For the complete documentation index, see llms.txt.
Skip to main content
New

Originator Controlled (ORCON)

Updated May 23, 2026

Originator Controlled (ORCON) is a U.S. classified-information dissemination caveat requiring the originating agency's permission before further distribution, extraction, or reproduction.

Originator Controlled, abbreviated ORCON and formally rendered "Dissemination and Extraction of Information Controlled by Originator," is a dissemination control marking applied to U.S. classified national intelligence to retain the originating agency's authority over onward sharing. Its legal foundation rests in Executive Order 13526 (signed by President Barack Obama on 29 December 2009), which governs classified national security information, and in Intelligence Community Directive (ICD) 710, "Classification Management and Control Markings System," issued by the Director of National Intelligence. The specific catalogue of authorized control markings, including ORCON, is maintained in the Controlled Access Program Coordination Office (CAPCO) Register and Manual, which the Office of the Director of National Intelligence (ODNI) updates periodically. ORCON is one of several "dissemination controls" — alongside NOFORN, PROPIN, RELIDO, and FISA — that operate independently of the underlying classification level (Confidential, Secret, or Top Secret).

The marking is applied at the point of origination by the classifier, who is the official authorized to make original classification decisions under section 1.3 of EO 13526, or by a derivative classifier carrying forward markings from source material. In the document header and footer, ORCON appears in the classification banner after a double slash, for example "SECRET//ORCON" or "TOP SECRET//SI//ORCON/NOFORN." Each paragraph carries a portion marking — "(S//OC)" — identifying ORCON content at the granular level. Once applied, ORCON binds every downstream recipient: a reader at the receiving agency may not forward, paraphrase into a new product, brief verbally to an uncleared audience, or extract substantive content into a separate cable, memorandum, or finished intelligence product without first obtaining written consent from the originator's designated release authority.

Mechanically, requests for onward dissemination flow through the recipient agency's foreign disclosure office or its equivalent to the originator's release authority, which evaluates the request against sources-and-methods considerations. The originator may grant blanket permission for a defined audience, approve a single extraction, authorize sanitization into a tear-line product, or refuse. The "tear-line" convention — a horizontal line below which sanitized, releasable text appears — is the principal workaround: the originator drafts a downgraded version stripped of sensitive sourcing that recipients may disseminate more broadly. ORCON also interacts with the "third-agency rule," a customary norm prohibiting onward transfer of another agency's information without consent, but ORCON is the formal, marking-based instantiation of that principle and carries enforceable weight under ICD 710.

Contemporary practice illustrates the marking's reach. CIA finished intelligence — President's Daily Brief articles, World Intelligence Review pieces, and HUMINT-derived assessments — routinely carries ORCON. The National Security Agency applies ORCON to signals-intelligence reporting derived from sensitive collection platforms, often in combination with SI (Special Intelligence) compartmented controls. At the State Department's Bureau of Intelligence and Research (INR) and the Defense Intelligence Agency, analysts working an ORCON cable from Langley must request release before quoting it in a cable to Embassy Berlin or a memorandum for the Secretary. Following the 2010 WikiLeaks disclosures of State Department cables and the 2013 Snowden revelations, agencies tightened audit logging on ORCON material within the Joint Worldwide Intelligence Communications System (JWICS) and SIPRNet platforms.

ORCON is frequently confused with NOFORN ("Not Releasable to Foreign Nationals"), but the two operate on different axes. NOFORN restricts the audience by nationality, prohibiting disclosure to any non-U.S. citizen including allied liaison officers; ORCON restricts the audience by chain of custody, requiring originator consent regardless of nationality. A document may carry both, neither, or either. Similarly, ORCON differs from PROPIN (Proprietary Information), which protects commercial proprietary data provided by a private entity, and from FISA, which marks information derived from Foreign Intelligence Surveillance Act collection and triggers separate handling under 50 U.S.C. § 1801 et seq. ORCON is also distinct from compartmented controls such as SI, TK (TALENT KEYHOLE), or HCS (HUMINT Control System), which gate access to a named compartment rather than govern downstream dissemination.

Edge cases generate persistent friction. Coalition operations — the Five Eyes partnership, NATO command structures, and ad hoc contingency coalitions — strain ORCON because liaison partners cannot read material the originator has not released. The "write-to-release" doctrine, promoted by ODNI since the mid-2000s and reinforced after the 9/11 Commission's critique of information-hoarding, urges originators to draft products from the outset at the lowest practicable classification with the broadest dissemination, reducing reliance on ORCON. Congressional oversight committees occasionally clash with executive-branch agencies over ORCON material, as the marking does not lawfully restrict disclosure to the Senate Select Committee on Intelligence or the House Permanent Select Committee on Intelligence, though agencies sometimes invoke it to delay. The 2017 disclosures attributed to a foreign liaison service of U.S.-origin reporting on the Manchester Arena bombing investigation illustrated the diplomatic damage when ORCON-equivalent expectations are breached.

For the working practitioner — the desk officer drafting talking points, the analyst preparing a coalition briefing, the journalist parsing a leaked document, or the FOIA litigator — ORCON is a daily operational constraint rather than a theoretical category. Misuse can trigger a security incident report under ICD 701, administrative sanction, or referral for criminal investigation under 18 U.S.C. § 798. Recognizing the marking, identifying the originator, routing the release request correctly, and drafting tear-lines competently are core tradecraft skills in any U.S. intelligence or foreign-policy bureaucracy.

Example

In 2017, U.K. Home Secretary Amber Rudd publicly protested after U.S.-origin ORCON-equivalent intelligence on the Manchester Arena bombing investigation appeared in American press reports before British authorities authorized release.

Frequently asked questions

No statutory authority permits an executive-branch agency to withhold ORCON material from the Senate Select Committee on Intelligence or the House Permanent Select Committee on Intelligence on the basis of the marking alone. Agencies nevertheless sometimes invoke ORCON to negotiate the timing and format of disclosure, which has produced recurring oversight disputes.
Talk to founder