Overview of Classified National Security Information

What exactly is classified information? How is it routinely used? Why could its unauthorized disclosure result in “exceptionally grave damage to the national security of the USA?” Is too much information classified, or not enough? Actual examples of how classified information is used will be explored and discussed, as well as the process by which the government has investigated the more than 4 million people who currently hold clearances. Real-life examples of previously classified military and CIA operations will be presented, along with accompanying video clips, to illustrate the risks, benefits, and sometimes unintended drawbacks, of such actions.  UMA Center. Limit 30.

Required Book(s): None. Optional Book: The Taking of K-129: How the CIA Used Howard Hughes to Steal a Russian Sub in the Most Daring Covert Operation in History by Josh Dean. ISBN 978-1101984451. 448 pages. Publisher: Dutton Caliber

Dan Possumato is a retired Deputy Garrison Commander and a former anti-terrorist consultant for the U.S. Army. He is a graduate of the U S. Army War College and is a part-time Special Investigator for the U.S. Department of State.

Return to the Spring 2019 Courses Page

Print Friendly, PDF & Email