SAPPC - Personnel Security Flashcards

1
Q

Five Elements of the Personnel Security Program (PSP)

A
Designation
Investigation
Adjudication
Reinvestigation
Continuous Evaluation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Designation

A

An assessment of a position’s potential impact on the national security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Investigation

A

An inquiry made by an authorized investigative agency into an individual’s activities for the purpose of making a personnel security determination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adjudication

A

Judgment concerning security clearance eligibility made by evaluating the information in the Personnel Security Investigation (PSI) with DoD standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Reinvestigation

A

Done at certain intervals based on duties or access and as part of the Continuous Evaluation Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Continuous Evaluation

A

Used to monitor employees for new information or changes that could affect status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Privacy Act of 1974

A

Regulates the federal government’s authority to collect personal information on an individual and limits the use of information collected for specific purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Purpose of the Personnel Security Program

A

To make a reasonable determination that individuals grated access to classified information or assigned to sensitive positions are and will remain loyal, trustworthy and reliable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two elements of National Security

A

National Defense

Foreign Relations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hatch Act

A

Requires federal employees to be loyal to the United States

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Executive Order 12968

A

Standardizes procedures for DoD personnel security policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security Clearance Eligibility

A

A favorable determination that an individual is eligible for access to classified information or assignment to sensitive duties at specific levels prior to access being granted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who controls Access?

A

Always controlled by the holder of the information. Ensures the person seeking access has the proper security clearance eligibility and a valid need to know in order to carry out official duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Designation/Position - Special Sensitive

A
  • Civilian national security position
  • Potential for inestimable damage to national security
  • Includes eligibility/access to SCI and SAP
  • Can be any civilian position the DoD Component head determines to be at higher level than critical-sensitive due to special requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Designation/Position - Critical Sensitive

A
  • Civilian national security position
  • Potential to cause exceptionally grave damage to national security
  • Includes Top Secret access, Fiduciary duties (obligation, expenditure, collection or control of revenue, funds, or items with value over $50 million)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Designation/Position - Noncritical Sensitive

A
  • Civilian national security position
  • Potential to cause significant or serious damage to national security
  • Includes access to Confidential, Secret, or DOE “L”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Designation/Position - Nonsensitive

A
  • No sensitive job duties and/or need for access to classified information
  • Position does not have the potential to adversely impact national security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Restrictions of Limited Access Authorization (LAA)

A
  • Investigative requirement is a Tier 5
  • Access is limited to the approved program or project
  • Access outside of the approved program or project is a compromise and must be handled as such
  • Info must be releasable to the applicant’s home country
  • Access is limited to Secret information or lower
  • Can be civilian, military, or contractor personnel
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Limited Access Authorization (LAA)

A

Authorization for non-U.S. citizen to be granted access to classified information. Non-US citizens are not granted security clearance eligibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Examples of Positions Not Requiring Access to Classified Information that may require a security investigation

A

Red Cross and/or United Service Organizations personnel

Non-U.S. citizens employed by DoD components overseas

Personnel occupying some IT or related positions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nuclear Personnel Reliability Program (PRP)

A

Ensures each person performing duties associated with nuclear weapons or nuclear command and control systems and equipment is emotionally stable, physically capable and has demonstrated reliability and professional competence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Restricted Data

A
  • All information concerning the design, manufacture, or use of atomic weapons, the production of special nuclear material, or the use of special nuclear material in the production of energy
  • An additional warning notice of special handling requirements
  • Not a Special Access Program or a classification category
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Requirements of Critical Nuclear Weapon Design Information (CNWDI)

A
  • Access limited to the absolute minimum of people who need it to accomplish their job duties
  • Minimum required security clearance is Top Secret or Secret
  • Except in rare instances, U.S. citizenship is required for access
  • Exceptions granted by the Secretary of Defense or designee
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Name 5 of the 9 areas SAP programs cover

A

Special Access Programs
Presidential Support Activities
Nuclear Personnel Reliability Program (Nuclear PRP)
Sensitive Compartmented Information (SCI)
Nuclear Command and Control – Extremely Sensitive Information (NC2-ESI)
Chemical PRP
NATO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Name 3 of the 6 main duties of a Security Officer

A
  • Prepare and request personnel security investigations
  • Evaluate information for interim security clearances
  • Administer the continuous evaluation program
  • Train personnel on the requirements for the personnel security program
  • Conduct briefings for personnel on the necessity of protecting classified information
  • Assist in determining sensitivity for both access and assignment to sensitive duties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is included in an Initial briefing?

A
  • Importance of classified information
  • Proper ways to protect classified information
  • How to perform duties that require access
  • Potential security concerns with foreign intelligence services
  • Procedures to report any issue associated with the protection of classified information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is the purpose of the Annual/Refresher briefing?

A
  • Remind people of responsibilities under the personnel security program
  • Inform of any changes in the personnel security program since last briefing
  • Reinforce good security practices
  • Remind people of the continuing need to follow the rules
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the goals of the Insider Threat briefing?

A
  • Stress importance of detecting potential insider threat
  • Make individuals aware of insider threat indicators and reporting requirements
  • Provide information on methods used by adversaries to recruit trusted insiders
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is included in the Termination briefing?

A
  • How to protect classified information
  • How intelligence services may target personnel after they have left federal service
  • Legal obligation/requirements to protect classified information
  • Criminal penalties for unauthorized disclosure of information
  • How to report problems
  • The need for written approval from the agency before any disclosure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

e-Qip Process

A

The security office initiates a personnel security questionnaire using e-QIP.

The individual being investigated must complete the e-QIP.

The security office reviews and approves the questionnaire.

The security office forwards it to the NBIB or PSMO-I.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Clearance Process Steps/Phases

A
  1. Personnel security investigation (PSI) is initiated and completed on an individual
  2. PSI is forwarded to the Department of Defense Consolidated Adjudications Facility (DoD CAF)
  3. The DoD CAF reviews the information in the PSI and compares it to national adjudication standards
  4. The DoD CAF makes a determination and either grants a security clearance eligibility or not
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Personnel Security Investigation (PSI)

A
  • An inquiry into an individual’s background, activities, and personal behavior
  • Allows adjudicators to look closely at important information about an individual’s honesty, reliability, character, loyalty, and trustworthiness.
  • Used to determine the eligibility of an individual for access to classified information, acceptance or retention into the armed forces, assignment or retention in sensitive duties, or other designated duties requiring investigation.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When the federal government collects personal information from an individual, it is required that the
individual be informed of what four things?

A
  1. Authority - Under what authority is the government agent or representative collecting the information?
  2. Principle Purposes - The purpose for collecting the information.
  3. Routine Uses - The routine uses of the information.
  4. Voluntary or Mandatory Nature of Disclosure - Whether providing this information is voluntary or mandatory, and what would be the impact of choosing not to provide the information?
34
Q

Reciprocity

A

Refers to the mutual acceptance of a personnel security clearance eligibility by all government agencies, regardless of which agency issued the clearance

35
Q

When is a previously cleared individual subject to a new investigation or adjudication?

A
  1. The previous clearance eligibility was based on an outdated investigation
  2. New derogatory information has become available since the previous investigation
  3. There was a break of more than 24 months in the individual’s relationship with the DoD
  4. The previous investigation does not meet the
    scope required
36
Q

2 main components of DISS

A

DISS Portal

Case Adjudication Tracking System (CATS)

37
Q

Case Adjudication Tracking System (CATS)

A

Designated as the DoD Case Adjudication Tracking System for all non-intelligence activities. Used by DoD CAF adjudicators to review electronic PSIs completed by the National Background Investigations Bureau (NBIB). With CATS the adjudicator can record eligibility and can recommend access determinations.

38
Q

Requesting PSI Guidelines

A
  1. Limit PSI requests to personnel who are essential to current operations.
  2. Limit PSI requests on military personnel to those individuals with sufficient time left in the service to warrant conducting the investigation.
  3. Complete all request forms and required documentation properly and IAW instructions.
  4. Government personnel submit their e-QIP to the National Background Investigations Bureau (NBIB)
  5. Industry submits their request through Personnel Security Management Office for Industry (PSMO-I)
  6. Limit access through strict need-to-know.
  7. Keep priority case requests to a minimum – only
    authorized individuals may request a PSI.
39
Q

Who can request PSI?

A

Authorized individuals include:

  1. Military Departments
  2. Defense Agencies
  3. Organization of the Joint Chiefs of Staff
  4. Office of the Secretary of Defense
  5. Commanders of Unified and Specific Commands
  6. Requesters approved by the Deputy Under Secretary of Defense for Policy
40
Q

Who can waive investigative requirements for sensitive positions or access to classified information?

A

Military/Civilian Personnel
- Commander, agency head, head of the component or the adjudicative authority

Contractor Personnel
- Director, CI and Security Programs, Office of the Deputy Asst Sec of Defense (I&S), Office of General Counsel, Office of the Secretary of Defense

41
Q

PSI Type/Investigation Tier: Tier 5

A
Background Investigation and Reinvestigation
-Military, Contractors, and Civilians: 
Special-Sensitive positions 
Critical-Sensitive positions 
Top Secret clearance eligibility
SCI clearance eligibility
42
Q

Single Scope Background Investigation (SSBI) applies to whom?

A
Military, Contractors, and Civilians
• Special-sensitive positions 
• Critical-sensitive positions 
• Top Secret and SCI clearance eligibility
• IT-I duties
• LAA
43
Q

Access National Agency Check and Inquiries (ANACI) applies to whom?

A

Civilians
• Non Critical-Sensitive positions
• Secret or Confidential clearance eligibility
• IT-II duties

44
Q

National Agency Check with Law and Credit (NACLC) applies to whom?

A

Military and Contractors
• Secret or Confidential clearance eligibility
• All military accessions and appointments
• IT II duties
• IT III duties (military only)

45
Q

Phased Periodic Reinvestigation (PPR)

A

Military, Contractors, and Civilians

Phase 1: determines whether Phase 2 is necessary
Phase 2: only performed if Phase 1 yields issue-relevant information

*Same as SSBI-PR but more efficient

46
Q

What happens if the individual who is being investigated refuses to provide information or sign a release?

A

The processing may be halted. If the individual currently has a security clearance or is assigned to other sensitive duties, the CAF could start action to revoke the individual’s security eligibility.

47
Q

Purpose of an investigative report

A

Allows adjudicators to get a comprehensive view of the individual and to make a sound decision regarding the person’s suitability for a position of trust, eligibility for access to classified information, and entry or retention in the military or government service.

48
Q

Procedures to protect PSI and personnel security records

A
  1. An authorized requester is responsible for the control and accountability of any reports it receives.
  2. Any information regarding an individual’s personnel security clearance status must be protected.
  3. The reproduction of PSI reports is restricted to the minimum number of copies required to perform official duties.
  4. PSI reports must be stored in a secured container, such as a vault or safe.
  5. PSI reports must be sealed in double envelopes when being transmitted by mail or courier.
49
Q

Who has access to PSI records?

A

Outside of the DoD -
Released only with the specific approval of the investigative agency with authority over the reports.

Within the DoD -
Limited to designated DoD officials who require access for official personnel security duties. Subjects of PSIs may have access to their own PSI information.

50
Q

PSI Report Retention

A

Stored in DoD records repositories that are authorized to store PSI reports.

Favorable reports are destroyed after 15 years.

Reports of a minor derogatory nature are destroyed after 15 years.

Reports resulting in unfavorable administrative action or court-martial are destroyed after 25 years

51
Q

Disposition of PSI Reports

A

These reports are the property of the investigating organization and are provided to the requesting organization as a loan.

DoD recipient organizations requesting PSI reports may retain them for only the time necessary to fulfill the originally requested official purpose.

Stored in DoD records repositories that are authorized to store PSI reports

52
Q

Destruction of PSI Records

A

PSI reports must be destroyed in the same manner that is used for the destruction of classified information.

53
Q

NBIB

A

NBIB is the investigative agency that conducts personnel security investigations for the Department of Defense

54
Q

Suitability Adjudication

A

Determines suitability for federal employment

55
Q

List 3 Types of Adjudication

A

National Security Adjudication
Suitability Adjudication
Homeland Security Presidential Directive (HSPD) 12 Adjudication

56
Q

What is a PSI used to determine?

A

Access to classified information
Acceptance or retention to the armed forces
Assignment or retention to sensitive duties

57
Q

What DoD system is utilized to connect security personnel around the world?

A

JPAS and/or DISS

58
Q

Requirements for Interim Clearance

A

No need for immediate access
SF-86 submitted and investigation opened by ISP
All minimum requirements for interim have been fulfilled

59
Q

DoD CAF Responsibilities

A

Makes adjudicative decisions
Is a central repository for investigative records
Requests additional info where there is evidence that someone may no longer be eligible for a clearance

60
Q

List 5 Elements of Suitability Determination

A
Position Designation
Pre-Investigation
Investigation
Adjudication
Reinvestigation
61
Q

Investigation Tiers for Suitability

A

No classified info

Tier 1- low risk, non-sensitive, physical and logical access (HSPD-12 credentialing). Use SF-85

Tier 2- nonsensitive, moderate risk public trust. Use SF-85P

Tier 4- nonsensitive high risk public trust. Use SF-85P

62
Q

Investigation Tiers for National Security

A

Classified info

Tier 5- critical-sensitive, special-sensitive and/or requiring “Q” access, Top Secret or SCI

Tier 3- non-critical sensitive and/or requiring Confidential, Secret or “L” access. Use SF-86

63
Q

Standards of evidence in a suitability case

A
  1. Evidence must establish conduct
  2. The govt has burden of proof
  3. All facts must be supported by a preponderance of evidence
64
Q

National Agency Check Inquires (NACI) applies to whom?

A

Civilians and Contractors
• Non-sensitive positions
• Low Risk
• HSPD Credentialing

65
Q

NAC

A

Fingerprint portion of a PSI

66
Q

Investigative requirement for critical-sensitive

A

SSBI
SSBI-PR
PPR

67
Q

Investigative requirement for noncritical-sensitive

A

ANACI

NACLC

68
Q

Investigative requirement for non-sensitive

A

NACI

69
Q

Purpose of the Statement of Reason (SOR)?

A

Provide a comprehensive and detailed written explanation of why a preliminary unfavorable adjudicative determination was made

70
Q

JCAVS

A

System used to communicate with the DoD CAF

71
Q

JAMS

A

Sub-system used by adjudicators

72
Q

JPAS

A

Consists of JCAVS and JAMS

DoD system of record for personnel security clearance information

73
Q

DISS

A

Will replace JPAS as DoD system of record for personnel security clearance information

74
Q

Scattered Castles

A

Intel Community Personnel Security Database that verifies personnel security access and visit certifications

75
Q

DCII

A

System of record for fraud investigations

76
Q

SII

A

System of records of PSIs conducted by OPM

77
Q

Administrative Judge

A

Ensures Military and Civilian personnel fairness by providing opportunity to appeal an unfavorable adjudicative determination

78
Q

DOHA

A

Ensures Contractor personnel fairness by providing opportunity to appeal an unfavorable adjudicative determination

79
Q

Events/incidents required to be reported to DoD CI organizations?

A

Espionage
Sabotage
Terrorism
Cyber

80
Q

Types of threats to classified information

A

Insider Threat
Foreign Intelligence entities (FIE)
Cybersecurity Threat

81
Q

Purpose of foreign visitor program

A

Track and approve foreign entity access to classified

Approve foreign entity access to unclassified info