Friday, March 30, 2012

6 Awesome Ways to Delay a Security Clearances

One thing an FSO just can't control is how long it takes the US Government to completely investigate, adjudicate and award a security clearance. These investigations rely on trained persons to research a persons background and another set of trained persons to make a decision on the findings. These professionals are charged with determining whether or not a person can be relied on to protect classified information from unauthorized disclosure. Returning or seeking clarification on submitted information is costly.

As an  FSO, you can control one critical part of the process. Ensure the applicant fills out the SF86 forms accurately and completely. Any mistakes, omissions or embellishments can cause serious time delays. You can help the applicant understand the content and explain how to complete required forms.

Here is great tool to help; the top 6 reasons security clearance decisions are delayed:

1.  Missing or illegible fingerprint cards. The cards must be provided to the office of personnel management within 30 days of approval by DISCO. It may be too late once you ignore the JPAS notification of "Release PSI". Also fingerprints should be properly applied to the card. Smudges and blurs are impossible to read.

2. Missing or unreadable information on release forms. Release forms authorize agencies to take action. If in authorization is in doubt, investigations can be delayed until clarification is made.

3.  Wrong place of birth information. Full and correct city, county and state or country information is required.  Any mistakes or false representation can cause setbacks.

4. False date of birth information. A correct date of birth is critical to accurately identify the applicant. Illegible and wrong dates make investigations impossible, requiring queries and delays.

5. Missing residences. The requirement is to "Provide complete information for two individuals with COMPLETE US addresses and phone numbers". Failure to do this will also cause delays.

6. Wrong SSN information. If the wrong SSN is giving, the request should be cancelled and a new one started with the correct one.

Be sure to respect the applicant's privacy. FSOs should review the applications to ensure that they are filled out correctly and accurately ONLY. FSOs should not attempt to determine whether or not an applicant is eligible for a clearance or make comments about eligibility. This is the adjudicator's and investigator's responsibility.

As an FSO you cannot control how long the process takes. However you can help keep it on track by training and informing applicants to write legibly, provide all required information, and be accurate. Accuracy and completeness can bring about a quicker decision.


Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Tuesday, March 27, 2012

Latest Article in Clearancejobs.com

A security clearance demonstrates that the government has determined that you are trustworthy. As such, you may perform on classified contracts depending on your security clearance level and need to know. To better understand how to protect classified information, it may help to understand how and why security classification is assigned. The following provides answers to popular questions: 

Classification Levels and Why Certain Information is Classified

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Friday, March 23, 2012

4 Steps to Winning the Cogswell Award

So, which companies will win the Cogswell Award this year? FSOs who take the time to develop a world class program designed to protect classified information are very deserving of the award. Here are four proven steps to help you demonstrate that your organization is going “above and beyond” NISPOM requirements:

1. Set security goals that everyone understands. These goals help create the organization-wide security culture that everyone can live with.

2.  Conduct institutional training that support these goals. Ensure the training encourages your employees to report any and all security violations, suspicious contacts, and foreign travel, which will further enhance those efforts.

3. Goals should be tracked and institutional training and expectations should be conducted  in preparation for the annual security inspection. Do this by implementing a daily security management process, which includes physical security, visitor control, and security education throughout the year. Some methods include:
Monthly Security Newsletter
Security Awareness Posters
Security Emails that remind employees about their Reporting Responsibility
Self-inspections
End-of-day checks
Annual Security Awareness training

4. Develop a partnership with your DSS rep. The inspection or a security violation is not the first time to meet your DSS rep. While developing a good working relationship, ensure your rep understands the level of support from your leadership. Sometimes the annual review is lengthy and the rep may not be able to appreciate or take in everything at one time. The annual review is a good time to hi-light what you’ve already demonstrated while building the relationship. Walk them through your facility and show the layers of security. This can be accomplished by the display of proper locks, card access systems, front desk procedures for visitors, display of badges, and other visible signs that promote Security Awareness that would only be accomplished with full management support. Then, when the annual review rolls around, remind them of what you’ve already showed.

By developing a security program outlined in the NISPOM and approved by your DSS rep, the Cogswell Award is definitely a reachable goal for your company. Demonstrate and document everything required by the NISPOM and how you went above and beyond. You can also reach out to fellow security professionals and join security associations to further enhance your security program and your security knowledge.

For more ideas, see our book DoD Security Clearances and Contracts Guidebook-What Defense Contractors Need to Know About Your Need to Know

Also, visit our blogs about NISP Enhancement.


Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

FSO Training-Get Some

Facility Security Officers (FSOs) wear many hats. Depending on the size of company and mission, they can be completely dedicated to security or serve as FSOs as one of many additional duties. Regardless of where their responsibilities lie, all FSOs should be very aware of NISPOM requirements.

When it comes to training, FSOs should be able to effectively train cleared employees of these NISPOM and Contract Security Classification Specification (DD Form 254) requirements.

Training requirements vary not only based on mission, but also depend on whether or not the facility is cleared as possessing or non-possessing. A possessing facility is authorized to store and work classified information in the cleared facility. A non-possessing facility cannot.

Objectives of the FSO Program Management Course are to prepare the FSO to implement and direct a NISPOM based security program in their cleared contractor facility. DSS offers online courses to both possessing and non-possessing facility FSOs. The training includes, but is not limited to the following topics:

Protecting classified material – The FSO learns how to protect classified information in a cleared contractor facility. This includes receipt, accountability, storage, dissemination and destruction of classified material.

Personnel security clearances – The FSO gains an understanding of the personnel security clearance request procedure, briefing techniques and maintenance of personnel clearances.

Facility clearance –The FSO learns how FCLs are established. They are also taught which records and activities are required to maintain the FCL.

Exports compliance and international operations – International business opportunities abound in a global economy. FSOs receive instruction on how to prevent unauthorized disclosure of critical technology, controlled export and military classified information. Companies can thrive in such an environment provided they can advise or execute Departments of State and Commerce licenses and agreements as required.

FSO duties – The FSO should understand not only the job description, but how to communicate with management and fellow employees. Responsibilities include accountability while implementing and directing a security program to protect classified material and NISPOM requirements.

Contract security classification specification (DD Form 254) – This is the vital piece of the classified contract. The FSO cannot execute or allow access to a classified contract unless they possess the customer issued DD Form 254. The FSO also understands how the DD Form 254 is constructed and how to provide input to better meet security requirements.

Security classification guides – As the DD Form 254 provides authorization to execute a classified contract, the SCG provides the “how to” instruction. All employees performing classified work consult the guide to understand what is classified and how to provide the required protection.

Security administration and records keeping –The FSO is expected to provide original documentation on Foreign Ownership Control or Influence, facility clearances, SF 312, training completion and classified inventory and disposition. Additionally, some records are not authorized for retention such as the completed Security Clearance application or SF 86 (as of 2006 they are destroyed once investigation is complete). Defense Security Service reviews required documentation during the annual security inspection.

Find out more at http://www.redbikepublishing.com/

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM

Friday, March 2, 2012

Going above and beyond requirements of NISP Enhancement Category 11

Going above and beyond requirements of NISP Enhancement Category 11 includes membership and attendance in Security Community Events.

Enrollment and attendance in security community and professional organization events demonstrates contribution and growth. For inspection purposes, be sure to collect sign-in sheets, training handouts and more importantly demonstrate application of lessons learned to show proof of your involvement. Monthly lunch meetings, working groups and other opportunities are places where members of a similar community meet to learn or solve common problems.

The National Industrial Security Program organizations include:

Industrial Security Awareness Council (ISAC)
 ISAC- ISAC is an informal, non-profit association of defense contractor, Defense Security Service, and Federal Bureau of Investigation personnel. It was formed to assist defense contractors in compliance with the National Industrial Security program and with the protection of classified and company proprietary information through training for security personnel, provision of security awareness media and materials, and dissemination of counterintelligence and other security-related information.

National Industrial Security Program Policy Advisory Committee (NISPPAC)
 The National Industrial Security Program Policy Advisory Committee, comprised of both Government and industry representatives, is responsible for recommending changes in industrial security policy through modifications to Executive Order 12829, its implementing directives, and the National Industrial Security Program Operating Manual. The NISPPAC also advises the Information Security Oversight Office on all matters concerning the policies of the National Industrial Security Program (NISP), including recommended changes to those policies, and serves as a forum to discuss policy issues in dispute.

Society of Industrial Security Professionals (NCMS)
The purpose of the Society is to advance the practice of classification management in the disciplines of industrial security, information security, government designated unclassified information, and intellectual property, and to foster the highest qualities of security professionalism among its members.

The National Defense Industrial Association (NDIA)
NDIA is America’s leading Defense Industry association promoting national security. NDIA is proud to provide a legal and ethical forum for the exchange of information between Industry and Government on National Security issues. Our members foster the development of the most innovative and superior equipment, training and support for our warfighters and first responders through our divisions, local chapters, affiliated associations and events.

Going above and beyond includes not only joining organizations, but documenting attendance and using knowledge learned to improve security at your organization.

Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR, and The NISPOM