This is the accessible text file for GAO report number GAO-06-785 
entitled 'Managing Sensitive Information: Actions Needed to Ensure 
Recent Changes in DOE Oversight Do Not Weaken an Effective 
Classification System' which was released on June 30, 2006. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as part 
of a longer term project to improve GAO products' accessibility. Every 
attempt has been made to maintain the structural and data integrity of 
the original printed product. Accessibility features, such as text 
descriptions of tables, consecutively numbered footnotes placed at the 
end of the file, and the text of agency comment letters, are provided 
but may not exactly duplicate the presentation or format of the printed 
version. The portable document format (PDF) file is an exact electronic 
replica of the printed version. We welcome your feedback. Please E-mail 
your comments regarding the contents or accessibility features of this 
document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Chairman, Subcommittee on National Security, Emerging 
Threats and International Relations, Committee on Government Reform, 
House of Representatives: 

United States Government Accountability Office: 

GAO: 

June 2006: 

Managing Sensitive Information: 

Actions Needed to Ensure Recent Changes in DOE Oversight Do Not Weaken 
an Effective Classification System: 

GAO-06-785: 

GAO Highlights: 

Highlights of GAO-06-785, a report to the Chairman, Subcommittee on 
National Security, Emerging Threats and International Relations, 
Committee on Government Reform, House of Representatives. 

Why GAO Did This Study: 

In recent years, the Congress has become increasingly concerned that 
federal agencies are misclassifying information. Classified information 
is material containing national defense or foreign policy information 
determined by the U.S. government to require protection for reasons of 
national security. GAO was asked to assess the extent to which (1) 
DOE’s training, guidance, and oversight ensure that information is 
classified and declassified according to established criteria and (2) 
DOE has found documents to be misclassified. 

What GAO Found: 

DOE’s Office of Classification’s systematic training, comprehensive 
guidance, and rigorous oversight programs had a largely successful 
history of ensuring that information was classified and declassified 
according to established criteria. However, an October 2005 shift in 
responsibility for classification oversight to the Office of Security 
Evaluations has created uncertainty about whether a high level of 
performance in oversight will be sustained. Specifically, prior to this 
shift, the Office of Classification had performed 34 inspections of 
classification programs at DOE sites since 2000. These inspections 
reviewed whether DOE sites complied with agency classification policies 
and procedures. After the October 2005 shift, however, the pace of this 
oversight was interrupted as classification oversight activities ceased 
until February 2006. So far in 2006, one classification oversight 
report has been completed for two offices at DOE’s Pantex Site in 
Texas, and work on a second report is under way at four offices at the 
Savannah River Site in South Carolina. More oversight inspections 
evaluating classification activity at eight DOE offices are planned for 
the remainder of 2006. In addition, according to the Director of the 
Office of Security Evaluations, the procedures for conducting future 
oversight are still evolving—including the numbers of sites to be 
inspected and the depth of analysis to be performed. If the oversight 
inspections planned for the remainder of 2006 are completed, it will 
demonstrate resumption in the pace of oversight conducted prior to 
October 2005. However, if these inspections are not completed, or are 
not as comprehensive as in the past, the extent and depth of oversight 
will be diminished and may result in DOE classification activities 
becoming less reliable and more prone to misclassification. 

On the basis of reviews of classified documents performed during its 34 
oversight inspections, the Office of Classification believes that very 
few of DOE’s documents had been misclassified. The department’s review 
of more than 12,000 documents between 2000 and 2005 uncovered 20 
documents that had been misclassified—less than one-sixth of 1 percent. 
DOE officials believe that its misclassification rate is reasonable 
given the large volume of documents processed. Most misclassified 
documents remained classified, just not at the appropriate level or 
category. Of greater concern are the several documents that should have 
been classified but mistakenly were not. When mistakenly not 
classified, such documents may end up in libraries or on DOE Web sites 
where they could reveal classified information to the public. The only 
notable shortcomings we identified in these inspections were the 
inconsistent way the Office of Classification teams selected the 
classified documents for review and a failure to adequately disclose 
these procedures in their reports. Inspection teams had unfettered 
access when selecting documents to review at some sites, but at others 
they only reviewed documents from collections preselected by site 
officials. Office of Classification reports do not disclose how 
documents were selected for review. 

What GAO Recommends: 

GAO is recommending that DOE conduct a similar number of classification 
oversight reviews, at a similar depth of analysis, as it did before the 
October 2005 shift in responsibility for classification oversight; 
apply selection procedures that more randomly identify classified 
documents for review; and disclose these selection procedures in future 
classification inspection reports. 

DOE agreed with GAO’s three recommendations but asserted it was already 
taking actions and making plans to ensure that the classification 
oversight program remains effective. Although GAO is encouraged by 
DOE’s efforts, until the agency establishes a record of accomplishment 
under the new organizational structure, it will not be clear whether 
oversight will be as effective as it has been. 

[Hyperlink, http://www.gao.gov/cgi-bin/getrpt?GAO-06-785]. 

To view the full product, including the scope and methodology, click on 
the link above. For more information, contact Gene Aloise, 202-512-
3841, aloisee@gao.gov. 

[End of Section] 

Contents: 

Letter: 

Results in Brief: 

Background: 

DOE Training, Guidance, and Oversight Programs Have Been Effective over 
Time, but a Recent Change in Oversight Responsibility Has Created 
Uncertainty: 

DOE Internal Reviews Found Very Few Documents Have Been Misclassified, 
but Document Selection Procedures Are Not Consistent and Lack 
Transparency: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Summary Of DOE Classification And Control Policies: 

Levels of Classification: 

Categories of Classified Information: 

Classification Markings: 

Unclassified but Controlled Information (UCI): 

Naval Nuclear Propulsion Information (NNPI): 

Appendix II: Comments from The Department Of Energy: 

Appendix III: GAO Contact And Staff Acknowledgments: 

Table: 

Table 1: DOE Classification Reviews and Findings, 2000-2005: 

Figure: 

Figure 1: DOE's OUO Stamp: 

Abbreviations: 

AEA Atomic Energy Act: 
C/FGI-MOD Confidential Foreign Government Information–Modified Handling 
Authorized: 
CRD Confidential Restricted Data: 
DOD Department of Defense: 
DOE Department of Energy: 
FRD Formerly Restricted Data: 
NNPI Naval Nuclear Prolusion Information: 
NNSA National Nuclear Security Administration: 
NSI National Security Information RD Restricted Data: 
SRD Secret Restricted Data TSRD Top Secret Restricted Data: 
UCNI Unclassified Controlled Nuclear Information: 

United States Government Accountability Office: 

Washington, DC 20548: 

June 30, 2006: 

The Honorable Christopher Shays: 
Chairman: 
Subcommittee on National Security, Emerging Threats and International 
Relations: 
Committee on Government Reform: 
U.S. House of Representatives: 

Dear Mr. Chairman: 

In recent years, the Congress has become increasingly concerned that 
federal agencies are misclassifying information.[Footnote 1] Classified 
information is material containing national defense or foreign policy 
information determined by the U.S. government to require protection for 
reasons of national security. Access to classified information 
generally requires a security clearance. The number of classified 
documents is unknown because there is no requirement to account for 
most of them; however, some estimates put their number in the hundreds 
of millions. In just the past 5 fiscal years for which data are 
available (2000 to 2004), federal agencies created more than 110 
million new classified documents. From 2000 through 2005, the 
Department of Energy (DOE) classified about 234,000 documents, 
including a record 62,281 documents in 2004 and about 58,000 documents 
in 2005. DOE is responsible for most of the U.S. government's 
information about nuclear weapons and technology. Managing classified 
information is one of the most important responsibilities that an 
agency has because underclassifying, wrongly declassifying, and 
overclassifying sensitive information can all endanger national 
security. While it is obvious that underclassifying or wrongly 
declassifying a document can lead to the improper release of vital 
information, overclassifying can also have damaging consequences. For 
example, the 9/11 Commission Report concluded that policies designed to 
protect government information have led to overclassification, which 
has inhibited information sharing among federal agencies.[Footnote 2] 

According to officials at the National Archives' Information Security 
Oversight Office, which is responsible for setting federal government 
policy for managing classified information, an effective classification 
management program is based on a strong system of internal controls, 
including training, guidance, and oversight. From the 1950s until 2005, 
DOE's Office of Classification and its predecessor offices provided 
expertise as well as systematic training, extensive guidance, and 
effective oversight. As part of DOE's Office of Security and Safety 
Performance Assurance, the Office of Classification provided training 
at DOE headquarters, field sites, and program offices in how to 
identify, mark, and protect classified information and documents. This 
office also developed an extensive collection of classification guides, 
or manuals, specifying precisely which information must be classified. 
However, in October 2005, DOE shifted responsibility for oversight from 
the Office of Classification to the Office of Security Evaluations-- 
another office within the Office of Security and Safety Performance 
Assurance--which is primarily responsible for the oversight of physical 
security at DOE sites containing nuclear materials. 

This report assesses the extent to which (1) DOE's training, guidance, 
and oversight ensure that information is classified and declassified 
according to established criteria and (2) DOE has found documents to be 
misclassified. 

To assess the extent to which DOE's training and oversight ensure 
information is classified and declassified appropriately, we analyzed 
the policies and procedures used at various DOE sites and national 
laboratories to determine if authorized classifiers and declassifiers 
had up-to-date training and guidance. Where applicable, we assessed the 
reliability of the data and found them sufficiently reliable for the 
purposes of this report. In addition, to better understand DOE's 
training program, its process for certifying classifiers and 
declassifiers, as well as the department's classification and 
declassification procedures, we completed DOE's core training for 
classifying and declassifying documents. We also met with officials 
responsible for managing classification activities in DOE headquarters 
units and managers at six DOE sites: two in Albuquerque and one in Los 
Alamos, New Mexico; one in Aiken, South Carolina; and two in Oak Ridge, 
Tennessee. To assess the extent to which DOE has found documents to be 
misclassified, we analyzed the 34 classification inspections by DOE's 
Office of Classification and its predecessor offices, between 2000 and 
2005.[Footnote 3] We did not independently review classified documents 
because the technical expertise required to make valid judgments about 
the classification of nuclear weapons and technology was not available 
to us outside DOE. We also met with officials from the Information 
Security Oversight Office of the National Archives and Records 
Administration to obtain their views on the elements of a successful 
classification program as well as their evaluations of how DOE manages 
classified information. We conducted our work from April 2005 to May 
2006 in accordance with generally accepted government auditing 
standards. 

Results In Brief: 

In recent years, DOE's Office of Classification's systematic training, 
comprehensive guidance, and rigorous oversight programs have, to a 
great extent, helped to ensure that information is classified and 
declassified according to established criteria. However, an October 
2005 shift in responsibility for classification oversight to the Office 
of Security Evaluations has created uncertainty about whether a high 
level of performance in oversight will be sustained. Specifically, 
prior to this shift, the Office of Classification had performed 34 
inspections of classification programs at DOE sites since 2000-- 
including an average of about 10 each year for 2004 and 2005. These 
inspections reviewed whether DOE sites complied with agency 
classification policies and procedures. For example, each site we 
visited had systems in place to ensure that staff authorized to 
classify documents had completed required training as well as complete 
and up-to-date classification guides. Our findings are consistent with 
those of the National Archives' Information Security Oversight Office, 
which evaluated DOE's management of classified information in September 
2005 and found it to be among the best in the federal government. As 
part of its required annual self-assessment, a site's classification 
officer documents the steps taken to ensure that all staff authorized 
to classify or declassify documents are up-to-date on their training 
and classification guidance. In addition, most sites we visited had 
gone through an Office of Classification oversight inspection within 
the previous 2 years. After the October 2005 shift, however, the pace 
of this oversight was interrupted as classification oversight 
activities ceased until February 2006. So far in 2006, one 
classification oversight report has been completed for two offices at 
DOE's Pantex Site in Texas, and work on a second report is under way at 
four offices at the Savannah River Site in South Carolina. In April 
2006, Office of Security Evaluations officials provided us plans for 
performing additional oversight inspections for the remainder of 2006. 
These plans included inspections evaluating classification activity at 
eight DOE offices at three additional sites. In addition, according to 
the Director of the Office of Security Evaluations, the procedures for 
conducting future oversight are still evolving--including the numbers 
of sites to be inspected and the depth of analysis to be performed. If 
the oversight inspections planned for the remainder of 2006 are 
completed, it will demonstrate resumption in the pace of oversight 
conducted prior to October 2005. However, if these inspections are not 
completed, or are not as comprehensive as they used to be, the extent 
and depth of oversight will be diminished and may result in DOE 
classification activities becoming less reliable and more prone to 
misclassification. 

On the basis of reviews of classified documents performed during its 34 
oversight inspections, the Office of Classification believes that very 
few of DOE's documents are misclassified, but we found that document 
selection procedures varied, and at times, may have limited the depth 
and independence of the document reviews. The department's review of 
more than 12,000 documents between 2000 and 2005 uncovered 20 documents 
(about one-sixth of 1 percent) had been misclassified. Most 
misclassified documents remained classified, just not at the 
appropriate level or category. Of greater concern are the several 
documents that should have been classified but mistakenly were not. 
When mistakenly not classified, such documents may end up in libraries 
or DOE Web sites where they could reveal classified information to the 
public. DOE officials believe that its misclassification rate is 
reasonable, given the large volume of documents processed. While DOE 
officials' goal is to classify all documents correctly, they recognize 
there is some element of subjectivity in classification decisions and 
that training, good guidance, and oversight are the best ways of 
ensuring the rate of misclassification is kept as low as possible. 
Until October 2005, the Office of Classification evaluated DOE's 
management of classified information by sending expert teams to sites 
and program offices to draw and review nonprobability samples of 
thousands of pages of documents. At each site, Office of Classification 
inspectors reviewed documents and found that no site had more than five 
misclassified documents, and 25 sites had none. For example, during a 
review of classified documents at Los Alamos National Laboratory in New 
Mexico in May 2005, an Office of Classification team reviewed 314 
classified documents, consisting of nearly 7,000 pages, 135 newly 
created unclassified documents consisting of over 3,000 pages, and 
nearly 6,500 pages on the publicly available Los Alamos Web site and 
linked Internet pages. Among the 314 classified documents, inspectors 
found that 4 documents were misclassified. These misclassifications 
included both overclassifying documents and underclassifying them. 
Among the 135 newly created unclassified documents, inspectors found a 
more serious error: a document in the Los Alamos technical library that 
was unclassified contained classified information on nuclear weapons. 
The only notable shortcomings we identified in how DOE conducted these 
inspections were the inconsistent way documents were selected for 
review and the failure to adequately disclose these selection 
procedures in their reports. At some sites, the team could make 
decisions on which documents to review on the basis of unfettered 
access to all classified document files; whereas at other sites, some 
files were not available for inspection; and still in other cases, the 
Office of Classification inspection team reviewed documents selected 
for it by site officials. Furthermore, Office of Classification reports 
did not disclose to the reader key facts about how information was 
gathered, what limitations the office agreed to, and how this affected 
its findings. Together these shortcomings may limit the independence of 
DOE oversight and potentially undermine confidence in the credibility 
of its findings. 

We are making recommendations to help ensure that DOE classification 
activities remain effective and result in documents that are classified 
and declassified according to established criteria. Specifically, we 
recommend that the Secretary of Energy (1) ensure that the classified 
information oversight program provides oversight to a similar number of 
sites, as it had done prior to October 2005 and a similar depth of 
analysis; (2) strengthen the review of classified documents by applying 
consistent selection procedures when identifying documents for review; 
and (3) disclose the selection procedures used for document review in 
future classification inspection reports. 

We provided a draft of this report to DOE for comment. DOE agreed with 
the report's recommendations, but commented that it was already taking 
actions and making plans to ensure that the classification oversight 
program remains effective. Although we are encouraged by DOE's efforts, 
until the agency establishes a record of accomplishment under the new 
organizational structure, it will not be clear whether oversight will 
be as effective as it has been in the past. 

Background: 

The U.S. government classifies information that it determines could 
damage the national security of the United States if disclosed 
publicly.[Footnote 4] Currently, all classified information falls under 
two authorities, one for national defense and foreign relations, the 
other for nuclear weapons and technology. Beginning in 1940, classified 
national defense and foreign relations information has been created, 
handled, and safeguarded in accordance with a series of executive 
orders. Executive Order 12958, Classified National Security 
Information, as amended, is the most recent.[Footnote 5] It establishes 
the basis for designating National Security Information (NSI). It 
demarcates different security classification levels, the unauthorized 
disclosure of which could reasonably be expected to cause exceptionally 
grave damage (Top Secret), serious damage (Secret), or damage 
(Confidential). It also lists the types of information that can be 
classified and describes how to identify and mark classified 
information. In 2005, about one quarter of DOE classification decisions 
concerned NSI. 

The advent of nuclear weapons during World War II, led to a new 
category of classified information. In 1946, the Congress enacted the 
Atomic Energy Act, which established a system for governing how U.S. 
nuclear information is created, handled, and safeguarded.[Footnote 6] 
Nuclear information categorized as Restricted Data (RD) or Formerly 
Restricted Data (FRD)[Footnote 7] is not governed by Executive Order 
12958. RD is defined as data concerning the design, manufacture, or 
utilization of atomic weapons; production of special nuclear material; 
and use of special nuclear material in the production of energy. This 
includes information about nuclear reactors that produce plutonium and 
tritium, radioactive isotope separation techniques, and the quantities 
of nuclear materials involved in these processes. FRD relates primarily 
to data regarding the military use of nuclear weapons. Examples of FRD 
include weapons stockpile data, weapon yields, the locations of nuclear 
weapons, and data about weapons safety and storage. Like NSI, 
classified nuclear information also has three classification levels: 
Top Secret, Secret, or Confidential. 

Naval Nuclear Propulsion Information (NNPI) is an exceptional category, 
which may fall under either of the two classification authorities. NNPI 
is deemed by both DOE and the Department of Defense (DOD) to be 
sufficiently sensitive to merit special protections and may be 
classified under the Atomic Energy Act or Executive Order 12958, 
depending on its subject and details. 

Some Controlled Information Remains Unclassified: 

Two categories of nuclear information can be withheld from the public 
without being classified: Unclassified NNPI and Unclassified Controlled 
Nuclear Information (UCNI). Unclassified NNPI and UCNI are information 
the government considers sufficiently sensitive to withhold from public 
release, but not so sensitive as to warrant designation as RD, FRD, or 
NSI.[Footnote 8] UCNI is a category created under the authority of the 
Atomic Energy Act, which enables DOE officials to share information 
with state and local law enforcement and emergency services personnel 
who, while lacking security clearances, may have a legitimate need to 
know operational details about, for example, planned shipments of 
special nuclear materials. 

Documents Can Be Classified In Whole Or In Part: 

According to the current executive order, documents containing only NSI 
must be "portion marked," for instance, classified paragraph-by- 
paragraph. For example, a document containing NSI may have paragraphs 
classified as Top Secret, Secret, or Confidential, along with others 
that are unclassified. However, documents containing any RD or FRD are 
classified in their entirety at the level of the most sensitive 
information in the document. Portion marking of documents containing RD 
and FRD is not required by the Atomic Energy Act and is discouraged by 
DOE policy.[Footnote 9] 

Requirements Vary For Declassifying Documents: 

Executive Order 12958, as amended, states that NSI shall be 
declassified as soon as it no longer meets the standards for 
classification.[Footnote 10] The point at which information is to be 
declassified is set when the decision is made to classify it, and it is 
linked to an event, such as a completed mission, or to a period of 
time. Classified records that are older than 25 years and have 
permanent historical value are automatically declassified unless an 
exemption is granted because their contents still remain sensitive and 
their release could harm national security. Agencies have adopted 
processes to facilitate declassification in compliance with the 
executive order. 

Unlike documents containing NSI, documents containing RD or FRD are not 
reviewed automatically for possible declassification.[Footnote 11] The 
reason for this is that these two categories are mostly scientific and 
technical and may not become less sensitive with the passage of time. 
In fact, such data may be useful to nations and terrorist groups that 
are trying to build nuclear weapons. At a time of increased concern 
about nuclear proliferation, some of the oldest and simplest nuclear 
technology can be useful for making weapons of mass destruction. For 
this reason, documents about nuclear weapons and technologies from the 
1940s and 1950s remain especially sensitive and worthy of protection. 

DOE Guidance On Classification: 

DOE implements the executive order and classification statutes by 
issuing departmental regulations, directives, and extensive use of 
classification guides. DOE's directive, Identifying Classified 
Information,[Footnote 12] is the department's comprehensive guide to 
classifying, declassifying, marking, and protecting information, 
documents, and material. The directive also establishes policies and 
procedures, such as departmentwide training and certification 
requirements for staff authorized to classify or declassify 
information, and for periodic self-assessments. Classification guides 
are manuals specifying precisely which DOE information must be 
classified, how it should be categorized (NSI, RD, or FRD), and at what 
level (Top Secret, Secret, or Confidential) it should be protected. DOE 
has a detailed and comprehensive set of classification guides that are 
integral to efficient functioning of the department's classification 
activities. The department limits the use of "source documents" for the 
purpose of making classification decisions.[Footnote 13] Source 
documents may be used to classify documents containing NSI, but only 
when there is no guidance available.[Footnote 14] For example, if a DOE 
classifier is evaluating a new document with the same information found 
in another document already classified as Secret, then this new 
document may also be classified as Secret. RD and FRD documents can 
never be used as source documents. 

DOE Training, Guidance, And Oversight Programs Have Been Effective over 
Time, But A Recent Change In Oversight Responsibility Has created 
Uncertainty: 

DOE's Office of Classification's systematic training, comprehensive 
guidance, and rigorous oversight programs had a largely successful 
history of ensuring that information was classified and declassified 
according to established criteria. DOE's training requirements and 
classification guidance are essential internal controls that provide a 
strong framework for minimizing the risk of misclassification. However, 
since responsibility for classification oversight was shifted from the 
Office of Classification to the Office of Security Evaluations in 
October 2005, the pace of oversight was interrupted--creating 
uncertainty about how oversight will be performed and whether it will 
continue to be effective. 

DOE'S Classification Training And Guidance Programs Are Systematic and 
Comprehensive: 

Systematic training requirements are an important element of DOE's 
framework for maximizing the proper classification of documents. Only 
staff that have successfully completed training are authorized to 
classify or declassify documents. Staff must be recertified as 
classifiers and/or declassifiers every 3 years, in order to retain 
their authority. Staff are typically trained as "derivative 
classifiers" and, in some cases, as "derivative declassifiers" as well. 
They are limited in their authority to those areas in which they have 
special knowledge and expertise and are only authorized to classify (or 
declassify) documents "derivatively"--that is, only if the document in 
question contains information a DOE or other U.S. government agency 
classification guide specifically requires be classified or 
declassified.[Footnote 15] There are currently about 4,600 derivative 
classifiers in DOE, nearly all of whom do classification work only as a 
collateral duty. For example, most derivative classifiers in DOE are 
scientists, engineers, or other technically trained people who work in 
programs or areas involving classified information that need staff who 
can properly classify the documents these programs produce. Relatively 
few DOE staff (just 215 as of May 2006) are authorized to declassify 
documents. Because a declassified document may become publicly 
available, derivative declassifiers are among the most experienced 
derivative classifiers. Only original classifiers, of which there are 
currently 25 throughout the DOE complex, are authorized to classify 
previously unclassified information.[Footnote 16] All DOE original 
classifiers are either very senior, full-time classification 
professionals, such as the director and deputy director of the Office 
of Classification, or one of the department's top-level political 
appointees, such as the Administrator, National Nuclear Security 
Administration. 

DOE has developed an extensive collection of more than 300 
classification guides, or manuals, specifying precisely which DOE 
information must be classified, how it should be categorized, and at 
what level (Top Secret, Secret, or Confidential) it should be 
protected. The Office of Classification oversees the regular updating 
of all classification guides used in DOE and must ultimately approve 
the use of every guide. DOE prohibits classification decisions based on 
source documents for documents containing RD and FRD and permits their 
use only when no guidance is available for documents containing NSI 
from other federal agencies. The Information Security Oversight Office 
considers the use of classification guides to be a best practice 
because they provide a singular, authoritative voice that is less open 
to individual interpretation or confusion than source documents and so 
using these guides are less likely to result in errors.[Footnote 17] 
According to the Information Security Oversight Office, DOE's use of 
classification guides is among the most extensive in the federal 
government. Classification guides are integral to the efficient 
functioning of the department's classification program. Some 
classification guides are more general in nature, such as those dealing 
with physical security, and are used widely throughout DOE. Others, 
known as "local guides," are used at a few or even a single site 
because they provide guidance specific to a single DOE program or 
project. For example, a classification guide used by contractors 
working on a decontamination and clean-up project at a site in Oak 
Ridge, Tennessee, provides specific guidance on nuclear waste and 
storage unique to this site. 

DOE has also implemented an extensive and rigorous oversight program. 
From 2000 through 2005, the Office of Classification and its 
predecessor offices have conducted on-site inspections of 
classification activities at 34 DOE field offices, national 
laboratories, and weapons manufacturing facilities. In calendar years 
2004 and 2005, the Office of Classification conducted an average of 10 
oversight inspections a year. Classification activities were evaluated 
in depth in eight different functional areas, including site-provided 
classification training, self-assessment efforts, and overall senior 
management support for (and awareness of) classification activities. To 
this end, before a team of 3 to 10 Office of Classification inspectors 
arrived, it would send the site's classification officer a "data call" 
requesting detailed and specific answers to dozens of questions about 
the procedures and practices of the site's classification program. For 
example, to ascertain how effectively classification guidance was being 
used, requests were made for information about what guidance was in use 
at the site; the names of authorized classifiers who had guides; 
whether there were any local (site-specific) guides in use, and if so, 
when were they last validated by Office of Classification officials. 
Similarly detailed requests for information were requested about each 
of the other classification program elements. Having such detailed 
information in hand prior to arrival at the site allowed inspection 
teams to undertake a comprehensive evaluation in just 2 to 5 days 
because they could focus more on validating the information provided in 
the data call than on undertaking the time-consuming task of gathering 
data themselves. The Office of Classification staff's expertise in 
classification matters is augmented with subject area experts. For 
example, to ensure the inspection team had adequate expertise to make 
valid assessments of classification decisions about nuclear weapons 
design at Los Alamos National Laboratory, a staff member with nuclear 
weapons design experience was assigned to the team. Moreover, in many 
cases, members of the inspection team had more than 20 years of 
classification experience. As a result of the extensive information 
provided by the data call, and the level of experience of the 
inspection team, generally the team submitted a draft inspection report 
to the site's classification officer before leaving. It is DOE policy 
that any findings requiring immediate correction resulted in the 
creation of a corrective action plan, which had to be completed within 
60 days of the inspection. DOE officials told us progress on 
implementing corrective action plans was reported to the Office of 
Classification quarterly. 

In September 2005, the Information Security Oversight Office reviewed 
DOE's classification program just prior to the shift in responsibility 
for classification oversight.[Footnote 18] Officials at the Information 
Security Oversight Office found DOE's program to be much better than 
the average federal agency. They singled out DOE's training program and 
extensive use of classification guidance as especially impressive. One 
official called DOE's program for ensuring that all staff authorized to 
classify and declassify documents were recertified every 3 years 
"outstanding." Another official called DOE's extensive use of 
classification guides a "best practice." Overall, Information Security 
Oversight Office officials were impressed with DOE's classification 
program, noting that robust oversight is a very important part of an 
effective program for managing classified information. 

Continued Effectiveness Of Classification Oversight Is Uncertain: 

Since responsibility for classification oversight was shifted from the 
Office of Classification to the Office of Security Evaluations, the 
pace of oversight was interrupted--creating uncertainty about how 
oversight will be performed and whether it will continue to be 
effective. The Office of Security Evaluations is the DOE office 
responsible primarily for the oversight of physical security at DOE 
sites, with a special emphasis on Category 1 sites (sites containing 
special nuclear materials). Since October 2005, the Office of Security 
Evaluations has completed one inspection of two offices at the Pantex 
Site in Texas and another inspection of four offices at the Savannah 
River Site is under way. In April 2006, Office of Security Evaluations 
officials provided us plans for performing additional oversight 
inspections for the remainder of 2006. These plans included inspections 
evaluating classification activity at eight DOE offices at three 
additional sites. Classification oversight has been incorporated into 
larger oversight efforts on physical security at DOE sites. 

Classification oversight ceased from October 2005 until February 2006 
when the Office of Security Evaluations began its inspection of two 
offices at the Pantex Plant, a nuclear weapons manufacturing facility 
in Texas. Before the shift in responsibility, DOE officials did not 
conduct any risk assessment of the likely effects on the classification 
oversight program of the shift for three reasons: (1) they did not 
consider the shift to be a significant organizational or management 
challenge because the upper-level management remained the same; (2) the 
Office of Security Evaluations would continue to draw on many of the 
same experienced Office of Classification staff who have been 
performing classification oversight for many years; and (3) 
responsibility for other key internal controls for managing 
classification activities, namely training and guidance, would remain 
with the Office of Classification. The director of the Office of 
Security Evaluations and the acting deputy director of the Office of 
Classification told us that the goal of shifting responsibility for 
classification oversight from one office to the other was to 
consolidate all oversight functions in one area. The idea arose in the 
course of a periodic reassessment of the organization of the Office of 
Security and Safety Performance Assurance--the larger organization of 
which these and several other offices are part--and a judgment by 
senior DOE management that one group should do all the oversight. The 
Office of Security Evaluations seemed the most logical place to locate 
classification oversight, according to senior DOE management. DOE 
officials also told us that the Office of Security and Safety 
Performance Assurance was not the only part of DOE affected by this 
drive to consolidate functions in single offices, and there was no 
intent to downgrade oversight. 

According to the Director of the Office of Security Evaluations, the 
procedures for conducting future oversight are still evolving-- 
including the numbers of sites to be inspected and the depth of 
analysis to be performed. The office currently plans to evaluate 
classification activities at 14 offices within five DOE sites in 
calendar year 2006, integrating classification oversight into its 
regularly scheduled inspections of Category 1 sites with inspections at 
a few non-Category 1 sites.[Footnote 19] The director of the Office of 
Security Evaluations said the goal is to visit each of DOE's 10 
Category 1 sites every 2 years. However, this schedule has been 
recently delayed as the office has been tasked by senior DOE management 
to perform security reviews in other areas of DOE operations. Now that 
classification oversight is a component within the much larger 
oversight agenda of the Office of Security Evaluations--one focused on 
the physical security of DOE's most sensitive sites--it raises 
uncertainty about whether classification oversight will have a 
diminished priority than when it was solely an Office of Classification 
responsibility. However, if all of the visits planned for 2006 are 
completed, then the Office of Security Evaluations will be conducting 
oversight at a pace similar to what was done prior to October 2005. 

As classification oversight is now the responsibility of the Office of 
Security Evaluations--and will be reported as one component in a much 
larger report on the overall security of DOE sites--it is unclear if 
the new format will have the same depth of analysis or be as 
comprehensive, detailed, and useful as the format used by the Office of 
Classification. The Office of Security Evaluations reports are bigger 
and have a much higher profile with senior DOE management than reports 
by the Office of Classification. As such, they are written to convey 
information to a broader and less technically oriented audience. Each 
element of security is rated as "effective performance" (green), "needs 
improvement" (yellow), or "significant weakness" (red). To accommodate 
this shift, the format for reporting the results of inspections of 
classification activities has changed to fit into this larger, well- 
established Office of Security Evaluations reporting format. These 
reports have relatively brief executive summaries but are supplemented 
by several appendixes, one for each component of site security. The 
executive summary includes the highlights of the inspection, an overall 
evaluation of security at the site, the formal findings (that is, 
deficiencies uncovered), and a brief scope and methodology section 
(which includes a listing of the personnel participating in the 
inspection). It is uncertain if the results of the inspection of 
classification activities will be included in the executive summary, or 
if this depends on whether the results are particularly noteworthy. Not 
all aspects of an inspection will be mentioned in the summary section, 
and most of what is reported on classification and other topics will be 
in their respective appendixes. The Office of Security Evaluation's 
full report will be classified because it will contain information on 
the vulnerabilities in site security. However, according to the 
Office's director, the appendix on classification will likely be 
unclassified. 

Since the shift in responsibility, the Office of Security Evaluations 
has completed one classification inspection of two offices at the 
Pantex Site; and the new procedures for oversight are still evolving. 
It is uncertain whether the reporting on classification oversight will 
be as detailed, specific, and, ultimately, as useful as it was prior to 
the October 2005 shift in responsibility. While the overall reporting 
format for the Office of Security Evaluations reports is firmly in 
place, the director of the office told us that the details of how to 
assess the effectiveness of the classification program is still 
evolving. Initially, the Office of Security Evaluations plans to gather 
similarly detailed and comprehensive information from the sites it 
inspects using the same "data call" as the Office of Classification; 
the data call requests detailed and specific answers to dozens of 
questions about the procedures and practices of the site's 
classification program. The director of the Office of Security 
Evaluations stressed--and the deputy director of the Office of 
Classification agreed--that they plan to have the information reported 
in the classification appendix written in language similar to that in 
Office of Classification reports, and findings and recommendations for 
improvement will be conveyed in language no less specific and 
"actionable" than in the previous reports. Nonetheless, until the 
Office of Security Evaluations performs several classification 
inspections and establishes its own record of accomplishment in 
overseeing DOE classification activities, it is not clear whether 
oversight will be as effective as it was before the shift in 
responsibility. Without continued effectiveness, DOE classification 
activities could become less reliable and more prone to 
misclassification. 

DOE Internal Reviews Found Very Few Documents Have Been misclassified, 
But Document Selection Procedures Are Not consistent And Lack 
Transparency: 

On the basis of reviews of over 12,000 classified documents totaling 
nearly a quarter million pages at 34 sites between 2000 and 2005, DOE 
officials have found that very few documents are misclassified. Office 
of Classification inspectors found 20 documents had been misclassified, 
an error rate of about one-sixth of 1 percent.[Footnote 20] At more 
than two-thirds of the sites (25 of 34) inspectors found no 
classification errors. The most misclassified documents that these 
inspectors found at any site were five, at the Los Alamos National 
Laboratory in May 2005. Four of these documents were classified, but 
not at the proper level or category. A fifth document containing 
nuclear weapons information should have been classified but was 
unclassified and found in the laboratory's technical library. (See 
table 1.) 

Table 1: DOE Classification Reviews and Findings, 2000-2005: 

Site: Office of Science and Technical Information; 
Dates of review: Oct 2005; 
Number of documents reviewed: 82; 
Number of pages reviewed: 2,846; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Y-12 Site Office; 
Dates of review: Oct 2005; 
Number of documents reviewed: 83; 
Number of pages reviewed: 1,525; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Y-12 Complex; 
Dates of review: Oct 2005; 
Number of documents reviewed: 575; 
Number of pages reviewed: 11,347; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Livermore Site Office; 
Dates of review: Aug 2005; 
Number of documents reviewed: 1,112; 
Number of pages reviewed: 7,064; 
Misclassifications: 3; 
Percent of documents misclassified: 0.27. 

Site: Livermore National Lab; 
Dates of review: Aug 2005; 
Number of documents reviewed: 222; 
Number of pages reviewed: 5,382; 
Misclassifications: 3; 
Percent of documents misclassified: 1.35. 

Site: Sandia National Lab/California; 
Dates of review: Aug 2005; 
Number of documents reviewed: 187; 
Number of pages reviewed: 3,850; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: NNSA Service Center; 
Dates of review: July 2005; 
Number of documents reviewed: 840; 
Number of pages reviewed: 5,439; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Office of Secure Transportation; 
Dates of review: July 2005; 
Number of documents reviewed: 64; 
Number of pages reviewed: 763; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Office of Civilian Radioactive Waste Management; 
Dates of review: June 2005; 
Number of documents reviewed: 213; 
Number of pages reviewed: 1,650; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Los Alamos Site Office; 
Dates of review: May 2005; 
Number of documents reviewed: 154; 
Number of pages reviewed: 427; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Los Alamos National Lab; 
Dates of review: May 2005; 
Number of documents reviewed: 449; 
Number of pages reviewed: 16,454; 
Misclassifications: 5; 
Percent of documents misclassified: 1.11. 

Site: Office of the Assistant Secretary for Environmental Management; 
Dates of review: Mar-Apr 2005; 
Number of documents reviewed: 25; 
Number of pages reviewed: 375; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Sandia Site Office; 
Dates of review: Mar 2005; 
Number of documents reviewed: 12; 
Number of pages reviewed: 1,110; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Sandia National Lab/New Mexico; 
Dates of review: Mar 2005; 
Number of documents reviewed: 174; 
Number of pages reviewed: 11,153; 
Misclassifications: 2; 
Percent of documents misclassified: 1.15. 

Site: Pantex Site Office; 
Dates of review: Nov 2004; 
Number of documents reviewed: 52; 
Number of pages reviewed: 680; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Pantex Plant; 
Dates of review: Nov 2004; 
Number of documents reviewed: 240; 
Number of pages reviewed: 16,753; 
Misclassifications: 2; 
Percent of documents misclassified: 0.83. 

Site: Kansas City Site Office; 
Dates of review: July 2004; 
Number of documents reviewed: 14; 
Number of pages reviewed: 94; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Kansas City Plant; 
Dates of review: July 2004; 
Number of documents reviewed: 29; 
Number of pages reviewed: 682; 
Misclassifications: 0ª; 
Percent of documents misclassified: 0[A]. 

Site: Oak Ridge Operations Office; 
Dates of review: June 2004; 
Number of documents reviewed: 634; 
Number of pages reviewed: 17,353; 
Misclassifications: 1; 
Percent of documents misclassified: 0.16. 

Site: Paducah Plant; 
Dates of review: Mar-Apr 2004; 
Number of documents reviewed: 18; 
Number of pages reviewed: 59; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Portsmouth Plant; 
Dates of review: Mar 2004; 
Number of documents reviewed: 13; 
Number of pages reviewed: 680; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Idaho Operations Office; 
Dates of review: Aug 2003; 
Number of documents reviewed: 49; 
Number of pages reviewed: 2,232; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Livermore Site Office; 
Dates of review: June 2003; 
Number of documents reviewed: 327; 
Number of pages reviewed: 6,499; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Richland Operations Office; 
Dates of review: Apr 2003; 
Number of documents reviewed: 233; 
Number of pages reviewed: 9,933; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Savannah River Operations Office; 
Dates of review: Oct 2002; 
Number of documents reviewed: 325; 
Number of pages reviewed: 10,362; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Rocky Flats Field Office; 
Dates of review: Jun 2002; 
Number of documents reviewed: 567; 
Number of pages reviewed: 10,905; 
Misclassifications: 1; 
Percent of documents misclassified: 0.18. 

Site: Nevada Operations Office; 
Dates of review: Mar 2002; 
Number of documents reviewed: 859; 
Number of pages reviewed: 10,196; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Oak Ridge Operations Office; 
Dates of review: June-July 2001; 
Number of documents reviewed: 953; 
Number of pages reviewed: 22,751[B]; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Ohio Field Office; 
Dates of review: Apr 2001; 
Number of documents reviewed: 225; 
Number of pages reviewed: 1,642; 
Misclassifications: 1; 
Percent of documents misclassified: 0.44. 

Site: Albuquerque Operations Office; 
Dates of review: Mar 2001; 
Number of documents reviewed: 2,095; 
Number of pages reviewed: 24,447[B]; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Richland Operations Office; 
Dates of review: Nov 2000; 
Number of documents reviewed: 334; 
Number of pages reviewed: 11,510[B]; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Oakland Operations Office; 
Dates of review: Sep-Oct 2000; 
Number of documents reviewed: 248; 
Number of pages reviewed: 1,214[B]; 
Misclassifications: 2; 
Percent of documents misclassified: .81. 

Site: Savannah River Operations Office; 
Dates of review: June 2000; 
Number of documents reviewed: 182; 
Number of pages reviewed: 4,173[B]; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Nevada Operations Office; 
Dates of review: Mar-Apr 2000; 
Number of documents reviewed: 581; 
Number of pages reviewed: 4,100[B]; 
Misclassifications: 0; 
Percent of documents misclassified: 0. 

Site: Total; 
Dates of review: [Empty]; 
Number of documents reviewed: 12,170; 
Number of pages reviewed: 225,650; 
Misclassifications: 20; 
Percent of documents misclassified: 0.16. 

Source: GAO analysis based on DOE data. 

[A] The original report on the Kansas City Plant cited two 
misclassified documents. Subsequently, plant officials appealed this 
finding, and the Office of Classification agreed that the two documents 
in question were not misclassified. 

[B] For these reviews, Office of Classification inspectors estimated 
the number of pages they analyzed. 

[End of table] 

Most misclassified documents remained classified, just not at the 
appropriate level or category. Of greater concern would be documents 
that should be classified but mistakenly are not. When mistakenly not 
classified, such documents may end up in libraries or on DOE Web sites 
where they could reveal sensitive RD and FRD to the public. When 
documents are not classified but should be, these errors can only be 
uncovered through some form of oversight, such as the document reviews 
that occurred in preparation for, and during, Office of Classification 
inspections. For example, during an inspection at the Sandia National 
Laboratories in March 2005, Office of Classification inspectors 
reviewed more than 170 unclassified documents in the laboratory's 
holdings and found 2 documents that contained classified information. 
Without systematic oversight, these kinds of errors are unlikely to be 
discovered and corrected. 

While DOE's extensive document reviews provided depth and rigor to its 
oversight inspections, two notable shortcomings in this process were 
(1) the inconsistent way that inspectors gained access to the many 
documents they would review and (2) the failure to adequately disclose 
these procedures in their reports. At the six DOE sites we visited, the 
procedures that the Office of Classification inspection teams used to 
obtain documents varied widely. For example, at the Los Alamos National 
Laboratory, inspectors were granted unfettered access to any storage 
vault and library, and they themselves chose the documents for 
review.[Footnote 21] Once in the vault or library, inspectors used the 
document indexes or interviewed the librarians to decide which 
documents and topics were recently classified or declassified. The 
inspectors requested the documents of most interest, or they browsed in 
the collection and pulled files randomly from the shelves. By contrast, 
at the NNSA Service Center in Albuquerque, site officials selected 
documents from several different locations, and then inspectors chose 
from among them. By not being able to select their own samples, Office 
of Classification inspectors limited their independence--which could 
possibly undermine the credibility of their findings. Because DOE does 
not have a complete inventory of its classified documents, it cannot 
select a strictly random sample. Nonetheless, DOE officials 
acknowledged they could improve their selection procedures to make them 
more consistent and random. Furthermore, in the 34 inspection reports 
we analyzed, Office of Classification inspectors did not disclose to 
the reader key facts about how information was gathered, what 
limitations they agreed to, and how this affected their findings. 
According to Standards for Internal Control in the Federal 
Government,[Footnote 22] independent inspections should properly 
document and report on the processes they use in their evaluations. The 
Office of Classification's reports provided no detail about how 
documents were chosen. Such detail would increase public confidence 
that DOE's classification oversight is transparent and robust. 

Conclusions: 

Since the 1950s, the DOE's Office of Classification and its predecessor 
organizations have developed strong systems of internal controls for 
managing classified information. At the core of these systems are (1) 
DOE's requirement that staff authorized to classify documents must 
complete training and be periodically recertified, (2) its 
comprehensive guidance, and (3) its program of regular and rigorous 
oversight to ensure that DOE sites are following agency classification 
policies. These training, guidance, and oversight programs have 
provided a proven framework that has contributed to DOE's success in 
managing classified information. However, the recent reduction in 
oversight activity following a shift in responsibilities raises 
questions about whether this framework will continue to be as strong. 
If the oversight inspections planned for the remainder of 2006 are 
effectively completed, it will demonstrate resumption in the pace of 
oversight conducted prior to October 2005. However, if these 
inspections are not completed, or are not as comprehensive, then the 
extent and depth of oversight will be diminished and may result in DOE 
classification activities becoming less reliable and more prone to 
misclassification. In addition, by implementing more random selection 
procedures for identifying classified documents to review--and by 
disclosing these procedures clearly in their reports--DOE has the 
opportunity to assure both itself and the public that its oversight is, 
indeed, effective. DOE is the agency most responsible for safeguarding 
the nation's nuclear secrets, and its classification and 
declassification procedures are especially vital to national security. 
At a time when risks of nuclear proliferation are increasing, it is 
imperative that DOE build on its past successes in order to continue to 
be effective. 

Recommendations For Executive Action: 

To help ensure that DOE classification activities remain effective and 
result in documents that are classified and declassified according to 
established criteria, we recommend that the Secretary of Energy take 
the following three actions: 

* ensure that the classified information oversight program provides 
oversight to a similar number of DOE sites, as it did before October 
2005, and provides a similar depth of analysis; 

* strengthen the review of classified documents by applying selection 
procedures that more randomly identify documents for review; and: 

* disclose the selection procedures used for documents for review in 
future classification inspection reports. 

Agency Comments And Our Evaluation: 

In commenting on the draft of this report, DOE agreed with the findings 
and recommendations of the report. DOE was pleased that its 
classification program is being recognized as particularly effective in 
protecting information vital to national security. However, while DOE 
agreed with our recommendation that steps be taken to ensure that the 
classification oversight program provide oversight to a similar number 
of sites at a similar depth of analysis, it asserted that it is in fact 
already taking the needed actions and has, overall, "retained the 
effective framework previously established by the Office of 
Classification." Although we are encouraged by DOE's efforts, until the 
agency establishes a record of accomplishment under the new 
organizational structure, it will not be clear whether oversight will 
be as effective as it has been in the past. 

DOE also concurred with our recommendations to strengthen the review of 
classified documents by applying selection procedures that more 
randomly identify documents for review and disclose these procedures in 
future reports and outlined steps it will take to implement these two 
recommendations. 

Comments from DOE's Director, Office of Security and Safety Performance 
Assurance are reprinted in appendix II. DOE also provided technical 
comments, which we incorporated into the report as appropriate. 

We are sending copies of this report to the Secretary of Energy; the 
Director, Office of Management and Budget; and interested congressional 
committees. We will also make copies available to others upon request. 
In addition, this report will be available at no charge on the GAO Web 
site at [Hyperlink, http://www.gao.gov]. 

If you or your staff have any questions concerning this report, please 
contact me at (202) 512-3841 or aloisee@gao.gov. Contact points for our 
Offices of Congressional Relations and Public Affairs may be found on 
the last page of this report. GAO staff that made major contributions 
to this report are listed in appendix III. 

Sincerely yours, 

Signed by: 

Gene Aloise: 
Director, Natural Resources and Environment: 

[End of section] 

Appendix I: Summary of DOE Classification and Control Policies: 

The Department of Energy (DOE) classifies and declassifies information 
under authorities granted by the Atomic Energy Act, first passed in 
1946, and under presidential executive orders governing national 
security information. These authorities and corresponding implementing 
directives provide for three classification levels: Top Secret, Secret, 
and Confidential. DOE uses three categories to identify the different 
types of classified information: Restricted Data, Formerly Restricted 
Data, and National Security Information. In addition to classified 
information, certain types of unclassified information are sensitive 
and require control to prevent public release. The markings used and 
the controls in place depend on the statutory basis of the unclassified 
control system and vary in DOE, from Official Use Only information to 
Unclassified Controlled Nuclear Information. At a practical level, 
unclassified information is controlled or not controlled, depending on 
its sensitivity, any overriding public interest requiring release, or 
operational considerations involving the benefit of control versus the 
cost of control (for example, it must be shared with uncleared state or 
local government officials). 

The information presented below is a summary of the various levels and 
categories used by DOE to classify and control information. 

Levels Of Classification: 

All classified information and documents are classified at one of three 
levels, listed in descending order of sensitivity: Top Secret (TS), 
Secret (S), or Confidential (C). 

Categories Of Classified Information: 

Restricted Data (RD): 

Classified under authority of the Atomic Energy Act (AEA) of 1954, as 
amended. 

Defined in the AEA[Footnote 23] as all data concerning: 

* the design, manufacture, or utilization of atomic weapons; and: 

* the production of special nuclear material. Examples include: (1) 
Production reactors (2) Isotope separation (gaseous diffusion, gas 
centrifuge, laser isotope separation). 


* The use of special nuclear materials in the production of energy. 
Examples include: (1) naval reactors, and (2) space power reactors. 

* But not information declassified or removed from the RD category. 

Documents are not portion marked-an entire document is classified at 
the level of the most sensitive information contained in the 
document.[Footnote 24] 

Formerly Restricted Data (FRD): [Footnote 25] 

Classified under authority of the AEA of 1954, as amended. 

Information that has been removed from the RD category because DOE and 
the Department of Defense have jointly determined that the information 
(1) now relates primarily to the military utilization of atomic weapons 
and (2) can be adequately safeguarded as defense information.[Footnote 
26] Examples include: 

* weapon stockpile quantities, 

* weapons safety and storage, 

* weapon yields, and: 

* weapon locations. 

Documents are not portion marked. 

National Security Information (NSI): 

Classified under the authority of Executive Order 12958, as amended. 

Information that pertains to the national defense or foreign relations 
of the United States and classified in accordance with the current 
executive order as Top Secret, Secret, or Confidential. 

* NSI documents may be classified up to a 25 year limit unless 
containing information that has been approved for exemption from 
declassification under Executive Order 12958, as amended, and based on 
an approved declassification guide. 

* For example, DOE treats certain nuclear-related information that is 
not RD or FRD, such as security measures for nuclear facilities, as 
exempt from declassification until such facilities are no longer in 
use. Many of these facilities have been in use for over 50 years. 

Documents are portion marked by paragraph. 

Confidential Foreign Government Information - Modified Handling 
Authorized (C/FGI-MOD): 

An agency must safeguard foreign government information under standards 
providing a degree of protection at least equivalent to that required 
by the government or international organization that furnished the 
information. If the FGI requires a level of protection lower than that 
for Confidential, the United States can, under Executive Order 12958 
section 4.1(h), classify and protect it as C/FGI-MOD, which provides 
protection and handling instructions similar to that provided to United 
States Official Use Only. Before C/FGI-MOD was created, the only legal 
way for such information to be controlled was at the Confidential 
level, which resulted in over-protection, increased security cost, and 
operational complexity. 

Classification Markings: 

Each classified document must be marked to show its classification 
level (and classification category if RD or FRD), who classified it, 
the basis for the classification, and the duration of classification 
(if NSI).[Footnote 27] Lack of a category marking indicates the 
classified document is NSI. A document containing only NSI must be 
portion marked. 

An RD document, for example, will be marked TSRD (Top Secret Restricted 
Data), showing the classification level and category. RD documents are 
similarly marked SRD (Secret Restricted Data), or CRD (Confidential 
Restricted Data). A document should never simply be marked "RD." The 
same rules apply to FRD information (TSFRD, SFRD, and CFRD). 

A classified document that is not RD or FRD is an NSI document. NSI 
documents are marked as TSNSI (Top Secret National Security 
Information), SNSI (Secret National Security Information), or CNSI 
(Confidential National Security Information); or simply Top Secret, 
Secret, or Confidential. 

Unclassified But Controlled Information (UCI): 

Unclassified Controlled Nuclear Information (UCNI): 

Controlled under authority of the AEA of 1954, as amended.[Footnote 28] 

Information concerning: 

* the design of nuclear material production facilities or utilization 
facilities; 

* security measures for protecting such facilities, nuclear material 
contained in such facilities, or nuclear material in transit; 

* The design, manufacture, or utilization of any atomic weapon or 
component if it has been declassified or removed from the RD category. 

UCNI markings - A document containing UCNI must be marked at the top 
and bottom of each page with "Unclassified Controlled Nuclear 
Information" or "UCNI" and include, on the front of the document, a 
marking that identifies the Reviewing Official making the 
determination, the date of the determination, and the guidance used. 

Official Use Only (OUO): [Footnote 29] 

Unclassified information that may be exempt from public disclosure 
under provisions of the Freedom of Information Act (FOIA) that is not 
otherwise subjected to a formally implemented control system. 

A decision to control information as OUO does not mean that such 
information is automatically exempt from disclosure if requested under 
the FOIA. That determination is made by a FOIA Authorizing Official 
only when the document is requested. The OUO marking merely serves as a 
warning that the document reviewer considers the information to be 
sensitive and indicates why by including on the document the FOIA 
exemption that the document reviewer thinks applies. 

OUO markings - Documents determined to contain OUO information are 
marked "Official Use Only" at the bottom of each page and include a 
marking on the front of the document that gives the name and title of 
the document reviewer making the determination, that document 
reviewer's determination of which FOIA exemption he or she believes 
applies, and a citation to the guidance relied upon, if any. (Note: 
Sometimes classification guides designate information as OUO rather 
than classified, and when they do, they state which FOIA exemption 
applies. This classification guide is then cited on the OUO stamp.) 

Figure 1: DOE's OUO Stamp: 

[See PDF for image] 

Source: DOE. 

[End of figure] 

Naval Nuclear Propulsion Information (NNPI): 

NNPI concerns all classified and controlled unclassified information 
related to the naval nuclear propulsion program. This marking 
supplements existing classification and control systems and is not a 
separate category outside of the authorities provided under the AEA or 
Executive Order 12958 for, as an example, classified NNPI. The use of 
"NNPI" is an additional marking applied to some of the previously 
defined categories of information to indicate additional controls for 
protection or access. 

Classified Naval Nuclear Propulsion Information(C-NNPI)I): 

Classified under the authority of the AEA of 1954, as amended, or 
Executive Order 12958, as amended. 

All classified information concerning the design, arrangement, 
development, manufacture, testing, operation, administration, training, 
maintenance, and repair of propulsion plants of naval nuclear powered 
ships and prototypes, including associated shipboard and shore- based 
nuclear support facilities. 

Markings can be RD or NSI. 

* C-NNPI documents containing RD information are marked TSRD, SRD, or 
CRD. 

* C-NNPI NSI documents are typically marked Secret NOFORN ("not 
releasable to foreign nationals"), or Confidential NOFORN. The NOFORN 
marking is used to indicate documents that should not be released to 
foreign entities. 

Note: There is no Top Secret NOFORN in the current Naval Reactors 
classification guidance. 

Documents containing information classified under the authority of the 
AEA are not portion marked. 

Unclassified Naval]nuclear Propulsion Information (U-NNPI)I): 

Controlled in accordance with Naval Sea Systems Command Instruction 
C5511.32B and protected pursuant to export control requirements and 
statutes. 

All unclassified but controlled information concerning the design, 
arrangement, development, manufacture, testing, operation, 
administration, training, maintenance, and repair of propulsion plants 
of naval nuclear powered ships and prototypes, including associated 
shipboard and shore-based nuclear support facilities.[Footnote 30] 

U-NNPI documents will be marked and controlled as NOFORN (not 
releasable to foreign nationals). 

[End of section] 

Appendix II: Comments from the Department of Energy: 

Department of Energy: 
Washington, DC 20585: 

June 15, 2006: 

Mr. Gene Aloise: 
Director: 
Natural Resources and Environment: 
United States Government Accountability Office: 
Washington, D.C. 20548: 

Dear Mr. Aloise: 

The Department of Energy (DOE) has completed its review of the 
Government Accountability Office (GAO) draft report GAO-06-785, 
Managing Sensitive Information: Actions Needed to Ensure Recent Changes 
in DOE Oversight Do Not Weaken an Effective Classification System. The 
DOE is pleased that the classification program is recognized as one of 
the best in the Federal Government. As noted in your draft report, the 
DOE's systematic training, comprehensive guidance, and rigorous 
oversight ensure that our program is effective in protecting 
information vital to the national security. 

While the DOE agrees with the three recommendations made in the report, 
we would like the opportunity to address the first one concerning the 
uncertainty of continued classification oversight of DOE sites. Despite 
the recent shift in responsibility to the Office of Security 
Evaluations, the classification oversight program has maintained a high 
level of performance, both in quantity and quality. 

Since the Classification and Information Control oversight program was 
transferred to the Office of Security Evaluations, six organizations 
have been inspected and eight more are scheduled for inspection in 
2006. These eight remaining inspections have been formally announced 
and placed on the schedule. Additionally, six of the eight 
organizations are not Category I sites and will be evaluated by the 
Classification and Information Control team only. This schedule 
demonstrates that the oversight program under the Office of Security 
Evaluations maintains the flexibility to conduct oversight inspections 
separate from the much larger physical security inspections that focus 
on Category I sites. This scheduling flexibility ensures that all sites 
with classification activities are evaluated on a periodic basis and 
reinforces our view that classification oversight remains a priority 
within the DOE. 

Further, the DOE is committed to retaining the depth of analysis and 
comprehensive approach to the classification oversight program. One 
indicator of our commitment, included in the report, is the 
continuation of the data call that was used previously, which collects 
detailed information for an extensive review of an organization's 
classification program. Another indicator is the continued support of 
experienced oversight personnel from the Office of Classification, 
which ensures continuity of inspection methods and procedures. 

The DOE has retained the effective framework previously established by 
the Office of Classification. We continue to improve the appraisal 
protocols through constant and rigorous assessment of procedures and 
adaptation of better, more efficient methods. The DOE is committed to 
ensuring that the classification oversight program remains effective 
and one of the best in the Government. 

Sincerely, 

Signed by: 

Glenn S. Podonsky: 
Director: 
Office of Security and Safety Performance Assurance: 

cc: M. Kilpatrick, SP-1: 
L. Gasperow, SP-1.2: 
J. Hawthorne, SP-50: 
A. Weston-Dawkes, SP-50: 
D. Williams, CF-1.2: 

DOE Response to GAO Draft Report: Managing Sensitive Information: 

Actions Needed to Ensure Recent Changes in DOE Oversight Do Not Weaken 
an Effective Classification System (GAO-06-785): 

In summary, the DOE finds the draft report to be a fair and accurate 
evaluation of its classification system. The DOE plans the following 
specific actions related to recommendations in the draft report: 

Recommendation 1. We recommend that the Secretary of Energy ensure that 
the classified information oversight program provides oversight to a 
similar number of DOE sites as it did before October 2005, and provides 
a similar depth of analysis. 

DOE Response. The DOE has already inspected six organizations and has 
formally announced plans to inspect eight other organizations in 2006. 
This schedule demonstrates that the pace in oversight has not slowed 
and that classification oversight remains a high priority for the DOE. 

Additionally, the DOE is committed to maintaining the depth of analysis 
in the classification oversight program by adhering to the successful 
framework developed before October 2005. Effective methods such as the 
pre-inspection data call and the inclusion of classification experts on 
the inspection team are still being used to ensure a comprehensive 
approach. Appraisal methods are continuously evaluated for improvement. 

Recommendation 2. We recommend that the Secretary of Energy strengthen 
the review of classified documents by applying selection procedures 
that more randomly identify documents for review. 

DOE Response. The DOE plans to revise the selection process for 
document reviews during oversight inspections. 

In the past year we have developed a standard procedure for selecting 
documents for review during oversight inspections. We based our 
selection criteria on factors such as (1) location, volume, and 
sensitivity of record collections; (2) security incident reports 
involving document review errors; and (3) document review results from 
previous inspections. 

In addition, we are currently evaluating different sampling methods in 
order to ensure that the document selection process we adopt is 
consistent and effective and focuses on criteria that will yield 
random, statistically valid samples for our document review team to 
inspect. 

Recommendation 3. We recommend that the Secretary of Energy disclose 
the selection procedures used for documents for review in future 
classification inspection reports. 

DOE Response. The DOE plans to include the procedures used to select 
the documents reviewed during oversight inspections in future 
classification inspection reports. 

[End of section] 

Appendix III: GAO Contact and Staff Acknowledgments: 

Staff Acknowledgments: 

In addition, Nancy Crothers, Robin Eddington, Doreen Feldman, William 
Lanouette, Greg Marchand, Terry Richardson, Kevin Tarmann, and Ned 
Woodward made significant contributions to this report. 

Footnotes: 

[1] We issued a report on the management of sensitive but unclassified 
information at the Departments of Energy and Defense. See GAO, Managing 
Sensitive Information: Departments of Energy and Defense Policies and 
Oversight Could Be Improved, GAO-06-369 (Washington, D.C.: Mar. 7, 
2006). We also issued a report on the status of the federal 
government's policies and processes to share classified and sensitive 
but unclassified terrorism-related information. See GAO, Information 
Sharing: The Federal Government Needs to Establish Policies and 
Processes for Sharing Terrorism-Related and Sensitive but Unclassified 
Information, GAO-06-385 (Washington, D.C.: Mar. 17, 2006). We are also 
issuing a report on the Department of Defense's management of 
classified information. See GAO, Managing Sensitive Information: DOD 
Can More Effectively Reduce the Risk of Classification Errors, GAO-06-
706 (Washington, D.C.: June 30, 2006). 

[2] See 9/11 Commission Report, National Commission on Terrorist 
Attacks Upon the United States, July 2004, available at http://www.9- 
11commission.gov/. 

[3] We included National Nuclear Security Administration (NNSA) sites 
in our review because much of DOE's classification activity occurs in 
NNSA. NNSA is a separately organized agency within DOE responsible for 
the management and security of the nation's nuclear weapons, 
nonproliferation, and naval reactor programs. 

[4] In Executive Order 12958, as amended, "national security" means the 
national defense or foreign relations of the United States. In 
addition, the U.S. government also designates some information as 
"controlled." Controlled information is restricted from unauthorized 
disclosure. According to DOE officials, although it is less sensitive 
than classified information, it may be shared with people lacking 
security clearances provided officials determine they have a "need to 
know." There are four categories of controlled information at the DOE: 
(1) Unclassified Controlled Nuclear Information (UCNI), (2) 
Unclassified Naval Nuclear Propulsion Information (U-NNPI), (3) 
Official Use Only (OUO), and (4) Other Agency Controlled Information. 
For information about UCNI and U-NNPI, please see appendix I of this 
report. For information about DOE's management of OUO, see GAO-06-369. 

[5] Executive Order 12958 was amended most recently by Executive Order 
13292 on March 25, 2003. 

[6] Pub. L. No. 79-585, 60 Stat. 755 (1946). 

[7] The term "Formerly" means that the information is no longer 
classified as "Restricted Data," not that it is no longer classified. 
This determination is made jointly by DOE and the Department of Defense 
(DOD) when they conclude that the information is primarily operational 
in nature and can be adequately safeguarded as defense information. 

[8] Unclassified NNPI is less sensitive than classified NNPI and must 
be protected in accordance with Navy regulations and under various 
export control requirements and statutes. 

[9] The Atomic Energy Act does not require portion marking on any 
documents containing RD or FRD information. DOE M 475.1-1A at VI-4,5, 
Identifying Classified Information, discourages portion marking of any 
documents containing RD or FRD information, even if the document also 
contains NSI, which would otherwise require it. 

[10] Executive Order 12958, as amended, defines "declassification" as 
the authorized change in the status of information from classified to 
unclassified. 

[11] While there is no specified time period for declassification of RD 
and FRD, DOE policy requires such information to be reviewed 
"continuously" to determine whether it may be removed from these 
categories, and DOE must review this information upon request. See DOE 
M 475.1-1A, IV-1--IV-4. 

[12] DOE M 475.1-1A, Identifying Classified Information, approved May 
8, 1998. DOE officials expect a revised and updated order, DOE M 475.1- 
1B to be promulgated in July 2006. 

[13] Executive Order 12958, as amended, defines "source document" as 
"an existing document that contains classified information that is 
incorporated, paraphrased, or generated in new form into a new 
document." 

[14] DOE policy states that a source document can only be used to 
classify information as NSI when it is entirely under the purview of 
another U.S. government agency, a foreign government, or an 
international organization and no guidance exists. 

[15] As previously discussed, source documents may also be used for 
documents containing classified NSI so long as they are under the 
purview of another agency and no other guidance is available. 

[16] In DOE, original classifiers are authorized to classify as NSI 
previously unclassified information. The original classification of 
information as RD or FRD is determined by regulations based on the 
Atomic Energy Act. Decisions to classify information as RD or FRD must 
also be approved by top managers in DOE's Office of Security and Safety 
Performance Assurance. 

[17] The Information Security Oversight Office is responsible for 
policy and oversight of information classified under the authority of 
Executive Order 12958, as amended, as NSI. 

[18] The Information Security Oversight Office does not have the 
authority to evaluate how DOE manages RD or FRD--information classified 
under the authority of the Atomic Energy Act. Although only about one- 
quarter of DOE classification decisions concerned NSI in 2005, the 
policies and procedures governing the management of RD and FRD are 
essentially the same. 

[19] These five sites include the Pantex Site, which has already been 
completed; the Savannah River Site, which is ongoing; Argonne National 
Laboratory, the Hanford Reservation, and Los Alamos National 
Laboratory. 

[20] DOE's document reviews are useful, but because DOE does not have a 
complete inventory of its classified documents, it cannot select a 
strictly random sample, and thus its findings are not generalizable. 

[21] At Los Alamos, by agreement between laboratory officials and the 
Office of Classification review team, inspectors did not request the 
two most sensitive types of documents: those detailing how nuclear 
weapons can be controlled and detonated. 

[22] GAO, Standards for Internal Control in the Federal Government, 
GAO/AIMD-00-21.3.1 (Washington, D.C.: November 1999). This publication 
is supplemented by Internal Control Management and Evaluation Tool, GAO-
01-1008G (Washington, D.C.: August 2001). 

[23] See 42 U.S.C. § 2014(y). 

[24] See DOE M 475.1-1A. 

[25] Categorizing information as "Formerly Restricted Data" may be 
confusing because it implies to some that the information is no longer 
restricted or classified. It is "Formerly Restricted Data" in the 
literal sense: it is still-classified information that was formerly 
"Restricted Data." 

[26] See U.S.C. § 2162(d). 

[27] See DOE M 475.1-1A. 

[28] See 42 U.S.C. § 2168. 

[29] Official Use Only information is the subject of another GAO 
report; see GAO-06-369. 

[30] See DOE M 470.4-4. 

GAO's Mission: 

The Government Accountability Office, the investigative arm of 
Congress, exists to support Congress in meeting its constitutional 
responsibilities and to help improve the performance and accountability 
of the federal government for the American people. GAO examines the use 
of public funds; evaluates federal programs and policies; and provides 
analyses, recommendations, and other assistance to help Congress make 
informed oversight, policy, and funding decisions. GAO's commitment to 
good government is reflected in its core values of accountability, 
integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through the Internet. GAO's Web site ( www.gao.gov ) contains 
abstracts and full-text files of current reports and testimony and an 
expanding archive of older products. The Web site features a search 
engine to help you locate documents using key words and phrases. You 
can print these documents in their entirety, including charts and other 
graphics. 

Each day, GAO issues a list of newly released reports, testimony, and 
correspondence. GAO posts this list, known as "Today's Reports," on its 
Web site daily. The list contains links to the full-text document 
files. To have GAO e-mail this list to you every afternoon, go to 
www.gao.gov and select "Subscribe to e-mail alerts" under the "Order 
GAO Products" heading. 

Order by Mail or Phone: 

The first copy of each printed report is free. Additional copies are $2 
each. A check or money order should be made out to the Superintendent 
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or 
more copies mailed to a single address are discounted 25 percent. 
Orders should be sent to: 

U.S. Government Accountability Office 

441 G Street NW, Room LM 

Washington, D.C. 20548: 

To order by Phone: 

Voice: (202) 512-6000: 

TDD: (202) 512-2537: 

Fax: (202) 512-6061: 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: www.gao.gov/fraudnet/fraudnet.htm 

E-mail: fraudnet@gao.gov 

Automated answering system: (800) 424-5454 or (202) 512-7470: 

Public Affairs: 

Jeff Nelligan, managing director, 

NelliganJ@gao.gov 

(202) 512-4800 

U.S. Government Accountability Office, 

441 G Street NW, Room 7149 

Washington, D.C. 20548: