[Infowarrior] - Security absurdity: US in sensitive information quagmire
Richard Forno
rforno at infowarrior.org
Mon Sep 13 21:20:03 CDT 2010
Security absurdity: US in sensitive information quagmire
Feds have over 100 ways of classifying, 230 ways of handling sensitive information
By Layer 8 on Mon, 09/13/10 - 11:09am.
http://www.networkworld.com/community/node/66215
Protecting and classifying sensitive information such as social security numbers shouldn't be that hard, but perhaps not surprisingly the US government has taken complicating that task to an art form.
It seems that designating, safeguarding, and disseminating such important information involves over 100 unique markings and at least 130 different labeling or handling routines, reflecting a disjointed, inconsistent, and unpredictable system for protecting, sharing, and disclosing sensitive information, according to the watchdogs at the Government Accountability Office.
The GAO noted the security classification mess in a report that looked at the challenges government contractors face in protecting private information last week. That report found that at least three federal agencies were not fully safeguarding private information increasing the risk of unauthorized disclosure or misuse. Part of the problem was the way such information is handled.
And as you might imagine, this is not a new problem. In 2006 the GAO reported on a survey of federal agencies that showed 26 were using 56 different designations to protect information they deemed critical to their missions-such as law-enforcement sensitive, sensitive security information, and unclassified controlled nuclear information. Because of the many different and sometimes confusing and contradictory ways that agencies identify and protect sensitive but unclassified information, the sharing of information about possible threats to homeland security has been difficult, the GAO stated.
It seems the problem has only grown worse since then, despite efforts to streamline and simplify the process. Without trying to define what exactly each one of these designations mean, here are just 50 of the ways sensitive but unclassified is carved up.
1. SENSITIVE
2. DO NOT DISSEMINATE
3. SBU-NF
4. SBU/ NOFORN
5. UNLIMITED RIGHTS
6. GOVERNMENT PURPOSE RIGHTS
7. LIMITED RIGHTS
8. RESTRICTED RIGHTS
9. SPECIAL LICENSE RIGHTS
10. PRE-EXISTING MARKINGS
11. COMMERCIAL MARKINGS
12. CLOSE HOLD
13. RSEN
14. PREDECISIONAL PRODUCT
15. SOURCE SELECTION SENSITIVE
16. DEA SENSITIVE (DEAS)
17. SENSITIVE (SENS)
18. COPYRIGHT (DATE) (OWNER)
19. DELIBERATE PROCESS PRIVILEGE
20. RELIDO
21. EYES ONLY
22. BANK SECRECY ACT INFORMATION (BSA)
23. ACQUISITION SENSITIVE
24. ATTORNEY WORK PRODUCT
25. LIMITED ACCESS
26. RESTRICTED ACCESS
27. MEDICAL RECORDS
28. LAN INFRASTRUCTURE
29. IT SECURITY RELATED
30. LAN BACKUP SENSITIVE INFORMATION
31. SOURCE SELECTION INFORMATION
32. TRADE SECRET
33. ATTORNEY CLIENT
34. BUDGETARY INFORMATION
35. PRE-DECISIONAL
36. FOR INTERNAL USE ONLY
37. NOT FOR DISTRIBUTION SAFEGUARDS INFORMATION (SGI)
38. AGENCY INTERNAL USE ONLY (U//AIUO)
39. TRADE SENSITIVE INFORMATION
40. SENSITIVE BUT UNCLASSIFIED (SBU)
41. HEALTH RELATED INFORMATION (EM)
42. NO DISTRIBUTION (NODIS OR ND)
43. LAW ENFORCEMENT SENSITIVE (LES)
44. EXCLUSIVE DISTRIBUTION (EXDIS OR XD)
45. FOR OFFICIAL USE ONLY (FOUO)
46. SENSITIVE STUDENT RECORDS (STR)
47. CONFIDENTIAL BUSINESS INFORMATION (CBI)
48. LIMITED OFFICIAL USE (LOU)
49. LIMITED DISTRIBUTION
50. LIMITED DISTRIBUTION (LIMDIS)
More information about the Infowarrior
mailing list