DoD R, “Department o£ Defense Personnel Security Program,” December , is hereby canceled as of December 31, DoD M – National Industrial Security Program Operating Manual. ( NISPOM) DoD R – Personnel Security Program. DOD R: DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM.
|Published (Last):||28 January 2015|
|PDF File Size:||4.13 Mb|
|ePub File Size:||16.45 Mb|
|Price:||Free* [*Free Regsitration Required]|
The adjudicative guideline specifies that foreign contacts and interests may be a security concern under the following circumstances: The individual “has divided loyalties or foreign financial interests”; The individual “may be manipulated or induced to help a foreign person, group, organization or government in a way that is not in U. The vast majority of juvenile offenders get into trouble only once or twice and they stop offending as they mature. Information is used to meet regulatory requirements when granting access to information systems and to maintain a repository of personnel who have been granted access.
Personal Conduct Conduct involving questionable judgment, lack of candor, dishonesty or unwillingness to comply with regulations can raise questions about an applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
If they do not respect the rules on use of illegal substances, they may not respect the rules for protection of classified information. Military Security Clearances Military deployments almost always require that the service member An applicant must be of unquestioned allegiance to the United States.
Although adverse information concerning a single criterion may not be sufficient for an unfavorable determination, the individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility or emotionally unstable behavior.
It is principally an Allegiance issue when an American citizen uses force or violence in seeking to overthrow or influence the U.
Any failure to provide truthful and candid answers during the security clearance process is of particular interest.
DoD R, “Personnel Security Program,” 1/
A source’s impressions, opinions or interpretations are useful to investigators as cod to things that require further investigation, but they are generally not used as a basis for adjudicative action unless they are substantiated by examples of specific behaviors.
The individual’s age and maturity at the time of the conduct.
Most scientific research and past espionage cases show that the connection between sexual behavior and personnel security is far more complex than the simple notion that “normal” sex is acceptable and “nonconforming” sexual practices are a security risk. Sexual Behavior Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
DOD 5200.2-R PDF
For example, a source’s opinion that the subject is irresponsible should be substantiated by description of specific examples of the subject’s irresponsibility, such as moving out of a rental apartment without notice. They can steal information, change information or destroy information in automated file systems while sitting at their desk and doing nothing that appears out eod the ordinary to casual observers.
It impairs judgment, reduces inhibitions, and increases any tendency dood aggression. As we store more and more information in computer dof and as these databases become more closely linked in networks, more people have broader access to more classified and other sensitive information than ever before. Notwithstanding the whole-person concept, pursuit of further investigation may be terminated by an appropriate adjudicative agency in the face of reliable, significant, disqualifying, adverse information.
DOD Adjudicative Elements – Security Clearance
Psychological Conditions Mental health is a security concern because it influences how a person perceives the world, makes decisions and manages stress. One knowledgeable source who reports credible adverse information may outweigh many acquaintances who claim never to have seen evidence of such behavior.
Sexual orientation or preference may not be used as a basis for disqualification in adjudicating eligibility for security clearance. In order to make this determination, a personnel security background investigation is conducted. If adverse information comes from a single source, it is necessary to evaluate both the credibility of the source’s access to that information and any possible ulterior motives for providing that information. doe
The Personal Conduct adjudicative guideline covers unreliable or untrustworthy behavior not considered under other guidelines, or which falls below the threshold for action under any other single guideline. The nature, extent, and seriousness of the conduct. The ultimate determination of whether the granting or continuing of eligibility for a security clearance is clearly consistent with the interests of national security must be an overall common sense judgment based upon careful consideration of the 13 adjudicative guidelines, each of which is to be evaluated in the context of the whole person.
Thus, the applicant clearance process must focus on risk factors that indicate a potential for future betrayal as well as current loyalty. Physical and electronic access are limited to persons responsible for servicing and authorized to use the system.
There have been numerous cases of such malicious behavior by disgruntled IT professionals with some level of administrative access to a government or corporate system. Sexual behavior that involves a criminal offense; indicates a personality or emotional disorder; reflects a lack of judgment or discretion; or may subject an applicant to undue influence or coercion, exploitation or duress can raise questions about the applicant’s reliability, trustworthiness and ability to protect classified national security information CNSI.
The term information technology systems as used here includes all computer hardware, software, firmware, networks and data used for the communication, transmission, processing, manipulation, storage or protection of information. The Adjudicative Process The adjudicative process is an examination of a sufficient period of a person’s life to make 5200.2–r affirmative determination that the person is an acceptable security risk.
A person’s strengths are evaluated to assess whether the strengths outweigh the weaknesses. The information collected must be sufficient to allow an affirmative or negative determination of a person’s eligibility for access to classified information. It follows that such information will be known to few people, and that these are likely to be close associates such as family members, lovers, best friends, teammates or close work colleagues.