SlideShare a Scribd company logo
1 of 18
PERSONNEL SECURITY INVESTIGATION
ISAD 22
PERSONNEL INVESTIGATION INVOLVE THREE (3) GENERAL
TECHNIQUES
1. Background Check
2. Positive vetting
3. Profiling
BACKGROUND CHECK
A check of a person’s identity and previous experience, including
where legally permissible, any criminal history, as part of the
assessment of an individual’s suitability
THE PURPOSE IS TWOFOLD:
 First, to ensure that the information provided by the
candidates is correct or deliberate lies.
 Second, to prevent hiring the wrong person. Done right,
background investigation will reduce the probability of
hiring a person whose vulnerabilities make him or her a
potential threat to the organization's assets.
GUIDELINES
• Background check should be supported by legal framework
that establishes general criteria.
• Background checks can be both invasive and costly, the
extent of the check can be adjusted to the value of the assets
that the person who is hired will be given access to.
• Information sought during the check should be relevant to
hiring decision, have good probability of being correct and if
in doubt, should be confirmed in other sources.
CONTENTS OF BACKGROUND CHECK
 Verification of identity
 Check of criminal history and, other personal circumstances or
behavior that could forewarn of danger
 Place of residence for the previous five (5) years
 Claimed education if it relates to the needs of the job
 Employment history back at least five (5) years with explanations
for any gaps in employment of more than one month.
POSITIVE VETTING
• The process of examining with careful thoroughness.
• The essence of vetting is to conduct interview under
stress and based upon answers previously given by the
applicant.
PROFILING
The process whereby a person’s reaction in a critical situation is
predicted by observing his behavior.
• Physiological or gestural signs
• Anomalous behavior
PURPOSE OF VETTING
 Challenge the applicant on the basis of any false
statement;
 Observe the applicants behavior under stress;
 Open areas for exploration which have still been hidden;
and
 Provide new investigative lead.
DECEPTION AND DETECTION TECHNIQUES
1. Polygraph
2. Psychological Stress Evaluator
3. Voice analyzer
POLYGRAPH/ LIE DETECTOR
 Records changes in blood pressure, breathing rate, pulse
and skin conductivity to electricity.
 Results depend upon the professional capabilities of the
examiner.
PSYCHOLOGICAL STRESS EVALUATOR
 Records and analyzes stress related components of voice.
 May be used with or without the knowledge of the person
being tested.
VOICE ANALYZER
 Records sub-audible tremors in speech on to a digital
tape.
BACKGROUND INVESTIGATION
A careful search and in-depth inquiry on the past and present
relevant information of an individual and his/her family members,
which is not limited to agency checks.
FINANCIAL AND LIFESTYLE CHECK
 Also called as Earning-to-Debt Ratio.
 Gather basic information on income and mode of living of the
person.
 It is usually used on consideration for assignment to significantly
more sensitive duties.
UNDERCOVER INVESTIGATION
 Placement of an agent in a role in which the agent’s true identity
and role remains unknown.
 It is usually used to obtain information for criminal prosecutions.
 Establish whether the person is engaging in illegal activities
REQUIREMENTS FOR UNDERCOVER INVESTIGATION
1. Investigator
2. Cover story
3. Placement technique
4. Control scheme
Personnel security investigation

More Related Content

What's hot

What's hot (20)

Police patrol
Police patrolPolice patrol
Police patrol
 
Sample Sample Pattern Area training Module
Sample Sample  Pattern Area training ModuleSample Sample  Pattern Area training Module
Sample Sample Pattern Area training Module
 
Questioned Documents First Chapter
Questioned Documents First ChapterQuestioned Documents First Chapter
Questioned Documents First Chapter
 
Whorl Patterns
Whorl PatternsWhorl Patterns
Whorl Patterns
 
Memo rhaney
Memo rhaneyMemo rhaney
Memo rhaney
 
Rule 114 bail
Rule 114 bailRule 114 bail
Rule 114 bail
 
Who are criminally liable
Who are criminally liableWho are criminally liable
Who are criminally liable
 
Criminal investigation manual
Criminal investigation manualCriminal investigation manual
Criminal investigation manual
 
Comparative police systems_preview
Comparative police systems_previewComparative police systems_preview
Comparative police systems_preview
 
Basic criminal procedures (arrest)
Basic criminal procedures (arrest)Basic criminal procedures (arrest)
Basic criminal procedures (arrest)
 
Criminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. RamosCriminal Procedure By Charlemagne James P. Ramos
Criminal Procedure By Charlemagne James P. Ramos
 
Fingerprint Classification- slide 1
Fingerprint Classification- slide 1Fingerprint Classification- slide 1
Fingerprint Classification- slide 1
 
Search warrant
Search warrantSearch warrant
Search warrant
 
ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)ETHICS AND CONDUCT (POLICE)
ETHICS AND CONDUCT (POLICE)
 
PNP MASTER PLANS
PNP MASTER PLANSPNP MASTER PLANS
PNP MASTER PLANS
 
criminal justice system
criminal justice systemcriminal justice system
criminal justice system
 
Pnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guidePnp pre charge evaluation and summary hearing guide
Pnp pre charge evaluation and summary hearing guide
 
CDI 8 MIDTERM edited 2022.pptx
CDI 8 MIDTERM edited 2022.pptxCDI 8 MIDTERM edited 2022.pptx
CDI 8 MIDTERM edited 2022.pptx
 
Criminal procedure simplified
Criminal procedure simplifiedCriminal procedure simplified
Criminal procedure simplified
 
Fingerprint Classification
Fingerprint ClassificationFingerprint Classification
Fingerprint Classification
 

Similar to Personnel security investigation

Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...
Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...
Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...research gate
 
Ethical review process, mk sharma
Ethical review process, mk sharmaEthical review process, mk sharma
Ethical review process, mk sharmaSHARDA UNIVERSITY
 
ETHICAL STANDARDS IN TESTING.
ETHICAL STANDARDS IN TESTING.ETHICAL STANDARDS IN TESTING.
ETHICAL STANDARDS IN TESTING.ANCYBS
 
psychological assessment for college students
psychological assessment for college studentspsychological assessment for college students
psychological assessment for college studentsjohnmickonozaleda
 
responsibility of an investigator
responsibility of an investigatorresponsibility of an investigator
responsibility of an investigatordrodo2002
 
institutional review board and independent ethics committee
institutional review board and independent ethics committeeinstitutional review board and independent ethics committee
institutional review board and independent ethics committeeMOHAMMAD ASIM
 
Institutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeInstitutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeChintamBaladattaSai
 
FORENSIC LABORATORY - Good Laboratroy Practices
FORENSIC LABORATORY  - Good Laboratroy PracticesFORENSIC LABORATORY  - Good Laboratroy Practices
FORENSIC LABORATORY - Good Laboratroy Practicesnafeesa Hanif
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update Resilient Systems
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxnormanibarber20063
 
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptxzenAlkaff
 
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptx
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptxHEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptx
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptxMANISH KUMAR MEENA
 

Similar to Personnel security investigation (20)

Poly graph testing
Poly graph testingPoly graph testing
Poly graph testing
 
Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...
Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...
Polygraph Testing Management Plan through Psychotherapy CBT, Behavior Therapy...
 
Ethical review process, mk sharma
Ethical review process, mk sharmaEthical review process, mk sharma
Ethical review process, mk sharma
 
Polygraph test
Polygraph testPolygraph test
Polygraph test
 
CLINICAL RESERCH TEAM MEMBERS .pptx
CLINICAL RESERCH TEAM MEMBERS                .pptxCLINICAL RESERCH TEAM MEMBERS                .pptx
CLINICAL RESERCH TEAM MEMBERS .pptx
 
INFORMED CONSENT.pptx
INFORMED CONSENT.pptxINFORMED CONSENT.pptx
INFORMED CONSENT.pptx
 
ETHICAL STANDARDS IN TESTING.
ETHICAL STANDARDS IN TESTING.ETHICAL STANDARDS IN TESTING.
ETHICAL STANDARDS IN TESTING.
 
psychological assessment for college students
psychological assessment for college studentspsychological assessment for college students
psychological assessment for college students
 
responsibility of an investigator
responsibility of an investigatorresponsibility of an investigator
responsibility of an investigator
 
institutional review board and independent ethics committee
institutional review board and independent ethics committeeinstitutional review board and independent ethics committee
institutional review board and independent ethics committee
 
Institutional review board/Independent ethics Committee
Institutional review board/Independent ethics CommitteeInstitutional review board/Independent ethics Committee
Institutional review board/Independent ethics Committee
 
IRB (1).pdf
IRB (1).pdfIRB (1).pdf
IRB (1).pdf
 
Health Assessment ...
Health Assessment ...Health Assessment ...
Health Assessment ...
 
Ich e6(r1)
Ich e6(r1)Ich e6(r1)
Ich e6(r1)
 
IRB (1).pptx
IRB (1).pptxIRB (1).pptx
IRB (1).pptx
 
FORENSIC LABORATORY - Good Laboratroy Practices
FORENSIC LABORATORY  - Good Laboratroy PracticesFORENSIC LABORATORY  - Good Laboratroy Practices
FORENSIC LABORATORY - Good Laboratroy Practices
 
HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update HIPAA – Where’s the Harm? Final Rule Update
HIPAA – Where’s the Harm? Final Rule Update
 
IntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docxIntroductionThis presentation guide will.docx
IntroductionThis presentation guide will.docx
 
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
4 TOPIC3 Procedure of Fire Analysis and After Effect SUN.pptx
 
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptx
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptxHEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptx
HEALTH_ASSESSMENT_AND_HISTORY_TAKING[1].pptx
 

More from Kaycelyn Ramos , CSP

More from Kaycelyn Ramos , CSP (6)

Adjudication
AdjudicationAdjudication
Adjudication
 
Selection and screening
Selection and screeningSelection and screening
Selection and screening
 
Designation and recruitment
Designation and recruitmentDesignation and recruitment
Designation and recruitment
 
Security incident
Security incidentSecurity incident
Security incident
 
How and why accident happen
How and why accident happenHow and why accident happen
How and why accident happen
 
Evolution of study of e governance
Evolution of study of e governanceEvolution of study of e governance
Evolution of study of e governance
 

Recently uploaded

crisiscommunication-presentation in crisis management.pptx
crisiscommunication-presentation in crisis management.pptxcrisiscommunication-presentation in crisis management.pptx
crisiscommunication-presentation in crisis management.pptxSamahhassan30
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceanilsa9823
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyHafizMuhammadAbdulla5
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampPLCLeadershipDevelop
 

Recently uploaded (17)

crisiscommunication-presentation in crisis management.pptx
crisiscommunication-presentation in crisis management.pptxcrisiscommunication-presentation in crisis management.pptx
crisiscommunication-presentation in crisis management.pptx
 
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Charbagh Lucknow best sexual service
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
CEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biographyCEO of Google, Sunder Pichai's biography
CEO of Google, Sunder Pichai's biography
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
Becoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette ThompsonBecoming an Inclusive Leader - Bernadette Thompson
Becoming an Inclusive Leader - Bernadette Thompson
 
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Tilak Nagar @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 16 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Day 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC BootcampDay 0- Bootcamp Roadmap for PLC Bootcamp
Day 0- Bootcamp Roadmap for PLC Bootcamp
 

Personnel security investigation

  • 2. PERSONNEL INVESTIGATION INVOLVE THREE (3) GENERAL TECHNIQUES 1. Background Check 2. Positive vetting 3. Profiling
  • 3. BACKGROUND CHECK A check of a person’s identity and previous experience, including where legally permissible, any criminal history, as part of the assessment of an individual’s suitability
  • 4. THE PURPOSE IS TWOFOLD:  First, to ensure that the information provided by the candidates is correct or deliberate lies.  Second, to prevent hiring the wrong person. Done right, background investigation will reduce the probability of hiring a person whose vulnerabilities make him or her a potential threat to the organization's assets.
  • 5. GUIDELINES • Background check should be supported by legal framework that establishes general criteria. • Background checks can be both invasive and costly, the extent of the check can be adjusted to the value of the assets that the person who is hired will be given access to. • Information sought during the check should be relevant to hiring decision, have good probability of being correct and if in doubt, should be confirmed in other sources.
  • 6. CONTENTS OF BACKGROUND CHECK  Verification of identity  Check of criminal history and, other personal circumstances or behavior that could forewarn of danger  Place of residence for the previous five (5) years  Claimed education if it relates to the needs of the job  Employment history back at least five (5) years with explanations for any gaps in employment of more than one month.
  • 7. POSITIVE VETTING • The process of examining with careful thoroughness. • The essence of vetting is to conduct interview under stress and based upon answers previously given by the applicant.
  • 8. PROFILING The process whereby a person’s reaction in a critical situation is predicted by observing his behavior. • Physiological or gestural signs • Anomalous behavior
  • 9. PURPOSE OF VETTING  Challenge the applicant on the basis of any false statement;  Observe the applicants behavior under stress;  Open areas for exploration which have still been hidden; and  Provide new investigative lead.
  • 10. DECEPTION AND DETECTION TECHNIQUES 1. Polygraph 2. Psychological Stress Evaluator 3. Voice analyzer
  • 11. POLYGRAPH/ LIE DETECTOR  Records changes in blood pressure, breathing rate, pulse and skin conductivity to electricity.  Results depend upon the professional capabilities of the examiner.
  • 12. PSYCHOLOGICAL STRESS EVALUATOR  Records and analyzes stress related components of voice.  May be used with or without the knowledge of the person being tested.
  • 13. VOICE ANALYZER  Records sub-audible tremors in speech on to a digital tape.
  • 14. BACKGROUND INVESTIGATION A careful search and in-depth inquiry on the past and present relevant information of an individual and his/her family members, which is not limited to agency checks.
  • 15. FINANCIAL AND LIFESTYLE CHECK  Also called as Earning-to-Debt Ratio.  Gather basic information on income and mode of living of the person.  It is usually used on consideration for assignment to significantly more sensitive duties.
  • 16. UNDERCOVER INVESTIGATION  Placement of an agent in a role in which the agent’s true identity and role remains unknown.  It is usually used to obtain information for criminal prosecutions.  Establish whether the person is engaging in illegal activities
  • 17. REQUIREMENTS FOR UNDERCOVER INVESTIGATION 1. Investigator 2. Cover story 3. Placement technique 4. Control scheme

Editor's Notes

  1. Through ID checks
  2. Anomalous –inconsistent from what is normal or expected
  3. Changes assessed by examiners therefore results are only as good as the skills of the examiner. Questioned legally if the machine is really working. That is why this is not permissible in courts.
  4. Garnishment of wages. Having a lien placed on your property for failing to pay a creditor. Eviction from a residence for failure to pay rent. Gambling
  5. – should not be known to the target population and shall be logically fit. He must know the identity of the control person, actions that are forbidden and have a good cover story.