• About the Author

  • Enter your email address to follow this blog and receive notifications of new posts by email.

    Join 79 other followers

  • Archive

  • Categories

  • May 2016
    M T W T F S S
    « Apr   Jun »
     1
    2345678
    9101112131415
    16171819202122
    23242526272829
    3031  
  • Disclaimer

    The following are INFORMATION, ARTICLES and OTHER that I found interesting for the day, week , month. My PROFESSIONAL OPINIONS are added to the information based on my EXPERIENCES in the SECURITY and INTELLIGENCE professions. If YOU have ARTICLES or OTHER you would like placed on the site, please do not hesitate to send them to me with YOUR OPINIONS at efpipps@gmail.com. I look forward to ALL of your comments and information.

RDP SECURITY NEWS/MAY 5, 2016 / THURSDAY

HAPPY 5TH OF MAY! IF YOU GO OUT TO ENJOY THE SPIRIT OF CINCO DE MAYO, BE SAFE, BE SMART AND GET A TAXI! GODSPEED

AFTER THE EXCITEMENT OF THE REPUBLICAN NOMINATION AND TRUMP BEING LEFT AS THE SOLE CANDIDATE, I THOUGHT I WOULD GO BACK TO MORE SECURITY BASED INFORMATION. BELOW IS EVERYTHING YOU NEED TO KNOW ABOUT GETTING A CLEARANCE AND WHAT KNOCKS YOU OUT, OR GETS YOU SENT TO PRISON (HILLARY CLINTON).  I DON’T KNOW WHY YOU WOULD WANT ONE, THE SYSTEM IS OBSOLETE AND OUTDATED AND THE U.S. O.P.M. NOW JUST SENDS COPIES OF ALL OF YOUR INFORMATION TO THE CHINESE AND RUSSIANS DIRECTLY.  IT SAVES ON THEIR HACKING US AND MAKING O.P.M. AND U.S. GOVERNMENT CYBER SECURITY LOOK MORE PATHETIC THAN IT ALREADY IS.  UNDER THE U.S. GOVERNMENT METHODOLOGY, EVEN A TERRIBLE SYSTEM RUN BY COMPLETE IDIOTS IS BETTER THAN NO SYSTEM AT ALL.  NO SURPRISES THERE.

ON GETTING A GOVERNMENT CLEARANCE,…

APPLICATION PROCEDURES

Once it is determined that a military member requires a Security Clearance because of assignment or job, the individual is instructed to complete a Security Clearance Background Investigation Questionnaire. The Electronic Questionnaires for Investigations Processing system (e-QIP) is part of an e-government initiative sponsored by the Office of Personnel Management (OPM). e-QIP allows applicants to electronically enter, update, and transmit their personal investigative data over a secure Internet connection to their employing agency or security management office for review and approval of the personnel security investigation request.

The e-QIP is accessible from a secure website at http://www.opm.gov/e-QIP that is designed to house all personnel security investigative forms.

Through an interface with the Joint Clearance Access and Verification System (JCAVS), e-QIP allows authorized requesters to electronically transmit requests for investigation (SF 86) electronically versus mailing, but only if the JCAVS e-QIP requester is a JCAVS user level 2, 3, 4, 5 or 6 and has requester permission granted by the account manager for their Security Management Office (SMO).

e-QIP replaces the Electronic Personnel Security Questionnaire (EPSQ).

However, it’s not necessary to download and install the software in order to see what questions are asked in the questionnaire.

When completing the questionnaire, for CONFIDENTIAL and SECRET Clearances, it’s necessary to provide information for the previous five years. For TOP SECRET Clearances, one must provide information for the previous ten years. It’s important to note here that giving false information on a Security Document constitutes a violation of Title 18, United States Code, Section 101, and Article 107 of the Uniform Code of Military Justice (UCMJ). Under the United States Code, one may be fined as well as imprisoned for a period of five years. Under the UCMJ, the maximum punishment includes reduction to the lowest enlisted grade, forfeiture of all pay and allowances, confinement for a period of five years and a dishonorable discharge.

You may wish to note that page 10 of the SF-86 contains a statement which you sign authorizing release of ANY information about you to Security Clearance Investigators. This means that investigators can access any and all information about you, including sealed records, juvenile records, expunged records and medical records.

Once you complete the ESPQ, the document is sent to the Defense Security Service (DSS) (formerly the Defense Investigative Service (DIS)). DSS is responsible for verifying the information and performing the actual background investigation. The level of investigation depends upon the level of access to be granted.
For CONFIDENTIAL and SECRET clearances:

A National Agency Check (NAC)-A computerized search of investigative files and other records held by federal agencies such as the Federal Bureau of Investigations (FBI) and Office of Personnel Management (OPM).
A Local Agency Check (LAC)-A review of appropriate criminal history records held by local law enforcement agencies, such as police departments or sheriffs, with jurisdiction over the areas where you have resided, gone to school, or worked.
Financial checks – A review of your Credit Record.

For TOP SECRET clearances:

A Single Scope Background Investigation (SSBI) is performed which includes all of the above, plus:

Field interviews of references to include coworkers, employers, personal friends, educators, neighbors and other appropriate individuals.
Checks of records held by employers, courts and rental offices.
A subject interview – An interview with you by an investigator.

These inquiries are performed by one or more investigators who work in the geographic area where the information is to be obtained. NACs, however, may be performed electronically from a central location.

The DSS uses two types of investigators to conduct these investigations; DSS Agents and Contractors. DSS obtains investigative support through Contractors, such as MSM Security Services Corp, Omniplex World Services Inc., Management Technology Corp (ManTech), Dyncorp (Information & Enterprise Technology Division) and Government Business Services Group (GBSG).

When conducting field interviews, the investigators normally begin with individuals you list as references in the questionnaire. They then use those references to develop names of additional references, etc., ad infidium. These references will be asked questions about your honesty, reliability and trustworthiness and their opinion on whether you should be given access to classified information or assigned to a sensitive position or position of trust. Your references will also be asked questions about your past and present activities, employment history, education, family background, neighborhood activities and finances. During the investigation the investigator(s) will try to determine if you have had any involvement with drugs, encounters with the police, or problem drinking habits and other facts about your personal history. The investigator(s) will attempt to obtain both favorable and unfavorable information about your background so an adjudicator can make an appropriate determination.

The objective of the subject interview is to obtain a complete picture of you as an individual so that an adjudicator can determine whether you will be able to cope with having access to classified or sensitive information without becoming a security risk. Therefore, the interview will be wide-ranging and cover most aspects of your life. During the subject interview, expect to be questioned about your family background, past experiences, health, use of alcohol or drugs, financial affairs, foreign travel and other pertinent matters.
What determines approval or disapproval?

It’s important to note that Defense Security Service (DSS) does not make any security clearance determinations or recommendations. DSS simply gathers information. Once the information has been verified, and the investigations completed, DSS presents the information to the specific military service’s adjudicator authority (each military service has their own), who determine whether or not to grant the security clearance, using standards set by that particular military service.

It’s impossible to say if any particular thing will result in denial of a security clearance. The adjudicators use the Adjudicator Guidelines to determine whether or not the individual can be trusted with our nation’s secrets. Primarily, adjudicators look for honesty, trustworthiness, character, loyalty, financial responsibility and reliability. On cases that contain significant derogatory information warranting additional action, the adjudicator may draft a request for additional investigation/information, or request psychiatric or alcohol and drug evaluation. Even so, adjudicators are not the final authority. All denials of clearances must be personally reviewed by a branch chief, or higher.

Because of a recent change in the law, there are some factors which will positively result in the denial of a clearance. As a result of the Smith Amendment, the FY01 Defense Authorization Act amended Chapter 49 of Title 10, United States Code, and precluded the initial granting or renewal of a security clearance by (DoD) under the following four specific circumstances:

(1) An individual has been convicted in any court of the U.S. of a crime and sentenced to imprisonment for a term exceeding one year.
(2) An individual is (currently) an unlawful user of, or is addicted to, a controlled substance (as defined in section 102 or the Controlled Substances Act (21U.S.C. 802))
(3) An individual is mentally incompetent, as determined by a mental health professional approved by the DoD
(4) An individual has been discharged or dismissed from the armed forces under dishonorable conditions.

The statute also provides that the Secretary of Defense and the secretary of the military department concerned may authorize an exception to the provisions concerning convictions, dismissals and discharges from the armed force in meritorious cases.
How long does the process take?

It depends on several factors, and the type of investigation. In the past three years, DoD has had a significant backlog of security clearances and reinvestigations pending, most especially for TOP SECRET level access. In general, expect a CONFIDENTIAL or SECRET clearance to take between 1 and 3 months. A TOP SECRET will probably take between 4 and 8 months. However, some individuals have been waiting for the results of their TOP SECRET investigation for more than one year. In general, the more there is to investigate, the longer the investigation will take. Expect the investigation to take longer if you have:

Lived or worked in several geographic locations or overseas.
Traveled outside of the United States.
Relatives who have lived outside of the United States.
Background information that is difficult to obtain or involves issues that require an expansion of your case.

If your technical training (AIT/Tech School/A-School) requires access to classified information, you may be assigned to do details (such as answering the phone in an office) while waiting for your Security Clearance to be granted. In some cases, you may be authorized to attend non-classified portions of the training while awaiting the results of your security clearance application.
Can I appeal a clearance denial or revocation?

If you are denied a security clearance, or an assignment to a sensitive position or a position of trust, or your current clearance or access is revoked, you have the right to appeal the adjudicative decision. Under such circumstances you will be provided a statement on the reason(s) why you are ineligible for the clearance and the procedures for filing an appeal. If you believe the information gathered about you during the investigation is misleading or inaccurate, you will be given the opportunity to correct or clarify the situation.

DoD maintains a web site which gives a good overview about past Security Clearance Appeal Decisions for DoD contractor personnel.
Are polygraph (lie detector) tests required?

The use of the polygraph for any Department of Defense program is governed by DoD Directive 5210.48 and DoD Regulation 5320.48R.

A polygraph examination is mandatory for employment by or assignment to the DSS and the National Security Agency (NSA) and for assignment (or loan) of DoD personnel to the Central Intelligence Agency (CIA ). It is also mandatory for some SCI and SAP access programs.

Additionally, the polygraph may be used for any other personnel security investigations to resolve serious credible derogatory information and then only with consent. No adverse action may be taken solely on the basis of a polygraph examination that indicates deception, except upon the written finding by the Secretary or Under Secretary of Defense, or a Secretary of one of the military departments, that the classified information in question is of such extreme sensitivity that access under the circumstances poses an unacceptable risk to the national security.

Polygraph examinations may also be used to supplement investigations of federal felonies, of unauthorized disclosure of classified information or of alleged acts of terrorism, or when requested by the subject of a personnel security investigation, for exculpation with respect to allegations arising in the investigation.

The DoD regulation details the exact manner in which the examination must be conducted. No relevant question may be asked during the polygraph examination that has not been reviewed with the person to be examined before the examination, and all questions must have a special relevance to the inquiry. Certain “validating” questions may be asked without prior disclosure to establish a baseline from which the examiners can judge the validity of the answers to the relevant questions. The probing of a person’s thoughts or beliefs, or questions on subjects that are not directly relevant to the investigation, such as religious or political beliefs or beliefs and opinions about racial matters, are prohibited.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: