COMPROMISE OF CLASSIFIED MATTERAccording to SECNAVINST 5510.36, compromiseis An unauthorized disclosure of classified informationto one or more persons who do not possess a currentvalid security clearance. This means that material iscompromised if someone loses, steals, captures,salvages, or sees the material without being cleared. Thematerial is also compromised if a person who has seenthe material defects.The compromise of classified informationthreatens our national security. How much of a threat thecompromise is depends on the nature and classificationof the compromised material. If you know that materialis compromised or subject to compromise, report thefacts to your superiors right away. If you find classifieddocuments where they don’t belong, such as lying in thestreet or on a beach, turn the documents in to yoursuperior or to the nearest military activity. While thisdoesn’t seem possible, it has happened!A security violation is defined as any failure tocomply with the regulations for the protection andsecurity of classified material.If you find an unattended open or unlocked safe orcontainer in which classified material is stowed, asecurity violation has been committed. You must reportthe discovery immediately to the senior duty officer.Then, guard the material until the duty officer arrives.After inspecting the material, the duty officer will lockthe safe. If it’s believed that the material is or may havebeen compromised, the duty officer will have the personresponsible for the material make a detailed inventory.PERSONAL CENSORSHIPOne form of classified material that can’t bephysically safeguarded is the information you carryaround in your head. You are the only person who canprevent its disclosure. Be constantly on guard to preventrevealing classified information—either by talking orby writing.A World War II slogan that’s still effective is “Looselips sink ships.” Loose talk, even to a person who has thesame knowledge you have, may be overheard byunauthorized persons. All of us like to talk about ourships, our jobs, and our travels. However, when we do,we should be sure we don’t discuss classifiedinformation in our conversations.Loose talk in public places can be especiallydamaging. Intelligence agents are trained to collect bitsof seemingly harmless information. Putting all the bitstogether might produce a comprehensive file ofclassified information.Never discuss classified information overtelephones, as they constitute one of the least securesystems of communication. Telephones are subject towiretapping—both physically and electronically.Long-distance circuits use microwave radiotransmission, which is easily intercepted. The use ofhomemade or unauthorized codes, double-talk, or anattempt to talk around a classified subject provides noprotection against trained intelligence personnel.The methods used by foreign intelligence agentstake many forms. An agent could be male or female,young or old, or of any national origin or background.Foreign agents exist in our everyday lives as ordinarypeople. They could blackmail you or make threatsagainst you or members of your family. They may takethe friendly approach and offer you friendship, money,or other things of value. They may even promise toassist your relatives living in a foreign country. Theymay offer any number of things in return for classifiedmaterial or bits of information that seem unimportant toyou. Always remember that people who deal inespionage are experts in dealing with people.REPORTING SUBVERSIVE ACTIVITIESWhether you have access to classified material ornot, you must report to your commanding officer,through your chain of command, anyone you suspect isinvolved with espionage, sabotage, or is compromisingclassified material. If a stranger approaches you askinginappropriate questions when you are on leave or libertystatus and you cannot contact your chain of command,report this information to the nearest military activity.Being security conscious and following securitystandards and requirements is a big responsibility.However, maintaining proper security can beaccomplished if you realize that security really is apersonal concern.22-14Student Notes:
Integrated Publishing, Inc. - A (SDVOSB) Service Disabled Veteran Owned Small Business