Security Clearances and The Protection National Security Information and Procedures
Security Clearances and The Protection National Security Information and Procedures
Sheldon I. Cohen
Sheldon I. Cohen & Associates
Sheldon I. Cohen
Sheldon I. Cohen & Associates
Released by
James A. Riedel
Director
he public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing inshuctions,
.arching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments
:garding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, to Department of
)efense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204,
dington, VA 222024302, Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for
ailing to comply with a collection of information if it does not display a currently valid OMB control number.
Distribution Unlimited.
13. SUPPLEMENTARYNOTES
14. ABSTRACT
PERSEREC undertook to sponsor the development of this report in order to make available in one place a readily
understandable discussion of the complex laws and procedures that have been designed to protect National Security
information. The report provides an authoritative compendium for lawyers, security officers and for managers of
corporations who must deal with the legal and procedural aspects of security clearances and -not least-for government and
contractor employees whose livelihoods depend upon their acquiring or maintaining security clearances.
16. SECURlTY CLASSIFICATION OF: 17. LIMITATION 18. NUMBER 19a. NAME OF REPONSIBLE PERSON
Unclassified OF ABSTRACT OF PAGES James A. Riedel, Director
a. REPORT b. ABSTRACT c. TMSPAGE 19b.TELEPHONE NUMBER (Include ureu rode)
Unclassified Unclassified Unclassified 831-657-3000
Standard Form 298 (Rev. 8/98)
Prescribed by ANSI td. 239.18
The Defense Personnel Security Research Center undertook to sponsor the
development of this report in order to make available in one place a readily
understandable discussion of the complex laws and procedures that have been designed to
protect national security information. The contents of the report are relevant to all
employees and contractor personnel of the Department of Defense who require security
clearances, and also to employees of federal agencies that deal with energy, intelligence
gathering, and law enforcement.
James A. Riedel
Director
Acknowledgements
I want to acknowledge first the assistance of Dr. Theodore R. Sarbin, Project
Manager, Defense Personnel Security Research Center (PERSEREC), whose advice,
help, and understanding were immeasurable. The assistance is also acknowledged of
many people from various federal offices who provided information that was not
obtainable from published sources. Included among these are some individuals whose
identities cannot be disclosed for security reasons.
Among those whom I can identify, and to whom I am indebted, are Richard A.
Ferris, Associate Director for Investigations, U.S. Office of Personnel Management; a
representative of the Central Intelligence Agency Office of General Counsel; Kim L.
Hargrove, Esq., Assistant General Counsel, National Security Agency; Barry Dalinsky,
Office of Safeguards and Security, U.S. Department of Energy; Robert R. Gales, Chief
Administrative Judge, Defense Office of Hearings and Appeals; D. Jerry Rubino,
Director, James P. Walker, Assistant Director, and Charles L. Alliman, Associate
Director, Security and Emergency Planning staff, U.S. Department of Justice; Thomas N.
Willess, Associate General Counsel, National Imagery and Mapping Agency; Steven
Lewis, Security Specialist, Defense Security Service; and Michelle I. Walensky, Public
Affairs Specialist, Federal Bureau of Investigation.
Finally, I wish to thank Dianne Johnson and Geneva Green in my office and
Suzanne Wood at PERSEREC whose editorial assistance made this report possible.
Although all those named above provided great guidance and assistance, the
content and opinions contained in this book are the responsibility of the author alone and
to the best of my ability reflect the official positions of the departments or agencies
reviewed. I have made an effort to provide up-to-date information, although 1 am aware
that I am dealing in some sense with a moving target, for rules and regulations are
changing constantly.
vii
...
Vlll
Table of Contents
Introduction 1
Chapter 1
Constitutional and Statutory Authority for the Establishment of a
National Secrecy System 5
Chapter 2
Type and Scope of Background Investigations 13
Chapter 3
Security Clearance Investigations by the Defense Security Service 18
Chapter 4
Security Clearance Investigations by the Office of Personnel Management 22
Chapter 5
Adjudicative Guidelines for Determining Eligibility for Access to Classified
Information 26
Chapter 6
Military and Defense Civilian Employee Appeals of Adverse Clearance
Determinations 48
Chapter 7
Contractor Employee Appeals of Adverse Clearance Determinations 55
Chapter 8
Use of the Polygraph in Security Clearance Investigations 62
Chapter 9
Central Security Investigation Indices 69
Chapter 10
Sensitive Compartmented Information and Special Access Programs 72
Chapter 11
Physical Security, Facility Clearances, and the NISPOM 78
Chapter 12
Security Clearances at the National Security Agency 85
Chapter 13
Department of Energy Security Clearance Program 88
Chapter 14
Department of Justice and the Federal Bureau of Investigation
Security Clearance Program 96
Chapter 15
Removal from Government Employment for Security Reasons
Under 5 U.S.C. 5 7532 103
Chapter 16
Classified Information in Judicial Proceedings and the Classified Information
Procedures Act 106
Notes 113
Appendices
The report is not about espionage and the laws dealing with espionage. That is an
area of criminal law beyond this report's intended scope. Any deliberate intent to disclose
national security information to unauthorized recipients, particularly to foreign recipients,
is a matter for criminal investigation and prosecution by the Federal Bureau of
Investigation (FBI) and the Department of Justice (DOJ). Nor is this report about
intelligence gathering or the use of intelligence information that is within the province of
the Central Intelligence Agency (CIA), the National Security Agency (NSA), the
National Imagery and Mapping Agency (NIMA), the Defense Intelligence Agency
(DIA), and numerous other departmental intelligence agencies. Rather, this report is
about the protection of national security information to prevent such information from
being compromised and the granting of clearances and access to that information both to
companies and to individuals. It concerns the processes and procedures used by the
govement to prevent the unauthorized disclosure of the nation's security information.
The agencies principally concerned with personnel security investigations are the
Defense Security Service (formerly the Defense Investigative Service), the Office of
Personnel Management, the FBI and the CIA for Sensitive Compartmented Information.
Final clearance adjudications are principally the responsibility of the Defense Office of
Hearings and Appeals for employees of government contractors, the Department of
Energy for its employees and the employees of its government contractors; and for other
government employees, the individual agencies' Adjudication Facilities and Personnel
Security Appeals Boards.
The need for protecting a nation's secrets has been recognized from the earliest
days of established government. In the United States the authority to do so has
historically been based on the inherent war powers of the President under the US.
Constitution. Besides those general powers, Congress, by statute, has vested in the
President specific powers and means for protecting national secrets, most particularly
since the end of World War 11. Those statutes include the National Security Act of 1947
that established the CIA, and the National Security Agency Act of 1959 that established
NSA. More recently enacted was the National Imagery and Mapping Agency Act of
1996, creating NIMA from a number of offices scattered throughout the government.
That Act recognized and formalized the existence of the National Reconnaissance Office
(NRO), which until then had been so secret that its very name could not be mentioned.
Presidents, through their Constitutional powers and the powers delegated by
Congress, issued public Executive Orders and secret Directives, creating agencies and
programs. The very existence of some of these programs is treated as a national secret.
Systems for protecting secret information and for determining who will have access to
that information have also been established by Executive decree. Yet even in protection
of national security, probably the most important of the President's responsibilities, his
power is not plenary. It is balanced with the other Constitutional imperatives of due
process and equal protection for the citizens of this country. In that balance, however, the
greater the need for secrecy and the more important the secret, the less weight is put on
the individual's constitutional rights. Even in this critical area, the President's
discretionary powers are not unfettered. He could not, for example, deny employment in
a secret project simply because of a citizen's race. This country is hopefully long past the
days when it interned its citizens simply because of their national origin, as was done to
Japanese-American citizens in 1941. Although no one has a constitutional right to see
classified information, if the government's reasons for denying access to classified
information were shown to conflict with fundamental constitutional protections, the
courts today would not refuse to consider and balance the conflicting constitutional
interests.
One not familiar with the law of classified information might think that
information might simply be classified "Secret" or "Not Secret"; or even "Confidential,"
"Secret," and "Top Secret." The system is far more complex. Information is categorized
by its type, sensitivity, uses and origin. The right of an individual to see or use, i.e., to
"access" a particular type or level of classified information always depends on his need to
see the particular information. It also depends on his having been investigated and
determined to be trustworthy and reliable. The degree of trustworthiness and reliability to
which the person is held will increase, as will the intensity of their background
investigation, as the sensitivity of the information to be available to them increases.
National security law is many faceted and somewhat arcane. Terms like
"clearance" and "access" may at first blush seem the same. Nevertheless, they are
significantly different, and that difference significantly affects an individual's or
company's ability to deal with classified information. Personnel clearances and facility
clearances are interrelated. Not infrequently, the mishandling of national security
information will jeopardize both a company's right to hold classified information and an
individual's security clearance. Someone not regularly involved in these issues might be
bewildered when faced with a potential loss of a "clearance" or loss of "access." That
loss could permanently deprive a person from working in the only field they know, or a
company of a key employee or contract on which its very survival depends. At such times
assistance should be sought from those people knowledgeable about the law and
procedure concerned with protecting national security information. It is to those people to
whom this book is directed.
Note: While every effort has been made to make this book gender neutral, at times use of
terms "he or she" or even the more cumbersome "he/she" tended to make the writing
even more ponderous than it was already. For simplicity in such cases the pronoun "he"
was used to encompass both male and female employees--with apologies for this
shorthand.
CHAPTER 1
The right of the government to keep information secret is found explicitly in only
two places in the U.S. Constitution. The first, Article I, Section 5, authorizes each House
of Congress to publish a Journal of its proceedings, except for "such parts as in their
judgment requires secrecy." The other, Article I, Section 9, requiring the publication of a
statement of account of all public money "from time to time," has been interpreted to
authorize keeping secret for a time certain expenditures for military or foreign relations.'
Implicit, however, is the authority of the Executive Branch to keep information secret in
carrying out its responsibilities in the areas of national defense and foreign relation^.^
This has been recognized from the earliest days of our country going back to military
operations in the Revolutionary
The Executive Branch exercised the power to protect national defense and foreign
relations information without le a1 formality until 1947 when an executive order was first
issued under President Truman.,gThis was followed by a series of four revisions, the first
of which was issued in 1972 by President Nixon followed by three more updates under
Presidents Carter, Reagan, and linto on.' The executive order currently in effect,
E.O.12958, closely resembles the Executive Order issued under President Carter, while
the Reagan Order followed more generally the policies of President Nixon, reflecting the
ebb and flow of the philosophies and policies of the political party then in power.6
The first Executive Order establishing standards for access to classified informa-
tion by government employees was issued in 1953 by President ~isenhower.~ A separate
executive order providing procedures for appealing security clearance decisions by non-
government, contractor employees was issued in 1960by President Eisenhower and re-
mains in effect today.* Most recently, President Clinton issued Executive Order 12968 in
1995 governing access to classified information by both government and nongovernment
employees, and providing, for the first time, a government-wide procedure for appealing
access decisions by government employees.
In addition to the inherent powers of the Executive Branch under the Constitution,
its authority to keep information secret flows from five statutes: the Espionage ~ c tthe, ~
National Security Act of 1947," the Atomic Energy Act of 1954," the Counter-
intelligence and Security Enhancements Act of 1994, amending the National Security Act
of 1947,12and the Freedom of Information ~ c t .The ' ~ National Security Act directs the
Director of Central Intelligence to "protect intelligence sources and methods from unau-
thorized dis~losure."'~ The Atomic Energy Act protects an entirely distinct category of
information relating to the production of atomic weapons and nuclear materials.15 The
Counterintelligence and Security Enhancements Act of 1994 directs the President to
develop uniform requirements for background investigations and uniform standards for
appeal of access denials.I6
The authority to protect information from disclosure includes not only the power
to decide what information is to be protected, but who will have "access" to that infor-
mation. Under Executive Order 12958, a person may have access to classified informa-
tion only when a favorable determination of eligibility has been made by an agency head,
when the person has signed a nondisclosure agreement and when the person has a need to
know the i n f ~ r m a t i o nFor
. ~ ~SAP information, a standard of eligibility higher than nor-
mally established for the same level of classified information may be used.23
General guidelines for eligibility for access were established for the first time
throughout the government in Executive Order 12968. They provide that an individual
must be a U.S. citizen, of sound judgment and character, trustworthy, and free from
potential foreign allegiances and coercion.24That executive order directed the Security
Policy Board to carry out its requirements, and that Board has now developed uniform
Adjudicative Standards binding on the Executive Branch that have been issued by the
National Security ~ d v i s o r . ~Those
' uniform standards have been or are now being incor-
porated into each agency's regulations.26The uniform standards have also been incorpo-
rated by the Director of Central Intelligence in Director of Central Intelligence Directive
614 (DCID 614), the regulation controlling access to Sensitive compartmented informa-
tion ( s c I ) . ~ ~
Entirely separate systems have been established to determine eligibility for access
by contractor employees and by government employees, and for eligibility for access to
SAP and SCI information. The standards, investigatory methods, and procedures are dis-
cussed in detail in Chapters 4,5,7, and 8.
Although the President has plenary powers under the Constitution to protect the
national security and conduct foreign relations, those powers do not automatically over-
come the rights of association; freedoms of speech, religion, liberty and due process; and
the equal protection of the law guaranteed to citizens under the Fifth and Fourteenth
Amendments of the ~ o n s t i t u t i o nThe
. ~ ~ courts have balanced these potentially counter-
vailing interests, and though considerations of national security weigh very heavily on the
scales, an individual's interest in employment and to be free from discrimination cannot
be ignored.30The process that is due and the equality of protection afforded always
depend on the issues at stake. In general, however, the courts will not interfere with the
Executive Branch's discretionary judgments of eligibility.3' Colorable constitutional
claims and whether an agency has followed its own procedures are reviewable by the
courts unless Con ess has clearly expressed its intent to preclude judicial review of con-
stitutional claims!Moreover, the Supreme Court has said that any attempt by Congress
to "deny any judicial forum for a colorable constitutional claim would raise serious con-
stitutional concerns."33
Because of historical anomalies in the case law, two procedural systems have
evolved for determining eligibility for access to national security information. One sys-
tem exists for employees of government contractors, for whom a fill administrative
hearing is allowed, with the right to present and cross examine witnesses, and another for
government employees who have no such rights.37The Department of Energy, under the
authority of the Atomic Energy Act, has combined these into a single system granting the
full body of due process rights to both classes of employees.
In Greene v. McElroy, a 1959 case, the Supreme Court held that an employee of a
defense contractor, whose loyalty was questioned, had the right to be shown the govern-
ment's evidence against him and the opportunity to demonstrate that it was untrue.38The
Supreme Court's later pronouncement in Dept. Of Navy v. Egan did not require any
administrative hearing for government employees, holding that there is no inherent right
to a security clearance, and that the Executive Branch has the discretionary right to grant
access to classified i n f ~ r m a t i o nWhile
. ~ ~ there is no logical way to reconcile these two
decisions, the gap has been partially closed by later Executive action. President Clinton,
by Executive Order 12968, has provided a truncated appeals process for government
employees or applicants for employment that requires that they be presented with the
reasons for denying their eligibility for access, and be allowed an opportunity to make a
written and oral presentation to present evidence why they should have access.40While
not formalized to the degree of having a hearing on the record with the right to cross-
examine the government's witnesses, the procedure allowed by the executive order is a
degree of due process that, in all likelihood, meets Constitutional requirements, and a
degree that would be sustained by the courts.
During the Cold War years of the 1950s through the 1970s, the nation's industrial
community grew to meet the government's need for military, intelligence, and nuclear
products. Each government agency at that time developed its own requirements and stan-
dards for protecting its national security information. By the end of the 1980s, the exces-
sive cost to both industry and the government of multiple standards and requirements
became overwhelmingly apparent. It was recognized that not only was there a plethora of
government personnel security programs, but there were numerous overlapping industrial
security programs, each with differing requirements for protecting classified information
and each with differing standards for physical security of facilities. In April 1990, the
President directed the National Security Council to explore the development of a single,
integrated industrial security program that might result in cost savings and improved
security protection. Before the end of that year the Secretaries of Defense and Energy,
and the Director of Central Intelligence submitted a report recommending the establish-
ment of a National Industrial Security Program (NIsP).~~ Their report found that there
were 21 Departments and agencies, each with its own industrial security program. It
found that in DoD alone there were 47 different standards, manuals, and directives sup-
plementing the basic executive orders and legislation, creating a significant burden on
industry and govemment. It reported that more than 25,000 people had multiple back-
ground investigations conducted by the various agencies with which they dealt. The cost
to industry was $120 million a year in added administrative costs and employee down-
time while waiting for the additional clearances for employees who had already been
cleared in other areas.43That added cost was, of course, passed on to the govemment
through higher prices. The report found that standardization of requirements could reduce
duplication by at least 20 percent.
Based on that report, an interagency task force was established in December 1990
to develop a National Industrial Security Program. It was given six months to turn around
40 years of institutional evolution. The recommendations of that task force, which
included opinions and ideas from industry panels, and fiom the American Bar Associa-
tion on personnel security issues, became the basis for the simplification of the entire
classified information program. Ultimately, fiom that report came uniform standards for
determining a person's eligibility for access to classified information, and uniform appeal
procedures if a security clearance or access was denied or revoked.
The first effort to consolidate the clearance process was the; issuance of National
Security Directive 63, Single Scope Background Investigations, in 1991 that set minimum
standards for Top Secret clearances and that required each agency to recognize the back-
ground investigations of other agencies. Its purpose was to eliminate redundant and
costly investigative practices used throughout the Executive ranch.^^ That consolidated
investigation, known as the SSBI, replaced the Background Investigation (BI) required
for access to Top Secret information, and the Special Background Investigation (SBI)
required for Sensitive compartmented i n f ~ r m a t i o nThe
. ~ ~ SSBI required a personal inter-
view of the subject, law enforcement and credit checks, and interviews with people
knowledgeable of the subject's lifestyle and background covering a 10-year period. It
allowed agencies to exceed those standards to address issues unique to those agencies.
Some agencies such as the CIA, the NSA, the FBI and the Treasury Department were
allowed to continue to use polygraphs to screen employees and ap licants because of the
nature of the national security infonnation with which they dealt.4 r
The next step in the consolidation was the issuance of Executive Order 12829 on
January 6,1993, formally establishing the National Industrial Security Program. The pro-
gram was to serve as a single, integrated, cohesive industrial security program to protect
classified information. That executive order directed the National Security Council to
provide overall policy direction, directed the Infomiation Security Oversight Office
(ISOO) to oversee the implementation of the executive order, and directed the Secretary
of Defense to issue a National Industrial Security Program Operating Manual to prescribe
the specific requirements for safeguarding classified information by contractors, licen-
sees, and grantees. The Secretaries of Energy and the Nuclear Regulatory Commission
were given responsibility for the portion of the manual dealing with nuclear energy, and
the Director of Central Intelligence was made responsible for the portion dealing with
intelligence sources and methods, i.e., sensitive compartmented information.
The National Industrial Security Program Manual (NISPOM) was issued in Octo-
ber 1994, and a supplement dealing with SAPS, sensitive compartmented information
(SCI) and critical restricted data (RD)was issued in December 1 9 9 4 . ~It ~replaced the
Department of Defense Industrial Security Manual for Safeguarding Classified
Information.
The need for further consolidation remained apparent. In 1993, because of the
fragmented personnel security system, the Secretary of Defense and the Director of
Central Intelligence appointed a Joint Security Commission to study and make recom-
mendations for a simplified, more uniform, and more cost-effective system. The Com-
mission issued its report, Redefining Security, in February 1994 addressing problems not
only in personnel security, but also in physical security, classification management, and
information systems security.
In the view of many, the task of consolidation and simplification is far from com-
plete. In March 1997, the Commission on Protecting and Reducing Government Secrecy,
a bipartisan commission created by Congress to review matters related to classified
information and security clearances, issued its report.53The report contained a number of
significant recommendations among which were: (a) enactment of a statute that would
state the principles of what may be declared secret, (b) creation of a national declassifi-
cation center to coordinate the declassification of information, (c) establishment of an
Executive Branch office responsible for classification and declassificationpractices, (d)
requirement that officials who initially classify information consider the costs and bene-
fits of secrecy as a factor in keeping something secret, (e) requirement that the Director of
Central Intelligence issue guidelines for determining what intelligence sources and meth-
ods are to be kept secret, (f) further standardization of the security clearance procedures,
and (g) greater attention to the threat to automated information systems.
On May 7,1997, S. 712, dubbed the Government Secrecy Reform Act, was intro-
duced by Senators Daniel Moynihan and Jesse Helms to enact the consensus recommen-
dations of the omm mission.^^ Hearings were held and a report issued by the Senate Com-
mittee on Governmental Affairs. However, no further action was taken in the 105th
~ o n g r e s sThe
. ~ ~bill was reintroduced in the 106th Congress on January 19, 1999 by
Senators Moynihan and ~ e l m sAt . ~the~ time of this writing, no legislation has been
enacted to carry out any of these recommendations, nor has the Executive branch taken
any steps to carry them out.
CHAPTER 2
Because over the years each agency had developed its own requirements and its
own unique forms, frequently requiring information not required by other agencies, it was
decided at the highest government levels to consolidate and simplify the clearance appli-
cation process. As a first step, the White House in 1991 issued National Security Direc-
tive 63, which established standards for a single background investigation to be used
throughout the government for Top Secret clearance^.^^ Those unified standards are
known as the Single Scope Background Investigation (SSBI). That Presidential action
was overtaken by legislation in 1994 requiring the Executive Branch "to establish uni-
form minimum requirements governing the scope and frequency of background investi-
gations of all employees in the Executive branch of Government" requiring access to
classified i n f ~ r m a t i o nWhile
. ~ ~ that statutory requirement is binding on all departments,
agencies and offices of the Executive Branch of government, it does not apply to con-
tractor employees.
The requirements of the statute were carried out by Executive Order 12968 on
August 2, 1995, which directed the Security Policy Board to develop a common set of
adjudicative standards for background investigations for access to classified informa-
t i ~ nAgencies
. ~ ~ were allowed under the Executive Order to use any lawful investigative
procedure to resolve issues that might arise during an investigation. The statutory man-
date was further carried out when the Securit Policy Board published the Uniform
Investigative Standards on March 24, 1997.6 g
The Executive Order and the Security Policy Board's Uniform Standards apply to
all U.S. Government civilian and military personnel. Although not required by statute,
they also apply to consultants, contractors and their employees, licensees, and grantees of
the government.6' They establish standards for collateral clearances, i.e., Confidential,
Secret, and Top Secret, and for SCI and Special Access Programs access determinations.
"Q" and "L" accesses under the Atomic Energy Act are also covered. The Standards
allow for enhanced investigative requirements for certain Special Access Programs if
they are specifically approved under Executive Order 1 2 9 5 8 . ~ ~
The Uniform Standads require that investigations meeting the standards for a
given level of clearance must be rr~utuallyand reciprocally accepted by all agencies. They
also provide that if a person who has less than two years' break in service is reemployed,
a reinvestigation will not be required unless it appears that the person no longer satisfies
the standard:,
The Security Policy Board has established three investigative standards. The first
standard is for Confidential, Secret, and "L" clearances and includes all Secret level Spe-
cial Access Programs (except those with "enhanced requirements").63 The second stan-
dard is for Top Secret and "Q" clearances, including those in SCI and Top Secret Special
Access Programs. The third standard is for reinvestigations of persons already cleared.64
All investigations include a National Agency Check as a minimum.
The National Agency Check I ,irsists of a review of: (a) the FBI's investigative
(
and criminal history files including a fingerprint search, (b) Office of Personnel Man-
agement (0PM)'s SecurityISuitability Investigations Index (SSI), (c) the Department of
Defense Defense Clearance and Investigations Index (DCII), and (d) such other national
agency records as are appropriate to the individual's backgro~nd.~' Those other agencies
may include the Immigration and Naturalization Service for records of citizenship, the
State Department, the CIA, the Treasury Department and the Department of Defense for
military personnel records. Any other federal agency's records may be checked where
appropriate to the investigation.66For an NAC, the applicant must submit a Standard
Form 86 (Questionnaire for National Security Positions), along with all releases and a
fingerprint card.
National Agency Check with Local Agency and Credit Checks (NACLC)
A National Agency Check with Local Agency and Credit Check inquiries
includes, in addition to the National Agency Check requirements: (a) a financial review
including a credit bureau check covering the places where the applicant has resided,
worked or gone to school for the previous seven years; (b) a check with law enforcement
agemies where the applicant has lived, worked, or attended school within the last five
years; and (c) independent confirmation of date and place of birth. The investigation may
be expanded if necessary.67
The scope of the SSBI is the prior 10 years or to age 18 of the applicant, which-
ever is less. An investigation may be expanded, as necessary, to resolve employment
issues and standards unique to individual agencies. Investigative requirements are:
(a) completion of SF 86; (b) a National Agency Check on the applicant with a fingerprint
check; (c) a National Agency Check of the subject's spouse or cohabitant without a fin-
gerprint check; (d) verification for naturalized citizens of U.S. citizenship of the applicant
and of his or her immediate family members; (e) independent verification of birth, edu-
cation, employment history, and military history; (f) interviews with four references at
least three of which have been independently developed, and with any former spouse
divorced within the previous 10 years; (g) confirmation of present and past residences
and interviews with neighbors; and (h) review of public records concerning the applicant
for bankruptcies, divorces, and civil or criminal actions. A personal interview of the
applicant is required in all cases, conducted by trained investigative, counterintelligence
or security personnel. Additional interviews may be conducted to resolve significant in-
formation inconsistencies. For departments or agencies, where authorized, the personal
interview may include a polygraph e ~ a m i n a t i o n . ~ ~
The Single Scope Background Investigation is used for initial investigations for
access to Top Secret, including Top Secret Special Access Programs (SAPS), and for
access to Sensitive Compartmented Information (SCI). It is also used for "Q" access
authorizations under the Atomic Energy ~ c t . ~ '
The SSBI may be expanded to resolve issues where the applicant has resided
abroad, or has listed foreign travel or connections with possible subversive organizations.
Medical records will be reviewed if the applicant lists a history of mental or nervous dis-
orders or addiction or abuse of drugs or alcohol. In that case, interviews with relatives,
psychiatrists, psychologists, and other medical and Iaw enforcement professionals may be
required.
A preemployment polygraph is required only for those agencies for which it has
been approved. These include the FBI, the CIA, the National Security Agency, the
Defense Intelligence Agency, and a limited number of positions in the Department of
Justice and in the Drug Enforcement Agency. It may be used in connection with investi-
gations or reinvestigations by other agencies to resolve issues that arise.
Periodic Reinvestigations are required for Top Secret accesses, including those
dealing with Special Access Programs and Sensitive Compartmented Information, and
for " Q access authorization^.^^ The investigation, known as a Single Scope Background
Investigation - Periodic Reinvestigation (SSBI-PR), must be conducted at least every five
years. The requirements are the same as those for an initial SSBI with the following
exceptions: (a) a National Agency Check is not required on a spouse or cohabitant if
already completed in connection with a prior investigation, (b) no further review of edu-
cation is needed, (c) employment is verified only since the last investigation, (d) only two
references and two neighbors must be interviewed, and (e) the Treasury Department's
financial data bases are checked for unusual or illegal financial transactions covering the
period while the person held a security clearance.
Questions asked during a personal interview must have relevance to the security
determination. Questions concerning religious beliefs and affiliations, beliefs and opin-
ions regarding racial matters, political beliefs, and affiliations of a non-subversive nature
are prohibited.76AISO barred are questions relating to opinions regarding the constitution-
ality of legislative policies and questions concerning affiliations with labor organizations
and fraternal organizations.
Positions not requiring access to "national security information" can still have a
material adverse effect on the national security. Such positions are designated as Sensi-
tive positions for which a full field investigation is required.80OPM has defined four lev-
els of sensitivity: (a) Special-Sensitive - those positions with a "potential for inestimable
damage to the national security," (b) Critical-Sensitive - those with a potential for "ex-
ceptionally grave damage, (c) Noncritical-Sensitive-those with a "potential of damage
or serious damage," and (d) Non-Sensitive-those that are "potentially prejudicial.''8'
Under the PSI Program, DSS has responsibility for conducting PSIs on DoD
military, civilian and contractor personnel, and employees of other organizations per-
forming research and development for DoD. If DSS encounters evidence of espionage or
subversion, the matter must be referred to a military department counterintelligence
agency or the F B I . Allegations
~~ of possible criminal conduct arising during a personnel
security investigation must be referred to the appropriate Department of Defense criminal
investigative agency or civilian j u r i ~ d i c t i o nDSS
. ~ ~ may not refer allegations of private
consensual sexual acts between adults to law enforcement agencies or military depart-
mcl~ts(OIIILI than a departmental central adjudication facility (CAF) for security clear-
ance adjudications) except if those acts are openly in public view, for compensation,
aboard a military vessel or aircraft, or with a subordinate while on active military or
reserve duty. Information about a person's sexual orientation, or that he or she is a homo-
sexual or bisexual, may not be reported for any purpose except to a CAF for an adjudica-
tion of whether that person would be sub.ject to blackmail if trying to conceal that
informati~n.~~
remainder.'' DSS's personnel investigations arc conducted both by its Special Agents
who are government employees, as well as by private contract investigators, as is done by
other government agencies.92
DSS conducts more than 150,000 personnel security investigations annually,
which are used by DoD adjudicative facilities to determine an individual's suitability to
enter the armed forces, access classified information, or hold a sensitive position within
DoD. In addition to initial investigations, DSS conducts Periodic Reinvestigations (PRs)
to determine if it is still consistent with national security standards for a subject to con-
tinue to have access to Classified information or to be retained in a sensitive position. The
scope and frequency of a PR depends on the initial investigation conducted and the type
of information to which the subject will have access or the sensitive nature of their posi-
tion. PRs may be initiated at any time following completion of, but not later than 5 years
for Top Secret, 10 years for Secret, and 15 years for Confidential.
As a result of policy changes affecting the frequency and scope of PRs and the
upsurge in information technology positions in government and industry requiring clear-
ances, there is a significant backlog of PRs within DoD resulting in an increased investi-
gative workload within DSS. In order to meet requirements, DSS has initiated an
approach to augment its investigative workforce with the use of private industry
contractors and military reservists. Additionally, in a memorandum dated September 19,
1999, the Assistant Secretary of Defense (C3I), mandated that all investigations for DoD
civilian personnel, except for overseas investigations, be conducted by the Office of Per-
sonnel Management beginning October 1, 1999. This arrangement will be reviewed at the
end of FYOO and each subsequent fiscal year until the Periodic Reinvestigation backlog is
resolved. Presidential appointees in DoD who require security clearances are investigated
by the FBI. Although the National Security Agency and the National Reconnaissance
Organization are "carve outs" from DSS's investigative authority, DSS also does the
investigations for all but the most sensitive positions at NSA?~
DSS uses polygraphs during security clearance investigations when unresolved is-
sues have arisen during the investigation. It does not do counterintelligenceinvestigations
or clearance investigations that require a polygraph as part of the initial clearance proc-
ess. The polygraphs may be used as a personnel security screening measure only in those
limited instances authorized by the Secretary of Defense in DoD Directive 5210.48.~~
Participation by the individual being investigated in a polygraph for a "collateral," i.e.,
Confidential, Secret or Top Secret clearance, is voluntary, and no inference may be
drawn simply from the person's refusal to take one. However, if issues remain that have
not been resolved in the individual's favor, the investigation will go forward in that
status, and inferences will be drawn against granting a security clearance based on those
unresolved issues. The use of polygraphs during security investigations is more fully dis-
cussed in Chapter 8.
Pursuant to the Privacy Act of 1974, most of the information contained in the
DSS investigative file is available to the Subject, but only after the investigation is com-
pleted. Some material such as confidential source information, third agency information,
medical information which a physician has determined would be harmfd if released to
the Subject, and information which would constitute an unwarranted invasion of the per-
sonal privacy of another person (e.g., spouse NAC information) may be exempt from the
mandatory disclosure provisions of the Privacy Act and therefore may not be released to
the Subject. A request for investigative files should be directed in writing to the Defense
Security Service, Privacy Act Branch, P.O. Box 46060, Baltimore, MD 21 240-6060. The
request should be signed by the Subject of the file, notarized and contain the Sub'ect's
social security number, date of birth, and address where the file is to be mailed.91)
The adjudicative agency for contractors is the Defense Office of Hearings and
Appeals. For members of the military or civilian employees of the DoD, the investigation
is referred to their respective cAFs.~*The decision whether a person is sufficiently trust-
worthy to hold a clearance is initially made by those offices. If the decision is unfavor-
able, an appeal by a military member or government employee may be taken from the
CAF to the Personnel Security Appeals Board of the Department concerned, or for a
contractor employee to the Defense Office of Hearings and Appeals for a final decision
(See Chapters 6 and 7).
Facility Clearances
The Industrial Security Program includes the Defense portion of the National
Industrial Security Program; the Arms, Ammunition, and Explosives (AA&E) Program;
and the Critical Infrastructure Protection (CIP) Program. The National Industrial Security
Program (NISP) was established to ensure that private industry and colleges/universities
properly safeguard classified information in their possession while performing on U.S. or
foreign government classified contracts or research and development. The AA&E Pro-
gram provides protection for conventional arms, ammunition, and explosives in the cus-
tody of DoD contractors. The CIP provides for the protection and assurance of Depart-
ment of Defense Critical Assets and Infrastructures in the private sector throughout the
world to support national security preparedness responsibilities during peace, crisis, and
war.
Under the NISP, DSS is responsible for granting facility clearances and for
ensuring the protection of classified information in industry. A facility clearance is an
administrative determination that a company is eligible for access to classified informa-
tion or for an award of a classified contract.99Facility clearances are more fblly discussed
in Chapter 11. Periodic reviews of cleared companies are accomplished by DSS Indus-
trial Security Specialists who are trained in the requirements of the NISPOM.
Until 1996, the Investigations Service conducted its investigations with a gov-
ernment staff of about 750 personnel. Now, all of its investigations are contracted out to
USIS, Inc., a private corporation formed with government approval, comprised of former
OPM staff investigators. The Investigations Service, now with a staff of about 50, man-
ages and does quality assurance checks on the investigations done by USIS, Inc. The
Investigations Service operates on a revolving fund basis, charging its customer agencies
for the cost of its investigations. These currently run fiom about $60 for a National
Agency Check to $2,995 for a Single Scope Background Investigation with rush
service.'03
OPM characterizes all investigations on a scale of "A" through "D," "A" cases
being those with no substantial issues, and " D cases being those with very substantial
issues of concern. The cases are rated based upon a matrix of standards established by
OPM that it calls "issue codes" and "seriousness codes."'" Code ratings are assigned by
the investigator to any questionable conduct relevant to the uniform Adjudicative Stan-
dards, the ratings are tallied and the case is assigned an overall rating. If a completed
investigation is coded "D" when forwarded by OPM to the requesting agency for adjudi-
cation, the agency must report back to OPM within 30 days of what action it has taken. If
the agency takes no action, OPM may revoke the employee's eligibility for government
employment, based on a determination of "unsuitability."
The number of investigations done by OPM, and the results of those investiga-
tions has remained remarkably consistent fiom year to year.106Noteworthy is how many
contain "actionable" issues. Less than half the Single Scope Background Investigations,
Background Investigations and Limited Background Investigations show no "actionable"
issues. For Periodic Reinvestigations of those people already holding security clearances,
slightly more than half show no actionable issues. Individuals having National Agency
Check with Inquiries investigations for the lowest level clearances fared the best with the
least number of issues of concern.
In fiscal years 1996 through 1998, OPM conducted, on yearly average, 4,276
SSBIs for Top Secret clearances. Of those, only 45.8 percent of the individuals investi-
gated had no actionable issues, 35.2 percent had minor to moderate issues, and 6.3 per-
cent of individuals investigated had substantial major issues of security concern in their
b a c k g r ~ u n d .The
' ~ ~ record was even worse for the 18,477 Background and Limited
Background investigations conducted annually. Of those, only 38.8 percent had no
actionable issues, 43.1 percent had minor to moderate issues of concern, and 10.6 of the
investigations raised substantial major issues of concern. Surprisingly, investigations for
the lowest level clearances resulted in 61.7 percent of the applicants having no issues of
concern and only 0.5 percent with major issues.
Proposed revisions to Parts 732 and 736 were published in January 1996 but as of
January 1999 were still under consideration.' l o The proposed revisions incorporate the
parts of the FPM, such as the investigative requirements and sensitivity levels of posi-
tions, included only by reference in the current regulations.
The granting of confidentiality to a source is far more restricted under the pro-
posed regulations. Whereas now, there is no limitation on promising that a source's iden-
tity will be kept confidential, as proposed, a pledge of confidentiality could only be
granted "in the most compelling circumstances and only upon specific request by the
source." A pledge of confidentiality could not be assumed and, if granted, would extend
only to the identity of the source or any information that might reveal the source's
''
identity.'
The proposed regulations also incorporate the provisions regarding the use of the
polygraph, formerly in the FPM."~Its use under either the former FPM or the proposed
regulations is limited to those Executive Branch agencies which have a highly sensitive
intelligence or counterintelligence mission directly affecting the national security, "e.g., a
mission approaching the sensitivity of the CIA." All other Executive Branch departments
and agencies are prohibited from initiating a polygraph examination for em loyment
screening purposes for applicants or appointees to the competitive ser~ice.''~Agencies
desiring to use the polygraph for preemployment screening must obtain the prior approval
of OPM and must adopt regulations in accordance with strict OPM standards specifying
how the polygraph is to be used.'14 OPM does authorize the use of polygraphs during
preemployment investigations of certain personnel in the Drug Enforcement Administra-
tion, including Special Agents and Intelligence Analysts. Some GSA employees assigned
to DoD communications and certain selected positions in the Secret Service and the
Bureau of Alcohol, Tobacco, and F i r e m s are also polygraphed.
Although the United States Government has long had programs to protect national
security secrets, it was not until 1953, with the issuance of Executive Order 10450, that
the criteria for judging a person's eligibility for a security clearance were first formalized.
That executive order remains in effect. The criteria formulated in Executive Order 10450,
although often reworded and reworked, are essentially the same today as they have been
for more than 45 years.
Over the years as administrations changed, each would issue its own executive
order modifying and adjusting the systems, standards, and procedures for protecting
national security inf~rmation."~ Also, each agency dealing with classified information
applied its own interpretations to thc standards for clearances of Executive Order 10450.
Within DoD alone, interpretation and application of the standards fluctuated over time
from very general to very specific to rather general again.
Although not required by statute, the Executive Order and the Security Policy
Board's Uniform Guidelines apply not only to all U. S. government civilian and military
personnel, but also to consultants, contractors and their employees, and licensees and
grantees of the govemment.'20The Guidelines apply to collateral clearances, i.e., Confi-
dential, Secret, and Top Secret, to determinations for access to Sensitive Compartmented
Information and to Special Access Programs, and to " Q and "L"accesses under the
Atomic Energy Act.
The Security Policy Board also adopted Uniform Investigative Standards for all
access investigations. Those standards allow for enhanced investigative requirements for
certain Special Access Programs that may be specifically approved under Executive
Order 12958.'2' The Uniform Standards require that investigations that meet the require-
ments at a given level must be mutually and reciprocally accepted by all agencies.'22
The Adjudicative Guidelines require that each case must be judged on its own
merits, but that any doubt must be resolved against granting access to classified informa-
tion. In the end, there must be a finding that it is clearly consistent with national security
to grant an individual a clearance and access.
(4) Resolved or appears likely to favorably resolve the security concern; and
After evaluating the information of security concern, the adjudicator may consider
temporarily suspending the person's access pending a final adjudication. Where the in-
formation is not serious enough to warrant a revocation of a security clearance, the clear-
ance may be continued with a warning that future incidents of a similar nature may result
in revocation of access.12*
The importance of the "whole person" concept cannot be over emphasized. Con-
duct by one person that is unacceptable might not disqualify another. For example, the
use of a variety of drugs by a person in high school or college, even to a substantial de-
gree, might not disqualify that person, while a single use of marijuana by an adult while
that person held a security clearance would probably cause loss of a clearance. Also, a
person active in his community and with a record of service to others would be more
likely to retain his clearance after being caught shoplifting during a period of emotional
stress, than someone with a series of minor traffic offenses and arrests for public disorder
involving alcohol.130Someone with a diligent work record and a history of adherence to
rules and regulations would be more likely to retain his clearance after a single violation
of security regulations than someone with the same violation who habitually disregarded
work rules.
Disqualifying Conditions:
Mitigating Conditions:
(1) The individual was unaware of the unlawful aims of the individual or
organization and severed ties upon learning of these;
(2) The individual's involvement was only with the lawful or humanitarian
aspects of such an organization;
(3) Involvement in the above activities occurred for only a short period of
time and was attritdable to curiosity or academic interest; or
(4) The person has had no recent involvement or association with such
activities.
Comments
The Concern. A security risk may exist when an individual's immediate family,
including cohabitants and other persons to whom he or she may be bound by
affection, influence, or obligation are not citizens of the United States or may be
subject to duress. These situations could create the potential for foreign influence
that could result in the compromise of classified information. Contacts with
citizens of other countries or financial interests in other countries are also relevant
to security determinations if they make an individual potentially vulnerable to
coercion, exploitation, or pressure.
Disqualifying Conditions:
(6) Conduct which may make the individual vulnerable to coercion, exploita-
tion, or pressure by a foreign government;
Mitigating Conditions:
Contacts with foreign citizens are the result of official United States Gov-
ernment business;
Contact and correspondence with foreign citizens are casual and infre-
quent;
Foreign financial interests are minimal and not sufficient to affect the
individual's security responsibilities.
Comments
Disqualifying Conditions:
Mitigating Conditions:
Becoming a naturalized United States citizen does not automatically end foreign
citizenship, as many foreign countries permit dual citizenship. Also, some countries grant
automatic citizenship to the offspring of their citizens regardless of where the children are
born. It is the exercise of rights under a foreign citizenship or the acceptance of benefits
from a foreign government because of that citizenship that is of ~oncern.'~' Those acts
are indicators of possible dual loyalty or possible coercion through the termination of for-
eign benefits. While renunciation of a foreign citizenship is not absolutely required, it is
the clearest indicator of a single loyalty to the United
Disqualifying Conditions:
(1) Sexual behavior of a criminal nature, whether or not the individual has
been prosecuted;
(2) Compulsive or addictive sexual behavior when the person is unable to stop
a pattern of self-destructive or high-risk behavior or that which is symp-
tomatic of a personality disorder;
(4) Sexual behavior of a public nature andlor that which reflects lack of dis-
cretion or j ~ d g n e n t . ' ~ '
Mitigating Conditions:
(1) The behavior occurred during or prior to adolescence, and there is no evi-
dence of subsequent conduct of a similar nature;
(2) The behavior was not recent, and there is no evidence of subsequent con-
duct of a similar nature;
This guideline (and Executive Order 12968) specifically excludes sexual orienta-
tion or preference as a basis for denying a clearance."' However, if one's sexual orienta-
tion or preference is not openly acknowledged, that becomes a security concern because
of the potential for ~ 0 e r c i o n .That
l ~ ~ concern for coercion is not limited to only homosex-
ual activity but also to heterosexual activity such as adultery which might be cause for
blackmail.
Guideline E-Personal
Mitigating Conditions:
The falsification was an isolated incident, was not recent, and the individ-
ual has subsequently provided correct information voluntarily;
Comments
Guideline E is a catchall for any types of conduct not otherwise prescribed and is
an overlap of all of the other guidelines. This guideline is a combination of former Crite-
rion "I" which barred "acts of omission or commission that indicated poor judgment, un-
reliability, and untrustworthiness," and former Criterion "0"which barred "any knowing
and willful falsification, cover-up, concealment, misrepresentation, or omission of a
material fact" from any written or oral statement given to the government. Because a
violation of any other guideline is also a violation of this one, it is the government's
practice, when charging a violation of any of the other guidelines to generally also charge
a violation of Guideline E . ' ~ ~
A frequent reason for denying of a clearance under this guideline is the failure to
file federal and state income tax returns. Though no taxes may be owed, the failure to file
is considered an unwillingness to follow rules and regulations and a violation of criminal
law. Generally, if a person completes his filings by the time of the adjudication, a clear-
ance will be granted. However, if there are subsequent failures to file, as often occurs, the
clearance will generally be revoked.
Disqualifying Conditions:
(5) Financial problems that are linked to gambling, drug abuse, alcoholism, or
other issues of security concern.
Mitigating Conditions:
(3) The conditions that resulted in the behavior were largely beyond the per-
son's control (e.g., loss of employment, a business downturn, unexpected
medical emergency, a death, divorce or separation);
(4) The person has received or is receiving counseling for the problem, and
there are clear indications that the problem is being resolved or is under
control;
Comments
History has shown that the need for money has often been the cause of traitors re-
vealing national security information. Excessive debt is viewed as one of the most serious
possible sources of coercion. As the guideline indicates, debt itself is not as critical as the
reasons for one's being in debt and the efforts being taken to resolve it.Is3 Filing for
bankruptcy does not cause an automatic revocation of a clearance. If the bankruptcy
resulted from a profligate use of credit for purchasing luxuries, it will be viewed as re-
sulting from poor judgment and lack of concern for others.'54 If, on the other hand, it was
caused by factors beyond the debtor's control, such as unexpected medical bills, the filing
may be viewed positively since excessive debt will have been eliminated as a possible
source of coercion. Debt alone will not cause the revocation of a clearance if the person is
making good-faith efforts to repay the debt within their means."'
Disqualifying Conditions:
Mitigating Conditions:
(2) The problem occurred a number of years ago, and there is no indication of
a recent problem;
(3) Positive changes in behavior supportive of sobriety; or
Comments
Alcohol, drug abuse and financial instability are the three most common reasons
for denial or loss of a security c ~ e a r a n c e .The
' ~ ~ government need not show that the indi-
vidual is :ti1 ;ilcoholic, an alcohol abuser, or alcohol dependent. Several incidents of alco-
hol-related incidents at or away from work are sufficient to question a person's judgment
or reliability.'58 The more serious the incident the fewer incidents will be required to re-
voke a clearance. Even if there have been no incidents, excessive consumption alone can
be the basis for denial or loss of a clearance.
The disqualifying conditions of this guideline are the easiest in theory and the
hardest in practice to overcome. Ideally, if a person enters and successfully completes an
alcohol rehabilitation program, and abstains from alcohol for at least 12 months, the
clearance should be restored. Accomplishing that, however, is sometimes extremely dif-
ficult. Despite the minimum of a year's abstinence as stated in the guideline, adjudicative
authorities generally look for at least two to three years before they will restore a clear-
ance. 159
Drugs are defined as mood- and behavior-altering substances, and include (a)
drugs, materials, and other chemical compounds identified and listed in the Controlled
Substances Act of 1970, as amended (e.g., marijuana or cannabis, depressants, narcotics,
stimulants, and hallucinogens), and (b) inhalants and other similar substances. Drug
abuse is the illegal use of a drug or use of a legal drug in a manner that deviates from
approved medical direction.
Disqualifying Conditions:
Mitigating Conditions:
Comments
Any illegal drug use, possession, purchase, sale, or distribution is grounds for
denial or revocation of a clearance. While the former Adjudicative Criteria were very
specific in listing the recency of use and the amount and type of illegal substance used as
factors to be considered in mitigation, the current guideline simply requires that it was
"not recent," and "an isolated or aberration event."161 Wide latitude is left to the adjudi-
cative body to consider mitigating facts, and there is no assurance of consistency from
board to board or case to case.16*
Finding anyone graduating from college today who has not used illegal sub-
stances at some time is difficult. If the test were that only a person who never used or
abused drugs could get a clearance, there would probably be few people in government or
the defense industry under the age of 60. For that reason, much latitude is given to sub-
stance abuse in high school and c 0 1 l e ~ e .Once
l ~ ~ a person has graduated, however, the
assumption is that he has entered the working world and matured.164Much less leeway is
given after that time.
When prior substance abuse is self-reported in a personnel security questionnaire,
the individual will be asked during a personal interview whether he intends to refrain
from the use of any illegal substances in the future. Unless an unqualified "yes" is given,
he will be denied a clearance.
No leeway will be given to any drug abuse while one holds a clearance.lG5The
government adheres to a zero-tolerance drug policy. Drug abuse after a clearance is
granted is considered a willhl breach of security regulations and will be grounds for
revocation of the clearance and loss of a job, if it is a job for which a clearance is
necessary. 166
The Concern. Emotional, mental and personality disorders can cause a signifi-
cant deficit in an individual's psychological, social, and occupational hnctioning.
These disorders are of security concern because they may indicate a defect in
judgment, reliability, or stability. A credentialed mental health professional (e.g.,
clinical psychologist or psychiatrist), employed by, acceptable to, or approved by,
the government, should be utilized in evaluating potentially disqualifying and
mitigating information fully and properly, and, particularly, for consultation with
the individual's mental health care provider.
Disqualifying Conditions:
(2) Information that suggests that an individual has failed to follow appropri-
ate medical advice relating to treatment of a condition, e.g., failure to take
prescribed medication;
(4) Information that suggests that the individual's current behavior indicates a
defect in his judgment or reliability.
Mitigating Conditions:
Comments
The guideline recognizes that mental health counseling may be necessary and
temporary at times of personal stress, such as a death in the family, illness, or marital
problems. It fkther recognizes that many mental health problems that in the past were
intractable are now curable or can be controlled by medication. Nevertheless, serious
mental disorders that do not respond to medical treatment will bar an individual from
access to classified information.
Behavior that does not rise to the level of a serious mental disorder can still result
in the loss of a clearance, and it is this category that is the most problematic. Included
among this concern are "personality disorders" that can cause "a significant deficit in an
individual's social and occupational functioning." The disqualifying conditions may be
"a pattern of high-risk, irresponsible, aggressive, antisocial, or emotionally unstable
behavior." Assessment of behavior in this category is the most subjective and may
depend as much on the personality of the investigator as on the applicant for a clearance.
Under the guideline, theoretically an engineer who liked to race motorcycles on the
weekend might be considered to exhibit "high-risk, irresponsible" behavior, or a physicist
who was unconcerned about his clothing fashion might be viewed as showing a deficit in
social functioning, or a computer programmer who did not socialize with his coworkers
might be considered to have a deficit in his occupational functioning. In general, how-
ever, only if a credible credentialed mental health professional were to say that the per-
sonality characteristics affected the person's judgment and reliability in ways that made
him untrustworthy would the clearance be denied or revoked. This is a difficult of line to
draw, and one that could eliminate the most brilliant from working on the national
defense, if judged by their eccentric and nonstandard habits. A common sense approach
becomes most important in separating behavior that simply varies from social standards
to that which is an identifiable mental health condition.
Guideline J--Criminal
The Concern. A history or pattern of criminal activity creates doubt about a per-
son's judgment, reliability and trustworthiness.
Disqualifying Conditions:
Mitigating Conditions:
(3) The person was pressured or coerced into committing the act, and those
pressures are no longer present in that person's life;
(4) The person did not voluntarily commit the act, andlor the factors leading
to the violation are not likely to recur;
(5) Acquittal; or
Comments
For the purposes of a security clearance, it is not the outcome of the charge that is
important, but the nature and gravity of the underlying conduct and the reason for the
dismissal or expungement of the charge.17*If a dismissal is for technical reasons, such as
untimeliness in bringing the charge or as a result of a policy of leniency for first offend-
ers, the underlying charges will be considered as part of the security review.'73 If the
dismissal or acquittal was because there was no factual basis to the charge, that, too, will
be considered.
Guideline K S e c u r i t y ~ i o l a t i o n s ' ~ ~
Disqualifying Conditions:
Mitigating Conditions:
Actions that:
Comments
Failure to comply with security regulations is viewed as among the most serious
of violations of the guidelines, as it goes to the very heart of the security process.'76 Will-
ful disclosure of classified information will certainly lead to the revocation of a clearance
and may result in criminal prosecution, even if not done with subversive intent.'77 Re-
peated unintentional infractions, even if minor, may also lead to the revocation of a clear-
ance.I7' Examples are inadvertently shredding a classified document without properly
accounting for it or leaving a computer disc in a desk drawer at the end of the day, rather
than locking it in an authorized safe.17' Such conduct is considered indicative of a lack of
the diligence required for the protection of classified information. While a first or second
violation may result in a reprimand, subsequent infractions of security regulations, even if
unintentional and not causing a compromise of classified information, will likely lead to
the revocation of a clearance.
Disqualifying Conditions:
Mitigating Conditions:
(1) Evaluation of the outside employment or activity indicates that it does not
pose a conflict with an individual's security responsibilities; or
Comments
Activities most likely to cause concern under this guideline are memberships in
scientific and technical professional ~ r ~ a n i z a t i o n s .Such
' ~ ' organizations fiequently pub-
lisl~research that, although not classified, may relate to the classified work being done by
the cleared individual. Of concern is the possibility of disclosure, at meetings or sympo-
sia, of unclassified information gained through classified research, being combined with
other unclassified information to give insight into classified work. Obtaining prior
authorization by the cleared individual to attend meetings or to make such presentations
is probably the safest way to avoid the possibility of a violation of this guideline.
Disqualifying Conditions:
Mitigating Conditions:
(5) The misuse was followed by a prompt, good-faith effort to correct the
situation.
Comments
Although it would appear that the information technology systems to which this
guideline refers are those used for classified or sensitive systems, in the several reported
cases from DOHA and DOE it has been applied to nonclassified and nongovernrnent
computers and to commercial copyrighted software.'83The use of a nonclassified gov-
ernment computer for viewing "adult" material on the Internet has been the basis for
denying a security clearance.'" Like the other guidelines, willful and criminal violations
of this guideline will assuredly cause loss of a clearance. The unintentional or noncrimi-
nal violations are more frequently the subject of a security investigation.
The occasional use of a personal computer for preparing a shopping list or a per-
sonal letter, while an unauthorized use of government property, is far from a rarity. The
use of Tempest-shielded computers for such a purpose, however, puts the use on an
information technology system that the guideline specifically addresses. Although the
preparation of a personal letter or shopping list is a violation of the guideline, it is the
more serious misuse of equipment used to process, manipulate, or store classified or sen-
sitive data that is of greater concern. Taking home a computer disc containing classified
information to work on it, though well-intentioned, is a prohibited violation. Failing to
remove and secure a hard drive containing classified information at the end of the work-
day is another violation. It is such actions, although well-intentioned or inadvertent, that
are a cause of security concern.
CHAPTER 6
The Supreme Court in Departmetzt of the Navy v. Egan has held that "no one has
a right to a security clearance" and that "the grant of a clearance is an affirmative act of
discretion ... only when clearly consistent with the interests of the national security."'85
That decision reflects what has been the policy and practice of the Executive Branch of
the govemment since at least the modem origin of the government's program. It was first
formalized in Executive Order 10450 in 1953. That Executive Order, still in effect, deals
only with security requirements for civilian government employees. Similar standards
and criteria have also been applied by Defense Department regulations to applicants for
government employment, to military personnel, and to contractor employees under the
Industrial Security Program. The present system for determining who will have access to
classified information, how those determinations are made, and how decisions may be
appealed was formulated in Executive Order 12968, signed by President Clinton in 1995.
For Department of Defense civilian employees and military personnel, this system is
implemented by DoD Directive 5200.2 and its corollary regulation, DoD 5200.2-R. Each
of the military departments has its own regulation.'86
Prior to the issuance of Executive Order 12968, DoD Regulation 5200.2-R pro-
vided that when a person's clearance was denied or revoked, he would be given: (a) a
detailed statement of why the unfavorable action was being taken, (b) the opportunity to
reply in writing to the authority that issued the statement of reasons, (c) a written re-
sponse to the reply stating the final reason for the decision to deny or revoke a clearance,
and (d) the right to appeal in writing to a higher authority in the DoD component con-
cerned. There was no right to a personal appearance, no right to see or challenge the evi-
dence on which the decision was based, no right to know or cross-examine the accuser,
and no right to present testimony, either personally or by witnesses, to counter the accu-
sations or to support the continuation of a clearance. This was the system approved by the
Supreme Court in the Egan case. The Court never addressed the issue of due process be-
cause, it held, that there was "no right" to a security clearance, and without an enforce-
able right, there is no particular process due.Is7
The current standards embodied in Executive Order 12968 resulted from more
than 11 years of discussion by two administration^.'^^ In March 1983, President Reagan
signed National Security Decision Directive 84 that directed, among other things, that a
study group be formed to review the federal personnel security system and recommend
revisions to existing Executive Ordcrs and regulations. The study resulted in a report to
the Secretary of Defense known colloquially as the Stilwell Commission report, recom-
mending various changes.lS9A draft executive order was circulated to various agencies in
January 1989 that would have authorized significant cutbacks in the procedural rights
then afforded govemment employees and applicants. Opposition from members of
Congress, federal employee unions, the American Bar Association, and other groups
caused the Executive Branch to reconsider and finally withdraw the proposal. With the
change in administrations in 1992, a new study was undertaken which led to the amend-
ment of the National Security Act of 1947, requiring uniform adjudication standards and
procedures.190In 1995, Executive Order 12968 was adopted to carry out the requirements
of the new law.
The new executive order did not provide to government employees all of the pro-
cedural safeguards already afforded to contractor employees, notably the right to a hear-
ing. It did, however, for the first time provide government employees and applicants for
employment the opportunity to present their side of the case and to have it heard outside
the security establishment. Executive Order 12968, while not fully satisfying either those
advocating a full due-process hearing or the security offices' desire for a quick and eco-
nomical decision, balanced the need to protect the nation's secrets with an individual's
right not to be unfairly deprived of his employment or professional career.
E.O. 12968 makes a number of significant changes in the way security clearances
are considered and granted or denied. For the first time, it imposes uniform standards on
government agencies in granting security clearances and access to classified information.
It directs the Security Policy Board to issue implementing standards within 180 days.lgl
The executive order also makes the uniform standards applicable to applicants for gov-
ernment employment, members of the Armed Forces, and civilian government employees
(as well as contractor employees). It prohibits discrimination based on race, sex, color,
religion, national origin, disability, or sexual preference in the granting of access to clas-
sified information.lg2
The executive order provides the right to a personal appearance by the applicant
or employee, with counsel, to testify and to present written evidence before a fact-finding
body and the right to a decision by a panel composed of a majority of members outside
the security field.
The vast majority of individuals employed by the government who are required to
have national security clearances are civilian employees of the Department of Defense
and members of the armed forces. Their clearances are controlled by Department of
Defense Personnel Security Program Regulation, DoD 5 2 0 0 . 2 - ~ .Chapters
'~~ 6,7 and 8
of that regulation address adjudications, the issuance of clearances, and accesses and
appeals of unfavorable clearance and access decisions.
Before a clearance or access is granted, the standard that must be met is that
entrusting the person with classified information or assigning the person to sensitive
duties is clearly consistent with the national security. That decision must be reached by
using an overall common sense evaluation of all relevant information, both favorable and
unfavorable, including prior experience in similar cases.'98 To ensure uniformity, the
military departments and some other DoD components are required to establish a Central
Adjudication Facility (CAF), to make personnel security determinations, and a Personnel
Security Appeals Board (PSAB) to hear appeals of those determinations. Any proposed
unfavorable determination must be signed by a civilian, of at least grade GS-11 or 12 or a
military officer of rank 0-4.199
The relevant factors that must be considered for government employees and
applicants are the same as those for contractor employees. They are: (a) the nature and
seriousness of the conduct, (b) the circumstances surrounding the conduct, (c) the fie-
quency and recency of the conduct, (d) the age of the individual, (e) the voluntariness of
participation, and (f) the absence or presence of rehabilitati~n.~"
The DoD regulation refers to DCID 614 for the adjudication policy for access to
SCI.~O~
The individual may respond in writing to the appropriate CAF within 30 days
from receipt of the SOR. The time for response is quite limited. The individual must give
notice of his intent to respond within 10 days after receipt of the SOR, and must file a
written response within 30 days. Any extension for more than 30 days must be by written
request to the employing organization. Requests can only be granted by the CAF.~" Fail-
ure to submit a timely response will result in forfeiture of all fkther appeal rights.
If the individual's response is not persuasive, the CAF will issue a Letter of
Denial stating the final reasons for taking the unfavorable action as specifically as
privacy and national security considerations permit. Denial of a clearance or access may
be expected between 60 and 90 days after the CAF's response. Following the CAF7s
denial, the person may appeal without a personal appearance directly to the component's
Personnel Security Appeals Board (PSAB) or may have a personal appearance by
requesting one before the Defense Office of Hearings and Appeals (DOHA). The per-
sonal appearance will be heard by an administrative judge of DOHA, the same judges
who also conduct full administrative hearings on the record for defense contractor
employees.
DOHA will schedule a personal appearance and will provide its "recommenda-
tions" to the appropriate PSAB, generally within 60 days following receipt of the request
for the personal appearance.206 he findings and conclusions of the DOHA administrative
judge are recommendations only, which the PSAB may accept, reject, or modify as it
sees fit. Following receipt of the appeal, or if there is a personal appearance, receipt of
the recommendations of the DOHA administrative judge, the PSAB will provide a writ-
ten decision including its rationale for the decision, normally within 30 to 60 days. The
decision of the PSAB is final and not appealable.207
The regulations establishing the procedures for the conduct of the personal
appearances are very perfunctory. They simply require that the administrativejudge con-
duct the proceeding "in a fair and orderly manner." The appellant may be represented by
legal counsel or by a non-lawyer personal representative. Approximately three percent of
individuals seeking a personal appearance before DOHA are represented by
The individual, either personally or through counsel, may make an oral presentation and
may respond to questions by his counsel, his personal representative or by the adminis-
trative judge. No DoD department or agency currently provides legal counsel for its
civilian employees, but the Navy, unlike the other military departments, does provide
legal counsel for its military personnel.
The appellant may submit documents relevant to whether the adverse determina-
tion should be overturned but may not present witnesses. Because the government's wit-
nesses will not be present, the appellant will have no opportunity to cross-examine them.
Timeliness is another area where actuality does not meet expectation. According
to DoD 5200.2-R, DOHA is to provide a recommendation to the PSAB within 60 days
after its receipt of a request for a personal appearance, and the PSABs are to issue a final
decision within 30 to 60 days after receipt of the recornmendati~n.~'~ DOHA is thus do-
ing better than the expected standard, averaging 49 days from receipt of notice of intent
to appeal to decision. The PSABs do less well, averaging 87 days from their receipt of
DOHA'S recommended decision to their own final decision.213While that is the average,
many final decisions take from 130 to 170 days.
Although the DoD regulation requires that the PSABs provide the reasons for
their decision, whether it be sustaining or overturning the original CAF decision, for the
most part they do not."' Generally, the final PSAB decision will simply be a statement
affirming or reversing the CAI? decision with no reason given and no explanation as to
why a contrary DOHA recommended decision was
DOHA does not provide a copy of its recommended decision to the employee or
applicant before submitting it to the PSAB so there is no opportunity for that person to
file objections or to note any errors. The PSABs also generally do not provide the
employee with a copy of DOHA's recommended decision with their final decision since
it is not required by regulation. DOHA does, however, automatically send a copy of its
recommended decision to the employee or applicant after the final PSAB decision is
issued.
CHAPTER 7
The provisions of DoD Dir. 5220.6 have, by mutual agreement, been extended to
20 other federal departments and agencies?I7 Absent, however, are the Central Intelli-
gence Agency, the National Reconnaissance Organization, the Federal Bureau of Investi-
gation and the Department of Energy, all of which have their own contractor review pro-
cedures. Since the DoD Directive by its terms excludes cases dealing with access to
Sensitive Compartment Information (SCI) and access to Special Access Programs
(SAPS), the lack of inclusion of the CIA and NRO from its coverage has no real effect on
contractors with those agencies, as everything they do falls within one or both of those
categories.218The Department of Energy, having jurisdiction under the Atomic Energy
Act, conducts its own security review program that offers procedural protections similar
to those in the DoD Directive. DOE'S program is discussed in Chapter 13. Procedures for
appealing decisions denying access to SCI under Director of Central Intelligence Direc-
tive 614 (DCID 614) are discussed in Chapter 10.
There are no formal procedures for protesting a denial of access to a SAP. Gener-
ally, the person whose access is denied will never know that he or she has even been con-
sidered and rejected. This lack of any "due process" procedures in the SAP arena also
arises fi-om Green v. McElroy, which suggested that the President might have inherent
authority to deprive a person of his employment in these situations so long as it was done
explicitly?19The Supreme Court's suggestion, as it applied to contractor employees, was
adopted by the Executive Branch in Executive Order 10865, $ 9 , and DoD Directive
5220.6, Paragraph B.6. Government employees are also explicitly excluded from
appealing SAP access decisions by Executive Order 12968.
Procedures at DOHA
DOHA requires that the applicant submit a "detailed written answer to the SOR
under oath." A general denial of the charges is insufficient. Because the SOR often mixes
factual allegations and legal conclusions, unless an applicant intends to admit that he is
unworthy of holding a security clearance, he must deny each paragraph individually and
admit only those particular facts he does not intend to contest. An applicant may choose
to not contest some or all of the factual alle;;ations, but defenses and mitigating circum-
stances may exist which, if raised, would avoid a finding of unsuitability. If an applicant
files an answer admitting to the entire SOR, including the legal conclusions, and then on
reflection or after retaining counsel amends his answer admitting only to those facts that
are truly uncontested, both the first and second answers may be considered by the
administrative judge in reaching a determinati~n.~~'
Hearings are normally held within a metropolitan area near the applicant's place
of employment or residence. Since the administrative judges and the government's attor-
neys, referred to as "Department Counsel," are based at one of the three DOHA offices in
Arlington, VA, Van Nuys, CA, or Boston, MA, they are fairly flexible in determining the
location of a hearing. A hearing may be in a Federal office building or a local or federal
courthouse at a place selected for the convenience of the applicant, witnesses for both
sides and counsel.
DOHA procedures provide for "at least 15 days notice of the hearing date," but
that, too, is reasonably flexible to allow for the convenience of the appellant, appellant's
counsel, Department Counsel, the availability of witnesses, and the administrative
judge's schedule.
Discovery
Discovery is quite limited. The DOHA Procedural Guidance requires that where
an administrative hearing is not requested, Department Counsel shall give the applicant
"all relevant and material information that could be adduced at a hearing."226In practice,
Department Counsel provides only those documents that it intends to introduce as evi-
dence in its case and does not provide any exculpatory or favorable character evidence
that could be used by the applicant in presenting his case. Department Counsel always
has the complete DSS investigative file that invariably contains some favorable informa-
tion, but will not provide that file unless a specific discovery request is made for it. Often
a request is made too late for effective use to be made of the file. The DSS investigative
file is available to the applicant at any time after the conclusion of the investigation by
making a written request to the DSS Baltimore, MD, office under the Privacy Act. If a
DOHA hearing has been scheduled and that is noted in the request, DSS will expedite
providing the file.
The Hearing
The hearing is held on the record with a verbatim transcript being made of the
proceedings, a copy of which is supplied to the applicant.23' Department Counsel may
make an opening statement followed by the applicant, who may also give an opening
statement, delay it until after the government presents its case, or waive it.
The government has the initial burden of proof and presents its case first. It need
only make aprima facie case before the applicant must go forward with the defense.
Since the ultimate issue is "whether it is clearly consistent with the national interest to
grant or continue [the applicant's] security clearance," and since "any doubt is to be
resolved in favor of the national security and considered final," the government's burden
to make aprima facie case is slight.232
Following the presentation of the government's case, the applicant has the
opportunity to present witnesses and other evidence on his behalf. Not only must evi-
dence be presented in response to the specific charges of the SOR, but equally important
is to present evidence in mitigation and evidence of the applicant's character and standing
in the community. Adjudications under DoD Dir. 5220.6 apply the "whole person" con-
cept, and the directive itself requires that each clearance decision be a "fair and impartial
common-sense determination based on all relevant and material information."233Also,
each of the Adjudicative Guidelines lists circumstances and conditions that may mitigate
the proscribed conduct.234While the administrative judge may find that the alleged con-
duct did occur, he may nevertheless find that, considering the mitigating evidence and
character, it is clearly consistent with the national interest to grant or continue the clear-
ance and rule in favor of the applicant.
DOHA procedures allow for the Federal Rules of Evidence (28 U.S.C. 1010 et.
seq.) to "serve as a guide," but they are not slavishly Hearsay evidence is
permitted, as in other administrative hearings, with consideration given to the weight to
be afforded the evidence.236
An applicant can apply for restoration of lost earnings if there is a final favorable
clearance decision concerning a clearance that had previously been denied, suspended, or
revoked.240The applicant must show that the earlier action was as a result of the gross
negligence of the Department of Defense and not due to the applicant's failure or refusal
to cooperate. Reimbursement is not authorized for counsel's fees or costs related to the
appeal to DO HA.^^'
At the applicant's request, hearings may be open to the public. DOHA proceed-
ings are covered by the Privacy Act, and no information produced in the proceedings can
be released outside the government. Even the contractor's security officer can receive
only the ultimate result. Decisions are published with all identifying information
redacted.
The scope of review on appeal is whether: (a) the findings of fact of the adminis-
trative judge are supported by substantial relevant evidence; (b) the procedural require-
ments of Executive Order 10865 and DoD Directive 5220.6 were followed, or (c) the
findings and conclusions are arbitrary, capricious, or contrary to law. In reaching its deci-
sion, the Appeal Board defers to credibility determinations of the administrative judge.245
The Appeal Board does not hear oral argument, as it construes the current Direc-
tive to preclude such authority. It may affirm or reverse the decision or remand the case
to the administrative judge to correct an identified error. In doing so, the Appeal Board
may specify the action to be taken on remand.246
A final decision by the Appeal Board is not a permanent bar. After a year from
the time the initial unfavorable decision becomes final, an applicant may reapply and, if
appropriate justification is supplied, the clearance may be granted.248If necessary treat-
ment is obtained, or if the proscribed activity, such as alcohol or drug abuse, is avoided
during that time, the likelihood that the clearance will be reinstated will increase. The
decision to reinstate is made by the Director of DOHA, but Department Counsel may
participate in the determination depending on the nature of the original allegations.
DOHA has never published in print either its administrative judges' or its Appeal
Board decisions, but does make copies of both available for public inspection and copy-
ing at its headquarters in Arlington, V A . ~ ~The
' decisions are maintained in chronological
loose-leaf binders and may be read and copied by advance appointment with the DOHA
headquarters' staff or may be requested by mail.
In 1997, DOHA began posting its decisions on the Internet, and they are currently
available from 1996 to the present. The URL address is www.defenselink.mil/dodgc/doha/
industrial, The cases are posted, in full, in chronological order based on the date of the
decision. A search engine allows for systematic research of the cases. The Appeal Board
cases are indicated by the suffix "A" added to the case number. Decisions of the
administrative judges are indicated by the suffix "H."
DOHA publishes in print two indices and a "case citator" each year. The first in-
dex is of all administrative judge and Appeal Board decisions arranged by the adjudica-
tive criteria considered in the case. Each case listed gives a synopsis of the case, the case
number and date of the decision. The second index is a supplement of Appeal Board de-
cisions only. It is organized by the major principles of law discussed in the cases. The
"case citator" is a numerical listing of all cases decided by the Appeal Board, giving the
date of the adminiswative judge's decision, the date of the Appeal Board decision, and the
final action taken. It does not, as the name would imply, give citations to later cases, so
unlike other case citators, one cannot research forward to find later cases addressing the
same point of law. The indices and the case citator are available without charge by writ-
ing to the Office of the Clerk, DOHA, PO Box 3656, Arlington, VA 22203.
CHAPTER 8
The court noted that between 1981 and 1997, the Department of Defense con-
ducted over 400,000 polygraph examinations to resolve issues arising in counterintelli-
gence, security, and criminal investigations. Justice Stevens, in a dissenting opinion, sup-
ported its use by DoD because, he said, its polygraph operators were trained in its own
Polygraph Institute, "which is gen~rallyconsidered the best training facility for polygraph
examiners in the United ~tates."~"Tho Supreme Court's opinion has put to rest any ar-
gument against the continued use of this technique as a tool in national security investi-
gations.
The courts are divided on whether to admit evidence obtained during a polygraph,
some disallowing it on the basis that it is not scientifically valid, others leaving it to the
discretion of the trial judge. The Supreme Court continues to leave the question of its
admissibility to the individual courts, deciding only that a blanket exclusion in criminal
proceedings is not unconstitutional.
In a criminal case, statements made during a polygraph exam are not admissible
unless given voluntarily, because of the Constitutional protections of the Fifth and Four-
teenth amendment^.'^^ However, the denial of a security clearance or of access to classi-
fied information, or the denial or loss of employment because of the withholding of a
security clearance, is not a criminal sanction, so the Fifth Amendment right against self-
incrimination offers no protection even if a polygraph test is required as a prerequisite.
Use in Security Investigations
The use of the polygraph in security clearance investigations has a long and con-
troversial history. Even before the Scheffer case, there was a well-reported divergence of
opinion regarding its validity. The 1997 Report of the Commission on Protecting and Re-
ducing Government Secrecy summarizes this divergence of opinion stating:
Senior officials from agencies that use the polygraph see it as a significant tool
because of its utility in generating admissions of wrongdoing, either during the pre-test,
test, or post-test period. The polygraph saves time and money, and it serves as a deterrent
by eliminating some potential applicants from seeking a highly sensitive position in the
first place. The polygraph examination is conducted before the background investigation,
saving additional resources should the applicant be rejected as a result of polygraph
admissions. According to a May 1993 NSA letter to the White House, over 95% of the
information the NSA develops on individuals who do not meet federal security clearance
guidelines is derived via voluntary admissions from the polygraph process.256
The report notes that not only do many senior Intelligence Community officials
believe that the polygraph is useful, but they also believe that it is scientificallyvalid. It
firther notes the reservations that many others have for using the polygraph as a fact-
finding tool stating:
Although the polygraph is useful in eliciting admissions, the potential also exists
for excessive reliance on the examination itself. A related concern is that too much trust
is placed in polygraph examiners' skills, creating a false sense of security within agencies
that rely on the polygraph. The few Government-sponsored scientific research reports on
polygraph validity (as opposed to its utility), especially those focusing on the screening of
applicants for employment, indicate that the polygraph is neither scientifically valid nor
especially effective beyond its ability to generate admissions (some of which may not
even be relevant based on current adjudicative criteria).257
The use of the polygraph for any Department of Defense program is governed by
DoD Directive 5210.48, which states the DoD policy. DoD Regulation 5210.48-R
implements that policy. This directive and regulation apply not only to the military de-
partments but also to the Defense Intelligence Agency and the National Security Agency,
components of DoD. They do not cover its use by the other agencies dealing with na-
tional security information, except to the extent that DoD personnel may be assigned or
detailed to them.
The procedures for administering polygraphs for DoD programs are specified in
Part D of DoD Directive 5210.48-R. There is no requirement that a person undergo a
polygraph for any reason; however, the refusal to do so may be a bar to employment by
certain of the DoD agencies such as the DIA or NSA, or assignment to the CIA. It may
bar employment in any Special Access Program.
The person to be interviewed must consent in writing, must be given timely ad-
vance notice of the time and place of the polygraph and of the right to have counsel
pres??ent, and must be advised of the privilege against self-incrimination and of the right
to terminate the examination at any time.270This information, however, is often given to
the person being examined after,he is already in the examining room - too late to be
effective. The person, who may have traveled some distance to attend the examination, is
placed in the position of having to reschedule, or worse in his own eyes, of appearing to
be uncooperative and having something to hide. Frequently, given the timing and context,
the person chooses not to have counsel, often to their later regret.
The DoD regulation spells out the exact manner in which the examination must be
conducted. No relevant question may be asked during the polygraph examination that has
not been reviewed with the person to be examined before the examination, and all ques-
tions must have a special relevance to the inquiry. Certain "validating" questions may be
asked without prior disclosure to establish a baseline from which the examiners can judge
the validity of the answers to the relevant questions. The probing of a person's thoughts
or beliefs, or questions on subjects that are not directly relevant to the investigation, such
as religious or political beliefs or beliefs and opinions about racial matters, are
prohibited.271
The examining room where the test is conducted will generally contain only a
desk in which the polygraph instrument is installed if an older mechanical model, or on
which a modem computer version is placed. The modem version of the instrument con-
sists of a computer which generates lines on a video screen, duplicating the lines drawn
by a series of pens on a moving scroll of graph paper on the older mechanical versions.
In addition to the desk, the room will generally contain only a chair for the
operator, and chairs for the person examined and his counsel. An observation room is
normally adjacent to the examination room connected by a one-way mirror. The observa-
tion room will contain a speaker connected to the examination room and listening and
recording devices to record the examination. The examination may be, but is not always,
witnessed by another investigator from the adjacent room. It may be recorded.
The role of counsel is limited but important. Counsel may not answer for the per-
son being examined, but that person and his counsel may adjourn to discuss a response
before it is given. Of course, any adjournment during the questioning will be noted in the
report of the polygraph operator. Counsel's presence is also important to advise on possi-
ble self-incrimination issues. Counsel can be in the examining room during the prelimi-
nary questioning and may sometimes be allowed to remain during the actual running of
the polygraph. At other times counsel may be required to observe the actual testing
through the one-way mirror connecting the adjacent room. Since all of the questions
asked during the actual test will have been reviewed prior to the person being attached to
the polygraph machine, there will have been ample time for counsel and the person ex-
amined to object to any question.
The CIA requires polygraphs of all applicants and regularly repolygraphs all em-
ployees on a periodic basis. It does not allow counsel to be present during any part of the
investigative process or during the polygraph. The agency feels that the presence of coun-
sel makes the investigation more difficult and less productive. The CIA does not disclose
transcripts of the polygraphs, all of which are recorded, and does not disclose the charts
or the questions asked, as it believes that this would compromise its investigative meth-
o d ~ . ~ 'If* someone challenges the rejection of his clearance or access based upon the
polygraph test, the CIA will review the polygraph results to consider the person's objec-
tions, but will not disclose the exact responses given by the individual.
Federal agencies deciding appeals of actions affecting employees deal with results
of the person's polygraph exam in a number of ways. The Defense Office of Hearings
and Appeals (DOHA), which decides appeals of security clearance decisions, has held
that admissions by an applicant made during a polygraph examination may be admissible
in evidence even though the results of polygraph examination are not."' Such ''results"
would include the polygraph charts and the polygraph operator's interpretation of those
charts. The DOHA Appeal Board has held that Paragraph D.6 of DoD Directive 5210.48,
which states that "no adverse action will be taken solely on the basis of a polygraph ex-
amination chart that indicates deception," does not bar the use in evidence of the appli-
cant's admissions.276
The Merit Systems Protection Board (MSPB), another federal agency which hears
appeals of adverse employment actions, does allow the results of polygraph tests into
evidence if a foundation is laid establishing the test's reliability. While finding that poly-
graph results may be admissible, the MSPB does not hold that the result of such tests
must be accepted into evidence.28'It leaves to the presiding official whether to admit the
test and to decide what weight is to be given such evidence.'82 In a 1980 case, the MSPB
listed a number of factors to be considered in determining the reliability of polygraph
evidence. The rigorous test of "reliability" established in that case was substantially
diminished in a 1997 case which allowed into evidence an investigator's summary of the
results of a polygraph test given by someone else. The investigator's summary was of
what he had found in the files of an earlier police investigation. The basis for admitting
the summary in the 1997 case was that it was a "public record or report" admissible under
Rule 803(8) of the Federal Rules of Evidence. The MSPB held that the problem of "dou-
ble hearsay" went simply to the weight, not the admissibility, of the evidence.283
The MSPB allows both the employee and the government to bolster its case with
polygraph evidence, but tends to give more weight to tests which support the govern-
ment's case than those which support the employee's version of the Use of poly-
graph evidence in MSPB proceedings has been affirmed by the Federal Circuit Court of
Appeals, which has held that it is within the province of the presiding official's credibil-
ity determination^.^^^
CHAPTER 9
A third central repository of information is the FBI, which maintains files on all
of its investigations and a central fingerprint file. All of these indices are checked at the
beginning of any clearance investi ation as part of the National Agency Check (NAC),
the first step in any hvestigation.2 L
When an agency makes a request, OPM will conduct a search of the SII and will
provide the requesting agency with information from the index as well as from any in-
vestigative files it maintains.291The requesting agency must notify OPM of any adjudi-
cative action taken on the subject within 90 days of receipt of the file. Also, any agency
conducting its own personnel security investigation must notify OPM of the initiation of
the investigation and of the final adjudicative action.292
If OPM conducts an investigation and its search of the SII reveals that an investi-
gation of the subject has reviously been conducted, it must obtain a copy of the previous
investigation for review. P,,
The DCII, although operated and maintained by the Defense Security Service, is
available to other federal agencies with adjudicative, investigative, or counterintelligence
missions, and is used throughout the intelligence community. Certain agencies may be
authorized to be "contributors" to the DCII, while others may be authorized to have
"Read Only" access. The security requirements for both contributors and "Read Only"
activities are the same.
Although the DCII is an unclassified system and contains only unclassified in-
formation, positions having a direct access to a DCII terminal are considered ADP-1
Critical Sensitive due to the sensitive nature of the information in the index. Individuals
having access to the DCII terminals must, therefore, have a favorably adjudicated back-
ground investigation. Because of the sensitivity of the information, DCII terminals are
afforded the physical protection normally reserved for classified information. The termi-
nals must be in a locked, guarded, and alarmed area, and when operational, access to the
terminals is limited to authorized persons.
The DCII database consists of an alphabetical index of personal names and occu-
pational titles. Personnel security adjudicative determinations are also maintained by the
subject's name.294The database includes information not only from personnel security
investigations, but also information from investigations conducted by DoD criminal, in-
telligence, and fraud activities. The indexed names are not only those of the subjects of
investigations, but also of cosubjects, victims, and cross-referenced "incidental" subjects.
For entries related to personnel security investigations, the DCII lists the clearance eligi-
bility and access status of an individual and the presence of any adjudicative file.
Investigative data in the DCII includes all information resulting from an investi-
gation, when an investigation was opened and when it was completed. Changes are made
to existing files whenever appropriate.
There are only three levels of classification of national security information: Con-
fidential, Secret, and Top Secret. Those levels define, respectively, information, the dis-
closure of which could reasonably be expected to cause "damage," "serious damage," or
"exceptionally grave damage" to the national security. No other terms may be used to
identify classified information.296Certain information, however, is deemed so important
that greater investigative standards and controls are placed on the "access" a person has
to such information. In that category is certain classified information dealing with intelli-
gence sources, methods, or activities known as Sensitive Compartmented Information
(SCI), access to which is governed by standards established by the Director of Central
Intelligence (DCI). SCI is held throughout the government, but to a lesser degree than in
the past. In the 1980s there were an estimated 800 SCI compartments in the Department
of Defense. By 1997 that was down to roughly 300 compartments.297
There is another class of information that imposes higher safeguarding and access
requirements than "normally required for information at the same classification level."
Such information is held in programs known as Special Access Programs SAPS).*^^
The National Security Act of 1947 requires the DCI to protect "intelligence
sources and methods from unauthorized disclosure."299Executive Order 12333 further
requires the DCI to protect intelligence sources and methods and to issue appropriate
directives to implement the From those anthorities has emanated Director of
Central Intelligence Directive No. 614 (DCID 6/4), Personnel Security Standards and
Procedures Governing Eligibility for Access to Sensitive Compartmented ~nforrnation.~~'
DCID 614 defines Sensitive Compartmented Information as "classified information con-
cerning or derived from intelligence sources, methods, or analytical processes requiring
handling exclusively within formal access control systems established by the Director of
Central ~ n t e l l i ~ e n c e Neither
. " ~ ~ ~ the National Security Act of 1947 nor E.O. 12333 or any
other L ~ ~ c u t i Order
v e has defined what is a "source" or "method." The use of these
authorities to sometimes classify not only closely held information, but also newspaper
articles, public broadcasts, and other open information in the public domain has been the
subject of ftequent criticism.303However, the right of the CIA to classify such informa-
tion has been upheld by the Supreme
The criteria under DCID 614 for approving an individual for access to SCI are the
Uniform Adjudicative Guidelines issued by the Security Policy Board. They are incorpo-
rated as L i i i l C~ ~to~ DCID 614. In general, the person must be: "stable, trustworthy, reli-
able, of excellent character, judgment and discretion, and of unquestioned loyalty to the
United All exceptions to these standards must be "common sense determina-
tions" that the risk to the national security "is manageable" in the specific case for which
the exception is granted.306In arriving at the decision of whether to grant access, all
doubts must be resolved in favor of protecting classified information. The ultimate con-
clusion in every case must be that the granting of access is "clearly consistent with the
interest of national security," using "an overall common sense determination based on all
available information."307
Individuals considered ineligible for access to SCI will not, solely for that reason,
be denied access to other classified information. Conversely, individuals who are author-
ized access to SCI under an exception to the requirements of DCID 614 will not, solely
for that reason, be considered eligible for access to any other class of information. The
person requiring access to SCI must be a U.S. citizen as, in general, must his family. An
exception will be made for a family member only for compelling reasons where it is de-
termined that the security risk is negligible.308The lack of U.S. citizenship of a family
member may be a factor. If the person seeking the clearance has lived outside the United
States for a substantial period of his life, that may prevent a complete investigation of the
individual which would preclude the granting of access.
The past practice of the CIA under earlier versions of DCID 614 had been to deny
almost all requests for an appeal and almost all requests for the reasons for denial of ac-
cess. With the issuance of E.O. 12968, that was no longer possible. The procedures for
appealing decisions denying or revoking access to SCI are now described in Annex D to
the current DCID 614. They apply government-wide not only to the "intelligence com-
munity" but to every other agency or government entity dealing with SCI.~"Every per-
son considered for initial or continued access to SCI (except in Special Access Programs)
can utilize those procedures. This includes government civilian employees, military per-
sonnel, employees of government contractors, and applicants for government or industry
The directive provides that the senior official of each Intelligence Community or-
ganization (the SOIC) or his designee may designate an individual to be the Determining
Authority to decide cases regarding access to SCL)'* The appeals procedures state the
law eslablished by judicial decision, that the denial or revocation of access under the
Directive will not be considered the denial of a constitutional property or liberty interest
in any claimed right to access to classified i n f ~ r m a t i o n . ~ ' ~
The right to appeal does not begin until there has been a final decision denying or
revoking access."' In the past, to avoid giving an employee notice of any problem, or any
opportunity to appeal, many government security officers simply directed the sponsoring
contractor or government organization to withdraw the employee's nomination for SCI
access. In such cases, the employee never knew that access was not or would not be
approved. Even if the employee did know, that person could do nothing to protest be-
cause he no longer had a "need" for access. That practice is no longer permissible. E.O.
12968 guarantees a right to appeal a decision denying access to any other classified in-
formation, including SCI, with the exception of Special Access Program information.
The appeal begins after a final decision is made and there is a stay of an access
decision pending the outcome of the appeal. Thus, any uncertainty regarding a person's
qualifications is resolved by preventing access unless and until the appeal establishes that
an improper decision was made.
Appeal rocedures at the CIA itself are described in CLA Administrative Regula-
tion AR-10-16.P" Although E.O. 12968 and DCID 614 require only that an agency pro-
vide an individual the investigative file if asked, the CIA does provide the investigative
file to CIA employees at the time it provides the written explanation. It will not provide
any polygraph document^.^'^ An applicant for employment or a contractor employee
must still request the file, and to him, the CIA will only provide a redacted summary
memorandum, deleting, among other information, the name of the deciding official even
though Executive Order 12968 requires its disclosure.
Appeals procedures for CIA employees differ from those for applicants and for
contractor employees. An appeal by a CIA employee goes to a higher-level panel than
one provided to applicants and contractors employees on the belief that employees al-
ready have access to secure information and, therefore, closer scrutiny must be given to
determine whether their security clearance should be revoked. CIA employees are enti-
tled to a personal appearance before a member of the security staff who is generally a
GS-12 to GS-14 level employee. The recommendations of the staff member based on the
personal appearance are reviewed by the Associate Deputy Director for Administra-
tion/Security. The final level of appeal is to an Appeal Panel comprised of the Agency
Executive Director who chairs the Panel, the Associate Deputy Director for Operations
for Counterintelligence, and the head of the employee's career service or office. The de-
cision of the Appeal Panel is final.
For CIA applicants and contractor employees and applicants, the personal appear-
ance is before a senior security officer not involved in the original revocations decision,
and the appeal is to a lower-level panel. The chair of that Appeal Panel is the Director of
Security for contractors, or a senior staff member of the Security Office for applicants.
The other panel members are a counterintelligencerepresentative or a human resources
representative and the chief of the component office sponsoring the application for
access.
Special Access Programs (SAPs) are defined by E.O. 12958 as a "specific class of
information that imposes safeguarding and access requirements that exceed those nor-
mally required for information at the same classification A SAP is also defined
by the DoD as any program imposing "need-to-know" or access controls beyond those
normally provided for access to Confidential, Secret, or Top Secret inf~rmation.~'~ It is
elsewhere defined by the DoD as a program or activity employing "enhanced security
measures exceeding those normally required for collateral information at the same level
of cla~sification."~'~
Such programs may impose additional or special clearance and adju-
dication procedures, investigative requirements, and material dissemination restrictions.
They may also impose special lists of persons with a "need to know."320
The basis for the creation of Special Access Programs has been provided by a
succession of executive orders and has been used to generally encompass not only DoD
weapons programs, but also SCI programs and other programs within the Departments of
Energy and State, programs for the protection of the President, for the continuity of gov-
ernment operations, and for covert actions operated from within the Executive Office of
thc i resident.^^' Special Access Programs can concern research, development, and acqui-
sition activities, or intelligence or military operations, and can be funded by one agency
and managed by another. While some programs are publicly acknowledged, others are
unacknowledged. For such programs, their very existence and purpose are classified and
may not be disclosed to any person without authorized access to that program.322Among
such unacknowledged SAPS, therc are programs even more sensitive called "waived pro-
grams." Those are considered so sensitive that they are exempt from the standard report-
ing requirements to Congress and are made known only to the Chairperson and Ranking
Minority Member of the appropriate Congressional Committee with oversight
authority.323
Executive Order 12958 for the first time formalized the requirements for the es-
tablishment of Special Access Programs. Unless authorized by the President, they can be
created only by the Secretaries of Defense, State, and Energy, and the Director of Central
Intelligence. These officials are directed to keep such programs "at an absolute mini-
mum." They are to limit such programs to those in which the number of persons having
access "ordinarily will be reasonably When SAPs are applied to the creation of
major weapons systems such as a new bomber, or major facilities such as an unacknow-
ledged air base, the term "reasonably small" becomes quite elastic.
Before a SAP can be established, there must be a specific finding by the appropri-
ate Secretary or the Director of Central Intelligence that: (a) the vulnerability or threat to
the information is exceptional and the normal criteria for determining eligibility for ac-
cess to such information are not sufficient to protect it from unauthorized disclosure, or
(b) the program is required by statute.328
For DoD SAPs there are cases where the mere knowledge of a particular contract
or its association with a SAP is classified. In those instances the agencies normally per-
forming functions associated with the Industrial Security Program, such as the Defense
Security Service for personnel or facility security, or the Defense Contract Audit Agency
for financial review, may be "carved out," i.e., relieved of their normal responsibilities.
Those functions will then be performed by the sponsoring component-level SAP Central
Office. In those cases, a written security plan including security review procedures must
be prepared for that particular SAP.'^' 1f a SAP is terminated or placed in a lower classi-
fication status, it becomes " d e - ~ a ~ ~ e d . " " ~
It is not required that there be appeals of SAP access decisions. However, they
may nevertheless be permitted (or, in the case of DoD, required) by agency regulation. If
allowed they may differ from the procedures for appealing decisions denying access to
SCI or to nonSAP programs.338Any such special procedures for DoD programs must be
approved by the Secretary or Deputy Secretary of ~ e f e n s e . ~ ~ ~
Although a person whose previously granted access was revoked would know of
the loss, there would be no appeal, as such decisions, either for government and contrac-
tor employees, are entirely discretionary with the program administrator. A person who
had not previously been approved for access would, in most cases, never know that he
was considered and rejected for SAP access, or even that a program-access request had
been conducted.
The denial or loss of access to a SAP will not, of itself, cause a loss or denial of
any clearance at the Confidential, Secret, or Top Secret level. However, the underlying
conduct that was the basis of the SAP denial may also be a basis for the loss of a collat-
eral clearance. Before such further loss of a collateral clearance could occur, the affected
individual would have all appeal rights associated with that type of clearance-if for a
contractor employee it would include the right to a full hearing, or for a government em-
ployee or applicant or member of the armed forces, the right to personal appearance.
CHAPTER 11
As discussed in Chapter 1, until a few years ago each department and agency, and
frequently subunits within the departments, had its own requirements for safeguarding
classified information. Each had regulations which were as particular as specifying the
type of safe that was required to protect a particular item. Contractors doing business
with different agencies of the government had to meet different requirements to protect
the same type of information.
In April 1990, the President directed the National Security Council to explore the
development of a single, integrated industrial security program that could result in cost
savings and improved security protection. This resulted in a report from the Secretaries of
Defense and Energy, and the Director of Central Intelli ence that recommended the es-
tablishment of a National Industrial Security Program?" They reported that 2 1 depart-
ments and agencies each had their own industrial security program - in the Department
of Defense alone there were 47 different standards, manuals, and directives supplement-
ing the basic executive orders and legislation. This diversity created a significant burden
on both industry and government, and the increased cost was passed on to the govern-
ment. The report found that standardization could reduce duplication by at least 20 per-
cent.341It recommended that a National Industrial Security Program be created under the
direction of the Department of Defense, with the Secretary of Energy continuing to have
the authority to protect nuclear materials and the Director of Central Intelligence the
authority over Sensitive Compartmented Information. From those recommendations
came a government-wide consolidation of physical industrial security requirements
known as the National Industrial Security Program (NISP).
On January 6, 1993, Executive Order 12829 was issued, formally establishing the
National Industrial Security Program which was to serve as a single, integrated, cohesive
program to safeguard federal government classified information released to contractors
and to licensees and grantees of federal agencies. The program is mandatory for all Ex-
ecutive Branch departments and agencies. The executive order directed the National
Security Council to provide overall policy direction, the Information Security Oversight
Office (ISOO) to oversee the implementation of the executive order, and the Secretary of
Defense to issue a National Industrial Security Program Operating Manual (NISPOM).
Specific requiremerits were to be prescribed by the manual for safeguarding classified
information by contractors, licensees, and grantees during all phases of the contracting
process. The Secretary of Energy and the Chairperson of the Nuclear Regulatory Com-
mission were given responsibility for that portion of the manual dealing with nuclear
energy, and the Director of Central Intelligence was made responsible for the portion
dealing with intelligence sources and methods, including Sensitive Compartmented
Information. A NISP Advisory Committee, consisting of representatives of both govern-
ment and industry, was also established under the executive order to consider policies
under the NISP and recommend changes to it.
The NISPOM was issued in January 1995 under the mandate of Executive Order
12829.A ~ ~supplement
~ was issued in December 1994, providing enhanced security re-
quirements for Critical Restricted Data (RD), Special Access Programs (SAPS), Sensitive
Compartmented Information (SCI) and other compartmented programs that protect intel-
ligence sources and methods.345The NISPOM replaced the DUDIndustrial Security
Manual for Safeguarding CIassGed Information previously in use. It applies not only to
DoD but to all Executive Branch departments and agencies and cleared contractor
facilities.
Under the NISPOM, every contractor must appoint a Facility Security Officer
(FSO) to supervise security measures implementing the manual. The FSO also must be
cleared as part of the facility clearance. Written contractor procedures may be required by
the government security office monitoring the contract but are not required in every
case.346Periodic security reviews are conducted, normally on advance notice, to the con-
tractor. Unannounced reviews may be conducted at the discretion of the government.
Contractors are required to continually review their security procedures and to re-
port any security infractions. To ensure that contractors do so, security hotlines also are
maintained by the concerned government agencies so that contractor employees can di-
rectly report any security irregularities to the government. Contractors must inform their
employees of the availability of these hot line^.^^^
Facility Clearances
To be eligible for a facility clearance, a contractor must (a) have need for access
to classified information in connection with a government requirement; (b) be organized
under the laws of one of the states, the District of Columbia, or Puerto Rico; (c) be in the
United States or its territories or possessions; (d) have a reputation for integrity and law-
ful conduct of its business and not be barred from participating in any U.S. Government
contracts; and (e) not be under foreign influence, ownership, or control such that the
granting of the facility clearance would be inconsistent with the national interest.
The senior management official and the facility security officer must also be
cleared to the level of the facility clearance. Officers, directors, and senior managers who
are excluded from holding a clearance must be specifically designated by the organiza-
tion's board of directors or executive body. Where there are multiple facility locations,
the home office must have a facility clearance at least to the highest level of any of the
cleared facility locations. If there is a parent-subsidiary relationship, the parent must gen-
erally have a clearance at least equal to any cleared subsidiary. Where a parent facility
can be excluded from a need for access to classified information, it will not be granted a
clearance.352
Both the NISPOM and the DoD Information Security Program Regulation go into
great detail on how classified material is to be safeguarded.362Not only do the regulations
prescribe how documents and physical objects are to be protected, they also give detailed
procedures for preventing oral discussions from being overheard or i n t e r ~ e ~ t e d .End-
~"
of-the-day security checks and perimeter controls over entry points are mandated.364
Contractors (but not government agencies) are required to maintain an accountability
system for To Secret documents, with each document being numbered and
inventoried. 36P
The methods for transmission of classified material are also specified in detail in
both the NISPOM and the DoD Information Security Program ~ e ~ u l a t i oMarking,
n.~~~
packaging, method of shipment, designation of authorized carriers, modes of electronic
transmission, use of couriers or escorts, and the use of commercial passenger aircraft are
all specified in great detail.370
Many types of common AIS equipment, such as computers and printers, emanate
electronic signals that can be intercepted from a distance and interpreted to determine
what information is being generated on those systems. The government program to in-
vestigate and prevent the interception of such signals is known as TEMPEST.)^' When it
is determined that classified information may be exposed to TEMPEST collection, it is
the responsibility of the government contracting authority dealing with the contractor to
perform threat assessments and vulnerability studies. If necessary, the government may
provide TEMPEST shielding and TEMPEST-shielded equipment, with all costs associ-
ated with such measures being recoverable as a direct charge to the contract.376
The DoD Information Security Program Regulation implements not only Execu-
tive Order 12958 for classified national security information but also prescribes proce-
dures for protecting sensitive information that is not classified but which requires some
type of protection or Among such information is that exempt from disclosure
under the Freedom of Information Act (FOIA) which the regulation designates as "For
Official Use Only" ( F O U O ) . The
~ ~ ~regulation also creates a category of "Sensitive But
Unclassified" (SBU) information described as also being exempt under FOIA, but the
regulation does not spell out how that information differs from " ~ 0 ~ 0 . " ~ ~ ~
Also included as protected information under the DoD Regulation is Drug En-
forcement Administration Sensitive Information, DoD Unclassified Controlled Nuclear
Information, sensitive information under the Computer Security Act of 1987, i.e., "un-
classified information that could adversely affect the national interest or the conduct of
Federal programs," and "technical d o c ~ m e n t s . ' ~Although
~' the DoD regulation carefully
states that its requirements apply only to national security information, it suggests the use
of "controls and protective measures" to prevent the disclosure of other such unclassified
information.382
CHAPTER 12
No person may be employed by, detailed to, or assigned to NSA unless his access
to the agency's classified information is "clearly consistent with the national interest."385
Employment depends on the successful outcome of a full-field investigation. While a
person can be provisionally employed pending the outcome of the investigation, he may
not have access to sensitive cryptologic information until the investigation is successfully
completed.386The full-field investigation may be temporarily waived if the Director of
NSA personally determines in writing that such an action is clearly consistent with and
advisable in the national.interest.387
All NSA affiliates must be eligible for access to SCI which is governed by the
standards and procedures of DCID 614. NSA has issued implementing procedures for
adjudicating denials or revocations of access or security clearances in accordance with
E.O. 12968 and DCID 614.~~' The NSA regulation covers not only NSA employees, but
also "affiliates," which collectively refers to applicants for employment, contractors, con-
sultants, and experts. The adjudication procedures provided by the NSA regulation have a
particular importance to employees of the agency. Since access to SCI is mandatory for
employment at NSA, a revocation of access means automatic processing for termination
of employment.
Each year about 25 new applications for access are denied, and one or two ac-
cesses by current holders are revoked. Because a decision to deny or revoke SCI access
means denial or loss of employment, NSA takes particular care not to use the access re-
view process as a substitute for procedures for handling disciplinary problems. Decisions
to use one or the other process are made centrally by senior human resources personnel in
consultation with personnel from the Office of Security to ensure that employees whose
performance is not viewed favorably by unit managers are not removed by using the
more summary security access procedures.
Preemployment Security Review
An employee or affiliate who has been denied access or whose access has been
revoked is entitled to the procedures provided under NSAICSS Reg. No. 122-07.~~' That
Regulation implements the requirements of Executive Order 12968 concerning access to
sensitive cryptologic information, to include SCI. For an employee, notice of the decision
to revoke access also serves as notice of the proposal to remove the employee from fed-
eral service at NSA."' Debarment from NSA facilities while an appeal is pending poses
no great problem with respect to an applicant or a contractor's employment. However,
current employees who appeal an access decision are entitled to remain on the federal
payroll until the appeal is decided. In those cases, they may be placed on administrative
leave if unclassified duties are unavailable.
The Chief, Adjudicative Services, is responsible for the initial decision to deny or
revoke access and for providing written notice of the decision and proposal to remove the
employee whose access has been denied. A review of the initial decision, if requested by
the employee or affiliate, will be made by the Chief, Adjudicative and Security Informa-
tion Services. If a review is not requested, the determination of the Chief, Adjudicative
Services, is final. In the case of an employee, a referral will be made to the Assistant Di-
rector for Support Services (ADS) or designated Deciding Official for a decision regard-
ing the proposal to remove the employee from employment.392
A review of the decision to deny or revoke access will be made by the Chief,
Adjudicative Services. In a request for review at that point, an employee may submit only
written materials. If the Chief, Adjudicative and Security Information Services, sustains
the initial decision, the employee or affiliate may appeal that decision within 30 days to
the Access Appeals Panel. The employee or affiliate may appear in person before the
panel, with or without a representative who may be an attorney, to make a personal pres-
entation and present "relevant documentation and material information, but shall not pre-
sent or question witnesses."394The panel will consider "any new information provided in
writing or in person, by the employee or affiliate." New information may be subject to
verification and adjudication. The panel may request additional agency support personnel
to be present to assist at the hearing.395
The decision of the panel to sustain or not to sustain the denial or revocation of
access will be based on a majority vote of the members and will be final. In the case of a
"senior7' employee, the panel makes only findin s of fact and a recommendation. It is the
Director of NSA who makes the final decision.3 k
The employee or affiliate will be provided with a final written decision specifymg
the reasons on which the decision was based, and for veterans-preference eligible em-
ployees, advising of the right to appeal to the MSPB.~'~
NSA formerly had another statutory avenue available for removing an employee
whom it considered to be a security threat. Former Section 303 of Public Law 88-290
permitted the Secretary of Defense to terminate the employment of any officer or em-
ployee of NSA when he: (a) considered such action to be in the interest of the United
States, and (b) determined that the procedures in other provisions of law authorizing
termination could not be invoked consistent with the national security.398
CHAPTER 13
DOE operates its security program under the authority of the Atomic Energy Act
of 1954, as amended (AEA), and Presidential executive orders to protect nuclear-related
information, materials, and facilities and national security information.399The origins of
DOE's security program date back to the Manhattan Engineer District, the World War I1
pr gect that developed the atomic bomb. The authority to protect nuclear-related infor-
I
mation devolved from it to the Atomic Energy Commission, then to the short-lived En-
ergy Research clnd Development Administration (ERDA), and from there to DOE. The
Nuclear Regulatory Commission (NRC) was created at the same time as ERDA to regu-
late the civilian nuclear power industry and is responsible for security regulations per-
tainin to its employees and to the civilian nuclear power and fuel fabrication indus-
tries.4%0
When information which relates primarily to the military use of atomic weapons
can be safeguarded as defense information, it may be removed from the RD category and
becomes known as "Formerly Restricted Data" (FRD).~'~Declassifying this type of in-
formation by DOE must have the concurrence of the Department of Defense. FRD, like
National Security information classified an executive order, can be classified as Confi-
dential, Secret, or Top It is protected in the same way as National Security in-
formation. However, dissemination of classified FRD information to foreign countries is
strictly controlled.405In that case, FRD reverts back to its status as Restricted Data.
DOE's personnel security program implements not only the AEA but also the re-
quirements and standards of Executive Order 10450, Executive Order 10865 pertaining to
government contractors, and Executive Order I2968 pertaining to government employees
and applicants. The DOE criteria and appeals procedures are identical for both its em-
ployees and its industrial contractors. Unlike the separate procedures afforded by DoD
and other agencies dealing with National Security information, DOE's employees and
applicants, like their industrial counterparts, have the right to a full administrative hearing
when their access authorization is in question.
DOE has its own separate system authorized under the AEA for granting "access
authorizations," which is similar to that of other agencies that grant Confidential, Secret,
and Top Secret clearances or SCI access. Most DOE employees receive either a " Q
access authorization equivalent to Top Secret, or an "L"access authorization equivalent
to Confidential or A " Q access authorization permits an individual to have
access, on a need-to-know basis, to Top Secret, Secret, and Confidential levels of Re-
stricted Data or Formerly Restricted Data, and to National Security information or infor-
mation concerning Special Nuclear Material. An "L" access authorization permits an
individual to have access, on a need-to-know basis, to Confidential Restricted Data,
Secret, and Confidential Formerly Restricted Data, and to Secret and Confidential
National Security information. Access to classified information marked as "COMSEC,"
"CRYPT0 or "SCI" at any classification level requires a " Q access authorizationPo'
The majority of DOE access authorizations are granted to DOE contractors and
subcontractors. The number of persons with DOE access authorizations has declined
steadily since 1988, to now almost half the 1988 number. Most of the drop is attributable
to a reduction in "Q" access authorizations. In 1988 there were 150,000 " Q access
authorizations and 50,000 "L" access authorizations. By June 1998, that number had
dropped to 70,000 " Q access authorizations and 40,000 "L" access authorizations.
The number of cases under administrative review has also dropped in like propor-
tion. In 1995 there were 222 cases closed. Of those, 103 review6 were withdrawn before
decision, and 93 clearances were either denied or revoked. Only three were granted. In
1997 of a total of 99 cases, 41 were canceled without decision, 54 were denied or re-
voked, and only 1 was granted. The figures for the first half of 1998 are consistent.408
Of accesses denied or revoked between 1995 and 1998,3O percent were for falsi-
fication, 25 percent were for alcohol use, 19 percent were for drug use, 5 percent were for
alcohol and drugs, 7 percent were for mental health problems, and 13 percent were for
reasons of mental health with substance abuse. There were no revocations under any of
the other criteria in those years.409
DOE regulations cover access to both classified matter and to Special Nuclear
Material, i.e., plutonium, uranium enriched in isotope 233 or 235, or other "specially de-
termined materials" but not "source materials."410They apply to employees and appli-
cants for employment with DOE, to agents or contractors of DOE:" and to "access per-
mittees," i.e., individuals whom DOE has permitted to have access to Restricted Data
applicable to civilian uses of atomic energy?l2
DOE background investigations for access eligibility are conducted by OPM and
the FBI and are as vigorous as those of any other agency. DOE may conduct additional
inquiries, such as personnel security interviews and mental evaluations by medical
examiners to determine access eligibility. Unlike procedures in other agencies, the inves-
tigative process itself may be challenged during the investigation if an employee or appli-
cant believes it is inappropriate as, for example, a belief that a mental examination is
unwarranted. If an individual declines to undergo such inquiries, the processing of the
access authorization will be suspended, or in the case of a person already holding
authorization, administratively terminated. The suspension or termination may be ap-
pealed to the Director, Office of Safeguards and Security, by filing a written appeal
within 30 days of the investigative action. After inquiry, the Director, DOE Office of
Safe ards and Security, must determine whether the particular inquiry was appropri-
ate.4b
If the Director determines that it was not, he will direct the process for access
authorization to continue or order the access authorization be reinstated without the
objectionable line of inquiry.
DOE regulations grant to government employees more rights during the review of
access determinations than are required by Executive Order 12968. They do not, how-
ever, conform to the executive order in every respect.4i8DOE is at the time of this writing
revising its regulations to conform to the executive order. It is expected to retain the ad-
ditional procedural safeguards for its employees now in its regulations beyond those re-
quired by the executive order.419New rules are forthcoming in 2000.) On December 17,
1999, DOE adopted a polygraph examination regulation in response to charges of laxity
in security at some of its facilities handling nuclear materials and atomic secrets.420As of
July 16,2000, of the 800 polygraph examinations administered, all had passed.42'
DOE'S regulations, like those of other agencies, specifically state that any access
authorization will be made based on a comprehensive, common sense judgement consid-
ering all relevant information, both favorable and unfavorable. Such information includes
the seriousness of the conduct; the surrounding circumstances; the frequency and recency
of the conduct; the individual's age, maturity, motivation, and voluntariness at the time of
the conduct; the potential for rehabilitation or reformation and the potential for pressure
and duress on the individual.423
When DOE revised its personnel security regulations in 1994, they included Ad-
judicative Guidelines interpreting the criteria for the grant or continuation of access to
material classified under the AEA and to special nuclear material. They are similar to Se-
curity Policy Board's Uniform Guidelines in that they addressed the "Concerns," the
"Disqualifying Factors" and the "Mitigating Factors for each criterion.'A24The criteria in
the 1994 DOE Guidelines are: (a) allegiance; (b) relatives; (c) falsification; (d) secu-
ritylsafeguards responsibilities; (e) emotional, mental and personality disorders; (f) re-
fusal to testify; (g) alcohol abuse; (h) drug abuse; and (i) honesty, reliability and trust-
worthiness (including criminal behavior, deviant sexual activity, foreign preference,
financial irresponsibility, and violation of commitment). The guidelines also address dis-
crimination in the workplace (EEO) and whistle-blower concerns.
DOE states that it now follows the Uniform Adjudicative Guidelines issued by the
Security Policy Board. However, its regulations have not yet been revised to reflect
this!25 In reviewing DOE adjudicated cases, those issued prior to the adoption of the Uni-
form Guidelines may be of more limited precedential value than those decided based on
the new guidelines.
DOE's 1994 Adjudicative Guidelines differ in many respects from the Security
Policy Board's Uniform ~ u i d e l i n e s . 4 ~
he~DOE version contains guidelines on "rela-
tives," "refusal to testify" and "violation of commitment" not found in the Security Policy
Board's Uniform Guidelines. DOE's guidelines are far more specific, giving the adjudi-
cator less flexibility, a format that is abandoned in the Security Policy Board's Uniform
Guidelines. For example, DOE's mitigating factors regarding drug abuse state that miti-
gation will be considered if: (a) the drug abuse was within the past 12 months, but was
only an isolated incident or of infrequent enough incidents to warrant acceptance of the
individual's assurance that he will not be involved with the drug while holding a DOE
access authorization; or (b) the drug involvement was more than 12 months ago, and the
individual is willing to offer assurance that he will not be involved with drugs while
holding DOE access authorization. The Security Policy Board's Uniform Guideline for
mitigation of drug abuse, by contrast, is simply that the drug involvement "was not re-
cent," "was an isolated or infrequent event," that there is a demonstrated intent not to use
drugs in the future, and that there has been a satisfactory completion of a drug treatment
program.
The DOE guidelines admonish its Personnel Security Specialists not to make
moral judgments and not to determine an individual's guilt or innocence, but to compare
the information available on an individual with the DOE guidelines to decide whether the
person is an acceptable security risk. The Personnel Security Specialists are advised to
note and evaluate all derogatory information about the individual on a Case Evaluation
Sheet to be maintained in the Personnel Security File (PSF). The DOE guidelines further
note that the PSF will be available to the individual, either through the administrative re-
view procedures or the Privacy Act, and advise the Security Specialists not to include any
references to sources that have provided information or testimony under a pledge of con-
fidentiality. They advise the Security Specialists that the PSF is unclassified and no
longer considered as "sensitive," "For Official Use Only information" and that it may be
released on written or verbal request of the concerned individual.427
Although the DOE guidelines admonish the adjudicators not to make "moral
judgments," the Guidelines themselves seem to do so. For example, "disqualifying" sex-
ual activity is defined as sexual activity that is "criminal in nature (regardless of whether
the individual has been, or is being, prosecuted for the commission of such acts)." Ac-
tivities so broadly described can create a variety of problems. In some states, sex between
consenting adults of the same gender is illegal, while in other states sex between unmar-
ried consenting adults of the opposite gender is illegal. In still other states, certain sexual
acts between consenting adults of the opposite sex who are married to each other are ille-
gal. Another disqualifying factor is the "commission of sexual acts for money or other
reward," an activity that is legal in some states. Under the DOE guidelines, it becomes
virtually impossible for adjudicators to make determinations without making moral
judgments.
The DOE Adjudicative Guidelines enforce the agency's concern for reprisals for
whistle blowing and for other protected activity, such as EEO complaints. Appendix A to
the DOE guidelines establishes numerous levels of oversight in the security review proc-
ess designed to prevent reprisals. It notes that adjudications will be in the Office of
Hearings and Appeals, a separate DOE activity. It advises Security Specialists to be
aware of conduct by DOE managers and contractors which might indicate that there was
not truly a security concern but indicate that the managers or contractors simply want to
be rid of troublesome employees. The DOE guidelines emphasize the importance of de-
termining the motivation of supervisors who are proposing to remove an employee.
The review and appeals process is the same for DOE employees, applicants for
DOE employment, contractor applicants, and contractor employees. If an investigation
reveals substantially derogatory information, the Director of Security of the local DOE
field office will review the information and may conduct further interviews, require a
mental evaluation, or use other means the Director deems appropriate to further investi-
gate. If the local Director of Security is still not satisfied that access is appropriate and
that the derogatory information is unresolved, the matter will be referred to the Manager
of the field operation or to the Director of the Office of Safeguards and Security, for
Washington, DC, area cases. Ultimately, all unresolved cases will be referred to the
Director of the Office of Safeguards and Security who will make the final determination
whether to grant access or to institute administrative review procedures.428At that point
an individual may request a hearing on the record.
The individual may testify and present witnesses and other evidence on his behalf.
All witnesses are subject to cross-examination. DOE regulations impose an affirmative
duty on DOE Counsel not only to represent the department, but to assist the Hearing
Officer in developing a full administrative record in bringing out a full and true disclo-
sure of all facts, both favorable and ur~favorable!~~Although formal rules of evidence do
not apply in DOE hearings, the Federal Rules of Evidence serve as a guide to assure the
production of the most probative evidence. That evidence must be material, relevant, and
competent. Hearsay evidence is admissible "for good cause shown" and is afforded as
much weight "as the circumstances ~arrant.""~
Only in certain instances may oral or written statements of government witnesses
be received without allowing the opportunity to cross-examine. The first is when the head
of the agency supplying the statement certifies that the person providing the statement is
a confidential informant engaged in gathering intelligence information, and that the dis-
closure of his identity would be harmful to the national interest. The second is when the
Secretary of DOE or his designee determines that (a) the information is reliable and mate-
rial and failure to receive it would be harmfil to the national interest; and (b) the person
could not appear to testify due to death, illness, or similar cause or "due to some other
specified cause determined by the [supplying agency's] head to be good and suffi-
~ i e n t . "Classified
~ ~ ~ records may also be put into evidence without showing them to the
individual if (a) the Secretary of DOE or his designee determines that the records are
material to a controverted issue, and the failure to consider such evidence would be harm-
ful to the national security; and (b) a summary of the records or evidence is made avail-
able to the individual "to the extent that the national security permits."438
The Hearing Officer may request the local Director of Security to conduct a fir-
ther investigation on unresolved issues. A written transcript of the proceedings must be
made and furnished to the individual without cost.439At the close of the hearing, the
Hearing Officer will render an opinion with findings of fact and reasons supporting those
findings. Only if the Hearing Officer determines that the grant of continued access to
protected information "would not endanger the national defense and security and would
be clearly consistent with the national interest" can he find in favor of the individual. The
possible impact on any DOE program by the loss of an individual's access authorization
may not be considered by the Hearing
Either DOE or the individual may appeal an unfavorable decision to the DOE
Office of Hearings and Appeals within 30 days after receipt of the decision. The record is
not necessarily closed at the completion of the administrative hearing. The Director,
Office of Hearings and Appeals, may initiate an investigation of any statement made in
the request for review, may solicit and accept submissions, i.e., briefs from either side,
and "may consider any other source of information that will advance the evaluation" so
long as both parties are allowed to respond to the third party submission^.^^' Within 45
days after the final close of the administrative record the Director, Office of Hearings and
Appeals, will make specific findings based on the record of each issue on appeal. If the
Director finds that it "would not endanger the national defense and security and would be
clearly consistent with the national interest," he will render an opinion in favor of access
authorization or reinstatement. If he cannot, an opinion will be rendered denying or re-
voking access a u t h ~ r i z a t i o n . ~ ~ ~
Where a decision is based on testimony of witnesses whom the individual has not
been allowed to cross-examine, only the Secretary of DOE may make a final determina-
tion denying or revoking access authorization. After the case is closed, an individual may
request reconsideration, but only if there is a new bonafide offer of employment requir-
ing access and there is either relevant and material new evidence of which the individual
was not previously aware, or there is convincing evidence of reformation and
rehabilitati~n.~~~
Sources of DOE Authority and Precedent
Since 1994, decisions of the DOE Office of Hearings and Appeals have been
published and are available on the Internet at www.oha.doe.gov/persec2. htm. They are
published in h l l (with personal identifying information redacted) including the date,
number of the decision, name of the hearing officer, and any subsequent determinations
affirming or overruling. The Web site has a search engine that allows the cases to be
searched both by adjudicative criteria and by key words. The decisions are "linked" to
other cited cases simplifying legal research.
DOE regulations and adjudicative criteria, including all updates, may also be
found on the Internet at www.oha.doe.gov/persecl.htm. This Web site also contains a list
of questions and answers for the general guidance of persons with questions about their
access determination.
CHAPTER 14
All positions at DOJ are categorized at various levels of sensitivity from Special-
Sensitive to non-Sensitive, but not all require national security clearances. Positions re-
quiring access to Top Secret national security information or SCI are designated Special-
Sensitive. Those positions with access to Secret or Confidential information are Critical-
The Director, Security and Emergency Planning Staff, as the Department Security
Officer, has the authority to grant, deny, suspend, or revoke an applicant's or employee's
access to classified information.448That responsibility has been redelegated to the Secu-
rity Programs Manager (SPM) of five of the DOJ components which initially determine
an employee's eligibility for access to classified information.
Executive Order 12968 and implementing DOJ regulations provide that an appli-
cant or employee may "request the opportunity" to appear ersonally before the ARC and
to present relevant documents, materials, and information& There is no provision for
presenting witness testimony or for cross-examining any persons who gave information
upon which the department's adverse decision was based. At a personal appearance be-
fore the ARC, an applicant or employee may be represented by an attorney or other rep-
resentative of the employee's choice, but at his own expense.454Although Executive
Order 12968 permits agencies to provide additional review procedures beyond those
required by the executive order, DOJ has not done so.455
In any appeal to the ARC, the Department Security Officer or designated SPM
Program Manager may present relevant written information and, if the applicant or em-
ployee appears personally, may also appear personally. Only if the ARC determines that
it is consistent with the national security may written submissions by the Security Officer
be shown to the appellant, or may the appellant be present during a personal presentation
of the Security Also, the Attorney General may bar any particular procedure
under DOJ's regulations fiom being made available to an appellant if it would reveal
classified information. The Attorney General may dispense with the appeal procedure
entirely, if it cannot be invoked "in a manner consistent with the national security.'A57
Procedures for appeal are spelled out in a brief, two-page statement issued by the
~ ~ c They
. 4 ~provide
' that appeals filed outside the 30-day time limit for appeal will not
be accepted, unless there are "compelling reasons" beyond the appellant's control to pre-
vent timely filing. The ARC may request additional information from the appellant, from
the Department Security Officer, or from any other source. Personal appearances will
take place at the Main Department of Justice Building. If the appellant is an employee,
travel expenses and reasonable per-diem costs for the appearance will be born by the em-
ploying DOJ component. For applicants, contractors and appellant's representative, travel
and other costs are the responsibility of the appellant.
Matters under the industrial security program affecting facility and contractor
clearances (except personal service contracts) are referred to the Defense Security Serv-
ice for investigation and approval.465An appeal of a proposal to deny or revoke a security
clearance of a contractor's employee is heard by the Defense Office of Hearings and Ap-
peals. (See Chapter 7.) If a clearance is granted and DOJ does not a ee with that deci-
sion, the department may deny the persm access to its informationg This DOJ policy
appears to conflict with the requirements of Executive Order 12968 which, for contractor
employees as well as government employees, refers not to clearances, but to "eligibility
for access to classified information." For a contractor employee to be cleared for access
to classified information but denied access to the facility where the information is
located, appears to subvert the purpose and intent of the executive order.
Polygraphs
Preemployment polygraphs are not required for anyone in DOJ, except 12 of its
employees in the Justice Command Center who have access to cryptoIogical information.
Polygraphs are used by several components of DOJ. The FBI uses them for preemploy-
ment investigations of its entire staff, and the Drug Enforcement Administration uses
them for its intelligence research analysts and special agents.
DOJ acts under delegated authority from the CIA regarding the safeguarding of
Sensitive Compartmented Information. DOJ has the authority to grant or suspend SCI
access. If derogatory information is adduced, an employee's or applicant's appeal is un-
der the procedures provided by the CIA in DCID 614. (See Chapter 1 0 . 1 DOJ
~ ~ ~follows
the requirements for the physical protection of SCI found in DCID 1/21.
The FBI, although a component of DOJ, has a security clearance program far
larger than its parent department!70 The FBI accounts for approximately 10 percent of
the security clearance investigations of the entire federal All of its em-
ployees are required to hold a Top Secret clearance, regardless of whether they handle
national security information.472Unlike most nondefense agencies whose security clear-
ance investigations are done by OPM, the FBI does all of its own. The investigations are
done, for the most part, by former or retired FBI agents as part of the Background Inves-
tigation Contract Service (BICS).
The FBI also conducts background security investigations for individuals needing
access to classified information under the Classified Information Procedures Act (CIPA)
(see Chapter 16), the Foreign Intelligence Surveillance Act of 1978 (FISA), and nonFBI
members of Joint Task Forces. It also conducts investigations for others needing access to
FBI facilities and classified information, such as attorneys representing FBI employees in
personnel matters, staffs of Federal Independent Counsel, Special Consultants, Federal
Legislative and Judicial Branch personnel, and chaplains and doctors counseling or
treating FBI staff!73 The FBI unit dealing with personnel security is divided into three
sections, one section handling clearances for FBI employees including those with SCI
clearances, a second section handling clearances for contractor employees, and a third
dealing with clearances for persons who are not employees or contractors, but who need
access to FBI facilities, such as police officers or attorneys.474
FBI regulations governing security clearance investigations are found in its Sec-
tions 67,259, and 260 of the FBI Manual of Investigative Operations and Guidance
(MIOG). Further requirements are described in its Manual for Administrative Operating
Procedures (MAOP).~~' Section 67 of the MIOG deals with the investigative require-
ments for applicants for FBI employment and prescribes how such investigations are to
be conducted. Investigative procedures described under Part 260 for contractor personnel
are quite different.
Executive Order 12968 requires agencies to limit their requests for access eligi-
bility to only those with a demonstrated foreseeable need. It prohibits them fiom re-
questing or approving eligibility in excess of actual requirements. However, it excepts
agencies fiom that limitation where eligibility for access is a mandatory condition of em-
ployment.476The FBI is one of those agencies. The FBI's rationale is that it is a "reac-
tive" agency that frequently has to respond to emergencies requiring security clearances.
It asserts that it must be able to easily transfer personnel among assignments, some of
which may require dealing with classified national security information. For that reason,
FBI requires all of its employees to have a Top Secret security clearance regardless of
whether they have access to national security information.
The standards for adjudicating access decisions affecting FBI employees are ap-
parently listed in the MAOP. They are described as detailed and particular, similar to the
former Department of Defense adjudicative standards previously found in its regulation,
DoD 5200.2-R. For example, the FBI standards addressing "experimental" or "regular"
drug use specify the precise number of times and the recency of use for each type of ille-
gal substance. In contrast, the much more general Adjudicative Guidelines now used
throughout the government state that any drug use is disqualifying, but allows mitigation
for events that are "not recent," "are isolated," or are "an aberration event."477The more
general guidelines give greater latitude to the adjudicating authority to consider individ-
ual circumstances, but there is less certainty in the outcome.
Like the DOJ, the FBI makes two determinations for each applicant and em-
ployee, trustworthiness and suitability, the former being determinative of eligibility for a
security clearance. A trustworthiness investigation is not begun until the applicant has
been dctern~inedto be suitable. Security investigations of FBI applicants are concerned
with character, loyalty, reputation, and associations.478Where derogatory information
obviously disqualifies the applicant, the investigation is ended. Various FBI indices are
checked, not only on the applicant, but on the applicant's close relatives, references,
roommates, close social friends, and others with whom the applicant has been closely as-
sociated during his adult life. Former spouses are interviewed, and if the applicant is to be
married, the future spouse and future immediate relatives are also investigated. Organi-
zations listed by the applicant are also checked against FBI indices. Neighbors and
roommates for the past five years are interviewed, and if derogatory information is devel-
oped, the interviews continue to the indefinite past.479References and neighbors are
questioned not only about the applicant but about the applicant's close relatives and asso-
ciates. If derogatory information is developed, inquiries are made to "informants and reli-
able sources."480If allegations of disloyalty or subversive activities are received, appro-
priate security informants are contacted.481
All employments, including part-time and of any duration, are verified, and peri-
ods of unemployment must be accounted for. Supervisors and a representative number of
coworkers are interviewed. Law enforcement records are checked in detail on both the
applicant and close relatives. Credit checks are done for seven years, and if bankruptcy is
admitted, checks go back 10 years. Persons interviewed are questioned about the appli-
cant's lifestyle and whether he appears to be living beyond apparent means.
The FBI both investigates and adjudicates the security clearances of its employees
and applicants for employments. An appeal of the FBI's decision to deny or revoke a
security clearance or access to SCI may be taken by the individual affected to the De-
partment of Justice for adjudication under its procedures as described earlier in this
chapter. Reconsideration may first be requested to the initial decision authority in the
FBI. If the FBI's decision is sustained, a W h e r and final appeal may be taken to the DOJ
Access Review Committee.
informatio~iis located, appears to subvert the purpose and intent of the executive order.
Because the FBI is concerned with any non-bureau employee having access to its
facilities, information, or employees, anyonc, even if not dealing with national security
information, must be investigated and cleared for access to FBI facilities.494For example,
people in this category are electrical, plumbing, or vending machine service personnel
and cleaning workers. For individuals with only "escorted" access, only a limited back-
ground investigation is conducted, but for persons having "unescorted" access to FBI
facilities, a SF-86 must be submitted and a 10-year background investigation con-
d ~ c t e dDeterminations
.~~~ of eligibility for facility access for such persons are made by
the Security Program Manager taking into consideration criteria set forth in Executive
Order 10450 and DCI/D 6 1 4 . ~ ~ ~
Facility Clearances
Summary procedures available under 5 U.S.C. 5 7532 are not intended to replace
other statutory avenues for removing a government employee, either for general or for
security-related considerations. Their use is not mandatory even where national security
considerations are the basis for removal. The general personnel laws also may be used to
remove an employee for "cause" when there is a reasonable doubt as to loyalty.502The
language of Section 7532 is permissive, and even though a removal could be taken under
that section, it was not intended to preempt the procedures available under 5 U.S.C. 5
75 13 or other statutes.503For example, NSA may rely on the National Security Act of
1959 or the Act concerning NSA Personnel Security Procedures to effect a person's
removal.504
The summary process under Section 7532 differs in several respects from Execu-
tive Order 12968 which provides government-wide procedures for revoking an em-
ployee's access to classified information. First, 5 U.S.C. $ 7532 applies to all government
employees regardless of whether they hold a clearance, while the executive order applies
only to those already holding a clearance. Second, it allows for the immediate suspension
without pay of the employee before any appeals procedures are provided. In contrast, un-
der Executive Order 12968, the employee ordinarily would remain on the government
payroll even though his access to classified information is suspended until his appeal
rights under the executive order had been exhausted.505Third, upon loss of a security
clearance under the executive order, if the agency has adopted regulations requiring such
a reassignment, a government employee has the right to reassignment to another position
not requiring a clearance.506Under Section 7532, an employee has no such right. Finally,
if an employee's right to access is revoked under the executive order and his position
requires a security clearance, and there are no agency regulations requiring reassignment,
the employee would still have a right to appeal to the Merit Systems Protection Board if
he was terminated, on the ground that the agency failed to follow procedural require-
ments in revoking the clearance.507Under 5 U.S.C. $ 7532 the head of the agency taking
the action may suspend an employee without pay when he considers it necessary in the
interests of national security and may remove the suspended employee if he determines it
to be necessary or advisable in the national interest.508The decision of the agency head is
final with no further appeal.
After suspension, but before termination, an employee does have certain appeal
rights under 5 U.S.C. 9 7532. The employee must be notified of the reasons for the sus-
pension but only to the extent that the agency head determines that it is in the interest of
national security. Within 30 days after notification, the employee may submit statements
or affidavits showing why he should be restored. For some employees that is the extent of
their appeal rights. Only if an employee is a United States citizen, has completed his trial
or probationary period, and has a permanent or indefinite appointment are there addi-
tional rights of appeal. In that case, the employee is entitled, after suspension and before
removal, to a written statement of the charges against him as specific as security consid-
erations permit and an opportunity to answer the charges and submit affidavits. The citi-
zen-employee is also entitled to a hearing before an agency authority constituted for that
purpose, a review of the case by the agency head or his designee before a final adverse
decision, and a written statement of the decision of the head of the agency.509Although
the nature of the hearing is not defined by the statute, it probably means a full trial-type
hearing allowing for the presentation and cross-examination of witnesse~."~
Because of the stringent limitation on the use of Section 7532 and the availability
of summary procedures under other statutes, executive orders or agency regulations, this
statutory authority has fallen into disuse. Another reason for its disuse is that a summary
dismissal also has the practical drawback of the government losing control of the person
considered a security risk. If the person is deemed a security threat, but there is insuffi-
cient evidence for a criminal prosecution, agencies will often try avoiding putting an em-
ployee in a desperate position. To minimize any potential security breach and prevent the
suspected employee from fleeing or selling the information he has, the agency may keep
the employee on the payroll but insulate that person from further contact with sensitive
information until the classified information he does possess can be neutralized.
CHAPTER 16
Criminal Prosecutions
The protection of national security information is of concern not only within the
Executive Branch of the government and in industry, but also, at times, in court pro-
ceedings. It can be involved in both criminal cases, particularly those involving espio-
nage, and in civil suits, for example, discrimination complaints by government employees
working in intelligence agencies. The disclosure of classified information is of particular
concern in criminal prosecutions because of the conflict of the interest of protecting gov-
ernment secrets with the right of defendants to be confronted with the evidence used
against them. In this regard, Congress has enacted the Classified Information Procedures
Act (CIPA) to protect classified information in criminal
The purpose of CIPA was to harmonize a defendant's right to obtain and use ex-
culpatory material at trial, with the government's right to protect classified information in
the nation's interest.517CIPA establishes procedures for permitting and protecting the use
of classified information during a criminal trial, including the use of protective orders and
sanctions. Sanctions vary and may be as severe as dismissal of an indictment if the gov-
ernment refuses to produce information that the court determines to be essential to the
defense.518
The specific criminal trial procedures provided by the CIPA are beyond the scope
of this review. However, of interest here are the personnel security procedures required
by CIPA in such cases. Because of separation of powers concerns for the independence
of the Judiciary, Section 9 of CIPA mandated that the Chief Justice of the United States,
in consultation with the Attorney General, the Director of the CIA, and the Secretary of
Defense, prescribe rules for the protection of unauthorized disclosure of classified infor-
mation in the custody of the United States district courts, courts of appeal, or Supreme
Court. Those rules were published in February 1981 and are found as a note to 18 U.S.C.
App. 3, 8 9.5'9
The security procedures established by the Chief Justice require that, in any
criminal case where classified information is expected, a Court Security Officer shall be
appointed who has a demonstrated competence in security matters.520The Court Security
Officer must be recommended by the Attorney General and certified by the DOJ's Secu-
rity Officer as cleared for the level and category of classified information involved. That
per ,( l i r may come from the Executive Branch but is responsible to the court for informa-
tion, physical, personnel, and communications security.
Any court personnel, i.e., persons appointed by the court or providing service to it
requiring access to classified information, must first be cleared. A clearance is not re-
quired for justices and judges.52' CIPA does not absolutely require that defense counsel
and other "persons associated with the defense," e.g., experts, secretaries, and law clerks,
be cleared (although normally a background investigation is done on everyone). How-
ever, even if they will not submit to an investigation, the government may obtain infor-
mation about their trustworthiness" by any lawful means," and may bring that informa-
tion to the attention of the court for its consideration in framing appropriate protective
orders.522While a defendant may select anyone for his defense team, if a person on the
defense team is not considered sufficiently trustworthy to protect national security infor-
mation, a protective order may prevent their having access to necessary information.
The Court Security Officer is responsible for marking all court documents con-
taining classified information with the appropriate level of classification and with any
special access controls.524Every document filed by the defendant must be filed under seal
and promptly turned over to the Court Security Officer who, in consultation with the
government's attorney or an agency representative, determines whether it contains classi-
fied information. If it does contain classified information, the appropriate classification
marking will be placed on the document and it will remain under seal.
Court Security Officers in practice are provided by the Litigation Security Sec-
tion, a unit within the DOJ Security and Emergency Planning staff, which is under the
direct supervision of the DOJ Security This section consists of five security
specialists and their support staff whose primary function is to provide security to the
federal courts under CIPA. It acts as advisor to the courts in criminal cases, creating secu-
rity procedures and initiating personnel investigations, as required. It will also, on request
of government attorneys, provide advice and assistance in criminal cases in state courts
and in civil proceedings involving classified national security information.
The Court Security Officer will clear defense counsel and their staff, court per-
sonnel, court reporters, judges' assistants, court clerks, and other court personnel other
than justices and judges, who are involved with classified information, using the same
adjudicative and investigative standards that apply to all government personnel.526Each
person needing access to classified information is required to fill out a SF 86, two finger-
print cards, an IRS tax waiver, and a DOJ credit information waiver form. The security
investigation itself is conducted by the FBI.
The Litigation Security Section may get involved in state criminal cases, if re-
quested by a federal government attorney, where classified information is involved. An
example is a California court case in which the defendant was convicted of murder that
had occurred on the premises of a contractor doing classified government work. During
the sentencing phase, the defendant wanted to introduce information concerning a classi-
fied position he had previously held with an intelligence agency.
The pending workload of the Litigation Security Section at the time of this writ-
ing is 32 criminal cases and 21 civil cases. The section receives, on average, four to five
new cases per year. Each of the five security specialists is designated as a Court Security
Officer so that any of them can assist any court needing the Section's services.
Civil and administrative cases involving classified information are not covered by
cIPA.'~~ When those situations arise, at the request of the government's attorneys, the
Litigation Security Section will notify the court and offer its assistance. Although courts
are not obligated to accept, they generally do. The section will not respond to requests for
assistance fi-om private counsel until a Court Security Officer is appointed by the court in
a particular case.
Persons other than employees of the Executive Branch involved in litigation with
the government who require access to classified information, classified either by DOJ or
in its custody, must be investigated and cleared by DOJ. Employees of government con-
tractors who have already been cleared by the Defense Security Service under the Indus-
trial Security Program do not need further clearance unless a higher level of clearance is
needed for the litigation.s30Since all information connected to litigation with the federal
government eventually come into the custody of the DOJ, its control over litigation secu-
rity is comprehensive.
The standards for determining eligibility for access to classified information are
the same for nongovernment personnel as for DOJ employees. DOJ regulations provide
that "no person" may be given access unless that person has been determined to be eligi-
ble under the standards of Executive Order 12968 (which applies to government employ-
ees or contractors), has a demonstrated need-to-know, and has signed an approved non-
disclosure agreement.53'
Sheldon I. Cohen has been in the private practice of law in Washington, DC, and
Arlington, VA, since 1964. He has handled government and private employment cases
throughout that time, with emphasis on national security law for the last 20 years. Mr.
Cohen was Chair of the American Bar Association, Administrative Law Section, Com-
mittee on National Security Interests, from 1990 through 1994. He was Chair of the
American Bar Association (ABA), Administrative Law Section, Government Personnel
Committee, from 1989 to 1993. He also served as Vice Chair of the ABA Committee on
Contracting with National Security Requirements of the Public Contracts Law Section.
As Chair and Vice Chair of those Committees, the author headed the ABA's efforts in
defeating a proposed 1989 Presidential Executive Order that would have eliminated all
appeal rights for government employees whose security clearances were threatened. He
coordinated the ABA's involvement in the drafting of the National Industrial Security
Operating Manual. The author also spearheaded the ABA7sefforts to obtain additional
appeal rights in employee security clearance cases which were included in Executive
Order 12968 in 1995 and headed the ABA7sparticipation in the drafting of the Uniform
Adjudicative Guidelines issued by the Security Policy Board in 1997.
The author regularly practices before the Defense Office of Hearings and Appeals
representing contractor employees and handles classified personnel matters before vari-
ous government agencies.
Notes
Halperin vs. CIA, 629 F.2d 144, 154-162 (D.C. Cir. 1980).
U.S. Constitution, Art. 11, 8.2. Dept. ofNavy v. Egan, 484 U.S. 518,527 (1988);
Totten v. United States, 92 U.S. 105 (1876). See United States v. Reynolds, 345
U.S. 1 (1953); Weinberger v. Catholic Action of Hawaii, 454 U.S. 139 (1981).
E.O. 11652 (1972); E.O. 12065 (1978); E.O. 12356 (1982) and E.O. 12958
(1995).
Compare Executive Orders 12065 and 12958 with Executive Orders 11652 and
12356.
5 U.S.C. 552.
Id., 8 1.3.
Id., $5 4.l(h), 4.4.
61 Stat. 496 (50 U.S.C. 401 et seq); E.O. 12333,46 Fed. Reg. 59941, Dec. 4,
1961.
Id., $ 4.4.
The Security Policy Board is the Board established by the President to consider,
coordinate, and recommend policy directive for the U.S. security policies,
procedures, and practices. It was established by Presidential Decision
Directive/NSC-29, (PDD-29) (Sept. 16, 1994), and is referred as the cognizant
authority for issuing the uniform standards in E.O. 12968 $1.1(j).
DCID 614.
A comprehensive discussion of the earlier case law is found in: Haag and Denk,
Due Process in Matters of Clearance Denial and Revocation (Defense Personnel
Security Research and Education Center, 1988)(PERS-TR-88-004).
See Cafeteria and Restaurant Workers Union v. McElroy, 367 U.S. 886 (196 1).
Ibid.
See, Able v. United States, 155 F.3d 628 (2nd Cir. 1998); Jackson v. Air Force
(unpublished) 1997 W.L. 759144 (9th Cir. 1997); Holmes v. California Army
National Guard, 124 F.3d 1126 (9th Cir.1997).
Compare Greene v. McElroy, 360 U.S. 474,496 (1959) with Vitarelli v. Seaton,
359 U.S. 535 (1951) and Dept. Of Navy v. Egan, 484 U.S. 518 (1988).
H.R. Conf. Rep. No. 103-753, 103rd Cong. 2d. Sess., Sept. 27, 1994.
E.O. 12968, Sec. 3.2(b). The Security Policy Board was created by Presidential
Decision Directive 29. A "Fact Sheet" describing the contents of that Directive is
found at the Security Policy Board Web site: www.spb.gov.
The Department of Defense has included the uniform standards in DoD 5200.2-R.
Appendices I and N. The Central Intelligence Agency has incorporated them in
DCID 614, Annexes A and C.
The Commission was created by P.L. 103-236, Title IX, 108 Stat. 525, Apr. 30,
1994 (50 U.S.C. 435, note).
Hearings were held on Mar. 25,1997 and May 7 1998 by the Senate Committee
on Governmental Affairs. They are available on the Web site of the Federation of
American Scientists, www.fas.org/spg/congress. The Committee issued its report,
S. Rep. 105-258, 105th Cong., 2d Sess. on Jul. 22, 1998.
63 Fed. Reg. 4572, Jan. 30,1988; 32 C.F.R. Part 147, Subpart B. The Uniform
Guidelines and Standards are issued as part of the DoD regulations as that
Department has the administrative responsibility for supporting the Security
Policy Board.
32 C.F.R. $ 147.18.
"Q" and "L" designations used by the Department of Energy under the Atomic
Energy Act are technically known as "accesses," but for the sake of simplicity in
this book are here referred also as clearances. "Q" is the equivalent to Top Secret
and "L" is the equivalent to Confidential.
32 C.F.R. $ 147.19.
32 C.F.R. $ 147.24.
See, DoD 5200.2-R, $$ 1-312,1-313,2-302;Chap. 11, Sec. 2; Chap. 111, App B.
32 C.F.R. $ 147.29.
32 C.F.R. Subpart C.
Ibid.
See Chapter 5.
See Chapter 4.
The Defense Security Service now also includes the DoD Polygraph Institute
(DODPI). The former DoD Security Institute (DoDSI) was disestablished in Sept.
1998, and its functions have been assumed by the DSS Academy. The DSS
Charter is DoD Directive 5 105.42.
DoD Directive 5200.2. The DoD Personnel Security Program is detailed in DoD
5200.2-R, codified at 32 CFR 154.
Ibid.
OPM Investigations Service uses USIS, Inc., which is made up of former OPM
investigators. NRO uses a private organization, USIS, Inc., to do its
investigations. OMNISEC, an organization comprised of retired CLA agents, does
some investigations for the CIA. The FBI also uses a group of former and retired
FBI agents that it calls the Background Investigations Contract Service (BICS).
DSS Manual 20-1-M is designated "For Official Use Only." It is probably similar
in content to the OPM investigator's handbook, Conducting and Reporting
Personnel Investigations, FPM Supplement 736-7 1.
DSS has a form for requesting an individual's file that is available on its Web site
at www.dss.mil.
There are seven CAF's: Army, Navy, Air Force, Joint Staff, Washington
Headquarters Services, Defense Intelligence Agency, and National Security
Agency. See Audit Report of the DoD Inspector General, No 97-196, Personnel
Security in the Department of Defense, Jul. 25, 1997.
OPM Federal Investigations Notice, Letter No. 99-08, Aug. 12, 1999.
OPM does adjudicate "suitability" determinations for all agencies for which it
does such investigations.
Data on the results of OPM's investigations for Fiscal Years 1996 through 1998
was supplied by the OPM Investigations Service.
The difference between the data cited and 100 percent reflects "other issues"
raised during the investigation.
5 C.F.R. §732.201(c).
Proposed revisions to 5 C.F.R. Parts 732 and 736 were published on Jan. 5,1996
at 61 Fed. Reg. 394. They are still under consideration by OPM as noted at 64
Fed. Reg. 4336, Jan. 28,1999.
Proposed 736.203.
E.O. 12968, Sec. 3.2(b). The Security Policy Board was created by Presidential
Decision Directive 29. A "Fact Sheet" describing the contents of that Directive is
found at the Security Policy Board Web site: www.spb.gov.
63 Fed. Reg. 4572, Jan. 30, 1988; 32 C.F.R. Part 147, Subpart B. These guidelines
were issued as part of the DoD regulations because that Department has the
responsibility for administratively supporting the Security Policy Board.
32 C.F.R. 5 147.18.
E.O. 12968 $5 3.l(f), 3.2(b) authorizes varying standards for differing levels of
access, including those for special access programs. The Security Policy Board's
guidelines further address these special requirements. 32 C.F.R. 5 147.19(a).
Special access programs are authorized by E.O. 12958, Sec. 4.4,60 Fed. Reg.
19825 (Apr. 20,1995).
32 C.F.R. 5 147.23.
32 C.F.R. 5 147.1.
32 C.F.R. 55 147.3-147.15.
32 C.F.R. 5 147.2.
Ibid.
bid.
The only reported decisions are those of the Defense Office of Hearings and
Appeals (DOHA) affecting contractor employees as part of the Industrial Security
Program (see Chapter 7, and those of the Department of Energy Office of
Hearings and Appeals (see Chapter 13). DOHA decisions beginning in 1996 are
available at www.defenselink.mil/dodg/doha.Representative DOHA cases are
cited in this chapter. The cases are fact-intensive and are legion. Prior to 1996
DOHA was known as the Defense Industrial Security Review Board (DISCR).
For convenience, all earlier DISCR cases are here referred to as DOHA cases.
DOHA Case No. 98-0056, June 19, 1998 (clearance granted); DOHA Case No.
96-0649, Apr. 22, 1997 (clearance granted).
32 C.F.R. $ 147.3.
There have been only two reported decisions of the Defense Office of Hearings
and Appeals under this guideline and its predecessors since 1972. DISCR OSD
Case No. 82-0130, Dec. 13, 1982, aff d July 22, 1983 (clearance granted); DISCR
OSD Case No. 88-1 198, Feb. 18, 1992 (clearance denied on other grounds).
Seven cases were brought between 1966 and 1969, four of them denying
clearance and three granting: OSD Case No. 66-488, Apr. 19, 1968; OSD Case
No. 66-580, Sept. 4, 1968; OSD Case No. 68-238, May 13, 1969; OSD Case No.
68-726, Dec. 17, 1969; OSD Case No. 68-254, Mar. 10,1970; OSD Case No, 68-
522N, Apr. 28, 1971; OSD Case No. 69-29, Mar. 23, 1970.
32 C.F.R. $ 147.4.
32 C.F.R. $ 147.5.
DOHA Case No. 98-03 13, Sept. 16, 1998 (clearance granted); DOHA Case No.
97-0356, Dec. 21, 1997 (clearance denied).
32 C.F.R. $ 147.6.
DOHA Case No. 98-01 13, Sept. 18, 1998 (clearance denied).
DOHA Case No. 97-061 8, Mar. 3 1, 1998 (clearance denied); DOHA Case No.
98-0077, Jun. 25, 1998 (clearance granted).
DOHA Case No. 98-0247, July 30, 1998 (clearance granted).
DOHA Case No. 97-0737, Apr. 21, 1998 (clearance granted); DOHA Case No.
97-0465, Jan. 23, 1998 (clearance granted).
See, Able v. United States, 155 F.3d 628 (2d Cir. 1998); Jackson v. Air Force
(unpublished) 1997 W.L. 759144 (9th Cir. 1997); Holmes v. California Army
National Guard, 124 F.3d 1126 (9th Cir. 1997).
32 C.F.R. fj 147.7.
DOHA Case No. 98-0269, Oct. 14, 1998 (clearance denied); DOHA Case No. 98-
0202, Oct. 14, 1998.
DOHA Case No. 98-0370, Oct. 2, 1998 (clearance denied); DOHA Case No. 98-
0303, Sept. 23,1998 (clearance denied); and DOHA Case No. 97-0830, June 6,
1998 (clearance denied).
32 C.F.R. fj 147.8.
DOHA Case No. 98-0368, Sept. 3, 1998 (clearance granted); DOHA Case No.
98-0358, Sept. 16, 1998 (clearance denied).
32 C.F.R. fj 147.9.
The Department of Energy reports for Fiscal Years 1995 through 1997 that of 3 12
denials and revocations, 63 percent involved alcohol or drug abuse. (See Chapter
13.) DOHA decisions for 1996 through 1998, show of a total of 603 cases, 485 of
them involved financial considerations, drugs, alcohol, or a combination of them.
32 C.F.R. fj 147.10.
The FBI still follows the former practice of having very specific and detailed
regulations on the type, period of use and amount of substance used. See Chapter
14.
DOHA Case No. 98-0091, Jul. 6, 1998 (clearance granted); DOHA Case No. 98-
0066, Sept. 11, 1998 (clearance denied).
Both civilian employees and military members may be dismissed for drug use
even if there is no security clearance involved under applicable personnel
regulations.
32 C.F.R. $ 147.11.
32 C.F.R. 147.12.
DOHA Case No. 98-0247, Jul. 30,1998 (clearance granted); DOHA Case No. 97-
0184, Aug. 17, 1998 (clearance granted).
32 C.F.R. 147.13.
DOHA Case No. 96-0605, Jul. 23, 1997 (clearance denied); DOHA Case No. 93-
1234, Jan. 20, 1995 (clearance denied).
32 C.F.R. § 147.14.
There were no DOHA decisions applying Guideline L for 1996 through 1998.
32 C.F.R. § 147.15.
DOHA Case No. 96-0687, Apr. 10, 1997 (copying of commercial software
programs while in college) (clearance denied).
The Navy regulation is 0PNAV.INST 55 10.3OA (Mar. 10, 1999); the Army
regulation is AR 380-67 (Sept. 9, 1988, as amended by change 3); and the Air
Force regulation is AFINST 3 1-501 (May 2, 1994, as revised, Apr. 22, 1996). The
Office of the Joint Chiefs of Staff does not have its own regulation.
P.L. 103-359, Title VIII, 108 Stat. 3434, Oct. 14, 1994 (50 U.S.C. 435).
See Statement by the White House Press Secretary accompanying the release of
E.O. 12968, Aug. 4, 1995. The Adjudicative Guidelines may be found on the
Security Policy Board Web site: www.spb.gov.
Ibid.
Id., at Appendix M.
DoD Directive 5220.6 applies to the Office of the Secretary of Defense, the
military departments, the Chairman of the Joint Chiefs of Staff and the Joint Staff,
the Inspector General of the Department of Defense and the Defense agencies. By
mutual agreement, it also extends to the: (a) Department of Agriculture, (b)
Department of Commerce, (c) Department of Interior, (d) Department of Justice,
(e) Department of Labor, (f) Department of State, (g) Department of
Transportation, (h) Department of Treasury, (i) Environmental Protection
Agency, (j) Federal Emergency Management Agency, (k) Federal Reserve
System, (1) General Accounting Office, (m) General Services Administration, (n)
National Aeronautics and Space Administration, (0) National Science Foundation,
(p) Small Business Administration, (q) United States Arms Control and
Disarmament Agency, (r) United States Information Agency, (s) United States
International Trade Commission, and (t) United States Trade Representative. (Part
B.2).
The three enclosures to DoD Directive 5220.6 are E.O. 10865, the Adjudicative
Guidelines for determining eligibility for a clearance and an Additional
Procedural Guidance for proceedings before DOHA (hereafter referred to as
DOHA Additional Procedural Guidance). (The Additional Procedural Guidance is
found at Appendix D).
The adjudicative criteria were first formulated in 1953 in E.O. 10450, "Security
Requirements for government Employees." The most recent formulation is the
Uniform Adjudicative Guidelines restated in the DOD Personnel Security
Regulation, 5200.2-R, Appendix I. (Included as Appendix B). Those guidelines
are included in DoD Directive 5220.6 provided with the SOR.
Department Of Navy v. Egan, 484 U.S. 518,531 (1988). E.g., DISCR OSD No.
89-1607 (Jul. 18, 1989).
DOHA Case No. 97-0727 (Aug. 3, 1998); DOHA Case No. 97-0202 (Jan. 20,
1998).
Ibid.
DOHA Case No. 97-0630 (May 28, 1998); DOHA Case No. 96-0152 (Jan. 14,
1997); DOHA Case No. 96-0228 (Apr. 3, 1997).
Ibid.
E.g., Stehney v Perry, 101 F.3d 925 (3d Cir. 1996); Brazil v Department of Navy,
66 F.3d 193,197 (9th Cir. 1995); cert. denied 517 U.S. 1103 (1996); Dorfmont v
Brown, 913F.2d 1399 (9th Cir. 1990).
Interview with the Office of the Chief Administrative Judge, Defense Office of
Hearings and Appeals.
The requirement of the Administrative Procedures Act, 5 U.S.C. 552(a)(2), for
public availability of agency opinions, technically had been met by having the
opinions available in its headquarters' library. There had not been a realistic
publication to DOHA'S nationwide audience until the recent posting of decisions
on the Internet.
South Dakota v. Neville, 459 U.S. 553, (1983); Schmerber v. Calfornia; 384 U.S.
757,764 (1966).
Secrecy Commission Report, 90. The Secrecy Commission Report cites: House
Permanent Select Committee on Intelligence, Report on United States
Counterintelligence and Security Concerns (1986); Office of Technology
Assessment, Scientific Validity of Polygraph Testing: A Research Review and
Evaluation--A Technical Memorandum, OTA-TM-H-15 (Washington, D.C.:
Office of Technology Assessment, November 1983); House Permanent Select
Committee on Intelligence, United States Counterintelligence and Security
Concerns; and Department of Defense Polygraph Institute, Study of the Accuracy
of Security Screening Polygraph Examinations.
Gordon Barland, Charles R. Honts, and Steven Barger, Studies of the Accuracy of
Security Screening Polygraph Examinations (Fort McClellan: Department of
Defense Polygraph Institute, 24 March 1989), iii. The Secrecy Commission
Report at p. 90, notes, however, that the DoDPI study was conducted in a
controlled setting and may not accurately reflect the conditions under which a
polygraph is normally taken.
NSA's use of the polygraph for employment screening was approved in Stehney
v. Perry, 101 F.3d 925 (3d Cir. 1996).
A Special Access Program is defined as: "a program established for a specific
class of classified information that imposes safeguarding and access requirements
that exceed those normally required for information at the same classification
level." E.O. 12958, 5 4 . 1 0 (1995).
DOE Polygraph Examination Regulation, 10 C.F.R. Part 709 (64 Fed. Reg.
70961-70980, December 17,1999.
Ibid. DoD Regulation 5210.48-R, Chap. 1 Para. C.D.l, however, provides that the
"results of an analysis of the polygraph charts may be considered to have
probative value in administrative determinations."
DOHA ISCR Case No. 96-0785 (Initial Decision) (Apr. 16, 1998).
DOHA ISCR Case No. 96-0785 (Appeal Board Decision) (Sept. 3, 1998).
DOHA ISCR Case No. 96-0785 (Remand Decision of the Administrative Judge)
(Jan. 11, 1999).
KunlJerman v. Department of the Navy, 785 F.2d 286 (Fed Cir. 1986).
Executive Order 10450, Sec. 9, Apr. 27, 1953.
Reference to the SII is found in the Chapters 732 and 736 Federal Personnel
Manual (FPM) which was abolished in 1993.
The latest version of DCID 614 (formerly numbered 1/14) was issued July 2,
1998. It is reproduced at Appendix C.
DCID 614, $ 6.
Id., 5 3.
Id., 8 1.
Ibid.
10 U.S.C. 5 119(e).
The background of the adoption of Executive Order 12958 is more fully discussed
in Chapter 1. In summary, based on the recommendations of a Joint Security
Commission for a simplified, more uniform, and more cost-effective system,
Congress in 1994 amended the National Security Act of 1947 to require the
President to establish procedures to govern access to classified information
binding on the Executive Branch and Congress. As a result of that legislation, the
President signed Executive Order 12958 on April 17, 1995, establishing a uniform
system for classifying, declassifying, and safeguarding national security
information.
Ibid.
Ibid.
Ibid.
Ibid.
Id., 56-302.
Id., Sec. 3.
NISPOM, Chapter 5, Secs. 3,8,9. DoD 5200.2-R, Appendix G gives very specific
requirements for the constructions of vaults, security rooms, intrusion detection
systems, and access controls, including "biometric devices", i.e., hand geometry,
retina scans, or voice recognition systems, for access to the most sensitive
information.
Id., Chapter 8.
Ibid.
Ibid.
Id., Section 3.
Id., Sections 4 - 7.
P.L. 88-290,78 Stat. 168, Mar. 26,1964; P.L. 86-36,73 Stat. 63, May 29, 1959,
50 U.S.C. 402, note; DoD Dir. 52 10.45, May 9,1964.
Id., $ 111.
Ibid.
Id., 5 V.
Id., 5 VI.
50 U.S.C. 5 833 (repealed, P.L. 104-201, 5 l633(b)(2), 110 Stat. 2751 (1996)).
Atomic Energy Act of 1954, as amended, c.1073,68 Stat. 92 1,940, Aug. 30,
1954 (42 U.S.C. $9 201 1-2296).
42 U.S.C. 9 2014(y).
42 U.S.C. 5 2162(d).
Secrecy Commission Report, p. 24.
Statistics have been provided by the DOE Office of Safeguards and Security,
Office of Security Affairs. The subcategories are less than the total cases closed
due to other administrative actions being taken.
Ibid.
10 C.F.R. $710.5.
10 C.F.R. $ 710.1,.2.
DOE Order 472.1B, Personnel Security Activities (Mar. 24, 1997); DOE
Personnel Security Program Manual, DOE M472.1-1 (May 22,1998).
10 C.F.R. $ 710.6.
10 C.F.R. $ 704.4(B).
The case of Karen Silkwood, a whistle-blower in a nuclear power plant, made into
a popular movie, exemplifies this problem.
Executive Order 12968, Part 5(c) allows agency heads to provide additional
review proceedings beyond those required by the order.
10 C.F.R. Part 710 is being revised to conform with Executive Order 12968 and
will be published in the Federal Register as a Notice of Proposed Rulemaking.
DOE will adopt the Adjudicative Guidelines used throughout the Executive
Branch which were approved by the President and issued by the Security Policy
Board. They will be included in the revised regulations as Appendix B.
DOE Polygraph Examination Regulation, 10 C.F.R. Part 709 (64 Red. Reg.
70961-7O98O), Dec. 17,1999.
10 C.F.R. $ 710.8.
10 C.F.R. 5 710.7.
10 C.F.R. 5 71 O.Z(I).
10 C.F.R. 5 710.9.
10 C.F.R. fj 710.21.
10 C.F.R.5 710.5(a). Prior to the 1994 revision of the regulations, hearing officers
were non-government attorneys who heard the appeals on a contract basis. This
was changed as a result of a GAO report, which held that the hearing was a
governmental function which should be performed by government employees.
Dec. B-23756, Dec. 29, 1989.
10 C.F.R. 5 710.21,710.22,710.24.
10 C.F.R. 5 710.25(d). DoD hearings are conducted by the Defense Office of
Hearings and Appeals (DOHA). See Chapter 6 and 7.
Ibid.
10 C.F.R. 5 710.26(d).
10 C.F.R. 5 710.26(h).
10 C.F.R. 5 710.26(0).
10 C.F.R. 5 710.26(q).
10 C.F.R. 5 710.27tb).
10 C.F.R. 5 710.28(c).
10 C.F.R. 5 710.28(e).
10 C.F.R. 5 710.31.
DOJ Employment Security Regulations, DOJ Order 2610.2A, Par. 8 (Aug. 21,
1990).
28 C.F.R. 5 17.11. DOJ's regulations concerning classified national security
information and access to classified information are found at 28 C.F.R. Part 17.
(AG Order No 2091-17) 62 Fed. Reg. 36984, July 10,1997. A detailed
description of each official's responsibilities with respect to national security
information is in DOJ's regulation concerning Security Programs and
Responsibilities, DOJ Order 2600.2B, (Jul. 10, 1989).
28 C.F.R. 5 17.12.
28 C.F.R. 5 17.14.
28 C.F.R. 17.1l(c).
28 C.F.R. 5 17.47(a).
28 C.F.R. 5 17.47(b).
28 C.F.R. 5 17.15.
28 C.F.R. 5 17.15.
28 C.F.R. 3 17.47(d).
28 C.F.R. 5 17.47 (e).
28 C.F.R. 5 17.47(g).
28 C.F.R. 5 17.47(h),(i).
28 C.F.R. 17.47.47(f).
28 C.F.R. 5 17.15.
The Procedures may be obtained from the Chair, Department of Justice ARC,
Room 1116, Main Justice Building, 950 Pennsylvania Ave. NW, Washington, DC
20530-0001.
Information provided during an interview with the DOJ Security and Emergency
Planning Staff.
28 C.F.R. 5 17.41.
According to DOJ, although consent to disclosure of financial information is a
requirement of E.O. 12968, issued in October 1995, as of May 1999 that
requirement has not been implemented government-wide because the financial
disclosure form had still not been finally approved and adopted.
28 C.F.R. 4 17.41(e).
Information provided during an interview with the DOJ Security and Emergency
Planning Staff, Jul. 29,1998.
Information provided during an interview with the DOJ Security and Emergency
Planning Staff, Jul. 29,1998.
Personnel and facility clearances under the Industrial Security Program are
handled by the Industrial/ Facility Security Unit. Security Countermeasures
Section, National security Division. FBI employee security clearances are also
handled by that division.
See MAOP Part II,3-1.1 and 3-1.2. The FBI, at the time of this writing, has not
provided any part of its MAOP, so the description of its contents is based on
information provided at a personal interview with representatives of the FBI's
Office of General Counsel, Office of Public Affairs, and units dealing directly
with personnel security clearance issues, as well as references to it in the FBI's
Manual of Investigative Operations and Guidance (MIOG).
Ibid.
32 C.F.R. Part 147, Attachment C to Subpart B, 63 Fed. Reg. 4578 (Jan. 30,
1998).
The requirement for universal polygraphing of FBI applicants was begun on May
4, 1994 according to information provided during an interview with the DOJ
Office of Security and Emergency Planning. An FBI regulation, MIOG, Subsec.
76-7.9 issued earlier (1/11/85), provides that polygraphing is only to be on
approval of the Assistant Director of the Inspection Division, or some other
person designated by the Director, FBI, provided the exam would materially assist
in the resolution of questions concerning (a) relationship or allegiance to a foreign
power, (b) freedom from coercive forces, or (c) ability to abide by laws and
regulations and intent to use his or her employment for FBI purposes.
Ibid.
5 U.S.C. 5 7531. NSA, DIA and the Defense Mapping Agency were added by
Memorandum of President Reagan, May 23, 1988,53 F.R. 26023 (5 U.S.C. 753 1,
note).
Carlucci v. Doe, 488 U.S. 104. The Supreme Court in Cole v. Young held that in
the absence of an immediate threat of harm to the "national security," the normal
dismissal procedures seem fully adequate, and the justification for summary
powers disappears. 351 U.S. 546.
Gri@ v. Defense Mapping Agency, 864 F.3d 1579, 1580 (Fed. Cir. 1989); Holley
v. Dept of the Navy, supra.
5 U.S.C. 5 7513. Department of the Navy v. Egan, 484 U.S. 518 (1988).
5 U.S.C. 5 7532(b).
5 U.S.C. 5 7532(c).
In dictum in Department of the Navy v. Egan, the Court stated: "Even assuming
he would be entitled to a [trial-type] hearing under 5 7532, we would still
consider the two procedures [comparing 5 U.S.C. 5 75131 not anomalous, but
merely different. 484 U.S. 533.
The Federal Personnel Manual, Chap. 732, Sec. 5-4. (The Federal Personnel
Manual was abolished in 1993. Chapter 732 of the Code of Federal Regulations is
currently under revision and is expected to contain many of the provisions that
previously appeared in the FPM).
Ibid.
Ibid.
P.L. 96-456,94 Stat. 2025, Oct. 15, 1980; 18 U.S.C. App. 3 , @ 1 - 16.
United States v. Pappas, 94 F.3d 795 (2d cir. 1996); United States v. Wilson, 571
F.Supp. 1422 (D.C.N.Y. 1983).
Security Procedures, $ 2.
Security Procedures, $ 4 .
Security Procedures, $ 5.
Security Procedures, $ 6 .
Security Procedures, $ 9.
Information concerning the DOJ Court Security Section was provided during an
interview with the Associate Director, Security and Emergency Planning Staff, in
August 1998.
Security Procedures, $ 4.
Bowers v. US. Dept. Of Justice, 690 F.Supp. 1483 (W.D.N.C. 1987) (inapplicable
to FOIA proceeding); United States v. Koreh, 144 F.R.D. 218 (D.N.J. 1992)(does
not apply in denaturalization proceeding).
28 C.F.R. $ 17.46(d).
28 C.F.R. $ 17.41(a).
Eg., Bowers v. US. Dept. of Justice, supra; United States v. Koreh, supra.
Statutes
National Security Act of 1947, as amended, c. 343,61 Stat. 496, Jul. 26,
1947 (50 U.S.C. 401-432).
Central Intelligence Agency Act of 1949, c. 227,63 Stat. 208 (50 U.S.C.
403a-403i) Jun. 20, 1949.
National Security Agency Act of 1959,73 Stat. 63, P.L. 86-36, May 29,
1959 (50 U.S.C. 402, note).
Internal Security Act of 1950, as amended, c. 1024, Stat. 987, Sept. 23,
1950 (50 U.S.C. 783).
Foreign Intelligence Surveillance Act of 1978, P.L. 95-51 1,92 Stat. 783,
Oct. 25, 1978 (50 U.S.C. 1801-1811).
Executive Orders
E.O. 11905, United States Foreign Intelligence Activities, 41. Fed. Reg.
7703, Feb. 18, 1976 (superseded by E.O. 12306).
E.O. 12356, National Security Information, Apr. 2, 1982 (50 U.S.C. 401,
note) (superseded by E.O. 12958).
E.O. 12829, National Lndustrial Security Program, 58 Fed. Reg. 3479, Jan.
6, 1993 (50 U.S.C. 435, note).
E.O. 12958, Classified National Security Information, Apr. 17, 1995 (50
U.S.C. 435, note).
National security directives have been given different names by each administra-
tion. They were called National Security Directives (NSDs) in the Bush administration,
National Security Decision Directives (NSDDs) in the Reagan administration, Presiden-
tial Directives (PDs) in the Carter administration, National Security Decision Memoranda
(NSDM) in the Nixon and Ford administrations, and National Security Action Memo-
randa (NSAMs) in the Kennedy and Johnson administrations. They are known as
President Decision Directives (PDDs) in the Clinton Administration. National Security
Council Intelligence Directives (NSCIDs) are Guidance to Entire Intelligence
Community.
Directives from the Director of Central Intelligence are known as DCIDs and
have government-wide application. The Director of Central Intelligence, who is the
President's Chief Advisor on Intelligence, also serves in another role as the Director of
the CIA.
DoD Directive 5210.65, Chemical Agent Security Program, Oct. 15, 1986.
NISPOM Supplement (for SAP and SCI storage requirements), Feb. 1995.
Air Force Regulation 0-2, Numerical Index of Standard and Recurring Air
Force Publications, Jul. 1,1992.
DOE Order 472. lB, Personnel Security Activities, Mar. 24, 1997.
34. USSAN Instruction 1-69, United States Security Authority for North
Atlantic Treaty Organization Affairs, Apr. 21, 1982 (Enclosure 2 to DoD
Dir 5100.55).
Interagency Agreements
Review Program, DoD Directive 5220.6, dated Jan. 2, 1992 (issued Oct.
31, 1997).
10. Report Supplement to Above Report "For Official Use Only," GAOIGGD-
83-43 (A), dated Feb. 18, 1983.
11. Need for Central Adjudication Facility for Security Clearances for Navy
Personnel, GAOIGGD-83-66, dated May 18, 1983.
M. Judicial Decisions
Dorfmont v. Brown, 913 F.2d 1399 (9th Cir. 1990), cert. denied, 499 U.S.
905 (Appeal of DISCR Decision).
Hill v. Department of Air Force, 844 F.2d 1407 (10th Cir. 1988), cert.
denied, 488
Stehney v. Perry, 101 F.3d 925 (3d Cir. 1996) (use of polygraph at NSA).
United States v. Scheffer, 523 U.S. 303 (1998) (use of polygraph in court
and in connection with security clearances).
Webster v. Doe, 486 U.S. 592 (1988) (authority of CIA to fire; decision
subject to judicial review for Constitutional claims).
Standard Forms
DIS Form 40, Alcohol and Drug Abuse Information Release and Consent
to Redisclosure, May 1990.
Standard Form 75, Request for Preliminary Employment Data, Jan. 1989.
DIS Form 85, Customer Consent [to Financial Records] and Authorization
for Access, Aug. 1988.
Standard Form 85P, Questionnaire for Public Trust Positions, Sept. 1995.
DoD Form 1879, Request for Personnel Security Investigation, Aug. 1999.
R. Other Sources
National Security Strategy of the United States, White House, Aug. 1991.
S. Computer Security
1. Statutes
a. Computer Fraud and Abuse Act of 1986, 100 Stat. 1213, P.L. 99-
474, Oct. 16, 1986.
b. Computer Security Act of 1987, 101 Stat. 1724, P.L. 100-235, Jan.
8, 1998.
7. Directives
DEPARTMENT OF DEFENSE
OMce of the Secretary
32 CFR Pat? 147
RIN 07904G54
-
favonble invatiptlnn not mwtingLhe (9) The likelihood of continuation of
It has been certified that this rule is
investigalivsstandards for accdn at racumnce.
not subject to the Regulatory Flexibility (b)Each case must be judged on its
Act (5 U.S.C. 6011 because it would not. thora l w s k
147.32 Tmpnmy eligibility for at own merits, and final determination
if pmmulgated, have a significant Ih* TOP S E m and SCI levels and remains the responsibility of the
economic impact on a substanlid temporary allglbility b r "Q" acoar specific department or agency. h y
number of small entities. This part will aulborintion: For someone who is not doubt as to whether access to classified
streamline personnel security clearance the subject of L currsnt. favorable information is dearly coruinent with
and make the p m c e u mom p o n n a l or pmnnal-security national security will be resolved in
efficienl inwnigrlian of any k i d .
147.33 Mditioorl rrqukments hy favor of the national security.
public Law 96511. Paperwork agander (c) The ultimate determination of
Reduction Act (44 US.C Chapter 35) Authority: EO. 12968 (60 FR 40245.3 CFR whether the granting or co$nuing of
1995 Chap.. p 3911. eligibility for a security clearance is
It has been certified that this patt does clearly consistent with the interests of
not impose any reporting or Subpart A-Adjudication pational security must be anoverall
recordkeeping requiremenu under the common sense determination based
Papework Raduction Act of 1995. 0 147.1 Introductlon upon careful considerationof the
The following adjudicativdguidelines .following. each of which is to be
List of Subjects in 32 (3FR Part 147 am established for all United Slates evalua'ted in the context of the whole,
Classified information. Investigations. Government civilian and military person. a s explained funher below:
Security measures. personnel. consultants, contractors. (11 Guideline A: Alleaiance to the
employees of contractors. licensees. United States.
Accordingly. Title 32 of the Code of certificate holders or grantees and their (2) Guideline B: Foreign influence.
Federal Regulations. Chapter I. employees and other individuals who (31 Guideline C: Foreign preference.
subchapter C is amended to add part require access to classified information. (4) Guideline D: Sexual behavior.
147 to read as follows: They apply to persons being considered ( 5 ) Guideline E: Personal conduct.
PART 147-ADJUDICATIVE GUIOEUNES for initial or continued eligibility for (6)Guideline F: Financial
FOR DETERMINING EUGIBILITY FOR a n z s s to classified information. to considerations.
ACCESS TO CLASSIFIED INFORMATION include sensitive compartmented (7)Guideline G: Alcohol
Subpart A-Adludicallve Guldellnel information and special access prognms consumption.
and am to be used by government (8) Guideline H: Drug involvement.
Sn. departments and agencies in all final (9) Guideline I: Emotional, mental.
147.1 lntmduct~on clearance determinations. and perionality disorders.
147 2 Adjudicative pmcess. (10) Guideline J: Criminal conduct.
147.3 Guideline A-Allegiance to the 9 147.2 AdlUdlCaUve process. (11) Guideline K: Security violations.
United Starerc (a) The adjudicative process is an
147.4 Guideline 8-Forcign influence. (12) Guideline L: Outside activities.
147.5 Guideline C-Foreign preference. examination 01 a s u f k i e n t period 01 a (131 Guideline M: Misuse of
147.6 Guideline D--Sexual behawor. person's life to make an affirmative Information Technology Systems.
147.7 Guideline E-Personal conduct. determination that the person is eligible (dl A l ~ o u g hadverse information
147.8 Guideline F-41oandal for a security clearance. Eligibility for concerning a single criterion may not be
considentions. access lo classified information is sulficient for an unfavorable
147.9 Guideline CNcohol co-rnprion. predicated upon the individual meeting deterrnination,me individual mav be
147.10 Guideline H-Drug involve men^ Ume personnel security guidelines. The disqualified if available informatibn
147.11 Guideline 1-Emoti~n.l.mental. and adjudicative pmcess is the careful reflects a recent or recurring pattern of
pmonality disorders. weighing of a number of variables questionable judgment. irresponsibility.
147.12 Guideline I--Criminal conduct known as the whole person concept. or emotionally unstable behavior.
147.13 Guideline K--Securityviolation%.
147.14 Guideline l.-Outsidc activities. Available, reliable information about the Notwithstanding, the whole perzon
147.15 Cuidelins M-Misue of information person. past and present. favorable and concept. pursuit of Further
technology qnemr. unfavorable. should be considered in investi~ationsmay be terminated bv an
reaching a determination. In evaluating a p p r o k a l e adjud.~cativoagency inihe
Subpan B-lnvesUgatlve Standards the relevance of an individual's face of reliable. sianificant.
147.18 (ntmdudioa conduct. the adjudicator should disqualifying. adterse info.rmation.
147.19 The rhns ~ t a a d d . consider the following adors: (el When information of security
147.20 hception lo periods of cowrage. (1) The nature. extent. and concern becomes known about an
147.21 Expanding invenigatioor seriousness of the conduct: individual who is currently.eligible for
147.22 Tnnsfanbility. (21 The circumstances surrounding access to classified information. the
147.23 8 m L in semias.
147.24 The national qancy cbeck the conduct. to include knowledgeable adjudicator should consider whether the
participation: person:
Subpart C - G u l d e l l n ~for Temporary (3) The frequency and recency of the (1)Voluntarily reponed the
Auau conduct: information:
147.28 LnMduRioa (4)The individual's age and maturity (21 Was fruthful and complete in
147.26 Ternporuy aligbiliiy for a c m l at the time of the conduct: responding to questions:
4574 Federal RegisterlVol. 63. No. 20 I Friday. January 30. 19981Rules and Regulations
' [3) Sought assistance and followed 5 147.4 Wd.llm B-Fonlgn Influen- (3) Contact and correspondence with
professional guidance. where [a) The concern. A security risk may foreign citizens are casual and
ap ro riato: exist when an individual's immediate
&solved or a p e e m l i h l y to family;includhg cohabitants and other (4) . . has pmmptly
indindual
favorably ~ 0 l v thee -ty comern: persons to whom he or she may be complied with existing agenq
(5) Has demonsmad eosltive changes bound by affedon. influence. or requirements regarding the reporting of
in behavior and employment- obligation are not citizens of the Untied contacts. feqUe~ts.Or h e a t s fmm
[6) Should have hip or her acatss persons or oqanizstions kom a foreign
hl States or may be subject to duress.
temporarily werid& These situations could m a t e h e Country:
adjudication
(O If aRer of the information.
informationof potential for foreign influence.that (5! Foreign financial interests an,
could -11 in ;he of m h a l and not sufficient to affect the
security concern. the adjudicator individual's secruity responsibilities.
clanrified information. &,,tacts with
that theto warrant a isnot
serious enough citizens of other counhies or T i c i a 1 5 147.1 Gddaline Mrslgn pn,enna
mommendation of dIssppmMl or , interests in other counaies are also (a) The concern. When an individual
revocation of the secuity clearance. it "levant sacurity determinations if acts in such a way as to indicate a
may be appropriate to recommend they maka an individual potentially
with a that hhtre vulnerable to coercion. exploitation. or preference
United foreign
for athen
States, he or she may Over the
be
incidents of a similar nature may result .-P prone to provide information or make
in revocation of access. (b) enditions that could mise o d&sions that are harmful to the
secunty concern and may be interests of the United States.
5 147.3 Guld.llne WllegianW 10 me . disqudifying include: (11An immediate (b) %nditioM that could raise a
.Uniled S o t e r family member. or a person to whom the security concern and may be
(a) The concern. An i=dividual must individual has clore ties of affection or include:
be of unquestioned alhiance to the obligation. is a citizen of. or resident or (I) The exenise of dual citizenship:
United Stater The willingness to present in. a foreign country: (2) Possession and/or use of a foreign
safeguard classified information is in (21 sharing wi in^ quaners with a passport:
if there is any to suspect person or penons. regardless of their (3) Milimy service or a willingness to
an the Untied citizenship status. if the potential for bear arms for a foreign country
-
(bl Conditions
States. could mise adverse foreign influence or duress. (4) Accepting educational. medical. or
exists: other benefits. such as retirement and
security concern and moy be social welfare, from a foreign country:
disqu~JiWngincJude:(l)Involvement (3) RelativeS. cohabitants. or
assodates who c o ~ & e dwith any (5) Residence in a foreign country to,
in any act of sabotage. espionage.
mason. terrorism. sedition. or other act f""im government: meet citizenship requirements:
whose aim is to ownhrow the (4) Failing to report. where required. 6)Using to
Government of the united stat=or alter associations with foreign nationals; pmtect Or business in
the form of government by 15) Unauthorized association with a * $ ~ M ~ ~ ~ h o I d i , political
B
unconstitutional means: suspected or known collaborator or in he foreign country:
(2) Association or sympathy with e m p l o p of a foreign intelligence (8) Voting in foreign elections:
persons who am attempting to commit. serviC% (9) Performing or attempting to
or who are committing. any of the above (61 Conduct which may make the perform duties. or otherwise acting, so
acts: individual vulnerable to coercion. as to serve the interests of another
(31Association or sympathy with exploitation. or pressure by a foreign government in preference to the
persons or oqanizations that advocate government: interests of the United States.
the ovenhmw of the United States (71 Indications that representatives or (cl Conditions h o t could mitigate
Government. or any state or subdivision. nationals from a foreign country an, security concerns include: (1)Dual
by force or violence or by other acting to inwase the vulnerability of citizenship is based solely on parents'
unconstitutional means: the individual to possible future citizenship or birtb.in a foreigncounuy;
(4) Involvement in activities which exploita~on,coehon or (21 Indicators of possible fore~gn
unlawfully advocate or prattice the (8) A substantial financial interest in preference [e.g.. foreign military service)
cornmiision a*s of force Or a country. or in any foreign owned or occurred before obtaining United States
to prevent others from exercising their operated business that could make the citizenship:
rights under the Conrtitution or laws of (3) Activity is sanctioned by the
the United States or of any stat?. individual vulnerable to foreign.
(c) Conditions that cou d rnltrgate influence' United States:
(c) Gndjtions that could mitigate (4) Individual has expressed a
security concerns include: [I) The willingness to renounce dual
individual was unaware of the unlawful Secu&'c"ncerns include: (1) A
aims individual or determination that the immediate family
and severed ties upon learning of these: membeds) (spouse- father. mother. Sons* 5 147.6 Guidance D--Sexualbehavior.
(21The individual's involvement was bmthers. risters). cohabitant. [a) The concern. Sexual behavior is a
only with the lawhrl or humanitarian O ' a ~ o d a t e ( ~in
) question not agents security concern if it involves a e m i n a l
as ects of such an organization: of a foreign power or in a position to be offense. indicates a personality or
f3) Involvement in the above activities exploited by a f o r e i p power in a way
occ-d for o g a *on period of c ~ m a that could force rh. ~ndivldualto choose f~~$I~~$~$~.$$5;'~,"," Or
and was ataibutable to curiosity or betwean loyalty to the person(s) duress. or reflects lack of judgment or
academic interest: involved and the United States: discretion.%Sexual orientation or
(41The person has had no recent (2) Contacts with foraign citizens am
invo~vementor a d a t i o n with such the rasuk of 0ffi~ial United States 'The adiudlutor should a h conrid.r y i d d i n u
activities. Government business: ponriningtocriminal condua IGuiddin. I) and
Federal Re i s t e r Vol. 63. No. 2OIFr1day. January 30. 19981 Rules and Regulations 4575
.-
preference may not be used as a basis 12)The deliberate omission. having to engage in illegal acts lo
for or e disqualifying factor in concealment. or falsification of relevant generate funds. Unexplained affluence
determining a person's eligibility for a and material faas from any personnel is often linked to pnxeeds From
clearance. security questionnaire. personal history financially pmfitable criminal acts.
@) Conditions lhot could raise o statement, or similar form used to (b) Conditions tho( could mise o
security concern and rnoy be conduct ~nvestigauons.determ~ne security concern ond may be
disouolifvng include: (11 Sexual emolovment oualifiwtmns. award disqualifying indude: (11 A history of
b&viorof; criminal nature, whether bedefik or staius, determine security not meeting financial obli ations
or not the individual has been clearanca eligibility or uustworthiness. (2) Deceptive or illegal &ancia1
pmsecuted: or award Eduaary responsibilities: practiwa such as embezzlement.
( 2 ) Compulsive or addictive sexual (3) Delibrately pmviding false or employee theft. check fraud. income tax
behavior when the person is unable to misleading information concerning evasion. expense account h u d . Ellng
sto a pattern or selfdestructive or relevant and material m a n e s to an deceptive loan statements. and other
hi&-risk t+mvior or that which is investigator, security official. competent intentional financial breaches of trust:
sym tomauc of a penonally disorder. medical authority. or other (31 Inability or unwillingness to
( 3 ~ ~ e x ubehav~or
al that cnuses an representative in connection with a satisry debts:
individual to be vulnerable to coercion. penonnel security or trustworthiness (4) Unexplained affluence:
loitation, or duress; (51 Financial problems that am linked
eT 4) Sexual behavior of a public nature
and/or that which reflects lack of
determination:
(4) Personal conduct or concealmant
of information that may increase an
to gambling, drug abuse. alcoholism, or
other issues of security concern.
d i m t i o n or judgment. individual's vulnerability to coercion. (c) Conditions thot could mitigote
- (c) Conditions lhat could mitigate exploitation. or duties. such as engaging security concern include: (1) The
security concerns include: (1) The in activities which, if h o w n . may affect behavior was no1 recent;
behavior &during or prior to the person's personal, profekional, or ( 2 ) It was an isolated incident
adolescennt and there is no evidence of community standing or render the . (31 The conditions that resulted in the
subs uent conduct of a similar n a t u m penon susceptible to blackmail: b e h a ~ o were
r largely beyond the
(2)%ebehavior was not recent and
there is no evidence of subsequent . (5) A pattern of dishonesty or rule
violations, including violation of any
person's contml (e.g.. loss of
employment. a business downtsun.
conduct of a similar nature: 9 t t e n or recorded agreement made unexpected medical emergency, or a
(3) There is no other evidence of
questionable judgment, irresponsibility. letween the individual and the agency: death. divorce or separation);
(6) Association with persons involved (4) The person has received or is
or emotional instabilit receiving counseling for the problem
(4),The behavior no linger serves as in criminal activit
a basu for coercion, exploitation, or WConditions &t could mitigote and t h e n are clear indications h i t the
duress. security concerns include: (1) The problem is being resolved or is under
information was unsubstantiated or not contml:
5 147.7 Guldellm E--PenonaI conduct pertinent to a determination of (5) The amuence resulted from a legal
(a) The concern. Conduct involving judgment. uustworthiness. or reliability: source:
questionable judgment. (21 The falsification was an isolated (6) The individual initiated a good-
untmstwonbiness, unreliability. lack of incident, was not recent. and the faith effort lo repay overdue ueditors or
candor. dishonesty, or unwlli&ness to indindual h a subsequently provided otherwise resolve debts.
comolv with ru!es and repulations could correct information voluntarily: 5 147.9 Guldellna GAlcohol
indi&ie that the person ;ay not (3) The individual made prompt. good consurnpllon.
properly safeguard classified faith effons lo correct the falsification
information. Tho following will before being confmnted with the facts: (a) The concern. Excessive alcohol
(4) Omission of material facts was consumption often leads to the exercise
normally result in an unfavorable
clearance action or administrative caused or significantly contributed to by of questionable judgment. unreliability.
termination of further processing for improper or inadequate advice ol failure to control impulses. and
clearance elitibilitv: au~horizedpersonnel. and the inmaserr the risk of unauthorized
(I)~efusal-toi d e r g o or cooperate previously omitted information was disclosure of cGsi fied information due
with required s e m t y pmcessing. promptly and fully rovided: to carelessness.
including m e l d and psychological ( 5 ) he iodivlduaf has taken positive (b) Conditions thot could mise o
. .
testin ; steps to significantly reduce or security concern and rnoy be
(2) bfusal to complete required eliminate vulnerability to coercion. disqualifying include: (1) Alcohol-
security forms. teleases, or provide full, ex loitation, or duress: related incidents away kom work. such
bank and uuthful answers to lawful
quenions of investigators. s-ty
k) A refusal to cooperate was based
on advice fmm legal counrel or other
as driving while under the influence.
fighting. child or spouse abuse. or other
officials or other re~resentativesin officials that the individual was not aiminal incidents related to alcohol
connection wilh a personnel security or required to comply with security use;
trustworthiness determination. recessing requirements and. upon ( 2 ) Alcohol-related incidents at work.
(b) Conditions lhot could mise o Eeing made aware of the cequirtment. such a rePo"% for work Or duty in an
securitvconcern ond mov be
disquoiifrng also includ;: (1) Reliable.
.
fullv and hylhfullv, omvided h e
req;ested information:
intoxicated or impaired condition. or
dnnLung on the job:
~ ~~
-. --- omvided bv
unfavorable information . . Association with oenons involved
I71 (3) Diagnosis by a d e n t i a l e d
-2
~
sssodates, em loyers. coworkers. in criminal activities has ceased. medical prnfessional (e.g.. physician.
-
neighbors. end'other acquaintances;
*Wt!omaL mental md p.noluliv d h r d s n
ICuiblln. I1 Ln dnemuntq how io -lv. h a
I lr,,l Udllna
consldanUonr
clinical psychologist. or psychiatrist) of
alcohol abuse or alcohol dependence:
(4) Evaluation of alcohol abuse or
(a] The concern. An individual who is alcohol dependence by a licensed
m v con- m w d by -ud b h m o r . financially overextended is at risk of clinical social worker who is a staff
Federal RcgisterIVol. 63. No. ZOIFriday. January 30. 19981 Rules a n d Regulations 4577
racuritv resoonsibilities and could 121The condun was unintentional or of Executive Order 12968 (60 FR 40245.
&ate in^^ risk of unauthorized in;dvertent: 3 CFR 1995 Comp.. p. 3911 and other
disclosum
- .. of classified ~nformeboe I31 'Iha iotmdunton or rumoval of applicable statutes and Executive
(b) Condilrans that could mise a media was authorized: Orden.
secunty concern and may be ( 4 The mtsuse was an isolated event: f 147.22 Tran8tanblllty.
disoualifvinn includc any sem'ce. (51 The misuse war followed by a
w h ; l h e i ~ ~ ~ ~ e n r a lwlunreer.
ed. or prompt. good faith effort to corn& the investigations that satisfy the
requimmeots of a given standard and
employment with: (1) A breign country: situation. us m a t mwl the investiaative
(2) Any fomign national: mquimments for all levels & i f l e d for
(3) A reprsrantative of any foreign Subpart ~ - l ' ' ; ~ r n u g a ~Standards
ve
interen: 5147.18 *mohKlfon
the s t a n d u d . Thev shall be mutuallv
~..
',
(41 Any fomign. domestic, or and racipmcally &apted by all
The following investigative standardr agencies.
international organization or penon & estahli&ed for u d t e d slates
engaged in anelysis, di-ion, or G~~~~~~ e.,ilian and f 147.23 Emaka In sarvlca.
publication of material on intelligence, personnel, cowltants, contracron. I f e panon who requires access has
defense- fore@ a i r s , or Protected employsar of contracton. licensees. been retired or separated from U.S.
technology. cartificate holden or grantees and their government employment for less than
[cl Conditions that could mitigafc employsar snd other bdiv,duals two pan and is the subject of an
s m m t y concerns include: (1) rsquire e a e u to dsssified information. investigation that is otherwise current.
Evaluation of the outside employment to indude sensitiat ~~~~~~~~~d the agency regranting the access will, as
or activity indicates that it does not pose ~ d ~and s ~p h a lt i ~ ~ a minimum. ieview an updated
a conflict with an individual's security ara to be 4by Standard F o m 86 and applicable
responsibilities: ~rograms, &partmenu
government a n t agencies rocords. A reinvestigation is not
(2) The individual terminates the a invartigativa baris for hl required unless the review indicates the
employment or diSC0ntinue~the activity delermiaations. However.. penon may no longer satisfy the
upon being notified h a t it is in conflict standards of Executive Order 12968 (60
with his or her security responsibilities. ~~e~~,"~b~"y~~~hibits an FR 40245.3 1995 Comp.. p. 3911:
6 147.t5 Guldellne H l s u s a of investigative procedures in addition to (Attachment D to this subpart. Table 2).
intor&tlon whn&y - i s . these riquirements in order to resolve $147.24 The nilUOlIal agency chact
la) j-he ~ ~ any issue ~ identified in the~ c o m e of a ~ The National ~ Agency Check ~ is a p a n l i
rules. omcedures. d d e h e s . or beckgmund investigation or of all investigations and
mgulaiions pertai&g to information reinv.Ftigation reinvestigations. It consists of a review
technology systems may raise security 5 147.10 ~ hthrw . ol:
concerns about an individual's There am three standards (Attachment (a) Investigative and criminal history
lrustworthiness. willingness. and ability D to this subpart s-arizes when files of the FBI. including a technical
to properly protect classified systems. to ute each one]: fingerprint sea&
networks, an4 informahon. Information la) The investination and (bl OPM's SecuritylSuitahility
Technology Systems tnclude all related reinvestigation &dards for "L" access Investigations Index:
equipment used for the communication. authonntions and for access to [c) DoD's Defense Clearance and
tran&nission, processing. manipulation, confidential and s&t (including all Investigations Index:
and storage of classified or sensitive secret-level Special Accau Programs not [dl Such other national agencies 1e.g..
information. specifically approved for snh'anced CIA. INS) as appropriate to the
(bl Conditions that could mise a invertigative requirements by an official individual's background.
security concern and may be authorized to establish Special Access
disqualifing include: (1)Illegal or P r o w by section in 4.4 offiecutive
unauthorized enlry into any information Order 129581 160 FR 19825.3 CFR 1995
technology system: Camp.. p. 33;:' la) Appliabil+ Shndud A applies to
(2) Illegal or unauthorized (b) The investigation standard for"Q invatigatiaos and reinvestigationsroc
modilication. destruction. manioulation access authorizations and for a a e s s to (11 Acnrs to CONFIDENTIALand SECRET
or denial of access to informatiin topsecret (including top secret Special (includingall SECRET-levelSpecial Access
residing on an information technology Access Pmgramsl and Sensitive P m p m not specificallyappmved lor
system:
,- . eohanced investigative mqukrnents by an
~
(I] ~omplaionojFoms:Cornpledon of ssrvlas, bduding dLtchyle type. For five yean 6um the date of. ths p w i o u t
stan.odud Form 06. including applicable military mambas. aU semias within one investigation (sea Attachmant D to h i s
n l m e s m d sup@g d~cumentatioe bnnsh of ths m a d f o n a will be considered subpart, Tabla 21.
(2) Notion01~ g s n c Checky Completion of u one smploymsn~@w of (cl Reinvcnigntiw Requirements.
a NaUond A B . ad ~ ruignmenu RsinvarM8atiw W i r e m e n o us as follow^:
[J] FinondolRsvia*:VeriBcation ofthe (Q Rejcrwnca: Four mfsrancm. of whom at (11 Complefion ofForms:Completion of
sububjan's Baancial stants, including credit lean two us developed: to the extent Standard Form 88. including applicable
bmauchecks tovaring aU locationr where pnaiable. all should h w lodal knowledge releases and supporthg doarmantation.
Ihssubject b r a i d e d . bsan employed. or of thr s u b e and
~ coUdvely spur at l a s t I21 N u t i o d Agency C h & Completion of
attended school for six months or mom for the ln sewn ygn. a N a t i o d Agsw Check (fin~srprintcarb
theput~yeuz (91 FmnerSpouw: An inlvviav of any us mqulrsd only if them hu not bssn a
(41 LWE and P l m ojBkth: Cormbontion bn-r r p o w d i d within the last e n . prwiour valid technical cheek of Ih.FBI].
of &to m d p h of birth thmugh msdi of ygn. (31National Agency CheJrfIv the Spouse
appropriate documsnlltto~~ if not completed (101 Neighborhwdr: ConRrmtion of all or Cohabiant [ifapplimblel:Completion of
in m y p r s v i w investigation: a check of resideam Em the last lbrw ynn rhmugh a Nariand Agmzy Chadc without fingerprint
Bumu of V(111 Statistla rscordr when m y appropriate intarview. with ~ i g h b o nand cudr. 6Jr tha s p ~ oremhrbitanr Tha
dlcrspurc).h found a &L thmughrafxd¶ravlan. National Agency Check fru the spoute or
(5) -1 Ageny U~ec&:At a minimum. (111 financial Revia*: Verification of the cohabitant is not rrquired if a h d y
d l investigations will indude checka of law subject's Bo.nci status. including credit m m p l d in coniunction with a pmviour
e n f o m e n t agencies baving jurisdiction h u ch& covering all h a t i o n s where investigation or minvatigation
wbem the subject h u lived, w o r m . and/or subiscl has resided. bean employed. andlor (41EmploymenEVerilication of all
atended A w l within rho last five yun. attended schml for six months or mom for employments since the last investigation
and. if appliable. of Ih.appropriate agency the k t W e n m. Attempts to interview a Nfeaent number of
for any idenlirred arm st^. (12) &en! Agency Check:A check of rourcm (supervisors. mworLsrs. or both] at
(dl fipnding the hvatiPtion: The a pmpriate criminal hiStory records COvEring all amploymats of six months or mom. For
i n ~ t i g a t i o nm y be expmded if uscarwry QL -when. ~hs e n
lubiectbu midad. bssn smpl0Pd. andlor
-. the militarymenixn. au -ices w i t h i one
M d o d m if vrau h clearly consistent btanch of the armed b m s will be mnsidered
with the ~ U o Murity. d attended schml for six mash or mom. u on? wnploymnt @su of
including cumnt resideam cegaadless of' assignmenb.
,umcbmDIll B lo Subput B-Sturdud B- duration. 151Rejerences: Interviews with two
s i i Smpa Backpund Investigation N o k If no residence. employment, or chmctsr mfmnces who am knowledgeable
cssm education u c d six months. local agency of the subicn: at least one will be a .
(a1 Applicobility. Standard B applia to cbalcr should be parformsd as deemed developed mfimnas. To the extent practical.
initial investigationr for. appmpdate. both should have said knowlsdge of the
(11 Access to TOP S a R E T (including TOP (1J) publie R ~ ~ verification
~ ~ & : of subiect and coUectiwly span the en*
SELlRET Special A-s -1 and dim, m p t d e s& , coun @od of the rainmtigation As appmpriate.
Sensitive Compamnent Information: cow civil or criminal. involving additional i n h ~ a may n be conducted.
(2) "Q" a c m r authorintiollr the subiea. including with cohabitants and relatives.
(b] Investigariva Requirements. (14) SubiUCl h*~'a*: A Sllhject inlcWieW. Netfiborhood+: InbIvim rm,
lnvestigatlveruquirsments us u follow.: by mipad d t y , inmtigative. noi@hn i n the vicinity of Ihssubject's most
(11 Completion ojF~ormr:Completion of or counte,.inte~i8ence ~ uthe ~ recent g raidanas of six montbr or more.
Standad Form 86. lncludlng applicable i n d g a w o . addieoosl =hie i n e M m s Confinnation of currant residmcs qardless
mf- and supporcine documntation may be conducted to c o u a relevant of length.
(21Nationdlyency CheJcComptation of information. to resolve signifbut (7) Finoneid Review:--Financial Sktus:
a National Agency Check inconrwncies. or both. sworn statements Verificacation of the subject's Enancial status.
(3) National AgenqChedr for the Spouse and unrwomdeclarations be tabs including credit buraau checks covering all
or Cahabitont (ifapplimble): Completion of when- appropriate. l o ~ t i o n whore
s subject bar midad. been
a National Agency Check without finprprint (151 polygmph [onlyin agencies ~ i t h employed. andlor attended school for six
cards. for the spouse or cobabitanL oppmvcd prsonnel securitypolygmph months or more for the period covered by the
(41Dala ondPI00 o/Birth:Cormbbtation pmgm&:~n depamrients or agencies with reinvesti&stioo:
of dam and p l r a of b i thmugb a check of policies sanctioning the use of the (i) Cheek of T r e n s u ~Finonciol
s Ibto
approprim documentation: a check of for p a o m e l rearrity purposes. the Bare: Agencies may q u a s t the Department
Bureau of Vital Stalinia rscmdr when any invesw&n indude a polygraph of the Traasury. under terms and conditions
discrepancy h found Lo ex*L anminrtion. conducted by a qualified p-bed by t h e S c r a of ~ the Trsknrry.
(5) CiUze~hip:For individuals born polygraph enminer. a s a d automatad data basn consisting of
ouutde the United States. d c a t i o n of US (c) f i p n d i n g the I n n ~ i o t i o n Tbe
. mpoN of c~umncyUansacrions by 6UaUci.d
citizenship dLastly from the appropriate investigation may tm expanded LI nacesmy. iprtitutioar, intermtioml traorponation of
rrgktntion mthoritr. vsriiicrrian of US At appmpriam. htet-viws with anyone able currancy or monetary insmunonu. foreign
dtirsnship or 1-1 status of torpign-born 10 provide info-thn or u, resolve issues. bank a d financial accounts. and transactions
immediate family memban [spouse. including but not limited u,cohabitants. under 510.000 that am m p o d as possible
cohabitant, father,mother. urns. daughten. mlativa, &iahisu. psychologisu. other money laundering violalioru
brothers. dsterrl. medical omfossionals. and law enforcement (81 h l Agency Check: A check of
I61 Educntion:Cormboration of most recent a m f i a r i o h --, -v ba-- cnnductsd.
------ - appmpnate cnminal history records mvenng-
or.;ost si8niBEant aiilncitiona when. during the period
d.- or diplonu Inlsrviaws of appropriate An*cn1 to Subput B-S'urdard C- covered by l a mimestigation. the subject
educufonal SO- if education is a pn- Sm@ B*d&ro-d InvatigaGon has resided. bean employed. a d o r attended
activitv of the subiect durina the most recent P ~ ~ i n v ~ g (SSBIqRI. * ~ o a
tbm iem. '.
(71 k n p l o p e n c VeriEotioo of all
(a) Applicability. Standard C applies to
minvastigation for.
school for six months or mom. indudmg
c m n t residence ngudless of duration
(Note: If no msidence. employment. or
employments for the p u t ravsn yean: (1) Aocsn fa TOPSECRET(induding TOP education ax- six months. 1-1 agency
persona1 interviews of snurc~~ ( ~ p v i s o n . SEQIETSpciol Accms Rogmms) and checks should be performed as deemed
cowakon. or both1 b r a c h emolovmant of
SIX months or mom, cormbont*n &rough
knsitim Commrunented Informotion:
I t ) .'Q' am& authonnu&.
.. aoomoriate.l
(9) ~ o r m e r ~ ~ o uAn
r eintervmw
: w t h any
records or sources of all pano& of (bt When fo Remmcrgoce The former spouse unless the divorce look place
unsmptoyment exceeding sixty days: mmwstIgation m y be trutiated at any tune befom the data of the last mvasugauon or
verifiiagon of all prior federal and milituy lollowing completion of. but MI later than minvestigation.
Federal RegisterIVol. 63. No. 2 0 / F r i d a y . January 30. 1 9 9 8 f R u l e s a n d Regulations 4579
-
(101 h b l i c Records: Verification of minvcstigation. additional subject intewlews necessary. As appropriate, interviews wilh
divorces. banluptcics. and other corn may ba conducted to collect mlsvant anyone able In pmvlda inlomation or 10
whether cinl orcnrnml. involving infomat~on.to msolve significant ~ ~ o l issuw.
v e including but not limited to
,,,bid since tho data of iile laat incons~rtencies.or bath. Sworn statemeot~ cohabi~anu.mlativa. psychiaums.
and unsworn dsclantiohc may be taken p~ychologists.other madiul professionals.
invs.ugation. and law enforcement pmfess~onalrmay be
(111S u b l a Infernm: A subject interview whenever appmpnale.
wndUCted'
mnduaed by Intoed security, investigative. (dl Expanding h e Rr~nvcrc~gation: The
or countsnntelligenca personnel. During Ihe rrmvestigauon may be expanded as Atlacbent D to Subput ? h i s i o n Tabla
... A
Out 01 dam NACLC or
SSBI.
Conl. Sec; T
.. SSBl ................ B
M a c
Out of date SSBl
TS. SCI: -0' ...----...--. SSBI-PR C
S u b p a n C-Guidelines lor Temporary adjudication process. The temporary 6 147.31 Tomooraw allaiblllfv far access at
Access ihe top secret ieve~s'ani~emp'orary
elig~bilitywill be valid until completion
of the invesugauon and adjudicauon: ellglblllty lor "Q" a c c e u aulhorlnllon: For
5 147.28 Introduction. someone who Is the wblect of a lavorabla
however. the agency granting it may lnvestlgauon not meeting the Investlgatlve
The following minimum investigative revoke it at any time based o n Standards lor accaas at those bvelz
standards. implementing section 3.3 of unfavorable information identified in
Execuuve Order 12966. Access to hs a minimumctuch temporary
the course of the investigation. eligibility requires completion of the
Classified Information. am established
for all United States Government and 9 147.30 Temporary allglblllty lor access a1 applicableForm
Standard 66. including any
supponing documentation.
military personnel. consullanu. ma ConlldsnUal and wcrat levels and
contractors. subconuactors. employees temporary ellglblllty lor "L" a c w s s favorable review of the form by the
of conmctors. licenseas. cenificate authorlntlon. appropriate adjudicating authority. a n d
holders or grantees and their employees exoedited submission of a request for a
and other individuals who require As a minimum. such temporary Siigle Scope Background Investigation
access to classified information before eligibility requtres completion of Ihe [sserl.
the appmpriate investigation can be Standard Form 86, including any
( 147 32 Temporary ellglblllty lor access at
completed and a final determination applicable supponing docurnentatian. me top ~ c r eand l SCI levels and temporary
made. favorable review of the form by the ellqlblll~~ lor "Q" access authortwUon: For
appropriate adjudicating authority, and sohaon3 who Is not Ihe sublect 01 a
1I4739 Temporary allglblltly for a c c a u submission of a request for a n expedited currant. lavorabla pwtonnaior personnel-
Based on a iustified need meetinc the National Aasncv Cbeck with Local secu111y Investlgallon ol any klnd.
mquimnenu'of section 3.3 of ~ x e & t i v e Agency ~ h k ' a n dCredit (NACLCI. As a minimum, such temporary
Order 12968. temporary eligibility for eligibility requires completion of the
a c a s may be granted before Standard Form 86, including any
investigations are complere and applicable supporting documentation.
favorably adjudicated. when, official favorable review of the form by the
h c t i o l r s must be performed prior to appropriate adjudicating authority.
completion of the invesugauon and immediate submission o f a request for
4580 Federal Re&ter/Vol. 63. No. ZOIFriday. January 30. 1 9 9 8 / R u l e s a n d Regulations
5 1 4 7 . ~Addltlonal mqulmmenu by
agancles
Tempoary eligibility for access must
satisfy these minimum investigative
standards. but agency heads may
establish additional requirements based
on the sensitrvity of the particular.
identified cateaories of classified
information necessary to perform the
lawful and authorized functions that are
the basis for granting temporary
eligibility for access. However. no
additional requirements shall exceed
the common standards for background
investigations developed under section
3.Zb)of Executive Order 12968.
Temporary eligibility for access is valid
only at the agency granting it and at
other agencies who expressly agree to
accept it and acknowledee
u n d k a n d i n g of its inv&trgative bass.
It is further subiect to limitations
specified in seckons 2.4(d) and 3.3 of
.becutive Order 12968. Access to
Classified Informotion.
Dated: January22.1998.
LM. Bynum.
-
Altemole OSD Federnl Repster Lialron
Oflcer. Oepanment of Defense.
[FRDoc. 98-1955 Filed 1-29-98: 8:15 am1
BILLING W O E
Appendix C
UNCLASSIFIED
Director of Central Intelligence Directive
Type : 6 Number: 4
Subject: PERSONNEL SECURITY STANDARDS
Category: 6 - Security
Effective Date: 07/02/98
DCID 1/14 was renumbered 6/4 by the Director of Central Intelligence (DCI) and
the Deputy Director of Central Intelligence for Community Management on 13 Oct
99, to more closely align the X I D with the new category structure as defined in
DCID 111. This action was accomplished in conjunction with the DCI approving
the newly created Annex F, "Reciprocity of SCI Eligibility Determinations".
Unclassified
13. Implementation.
Existing directives, regnlations, agreements, and other guidance
governing access to SCI as defined herein will be revised
accordingly.
2 Julv 1998
Director of Central Intelligence Date
Unclassified
DCID 6/4
ANNEX A
'
~nvestigative Standards for Background Investigations for Access
to Classified Information
1. Introduction.
The following investigative standards are established for all
United States Government civilian and military personnel,
consultants, contractors, employees of contractors, licensees,
certificate holders or grantees and their employees and other
individuals who require access to classified information, to
include Sensitive Compartmented Information (SCI) and Special
Access Programs (SAPS), and are to be used by government
departments and agencies as the investigative basis for final
clearance determinations. However, nothing in these standards
prohibits an agency from using any lqwful investigative procedures
in addition to these requirements in order to resolve any issue
identified in the course of a background investigation or
reinvestigation.
2. The Three Standards.
There are three standards (Table 1 in the Appendix summarizes when
to use each one) :
a. The investigation and reinvestigation standards for "L"
access authorizations and for access to CONFIDENTIAL and SECRET
(including all SECRET-level SAPs not specifically approved for
enhanced investigative requirements by an official authorized to
establish SAPs by sect. 4.4 of Executive Order 12958);
b. The investigation standard for "Q" access authorizations
and for access to TOP SECRET (including TOP SECRET SAPS) and SCI;
and
c. The reinvestigation standard for continued access to the
levels listed in para. 2 (b).
3. Exception to Periods of Coverage.
Some elements of standards specify a period of coverage (e.g.,
seven years). Where appropriate, such coverage may be shortened
to the period from the Subject's eighteenth birthday to the
present or to two years, whichever is longer.
'The content of this Annex is taken verbatim from the Presidentially approved
Investigative Standards and Temporary Eligibility Standards and should be read
in the context of access eligibility to SCI, although the actual wording
addresses a broader application to clearance actions.
10
Unclassified
4. Expanding Investigations.
Investigations and reinvestigations may be expanded under the
provisions of Executive Order 12968 and other applicable statutes
and Executive Orders.
STANDARD A
National Agency Check with Local Agency Checks and Credit Check
(NACLC)
8. Applicability.
Standard A applies to investigations and reinvestigations for:
a. Access to CONFIDENTIAL and SECRET (including all SECRET-
level SAPs not specifically approved for enhanced investigative
requirements by an official authorized to establish SAPs by sect.
4.4 of Executive Order 12958), and
b. "L" access authorizations
Unclassified
STANDARD B
Single Scope Background Investigation (SSBI)
12. Applicability.
13. ~nvestigativeRequirements.
Investigative requirements are as follows:
a. Completion of Forms: completion of Standard Form 86,
including applicable releases and supporting documentation.
b. National Agency Check: completion of a National Agency
Check.
c. National Agency Check for the Spouse or Cohabitant (if
applicable): completion of a National Agency Check, without
fingerprint cards, for tke spouse or cohabitant.
d. Date and Place of Birth: corroboration of date and
place of birth through a check of appropriate documentation; a
check of Bureau of Vital Statistics records when any discrepancy
is found to exist.
e. Citizenship: for individuals born outside the United
States, verification of US citizenship directly from the
appropriate registration authority; verification of US citizenship
or legal status of foreign-born immediate faniily members (spouse,
cohabitant, father, mother, sons, daughters, brothers, sisters).
f. Education: cdrroboration of most recent or most
significant claimed attendance, degree, or diploma. Interviews of
appropriate educational sources if education is a primary activity
of the Subject during the most recent three years.
g. Employment: verification of all employments for the
past seven years; pereonal interviews of sources (supervisors,
coworkers, or both) for each employment of six months or more;
corroboration through records or sources of all periods of
unemployment exceeding sixty days; verification of all prior
federal and military service, including discharge type. For
military members, all service within one branch of the armed
forces will be considered as one employment, regardless of
assignments.
h. References: four references, of whom at least two are
developed; to the extent practicable, all should have social
knowledge of the Subject and collectively span at least the last
seven years.
i. Former Spouse: an interview of any former spouse
divorced within the last ten years.
j. Neighborhoods: confirmation of all residences for the
last three years through appropriate interviews with neighbors and
through records reviews.
Unclassified
STANDARD C
Single-Scope Background Investigation-Periodic Reinvestigation
(SSBI-PR)
15. Applicability.
DCID 6/4
Appendix
Decision Tables
TABLE 1: WHICH INVESTIGATION TO REQUEST
If the And the pezson Based on this Then the in- Using
requirement has this investigation vestigation standard
is for access required is
CONFIDENTIAL none none NACLC A
SECRET; 'L" out of date NACLC
or SSBI
CONF,SEC;"L'
TOP none none SSBI B
I SECRET.
QSI;
--- "Q" I none; CONF,
SEC: "La
current or out of
date NACLC
out of date SSBI
I --
TS, SCI; "Q" SSBI-PR C
..
0-23 24 months
months or more
CONFIDENTIAL 0 to 14 none NACLC
yrs. 11 (NOTE 1)
nos.
15 yrs. Or NACLC
more
SECRET; 'L" 0 to 9 yrs. none
11 (NOTE 1)
nos.
10 yrs. Or NACLC
more
I TOP SECRET,
SCI;
0 to 4 yrs.
11
aos .
none
(NOTE 1)
SSBI
5 yrs. Or SSBI-PR
1. Introduction.
The following minimum investigative standards, implementing
section 3.3 of Executive Order 12968, "Access to Classified
Information", are established for all United States Government and
military personnel, consultants, contractors, subcontractors,
employees of contractors, licensees, certificate holders or
grantees and their employees and other individuals who require
access to classified information before the appropriate
investigation can be completed and a final determination made.
2. Temporary Eligibility for Access.
Based on a justified need meeting the requirements of section 3.3
of Executive Order 12968, temporary eligibility for access may be
granted before investigations are complete and favorably
adjudicated, where official functions must be performed prior to
completion of the investigation and adjudication process. The
temporary eligibility will be valid until completion of the
investigation and adjudication; however, the agency granting it
may revoke it at any time based on unfavorable information
identified in the course of the investigation.
3. Temporary Eligibility for Access at the CONFIDENTIAL and
SECRET Levels and Temporary Eligibility for "LW Access
Authorization.
As a minimum, such temporary eligibility requires completion of
the Standard Form 86, including any applic~~blesupporting
documentation, favorable review of the form by the appropriate
adjudicating authority, and submission of a request for an
expedited National Agency Check with Local Agency Checks and
Credit (NACLC).
4. Temporary Eligibility for Access at the TOP SECRET and SCI
Levels and Temporary Eligibility for " Q W Access ~uthorization: For
Someone who is the Subject of a Favorable Investigation not
Meeting the Investigative Standards for Access at those Levels.
As a minimum, such temporary eligibility requires completion of
the Standard Form 86, including any applicable supporting
documentation, favorable review of the form by the appropriate
adjudicating authority, and expedited submission of a request for
a Single Scope Background Investigation (SSBI).
Unclassified
DCID 6/4
1. Guidelines.
In accordance with the requirements of DCID 6/4 , this document
sets out guidelines to maintain quality standards for the Single
Scope Background Investigation (SSBI). These guidelines assume
the adjudicator's perspective because the adjudicator is the
ultimate customer for the SSBI. The guidelines are divided into:
Definition of Quality
DCID 614
ANNEX C'
Guideline A
Allegiance to the United States
3. The Concern.
An individual must be of unquestioned allegiance to the United
States. The willingness to safeguard classified information is in
doubt if there is any reason to suspect an individual's allegiance
to the United States.
4. Conditions that could raise a security concern and may be
disqualifying include:
a. Involvement in any act of sabotage, espionage, treason,
terrorism, sedition, or other act whose aim is to overthrow the
Government of the United States or alter the form of government by
unconstitutional means;
b. Association or sympathy with persons who are attempting
to commit, or who are committing, any of the above acts;
Unclassified
GUIDELINE B
Foreign Influence
6. The Concern.
A security risk may exist when an individual's immediate family,
including cohabitants ard other persons to whom he or she may be
bound by affection, influence, or obligation are not citizens of
the United States or may be subject to duress. These situations
could create the potential for foreign influence that could result
in the compromise of classified information. Contacts with
citizens of other countries or financial interests in other
countries are also relevant to security determinations if they
make an individual potertially vulnerable to coercion,
exploitation, or pressure.
7. Conditions that could raise a security concern and may be
disqualifying include:
a. An immediate family member, or a person to whom the
individual has close ties of affection or obligation, is a citizen
of, or resident or present in, a foreign country;
b. Sharing living quarters with a person or persons,
regardless of their citizenship status, if the potential for
adverse foreign influence or duress exists;
Unclassified
GUIDELINE C
Foreign Preference
9. The Concern.
When an individual acts in such a way as to indicate a preference
for a foreign country over the United States, then he or she may
be prone to provide information or make decisions that are harmful
to the interests of the United States.
Unclassified
GUIDELINE D
Sexual Behavior
12. The Concern.
Sexual behavior is a security concern if it involves a criminal
offense, indicates a personality or emotional disorder, may
Unclassified
GUIDELINE E
Personal Conduct
' The adjudicator should also consider guidelines pertaining to criminal conduct
(Guideline J ) and emotional, mental, and personality disorders (Guideline I) in
determining how to resolve the security concerns raised by sexual behavior.
Unclassified
GUIDELINE F
Financial Considerations
18. The Concern.
An indi-vidualwho is financially overextended is at risk 'of having
to engage in illegal acts to generate funds. Unexplained
affluence is often linked to proceeds from financially profitable
criminal acts.
19. Conditions that could raise a security concern and may be
disqualifying include:
a. A history of not meeting financial obligations;
b. Deceptive or illegal financial practices such as
embezzlement, employee theft, check fraud, income tax evasion,
expense account fraud, filing deceptive loan statements, and other
intentional financial breaches of trust;
c. Inability or unwillingness to satisfy debts;
d. Unexplained affluence;
e. Financial problems that are linked to gambling, drug
abuse, alcoholism, or other issues of security concern.
20. Conditions that could mitigate security concerns include:
a. The behavior was not recent;
b. It was an isolated incident;
c. The conditions that resulted in the behavior were
Unclassified
GUIDELINE G
Alcohol Consumption
GUIDELINE H
Drug Involv,ement
GUIDELINE I
Emotional, Mental, and Personality Disorders
27. The Concern.
Emotional, mental, and personality disorders can cause a
significant deficit in an individual's psychological, social and
occupational functioning. These disorders are of security concern
because they may indicate a defect in judgment, reliability, or
stability. A credentialed mental health professional (e.g.,
clinical psychologist or psychiatrist), employed by, acceptable to
or approved by the U.S. Government, should be utilized in
evaluating potentially disqualifying and mitigating information
fully and properly, and particularly for consultation with the
individual's mental health care provider.
28. Conditions that could raise a security concern and may be
disqualifying include:
a. An opinion by a credentialed mental health professional
that the individual has a condition or treatment that may indicate
a defect in judgment, reliability, or stability;
b. Information that suggests that an individual has failed
to follow appropriate medical advice relating to treatment of a
condition, e.g., failure to take prescribed medication;
Unclassified
GUIDELINE J
Criminal Conduct
GUIDELINE K
Security Violations
GUIDELINE L
Outside Activities
GUIDELINE M
Misuse of Information Technology Systems
3 9. The Concern.
Noncompliance with rules, procedures, guidelines, or regulations
pertaining to information technology systems may raise security
concerns about an individual's trustworthiness, willingness, and
ability to properly protect classified systems, networks, and
information. Informatiqn Technology Systems include all related
equipment used for the communication, transmission, processing,
manipulation, and storage of classified or sensitive information.
40. Conditions that could raise a security concern and may be
disqualifying include:
a. Illegal or unauthorized entry into any information
technology system;
b. Illegal or unauthorized modification, destruction,
manipulation or denial of access to information residing on an
information technology system;
c. Removal (or use) of hardware, software, or media from
any information technology system without authorization, when
specifically prohibited by rules, procedures, guidelines or
regulations;
d. Introduction of hardware, software, or media into any
information technology system without authorization, when
specifically prohibited by rules, procedures, guidelines or
regulations.
41. Conditions that could mitigate security concerns include:
a. The misuse was not recent or significant;
b. The conduct was unintentional or inadvertent;
Unclassified
DCID 6/4
ANNEX D
Appeals Pro : Denial or Revocation of Access
1. Policy.
This annex establishes common appeals procedures for the denial or
revocation of access to sensitive compartmented information (SCI)
by entities of the Intelligence Community after adjudication
pursuant to the provisions of DCID 6/4. This annex is promulgated
pursuant to Executive Order 12333, Executive Order 12968, and the
National Security Act of 1947, as amended. For the purposes of
this annex, all references to DCID 6/4 include the basic document
and all of its annexes. Any individual who has been considered
for initial or continued access to SCI pursuant to the provisions
of DCID 6/4 shall, to the extent provided below, be afforded an
opportunity to appeal the denial or revocation of such access.
This annex supersedes any and all other practices and procedures
for the appeal of the denial or revocation of SCI access. This
annex will not be construed to require the disclosure of
classified information or information concerning intelligence
sources and methods, nor will it be construed to afford an
opportunity to appeal before the actual denial or revocation of
SCI access. In addition, the provisions of DCID 6/4, or any other
document or provision of law, will not be construed to create a
liberty or property interest of any kind in the access of any
individual to SCI.
2. Applicability.
This annex applies to all US Government civilian and military
personnel, as well as any other individuals, including contractors
and employees of contractors, who are considered for initial or
continued access to SCI. This annex does not apply to decisions
regarding employment and will not be construed to affect or impair
public Law 88-290 or the authority of any entity to effect
applicant or personnel actions pursuant to Public Law 88-290,
Public Law 86-36, or other applicable law.
3. SCI Access Determination Authority.
4. Procedures.
a. ~ndividualswill be:
DCID 6/4
ANNEX E
Standards for SCI Security Awareness
Programs in the US Intelligence Community
Consistent with controls and procedures set forth in DCID 1/19,
"Security Policy for Sensitive Compartmented Information," and its
supplement, "DCID 1/19 Security Policy Manual," standards are
hereby established for the SCI security education programs
designed to enhance the security awareness of the US Government
civilian and military personnel and private contractors working in
the US Intelligence Community. Compliance with these standards is
required for all departments/agencies within the Intelligence
Community. Existing security awareness programs will be modified
to conform with these standards. Departments/agencies will
establish a documented program to ensure that training has been
presented to all personnel.
All individuals nominated for or holding -SCI access approval will
be notified initially and annually thereafter of their
responsibility to report to their'cognizant security officers any
activities or conduct such as described in Annex C that could
conflict with their ajility to protect classified information from ,
3. Debriefing .
When a department/agency has determined that access to SCI is no
longer required, final instructions and guidelines will be
provided to the individual. At a minimum these shall include:
a. A requirement that the individual read appropriate
sections of Titles 18 and 50, U.S.C., and that the intent and
criminal sanctions of these laws relative to espionage and
unauthorized disclosure be clarified.
b. Th@ continuing obligation, under the prepublication and
other provisions of the nondisclosure agreement for SCI, never to
divulge; publish; or reveal by writing, word, conduct, or
otherwise, to any unauthorized persons any SCI, withouz the
written consent of appropriate department/agency officials.
c. A n acknowledgment that the,individual will report
without delay to the Federal Bureau of Investigation, or the
department/agency, any attempt by an unauthorized person to
solicit national security information.
d. A declaration that the individual no longer 2ossesses
any docuients or material containing SCI.
e. A reminder of 'the risks associated with foreign travel
and foreign association.
Unclassified
DCID 6 / 4
ANNEX F'
1. Reciprocity Policy.
'Annex F was signed by the DCI on 13 O c t 99. At that time, the number of DCID
1/14 was changed t o 6 / 4 to corr'espond to an appropriate section in DCID 1/1
50
Unclassified
32. The Agpeal Board shall address the material issues raised
by the parties to determine whether hamfui error occurred. Its
scope of review shall be to determine whether or not:
Jan 2, 92
5220.6 (Encl 3)
In an effort to exped'ite the hearing in DOHA industrial security clearance cases, the following
guidance is being sent to Applicants and their respective attomes or Personal Representatives, and
Department Counsel (the parties) to assist them in preparing for the hearing. This guidance is not
exhaustive, and the parties should also refkr to Department of Defense Directive 5220:6 for guidance
on hearing matters. In the event of e y conflict between this guidance and the provisions of DoD
Directive 5220.6,~the provisions of the Directive control.
1. The hearing is an adversarial proceeding in which the parties have the responsibility to
present their respective cases. The Government is normally represented by an attorney known as a
Department Counsel. . The Applicant has the optionof appearing by himself or herself without an
attorney, or being represented by an attorney selected and paid for by the Applicant, or by being
represented by a Personal Representative such as a friend, family member, or union representative.
4. A party requesting a continuance of a scheduled hearing date must make a timely showing
of good cmlse, in writing, for any such continuance. Among the factors to be considered are the
'The Directorate for ~ndu&al Security Clearance Review (DISCR) was redesignated as the Defense Office of
Hearings and Appeals (DOHA), efcectiveMay 20,1994.
ZThe January 2,1992 edition of the Directive has been amended on three occasions: Change 1 became effective
on November 22,1993; Change 2 became effective on May 20,1994;and Change 3 became effective on February 16,1996.
requester's diligence in readying his or her case prior to the date set for the hearing, and
inconvenience to the opposing party, witnesses, and the Administrative Judge. Failure of an
Applicant to appear for the scheduled'hearingor to comply with an order of the Administrative Judge
may result in the case being returned to the Director, DOHA for discontinuance of processing and
revocation of any security clearance the Applicant currently possesses.
5. Neither party should attempt to fbmish any information relating to the case without giving
the other party the opportunity to be present. Such actions constitute what are known as prohibited
ex parte communications. Also, copies of any proposed exhibits must not be submitted to the
Administrative Judge prior to the hearing. Any documents to be offered as evidence should be
presented at the hearing itself during the presentation of that party's case. In some instances, when
an Applicant has appended documents to the response to the Statement of Reasons, the documents
have been returned with an explanation that such materials are inappropriate to a pleading and that
they should be resubmitted as proposed exhibits during the hearing. If such action has occurred, an
Applicant should inform the Administrative Judge during the hearing, and be prepared to again offer
the material previously rejected.
7. The parties have a wide degree of discretion in deciding what order to present the evidence
in their respective cases. The Federal Rules of Evidence are used as a guide.
8. The parties should not mark any proposed exhibits. At the hearing, the Administrative
Judge will mark the &%its. Exhiiits offered as evidence, but not admitted as such, will be retained
by the Administrative Judge. As a general rule, photocopies of documents may be offered in lieu of
the original, provided that the copies are legible. In the case of public records or business records,
it is not required that the copies being offered be certified copies. However, nothing in this paragraph
relieves a party fiom the responsiiility of laying a proper foundation for a document when necessary.
It is generally good practice to make d c i e n t photocopies of each proposed exhibit so that separate
complete copies can be offered to the Administrative Judge and the opposing party. Preparation of
such additional copies should take place before the scheduled hearing date, because there may not
be any photocopying facilities available at the hearing location.
'~nopeningstatement is not kidence. It is merely a summary of the theory of the case and a brief explanation as
to the nature of the e@ testimony of witnesses and the nature of documents, which serves to provide the Administrative
Judge with some general idea of the case to be better able to understand the evidence.
9. Witnesses will be sequestered (kept out of the hearing room while other witnesses are
testifjring) during the hearing, with the exception of the Applicant and any expert witnesses. The
parties may have the assistance of any expert witness, selected and paid for by the party wishing to
call the witness, during the course of the hearing.
10. The Administrative Judge does not swear in Applicants or other witnesses who testify.
Instead the Administrative Judge will direct their attention to, and advise them that Section 1001 of
T i 18 of the United States Code applies to the proceedings. Section 1001 of Title 18 of the United
States Code makes it a criminaloffense, punishable by a maximum of 5 years in prison and a $10,000
fine,or both, to knowingly and wiUUy make a Use or misleadimg statement or representation to any
department or agency of the United States.
11. All witnesses are subject to cross-examination, or questioning, by the other party. The
scope of crossexamination is not limited to the scope of the witness's direct examination. However,
any r;ros-examination must cover issues that are material and relevant to the issues in the case or the
witness's credibility. As a general rule, the parties will be allowed an opportunity to conduct one
redirect examination and one recross-examination of a witness. The Administrative Judge may, in
his or her discretion, question any witness. .
12. Each party has the right to raise appropriate objections to any evidence, or portion
thereof, being offered by the other party. Objections must be made in a timely fashion. Failure to
raise an objection, at the time the objectionable evidence or testimony is offered, will be construed
as acquiescence. When raising an objection, the objecting party should address the objection to the
Admhktrative Judge, stating the basis for the objection4 The non-objecting party will be given an
opportunity to respond to the objection, if he or she wishes. The Administrative Judge will rule on
any objection raised. In the event an objection is overruled, the objecting party has an automatic
exception to the Administrative Judge's ruling.
13. After completion of the presentation of evidence by the parties, they will have an
opportunity to make closing argument^.^ Department Counsel will go first. Applicant follows, with
Department Counsel having a right to rebuttal. Applicant does not have a right to respond to
Department Counsel's rebuttal argument.
14. A court reporter will be present to make an official transcript of the hearing. The court
reporter will send the original transcript to the Administrative Judge, and a copy of the transcript, free
.
of charge, to the Applicant or Applicant's attorney, as appropriate.
'An Applicant, not represented by an attorney, need only state the objection as clearly as he or she can, in plain
ELI&& "Legalesenis not necessary.
'A closing statanent is not tvidence. It is merely a review of the sigruficant evidence and commentary regarding
the applicability or urn-applicability,aSappropriate, of adjudication policy factors, both disqualifying and mitigating, as set
forth in the Directive, which serves to provide the Administrative Judge with a better or "guided"understanding of the
evidence.
15. The Administrative Judge will not announce his or her decision to the parties at the end
of the hearing. A copy of the Administrative Judge's w-ritten decision will be sent to the by
letter explaining the provisions for appeal.
16. The Administrative Judge has the discretion to vary the provisions of this guidance upon
a showing of good cause, or whenever necessary to provide for the fair and efficient administration
of the proceeding under the Directive.
Robert R. Gales
Chief Administrative Judge
Appendix F
In re: 1
1
1
SSN: I . . . ) ISCR Case No.
1
Applicant for Security Clearance 1'.
1
A review of your eligibility for security clearance has been made pursuant to
Executive Order 10865, as amended, and as implemented by DoD Directive 5220.6,
dated January 2, 1992, and this office is unable to find that it is clearly consistent
with the national interest to grant you access to any classified information and
recommends that your case be submitted to an Administrative Judge for a
determination whether to deny or revoke your security clearance. This
recommendation is based on the following reasons:
Robert Kames
Personnel ~ecurit)iSpecialist
DEFENSE LEGAL SERVICES AGENCY
DEFENSE OFFICE OF HEARINGS AND APPEALS
In re: 1
1
1 ISCR Case No.
1
Applicant 1
COUNTY OF 1
1
STATE OF 1
Notary Pub1 ic
My Commission Expires:
DEFENSE LEGAL SERVICES AGENCY
DEFENSE OFFICE OF HEARINGS AND APPEALS
In re: )
)
1 ISCR Case No.
1
Applicant 1
COUNTY OF 1
STATE OF 1
Notary Public
My Commission Expires:
Appendix G
Sec.
no.1 Purpose.
710.2 SCOW.
n0.3 Reference.
no.4 POUCY.
nos D~~IWOIU.
Poesible unpact of the loss of the in&- ( g ) In the event the Hearing Officeps
vidual's access authorization upon the? ,pinion Is adverse to the individual,
DOE p r o m shaJl noc be conaidered u d the individual does not flle a re-
by the Bearing Ottlcer. auest for fhmher ravfew p w u a u t to
(c) The Hearing Omcer shall make in0.28. a copy of the adanlabtrauve
spec in^ flndLngs baaed upon the record %cord shall be provfded to the Dtrec-
as to the valldity of each of the allega- tor. Office of Secarity bfltalrs. who
Kons contained ln t&e notiflcatlon let- shall make a fLnal determination on
ter and the significance which the the basis of the IIWerfal contained In
Hearing Omcer attaches to such valid the admfnistrattve record
allegations. These flndings shall be 571028 Acdon o n the Hearing
supponed fully by a statement of rea- ceis opinion.
sons whlch constitute the 'basis for
such findings. (a) The Omce of Securlty hUairs or
(dl The Hearing Officer's opinion the lndividual Involved may ffle a re-
shall be predicated upon the Hearfng quest for revlew of the Hearing Om-
s fact. It. after con- cer's opinion issued under 8710.27 wlth-
Officer's ~ d l n g of
siderlng all the factors In light of the Ln 30 calendar days of receipt of the
criterfa set forth i n thls subpart. the opinion. Any such mxuest shall be flied
Hearing Officer is of the optnton that it with the Dlrecto3. OfLlce of He-gs
will noc endanger the common defense and Appeals. and served on the other
and securftjt and w l l l be clearly con- Party.
sistent with the national interest to ing (b) Within l!j calendar days after fll-
grant or continue access aathorfiatlon a request for review under this sec-
to the indtvidual. tke Reat?ng OfLlcer tlon. a
the parcy seeklng revfew shall ffle
statement identifying the issues on
shall render a favorable opinion: other- whfch i t wishes the Director. Ofnce of
wise, the H e w Omcer shall render Reaclngs and Appeals. to focus. A copy
an adverse opinloa of such statement shall be served on
(e) The Ofnce of Heazfnqs and A p the other party. who may ffle a re-
peals shall h u e the opinion of the sponse within 20 days of receipt of the
Hear!!g Ottlcer withtn 30 calendar dam statement.
of the receipt of the hearfng transcrlpc (c) The Director. Office of Heartags
by the Bearlug Officer. or the closing and Appeals. may inttiate an lnvestiga-
of the record. whfchever is later, unless tion of any statement contained in the
an extension is meed by the Dlrec- request for review and utilize any rel-
tor. OfIlce of Hearings a d Appeals. evant facts obtained by such tnvestiga-
Copies of the Hearing Offlcer's oplnion tion ln conducclng the revlew of the
will be 3rovlded to the OEce of Secu- Hearlng Officer's oglnion. The Dlrec-
rity .W.the Manager. the individ- tor. Ofnce of E e M and Appeals.
ual concerned and his counsel or other may solicit and accept submissions
representatives. DOE Counsel. and any from either the individual or the Offfcp:
other part;r identifled by the Hearlng of Sece.ty .lEairs. that are relevant
OfUcer. A t that time. the individual to the revlew. The Dlrector. Ofnce of
shall also be notltIed of his Aght to re- Hearlngs and Appeals. may establish
quest fluzher revlew of hb case gursu- appropriate time frames to allow for
ant to 47l0.28. such responses. Ln reolewlng the Hear-
(0In the event the Rearlzg Offlcer's lng Officer's opinfon. the Dlrector. Of-
opinion 1s favorable to the lndtvidual. a ffce of Hearings and Appeals. may con-
copy of the adznblstrative record in sider any other source of lnfonnation
the case shall also be provided to the that will advance the evaluation. pro-
Offlce of Security .%ffaLrs. The Direc- vided that both parties are afforded an
tor. Offlce of Sacu?ty -Waks will de- oppomunlty to respond to all third per-
terzllne whether: son submissions. All information ob-
(1)To gant or relustate the Lndtvtd- tained under thls section shall be made
ual's access authorization. or part of the administrative record.
(2) To refer the case to the Director, (dl Withln 45 days of the closing of
Omce of Hearings and Appeals. for fur- the record. the Dlrector. Omce of Hear-
ther review. ings and .kppeals. shall make speciflc
gepartrnent of Energy
mdings disposing of each substantial rector. Omce of Hearings and .\ppeals.
issue identined in a written statement Copies of the correspondence shall also
support of t h e request for review and be provided to t h e Dlrector. Omce 02
the wrltten response submltted by ei- Hearings and Appeals. t h e Manager.
ther the Individual or the Offlce of Se- DOE Counsel. and a n y o t h e r party. In
curfty Affatff. and shall predicate Us t h e event of an adverse d e t e ~ t i o n .
opinion on the administrative record. the correspondence shall Lndicace the
lncludlng any new evldence t h a t may findlngs by the Dlrector. Ofnce of Se-
b v e been submitted pursuant to curlty .Wa.lrs. with respect to each al-
gn0.29.I% after considering all the fac- legation contatned In t h e notiflcatlon
tors in light of t h e crlteria s e t forth in le tcer.
tbts subpart. t h e Director. Offlce of
Hearings.and Appeals. is of the opinion 9 7 1 0 3 New evidence.
that it will n o t endanger the common (a) In the event of t h e discovery of
defense and security and wl11 be clearly new evidence relevant t o the allega-
consistent with t h e national interest tions contained in t h e notification let-
to grant or contlnue access authoriza- t e r prlor to Qnal determination of the
tion to the individual. the Director. Of- indtvldual's eligibility for access au-
Uce of Hearings and Appeals. shall thorization. s u ~ h ' e ~ a d e n cshall
e be sub-
render an opinton favorable to the indf- mttted by the offering p a r t y t o t h e Dl-
vidual: otherwise. the Dlrector. Dfflce rector. Offlce of Safeguards and Secu-
of Hearings and Appeals. shall render rity. DOE Counsel shall notify t h e indi-
an opinion adverse to the individual. vidual of a n y new evldence submitted
The m i t t e n opinion of the Dlrector. by DOE.
OfCce of HearUxs a n d Appeals, shall be (b)The Dlrector. Offlce of Safeguards
prodded to the Director. Omce of Se- and Security, shall:
curity .Affairs. accompanfed by the ad- (I) Refer the m a t t e r t o the Eearlnq
mlntscratlve record i n the case. The Dl- Otflcer appointed i n t h e indlvtdual's
rector. Offlce of Eearlngs and Appeals. case if the Hear?ng Offlcer h a s - n o t yec
shall notify t h e individual of the fore- issued a n opinion. The Eeartng Oftlcer
going action. gecttnq the application for the presen-
(e) Within 30 calendar days of receipt tacion of new evidence shall decennine
of-the opinton of the Dlrector. O n c e of the appropriate form !n which a n y new
@ear?ngsand Appeals. the Director, Of- evrdence. and che ocher party's re-
fice of Sacunty .Affairs. will make the sponse. shall be received. e.g.. by testl-
flnal determination. based on a com- rnony beiore tbe H e a d n g Offfcer, by
piece redew of t h e record. whether ac- deposition or by aflldavit.
cess authorization shall be granted or (2) Ln those cases where the Hearing
dented. or reinstaced or revoked. If. Ofncer's opinion has been issued. the
after considering all of the factors in application for gresentatlon of new evi-
llght of the criteria set forth In thls dence shall be referred to the Director,
subpart. the Dtrector. Offfce of Secu- Offtce of H e a r t n s and Appeals. or the
rity -4ffalr-s.determines t h a t i t will not Director. OffIce of Secl.Wty AffaLrs, de-
endanger the common defense and se- pendlng upon where t h e case resldes. In
curity and wlll be clearly consistent the evenc that the Director, Offlce of
Wth the national interest, access au- Hearlam and bppeals. o r Director. Of-
thorization shall be granted to or rein- fice of Securtty Affalrs, determines
stated for the lndlvidual: othenrtse. t h a t the new evldence should be re-
the Dlrector. Offlce of Security .Uaim, celved. he shall decermtne the form in
shall deterrnlne t h a t access author!!- which It. and the other party's re-
tion shall be dented to or revoked for sponse. shall be ~eceived.
the individual. (c) When new evidence submitted by
(D The Dlrector. Offlce of Securlty either party 1s received inco the record.
hltalrs,shall. through the Director. Of- the opposing party shall be afforded
ace of Safeguards and Security. Inform t h e opportunity to cross-e-ne the
the lndlvtdual involved and his counsel source of the new lnforrnation or to
or representative In writing of the final subrnlt a Foritten response, unless the
deterrnlnation and provlde a copy of tniormation 1s subject t o the e x c e g
the written opinion rendered by the Di- tlons in 8710.26 (1) or (01.
10 CFR Ch. 111 (1-1-98 Edition)
9 710.30 Action by the Secretary. voking access authorization to an indi-
(a) Whenever an individual has not vidual. the Individual's eligibility for
been afiorded an opportanity to cross- access authorfzation may be reconsid-
examlne wltnesaes who have furnished ered when there is a bona Ude offer or
lnformacion adverse ta the Individual employment requiring access to Re-
under the pmvtsions of 9n0.28 (I)or (0). stricted Data. national security Mar-
only the Secretary may issue a final mation or special nuclear material.
detenninauon denying or revoldng the and there is either:
access authorization after personally (1) Material and relevant new e e -
revlewfng the record. dence which t2e lndividual and the Ln-
(b) When the Secrecarg makes a ttnal dlvtdual's representatives are without
determination regarding the indivtd- fault in failing to present earlier, or
ual's ellaibfflt~for DOE access author- (2) Convtncing evidence of reiorma-
ization. the Inhividual will be notifled. tion or rehabilitation-
by the Dlrector, Offlce of Security -4f- (c) A request for reconsideration
fairs, of that decision and of the Sec- shall be submitted in writing to the
retary's tlndlngs wlth respect to each W a g e r having jurisdiction over the
allegation contained In the nocifica- ~ositionfor which access authorization
tlon letter and each substantial issue required. A request for reconsider-
idencifled Ln the statement in support ation shall be accompanied by an am-
of the request for review. davit setting fotth in d e w the new
(c) Nothing contained in these proce- evidence or evldence of reformation ar
dures shall be deemed to limit or affect rehabilltation. The Manager shall no-
the responsibflfty and powers of the tify the individual as to whether the
Secretw to issue subpoenas or to individual's ellgibfflty for access au-
deny or revoke access to Restricted thorizatlon will be reconsidered a n d if
Data zacfonal secarftp Lnformation. or so. the method by whlch such reconsid-
special nucleat rnaterlal if the securlty eration w i l l be accomplished.
of the nation so requires. The Sec- (dl FLnat decermlnatfons regarding
retam's authorttg may not be dele- eligibflity for DOE access authoriza-
gated and may be exercised only when tion 13 reconsideration cases shall be
the Secretary determines that the pro- made by the D!mctor. Office of Secu-
cedures prescribed in 9710.26 (1) or (01 rity .Iffaiff.
cannot be fnvoked consistant with the
national securlty. and such deter--
tlon shall be conciusive.
0710.31 Reconsfderation of access eli- 0 710.32 Terminations.
gibilitp. In the event the tn&viduai is no
(a)Where, pursuant to the procedures longer an applicant for access aut5or-
set forth in 6710.20 through 710.30. the lzacion or no longer requires access au-
Dlrector. Oftloe of Securlty hffairs. or thorization. the procedures of this sub-
the Secretary has made a determina- p u t shall be terminated without a
tlon granebg or reinstating access au- anal deterninacion as to the Fndlvld-
thorization to an indivldual. the indi- ual's ellgibtlitp for access authoriza-
vidual's eligibility for access author- tion.
ization shall be reconsidered as a new
admlatstracive review under the proce- 9 710.33 Attorney representation.
dures set forth ln thls subpart when In the event the individual is reg.
previously unconsidered substantially resented by an actorney or ocher r e p
derogatory Fnforrnation is identifled. or resentatives. the individual shall file
the Individual vlolates a commttment wlth the Hear!!g OfLicer and DOE
or promise upon which the DOE pre- Counsel a document designating sucfr
vlousl~relied to favorably resolve an atcorney or representatives and au-
issue of accese eligibility. thorlzing one such attorney or r e p
(b) Where. pursuant to those proce- resentacive to receive all correspond-
dures. the Manager, Director. OiQce of ence. transcripts, and other documents
Securlty Afiatrs. or the Secretary has pertaining to the proceeding under this
made a detennlnaUon denying or re- subpart.
Department of Energy Pt. 7 10, Subpt. A. App. A
Alexandria Division
PROTECTIVE ORDER
This matter comes before the Court upon the Government's Motion for Protective
information and documents, which will be reviewed or made available to the defendant and
I11 (1988) ("CIPA"); Security Procedures Established Pursuant to Pub. L. 96-456,94 Stat.
2025, by the Chief Justice of the United States for the Protection of Classified Information
(the "Security Procedures"); rules 16(d) and 57 of the Federal Rules of Criminal Procedure;
the general supervisory authority of the Court; and in order to protect the national security,
IT IS ORDERED:
1. The procedures set forth in this Protective Order, CIPA, and the Security
Procedures shall apply to all pretrial, trial, post-trial and appellate matters concerning
(3) classified documents and information which have otherwise been made known to
the defendant or defense counsel, and which documents have been marked: "Confidential,"
or defense counsel have been advised in writing from the government of their classified
nature.
3. All such classified documents and information contained therein shall remain
classified unless the documents bear a clear indication that they have been declassified by
the agency or department that is the originating agency of the document or the information
4. The words "documents" or "information" as used in this Order include, but are not
limited to, all written or printed matter of any kind, formal or informal, including originals,
conforming copies and non-conforming copies (whether different from the original by reason
of notation made on such copies or otherwise), and further include, but are not limited to,
and drafts, alterations, modifications, changes and amendments of any kind to the foregoing.
(2) graphics or oral records or representations of any kind, including, but not limited
to, photographs; charts; graphs; microfiche; microfilm; videotapes; sound recordings of any
(3) electronic, mechanical ro electric records of any kind, including, but not limited
to, tapes; cassettes; disks; recordings; films; typewriter ribbons and word-processing disks
or tapes; and
5. This case involves classified national security information and documents. The
storage, handling and control of such documents and information require special security
precautions mandated by statute, executive order, and regulation, and access to which
6. The Court has been advised that the government attorneys working on this case,
access to the classified documents and information that relate to this case.
7. In accordance with the provisions of CIPA and the Security Procedures, the Court
designates --------- --- ------- as Court Security Officer for this case, and --------- ----------,
--_______
------------ _---------- ----------
9
and ------------ ---------- as alternate Court Security
Officers, for the purpose of providing security arrangements necessary to protect from
defendant or his counsel in connection with this case. Defense counsel shall seek guidance
&om the Court Security Officer with regard to appropriate storage and use of classified
3
information.
8. This Order shall apply to the defendant, defense counsel and any other person who
9. Defendant and the following attorneys for the defense and their approved
employees shall be given access to classified national security documents and information
proceedings in this case, in accordance with the terms of this Protective Order and upon
receipt of the appropriate security clearances: ------.-------- ----- -.------ ------- -.--------------
----- ------- and ------ -------.
10. Before any person, including the defendant and his counsel, but not including
agencies, shall inspect or review classified national security information involved in this
case, he or she must also sign and swear to the Memorandum of Understanding ("MOU")
appended to this Protective Order. Each such person executing the MOU must file an
executed original with the Court and in addition must provide an executed original to the
11. Unless already holding an appropriate security clearance, and approved for access
to classified material in the instant case, for the purpose of establishing security clearances
necessary for access to classified information that may be involved in this case, Standard
Form 86 ("Security Investigation Data for Sensitive Position"), attached releases, and h l l
fingerprints shall be completed and submitted to the Court Security Officer forthwith by
defense counsel, all persons whose assistance the defense reasonably requires, and by such
Court personnel as the Court requires for its assistance. The Court Security Officer shall take
12. Any request for disclosure of classified information to additional persons not
named in paragraph 9 will require the approval of the Court and will be made by motion.
The government will be given an opportunity to be heard in response of any defense request
for disclosure to a person not named in paragraph 9 above. Any person approved by the
Court for disclosure under this paragraph shall be required to receive the appropriate security
clearance from the Court Security Officer, to sign and submit to the Court the MOU
appended to this Order, and to comply with all terms and conditions of this Order. Any
request for security clearances and for access to classified documents and information in this
case shall be made to the Court Security Officer, who shall promptly file them.
13. Defense counsel shall be given access between 8 a.m. and 6 p.m., and at all other
times including weekends and holidays upon 24 hour notice, to a secure room approved by
the Court Security Officer for the storage of classified national security documents and for
the preparation of documents which contain classified information. The defendant shall have
access to the room only with the presence of defense counsel, and only during the hours of
8 a.m. to 6 p.m. weekdays, unless these hours are amended by Order of Court. No
documents containing classified information may be removed from this room unless
authorized by the Court Security Officer.
14. No person who is permitted to inspect and review classified national security
information and documents under the terms of this Protective Order shall copy or reproduce
any part of them, in any manner or form, except as provided by the Court Security Officer.
15. Classified national security documents and information, and information believed
to be classified, shall only be discussed in an area approved by the Court Security Officer,
and in which persons not authorized to possess such information cannot overhear such
discussions.
16. No one shall discuss classified information related to this case over any standard
of any person who has not been granted access to classified information in this case by the
Court.
17. Written materials containing classified information prepared for this case by the
otherwise prepared only by persons who have received access to classified information
pursuant to this Order. The Court Security Officer shall not reveal to the government the
content of any conversations shehe may hear between defense counsel, their employees, and
the defendant, or any of them, nor reveal the nature of the documents being reviewed by
18. All machines of any kind used in the preparation or transmission of classified
information in this case may be used only with the approval of the Court Security Officer and
in accordance with any reasonable instructions the Court Security Officer may issue.
19. Until further order of this Court, all written pleadings of the defendant in this case
shall be submitted to the Court Security Officer. The time of physical submission to the
Court Security Officer shall be considered the time of filing. The Court Security Officer
shall promptly review such pleadings and determine, with the assistance and consultation
classified and the level of classification of such material. If the pleading does not contain
any classified information, the Court Security Officer shall forward it immediately to the
Clerk of the Court for routine filing. If the pleading does contain classified information, or
information which might lead to or cause the disclosure of classified information, the Court
Security Officer, after consultation with the attorney for the government, defense counsel and
the originating agencies, shall: (1) mark it appropriately; (2) provide a marked copy to
government and defense counsel; and (3) have it filed under seal and stored under the
20. All written pleadings of the United States which involve classified information
shall be forwarded to the Court Security Officer for filing under seal with the Clerk of the
Court.
2 1. Without prior authorization of the Department of Justice or the Court, there shall
be no disclosure to any person not named in this Protective Order by defense counsel,
defendant or any other person who may later receive the security clearance from the
Department of Justice in connection with this case (except to the Court, the Court Security
H- 9
Officer or government counsel acting in the course of their official duties), of any classified
national security information or documents (or information contained therein) until such
time, if ever, that such documents or information are openly admitted into evidence during
22. Those named herein are advised that direct or indirect unauthorized disclosure,
and in some cases, exceptionally grave damage to the national security of the United States,
or may be used to the advantage of a foreign nation against the interests of the United States.
This Protective Order is to ensure that those named herein will never divulge the classified
information disclosed tc, them to anyone who is not now authorized to receive it, without
prior written authorization from the originating agency and in conformity with this Order.
23. Persons subject to this Order are advised that any breach of this Order may result
in the terminating of their access to classified information and documents and may subject
them to contempt of Court. In addition, they are advised that any unauthorized disclosure
24. All persons given access to classified information pursuant to this Order are
advised that such information is now and will forever remain the property of the United
States government. Such persons shall return all classified documents which come into their
possession, or for which they are responsible because of access pursuant to this Order, upon
25. A copy of this Order shall issue forthwith to defense counsel named herein and
said counsel are required to advise the defendant of the contents of this Order, and to fUrnish
defendant with a copy. The defendant, through counsel, shall forthwith sign the attached
MOU and counsel shall forthwith file an executed original with the Court. Furthermore,
defense counsel are to provide executed originals of this statement to the Court Security
Officer. The signing and filing of this statement by defendant is a condition precedent to the
or defendant's consent to the entry of this order, shall be construed as a waiver of any right
of the defendant, including any claim raised by the defendant that the provisions of CIPA are
unconstitutional.
27. This Order may be amended by the Court upon the showing of good cause.
This agreement ("the Agreement') is made this day of , 200- (effective date), by and
between [Ultimate Parent], a [country] corporation; [Intermediate Parent], a [State or Country]
Corporation (the "Parent Corporation"); [Cleared Corporation], a [State] Corporation (the
"Corporation") and the United States Department of Defense (DoD), all of the above collectively
"the Parties".
1 RECITALS
WHEREAS, the Corporation is duly organized and existing under the laws of the State of
, and has an authorized capital of shares, all of which are common
voting shares, par value $ , and of which, shares are issued and
outstanding; and I
WHEREAS, [Ultimate Corporation] owns all the outstanding voting shares of [Intermediate
Parent]; and
WHEREAS, the Parent Corporation owns the issued and outstanding shares of the
Corporation; and
"
WHEREAS, , a public corporation traded on the New York Stock Exchange,
owns all the shares of the parent; and
WHEREAS, the offices of the Corporation and, possibly, its wholly owned subsidiaries,
require facility security clearances2issued under that National Industrial Security Program ("NISP)
to conduct its business of , and the NlSP requires that a corporation
maintaining a facility security clearance be effectively insulated from foreign ownership, control
The Office of the Secretary of Defense (including all boards, councils, staffs, and
commands),DoD agencies, and the Departments of Army, Navy, and Air Force (including all of
their activities); the Departments of State, Commerce, Treasury, Transportation, Interior,
Agriculture, Labor, and Justice; National Aeronautics and Space Administration; General
Services Administration; Small Business Administration; National Science Foundation,
Environmental Protection Agency United States Arms Control and Disarmament Agency;
Federal Emergency Management Agency; Federal Reserve System; United States Information
Agency; InternationalTrade Commission; United States Trade Representative; and the
General Accounting Office (the "User Agencies").
WHEREAS, the DoD has agreed to grant or continue the facility security clearance(s) of
the Corporation and its wholly owned subsidiaries from and after the effective date of this
Agreement in consideration of, inter alia, the Parties' execution and compliance with the provisions
of the Agreement, the purpose of which is to reasonably and effectively deny the Parent
Corporation and all entries which the Parent Corporation either controls, or is controlled by,
hereinafter sometimes referred to collectively as the "Affiliates," from unauthorized access to
classified3and controlled unclassified information4and influence over the Corporation's business
or management in a manner which could result in the compromise of classified inforrnation or
could directly and adversely affect the performance of ,classified contracts; and
WHEREAS, the Parties agree that control of the Corporation should be vested in the Board
of Directors of the Corporation; and
WHEREAS, a company under FOCI is not normally authorized to have access to the
following classified information.
b. RESTRICTED DATA as defined in the United States Atomic Energy Act of 1954, as
amended;
Any information that has been determined pursuant to Executive Order 12356 or any
predecessor or successor order to require protection against unauthorized disclosure and is so
designated. The classifications TOP SECRET, SECRET, and CONFIDENTIAL are used to
designate such information.
WHEREAS, in order to comply fully with the policies of DoD that require a corporation
maintaining a facility security clearance to be insulated effectively from undue FOCI, all parties
hereto have agreed that management control of the defense and technology security affairs and
classified contracts of the Corporation should be vested in resident citizens of the United States
who have DoD personnel security clearances5; and
WHEREAS, in order to meet DoD's national security objectives in the matter of the
Corporation's facility security clearance (s) and to further the Corporation's business objectives,
the Parties intend to be bound by the provisions of the Agreement;
NOW THEREFORE, it is expressly agreed by and between the Parties that this Agreement
is hereby created and established, subject to the following terms and conditions, to which all of
the Parties expressly assent and agree:
ORGANIZATION
The Board of Directors of the Corporation ("the Corporation Board"), shall be appointed by the
Parent Corporation and shall be composed of: (i) a minimum of ( ) individuals
who have no prior relationship with the Corporation or the Affiliates (the "Outside Directors"),
except as otherwise allowed by DoD; (ii) at least one representative of the Parent Corporation (the
"Inside Director"); and (iii) one or more cleared officer(s) of the Corporation (the OfficerIDirector").
The number of Inside Directors shall not exceed the combined total of Outside Directors and
OfficerIDirectors. Except as specifically provided herein, each member of the Corporation Board,
however characterized by this Section 1.01, shall have all of the rights, powers, and
responsibilities conferred or imposed upon directors of the company, by applicable statutes and
regulations, and by the Corporation's charter and by-laws. The Chairman of the Corporation
2.01 The Corporation Board shall not be authorized to take any of the actions specified in
subsections 2.01a. through 2.01d. below, unless it shall have received, with respect to each such
action, the prior written approval of the Parent Corporation:
a. The sale, lease or other disposition of any of the property, assets or business
of the Corporation, or the purchase of any property or assets by the Corporation that is other than
in the ordinary course of business.
c. The filing or making of any petition under the Federal Bankruptcy Code or any
applicable bankruptcy law or other acts of similar character;
For purposes of this Agreement, "principle officers" shall have the meaning ascribed
to it under the DoD Industrial Security Manual, Appendix D, page 9, viz.: those persons
occupying positions normally identified as president, senior vice president, secretary, treasurer
and those persons occupying similar positions. In unusual cases, the determination of
principal officer status may require a careful analysis of an individual's assigned duties,
responsibilities, and authority as officially recorded by the organization. Excluded from this
definition are: (i) assistant vice presidents who have no management responsibilities related to
performance on classified contracts, (ii) assistant secretaries, and (iii) assistant treasurers.
Section 16.01 below.
3.02. The Parent Corporation, as the sole stockholder of the Corporation, may remove any
member of the Corporation Board for any reason permitted by the provisions of applicable state
law or the Corporation's Certificate of Incorporation or By-Laws, provided that:
a. The removal of an Outside Director shall not become effective until that director,
the Corporation, and DSS have been notified, DSS has approved the removal, and a successor
who is qualified to become an Outside Director within the terms of the Agreement has been
approved by DSS;
3.03 In the event of any vacancy on the Corporation Board, however occurring, the
Corporation shall give prompt notice of such vacancy to the Parent Corporation and DSS, through
its Facility Security Officer, and such vacancy shall be filled promptly by the Parent Corporation.
Such a vacancy shall not exist for a period of more than 90 days after the Director's resignation,
death, disability or removal unless DSS is notified of the delay.
3.04 Except as provided by this paragraph, the obligation of a Director to abide by and
enforce this Agreement shall terminate when the Director leaves office, but nothing herein shall
relieve the departing Director of any responsibility that the Director may have, pursuant to the laws
and regulations of the United States, not to disclose classified information or controlled
unclassified information obtained during the course of the Director's service on the Corporation
Board, and such responsibility shall not terminate by virtue of the Director leaving office. The
Corporation's Facility Security Officer shall advise the departing Director of such responsibility
when the Director leaves office, but the failure of the Corporation to so advise the Director shall
not relieve the Director of such responsibility.
4.01. The Outside Directors in their capacity as directors of the Corporation shall vote and
act on all matters in accordance with their best efforts.'
4.02. The Corporation and the Parent Corporation jointly and severally shall indemnify and
hold harmless each Outside Director from any and all claims arising from, or in any way connected
to, his performance as a director of the Corporation under the Agreement except for his own
individual gross negligence or willful misconduct. The Corporation and the Parent Corporation
shall advance fees and costs incurred in connection with the defense of such claim. The Parent
Corporation or the Corporation may purchase insurance to cover this indemnification.
5.01. The parties hereto agree that the provisions of this Agreement restricting
unauthorized access to classified information and controlled unclassified information entrusted to
the Corporation by entities under FOCI, and all provisions of the Visitation Policy established in
Article XI, below shall apply to and shall be made to be binding upon all present and future
subsidiariessof all companies controlled by the Corporation that have facility security clearances,
or that may be processed for facility security clearance. The Corporation hereby agrees to
undertake any and all measures, and provide such authorizations, as may be necessary to
effectuate this requirement. The sale of, or termination of the Corporation's control over, any such
subsidiary or controlled company shall terminate the applicability to it of the provisions of this
Agreement.
5.03. It shall be a condition of each such formation or acquisition that all provisions of the
'For the purposes of the Agreement, the term "best efforts," signifies performance of
duties reasonably and in good faith, in the manner believed to be in the best interests of the
Corporation but consistent with the national security concerns of the United States, and with
such care, including reasonable inquiry, as an ordinarily prudent person in a like position would
use under similar circumstances.
The term "subsidiaries" shall, for the purposes of this Agreement, include companies
wholly owned by the Corporation or in which the Corporation owns a controlling interest, either
directly or through the Corporation's ownership interest in intermediate companies.
Visitation Policy established in Article XI, below and all of the above-described restrictive
provisions of the Agreement shall apply to each such company immediately upon consummation
of such formation or acquisition, and that the Corporation and the subsidiary or controlled
company shall execute a document agreeing that such company shall be bound thereby, and a
copy of the executed document shall be forwarded to DSS.
5.04. A document such as described in subsection 5.03 above, shall also be executed and
submitted with respect to each present subsidiary of the Corporation, and with respect to any other
company which the Corporation presently controls.
5.05. Compliance with this Article V shall not be interpreted as conferring the benefits of
this Agreement on those companies. Those companies shall not be entitled to receive a facility
security clearance, nor shall they be entitled to access classified information, to perform classified
contracts or to participate in classified programs pursuant to this Agreement, solely by virtue of
their legal relationship with the Corporation, and their execution of the documents referred to in
subsections 5.03 and 5.04 above.
OPERATION
-
ARTICLE VI Operation of the Agreement
6.01. The Corporation shall at all times maintain policies and practices to ensure the
safeguarding of classified information and controlled unclassified information entrusted to it in the
performance of classified contracts and participation in classified programs for the User Agencies
in accordance with the Security Agreement (DD Form 441 or its successor form), this Agreement,
appropriate contract provisions regarding security, United States export control laws, and the
NISP.
b. [Ultimate Patent] shall formally acknowledge and approve the Corporation resolution
referenced in 6.01.a.l above, and the Parent Corporation resolutions referenced in 6.01.a.2.
above.
7.02. The GSC Shall designate one of the Outside Directors to serve as Chairman of the
GSC.
7.03. The members of the GSC shall exercise their best efforts to ensure the
implementationwithin the Corporation of all procedures, organizational matters and other aspects
pertaining to the security and safeguarding of classified and controlled unclassified information
called for in this Agreement, including the exercise of appropriate oversight and monitoring of the
Corporation's operations to ensure that the protective measures contained in this Agreement are
effectively maintained and implemented throughout its duration.
7.04. The Chairman of the GSC shall designate a member to be Secretary of the GSC.
The Secretary's responsibility shall include ensuring that all records, journals and minutes of GSC
meetings and other documents sent to or received by the GSC are prepared and retained for
inspection by DSS.
7.05. A Facility Security Officer ("FSO") shall be appointed by the Corporation. The FSO
shall report to the GSC as its principal advisor concerning the safeguarding of classified
information. The FSO's responsibility includes the operational oversight of the Corporation's
compliance with the requirements of the NISP. The advice and consent of the Chairman of the
GSC will be required to select the FSO.
7.06. The members of the GSC shall exercise their best efforts to ensure that the
Corporation develops and implements a Technology Control Plan ("TCP"), which shall be subject
to inspection by DSS. The GSC shall have authority to establish the policy for the Corporation's
TCP. The TCP shall prescribe measures to prevent unauthorized disclosure or export of
controlled unclassified information consistent with applicable United States Laws.
7.07. A Technology Control Officer ("TCO) shall be appointed by the Corporation. The
TCO shall report to the GSC as its principal advisor concerning the protection of controlled
unclassified information. The TCO's responsibilities shall include the establishment and
administration of all intracompany procedures to prevent unauthorized disclosure and export of
controlled unclassified information and to ensure that the Corporation otherwise complies with the
requirements of United States Govemment export control laws.
7.08. Discussions of classified and controlled unclassified information by the GSC shall
be held in closed sessions and accurate minutes of such meetings shall be kept and shall be
made available only to such authorized individuals as ere so designated by the GSC.
7.09. Upon taking office, the GSC members, the FSO and the TCO shall be briefed by a
DSS representative on their responsibilities under the NISP, United States Government export
control laws and this Agreement.
7.10. Each member of the GSC, the FSO and the TCO shall exercise histher best efforts
to ensure that all provisions of thisAgreement are carried out, that the Corporation's directors,
officers, and employees comply with the provisions hereof, and the DSS is advised of any known
violation of, or known attempt to violate any provision hereof, appropriate contract provisions
regarding security, United States Government export control laws, and the NISP.
7.11. Each member of the GSC shall execute for delivery to DSS, upon accepting hislher
appointment, and thereafter, at each annual meeting of GSC with DSS, as established by this
Agreement, a certificate acknowledging the protective security measures taken by the Corporation
to implement this Agreement. Each member of the GSC shall further acknowledge histher
agreement to be bound by, and to accept hisfher responsibilities hereunder and acknowledge that
the United States Govemment has placed its reliance on himther as a United States citizen and
as the holder of a personnel security clearance to exercise hisfher best efforts to ensure
compliance with the terms of this Agreement and the NISP.
b. Upon the effective date of the Agreement and annually thereafter, each such
officer shall execute, for delivery to DSS, a certificate: (1) acknowledging the protective security
measures taken by the Corporation to implement the Agreement; and (2) acknowledging that the
United States Government has placed its reliance on himfher as resident citizen of the United
States, and as a holder of a personnel security clearance, to exercise hislher best efforts to
ensure compliance with the terms and conditions of the Agreement by the parties hereto.
7.13. Obligations and Certification of lnside Directors
4. advise the GSC promptly upoh becoming aware of: (i) any violation or
attempted violation of this Agreement or contract provisions regarding industrial security, export
control; or (ii) actions inconsistent with the NlSP or applicable United States Government laws or
regulations.
b. Upon accepting appointment, each lnside Director shall execute for delivery to
DSS a certificate affirming such Di!ector's agreement to be bound by, and acceptance of the
responsibilities imposed by the Agreement, and further acknowledging and affirming the
obligations set forth in 7.13.a. above.
8.01. The Corporation Board shall establish a permanent committee of the Board,
consisting of at least one Outside Director and one lnside Director, to be known as the
Compensation Committee. The Compensation Committee shall be responsible for reviewing and
approving the Corporation Board's recommendation for the annual compensation of the
Corporation's principal officers, as defined herein.
9.01. Representative of DSS, the Corporation's Board, the Corporation's Chief Executive
Officer, the Corporation's Chief Financial Officer, the FSO, and the TCO shall meet annually to
review the purpose and effectiveness of this Agreement and to establish a common understanding
of the operating requirements and how they will be implemented. These meetings shall include
a discussion of the following:
9.02. The Chief Executive Officer of the Corporation and the Chairman of the GSC shall
submit to DSS one year from the effective date of the Agreement and annually thereafter an
implementation and compliance report which shall be executed by all members of the GSC. Such
reports shall include that following information:
a. A detailed description of the manner in which the Corporation is carrying out its
obligation under the Agreement;
e. A statement, as aGpropriate that a review of the records concerning all visits and
communications between representatives of the Corporation and the Affiliates have been
accomplished and the records are in order;
g. A discussion of any other issues that could have a bearing on the effectiveness
or implementation of this Agreement.
-
ARTICLE X Duty to Report Violations of the Agreement.
10.01. The Parties to this Agreement, except DoD, agree to report promptly to DSS all
instances in which the terms and obligations of this Agreement may have been violated.
-
ARTICLE XI Visitation Policy.
11.01. The Chairman of the GSC shall designate at least two Outside Directors who shall
have authority to review, approve, and disapprove requests for visitsg to the Corporation by all
personnel who represent the Affiliates, including all of the directors, officer, employees,
representatives, and agents of each, and proposed visits to any Affiliate by all personnel who
represent the Corporation, (including all of its directors, employees, officers, representatives, and
agents, except for the Inside Director), as well as visits between or among such personnel at other
locations (herein "visit" or "visits"). A record of all visit requests, including the decisions to approve
or disapprove, and information regarding consummated visits, such as, date, place, personnel
involved and summary of material discussion or communication, shall be maintained by the
designated Outside Director and shall be periodically reviewed by the GSC.
11.02. Except for certain Routine Business Visits, as defined in Section 11.05 below, all
visits must be approved in advance by the one of the Outside Directors designated by the GSC
Chairman to act on such matters. All requests for visits shall be submitted or communicated to
the FSO for routing to the designated Outside Director. Although strictly social visits at other
locations between the Corporation personnel and personnel representing the Affiliates are not
prohibited, written reports of such visits must be submitted after the fact to the FSO for filing with,
and review by, the designated Outside Director and the GSC.
11.03. A written request for approval of a visit must be submitted to the FSO no less than
seven (7) calendar days prior to the date of the proposed visit. If a written request cannot be
accomplished because of an unforeseen exigency, the request may be communicated via
telephone to the FSO and immediately confirmed in writing; however, the FSO may refuse to
accept any request submitted less than seven (7) calendar days prior to the date of the proposed
visit if the FSO determines that there is insufficient time to consider the request. The exact
purpose and justification for the visit must be set forth in detail sufficient to enable one of the
designated Outside Directors to make an informed decision concerning the proposed visit, and
the FSO may refuse to accept any request that the FSO believes lacks sufficient information.
Each proposed visit must be individually justified and a separate approval request must be
submitted for each.
11.04. The FSO shall advise one of the designated Outside Directors of a request for
approval of a visit (other than a Routine Business Visit) as soon practicable after receipt of the
written request. The designated Outside Director shall evaluate the request as soon as
practicable after receiving it. The Outside Director may approve or disapprove the request, or
disapprove the request pending submittal of additional information by the requester. The Outside
Director's decision shall be communicated to the requester by any means and it shall be confirmed
in writing when practicable, at least one day prior to the date of the proposed visit, but in no event
later than six (6) calendar days after its recaipt by the FSO. A chronological file of all
documentation associated with meetings, visitatrons, and communications (contact reports),
together with records of approvals and disapprovals, shall be maintained by the FSO for
inspection by DSS. At the time of each GSC meeting, the Outside Directors of the Corporation
shall review such documentation filed since the last meeting to ensure adherence to approved
As used in the Agreement, the term "visits" includes meetings at any location within or
outside the United States, including but not limited to any facility owned or operated by the
Corporation or any Affiliates, whether occurring in person or via electronic means, including but
not limited to telephone conversations, teleconferences, video conferences, or electronic mail.
procedures by the requesters and the designated Outside Director and to verify that sufficient and
proper justification has been furnished for approved visits.
b. Routine Business Visits are in general those that are made in connection with
the regular day-to-day business operations of the Corporation, do not involve the transfer or
receipt of classified information or controlled unclassified information and pertain only to the
commercial aspects of the Corporation's business. Routine Business Visits include:
(i) Visits for the purpose of discussing or reviewing such commercial subjects
as the following: company performance versus plans or budgets; inventory, accounts receivable,
accounting and financial controls; implementation of business plans; and implementation of
technical development programs;
(ii) Visits of the kind made by commercial suppliers in general regarding the
solicitation of orders, the quotation of prices, or the provision of products and services on a
commercial basis;
(iv) Visits concerning marketing and technical activities relating to the import
or export of products requiring compliance with regulations of United States departments or
agencies, including but not limited to the Departments of Defense, Commerce, State, and
Treasury.
Anything to the contrary notwithstanding, the notice and approval of visitation restrictions
contemplated in the Agreement shall not apply to visits between the Corporation and its
subsidiaries. However, visits between the Corporation's subsidiaries and any Affiliate shall be
subject to the visitation approval procedures set forth herein.
13
Anything foregoing to the contrary notwithstanding, the GSC, in its reasonable business
discretion and consistent with its obligation to safeguard classified information and controlled
unclassified information in the Corporation's possession may, with the approval of DSS:
A chronological file of all visit requests, reports of visits, and contact reports, together with
appropriate approvals or disapprovals pursuant to the Agreement shall be maintained by the GSC
for review by DSS.
1 REMEDIES
12.01. DoD resewes the right to impose any security safeguard not expressly contained
in this Agreement that it believes is necessary to ensure that the subsidiaries and Affiliates are
denied unauthorized access to classified and controlled unclassified information.
12.02. Nothing contained herein shall limit or affect the authority of the head of a United
States Government agency'' to deny, limit or revoke the Corporation's access to classified and
controlled unclassified information under its jurisdiction if the national security requires such action.
1 12.03. The Parties hereby assent and agree that the United States Government has the
right, obligation and authority to impose any or all of the following remedies in the event of a
material breach of any term hereof:
14
government contracts, in accordance with the provisions of the Federal Acquisition Regulations;
and
12.04. Nothing in the Agreement limits the right of the Unites States Government to pursue
criminal sanctions against the Corporation, or any Affiliates, or any director, officer, employee,
representative or agency of any of these companies, for violations of the criminal laws of the
United States in connection with their performance of any of the obligations imposed by this
Agreement, including but not limited to any violations of the False Statements Act, 18 U.S.C. 1001,
or the False Claims Act 18 U.S.C. 287.
ADMINISTRATION
13.01. All notices required or permitted to be gi$en to the Parties hereto shall be given by
mailing the same in a sealed postpaid envelope, via registered or certified mail, or sending the
same by courier or facsimile, addressed to the addresses shown below, or to such other
addresses as the Parties may designate from time to time pursuant to this Section:
14.01. In the event that any resolution, regulation or bylaw of any of the Parties to the
Agreement is found to be inconsistent with any provision hereof, the terms of this Agreement shall
control.
15.01. This Agreement shall be implemented so as to comply with all applicable United
States laws and regulations. To the extent consistent with the right of the United States
hereunder, the laws of the State of shall apply to questions concerning the rights,
powers, and duties of the Corporation and the Parent Corporation under, or by virtue of this
Agreement.
15.02. In all instances consistent with the context, nouns and pronouns of any gender
shall be construed to include the other gender.
TERMINATION
a. In the event of sale of the business or all the shares to a company or person not
under FOCI;
c. When DSS determines that continuation of a facility security clearance for the
Corporation is no longer necessary;
d. When DSS determines that there hqs been a breach of this Agreement that
requires it to be terminated or when DSS otherwise determines that termination is in the national
interest;
f. Five (5) days from the effective date of this Agreement if, at least ninety (90)
days before that, the Corporation petitions DSS to terminate this agreement; and
g. When the Parent Corporation and the Corporation for any reason and at
anytime, petition DSS to terminate this Agreement. However, DSS has the right to receive full
disclosure of the reason or reasons therefor, and has the right to determine, in its sole discretion,
whether such petition should be granted.
16.02. Unless it is terminated earlier under the provisions of paragraph 16.01, this
agreement shall expire ten (10) years from the date of execution without any action being required
of any of the parties to the agreement. However, if the parent Corporation and the Corporation
together request that DSS continue the agreement past the expiration date, DSS may extend the
term of the agreement while a new agreement is being negotiated. Any request to extend the
term of the agreement made under this paragraph shall be submitted to DSS no later than ninety
(90) days prior to the expiration date of the agreement.
16.03. If DoD determines that this Agreement should be terminated for any reason, DSS
shall provide the Corporation and the Parent Corporation with thirty (30) days written advance
notice of its intent and the reasons therefor.
16.05. This Agreement may be amended by an agreement in writing executed by all the
Parties.
16.06. The Parties agree that any questions concerning interpretations of this Agreement,
or whether a proposed activity is permitted hereunder, shall be referred to DSS and DoD shall
serve as final arbiterlinterpreter of such matters.
EXECUTION
This Agreement may be executed in several counterparts, each of which shall be deemed to be
an original, and all of such counterparts shall together constitute but one and the same instrument.
IN WITNESS WHEREOF, the Parties hereto have duly executed the Agreement which shall not
t
become effective until duly executed by the DoD.
by:
Signature of Witness President, , Inc.
--
by:
Signature of Witness Senior Vice President, ,Inc.
Effective Date:
Deputy Director for Policy, Defense Security
Service (FORTHE DEPARTMENT OF DEFENSE)
ATTACHMENTS
We, the undersigned, being all of the members of the Board of Directors of (insert name of
Corporation), a corporation duly organized and existing under the laws of the State of
, DO HEREBY CONSENT TO AND APPROVE THE ADOPTION OF the
following recitals and resolutions:
WHEREAS under paragraph 7 of the Agreement (insert name of Corporation) must take
certain protective measures so that (insert name of Corporation) shall at all time maintain policies
and practices that assure the safeguarding of classified information and the performing of
classified contracts or programs for the United States User Agencies in accordance with the
Department of Defense Security Agreement (DD Form 441), the Agreement, appropriate contract
provisions relating to security, and the National Industrial Security Program Operating Manual
NISPOM), DoD 5220 22-MI including, in accordance with paragraph 7.01, revision of By-Laws of
(insert name of Corporation) to establish a permanent committee of the (insert name of
Corporation) Board of Directors consisting of all the outside directors of (insert name of
Corporation) and the (insert name of Corporation) corporate officerldirectors to be known as the
Government Security Committee.
1. (insert name of Corporation), shall at all times maintain policies and practices that
assure the safeguarding of classified information and the performing of classified contracts and
programs for the United States User Agencies in accordance with the Department of Defense
Security Agreement (DD Form 441), the Agreement, appropriate contract provisions regarding
security, and the NISPOM, DoD 5220 22-M.
'List all firms between the ultimate Shareholder and the Corporation.
3. The Government Security Committee shall assure that (insert name of Corporation)
maintains policies end practices to safeguard classified information in the possession of (insert
name of Corporation) consistent with the terms of the Department of Defense Security Agreement
(DD Form 441) and the Agreement.
4. The Govemment Security Committee shall be responsible for the implementation of the
Agreement within (insert name of Corporation) including the exercise of appropriate oversight ant
monitoring of (insert name of Corporation) operations to assure that the protective measures
contained in the Agreement are implemented effectively and maintained throughout the duration
of the Agreement.
5. The members of the Government Security Committee shall be cleared to the level of
the facility security clearance of (insert name of Corporation) and shall be specifically approved
for this function by the Defense Security Service ("DSS").
6. One of the outside directors shall be desi nated as Chairman of the Govemment
Security Committee.
?
7. At least one of the outside directors shall attend all (insert name of Corporation) Board
of Directors meetings and (insert name of Corporation) Board of Directors committee meetings in
order for there to be a quorum.
8. One of the (insert name of Corporation) officers on the Govemment Security Committee
shall be designated by the Government Security Committee to assure that all records, journals,
and minutes of the Government Security Committee meetings or other communications of the
Government Security Committee are maintained and readily available for DSS inspections.
10. Upon taking office, the Government Security Committee members will be briefed by
a DSS representative on their responsibilities under DoD security regulations and the Agreement.
11. Each member of the Government Security Committee, upon accepting such
appointment and annually thereafter, shall acknowledge by certificate in the form attached hereto,
that the United States Govemment has placed its reliance on them as United States citizens and
as holders of personnel security clearances to exercise all appropriate aspects of the Agreement
and to assure that the members of the (insert name of Corporation) Board of Directors, (insert
name of Corporation) officer, and (insert name of Corporation) employees comply with the
provisions of the Agreement, and that DSS is advised of any violation of, or attempt to violate, any
undertaking in Agreement, appropriate contract provisions regarding security or the NISPOM,
(DoD 5220 22-M), of which they are aware.
RESOLVED FURTHER that the action of the President of (insert name of Corporation) in
executing and delivering the Agreement be and hereby is ratified and affirmed and that the
Agreement be and hereby is adopted and approved in substantially the form attached to this
written consent.
This Consent may be signed in several counterparts and all such counterparts taken
together shall be taken together as one. The number of counterparts that in the aggregate contain
the signature of all members of the Board of Directors shall constitute the binding action of the
Board.
DATED:
- -
Director Director
Director Director
Director Director
Director Director
UNANIMOUS CONSENT OF THE BOARD OF DIRECTORS OF
(insert name of Shareholder)**
We, the undersigned, being all the members of the Board of Directors of (insert name of
Shareholder) a corporation duly organized and existing under the laws of (insert name of State
or Country), DO HEREBY CONSENT TO AND APPROVE THE ADOPTION OF the following
recitals and resolution:
WHEREAS, one of the requirements of the Agreement for the issuance of an unrestricted
facility security clearance to (insert name of Corporation)is the adoption by the Board of Directors
of (insert name of Shareholder) of a resolution, which cannot be amended without notification to
DoD, that excludes the members of its Board of Directors and its officers, employees
representatives, and agents from access to classified information in the possession of (insert
name of Corporation).
NOW, THEREFORE, BE IT RESOLED that in accordance with and subject to the terms of the
Agreement:
'List all firms between the ultimate Shareholder and the Corporation.
"This Board Resolution must be completed by all Shareholder firms in the chain of ownership.
RESOLVED FURTHER that paragraph 7.01 of the Agreement as it relates to the
Government Security Committee and the resolution of the (insert name of Corporation) Board of
Directors, adopted by unanimous written consent and dated , as it relates to the
Goverr~mentSecurity Committee be and said terms of the Agreement and the resolution hereby
are incorporated into by reference and made a part of the By-Laws of (insert name of
Corporation).
RESOLVED FURTHER that the action of the Chairman of the Board of (insert name of
Shareholder) in executing and delivering the Agreement be and hereby is ratified and affirmed,
and that the appropriate officer or officers of (insert name of Shareholder) be and hereby are
authorized to take such other actions as may be necessary to implement the provisions thereof.
This Consent may be signed in several counterparts and all such counterparts taken
together shall be taken together as one. The number of counterparts that in the aggregate contain
the signatures of all member of the Board of Directors shall constitute the binding action of the
Board.
DATED:
Director Director
Director Director
Director Director
Director Director
SAMPLE
Pursuant to the provisions of the Department of Defense Industrial Security Regulation, 5220.22-
R, and the proposed Special Security Agreement among the Department of Defense (list subject
corporation and all parent corporations),
Signed:
Dated:
Witness:
(NAME TYPED OR PRINTED)
GOVERNMENT SECURITY COMMITTEE MEMBER CERTIFICATE
By execution of this Certificate, I acknowledge the protective security measures that have
been taken by through resolutions dated , to
implement the Special Security Agreement (the "Agreement"), copies of which are attached.
I further acknowledge that the United States Government has placed its reliance on me as
a United States citizen and as a holder of a personnel security clearance to exercise all
appropriate aspects of the Agreement, to assure that members of the Board of
Directors, officers, and employees comply with the
provisions of the Agreement; and to assure that the Defense Security Service is advised of any
violation of, or attempt to violate any undertaking in the Agreement, appropriate contract
provisions regarding security or the National Industrial Security Program Operating Manual, DoD
5220.22-MI of which I am aware.
Dated:
Signed:
I certify that:
I.I have waived any right to have access to classified information and export-controlled
technical data held by except as permissible under the National Industrial
Security Program Operating Manual (NISPOM), DoD 5220.22MIand applicable United States laws
and regulations;
3. 1 will not seek and have not obtained classified information or export controlled technical
data in the possession of except as permissible under the NISPOM and
applicable United States laws and regulations;
Dated:
Signature:
(Name Typed or Printed)
Witness:
I I I I
J K$%% - None Other Address ZIP Code
SON Personnel -NPRC
Folder At SON
L MLocation None , Other Address , ZIP Code
I
N OPAC-ALC, 10 Accounting Data andlor ,
Number Agency Case Number
NAME
Last Name
@PLACE
*If you have no middle name. enter "NMN".
OF BIRTH
I
I
I
I
Middb Name
,a
J r I.e c
I
SOCIAL SECURITY
BIRTH
Month Day Year
0 OTHER
IDENTIFYING
Height (feet and inches) Weight (pounds) Hair Color Eye Color Sex (Mark one box)
Female Male
INFORMATION
OTELEPHONE
Work (Include Area Code and extension) Home (Include Area Code)
Day
NUMBERS
@CITIZENSHIP
7 Night ( =I) Day
Night ( )
0 'Our Mother's Maiden Name
Iam a US. citizen or national by birth in the U.S. or U.S. territorylpossession. (Answer
items b and d)
@ Mark the box at the right that
reflects your current citizenship I am a US. citizen, but I was NOT born in the U.S. (Answer items b, c and d)
status, and follow its instructions.
,
Iam not a US. citizen. (Answer items b and e)
@ UNITED STATES CITIZENSHIP If you are a US. citizen, but were no! born in the US., provide information about one or more of the following proofs of your citizenship.
Naturalization Certificate (Where were you naturalized?)
Court \State I Certificate Number MonthlDayNear Issued
I Ciw
Citizenship Certificate (Where was the certificate issued?)
City S t I Certificate Number I MonthlDayNear Issued
I I
-
State Department Form 240 Report of Birth Abroad of a Citizen of the United States
Give the date the form was I MonthlDayNear , Explanation
prepared and give an explanation 1 I
US. Passport
I 1
@ DUAL CITIZENSHIP If you are (orwere) a dual citizen of the United States and another country, Country
providethe name of that country in the space to the right.
@ ALIEN If you are an alien, providethe following information:
City State Date You Entered US. Alien RegistrationNumber Country(ies) of Citizenship
Place You Month Day Year
Entered the
United States:
Exception lo SF65. SFBSP. SF65P-S. SF66, and SF86A appmved by GSA Seplember. 1995. Page 1
Designedusing Perfon Pro. WHSIDIOR. Sep 95
List the places where you have lived, beginning with the most recent ( # 1 ) and working back 7 years. All periods must be accounted for in your list. Be sure to indicate the
actual physical location of your residence: do not use a post office box as an address, do not list a permanent address when you were actually living at a school address,
etc. Be sure to specify your location as closely as possible: for example, do not list only your base or ship, list your barracks number or home port. You may omit
temporary military duly locations under 90 days (list your permanent address instead), and you should use your APOIFPO address 11you lived overse; ;
For any address in the last 5 years, list a person who knew you at that address, and who preferably still lives in that area (do not list people for residences completely
outside this 5-year period, and do not list your spouse, former spouses, or other relatives). Also for addresses in the last five years, if the address is "General Delivery." a
Rural or Star Route, or may be difficult to locate, provide directions for locating the residence on an attached continuation sheet.
MonthNear MonthIYear Street Address Apt. # City (Country) State ZIP Code
#I TO Present
--
Name of Person Who Knows You Street Address Apt. # City (Country) Slate ZIP Code Telephone Number
( 1
MonthNear MonthIYear Street Address Apt. # City (Country) State ZIP Code
#2 To
Name of Person Who Knew You Street Address Apt. # I City (Country) ( State ( ZIP Code Telephone Number
( 1
MonthNear MonlhlYear Street Address Apt # City (Country) State ZIP Code
#3 To
Name of Person Who Knew You %&t Address Apt. # I CQ (Country) I ~ t a t e 1 2Code
1~ ~ e l i ~ h o nNunber
tr
( 1
MonthNear MonthlYear Street Address Apt. # City.(Country) State ZIP Code
#4 To
Name of Person Who Knew You Street Address Apt. # City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthNear Street Address Apt. # City (Country) State ZIP Code
#5 To
Name of Person Who Knew You Street Address Apt. # City (Country) State ZIP Code Telephone Number
( 1
@WHERE YOU WENT TO SCHOOL
List the schools you have attended, beyond Junior High School, beginning with the most recent (#I) and working back 7 years. List College or University degrees and
the dates they were received. If all of your education occurred more than 7 years ago, list your most recent education beyond high school, no matter when that education
occurred.
F o r schools you attended in the past 3 years, list a person who knew you at school (an instructor, student, etc.). Do not list people for education
completely outside this 3-year period.
T o r correspondence schools and extension classes, provide the address where the records are maintained.
MonthNear MonthIYear Code Name of School DegreeIDiplomalOther Monthwear Awarded
#I To
Street Address and City (Country) of School State ZIP Code
I I
Name of Person Who Knew You I Street Address Apt. # I City (Country) I State I ZIP Code ( Telephone Number
( 1
MonthNear MonthlYear Code Name of School DegreelDiplomalOther Monthwear Awarded
#2 To
Street Address and City (Country) of School State ZIP Code
I 1
Name of Person Who Knew You Street Address Apt. # City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthIYear Code Name of School Degree/DiplomalOther MonthNear Awarded
#3 To
Street Address and City (Country) of School State ZIP Code
I
Name of Person Who Knew You Street Address Apt. # City (Country) State ZIP Code Telephone Number
( 1
Enter your Social Security Number before going to the next page +
I
Page 2
List your employment activities, beginning with the present (#I)and working back 7 years. You should list all full-timework, part-time work, military service, temporary
military duty locations over 90 days, self-employment. other paid work, and all periods of unemployment. The entire 7-year period must be accounted for without breaks.
but you need not list employments before your 16th birthday. EXCEPTION: Show all Federal civilian service, whether it occurred within the last 7 years or not.
Code. Use one of the codes listed below to identify the type of employment:
-
1 Active military duty stations 5 -State Government (Non-Federal 7 - Unemployment(Include name of 9 -Other
2 -National GuardlReserve employment) person who can verify)
-
3 U.S.P.H.S. CommissionedCorps 6 - Self-employment (Include business name -
8 Federal Contractor (List Contractor.
-
4 Other Federal employment andlor name of person who can verify) not Federal agency)
EmployerNerifier Name. List the business name of your employer or the name of the person who can verify your self-employment or unemploymentin this block. If
military service is being listed, include your duty location or home port here as well as your branch of service. You should provide separate listings to reflect changes in
your military duty locations or home ports.
0
Previous Periods of Actlvity. Complete these lines if you worked for an employer on more than one occasion at the same location. After entering the most recent
period of employment in the initial numbered block, provide previous periods of employment at the same location on the additionallines provided. For example, if you
worked at XY Plumbing in Denver. CO, during 3 separate periods of time, you would enter dates and information concerning the most recent period of employment first.
and provide dates, position titles, and supervisorsfor the two previous periods of employment on the lines below that information.
MonthNear MonthNear Code EmployerNerifier NamelMilitary Duty Location Your Position TitleIMilitary Rank
#I TO Present
Employer'sNeriier's Street Address City (Country) State ZIP Code Telephone Number
( 1
Street Address of Job Location (Y different than Employer'sAddress) City (Country) State ZIP Code Telephone Number
( 1
Supervisor's Name 8 Street Address (if diierent than Job Location) City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthNear Position Title Supervisor
PREVIOUS To
PERIODS - MonthNear MonthNear PositionTitle Supervisor
OF
To
ACTIVITY
(,qlock # f ) MonthNear MonthNear PositionTitle Supervisor
To
MonthNear MonthNear Code EmployerNerifierNamelMilitary Duty Location Your Position TitlelMilitary Rank
#2 To
Employer'sNerifier'sStreet Address 1 City (Country) State 1 ZIP Code ) Telephone Number
( 1
Street Address of Job Location (Y diierent than Employets Address) City (Country) State ZIP Code Telephone Number
( 1
Supervisor's Name 8 Street Address (if diierent than Job Location) City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthNear PositionTitle Supervisor
PREVIOUS To
PERIODS MonthNear MonthNear Position Title Supervisor
OF
ACTlVlTY
-10 I I
(,ql& #2) MonthNear MonthNear Position Title Supervisor
To
MonthNear MonthNear Code EmployerNerifierNamelMilitary Duty Location Your Position TitlelMilitary Rank
#3 To
Employer'sNeriiier'sStreet Address City (Country) State ZIP Code Telephone Number
( 1
Street Address of Job Location (1different than Employer'sAddress) City (Country) State ZIP Code Telephone Number
( 1
Supervisor's Name 8 Street Address (if differentthan Job Location) City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthNear PositionTitle Supervisor
PREVIOUS To
PERIODS MonthNear MonthNear Position Title Supervisor
OF
To
ACTIVITY
plock #3) MonthNear MonthNear Position Title Supervisor
To
Enter your Social Security Number before going to the next page
I
YOUR EMPLOYMENT ACTIVITIES (CONTINUED)
MonlhNear MonthNear Code EmployerNerifier NameIMiiitary Duty Location Your Position TitleIMil~taryRank
#4 To
Employer'sNerifier'sStreet Address City (Country) State ZIP Code Telephone Number
( 1
Street Address of Job Location (if different than Employer'sAddress) City (Country) State ZIP Code Telephone Number
Supervisor's Name & Street Address (if different than Job Location) I City (Country) 1 State ( ZIP Code I Telephone Number
MonthNear MonthNear Position Title 1 Supervisor
PREVIOUS To
PERIODS MonthNear MonthNear Position Title Supervisor
OF
To
ACTlVlTY -
(810ck #) MonthNear MonthNear Position Title Supervisor
To
MonthNear MonthNear Code EmployerNerifier NamelMilitary Duly Location Your Position TitlelMilitary Rank
#5 To
Employer'sNerifier'sStreet Address City (Country) State ZIP Code Telephone Number
( 1
Street Address of Job Location (ildifferent than Employer'sAddress) City (Country) State ZIP Code Telephone Number
( 1
Supervisor's Name & Street Address (if different than Job Location) City (Country) State ZIP Code Telephone Number
( 1
MonthNear MonthNear Position Title Supervisor
PREVIOUS To
PERIODS MonlhNear MonthNear Position Title Supervisor
OF
ACTIVITY To I
I I I
PEOPLE WHO KNOW YOU WELL
@ List three people who know you well and live in the United Slates They should h good inends. peers, colleagues, coliege roommates. etc.. whose combined
association with you covers as well as possible the last 7 years. Do not list your spouse, former spouses, or other relatives, and try not to list anyone who is listed
elsewhere on this form.
Name Dates Known
MonthNear MonthIYear
#I
To
Home or Work Address City (Country) State ZIP Code
1 I I
Name Dates Known
MonthNear MonthNear
#2
To 1
Home or Work Address City (Country) Stale ZIP Code
I I I
Name Dates Known
MonthNear MonthPlear
#3
To 1
Home or Work Address City (Country) State ZIP Code
Enter your Social Security Number before going to the next page
.I
Page 4
@ YOUR SPOUSE
Mark one box to show your current marital status and provide information about your spouse(s) in items a. andlor b.
R -- 1 Never married
2 Married
-- -
R- 3 Separated
-
4 Legally Separated
Current Spouse Complete the following about your current spouse only.
R- 5 Divorced
6 -Widowed
@
Full Name Date of B~nh Place of Birth (Indude country i f outsrde the U.S.) Social Security Number
I I I
Other Names Used (Specify maiden name, names by other mamages. etc.. and show dates used for each name) Country(ies) of Citizenship
Date Married Place Married (Include country i f outside the U.S.) State
I
If Separated. Date of Separation If Legally Separated, Where is the Record Located? City (Country) State
Address of Current Spouse, if different than your current address (Street, city, and country i f outside the U.S.) State ZIP Code
I I
0 Former Spouse(s). Complete the following about your former swuse(s). use blank sheets if needed.
Full Name Date of Binh Place of Birth (Include country i f outside the US.) State
Country(ies) of Citizenship Date Mamed Place Married (Indude country i f outside the U.S.) State
Check one. Then Give Date MonthlDayNear If Divorced. Where is the Record Located? City (Cpuntry) State
Divorced W~dowed
Address of Former Spouse (Street. crty. and country ifwtside Y?e U.S.) 1 State ( ZIP Code I Telephone Number
Enter your Social Security Number before going to the next page w
Page 5
5-7
@ CITIZENSHIP OF YOUR RELATIVES AND ASSOCIATES
If your mother, father, sister, brother, child, or current spouse or person with whom you have a spouse-like relationship is a U S . citizen by other than birth, or an alien
residing in the US.. provikli? Il,r 11al11reof the individual's relationship to you (Spouse. Spouse-like. Mother, etc.), and the individual's name and date of birth on the first
.
line (this informationis , . x e d to pair it accurately with information in iAms 13 and 14).
On the second line, provide the individual's naturalizationcertificate or alien registration number and use one of the document codes below to identify proof of citizenship
status. Provide additional informationon that line as requested.
I- NaturalizationCertificate: Provide the date issued and the location where the person was naturalized (Court. City and State).
2 - Citizenship Certificate: Provide the date and location issued (City and State).
3 -Alien Registration: Provide the date and place where the person entered the U S. (City and State).
4 - Other: Provide an explanation in the "Additional Information" block.
Association Name Date of Birth (MonVI/Day/Year)
#I
CertiflcatelRegistration# Docurnenr Code Additional Information
I I
Association 1 Name 1 Date of Birth (MonVIiDayNear)
#2
CertificatelRegistration# Document Code Additional Information
-.
@ Have you Served in the United States Merchant Marine?
List all of your military service below, including service in Reserve, National Guard, and US. Merchant Marine. Start with the most recent period of service (#I) and work
backward. If you had a break in service, each separate period should be listed.
*Code. Use one of the codes listed below to identify your branch of service:
1-Air Force 2 -Army 3 - Navy 4 -Marine Corps 5 Coast Guard - -
6 Merchant Marine 7 - National Guard
To
To
@ YOUR FOREIGN ACTIVITIES Yes NO
@
Have you ever had any contact with a foreign government, its establishments(embassiesor consulates), or its representatives, whether inside
or outside the US.. other than on official U S . Government business? (Does not include routine visa applications and border crossing
contacts.)
In the last 7 years, have you had an active passport that was issued by a foreign government?
I l Il
If you answered "Yes" to a, b, c, or d above, explain in the space below: provide inclusive dates, names of firms andlor governments involved, and an explanation of your
involvement.
MonthNear MonthNear 1 Firm andlor Government
I Explanation
To
FOREIGN COUNTRIES YOU HAVE VISITED
List foreign countries you have visited, except on travel under official Government orders, beginningwith the most current (#I)
and working back 7 years. (Travel as a
dependent or contractor must be listed.)
*Use one of these codes to indicate the purpose of your visit: 1 Business - 2 Pleasure - 3 Education -4 Other -
*Include short trips to Canada or Mexico. If you have lived near a border and have made short (one day or less) trips to the neighboringcountry, you do
not need to list each trip. Instead, provide the time period, the code, the country, and a note ("Many Short Trips").
*Do not repeat travel covered in items 9. 10, or 11.
MonthNear MonthNear Code Country MonthNear MonlhlYear Code Country
#2 To 1 #4 To
This concludes Part 1 of this form. If you have used Page 9, contlnuation sheets, or blank sheets to complete any of the
auestions in Part 1, aive the number for those auestions In the s ~ a c to
e the riaht: I
Enter your Social Security Number before going to the next page
I
Page 6
J-8
Standard Form 86 Form approved:
Revised Seotember 1995 QUESTIONNAIRE FOR OMB NO. 3206-0007
US. Office bf Personnel Management NATIONAL SECURITY POSITIONS NSN 7540-00-6344036
5 CFR Parts 731.732. and 736 86-111
OFFICIAL
USE
ONLY
@ Have you registeredwith the Selective Service System? If "Yes." provide your registration number. If "No," show the reason for your legal
exemption below.
Registration Number Legal Exemption Explanation
I
@ YOUR MEDICAL RECORD yes ( NO
I
In the last 7 years, have you consulted with a mental health professional(psychiatrist, psychologist, counselor. etc.) or have you consultedwith
another health care provider about a mental health related condition?
If you answered Yes." provide the dates of treatment and the name and address of the therapist or doctor below, unless the wnsultation(s) involved only marital, family.
or grief counseling, not relatedto violence by you.
Monthffear Monthffear NamelAddressof Therapist or Doctor State ZIP Code
To
@ YOUR EMPLOYMENT RECORD yes I NO
I
Has any of the following happened to you in the last 7 years? If "Yes." begin with the most recent occurrenceand go backward, providing date fired.
quit. or left, and other informationrequested.
Use the following codes and explain the reason your employment was ended:
I-Fired from a job 3 - Lefl a job by mutual agreement following allegations of misconduct -
5 Left a job for other reasons
2 -Quit a job after being told 4 - Left a job by mutual agreement following allegations of under unfavorablecircumstances
vou'd be fired unsatisfactow ~erformance
Monthffear
I I
Code Specify Reason
I Employer's Name and Address (Include city/Country if outside U S . )
I I
state =IP
- - -
@ Have you ever been chargedwith or convicted of any felony offense? (Include those under Uniform Code of Military Justice)
@ Have you ever been charged with or convicted of a firearms or explosives offense?
@ Are there currently any charges pending against you for any criminal offense?
@ Have you ever been charged with or convicted of any offense@) related to alcohol or drugs?
In the last 7 years. have you been subject to court martial or other disciplinaryproceedings under the Uniform Code of Military Justice? (Include
non-judicial, Captain's mast, etc.)
0
--
In the last 7 years. have you been arrested for, charged with, or convicted of any offense(s) not listed in response to a, b, c, d, o r e above?
(Leave out traffic fines of less than $150 unless the violation was alcohol or drug related.)
-
1 1 1
If you answered "Yes" to a. b, c, d, e, or f above, explain below. Under "Offense." do not list specific penalty codes, list the actual offense or violation (for example, anon, theft,
etc.).
MonthNear Offense Action Taken Law EnforcementAuthoritylCourt(Indude C~lyand counlyIcounby rfoutsrde u S) State ZIP Code
Enter your Social Security Number before going to the next page b
Page 7
@ YOUR USE OF ILLEGAL DRUGS AND DRUG ACTIVITY
Yes No
1
The following questions pertain to the illegal use of drugs or drug activity. You are required to answer the questions fully and truthfully, and your
failure to do so could be grounds for an adverse employment decision or action against you, but neither your truthful responses nor information
derived from your responses will be used as evidence against you in any subsequent criminal proceeding.
@ Since the age of 16 or in the last 7 years, whichever is shorter, have you @gg!!y used any controlled substance, for example, marijuana, cocaine,
crack cocaine, hashish, narcotics (opium, morphine, codeine, heroin, etc.), amphetamines, depressants (barbiturates, methaqualone, tranquilizers,
etc.), hallucinogenics (LSD, PCP, etc.), or prescription drugs?
0 Have you ever illegally used a controlled substance while employed as a law enforcement officer, prosecutor, or courtroom official; while possessing
a security clearance; or while in a position directly and immediately affecting the public safety?
In the last 7 years, have you been involved in the illegal purchase, manufacture, trafficking, production, transfer, shipping, receiving, or sale of any
narcotic, depressant, stimulant, hallucinogen, or cannabis for your own intended profit or that of another?
~fyou answered "Yes" to a orb above, provide the date(s), identify the controlled substance(s)andlor prescription drugs used, and the number of times each was used.
To
@ YOUR INVESTIGATIONS RECORD Yes
I
NO
0 Has the United States Government ever investigated your backgroundandlor granted you a security clearance? If Yes." use the codes that
follow to provide the requested information below. If "Yes." but you can't recall the investigating agency andlor the security clearance
received, enter "Other" agency code or clearance code, as appropriate,and "Don't k n o d or 'Don't recall" under the "Other Agency"
heading, below. If your response is "No," or you don't know or can't recall if you were investigatedand cleared, check the "No" box.
To your knowledge, have you ever had a clearance or access authorization denied, suspended, or revoked, or have you ever been debarred Yes No
from government employment? If "Yes," give date of action and agency. Note: An administrative downgrade or termination of a security
clearance is not a revocation.
I I
MonthNear Department or Agency Taking Action MonthNear Department or Agency Taking Action
Enter your Social Security Number before going to the next page
I
Page 8
J-10
@ YOUR FINANCIALDELINQUENCIES ) Yes NO )
@ In the last 7 years. have you been Over 180 days delinquent on any debt(s)?
In the last 7 years, have you been a party to any public record civil court actions not listed elsewhereon this form?
If you answered "Yes." provide the information about the public record civil court action requested below.
MonthNear Nature of Action Result of Acbon Name of Parties Involved ~ counly/cwnby doutsde u.s.)
Court (hdude C Iand State ZIP Code
0 Have you ever been an officer or a member or made a contributionto an organizationdedicated to the violent overthrow of the United States
Government and which engages in illegal activities to that end, knowing that the organizationengages in such activities with the specific intent to
further such activities?
I I
@ Have you ever knowingly engaged in any acts or activities designed to overthrow the United States Government by force?
Use the continuationsheet(s) (SF86A) for additional answers to items 9,10, and 11. Use the space below to continue answers to all other items and any informationyou
would like to add. If more space is needed than is provided below. use a blank sheet(s) of paper. Start each sheet with your name and Social Security Number. Before each
answer, identify the number of the item.
..................-.-......-----.--.- .............................................
................................................................................
............................................................. -.............-.......
....................................................................................
...............................................................................
................--....-.-.---.-.. . . . --.-.....................
..................-.......-...--.................... -...................
......... ................ . . . . . . . . . . . . . . - - . . . . . . . . . . . . . . . . .
........... ............................................................
.....-.... ...................................... .............-.-....
. . . . . . . ..................... . . . . . . . . . . . . . . . . . . . . - . . . . - - . . . .
---- - .- . . . . . . . . . . . . . . . . . . . . . . . . . . . . ................
. - - - - - . .- . . - - - - .- - . --- - - - - .- . . . . . . . . . . . . . . - . . . . . . . . . . . . . . . . . . - . . . . .
. - - . . . ................... ............. ............. . . .
After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the form is complete and accurate, and then
sign and date the following certification and sign and date the release on Page 10.
p
p -- -
My statements on this form, and any attachments to it, are true, complete, and correct to the best of my knowledge and belief and are
made in good faith. I understand that a knowing and willful false statement on this form can be punished by fine or imprisonment or
both. (See section 1001 of title 18, United States Code).
Signature (Sign in ink)
I Date
- - - - p-
Enter your Social Security Number before going to the next page b
Page 9
Standard Form 86 Form approved:
Revised September 1995 OM0 NO. 3206-0007
U.S. Office of Personnel Management NSN 7540-00-634-4036
5 CFR Parts 731,732, and 736 86-11 1
Carefully read this authorization to release information about you, then sign and date it in ink
I Authorize any investigator, special agent, or other duly accredited representative of the authorized Federal agcncy conducting my
background investigation, to obtain any information relating to my activities from individuals, schools, residential management
agents, employers, criminal justice agencies, credit bureaus, consumer reporting agencies, collection agencies, retail business
establishments, or other sources of information. This information may include, but is not limited to, my academic, residential,
achievement, performance, attendance, disciplinary, employment history, criminal history record information, and financial and
credit information. I authorize the Federal agency conducting my investigation to disclose the record of my background
investigation to the requesting agency for the purpose of making a determination of suitability or eligibility for a security clearance.
I Understand that, for financial or lending institutions, medical institutions, hospitals, health care professionals, and other sources of
information, a separate specific release will be needed, and I may be contacted for such a release at a later date. Where a separate
release is requested for information relating to mental health treatment or counseling, the release will contain a list of the specific
questions, relevant to the job description, which the doctor or therapist will be asked.
I Further Authorize any investigator, special agent, or other duly accredited representative of the U.S. Office of Personnel
Management, the Federal Bureau of Investigation, the Department of Defense, the Defense Investigative Service, and any other
authorized Federal agency, to request criminal record information about me from criminal justice agencies for the purpose of
determining my eligibility for access to classified information andlor for assignment to, or retention in a sensitive National Security
position, in accordance with 5 U.S.C. 9 10 1. I understand that I may request a copy of such records as may be available to me under
the law.
I Authorize custodians of records and sources of information pertaining to me to release such information upon request of the
investigator, special agent, or other duly accredited representative of any Federal agency authorized above regardless of any previous
agreement to the contrary.
I Understand that the information released by records custodians and sources of information is for official use by the Federal
Government only for the purposes provided in this Standard Form 86, and that it may be redisclosed by the Government only as
authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for
five (5) years from the date signed or upon the termination of my affiliation with the Federal Government, whichever is sooner.
Read, sign and date the release on the next page if you answered "Yes" to question 21.
Signature (Sign in ink) Full Name (Type or Print Legfbly) Date Signed
'Current Address (Street. City) State ZIP Code Home Telephone Number
(Include Ares Code)
( 1
Page 10
Standard Form 86 Form approved:
Revised September 1995 OM0 NO. 3206-0007
U S . Office of Personnel Management NSN 7540-00-634-4036
5 CFR Parts 731.732, and 736 86-11 1
Carefully read this authorization to release information about you, then sign and date it in ink.
This is a release for the investigator to ask your health practitioner(s) the three questions below concerning your mental health
consultations. Your signature will allow the practitioner(s) to answer only these questions.
I am seeking assignment to or retention in a position with the Federal government which requires access to classified national security
information or special nuclear information or material. As part of the clearance process, I hereby authorize the investigator, special
agent, or duly accredited representative of the authorized Federal agency conducting my background investigation, to obtain the
following information relating to my mental health consultations:
Does the person under investigation have a condition or treatment that could impair hisher judgment or reliability,
particularly in the context of safeguarding classified national security information or special nuclear information or material?
If so, please describe the nature of the condition and the extent and duration of the impairment or treatment.
I understand the information released pursuant to this release is for use by the Federal Government only for purposes provided in the
Standard Form 86 and that it may be redisclosed by the Government only as authorized by law.
Copies of this authorization that show my signature are as valid as the original release signed by me. This authorization is valid for 1
year fiom the date signed or upon termination of my affiliation with the Federal Government, whichever is sooner.
Signature (Sign in ink) Full Name (Type or Print Leg~bly) Date Signed
I
Other Names Used Social Security Number
I
- . 1 State I ZIP Code I Home Telephone Number
- -.. ...Address
Currant . .--. --- /Street
,- ..- - . Citv)
- .,,
I I 1 (Include ~ r e Code)
a
CONSENT TO UNDERGO POLYGRAPH EXAMINATION
1. ,have been asked t o undergo polygraph esunimtion by
I UNDERSTAND THE ABOVE PROVISIONS AND FREELY AND VOLUNTARILY CONSENT TO UNDERGO POLYGRAPH EXAMINATION. NO
THREATS HAVE BEEN MADE OR PROMISES EXTENDED TO ME TO OBTAIN MY PARTICIPATION I N THIS EXAMINATION.
SIGNATURE OF WITNESS
I SIGNATURE OF POLYGRAPH EXAMINER
1. Intending to be legally bound, I hereby accept the obligations contained in this Agreement in consideration of my being
granted access to classified information. As used in this Agreement, classified information is marked or unmarked classified
information, including oral communications,that is classified under the standards of Executive Order 12958, or under any other
Executive order or statute that prohibits the unauthorized disclosure of information in the interest of national security; and
unclassified information that meets the standards for classification and is in the process of a classification determination as
provided in Sections 1.l, 1.2, 1.3 and 1.4(e) of Executive Order 12958, or under any other Executive order or statute that
requires protection for such information in the interest of national security. I understand and accept that by being granted
access to classified information, special confidence and trust shall be placed in me by the United States Government.
2. 1 hereby acknowledge that I have received a security indoctrination concerning the nature and protection of classified
information, including the procedures to be followed in ascertaining whether other persons to whom I contemplate disclosing
this information have been approved for access to it, and that I understand these procedures.
3. 1 have been advised that the unauthorized disclosure, unauthorized retention, or negligent handling of classified informa-
tion by me could cause damage or irreparable injury to the United States or could be used to advantage by a foreign nation.
I hereby agree that i wiii never divulge classified information tc anyone unless: (a) I have officially verified that the recipient
has been properly authorized by the United States Government to receive it; or ('D) i have been give; pilor written cotice cf
authorization from the United States Government Department or Agency (hereinafter Department or Agency) responsible for
the classification of information or last granting me a security clearance that such disclosure is permitted. I understand that if
I am uncertain about the classification status of information, I am required to confirm from an authorized official that the
informationis unclassified before I may disclose it, except to a person as provided in (a) or (b), above. I further understand that
I am obligated to comply with laws and regulations that prohibit the unauthorized disclosure of classified information.
4. 1 have been advised that any breach of this Agreement may result in the termination of any security clearances I hold;
removal from any position of special confidence and trust requiring such clearances; or termination of my employment or other
relationships with the Departments or Agencies that granted my security clearance or clearances. In addition, I have been
advised that any unauthorized disclosure of classified information by me may constitute a violation, or violations, of United
States criminal laws, including the provisions of Sections 641,793,794,798, '952 and 1924, Title 18, United States Code, *the
provisions of Section 783(b), Title 50, United States Code, and the provisions of the Intelligence Identities Protection Act of
1982. 1 recognize that nothing in this Agreement constitutes a waiver by the United States of the right to prosecute me for any
statutory violation.
5. 1 hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will
result or may result from any disclosure, publication or revelation of classified information not consistent with the terms of this
Agreement.
6. 1 understand that the United States Government may seek any remedy available to it to enforce this Agreement including,
but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement.
7. 1 understand that all classified information to which I have access or may obtain access by signing this Agreement is now
of the 'Jnited States Government unless and until otherwise determined
and will remain the property of, 01uti~iet'ihec ~ i i t i d
by an authorized official or final ruling of a court of law. I agree that I shall return all classified materials which have, or may
come into my possession or for which I am responsible because of such access: (a) upon demand by an authorized
representative of the United States Government; (b) upon the conclusion of my employment or other relationship with the
Department or Agency that last granted me a security clearance or that provided me access to classified information; or (c)
upon the conclusion of my employment or other relationship that requires access to classified information. If I do not return
such materials upon request, I understand that this may be a violation of Sections 793 andlor 1924, Title 18, United States
Code, a United States criminal law.
8. Unless and until I am released in writing by an authorized representative of the United States Government, I understanc
that all conditions and obligations imposed upon me by this Agreement apply during the time I am granted access to classified
information, and at all times thereafter.
9. Each provision of this Agreement is severable. If a court should find any provision of this Agreement to be unenforceab!e
all other provisions of this Agreement shall remain in full force and effect.
(Continue on reverse.)
11. Ihave read this Agreement carefully and my questions, if any, have been answered. I acknowledge that the briefing officer
has made available to me the Executive Order and statutes referenced in this agreement and its implementing regulation (32
CFR Section 2003.20) so that Imay read them at this time, if I so choose.
SIGNATURE DATE SOCIAL SECURITY NUMBER
(See Notice below)
I I
ORGANIZATION (IF CONTRACTOR. LICENSEE. GRANTEE OR AGENT. PROVIDE: NAME. ADDRESS. AND. IF APPLICABLE. FEDERAL SUPPLY CODE NUMBER)
(Type or PW
WITNESS ACCEPTANCE
THE EXECUTION OF THlS AGREEMENT WAS WITNESSED THE UNDERSIGNED ACCEPTEDTHIS AGREEMENT ON
BY THE UNDERSIGNED. BEHALF OFTHE UNITED STATES GOVERNMENT.
SIGNATURE DATE SIGNATURE DATE
I
NAME AND ADDRESS (Type orpnnt) NAME AND ADDRESS rm or prinl)
I
NAME OF WITNESS (Type orprino SIGNATURE OF WITNESS
NOTICE: The Privacy Act, 5 U.S.C. 552a, requires that federal agencies inform individuals, at h e time information is solicited from them, whether the disdosure
is mandatory or voluntary, by what authority such information is solicited, and what uses will be made of the informafion.You are hereby advised that authority
for soliciting your Social Seciirity Account Number (SSN) is Executive Order 9397. Your SSN will be used to identify you precisely when it is necessary to 1)
certify that you have access to the informationindicatedabove or 2) determine that your access to the information indicated has terminated. Although disdosure
of your SSN is not mandatory, your failure to do so may impede the processing of such certifications or determinations, or possibly result in the denial of your
beino
- 0 "
aranted access to classified
-- - information.