Members are also debriefed and required to
sign a Security Termination Statement (fig. 9-2)
if they inadvertently gain access to information
they arent qualified to receive.
The debriefing should clearly stress the following
security precautions:
1.
2.
3.
4.
5.
Personnel are to return all classified
materials in their possession.
Personnel are no longer eligible for access
to classified information.
Personnel may never divulge classified
information; orally or in writing, to any
unauthorized person or in judicial, quasi-
judicial, or administrative proceedings
without first receiving written permission
from OP-09N.
Personnel may receive severe penalties for
disclosure.
Personnel are to report to NIS any attempt
by an unauthorized person to solicit
classified information. (Any attempts are
reported to the FBI or nearest DOD
component if personnel are no longer
affiliated with the Department of the
Navy.)
When a clearance is being revoked, a person
occasionally may refuse to sign the Security
Termination Statement during the debriefing. If
that happens, stress that the refusal to sign doesnt
change the persons obligation to protect classified
information from unauthorized disclosure. Send
a copy of the termination statement, which shows
that the person refused to sign the statement, to
OP-09.
COMPROMISE AND OTHER
SECURITY VIOLATIONS
Two types of security violations occur. One
involves the compromise or possible compromise
of classified information. The other involves a
violation of security regulations, but does not
involve a compromise.
Compromise is the disclosure of classified
information to a person who is not authorized
access to that information. The unauthorized
disclosure may have occurred knowingly, willfully,
or through negligence. Conclusive evidence that
classified information has been disclosed to an
unauthorized person confirms the existence of a
compromise.
Discovery of Compromise
If you discover a compromise of classified
material, you should regain custody of the
material, if possible, and give it the proper
protection. Then notify NIS, who may begin an
investigation independent of command inquiries.
PRELIMINARY INQUIRY. A preliminary
inquiry will be conducted when classified infor-
mation has been compromised or subjected to
compromise. The inquiry should be completed
quickly, usually within 2 or 3 days.
Every effort should be made to keep the
inquiry Unclassified.
The occurrence of a
compromise does not necessarily require a
classified inquiry.
The inquiry may reveal that the compromise
presents a minimal risk. If you find no signifi-
cant command security weaknesses, you do not
have to take formal disciplinary action. In such
cases, send the report of preliminary inquiry, by
endorsement, to the next senior in the admin-
istrative chain and who has Top Secret classifica-
tion authority.
JUDGE ADVOCATE GENERAL (JAG)
MANUAL INVESTIGATION. A JAG Manual
investigation is an administrative investigation
based on chapters II through VI of the Manual
of the Judge Advocate General. The command
having custodial responsibility for the material
compromised convenes the investigation. The
purpose of a JAG Manual investigation is to
answer, in detail, questions about the who, what,
where, when, and why of the security violation.
The JAG Manual investigation gives the command
an opportunity to make a critical review of its
security posture.
Other Security Violations
The commanding officer may act without
reporting to higher authority on a violation of a
security regulation not resulting in compromise
or subjection to compromise. However, the
commanding officer must ensure that type of
security violation is investigated just as thoroughly
as one resulting in a compromise because it
shows a weakness within the security program.
Commanding officers may decide if the occurrence
of that security violation justifies some form of
corrective action. The possibility of persons
receiving disciplinary action for that type of
violation is just as great as it is for a violation
9-11