The document provides definitions for over 100 security and suitability terms used in clearance processes. It covers terminology related to investigation types, clearance levels and categories, adjudication procedures, and position risk designations. Key terms defined include active clearance, adjudicative guidelines, background investigation, classified information, security clearance, public trust position, and single scope background investigation.
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Security Clearance
Monster, a global leader in online careers, presents our 2010 Security Clearance Talent Assessment, which highlights online candidate resume activity across the United States. This report leverages Monster’s extensive database coupled with information collected from third parties, partners, and affiliations to provide a comprehensive picture of the Security Clearance space.
Monster’s data and analysis uncovers information to help HR professionals and hiring managers optimize and gain a competitive edge in the constantly changing world of talent acquisition.
Learning Outcome: Increase knowledge and awareness around the US security Clearance process
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Learning Objective: Examine the process of achieving a U.S. Security Clearance
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel. This seminar will guide you through the processing of getting and keeping a U.S. security clearance. Further, we will explore the future and emerging career opportunities that require various clearance levels.
At the end of this seminar, participants will be able to:
a) Identify a series of career paths and associated tools to improve job marketability.
b) List a series of certification and association options.
c) Review the security clearance process and associated misconceptions and mistakes.
The Fundamentals of Applying for and Obtaining a Security ClearanceFedEmployeeLaw
There are two truths in applying for a security clearance. First, a security clearance is a privilege and not a right. Second, questions about granting or revoking a clearance will always be resolved in favor of national security. Knowing whether your background raises any questions about granting or revoking a clearance can make or break your career in the Federal government.
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Security Clearance
Monster, a global leader in online careers, presents our 2010 Security Clearance Talent Assessment, which highlights online candidate resume activity across the United States. This report leverages Monster’s extensive database coupled with information collected from third parties, partners, and affiliations to provide a comprehensive picture of the Security Clearance space.
Monster’s data and analysis uncovers information to help HR professionals and hiring managers optimize and gain a competitive edge in the constantly changing world of talent acquisition.
Learning Outcome: Increase knowledge and awareness around the US security Clearance process
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Learning Objective: Examine the process of achieving a U.S. Security Clearance
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel. This seminar will guide you through the processing of getting and keeping a U.S. security clearance. Further, we will explore the future and emerging career opportunities that require various clearance levels.
At the end of this seminar, participants will be able to:
a) Identify a series of career paths and associated tools to improve job marketability.
b) List a series of certification and association options.
c) Review the security clearance process and associated misconceptions and mistakes.
The Fundamentals of Applying for and Obtaining a Security ClearanceFedEmployeeLaw
There are two truths in applying for a security clearance. First, a security clearance is a privilege and not a right. Second, questions about granting or revoking a clearance will always be resolved in favor of national security. Knowing whether your background raises any questions about granting or revoking a clearance can make or break your career in the Federal government.
Want a Security Clearance? This is what you need to know
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel. This workshop will guide you through the processing of getting and keeping a US security clearance. Further, we will explore the future and emerging career opportunities that require various clearance levels.
Learning Outcome: Increase knowledge and awareness around the US security Clearance process
At the end of this workshop, participants will be able to:
a) Identify a series of career paths and associated tools to improve job marketability
b) List a series of certification and association options
c) Review the security clearance process and associated misconceptions and mistakes
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Learning Objective: Examine the process of achieving a U.S. security clearance and how this clearance will allow you to access future career opportunities
Description: As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing yourself with the extensive U.S. security clearance process, you can prepare to access opportunities that help you excel. This seminar will guide you through the process of getting and keeping a U.S. security clearance. We will also explore the future and emerging career opportunities that require various clearance levels.
At the end of this seminar, participants will be able to:
1. Identify a series of career paths and associated tools to improve job marketability.
2. List a series of certification and association options.
3. Understand the security clearance process and associated misconceptions and mistakes.
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
This presentation describes the results of a project (SPIDER) that has developed a proof-of-concept for fine-grained information access control, and communication of controls using a concept derived from Creative Commons called Protective Commons.
Synopsis: Many visions, definitions, strategies and concepts on how “federation” should or would work currently abound when discussing Identity Management scenarios. The Federation for Identity and Cross-Credentialing Systems (FiXs) a not for profit Industry organization of more than 50 members/subscribers has actually built and operationalized, with the Department of Defense, one of the very first , if not the first such environment in existence today.
This presentation and discussion will focus on the journey travelled over the last four years of collaborative work between the DoD and FiXs on establishing this Federation between Industry and Government.
Participants will learn about the development of trust models, operating rules, policies on privacy and security, mandatory guidelines and standards, open technology solutions and the politics of making a Federation between Industry and Government actually operational.
The discussion leader is Dr. Michael J. Mestrovich, President of FiXs, and one who spent nearly thirty years within the Department of Defense and Federal Government developing, implementing and operating enterprise wide systems and infrastructures for personnel, health, business and command and control systems. Over the past few years, since he retired from DoD, he has focused on innovative ways to allow Industry and Government to work together in collaborative forums in solving National infrastructure issues.
CMMC rollout: How CMMC will impact your organizationInfosec
More than 300,000 organizations will be affected by the Cybersecurity Maturity Model Certification (CMMC) Framework. Plus, an entire ecosystem is being built to support the new CMMC assessments, including CMMC Third-Party Assessor Organizations (C3PAOs), Registered Provider Organizations (RPOs), Licensed Partner Publishers (LPPs) and Licensed Training Provider (LTPs).
Want a Security Clearance? This is what you need to know
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel. This workshop will guide you through the processing of getting and keeping a US security clearance. Further, we will explore the future and emerging career opportunities that require various clearance levels.
Learning Outcome: Increase knowledge and awareness around the US security Clearance process
At the end of this workshop, participants will be able to:
a) Identify a series of career paths and associated tools to improve job marketability
b) List a series of certification and association options
c) Review the security clearance process and associated misconceptions and mistakes
As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing oneself with the extensive US Security Clearance Process, you can begin to prepare and access opportunities that help you excel.
At the end of this seminar, participants will be able to:
a. Identify a series of career paths and associated tools to improve job marketability.
b. List a series of certification and association option.
c. Review the security clearance process and associated misconceptions and mistakes.
Learning Objective: Examine the process of achieving a U.S. security clearance and how this clearance will allow you to access future career opportunities
Description: As you create your master plan for success, consider the variety of tools needed to gain a competitive edge in your industry. By familiarizing yourself with the extensive U.S. security clearance process, you can prepare to access opportunities that help you excel. This seminar will guide you through the process of getting and keeping a U.S. security clearance. We will also explore the future and emerging career opportunities that require various clearance levels.
At the end of this seminar, participants will be able to:
1. Identify a series of career paths and associated tools to improve job marketability.
2. List a series of certification and association options.
3. Understand the security clearance process and associated misconceptions and mistakes.
Self-Protecting Information for De-Perimiterised Electronic RelationshipsJeremy Hilton
This presentation describes the results of a project (SPIDER) that has developed a proof-of-concept for fine-grained information access control, and communication of controls using a concept derived from Creative Commons called Protective Commons.
Synopsis: Many visions, definitions, strategies and concepts on how “federation” should or would work currently abound when discussing Identity Management scenarios. The Federation for Identity and Cross-Credentialing Systems (FiXs) a not for profit Industry organization of more than 50 members/subscribers has actually built and operationalized, with the Department of Defense, one of the very first , if not the first such environment in existence today.
This presentation and discussion will focus on the journey travelled over the last four years of collaborative work between the DoD and FiXs on establishing this Federation between Industry and Government.
Participants will learn about the development of trust models, operating rules, policies on privacy and security, mandatory guidelines and standards, open technology solutions and the politics of making a Federation between Industry and Government actually operational.
The discussion leader is Dr. Michael J. Mestrovich, President of FiXs, and one who spent nearly thirty years within the Department of Defense and Federal Government developing, implementing and operating enterprise wide systems and infrastructures for personnel, health, business and command and control systems. Over the past few years, since he retired from DoD, he has focused on innovative ways to allow Industry and Government to work together in collaborative forums in solving National infrastructure issues.
CMMC rollout: How CMMC will impact your organizationInfosec
More than 300,000 organizations will be affected by the Cybersecurity Maturity Model Certification (CMMC) Framework. Plus, an entire ecosystem is being built to support the new CMMC assessments, including CMMC Third-Party Assessor Organizations (C3PAOs), Registered Provider Organizations (RPOs), Licensed Partner Publishers (LPPs) and Licensed Training Provider (LTPs).
Comprehensive Analysis of Contemporary Information Security Challengessidraasif9090
this could involve clicking on a designated upload button, dragging and dropping files into a specific area, or selecting files from a file explorer window.
Supported File Types: Specify which types of documents can be uploaded to the platform. This might include common formats such as PDFs, Word documents, Excel spreadsheets, images (JPG, PNG, etc.), and others.
Presented at the University of Louisville Cyber Securitys Day,.docxChantellPantoja184
Presented at the University of Louisville Cyber Securitys Day, October 2006
Solving the Insider Threat Problem
Dr. Bruce Gabrielson, NCE
Booz, Allen, Hamilton
CND R&T PMO
Abstract
The insider threat is significant and real within both the Department of Defense (DoD) and
commercial sector. Many previous studies have looked at the broad scope of the problem without
any real attempt to identify a solution. This presentation provides visibility into how this or any
other broadly defined technology gap can be decomposed such that partial solutions are
identifiable using a formal investigative process. In particular, it describes the approach taken by
the DoD’s Enterprise-wide Information Assurance (IA)/Computer Network Defense (CND)
Solution
s Steering Group’s (ESSG’s) Insider Threat Technology Advisory Group (TAG).
Insider Threat Status and Issues
As a general DoD definition, the “insider” is anyone who is or has been authorized access to a
DoD information system, whether a military member, a civilian employee, employee of another
Federal agency or the private sector. Some definitions, however, address the broader scope of
“system components” or “computer software code” inserted inside a system and intended to carry
out a malicious act. Of interest regarding the many broad descriptions of insider is that the
definition proposed is often dependent on the perspective of the individual defining the problem.
The real question arises, is the perpetrator simply someone exhibiting bad behavior or is this
person representing a serious threat to our nation.
Regardless of the definition used, we do know the insider threat is significant and real. A recent
DoD Inspector General (IG) report indicates that, for one set of investigations, 87 percent of
identified intruders into DoD information systems were either employees or others internal to the
organization.
Insider Threat Details
The definition of insider threat should encompass two main threat actor categories and five
general categories of activities. The first actor category, the “true insider,” is defined as any
entity (person, system, or code) authorized by command and control elements to access network,
system, or data. The second actor category, the “pseudo-insider,” is someone who, by policy, is
not authorized the accesses, roles, and/or permissions they currently have but may have gotten
them inadvertently or through malicious activities.
The activities of both fall into five general categories: 1) exceeds given network, system or data
permissions; 2) conducts malicious activity against or across the network, system or data; 3)
provided unapproved access to the network, system or data; 4) circumvents security controls or
exploits security weaknesses to exceed authorized permitted activity or disguise identify; or 5)
non-maliciously or unintentionally damages resources (network, system or data) by destruction,
corruption, denial of access, o.
A comprehensive guide to your post-military career search. Information on what to do when, resume and interview tips, networking and transition advice, and more. Search for cleared jobs at www.clearancejobs.com.
Top career transition and job search tips for any cleared job seeker. Get key advice on interviews, resume writing and networking for defense industry and clearance careers. This comprehensive guide provides critical, easy-to-read insight into starting or revamping your job search or building your career network. Get other news, tips and advice at www.clearancejobs.com/cleared-news.
ClearanceJobs: Reaching Veterans, Wounded Warriors and Targeted DisabilitiesClearanceJobs
ClearanceJobs is committed to connecting Federal agencies with targeted candidates. Our resume database includes veterans, wounded warriors and targeted disability groups. In fact, veterans represent 75 percent of the candidates in our database, and their resumes are searchable by military branch and rank. Our Advanced Keyword Search engine and Cleared Network Groups are invaluable tools that help you find and hire diverse candidates.
Government Contractor vs Government EmploymentClearanceJobs
This webinar looks at the preferences of the security-cleared professional. The pros and cons of being a government contractor or government employee. The issue of insourcing and the motivations behind cleared government contractors career decisions.
BRAC 2005 - 2011 (Base Realignment and Closure)ClearanceJobs
BRAC 2005 is the largest base realignment and closure in DoD history. Over 100,00 military personnel will be relocated. Installations like Fort Meade, Aberdeen Proving Ground, Fort Belvoir, Fort Bliss, Fort Carson, and other installations in Maryland and Virginia.
FSO Training: Preparing for Business GrowthClearanceJobs
Facility Security Officers must support NISPOM requirements over a growing enterprise. Classified information must be protected through adding security personnel and/or expanding facilitates.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. ClearanceJobs Security and Suitability
Clearance Golossary
—A— Classified Information — The three levels CRYPTO — Cryptographic. A category of
of classified national security information classified information at the Secret and
Active Clearance — Security clearance
are: Confidential, Secret and Top Secret. Top Secret levels related to cryptographic
status where the individual granted a
There are categories of classified logic, keys and authenticators that require
clearance currently occupies a position for
information, such as SCI, SAP and COMSEC,
, special access controls and briefings.
which the clearance is required.
within these three levels requiring
Current Clearance — Commonly used term
Adjudicative Guidelines — Document special safeguarding and access controls
to describe the status of an individual’s
containing the 13 criteria used by that exceed those normally required for
security clearance where the clearance
federal security clearance adjudicators information at the same classification
has terminated but is eligible for
to determine an applicant’s eligibility level.
reinstatement.
for access to classified national security
CNWDI — Critical Nuclear Weapons Design
information. CUI — Controlled Unclassified Information.
Information. A category of Department
Unclassified information pertinent to the
ANACI — Access National Agency Check of Defense (DoD) Secret and Top Secret
national interest of the United States
with Inquiries. Type of personnel security Restricted Data that reveals the theory
or to the important interests of entities
investigation required for initial-hire of operation or design of the components
outside the Federal Government. Other
federal employees who need a Confidential of a thermonuclear or fission weapon or
unclassified information protected by
or Secret clearance or a DoE “L” Access test device. Special access controls and
law from unauthorized disclosure is also
Authorization. briefings are required for CNWDI.
designated CUI. (See also FOUO and SBU.)
—B— COMSEC — Communications Security.
CVS — Clearance Verification System.
Protective measures taken to deny
BI — Background Investigation. Type of Investigation and clearance database
unauthorized persons information
personnel security investigation conducted system operated by OPM and accessible
derived from telecommunications of the
for High-Risk Public Trust Positions. BI to federal security personnel. CVS
U.S. Government relating to national
is also used as a generic term for any will eventually replace OPM’s older SII
security and to ensure the authenticity
personnel security investigation. database. CVS has linkage to DoD’s JPAS
of such communications. COMSEC is also
database.
—C— a category of classified information that
requires special safeguarding, access
CAF — Central Adjudication Facility. The —D—
restrictions and briefings.
office of a federal agency that adjudicates DCII — Defense Central Index of
all security clearance for that agency. COSMIC Top Secret — Control Of Secret Investigations. Computer database
Within the Department of Defense there Material in an International Command. The that contains listings of criminal and
are 10 CAFs (Army, Navy, Air Force, DISCO, term used for NATO Top Secret information security investigations conducted by DoD
JCS, WHS, DIA, NSA, NGA and NRO). and clearances. investigative agencies. The DCII is no
longer being updated with new clearance
CONTINUED>>
Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.
1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
2. data. Since July 2005, new clearance data security clearance where the clearance —J—
are being entered into the Joint Personnel has terminated and is no longer eligible
JPAS — Joint Personnel Adjudication
Adjudication System (JPAS). for reinstatement because time limits for
System. Web-based system that connects
reinstatement have been exceeded.
DISCO — Defense Industrial Security security personnel with a database used
Clearance Office. Component of DSS that —F— to initiate and manage DoD personnel
processes, adjudicates and grants security security investigations and clearances. It
FOUO — For Official Use Only. Protective
clearances for industrial (contractor) is managed by DoD Central Adjudication
marking used to identify unclassified
personnel under the National Industrial Facilities (CAFs) and is composed of
sensitive government information requiring
Security Program (NISP). two subsystems: Joint Adjudication
special handling and access controls.
Management System (JAMS) and Joint
DOHA — Defense Office of Hearings and Clearance Access Verification System
FRD — Formerly Restricted Data. Classified
Appeals. Component of the Defense Legal (JCAVS).
information which has been removed
Services Agency that issues decisions in
from the Restricted Data category after
security clearance cases for contractor —L—
Department of Energy (DoE) and DoD
personnel doing work for DoD components LAA — Limited Access Authorization.
have jointly determined that it relates
and 20 other Federal Agencies and Permission granted by the Federal
primarily to the military utilization of
Departments. It also conducts personal Government to non-U.S. citizens for access
atomic weapons and can be adequately
appearances for DoD civilian employee to classified national security information
safeguarded as national security
and military personnel security clearance where the non-U.S. citizen possesses
information.
appeals. unique or unusual skill or expertise that
—H— is urgently needed to support a specific
DSS — Defense Security Service. Formerly
HSPD-12 — Homeland Security Presidential government project involving access to
known as the Defense Investigative Service
Directive Number 12. Mandates a specified classified information and a
(DIS). DSS is responsible for administering
standard for secure and reliable forms cleared or clearable U.S. citizen is not
the National Industrial Security Program
of identification for personnel requiring readily available.
(NISP) and providing security education
and training to DoD and other federal physical or logical access to federal
“L” Access Authorization — DoE clearance
personnel and contractors. facilities or computer systems. Sponsorship
that authorizes access up to Secret
plus a favorably adjudicated NACI are
Formerly Restricted Data and Secret
—E— needed to obtain a Personal Identity
National Security Information.
eQIP — Electronic Questionnaires for Verification (PIV) card required by this
Investigations Processing. Web-based directive. LBI — Limited Background Investigation.
versions of OPM Standard Forms 85, Type of personnel security investigation
—I— used for Moderate-Risk or High-Risk Public
85P 85PS and 86 used for initiating
,
federal personnel security investigations. Interim Security Clearance — Temporary Trust positions.
The eQIP version of the SF86 replaced security clearance based on the favorable
completion of minimum investigative LOD — Letter of Denial. Letter issued by
DoD’s Electronic Personnel Security
requirements, pending the completion of a security clearance adjudication facility
Questionnaire (EPSQ).
the full investigative requirements for the informing an applicant of a final decision
Expired Clearance — Commonly used term final clearance determination. to deny the applicant a security clearance
to describe the status of an individual’s and of the applicant’s right to appeal the
CONTINUED>>
Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.
1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
3. decision to the agency’s Personnel Security NACLC — National Agency Check with Local Counterintelligence-Scope or Full-
Appeals Board. Agency Checks and Credit Check. Type Scope (lifestyle and counterintelligence
of personnel security investigation used questions).
LOI — Letter of Intent. Letter that
for Confidential and Secret clearances
accompanies a “Statement of Reasons” PPR — Phased Periodic Reinvestigation.
or for DoE “L” access authorizations.
explaining why a tentative decision to Abbreviated form of the Single Scope
This investigation is not authorized for
deny a security clearance was made and Background Investigation – Periodic
initial-hire federal employees requiring
offering the applicant an opportunity to Reinvestigation (SSBI-PR). The PPR is an
a security clearance or a DoE “L” Access
rebut or mitigate the reasons. optional form of the SSBI-PR reserved for
Authorization.
personnel with no unfavorable information
Loss of Jurisdiction — Status of an
—O— listed in their clearance application.
individual’s security clearance when
employment for the required clearance OHA — Office of Hearings and Appeals. PR — Periodic Reinvestigation.
terminates after a clearance action is Component of the Department of Energy Reinvestigations required at specific
initiated but before a final determination (DoE) responsible for conducting hearings intervals to maintain a security clearance
is made to grant, continue, deny or revoke and issuing decisions involving personnel or a designated public trust position.
the clearance. security clearance cases of DoE employees
and contractors. PRSI — Personal Subject Interview. In
—M— depth interview of the subject of a
OPM/FISD — Office of Personnel personnel security investigation by a
MBI — Minimum Background Investigation.
Management/Federal Investigative Services security investigator. The PRSI is a standard
Type of personnel security investigation
Division. Principal supplier of personnel component of the SSBI, SSBI-PR, PPR, BI,
used for Moderate-Risk Public Trust
security investigations to the Federal MBI, LBI, and PT-SBI.
positions.
Government.
PSI — Personal Security Investigation. Term
—N— —P— that encompasses all types of background
NAC — National Agency Check. Basic investigations used to determine
Period of Coverage — Also known as the
component of all federal personnel employment suitability and security
Period of Investigation. Standard period
security investigations. As a minimum all clearance eligibility.
of time covered by a Personnel Security
NACs include a check of FBI Headquarters
Investigation (PSI). Each type of PSI
records, an FBI technical fingerprint
has an overall period of coverage and
search, and a check of OPM and DoD
specific periods of coverage for individual Public Trust Position — Designated
investigative databases.
components (i.e. employment, police federal employee and contractor positions
NACI — National Agency Check with records, and education) of a PSI. that, due to the sensitive unclassified
Inquiries. Type of personnel security responsibilities of the positions, require
Polygraph — Device that measures and
investigation used for determining federal suitability determinations based on
records physiological responses while a
employment suitability or for the issuance personnel security investigations. Public
subject answers a series of questions. It
of a Personal Identity Verification (PIV) Trust positions are designated as either
relies on the belief that false answers
card required by HSPD-12. An NACI plus Moderate-Risk or High-Risk. Public Trust
will produce distinctive measurements.
credit check can be used as the basis for position include positions designated ADP-I,
Polygraph examinations are used as
contractor Moderate-Risk Public Trust ADP-II, ADP-III, IT-1, IT-2, IT-3, IT-5, IT-6,
an adjunct to an SSBI for some Special
positions. 5C and 6C.
Access Programs and can be either
Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.
1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
4. PT-SBI — Public Trust-Special Background level (does not include COMSEC, CRYPTO, Security Clearance — Determination
Investigation. Type of personnel security or CNWDI). SAPs are categorized as made by a government personnel security
investigation conducted for selected High- intelligence, acquisition and operations/ adjudicator that an individual’s access to
Risk Public Trust positions. support. They are also categorized as classified information is clearly consistent
acknowledged, unacknowledged and with the interests of national security.
—Q— waived. Among adjudicators the term “Security
“Q” Access Authorization — DoE Clearance” is being replaced by the term
SBU — Sensitive But Unclassified. Term
clearance that authorizes access up to “Eligibility for Access.”
that is being replaced by “Controlled
Top Secret Restricted Data and Top Secret
Unclassified Information.” (See also CUI SF85 — Standard Form 85. Questionnaire
National Security Information.
and FOUO). for Non-Sensitive Positions. Form used
—R— as the basis for a NACI to determine
Scattered Castles — Consolidated
an individual’s suitability for federal
RD — Restricted Data. Classified personnel security investigation and
employment in non-sensitive positions
information defined by the Atomic Energy clearance database of U.S. Intelligence
or to hold certain non-sensitive federal
Act as concerning: 1) design, manufacture, Community personnel. The database is
contractor positions.
or utilization of atomic weapons; 2) operated and maintained by the Director
production of special nuclear material; or of National Intelligence. SF85P — Standard Form 85P Questionnaire
.
3) use of special nuclear material in the for Public Trust Positions. Form used as
production of energy. RD is considered a SCI — Sensitive Compartmented
the basis for an investigation to determine
special access program. Information. Category of classified
an individual’s suitability to hold a Public
information with many separate
Trust position.
RRU — Request for Research/Recertify/ subcategories or compartments that
Upgrade Eligibility. Direct notification imposes safeguarding and access SF85P-S — Standard Form 85P-S.
to the appropriate CAF through JPAS of restrictions that exceed those normally Supplemental Questionnaire for Selected
any personnel security clearance status required for information at the same Positions. Form used in addition to the
changes a JPAS user cannot make within classification level. SCI is a Special Access SF85P as the basis for an investigation
the system. Program (SAP) involving intelligence to determine an individual’s suitability
sources, methods or analytical processes. to hold selected High-Risk Public Trust
RSI — Reimbursable Suitability/Security
SCI has three sensitivity levels — SSBI positions.
Investigations. Specific investigative
without polygraph, SSBI with CI-Scope
actions to gather information to resolve SF86 — Standard Form 86. Questionnaire
polygraph and SSBI with Full-Scope
issues that surfaced during a standard OPM for National Security Positions. Form
polygraph.
personnel security investigation. used as the basis for an investigation to
Scope of Investigation — Standard determine an individual’s eligibility for a
—S—
components of an investigation, such security clearance or for continuation of
SAP — Special Access Program. Program as character references, employment an existing security clearance.
established for a specific category of records, credit report, police records
classified information that imposes SII — Security/Suitability Investigations
checks, national agency checks and
safeguarding and access requirements Index. OPM’s computer database of
educational records. The term “scope”
that exceed those normally required for investigations accessible to federal
is often misused to describe an
information at the same classification security personnel.
investigation’s “Period of Coverage.”
Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.
1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS
5. SOR — Statement of Reason. Document
from a security clearance adjudication
facility advising an applicant of the
specific reason(s) why the adjudication
facility intends to deny or revoke a
security clearance. The SOR also advises
the applicant of his/her right to submit
a written rebuttal and/or mitigating
information regarding the allegations and
in the case of contractors, the additional
right to a hearing before an administrative
judge.
SPIN — Special Interview. Subject
interview to address specific unresolved
issues developed during a standard OPM
personnel security investigation.
SSBI — Single Scope Background
Investigation. Type of personnel security
investigation used for Top Secret
clearances, DoE “Q” access authorizations,
Sensitive Compartmented Information
(SCI) and other designated Special Access
Programs (SAP).
Compiled by William H. Henderson, author of Security
Clearance Manual
Build your own personal network of cleared candidates on The Cleared Network – only on ClearanceJobs.com.
1.877.386.3323 • www.clearancejobs.com SECURITY CLEARANCE JOBS FOR U.S. CITIZENS