FAS

Annual Secrecy Costs Now Exceed $10 Billion

05.04.11 | 2 min read | Text by Steven Aftergood

The rise in national security secrecy in the first year of the Obama Administration was matched by a sharp increase in the financial costs of the classification system, according to a new report to the President (pdf).

The estimated costs of the national security classification system grew by 15% last year to reach $10.17 billion, according to the Information Security Oversight Office (ISOO).  It was the first time that annual secrecy costs in government were reported to exceed $10 billion.

An additional $1.25 billion was incurred within industry to protect classified information, for a grand total of $11.42 in classification-related costs, also a new record high.

The cost estimates, based on the classification-related activities of 41 executive branch agencies, were reported to the President by ISOO on April 29 and released yesterday.  They include the estimated costs of personnel security (clearances), physical security, information systems security, as well as classification management and training — all of which increased last year.

Many factors contribute to the rise in secrecy costs, but one of them is widespread overclassification.  Ironically, the new ISOO report provides a vivid illustration of the overclassification problem.

ISOO did not disclose security cost estimates for the large intelligence agencies — the Office of the Director of National Intelligence, the Central Intelligence Agency, the National Security Agency, the National Geospatial-Intelligence Agency, and the National Reconnaissance Office — because those costs are considered classified.

Secrecy News asked two security officials to articulate the damage to national security that could result from release of the security cost estimates for the intelligence agencies, but they were unable to do so.  They said only that the classification of this information was consistent with intelligence community guidance.  But this is a circular claim, not an explanation.  The information is classified because somebody said it’s classified, not because it could demonstrably or even plausibly damage national security.

This kind of reflexive secrecy, which is characteristic of much of contemporary classification policy, would be stripped away if the Administration’s pending Fundamental Classification Guidance Review were properly and successfully implemented.  That Review process is supposed to bring “the broadest possible range of perspectives” to bear on the question of exactly what information should be classified, according to an ISOO implementing directive (pdf).  But so far there is no visible indication that the process is bearing fruit, or even that the Administration is seriously committed to it.

Last week Under Secretary of Defense for Intelligence Michael G. Vickers took time away from more urgent matters to sign a new memorandum (pdf) concerning implementation of the President’s 2009 executive order on classification.  But the Vickers memorandum is incomplete, dealing only with “immediate” implementation issues, and it does not mention the Fundamental Classification Guidance Review at all.

The Information Security Oversight Office reported last month that the number of original classification decisions — or “new secrets” — that were generated by the Obama Administration in its first full year in office (FY 2010) was 224,734.  That was a 22.6 percent increase over the year before.

publications
See all publications
Government Capacity
Blog
If We’ve Learned Anything It is that Learning Agendas Bring Evidence into Policymaking

While it seems that the current political climate may not incentivize the use of evidence-based data sources for decision making, those of us who are passionate about ensuring results for the American people will continue to firmly stand on the belief that learning agendas are a crucial component to successfully navigate a changing future.

11.17.25 | 9 min read
read more
Government Capacity
Blog
What’s Next for Federal Evidence-Based Policymaking

In recent months, we’ve seen much of these decades’ worth of progress erased. Contracts for evaluations of government programs were canceled, FFRDCs have been forced to lay off staff, and federal advisory committees have been disbanded.

11.13.25 | 6 min read
read more
Global Risk
Report
Inspections Without Inspectors: A Path Forward for Nuclear Arms Control Verification with “Cooperative Technical Means”

This report outlines a framework relying on “Cooperative Technical Means” for effective arms control verification based on remote sensing, avoiding on-site inspections but maintaining a level of transparency that allows for immediate detection of changes in nuclear posture or a significant build-up above agreed limits.

11.10.25 | 3 min read
read more
Government Capacity
Blog
A Research, Learning, and Opportunity Agenda for Rebuilding Trust in Government

At a recent workshop, we explored the nature of trust in specific government functions, the risk and implications of breaking trust in those systems, and how we’d known we were getting close to specific trust breaking points.

11.10.25 | 6 min read
read more