ISOO Spurs Agencies to Perform Classification Review
In a focused effort to combat overclassification, President Obama has ordered executive branch agencies to conduct a “Fundamental Classification Guidance Review.” The two year Review process, mandated in the December 2009 executive order 13526 (sect. 1.9) is intended to identify and eliminate obsolete classification requirements in current agency policies.
Last week, the Information Security Oversight Office (ISOO) told selected senior agency officials that the Review is more than a formality, and that they must make a serious commitment to its implementation.
“The scope of this review needs to be systematic, comprehensive, and conducted with thoughtful scrutiny involving detailed data analysis,” wrote ISOO director William J. Bosanko in a memorandum (pdf) dated January 27.
Merely rubber-stamping the status quo is not going to be enough, he explained to the senior agency officials.
“Please be advised that a review conducted only by the pertinent original classification authority is not sufficient.” Instead, “the broadest possible range of perspectives” shall be brought to bear on reviewing agency classification guidance.
Moreover, the resulting recommendations for eliminating obsolete classification guidance should be clear and actionable.
“Agencies should be specific in their determinations as to what no longer requires protection,” Mr. Bosanko wrote. “An example would be a specific part of a weapon system versus the weapon system as a whole. The user of the guide must be able to identify the specific element of information that does or does not require protection.”
Interim status reports on agency progress are to be provided every six months, Mr. Bosanko advised.
The present Fundamental Classification Guidance Review is loosely modeled on the Fundamental Classification Policy Review that was performed by the Department of Energy in the mid-1990s. That Review led to the declassification by DOE of numerous areas of classified information that had ceased to be sensitive (as well as increased protection for a smaller number of other areas deemed highly sensitive).
Until now, a similar approach has never been tried on a government-wide basis. If diligently implemented, it holds the promise of a measurable reduction in the scope of national security secrecy. On the other hand, if it does not produce meaningful results, then the prospects for classification reform will become vanishingly small.
It is in the interests of the United States to appropriately protect information that needs to be protected while maintaining our participation in new discoveries to maintain our competitive advantage.
The question is not whether the capital exists (it does!), nor whether energy solutions are available (they are!), but whether we can align energy finance quickly enough to channel the right types of capital where and when it’s needed most.
Our analysis of federal AI governance across administrations shows that divergent compliance procedures and uneven institutional capacity challenge the government’s ability to deploy AI in ways that uphold public trust.
From California to New Jersey, wildfires are taking a toll—costing the United States up to $424 billion annually and displacing tens of thousands of people. Congress needs solutions.