recommended reading

Unclassified JFK Assassination Database Still Stored In Top Secret Vault -- for Convenience

National Archives

The master database cataloging material related to the assassination of President John F. Kennedy has always been housed in a Top Secret vault, much of the time on a personal computer, according to National Archives and Records Administration officials. 

The index -- which does not hold physical artifacts -- was set up in a stand-alone computer in the early 1990s in response to the 1992 JFK Assassination Records Collection Act. The law does not require Fort Knox-like protection. It's just handy for the Archives personnel who use the system to have the JFK database close to other caseloads that include classified records. 

"The database has resided in office space that is authorized up to at least the Top Secret level," Archives spokeswoman Laura Diachenko told Nextgov. "It was in this space primarily because the staff who had responsibility for it worked in this space due to their other duties," such as processing Freedom of Information Act requests. "For convenience, the master system needed to be near their work stations. Therefore, it has always resided in classified work space."

While the so-called JFK Assassination Records Collection Database Master System isn't classified, it does contain some content unavailable to the public, she said. 

But this is no underground chamber secured by a bank-vault door. It looks more like a cubicle.

"The only visual difference between this office space and any other space in our building is that you would see a combination lock on all of the doors," Diachenko said. 

A version of the database available to citizens online is on public-facing servers. Both versions are only finding aids. They contain locations and other descriptive information for physical papers, photographs and analog film. The collection includes, for example, Kennedy’s autopsy report, as well as an audio tape of charges made by political commentator Bill O'Reilly, then a Dallas TV reporter, that alleged assassin Lee Harvey Oswald was employed by the CIA. 

The databases do not hold digitized images of the records themselves. 

The JFK master database has been shuffled around a bit inside the agency's College Park campus. A 2009 contract solicitation to support the machine and many other Archives systems stated the database was stored on an isolated PC and server inside a "sensitive but not national security classified" vault.

"The PC runs a Clipper application that is used to validate and load records sent by agencies into the JFK server," states the work order obtained by Nextgov. Clipper is a 1990s-era software tool that can be used to enhance and speed up database programs from the 1980s. 

The index continued to be stored on a stand-alone PC until June when it was transferred to a new system that tracks the Archive's inventory of classified materials. The "archival declassification redaction and tracking system and unclassified declassification and redaction system," or ADRRES, helps automate the work of sanitizing of materials. It, too, is stored in a Top Secret environment. 

One preserved item people won't find indexed is the blood-stained pink Chanel suit first lady Jackie Kennedy wore the day her husband died, Nov. 22, 1963, and refused to clean. She reportedly told aides, “Let them see what they’ve done.”

The Kennedy family did not want to sensationalize that day's relics, so relatives requested it not be seen until more than a century later, in 2103. The New York Times in 2013 reported: "Mrs. Kennedy's clothes are the only items in the assassination collection with this specific restriction. By comparison, scholars and researchers who meet special criteria of the archives may view President Kennedy’s clothing and the rifle used by Lee Harvey Oswald."

Threatwatch Alert

Accidentally leaked credentials / Misplaced data

Hospital Breach Affects Thousands of Patients

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download

When you download a report, your information may be shared with the underwriters of that document.