Sie sind auf Seite 1von 3

V

V
V
- -428*-*. 200^- l:08pn —OFFICE OF PUBLIC RFF
NO. 346

UNCLASSIFIED//FOR OFFICIAL USE ONLY

CIA Document Sharing and Note Taking Guidelines for the Nationa
Commission on Terrorist Attacks Upon the United States (NCTA)
1. Office Space and Security:

a. We will provide you with the cipher lock combination for the back door of 7BOO f\l Headqua

b. We will provide you with aLseparate cipher lock combination for the dedicated4^
NCTA office space. L)f<.^nJte 6W «J*/ ?
c. We will provide you with the combination to a safe in the dedicated NCTA office
space.
d. Should you choose to write down any cipher lock or safe combinations, please
take care to disguise the combinations in such a way that they will not be readily
recognizable to a third party and keep them in a secure place.
e. You will not have vault access, so you will only be able to access your dedicated
_^ office space while a CIA staff employee is in the vault.
J^ Regular Hours of Operation for the 7BOO vault: M-F, 8-6
g. Secure and non-secure fax machines and a copier are available for your use in the
vault
h. Please be conscious of classified discussions on NON-secure telephones.
i. Please also be conscious of identifying (by name or otherwise) our covert
employees in NON-secure spaces (the Agency cafeteria, the elevators etc.) or in
_ front of persons who have no need to know their identities.
We will provide you with security cover sheets for compartmented material^
make sure that all compartmented material is affixed with such a cover
sheet bearing the appropriate classification markings at all times, even within your
office space. _ -^ ^^ _ ru^jJL u

Requests for Docurnen Briefings and Interview ..rf[<=T-/i


/J

a. All requests for documents! briefings rviewsj should be routed to CIA


from NCTA in a manner consistent with the classification of the information AJ,
requested. A simultaneous transmission of the request should be sent to tiBe~
Administration' s focal point Adam Ciongoli. _ -
b. Requests should be: dated, in writing, as specific as possible and indicate an TT/-rc'
NCTA point of contact to receive the request. Ct* C

3. Records Reviewed by the Congressional 9/11 Joint Inquiry Staff which remain at
CIA Headquarters

a. This collection of documents has been archived in a particular order, please take care to
keep them in that order.
b. Please don't write on the documents.
No copies of operational cable traffic from this collection are to be removed from CIA
Headquarters.
«.2003_ l:08PM OFFICE OF PUBLIC flFF
NO.346 P.3

XJNCLASSIFIED//FOR OFFICIAL USE ONLY


-DRAFT-

Copies of e-mails from this collection that contain NO/NO operational information may
be removed from CIA Headquarters to the K Street space only with specific
authorization. We will consider those requests on a case-by-case basis.
*sfjpfr* ltffKft*??(Fssl
•PocumentsJPtoduced in response to NCTA Requests

Operational Cable Traffic must remain on the CIA HQS compound, NO/NO copies may
be removed to K. Street.
Copies of e-mails that contain NO/NO operational information may be removed from
CIA Headquarters to the K Street space only with specific authorization. We will
consider those requests on a case-by-case basis.
Please don't write on the original documents.
The copies of operational cable traffic produced in response to NCTA requests and any e-
mails that contain operational information, remain at all times CIA agency records,
NOT/NOT Congressional or i
Finished intelligence reports and disseminated intelligence reports may be taken to the K
Street space. These documents must be transported and stored in accordance with the
classification of the information.

Please do not take notes of information abokt individual or liaison sources that contain
specific details that may allow the source tope identified by a person knowledgeable of
the subject matter. The information of<grg2*e£E>concern to us is information that pertains
tothe_acquisition of the infonnatioiuwhich might reveal the identity of a particular source
or liaison ;r r In cnnii mi. -^.rlflr int. locations, times, names, employment position
of the source's sub-sources, exclusive streams of reporting
only known to the source. ^Bj^fThelp you craft languaj
be identifying, but will still be useful to your research
b. Please do not take down "crypts", the code names CIA uses to laenury specific sources
and operations, in your notes. Crypts are readily recognizable in text, they consist of a
two letter digraph followed by a word or words written in ALL CAPS.
c. Please do not group together bits and pieces of information gathered from various sources
that relate to our assets in a way that would identify the asset to a person knowledgeable
of the subject matter. i_____ s "p>
d. Notes must be appropriately classified/and portion marked^
e. In order to remove notes from CIA Headquarters, they must be reviewed for
classification and source revealing information and initialed by an Q£A POC before they
may be transported. Reviews of notes will be carried out as quickly as possible.
f. Classified/ffotes must be transported and stored in accordaneewith the classification of
the notes.

Das könnte Ihnen auch gefallen