treasury, and the Department of Energy (DOE); and the staff



elements of the Director of Central Intelligence (DCI).



 



e.   Senior Officials of the Intelligence Community (SOICs). The



heads of organizations in the Intelligence Community.



 



f.   Senior Intelligence Officer (SIO). The highest ranking



military or civilian individual charged with direct foreign



intelligence missions, functions, or responsibilities within an



element of the Intelligence Community.



 



g.   Sensitive Compartmented Information (SCI). Classified



Intelligence Information concerning or derived from intelligence



sources, methods, or analytical processes, which is required to be



handled within formal access control systems established by the



Director of Central Intelligence.



 



h.   SCI Facility (SCIF). An accredited area, room, group of rooms,



or installation where SCI may be stored, used, discussed, and/or



processed.











9-302. Background. 







DCID 1/7, "Security Controls on the Dissemination of Intelligence



Information," establishes policies, controls, procedures, and



control markings for the dissemination and use of intelligence to



ensure that it will be adequately protected. DCID 1/14, "Minimum



Personnel Security Standards and Procedures Governing Eligibility



for Access to Sensitive Compartmented Information," establishes



personnel security standards for personnel requiring access to SCI.



Access to SCI must be approved by the SOICs. DCID 1/19, "Security



Policy for Sensitive Compartmented Information," establishes



policies and procedures for the security, use, and dissemination of



SCI.







9-303. Control Markings Authorized for Intelligence Information.



 



a.   "Warning Notice-Intelligence Sources or Methods Invoved"



(WNINTEL). This marking is used only on Intelligence Information



that identifies or would reasonably permit identification of an



intelligence source or method that is susceptible to



countermeasures that could nullify or reduce its effectiveness.



This marking may be abbreviated as "WNINTEL" or "WN." This marking



may not be used in conjunction with special access or sensitive



compartmented information (SCI) controls.



 



b.   "DISSEMINATION AND EXTRACTION OF INFORMATION CONTROLLED BY



ORIGINATOR" (ORCON). This marking may be used only on Intelligence



Information that clearly identifies or would reasonably permit



ready identification of an intelligence source or method that is



particularly susceptible to countermeasures that would nullify or



measurably reduce its effectiveness. This marking may be



abbreviated as "ORCON" or "OC."



 



c.   "NOT RELEASABLE TO CONTRACTORS/CONSULTANTS" (NOCONTRACT). This



marking may be used only on Intelligence Information that is



provided by a source on the express or implied condition that it



not be made available to contractors; or that, if disclosed to a



contractor, would actually or potentially give him/her a



competitive advantage, which could reasonably be expected to cause



a conflict of interest with his/her obligation to protect the



information. This marking may be abbreviated as "NOCONTRACT" or



"NC."



 



d.   "CAUTION - PROPRIETARY INFORMATION INVOLVED" (PROPIN). This



marking is used, with or without a security classification, to



identify information provided by a commercial firm or private



source under an express or implied understanding that the



information will be protected as a trade secret or proprietary data



believed to have actual or potential value. This marking may be



used in conjunction with the "NOCONTRACT" marking to preclude



dissemination to any contractor. This marking may be abbreviated as



"PROPIN" or "PR."



 



e.   "NOT RELEASABLE TO FOREIGN NATIONALS" (NOFORN). This marking



is used to identify Intelligence Information that may not be



released in any form to foreign governments, foreign nationals, or



non-U.S. citizens. This marking may be abbreviated "NOFORN" or



"NF."



 



f.   "AUTHORIZED FOR RELEASE TO (name of country(ies)/international



organization)" (REL). This marking is used to identify Intelligence



Information that an originator has predetermined to be releasable



or has released, through established foreign disclosure procedures



and channels, to the foreign/international organization indicated.



This marking may be abbreviated "REL (abbreviated name of foreign



organization)."











9-304. Limitation on Dissemination of Intelligence Information. 







A contractor is not authorized to further disclose or release



classified Intelligence Information (including release to a



subcontractor) without prior written authorization of the releasing



agency.











9-305. Safeguarding Intelligence Information. 







All classified Intelligence Information in the contractor's



possession shall be safeguarded and controlled in accordance with



the provisions of this Manual for classified information of the



same classification level, with any additional requirements and



instructions received from the GCA, and with any specific



restrictive markings or limitations that appear on the documents



themselves.











9-306. Inquiries. 







All inquiries concerning source, acquisition, use, control or



restrictions pertaining to Intelligence Information shall be



directed to the releasing agency.






Table of Contents