10.07.2015 Views

r380-14

r380-14

r380-14

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

R 380-<strong>14</strong>TABLE OF CONTENTS (Continued)PARAGRAPHPAGEImproperly classified USCENTCOM documents 4-6 4-3Prohibitions 4-7 4-3Chapter 5 – DERIVATIVE CLASSIFICATION 5-1Description 5-1 5-1Policy 5-2 5-1Individual Responsibility 5-3 5-1Other Classification Guides 5-4 5-2Chapter 6 – MARKING CLASSIFIED INFORMATION 6-1Overall Classification 6-1 6-1Source of Classification 6-2 6-1Declassification Instructions 6-3 6-4Marking in the Electronic Environment 6-4 6-4Additional Markings 6-5 6-7Chapter 7 – DECLASSIFICATION AND DOWNGRADING 7-1Description 7-1 7-1Policy 7-2 7-1Declassification Exemption 7-3 7-1Downgrading 7-4 7-2Downgrading or Declassification Earlier Than Scheduled 7-5 7-3Chapter 8 – PROPONENT ` 8-1Summary of Changes 8-1 8-1APPENDICESPAGEAPPENDIX AManpower, Personnel and Administration (CCJ1) A-1APPENDIX BIntelligence and Security(CCJ2-JICCENT) B-1APPENDIX CSecurity (CCJ2-SSO) C-1APPENDIX DSouth East Regional Service Center (CCJ2-SE-RSC) D-1APPENDIX ECounterintelligence/Human Intelligence (CCJ2-X) E-1APPENDIX FOperations (CCJ3-C) F-1APPENDIX Gii


R 380-<strong>14</strong>APPENDICES (Continued)PAGEOperations (CCJ3-IO) G-1APPENDIX HOperations (CCJ3-IAG) H-1APPENDIX IOperations (CCJ3-O) I-1APPENDIX JStrategic Deployment (CCJ3-S) J-1APPENDIX KLogistics and Engineering (CCJ4) K-1APPENDIX LStrategy, Plans and Policy (CCJ5) L-1APPENDIX MDeliberate War Plans (CCJ5-P) M-1APPENDIX NCommand & Control, Communications, Computers Systems (CCJ6) N-1APPENDIX OExercise & Training (CCJ7) O-1APPENDIX PAnalysis & Requirements (CCJ8-AR) P-1APPENDIX QScientific Advisor (CCJ8-ST) Q-1APPENDIX RCommand Group (CCCC) R-1APPENDIX SCENTCOM Deputy Commander Theater Travel Coordination Cell S-1APPENDIX TCommunication Integration (CCCI) T-1APPENDIX UProvost Marshal (JSD) U-1APPENDIX VElectronic Sweeps V-1APPENDIX WEquivalent Foreign Security Classifications W-1iii


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKiv


R 380-<strong>14</strong>CHAPTER 1GENERAL1-1. PURPOSE. This guide establishes the basic policies for proper marking, classification,downgrading, and declassification of information related to the operations, facilities,communications, data collection and processing, warning, and other information pertaining toUnited States Central Command (USCENTCOM), its components and units assigned to oroperating in the USCENTCOM Area of Responsibility (AOR).1-2. APPLICABILITY. This guide applies to Headquarters, USCENTCOM, its components,and those government agencies (civilian contractors and personnel) involved in the activities ofUSCENTCOM, and any units or subordinate commands operating in the USCENTCOM AOR.1-3. AUTHORITY. The Original Classification Authority (OCA) for this guide is Commander,USCENTCOM. This classification guide reflects changes required by Executive Order (EO)13526 dated 29 December 2009, Classified National Security Information”, the InformationSecurity Oversight Office (ISOO) Implementing Directive (32 CFR Parts 2001 and 2003),subsequent ISOO Notices, Intelligence Community Directive (ICD) 710 Classification andControl Markings System dated 11 September 2009, ICD 208 Writing for Maximum Utilitydated 17 December 2008, the Controlled Access Program Coordination Office‟s (CAPCO)Authorized Classification and Control Markings Register dated 31 May 2011, and the CAPCOIntelligence Community Classification and Control Markings Implementation Manual dated 31May 2011; and Department of Defense (DoD) Regulation 5200.1-R, Information SecurityProgram, January 1997. Changes in classification markings are required in accordance with EO13526 and ICD 710, Classification and Control Markings System which are implementedthrough the Director of National Intelligence‟s CAPCO Authorized Classification and ControlClassification Markings Register and the CAPCO Intelligence Community Classification andControl Markings Implementation Manual. The classification authority for information coveredunder this guide shall be cited as shown below, along with the appropriate declassificationinstructions.Classified By: Joe Carver, DirectorDerived From: Department of Good Works SCG dated June 27, 2010Declassify On: 20151231(This date is dependent upon the guidance found in appendices A-V ofthis guide)1-4. OFFICE OF PRIMARY RESPONSIBILITY (OPR). The USCENTCOM Special SecurityOffice (SSO) issues this guide. Address inquiries concerning content and interpretation, as wellas any recommendations for changes to:USCENTCOM Special Security Office7115 South Boundary BlvdMacDill AFB, FL 33621-51011-5. INDIVIDUAL RESPONSIBIITIES. Individuals are responsible for ensuring information isproperly protected and classified appropriately. Over classification of information hinders the1-1


R 380-<strong>14</strong>timely sharing of information and mission accomplishment. Originators of information mustensure all documents are properly marked and written for release. Classification and controlrequirements apply to information regardless of the medium (e.g., text, images, graphics, andelectronic documents (including web pages, e-mails, cables disseminated via message-handlingsystems, wikis, and blogs). Portion markings shall be used on all classified information unless awaiver has been obtained in accordance with guidance from the ISOO; heads of IntelligenceCommunity elements may submit requests for waivers to markings, formats, or authorizedabbreviations in writing to CAPCO for Director of ODNI/ONCIX/SEC/SSD consideration.Classified information must have: (1) The highest classification level of information containedin the document and applicable control markings on the top and bottom (header and footer;banner line) of each page or slide; (2) classification portion marks; (3) the classification authorityblock; and (4) Date of origin of the document. Originators shall include a point of contact andcontact instructions at the end of all classified products to expedite decisions on informationsharing. Unclassified information with control markings must have: (1) The highestclassification level of information contained in the document and applicable control markings onthe top and bottom (header and footer; banner line) of each page or slide and (2) classificationportion marks.1-6. CLASSIFICATION CHALLENGES. If at any time, any of the security classificationguidance undergoes a challenge, the items of information shall continue to be protected at thelevel prescribed by this guide until an OCA has made a final determination. Requestors ofinformation and authorized holders of information shall seek to resolve issues at the lowestpossible level. Classification challenges should follow the procedures provided in Section 1.8 ofEO 13526, as well as implementing procedures established in accordance with this ExecutiveOrder and Director of National Intelligence (DNI) guidance.1-2


R 380-<strong>14</strong>CHAPTER 2TYPES OF INFORMATION2-1. U.S. classification markings (TOP SECRET, SECRET, CONFIDENTIAL) are used in theheader and footer (top and bottom) of each page and each product. The classification must bespelled out in full and may not be abbreviated in the banner line. A product may have only oneclassification on the top and bottom. FOR OFFICIAL USE ONLY (FOUO). FOUO isunclassified DoD information that has not been given a security classification pursuant to thecriteria of EO 13526, but which may be withheld from the public because disclosure would causea foreseeable harm to an interest protected by one or more Freedom of Information Act (FOIA)Exemptions in DoD 5400.7-R. No other material shall be considered FOUO. Unclassifiedinformation with control markings such as FOUO must have: (1) The highest classification levelof information contained in the document and applicable control markings on the top and bottom(header and footer; banner line) of each page or slide and (2) classification portion marks.2-2. CLASSIFIED INFORMATION. Classified information is information that has beendetermined by an OCA or through derivative classification to pose a risk to national security ifnot protected properly. The United States (U.S.) government recognizes three levels ofclassification.a. TOP SECRET - Assigned when the unauthorized disclosure could reasonably be expectedto cause exceptionally grave damage to the national security that the OCA is able to describe.b. SECRET - Assigned when the unauthorized disclosure could reasonably be expected tocause serious damage to the national security that the OCA is able to describe.c. CONFIDENTIAL - Assigned when the unauthorized disclosure could reasonably beexpected to cause damage to the national security that the OCA is able to describe.2-3. SENSITIVE COMPARTMENTED INFORMATION (SCI). SCI is information andmaterials requiring special community controls indicating restricted handling within present andfuture community intelligence collection programs and their end products. These specialcommunity controls are formal systems of restricted access established to protect the sensitiveaspects of sources, methods and analytical procedures of foreign intelligence programs. TheChief, SSO is the office responsible for indoctrination in SCI and ensuring compliance with allapplicable regulations and directives.2-4. SPECIAL ACCESS PROGRAM (SAP) INFORMATION. SAP involves activities that fallwithin the statutory authority and responsibility of the DNI. Within these provisions, only thoseprograms that require, as a condition of access, the signing of a nondisclosure statement areconsidered SAPs. SAPs are given the status of SCI compartments and sub compartments interms of the minimum required security levels necessary for their protection. WithinUSCENTCOM the Director of Operations is responsible for the administration andindoctrination of personnel deemed eligible.2-1


R 380-<strong>14</strong>2-5. NORTH ATLANTIC TREATY ORGANIZATION (NATO) AND FOREIGNGOVERNMENT INFORMATION (FGI)a. NATO Information. NATO classified information will be safeguarded in accordance with(IAW) U.S. Security Authority for NATO Instruction I-69. USCENTCOM Command &Control, Communications & Computer Systems Directorate (CCJ6) is responsible for ensuringcompliance with network handling instructions for NATO material. SSO will indoctrinate thosepersonnel requiring NATO access.b. FGI. Under E.O. 13526, and ISOO Implementing Directive (32 CFR Parts 2001 and2003), Foreign Government Information is defined as (1) Information provided to the U.S.government by a foreign government or governments, an international organization ofgovernments, or any element thereof, with the expectation that the information, the source of theinformation, or both, are to be held in confidence; or (2) Information produced by the U.S.pursuant to or as a result of a joint arrangement with a foreign government or governments, aninternational organization of governments, or any element thereof, with the expectation that theinformation, the arrangement, or both, are to be held in confidence; or (3) Information receivedand treated as “Foreign Government Information” under the terms of a predecessor order.During the course of exercises and operations, USCENTCOM receives information from foreigngovernments. This material is required to be protected at the equivalent level of U.S.classification. U.S. personnel receiving FGI must be cleared to the appropriate level of theinformation received. FGI markings are used on U.S. products to denote the presence of foreignownedor foreign-produced information in both the portion markings and on the top and bottomof the page or product. Use FGI plus the trigraphic country codes listed in ISO 3166 or thetetragraphic codes for international organizations or groups of countries as listed in the CAPCORegister APPENDIX A and APPENDIX B, unless the very fact that the information is derivedfrom a foreign government must be concealed. Documents containing FGI shall keep the FGIsegregated from U.S. classified portions. Release or disclosure of FGI back to the sourcecountry is not implied and must be approved by the responsible agency. Documents containingFGI from more than one country and/or international organization shall keep the FGI from eachindividual country or international organization segregated in separate portions. The release ordisclosure of FGI to any third-country entity must have the prior consent of the originatinggovernment if required by a treaty, agreement, bilateral exchange, or other obligation. (See theISOO Directive 32 CFR 2001.23D-E and the CAPCO Implementation Manual for markingguidance.) Unclassified FGI is withheld from public release until approved for release by thesource country.2-6. FOCAL POINT INFORMATION. Focal Point Information is a Joint Chiefs of Staffprogram. The system uses unique code words to Protect Operationally Sensitive Information andalert responsible personnel to deliver the traffic to specifically authorized personnel only. EachFocal Point Program has its own Security Classification Guide that has been specifically writtento provide unique guidance on handling, storage and disclosure of the information. CCR 380-<strong>14</strong>is not the final authority for ACCM information; personnel needing access to or having questionsconcerning Focal Point should contact CCJ3 for indoctrination.2-2


R 380-<strong>14</strong>2-7. CRITICAL NUCLEAR WEAPON DESIGN INFORMATION (CNWDI). TheUSCENTCOM SSO is responsible for indoctrination of personnel in CNWDI. These personnelmust have a need to know, verified by an O-6 or above and have a final SECRET or TOPSECRET clearance.2-8. OPERATIONS SECURITY (OPSEC) INFORMATION. OPSEC is governed byUSCENTCOM Regulation (CCR) 530-1, Operations Security; Joint Pub (JP) 3-13.3, JointDoctrine for Operations Security and Chairman of the Joint Chiefs of Staff Instruction (CJCSI)3213.01C; Joint Operations Security. CCJ3 is the CENTCOM OPR for OPSEC. OPSEC is theprocess of identifying and analyzing critical information pertinent to the military operation oractivity and executing measures to eliminate or reduce vulnerabilities to a manageable level.OPSEC indicators result from friendly detectable actions or from open-source information.OPSEC generally is NOT classified but is a program designed to minimize indicators.2-9. JOPES TPFDD INFORMATION. The Joint Operations Planning and Execution System(JOPES) is designated as SECRET.a. Access to JOPES is limited to authorized U.S. personnel only possessing a FINALSECRET clearance. Access to JOPES by coalition personnel is not authorized. The release ofcertain JOPES TPFDD information is permitted as approved by CCJ3 and coordinated withCCJ3-S and the command foreign disclosure office (CCJ2-FDO).b. Release of JOPES force movement information must be coordinated with CCJ3-S, the OPRfor JOPES at USCENTCOM as well as CCJ2-FDO.c. Although individual data elements by themselves may not be classified, the data inaggregation could portray the scope of operations, force deployments, location centers, etc.d. JOPES information is SECRET but certain data elements may be declassified for purposesof transportation planning upon execution; the data elements which may be declassified arelimited to those data elements specifically required to schedule airlift, sealift, or groundmovement as appropriate.e. JOPES classification guidance is governed by existing CJCSI 3122 Series, JOPES VolumesI-III and applies to all Contingency Planning, Crisis Action Planning, and Exercise TPFDDssupporting USCENTCOM2-3


R 380-<strong>14</strong>.THIS PAGE INTENTIONALLY LEFT BLANK2-4


R 380-<strong>14</strong>other government agencies. The FDO is the designated office for coordinating release of otheragencies' information to foreign partners and/or international organizations.3-5. LIMITATIONS ON RELEASE. The following information may not be released orauthorized for release:a. Classified information on the recipient country or its territories, with certain exceptionscontained in Director of Central Intelligence Directive (DCID) 6/7.b. Classified information which would:(1) Jeopardize current or future intelligence sources or methods.(2) Jeopardize existing or planned intelligence activity, or the safety, welfare, or reputationof individuals connected therewith.(3) Be used to damage U.S. relations with friendly or allied countries.(4) Be used for propaganda purposes.(5) Jeopardize counterintelligence operations.(6) Reasonably be expected to be acquired by hostile countries.c. Classified information obtained from another government without its consent.d. Classified information that could be harmful or prejudicial to the national security, foreignpolicy, or intelligence interests of the U.S.e. Classified information, the release of which would be contrary to U.S. federal legislation orto agreements or treaties between the U.S. and foreign nations.f. Classified information, not publicly available, on a U.S. person, unless authorized by EO13526.3-2


R 380-<strong>14</strong>CHAPTER 4ORIGINAL CLASSIFICATION AUTHORITY4-1. DESCRIPTION. Original classification is the initial decision that information produced byUSCENTCOM could be expected to cause damage to national security if subjected tounauthorized disclosure, and the interests of national security are best served by applying thesafeguards of EO 13526 to protect it. This decision may be made only by persons who havebeen specifically delegated the authority to do so and have received training in the exercise ofthis authority. The training must be documented and maintained in the Security Manager Booklocated with the USCENTCOM SSO.4-2. POLICY. IAW Secretary of Defense (SecDef) Memorandum, 13 November 95, Delegationof Original Classification Authority, the Commander, USCENTCOM (CDR), DeputyCommander (DCDR) and USCENTCOM Chief of Staff (COS) are delegated Top Secret OCAIAW EO 13526.4-3. DELEGATION OF AUTHORITY. The Under Secretary of Defense for Intelligence,USD(I) is the delegation authority for SECRET OCA for USCENTCOM. This authority maynot be further delegated.4-4. TRAINING. Persons who have been delegated originalclassification authority must receive a briefing and training annually on their duties as an OCAfrom the SSO.4-5. PROCESS. Original classification decisions made by USCENTCOM OCAs are limited toinformation produced by or for USCENTCOM or its activities. When making a decision toclassify information, the designated USCENTCOM original classification authority shallpersonally review the information to:a. Determine that the information is owned by, produced by, produced for, or is under thecontrol of USCENTCOM.b. IAW EO 13526, determine that the information falls within one or more of the categoriesof information listed below:(1) Military plans, weapon systems, or operations.(2) Foreign government information.(3) Intelligence activities (including special activities), intelligence sources or methods, orcryptology.(4) Foreign relations or foreign activities of the U.S., including confidential sources.(5) Scientific, technological, or economic matters relating to national security.4-1


R 380-<strong>14</strong>(6) U.S. Government programs for safeguarding nuclear materials or facilities.(7) Vulnerabilities or capabilities of systems, installations, projects or plans relating tonational security.c. Determine that, if classification is applied or reapplied, there is a reasonable possibility thatthe information can be provided protection from unauthorized disclosure.d. Determine that the unauthorized disclosure of the information could reasonably beexpected to cause damage to the national security of the U.S., and that the damage can beidentified or described. NOTE: USCENTCOM regularly must justify(identify or describe) why documents have been classified. SSO and ISB will assist OCAs inpreparing the justification.e. Determine which level of classification is to be applied.(1) Apply TOP SECRET classification to information when its unauthorized disclosure isexpected to cause exceptionally grave damage to national security the original classificationauthority personally is able to identify or describe. Only the Commander, Deputy Commanderor COS can make the decision to classify USCENTCOM information as TOP SECRET.(2) Apply SECRET to information for which the unauthorized disclosure expected to causeserious damage to national security that the original classification authority is personally able toidentify or describe. The decision to classify USCENTCOM information SECRET can be madeonly by those officials designated in paragraph 4-3 of this regulation and only in those areas ofexpertise for the OCA.(3) Apply CONFIDENTIAL to information for which the unauthorized disclosurereasonably could be expected to cause damage to the national security that the originalclassification authority is personally able to identify or describe. The decision to classifyUSCENTCOM information CONFIDENTIAL may be made only by those officials designatedin paragraph 4-3 of this regulation and only in those areas of expertise for the OCA.f. Ensure the document is marked properly (see Chapter 6)and includes the classificationauthority block on the face (first page) of each document or other media to indicate the name ofthe person and office symbol who classified the document; the authority (if classified by anOCA, after “Reason” list the section of an Executive Order or if derivatively classified, after“Derived from” list the classification guide title, number and date or if from source, theoriginating agency, serial number and date of the classified source product) for the classificationdetermination, and after the declassification instructions:(1) CLASSIFIED BY: the identification by name or personal identifier and position title ofthe OCA, the agency, and the office of origin(2) CLASSIFICATION REASON: the concise reason for classification that, at aminimum, cites one of the classification categories listed in Section 1.4 of E.O. 135264-2


R 380-<strong>14</strong>(3) DECLASSIFY ON: the duration of the original classification decision, specified as thedate or event that corresponds to the lapse of the information‟s national security sensitivity.Valid declassification values include (a) a date of no more than 25 years from the originalclassification decision or the information‟s origin. The following format must be used:YYYMMDD; (ban event. Events must be reasonably definite and foreseeable; (c) an exemptioncategory of 50X1-HUM or 50X2-WMD or am ISOO-approved designator reflecting the ISCAPapproval for classification beyond 50 years. The “50X1-HUM” marking is used when theinformation clearly and demonstrably could reveal a confidential human source or a humanintelligence source. With the implementation of E.O. 13526, and for the purposes of reusing orcreating new classified documents, “50X1-HUM” replaces “25X1-human” which is no longer anauthorized declassification instruction. “25X1-human” must be removed from all automatedmarking systems. As stated in section 1.5(d) of E.O. 13526, no information may remainclassified indefinitely; therefore, information marked as “25X1-human” will be subject toautomatic declassification. Since the “25X1-human” marking will continue to be found onoriginally and derivatively classified documents for many years, it will be treated as having thesame classification duration as “50X1-HUM,” and that information is not subject to automaticdeclassification for up to 75 years.* The “50X2-WMD” marked is used when the informationclearly and demonstrably could reveal key design concepts of weapons of mass destruction; (d)25X1, EO 12951 (Note: Per DNI Memo E/S 00400, dated 26 May 2010, value replaces the“DCI Only: and “DNI Only” markings.) The DNI prescribed the “25X1, EO 12951” markingfor use on information described in EO 12951, Release of Imagery Acquired by Space-BasedNational Intelligence Reconnaissance Systems and previously marked with DNI Only or DCIOnly; (e) An exemption category of 25X, date or event “ (where “#” is a number from 1 to 9) ;(f) An exemption category of 50X, date or event “ (where “#” is a number from 1 to 9); and (g)An exemption category of 75X, date or event “ (where “#” is a number from 1 to 9). [Approvedexemption codes are in ISOO Implementing Directive (32 CFR Parts 2001 and 2003).].(4) Date of origin of the document4-6. IMPROPERLY CLASSIFIED USCENTCOM DOCUMENTS. Due to the sheer volume ofinformation and documents that USCENTCOM produces, documents will at times be improperlymarked or classified. During FOIA requests or during court proceedings documents could berequested that an OCA must first do a determination of classification. When determining adocument warrants classification, an OCA will issue a memorandum that properly classifies (ordeclassifies) the document(s). See Figure 4-1.4-7. PROHIBITIONS. Anyone who fraudulently applies the name of an OCA as theclassification authority to a document the OCA did not personally review and approve is subjectto administrative sanctions such as loss of access or suspension of clearance.4-3


R 380-<strong>14</strong>Figure 4-1Classification Memorandum4-4


R 380-<strong>14</strong>CHAPTER 5DERIVATIVE CLASSIFICATION5-1. DESCRIPTION. Most classified documents produced within USCENTCOM are the resultof derivative classification. Derivative classification is the act of incorporating, paraphrasing,restating, or generating in a new form any formation that is already determined to be classifiedby an OCA in a source document, classification guide, or other OCA guidance document. Theapplication of classification markings and declassification instructions to a document or othermaterial as directed by a security classification guide, security classification memorandum, asource document, or other source material is derivative classification. Under no circumstanceswill such information be cited as originally classified by an USCENTCOM classificationauthority.5-2. POLICY. USCENTCOM regulation 380-<strong>14</strong> is the Security Classification Guide (SCG).Any products derived from other agency documents will list that agency‟s document or in theuse of more than one document, an addendum will accompany the USCENTCOM product listingALL products used and their classification. Activity security managers will ensure all personnelderivatively classifying documents have been properly trained.5-3. INDIVIDUAL RESPONSIBILITY. All persons performing derivative classification will:a. Observe and respect the original classification decision unless superseded by OCAguidance, and carry forward to any newly created document the pertinent classification markingsfrom the source document(s), classification guide(s), or other applicable OCA guidance. Do not„downgrade‟ the information to ensure releaseability. Personnel will refer any requests toregrade the material to the originating agency or individual.b. Apply classification markings, declassification instructions, warning messages, or othermeans of identification to the derivatively classified material (see Chapter 6). When derivativelyclassifying from more than one classified source, use the highest level of classification and allthe caveats in accordance with the CAPCO guide on the top and bottom of the document or othermedia in order to afford the information the greatest degree of protection; include all the warningmessages from among the sources on the face (first page) of the document or media.c. Use only authorized sources of instructions about the classification of the information inquestion. Authorized sources of instructions about classification are security classificationguides, other forms of classification guidance, and markings on material from which theinformation is extracted.d. Include a list of all documents or sources used in the derivative classification appended tothe last page.e. Ensure the document is marked properly (see Chapter 6) and includes the date of origin andthe classification authority block on the face (first page) of each document or other media toindicate the name of the person and office symbol who derivatively classified the document; theauthority (after “Derived from” list the classification guide and date or the serial and the agency,5-1


R 380-<strong>14</strong>serial number and date of the classified source product) for the classification determination, andafter the declassification instructions:(1) CLASSIFIED BY: the identification by name and office symbol of the derivativeclassifier(2) (U) DERIVED FROM:(If the information classified under the classification guide is the only classified informationcontained in a document), Classification guide title and number, date published. For example,DERIVED FROM: USCENTCOM Security Classification Guide, CCR380-<strong>14</strong>; date publishedor(If derived from one classified source or classification guide) Agency, serial number, date ofclassified source. For example,DERIVED FROM: DIA, 12123434-11, 31 October 2011or(If derived from more than one source) Multiple Sources. For example,DERIVED FROM: Multiple SourcesThe author must include all the sources, including the classification in the list of sources.If the classification document is an analytical intelligence product that will be disseminated, allthe sources must be formatted as endnotes in accordance with ICD 206.If the classification document is an analytical intelligence product that will be disseminated, inaccordance with ICD 206, the endnote format for citing this classification guide will be[Endnote number] (U//FOUO) USCENTCOM; CCR380-<strong>14</strong>; date published; USCENTCOMSecurity Classification Guide CCR380-<strong>14</strong> (U//FOUO); page number; overall classification isU//FOUO; CCR 380-<strong>14</strong> is the USCENTCOM Classification Guide that provides guidance onclassifying intelligence data; according to it, the referenced data should be classified list theclassification.(3) DECLASSIFY ON: the duration of the original classification decision, specified as thedate or event that corresponds to the lapse of the information‟s national security sensitivitycarried forward from the source document‟s “Declassify On” line or from the applicableclassification guide. Valid declassification values include: (a) a date up to 25 years from theoriginal classification decision; (b) a specific event within 25 years; (c) an exemption category of50X1-HUM or 50X2-WMD or am ISOO-approved designator reflecting the ISCAP approval forclassification beyond 50 years; (d) 25X1, EO 12951 (prescribed by the DNI for use oninformation described in EO 12951, Release of Imagery Acquired by Space-Based NationalIntelligence Reconnaissance Systems and previously marked with DNI Only or DCI Only); (e)25X1-human (per ISOO, this marking is to be carried over by the derivative classifier until theoriginator has authorized the use of the 50X1-HUM marking; (f) 25X1 to 25X9, with a date orevent; (g) See approved exemption codes in ISOO Implementing Directive (32 CFR Parts 2001and 2003).]; and (h) Absent guidance from an OCA with jurisdiction over the information, acalculated 25-year date from the date of the source information. When the source date cannot bereadily determined, calculate a date 25 years from the current date.5-2


R 380-<strong>14</strong>(4) Date of origin of the documentExample Declassification Blocks:a. ORIGINAL CLASSIFICATION BLOCK:Classified By: John E. Doe, Chief Division 5Reason: 1.4(a)Declassify On: 20151231b. DERIVITIVE CLASSIFICATION BLOCK:Classified By: Joe Carver, DirectorDerived From: Department of Good Works Memorandum dated June 27, 2010, Subj: (U)ExamplesDeclassify On: 201512315-4. OTHER CLASSIFICATION GUIDES. USCENTCOM, as a combatant command, hasmission responsibility for a geographic area designated by the President. Services (U.S. Army,Navy, Air Force and Marines) are force providers. Certain systems fielded by the Services havepublished classification guides. In those instances where declassification or classificationdeterminations are requested, each security guide will be used as it relates to the USCENTCOMmission, area of responsibility (AOR) and the platform (sensors, capabilities, etc.) that areService responsibilities.5-3


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANK5-4


R 380-<strong>14</strong>CHAPTER 6MARKING CLASSIFIED INFORMATION6-1. OVERALL CLASSIFICATION. See Figure 6-1. Every classified document must bemarked to show the highest classification of information it contains. This marking must beconspicuous enough to alert anyone handling the document that it is classified. The overallclassification will be marked, stamped, or affixed (with a sticker, tape, etc.) in letters larger thanthe rest of the text on:a. The front cover, if there is one.b. The title page, if there is one.c. The first page. If the document has no front cover, the first page will be the front page. If ithas a cover, the first page is defined as the first page you see when you open the cover. In somedocuments, the title page and first page may be the same.d. The outside of the back cover, if there is one.6-2. SOURCE OF CLASSIFICATION. Every USCENTCOM document will include thedirectorate and branch that produced the document within the classification line.a. ORIGINAL CLASSIFICATION. Every originally classified document must have a“Classified by” line placed on the face of the document that identifies the original classificationauthority responsible for classification of the information it contains. The original classificationauthority shall be identified by name or personal identifier and position title. Application of thisidentifying data indicates the OCA personally reviewed the document and rendered aclassification decision. See Section 4.b. DERIVATIVE CLASSIFICATION. Persons who apply derivative classification markingsshall be identified by name and position, or by personal identifier, in a manner that isimmediately apparent for each derivative classification action. (32CFR, Part 2001). The firstpage of a derivatively derived document will be marked with a “Classified by” line, “Derivedfrom” line, and a “declassify on” line (See Section 5 and Figure 6-1). Each source documentwith DERIVED FROM: Multiple Sources in the classification authority block, must include alist of all documents or sources used in the derivative classification appended to the last page perE.O. 13526, Section 1.6 and 2.1; ISOO Implementing Directive (32 CFR Parts 2001 and 2003),the CAPCO Implementation Manual, or inserted as endnotes per ICD 206.6-1


R 380-<strong>14</strong>Figure 6-1Derivative Classification Example6-3. DECLASSIFICATION INSTRUCTIONS. Every classified document must be marked onthe face of the document with a "Declassify on" line, with instructions concerning thedeclassification of the information in the document. For originally classified USCENTCOMdocuments, the OCA will choose the date of declassification not to exceed 25 years from date oforigination. When a document or item of material is marked for downgrading or declassificationon a date or event, the holder shall, prior to downgrading, declassification, or removal of6-2


R 380-<strong>14</strong>classification markings, confirm that the OCA(s) for the information has not extended theclassification period. This can be done by reference to a security classification ordeclassification guide or to other appropriate guidance issued by the OCA or by consultationwith the OCA. For derivative documents, use the latest date of declassification of thedocuments. Refer to E.O. 13526, Section 1.6 and 2.1; ISOO Implementing Directive (32 CFRParts 2001 and 2003); the CAPCO Implementation Manual; and DoD 5200.1-R for additionalinstructions.6-4. MARKING IN THE ELECTRONIC ENVIRONMENT. General Guidance. Where specialprovisions for marking some types of computer-generated information are needed, therequirement remains to identify as clearly as possible the information that requires protection andthe level of protection it requires, and to make available either on the item or by other means, theother required information.a. Classified information resident in an electronic environment is subject to all of therequirements of Reference (d) and shall be:b. Marked with the required classification markings to the extent that such markings arepractical, including banner line with overall classification and control markings, portionmarkings, and classification authority block.c. Marked with the required classification markings when appearing in or as part of anelectronic output (e.g. database query) so that users of the information will be alerted to theclassification status of the information.d. Marked in accordance with derivative classification procedures (see paragraph 8.c of thisenclosure), maintaining traceability of classification decisions to the OCA. In cases whereclassified information in an electronic environment cannot be marked in this manner, a warningshall be applied to alert users that the information may NOT be used as a source for derivativeclassification and providing a point of contact and instructions on how to obtain further guidanceon use and classification of the information.e. Prohibited from use as source of derivative classification if the information is dynamic innature (e.g. wikis and blogs) and is not marked as required by References (d) and (e) and thisVolume.(1) All e-mail, blog and wiki entries, bulletin board posting, and other electronic messagesshall be marked as finished documents, in accordance with the requirements of this section, dueto the originator‟s inability to control retention and redistribution once transmitted. They shallnot be marked as working papers.(2) Some organizations use automated tools to mark electronic messages (e.g.,organizational messages, e-mails, and text or instant messages). It remains the individual‟sresponsibility to properly mark classified messages, including banner marking, portion markings,and classification authority block when an automated tool is used.6-3


R 380-<strong>14</strong>(3) Where fan-folded printouts are still used, classification markings on interior pages maybe applied by the information system or equipment even though the markings may not meet thenormal test of being conspicuous. Dissemination control markings and the classificationauthority block shall either be marked on the face of the document or be placed on a separatesheet of paper attached to the front of the document. Segments of such printouts removed forseparate use or maintenance shall be marked as individual documents.f. E-Mail Messages.(1) E-mail transmitted on or prepared for transmission on classified systems or networksshall display the banner line at the top and bottom of the body of each message. A single lineartext string showing the overall classification, to include dissemination and control markings,shall be included as the first line of text and at the end of the body of the message after thesignature block (see Figure 16).(2) The banner marking for the e-mail shall reflect the classification of the header and bodyof the message. This includes the subject line, the text of the e-mail, any classified signatureblock, attachments, included messages, and any other information conveyed in the body of the e-mail.(3) Classified e-mail shall be portion marked. Each portion shall be marked to reflect thehighest level of information contained in that portion. A text portion containing a uniformresource locator (URL) or reference (i.e., link) to another document shall be portion markedbased on the classification of the content of the URL or link text, not the content to which itpoints. This is true even when the data accessible via the URL or link reflects a higherclassification marking.Classification of the subject lineOverall classification of of the the e-mail to include attachmentsPortion markings indicate classification of title of attachmentsInclude classification authority block on all classified e-mailsFigure 6-2Overall classification of the e-mail6-4


R 380-<strong>14</strong>(4) The subject line‟s portion marking will show the classification of the subject line itself,not the overall classification of the e-mail. The subject line portion marking shall reflect thesensitivity of the subject alone and shall not consider the sensitivity of the e-mail content orattachments. Subject lines and titles may be portion marked before or after the subject or title.(5) The classification authority block shall be placed after the signature block, but beforethe final banner line at the end of the e-mail. The block may optionally appear as a single lineartext string instead of the traditional three line format.(6) When forwarding or replying to an e-mail, individuals shall ensure that the markingsused reflect the classification markings for all the content present in the resulting message andany attachments. This will include any newly drafted material, material received from previoussenders, and any attachments.(7) For unclassified e-mails or other messages transmitted over a classified system, thedesignation “UNCLASSIFIED” shall be conspicuously placed within the banner line and anydissemination controls, such as “FOUO” or “PROPIN” (Proprietary Information), that may applymust be included.(8) E-mails used as transmittal documents shall be marked as required by ISOOImplementing Directive (32 CFR Parts 2001 and 2003). Place the instruction indicating the e-mail‟s overall classification level when separated from its enclosures just above the final bannerline.6-5. ADDITIONAL MARKINGS. USCENTCOM works in a joint, multi-national and coalitionenvironment; therefore, information sharing is paramount for successful missionaccomplishment. Additional markings that limit the ability to share information should be usedsparingly on USCENTCOM documents and there should be no default classification. Thefollowing is not an all-inclusive list of additional markings but include special instructions forUSCENTCOM personnel.a. Not Releasable to Foreign Nationals (NOFORN). NOFORN is an intelligencedissemination caveat and governed by the Director of National Intelligence (DNI); the NationalSecurity Act of 1947, Section 103 (c)(5); DCID 6/6, Section IX.E; DCID 6/7; and NationalDisclosure Policy (NDP)-1. NOFORN indicates that this classified intelligence information maynot be released in any form to foreign government, foreign nationals, foreign organizations, ornon-U.S. citizens without the permission of the originator and in accordance with the provisionsof DCID 6/7 and NDP-1. If the information did not come from an intelligence system or report,it will not be considered as NOFORN. Sections desiring to limit information to U.S. personnelonly should use REL TO USA after the classification (i.e. S//REL TO USA). When a documentor media contains both NOFORN and REL TO or NOFORN and EYES ONLY portions,NOFORN takes precedence for the markings in the top and bottom of the document or media.When a document or media contains both REL TO and uncaveated portions, NOFORN takesprecedence in the classification markings in the top and bottom of the document or media. Whenall portions in a document or media are marked with REL TO and there is no common country,6-5


R 380-<strong>14</strong>NOFORN takes precedence in the classification markings in the top and bottom of the documentor media. (See CAPCO Implementation Manual.)b. Releasable To (REL TO). USCENTCOM shares information with several differentorganizations and affiliations. Derivative information that is not marked for release to coalitionor multi-national organizations cannot be released. The USCENTCOM Foreign DisclosureOffice (FDO) is responsible for approving Classified Military Information (CMI) for disclosureor release to a foreign government or international organization. The FDO requests originatingagencies‟ approval for release of CMI to our coalition partners. Use REL TO followed by thecountry trigraph codes (listed in alphabetical order after USA) to list the countries authorized toreceive the information. USA should always be the first country trigraph listed after the words“REL TO” in U.S. documents or media; after USA, ISO 3166 country trigraph codes shall belisted in alphabetical order followed by tetragraphic codes listed in alphabetical order; each codeis separated by a comma and a space. Authorized trigraphs for countries are listed in ISO 3166.Authorized tetragraphs are listed in the CAPCO APPENDIX A, Tetragraph Table.USCENTCOM uses the GCTF tetragraph instead of listing out each country for coalitionmembers assigned to USCENTCOM as well as when appropriate for sharing in support of OEFor other terrorism related needs. The FDO, SSO and CSB are available to answer any markingquestions you may have.c. FOREIGN GOVERNMENT INFORMATION (FGI). The FGI marking is used in U.S.products to denote the presence of foreign-owned or foreign-produced information. Thesemarkings are used based on sharing agreements or arrangements with the source country orinternational organization (See E.O. 13526, Section 6.1(r); and ISOO Directive 32 CFR Parts2001 and 2003.). USCENTCOM agrees to protect the information at the equivalent level ofclassification of the information in the U.S. system of marking. FGI material usually comes withlimiting instructions and must be followed to preserve U.S. relationships and informationsharing. ISO 3166 country trigraph codes shall be listed in alphabetical order followed bytetragraphic codes listed in alphabetical order; each code is separated by a space. Authorizedtrigraphs for countries are listed in ISO 3166; authorized tetragraphs are listed in the CAPCOAPPENDIX A, Tetragraph Table. Documents with contain FGI data and U.S> data must keepthe FGI portions separate from the U.S> portions. See the CAPCO Implementation manual formarking guidance.d. NATO DOCUMENTS. NATO documents should be marked in accordance with U.S.Security Authority for NATO (USSAN) Instruction 1-69 and USSAN 1-07. Just becauseUSCENTCOM personnel possess a valid U.S. clearance does not mean they have beenindoctrinated for NATO material.e. ALTERNATIVE COMPENSATORY CONTROL MEASURES (ACCM). ACCM,sometimes referred to as Special Category or SPECAT, handling caveats appear on sensitive,classified military information. Personnel receiving information with ACCM handlinginstructions are limited to those with a need to know. Specifically designated offices handleindoctrination into the appropriate ACCM.6-6


R 380-<strong>14</strong>CHAPTER 7DECLASSIFICATION AND DOWNGRADING7-1. DESCRIPTION. Declassification and regrading is the process of changing the classificationof USCENTCOM information. USCENTCOM processes Automatic, Systematic and Mandatoryreviews of classified material. Automatic reviews are classified records that are more than 25years old and have been determined to have permanent historical value under title 44, UnitedStates Code; Systematic reviews are of permanently historical value excepted from automaticdeclassification under section 3.3 of EO 13526 and that the Archivist of the US has deemed ofpermanent historical value. Mandatory review is performed in response to a reasonable requestfor a review describing the document or material containing the information with sufficientspecificity to enable the agency to locate it with a reasonable amount of effort.7-2. POLICY. Information meeting the classification requirements of this guide shall remainclassified as long as required for national security. EO 13526, provides uniform instructions fordeclassifying and downgrading national security information, including information relating todefense against transnational terrorism. These instructions are provided for each specific topic ofinformation and they are not intended to be transcribed verbatim. They should be used todetermine a specific date or event for declassification or downgrading. Specific declassificationauthority is not required to remark documents downgraded or declassified in accordance withinstructions provided in this guide.7-3. (U) DECLASSIFICATION/EXEMPTION. The "DECLASSIFY ON" column specifies thedate or event for declassification or the 25-year automatic declassification exemption category asdescribed in E.O. 13526, Section 1.6 and 2.1; ISOO Implementing Directive (32 CFR Parts 2001and 2003); the CAPCO Implementation Manual; and DOD 5200.1-R. When deciding how tocomplete the “DECLASSIFY ON” line, an original classification authority will have thefollowing choices:a. (U) A date of no more than 25 years from the original classification decision or theinformation's origin. The following format must be used: YYYYMMDD.b. (U) An event. Events must be reasonably definite and foreseeable.c. (U) “50X1-HUM” marking used when the information clearly and demonstrably couldreveal a confidential human source or a human intelligence source.d. (U) “50X2-WMD” marking used when the information clearly and demonstrably couldreveal key design concepts of weapons of mass destruction.e. (U) Per ISOO Notice 2012-02: This marking is no longer authorized. “25X1, EO 12951”(Note: Per DNI Memo E/S 00400, dated 26 May 2010, value replaces the “DCI Only” and “DNIOnly” markings).7-1


R 380-<strong>14</strong>f. (U) An exemption category of “25X#, date or event” (where “#” is a number from 1-9).(The use of exemptions from automatic declassification by agencies must be authorized inaccordance with ISOO Implementing Directive, § 2001.26.)g. (U) An exemption category of “50X#, date or event” (where “#” is a number from 1-9).(The use of exemptions from automatic declassification by agencies must be authorized inaccordance with ISOO Implementing Directive, § 2001.26.)h. (U) An exemption category of “75X#, date or event” (where “#” is number from 1-9). (Theuse of exemptions from automatic declassification by agencies must be authorized in accordancewith ISOO Implementing Directive, § 2001.26.)7-4. DOWNGRADING. Downgrading is the change from a higher security classification to alower level due to the information or means of collecting the information not meeting theprerequisites of EO 13526.a. Instructions. Cancel (i.e., line through) old classification markings and substitute the newones when a document is downgraded according to its markings. At a minimum, the markingson the cover (if one exists), title page (if one exists), and the first page shall be changed. Ifinformation no longer meets the requirements for classification at a higher level but still needsprotecting, downgrading instructions will be included. For example, a TOP SECRET plan canbe marked, „DOWNGRADE to SECRET after execution.‟ The marking should be on the frontpage and be similar to the following:CLASSIFIED BY: Joe SnuffyDERIVED FROM: USCENTCOM SCG 0707DECLASSIFY ON: 15 July 2017DOWNGRADE to CONFIDENTIAL following mission completionb. Authority to Downgrade. Information may be declassified and downgraded by thoseofficials who have been delegated Original Classification Authority in this regulation andofficials who have been delegated, in writing, declassification authority. The authority todeclassify information extends only to information for which the specific official hasclassification, program, or functional responsibility. The CCJ6-RD Command Records Managerhas designated the CCJ6-RDD, Chief, Declassification Management Section the authority todeclassify or withhold records under the Automatic Declassification Program. OriginalClassification authorities may designate, in writing, members of their staffs in grades O5 andabove to exercise declassification authority over information under their jurisdiction. A copy ofdelegation of declassification authority will be maintained by the security manager. Aninformation copy will be forwarded to CCJ2-CSB. OCAs must ensure those personnel theydesignate as declassification authorities are trained, knowledgeable, and capable of makingsound declassification decisions in regard to the specific information. The responsibility for thedeclassification decisions rests with the OCA, therefore coordination and oversight is imperative.Information not originally produced by USCENTCOM will not be regraded without the expressconsent of the ORIGINATOR of the information.7-2


R 380-<strong>14</strong>7-5. DOWNGRADING OR DECLASSIFICATION EARLIER THAN SCHEDULED. If adocument is downgraded or declassified earlier than indicated by its markings, the guidance inparagraph 7-4, as appropriate, of this enclosure must be followed. In addition, place thisinformation on the document:a. The date of the downgrading or declassification re-marking.b. The authority for the action (e.g., the identity of the OCA who directed the action oridentification of the security classification guidance or instruction that required the action).When possible file a copy of the correspondence authorizing the early downgrading ordeclassification with the document.c. Upgrading. If a document is upgraded, all classification markings affected by theupgrading shall be changed to the new markings. Also, place this information on the document:(1) The date of the re-marking.(2) The authority for the action (e.g., the identity of the OCA who directed the action, oridentification of the correspondence or classification instruction that required it).d. Extension of Classification. If information has been marked for declassification on aspecific date or event and the duration of classification is subsequently extended, then:(1) The “Declassify On:” line shall be changed to show the new declassificationinstructions.(2) A notation shall be included on the front cover or first page indicating the identity of theOCA authorizing the extension or identification of the correspondence or classificationinstruction requiring it, and the date of the action.e. Reclassification. Previously declassified information may be reclassified IAW ISOOImplementing Directive (32 CFR Parts 2001 and 2003). When reclassified, information shall bere-marked to clearly provide:(1) New overall classification markings and portion markings to replace those that had beencancelled.(2) A new classification authority block (i.e., identification of the OCA, reason forclassification, and declassification instructions).(3) The date the reclassification action was taken.f. Bulk Changes. If the volume of material involved in a downgrading, upgrading, ordeclassification action is so large that individually re-marking each item may cause seriousinterference with operations, the custodian may attach a notice to the inside of the storage unitproviding the information required by this section or section 11 of this enclosure, as applicable.7-3


R 380-<strong>14</strong>When individual documents are removed from the storage unit for use, they shall be marked inthe manner prescribed. If documents are removed for transfer to another storage unit, they neednot be re-marked if a proper notice is also posted to the new storage unit.7-4


380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANK8-2


APPENDIX AR 380-<strong>14</strong>MANPOWER, PERSONNEL, AND ADMINISTRATION (CCJ1)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. DailypersonnelstatisticsS 1 month 1.4(g) Approximate numbers ofdeployed personnel may bereleased by the CCCI forofficial useA-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKA-2


INFORMATIONREVEALING1. InformationconcerningCI/HUMINT andother sensitiveintelligencesources andmethods2. Intelligenceinformationobtained fromCI/HUMINT3. Intelligenceexchangeagreements4. Products ofanalysis byUSCENTCOMintelligenceanalystsAPPENDIX BINTELLIGENCE AND SECURITY (CCJ2/JICCENT)CLASSIFICATION DECLASSIFICATION REASON REMARKSR 380-<strong>14</strong>S 10 years 1.4(c) May be classified higherif it incorporatesinformation of a higherclassification or bydirection of the CCJ2OCAC 10 years 1.4(c) If the source is notidentifiedS 10 years 1.4(b) 1.4(c)Refer to TablebelowTable 1. Classifying CCJ2 AnalysisINFORMATIONREVEALING4.a. Assessmentdetail is equal tothat of originalsourceinformation anddoes not revealintelligencesources oractivities, or U.S.foreign relationsactivities,command plans orsimilar sensitivedata,Refer to Table below 1.4(c) Refer to Table 1 belowCLASSIFICATION DECLASSIFICATION REASON REMARKS4.a.1. Assessmentshould be classifiedin line with originalsources4.a.2. If allinformation in theassessment isderived only fromsources markedS//REL TO USA,GBR and theassessment does notcontain any originalthoughts, theassessment isS//REL TO USA,GBRMost restrictivedeclassification of allthe declassifications ofthe original sources.Most restrictivedeclassification of allthe declassifications ofthe original sources.1.4 (a)1.4 (c)1.4 (d)1.4 (g)1.4 (a)1.4 (c)1.4 (d)1.4 (g)4.a.3. If allinformation inassessment isMost restrictivedeclassification of allthe declassifications ofB-11.4 (a)1.4 (c)1.4 (d)


R 380-<strong>14</strong>derived fromsources markedS//REL TO USA,GBR, but theassessmentscontains originalthoughts andjudgments, theassessment is S.4.a.3. If assessmentis derived fromS//NF source andS//REL TO USA,GBR, and AUSsource, assessmentwill be markedS//NF4.a.4. If assessmentis derived fromS//REL TO USA,GBR source, S//NFsource andS//OC//NF source,assessment shouldbe markedS//OC//NF4.a.5. If allinformation in anassessment ordiscussion isderived fromUNCLASSIFIEDsources, theanalytic judgmentsor discussions thatembodyconclusions anyintelligent observercould derive frompublicly availableinformation andthat do notinherently revealsensitiveinformation aboutU.S. plans, policiesor interests, theassessment shouldbe markedthe original sources.Most restrictivedeclassification of allthe declassifications ofthe original sources.Most restrictivedeclassification of allthe declassifications ofthe original sources.Not applicableB-21.4 (g)1.4 (a)1.4 (c)1.4 (d)1.4 (g)1.4 (a)1.4 (c)1.4 (d)1.4 (g)Notapplicable


R 380-<strong>14</strong>4.b. Although allinformation in anassessment ordiscussion wasderived fromCLASSIFIEDsources, if theanalyticjudgments ordiscussions thatembodyconclusions anyintelligentobserver couldderive frompublicly availableinformation andthat do notinherently revealsensitiveinformation aboutU.S. plans,policies orinterests,4.c. Analyticjudgments thatdepend onknowledge orunderstanding notavailable to thegeneral publicthat originatedfrom a sensitivesource, to include4.c.1. U.S.policymakers‟priorities,interests orintentions should4.c.2. U.S., alliedor coalitionpartners‟ militaryoperational plans,contingencyplans, planningguidance, orUNCLASSIFIED.UNCLASSIFIED Not applicable Not applicableSECRET or TOPSECRET. See Note1.25 years from the dateof origination1.4 (a)1.4 (c)1.4 (d)1.4 (g)4.c. Analytic judgmentsthat depend onknowledge orunderstanding notavailable to the generalpublic that originatedfrom a sensitive source,to include4.c.1. U.S.policymakers‟ priorities,interests or intentionsshould4.c.2. U.S., allied orcoalition partners‟military operationalplans, contingencyplans, planningguidance, orcontemplated futureplans or guidance4.c.3. Vulnerabilities ofB-3


R 380-<strong>14</strong>contemplatedfuture plans orguidance4.c.3.Vulnerabilities ofthe U.S. orforeign countries,their militaryforces, militarysystems, domesticinfrastructure,political system,or other vitalcomponentsthe U.S. or foreigncountries, their militaryforces, military systems,domestic infrastructure,political system, or othervital components4.d. Analyticjudgments orproducts thatprovide anauthoritativeUSCENTCOMposition thatdraws on anunderstanding ofclassifiedinformation.CONFIDENTIAL,SECRET or TOPSECRET. See Note1.25 years from the dateof origination1.4 (a)1.4 (c)1.4 (d)1.4 (g)Judgments that can beclosely linked to specificclassified sources shouldreflect the classificationof those sources andshould carry appropriatereleaseability markingsin accordance with ICD710. Citing theauthorities contained inthis guide is not requiredas a basis for theclassification of thesejudgments.4.e. Compilationsof unclassifiedinformation,absent anyanalyticjudgments, that inaggregate provideinsight intonational securityor intelligenceissues, beyondwhat would beobvious to aninformed outsideobserver.SECRET25 years from the dateof origination1.4 (c) Should carry appropriatereleaseability markingsin accordance with ICD710.4.f. Analyticjudgments thatSECRET25 years from the dateof originationB-41.4 (c) Should carry appropriatereleaseability markings


R 380-<strong>14</strong>depend onanalyticmethodologiesnot available tothe public.in accordance with ICD710.4.g. Analyticjudgments thatdepend onanalyticmethodologiesnot available tothe public.SECRET25 years from the dateof origination1.4 (c) Should carry appropriatereleaseability markingsin accordance with ICD710.4.h. Analyticwritings ordiscussions thatprovide insightinto intelligencemethods, gaps, orcollectionpriorities but thatdo not includespecificinformationderived fromintelligencereports that wouldbe covered byother derivativeclassificationguidance.SECRET25 years from the dateof origination1.4 (c)1.4 (d)Should carry appropriatereleaseability markingsin accordance with ICD710.Information thatreveals theexistence of aUSCENTCOMliaisonrelationship witha foreignintelligenceservice but thatdoes not includespecificintelligenceinformation thatwould be coveredby otherderivativeSECRET25 years from the dateof originationB-51.4 (c) May be NOFORN orreleasable to the foreignpartner, as dictated bythe terms of theapplicable foreignexchange agreement.


R 380-<strong>14</strong>classificationguidance.4.j. Assessmentlevel of detail isdifferent fromoriginal sourceinformation or itrevealsintelligencesources oractivities, U.S.foreign relationsactivities,command plans orsimilar sensitivedata.If original sourcesare S//OC/NF andS//NF, andassessment includesno OC references,assessment shouldbe marked S//NFIf original sourcesare S//REL TOUSA, GBR andassessmentincorporateshistorical OC andNF data,assessment shouldbe markedS//OC/NFMost restrictivedeclassification of allthe declassifications ofthe original sources.Most restrictivedeclassification of allthe declassifications ofthe original sources.1.4 (a)1.4 (c)1.4 (d)1.4 (g)1.4 (a)1.4 (c)1.4 (d)1.4 (g)NOTE 1: Use the following definitions for deciding classification levels.--- a. TOP SECRET shall be applied to information, when the unauthorized disclosure could reasonably beexpected to cause exceptionally grave damage to the national security that the OCA is able to identify ordescribe.--- b. SECRET shall be applied to information when the unauthorized disclosure could reasonably be expectedto cause serious damage to the national security that the OCA is able to identify or describe.--- c. CONFIDENTIAL shall be applied to information when the unauthorized disclosure could reasonably beexpected to cause damage to the national security that the OCA is able to identify or describe.NOTE 2: Only the USCENTCOM Foreign Disclosure Office has the authority to approve the release ofinformation to a non-U.S. entity. (i.e., Original sources were not marked REL TO but the analyst believesassessment could be made REL TO. The analyst must submit the data to the FDO who will determine if it canbe released to specific foreign entities in accordance with National Disclosure Policy 1.).B-6


APPENDIX CR 380-<strong>14</strong>SECURITY (CCJ2-SSO)INFORMATIONREVEALING1. Approved modificationsto the requirements ofDOD 5200.1-R duringoperations2. Damage assessmentsconducted pursuant to theloss or compromise ofclassified information3. Exploitable informationor personnel securityweaknesses in OCONUSareas4. General securitycountermeasures5. Loss of classifiedmaterial6. Weaknesses in theapplication of securitymeasures for safeguardingclassified informationduring operations, inOCONUS locations, orduring periods of increasedthreatCLASSIFICATION DECLASSIFICATION REASON REMARKSCUpon completion ofoperation1.4(g)C 10 years 1.4(g) May beclassifiedhigher basedon contentCUpon correction, 1.4(g)elimination of weakness,or 10 years, whichever issoonerU N/A N/ACCUpon regaining custodyof material or followingcompletion of damageassessment, whichever islaterUpon correction ofweakness or completionof the operation,whichever is sooner1.4(g)1.4(g)C-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKC-2


APPENDIX DR 380-<strong>14</strong>SOUTH EAST REGIONAL SERVICE CENTER (CCJ2/SE-RSC)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. ALE password TS Upon change 1.4(a) SCI2. COLISEUMpasswordTS Upon change 1.4(a) SCI3. DAWN/HOCNETpasswordS Upon change 1.4(a)4. GALE password TS Upon change 1.4(a) SCI5. JWICS LAN/WANuser IDU N/A N/A6. JWICS LAN/WANpasswordTS Upon change 1.4(a) SCI7. RMS password TS Upon change 1.4(a) SCI8. SAFE password TS Upon change 1.4(a) SCI9. Virus/networkintrusionsS Once neutralized 1.4(g)10. XDITDSpasswordTS Upon change 1.4(a) SCID-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKD-2


APPENDIX ECOUNTERINTELLIGENCE / HUMAN INTELLIGENCE (CCJ2-X)INFORMATIONREVEALING1. Requests forProcedures SpecialInvestigativetechniques IAW DoD5240.1R2. Number andCategory of CI/CEcases within AORCLASSIFICATION DECLASSIFICATION REASON REMARKSR 380-<strong>14</strong>S 10 years 1.4(c) Classified basedon operationalmeansCS10 years 1.4(c) NOFORN3. CI Force ProtectionVulnerabilityAssessmentsU//FOUOtoS0-25 years 1.4(c) Based onassessment ofidentifiedvulnerabilities andcorrection ofidentifiedproblems4. Tasking whichreveals impendingU.S. intelligenceoperations, or U.S.intelligence targets orintelligence objectivesS//NOFORN May be exempted :Declassify 10 to 25years from date info isclassified if revealsactual U.S. military warplans that remain ineffectSensitive operationsmaybe classified higheror carry restrictedassess if requested1.4(a)1.4(c)1.4(g)Tasking andinformation indirect support ofplanned,impending orongoing U.S.intelligenceoperations will notbe shared withoutprior DCI or hisdesignated agent‟sapproval.5. Individual orcomprehensive lists offoreign intelligence oroperational targetsS//NOFORNorHigherMay be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor method1.4(a)1.4(b)1.4(d)1.4(g)Target informationin direct supportof planned,impending, orongoing U.S.military operationsINFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKSE-1


R 380-<strong>14</strong>6. Target lists thatreveal impending U.S.intelligence operationsor intelligenceobjectivesS//NOFORNorHigherMay be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor method1.4(a)1.4(b)1.4(c)1.4(d)1.4(g)Information isdirect support ofplanned,impending, orongoing U.S.intelligenceoperations will notbe shared withoutprior DCI or hisdesignated agent‟sapproval7. CI OperationalConcept (CIOC) or CISpecial OperationalConcept (CISOC).This includes CI-Specific CONOPS(i.e. JCIUs, etc.)S//NOFORNDeclassify 10 yearsfrom date info isclassified1.4(a)1.4(c)Any informationabout the purpose,subject or target,objectives, andmethods will beclassified8. Requests forProcedure 1-4 and 10-15, AR 381-10.9. Requests forProcedures 5-9, AR381-10.10. Relations betweenCENTCOM CIelements and otherU.S. CI andinvestigative/intelligence agencies.INFORMATIONREVEALING11. Use of CI assets inforeign intelligenceand special activities.U 1.4(a) Will be classifiedonly if operationalactivities would bedisclosed –classification willbe based on theclassification ofthe sourcematerial.SU or SDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassifiedE-21.4(a)1.4(a)Any informationabout the purpose,subject or targetobjectives, andmethods will beclassified.UNCLASSIFIEDif relationship isovert.SECRET ifrelationship iscovert. (Per DoDIC-5240.8)CLASSIFICATION DECLASSIFICATION REASON REMARKSSMay be exempted:Declassify 10 to 25years from date info is1.4(a)1.4(b)1.4(c)Per DoDI C-5240.8


R 380-<strong>14</strong>classified if informationwould seriously anddemonstrably impairrelations between theUnited States and aforeign government, orseriously anddemonstrablyundermine ongoingdiplomatic activities ofthe United States1.4(d)12. Informationofficially receivedfrom foreign agenciesconcerning personalsecurity investigations.CDeclassify 10 yearsfrom date info isclassified1.4(b)Protected asCONFIDENTIALunless the foreigngovernmentauthorizes it to behandled asUNCLASSIFIED.(Per DoDI C-5240.8)13. Spot Reports fornon-investigativeactivity – i.e., threatsagainst persons orproperty.U to CDeclassify 10 yearsfrom date info isclassified1.4(a)CONFIDENTIALif report wouldcompromise aclassified source.<strong>14</strong>. CI/CEInvestigationsC to TS May be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor method1.4(a)1.4(c)1.4(d)See AR 381-47(S) for additionalsecurityclassificationguidance.Information mayhave caveats andrequire SpecialAccessINFORMATIONREVEALING15. Fact thatUSCENTCOMelement is conductinga specific CI/CEinvestigation, project,CLASSIFICATION DECLASSIFICATION REASON REMARKSC to SDeclassify 10 yearsfrom date info isclassified1.4(a)1.4(c)Minimum ofConfidential. SeeNOTES 1, 2, and3.E-3


R 380-<strong>14</strong>operation, or otheractivity.16. Initial SAEDAreport.17. Agent Reports andInvestigativeMemorandum forRecord (IMFR).18. Identity ofSubject(s) ofinvestigation.19. True name ofCI/CE investigativesource or otheridentifying personaldata.20. Case ControlNumber (CCN) orNickname.INFORMATIONREVEALING21. Report ofInvestigation (ROI).C to SC to SDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassifiedC to SDeclassify 10 yearsfrom date info isclassifiedC May be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor methodUDeclassify 10 yearsfrom date info isclassified1.4(a)1.4(c)1.4(g)1.4(a)1.4(c)1.4(d)1.4(g)1.4(a)1.4(c)1.4(a)1.4(c)1.4(d)1.4(g)1.4(a)All initial SAEDAreports will beclassified aminimum ofCONFIDENTIAL; including thedate/location ofincident. SeeNOTE 2.Minimum ofCONFIDENTIALSee NOTE 1 and2.Minimum ofCONFIDENTIAL.See Note 1 and 2.See NOTE 1.When standingalone. Classifyappropriatelywhen CCN orNickname islinked to details ofthe investigation,including locationand date ofincident.CLASSIFICATION DECLASSIFICATION REASON REMARKSC to SDeclassify 10 yearsfrom classification date1.4(a) See NOTE 1, 2,and 3.22. Number andCategory of CI/CEcases -- open, closedand pending -- withinC to SDeclassify 10 yearsfrom date info isclassified1.4(a)Statistics by MSCor Category areCONFIDENTIALTotal INSCOME-4


R 380-<strong>14</strong>USCENTCOM and byComponents.23. Investigativetechniques for aspecific case.24. Fact that theUSCENTCOM andsubordinate unitsengage in offensive CIoperations (OFCO).25. Source oroperation/programnickname.26. Memorandums ofAgreements orUnderstandingbetween CI/HUMINTunits and assets.C to S May be exempted :Declassify 10 to 25years from date info isclassified if informationreveal actual U.S.military war plans thatremain in effect;including foreigngovernmentinformation that wouldseriously anddemonstrablyundermine ongoingdiplomatic activities ofthe United StatesS//NOFORN Declassify 10 yearsfrom date info isclassifiedU orS//NOFORNS//NOFORNDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassified1.4(a)1.4(c)1.4(d)statistics areSECRET.See NOTE 1. Thefollowing itemswill also beclassifiedSECRET: overallinvestigative plan,Procedurerequests, CIOCsor CISOCs, andtechnical CIsupport.1.4(a) See NOTE 41.4(a)1.4(c)UNCLASSIFIEDwhen standingalone. SECRET/NOFORN whenassociated withIdentifyinginformation. SeeNOTE 41.4(c) See NOTE 4.INFORMATIONREVEALING27. Information relatedto those activities ofCI assets coveredunder the provisions ofDoDI 5240.9.CLASSIFICATION DECLASSIFICATION REASON REMARKSS//NOFORNMay be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceE-51.4(a)1.4(c)See NOTE 4.


R 380-<strong>14</strong>or method28. Consolidatedreports on activitiescovered under theprovisions of DoDI5240.9S//NOFORNMay be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor method1.4(a)1.4(c)1.4(d)See NOTE 4.29. Summaries ofindividual cases.S//NOFORNDeclassify 10 yearsfrom date info isclassified1.4(a) See NOTE 4.30. Aggregatestatistics disclosing nooperational details.INFORMATIONREVEALING31. Consolidatedlistings ofCI/HUMINT assets oroperations.CtoS//NOFORNDeclassify 10 yearsfrom date info isclassified1.4(a)CONFIDENTIAL/NOFORN whenshowing numberof active/inactiveOFCO casesstanding alone orby region/CINCAO (i.e.,EUCOM,Europe,CENTCOM, Asia,etc.).SECRET/NOFORN when showingnumbers ofoperations againsta specific countryand at all othertimes. See NOTE4.CLASSIFICATION DECLASSIFICATION REASON REMARKSS//NOFORNMay be exempted :Declassify 10 to 25years from date info isclassified if informationreveal actual U.S.military war plans thatremain in effect;including foreign Gov‟tinformation that wouldseriously anddemonstrably1.4(a)1.4(b)1.4(c)1.4(d)1.4(g)See NOTE 4.E-6


R 380-<strong>14</strong>undermine ongoingdiplomatic activities ofthe United States32. CDRUSCENTCOM orComponent CDR PIRsCToS//NOFORNDeclassify 10 yearsfrom date info isclassified1.4(a)CONFIDENTIALwhendisassociated fromoperation orsource.SECRET/NOFORN at all othertimes. See NOTE4.33. Modus Operandi(MO) of U.S.Intelligence Agencies.CToS//NOFORNMay be exempted :Declassify 10 to 25years from date info isclassified ifinformation revealsactual U.S. military warplans that remain ineffect1.4(a)1.4(c)1.4(d)1.4(g)See NOTE 4.34. MO of ForeignIntelligenceEntities(FIE) inspecific cases.CToS//NOFORNDeclassify 10 yearsfrom date info isclassified1.4(a)1.4(b)See NOTE 4.35. Vetting or Assetvalidation Procedures.CDeclassify 10 yearsfrom date info isclassified1.4(a) See NOTE 4.INFORMATIONREVEALING36. Biographicalbackground andpersonality data.37. CI support toForce Protection: Ifminor vulnerabilitiesCLASSIFICATION DECLASSIFICATION REASON REMARKSS//NOFORN May be exempted :Declassify 10 to 25years from date info isclassified if the identityof a confidential source,or a human intelligencesource, or informationabout the application ofan intelligence sourceor methodC5 years or when thevulnerability iscorrected.E-71.4(a)1.4(c)1.4(d)1.4(a)See NOTE 4.


R 380-<strong>14</strong>are identified.38. CI support toForce Protection: Ifmajor vulnerabilitiesare identifiedSUp to 25 years ifinformation revealedwould seriously anddemonstrably impaircurrent nationalsecurity emergencypreparedness plans orreveal currentvulnerabilities ofsystems, installations,infrastructures, orprojects relating tonational security1.4(a)May be classifiedhigher, dependingon the assessedunit‟s SCG. Insome rarecircumstances,vulnerabilitiesand/orcountermeasures -- even after theyhave beencorrected -- couldstill compromisethe activity,program oroperation beingassessed if theybecame known toFIS/HOIS.39. CI support toSpecial AccessPrograms (SAPs) andSpecial Mission Units(SMUs).INFORMATIONREVEALING40. CI support toAcquisition SystemProtection Program(ASPP).41. Request for CITechnical Services(COMSECMonitoring/TSCM/TEMPEST/Polygraph/Counter-SIGINT support.U to S Declassify 10 to 25years from date info isclassified if informationwould impair theapplication of state-ofthe-arttechnology witha U.S. weapons system1.4(a)Identities ofsupportedprograms,activities or unitsmay be classified,depending on theirsensitivity.Consult thesupportedprogram‟s SCG.CLASSIFICATION DECLASSIFICATION REASON REMARKSU 1.4(a) Fact that CIsupports ASPP isUNCLASSIFIED.U to SDeclassify 10 yearsfrom date info isclassified1.4(a)UNCLASSIFIEDunless the dates ofthe service or thephone lines to bemonitored arelisted; SECRETprior to and duringthe service; Maybe classifiedhigher, dependingon the monitoredE-8


R 380-<strong>14</strong>unit‟s SCG.42. CI TechnicalServices ReportsU to CDeclassify 5 years fromdate info is classified1.4(a)UNCLASSIFIEDif no vulnerabilityor securityviolations areidentified;CONFIDENTIALif vulnerabilitiesor securityviolations areidentified. May beclassified higher,depending on themonitored unit‟sSCG.43. InformationconcerningCI/HUMINT andother sensitiveintelligence sourcesand methodsStoS//NOFORNDeclassify 25 yearsfrom Date info isclassified1.4(a)SECRET if nosource informationor methods areidentified ordiscussed44. Intelligenceinformation obtainedfrom CI/HUMINTactivitiesCtoS//NOFORNDeclassify 25 yearsfrom Date info isclassified1.4(a)Sensitive sourceoperations andinformation maybe classifiedhigher or carryrestricted access ifrequestedINFORMATIONREVEALING45. Information on thecoding and registrationof sources (i.e., BasicSource Data or BSD)with the DefenseSource Registry(DSR), the SourceOperationsManagement Module(SOMMS, or anyother theater sourceregistry)CLASSIFICATION DECLASSIFICATION REASON REMARKSS//NOFORNDeclassify 25 yearsfrom Date info isclassified1.4(a)Sensitive sourceoperations andinformation maybe classifiedhigher or carryrestricted access ifrequestedNOTES:1 - (U) All CI/CE operational activity – namely investigations, projects and operations as defined in AR 381-20-- will be classified a minimum of CONFIDENTIAL unless a higher classification is imposed elsewhere in thisSCG or based on material derived from another SCG.E-9


R 380-<strong>14</strong>2 - (U) Classify SECRET for Category I and II cases and those Category VI cases where foreign intelligenceservices are suspected or confirmed.3 - (U) May be classified higher based on another SCG, a tasking document, or if so specified in an approvedCIOC/CISOC.4 - (S//NF) The NOFORN caveat does not apply to those countries involved in approved bilateral /multilateralDouble Agent Operations as specified in the approved CIOC. In lieu of the "NOFORN" caveat as specified inthis SCG, the material will be marked "US AND [list the appropriate country] ONLY".NOTE: See DoD C-5240.8, Department of Defense Counterintelligence Security Classification Guide foradditional classification areas. Information classified by DoD C-5240.8 should be marked as follows:DERIVED FROM: DoD C-5240.8DECLASSIFY ON: Insert Date Directed by GuideE-10


APPENDIX FR 380-<strong>14</strong>OPERATIONS (CCJ3-C)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Documentsidentifying NearReal Time (NRT)track data.DocumentsidentifyingPosition, Locationand Identificationof US and coalitionforces2. Near real timefriendly forceposition, locationand identification(PLI)3. Friendly ForcePosition, Locationand Identification(PLI) Data duringHumanitarianAssistanceOperations.Confidential 10 years 1.4 (a,g) May be classifiedhigher if it incorporatesinformation of a higherclassification or upondirection of an OCA.Mission Dependent(Per JROCM, canstart out asunclassified andmay be classifiedhigher by OCAdepending on themission.)U(FOUO)10 yrs or at theconclusion of theoperation (i.e. OPLANCOMPLETED).Upon movementcompletion ortermination ofoperation.1.4 (a,g) Combat operations isan environment inwhich the unauthorizeddisclosure of friendlyforces near-real time(NRT) position,location andidentification datawould place our forcesand national security atrisk.1.4 (a,g) In a non-hostileenvironment, theposition, location andidentification (PLI) offriendly force data willnormally beUnclassified.However, the data mustbe protected inaccordance with FIPS-<strong>14</strong>0-2 and may beclassified up to secretby OCA, i.e. In somecircumstances wherethe aircraft are takingoff from may beclassified.F-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKF-2


APPENDIX GR 380-<strong>14</strong>OPERATIONS (CCJ3-IO)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. Exploitable CUpon correction, 1.4(g)critical or sensitiveunclassifiedinformation inOCONUS areas oronlineelimination ofweakness, or 10 years,whichever is sooner2. General OPSECcountermeasuresU N/A N/A3. Loss of criticalsensitiveunclassifiedmaterial4. Weaknesses inthe application ofOPSEC measuresfor safeguardingsensitiveinformation onUSCENTCOMofficial websites5. Internet-basedMilitaryInformationSupport Operations(MISO)6. Regional WebInteractionProgram (RWIP)CCCUpon identificationand mitigation orfollowing completionof damage assessment,whichever is laterUpon mitigation ofweakness orcompletion of theoperation, whichever issoonerDeclassify 10 yearsfrom date info isclassified1.4(g)1.4(g)1.4(a)S//REL GBR N/A 1.4(a)G-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKG-2


APPENDIX HR 380-<strong>14</strong>OPERATIONS (CCJ3-IAG)INFORMATIONREVEALING1. Names of RewardRecipients/Informants2. ConsolidatedRewards List3. RewardNomination Message4. HVI RewardNomination Packages(which includesintelligence)5. FRAGOs /Genadmin Messages6. Taskers: ESPs /memos / informationpapers / talkingpoints / case studies /RFIsCLASSIFICATION DECLASSIFICATION REASONU or up to S Declassify 25 yearsfrom the date info isclassifiedREMARKSUNCLASSIFIED/FOUOif SCI#, or OTS# used.SECRET if *Full Nameof Recipient used.The Rewards Program isnot an IntelligenceProgram and is notintended to replace anyIntelligence Program.U N/A Names of HVIs, thecache items discovered,and rewards amounts areUNCLASSIFED/FOUOS//REL TO USA,ISAF, NATOUS//REL TO USA,ISAF, NATOUS//REL TO USA,ISAF, NATOUS//REL TO USA,ISAF, NATOUDeclassify 25 yearsfrom the date info isclassifiedDeclassify 25 yearsfrom the date info isclassifiedDeclassify 25 yearsfrom the date info isclassifiedDeclassify 25 yearsfrom date info isclassified or can bemarked upon executionof operationUNCLASSIFIED/FOUOif possible for widestdissemination. Onlyintelligence up to RELTO should be used atmaximumOnly intelligence up toREL TO should be usedat maximumUNCLASSIFIED/FOUOif possible for widestdisseminationOnly intelligence up toREL TO should be usedat maximumUNCLASSIFIED/FOUOif possible for widestdisseminationOnly intelligence up toREL TO should be usedat maximum7. RewardAuthorization List(RAO)U N/A Monthly list provided byCENTCOM to the AORINFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKSH-1


R 380-<strong>14</strong>8. Pay Vouchers U N/A All FinancialDocuments (EX: DD1081) areUNCLASSIFIED/FOUO unless packetcontains higherclassification from otherdocuments9. Quarterly/End ofYear ReportsU up toS//NOFORNDeclassify 25 yearsfrom the date info isclassifiedClassification dependson the classificationlevel of intelligenceinformation indocumentWARNING: Rewards documents that contain derivative classified information and controls must contain atleast the same level of classification and controls as the information from which it was derivedH-2


R 380-<strong>14</strong>INFORMATIONREVEALING1. Commander‟sUpdate Brief (CUB)and ComponentCommanders Brief(CCB)2. Current Opsbriefings / CDR andJ3 Trip books3. FRAGOs /Genadmin messagesAPPENDIX IOPERATIONS (CCJ3-O)CLASSIFICATION DECLASSIFICATION REASON COMMENTSS CUB - S//REL TOUSA, FVEY toGCTF depending onslide package loadedfor brief.CCB – S//REL TOUSA, ACGUSS//REL TO USA,ACGU or USS//REL TO USA,ACGUS//REL TO USA,GCTFS//REL TO USA,FVEYDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassified1.4 (a) Displayed brief is S orhigher, adjusted to Relfor posting in sharedfolders1.4 (a)1.4 (b)1.4 (d)Classification dependson audience1.4 (a) Classification dependson target audience.Code words/missionnicknames areUNCLASSIFIED whennot associated withmission details4. Taskers: ESPs /memos / informationpapers / talkingpoints / RFIsSS//REL TO USA,ACGUS//REL TO USA,GCTFS//REL TO USA,FVEYUDeclassify 10 yearsfrom date info isclassified1.4 (a) Classification dependson target audience.Code words/missionnicknames areUNCLASSIFIED whennot associated withmission details5. Weather briefingslidesS//REL TO USAGCTFDeclassify 10 yearsfrom date info isclassified or 7 daysafter the event, Markfor Manual Release(MR)1.4 (a) Weather forecasts arenot classified. WxImpacts to operationsand wx associated withclassified locations areclassified, as appropriate6. SIGACT EventSummariesS//REL (asappropriate) or UDeclassify 10 yearsfrom date info isclassified or 7 daysafter the event (MR)1.4 (a) UNCLASSIFIED afterthe info has beensanitized of specificunit, friendly casualties,battle damage, and othersensitive operationalinformationI-1


R 380-<strong>14</strong>INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON COMMENTS7. SIGACTs relatedto fact of andgeneral type(vehicle-borne, etc)of IED attack atspecific location onspecific date8. SIGACTs relatedto the fact ofdiscovery of IED9. SIGACTs relatedto fact of and type ofterrorist/insurgentattack at specificlocation on specificdate10. Products derivedfrom SIGACTswhich showaggregate, roughstatistics on IEDs(total number foundtype, total detonated11. Operational codeword(s) whenidentified withmission operations12. Concept ofoperations(CONOPS),Operations Orders(OPORD) orFragmentary Orders(FRAGOs)S or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)Mark for ManualRelease (MR) anddeclassification 24 hrsafter the eventMark for ManualRelease (MR) anddeclassification 24 hrsafter the eventMark for ManualRelease (MR) anddeclassification 24 hrsafter the eventMark for ManualRelease (MR) anddeclassification 24 hrsafter the eventDeclassify uponcompletion ofmovement ortermination ofoperations (MR)Declassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation (MR)I-21.4 (a) UNCLASSIFIED afterthe info has beensanitized of specificunit, friendly casualties,battle damage, and othersensitive information.DO NOT reveal detailsof IED attacks such asinsurgent tactics andtheir effectiveness1.4 (a) Details on how IED wasdiscovered CANNOTbe automaticallydeclassified. DO NOTreveal, details ofCoalition Forces IEDcountermeasures1.4 (a) UNCLASSIFIED afterthe info has beensanitized of specificunit, friendly casualties,battle damage, and othersensitive information.1.4 (a) Details of casualtieslinked to specific IEDsor attacks, to includelocation or timeframeCANNOT beautomaticallydeclassified.1.4 (a) Code words/missionnicknames areUNCLASSIFIED whennot associated withmission details1.4 (a) An FDO may discloseor release information tothe HN when requiredto perform a mission.The timing shouldmaximize training &planning, but minimizeoperational risk.INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKS


R 380-<strong>14</strong>REVEALING13. Specificcomponents orMSCs‟ goals, aimsor intentions<strong>14</strong>. Movement ofammunition,aircraft, personnel,units, or commequipment15. Date and timemission/operationbegins16. Time lines/schedulesS or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)S or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation (MR)Declassify uponcompletion ofmovement ortermination ofoperations (MR)Declassify uponcompletion ofmovement ortermination ofoperations (MR)Declassify 10 yearsfrom date info isclassified or uponexecution of operation(MR)I-31.4 (a)1.4 (a) An FDO may discloseor release to the HNwhen required toperform a mission. Thetiming should maximizetraining & planning, butminimize operationalrisk. J3-O maydowngrade to meetoperationalrequirements or provideaccess to thisinformation to necessarysupport personnel afterassessing operation risk.1.4 (a) An FDO may discloseor release to the HNwhen required toperform a mission. Thetiming should maximizetraining & planning, butminimize operationalrisk.1.4 (a) FDO may disclose orrelease timelines to HNwhen required toperform a mission. Thetiming should maximizetraining & planning, butminimize operationalrisk. J3-O maydowngrade to meetoperationalrequirements or provideaccess to informationnecessary to supportpersonnel afterassessing operationalrisk.INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING17. Specific S or S//REL (as Declassify 10 years 1.4 (a) FDO may disclose or


R 380-<strong>14</strong>locations, grids, orgeo-coords to beusedappropriate)from date info isclassified or uponexecution of operation(MR)release timelines to HNwhen required toperform a mission. Thetiming should maximizetraining & planning, butminimize operationalrisk. J3-O maydowngrade to meetoperationalrequirements or provideaccess to informationnecessary to supportpersonnel afterassessing operationalrisk.18. Implementingconditions anddecision pointsS or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation (MR)1.4 (a) FDO may release to HNwhen required toperform a mission. Thetiming should maximizetraining & planning, butminimize operationalrisk.19. Operationspecific rules ofengagement (ROE)S or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified or uponexecution of operation(MR)1.4 (a) General theater ROEstatements and ROEcards are unclassified.ROE may have to besanitized before release.20. Operationalcapabilities/shortfallsS or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified1.4 (g)21. Operationreadiness (alert)time (i.e.emplacement,loading, firing, QRFdispatch times, etc.)S or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified or uponexecution of operation(MR)1.4 (a)INFORMATIONREVEALING22. SpecificoperationalinformationCLASSIFICATION DECLASSIFICATION REASON REMARKSU or S or S//REL(as appropriate)Declassify 10 yearsfrom date info isclassified; or uponexecution of operationI-41.4 (a) UNCLASSIFIED if theinfo: 1) describes a pastevent and is expressedin generic terms, 2)


R 380-<strong>14</strong>(MR) see commentprovides no indicatorsof potential future ops,3) does not providespecific locations, unitdata, TTPs, capabilities,or source info 4) doesnot embarrass anyCoalition members, 5)does not violate any ofthe above if releasedover time or incompilation23. Overall forcestructure with totalpersonnel strengthfigures andpercentage ofpersonnel fillsU or C//REL (asappropriate)Declassify 10 yearsfrom date info isclassified1.4 (a) Strength of all deployedforces isCONFIDENTIAL;Individual unit strengthis UNCLASSIFIED24. Techniques,limitations, andeffectiveness ofpsychological opsS or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified1.4 (a) Releasable only toparticipants with a strict“Need to Know”25. Supporting Inteland counter Intelplans/operationsS or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified1.4 (a)1.4 (g)Releasable only toparticipants with a strict“Need to Know”26. Fratricide issues U or S or S//REL(as appropriate)Public release authorityrests with componentcommanders1.4 (a)27. Accident andsafety dataUShould only bedistributed toComponents and non-Coalition countriesonly with a strict“Need to Know1.4 (a)INFORMATIONREVEALING28. Targetingmethodology andtarget selectionprocessCLASSIFICATION DECLASSIFICATION REASON REMARKSS or S//REL (asappropriate)Declassify 10 yearsfrom date info isclassified29. Command U UNCLASSIFIED 1.4 (a)I-51.4 (a) Releasable only toparticipants with a strict“Need to Know”


R 380-<strong>14</strong>relationships,agreements andMOU.30. EffectsSynchronizationCommittee (ESC)Briefing Slides,EffectsSynchronizationWorking Groupagenda & Postmeeting notes31. Near real timefriendly forceposition, locationand identification(PLI) TRACKDATA DURINGCOMBATOPERATION.INFORMATIONREVEALING32. Friendly ForcePosition, Locationand Identification(PLI) Data duringHumanitarianAssistanceOperations.SS//REL TO USA,ACGUS//REL TO USA,GCTFS//NOFORNSunless classified IAW“Specific details ofCoalition plans” aboveDeclassify 10 yearsfrom date info isclassified10 yrs or at theconclusion of theoperation (i.e. OPLANCOMPLETED).Combat operations isan environment inwhich the unauthorizeddisclosure of friendlyforces near-real time(NRT) position,location andidentification datawould place our forcesand national security atrisk.1.4 (g)1.4 (d) Classification dependson target audience.1.4 (g) In a hostile environmentthe systems must becapable of protectingBlue Force TrackingData (to includeCoalition Partners) to alevel merited byclassification.USCENTCOM is theOCA for Friendly ForcePosition, Location, andIdentification (PLI) datawithin its AOR.However, Commandermay downgrade to meetoperational requirementor to provide access tothis information topersonnel. On need-tonowinformation that aprospective recipientrequires access tospecific classifiedinformation in order toperform or assist in alawful and authorizedgovernmental function.CLASSIFICATION DECLASSIFICATION REASON REMARKSU(FOUO)Upon movementcompletion ortermination ofoperation.1.4 (g) In a non-hostileenvironment, theposition, location andidentification (PLI) offriendly force data willnormally beUnclassified. However,I-6


R 380-<strong>14</strong>the data must beprotected in accordancewith FIPS-<strong>14</strong>0-2.1.4 (g) U.S. Forcesparticipation inconsequencesmanagement Operationswill normally beunclassified. However,the nature of the eventor U.S. Forcesparticipation mayrequire participation andposition, location anidentification data to beclassified33. ConsequenceManagement ofFriendly ForcePosition, Locationand Identification(PLI) Data.U or up to S10 yrs ifdata/Informationdeemed classified.The unauthorizeddisclosure of U.S.participation in certainconsequencesmanagement operationmay cause damage toU.S. National Securityby revealing sources,methods andcapabilitiesI-7


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKI-8


APPENDIX JR 380-<strong>14</strong>STRATEGIC DEPLOYMENT (CCJ3-S)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. C-Date/calendardate associationS3 years aftercompletion1.4(a)2. Concept ofoperationsS 1 year after completion 1.4(a) Confidential uponexecution3. Exercise name S Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HN4.Exercise/operationlocation5.Exercise/operationname associatedwith host nation(HN)6. exercise/operationname associatedwith participatingunits7. Operation codewords8. Participation of aspecific individualin operation orexercise9. Participatingunits, includingtype, vulnerabilities,locations, quantities,readiness status,deployments,redeployments, anddetails of movementof U.S. and friendlyforces in operation10. Units/HNassociationS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) /1.4(d)If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS 1 year after completion 1.4(a) Confidential uponexecutionU N/A N/ASUpon execution orfollowing release bynational commandauthorities, whicheveris sooner1.4(a)S 1 year after completion 1.4(a)1.4(d)If classification/declassificationinstructions are notspecified by JCS/HNConfidential uponexecutionJ-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKJ-2


APPENDIX KR 380-<strong>14</strong>LOGISTICS AND ENGINEERING (CCJ4)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. Analysis andimpact of allUSCENTCOMAORsS/REL/FVEY Upon completion ofmission1.4(d) /1.4(g)Negotiations ofconstruction projects,AIK, customs issues, etc2. Bilateral OPLANexecution logisticsand supportrequirements withAOR partners3. Characteristics ofU.S. weapons andrelated sustainability4.Deployment/redeployment of units5. Force protectionthreat analysis6. JA1 fuelinventoryC10 years or uponcompletion of project,whichever is soonerK-11.4(a) /1.4(d)S 10 years 1.4(a) May be classified higherupon direction of anOCASSSUpon completion ofmission or followingrelease by nationalcommand authorities,whichever is soonerUpon completion ofmission10 years or uponcompletion of mission,whichever is sooner7. MOBSTR-B S Upon completion ofmission8. Movement ofammunition,aircraft, personnel,units, orcommunicationsequipment9. Movement ofsensitive or criticalsupplies/personnel10. Number ofaircraft in AORINFORMATIONREVEALINGSSSUpon completion ofmissionUpon completion ofmissionUpon completion ofmission1.4(a) /1.4(g)1.4(g)1.4(g)1.4(g)1.4(a) /1.4(g)1.4(a) /1.4(g)1.4(g)May be classified higherupon direction of theCCJ4/7 OCAIncludes intelligenceefforts and threatweaponsClassified wheninventory is related todays of war supplyLocation/ capabilities ofrelay system for U2May be classified higherupon direction of anOCAMay be classified higherupon direction of theCCJ4/7 OCACoalition aircraft report(If classification/declassificationinstructions are notspecified by JCS/HN)CLASSIFICATION DECLASSIFICATION REASON REMARKS


R 380-<strong>14</strong>11. Proposed U.S.positions or strategyof negotiations12. War reservestockage dataS/REL/FVEYUpon completion ofmission1.4(a) /1.4(d)S/REL/FVEY 10 years 1.4(a) /1.4(g)Negotiations ofconstruction projects,assistance in kind(AIK), customs issues,etc.K-2


APPENDIX LR 380-<strong>14</strong>STRATEGY, PLANS, AND POLICY (CCJ5)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. Beddown sites S 10 years or upon plan 1.4(a)execution, if executed2. Capabilities-basedmunitionsrequirementsS 10 years 1.4(a)3.Chemical/biologicalweapons andproliferation plans4. Command andcontrol relationships5. Commander'sintent6. Deception plansfor operations7. Defended assetslist (DAL)8. Essential elementsof friendlyinformation (EEFI)S 10 years 1.4(a) /1.4(h)U N/A N/AS 10 years 1.4(a) Confidential upon planexecutionTS 10 years 1.4(a)S 10 years 1.4(a)S 10 years 1.4(a) Complete detailed list9. Force lists S 10 years 1.4(a) Confidential10. HN participation S 10 years or upon planexecution, if executed1.4(a) /1.4(b)11. Joint monthly S 10 years 1.4(a)readiness review(JMRR)13. Location anddesignation ofUSCENTCOMrepresentativesU N/A N/A<strong>14</strong>. MissionstatementsS 10 years 1.4(a) Confidential upon planexecution15. NBC operations S 10 years 1.4(a)1.4(h)16. Plan briefs S 10 years 1.4(a)17. Plan phasing S 10 years 1.4(a)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKSL-1


18. Planningdirectives19. Planningmilestones, internalsuspense dates20. Rules ofengagement21. Strategicconcepts22. TPFDD planidentifiers, except:23. Aggregatetonnage/pax24. U.S. unit nameand destinationcombined25. U.S. unit namewith EAD/LAD26. U.S. unit namewith UIC/ULN27. ULN anddestination28. ULN andEAD/LAD29. Origin, UIC, andULNINFORMATIONREVEALING30. Flight plans forlogistics supportR 380-<strong>14</strong>S 10 years 1.4(a) Confidential upon planexecutionU N/A N/AS10 years or upon plan 1.4(a)execution, if executedS 10 years 1.4(a)S Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNU N/A N/AS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HNCLASSIFICATION DECLASSIFICATION REASON REMARKSS Upon execution 1.4(a) If classification/declassificationL-2


31. War Plan Shorttitle (Number)displayed with LongTitle , nickname,name of country ordisplayed with animage or graphic ofthe country relatedto the plan32. War plan shorttitle or long titlestanding aloneSDeclassify 10 yearsfrom date info isclassifiedMay be manuallyreviewed after planexecutionU N/A N/AR 380-<strong>14</strong>instructions are notspecified by JCS/HN1.4 (a) Any linkage of a WarPlan Number to thecountry it addresses isclassified SecretSensitive planningefforts may be classifiedhigher by direction ofthe OCAL-3


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKL-4


APPENDIX MR 380-<strong>14</strong>DELIBERATE WAR PLANS (CCJ5-P)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Characteristics ofU.S. weapons andrelated sustainability2. Communicationseffectiveness,sustainability,limitations3. Concept ofoperations includingorder of battle,executioncircumstances,operating locations,resources required,tactical maneuvers,deployments, actionand objectives4. DEFCONmeaning and statusS 10 years 1.4(a) May be classifiedhigher upon directionof an OCAS 10 years 1.4(a)S 10 years 1.4(a) Confidential uponplan executionS 10 years 1.4(a)5. SynchronizationmatricesS 10 years 1.4(a)6. Plan(s) timelines S 10 years 1.4(a)7. Flexible deterrentoptionsS 10 years 1.4(a)8. Estimates ofoperationaleffectiveness ofintelligence,counterintelligence,rescue, andreconnaissanceS 10 years 1.4(a)9. Limitations andvulnerabilities ofU.S. forces in thecombat areaINFORMATIONREVEALINGS 10 years 1.4(g)CLASSIFICATION DECLASSIFICATION REASON REMARKSM-1


10. Location,itineraries, andtravel modes of keyU.S. and friendlymilitary and civilianleaders11. Nuclearweapons; potentialuse of12. Operation codewords13. Participatingunits, includingtypes,vulnerabilities,locations, quantities,readiness status,deployments,redeployments, anddetails of movementof U.S. friendlyforcesR 380-<strong>14</strong>S 10 years 1.4(a) Confidential uponexecution of VIPtravelS 10 years 1.4(a)1.4(h)S 10 years 1.4(a)S 10 years 1.4(a) Confidential uponplan execution<strong>14</strong>. Planclassification guide15. Planningassumptions16. Status anddetails of U.S.alliances, includingstatus of forces,deployment rights,privileges, airfielduse, and portavailabilityCS10 years or upon planexecution, if executed10 years or upon planexecution, if executedM-21.4(a)1.4(a)S 10 years 1.4(a)1.4(d)17. Friendly centers S 10 years 1.4(a)of gravity18. War termination S 10 years 1.4(a)objectives19. End state of plan S 10 years 1.4(a)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS20. Target areaweather informationS10 years or upon planexecution, if executed1.4(a)


21. Top secretoptions; discussionof22. Limitations andvulnerabilities ofU.S.TS 10 years 1.4(a)S 10 years 1.4(g)R 380-<strong>14</strong>M-3


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKM-4


APPENDIX NR 380-<strong>14</strong>COMMAND AND CONTROL, COMMUNICATIONS, AND COMPUTER SYSTEMS (CCJ6)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Communicationsnetworks, users,frequencies, callsigns, HJ times, andidentification of netcontrol stations2. COMSECincidents/violationsC//REL (asappropriate)CDeclassify 10 yearsfrom date info isclassifiedDeclassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation1.4(a)1.4(g)May require higherclassificationdepending upon thesystem. Disclosurewill facilitate enemydisruption of C2capabilities1.4(g) Per E.O. 13526,releasable only afterManual Review.Disclosure wouldease the exploitationof the individualnetworks3. Composite list ofCOMSEC shorttitlesCDeclassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation1.4(c) Per E.O. 13526,releasable only afterManual Review.Disclosure wouldease the exploitationof the individualnetworks4. Cryptology S 10 years 1.4(c)5. Communicationoutages that degradecommand andcontrol capabilityS//REL TO USA,GCTFDeclassify 10 yearsfrom date info isclassified or can bemarked upon executionof operation1.4(g)Releaseabilitydependant on theater;Per E.O. 13526,releasable to ISAF /NATO on manualreview. Disclosurecould provideassessment of hostileactions that may havecaused the outage.6. Computer (SIPR, U//FOUO N/A N/AGCCS, CENTRIXS,NIPR) User IDINFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSN-1


R 380-<strong>14</strong>REVEALING7. Scheduled downtimes ofcommunicationssystems8. Computer (SIPR,GCCS, CENTRIXS,NIPR) Password9. Specific locationsof deployedcommunicationsunits10. Specific locationor countries plannedfor employment ofelements of SWAextensions to theDefense InformationCommunicationsAgency GlobalInformation Grid orTheater InformationGridS//REL TO USA,GCTFS/orS//REL TO USA,GCTFC//RELTO USA, GCTFC//REL TO USA,GCTFDeclassify 10 yearsfrom date info isclassified or can bemarked upon executionof operationDeclassify 10 yearsfrom date info isclassified or can bemarked upon executionof operationUpon redeploymentUpon redeployment1.4(g)1.4(a)1.4(a)1.4(g)1.4(a)1.4(g)Releaseabilitydependent on theater;Per E.O. 13526,releasable to ISAF /NATO on manualreview. Disclosurecould provideassessment of anindividual node‟simportance in thenetwork.Releasable toindividual user only;Dependent onclassification ofcomputer system.Disclosure will allowunauthorized accessto computer system.Releaseabilitydependent on theater;Per E.O. 13526,releasable to ISAF /NATO on manualreview. Disclosurecould provideassessment of anindividual node‟simportance in thenetworkReleaseabilitydependent on theater;Per E.O. 13526,releasable to ISAF /NATO on manualreview. Disclosurecould provideassessment of anindividual node‟simportance in thenetworkINFORMATIONREVEALING11. Specificlocations orCLASSIFICATION DECLASSIFICATION REASON REMARKSS 10 years 1.4(d)N-2


R 380-<strong>14</strong>countries in whichUSCENTCOM JointC4 TheaterInformation Grid(TIG)are employed12. Specificlocations ofdeployedcommunicationsunitsS//REL TO USA,GCTFUpon redeployment1.4(a)1.4(g)Ability to releasedepends on theater;Per E.O. 13526,releasable to ISAF /NATO on manualreview. Disclosurecould provideassessment of anindividual node‟simportance in thenetwork13. Details revealingforce locations, bytype, for war planemployment ofCENTCOMcontrolledcommunicationsassetsS//REL TO USA,GCTFUpon redeployment1.4(c)1.4(g)Ability to releasedepends on theater;Per E.O. 13526,releasable to ISAF/NATO on manualreview.Disclosure couldprovide assessmentof an individualnode‟s importance inthe network<strong>14</strong>. Specificlocations orcountries in theAOR in whichcommunicationequipment isidentified assupporting theUSCENTCOM JointC4 TheaterInformation GridINFORMATIONREVEALING15. Identification ofan operationalshortfall orlimitation In war-S 10 years 1.4(d)CLASSIFICATION DECLASSIFICATION REASON REMARKSS Upon correction 1.4(g)N-3


R 380-<strong>14</strong>fighting capabilitiesof USCENTCOMJoint C4 TheaterInformation Grid(TIG).16. Details of thecapability requiredto achieve the initialoperationalcapability ofUSCENTCOM JointC4 TIG.SUpon full operationalcapability1.4(g)17. A description ofthe USCENTCOMJoint C4 TheaterInformation Grid(TIG)system anddetails of thecapability requiredto achieve fulloperationalcapability18. A description ofthe composition of aUSCENTCOM JointC4 TheaterInformation Grid(TIG)node at fulloperationalcapability19. Characteristicsof theUSCENTCOM JointC4 TheaterInformation Grid(TIG).INFORMATIONREVEALING20. Cost/Budget dataon theUSCENTCOM JointC4 TheaterInformation Grid(TIG).U//FOUO N/A N/A Description includesdiagrams or drawingsdepicting the detailsof deployed systems.U//FOUO N/A N/A Description includesdiagrams or drawingsdepicting the detailsof deployed systems.U N/A N/ACLASSIFICATION DECLASSIFICATION REASON REMARKSU N/A N/AN-4


R 380-<strong>14</strong>21. Identification ofthe agenciesresponsible for thevarious aspects ofsystem acquisition,implementation,operation, andmaintenance22. Requiredcapability dates,initial operationalcapability, and fulloperationalcapability datesU N/A N/AS Upon execution 1.4(a) If classification/declassificationinstructions are notspecified by JCS/HN23. Frequencies lists U N/A N/A24. Contingency andOperational JointCommunicationsElectronicsOperatingInstructions (JCEOI)25. Frequency listsused in the AORassociated with thelocation/coordinates,date/times of use,operating units, anddetailed purpose ofthe frequency(Example: ForceProtection Net)S When superseded 1.4(a) Unclassified fortraining within theU.S. Releasable toMNF when part ofCoalitionS When superseded 1.4(a) Releasable to MNFwhen part of theCoalition. List offrequencies alone areUnclassifiedINFORMATIONREVEALING26. Frequency listsused in the AORrequired forcoordination withthe host nation mayonly be associatedwith thelocation/coordinates,date/times of use ofCLASSIFICATION DECLASSIFICATION REASON REMARKSU N/A N/A Information requiredto be released isconsidered FOUO(DOD 5400.7-R)N-5


R 380-<strong>14</strong>the frequency(Example: LandMobile RadioCommunications)27. Joint RestrictedFrequency Listings(JRFL)S When superseded 1.4(a) /1.4(c)Releasable to MNFwhen part of theCoalition.Determined byCommand ElectronicWarfare Officer(EWO)N-6


APPENDIX OR 380-<strong>14</strong>EXERCISE & TRAINING (CCJ7)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALINGExercises (CCJ7) Separateclassificationguidance shall beissued by CCJ7 forexercises. CCJ7 willissue a by-countryyearly guide or aguide for eachspecific exercise. Forfurther information,contact CCJ7O-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKO-2


APPENDIX PR 380-<strong>14</strong>ANALYSIS & REQUIREMENTS (CCJ8-AR)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Supporting dataand products ofanalysis of theJoint Planning andExecution Systemrelating toUSCENTCOMplans or operationsS 10 years 1.4(a) May be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCA2. Supporting dataand products ofanalysis ofscientific,technological, oreconomic mattersrelating toUSCENTCOMplans or operationsS 10 years 1.4(e) May be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCA3. Supporting dataand products ofanalysis identifyingvulnerabilities orcapabilities ofsystems,installations,infrastructures,projects, plans, orprotection servicesrelating toUSCENTCOMplans or operationsS 10 years 1.4(g) May be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCA4. RequirementsdocumentsidentifyingUSCENTCOMfuture operationalneedsS 10 years 1.4(a)1.4(b)1.4(e)1.4(g)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKSP-1


R 380-<strong>14</strong>5. Documentsidentifying UrgentOperational Needs(UON) or JointUrgent OperationalNeeds (JUON)6. Data files, plansfiles, and productsof modeling andsimulation insupport ofUSCENTCOMWar Plandevelopment7. Supporting dataand assessments ofthe TheaterCampaign Plan,Campaign Plans,Major Operations8. Supporting dataand productsrelating to themunitionsrequirementsprocess in supportof theUSCENTCOMTheater Strategy.S 10 years 1.4(a)1.4(c)1.4(e)1.4(g)S 10 years 1.4(a)1.4(b)1.4(c)1.4(g)S 10 years 1.4(a)/1.4(b)/1.4(g)May be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCAMay be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCAMay be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCAS 10 years 1.4(a)/ May be classifiedhigher or lower if itincorporatesinformation of ahigher or lowerclassification orupon direction of anOCAP-2


APPENDIX QR 380-<strong>14</strong>SCIENTIFIC ADVISOR (CCJ8-ST)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. Vulnerabilities ofnew militarytechnologiesS10 years or uponcorrection, if corrected1.4(e)1.4(g)2. New operationalconcepts based onapplication of newtechnologies3. Requirementsdocumentsidentifying criticalmilitarydeficienciesS 25 years 1.4(e)S 10 years 1.4(g)Q-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKQ-2


APPENDIX RR 380-<strong>14</strong>COMMAND GROUP (CCCC)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALING1. Detailed travelitinerary ofUSCENTCOMCommanderSUpon completion oftravel1.4(a)1.4(g)Classified wheninformation revealsname/title associatedwith dates/times orlocations2. Detailed travelitineraries ofGeneral/Flagofficers and civilianequivalentSUpon completion oftravel1.4(a)1.4(g)Classified wheninformation revealsname/title associatedwith dates/times orlocationsR-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKR-2


APPENDIX SR 380-<strong>14</strong>CENTCOM DEPUTY COMMANDER – THEATER TRAVEL COORDINATION CELL(CCDC-TTCC)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Countryclearance requestsU N/A N/A Will becomeclassified if specificclassified informationis included (e.g.,detailed travelitineraries ofgeneral/flag officers,etc.)S-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKS-2


APPENDIX TR 380-<strong>14</strong>COMMUNICATION INTEGRATION (CCCI)INFORMATION CLASSIFICATION DECLASSIFICATION REASON REMARKSREVEALINGPublic affairscontingencystatementU N/A N/AT-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKT-2


APPENDIX UR 380-<strong>14</strong>PROVOST MARSHAL (JSD)INFORMATIONREVEALINGCLASSIFICATION DECLASSIFICATION REASON REMARKS1. Deployment /redeployment ofsecurityaugmentationtroops whencombined withdates and/orlocations2. Enemy prisonerof war (EPW)information thatreveals locations ofunits or EPWcamps; unitstrength and/ormilitarycapabilities; ornumber of EPWs3. Physical securityvulnerabilities andvulnerability toterrorist attackU N/A 1.4(a)1.4(g)SSUpon completion ofoperation/ hostilitiesUpon correction orafter 5 years ifuncorrected1.4(a)1.4(c)1.4(g)1.4(g)4. Threat condition U N/A N/A5. Detailed terroristthreatlevel/condition6. General terroristthreat information7. Vulnerabilityassessments andtrends8. Purchase requestpackageC 10 years 1.4(a)1.4(g)Classified only duringperiods of increasedthreat; Included arenumbers of personnel,dates, and locations.May be classifiedhigher upon directionof an OCAU N/A N/A All terrorist threatinformation mustcontain unclassifiedtear line for widestdisseminationS 10 years 1.4(g) May be declassifiedupon resolution of allvulnerabilities withouta waiverU N/A N/A For Official Use OnlyU-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKU-2


APPENDIX VR 380-<strong>14</strong>Electronic SweepsINFORMATIONREVEALING1. Generalinformation notrevealing anydetails2. Specificinformationrevealing daterange and area tobe swept3. Target areaweatherinformation4. Top secretoptions; discussionofCLASSIFICATION DECLASSIFICATION REASON REMARKSC 10 years See AFI 71-19 forstrict need-to-knowguidanceSS10 years10 years or upon planexecution, if executed1.4(a)TS 10 years 1.4(a)V-1


R 380-<strong>14</strong>THIS PAGE INTENTIONALLY LEFT BLANKV-2


APPENDIX WR 380-<strong>14</strong>Equivalent Foreign Security ClassificationsCountry TOP SECRET SECRET CONFIDENTIAL OTHERAlbania TEPER SEKRET SEKRET IMIREBESUESHE I KUFIZUARArgentina ESTRICTAMENT SECRETO CONFIDENCIAL RESERVADOE SECRETOAustralia TOP SECRET SECRET CONFIDENTIAL RESTRICTEDAustria STRENG GEHEIM GEHEIM VERSCHLUSSBalkansBelgium(French)STROGOPOVERLJIVOState SECRETDRZAVA TAJNATAJNO MilitarySECRET VOJNATAJNAPOVERLJIVOTRES SECRET SECRET CONFIDENTIEL DIFFUSIONRESTREINTS(Flemish) ZEER GEHEIM GEHEIM VERTROUWELIJKBoliviaSUPERSECRETOor MUY SECRETOSECRETOCONFIDENCIALRESERVADOBEPERTKEVERSPREIDINGBrazil ULTRA SECRETO SECRETO CONFIDENCIAL RESERVADOBulgaria STROGOSEKRENTOSEKRETEN/SEKRETNOPOVERITELEN/OVERITELNOOGRANICHE (as inLimited)NEPOZVOLEN(Illicit) ZABRANEN(Forbidden)Cambodia TRES SECRET SECRET SECRET/CONFIDENTIELCanada TOP SECRET SECRET CONFIDENTIAL RESTRICTEDChile SECRETO SECRETO RESERVADO RESERVADOColumbia ULTRASECRETO SECRETO RESERVADO CONFIDENCIALRESTRINGIDOCosta Rica ALTO SECRETO SECRETO CONFIDENCIALCroatiaNAJVECITAJNI POVERLJIV OGRANCIENTAJNITAJNIDenmarkYDERSTHEMMELIGTHEMMELIGT FORTROLIGT TILTJENESTEBRUGEcuador SECRETISIMO SECRETO CONFIDENCIAL RESERVADOEl Salvador ULTRA SECRETO SECRETO CONFIDENCIAL RESERVADOEthiopia YEMIAZ BIRTOU MISTIRKILKILMISTIRCountry TOP SECRET SECRET CONFIDENTIAL OTHERW-1


R 380-<strong>14</strong>FinlandERITTAINSALAINENFrance TRES SECRET SECRETDEFENSEW-2CONFIDENTIELDIFFUSIONRESTREINTEGermany STRENG GEHEIM GEHEIM VERTRAULICHGreece AKP/ AOPPHTON AOPPHTON EMITEYTIKON EPIPIMENH XPHEGuatemala ALTO SECRETO SECRETO CONFIDENCIAL RESERVADOHaiti SECRET CONFIDENTIALHonduras SUPER SECRETO SECRETO CONFIDENCIAL RESERVADOHong Kong TOP SECRET SECRET CONFIDENTIAL RESTRICTEDHungary SZIGOR'UANTITKOSTITKOSBIZALMASIceland ALGJORTI TRUNADARMALIndia TOP SECRET SECRET CONFIDENTIAL RESTRICTEDIndonesia SANGATRAHASIA TERBATASRAHASIAIran BENKOLI SERRI SERRI KHEILIMAHRAMANEHIraq (EnglishTranslation)Ireland (Gaelic)ABSOLUTELYSECRETAN-SICREIDEACHSECRETLIMITEDSICREIDEACH RUNDA SRIANTAIsrael SODI BEYOTER SODI SHAMUR MUGBALItaly SEGRETISSIMO SEGRETO RISERVATISSIM RISERVATOOJapan KIMITSU GOKUHI HI TORIATSUKAICHUIJordanMAKTUM MAKTUM SIRRI MAHDUDJIDDANKazakhstanUse Russian equiv.Korea KUP PI MIL KUP PI MIL KUP PI MILKyrgyzstanUse Russian equiv.Laos TRES SECRET SECRET SECRET/CONFIDENTIELLebanon TRES SECRET SECRET CONFIDENTIELMoldovan (Mayuse RussianEquiv.)ULTRASECRET SECRET CONFIDENTIALSECRETDIFFUSIONRESTREINTERESTRINSMexico ALTO SECRETO SECRETO CONFIDENCIAL RESTRINGIDOCountry TOP SECRET SECRET CONFIDENTIAL OTHERNetherlands ZEER GEHEIM GEHEIM CONFIDENTIEELVERTROUWELIJDIENSTGEHEIM


R 380-<strong>14</strong>KNew Zealand TOP SECRET SECRET CONFIDENTIAL RESTRICTEDNicaragua ALTO SECRETO SECRETO CONFIDENCIAL RESERVADONorway STRENGT HEMMELIG KONFIDENSIELL BEGRENSETHEMMELIGPakistan TOP SECRET SECRET CONFIDENTIAL RESTRICTEDParaguay SECRETO SECRETO CONFIDENCIAL RESERVADOPeruESTRICTAMENT SECRETO CONFIDENCIAL RESERVADOE SECRETOPhilippines TOP SECRET SECRET CONFIDENTIAL RESTRICTEDPolandTAIJNYSPECJALNEGOTAJNYPOUFNYPortugal MUITO SECRETO SECRETO CONFIDENCIAL RESERVADORomanian ULTRASECRET SECRET CONFIDENTIAL RESTRINSOR SECRETRussian COBEOWEHHO CEKPETHOSaudi Arabia SAUDI TOP SAUDI VERYSECRETSECRETSpainSweden (RedBorders)MAXIMOSECRETOHEMLIGW-3SAUDI SECRETSAUDIRESTRICTEDSECRETO CONFIDENCIAL DIFFUSIONLIMITADAHEMLIGSwitzerland (Three languages. TOP SECRET has a registration number to distinguish it from SECRET ANDCONFIDENTIAL)Taiwan (No translation in English characters)Tajikistan (Use Russian equivalent)Thailand LUP TISUD LUP MAAG LUP POK PIDTurkey COK GIZLI GIZLI OZEL HIZMET OZELTurkmenistan (Use Russian equiv.)UkraineTSILKOMSEKRETNESEKRETNOKONFIDENTSIAL'NODLYASouth Africa TOP SECRET SECRET CONFIDENTIAL RESTRICTEDAfrikaans UITERS GEHEIM GEHEIM VERTROULIK BEPERKEgypt) TOP SECRET VERY SECRET SECRET OFFICIALUnited Kingdom TOP SECRET SECRET CONFIDENTIAL RESTRICTEDCountry TOP SECRET SECRET CONFIDENTIAL OTHERUruguay ULTRA SECRETO SECRETO CONFIDENCIAL RESERVADOUzbekistan (Use Russian equivalent)Vietnam TRES SECRET SECRET CONFIDENTIEL DIFFUSION


R 380-<strong>14</strong>DEFENSE DEFENSE RESTREINTE(Vietnamese) TOI-MAT MAT KIN TU MATNote: The classifications given above represent the nearest comparable designation that are used to signifydegrees of protection and control similar to those prescribed for the equivalent U.S. classification.W-4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!