Lea 213 Module 5
Lea 213 Module 5
Learning Content:
: Basis of Document, Information, and Communication Security
: Standard Rules
: Document Security System
: Information Security
: Communication Security
: Transmission
: Cryptographic
The leakage of document and information cost government, business and industry
alike, billions of pesos. A rival company or an enemy agent might use an illegally obtain
document and information for their own advantage. For this reason, a comprehensive and
information security program is very essential to the installation in order to focus freely on
the attainment of its goals and objectives.
Standard Rules
1. The authority and responsibility for the preparation and classification of classified
matter rest exclusively with the originating office.
2. Classified matter should be classified according to their content and not to the file
in which they are held or of another document to which they refer except
radiograms or telegrams referring to previously classified radiograms or telegram.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
Documents Security is that aspect of security which involves the application of security
measures for the proper protection and safeguarding of classified information.
Classification Categories
Official matter which requires protection in the interest of national security shall be
limited to four categories of classification which in descending order of importance shall
carry one of the following designations:
Security Clearance
-is the certification by a responsible authority that the person described is cleared
for access to classified matter the appropriate level. Need-to-know is the
principle whereby access to classified matter may only be only given to those persons
to whom it is necessary for the fulfillment of their duties. Persons are not entitled to have
access to classified matter solely by virtue of their status or office. It is a requirement that
the dissemination of classified matters be limited strictly to persons whose official duty
requires knowledge or possession thereof.
Certificated of Destruction
-is the certification by a witnessing officer that the classified matters describe
therein has been disposed of in his presence, approved destruction methods.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
Declassify
-is the removal of security classification from classified matter.
Reclassify / Re grading
- is the act of changing the assigned classification of matter.
Up- grading
- is the act of assigning to a matter of higher classification to a classified document.
Classification Authority
These are information and material (matter) the unauthorized disclosure of which,
while not endangering the national security, would be prejudicial to the interest or prestige
of the nation or any governmental activity, or would cause administrative embarrassment
or unwarranted injury to an individual or would be of advantage to a foreign nation.
These are information and material (matter), which requires special protection
other than that determined to be TOP SECRET, SECRET, or CONFIDENTIAL.
Dissemination
– Dissemination of classified matter shall be restricted to properly cleared persons whose
official duties required knowledge or possession thereof. Responsibility for the
determination of “need-to-know” rests upon both each individual, who has possession,
knowledge or command control of the information involve, and the recipient.
Classified matter originating from another department shall not be disseminated to other
departments without the consent of the originating department.
General Policy. – No person in the government shall convey orally, visually or by written
communication any classified matter outside his own department unless such
disclosures have been processed and cleared by the department head or his authorized
representative.
1. Its use shall be solely for the purpose for which the classified matter is requested.
2. It shall be treated or handled in accordance with the classified categories of the
originating office.
3. Handling shall be made by security-cleared personnel.
4.Reproduction and dissemination shall not be made without the consent of the
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
department head.
Classified matter shall be released for public consumption only upon the consent of the
department head or his authorized representative. However, in instances where there is
a demand or need for releasing classified information, extreme caution must be exercised
to analyze in detail contents of the classified matter before release. Normally all
information is released through Public Information Officers. Public Information Officers
should be assisted in the analysis of classified information by the Security Officer.
1. Category A
a. Information which contains reportable time sensitive, order of battle and
significant information.
b. It should be given priority because it is critical information.
c. It must be forwarded without delay.
d. It is critical to friendly operations.
e. It requires immediate action.
2. Category B
a. Anything that contains communications, cryptographic documents, or systems
that should be classified as secret and requires special handling.
b. Higher authorities should declassify it.
3. Category C
a. Other information, which contains something that, could be an intelligence value.
b. Contains exploitable information regardless of its contents.
c. Unscreened materials/documents should be categorized as Category C.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
4. Category D
a. No value, yet lower level will classify documents as category D.
b. No decision must be made at the lower echelon that document has no value. It is the
responsibility of the higher Headquarters.
2. Training is important to make security personnel conscious and realize the value of
document.
5. Classified matter obtained from other department shall retain the same original
classification.
Proprietary information is information that in some special way relates to the status or
activities of the possessor and over which the possessor asserts ownership. In the
business community, proprietary information relates to the structure, products or
business methods of the organization. It is usually protected in some way against
causal or general disclosure.
Republic of the Philippines
Southern Philippines Agri-business and Marine and Aquatic School of Technology
Malita, Davao Occidental
LEA213 – MARIA LUZ J VILLACUATRO, RCrim
All proprietary information is confidential, but not all confidential information is proprietary.
For example, confidential personnel data in employee files is not considered as
proprietary although the company treats it as confidential.
1. Trade Secrets- this consist of any formula, pattern, device or compilation of information
which is used in one’s business and which gives him an opportunity to gain
an advantage over competitors who do not know or us e it. It may be a formula for a
chemical compound a process of manufacturing, treating or preserving materials, a
pattern for machine or device, or a list of customers. It differs from other secret information
as to single or ephemeral events. A trade secret is a process or device for continuous use
in the protection of the business.
1. Requirements for obtaining a patent are specific. To qualify for a patent the invention
must be more than novel and useful. It must represent a positive contribution beyond
the skill of the average person.
Realizing that the most serious threat to trade secrets is the employee, a measure of
protection is often realized through the use of employee agreements which
restrict the employee’s ability to disclose information without specific authorization
to the company. The following countermeasures may be adopted:
Communication Security
- is the protection resulting from the application of various measures which prevent
or delay the enemy or unauthorized persons in gaining information through our
communications. It includes Transmission, Cryptographic and Physical security.
Rules- governing communications security do not in guarantee security, and they do not
attempt to meet every conceivable situation. Communication security rules are a means,
not an end.
Transmission Security
-is that component of communication security which results from all measures designed
to protect transmission from interception, traffic analysis and imitative deception.
Radio Operators shall adhere to the use of correct procedures, circuit discipline and
authentication system as a security measure against traffic analysis, imitative deception
and radio direction finding.
Cryptographic Security
Code - a system which uses words as the smallest element like the one below.
Code word Plaintext
Angel we are ready
Fox sends additional
Cipher - a system that manipulate one, two, or three characters at a time like:
Cipher Plaintext
B 1
C 2
J 3
D 4
Abbreviation
C: code or cipher
P: Plaintext
K: keyword/ key number
Note: Code and cipher may be used interchangeably to mean the same.
Categories of Cipher
For instance:
Below is an example.