Skip to content Skip to sidebar Skip to footer

My Security Clearance Agent Wants to Speak to Me Again

Security Clearance FAQs

Security Clearances for Individuals

What is a security clearance?

A national security clearance is a conclusion made by agencies of the United States Authorities that a person is eligible for access to classified national security information upward to a certain level. Although the term "security clearance" is notwithstanding widely used (even by Government security specialists); it has been replaced in official documents by the term "eligibility" for admission. An applicant cannot exist granted eligibility for admission to classified information unless a decision has been made that it is clearly consistent with the interests of the national security based on a favorable adjudication of an appropriate investigation of their groundwork. The eligibility standards for access to classified information are contained in the National Security Adjudicative Guidelines (NSAG).

What are the levels of classified information and security clearance?

At that place are 3 levels of levels of classified national security information—Confidential, Secret, and Top Secret. Each level is determined by the amount of damage that would be acquired to the security of the Us if that information were disclosed to anyone not authorized to receive it.

  • Acme SECRET data is information which, if disclosed without potency, could reasonably be expected to crusade exceptionally grave damage to the national security.
  • Undercover data is information which, if disclosed without authorization, could reasonably exist expected to cause serious damage to the national security.
  • CONFIDENTIAL data is information which, if disclosed without authorization, could reasonably exist expected to crusade damage to the national security.

Nigh all agencies issue security clearances at these aforementioned 3 levels—Confidential, Surreptitious, and Elevation Secret. The Section of Energy (DOE) has two levels of security clearances—"Fifty" access authorizations and "Q" access authorizations. DOE has the aforementioned three levels of classified fabric, but some of their classified cloth is farther designated "Restricted Data" (RD) or "Formerly Restricted Data" (FRD). An "L" access authorisation is required access to Confidential or Underground national security information and to Confidential and Secret FRD. A "Q" access say-so is required to access to Elevation Secret national security information and to Secret and Summit Secret RD. RD is a Special Access Program (SAP) that covers "all data concerning (1) design, industry, or utilization of atomic weapons; (2) the product of special nuclear material; or (three) the utilise of special nuclear material in the product of energy," except for data that has been declassified or removed from the Restricted Information category.

What is a Special Access Program (SAP)?

A SAP is a program established for a specific class of classified data that imposes safeguarding and access requirements that exceed those normally required for data at the same classification level. A SAP is established only when the program is required by statute or upon the specific finding that the vulnerability of, or threat to, specific information is infrequent; and the normal criteria for determining access to data classified at the aforementioned level are not sufficient. The purpose of establishing a SAP is to:

i. enforce formal need-to-know,
2. proceed admission to a minimum,
3. heighten other security measures as needed, and
4. identify who has had admission.

SAPs are categorized as Intelligence, Conquering, and Operations/Support. Intelligence SAPs are also known equally Controlled Access Programs (CAP) and Sensitive Compartmented Information (SCI).

How do I get access to Sensitive Compartmented Information (SCI) or other Special Admission Program (SAP) information?

In gild to be granted admission to SCI or other SAP information, a person must be sponsored for access to the SAP and canonical by a Government agency property the information. There may be vetting requirements in addition to a Tier 5 investigation, such as a polygraph examination.

What is a collateral security clearance?

A collateral security clearance is a clearance that does non include access to information protected within a Special Access Plan (SAP), similar Sensitive Compartment Information (SCI) or Restricted Data (RD).

What is a sensitive national security position?

Positions in which the occupant could bring well-nigh a material adverse effect on the national security are sensitive positions. All federal positions must be designed as non-sensitive, non-critical sensitive, critical sensitive, or special sensitive. Not all sensitive positions require access to classified information; however, all positions that require access to classified data are sensitive. Positions that require admission to Confidential or Hush-hush information are non-critical sensitive; positions that require access to Pinnacle Undercover information are disquisitional sensitive; and positions that require admission to Sensitive Compartment Information (SCI) or other Special Access Programs (SAPs) are special sensitive. It is the sensitivity level of a position that determines what type of investigation is required. The National Security Adjudicative Guidelines (NSAG) utilise every bit to security clearances and sensitive positions. Some DoD agencies refer to sensitive positions that don't require access to classified data as positions of trust. Positions of trust should non be confused with Public Trust positions.

What are Public Trust positions?

Although often referred to as a clearance; eligibility for a Public Trust position is not security clearance. In addition to sensitivity designations, all federal positions are ranked as depression risk, moderate take chances, and high risk. Only positions ranked every bit moderate risk and high risk are considered Public Trust positions. Requirements for these positions are governed by Title 5 Lawmaking of Federal Regulations, Part 731 and the Federal Investigative Standards.

What types of investigations are required for obtaining a security clearance or eligibility to concord a sensitive position?

A Tier iii investigation is required for a Confidential or Secret clearance, for a Department of Energy (DOE) "Fifty" access say-so, or to agree a not-disquisitional sensitive position. In October 2022 the Tier 3 investigation replaced the NACLC (National Agency with Law and Credit) and the ANACI (Access National Agency Check with Inquiries) investigations that were previously used for these clearances and positions. The Tier 3 investigation relies most entirely on "Automated Record Checks" (ARC) and Letter of the alphabet Inquiries.

A Tier 5 investigation is required for a Top Secret clearance, for DOE "Q" admission say-so, or to agree a disquisitional sensitive position. Information technology is as well required for all levels of access to Sensitive Compartmented Information (SCI) and some other Special Access Programme (SAP) information. In October 2022 the Tier 5 investigation replaced the SSBI (Single Scope Background Investigation). The Tier v investigation uses ARC but as well uses interviews and tape checks conducted by field investigators, including an Enhanced Subject Interview (ESI) of the clearance applicant.

When a potentially disqualifying issue is present or surfaces during a Tier iii or Tier v investigation, an Expandable Focused Investigation (EFI) is initiated to develop all relevant data needed to properly evaluate the consequence.

Tier 1, 2, and iv investigations are required for determining eligibility for basic federal employment suitability/fitness, Homeland Security Presidential Directive 12 credentialing, and Public Trust positions. There are five tiers of federal personnel security investigations (PSIs), only the Regime is currently considering reducing the number of tiers to three.

What types of reinvestigations are required for maintaining a security clearance or eligibility to agree a sensitive position?

In order to maintain a security clearance or eligibility to concur a sensitive position, people are subject to Periodic Reinvestigations (PRs); nonetheless PRs for some cleared personnel are existence replaced by "Continuous Evaluation" (CE). A PR is an investigation conducted to update a previously completed groundwork investigation on a person occupying a position requiring access to classified information or occupying a sensitive position, to determine whether that individual continues to meet the requirements for the position. Previously, PRs occurred at 5, 10, or fifteen year intervals, depending on clearance level. Since December 2012 there has been a requirement that all PRs be conducted at v twelvemonth intervals, but this requirement has not been fully implemented, initially because of lack of funding and later because of the investigative backlog that began in 2022 and connected until early 2020.

Usually a Tier 3R investigation is required for people who agree Confidential clearances, Hugger-mugger clearances, DOE "L" access authorizations, and who occupy not-disquisitional sensitive positions. When a person due for a PR, they are required to submit a new "Questionnaire for National Security Positions" (Standard Form 86—SF86). If no new potentially disqualifying condition is listed on their form, they may exist enrolled in CE and a traditional PR volition not be conducted.

Tier 5R investigations are required for people who take Peak Undercover clearances, DOE "Q" access authorizations, SCI access, some other SAP access, and who occupy a disquisitional sensitive or special sensitive position. Personnel discipline to Tier 5R investigations may also exist reevaluated on a random or continuous basis betwixt investigative cycles or when event driven. The five-yr periodicity for Tier 5R investigations has been extended temporarily to six years in the past due to investigative backlog.

What is Continuous Evaluation?

Under Security Executive Agent Directive 6 (SEAD 6) Continuous Evaluation (CE) is a "A personnel security investigative process to review the background of a covered private who has been determined to be eligible for admission to classified information or to hold a sensitive position at any time during the period of eligibility. CE leverages a set of automated records checks and business concern rules, to assist in the ongoing cess of an individual's connected eligibility. It supplements- just does not supersede-the established personnel security program for scheduled periodic reinvestigations of individuals for continuing eligibility." These reviews are conducted using automatic records checks of various Regime and commercial databases and other information lawfully available to security officials.

Who decides whether to grant a security clearance?

Security clearances are granted by trained personnel security specialists (adjudicators) employed by federal agencies. Adjudicators review the results of Tier iii and Tier v Personnel Security Investigations (PSIs) and evaluate the information against the criteria in the "National Security Adjudicative Guidelines" (NSAG). The NSAG is independent in Security Executive Agent Directive 4, issued by the Director of National Intelligence (DNI). In the case of most clearance applicants employed by defense contractors, staff adjudicators at the DoD Consolidated Adjudications Facility (CAF) volition grant their security clearances. If a staff adjudicator at DoD CAF is unable to grant a security clearance for a defense contractor employee because of unmitigated potentially disqualifying information, the case will be referred to the Defense Office of Hearings and Appeals (DOHA) for a determination by an Administrative Estimate. There are contractor personnel working at some adjudicative facilities. They assistance Government adjudicators by reviewing PSIs and making written recommendations, but simply a Government employee can make a security clearance determination.

Who may have access to classified information?

Merely those persons who take a bona fide need to know and who possess a personnel security clearance at the same or higher level than the classified information may have access to that information.

Can an individual who has been granted a security clearance be authorized admission to any and all classified information?

No. The individual must have both the appropriate level of security clearance and a demand to know the classified information.

Do contractors have the say-so to grant, deny, revoke or append personnel security clearances for their employees?

No. Cleared federal contractors tin can sponsor their employees for security clearances, but the final determination regarding clearance eligibility rests with the federal Government. If unfavorable information about a cleared contractor employee becomes known to the employer'south Facility Security Officer (FSO), the FSO has a responsibility to report the information to the Regime and has the authority to append that person'southward access to classified information. Suspension of access is not the same as clearance suspension, which only the Government can do. In one case access has been suspended by an FSO, just the Regime has the authority to reinstate access.

What is an interim security clearance?

An interim or temporary security clearance is a clearance that can be issued before a PSI is completed and a terminal clearance is granted. An acting or temporary clearance is based on some express checks, a review of the clearance awarding form, and the initiation of the appropriate PSI. An interim clearance tin can be granted at the Cloak-and-dagger or Pinnacle Secret levels. Ordinarily an interim clearance determination can be made in a week or ii. A person with a terminal Hugger-mugger clearance can usually be granted an interim Superlative Hugger-mugger clearance as shortly as a Tier 5 investigation is initiated. Security Executive Agent Directive 8 governs the issuance of interim and temporary security clearance.

An interim security clearance allows a person to have access to classified information at the level of the interim clearance, while his or her final clearance is being processed. All DoD applicants for collateral security clearances are considered for interim clearance eligibility. For interim or temporary access to classified information inside a Special Admission Programme (SAP) special potency is required. Interim clearances tin be withheld or withdrawn after they are granted. The withholding or withdrawal of an interim clearance does not mean that a terminal will not exist issued, and information technology is non considered a clearance denial. It means there is potentially disqualifying information that must fully investigated before a clearance eligibility determination can be made.

What exercise the terms "active", "electric current" and "expired" security clearance hateful?

An "active" security clearance is one in which the private is eligible for access to classified data. A "current" security clearance is one in which the individual's eligibility for admission to classified information was terminated, but tin be reinstated (recertified) without a new investigation, provided no new potentially disqualifying conditions exist. A security clearance remains "current" for two years later it is terminated as long as the underlying PSI is not out-of-date. Previously PSIs went out-of-date after 5, x, or xv years depending on the level of clearance. At present all PSIs go out-of-date afterwards 5 years, simply a clearance tin be reinstated up to seven years if a new investigation is concurrently initiated. If there is either a two yr pause in access to classified information or the last PSI is more than seven years old, an individual'south clearance becomes "expired." Both "active" and "current" security clearances are relatively easy to transfer between employers within an agency like the Department of Defense (DoD). Reciprocal acceptance of an "agile" or "current" clearance by one agency (e.g. DoD) that was granted by other agency (east.1000. DHS) tin sometimes be problematic. When a person with an "expired" clearance is sponsored for a security clearance, he/she will be candy in the same manner every bit someone applying for the first time.

Who issues the Security Clearance?

There are dozens of Government agencies that effect security clearances. DoD civilians, contractors and military personnel account for about 88 percent of all security clearances. Near all DoD clearances are issued by the DoD Consolidated Adjudications Facility (CAF). A very pocket-sized percentage of DoD clearances are issued by the iii-lettered DoD intelligence agencies (DIA, NGA, NRO and NSA), which have their own adjudicative offices collocated with DoD CAF at Fort Meade, MD. In 2022 DoD CAF became role of the Defense Counterintelligence and Security Agency (DCSA) and is sometimes called DCSA CAF.

The Department of Homeland Security (DHS) issues the next largest number of clearances. DHS including its component agencies accounts for about four percent of all clearances. The Department of Energy (DoE) issues nigh ane per centum of all clearance. All other Executive Branch departments and agencies account for less than one pct each with most accounting for less than ane-tenth of one percent. They include the departments of Justice, State, Transportation, Treasury, Health and Human Services, Interior, Commerce, and Veterans Affairs, as well as agencies such equally CIA, USAID, BBG, Peace Corps, TVA, GAO, OPM, USITC, and USPS.

What are the steps for getting a Security Clearance?

For DoD cleared contractors the company identifies an employee or employment candidate (applicant) who needs access to classified information (e.g., the bidder will piece of work on a classified contract). The company's Facility Security Officer (FSO) submits an investigation request through the Articulation Personnel Arbitrament Organisation—JPAS (JPAS is beingness replaced past the Defense Data Systems for Security—DISS). The applicant receives instructions for completing a "Questionnaire for National Security Positions" (Standard Form 86—SF86) using a spider web-based calculator program called e-QIP (electronic Questionnaire for Investigations Processing) or a newer program called eApplication. The bidder must as well be fingerprinted. The applicant completes the SF86 and releases information technology to their FSO. The FSO reviews, approves and releases the SF86 to the Defense Counterintelligence and Security Agency (DCSA), Vetting Risk Operations Center (VROC) and submits the fingerprints to DCSA National Groundwork Investigations Bureau (NBIB). VROC submits the SF86 to NBIB and makes an interim clearance decision. NBIB conducts an investigation and sends the results to DoD CAF (also known as DCSA CAF), which then grants a clearance or refers the case to DOHA. A slightly different procedure is used for federal employees, military personnel, and intelligence customs applicants, but the basic steps of application, investigation, and adjudication are the same.

Can a naturalized denizen become a Personnel Security Clearance?

Yes. A naturalized citizen is treated the same as a native born United states denizen.

Can a non-U.s. citizen obtain a security clearance?

Only US citizens tin can obtain security clearances. In rare instances, non-citizens with unique, highly specialized skills and experience may exist granted a "Limited Admission Authorization" (LAA) that would allow them access to specific data at the Confidential and Secret levels.

What blazon of data is requested on a security clearance application?

The amount and item of information required on a clearance application (SF86) is the aforementioned for all levels of security clearance. It includes personal identifying data; history of employment, residence and teaching; character references, marital and family information; strange connections and travel; criminal, drug, and alcohol problems; fiscal delinquencies; and more than. Some questions crave information covering the past seven or ten years and some questions comprehend an applicant'southward entire life. Some positions may crave an additional financial disclosure class and/or supplemental strange national contact forms.

What is the "Whole-Person" concept?

The adjudicative process is an test of a sufficient catamenia and a careful weighing of a number of variables of an individual'due south life to make an affirmative determination that the private is an acceptable security adventure. This is known equally the whole-person concept. All available, reliable data about the person, past and present, favorable and unfavorable, should be considered in reaching a national security eligibility determination.

Each case must be judged on its own merits and the final determination remains the responsibility of the authorized adjudicative agency. Whatsoever dubiousness concerning personnel existence considered for national security eligibility will be resolved in favor of the national security.

The ultimate conclusion of whether the granting or continuing of national security eligibility is clearly consistent with the interests of national security must be an overall common sense judgment based upon careful consideration of the [adjudicative] guidelines, each of which is to be evaluated in the context of the whole person.[1]

What are the adjudicative guidelines?

Once an investigation is completed and returned to the appropriate adjudication facility, an adjudicator reviews the Written report of Investigation and any previous investigations. All federal security clearance adjudicators apply the xiii criteria listed in the National Security Adjudicative Guidelines for Determining Eligibility for Access to Classified Information or Eligibility to Hold a Sensitive Position. These criteria are:

(1) GUIDELINE A:    Allegiance to the United states of america

(2) GUIDELINE B:    Strange Influence

(3) GUIDELINE C:    Foreign Preference

(4) GUIDELINE D:   Sexual Behavior

(5) GUIDELINE E:    Personal Conduct

(6) GUIDELINE F:    Fiscal Considerations

(7) GUIDELINE K:   Alcohol Consumption

(viii) GUIDELINE H:   Drug Involvement and Substance Misuse

(ix) GUIDELINE I:     Psychological Conditions

(10) GUIDELINE J:     Criminal Comport

(eleven) GUIDELINE One thousand:    Handling Protected Data

(12) GUIDELINE Fifty:    Exterior Activities

(13) GUIDELINE Thou:  Employ of Information Technology

In addition to the general security concern described for each criterion, adjudicators consider specific potentially disqualifying and potentially mitigating factors listed under each guideline, as well every bit:

(1) The nature, extent and seriousness of the behave

(ii) The circumstances surrounding the bear, to include knowledgeable participation

(3) The frequency of the conduct

(iv) How recently the conduct occurred

(five) The individual's age and maturity at the time of the conduct

(vi) The voluntariness of participation

(7) The presence or absence of rehabilitation and other pertinent behavioral changes

(8) The motivation for the behave

(9) The potential for force per unit area, compulsion, exploitation, or duress; and

(x) The likelihood of continuation of the deport

If the adjudicator needs more information than contained in the investigative file, applicants tin can exist required to answer a request for information or written interrogatories. Adjudicators must also utilise the Bail Amendment.

What is the Bond Amendment?

The Bond Amendment (Section 1072 of Public Police force 110–181) prohibits Government agencies from granting or renewing a security clearance for a person who is an unlawful user of a controlled substance or an addict. Information technology also restricts Government agencies from granting or renewing a security clearance for admission to Special Access Programs, Restricted Information, or Sensitive Compartmented Information without an express written waiver when a person:

(A) has been convicted in any court of the United States of a crime, was sentenced to imprisonment for a term exceeding 1 year, and was incarcerated every bit a result of that sentence for not less than ane year;

(B) has been discharged or dismissed from the Armed Forces nether dishonorable conditions; or

(C) is mentally incompetent, equally determined by an adjudicating authorization, based on an evaluation past a duly qualified mental wellness professional employed past, or adequate to and approved by, the United States Regime and in accordance with the adjudicative guidelines.

What are the most common reasons for security clearance denial?

Since 2008 Financial Considerations, Guideline F of the National Security Adjudicative Guidelines, has been the nigh frequently cited issue in cases decided by the Defense Office of Hearings and Appeals (DOHA). It has appeared in about fifty percent of these cases. Guideline E, Personal Bear, has consistently been number 2, but most Guideline E cases involve simulated information on a clearance application form regarding some other issue, like booze, drugs, criminal conduct, or finances. Guideline B, Foreign Influence has consistently been number three. The next three most mutual issues are Drug Involvement, Criminal Comport, and Alcohol Consumption, only they take change positions relative to each other from year to yr.

What happens if the Authorities decides to deny or revoke a security clearance?

An individual whose security clearance is being denied or revoked by the Government has the right to rebut and appeal the decision. The process for doing this differs for people sponsored by Authorities agencies (civilian and armed forces personnel) and people sponsored by cleared contractors. Executive Order 12968, "Access to Classified Information," prescribes the clearance procedure for everyone being considered for a national security clearance. Executive Gild 10865, "Safeguarding Classified Information Within Manufacture," further prescribes the process for almost federal contractors. The provisions of DoD Manual 5200.02 apply to DoD civilians and military personnel, Title 10 Code of Federal Regulations, Part 710, applies to DOE, and Intelligence Community Policy Guidance 704.3 (ICPG 704.3) applies to the Intelligence Customs (IC). Many other federal agencies have their own written procedures for rebutting and highly-seasoned unfavorable clearance decisions, merely they all adapt to the Executive Order 12968.

For most contractor personnel, the denial/revocation and entreatment process is the responsibility of the Defense force Office of Hearings and Appeals (DOHA). When the Industry Division of DoD Consolidated Adjudications Facility (CAF) makes a preliminary conclusion to deny or revoke a clearance, they transfer the instance to DOHA. Simply a small percentage of cases are referred from DoD CAF to DOHA. If DOHA receives the example, they issue a Statement of Reasons (SOR) to the applicant, explaining why the Government intends to deny or revoke the clearance. The applicant then has an opportunity to answer to allegations in the SOR and have their case decided by an Authoritative Approximate (AJ). The applicant has a correct to exist represented past an attorney or personal representative. The bidder has 20 days to reply the SOR and offer show to abnegate, explain, or mitigate the allegations. If the applicant doesn't submit a timely respond to the SOR, their clearance is summarily denied or revoked with no farther action. If the bidder answers the SOR, he/she has the pick of requesting a hearing earlier a DOHA AJ or a decision based on the written record (without a hearing) past a DOHA AJ. With either option the applicant will have an opportunity to present additional arguments and evidence for why they should be granted a clearance.

After the DOHA AJ issues a written decision, either the applicant or the DOHA Department Counsel (the opposing attorney, who represents the Government) has the choice of appealing the conclusion to a three-member DOHA Entreatment Board. The Entreatment Board will review the written arguments presented by the appellant and either affirm, reverse, or remand the DOHA AJ'south decision.

An bidder whose security clearance has been finally denied or revoked may not reapply for a security clearance for ane year from the date of the DOHA AJ's written decision. To reapply the individual must exist sponsored past a cleared contractor for a security clearance. After submitting a new SF86, the individual volition be required to submit written justification for the reapplication to the Director of DOHA, explaining what changes take occurred that would make it likely that the private would exist granted a clearance. If the Manager of DOHA approves the reapplication, DoD CAF will request a new investigation and the individual will go through the entire clearance procedure.

The rebuttal and appeal process for clearance denials and revocations is somewhat dissimilar for federal civilian employees, military personnel, and those subject to ICPG 704.3. In all cases there is an opportunity to response in writing to an SOR (or other detailed written explanation of the footing for the denial or revocation) and request a review of the unfavorable decision. There is also an opportunity to present your case in person to a hearing officeholder or AJ at or afterward the review phase or to a three-member appeal board at the appeal stage.

Volition my security clearance transfer to other federal agencies?

Transferring clearances within the Department of Defense (DoD) is more often than not not a problem. Virtually anybody with a DoD clearance has a record in the Joint Personnel Adjudications Systems (JPAS) or its successor system, the Defense force Information Systems for Security (DISS). JPAS can be used to verify active and current DoD clearances. It can also be used past contractor Facility Security Officers and authorities Security Managers to transfer ownership of a person's JPAS record from i arrangement (sponsor) to another organization (sponsor) or to recertify (reactivate) a "current" clearance (one that was terminated less than ii years before). Temporary or acting clearances are not eligible for transfer, nor are clearances that were granted with an "exception," such every bit a waiver, deviation, or condition. Clearance transfers or "reciprocity" is governed by Security Executive Agent Directive vii (SEAD 7).

At that place are two other online databases with personnel security clearance information that tin exist used to verify clearance data—the Central Verification System (CVS) and Scattered Castles (SC). Intelligence Community agencies record personnel security clearance data in SC and all other non-DoD agencies are supposed to feed clearance data into CVS. However, transferring clearances from agencies that don't use JPAS can be problematic, because the gaining Government bureau must verify the clearance and enter information technology into the clearance database system they apply. Sometimes the gaining Government bureau must contact the losing Regime bureau and request the individual's clearance information, which takes more fourth dimension.

A related problem tin occur when a contractor employee or a old armed services serviceman whose Secret clearance is based on a NACLC (pre-2016) investigation wants to accept a job equally a federal employee. The NACLC does not meet federal employment suitability investigation standards, so consequently some other investigation must exist conducted for employment suitability—not for security clearance. This is not a problem for people who had a Tier 3 investigation (October 2022 or after) for their Secret clearance.

If an individual had a security clearance or eligibility for a sensitive national security position in the past, can they now get a security clearance for some other position?

Security clearances and eligibility for sensitive national security positions can exist reactivated (recertified) by the same or dissimilar Government agency, if:

  • 24 months have non elapsed since the clearance was terminated,
  • the underlying investigation is less than v years old, and
  • there is no new potentially disqualifying information since the concluding eligibility decision.

If the underlying investigation is between 5 and vii years old, a new investigation must exist initiated at the aforementioned fourth dimension the clearance is recertified.

Where can I go assistance completing my security clearance parcel or inquire nigh the status of my security clearance?

DCSA has online assistance at their website for applicants completing a security clearance application. The applicant's company Facility Security Officer (FSO) should be able to assistance with bug not covered at the DCSA website and for data about condition of a clearance request. Federal civilian and military applicants should contact their Security Manager. It is possible for an bidder to communicate directly with DCSA VROC by telephone or email, but DoD CAF will but communicate with FSOs and Security Managers. If an bidder anticipates problems or receives advice from an adjudication facility, information technology's probably wise to hire an attorney or security clearance consultant to aid with the security clearance questionnaire, a request for information (written interrogatories), or a Statement of Reasons.

What are polygraph examinations?

A polygraph is an examination process that uses a diagnostic musical instrument capable of measuring and recording a subject'southward physiological reactions as the subject field answers questions. Because physiological reactions tin vary when subjects are telling the truth and when they are existence deceptive, by comparing a subject's reactions to unlike questions a polygraph examiner can detect reactions that may indicate deceptive responses to specific questions.[two]

Although polygraphy has scientific components, it is non a science; it is a field of study dependent on the training, skill, and experience of the polygrapher. Physiological responses are scientific aspects of this discipline, and a properly calibrated musical instrument volition register very accurate readings. However, the etiology of these reactions tin be extremely complex. Thus, the polygraph is not a "prevarication detector." Exam subjects may register measurable physiological responses for a variety of reasons. The near significant contribution of the polygraph is its success in eliciting information and its value as a deterrent; even so, the polygraph should be but i of several investigative tools.[three]

Very few positions require Personnel Security Screening (PSS) polygraph examinations. For those positions that are designated as needing a PSS exam, the exams are conducted as role of the process of determining initial or continuing eligibility for access to Top Secret information, special admission program (SAP), or other sensitive intelligence or operational data. The first two of the three types of exams listed below may be used as a component of a PSS polygraph program. The third blazon may be used equally function of a security clearance investigation, when needed to resolve a specific issue:

Counterintelligence (CI) Scope Polygraph (CSP) examinations,

Expanded Scope Polygraph (ESP) examinations, and

Specific Issue Polygraph (SIP) examinations.

What are the differences betwixt the types of polygraph examinations?

"Counterintelligence Telescopic Polygraph" (CSP): A polygraph examination that includes counterintelligence (CI) topics concerning interest in espionage, demolition, or terrorism; unauthorized disclosure or removal of classified information (including to the media); unauthorized or unreported strange contacts; and deliberate damage to or malicious misuse of U.S. regime information or defence force systems."

"Expanded Telescopic Polygraph" (ESP): A polygraph exam that includes all CI topics of the CSP, as well as the topics of criminal conduct, drug involvement, and falsification of security questionnaires and forms. (The ESP examination has also been referred to every bit a Full Scope Polygraph [FSP] or an Expanded Telescopic Screening [ESS] exam in some organizations.)

'"Specific Upshot Polygraph" (SIP): An examination conducted to address an private upshot of adjudicative concern such every bit espionage, sabotage, unauthorized disclosure of classified information, criminal carry, etc. This examination may be used in conjunction with a CSP or ESP.[4]

A CSP is the most mutual blazon of PSS polygraph examination. DoD CSP examination questions cover:

(ane)     Involvement with a Foreign Intelligence and Security Service (FISS) and/or Spying or Espionage Activities Confronting the United States.

(2)     Involvement in Terrorism Confronting the United states of america.

(3)     Involvement in Sabotage Confronting the United States.

(4)     Mishandling of Classified Data.

(five)     Unauthorized Strange Contacts.[5]

The ESP consists of a CSP exam plus what was known as a "Lifestyle" polygraph exam. The Lifestyle portion of the DoD ESP asks about:

(i)     Falsification of security questionnaires and forms.

(two)     Interest in serious criminal conduct.

(3)     Illegal drug involvement.[6]

What happens if I don't pass a polygraph examination?

The National Security Adjudicative Guidelines in Security Executive Agent Directive 4 specifically states, "No adverse activeness concerning these guidelines may exist taken solely on the basis of polygraph examination technical calls in the absence of adjudicatively significant information."

DoD Instruction 5210.91, "Polygraph and Brownie Assessment (PCA) Procedures," states that when there is a failure to resolve a PSS polygraph examination issue, "the private shall be given an opportunity to undergo boosted examination. . . . [T]he Caput of the relevant DoD Component may temporarily suspend an individual's access to controlled information and deny the individual assignment or detail that is contingent on such admission, based upon a written finding that, considering the results of the examination and the extreme sensitivity of the classified data involved, access nether the circumstances poses an unacceptable adventure to the national security. Such temporary interruption of access may not form the function of any basis for an adverse authoritative activeness or an adverse personnel action."

Basically a security clearance cannot be deny or revoke but because of an unfavorable polygraph test result. If the polygraph exam surfaces any indication of the being of a potentially disqualifying status for security clearance, at that place must be corroboration from some other source of information. This corroboration commonly comes directly from statements made by the bidder during the pre-test or post-exam phase of the PSS polygraph examination.

Tin I obtain a security clearance on my own?

No, an individual cannot obtain a security clearance on their own. They must exist sponsored for a security clearance past a federal agency or a cleared federal contractor.

How long does a security clearance accept to process?

Security clearance processing times accept gone upwards and down over the years. A major increase in processing times for federal agencies which received investigative services from the Office of Personnel Direction (OPM) began in 2022 and did not begin failing until early on 2019. By early 2022 processing times were back downwards to pre-2015 levels. In October 2022 responsibility for Personnel Security Investigations (PSIs) conducted by OPM transferred to the Defense Counterintelligence and Security Bureau (DCSA). Average end-to-finish processing time of Acme Undercover clearances at DCSA was 104 days in September 2020. Average terminate-to-end processing fourth dimension of Confidential and Secret clearances at DCSA was 83 days in September 2020. These are averages for the fastest 90%—the range of completion times for the fastest xc% is very large and the cases in the ten% that are not included in the average tin can take a yr or two. DCSA handles about 90% of all security clearance investigations and 95% of all PSIs for the federal authorities. Agencies that conduct their own security clearance investigations take dissimilar processing times.

If I am granted a security clearance, who volition notify me?

When you lot are granted a security clearance, you will be notified by your Facility Security Officeholder (FSO) or your Regime Security Manager. Before y'all are given access to classified information, your employer must give you lot a security briefing and have yous sign a nondisclosure agreement.

What is the value of a security clearance?

In all areas of the country people with agile security clearances are in high demand in many industries, occupations, and professional levels. Many companies offer higher starting salaries to people who accept active clearances. By and large the higher the clearance level, the college the starting salary compared to equivalent positions that don't require a clearance.

Many contractors say that a security clearance is needed to apply for their jobs. How tin can I become a security clearance in advance and then I tin apply for these jobs and tin can I pay for it myself?

Currently, people are non permitted to apply for a security clearance on their ain, even if they are willing to pay for information technology themselves. They must exist sponsored for a clearance by a federal agency or a cleared federal contractor. It is possible to be sponsored for a security clearance based on a written conditional offer of employment without really being hired for a position that requires a clearance. Once the clearance is granted the sponsoring organization must rent and onboard the person within a prescribed period of time.

Tin can I see if I am qualified for a security clearance?

No. There is no way to obtain an official opinion regarding clearance eligibility or to pre-qualify for a security clearance. There are security clearance attorneys and consultants, who for a fee, can appraise your probability of success in obtaining a clearance.

After a security clearance is granted, tin it later exist revoked?

Yes. At that place is a continuing evaluation requirement for all personnel property security clearances or sensitive positions within the Regime. This includes Periodic Reinvestigations required by the Federal Investigative Standards, reporting requirements under Security Executive Agent Directive (SEAD) three (SEAD iii), and automated "Continuous Evaluation" nether SEAD 7. Each of these components informs the Authorities of potentially disqualifying information that could impact an individual's continuing eligibility for access to classified information or to hold a sensitive position. When potentially disqualifying information surfaces, Government adjudicators can initiate action to revoke previously granted national security eligibility. If such action is taken, the Government must afford the individual procedural due process in accordance with Executive Order 12986 and its various implementing directives.

What is eastward-QIP (Electronic Questionnaire for Investigations Processing)?

E-QIP is a spider web-based computer program that allows applicants to complete an online version of the investigative Standard Forms (SF85, SF85-P, and SF86). Each of the forms is used for different types of groundwork investigations. E-QIP is being replaced by a new program chosen e-App for electronic Awarding. When applicants are sponsored for a security clearance by a Government agency or cleared contractor, they are given instructions on how to access e-QIP.

What is the JPAS (Joint Personnel Adjudication System)?

The Articulation Personnel Adjudication System (JPAS) is the official personnel security investigation and clearance database direction arrangement for DoD. All National Industrial Security Plan (NISP) cleared contractors use this system for all types of personnel security actions. JPAS is existence gradually replaced by the Defense Information Systems for Security (DISS). This transition should exist complete past spring or summer 2021.

Security Clearance Investigations

Who conducts security clearance background investigations?

The Department of Defence force Counterintelligence and Security Bureau (DCSA) conducts security clearance groundwork investigations for DoD and dozens of other federal agencies. They also conduct background investigations for federal employment suitability and fitness determinations and for Homeland Security Presidential Directive – 12 credentialing. DCSA uses authorities and contract investigators to carry background investigations. There are several federal agencies that accept authority to conduct their own investigations. These are primarily intelligence and law enforcement agencies.

Doesn't the FBI deport all Federal groundwork investigations?

The FBI conducts less than one pct federal background investigations. They conduct background investigations on their ain employees and applicants, every bit well as high level Presidential appointees; employee and contractors working for the Executive Office of the President; some congressional staffers; loftier level employees of the Department of Justice (DOJ) (including the Role of the Pardon Attorney and Banana U.S. Attorneys); Administrative Function of the Usa Courts; designated positions in the Nuclear Regulatory Committee (NRC) and Department of Energy (DOE); Joint Terrorism Task Force (JTTF) detailees, other Joint Job Force (JTF) detailees, Law Enforcement Executives and Elected Officials (LEO Program); Strange Intelligence Surveillance Deed (FISA) personnel; Classified Information Procedures Act (CIPA) personnel; and miscellaneous other personnel categories. For most of these investigations the FBI uses a nationwide network of individual contract investigators who are directed by the FBI'south Groundwork Investigation Contract Services (BICS).

What is a PSI?

In the federal Government a Personnel Security Investigation (PSI) is a generic term for groundwork investigations required to determine an applicant'south eligibility for a Regime personnel security programme, such every bit:

  • National Security Clearance
  • Federal Employment Suitability/Fettle, and
  • Homeland Security Presidential Directive 12 credentialing.

Will investigators look at my social media accounts?

Yes. In May 2022 Security Executive Agent Directive 5 (SEAD 5) authorized "the collection and apply of publicly available social media information during the deport of personnel security background investigations and adjudications for determining initial or continued eligibility for access to classified national security information or eligibility to hold a sensitive position and the retentiveness of such information."

Will I have to give investigators my passwords or access to my social media accounts?

No. You will not be required to provide passwords, log into your private accounts, or take whatever action that would disclose non-publicly available social media information. Investigators are not allowed to create accounts or utilise existing accounts on social media for the purpose of connecting (e.g., "friend", "follow") to your business relationship.

Why are PSIs and security clearances necessary?

PSIs and security clearances are cardinal elements in protecting the national security of the United states of america. PSIs and security clearances are required to safeguard sensitive data and facilities and to counter the threats from:

  • Foreign intelligence services,
  • Organizations or people who wish to overthrow or damage the United States authorities through unlawful ways, and
  • Individuals who lack the judgment, reliability, trustworthiness, and willingness to comply with rules and regulations to properly safeguard sensitive and classified government information.

What can I exercise to speed the investigation process?

The all-time way to help speed upwardly an investigation is to provide accurate, detailed information on the SF86 (application form). A lot of information is required to conduct a groundwork investigation. The paper version of the SF86 is 130 pages, not including instructions and releases. The electronic version of the form is shorter for most applicants, because on the electronic version a "no" response to a threshold question causes the program to skip over sub-questions where no entries are required. Incomplete or wrong information can significantly delay the investigation. For information on what is needed to complete the application, come across the paper (PDF) version of the SF86.

What is Continuous Evaluation?

Continuous Evaluation (CE) is the automated monitoring of numerous commercial and government databases for security-relevant data apropos individuals who have a security clearance or hold a sensitive position. Continuous Evaluation is probably a misnomer in that monitoring is frequent just not continuous. The system automatically reports relevant information to security clearance adjudicators for their review and action. CE was developed past the DoD Personnel and Security Enquiry Center (PERSEREC) equally the Automated Continuous Evaluation Organisation (ACES).

Security Clearance for Facilities

What is the National Industrial Security Plan (NISP)?

The National Industrial Security Programme (NISP) was established by Executive Order 12829 to ensure that cleared U.Due south. defence force manufacture safeguards the classified information in their possession while performing work on contracts, programs, bids, or research and development efforts."

DCSA administers the NISP on behalf of the Department of Defense and 33 other federal agencies. There are approximately 12,500 contractor facilities that are cleared for access to classified information under DCSA'southward security oversight responsibilities. DCSA provides field personnel, Regime Contracting Activities (GCAs) and cleared contractors with timely, consequent policy guidance and to provide effective interpretation of the NISP.[seven]

The National Industrial Security Programme Operating Transmission (NISPOM) contains specific information near cleared contractor responsibilities under the NISP. All classified federal contracts require compliance with the provisions of the NISPOM.

What is a cleared Facility?

The term facility is used within the National Industrial Security Program (NISP) as a mutual designation for an operating entity consisting of a establish, laboratory, office, higher, university, or commercial structure with associated warehouse, storage areas, utilities and components, which are related by function or location. A cleared facility is one that is authorized to safeguard classified data and/or sponsor personnel for security clearances.

What is a Facility Security Clearance?

A Facility Security Clearance (FCL) is an administrative conclusion that, from a national security standpoint, a facility is eligible for admission to classified information at equally loftier a nomenclature level as the security clearance existence granted. The FCL may be granted at the Confidential, Secret, or Top Secret level. The FCL requires the execution of a Department of Defense Security Understanding (DD Course 441). Nether the terms of the agreement, the Government agrees to issue the FCL and inform the contractor as to the security classification of information to which the contractor will have access. The contractor, in turn, agrees to abide by the security requirements set forth in the National Industrial Security Plan Operating Manual (NISPOM).

How does a company get a Facility Security Clearance (FCL)?

A company must be sponsored past a regime bureau or a security cleared contractor for an FCL based on a bona fide procurement need. A company cannot sponsor itself for an FCL. The sponsoring organization sends a sponsorship letter of the alphabet to DCSA.

In one case a asking is made, what is involved in getting a FCL?

There are two types of FCLs—possessing and non-possessing. When the DCSA Facility Clearance Branch (FSB) determines that a request for a "possessing" FCL is valid, the facility is sent data about the process and instructions on how to prepare for the process. Within 5-x days a telephone survey is conducted to hash out the facility'south specific situation. The facility then gathers and electronically uploads their business concern documents via National Industrial Security Organisation (NISS). Once the complete FCL parcel is submitted, a DCSA Industrial Security Representative (ISR) from a local DCSA Industrial Security Field Office is assigned to the facility. If the ISR determines that the bundle is complete, information technology will be forwarded for boosted reviews and the ISR will notify FSB to process the facility'due south Cardinal Direction Personnel (KMP) for Personnel Security Clearances (PCLs). The facility submits PCL applications and fingerprints for their KMP. The ISR performs an initial FCL orientation meeting at the facility. If eligible, the facility receives an interim FCL; otherwise, the facility will have to wait for a final FCL decision.

FCLs for "non-possessing" (also known as Access Elsewhere—AE) facilities are processed by the DCSA National Access Elsewhere Security Oversight Middle (NAESOC). The FCL processing for AE facilities is similar to "possessing" facilities, but is managed centrally at the NAESOC. Security requirements are less complicated, because all access to classified information will occur at a Government facility or the facility of some other cleared contractor.

Who has to be cleared in connectedness with a Facility Security Clearance (FCL)?

A Defence force Counterintelligence and Security Agency (DCSA) Industrial Security Representative (ISR) with the assistance of the company'southward betoken of contact will determine which individuals must exist cleared as function of the FCL. Ordinarily, those people who have control over the company (e.yard., the CEO, President, Executive VPs, and other officers or lath members), the Facility Security Officer (FSO), and the Insider Threat Program Senior Official (ITPSO) must be cleared at the same level every bit the FCL. Those individuals cleared as function of the FCL are called Key Management Personnel (KMP). The FSO can also be the ITPSO. There are facilities with only one KMP.

What happens if a "controlling" officer cannot exist cleared in connection with the Facility Security Clearance (FCL)?

The facility volition not be eligible for a Facility Security Clearance (FCL), unless the officer officially steps down from his or her position as an officer/managing director and relinquish control of the facility. Often the removal of a controlling officer tin be obviated by adopting a corporate board resolution that excludes an possessor or officer from any control or involvement in a classified contract. The ISRs tin can help assist with the grooming, adoption by the company, and acceptance by DCSA of the board resolution.

How much does it toll to become a Personnel Security Clearance (PCL)?

With very limited exceptions there is no direct charge to federal contractors for a Personnel Security Clearance (PCL). Authorities agencies receive appropriated funds to embrace the cost of adjudicating security clearances and to pay an Investigation Service Provider, like DCSA/NBIB, for security clearance investigations. DCSA receives appropriated funds to pay for federal contractor clearance investigations and adjudications under the NISP. DCSA also receives appropriated funds to pay for security clearance adjudication for the military machine service departments and other DoD agencies.

What does the Facility Security Clearance (FCL) cost the contractor?

There is no direct charge to the contractor for processing a Facility Security Clearance (FCL). All the same, the contractor is responsible for security costs associated with participation in the National Industrial Security Program (NISP) (such as classified storage containers, admission controls, etc.). Accordingly, contractors should determine their security requirements and related costs and consider such costs when bidding on a classified contract.

What blazon of security controls must be in place if a facility is security cleared?

The NISP Operating Manual (NISPOM) prescribes the minimum security requirements that must be fulfilled past security cleared contractors. The Industrial Security Representative (ISR) tin provide guidance to the contractor in implementing these requirements in their facility. The implementation of these requirements will ensure the adequate safeguarding of the classified information involved. In some cases, Government agencies accept requirements for boosted safeguards. For example, if your contract requires you lot to constitute a Special Access Program (SAP), additional controls beyond those commonly required will be necessary.

How long does the facility security clearance remain in effect?

The facility security clearance remains in result equally long equally the Department of Defence Security Agreement (DD Form 441), is effective. This agreement may be terminated by either party by 30 days' detect. Generally, most facility security clearances remain in effect as long as there is a need for the contractor to have access to classified information.

Can the government conduct inspections of a cleared facility?

Periodic security reviews of all security cleared contractors are conducted past the assigned DCSA ISR to ensure that safeguards employed past contractors are adequate for the protection of classified information. DCSA has moved to Take chances-based Industrial Security Oversight (RISO). The ISR will determine the frequency of periodic security reviews.

Compiled by:
William H. Henderson
Federal Clearance Assistance Service
February 2021


[6] Ibid.

[7] Retrieved from the Defense Counterintelligence and Security Agency, National Industrial Security Program webpage at https://www.dcsa.mil/mc/ctp/riso/ on Jan 30, 2021.

adamschately87.blogspot.com

Source: https://clearedjobs.net/security-clearance-faqs

Post a Comment for "My Security Clearance Agent Wants to Speak to Me Again"