Members are also debriefed and required tosign a Security Termination Statement (fig. 9-2)if they inadvertently gain access to informationthey aren’t qualified to receive.The debriefing should clearly stress the followingsecurity precautions:1.2.3.4.5.Personnel are to return all classifiedmaterials in their possession.Personnel are no longer eligible for accessto classified information.Personnel may never divulge classifiedinformation; orally or in writing, to anyunauthorized person or in judicial, quasi-judicial, or administrative proceedingswithout first receiving written permissionfrom OP-09N.Personnel may receive severe penalties fordisclosure.Personnel are to report to NIS any attemptby an unauthorized person to solicitclassified information. (Any attempts arereported to the FBI or nearest DODcomponent if personnel are no longeraffiliated with the Department of theNavy.)When a clearance is being revoked, a personoccasionally may refuse to sign the SecurityTermination Statement during the debriefing. Ifthat happens, stress that the refusal to sign doesn’tchange the person’s obligation to protect classifiedinformation from unauthorized disclosure. Senda copy of the termination statement, which showsthat the person refused to sign the statement, toOP-09.COMPROMISE AND OTHERSECURITY VIOLATIONSTwo types of security violations occur. Oneinvolves the compromise or possible compromiseof classified information. The other involves aviolation of security regulations, but does notinvolve a compromise.Compromise is the disclosure of classifiedinformation to a person who is not authorizedaccess to that information. The unauthorizeddisclosure may have occurred knowingly, willfully,or through negligence. Conclusive evidence thatclassified information has been disclosed to anunauthorized person confirms the existence of acompromise.Discovery of CompromiseIf you discover a compromise of classifiedmaterial, you should regain custody of thematerial, if possible, and give it the properprotection. Then notify NIS, who may begin aninvestigation independent of command inquiries.PRELIMINARY INQUIRY. —A preliminaryinquiry will be conducted when classified infor-mation has been compromised or subjected tocompromise. The inquiry should be completedquickly, usually within 2 or 3 days.Every effort should be made to keep theinquiry Unclassified.The occurrence of acompromise does not necessarily require aclassified inquiry.The inquiry may reveal that the compromisepresents a minimal risk. If you find no signifi-cant command security weaknesses, you do nothave to take formal disciplinary action. In suchcases, send the report of preliminary inquiry, byendorsement, to the next senior in the admin-istrative chain and who has Top Secret classifica-tion authority.JUDGE ADVOCATE GENERAL (JAG)MANUAL INVESTIGATION. —A JAG Manualinvestigation is an administrative investigationbased on chapters II through VI of the Manualof the Judge Advocate General. The commandhaving custodial responsibility for the materialcompromised convenes the investigation. Thepurpose of a JAG Manual investigation is toanswer, in detail, questions about the who, what,where, when, and why of the security violation.The JAG Manual investigation gives the commandan opportunity to make a critical review of itssecurity posture.Other Security ViolationsThe commanding officer may act withoutreporting to higher authority on a violation of asecurity regulation not resulting in compromiseor subjection to compromise. However, thecommanding officer must ensure that type ofsecurity violation is investigated just as thoroughlyas one resulting in a compromise because itshows a weakness within the security program.Commanding officers may decide if the occurrenceof that security violation justifies some form ofcorrective action. The possibility of personsreceiving disciplinary action for that type ofviolation is just as great as it is for a violation9-11
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business