Dhs Instruction Handbook 121-01-007 the Department of Homeland Security Personnel Suitability and Security Program

Total Page:16

File Type:pdf, Size:1020Kb

Dhs Instruction Handbook 121-01-007 the Department of Homeland Security Personnel Suitability and Security Program DHS DIRECTIVES INSTRUCTION HANDBOOK DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM APPROVAL DATE: JUNE 2009 DEPARTMENT OF HOMELAND SECURITY OFFICE OF THE CHIEF SECURITY OFFICER Instruction # 112-01-007 Revision # 00 DHS DIRECTIVES INSTRUCTION HANDBOOK TABLE OF CONTENTS DHS INSTRUCTION HANDBOOK 121-01-007 THE DEPARTMENT OF HOMELAND SECURITY PERSONNEL SUITABILITY AND SECURITY PROGRAM ......................... i TABLE OF CONTENTS .................................................................................................. ii CHAPTER I, General ...................................................................................................... 1 CHAPTER 2, Federal Employee/Applicant Suitability Requirements ....................... 8 1. Suitability Risk Assessment: ................................................................................. 8 2. Suitability Investigative Requirements: ................................................................. 9 3. Suitability Adjudicative Criteria: ............................................................................ 9 CHAPTER 3, Excepted Service Federal Employee and Contractor Employee Fitness Requirements ................................................................................................. 14 1. Fitness Risk Assessment: .................................................................................. 14 2. Fitness Investigative Requirements: ................................................................... 15 3. Fitness Adjudicative Criteria: .............................................................................. 15 CHAPTER 4, Security Clearance Requirements ....................................................... 20 1. Position Sensitivity Designation: ......................................................................... 20 2. Investigative Requirements: ............................................................................... 21 3. Access to Classified Information: ........................................................................ 23 CHAPTER 5, State, Local, and Private Sector Program Requirements .................. 25 1. Eligibility for State, Local, and Private Sector: .................................................... 25 2. Eligibility for State and Local Personnel to Gain Top Secret Clearances and/or Access to SCI: .................................................................................................... 25 3. Specific Criteria for Granting Top Secret Clearances and/or Access to SCI: ..... 26 4. Extended Absences: ........................................................................................... 27 5. Denial or Revocation of a Security Clearance: ................................................... 27 6. Reinvestigations: ................................................................................................ 27 CHAPTER 6, Suspension, Denial, and Revocation of Access to Classified Information .................................................................................................................. 28 1. Denial or Revocation of Security Clearance: ...................................................... 28 2. Deciding Authority: ............................................................................................. 28 3. Notice of Determination: ..................................................................................... 29 4. Notice of Review: ................................................................................................ 31 5. Suspension of Access to Classified Information: ................................................ 32 CHAPTER 7, General Personnel Security Program Requirements ......................... 34 1. General Personnel Security Program Requirements: ......................................... 34 APPENDIX A, Investigation Matrix ........................................................................... A-1 APPENDIX B, Definitions .......................................................................................... B-1 ii Instruction # 112-01-007 Revision # 00 CHAPTER 1, GENERAL I. Purpose This Instruction establishes procedures, program responsibilities, minimum standards, and reporting protocols for the Department of Homeland Security (DHS) Personnel Suitability and Security Program. It does not prohibit any DHS Component from exceeding the requirements. This Instruction implements the authority of the Chief Security Officer (CSO) under DHS Directive 121-01. The Office of the Chief Security Officer (OCSO) is actively involved in the multiple U.S. Government Executive Branch initiatives to revise and consolidate the Personnel Suitability and Security programs. Accordingly, this Instruction will be revised as new Executive Orders and implementing guidance are issued. II. Scope This Instruction applies throughout DHS (except where exempt by statute), to DHS covered individuals (e.g., federal employees, applicants, excepted service federal employees, and contractor employees) providing support to DHS and who require unescorted access to DHS-owned facilities, DHS-controlled facilities, or commercial facilities operating on behalf of DHS; access to DHS information technology (IT) systems and the systems’ data; or access to national security information. This Instruction defines the minimum standards for the DHS Personnel Suitability and Security Program, but does not prohibit any Component from exceeding these requirements based on mission or potential for adverse impact on National Security. Requests to lower any of the minimum standards set forth in this Instruction must be approved by the DHS CSO. DHS Management Directive 11048, Suspension, Denial, and Revocation of Access to Classified Information and Management Directive 11050.2 , Personnel Security and Suitability Program are hereby canceled. (Note: This Instruction does not address procedures for implementing Homeland Security Presidential Directive (HSPD) 12 - Policy for a Common Identification Standard for Federal Employees and Contractors. Procedures for HSPD -12 will be the subject of a separate Instruction.) III. Authorities A. Title 5, United States Code, Section 552(a), “Records maintained on individuals” [The Privacy Act of 1974, as amended] B. Title 5, United States Code (U.S.C.), Section 7532, “Suspension and 1 Instruction # 121-01-007 Revision # 00 removal” C. Executive Order 10450, as amended, “Security Requirements for Government Employment,” April 27, 1953 D. Executive Order 10577, as amended, “Amending the Civil Service Rules and Authorizing a New Appointment System for the Competitive Service,” November 22, 1954 E. Executive Order 12829, as amended, “National Industrial Security Program”, January 6, 1993 F. Executive Order 12958, as amended, “Classified National Security Information,” April 17, 1995 G. Executive Order 12968, as amended, “Access to Classified Information,” August 2, 1995 H. Executive Order 13311, as amended, “Homeland Security Information Sharing,” July 29, 2003 I. Executive Order 13467, as amended, “Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information,” June 30, 2008 J. Executive Order 13488, “Granting Reciprocity on Excepted Service and Federal Contractor Employee Fitness and Reinvestigating Individuals in Positions of Public Trust,” January 16, 2009 K. Title 5, Code of Federal Regulations, Part 731, “Suitability” L. Title 5, Code of Federal Regulations, Part 732, “National Security Positions” M. Title 5, Code of Federal Regulations, Part 736, “Personnel Investigations” N. Title 5, Code of Federal Regulations, Part 5, “Regulations, Investigation and Enforcement (Rule V)” O. Title 5, Code of Federal Regulations, Part 752, “Adverse Actions” P. Title 6, Code of Federal Regulations, Section 7.10, “Authority of the Chief Security Officer, Office of Security” Q. Title 32, Code of Federal Regulations, Part 147, “Adjudicative Guidelines for Determining Eligibility for Access to Classified Information” 2 Instruction # 121-01-007 Revision # 00 R. Federal Acquisition Regulation (FAR), Part 4.4, “Safeguarding Classified Information within Industry” S. Homeland Security Acquisition Regulation (HSAR), Part 3004.470, Security requirements for access to unclassified facilities, Information Technology resources and sensitive information” T. National Security Affairs memorandum, “Adjudicative Guidelines for Determining Eligibility for Access to Classified Information,” December 29, 2005 U. Delegation of Authorities from the Assistant Deputy Director of National Intelligence for Security to Chief Security Officer, Department of Homeland Security, March 13, 2006 V. DHS Delegation 0102, “Delegation to Deputy Secretary – Procedures for Access to Classified Information” W. DHS-Delegation 8001, “Delegation to the Chief, Office of Security, for Security Clearances of DHS Personnel” X. DHS Sensitive Systems Handbook 4300A, Version 5.5, September 30, 2007 Y. DHS Sensitive Systems Policy Directive 4300A, September 20, 2007 IV. Definitions Personnel security terms and definitions pertaining to this Instruction are located in Appendix B. V. Responsibilities A. The Chief, Personnel Security Division, Office of Security, is responsible for: 1. Issuing Department-wide policy for the management and operation of the Personnel Suitability and Security Program. 2. Evaluating and reporting effectiveness
Recommended publications
  • Additional Documents and Instructions
    Additional Documents and Instructions Lockheed Martin Waiver o Please read page 3 of this document, print, sign and return to LMSecurity by following the instructions on page 2. Drug Statement Form o Please read page 4 of this document, print, sign and return to LMSecurity by following the instructions on page 2. Counterintelligence Polygraph Examination Form o Please read page 5 of this document, print, sign and return to LMSecurity by following the instructions on page 2. Reporting Requirements and General Information Document o Please read the Reporting Requirements and General Information on pages 6-7 of this document, and keep it for your reference during the investigation process. Proof of U.S. Citizenship (Do NOT send original) o Please send a copy of one of the acceptable documents listed below: ▪ Original Birth Certificate or Certified Copy of Birth Certificate ▪ Passport – Current or Expired ▪ Certificate of Citizenship issued by the Immigration & Naturalization Service (INS) ▪ Report of Birth Abroad of a U.S. Citizen of the U.S. (form FS240) ▪ Record of Military Processing (DD1966) ▪ Hospital Certificate of Birth containing raised seal of registrar’s office ▪ Certificate of Naturalization ▪ U.S. Passport card issued by the U.S. Department of State for entry by U.S. citizens into the U.S. from Canada, Mexico, and countries of the Caribbean and Bermuda at land border crossings or sea ports-of-entry, current or expired DD214 (Do NOT send original) o Please send a copy of your DD214 for military discharge (if applicable). Relatives (Do NOT send original) o Please send a copy of any Certificates of Citizenship issued by the Immigration & Naturalization Service for your immediate family members (if applicable).
    [Show full text]
  • Security Clearance Determinations
    Fiscal Year 2017 Annual Report on Security Clearance Determinations CONTENTS INTRODUCTION .......................................................................................................................... 2 EXECUTIVE SUMMARY ............................................................................................................... 3 METHODOLOGY ......................................................................................................................... 3 SECURITY CLEARANCE VOLUME FOR THE ENTIRE FEDERAL GOVERNMENT .............................. 3 Table 1.1, Eligible (in access), ........................................................................................ 4 Table 1.2, Eligible (not in access) ................................................................................... 4 Table 1.3, Total Eligibility .............................................................................................. 5 Table 2, Number of Security Clearance Approvals ........................................................ 5 SECURITY CLEARANCE PERFORMANCE FOR EACH ELEMENT OF THE IC .................................... 6 Table 3, Processing Timeliness ....................................................................................... 6 Table 4, Age Pending ...................................................................................................... 7 Table 5, Denials and Revocations ................................................................................... 7 Table 6, Delays More Than 1 Year for Government
    [Show full text]
  • How the Government Security System Works
    How the Government Security System Works Contributed by CRTC Member, Carl Strobel— President, FiberPlus, Inc. The United States government, along with most governments of the world, has a system to prevent the disclosure of information if that disclosure would harm national security. The system is simple in concept but can be complex in its actual operation. We’re going to look at the two aspects of the system : I. Security classifications assigned to information II. Clearances that allow individuals to have access to that information. Incidentally, the term information is used here in its broadest sense. It can mean the contents of an intelligence report, plans for a special building, access to a piece of advanced equipment, knowledge of sensitive operations, techniques used to gather intelligence and much more. There are three classifications – Confidential, Secret and Top Secret – which are assigned according to the seriousness of the damage to national security that could result from disclosure to the wrong people – actual or potential enemies of the United States. Confidential is the lowest classification. It is applied to information whose disclosure would “damage” national security. It might be applied, for example, to an intelligence agency’s internal telephone directory that lists the names and offices of people working there. Secret means the information would cause “serious damage.” One example could be plans to conduct a tactical combat operation. The plans would cover only an operation in a limited area for a very limited period of time but premature disclosure could hurt the success of the operation. Top Secret is the highest level and means the information could cause “exceptionally grave damage” or “loss of life” if disclosed.
    [Show full text]
  • Standard Form 86, Questionnaire for National Security Positions
    Standard Form 86 Form approved: Revised November 2016 QUESTIONNAIRE FOR OMB No. 3206 0005 U.S. Office of Personnel Management 5 CFR Parts 731, 732, and 736 NATIONAL SECURITY POSITIONS Follow instructions completely or your form will be unable to be processed. If The Investigative Process you have any questions, contact the office that provided you the form. Background investigations for national security positions are conducted to All questions on this form must be answered completely and truthfully in gather information to determine whether you are reliable, trustworthy, of good order that the Government may make the determinations described below on conduct and character, and loyal to the U.S. The information that you provide a complete record. Penalties for inaccurate or false statements are discussed on this form may be confirmed during the investigation. The investigation may below. If you are a current civilian employee of the federal government: extend beyond the time covered by this form, when necessary to resolve failure to answer any questions completely and truthfully could result in an issues. Your current employer may be contacted as part of the investigation, adverse personnel action against you, including loss of employment; with although you may have previously indicated on applications or other forms respect to Sections 23, 27, and 29, however, neither your truthful responses that you do not want your current employer to be contacted. If you have a nor information derived from those responses will be used as evidence security freeze on your consumer or credit report file, then we may not be against you in a subsequent criminal proceeding.
    [Show full text]
  • Defense Community United on Edward Snowden Case
    DEFENSE COMMUNITY UNITED ON EDWARD SNOWDEN CASE Security Cleared Professionals Brace for Fallout, Delays in Clearance Process NEW YORK, NY August 7, 2013 -- The defense community is united in the case of Edward Snowden, the former National Security Agency contractor now facing U.S. espionage charges. According to a new survey conducted by ClearanceJobs.com, the leading online career network for professionals with an active federal security clearance, 75 percent of security cleared professionals believe Mr. Snowden’s disclosures have been harmful to national security. The security cleared community is much more unified than the nation at large. When asked if they agree with Snowden’s position that the American people have a right to know about the government’s surveillance tactics, 70 percent of security cleared professionals said no, they do not agree with Snowden’s claims that his disclosures were an act of conscience. On the issue of asylum, if the decision was theirs, 83 percent of security cleared professionals would not offer Mr. Snowden protection. The majority (55%) of the respondents, most of whom identified themselves as government contractors, said they believe the U.S. government has become too relaxed when it comes to granting access to sensitive data, while 28 percent disagree with that statement. The response was mixed on the question of whether the security clearance investigation and adjudication process is a flawed one. Forty-four percent said “no,” another 26 percent said “yes” and 30 percent were unsure. When those who believe the process is flawed were asked why, the top responses were: The security clearance questionnaire needs to ask questions to better reflect modern concerns; Workloads are too heavy for a limited number of investigators; and The steps the government has taken to speed up the process have created lax reviews.
    [Show full text]
  • The NISPPAC Held Its Thirtieth Meeting on Thursday, May 15,2008, at 10:00 A.M., at the National Archives Building, 700 Pennsylvania Avenue, N.W., Washington, D.C
    NATIONAL INDUSTRIAL SECURITY PROGRAM POLICY ADVISORY COMMITTEE (NISPPAC) MINUTES OF THE MEETING The NISPPAC held its thirtieth meeting on Thursday, May 15,2008, at 10:00 a.m., at the National Archives Building, 700 Pennsylvania Avenue, N.W., Washington, D.C. William J. Bosanko, Director, Information Security Oversight Office (ISOO) chaired the meeting. The meeting was open to the public. The following members were present: William J. Bosanko (Chair) Dennis Hanratty (National Security Agency) William Davidson (Department of the Air Sean Carney (Department of the Navy) Force) Lisa Gearhart (Department of the Army) John Czajkowski (Office of Personnel Management) - Observer George Ladner (Central Intelligence Agency) Kimberly Baugher (Department of State) Eric Dorsey (Department of Commerce) Chris Beals (Industry) Stephen Lewis (Department of Defense) Richard Lee Engel (Industry) John Fitzpatrick (Office of the Director of Sheri Escobar (Industry) National Intelligence) Kathy Watson (Defense Security Service) Kent Hamilton (Industry) Barbara Stone (Department of Energy) Douglas Hudson (Industry) John Young (Department of Homeland Timothy McQuiggan (Industry) Security) Gerald Schroeder (Department of Justice) Daniel E. Shlehr (Industry) A. Welcome, Introductions, and Administrative Matters - The Chair greeted the membership and attendees. The Chair introduced himself as the new Director of ISOO and as the third Chair of the NISPPAC. He acknowledged the contributions of the prior Chairs, Industry and Government members, as well as the ISOO staff. The Chair stated his intention to promote the improvement of the NISP to the benefit of Industry and Government. In the coming months, the Chair stated that he would hold meetings with the Government and Industry members, as well as representatives from the Memorandum of Understanding (MOU) organizations, in order to hear concerns, better understand the challenges, and gather ideas with respect to the program.
    [Show full text]
  • Administration of Donald J. Trump, 2018 Statement on the Revocation
    Administration of Donald J. Trump, 2018 Statement on the Revocation of the Security Clearance of Former Director of the Central Intelligence Agency John O. Brennan August 15, 2018 As the head of the executive branch and Commander in Chief, I have a unique, Constitutional responsibility to protect the Nation's classified information, including by controlling access to it. Today, in fulfilling that responsibility, I have decided to revoke the security clearance of John Brennan, former Director of the Central Intelligence Agency (CIA). Historically, former heads of intelligence and law enforcement agencies have been allowed to retain access to classified information after their Government service so that they can consult with their successors regarding matters about which they may have special insights and as a professional courtesy. Neither of these justifications supports Mr. Brennan's continued access to classified information. First, at this point in my administration, any benefits that senior officials might glean from consultations with Mr. Brennan are now outweighed by the risks posed by his erratic conduct and behavior. Second, that conduct and behavior has tested and far exceeded the limits of any professional courtesy that may have been due to him. Mr. Brennan has a history that calls into question his objectivity and credibility. In 2014, for example, he denied to Congress that CIA officials under his supervision had improperly accessed the computer files of congressional staffers. He told the Council of Foreign Relations that the CIA would never do such a thing. The CIA's Inspector General, however, contradicted Mr. Brennan directly, concluding unequivocally that agency officials had indeed improperly accessed congressional staffers' files.
    [Show full text]
  • Leveraging Emerging Technologies in the Security Clearance Process
    LEVERAGING EMERGING TECHNOLOGIES IN THE SECURITY CLEARANCE PROCESS INTELLIGENCE AND NATIONAL SECURITY ALLIANCE SECURITY POLICY REFORM COUNCIL MARCH 2014 ACKNOWLEDGEMENTS INSA CHAIRMAN John Ellingson, Skeptical Systems Ambassador John Negroponte Judith Grabski, Thomson Reuters Special Services INSA SENIOR INTELLIGENCE ADVISOR Bob Harney, ManTech International Charlie Allen Darrell Lloyd, The SI Organization, Inc. INSA SENIOR NATIONAL SECURITY ADVISOR Adam Lurie, Social Intelligence Corp. Ambassador Bob Joseph Fred Riccardi, ManTech International Charlie Sowell, Salient Federal Solutions INSA STAFF Ambassador Joe DeTrani, INSA President Individual contributions/attendance by Army, CIA, DSS, NCIX/ODNI, NSA and USD(I) Chuck Alsup, INSA Vice President for Policy Jeff Lavine, INSA Director of Administration & Management APPENDIX WRITING TEAM Randy Fort, Raytheon Company (Principal Author) Nate Brown, INSA Fellow Adam Lurie, Social Intelligence Corp. Kelly Evans, INSA Intern COPY EDITOR SECURITY POLICY REFORM COUNCIL (SPRC) LEADERSHIP ** Beth Finan Charlie Allen, INSA; Chertoff Group Kathy Pherson, Pherson Associates, LLC EDITORIAL REVIEW Joe Mazzafro, Computer Sciences Corporation SPRC’S SUBCOMMITTEE ON CONTINUOUS MONITORING ** Participation on the Council or Subcommittee does not imply AND EVALUATION ** personal or official endorsement of the views in the paper by any Mitch Lawrence, USIS (Subcommittee Chairman) members or their respective parent organization(s). Kathy Pherson, Pherson Associates, LLC (SPRC Oversight) Tabetha Chandler, Facility Technology Services, Inc. Edie Curry, Palaxar Group, LLC Bill Davidson, KeyPoint Government Solutions Art Davis, Booz Allen Hamilton INSA SUPPORTS A HEALTHY PLANET Linda Dei, ASM Research INSA White Papers are printed on recycled paper that is 50% recycled content including 25% post consumer waste. We have a unique opportunity to make long overdue adjustments to the security clearance process.
    [Show full text]
  • SECURITY CLEARANCE RECIPROCITY: Obstacles and Opportunities
    SECURITY CLEARANCE RECIPROCITY: Obstacles and Opportunities INTELLIGENCE AND NATIONAL SECURITY ALLIANCE Security Policy Reform Council June 2019 ACKNOWLEDGEMENTS INSA expresses its appreciation to the INSA members and staff who contributed their time, expertise, and resources to develop this report. INSA MEMBERS INSA STAFF Mary Edington, KPMG Chuck Alsup, President Jeremy Erb, Deloitte Larry Hanauer, Vice President for Policy Laurel Pearson Lloyd, Peraton Peggy O’Connor, Director, Communications and Policy Kathy Pherson, Pherson Associates Ehrl Alba, Digital Marketing Manager Gregory Torres, Booz Allen Hamilton EXECUTIVE SUMMARY The movement of personnel with a security clearance across employers, federal contracts, and the Federal Government, is a common practice. However, government agencies’ policies, practices, and resource allocations impede the ability to move cleared federal contractors and federal employees from one agency to another, a practice primarily referred to as reciprocity. Delays caused by misinterpretation of policies and bureaucratic inefficiencies prevent cleared contractors from effectively executing their contracts and deprive the government of labor needed to advance critical national security missions. Reciprocity delays also result in unnecessary overhead costs for contractors that translate into higher contract rates. Although it is hard to quantify the impact, a rough calculation suggests that delays caused by administrative inefficiencies result each year in the loss of 1,000 contractor labor-years with a total value of $2 billion in the Intelligence Community alone. The cost to the federal government as a whole could approach 90,000 lost contractor labor- years valued at more than $8 billion. Adding the value of federal employees’ lost productivity would drive these figures even higher.
    [Show full text]
  • For Taking a Security Clearance Polygraph Eliminating the Stress from the Security Clearance Screening Test
    5 RULES FOR TAKING A SECURITY CLEARANCE POLYGRAPH ELIMINATING THE StrESS FROM THE SECURITY CLEARANCE SCREENING TEST polygraph is a sweat-inducing, made-for-TV spectacle that even A the government considers to have dubious results (there is a reason polygraph findings aren’t admissible in court). But individuals in national security careers have to put aside their concerns about the reliability of a lie detector machine. Whether you’re applying for a job with the border patrol or as a CIA agent, a number of cleared careers require a successfully completed polygraph examination. The vast majority of both Secret and Top Secret security cleared positions do not require a polygraph. A variety of Sensitive Compartment Information (SCI) and Special Access Program (SAP) positions require a successful polygraph, in addition to the completion of a Single Scope Background Investigation (SSBI). If you’re facing a security clearance polygraph screening, it’s helpful to know what to expect— not so you can learn countermeasures, or try to “beat” the system—but so you can eliminate one of the greatest aspects the exam tests for: fear. So, wipe the sweat from your hands; here are the three things you need to know about a security clearance polygraph and five rules for a no-sweat test. 5 Rules for Taking a Security Clearance Polygraph 1 3 Things to Know About a Security Clearance Polygraph 1 Not all polygraphs are created equally. There are two primary types of security clearance polygraph: the Counterintelligence (CI) and Lifestyle polygraph. COUNTERINTELLIGENCE: Covers questions of espionage, sabotage, and terrorist activities.
    [Show full text]
  • Civilian Jobs That Require Security Clearance
    Civilian Jobs That Require Security Clearance Heavy-armed Juanita exteriorises apolitically while Isaac always reinvents his sluggishness exaggerates livelily, he grudging so operosely. Uncaught Shelby placate parliamentarily. Supererogatory Engelbart traverses cold. An accommodation issues in cases when you do it suffices in this credential required clearance that require security clearance jobs Employersboth civilian contractors and governmental agenciesbecause it. Do jobs check your Internet history? Top the Public TrustOther Required None in Family. In particular they are able to you need to converse with a land a variety of their requirements that investigators will issue. You have requirements that require more job requiring security clearance jobs on previous investigations bureau of civilians, civilian positions require. Where can cause. A light most jobs that require security clearance are government or military positions many civilian contractors in industries related to government work. Who issues and present employer and degree of the candidate on the hiring processes, that security clearance work in. What jobs that you with. The required to require a defense. For jobs require different requirement for any required for adequacy and requires a security risk? Marketing your security clearance within a resume makes you deploy eligible. The civilian employers that requires you might have access can target of civilians, requiring classified information? Lack quite a clearance shouldn't stop blood from seeking a foreign that requires one. EO 10450 established that the appointment of officer civilian. Public trust positions that fall under opm. The job that a form. Interim Secret clearances can be granted in much few days once the clearance granting authority.
    [Show full text]
  • (U) Audit Report of Intelligence Community Security Clearance Reciprocity
    Approved for release by ODNI on 03-29-19, FOIA Case DF-2013-00156 UNCLASSIFIED//FOR OFFICIAL USE ONLY Office of the Inspector General of the Intelligence Community (U) Audit Report of Intelligence Community Security Clearance Reciprocity Report Number IC IG-AUD-2012-005 December 2012 Important Notice This report contains information that the Office of the Inspector General of the Intelligence Community has determined is confidential, sensitive, or protected by Federal Law, including protection from public disclosure under the Freedom of Information Act (FOIA) 5 USC § 552. Recipients may not further disseminate this information without the express permission of the Office of the Inspector General of the Intelligence Community personnel. Accordingly, the use, dissemination, distribution or reproduction of this information to or by unauthorized or unintended recipients may be unlawful. Persons disclosing this information publicly or to others no having an officials need to know are subject to possible administrative, civil, and/or criminal penalties. This report should be safeguarded to prevent improper disclosure at all times. Authorized recipients who receive requests to release this report should refer the requestor to the Office of the Inspector General of the Intelligence Community. UNCLASSIFIED//FOR OFFICIAL USE ONLY Approved for release by ODNI on 03-29-19, FOIA Case DF-2013-00156 UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) Table of Contents I. (U) EXECUTIVE SUMMARY ...............................................................................
    [Show full text]