DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.
|Published (Last):||17 December 2018|
|PDF File Size:||13.50 Mb|
|ePub File Size:||15.81 Mb|
|Price:||Free* [*Free Regsitration Required]|
If you did received a Letter of Intent LOI to respond to a proposed suspension of eligibility or access, or if you are having problems odd in the process with a clearance suspension, revocation or issuance, please call my office as soon as possible for consultation and review. Capacity for Making Commitment Obligations that accompany a security clearance involve a lifetime commitment to maintain secrecy.
The adjudicator is not just a reviewer and reporter of information. Is the subject capable, over a long period of time, of maintaining a dkd to protect classified information under all circumstances?
In evaluating the relevance of an individual’s conduct, the adjudicator will consider the 13 Adjudicative Guidelines and cross reference them with the following below-listed 9 Adjudicative Factors:. If you are in the military, a government contractor, or if you are a government civilian, your security clearance is, in all likelihood, a pre-requisite to your career.
Sexual Behavior Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
Emotionally stable and well-adjusted individuals generally respond to these experiences in positive ways; by learning from them, adjusting their expectations, working harder or sticking with their core values. Psychological Conditions Mental health is a security concern because it influences how a person perceives the world, makes decisions and manages stress. Records include identifying information: No adverse inference concerning the standards in this guideline may be made solely on the basis of the sexual orientation of the individual.
As we store more and more information in computer databases and as these databases become more closely linked in networks, more people have broader access to more classified and other sensitive information than ever before. The topics or “issues” listed below are the primary factors by which Department of Defense DoD personnel security specialists adjudicators will either grant or deny your application for a security clearance.
The complexity of human behavior severely limits any ability to codify such thresholds for making adjudicative decisions. Using the computer, individual employees can quickly and quietly commit serious crimes that are very difficult to detect.
Although the adjudicative process considers trustworthiness and reliability in regards to protecting national security-related information, an applicant’s prior history with handling other forms of protected information is relevant e. The role of the adjudicator is to ensure that all doubts concerning personnel being granted eligibility for access to classified information shall be resolved in favor of national security. Each case must be judged on its own merits and final determination remains the responsibility of the specific department or agency.
When a person’s life history shows evidence of unreliability or untrustworthiness, questions arise whether the person can be relied on and trusted to exercise the responsibility necessary for working in a secure environment where protecting classified national security information CNSI is paramount. Certain emotional, mental and personality conditions can impair judgment, reliability or trustworthiness.
The adjudicative process is an examination of a sufficient period of a person’s life to make an affirmative determination that the person is an acceptable security risk. Access to classified information is a privilege, not a right. Employees whose behavior is under conscious control think before acting, take their duties seriously, and are able to delay immediate gratification of their desires in order to achieve some longer-term goal.
Passwords and User IDs are used to control access to the system data, and procedures are in place to deter and detect browsing and unauthorized access. Military Security Clearances Military deployments almost always require that the service member In evaluating the relevance of an individual’s conduct, the adjudicator will consider the 13 Adjudicative Guidelines and cross reference them with the following below-listed 9 Adjudicative Factors: Deliberate or negligent failure to comply with rules and regulations for protecting classified or other sensitive information raises doubt about an individual’s trustworthiness, judgment, reliability or willingness and ability to safeguard such information and is a serious security concern.
Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information SCI and special access programs SAPsand are to be used by government departments and agencies in all final clearance determinations.
If they do not respect the rules on use of illegal substances, they may not respect the rules for protection of classified information.
DOD 5200.2-R PDF
Excessive alcohol consumption often leads to questionable judgment or the failure to control impulses and can raise questions about an applicant’s reliability and trustworthiness.
Involvement in certain types of outside employment or activities is of security concern if it poses a conflict of interest with an individual’s security responsibilities and could create an increased risk of unauthorized disclosure of classified information.
Over the past twenty five years, I have represented military service members, government contractors sod federal dpd employees who have had security clearance problems. If allegiance to the United States is in doubt, an individual’s willingness to safeguard classified information is also in doubt. Other crimes such as drug dealing, illegal gambling, assault on coworkers, theft from other employees and prostitution also affect the workplace.
A personnel security clearance is an administrative determination by a certified adjudicator that an individual is eligible under national security standards for access to classified information.
The vast majority of juvenile offenders get into trouble only once or twice and they stop offending as they mature.
The Personal Conduct adjudicative guideline covers unreliable or untrustworthy behavior not considered under other guidelines, or which falls below the threshold for action under any other single guideline.
DoD R, “Personnel Security Program,” 1/
It indicates that the employee-employer relationship, too, is likely to withstand the inevitable rocky periods that crop up in most relationships and which might otherwise cause the 5020.2-r to turn against the employer. It is when an individual’s activities present a potential conflict with their role as a clearance holder that a national security concern exists.
Willingness and ability to comply with rules and regulations is, therefore, an important qualification for access vod classified information. One knowledgeable source who reports credible adverse information may outweigh many acquaintances who claim never to have seen evidence of such behavior. Most government organizations and private businesses do not know and cannot measure accurately how much they suffer from dov in the workplace by employees or outsiders.
When information of security concern becomes known about an individual who is currently eligible for access to classified information, the adjudicator should consider whether the person: A qualified mental health professional e. Organizations are vulnerable to a wide variety of crimes including embezzlement, procurement fraud, sabotage of dd systems and theft of government property.
Knowing all of this information will allow you to better position yourself and to significantly increase your chances of successfully being granted your security clearance. It provides a means for adjudicators to consider a pattern of unreliable and untrustworthy behavior that may encompass multiple guidelines.
One of the keys is found in the appropriate regulations which underpin all security clearance work, and specifically in those sections dealing with extenuation and mitigation. For example, a source’s opinion that the subject is irresponsible should be substantiated by description of specific examples of the subject’s irresponsibility, such as moving out of a rental apartment without notice.
This range of values will indicate the level of severity per issue or topic. If adverse information comes from a single source, it is necessary to evaluate both the credibility of the source’s access to that information and any possible ulterior motives for providing that information.
An adjudicator must be free of any personal biases, opinions and prejudices when applying the 13 Adjudicative Guidelines.