Submit Your Own Transformation White Paper

Now that you have had the opportunity to review and comment on the Board’s draft proposals for transforming the classification system, we would like to invite you to submit your own specific ideas.  Submissions should: Provide transformative but plausible ideas and actionable implementation strategies Promote innovation and especially address the challenges of classified digital data … Continue reading Submit Your Own Transformation White Paper

A Half Life for Historical Formerly Restricted Data (FRD)

Background Classified information concerning the technical design and manufacture of atomic weapons and the production or use of special nuclear material in the production of energy is categorized as Restricted Data (RD) by the Department of Energy (DOE) under the Atomic Energy Act of 1954.  Formerly Restricted Data (FRD) is a separate category of information … Continue reading A Half Life for Historical Formerly Restricted Data (FRD)

Two New Papers

The PIDB would like to invite you to post your comments on two new proposals for transforming the classification system. The new topics concern: Paper 5: Stewardship of Our Classified History Paper 6: Information Security and Access in the Electronic Environment A forthcoming paper will address historical Formerly Restricted Data. Additionally, be sure to mark … Continue reading Two New Papers

Stewardship of Our Classified History

The Problem The current records management system does not ensure those records of historical significance are identified in such a way as to promote their timely review for declassification and public release.  With greater reliance on digital records to decide policies and conduct missions, there is a great danger that, unless changes are made, our … Continue reading Stewardship of Our Classified History

Information Security and Access in the Electronic Environment

Background Individuals generating or working with classified information are required to obey established procedures for accessing, annotating, handling, and safeguarding that information.  The system is managed much as it was before the advent of digital communication.  Protocols governing these transactions were developed at the beginning of the Cold War and reflect the paper-based world in … Continue reading Information Security and Access in the Electronic Environment