Army Regulation 380-67

24 January 2014

Effective date: 24 February 2014

UNCLASSIFIED

Security

Personnel Security Program



SUMMARY of CHANGE

AR 380-67
Personnel Security Program

This rapid action revision, dated 24 January 2014

* Revises criteria for application of security standards (para 2-4 q ).

* Incorporates the provisions to provide procedural benefits to afford individuals an opportunity to appeal a final adjudicative decisions to a higher level authority (para 8-6 d ).

* Adds performance measures (para 11-5).

* Rescinds appendix on reporting of nonderogatory cases (app E).

* Deletes appendix on guidelines for conducting prenomination personal interviews (app G).

* Deletes appendix on the list of designated countries (app H).

* Updates the National Adjudicative Guidelines (app I).

* Adds internal control evaluation (app M).



Chapter 1
General Provisions

1-1. Purpose

a. To establish policies and procedures to ensure that acceptance and retention of personnel in the Armed Forces and United States Army, acceptance and retention of civilian employees in the Department of Defense (DOD) and Department of the Army (DA), and granting members of the Armed Forces, Army, DA and DOD civilian employees, DA and DOD contractors, and other affiliated persons access to classified information and assignment to sensitive positions are clearly consistent with the interests of national security.

b. This regulation

(1) Establishes DA and DOD personnel security policies and procedures;

(2) Sets forth the standards, criteria and guidelines upon which personnel security determinations shall be based;

(3) Prescribes the kinds and scopes of personnel security investigation (PSIs) required;

(4) Details the evaluation and adverse action procedures by which personnel security determinations shall be made; and

(5) Assigns overall program management responsibilities.

1-2. References

Required and related publications and prescribed and referenced forms are listed in appendix A .

1-3. Explanation of abbreviations and terms

Abbreviations and special terms used in this regulation are explained in the glossary .

1-4. Responsibilities

Responsibilities are listed throughout this regulation.

1-5. Objectives

a. This regulation implements the DOD and DA Personnel Security Program and takes precedence over all other departmental issuances affecting that program.

b. All provisions of this regulation apply to DA and DOD civilian personnel, members of the Armed Forces, excluding the Coast Guard in peacetime, U.S. Army, DA and contractor personnel and other personnel who are affiliated with the DOD and the Army except that the unfavorable administrative action procedures pertaining to contractor personnel requiring access to classified information are contained in DOD 5220.22-R ( AR 380-49 ) and in Department of Defense Directive ( DODD ) 5220.6 (AR 380-49) .

c. The policies and procedures which govern the National Security Agency are prescribed by Public Laws ( PL ) 88-290 and 86-36, Executive Orders 10450 ( EO 10450 ) and 12333 , DODD 5210.45 , Director of Central Intelligence Directive (DCID) 1/14 (references (e), (f), (g), (h), (i), and (l), respectively), and regulations of the National Security Agency.

d. Under combat conditions or other military exigencies, an authority in paragraph 1, appendix F , may waive such provisions of this regulation as the circumstances warrant.

e. This regulation also applies to

(1) Persons employed, hired on an individual basis, or serving on an advisory or consultant basis (including co-op and summer hire students) for whom Army personnel security clearances are required, whether or not such persons are paid from appropriated or nonappropriated funds.

(2) Employees of the Army National Guard (ARNG), Army-Air Force Exchange Service, American Red Cross, the United Service Organizations (USO), who are required to have Army personnel security clearances.

Chapter 2
Policies

Section I
Standards for Access to Classified Information or Assignment to Sensitive Duties

2-1. General

a. Only U.S. citizens shall be granted a personnel security clearance, assigned to sensitive duties, or granted access to classified information unless an authority designated in appendix F has determined that, based on all available information, there are compelling reasons in furtherance of the DOD mission, including, special expertise, to assign an individual who is not a citizen to sensitive duties or grant a limited access authorization to classified information. Non- U.S. citizens may be employed in the competitive service in sensitive civilian positions only when specifically approved by the Office of Personnel Management (OPM), pursuant to EO 11935 . Exceptions to these requirements shall be permitted only for compelling national security reasons.

b. No person is entitled to knowledge of, possession of, or access to classified defense information solely by virtue of office, position, grade, rank, or security clearance. Such information will be entrusted only to persons whose official military or other governmental duties require it and who have been investigated and cleared for access under the standards prescribed by this regulation. Security clearances indicate that the persons concerned are eligible for access to classified information should their official duties require it.

2-2. Clearance and sensitive position standard

The personnel security standard that must be applied to determine whether a person is eligible for access to classified information or assignment to sensitive duties is whether, based on all available information, the person's loyalty, reliability, and trustworthiness are such that entrusting the person with classified information or assigning the person to sensitive duties is clearly consistent with the interests of national security.

2-3. Military service standard

The personnel security standard that must be applied in determining whether a person is suitable under national security criteria for appointment, enlistment, induction, or retention in the Armed Forces is that, based on all available information, there is no reasonable basis for doubting the person's loyalty to the Government of the United States.

Section II
Criteria for Application of Security Standards

2-4. Criteria for application of security standards

The ultimate decision in applying either of the security standards set forth in paragraphs 2-2 and 2-3 , above, must be an overall common sense determination based upon all available facts. The criteria for determining eligibility for a clearance or assignment to a sensitive position under the security standard shall include, but not be limited to the following (see app I for further guidance on the application of these factors):

a. Commission of any act of sabotage, espionage, treason, terrorism, anarchy, sedition, or attempts thereat or preparation therefore, or conspiring with or aiding or abetting another to commit or attempt to commit any such act.

b. Establishing or continuing a sympathetic association with a saboteur, spy, traitor, seditionist, anarchist, terrorist, revolutionist, or with an espionage or other secret agent or similar representative of a foreign nation whose interests may be inimical to the interests of the United States, or with any person who advocates the use of force or violence to overthrow the Government of the United States or to alter the form of Government of the United States by unconstitutional means.

c. Advocacy or use of force or violence to overthrow the Government of the United States or to alter the form of Government of the United States by unconstitutional means.

d. Knowing membership with the specific intent of furthering the aims of, or adherence to and active participation in any foreign or domestic organization, association, movement, group or combination of persons (hereafter referred to as organizations) which unlawfully advocates or practices the commission of acts of force or violence to prevent others from exercising their rights under the Constitution or laws of the United States or of any State or which seeks to overthrow the Government of the United States, or any State or subdivision thereof by unlawful means.

e. Unauthorized disclosure to any person of classified information, or of other information, disclosure of which is prohibited by statute, Executive order, or regulation.

f. Performing or attempting to perform one's duties, acceptance and active maintenance of dual citizenship, or other acts conducted in a manner which serves or which could be expected to serve the interests of another government in preference to the interests of the United States.

g. Disregard of public law, statutes, EOs, or regulations, including violation of security regulations or practices.

h. Criminal or dishonest conduct.

i. Acts of omission or commission that indicate poor judgment, unreliability, or untrustworthiness.

j. Any behavior or illness, including any mental condition, which, in the opinion of competent medical authority, may cause a defect in judgment or reliability with due regard to the transient or continuing effect of the illness and the medical findings in such case.

k. Vulnerability to coercion, influence, or pressure that may cause conduct contrary to the national interest. This may be (1) the presence of immediate family members or other persons to whom the applicant is bonded by affection or obligation in a nation (or areas under its domination) whose interests may be inimical to those of the United States, or (2) any other circumstances that could cause the applicant to be vulnerable.

l. Excessive indebtedness, recurring financial difficulties, or unexplained affluence.

m. Habitual or episodic use of intoxicants to excess.

n. Illegal or improper use, possession, transfer, or sale of or addiction to any controlled or psychoactive substance, narcotic, cannabis, or other dangerous drug.

o. Any knowing and willful falsification, cover up, concealment, misrepresentation, or omission of a material fact from any written or oral statement, document, form or other representation or device used by DOD or any other Federal agency.

p. Failing or refusing to answer or to authorize others to answer questions or provide information required by a congressional committee, court, or agency in the course of an official inquiry whenever such answers or information concern relevant and material matters pertinent to an evaluation of the individual's trustworthiness, reliability, and judgment. Refusing or intentionally failing to provide a current personal security questionnaire (PSQ) or omitting material facts in a PSQ or other security form. Refusing to submit to a medical or psychological evaluation when information indicates the individual may have a mental or nervous disorder or be addicted to alcohol or any controlled substance.

q. Sexual behavior that involves a criminal offense, indicates a personality or emotional disorder, reflects lack of judgment or discretion, or which may subject the individual to undue influence or coercion, exploitation, or duress can raise questions about an individual's reliability, trustworthiness and ability to protect classified information. No adverse inference may be made solely on the basis of the sexual orientation of the individual.

.

Section III
Types and Scope of Personnel Security Investigations

2-5. General

The types of PSIs authorized below vary in scope of investigative effort required to meet the purpose of the particular investigation. No other types are authorized. The scope of a PSI may be neither raised nor lowered without the approval of the DUSD(P).

2-6. National agency check/entrance national agency check

Essentially, a national agency check (NAC) is a records check of designated agencies of the Federal Government that maintain record systems containing information relevant to making a personnel security determination. An entrance national agency check (ENTNAC) is a NAC (scope as outlined in para B -1, app B ) conducted on inductees and first-term enlistees, but lacking a technical fingerprint search. A NAC is also an integral part of each background investigation (BI), special background investigation (SBI), and periodic reinvestigation (PR). Chapter 3 prescribes when a NAC is required.

2-7. National agency check and written inquiries

The OPM conducts a NAC and written inquiries (NACI) on civilian employees for all departments and agencies of the Federal Government, pursuant to EO 10450 . NACIs are considered to meet the investigative requirements of this regulation for a nonsensitive or noncritical-sensitive position and/or up to a SECRET clearance and, in addition to the NAC, include coverage of law enforcement agencies, former employers and supervisors, references, and schools covering the last 5 years.

2-8. DOD national agency check and written inquiries

The Defense Investigative Service (DIS) will conduct a Department of Defense National Agency check with written inquiries (DNACI), consisting of the scope contained in paragraph B -2, appendix B , for DOD military and contractor personnel for access to SECRET information. Chapter 3 prescribes when a DNACI is required.

2-9. Background investigation

The BI is the principal type of investigation conducted when an individual requires TOP SECRET clearance or is to be assigned to a critical-sensitive position. The BI normally covers a 5-year period and consists of a subject interview, NAC, local agency check (LAC)s, credit checks, developed character references (3), employment records checks, employment references (3), and select scoping as required to resolve unfavorable or questionable information. (See para B -3, app B .) Chapter 3 prescribes when a BI is required.

2-10. Special background investigation

a. An SBI is essentially a BI providing additional coverage both in period of time as well as sources of information, scoped in accordance with the provisions of Director of Central Intelligence Directive (DCID) 1/14 but without the personal interview. While the kind of coverage provided for by the SBI determines eligibility for access to sensitive compartmented information (SCI), DD has adopted this coverage for certain other special access programs. Chapter 3 prescribes when an SBI is required.

b. The OPM, FBI, Central Intelligence Agency (CIA), Secret Service, and the Department of State conduct specially scoped BIs under the provisions of DCID 1/14. Any investigation conducted by one of the above-cited agencies under DCID 1/14 standards is considered to meet the SBI investigative requirements of this regulation.

c. The detailed scope of an SBI is set forth in paragraph B -4, appendix B .

2-11. Special investigative inquiry

a. A special investigative inquiry (SII) is a PSI conducted to prove or disprove allegations relating to the criteria outlined in paragraph 2-4 of this regulation, except current criminal activities (see para 2-17 d , below), that have arisen concerning an individual upon whom a personnel security determination has been previously made and who, at the time of the allegation, holds a security clearance or otherwise occupies a position that requires a trustworthiness determination.

b. Special investigative inquiries are scoped as necessary to address the specific matters requiring resolution in the case concerned and generally consist of record checks and/or interviews with potentially knowledgeable persons. An SII may include an interview with the subject of the investigation when necessary to resolve conflicting information and/or to provide an opportunity to refute or mitigate adverse information.

c. In those cases when there is a disagreement between DIS and the requester as to the appropriate scope of the investigation, the matter may be referred to the Deputy Under Secretary of Defense (Policy) (DUSD(P)) for resolution. Requests for resolution will be forwarded through command channels to HQDA (DAMI-CIS), Washington, DC 20310-1051.

2-12. Periodic reinvestigation

As referred to in paragraph 3-55 and other national directives, certain categories of duties, clearance, and access require the conduct of a PR every 5 years according to the scope outlined in paragraph B -5, appendix B . The PR scope applies to military, civilian, contractor, and foreign national personnel.

2-13. Personal interview

Investigative experience over the years has demonstrated that, given normal circumstances, the subject of a PSI is the best source of accurate and relevant information concerning the matters under consideration. Further, restrictions imposed by the Privacy Act of 1974 dictate that Federal investigative agencies collect information to the greatest extent practicable directly from the subject when the information may result in adverse determinations about an individual's rights, benefits, and privileges under Federal programs. Accordingly, personal interviews are an integral part of the DOD personnel security program and shall be conducted in accordance with the requirements set forth in the following paragraphs of this section.

a. Background investigation/periodic reinvestigation. A personal interview shall be conducted by a trained DIS agent as part of each BI and PR.

b. Resolving adverse information. A personal interview of the subject shall be conducted by a DIS agent (or, when authorized, by investigative personnel of other DOD investigative organizations designated in this regulation to conduct PSIs), when necessary, as part of each special investigative inquiry, as well as during the course of initial or expanded investigations, to resolve or clarify any information which may impugn the subject's moral character, threaten the subject's future Federal employment, raise the question of subject's security clearability, or be otherwise stigmatizing.

c. Hostage situation. A personal interview shall be conducted by a DIS agent (or, when authorized, by investigative personnel of other DOD investigative organizations designated in this regulation to conduct PSIs) in those instances in which an individual has immediate family members or other persons bound by ties of affection or obligation who reside in a nation whose interests are inimical to the interests of the United States. (See para 2-18 .)

d. Applicants/potential nominees for DOD Military or civilian positions requiring access to sensitive compartmented information or other positions requiring an special background investigation. A personal interview of the individual concerned shall be conducted, to the extent feasible, as part of the selection process for applicants/potential nominees for positions requiring access to SCI or completion of an SBI. The interview shall be conducted by a designee of the component to which the applicant or potential nominee is assigned. Clerical personnel are not authorized to conduct these interviews. Such interviews shall be conducted utilizing resources in the order of priority indicated below:

(1) Existing personnel security screening systems (for example, Air Force Assessment Screening Program, Naval Security Group Personnel Security Interview Program, U.S. Army Personnel Security Screening Program); or

(2) Commander of the nominating organization or such official as they have designated, in writing (for example, deputy commander, executive officer, security officer, security manager, S-2, counterintelligence specialist, personnel security specialist, or personnel officer); or

(3) Agents of investigative agencies in direct support of the component concerned.

e. Administrative procedures.

(1) The personal interview required by paragraph d , above, shall be conducted in accordance with appendix G .

(2) For those investigations requested subsequent to the personal interview requirements of paragraph d , above, the following procedures apply:

(a) The DD Form 1879 (Request for Personnel Security Investigation) shall be annotated under Item 20 (Remarks) with the statement "Personal Interview Conducted by (cite the duty assignment of the designated official (for example, commander, security officer, personnel security specialist, and so forth))" in all cases in which an SBI is subsequently requested.

(b) Unfavorable information developed through the personal interview required by paragraph d , above, will be detailed in a written report attached to the DD Form 1879 to include full identification of the interviewer. Failure to provide such information may result in conduct of an incomplete investigation by DIS.

(c) Whenever it is determined that it is not feasible to conduct the personal interview required by paragraph d , above, prior to requesting the SBI, the DD Form 1879 shall be annotated under Item 20 citing the reason for not conducting the interview.

2-14. Expanded investigation

If adverse or questionable information relevant to a security determination is developed during the conduct of a PSI, regardless of type, the investigation shall be expanded, consistent with the restrictions in paragraph 2-24 , to the extent necessary to substantiate or disprove the adverse or questionable information.

Section IV
Authorized Personnel Security Investigative Agencies

2-15. General

The DIS provides a single centrally directed personnel security investigative service to conduct PSIs within the 50 states, District of Columbia, and Commonwealth of Puerto Rico for DOD components, except as provided for in DODD 5100.23 . DIS will request the military departments or other appropriate Federal agencies to accomplish DOD investigative requirements in other geographic areas beyond their jurisdiction. No other DOD component shall conduct PSIs unless specifically authorized by the DUSD(P). In certain instances provided for below, the DIS shall refer an investigation to other investigative agencies.

2-16. Subversive affiliations

a. General. In the context of DOD investigative policy, subversion refers only to such conduct as is forbidden by the laws of the United States. Specifically, this is limited to information concerning the activities of individuals or groups that involve or will involve the violation of Federal law, for the purpose of:

(1) Overthrowing the Government of the United States or the government of a State;

(2) Substantially impairing for the purpose of influencing U.S. Government policies or decisions:

(a) The functions of the Government of the United States, or

(b) The functions of the government of a State;

(3) Depriving persons of their civil rights under the Constitution or laws of the United States.

b. Military department/Federal Bureau of Investigation jurisdiction. Allegations of activities covered by criteria a through f of paragraph 2-4 of this regulation are in the exclusive investigative domain of either the counterintelligence agencies of the military departments or the Federal Bureau of Investigation (FBI), depending on the circumstances of the case and the provisions of the Agreement Governing the Conduct of Defense Department Counterintelligence Activities in Conjunction with the FBI . Whenever allegations of this nature are developed, whether before or after a security clearance has been issued or during the course of a PSI conducted by DIS, they shall be referred immediately to either the FBI or to a military department counterintelligence agency, as appropriate.

c. Defense Investigative Service jurisdiction. Allegations of activities limited to those set forth in criterion g through q of paragraph 2-4 of this regulation shall be investigated by DIS.

2-17. Suitability information

a. General. Most derogatory information developed through PSIs of DOD military or civilian personnel is so- called suitability information, that is, information pertaining to activities or situations covered by criteria g through q of paragraph 2-4 of this regulation. Almost all unfavorable personnel security determinations made by DOD authorities are based on derogatory suitability information, although such information is often used as a basis for unfavorable administrative actions not of a security nature, such as action under the Uniform Code of Military Justice ( UCMJ ) or removal from Federal employment under OPM regulations.

b. Preclearance investigation. Derogatory suitability information, except that covered in paragraph d , below, developed during the course of a PSI, prior to the issuance of an individual's personnel security clearance, shall be investigated by DIS to the extent necessary to confirm or refute its applicability to criteria in paragraph 2-4 , g through q of this regulation.

c. Postadjudication investigation. Derogatory suitability allegations, except those covered by paragraph d , below, arising subsequent to clearance requiring investigation to resolve and to determine the individual's eligibility for continued access to classified information, reinstatement of clearance/access, or retention in a sensitive position shall be referred to DIS to conduct a special investigative inquiry. Reinvestigation of individuals for adjudicative reconsideration due to the passage of time or evidence of favorable behavior shall also be referred to DIS for investigation. In such cases, completion of the appropriate statement of personal history by the individual constitutes consent to be investigated. Individual consent or completion of a statement of personal history is not required when paragraph 3-56 applies. Postadjudication investigation of allegations of a suitability nature required to support other types of unfavorable personnel security determinations or disciplinary procedures independent of a personnel security determination shall be handled in accordance with applicable component administrative regulations. These latter categories of allegations lie outside the DOD personnel security program and are not a proper investigative function for departmental counterintelligence organizations, component personnel security authorities, or DIS.

d. Allegations of criminal activity. Any allegations of conduct of a nature indicating possible criminal conduct, including any arising during the course of a PSI, shall be referred to the appropriate DOD, military department, or civilian criminal investigative agency. Military department investigative agencies have primary investigative jurisdiction in cases where there is probable cause to believe that the alleged conduct will be the basis for prosecution under the UCMJ . Such information will be referred to the installation or unit provost marshal and/or security manager or the U.S. Army Criminal Investigation Command for action.

2-18. Hostage situations

a. General. A hostage situation exists when a member of an individual's immediate family or such other person to whom the individual is bound by obligation or affection resides in a country whose interests are inimical to the interests of the United States. The rationale underlying this category of investigation is based on the possibility that an individual in such a situation might be coerced, influenced, or pressured to act contrary to the best interests of national security.

b. DIS jurisdiction. In the absence of evidence of any coercion, influence, or pressure, hostage investigations are exclusively a personnel security matter, rather than counterintelligence, and all such investigations shall be conducted by DIS.

c. Military department and/or the Federal Bureau of Investigation jurisdiction. Should indications be developed that hostile intelligence is taking any action specifically directed against the individual concerned or should there exist any other evidence that the individual is actually being coerced, influenced, or pressured by an element inimical to the interests of national security then the case becomes a counterintelligence matter (outside of the investigative jurisdiction of DIS) to be referred to the appropriate military department or the FBI for investigation.

2-19. Overseas personnel security investigations

Personnel security investigations requiring investigation overseas shall be conducted under the direction and control of DIS by the appropriate military department investigative organization ( AR 381-20 applies). Only postadjudication investigations involving an overseas subject may be referred by the requester directly to the Military Department investigative organization having investigative responsibility in the overseas area concerned (see app J ) with a copy of the investigative request sent to DIS. In such cases, the military department investigative agency will complete the investigation and forward the completed report of investigation directly to DIS, with a copy to the requester.

Section V
Limitations and Restrictions

2-20. Authorized requesters and personnel security determination authorities

Personnel security investigations may be requested and personnel security clearances (including special access authorizations as indicated) granted only by those authorities designated in paragraph 5-1 and appendix F .

2-21. Limit investigations and access

The number of persons cleared for access to classified information shall be kept to a minimum, consistent with the requirements of operations. Special attention shall be given to eliminating unnecessary clearances and requests for PSIs.

2-22. Collection of investigative data

To the greatest extent practicable, personal information relevant to security determinations shall be obtained directly from the subject of a PSI. Such additional information required to make the necessary personnel security determination shall be obtained as appropriate from knowledgeable personal sources, particularly the subject's peers, and through checks of relevant records, including school, employment, credit, medical, and law enforcement records.

2-23. Privacy Act notification

Whenever personal information is solicited from an individual preparatory to the initiation of a PSI, the individual must be informed of (1) the authority (statute or Executive order that authorized solicitation); (2) the principal purpose or purposes for which the information is to be used; (3) the routine uses to be made of the information; (4) whether furnishing such information is mandatory or voluntary; (5) the effect on the individual, if any, of not providing the information; and (6) that subsequent use of the data may be employed as part of an aperiodic, random process to screen and evaluate continued eligibility for access to classified information.

2-24. Restrictions on investigators

Investigation shall be carried out insofar as possible to collect only as much information as is relevant and necessary for a proper personnel security determination. Questions concerning personal and domestic affairs, national origin, financial matters, and the status of physical health thus should be avoided unless the question is relevant to the criteria of paragraph 2-4 of this regulation. Similarly, the probing of a person's thoughts or beliefs and questions about conduct that have no personnel security implications are unwarranted. When conducting investigations under the provisions of this regulation, investigators shall:

a. Investigate only cases or persons assigned within their official duties.

b. Interview sources only where the interview can take place in reasonably private surroundings.

c. Always present credentials and inform sources of the reasons for the investigation. Inform sources of the subject's accessibility to the information to be provided and to the identity of the sources providing the information. Restrictions on investigators relating to Privacy Act advisements to subjects of PSIs are outlined in paragraph 2-23 .

d. Furnish only necessary identity data to a source and refrain from asking questions in such a manner as to indicate that the investigator is in possession of derogatory information concerning the subject of the investigation.

e. Refrain from using, under any circumstances, covert or surreptitious investigative methods, devices, or techniques, including mail covers, physical or photographic surveillance, voice analyzers, inspection of trash, paid informants, wiretaps, or eavesdropping devices.

f. Refrain from accepting any case in which the investigator knows of circumstances that might adversely affect their fairness, impartiality, or objectivity.

g. Refrain from conducting, under any circumstances, physical searches of the subject or their property.

h. Refrain from attempting to evaluate material contained in medical files. Medical files shall be evaluated for personnel security program purposes only by such personnel as are designated by DOD medical authorities. However, review and collection of medical record information may be accomplished by authorized investigative personnel.

2-25. Polygraph restrictions

The polygraph may be used as a personnel security screening measure only in those limited instances authorized by the Secretary of Defense in DODD 5210.48 , ( AR 195-6 ) .

Chapter 3
Personnel Security Investigative Requirements

Section I
Sensitive Positions

3-1. Designation of sensitive positions

Certain civilian positions within DOD entail duties of such a sensitive nature, including access to classified information, that the misconduct, malfeasance, or nonfeasance of an incumbent in any such position could result in an unacceptably adverse impact upon the national security. These positions are referred to in this regulation as sensitive positions. It is vital to the national security that great care be exercised in the selection of individuals to fill such positions. Similarly, it is important that only positions which truly meet one or more of the criteria set forth in paragraph 3-2 be designated as sensitive. A sensitive position will not be downgraded or reclassified as nonsensitive solely to aid in recruiting personnel.

3-2. Criteria for security designation of positions

Each civilian position within DOD shall be categorized, with respect to security sensitivity, as either nonsensitive, noncritical-sensitive, or critical-sensitive.

a. The criteria to be applied in designating a position as sensitive are:

(1) Critical-sensitive.

(a) Access to TOP SECRET information.

(b) Development or approval of plans, policies, or programs that affect the overall operations of the DOD or of a DOD component.

(c) Development or approval of war plans, plans or particulars of future major or special operations of war, or critical and extremely important items of war.

(d) Investigative and certain investigative support duties, the issuance or adjudication of personnel security clearances or access authorizations, or the making of personnel security determinations.

(e) Fiduciary, public contact, or other duties demanding the highest degree of public trust.

(f) Duties falling under special access programs.

(g) Category I automated data processing (ADP) positions.

(h) Any other position so designated by the head of the component or designee.

(2) Noncritical-sensitive.

(a) Access to SECRET or CONFIDENTIAL information.

(b) Security police/ provost marshal-type duties involving the enforcement of law and security duties involving the protection and safeguarding of DOD personnel and property.

(c) Category II automated data processing positions.

(d) Duties involving education and orientation of DOD personnel.

(e) Duties involving the design, operation, or maintenance of intrusion detection systems deployed to safeguard DOD personnel and property.

(f) Any other position so designated by the head of the component or designee.

b. All other positions shall be designated as nonsensitive.

3-3. Authority to designate sensitive positions

The authority to designate sensitive positions is limited to those authorities designated in paragraph F-7 , appendix F . These authorities shall designate each position within their jurisdiction as to its security sensitivity and maintain these designations current vis-a-vis the specific duties of each position.

3-4. Limitation of sensitive positions

It is the responsibility of those authorities authorized to designate sensitive positions to ensure that (1) only those positions that meet the criteria of paragraph 3-2 , above, are designated as sensitive, and (2) the designation of sensitive positions is held to a minimum consistent with mission requirements. Designating authorities shall maintain an accounting of the number of sensitive positions by category, that is, critical or noncritical-sensitive. Such information will be included in the annual report required in chapter 11 .

3-5. Billet control system for TOP SECRET

a. To standardize and control the issuance of TOP SECRET clearances within the Department of Defense, a specific designated billet must be established and maintained for all DOD military and civilian positions requiring access to TOP SECRET information. Only persons occupying these billet positions will be authorized TOP SECRET access . If an individual departs from a TOP SECRET billet to a billet/position involving a lower level clearance, the TOP SECRET access will be administratively rescinded. This TOP SECRET billet requirement is in addition to the existing billet structure maintained for SCI access.

b. Each request to DIS for a BI or SBI that involves access to TOP SECRET or SCI information will require inclusion of the appropriate billet reference, on the request for investigation.

Section II
Civilian Employment

3-6. General

The appointment of each civilian employee in any DOD component is subject to investigation, except for reappointment when the break in employment is less than 12 months. The type of investigation required is set forth in this section according to position sensitivity.

3-7. Nonsensitive positions

In accordance with the OPM Federal Personnel Manual, a NACI shall be requested not later than 3 working days after a person is appointed to a nonsensitive position. Although there is normally no investigation requirement for per diem, intermittent, temporary, or seasonal employees in nonsensitive positions provided such employment does not exceed an aggregate of 120 days in either a single continuous or series of appointments, a NAC may be requested of DIS where deemed appropriate by the employing activity.

3-8. Exceptions to investigative requirements

The following exceptions have been granted DA by the OPM:

a. When a U.S. citizen or an alien scheduled to work in the United States and its territories or possessions is to be assigned to a nonsensitive position on a temporary basis not to exceed 6 months, a NACI is not automatically required. The commander or head of the activity will decide whether or not it is needed. In no case will this investigation be less than the preemployment inquiries prescribed by CPR 296-31, appendix B, S731-3. Commanders will ensure maximum and proper use of this exception.

b. A non-U.S. citizen to be assigned to a nonsensitive position outside the United States and its territories and possessions will be subject to as much of the investigation outlined below as it is feasible to conduct:

(1) A check of the national investigative agencies of the foreign government.

(2) A check of the appropriate local law enforcement agencies where the person has resided for the past 5 years.

(3) A check of the appropriate U.S. military intelligence files.

c. The requirement for the "written inquiries" portion of the NACI in connection with summer hire personnel has been waived. A NACI will be required if a summer hire employee is subsequently hired as a permanent employee.

d. A NACI will not be requested for a military or civilian family member hired under 5 CFR 213.3106(b)(6). Commanders will ensure that this employment will not be adverse to U.S. interests.

3-9. Noncritical-sensitive positions

a. An NACI shall be requested and the NAC portion favorably completed before a person is appointed to a noncritical-sensitive position (for exceptions see para 3-10 ). An ENTNAC, NAC or DNACI conducted during military or contractor employment may also be used for appointment provided a NACI has been requested from OPM and there is no more than 12 months break in service since completion of the investigation.

b. Seasonal employees (including summer hires) normally do not require access to classified information. For those requiring access to classified information, the appropriate investigation is required. The request for the NAC should be submitted to DIS by entering "SH" (summer hire) in red letters approximately 1 inch high on the DD Form 398-2 , Personnel Security Questionnaire (National Agency Check). Additionally, to ensure expedited processing by DIS, summer hire requests should be assembled and forwarded to DIS in bundles, when appropriate.

3-10. Critical-sensitive positions

A BI shall be favorably completed prior to appointment to critical-sensitive positions (for exceptions see para 3-10). Certain critical-sensitive positions require a preappointment SBI in accordance with section V of this chapter. Preappointment BIs and SBIs will be conducted by DIS. In as much as a BI or SBI is of greater scope, a NACI will not be requested from OPM if a BI or SBI for employment in a critical-sensitive position is requested from DIS or a valid BI or SBI exists.

3-11. Exceptions

a. Noncritical-sensitive. In an emergency, a noncritical-sensitive position may be occupied pending the completion of the NACI if the head of the requesting organization finds that the delay in appointment would be harmful to the national security and such finding is reduced to writing and made a part of the record in the official personnel folder (OPF). The emergency finding will include a statement of why a delay pending completion of the required investigation will be harmful to the national interest. In such instances, the position may be filled only after the NACI has been requested.

b. Critical-sensitive. In an emergency, a critical-sensitive position may be occupied pending completion of the BI (or SBI, as appropriate) if the head of the requesting organization or an authority listed in paragraph F-7 a, appendix F finds that the delay in appointment would be harmful to the national security and such finding is reduced to writing and made a part of the record in the OPF. The emergency finding will include a statement of why a delay pending completion of the required investigation will be harmful to the national interest. In such instances, the position may be filled only when the NAC portion of the BI (or SBI) or a previous valid NACI, NAC, or ENTNAC has been completed and favorably adjudicated, and there has been no break in service in excess of 12 months.

c. Harmful delays. In exceptions a and b above, a delay in appointment may be considered harmful to national interests if the following apply:

(1) Regulatory requirements, mission-essential functions, or responsibilities cannot be met. A detailed explanation will be provided.

(2) No other personnel are available on a temporary basis to complete these requirements.

d. Applicability. This policy applies to new appointments and to current incumbents of positions when the sensitivity designation is changed.

3-12. Mobilization of DOD civilian retirees

The requirements contained in paragraph 3-5 of this section, regarding the type of investigation required by position sensitivity for a DOD civilian retiree's temporary appointment when the break in employment is greater than 12 months, should either be expedited or waived for the purposes of mobilizing selected reemployed annuitants under the provisions of 5 USC, depending upon the degree of sensitivity of the position to which assigned. Particular priority should be afforded to newly assigned personnel assigned to the defense intelligence and security agencies with respect to granting security clearances in an expeditious manner under paragraph 3-5 of this section.

Section III
Military Appointment, Enlistment, and Induction

3-13. General

The appointment, enlistment, and induction of each member of the Armed Forces or their Reserve Components into any of the components of the U.S. Army shall be subject to the favorable completion of a PSI. The types of investigation required are set forth in this section.

3-14. Entrance investigation

a. An ENTNAC shall be conducted on each enlisted member of the Armed Forces at the time of initial entry into the service. A DNACI shall be conducted on each commissioned officer, warrant officer, cadet, midshipman, and Reserve Officers Training Candidate, at the time of or before appointment. A SECRET clearance is a condition of appointment. Paragraph 3-303 outlines exceptions. A full NAC shall be conducted upon reentry of any of the above when there has been a break in service greater than 12 months.

b. If an officer or warrant officer candidate has been the subject of a favorable NAC or ENTNAC and there has not been a break in service of more than 12 months, a new NAC is not authorized and the NAC or ENTNAC may be used as the authority for commissioning, subject to favorable completion of a DNACI. This includes ROTC graduates who delay entry onto active duty pending completion of their studies.

c. All derogatory information revealed during the enlistment or appointment process (including Personnel Security Screening Program processing) that results in a moral waiver will be fully explained on a written summary attached to the DD Form 398-2 or DD Form 398.

3-15. Reserve Components and National Guard

Reserve Components and National Guard personnel not on active duty are subject to the investigative requirements of this chapter.

3-16. Exceptions for certain commissioned officers of Reserve Components

The requirements for entrance investigation shall be rigidly adhered to except as follows. Health professionals, chaplains, and attorneys may be commissioned in the Reserve Components prior to completion of a DNACI provided that:

a. A DNACI is initiated at the time an application for a commission is received; and

b. The applying health professional, chaplain, or attorney agrees in writing that, if the results of the investigation are unfavorable, he or she will be subject to discharge if found to be ineligible to hold a commission. Under this exception, commissions in Reserve Components other than the National Guard may be tendered to immigrant alien health professionals, chaplains, and attorneys; however, provisions of paragraph 3-21 apply regarding eligibility for access to classified information.

3-17. Mobilization of military retirees

The requirements contained in paragraph 3-13 of this section, regarding a full NAC upon reentry to active duty of any officer or enlisted regular/reserve military retiree or Individual Ready Reserve (IRR) who has been separated from service for a period of greater than 12 months are waived for the purposes of partial or full mobilization under provisions of 10 USC, to include the period of prescribed service refresher training. Particular priority should be afforded to military retirees mobilized and assigned to the defense intelligence and security agencies communities. (See para 7-2 for issuance of interim clearances.)

3-18. Mobilization exercises

MACOMs may waive the investigative requirements in paragraph 3-19 for any personnel under combat conditions or participating in HQDA-directed mobilization exercises. (See para 7-2 e for issuance of interim clearances.)

Section IV
Security Clearance

3-19. General

a. The authorities designated in paragraph F-1, appendix F , are the only authorities authorized to grant, deny or revoke DOD personnel security clearances. The granting of such clearances shall be limited to only those persons who require access to classified information for mission accomplishment.

b. Military, DOD civilian, and contractor personnel who are employed by or serving in a consultant capacity to the DOD, may be considered for access to classified information only when such access is required in connection with official duties. Such individuals may be granted either a final or interim personnel security clearance provided the investigative requirements set forth below are complied with, and provided further that all available information has been adjudicated and a finding made that such clearance would be clearly consistent with the interests of national security.

c. Before issuing any security clearance, final or interim, the commander must verify the following:

(1) That the person has had no break in Federal service exceeding 12 months since the completion of the investigation.

(2) That the person can prove U.S. citizenship by presenting one of the documents listed in paragraph B-4 d , appendix B (see para 3-20 ).

3-20. Investigative requirements for clearance

a. TOP SECRET.

(1) Final clearance:

(a) BI /SBI.

(b) Established billet per paragraph 3-4 (except contractors).

(c) Favorable review of local personnel, post military police, medical records, and other security records, as appropriate.

(2) Interim clearance:

(a) Favorable NAC, ENTNAC, DNACI, or NACI completed within past 5 years.

(b) Favorable review of DD Form 398 / SF-86 / OF 612 / DD Form 49 .

(c) BI or SBI has been initiated.

(d) Favorable review of local personnel, post or base military police, medical, and other security records as appropriate.

(e) Established billet per paragraph 3-4 (except contractors).

(f) Provisions of paragraph 3-10 have been met regarding civilian personnel.

(g) If evidence exists of a BI, SBI, full field investigation, Criminal Investigation Command (CID) character investigation, or comparable investigation not over 4 years old, provisions of paragraphs (b) and (c), above, are waived and a requesting a final TOP SECRET clearance will be submitted to central clearance facility (CCF) noting that an interim clearance was granted. Such evidence will be attached to the DA Form 5247-R . CCF will check the defense central investigations index (DCII) to find whether or not a later investigation exists that would require withdrawal of a security clearance.

(h) Commanders may grant an interim TOP SECRET clearance for 180 days in the name of the Commander, CCF.

b. SECRET.

(1) Final clearance:

(a) DNACI: Military (except first-term enlistees) and contractor employees.

(b) NACI: Civilian employees.

(1) The NACI is required even though the individual held a valid security clearance based on a NAC, ENTNAC, or DNACI while a member of the Armed Forces.

(2) Exception: Summer hires, members of cooperative education programs, employees of nonappropriated fund instrumentalities, Army and Air Force Exchange Service employees, Red Cross members, USO employees, and non-Federal employees of the ARNG may be granted a final clearance on the basis of a favorable completed NAC/ENTNAC conducted by the DIS. No interim clearance is authorized for these employees.

(c) Entrance: First-term enlistees.

(d) Favorable review of local personnel, post military police, medical, and other security records as appropriate.

(2) Interim clearance:

(a) When a valid need to access SECRET information is established, an interim SECRET clearance may be issued for 180 days in the name of the CDR, CCF, in every case, provided that a DA Form 5247-R has been submitted to CCF, and the steps outlined in paragraphs (b) through (e), below, have been complied with.

(b) Favorable review of DD Form 398-2 / SF 85 / OF 612 / DD Form 48 .

(c) NACI, DNACI, or ENTNAC initiated.

(d) Favorable review of local personnel, post or base military police, medical, and other security records as appropriate.

(e) NAC or ENTNAC completed or, in an emergency, provisions of paragraph 3-10 have been complied with regarding civilian personnel.

c. CONFIDENTIAL.

(1) Final clearance:

(a) NAC or ENTNAC: Military and contractor employees (except for Philippine national members of the United States Navy on whom a BI shall be favorably completed).

(b) NACI; Civilian employees (except for summer hires and others listed in paragraph 3-19 b (l)(b)(l) 2 who may be granted a final clearance on the basis of a NAC).

(c) Favorable review of local personnel, post military police, medical, and other security records as appropriate.

(2) Interim clearance:

(a) Favorable review of DD Form 398-2 / SF 86 / OF 612 / DD Form 48 .

(b) NAC, ENTNAC, or NACI initiated.

(c) Favorable review of local personnel, post or base military police, medical, and other security records as appropriate.

(d) Provisions of paragraph 3-10 have been complied with regarding civilian personnel.

d. Validity of, previously granted clearances. Clearances granted under less stringent investigative requirements retain their validity; however, if a higher degree of clearance is required, investigative requirements of this regulation will be followed.

3-21. Naturalized U.S. citizens

This paragraph rescinded per DUSD(P) memorandum dated 12 February 1988, subject: Revocation of the Policy, in paragraph 3-20, DOD 5200.2-R .

3-22. Access to classified information by non-U.S. citizens

a. Only U.S. citizens are eligible for a security clearance. Therefore, every effort shall be made to ensure that non-U.S. citizens are not employed in duties that may require access to classified information. However, when there are compelling reasons to grant access to classified information to an immigrant alien or a foreign national in furtherance of the mission of the Department of Defense, such individuals may be granted a "limited access authorization" (LAA) under the following conditions:

(1) The LAAs will be limited to SECRET and CONFIDENTIAL level only; LAAs for TOP SECRET are prohibited.

(2) Access to classified information is not inconsistent with that determined releasable by designated disclosure authorities, in accordance with DODD 5230.11 ( AR 380-10 ) to the country of which the individual is a citizen.

(3) Access to classified information must be limited to information relating to a specific program or project.

(4) Favorable completion of a BI (scoped for 10 years); where the full investigative coverage cannot be completed, a counterintelligence scope polygraph examination will be required in accordance with the provisions of DODD 5210.48 ( AR 195-6 ) .

(5) Security clearances previously issued to immigrant aliens will be reissued as LAAs. Immigrant aliens who are eligible for U.S. citizenship and have not tried to become naturalized within 12 months of eligibility will not be considered for an LAA. They will be reported to CCF for action under chapter 8 , if appropriate.

(6) The limited access authorization determination shall be made only by an authority designated in paragraph F-2 , appendix F .

(7) The LAAs issued by the Unified and Specified Commands shall be reported to the central adjudicative facility of the appropriate Military Department in accordance with the assigned responsibilities in DODD 5100.3 for inclusion in the DCII.

(8) The LAAs will be limited to persons who have a special skill or technical expertise essential to the national security that is not available from U.S. personnel. LAAs will not be granted to secretarial or clerical personnel or others who perform routine administrative duties.

(9) Commanders are reminded that an LAA is not a security clearance but an authorization for access to specific, U.S. classified information required in performance of job duties. Exposure to classified information outside the scope of an approved LAA is a compromise of such information and will be processed according to AR 380-5 .

b. In each case of granting a limited access authorization, a record shall be maintained as to:

(1) The identity (including current citizenship) of the individual to whom the limited access authorization is granted, to include, name and date and place of birth;

(2) Date and type of most recent investigation to include the identity of the investigating agency;

(3) The nature of the specific program material(s) to which access is authorized (delineated as precisely as possible);

(4) The classification level to which access is authorized;

(5) The compelling reasons for granting access to the materials cited in paragraph (3), above, and

(6) Status of the individual (that is, immigrant alien or foreign national).

c. Individuals granted LAAs under the foregoing provisions shall be the subject of a 5-year periodic reinvestigation as set forth in paragraph B-5 , appendix B.

d. Foreign nationals who are LAA candidates must agree to submit to a counterintelligence-scope polygraph examination prior to being granted access in accordance with DODD 5210.48 ( AR 195-6 ) .

e. If geographical and political situations prevent the full completion of the BI (and/ or counterintelligence-scope polygraph), issuance of an LAA shall not be authorized; exceptions to the policy may only be authorized by the DUSD(P).

f. A report on all LAAs in effect, including the data required in paragraphs b (l) through (6), above, shall be furnished to the DUSD(P), DCSINT (DAMI-CIS), within 30 days after the end of each fiscal year (See para 11-102.)

3-23. Access by persons outside the executive branch

a. Access to classified information by persons outside the executive branch shall be accomplished in accordance with chapter VII, DOD 5200.1-R ( AR 380-5 ) . The investigative requirement shall be the same as for the appropriate level of security clearance, except as indicated below.

b. Members of the U.S. Senate and House of Representatives do not require personnel security clearances, They may be granted access to DOD classified information which relates to matters under the jurisdiction of the respective committees to which they are assigned and is needed to perform their duties in connection with such assignments.

c. Congressional staff members requiring access to DOD classified information shall be processed for a security clearance in accordance with DODD 5142.1 and the provisions of this regulation. The Director, Washington Headquarters Services (WHS), will initiate the required investigation (initial or reinvestigation) to DIS, adjudicate the results and grant, deny or revoke the security clearance, as appropriate. The Assistant Secretary of Defense (Legislative Affairs) will be notified by WHS of the completed clearance action.

d. State Governors do not require personnel security clearances. They may be granted access to specifically designated classified information, on a"need-to-know" basis, based upon affirmation by the Secretary of Defense, the Secretary of the Army (SA), or the Deputy Chief of Staff, G-2 (DCS, G-2) that access, under the circumstances, serves the national interest. Staff personnel of a Governor's office requiring access into classified information shall be investigated and cleared in accordance with the prescribed procedures of this regulation when the head of a DOD component or single designee, the SA, or the DCS, G-2 affirms that such clearance serves the national interest. Access shall also be limited to specifically designated classified information on a"need-to-know" basis. Requests for access by State Governors and/or the staff of a Governor's office will be submitted to HQDA (DAMI-CIS.)

e. Members of the U.S. Supreme Court, the Federal judiciary and the Supreme Courts of the individual States do not require personnel security clearances. They may be granted access to DOD classified information to the extent necessary to adjudicate cases being heard before these individual courts.

f. Attorneys representing DOD military, civilian or contractor personnel, requiring access to DOD or DA classified information to properly represent their clients, shall normally be investigated by DIS and cleared in accordance with the prescribed procedures in paragraph 3-19 . This shall be done upon certification of the General Counsel of the DOD component involved in the litigation or Office of The Judge Advocate General that access to specified classified information, on the part of the attorney concerned, is necessary to adequately represent their client. In exceptional instances, when the exigencies of a given situation do not permit timely compliance with the provisions of paragraph 3-19, access may be granted with the written approval of an authority designated in paragraph F-1 , appendix F, provided that as a minimum: (a) a favorable name check of the FBI and the DCII has been completed, and (b) a DOD Non-Disclosure Agreement has been executed. Requests for access for attorneys representing DA military, civilian, or contractor personnel will be submitted through the Office of The Judge Advocate General (DAJA-AL), Washington, DC 20310-2212 to the Office of The Deputy Chief of Staff for Intelligence (DAMI-CIS), Washington, DC 20310-1056. In postindictment cases, after a judge has invoked the security procedures of PL 96-456 , Stat. 2025, the Classified Information Procedures Act (CIPA), the Department of Justice may elect to conduct the necessary BI and issue the required security clearance, in coordination with the affected DOD component or the DA.

3-24. Restrictions on issuance of personnel security clearances

Personnel security clearances must be kept to the absolute minimum necessary to meet mission requirements.
Personnel security clearances shall not be issued:

a. To persons in nonsensitive positions.

b. To persons whose regular duties do not require authorized access to classified information.

c. For ease of movement of persons within a restricted, controlled, or industrial area, whose duties do not require access to classified information.

d. To persons who may only have inadvertent access to sensitive information or areas, such as guards, emergency service personnel, firemen, doctors, nurses, police, ambulance drivers, or similar personnel.

e. To persons working in shipyards whose duties do not require access to classified information.

f. To persons who can be prevented from accessing classified information by being escorted by cleared personnel.

g. To food service personnel, vendors and similar commercial sales or service personnel whose duties do not require access to classified information.

h. To maintenance or cleaning personnel who may only have inadvertent access to classified information unless such access cannot be reasonably prevented.

i. To persons who perform maintenance on office equipment, computers, typewriters, and similar equipment who can be denied classified access by physical security measures.

j. To perimeter security personnel who have no access to classified information.

k. To drivers, chauffeurs and food service personnel.

3-25. Administrative downgrading

Clearance certificates will not be administratively reduced or invalidated because a person has been assigned to duties that do not require access to the same or lower degree of classified information, the permanent duty station has been changed, or to avoid revocation in the face of credible derogatory information.

3-26. Dual citizenship

Persons claiming both U.S. and foreign citizenship shall be processed under paragraph 3-19 , above, and adjudicated in accordance with the"Foreign Preference" standard in appendix I .

3-27. One-time access

Circumstances may arise where an urgent operational or contractual exigency exists for cleared DOD personnel to have one-time or short duration access to classified information at a higher level than is authorized by the existing security clearance. In many instances, the processing time required to upgrade the clearance would preclude timely access to the information. In such situations, and only for compelling reasons in furtherance of the DOD or DA mission, an authority referred to in paragraph a , below, may grant higher level access on a temporary basis subject to the terms and conditions prescribed below. This special authority may be revoked for abuse, inadequate record keeping, or inadequate security oversight. These procedures do not apply when circumstances exist which would permit the routine processing of an individual for the higher level clearance. Procedures and conditions for effecting emergency one-time access to the next higher classification level are as follows:

a. Authorization for such one-time access shall be granted by a general officer, a general court martial convening authority or equivalent Senior Executive Service member, after coordination with appropriate security officials.

b. The recipient of the one-time access authorization must be a U.S. citizen, possess a current DOD security clearance, and the access required shall be limited to classified information one level higher than the current clearance.

c. Such access, once granted, shall be canceled promptly when no longer required, at the conclusion of the authorized period of access, or upon notification from the granting authority.

d. The employee to be afforded the higher level access shall have been continuously employed by a DOD Component or a cleared DOD contractor for the preceding 24-month period. Higher level access is not authorized for part-time employees.

e. Pertinent local records concerning the employee concerned shall be reviewed with favorable results.

f. Whenever possible, access shall be confined to a single instance or, at most, a few occasions. The approval for access shall automatically expire 30 calendar days from date access commenced. If the need for access is expected to continue for a period in excess of 30 days, written approval of the granting authority is required. At such time as it is determined that the need for access is expected to extend beyond 90 days, the individual concerned shall be promptly processed for the level of clearance required. When extended access has been approved, such access shall be canceled at or before 90 days from original date of access.

g. Access at the higher level shall be limited to information under the control and custody of the authorizing official and shall be afforded under the general supervision of a properly cleared employee. The employee charged with providing such supervision shall be responsible for: (1) recording the higher level information actually revealed, (2) the date(s) such access is afforded, and (3) the daily retrieval of the material accessed.

h. Access at the next higher level shall not be authorized for communications security (COMSEC), SCI, NATO, or foreign government information.

i. The exercise of this provision shall be used sparingly and repeat use within any 12-month period on behalf of the same individual is prohibited. The approving authority shall maintain a record containing the following data with respect to each such access approved:

(1) The name and social security number (SSN) of the employee afforded higher level access.

(2) The level of access authorized.

(3) Justification for the access, to include an explanation of the compelling reason to grant the higher level access and specifically how the DOD mission would be furthered.

(4) An unclassified description of the specific information to which access was authorized and the duration of access along with the date(s) access was afforded.

(5) A listing of the local records reviewed and a statement that no significant adverse information concerning the employee is known to exist.

(6) The approving authority's signature certifying are listed in paragraphs (1) through (5), above.

(7) Copies of any pertinent briefings/debriefings administered to the employee.

3-28. Access by retired flag/general officers

a. Upon determination by an active duty flag/general officer that there are compelling reasons, in furtherance of the Department of Defense or DA mission, to grant a retired general officer access to classified information in connection with a specific DOD or DA program or mission, for a period not greater than 90 days, the investigative requirements of this regulation may be waived. The access shall be limited to classified information at a level commensurate with the security clearance held at the time of retirement not including access to SCI. This level of access may be determined by contacting the CDR, CCF (PCCF-SC).

b. The flag/general officer approving issuance of the clearance shall provide the CCF a written record to be incorporated into the DCII detailing

(1) All data pertaining to the cleared subject;

(2) The classification of the information to which access was authorized.

c. Such access may be granted only after the compelling reason and the specific aspect of the DOD or DA mission which is served by granting such access has been detailed and under the condition that the classified materials involved are not removed from the confines of a Government installation or other area approved for storage of DOD or DA classified information.

Section V
Special Access Programs

3-29. General

It is the policy of the Department of Defense to establish, to the extent possible, uniform and consistent personnel security investigative requirements. Accordingly, investigations exceeding established requirements are authorized only when mandated by statute, national regulations, or international agreement. In this connection, there are certain Special Access programs originating at the national or international level that require PSIs and procedures of a special nature. These programs and the special investigative requirements imposed by them are described in this section. A Special Access program is any program designed to control access, distribution, and protection of particularly sensitive information established pursuant to section 4-2 of EO 12356 , section 4-2 and prior EOs. DOD 5200.1-R (AR 380-5) governs the establishment of Departmental Special Access Programs.

3-30. Sensitive compartmented information

a. Investigative requirement. The investigative requirement for access to SCI is an SBI (see para B -4, app B ) including a NAC on the individual's spouse or cohabitant. When conditions indicate, additional investigation shall be conducted on the spouse of the individual and members of the immediate family (or other persons to whom the individual is bound by affection or obligation) to the extent necessary to permit a determination by the adjudication agency that the personnel security standards of DCID 1/14 (reference (l)) are met.

(1) The individual must not be under flagging action under AR 600-8-2 .

(2) The individual must not be under psychiatric care or participating in any drug or alcohol rehabilitation treatment.

(3) The individual must have no pending action under chapter 8 of this regulation.

(4) The individual must not be the defendant in any pending civil litigation.

(5) The individual and spouse, parents, brother, sister, children, or other persons with whom the individual cohabits or is bound by affection or obligation must be U.S. citizens. Requests for waiver of this criterion must justify a compelling operational requirement and be forwarded to CCF for approval with the SBI packet attached. (See para d, below, for specific guidelines concerning foreign national affiliations.)

(6) Unresolved or unsubstantiated derogatory allegations should not normally be used to disqualify an individual without a complete investigation. Information of this type will be adjudicated by CCF after completion of the investigation. If the commander decides that the derogatory information clearly warrants denial of SCI access, the nomination and the derogatory information will be forwarded to CCF with the SBI packet attached.

b. Previous investigations. A previous investigation conducted within the past 5 years which substantially meets the investigative requirements prescribed by this section may serve as a basis for granting access approval provided that there has been no break in the individual's military service, DOD civilian employment, or access to classified information under the Industrial Security Program greater than 12 months. If the last SBI is more than 3 years old, the individual shall submit one copy of an updated PSQ covering the period since the completion of the last SBI to the servicing special security officer (SSO) for review.

c. Nomination procedures. An individual requiring SCI access should be nominated to CCF as soon as he or she is identified to fill an approved billet. Nominations will be submitted in accordance with AR 380-28 . If appropriate, nomination will certify that a review of the PSQ revealed no unfavorable information, or forward a copy of DD Form 398 .

(1) "One-time" access. Exceptions are nominations for "one- time" SCI access to attend a conference or briefing, or other situation in which temporary (no more than 90 days) SCI access appears warranted. Normal SCI investigative standards (SBI completed within the last 5 years) apply in cases involving one-time access.

(2) Exceptional circumstances. Interim SCI access may be granted by the CDR, CCF, before completion of the fully prescribed investigation when the need for access to SCI is so urgent that the benefits would far outweigh the security risk. Requests for interim access are based on compelling need (see para d (l)(c), below). Requests for exceptions must clearly state the compelling need and describe how denial of access will affect the ability of the organization to accomplish its mission.

d. Director of Central Intelligence Directive 1/14 requirements. The DCID 1/14, paragraph 5b, requires that both the subject and members of their immediate family or cohabitant be U.S. citizens. Immediate family members, cohabitant, and persons to whom the subject is bound by affection or obligation should neither be subject to physical, mental, or other forms of duress by a foreign power, or advocate the use of force or violence to overthrow the Government of the United States by unconstitutional means.

e. Foreign affiliation. Individuals who are not U.S. citizens or who claim both U.S. and foreign citizenship are not eligible for SCI access. In addition, established criteria normally will not be waived if

(1) Subject is a U.S. citizen but has resided in a country listed in appendix H for a significant period and/or has close foreign ties with relatives or associates residing in such a country. Whether or not such association is extensive or a risk to security depends on the nature and degree of contact and the potential for adverse influence or duress.

(2) Although a naturalized U.S. citizen, subject was born in a country listed in appendix H and has had extensive travel that was not a result of directed Federal service or has lived in or near the native country after obtaining U.S. citizenship.

f. Family members with foreign affiliation. A nominee who has parents, brothers, sisters, or children who are not U.S. citizens is not eligible for SCI unless CCF grants a waiver. The DCID 1/14 criteria may be waived in the absence of a compelling need, provided there is no evidence of anti-American feeling, and the family members were

(1) Born in a country not listed in appendix H and live in the United States or in a country not listed in appendix H.

(2) Born in a country listed in appendix H but have not lived under a Communist regime, have no close ties with anyone living in a country listed in appendix H, and live in the United States.

g. Spouse with foreign affiliation. A nominee who is currently married to a foreign national is normally not eligible for SCI access. The prenomination interview required by paragraph 2-13 should reveal the affiliation and will normally preclude further processing of the SBI paperwork to DIS. This is particularly true when the nominee is identified by the losing command as requiring SCI access for a projected assignment. The losing command cannot determine the existence of a compelling need at the gaining command. When this situation arises, the losing command will immediately notify TAPA and suspend SCI processing pending notification by TAPA.

(1) The DCID 1/14 criteria may be waived if the commander (05 or above) certifies a compelling need exists and the following factors apply:

(a) Spouse was born in a country other than those listed in appendix H .

(b) There is no evidence of anti-American feeling demonstrated by spouse.

(c) A statement is submitted to CCF indicating that spouse intends to become a U.S. citizen, when eligible.

(2) The DCID 1/14 criteria may be waived for a non-U.S. citizen spouse from a country listed in appendix H provided the spouse has not lived for any significant period under a terrorist or Communist regime, has no close ties in such countries, and the supported command shows a compelling need for the nominee to have SCI access (see para d (l)(c), above). There must be no evidence that the spouse has anti-American feelings. A statement must have been submitted indicating intent to apply for U.S. citizenship as soon as eligible.

(3) Established criteria normally may not be waived if the following factors apply:

(a) Spouse was born in a country listed in appendix H and has resided under a terrorist or communist regime with interests adverse to those of the United States for a significant period and/or maintains close ties with anyone in a country listed in appendix H. The fact that the spouse has obtained U.S. citizenship does not alter the circumstances.

(b) Spouse is eligible for U.S. citizenship, but has not tried to apply within 12 months of eligibility.

(4) The circumstances described above that apply to foreign-born spouses apply equally to subjects who share living quarters or cohabitate with foreign nationals.

(5) Nominees for whom a foreign national spouse waiver is granted under paragraph 3-29 g may not be transferred in status, recertified to a gaining command, or extended in their present assignment without prior authorization from CCF.

h. Waiver of foreign connections. Requests for waiver of foreign connections for personnel in career management field (CMF) 33 or 98 need not be accompanied by a compelling need statement. Possession of CMF 33 or 98 is considered a compelling need because of the extreme shortage of personnel in these CMFs. However, all other requirements of i , below, apply. If CCF grants a waiver, these individuals may retain their SCI access eligibility upon transfer outside the foreign spouse's country of origin, may extend their foreign duty tour within the spouse's country of origin up to 4 years, and may be reassigned to spouse's country of origin provided spouse has applied for U.S. citizenship within 12 months of becoming eligible. Individuals in CMF 33 and 98 may be recertified to the gaining command for SCI access without prior authorization from CCF provided the spouse has applied for U.S. citizenship within 12 months of becoming eligible.

i. Marriage to a foreign national. The following measures apply to individuals indoctrinated for SCI access who plan to marry a non-U.S. citizen:

(1) An individual who declares an intent to marry a foreign national will immediately receive a command interview. Results of the interview stating whether or not a waiver will be requested will be forwarded to CCF and will cover the following information:

(a) Full name, date and place of birth, occupation, and citizenship of the prospective spouse and their family members.

(b) Whether or not the prospective spouse has had any connections with a hostile intelligence service or has any friends, relatives, or contacts residing in a country listed in appendix H .

(c) If the prospective spouse or a family member was born in what is now a country listed in appendix H, the dates, method, and circumstances of their departure from that country and the nature and extent of all ties remaining in that country will be fully determined.

(d) Whether or not the prospective spouse or any family member has expressed any unusual interest in the subject's assignments and/or duty position.

(e) Acknowledgment that the person understands the obligation to report any situation of potential subversion and espionage directed against the Army (SAEDA) and deliberate security violations interest under provisions of AR 381-12 .

(2) If the command interview is favorable and the subject does not request a waiver or no compelling need for continuing access exists, the subject may remain indoctrinated until the marriage. At that time, the subject will be debriefed.

(3) If the subject wants to request a waiver and a compelling need exists, the request will be submitted through command channels to CCF. To permit continuous uninterrupted access, allow at least 6 months to process the waiver request and conduct the premarital investigation. The process involves the following actions:

(a) The command must certify that a compelling need exists and that a waiver is essential to the command's mission (or provide a statement that the person is in CMF 33 or 98) and furnish results of the command interview conducted under provisions of paragraph i (l), above.

(b) The person submitting the waiver request must furnish the following:

(1) A statement that he or she understands that should the waiver be granted, he or she cannot be reassigned to the spouse's country of origin in a position requiring SCI access until the spouse has obtained U.S. citizenship, cannot be reassigned to a position requiring SCI access when a compelling need does not exist, and cannot request extension of a foreign service tour and retain SCI access unless exceptional circumstances involving operational deficiencies exist. (See para h , above, for exception for CMF 33 and 98.)

(2) A current DD Form 398-2 , or its dual-language equivalent, completed by the prospective spouse.

(3) A statement by the prospective spouse indicating an intention to become a U.S. citizen when eligible.

(4) If the person is assigned to an overseas command, the command endorsement of the waiver request will include a copy of the investigation completed on the spouse in accordance with AR 608-61 and paragraph 4, AR 600-240 (reference (ww)). These premarital investigations will essentially be at least equal to a foreign-country NAC, which includes investigative checks of national and local security and law enforcement agencies as well as other appropriate civil authorities in the place where the prospective spouse has resided since age 16 (Central Intelligence Agency (CIA) check will be requested by CCF, if required).

(5) If the person is assigned to a continental United States (CONUS) command, CCF will use the DD Form 398-2 submitted with the waiver request to obtain appropriate CIA, Immigration and Naturalization Service (INS), and FBI checks on the prospective spouse. This will be the only investigation required unless adverse information is found during the processing and/or investigation.

(c) The person need not be debriefed from SCI access upon marriage to a foreign national if the requirements of this paragraph are met. If the command interview, review of the premarital investigation of the spouse, or review of DD Form 398-2 reveals information indicating a potential hostage situation, a SAEDA attempt, or possible connections with a hostile intelligence service, access will be suspended pending final determination by CCF and action under AR 381-12 , if appropriate.

(4) If a person marries a foreign national without complying with the provisions outlined in paragraphs i (3)(a) and (b), above, he or she is ineligible for continued SCI access and will be debriefed. The SSO will tell CCF why the individual has been debriefed.

(5) When the spouse obtains U.S. citizenship, proof of citizenship must be presented to the supporting SSO. The SSO will immediately certify the following information to the CCF:

(a) Spouse's full identifying data.

(b) Date and place of entry of spouse into the United States.

(c) Naturalization certificate number.

(d) Date, court, and place of naturalization.

(e) Complete personal identifying data of the indoctrinated person.

j. Close and continuous contact. A person who establishes a close and continuous contact with a foreign national will have their SCI access suspended if there is reason to believe that the foreign national is involved with hostile intelligence, has connections in a country listed in appendix H , or is working for a foreign government in some capacity that may present a security threat. In the absence of those conditions, suspension may not be appropriate. The person should be counseled on their security responsibilities and given a SAEDA briefing. A report of the command's action will be sent to the CCF.

k. Other conditions. The CCF will be promptly notified if any of the following conditions become known or a matter of record:

(1) Adverse information reported or developed concerning the person or spouse.

(2) Spouse's refusal to apply, procrastination, or any other action that delays obtaining a U.S. citizenship.

(3) Spouse has or is suspected of having committed, on behalf of a foreign power, any act that is contrary to the best interest of the United States. The details of the situation will be immediately reported to the CCF and will include the person's degree of access to any compartment operation or project. No further action will be taken pending receipt of instructions from the CCF unless the security of SCI is endangered.

l. Status of waiver. CCF correspondence approving a waiver will advise whether or not the individual may be recertified to the gaining command for SCI access upon completion of current assignment without prior authorization from the CCF. The losing SSO's message to the gaining SSO will clearly state that the subject is married to a foreign national and whether or not CCF instructions allow a transfer in status.

3-31. Retired general officer sensitive compartmented information access determinations

a. A retired general officer (GO) may participate in activities requiring one-time SCI access under the provisions of AR 380-28 under the following conditions:

(1) The GO has a favorably completed SBI that meets the standards of DCID 1/14 at the time the investigation was completed.

(2) The GO is officially representing the U.S. Government at the request of an authorized U.S. Government agency. Such access is not authorized when the GO is representing a U.S. Government contractor, consulting firm, independent business, or the retired GO.

(3) No disqualifying information is available that would preclude granting SCI access.

b. An active duty GO whose SBI exceeds the 5-year-expiration period and who states an intention to retire within 6 months will not be required to have an SBI PR. However, such a GO will be encouraged to submit a request for an SBI PR because it would be advantageous to the Army and the GO to maintain current SCI eligibility.

3-32. Single Integrated Operation Plan-Extra Sensitive Information

The investigative requirement for access to Single Integrated Operation Plan-Extra Sensitive Information (SIOP-ESI) is an SBI, including a NAC on the spouse and the individual's immediate family who are 18 years of age or over and who are U.S. citizens other than by birth or who are resident aliens.

3-33. Presidential support activities

a. DODD 5210.55 prescribes the policies and procedures for the nomination, screening, selection, and continued evaluation of DOD and DA military and civilian personnel and contractor employees assigned to or utilized in Presidential support activities. The type of investigation of individuals assigned to Presidential support activities varies according to whether the person investigated qualifies for Category One or Category Two as indicated below:

(1) Category One.

(a) Personnel assigned on a permanent or full-time basis to duties in direct support of the President (including the office staff of the Director, White House Military Office, and all individuals under his control):

(1) Presidential aircrew and associated maintenance and security personnel.

(2) Personnel assigned to the White House communications activities and the Presidential retreat.

(3) White House transportation personnel.

(4) Presidential mess attendants and medical personnel.

(5) Other individuals filling administrative positions at the White House.

(b) Personnel assigned on a temporary or part-time basis to duties supporting the President:

(1) Military social aides.

(2) Selected security, transportation, flightline safety, and baggage personnel.

(3) Others with similar duties.

(c) Personnel assigned to the Office of the Military Aide to the Vice President.

(2) Category Two.

(a) Personnel assigned to honor guards, ceremonial units, and military bands who perform at Presidential functions and facilities.

(b) Employees of contractors who provide services or contractors employees who require unescorted access to Presidential support areas, activities, or equipment, including maintenance of the Presidential retreat, communications, and aircraft.

(c) Individuals in designated units requiring a lesser degree of access to the President or Presidential support activities.

b. Personnel nominated for Category One duties must have been the subject of an SBI, including a NAC on the spouse and all members of the individual's immediate family of 18 years of age or over who are U. S. citizens other than by birth or who are resident aliens. The SBI must have been completed within the 12 months preceding selection for Presidential support duties. If such an individual marries subsequent to the completion of the SBI, the required spouse check shall be made at that time.

c. Personnel nominated for Category Two duties must have been the subject of a BI, including a NAC on the spouse and all members of the individual's immediate family of 18 years of age or over who are U.S. citizens other than by birth or who are resident aliens. The BI must have been completed within the 12 months preceding selection for Presidential support duties. It should be noted that duties (separate and distinct from their Presidential support responsibilities) of some Category Two personnel may make it necessary for them to have special access clearances which require an SBI.

d. The U.S. citizenship of foreign-born immediate family members of all Presidential support nominees must be verified by investigation.

e. A limited number of Category One personnel having especially sensitive duties have been designated by the Director, White House Military Office as"Category A." These personnel shall be investigated under special scoping in accordance with the requirements of reference (jj).

3-34. Nuclear weapon personnel reliability program

a. DODD 5210.42 ( AR 50-5 ) (reference (s)) sets forth the standards of individual reliability required for personnel performing duties associated with nuclear weapons and nuclear components. The investigative requirement for personnel performing such duties is:

(1) Critical position: Background investigation. In the event that it becomes necessary to consider an individual for a critical position and the required BI has not been completed, interim certification may be made under carefully controlled conditions as set forth below.

(a) The individual has had a favorable DNACI or NAC (or ENTNAC) within the past 5 years without a break in active service or employment in excess of 1 year.

(b) The BI has been requested.

(c) All other requirements of the Personnel Reliability Program (PRP) screening process have been fulfilled.

(d) The individual is identified to supervisory personnel as being certified on an interim basis.

(e) The individual is not used in a two-man team with another such individual.

(f) Justification of the need for interim certification is documented by the certifying official.

(g) Should the BI not be completed within 150 days from the date of the request, the certifying official shall query the Component clearance authority (by forwarding DA Form 5247-R to CDR, CCF (PCCF-M)), who shall ascertain from DIS the status of the investigation. On the basis of such information, the certifying official shall determine whether to continue or to withdraw the interim certification.

(2) Controlled position: Department of Defense National Agency check with written inquiries/national agency check with inquiries .

(a) An ENTNAC completed for the purpose of first-term enlistment or induction into the Armed Forces does not satisfy this requirement.

(b) Interim certification is authorized for an individual who has not had a DNACI/NACI completed within the past 5 years, subject to the following conditions:

(1) The individual has had a favorable ENTNAC/NAC, or higher investigation, that is more than 5 years old and has not had a break in service or employment in excess of 1 year.

(2) A DNACI/NACI has been requested at the time of interim certification.

(3) All other requirements of the PRP screening process have been fulfilled.

(4) Should the DNACI/NACI not be completed within 90 days from the date of the request, the procedures set forth in paragraph a (l)(g), above, for ascertaining the delay of the investigation in the case of a critical position shall apply.

(3) Additional requirements apply.

(a) The investigation upon which certification is based must have been completed within the last 5 years from the date of initial assignment to a PRP position and there must not have been a break in active service or employment in excess of 1 year between completion of the investigation and initial assignment.

(b) In those cases in which the investigation was completed more than 5 years prior to initial assignment or in which there has been a break in service or employment in excess of 1 year subsequent to completion of the investigation, a reinvestigation is required.

(c) Periodic reinvestigation is required every 5 years for individuals assigned to critical nuclear weapon positions. PR is not required subsequent to initial assignment to PRP for controlled nuclear weapon positions so long as the individual remains in PRP.

(d) A medical evaluation of the individual as set forth in DODD 5210.42 ( AR 50-5 ) (reference (s)).

(e) Review of the individual's personnel file and other official records and information locally available concerning behavior or conduct which is relevant to PRP standards.

(f) A personal interview with the individual for the purpose of informing him of the significance of the assignment, reliability standards, the need for reliable performance, and of ascertaining his attitude with respect to the PRP.

(g) Service in the Army, Navy and Air Force Reserve does not constitute active service for PRP purposes.

b. The Commander, CCF, will make security clearance determinations for nuclear duty positions under AR 50-5 . The CCF will forward cases that contain potentially disqualifying information to the unit commander for PRP determination if the subject of the investigation is in a critical nuclear duty position. Where potentially disqualifying information exists, CCF will annotate part III of DA Form 873 (Certificate of Clearance and/or Security Determination) "Dossier review required for critical nuclear duty." If potentially disqualifying information does not exist, CCF will annotate the DA Form 873 "PRP/Surety Considered." If the certifying authority waives the potentially disqualifying information, he or she will annotate the individual's DA Form 3180 (Personnel Screening and Evaluation Record) in accordance with chapter 3, AR 50-5. In this event, the commander shall not annotate "PRP/Surety Considered" in part III of DA Form 873.

3-35. Chemical Personnel Reliability Program

The CDR, CCF, will make security clearance determinations for chemical duty positions under AR 50-6 (reference (y)).

3-36. Automation security

The CDR, CCF, will make security clearance determinations for the Personnel Security and Screening Program. CCF will forward cases that contain potentially disqualifying information to the unit commander for Personnel Security and Screening Program determination if the subject of the investigation is in an ADP position. Where potentially disqualifying information exists, CCF will annotate part II of DA Form 873 "Dossier review required for critical nuclear duty." If potentially disqualifying information does not exist, CCF will annotate the DA Form 873 "PRP/Surety Considered." (See para 3-614 and app K .) If the automation security officer waives the potentially disqualifying information, the commander will not annotate, "PRP/Surety Considered" in part III of DA Form 873.

3-37. Access to North Atlantic Treaty Organization classified information

a. Personnel assigned to NATO staff position requiring access to NATO COSMIC (TOP SECRET), SECRET or CONFIDENTIAL information shall have been the subject of a favorably adjudicated BI (10-year scope), DNACI/NACI, or NAC/ENTNAC, current within 5 years prior to the assignment, in accordance with USSAN Instruction 1-69 ( AR 380-15 ) and paragraph 3-61 , below.

b. Personnel not assigned to a NATO staff position, but requiring access to NATO COSMIC, SECRET or CONFIDENTIAL information in the normal course of their duties, must possess the equivalent final U.S. security clearance based upon the appropriate PSI (see app B ) required by paragraphs 3-19 and 3-65 and of this regulation.

3-38. Other special access programs

Special investigative requirements for special access programs not provided for in this paragraph may not be established without the written approval of the DUSD(P).

Section VI
Certain Positions Not Necessarily Requiring Access to Classified Information

3-39. General

DODD 5200.8 ( AR 190-16 ) outlines the authority of military commanders under the Internal Security Act of 1950 to issue orders and regulations for the protection of property or places under their command. Essential to carrying out this responsibility is a commander's need to protect the command against the action of untrustworthy persons. Normally, the investigative requirements prescribed in this regulation should suffice to enable a commander to determine the trustworthiness of individuals whose duties require access to classified information or appointment to positions that are sensitive and do not involve such access. However, there are certain categories of positions or duties which, although not requiring access to classified information, if performed by untrustworthy persons, could enable them to jeopardize the security of the command or otherwise endanger the national security. The investigative requirements for such positions or duties are detailed in this section.

3-40. Access to restricted areas, sensitive information, or equipment not involving access to classified information

a. Access to restricted areas, sensitive information or equipment (such as critical COMSEC items) by DOD military, civilian, or contractor personnel shall be limited to those individuals who have been determined trustworthy as a result of the favorable completion of a NAC (or ENTNAC) or who are under the escort of appropriately cleared personnel. Where escorting such persons is not feasible, a NAC shall be conducted and favorably reviewed by the appropriate component agency or activity, MACOM commander and staff agency heads authorized to request security investigations, or head of DA Staff agency prior to permitting such access. DOD components, MACOM commanders, and heads of DA Staff agencies shall not request, and shall not direct or permit their contractors to request, security clearances to permit access to areas when access to classified information is not required in the normal course of duties or which should be precluded by appropriate security measures. In determining trustworthiness under this paragraph, the provisions of paragraph 2-4 and appendix I will be utilized.

b. In meeting the requirements of this paragraph, approval shall be obtained from one of the authorities designated in paragraph F-1 , appendix F of this regulation, or the DCSINT (DAMI-ClS) for authority to request NACs on DOD military, civilian, or contractor employees. A justification shall accompany each request and shall detail the reasons why escorted access would not better serve the national security. Requests for investigative requirements beyond a NAC shall be forwarded to the DUSD(P) for approval.

c. The NAC requests shall (1) be forwarded to DIS in accordance with the provisions of paragraph C-2 , appendix C , (2) contain a reference to this paragraph on the DD Form 398-2 , and (3) list the authority in appendix F who approved the request.

d. Determinations to deny access under the provisions of this paragraph must not be exercised in an arbitrary, capricious, or discriminatory manner and shall be the responsibility of the military or installation commander as provided for in DODD 5200.8 ( AR 190-16 ) .

3-41. Nonappropriated fund employees

a. Each nonappropriated fund employee who is employed in a position of trust as designated by an official authorized in paragraph F-8 , appendix F , shall have been the subject of a NAC completed no longer than 12 months prior to employment or a prior PSI with no break in Federal service or employment greater than 12 months in accordance with DOD 1401.1-M ( AR 215-3 ) . An individual who does not meet established suitability requirements may not be employed without prior approval of the authorizing official. Issuance of a CONFIDENTIAL or SECRET clearance will be based on a DNACI or NAC in accordance with paragraph 3-19 .

b. If a nonappropriated fund employee requires a security clearance, the commander of the host installation will request a personnel security clearance from CCF.

3-42. Customs inspectors

DOD employees appointed as customs inspectors, under waivers approved in accordance with DOD 5030.49-R , shall have undergone a favorably adjudicated NAC completed within the past 5 years unless there has been a break in DOD employment greater than 1 year, in which case a current NAC is required.

3-43. Red Cross/united service organizations personnel

a. A favorably adjudicated NAC shall be accomplished on Red Cross or united service organizations personnel as a prerequisite for assignment with the Armed Forces overseas ( DODD 5210.25 ( AR 380-49 ) Employees who are not U.S. citizens shall have been the subject of a BI, completed with favorable results, before being nominated for assignment with Army elements overseas.

b. A completed PSQ (DD Form 398 or DD Form 398-2 ) shall be forwarded to the Defense Industrial Security Clearance Office (DISCO), DIS, P.O. Box 2499, Columbus, OH 43216, for initiation of the BI or NAC in accordance with the provisions of DOD Directive 5220.6 (AR 380-49).

c. If a Red Cross or USO employee requires a personnel security clearance, the commander of the host installation will request the appropriate clearance from the CDR, CCF. The request for clearance will include a copy of the favorable employment determination by DISCO.

3-44. Officials authorized to issue security clearances

Any person authorized to adjudicate personnel security clearances shall have been the subject of a favorably adjudicated BI.

3-45. Officials authorized to grant access to sensitive compartmented information

Any person authorized to adjudicate SCI access eligibility will have been the subject of a favorably completed SBI.

3-46. Personnel security clearance adjudication officials

Any person selected to serve with a board, committee, or other group responsible for adjudicating personnel security cases shall have been the subject of a favorably adjudicated BI.

3-47. Persons requiring DOD building passes

Pursuant to DODD 5210.46 , each person determined by the designated authorities of the components concerned as having an official need for access to DOD buildings in the National Capital Region shall be the subject of a favorably adjudicated NAC prior to issuance of a DOD building pass. Conduct of a BI for this purpose is prohibited unless approved in advance by ODUSD(P).

3-48. Foreign national employees overseas not requiring access to classified information

Foreign nationals employed by DOD organizations overseas, whose duties do not require access to classified information, shall be the subject of the following record checks, initiated by the appropriate military department investigative organization consistent with paragraph 2-19 , prior to employment:

a. Host government law enforcement and security agency checks at the city, State (Province), and national level, whenever permissible by the laws of the host government;

b. DCII; and

c. FBI-Headquarters (HQ)/ID (where information exists regarding residence by the foreign national in the United States for 1 year or more since age 18).

3-49. Special agents and investigative support personnel

Special agents and those non-investigative personnel assigned to investigative agencies whose official duties require continuous access to complete investigative files and material require an SBI.

3-50. Persons requiring access to chemical agents

Personnel whose duties involve access to or security of chemical agents shall be screened initially for suitability and reliability and shall be evaluated on a continuing basis at the supervisory level to ensure that they continue to meet the high standards required. At a minimum, all such personnel shall have had a favorably adjudicated NAC completed within the last 5 years prior to assignment in accordance with the provisions of DODD 5210.65 . ( AR 50-6 ) .

3-51. Education and orientation personnel

Persons selected for duties in connection with programs involving the education and orientation of military personnel shall have been the subject of a favorably adjudicated NAC prior to such assignment. This does not include teachers/administrators associated with university extension courses conducted on military installations in the United States. Non-U.S. citizens from a country listed in appendix H shall be required to undergo a BI if they are employed in a position covered by this paragraph. Investigations for military service or civilian employment with a DOD component satisfy the investigation requirement.

3-52. Contract guards

Any person performing contract guard functions shall have been the subject of a favorably adjudicated NAC by DISCO prior to such assignment to any security duties and in accordance with AR 190-56 .

3-53. Transportation of arms, ammunition and explosives

Any DOD military, civilian or contract employee (including commercial carrier) operating a vehicle or providing security to a vehicle transporting Category I, II, or CONFIDENTIAL arms, ammunition and explosives shall have been the subject of a favorably adjudicated NAC or ENTNAC. Results of the completed NAC or ENTNAC shall be returned to CDR, Military Traffic Management Command (MTMC) (MT-SS), Room 403, 5611 Columbia Pike, Falls Church, VA 22041-5050, for adjudication.

3-54. Personnel occupying information systems positions designated automated data processing-I, -II, and -III

DOD military, civilian personnel, consultants, and contractor personnel performing on unclassified automated information systems may be assigned to one of three position sensitivity designations (in accordance with app K ) and investigated as follows:

Table 3-1.
ADP-I: BI/SBI
ADP-II: DNACI/NACI
ADP-III: NAC/ENTNAC/NACI
Foreign nationals may be assigned to ADP-I and ADP-II positions only by an authority designated in paragraph F-2 , appendix F, and paragraph 2-1 . Those personnel falling in the above categories who require access to classified information will, of course, be subject to appropriate investigative scope contained in paragraph 3-19 , above.

3-55. Others

Requests for approval to conduct an investigation of other personnel not provided for in paragraphs 3-39 through 3-53, above, considered to fall within the general provisions of paragraph 3-38 , above, shall be submitted, detailing the justification thereof, for approval through the DCS, G-2 (DAMI-CIS) to the DUSD(P). Approval of such requests shall be contingent upon an assurance that appropriate review procedures exist and that adverse determinations will be made at no lower than major command level.

Section VII
Reinvestigation

3-56. General

DOD policy prohibits unauthorized and unnecessary investigations. There are, however, certain situations and requirements that necessitate reinvestigation of an individual who has already been investigated under the provisions of this regulation. It is the policy to limit reinvestigation of individuals to the scope contained in paragraph B- 5, appendix B , to meet overall security requirements. Reinvestigation, generally, is authorized only as follows:

a. To prove or disprove an allegation relating to the criteria set forth in paragraph 2-15 of this regulation with respect to an individual holding a security clearance or assigned to a position that requires a trustworthiness determination;

b. To meet the periodic reinvestigation requirements of this regulation with respect to those security programs enumerated below; and

c. Upon individual request, to assess the current eligibility of individuals who did not receive favorable adjudicative action after an initial investigation, if a potential clearance need exists and there are reasonable indications that the factors upon which the adverse determination was made no longer exists.

d. Reinvestigation will not be requested if the subject is within 12 months of retirement.

3-57. Allegations related to disqualification

Whenever questionable behavior patterns develop, derogatory information is discovered, or inconsistencies arise related to the disqualification criteria outlined in paragraph 2-15 that could have an adverse impact on an individual's security status, a SII, psychiatric, drug, or alcohol evaluation, as appropriate, may be requested to resolve all relevant issues in doubt. If it is essential that additional relevant personal data is required from the investigative subject and the subject fails to furnish the required data, the subject's existing security clearance or assignment to sensitive duties shall be terminated in accordance with paragraph 8-5 of this regulation.

3-58. Access to sensitive compartmented information

Each individual having current access to SCI shall be the subject of a PR conducted on a 5-year recurring basis scoped as set forth in paragraph B -5, appendix B .

3-59. Critical-sensitive positions

Each DOD civilian employee occupying a critical-sensitive position shall be the subject of a PR conducted on a 5-year recurring basis scoped as set forth in paragraph B -5, appendix B .

3-60. Critical military duties

All military personnel with a military occupational speciality (MOS) or specialty classification under PAM 611-21 that requires eligibility for SCI, regardless of access level, shall be the subject of a PR on a 5-year recurring basis as set forth in paragraph B-5 , appendix B. So will military personnel with duties that fall under any of the following criteria:

a. Access to TOP SECRET information.

b. Development or approval of plans, policies, or programs that affect the overall operations of the DOD or a Component.

c. Development or approval of war plans, plans or particulars of future major or special operations of war, or critical and extremely important items of war.

d. Investigative and certain support duties, adjudication of personnel security clearances or access authorizations, or making personnel security determinations.

e. Fiduciary, public contact, or other duties demanding the highest degree of public trust.

f. Duties falling under special access programs (excluding controlled nuclear duty positions).

g. Category I ADP positions.

h. Any other position so designated by the SA or designee.

3-61. Presidential support duties

Each individual assigned Presidential support duties shall be the subject of a PR conducted on a 5-year recurring basis scoped as set forth in paragraph B -5, appendix B .

3-62. North Atlantic Treaty Organization staff

Each individual assigned to a NATO staff position requiring a COSMIC clearance shall be the subject of a PR conducted on a 5-year recurring basis scoped as set forth in paragraph B -5, appendix B . Those assigned to a NATO staff position requiring a NATO SECRET clearance shall be the subject of a new NAC conducted on a 5-year recurring basis.

3-63. Extraordinarily sensitive duties

In extremely limited instances, extraordinary national security implications associated with certain SCI duties may require very special compartmentation and other special security measures. In such instances, a component of Senior Official of the Intelligence Community or the DCS, G-2 may, with the approval of the DUSD(P), request PRs at intervals of less than 5 years as outlined in paragraph B -5, appendix B . Such requests shall include full justification and a recommendation as to the desired frequency. In reviewing such requests, the DUSD(P) shall give due consideration to:

a. The potential damage that might result from the individual's defection or abduction.

b. The availability and probable effectiveness of means other than reinvestigation to evaluate factors concerning the individual's suitability for continued SCI access.

3-64. Foreign nationals employed by DOD organizations overseas

Foreign nationals employed by DOD organizations overseas who have been granted a "limited access authorization" pursuant to paragraph 3-21 shall be the subject of a PR, as set forth in paragraph B -5, appendix B , conducted under the auspices of DIS by the appropriate military department or other U.S. Government investigative agency consistent with paragraph 2-19 and appendix J of this regulation.

3-65. Persons accessing very sensitive information classified SECRET

a. Heads of DOD Components shall submit a request to the DUSD(P) for approval to conduct periodic reinvestigations on persons holding SECRET clearances who are exposed to very sensitive SECRET information.

b. Generally, the DUSD(P) will only approve periodic reinvestigations of persons having access to SECRET information if the unauthorized disclosure of the information in question could reasonably be expected to:

(1) Jeopardize human life or safety.

(2) Result in the loss of unique or uniquely productive intelligence sources or methods vital to U.S. security.

(3) Compromise technologies, plans, or procedures vital to the strategic advantage of the United States.

c. Each individual accessing very sensitive SECRET information who has been designated by an authority listed in paragraph F-1 , appendix F as requiring periodic reinvestigation, shall be the subject of a PR conducted on a 5-year recurring basis scoped as stated in paragraph B- 5, appendix B .

3-66. Access to TOP SECRET information

Each individual having current access to TOP SECRET information shall be the subject of a PR conducted on a 5-year recurring basis scoped as outlined in paragraph B- 5, appendix B .

3-67. Personnel occupying computer positions designated automated data processing-I

All DOD military, civilian, consultant, and contractor personnel occupying computer positions designated ADP-I shall be the subject of a PR conducted on a 5-year recurring basis as set forth in paragraph B- 5, appendix B .

3-68. Critical nuclear duty positions

All DA military (including those with an MOS that requires eligibility for critical nuclear duties), civilian, and contractor personnel occupying critical nuclear duty positions in accordance with AR 50-5 shall be the subject of a PR conducted on a 5-year recurring basis as set forth in paragraph B-5, appendix B .

Section VIII
Authority to Waive Investigative Requirements

3-69. Authorized officials

Only an official designated in paragraph F- 7, appendix F , is empowered to waive the investigative requirements for appointment to a sensitive position, assignment to sensitive duties or access to classified information pending completion of the investigation required by this chapter. Such waiver shall be based upon certification in writing by the designated official that such action is necessary to the accomplishment of a DOD mission. A minor investigative element that has not been met should not preclude favorable adjudication nor should this require a waiver when all other information developed on an individual during the course of a prescribed investigation is favorable.

3-70. Combat operations, DA-directed mobilization

Under combat conditions, authorities listed in paragraph F-7, appendix F , may waive such provisions of this regulation as are operationally necessary and warranted by the circumstances. Under mobilization or similar conditions and mobilization exercises, prior approval to waive requirements of this regulation must be obtained from the DCS, G-2 (DAMI-CIS). This authority may be redelegated to commanders of subordinate elements to expedite security clearance actions. Such redelegation will not be made to echelons below that at which the military personnel records jacket (MPRJ) is maintained. Investigative prerequisites waived under the authority of this paragraph will be complied with as soon as the situation permits.

Chapter 4
Reciprocal Acceptance of Prior Investigations and Personnel Security Determinations

4-1. General

Previously conducted investigations and previously rendered personnel security determinations shall be accepted within DOD in accordance with the policy set forth below.

4-2. Prior investigations conducted by DOD investigative organizations

As long as there is no break in military service/civilian employment greater than 12 months, any previous personnel security investigation conducted by DOD investigative organizations that essentially is equivalent in scope to an investigation required by this regulation will be accepted without requesting additional investigation. There is no time limitation as to the acceptability of such investigations, subject to the provisions of paragraphs 2-12 and 4-3 and b of this regulation.

4-3. Prior personnel security determinations made by DOD authorities

a. Adjudicative determinations for appointment in sensitive positions, assignment to sensitive duties or access to classified information (including those pertaining to SCI) made by designated DOD authorities will be mutually and reciprocally accepted by all DOD Components without requiring additional investigation, unless there has been a break in the individual's military service/civilian employment of greater than 12 months or unless derogatory information that occurred subsequent to the last prior security determination becomes known. A check of the DCII should be conducted to accomplish this task.

b. Whenever a valid DOD security clearance or special access authorization (including one pertaining to SCI) is on record, Components shall not request DIS or other DOD investigative organizations to forward prior investigative files for review unless:

(1) Significant derogatory information or investigation completed subsequent to the date of last clearance or Special Access authorization is known to the requester; or

(2) The individual concerned is being considered for a higher level clearance (for example, SECRET or TOP SECRET) or the individual does not have a special access authorization and is being considered for one; or

(3) There has been a break in the individual's military service/civilian employment of greater than 12 months subsequent to the issuance of a prior clearance; or

(4) The most recent SCI access authorization of the individual concerned was based on a waiver.

c. Requests for prior investigative files authorized by this regulation shall be made in writing, shall cite the specific justification for the request (that is, upgrade of clearance, issue Special Access authorization, and so forth), and shall include the date, level, and issuing organization of the individual's current or most recent security clearance or special access authorization.

d. All requests for non-DOD investigative files, authorized under the criteria prescribed by paragraphs a , b (l), (2), (3), and (4) and c , above, shall be:

(1) Submitted on DD Form 398-2 to DIS;

(2) Annotated as a "single agency check" of whichever agency or agencies developed the investigative file or to obtain the check of a single national agency.

e. When further investigation is desired, in addition to an existing non-DOD investigative file, a DD Form 1879 will be submitted to DIS with the appropriate security forms attached. The submission of a Single Agency Check via DD Form 398-2 will be used to obtain an existing investigative file or check a single national agency.

f. Whenever a civilian or military member transfers from one DOD activity to another (or from one Army organization to another), the losing organization is responsible for advising the gaining organization of any pending action to suspend, deny, or revoke the individual's security clearance as well as any adverse information (or disqualifying information, i.e., marriage to a foreign national) that may exist in security, personnel, or other files. In such instances, the clearance shall not be reissued until the questionable information has been adjudicated.

4-4. Investigations conducted and clearances granted by other agencies of the Federal Government

a. Whenever a prior investigation or personnel security determination (including clearance for access to information classified under EO 12356 of another agency of the Federal Government meets the investigative scope and standards of this regulation, such investigation or clearance may be accepted for the investigative or clearance purposes of this regulation, provided that the employment with the Federal agency concerned has been continuous and there has been no break longer than 12 months since completion of the prior investigation, and further provided that inquiry with the agency discloses no reason why the clearance should not be accepted. If it is determined that the prior investigation does not meet the provisions of this paragraph, supplemental investigation shall be requested.

b. A NACI conducted by OPM is of greater scope than a NAC or DNACI, and shall be accepted and considered equivalent to a DNACI for the purposes of this regulation.

c. DOD policy on reciprocal acceptance of clearances with the Nuclear Regulatory Commission and the Department of Energy is set forth in DODD 5210.2 ( AR 380-5 ) .

d. When a DA organization must authorize access to classified information in its custody to a member of another service or agency who has not been cleared or who needs a higher degree of clearance, the parent service or agency will be asked to grant the clearance.

e. If it is not in the best interests of the national security to permit the person access to classified defense information in Army custody, or if the person is denied the required clearance, the commander will reassign the person to nonsensitive duties or, if appropriate, revoke the detail or assignment and advise the parent Service or agency of the reasons. The parent Service or agency is responsible for initiating security proceedings and denying or revoking a security clearance.

f. The CDR, CCF, is responsible for granting, revoking, or denying security clearances for Army personnel who are assigned or detailed to other Services, Defense Agencies, and the Unified and Specified Commands.

Chapter 5
Requesting Personnel Security Investigations

5-1. General

Requests for PSIs shall be limited to those required to accomplish the Defense mission. Such requests shall be submitted only by the authorities designated in paragraph 5-2 , below. These authorities shall be held responsible for determining if persons under their jurisdiction require a PSI. Proper planning must be effected to ensure that investigative requests are submitted sufficiently in advance to allow completion of the investigation before the time it is needed to grant the required clearance or otherwise make the necessary personnel security determination.

5-2. Authorized requesters

Requests for PSI shall be accepted only from the requesters designated below:

a. Military departments.

(1) Army.

(a) CCF, Fort George G. Meade, MD 20755-5250.

(b) DCS, G-2.

(c) All activity commanders designated in paragraph F-7 .

(d) Chiefs of recruiting stations.

(e) State adjutants general for the ARNG.

(2) Navy (including Marine Corps)

(a) Central Adjudicative Facility.

(b) Commanders and commanding officers of organizations listed on the Standard Navy Distribution List.

(c) Chiefs of recruiting stations.

(3) Air Force

(a) Air Force Security Clearance Office.

(b) Assistant Chief of Staff for Intelligence.

(c) All activity commanders.

(d) Chiefs of recruiting stations.

b. Defense Agencies Directors of Security and activity commanders.

c. Organization of the Joint Chiefs of Staff Chief, Security Division.

d. Office of the Secretary of Defense Director for Personnel and Security, WHS.

e. Commanders of the Unified and Specified Commands or their designees.

f. Such other requesters approved by the DUSD(P).

5-3. Criteria for requesting investigations

Authorized requesters shall use the tables set forth in appendix D to determine the type of investigation that shall be requested to meet the investigative requirement of the specific position or duty concerned.

5-4. Request procedures

To ensure efficient and effective completion of required investigations, all requests for PSIs shall be prepared and forwarded in accordance with appendix C and the investigative jurisdictional policies set forth in section IV, chapter 2 of this regulation.

5-5. Priority requests

To ensure that PSIs are conducted in an orderly and efficient manner, requests for priority for individual investigations or categories of investigations shall be kept to a minimum. DIS shall not assign priority to any PSI or categories of investigations without written approval of the DUSD(P).

5-6. Personal data provided by the subject of the investigation

a. To conduct the required investigation, it is necessary that the investigative agency be provided certain relevant data concerning the subject of the investigation. The Privacy Act of 1974 requires that, to the greatest extent practicable, personal information shall be obtained directly from the subject individual when the information may result in adverse determinations affecting an individual's rights, benefits, and privileges under Federal programs.

b. Accordingly, it is incumbent upon the subject of each PSI to provide the personal information required by this regulation. At a minimum, the individual shall complete the appropriate investigative forms, provide fingerprints of a quality acceptable to the FBI, and execute a signed release, as necessary, authorizing custodians of police, credit, education, employment, and medical and similar records, to provide relevant record information to the investigative agency. When the FBI returns a fingerprint card indicating that the quality of the fingerprints is not acceptable, an additional set of fingerprints will be obtained from the subject. In the event the FBI indicates that the additional fingerprints are also unacceptable, no further attempt to obtain more fingerprints need be made; this aspect of the investigation will then be processed on the basis of the name check of the FBI files. As an exception, a minimum of three attempts will be made (1) for all Presidential support cases, (2) for SCI access nominations if the requester so indicates, and (3) in those cases in which more than minor derogatory information exists. Each subject of a PSI conducted under the provisions of this regulation shall be furnished a Privacy Act Statement advising of (1) the authority for obtaining the personnel data, (2) the principal purpose(s) for obtaining it, (3) the routine uses, (4) whether disclosure is mandatory or voluntary, (5) the effect on the individual if it is not provided, and (6) that subsequent use of the data may be employed as part of an aperiodic review process to evaluate continued eligibility for access to classified information.

c. Failure to respond within the time limit prescribed by the requesting organization with the required security forms or refusal to provide or permit access to the relevant information required by this regulation shall result in termination of the individual's security clearance or assignment to sensitive duties utilizing the procedures of paragraph 8-6 or further administrative processing of the investigative request.

5-7. Requests for additional information or clarification

When questionable behavior, inconsistencies, or other derogatory information related to the criteria in paragraph 2-4 arise, CCF may request more information or clarification directly from the field commander or the subject (see para 3-56 ). Such requests include, but are not limited to the following:

a. Results of command inquiries and investigations; copies of courts- martial proceedings; copies of administrative or disciplinary actions, written reprimands, Articles 15; results of local records file checks or of previous psychiatric or drug and alcohol evaluations; or letters of indebtedness received by the command.

b. DD Forms 398, fingerprint cards, and other forms or release statements required to conduct investigations; verification of citizenship of the subject and/or immediate family. Occasionally, to expedite the decisionmaking process, CCF will ask security managers to obtain specific information from the subject, such as current financial status, proof of payment of delinquent debts, or clarification of information listed on DD Form 398 or similar forms.

c. Progress and final reports from Alcohol and Drug Abuse Prevention and Control Program officials on alcohol and drug rehabilitation treatment. Such reports will include history and extent of substance abuse, diagnosis, attitude toward treatment, results of treatment, and immediate and long-term prognosis. CCF will request a current alcohol or drug evaluation when incidents of alcohol or drug abuse are reported and the subject has not been referred for drug and/or alcohol treatment; more than 1 year has passed since treatment occurred, or it occurred during a previous assignment and results are not available; or there was an indication of substance abuse after completion of treatment. A physician or mental health clinician trained in the alcohol and drug rehabilitation field, who is employed by or under contract to the U.S. military or U.S. Government, will conduct the evaluation. The purpose of the evaluation is to assess the subject's ability to refrain from abuse and to obtain an opinion on the potential impact upon the subject's judgment and reliability in protecting classified information and material.

d. Information from medical records that indicates mental disorder or emotional instability or results of any psychiatric or mental health evaluation or treatment for a mental condition. When any information indicates a history of mental or nervous disorder or reported behavior appears to be abnormal, indicating impaired judgment, reliability, or maturity, CCF will request a mental health evaluation to determine whether or not any defect in judgment or reliability or any serious behavior disorder exists. A board- certified or board-eligible psychiatrist or licensed or certified clinical psychologist who is employed by or under contract to the U.S. military or U.S. Government will conduct mental health evaluations for security clearance purposes. The evaluation report should outline the methods used in the evaluation (for example, psychological testing and clinical interviews), include a narrative case history, assess the results of any psychological tests, and include a diagnosis under DSM III (see note) or state that no diagnosis exists. The report should include a prognosis and indicate what effect the diagnosed condition has on judgment, reliability, and stability, and describe any characteristics in a normal or stressful situation. If the individual's condition is under control through treatment or medication, the report should indicate what could happen if the individual did not comply with treatment and what likelihood exists of failure to comply. If appropriate, the report should indicate an estimated time or condition that could cause a favorable change.
Note. American Psychiatric Association: Diagnostic and Statistical Manual of Mental Disorders, Third Edition, Wash, DC: APA, 1980.

e. It is imperative, in the interests of national security, that the commander and the subject of the case respond promptly to CCF's request for information. Failure to respond to requests for information required by CCF for personnel security clearance determinations within the prescribed time shall result in CCF directing suspension of the individual's access to classified information or termination of action to process request for security clearance. Continued failure to respond to CCF's request for information shall result in action to terminate the individual's security clearance utilizing the procedures of paragraph 8-6 .

5-8. Grounds for denial

If information developed by the command indicates the existence, current or past, of any mental or nervous disorder or emotional instability, a request for a PSI will not be submitted and interim clearance will not be granted. Clearance can be granted only if competent medical authority, as defined above, certifies that the disorder or instability has been overcome or will not cause a defect in the person's judgment or reliability.

5-9. Requesting National Agency Check and written inquiries from the Office of Personnel Management

A NACI will be submitted to OPM according to OPM instructions. Block H of the agency use block of Standard Form 86 will show the employing agency's security office identification (SOI) number where OPM will forward the results of the NACI. The Security Manager will coordinate with the appropriate civilian personnel office to determine eligibility for employment prior to requesting a security clearance determination from CCF.

a. If the NACI is completely favorable, the Security Manager may attest to that fact in the "Remarks" block of DA Form 5247-R . If the NACI contains unfavorable information, a copy of the entire NACI will be submitted to the CCF with the request for security clearance.

b. If the NACI contains other than minor unfavorable information, an interim clearance is not authorized and DA Form 5247-R will indicate that a favorable employment determination was made.

c. If a clearance is not immediately required, the NACI results may be maintained by the Security Manager as long as the person is employed and may be transferred within the DOD.

Chapter 6
Adjudication

6-1. General

a. The standard which must be met for clearance or assignment to sensitive duties is that, based on all available information, the person's loyalty, reliability, and trustworthiness are such that entrusting the person with classified information or assigning the person to sensitive duties is clearly consistent with the interests of national security.

b. The principal objective of the DOD personnel security adjudicative function, consequently, is to ensure selection of persons for sensitive positions who meet this standard. The adjudication process involves the effort to assess the probability of future behavior which could have an effect adverse to the national security. Since few, if any, situations allow for positive, conclusive evidence of certain future conduct, it is an attempt to judge whether the circumstances of a particular case, taking into consideration prior experience with similar cases, reasonably suggest a degree of probability of prejudicial behavior not consistent with the national security. It is invariably a subjective determination, considering the past but necessarily anticipating the future. Rarely is proof of trustworthiness and reliability or untrustworthiness and unreliability beyond all reasonable doubt.

c. Establishing relevancy is one of the key objectives of the personnel security adjudicative process in evaluating investigative material. It involves neither the judgment of criminal guilt nor the determination of general suitability for a given position; rather, it is the assessment of a person's trustworthiness and fitness for a responsibility which could, if abused, have unacceptable consequences for the national security.

d. While equity demands optimal uniformity in evaluating individual cases, ensuring fair and consistent assessment of circumstances from one situation to the next, each case must be weighed on its own merits, taking into consideration all relevant facts, and prior experience in similar cases. All information of record, both favorable and unfavorable, must be considered and assessed in terms of accuracy, completeness, relevance, seriousness, and overall significance. In all adjudications the protection of the national security shall be the paramount determinant.

6-2. Central adjudication

a. To ensure uniform application of the requirement of this regulation and to ensure that DOD personnel security determinations are effected consistent with existing statutes and Executive orders, the head of each military department and Defense Agency shall establish a single central adjudication facility for their component. The CCF, Fort George G. Meade, MD, has been designated as the single central adjudication facility for the DA. The function of each facility or the CCF shall be limited to evaluating PSIs and making personnel security determinations. The chief of each central adjudication facility or CDR, CCF, shall have the authority to act on behalf of the head of the component or the SA with respect to personnel security determinations. All information relevant to determining whether a person meets the appropriate personnel security standard prescribed by this regulation shall be reviewed and evaluated by personnel security specialists specifically designated by the head of the component concerned, or designee, or by the SA or the DCS, G-2.

b. In view of the significance each adjudicative decision can have on a person's career and to ensure the maximum degree of fairness and equity in such actions, a minimum level of review shall be required for all clearance/access determinations related to the following categories of investigations:

(1) Background investigation/special background investigation/periodic investigation/entrance national agency check/special investigative inquiry.

(a) Favorable: Completely favorable investigations shall be reviewed and approved by an adjudicative official in the civilian grade of GS-7/9 or the military rank of O-3.

(b) Unfavorable: Investigations that are not completely favorable shall undergo at least two levels of review by adjudicative officials, the second of which must be at the civilian grade of GS-11/12 or the military rank of O-4. When an unfavorable administrative action is contemplated under paragraph 8-201, the letter of intent (LOI) to deny or revoke must be approved and signed by an adjudicative official at the civilian grade of GS-13/14 or the military rank of O-5. A final notification of unfavorable administrative action, subsequent to the issuance of the LOI, must be approved and signed at the civilian grade of GS-14/15 or the military rank of O-6.

(2) National agency check with inquiries/Department of Defense National Agency check with written inquiries/national agency check/entrance national agency check.

(a) Favorable. A completely favorable investigation may be finally adjudicated after one level of review provided that the decisionmaking authority is at the civilian grade of GS-5/7 or the military rank of O-2.

(b) Unfavorable. Investigations that are not completely favorable must be reviewed by an adjudicative official in the civilian grade of GS-7/9 or the military rank of O-3. When an unfavorable administrative action is contemplated under paragraph 8-6 , the letter of intent to deny/revoke must be signed by an adjudicative official at the civilian grade of GS-11/12 or the military rank of O-4. A final notification of unfavorable administrative action subsequent to the issuance of the LOI must be signed by an adjudicative official at the civilian grade of GS-13 or the military rank of O-5 or above.

c. Exceptions to the above policy may only be granted by the Deputy Under Secretary of Defense for Policy.

6-3. Evaluation of personnel security information

a. The criteria and adjudicative policy to be used in applying the principles at paragraph 6-1 , above, are set forth in paragraph 2-4 and appendix I of this regulation. The ultimate consideration in making a favorable personnel security determination is whether such determination is clearly consistent with the interests of national security and shall be an overall common sense evaluation based on all available information. Such a determination shall include consideration of the following factors:

(1) The nature and seriousness of the conduct;

(2) The circumstances surrounding the conduct;

(3) The frequency and recency of the conduct;

(4) The age of the individual;

(5) The voluntariness of participation; and

(6) The absence or presence of rehabilitation.

b. Detailed adjudication policy guidance to assist adjudicators in determining whether a person is eligible for access to classified information or assignment to sensitive duties is contained in appendix I . Adjudication policy for access to SCI is contained in DCID 1/14.

6-4. Adjudicative record

a. Each clearance/access determination, whether favorable or unfavorable, shall be entered by the CDR, CCF, into the Defense Central Security Index (DCSI), a sub-element of the DCII. (Operational details regarding implementation of the DCSI shall be implemented in a forthcoming change to this regulation.)

b. The rationale underlying each unfavorable administrative action shall be reduced to writing and is subject to the provisions of DODD 5400.7 ( AR 25-55 ) and DODD 5400.11 ( AR 340-21 ) .

6-5. Reporting results of security or suitability determinations for civilian employees

The CCF will forward a copy of the initial BI or SBI of civilian employees, conducted by DIS, to the Security Manager of the employing command after making a security clearance determination. This will allow the employing command to determine employment eligibility and notify OPM. Employing activities will forward OFI Form 79A to report security or suitability determinations based on results of BI/SBI to: OPM-FIPC (OFI 79A), Boyers, PA 16018-0618, within 30 days after final determination.

Chapter 7
Issuing Clearance and Granting Access

7-1. General

a. The issuance of a personnel security clearance (as well as the function of determining that an individual is eligible for access to Special Access program information, or is suitable for assignment to sensitive duties or such other duties that require a trustworthiness determination) is a function distinct from that involving the granting of access to classified information. Clearance determinations are made on the merits of the individual case with respect to the subject's suitability for security clearance. Access determinations are made solely on the basis of the individual's need for access to classified information in order to perform official duties. Except for suspension of access pending final adjudication of a personnel security clearance, access may not be finally denied for cause without applying the provisions of paragraph 8-6 .

b. Only the authorities designated in paragraph F-1 , appendix F , are authorized to grant, deny or revoke personnel security clearances or special access authorizations (other than SCI). Any commander or head of an organization, to include CCF, may suspend access for cause when there exists information raising a serious question as to the individual's ability or intent to protect classified information, provided that the procedures set forth in paragraph 8-3 of this regulation are complied with.

c. All commanders and heads of DOD organizations have the responsibility for determining those position functions in their jurisdiction that require access to classified information and the authority to grant access to incumbents of such positions who have been cleared under the provisions of this regulation.

7-2. Issuing clearance

a. Authorities designated in paragraph F-1 , appendix F, shall record the issuance, denial or revocation of a personnel security clearance in the DSCI (see para 6-4 , above). A record of the clearance issued shall also be recorded in an individual's personnel/security file or official personnel folder, as appropriate. The CDR, CCF, will forward DA Form 873 to the command security manager for inclusion in the OPF or in the MPRJ in accordance with AR 640-10 . The DA Form 873 will not be removed except to make a copy, correct an administrative error, when a more recent clearance certificate is issued by CCF, to suspend access, or to comply with a direction of CCF.

b. A personnel security clearance remains valid until (1) the individual is separated from the Armed Forces, (2) separated from DOD civilian employment, (3) has no further official relationship with DOD or other Federal agencies, (4) official action has been taken to deny, revoke or suspend the clearance or access, or (5) regular access to the level of classified information for which the individual holds a clearance is no longer necessary in the normal course of their duties. If an individual resumes the original status of (1), (2), (3), or (5) above, no single break in the individual's relationship with DOD exists greater than 12 months, and/or the need for regular access to classified information at or below the previous level recurs, the appropriate clearance shall be reissued without further investigation or adjudication provided there has been no additional investigation or development of derogatory information.

c. Personnel security clearances of DOD military personnel shall be granted, denied, or revoked only by the designated authority of the parent military department. Issuance, reissuance, denial, or revocation of a personnel security clearance by any DOD component concerning personnel who have been determined to be eligible for clearance by another component is expressly prohibited. Investigations conducted on Army, Navy, and Air Force personnel by DIS will be returned only to the parent service of the subject for adjudication regardless of the source of the original request. The adjudicative authority will be responsible for expeditiously transmitting the results of the clearance determination. As an exception, the employing DOD component may issue an interim clearance to personnel under their administrative jurisdiction pending a final eligibility determination by the individual's parent component. Whenever an employing DOD component issues an interim clearance to an individual from another component, written notice of the action shall be provided to the parent component.

d. When a Defense Agency, to include OJCS, initiates an SBI (or PR) for access to SCI on a military member, DIS will return the completed investigation to the appropriate Military Department adjudicative authority in accordance with paragraph c , above, for issuance (or reissuance) of the TOP SECRET clearance. Following the issuance of the security clearance, the military adjudicative authority will forward the investigative file to the Defense Agency identified in the "Return Results To" block of the DD Form 1879 . The receiving agency will then forward the completed SBI on to DIA for the SCI adjudication in accordance with DCID 1/14.

e. The interim clearance will be recorded on DA Form 873 and shall be recorded in the DCSI by the parent DOD Component in accordance with paragraph 6-103 in the same manner as a final clearance. If a final clearance has not been received within 150 days, commanders will submit DA Form 5247-R (Request for Security Determination) to CDR, CCF (PCCF-M), as a tracer action and extend the interim period for an additional 180 days. If the DCII reveals existence of unevaluated derogatory information, CCF will advise requester that interim clearance is not authorized.

f. Requests for investigation for security clearances ( DD Form 1879 and DD Form 398-2 ) forwarded to DIS do not require submission of DA Form 5247-R to CCF. DIS will forward the completed investigation to CCF, who will make a clearance determination and inform the requester. If a clearance determination is not received in 150 days, the requester may trace the action by forwarding DA Form 5247-R to CCF. Commands should forward DA Form 5247-R on newly arrived personnel in their command if the personnel file or the individual indicates that an investigation was initiated at the former command. This will allow CCF to forward the clearance determination to the current commander.

g. CCF will forward DA Form 873 to the command whose unit identification code (UIC) appears on the DA Form 5247-R , DD Form 1879 , or DD Form 398-2 , if the UIC is documented in CCF'S data base. The UIC is used by CCF to add the requester's mailing address to the DA Form 873. Action to add, delete, or correct a UIC or associated address should be forwarded to Commander, CCF (PCCF-S). Commands may also request that a higher command, "THRU" UIC, be associated with any of their subordinate command UICs. This will allow CCF to forward the DA Form 873 addressed through the higher headquarters to the subordinate commander.

7-3. Granting access

a. Access to classified information shall be granted to persons whose official duties require such access, and who have the appropriate personnel security clearance. CCF normally grants the highest level of clearance authorized by the personnel security investigation on record. Access determinations (other than for special access programs) are not an adjudicative function relating to an individual's suitability for such access. Rather they are decisions made by the commander that access is officially required.

b. In the absence of derogatory information on the individual concerned, DOD commanders and organizational managers shall accept a personnel security clearance determination, issued by any DOD authority authorized by this regulation to issue personnel security clearances, as the basis for granting access, when access is required, without requesting additional investigation or investigative files. For Army-affiliated personnel, this determination is documented by a DA Form 873 in the personnel file. A DA Form 873, as well as clearance certificates issued by other DOD Components, will be honored provided

(1) There has been no break in Federal service exceeding 12 months since the investigation date; and

(2) A check of local records discloses no unfavorable information.

c. The access level of cleared individuals will also be entered into the DCSI by the CDR, CCF, along with clearance eligibility status, as systems are developed and adopted which make such actions feasible.

d. Once the CDR, CCF, has granted a person's security clearance, special access for NATO, SIOP-ESI, or other programs will be granted by the commander responsible for their control under appropriate regulations. The Commander, CCF, will make all eligibility determinations for SCI access.

e. DA Form 5247-R , with a copy of the clearance documentation, will be forwarded to CDR, CCF (PCCF-M), when accepting an Army clearance granted prior to CCF's assumption of clearance authority or by another DOD Component or Federal agency. In these cases, access to classified information need not be delayed pending receipt of a DA Form 873 . Access may be granted and continued provided local file checks are favorable. Forwarding is not necessary if DA Form 873 is annotated, "Project Top Feed Completed."

7-4. Administrative withdrawal

As set forth in paragraph 7-2 b , above, the personnel security clearance and access eligibility must be withdrawn when the events described therein occur. When regular access to a prescribed level of classified information is no longer required in the normal course of an individual's duties, the previously authorized access eligibility level must be administratively downgraded or withdrawn, as appropriate. Access based on an investigation completed over 5 years ago will be limited to no higher than SECRET unless a request for periodic reinvestigation was forwarded to DIS prior to the 5-year anniversary date of the previous investigation.

Chapter 8
Unfavorable Administrative Actions

Section I
Requirements

8-1. General

For purposes of this regulation, an unfavorable administrative action includes any adverse action which is taken as a result of a personnel security determination, as defined in the terms section, and any unfavorable personnel security determination, as defined in the terms section. This chapter is intended only to provide guidance for the internal operation of the DOD and is not intended to, does not, and may not be relied upon, to create or enlarge the jurisdiction or review authority of any court or administrative tribunal, including the Merit Systems Protection Board.

8-2. Referral for action

a. Whenever derogatory information relating to the criteria and policy set forth in paragraph 2-4 and appendix I of this regulation is developed or otherwise becomes available to any DOD element, it shall be referred by the most expeditious means to the commander or the security officer of the organization to which the individual is assigned for duty. The CDR or security officer of the organization to which the subject of the information is assigned shall review the information in terms of its security significance and completeness. If further information is needed to confirm or disprove the allegations, additional investigation should be requested. The commander of the duty organization shall ensure that the parent component of the individual concerned is informed promptly concerning (1) the derogatory information developed and (2) any actions taken or anticipated with respect thereto by forwarding DA Form 5248-R (Report of Unfavorable Information for Security Determination) to the CDR, CCF (PCCF-M). However, referral of derogatory information to the commander or security officer shall in no way affect or limit the responsibility of the central adjudication facility to continue to process the individual for denial or revocation of clearance or access to classified information, in accordance with paragraph 8-6 , below, if such action is warranted and supportable by the criteria and policy contained in paragraph 2-4 and appendix I . No unfavorable administrative action as defined in the terms section may be taken by the organization to which the individual is assigned for duty without affording the person the full range of protections contained in paragraph 8-6, below, or, in the case of SCI, Annex B, DCID 1/14.

b. The Director, DIS, shall establish appropriate alternative means whereby information with potentially serious security significance can be reported other than through DOD command or industrial organization channels. Such access shall include utilization of the DOD Inspector General "hotline" to receive such reports for appropriate followup by DIS. DOD components and industry will assist DIS in publicizing the availability of appropriate reporting channels. Additionally, DOD components will augment the system when and where necessary. Heads of DOD components will be notified immediately to take action, if appropriate.

(1) When the commander learns of credible derogatory information on a member of their command that falls within the scope of paragraph 2-4 , the commander will immediately forward DA Form 5248-R to the CDR, CCF.

(2) DA Form 5248-R will be submitted in a timely manner. At a minimum, initial reports will indicate the details of the credible derogatory information and actions being taken by the commander or appropriate authorities (for example, conducting an inquiry or investigation) to resolve the incident. Followup reports will be submitted at 90-day intervals if the commander has not taken final action or, for example, the subject is still pending action by civil court. At the conclusion of the command action, a final report will be forwarded to CCF indicating the action taken by the commander. The final report must contain results of any local inquiry, investigation, or board action and recommendation of the command concerning restoration or revocation of the person's security clearance, if appropriate.

(3) Commanders will not delay any contemplated personnel action while awaiting final action by CCF. The personnel action should proceed, with CCF being informed of the final action by submission of DA Form 5248-R through established channels.

(4) If the personnel file does not indicate the existence of a security clearance, commanders must still report information that falls within the scope of paragraph 2-4 , since the person might later require a clearance. Only a final report is required on personnel who do not have a security clearance.

(5) The SSOs are charged with protecting SCI. If an SSO learns of any derogatory information falling within the scope of paragraph 2-4 concerning any person under the SSO's security cognizance, the SSO will immediately inform the commander. The failure of a commander to forward a DA Form 5248-R to CCF, when derogatory information has been developed on SCI indoctrinated individuals, should be brought to the attention of the individual's security manager and the senior intelligence officer.

8-3. Suspension

The commander or head of the organization shall determine whether, on the basis of all the facts available upon receipt of the initial derogatory information, it is in the interests of national security to continue subject's security status unchanged or to take interim action to suspend subject's access to classified information or assignment to sensitive duties (or other duties requiring a trustworthiness determination), if information exists which raises serious questions as to the individual's ability or intent to protect classified information, until a final determination is made by the appropriate authority designated in appendix F . Every effort shall be made to resolve a suspension action as expeditiously as possible.

a. When a commander learns of significant derogatory information falling within the scope of paragraph 2-4 , in addition to the reporting requirements of 8-2 a , above, the commander must decide whether or not to suspend the individual's access to classified information. The commander may wish to suspend access on an "informal" basis while gathering information to determine whether or not formal suspension is warranted. After gathering the required data, the commander may decide to restore access. If the CDR does not suspend access, CCF will review all available information and, if warranted, advise the commander to suspend access.

b. If the commander decides on formal suspension of access, DA Form 873 will be removed from individual's personnel file and attached to DA Form 5248-R reporting the suspension to CCF. Once this is done, the commander may not restore access until a final favorable determination by the CDR, CCF, unless ALL the following criteria are met. These following procedures apply to both collateral and SCI access:

(1) If the commander determines that the person has been cleared of all charges and that the alleged offense or disqualifying information has been disproved or found groundless, and the commander is completely convinced that no element of risk remains, the commander may restore interim access in the name of the CDR, CCF. The commander will notify CCF of this action. Access will not normally be restored in cases where factors such as dismissal of charges, acquittal because of legal technicalities, plea bargaining, or absence of a speedy trial are involved. These factors cannot be construed as a clearing of all charges.

(2) When the commander is considering suspending or has suspended a person's access because of a suspected or actual psychological problem, the commander may elect to retain the person in status or reinstate access if the following conditions are met:

(a) A current medical evaluation indicates the condition was a one-time occurrence.

(b) The condition has no lasting effects that would affect the person's judgment.

(c) There is no requirement for further medical consultation relating to the condition.

(d) The examining physician recommends the person be returned to full duty status.

(e) The person exhibits no unacceptable behavior after the favorable medical evaluation.

(f) The commander firmly believes the person does not pose a risk to the security of classified information.

(3) If the commander has any doubts concerning the person's current acceptability for access, even though the above provisions have been met, the case will be referred to CCF. Only the CDR, CCF, may reinstate access in cases where the person attempted suicide.

c. The commander will ensure that the SSO is expeditiously notified of any information within the scope of paragraph 2-200 if the person is indoctrinated for SCI. This notification is especially critical if the commander suspends access.

d. A commander who suspends access to classified information will ensure that the suspension is documented in the Field Determined Personnel Security Status data field of the Standard Installation/Division Personnel System personnel file.

8-4. Final unfavorable administrative actions

The authority to make personnel security determinations that will result in an unfavorable administrative action is limited to those authorities designated in appendix F , except that the authority to terminate the employment of a civilian employee of a military DOD Agency is vested solely in the head of the DOD component concerned and in such other statutory official as may be designated. Action to terminate civilian employees of the Office of the Secretary of Defense and DOD components, on the basis of criteria listed in paragraphs 2-4 , a through f , shall be coordinated with the DUSD(P) prior to final action by the head of the DOD component. DOD civilian employees or members of the Armed Forces shall not be removed from employment or separated from the Service under provisions of this regulation if removal or separation can be effected under OPM regulations or administrative (nonsecurity) regulations of the military departments. However, actions contemplated in this regard shall in no way affect or limit the responsibility of the central adjudication facility to continue to process the individual for denial or revocation of a security clearance, or access to classified information on or assignment to a sensitive position if warranted and supportable by the criteria and standards contained in this regulation.

Section II
Procedures

8-5. General

No final personnel security determination shall be made on a member of the Armed Forces, an employee of the DOD, a consultant to the DOD, or any other person affiliated with the DOD without granting the individual concerned the procedural benefits set forth in 8-6, below, when such determination results in an unfavorable administrative action (see para 8-1 ). As an exception, Red Cross/united service organizations employees shall be afforded the procedures prescribed by DODD 5210.25 ( AR 380-49 ) .

8-6. Unfavorable administrative action procedures

Except as provided for below, no unfavorable administrative action shall be taken under the authority of this regulation unless the person concerned has been given:

a. A written statement of the reasons why the unfavorable administrative action is being taken. The statement shall be as comprehensive and detailed as the protection of sources afforded confidentiality under the provisions of the Privacy Act of 1974 (5 USC 552a) and national security permit. Prior to issuing a statement of reasons to a civilian employee for suspension or removal action, the issuing authority must comply with the provisions of Federal Personnel Manual, chapter 732, subchapter 1, paragraph 1-6b. The signature authority must be as provided for in paragraphs 6-101 b (1)(b) and 6-101 b (2)(b).

(1) The CDR, CCF, is the DA authority for denial and/or revocation of security clearances and/or SCI access eligibility. The CDR, CCF, may delegate this authority to those individuals outlined in paragraph 6-2 b .

(2) When CCF receives credible derogatory information and denial or revocation of a security clearance and/or SCI access eligibility is considered appropriate, CCF will forward a letter of intent through the command security manager to the individual. This LOI will outline the derogatory information and explain the proposed action. It will offer the person a chance to reply in writing with an explanation, rebuttal, or mitigation for the incidents.

(3) The LOI will direct suspension of access to classified information. If the LOI addresses SCI access only, access to collateral information may continue.

(4) If the person needs access to classified information in order to prepare a response to the LOI, CCF may authorize limited access for that specific purpose.

(5) When a commander receives an LOI concerning a person who is no longer assigned to the command, one of the following actions will be taken:

(a) If the person is transferred, endorse the LOI to the gaining command and forward an information copy of the endorsement to CCF (PCCF-M).

(b) If the person has been released from active duty and has a Reserve obligation, forward the LOI to the U.S. Army Reserve Personnel Center (DARP-SPI), St. Louis, MO 63132-5200. Forward an information copy of the endorsement to CCF (PCCF-M).

(c) If the person has been discharged from military service with no Reserve obligation, endorse the LOI to CCF (PCCF-M), attaching a copy of the discharge orders.

(6) The CDR, CCF, may waive the due process requirements of this chapter when a person is incarcerated by military or civilian authorities on conviction of a criminal offense, or when a person is dropped from the rolls as a deserter. In such instances, the commander will take the following actions immediately:

(a) Withdraw the DA Form 873 from the person's MPRJ or OPF and stamp or print across the face, "Revoked by authority of CDR, CCF deserted (date)" or "Revoked by authority of Commander, CCF incarcerated as a result of civil conviction or court-martial (date)," as appropriate for military and civilian personnel. Forward the DA Form 873 and DA Form 5248 explaining the circumstances to the CDR, CCF (PCCF-M).

(b) If the MPRJ or OPF does not contain a DA Form 873, forward DA Form 5248-R , explaining the circumstances, to the Commander, CCF (PCCF-M).

b. An opportunity to reply in writing to such authority as the head of the component concerned may designate.

(1) The commander will ensure that the person acknowledges receipt of the LOI by signing and dating the form letter enclosed with the LOI. The person will indicate their intention of submitting a rebuttal. The form letter will be forwarded immediately to CCF.

(2) The commander will ensure that the person is counseled as to the seriousness of CCF's contemplated action and will offer advice and assistance needed in forming a reply. The person can obtain legal counsel or other assistance at his or her own expense and may request a copy of the investigative files under the provisions of the Privacy Act. Privacy requests must be forwarded to the Chief, Freedom of Information/Privacy Office, U.S. Army Intelligence and Security Command (IACSF-FI), Fort George G. Meade, MD 20755-5995. If other than Army investigative records repository files exist, the Freedom of Information (FOI)/Privacy Office will refer the request to the appropriate repository. The individual must provide full name (including aliases), SSN, and date and place of birth. The person's signature must be notarized by a commissioned officer. If the person requires an extension of the 60-day suspension, the command security manager should forward a request, with justification, to the CDR, CCF (PCCF-M). An expected completion date will be provided.

(3) The person's response must address each issue raised in CCF's LOI. Any written documentation may be forwarded. Letters of recommendation from supervisory personnel may be attached to the response.

(4) The person will forward the response to CCF through the representative of the CDR who provided the LOI. The LOI must be endorsed by at least one CDR. The CDR should recommend whether the person's clearance should be denied, revoked, or restored. The CDR should provide a rationale, addressing the issues outlined in the LOI. Responses to LOIs that do not include the CDR's recommendation will be returned with a request for comments.

c. A written response to any submission under paragraph b , stating the final reasons therefore, which shall be as specific as privacy and national security considerations permit. The signature authority must be as provided for in paragraphs 6-2 b (1)(b) and 6-2 b (2)(b) . Such response shall be as prompt as individual circumstances permit, not to exceed 60 days from the date of receipt of the appeal submitted under paragraph b , above, provided no additional investigative action is necessary. If a final response cannot be completed within the timeframe allowed, the subject must be notified in writing of this fact, the reasons therefore, and the date a final response is expected, which shall not, in any case, exceed a total of 90 days from the date of receipt of the appeal under paragraph b .

(1) The CCF's decision is considered final. This decision will be forwarded through the command security office to the individual.

(2) In accordance with AR 600-37, CCF must provide unfavorable information developed during the PSI to both the DA Suitability Evaluation Board (DASEB) and the appropriate TAPA, Army Reserve Personnel Center, or Guard Personnel Center personnel management office on all senior enlisted (E-6 and above), commissioned, or warrant officer personnel. Specifically included is any information that results in denial or revocation of a security clearance. A copy of CCF's LOI, the person's response, and CCF's final letter will be forwarded. The regulation does not exclude providing other significant unfavorable information that does not in itself result in an adverse decision. The DASEB determines which information is retained in a person's official military personnel file (OMPF). The fact that the information is being forwarded to the DASEB or personnel management office will be documented in CCF's final letter of determination.

d. No final unfavorable personnel security clearance or access determination shall be made on an individual without granting them an opportunity to appeal to a higher level of authority as set forth in DOD 5200.02-R when such determination results in unfavorable administrative action. CCF's final letter of determination will state that if the person intends to appeal in writing directly to the Army's Personnel Security Appeals Board (PSAB) or request a personal appearance to the Defense Office of Hearings and Appeals (DOHA). The DOHA will review the facts of the case and make a recommendation to the PSAB. If, upon review of the in person or written appeal, a determination by PSAB is considered the final security clearance eligibility determination, no further appeal is authorized. All requests for appeal must be returned within 60 days from receipt of the letter.

8-7. Requests for reconsideration

a. If during the 60 days following receipt of CCF's final letter of determination the subject has additional information in rebuttal or mitigation, he or she should submit it to the CDR, CCF, rather than submitting an appeal to HQDA (DAMI-CIS). DAMI-CIS will forward such information to the CCF Commander. If the CCF review again results in denial or revocation, the person may then appeal to HQDA.

b. If after a final determination by the CDR, CCF, or by HQDA (DAMI-CIS), the person files an appeal, CCF will accept no requests for reconsideration based solely on the passage of time as a mitigating factor for at least 1 year from the date of the final letter of determination or the DA appeal decision, whichever was later.

c. Any request for reconsideration submitted to the CDR, CCF, in accordance with the provisions of paragraphs a and b , above, must outline the reasons for loss of clearance and provide a rationale for favorable action by CCF. The request for reconsideration must be endorsed by the person's CDR. The CDR should be familiar with the information available to CCF and with CCF's rationale for denial or revocation. The CDR should state why the clearance and/or SCI access should be restored. If the person is not able to provide the CDR with a copy of CCF's original action, the commander should request a copy of the Army Investigative Records Repository dossier through their authorized file requester, normally the installation directorate of security (DSEC)/security manager at separate brigade, division, corps, and major command levels.

8-8. Involuntary separation of military members and DA civilian personnel

As soon as involuntary separation is considered for military members or DA civilian personnel who have had access to SCI, Special Access programs, or other sensitive programs, the local CDR will send the information listed below to HQDA (DAMI-CIS), Washington, DC 20310-1051. Elimination action will not be completed until DAMI-CIS acknowledges receipt of this information.

a. Individual's name, grade, and SSN.

b. Date and place of birth.

c. Marital status.

d. Length of service.

e. Reason(s) for proposed involuntary discharge or dismissal.

f. Type of discharge or dismissal contemplated.

g. Level of access to classified information. Classified details should not be submitted.

8-9. Exceptions to policy

a. Notwithstanding paragraph 8-6 , above, or any other provision of this regulation, nothing in this regulation shall be deemed to limit or affect the responsibility and powers of the Secretary of Defense to find that a person is unsuitable for entrance or retention in the Armed Forces, or is ineligible for a security clearance or assignment to sensitive duties, if the national security so requires, pursuant to 5 USC 7532. Such authority may not be delegated and may be exercised only when it is determined that the procedures prescribed in paragraph 8-6, above, are not appropriate. Such determination shall be conclusive.

b. Notification of adverse action need not be given to

(1) Military personnel who have been dropped from the rolls of their organization for absence without authority.

(2) Persons who have been convicted of a criminal offense by a civilian court or court-martial and are incarcerated.

Section III
Reinstatement of Civilian Employees

8-10. General

Any person whose civilian employment in the DOD is terminated under the provisions of this regulation shall not be reinstated or restored to duty or reemployed in the DOD unless the Secretary of Defense, or the head of a DOD component, finds that such reinstatement, restoration, or reemployment is clearly consistent with the interests of national security. Such a finding shall be made a part of the personnel security record.

8-11. Reinstatement benefits

A DOD civilian employee whose employment has been suspended or terminated under the provisions of this regulation and who is reinstated or restored to duty under the provisions of 5 USC 3571 is entitled to benefits as provided for by PL 89-380 .

Chapter 9
Continuing Security Responsibilities

Section I
Evaluating Continued Security Eligibility

9-1. General

A personnel security determination is an effort to assess the future trustworthiness of an individual in terms of the likelihood of the individual preserving the national security. Obviously it is not possible at a given point to establish with certainty that any human being will remain trustworthy. Accordingly, the issuance of a personnel security clearance or the determination that a person is suitable for assignment to sensitive duties cannot be considered as a final personnel security action. Rather, there is the clear need to ensure that, after the personnel security determination is reached, the individual's trustworthiness is a matter of continuing assessment. The responsibility for such assessment must be shared by the organizational commander or manager, the individual's supervisor and, to a large degree, the individual himself. Therefore, the heads of DOD components shall establish and maintain a program designed to evaluate on a continuing basis the status of personnel under their jurisdiction with respect to security eligibility. This program should ensure close coordination between security authorities and personnel, medical, legal, and supervisory personnel to ensure that all pertinent information available within a command is considered in the personnel security process.

9-2. Management responsibility

a. Commanders and heads of organizations shall ensure that personnel assigned to sensitive duties (or other duties requiring a trustworthiness determination under the provisions of this regulation) are initially indoctrinated and periodically instructed thereafter on the national security implication of their duties and on their individual responsibilities.

b. The heads of all DOD components are encouraged to develop programs designed to counsel and assist employees in sensitive positions who are experiencing problems in their personal lives with respect to such areas as financial, medical or emotional difficulties. Such initiatives should be designed to identify potential problem areas at an early stage so that any assistance rendered by the employing activity will have a reasonable chance of precluding long-term, job-related security problems.

9-3. Supervisory responsibility

Security programs shall be established to ensure that supervisory personnel are familiarized with their special responsibilities in matters pertaining to personnel security with respect to personnel under their supervision. Such programs shall provide practical guidance as to indicators that may signal matters of personnel security concern. Specific instructions should be disseminated by security managers concerning reporting procedures to enable the appropriate authority to take timely corrective action to protect the interests of national security as well as to provide any necessary help to the individual concerned to correct any personal problem which may have a bearing upon the individual's continued eligibility for access.

a. In conjunction with the submission of BIs and SBIs stated in chapter 2 , section II, and appendix B , paragraphs B-3 and B-4; and with the submission of PRs stated in section VII, chapter 3 , and paragraph B- 5, appendix B; supervisors will be required to review an individual's DD Form 398 to ensure that no significant adverse information of which they are aware and that may have a bearing on subject's initial or continued eligibility for access to classified information is omitted.

b. If the supervisor is not aware of any significant adverse information that may have a bearing on the subject's initial or continued eligibility for access, then the following statement must be documented, signed and dated, and forwarded to DIS with the investigative package. "I am aware of no information of the type contained in DOD 5200.2-R , appendix E ( AR 380-67 ) relating to subject's trustworthiness, reliability, or loyalty that may reflect adversely on his/her ability to safeguard classified information."

c. If the supervisor is aware of such significant adverse information, the following statement shall be documented, signed and dated, and forwarded to DIS with the investigative package, and a written summary of the derogatory information forwarded to DIS with the investigative package: "I am aware of information of the type contained in DOD 5200.2-R, appendix E (AR 380-67) , relating to subject's trustworthiness, reliability, or loyalty that may reflect adversely on their ability to safeguard classified information and have reported all relevant details to the appropriate security official(s)."

d. In conjunction with regularly scheduled fitness and performance reports of military and civilian personnel whose duties entail access to classified information, supervisors will include a comment in accordance with paragraphs 9-3 b and c , above, as well as a comment regarding an employee's discharge of security responsibilities, pursuant to their component guidance.

e. If the statement in paragraph 9-3 c , above applies, the supervisor must ensure that all relevant information is reported to the local command security official responsible for processing the investigative paperwork.

f. If the information seems to warrant adverse action, the command security official will immediately refer it to the CDR, CCF (PCCF-M), using DA Form 5248-R . The CCF will process the cases in accordance with established procedures.

g. If the local command security official determines that the information is minor and does not warrant an adverse action, the PSI request should be forwarded to DIS. A summary of the derogatory information will be part of the investigative request packet. DIS will initiate the investigation and expand as appropriate. DIS will forward results of the investigation to CCF for adjudication.

h. It is important that immediate supervisors take an objective approach to the requirements in paragraphs b and c , above, to ensure equity to both the subject of the investigation and national security.

9-4. Individual responsibility

a. Individuals must familiarize themselves with pertinent security regulations that pertain to their assigned duties. Further, individuals must be aware of the standards of conduct required of persons holding positions of trust. In this connection, individuals must recognize and avoid the kind of personal behavior that would result in rendering one ineligible for continued assignment in a position of trust. In the final analysis, the ultimate responsibility for maintaining continued eligibility for a position of trust rests with the individual.

b. Moreover, individuals having access to classified information must report promptly to their security office:

(1) Any form of contact, intentional or otherwise, with a citizen of a designated country, (see app H ) unless occurring as a function of one's official duties.

(2) Attempts by representatives or citizens of designated countries to cultivate friendships or to place one under obligation.

(3) Attempts by representatives or citizens of foreign countries to:

(a) Cultivate a friendship to the extent of placing one under obligation that they would not normally be able to reciprocate, or by offering money payments or bribery to obtain information of actual or potential intelligence value.

(b) Obtain information of actual or potential intelligence value through observation, collection of documents, or by personal contact.

(c) Coerce by blackmail, by threats against or promises of assistance to relatives living under foreign control, especially those living in a designated country.

(4) All personal foreign travel in advance.

(5) Any information of the type referred to in paragraph 2-4 or appendix I .

9-5. Coworker responsibility

Coworkers have an equal obligation to advise their supervisor or appropriate security official when they become aware of information with potentially serious security significance regarding someone with access to classified information or employed in a sensitive position.

Section II
Security Education

9-6. General

The effectiveness of an individual in meeting security responsibilities is proportional to the degree to which the individual understands them. Thus, an integral part of the DOD security program is the indoctrination of individuals on their security responsibilities. Moreover, such indoctrination is essential to the efficient functioning of the DOD personnel security program. Accordingly, heads of DOD components shall establish procedures in accordance with this chapter whereby persons requiring access to classified information, or being assigned to positions that require the occupants to be determined trustworthy are periodically briefed as to their security responsibilities.

9-7. Initial briefing

a. All persons cleared for access to classified information or assigned to duties requiring a trustworthiness determination under this regulation shall be given an initial security briefing. A record of this briefing will be maintained in the security office. The briefing shall be in accordance with the requirements of paragraph 10-3 , DOD 5200.1-R ( AR 380-5 ) and consist of the following elements:

(1) The specific security requirements of their particular job.

(2) The techniques employed by foreign intelligence activities in attempting to obtain classified information and their responsibility for reporting such attempts ( AR 381-12 ).

(3) The prohibition against disclosing classified information, by any means, to unauthorized persons or discussing or handling classified information in a manner that would make it accessible to unauthorized persons.

(4) The penalties that may be imposed for security violations.

b. If an individual declines to execute SF Form 189, "Classified Information Nondisclosure Agreement," the DOD component shall initiate action to deny or revoke the security clearance of such person in accordance with paragraph 8-6 , above.

9-8. Refresher briefing

Programs shall be established to provide, at a minimum, annual security training for personnel having continued access to classified information. The elements outlined in paragraph 10-2 , DOD 5200.1-R ( AR 380-5 ) shall be tailored to fit the needs of experienced personnel.

9-9. Foreign travel briefing

a. DOD components will establish appropriate internal procedures requiring all personnel possessing a DOD security clearance to report to their security office all personal foreign travel in advance of the travel being performed. When travel patterns, or the failure to report such travel, indicate the need for investigation, the matter will be referred to the appropriate counterintelligence investigative agency.

b. Personnel having access to classified information shall be given a foreign travel briefing by a counterintelligence agent, security specialist, security manager, or other qualified individual, as a defensive measure prior to travel to a designated country (see app H ) in order to alert them to their possible exploitation by hostile intelligence services. These personnel will also be debriefed upon their return. The briefings will be administered under the following conditions:

(1) Travel to or through designated country for any purpose.

(2) Attendance at international, scientific, technical, engineering, or other professional meetings in the United States or in any country outside the United States when it can be anticipated that representative(s) of designated countries will participate or be in attendance.

c. Individuals who travel frequently, or attend or host meetings of foreign visitors as described in paragraph b 2, above, need not be briefed for each occasion, but shall be provided a thorough briefing at least once every 6 months and a general reminder of security responsibilities before each such activity.

d. Records on such employees of all personal foreign travel will be maintained for 5 years and may be in manual or automated form. Foreign travel records will be forwarded to the gaining command upon transfer of the individual. The losing command will retain a copy of the foreign travel record on file for 1 year after the individual's departure. Record of individuals who retire, separate, or terminate employment will be retained at the losing command until the expiration of the 5-year period. Data to be recorded are listed below:

(1) Name.

(2) SSN.

(3) Organization.

(4) Date security office was notified of proposed travel.

(5) Country or countries to be visited and inclusive dates.

(6) Date of foreign travel briefing (if travel meets criteria in para b , above) and name of person conducting briefing.

(7) Date of foreign travel debriefing (in accordance with para b , above) and name of person conducting debriefing.

(8) Purpose of visit.

9-10. Termination briefing

a. Upon termination of employment, administrative withdrawal of security clearance, revocation of security clearance, or contemplated absence from duty or employment for 60 days or more, DOD military personnel and civilian employees shall be given a termination briefing, return all classified material, and execute a Security Termination Statement. DA Form 2962 (Security Termination Statement and Debriefing Certificate) will be used for this purpose. Paragraph 10-5 , AR 380-5 applies. This statement shall include the following;

(1) An acknowledgement that the individual has read the appropriate provisions of the Espionage Act and other criminal statutes and DOD regulations applicable to the safeguarding of classified information to which the individual has had access, and understands the implications thereof;

(2) A declaration that the individual no longer has any documents or material containing classified information in their possession;

(3) An acknowledgement that the individual will not communicate or transit classified information to any unauthorized person or agency; and

(4) An acknowledgement that the individual will report without delay to the FBI or the DOD component concerned any attempt by any unauthorized person to solicit classified information.

b. When an individual refuses to execute a security termination statement, that fact shall be reported immediately to the security manager of the cognizant organization concerned. In any such case, the individual involved shall be debriefed orally. The fact of a refusal to sign a security termination statement shall be reported to the Director, DIS, who shall ensure that it is recorded in the DCII.

c. The security termination statement shall be retained by the DOD component that authorized the individual access to classified information for the period specified in the component's records retention schedules, but for a minimum of 2 years after the individual is given a termination briefing.

d. In addition to the provisions of paragraphs a , b , and c , above, DOD components shall establish a central authority to be responsible for ensuring that security termination statements are executed by senior personnel (general officers, flag officers, and senior executive service (SES)s). Failure on the part of such personnel to execute a security termination statement shall be reported immediately to the DUSD(P). Senior civilian employees, SESs and above, will execute the DA Form 2962 at the employing activity at time of separation. The General Officer Management Office, ODCS, G-1, is the control office authorized to execute a DA Form 2962 for each separating general officer.

Chapter 10
Safeguarding Personnel Security Investigative Records

10-1. General

In recognition of the sensitivity of personnel security reports and records, particularly with regard to individual privacy, it is DOD policy that such personal information shall be handled with the highest degree of discretion. Access to such information shall be afforded only for the purpose cited herein and to persons whose official duties require such information. Personnel security investigative reports may be used only for the purposes of determining eligibility of DOD military and civilian personnel, contractor employees, and other persons affiliated with the DOD, for access to classified information, assignment or retention in sensitive duties or other specifically designated duties requiring such investigation, or for law enforcement and counterintelligence investigations. Other uses are subject to the specific written authorization of the DUSD(P).

10-2. Responsibilities

DOD authorities responsible for administering the DOD personnel security program and all DOD personnel authorized access to personnel security reports and records shall ensure that the use of such information is limited to that authorized by this regulation and that such reports and records are safeguarded as prescribed herein. The heads of DOD components and the DUSD(P) for the Office of the Secretary of Defense shall establish internal controls to ensure adequate safeguarding and limit access to and use of personnel security reports and records as required by paragraphs 10-3 and 10-4 , below.

10-3. Access restrictions

Access to personnel security investigative reports and personnel security clearance determination information shall be authorized only in accordance with DODD 5400.7 ( AR 25-55 ) and DODD 5400.11 ( AR 340-21 ) and with the following:

a. DOD personnel security investigative reports shall be released outside of the DOD only with the specific approval of the investigative agency having authority over the control and disposition of the reports.

b. Within DOD, access to personnel security investigative reports shall be limited to those designated DOD officials who require access in connection with specifically assigned personnel security duties, or other activities specifically identified under the provisions of paragraph 10-1 . Under no circumstances will foreign national employees of the DA be permitted access to investigative files concerning U.S. military, U.S. civilian, or foreign national employees, unless such employees shall themselves have been the subject of a favorable counterintelligence scoped BI.

c. Access by subjects of personnel security investigative reports shall be afforded in accordance with DODD 5400.11 (AR 340-21) .

d. Access to personnel security clearance determination information shall be made available, other than provided for in paragraph c , above, through security channels, only to DOD or other officials of the Federal Government who have an official need for such information.

10-4. Safeguarding procedures

Personnel security investigative reports and personnel security determination information (to include NACI) shall be safeguarded as follows:

a. Authorized requesters shall control and maintain accountability of all reports of investigation received.

b. Reproduction, in whole or in part, of personnel security investigative reports by requesters shall be restricted to the minimum number of copies required for the performance of assigned duties.

c. Personnel security investigative reports shall be stored in a vault, safe, or steel file cabinet having at least a lock bar and an approved three- position dial-type combination padlock or in a similarly protected area/container.

d. Reports of DOD PSIs shall be sealed in double envelopes or covers when transmitted by mail or when carried by persons not authorized access to such information. The inner cover shall bear a notation substantially as follows: "TO BE OPENED ONLY BY OFFICIALS DESIGNATED TO RECEIVE REPORTS OF PERSONNEL SECURITY INVESTIGATION."

e. An individual's status with respect to a personnel security clearance or a special access authorization is to be protected as provided for in paragraph VI.C.6., DODD 5400.7 ( AR 25-55 ) .

10-5. Records disposition

a. Personnel security investigative reports, to include OPM NACIs may be retained by DOD recipient organizations, if the head of the component deems it necessary to fulfill the requirements of paragraph 9-1 of this regulation , only for the period necessary to complete the purpose for which they were originally requested. Such reports are considered to be the property of the investigating organization and are on loan to the recipient organization. All copies of such reports shall be destroyed within 90 days after completion of the required personnel security determination. Destruction shall be accomplished in the same manner as for classified information in accordance with paragraph 9-2 , DOD 5200.1-R ( AR 380-5 ) .

b. DOD record repositories authorized to file personnel security investigative reports shall destroy PSI reports of a favorable or of a minor derogatory nature 15 years after the date of the last action. That is, after the completion date of the investigation or the date on which the record was last released to an authorized user whichever is later. Personnel security investigative reports resulting in an unfavorable administrative personnel action or court-martial or other investigations of a significant nature due to information contained in the investigation shall be destroyed 25 years after the date of the last action. Files in this latter category that are determined to be of possible historical value and those of widespread public or congressional interest may be offered to the National Archives after 15 years. AR 381-45 applies.

c. Personnel security investigative reports on persons who are considered for affiliation with DOD will be destroyed after 1 year if the affiliation is not completed.

10-6. Foreign source information

Information that is classified by a foreign government is exempt from public disclosure under the Freedom of Information and Privacy Acts. Further, information provided by foreign governments requesting an express promise of confidentiality shall be released only in a manner that will not identify or allow unauthorized persons to identify the foreign agency concerned.

Chapter 11
Program Management

11-1. General

To ensure uniform implementation of the DOD personnel security program throughout the department, program responsibility shall be centralized at the DOD component level.

11-2. Responsibilities

a. The DUSD(P) shall have primary responsibility for providing guidance, oversight, development and approval for policy and procedures governing personnel security program matters within the department:

(1) Provide program management through issuance of policy and operating guidance.

(2) Provide staff assistance to the DOD components and Defense Agencies in resolving day-to-day security policy and operating problems.

(3) Conduct inspections of the DOD Components for implementation and compliance with DOD security policy and operating procedures.

(4) Provide policy, oversight, and guidance to the component adjudication functions.

(5) Approve, coordinate and oversee all DOD personnel security research initiatives and activities.

b. The General Counsel shall ensure that the program is administered in a manner consistent with the laws; all proceedings are promptly initiated and expeditiously completed; and that the rights of individuals involved are protected, consistent with the interests of national security. The General Counsel shall also ensure that all relevant decisions of the courts and legislative initiatives of the Congress are obtained on a continuing basis and that analysis of the foregoing is accomplished and disseminated to DOD personnel security program management authorities.

c. The heads of the components shall ensure that

(1) The DOD personnel security program is administered within their area of responsibility in a manner consistent with this regulation.

(2) A single authority within the office of the head of the DOD component is assigned responsibility for administering the program within the component.

(3) Information and recommendations are provided the DUSD(P) and the General Counsel at their request concerning any aspect of the program.

d. The Deputy Assistant Secretary of the Army for Civilian Personnel, Nonappropriated Funds, and Security Policy will ensure the implementation of DODD 5200.2 and DOD 5200.2-R . The DASA (SAMR-PSP) will conduct oversight to include approving and disapproving of security-related policy and will provide guidance, as needed, on Army personnel security policy in its broadest dimensions.

e. The DCS, G-2 is responsible for formulating policy governing

(1) Army personnel security.

(2) Submitting PSI requests.

(3) Adjudicating personnel security.

(4) Continually assessing the suitability of individuals for access to classified information.

f. The DCS , G-1 is responsible for

(1) Accessing personnel for the total force.

(2) Determining personnel classification and standards.

(3) Adjudicating centralized personnel security.

(4) Formulating personnel management policy and procedures in compliance with existing security standards and criteria.

(5) Developing automation architecture for integrating the Total Army Information Systems.

(6) Using designation criteria to determine the number of civilian positions designated as sensitive. Records of sensitive and nonsensitive positions will be maintained by the servicing civilian personnel office. Those individuals authorized to designate sensitive positions will inform the servicing civilian personnel office of any change in position sensitivity.

g. The CDR, CCF, is responsible for the centralized adjudication, granting, revocation, and denial of personnel security clearances and SCI access eligibility determinations. The CDR, CCF, is authorized to suspend or direct the suspension of access to classified information.

h. The CDRs, Army Staff heads, and supervisors are responsible for implementing the personnel security provisions of this regulation. Personnel security functions are normally delegated to the installation DSEC/security manager/G2, who will

(1) Initiate requests for PSIs.

(2) Suspend an individual's access to classified information.

(3) Request security clearances.

(4) Grant interim security clearances.

(5) Report any adverse information.

(6) Assist personnel in completing applicable investigative forms.

(7) Conduct oversight visits of subordinate units at least once every 2 years.

11-3. Reporting requirements

a. Personnel security program management data will be developed and submitted by 1 November each year for the preceding fiscal year in a report to the DUSD(P) DCS, G-2 (DAMI-CIS), Washington, DC 20310-1051. The information required below is essential for basic personnel security program management and in responding to requests from the Secretary of Defense and Congress. The report will cover the preceding fiscal year, broken out by clearance category, according to officer, enlisted, civilian or contractor status.

b. The CDR, CCF, will report the following:

(1) Number of TOP SECRET, SECRET, and CONFIDENTIAL clearances issued;

(2) Number of TOP SECRET, SECRET, and CONFIDENTIAL clearances denied;

(3) Number of TOP SECRET, SECRET, and CONFIDENTIAL clearances revoked;

(4) Number of SCI access determinations issued;

(5) Number of SCI access determinations denied;

(6) Number of SCI access determinations revoked;

(7) Number of actions which resulted in nonappointment or nonselection to a sensitive position;

(8) Number of personnel adjudicating personnel security cases on a full- or part- time basis;

(9) Number of man-years expended in adjudicating personnel security cases.

c. MACOM commanders and heads of Army Staff agencies will consolidate reports submitted by their subordinate units and field operating agencies pertaining to the following data:

(1) Total number of personnel holding a clearance for TOP SECRET, SECRET, CONFIDENTIAL, and sensitive compartmented information as of the end of the fiscal year.

(2) Total number of personnel authorized access to TOP SECRET, SECRET, CONFIDENTIAL, and sensitive compartmented information as of the end of the fiscal year.

(3) Number of TOP SECRET billets established (see para 3-4 ).

(4) Number of civilian positions designated sensitive, by designation criteria.

(5) The number of limited access authorizations in effect (in accordance with para 3-21 ).

d. This reporting requirement has been assigned report control symbol DD-POL(A)1749.

11-4. Inspections

The heads of DOD components shall ensure that personnel security program matters are included in their administrative inspection programs.

11-5. Performance measures

a. Commander's and/or organization head.

(1) Provide the document that establishes or identifies command's security organization and demonstrates the security manager as having direct and ready access to the commanding officer.

(2) Provide evidence of formal security management training.

(3) Provide the documentation that identifies the security manager by name to all command personnel.

(4) Provide examples of security management functions that demonstrate overall management of the program.

(5) How many persons are assigned duties and responsibilities to support the command's security program, what are their duties, and how do they report to the security manager?

(6) Provide a copy of the most current written command security procedures.

(7) Explain any security services provided by the command including inspection, evaluation, education, or assist visits.

(8) Provide the format or requirements for the annual refresher briefings.

(9) Provide the command's security termination statement procedures.

(10) What security procedures are in place to ensure only those with validated need are submitted for a limited access authorization?

(11) What protocols are in place to limit investigative and security clearance requests to only those individuals who need such in performance of their duties or functions?

b. Security officers and/or managers.

(1) Annual volume of security clearances submitted.

(2) Provide number of submissions rejected by the Personnel Security Investigation Center of Excellence based on existence of a prior valid investigation that meets requirements.

(3) Does the security manager verify security clearance of persons authorized access to classified info?

Appendix A
References

The Official Army Publications Web Sites.

Publication Section I
Required Publications

This section contains no entries.

Publication Section II
Related Publications

A related publication is a source of additional information. The user does not have to read it to understand this regulation. DOD publications are available at http://www.dtic.mil/whs/directives/corres/pub1.html . United States Codes are available at http://www.gpoaccess.gov/uscode/

AR 11-2. Managers' Internal Control Program

AR 25-30. The Army Publishing Program

AR 25-55. Release of Information and Records from Army Files

AR 50-5. Nuclear Surety

AR 50-6. Chemical Surety

AR 190-16. Physical Security

AR 190-56. The Army Civilian Police and Security Guard Program

AR 215-3. Nonappropriated Funds Personnel Policy

AR 340-21. The Army Privacy Program

AR 380-5. Department of the Army Information Security Program

AR 380-10. Foreign Disclosure and Contacts with Foreign Representatives (U)

AR 380-28. Department of the Army Special Security System

AR 380-49. Industrial Program

AR 380-381. Special Access Programs (SAPs) and Sensitive Activities

AR 381-12. Threat Awareness and Reporting Program

AR 381-20. The Army Counterintelligence Program (S)

AR 381-45. Investigative Records Repository

AR 600-8-2. Suspension of Favorable Personnel Actions (FLAGS)

AR 600-37. Unfavorable Information

AR 600-8-104. Military Personnel Information Management/Records

AR 608-10. Child Development Services

AR 614-200. Enlisted Assignments and Utilization Management

DA Pam 611-21. Military Occupational Classification and Structure

Director of Central Intelligence Directive: DCID No 1/14. Minimum Personnel Security Standards and Practices Governing Access to Sensitive Compartmented Information

DIS 20-1-M. Manual for Personnel Security Investigations

DOD 1401.1-M. Personnel Policy Manual for Nonappropriated Fund Instrumentalities

DOD 5030.49-R. Customs Inspection

DOD 5200.1-R. Information Security Program Regulation

DOD 5200.2-R. DOD Personnel Security Program

DOD 5220.22-R. Industrial Security Regulation

DOD 7000.14-R, Volume 13. Financial Management Regulation, Volume 13, Nonappropriated Funds Policy and Procedures

DODD 5100.3. Support of the Headquarters of Unified Specified, and Subordinate Joint Commands

DODD 5100.23. Administrative Arrangements for the National Security Agency

DODD 5100.55. United States Security Authority for North Atlantic Treaty Organization Affairs

DODD 5105.42. The Defense Investigative Service

DODD 5142.1. Assistant Secretary of Defense (Legislative Affairs)

DODD 5200.8. Security of Military Installations and Resources

DODD 5210.2. Access to and Dissemination of Restricted Data

DODD 5210.25. Assignment of American National Red Cross and United Service Organizations

DODD 5210.42. Nuclear Weapon Personnel Reliability Program

DODD 5210.45. Personnel Security in the National Security Agency

DODD 5210.46. Department of Defense Building Security for the National Capital Region

DODD 5210.48. DOD Polygraph Program

DODD 5210.55. Selection of DOD Military and Civilian Personnel and Contractor Employees for Assignment to Presidential Support Activities

DODD 5210.65. Chemical Agency Security Program

DODD 5220.22. Industrial Security Regulation

DODD 5230.11. Disclosure of Classified Military Information to Foreign Governments and International Organizations

DODD 5400.7. DOD Freedom of Information Act Program

DODD 5400.11. Department of Defense Privacy Program

EO 9835. Prescribing Procedures for the Administration of an Employee Loyalty Program in the Executive Branch of the Government

EO 10450. Security Requirements for Government Employment

EO 11935. Citizenship Requirements for Federal Employment

EO 12333. United States Intelligence Activities

EO 12356. National Security Information

PL 86-36. National Security Agency-Officer and Employees

PL 88-290. National Security Agency-Personnel Security Procedures

PL 89-380. Unauthorized publication or use of communications

PL 96-456. Classified Information Procedures Act of 1980

UCMJ, Art. 15. Nonjudicial Punishment (Available at http://www.au.af.mil/au/awc/awcgate/ucmj.htm .)

Atomic Energy Act of 1954. Atomic Energy

Privacy Act of 1974. Antiterrorism

5 CFR 213.306. Accepted service

5 USC 552a. Records maintained on individuals

5 USC 3571. Reinstatement or restoration; individuals suspended or removed for national security

5 USC 7532. Suspension and removal

10 USC. Armed Forces

FPM letter 732. Military Personnel Information Management/Records

OMB Circular A-130. Management of Federal Resources (Available at http://www.whitehouse.gov/omb/circulars_a130 .)

RCS DD-POL(A)1749. No information

Publication Section III
Prescribed Forms

This section contains no entries.

Publication Section IV
Referenced Forms

The following forms are available on the APD Web site http:// www.apd.army.mil .

DA Form 11-2. Internal Control Evaluation Certification

DA Form 477 (obsolete). Requisition for Enlisted Personnel

DA Form 872. Requisition for Individual Officer Personnel

DA Form 873 (obsolete). Certificate Clearance and/or Security Determination

DA Form 2028. Recommended Changes to Publications and Blank Forms

DA Form 2962. Security Termination Statement

DA Form 5247-R (obsolete). Request for Security Determination (LRA)

DA Form 5248-R. Report of Unfavorable Information for Security Determination (LRA)

DD Form 398 (obsolete). Personnel Security Questionnaire

DD Form 398-2 (obsolete). DOD National Agency Questionnaire (NAQ)

DD Form 1879 (obsolete). DOD Request for Personnel Security Investigation

DD Form 2221 (obsolete). DOD Authority for Release of Information and Records

FD 258. Applicant Fingerprint Card

FS-240. Report of Birth Abroad of a Citizen of the United States of America

FS-545. Certification of Birth

SF Form 85. Questionnaire for Non-Sensitive Positions

SF Form 87. Fingerprint Chart

SF 171 (superseded by OF 612). Application for Federal Employment

Appendix B
Investigative Scope

This appendix prescribes the scope of the various types of PSIs.

B-1. National Agency Check

At a minimum, the first three of the described agencies (DCII, FBI/HQ, and FBI/ID) below shall be included in each complete NAC; however, a NAC may also include a check of any or all of the other described agencies, if appropriate.

a. The DCII records consist of an alphabetical index of personal names and impersonal titles that appear as subjects or incidentals in investigative documents held by the criminal, counterintelligence, fraud, and personnel security investigative activities of the three military departments, DIS, DCIS, and the National Security Agency. DCCI records will be checked on all subjects of DOD investigations.

b. The FBI/HQ has on file copies of investigations conducted by the FBI. The FBI/HQ check, included in every NAC, consists of a review of files for information of a security nature and that developed during applicant-type investigations.

c. An FBI/ID check, included in every NAC (but not ENTNAC), is based upon a technical fingerprint search that consists of a classification of the subject's fingerprints and comparison with fingerprint cards submitted by law enforcement activities. If the fingerprint card is not classifiable, a "name check only" of these files is automatically conducted.

d. The files of OPM contain the results of investigations conducted by OPM under EOs 9835 and 10450, those requested by the Nuclear Regulatory Commission (NRC), the Department of Energy (DOE) and those requested since August 1952 to serve as a basis for "Q" clearances. Prior to that date, "Q" clearance investigations were conducted by the FBI. A "Q" clearance is granted to individuals who require access to DOE information. In order to receive a "Q" clearance, a full field BI must be completed on the individual requiring access in accordance with the Atomic Energy Act of 1954. Also on file are the results of investigations on the operation of the Merit System, violations of the Veterans Preference Act, appeals of various types, fraud and collusion in civil service examinations and related matters, data on all Federal employment, and an index of all BIs on civilian employees or applicants completed by agencies of the executive branch of the U.S Government. The OPM files may also contain information relative to U.S. citizens who are, or who were, employed by a United Nations organization or other public international organization such as the Organization of American States. OPM records are checked on all persons who are, or who have been, civilian employees of the U.S. Government; or U.S. citizens who are, or who have been, employed by a United Nations organization or other public international organization; and on those who have been granted security clearances by the NRC or DOE.

e. The files of Immigration and Naturalization Service (INS) contain (or show where filed) naturalization certificates, certificates of derivative citizenship, all military certificates of naturalization, repatriation files, petitions for naturalization and declaration of intention, visitors' visas, and records of aliens (including government officials and representatives of international organizations) admitted temporarily into the United States INS records are checked when the subject is

(1) An alien in the United States, or

(2) A naturalized citizen whose naturalization has not been verified, or

(3) An immigrant alien, or

(4) A U.S. citizen who receives derivative citizenship through the naturalization of one or both parents, provided that such citizenship has not been verified in a prior investigation.

f. The State Department maintains the following records:

(1) Security division files contain information pertinent to matters of security, violations of security, personnel investigations pertinent to that agency, and correspondence files from 1950 to date. These files are checked on all former State Department employees.

(2) Passport division shall be checked if subject indicates U.S. citizenship due to birth in a foreign country of American parents. This is a check of State Department Embassy files to determine if subject's birth was registered at the U.S. Embassy in the country where he was born. Verification of this registration is verification of citizenship.

g. The files of CIA contain information on present and former employees, including members of the Office of Strategic Services (OSS), applicants for employment, foreign nationals, including immigrant aliens in the United States, and U.S. citizens traveling outside the United States after July 1, 1946. These files shall be checked under the following guidelines.

Table B-1. Criteria for Central Intelligence Agency checks
Investigation: NAC, DNACI, or ENTNAC
Criteria for CIA checks: Residence anywhere outside of the United States for a year or more since age 18 except under the auspices of the United States Government; and travel, education, residence, or employment since age 18 in any designated country ( app H ).
Investigation: BI
Criteria for CIA checks: Same as NAC, DNACI, and ENTNAC requirements plus travel, residence, employment, and education outside the United States for more than a continuous 3-month period during the past 5 years, or since age 18, except when under the auspices of the Government.
Investigation: SBI
Criteria for CIA checks: Same as BI requirements except the period of the investigation will cover the past 15 years, or since age 18. Also when subject's employment, education, or residence has occurred overseas for a period of more than 1 year under the auspices of the U.S. Government, such checks will be made.
These files shall also be checked if subject has been an employee of CIA or when other sources indicate that CIA may have pertinent information.

h. Military personnel record center files are maintained by separate departments of the Armed Forces, General Services Administration and the reserve records centers. They consist of the master personnel records of retired, separated, reserve, and active duty members of the Armed Force. These records shall be checked when the requester provides required identifying data indicating service during the last 15 years.

i. The files of Treasury Department agencies (Secret Service, Internal Revenue Service, and Bureau of Customs) will be checked only when available information indicates that an agency of the Treasury Department may be reasonably expected to have pertinent information.

j. The files of other agencies such as the National Guard Bureau, the DISCO, and so forth, will be checked when pertinent to the purpose for which the investigation is being conducted.

B-2. DOD National Agency Check and written inquiries

a. Scope. The time period covered by the DNACI is limited to the most recent 5 years, or since the 18th birthday, whichever is shorter, provided that the investigation covers at least the last 2 full years of the subject's life, although it may be extended to the period necessary to resolve any questionable or derogatory information. No investigation will be conducted prior to an individual' s 16th birthday. All DNACI investigation information will be entered on the DD Form 398-2 and FD-F orm 258 and forwarded to the Defense Investigative Service C-4 , app C ).

b. Components of a DOD National Agency Check and written inquiries.

(1) NAC. This is the same as described in paragraph B- 1, above.

(2) Credit.

(a) A credit bureau check will be conducted to cover the 50 States, the District of Columbia, Puerto Rico, Guam, and the Virgin Islands, at all locations where subject has resided (including duty stations and home ports), been employed, or attended school for 6 months (cumulative) during the past 5 years.

(b) When information developed reflects unfavorably upon a person's current credit reputation or financial responsibility, the investigation will be expanded as necessary.

(3) Employment.

(a) Non-Federal employment.

(1) Verify, via written inquiry, all employment within the period of investigation with a duration of 6 months or more. Current employment will be checked regardless of duration.

(2) If all previous employments have been less than 6 months long, the most recent employment, in addition to the current, will be checked in all cases.

(3) Seasonal holiday, part-time and temporary employment need not be checked unless subparagraph 2, above, applies.

(b) Federal employment. All Federal employment (to include military assignments) within the period of investigation will be verified by the requester through locally available records, and a statement reflecting that such checks have been favorably accomplished will be contained in the investigative request. Those that cannot be verified in this fashion will be accomplished via written inquiry by DIS (within the 50 United States, Puerto Rico, Guam, and the Virgin Islands).

B-3. Background investigation

The period of investigation for the BI is 5 years and applies to military, civilian, and contractor personnel.

a. National agency check. See paragraph B- 1, above.

b. Local agency checks. Same as paragraph B- 4 j , below, except period of coverage is 5 years.

c. Credit checks. Same as paragraph B- 4 i , below.

d. Subject interview. This is the principal component of a BI. In some instances an issue will arise after the primary SI and a secondary interview will be conducted. Interviews in the latter category are normally "issue" interviews that will be reported in the standard BI narrative format.

e. Employment records. Employment records will be checked at all places where employment references are interviewed with the exception of current Federal employment when the requester indicates that such employment has been verified with favorable results.

f. Employment reference coverage. A minimum of three references, either supervisors or coworkers , who have knowledge of the SUBJECT's activities in the work environment will be interviewed. At least one employment reference at the current place of employment will always be interviewed with the exception of an individual attending military basic training, or other military training schools lasting less than 90 days. However, if the SUBJECT has only been at the current employment for less than 6 months, it will be necessary to go not only to their current employment (for example, for one employment reference) but also to the preceding employment of at least 6 months for additional employment references. If the SUBJECT has not had prior employment of at least 6 months, interview(s) will be conducted at the most recent short-term employment in addition to the current employment.

g. Developed and listed character references. A minimum of three developed character references (DCRs) whose combined association with the subject covers the entire period of investigation will be interviewed. If coverage cannot be obtained through the DCRs, a listed character reference (LCR) will be contacted to obtain coverage.

h. Unfavorable information. Unfavorable information developed in the field will be expanded.

B-4. Special background investigation

a. Components of an special background investigation. The period of investigation for an SBI is the last 15 years or since the 18th birthday, whichever is the shorter period, provided that the investigation covers at least the last 2 full years of the subject's life. No investigation will be conducted for the period prior to an individual' s 16th birthday. Emphasis shall be placed on peer coverage whenever interviews are held with personal sources in making education, employment, and reference (including developed) contacts.

b. National agency check. In addition to conducting a NAC on the subject of the investigation, the following additional requirements apply:

(1) A DCII, FBI/ID name check only and FBI/HQ check shall be conducted on subject's current spouse or cohabitant. In addition, such other national agency checks as deemed appropriate based on information on the subject's statement of personal history or PSQ shall be conducted.

(2) A check of FBI/HQ files on members of subject's immediate family who are aliens in the United States or immigrant aliens who are 18 years of age or older shall be conducted. As used throughout the regulation, members of subject's immediate family include the following:

(a) Current spouse.

(b) Adult children, 18 years of age or older, by birth, adoption, or marriage.

(c) Natural, adopted, foster, or stepparents.

(d) Guardians.

(e) Brothers and sisters either by birth, adoption, or remarriage of either parent.

(3) The files of CIA shall be reviewed on alien members of subject's immediate family who are 18 years of age or older, regardless of whether or not these persons reside in the United States.

(4) The INS files on members of subject's immediate family 18 years of age or older shall be reviewed when they are:

(a) Aliens in the United States, or

(b) Naturalized U.S. citizens whose naturalization has not been verified in a prior investigation, or

(c) Immigrant aliens, or

(d) U.S. citizens born in a foreign country of American parent(s) or U.S. citizens who received derivative citizenship through the naturalization of one or both parents, provided that such citizenship has not been verified in a prior investigation.

c. Birth. Verify subject's date and place of birth (DPOB) through education, employment and/or other records. Verify through Bureau of Vital Statistics (BVS) records if not otherwise verified under paragraph d, below, or if a variance is developed.

d. Citizenship. Subject's citizenship status must be verified in all cases. U.S. citizens who are subjects of investigation will be required to produce documentation that will confirm their citizenship. Normally, such documentation should be presented to the DOD Component concerned prior to the initiation of the request for investigation. When such documentation is not readily available, investigative action may be initiated with the understanding that the designated authority in the DOD Component will be provided with the documentation prior to the issuance of a clearance. DIS will not check the BVS for native-born U.S. citizens except as indicated in paragraph c , above. In the case of foreign-born U.S. citizens, DIS will check INS records. The citizenship status of all foreign-born members of subject's immediate family shall be verified. Additionally, when the investigation indicates that a member of subject's immediate family has not obtained U.S. citizenship after having been eligible for a considerable period of time, an attempt should be made to determine the reason. The documents listed below are acceptable for proof of U.S. citizenship for personnel security determination purposes:

(1) A birth certificate must be presented if the individual was born in the United States. To be acceptable, the certificate must show that the birth record was filed shortly after birth and must be certified with the registrar's signature and the raised, impressed, or multicolored seal of their office except for States or jurisdictions which, as a matter of policy, do not issue certificates with a raised or impressed seal. Uncertified copies of birth certificates are not acceptable.

(a) A delayed birth certificate (a record filed more than 1 year after the date of birth) is acceptable provided that it shows that the report of birth was supported by acceptable secondary evidence of birth as described in paragraph (b), below.

(b) If such primary evidence is not obtainable, a notice from the registrar stating that no birth record exists should be submitted. The notice shall be accompanied by the best combination of secondary evidence obtainable. Such evidence may include a baptismal certificate, a certificate of circumcision, a hospital birth record, affidavits of persons having personal knowledge of the facts of the birth, or other documentary evidence such as early census, school, or family Bible records, newspaper files and insurance papers. Secondary evidence should have been created as close to the time of birth as possible.

(c) All documents submitted as evidence of birth in the United States shall be original or certified documents. Uncertified copies are not acceptable.

(2) A certificate of naturalization shall be submitted if the individual claims citizenship by naturalization.

(3) A certificate of citizenship issued by the INS shall be submitted if citizenship was acquired by birth abroad to a U.S. citizen parent or parents.

(4) A Report of Birth Abroad of A Citizen of The United States of America (Form FS-240), a Certification of Birth (Form FS-545 or DS-1350), or a Certificate of Citizenship is acceptable if citizenship was acquired by birth abroad to a U.S. citizen parent or parents.

(5) A passport or one in which the individual was included will be accepted as proof of citizenship.

e. Education.

(1) Verify graduation or attendance at institutions of higher learning in the United States within the last 15 years, if such attendance was not verified during a prior investigation.

(2) Attempts will be made to review records at overseas educational institutions when the subject resided overseas in excess of 1 year.

(3) Verify attendance or graduation at the last secondary school attended within the past 10 years if there was no attendance at an institution of higher learning within the period of investigation.

(4) Verification of attendance at military academies is only required when the subject failed to graduate.

f. Employment.

(1) Non-Federal employment. Verify all employment within the period of investigation to include seasonal, holiday, Christmas, part-time, and temporary employment. Interview one supervisor and one coworker at subject's current place of employment as well as at each prior place of employment during the past 10 years of 6 months or longer. The interview requirement for supervisors and coworkers does not apply to seasonal, holiday, Christmas, part-time, and temporary employment (4 months or less) unless there are unfavorable issues to resolve or the letter of inquiry provides insufficient information.

(2) Federal employment. All Federal employment will be verified within the period of investigation to include Christmas, seasonal temporary, summer hire, part-time, and holiday employment. Do not verify Federal employment through review of records if already verified by the requester. If Federal employment has not been verified by the requester, then subject's personnel file at their current place of employment will be reviewed. All previous Federal employment will be verified during this review. In the case of former Federal employees, records shall be examined at the Federal Records Center in St. Louis, Mo. Interview one supervisor and one coworker at all places of employment during the past 10 years if so employed for 6 months or more.

(3) Military employment. Military service for the last 15 years shall be verified. The subject's duty station, for the purpose of interview coverage, is considered as a place of employment. One supervisor and one coworker shall be interviewed at subject's current duty station if subject has been stationed there for 6 months or more; additionally, a supervisor and a coworker at subject's prior duty stations where assigned for 6 months or more during the past 10 years shall be interviewed.

(4) Unemployment. Subject's activities during all periods of unemployment in excess of 30 consecutive days, within the period of investigation, that are not otherwise accounted for shall be verified.

(5) When an individual has resided outside the United States continuously for over 1 year, attempts will be made to confirm overseas employments as well as conduct required interviews of a supervisor and coworker.

g. References. Three developed character references who have sufficient knowledge of subject to comment on their background, suitability, and loyalty shall be interviewed personally. Efforts shall be made to interview developed references whose combined association with subject covers the full period of the investigation with particular emphasis on the last 5 years. Employment, education, and neighborhood references, in addition to the required ones, may be used as developed references provided that they have personal knowledge concerning the individual's character, discretion, and loyalty. Listed character references will be interviewed only when developed references are not available or when it is necessary to identify and locate additional developed character references or when it is necessary to verify subject's activities (e.g., unemployment).

h. Neighborhood investigation. Conduct a neighborhood investigation to verify each of subject's residences in the United States of a period of 6 months or more on a cumulative basis, during the past 5 years or during the period of investigation, whichever is shorter. During each neighborhood investigation, interview two neighbors who can verify subject's period of residence in that area and who were sufficiently acquainted to comment on subject's suitability for a position of trust. Neighborhood investigations will be expanded beyond this 5-year period only when there is unfavorable information to resolve in the investigation.

i. Credit. Conduct credit bureau check in the 50 States, the District of Columbia, Puerto Rico, and overseas (where APO/FPO addresses are provided) at all places where subject has resided (including duty stations and home ports), been employed, or attended school for 6 months or more, on a cumulative basis, during the last 7 years or during the period of the investigation, whichever is shorter. When coverage by a credit bureau is not available, credit references located in that area will be interviewed. Financial responsibility, including unexplained affluence, will be stressed in all reference interviews.

j. Local agency checks. LACs, including State central criminal history record repositories, will be conducted on subject at all places of residence to include duty stations and/or home ports, in the 50 States, the District of Columbia, and Puerto Rico, where residence occurred during the past 15 years or during the period of investigation, whichever is shorter. If subject's place of employment and/or education is serviced by a different law enforcement agency than that servicing the area of residence, LACs shall be conducted also in these areas.

k. Foreign travel. If subject has been employed or educated or has traveled or resided outside of the United States for more than 90 days during the period of investigation, except under the auspices of the U.S. Government, additional record checks during the NAC shall be made in accordance with paragraph B- 1 f of this appendix. In addition, the following requirements apply:

(1) Foreign travel not under the auspices of the U.S. Government. When employment, education, or residence has occurred overseas for more than 90 days during the past 15 years or since age 18, which was not under the auspices of the U.S. Government, a check of records will be made at the Passport Office of the Department of State, the CIA, and other appropriate agencies. Efforts shall be made to develop sources, generally in the United States, who knew the individual overseas to cover significant employment, education, or residence and to determine whether any lasting foreign contacts or connections were established during this period. If the individual has worked or lived outside of the United States continuously for over 1 year, the investigation will be expanded to cover fully this period through the use of such investigative assets and checks of record sources as may be available to the U.S. Government in the foreign country in which the individual resided.

(2) Foreign travel under the auspices of the U.S. Government. When employment, education, or residence has occurred overseas for a period of more than 1 year, under the auspices of the U.S. Government, a record check will be made at the Passport Office of the Department of State, the CIA, and other appropriate agencies. Efforts shall be made to develop sources (generally in the United States) who knew the individual overseas to cover significant employment, education, or residence and to determine whether any lasting foreign contacts or connections were established during this period. Additionally, the investigation will be expanded to cover fully this period through the use of such investigative assets and checks of record sources as may be available to the United States Government in the foreign country in which the individual resided.

l. Foreign connections. All foreign connections (friends, relatives, and/or business connections) of subject and immediate family in the United States or abroad, except where such association was the direct result of subject's official duties with the U.S. Government, shall be ascertained. Investigation shall be directed toward determining the significance of foreign connections on the part of subject and the immediate family, particularly where the association is or has been with persons whose origin was within a country whose national interests are inimical to those of the United States. When subject or their spouse have close relatives residing in a Communist-controlled country, or subject has resided, visited, or traveled in such a country, not under U.S. Government auspices, the provisions of paragraph 2-308 c of this regulation apply.

m. Organizations. Efforts will be made during reference interviews and record reviews to determine if subject and/or the immediate family has, or formerly had, membership in, affiliation with, sympathetic association towards, or participated in any foreign or domestic organization, association, movement, group, or combination of persons of the type described in paragraphs 2-4 a through d of this regulation.

n. Divorce. Divorces, annulments, and legal separations of subject shall be verified only when there is reason to believe that the grounds for the action could reflect on subject's suitability for a position of trust.

o. Military service. All military service and types of discharge during the last 15 years shall be verified.

p. Medical records. Medical records shall not be reviewed unless:

(1) The requester indicates that subject's medical records were unavailable for review prior to submitting the request for investigation, or

(2) The requester indicates that unfavorable information is contained in subject's medical records, or

(3) The subject lists one or more of the following on the statement of personal history or PSQ:

(a) A history of mental or nervous disorders.

(b) That subject is now or has been addicted to the use of habit-forming drugs such as narcotics or barbiturates or is now or has been a chronic user to excess of alcoholic beverages.

q. Updating a previous investigation to SBI standards. If a previous investigation does not substantially meet the minimum standards of an SBI or if it is more than 5 years old, a current investigation is required but may be limited to that necessary to bring the individual's file up to date in accordance with the investigative requirements of an SBI. Should new information be developed during the current investigation that bears unfavorably upon the individual's activities covered by the previous investigation, the current inquiries shall be expanded as necessary to develop full details of this new information.

B-5. Periodic reinvestigation

a. Each DOD military, civilian, consultant, and contractor employee (to include foreign nationals holding a limited access authorization) occupying a critical-sensitive position, possessing a TOP SECRET clearance, or occupying a special access program position or whose MOS requires access to TOP SECRET and/or SCI , shall be the subject of a PR initiated not later than 5 years from the date of completion of the last investigation. The PR shall cover the period of the last 5 years.

(1) If there has been a break in the individual's military service, DA civilian employment, or contractor employment (for contractor employees who require access to SCI) of more than 12 months, a PR is not acceptable. A BI or SBI, as appropriate, is required.

(2) If the previous investigation (BI, SBI, or PR) is more than 6 years old, a PR is not acceptable. A BI or SBI, as appropriate, is required to cover the period since the last investigation.

b. Minimum investigative requirements. A PR shall include the following minimum scope.

(1) National agency check. A valid NAC on the subject will be conducted in all cases. Additionally, for positions requiring SCI access, checks of DCII, FBI/HQ, FBI/ID name check only, and other agencies deemed appropriate will be conducted on the subject's current spouse or cohabitant, if not previously conducted. Additionally, NACs will be conducted on immediate family members, 18 years of age or older, who are aliens and/or immigrant aliens, if not previously accomplished.

(2) Credit. Credit bureau checks covering all places where the subject resided for 6 months or more, on a cumulative basis, during the period of investigation, in the 50 States, District of Columbia, Puerto Rico, and overseas (where APO/FPO addresses are provided) will be conducted.

(3) Subject interview. The interview should cover the entire period of time since the last investigation, not just the last 5-year period. Significant information disclosed during the interview, which has been satisfactorily covered during a previous investigation, need not be explored again unless additional relevant information warrants further coverage. An SI is not required if one of the following conditions exist:

(a) The subject is aboard a deployed ship or in some remote area that would cause the interview to be excessively delayed.

(b) The subject is in an overseas location serviced by the State Department or the FBI.

(4) Employment. Current employment will be verified. Military and Federal service records will not routinely be checked, if previously checked by the requester when PR was originally submitted. Also, employment records will be checked wherever employment interviews are conducted. Records need be checked only when they are locally available, unless unfavorable information has been detected.

(5) Employment references. Two supervisors or coworkers at the most recent place of employment or duty station of 6 months will be interviewed ; if the current employment is less than 6 months, employment reference interviews will be conducted at the next prior place of employment of at least a 6-month duration.

(6) Developed character references. Two developed character references who are knowledgeable of the subject will be interviewed. The developed character references who were previously interviewed will only be reinterviewed when other developed references are not available.

(7) Local agency checks. The DIS will conduct local agency checks on the subject at all places of residence, employment, and education during the period of investigation, regardless of duration, including overseas locations.

(8) Select scoping. When the facts of the case warrant, additional select scoping will be accomplished, as necessary, to fully develop or resolve an issue.

Appendix C
Request Procedures

C-1. General

To conserve investigative resources and to ensure that PSIs are limited to those essential to current operations and are clearly authorized by DOD policies, organizations requesting investigations must ensure that continuing command attention is given to the investigative request process.
In this connection, it is particularly important that the provision of EO 12356 requiring strict limitations on the dissemination of official information and material be closely adhered to and that investigations requested for issuing clearances are limited to those instances in which an individual has a clear need for access to classified information. Similarly, investigations required to determine eligibility for appointment or retention in DOD, in either a civilian or military capacity, must not be requested in frequency or scope exceeding that provided for in this regulation.
In view of the foregoing, the following guidelines have been developed to simplify and facilitate the investigative request process:

a. Limit requests for investigation to those that are essential to current operations and clearly authorized by DOD policies and attempt to utilize individuals who, under the provisions of this regulation, have already met the security standard;

b. Ensure that military personnel on whom investigative requests are initiated will have sufficient time remaining in service after completion of the investigation to warrant conducting it;

c. Ensure that request forms and prescribed documentation are properly executed in accordance with instructions;

d. Dispatch the request directly to the DIS Personnel Investigations Center;

e. Promptly notify the DIS Personnel Investigations Center through CCF (PCCF-M) if the investigation is no longer needed (notify OPM if a NACI is no longer needed; and

f. Limit access through strict need to know, thereby requiring fewer investigations.
In summary, close observance of the above-cited guidelines will allow the DIS to operate more efficiently and permit more effective, timely, and responsive service in accomplishing investigations.

C-2. National agency check

When a NAC is requested, an original only of the DD Form 398-2 (National Agency Check Request) and a completed FD 258 (Applicant Fingerprint Card) are required. If the request is for an ENTNAC, an original only of the DD Form 398-2 and a completed DD Form 2280 (Armed Forces Fingerprint Card) are required. Those forms should be sent directly to: Personnel Investigation Center, Defense Investigative Service, P.O. Box 1083, Baltimore, MD 21203.

C-3. National agency check and written inquiries

When a NACI is requested, an original and one copy of the SF 86 (Questionnaire for Sensitive Positions), an Of 612 (Optional Application for Federal Employment), and an SF 87 (U.S. Civil Service Commission Fingerprint Chart) shall be sent directly to: Office of Personnel Management, Bureau of Personnel Investigations, NACI Center, Boyers, PA 16018. The notation "ALL REFERENCES" shall be stamped immediately above the title at the top of the Standard Form 85.

C-4. DOD National Agency Check and written inquiries

a. When a DNACI is requested, one copy of DD Form 1879 , an original and two copies of the DD Form 398-2 (National Agency Check Request), two copies of FD 258 (Fingerprint Card), and an original of DD Form 2221 (Authority for Release of Information and Records) shall be sent directly to: Personnel Investigations Center, Defense Investigative Service, P.O. Box 1083, Baltimore, MD 21203.

b. The DD Form 398-2 must be completed to cover the most recent 5-year period. All information, to include items relative to residences and employment, must be complete and accurate to avoid delays in processing.

C-5. Special background investigation/background investigation

a. When requesting a BI or SBI, one copy of DD Form 1879 (Request for Personnel Security Investigation), an original and four copies of DD Form 398 (Statement of Personnel History), two copies of FD 258, and an original of DD Form 2221 (Authority for Release of Information and Records) shall be sent directly to: Personnel Investigations Center, Defense Investigative Service, P.O. Box 454, Baltimore, MD 21203.

b. For the BI and SBI, the DD Form 398 must be completed to cover the most recent 5- and 15-year period, respectively, or since the 18th birthday, whichever is shorter.

c. When requesting an SBI, DD Form 398-2 must be submitted for the spouse or cohabitant. A DD Form 398-2 must also be submitted for immediate family members over 18 years of age who are not U.S. citizens.

C-6. Periodic reinvestigation

a. The PRs shall be requested only in such cases as are authorized by paragraph 2-12 of this regulation.

(1) For a PR requested in accordance with paragraph 2-12, the DD Form 1879 must be accompanied by the following documents:

(a) Original and four copies of DD Form 398 .

(b) Two copies of FD-258.

(c) Original copy of DD Form 2221 .

(2) In processing PRs, previous investigative reports will not be requested by the requesting organization, unless significant derogatory or adverse information, postdating the most recent favorable adjudication, is developed during the course of reviewing other locally available records. In the latter instance, requests for previous investigative reports may only be made if it is determined by the requesting organization that the derogatory information is so significant that a review of previous investigative reports is necessary for current adjudicative determinations.

b. No abbreviated version of DD Form 398 may be submitted in connection with a PR.

c. The DD Form 398 completed for a BI PR will cover the most recent 5-year period and for an SBI PR it will be completed to cover the period from the date of the most recent SBI or SBI PR to present date.

d. The PR request shall be sent to the address in paragraph C- 5 a , above.

C-7. Additional investigation to resolve derogatory or adverse information

a. Requests for additional investigation required to resolve derogatory or adverse information shall be submitted by DD Form 1879 (Request for Personnel Security Investigation) to: Defense Investigative Service, P.O. Box 454, Baltimore, MD 21203. Such requests shall set forth the basis for the additional investigation and describe the specific matter to be substantiated or disproved.

b. The request should be accompanied by an original and four copies of the DD Form 398 , when appropriate, two copies of FD-258 and an original copy of DD Form 2221 , unless such documentation was submitted within the last 12 months to DIS as part of a NAC or other PSI. If pertinent, the results of a recently completed NAC, NACI, or other related investigative reports available should also accompany the request.

C-8. Obtaining results of prior investigations

Requesters requiring verification of a specified type of PSI, and/or requiring copies of prior investigations conducted by the DIS shall submit requests by letter or message to: Defense Investigative Service Investigative Files Division, P.O. Box 1211, Baltimore, MD 21203. Message address: DIS personnel investigation center (PIC) Baltimore, MD/ /D0640. The request will include subject's name, grade, SSN, date and place of birth, and DIS case control number if known.

C-9. Requesting postadjudication cases

a. Requests pertaining to issues arising after adjudication of an investigation (post-adjudication cases) shall be addressed to DIS on a DD Form 1879 accompanied by a DD Form 398 , when appropriate.

b. All requests for initial investigations will be submitted to PIC regardless of their urgency. If, however, there is an urgent need for a postadjudication investigation, or the mailing of a request to PIC for initiation of a postadjudication case would prejudice timely pursuit of investigative action, the DD Form 1879 may be directed for initiation, in CONUS, to the nearest DIS field office, and in overseas locations, to the military investigative service element supporting the requester ( app J ). The field element (either DIS or the military investigative agency) will subsequently forward either the DD Form 1879 or completed investigation to PIC.

c. A fully executed DD Form 1879 and appropriate supporting documents may not be immediately available. Further, a case that is based on sensitive security issues may be compromised by a request that the subject submit a DD Form 398. A brief explanation should appear on the DD Form 1879 which does not include complete supporting documentation.

C-10. Requests involving contractor employees

To preclude duplicative investigative requests and double handling of contractor employee cases involving access to classified information, all requests for investigation of contractor personnel must be submitted, using authorized industrial security clearance forms, for processing through the Defense Industrial Security Clearance Office, except for programs in which specific approval has been obtained from the Deputy Under Secretary of Defense for Policy to utilize other procedures.

C-11. Responsibility for proper documentation of requests

The official signing the request for investigation shall be responsible for ensuring that all documentation is completed in accordance with these instructions.

C-12. Requests involving Red Cross and United Services Organization employees

a. The Red Cross and USO will prepare the request for NAC on prospective employees. DD Form 398-2 and FD Form 258 will be forwarded to the Defense Industrial Security Clearance Office (DISCO) for processing.

b. The DISCO will make a determination as to the acceptability of the prospective employee. If the determination is favorable, the Red Cross or USO will be notified. All unfavorable determinations will be forwarded to the Director for Industrial Security Clearance Review Office of the Defense General Counsel for action. The applicant, Red Cross or USO, and the host commander will be advised of the final determination.

c. If derogatory information is received on a Red Cross or USO employee, the host command or Red Cross or USO will forward the information for review to: Defense Industrial Security Clearance Office (DISCO-A), P.O. Box 2499, Columbus, OH 43216-5006.

d. The DISCO will initiate any investigation necessary to resolve derogatory information.

e. If a Red Cross or USO employee requires a security clearance, the host commander will forward the request together with a copy of the DISCO acceptability determination to the CDR, CCF, for action. All security clearances will be granted by the CDR, CCF, for Red Cross and/or USO employees on Army installations.

Appendix D
Tables for requesting investigations

.

See table D-1 for a guide on requesting background investigations.

Table D-1. Guide for requesting background investigations
A B C
If the individual is a and duties require then a BI is required before
U.S. national military member, civilian, consultant, or contractor employee TOP SECRET clearance granting final clearance
U.S. national civilian employee assignment to a "critical-sensitive" position assignment to the position
U.S. national military member, civilian, or contractor employee occupying a "critical" position in the Nuclear Weapon PRP occupying a "critical" DOD position
U.S. national military member or civilian employee granting or denying clearances performing clearance functions
U.S. national military member or civilian employee membership on security screening, hearing, or review board appointment to the board
immigrant alien limited access to SECRET or CONFIDENTIAL information issuing limited access authorization (see note)
non-U.S. national employee, excluding immigrant alien, limited access to SECRET or CONFIDENTIAL information issuing limited access authorization
non-U.S. national nominee for military education and orientation program (from a country listed at app H ) education and orientation of military personnel performing duties
U.S. national military member or DOD civilian or contractor employee assignment to a category two Presidential support position assignment
U.S. national military member or DOD civilian or contractor employee assigned to NATO access to NATO COSMIC information access may be granted

Notes:
. BI will cover a 10-year scope.


Table D-2. Guide for requesting special background investigations
A B C
then a SBI is required
If the individual is a and duties require before
U.S. national military member or DOD civilian, consultant, or contractor employee access to SCI granting access
assignment to a category one Presidential support position assignment
access to SIOP-ESI granting access
assignment to the National Security Agency assignment
access to other special access programs approved under paragraph 3-37 granting access
assignment to personnel security, counterintelligence, or criminal investigative or direct investigative support duties assignment


Table D-3. Guide for requesting periodic reinvestigations
A B C
If the individual is a and duties require then a PR is required
U.S. national military member or DOD civilian, consultant, or contractor employee access to SCI 5 years from date of last SBI/BI or SBI PR
TOP SECRET clearance 5 years from date of last SBI/BI or PR
access to NATO COSMIC 5 years from date of last SBI/BI or PR
assignment to Presidential support activities 5 years from date of last SBI/BI or PR
U.S. national civilian employee assignment to a "critical-sensitive" position 5 years from last SBI/BI or PR
non-U.S. national employee current limited access authorization to SECRET or CONFIDENTIAL information 5 years from last SBI/BI or PR
U.S. national military member assignment to duties defined in paragraph 3-59 or requiring TS or SCI eligibility in accordance with DA Pam 611-21 . 5 years from last SBI/BI or PR


Table D-4. Guide for requesting DOD National Agency Check with written inquiries or national agency check and inquiries
A B C
If the individual is a and duties require then a DNACI/NACI is required
U.S. national military member or contractor employee SECRET clearance before granting clearance (see note 1)
Interim SECRET clearance automatically (see note 2)
U.S. national civilian employee or consultant SECRET clearance before granting clearance
Interim SECRET clearance automatically (see note 3)
Appointment to "noncritical-sensitive" position before appointment
U.S. national military member or DOD civilian or contractor employee occupying a "controlled" position in the Nuclear Weapon PRR before assignment
applicant for appointment as a commisioned officer commission in the Armed Forces before appointment (after appointment for health professionals, chaplains, and attorneys, under conditions authorized by para 3-15 of this regulation)
Naval Academy Midshipman, Military Academy Cadet, or Air Force Academy Cadet enrollment to be initiated 90 days after entry
Reserve Officer Training Corps (ROTC) Cadet or Midshipman entry to advanced course or college scholarship program to be initiated 90 days after entry

Notes:
1. First-term enlistees shall require an ENTNAC.
2. Provided DD Form 398-2 is favorably reviewed, local records check favorably accomplished, and DNACI initiated.
3. Provided an authority designated in appendix F finds delay in such appointment would be harmful to national security; favorably review of DD Form 389-2 ; NACI initiated; and favorable local records check accomplished.


Table D-5. Guide for requesting National Agency Checks
A B C
If the individual is a and duties require then a NAC is required
first-term enlistee retention in the Armed Forces (including National Guard and Reserve) to be initiated NLT 3 work days after entry (see note 1)
prior service member reentering military service after break in Federal employment exceeding 1 year retention in the Armed Forces (including National Guard and Reserve) to be initiated NLT 3 work days after reentry
nominee for military education and orientation program education and orientation of military personnel before performing duties (see note 2)
U.S. national military or DOD civilian or contractor employee access to restricted areas, sensitive information, or equipment as defined in paragraph 3-39 before authorizing entry
nonappropriated fund instrumentality (NAFI) civilian employee appointment as NAFI custodian before appointment
accountability for nonappropriated funds before completion of probationary period
fiscal responsibility as determined by NAFI custodian before completion of probationary period
other "positions of trust" before appointment
Persons requiring access to chemical agents access to or security of chemical agents before assignment
U.S. national, civilian employee nominee for customs inspection duties waiver under provisions of paragraph 3-41 before appointment (see note 3)
Red Cross/USO personnel assignment with the Armed Forces overseas before assignment (see note 4 for foreign national personnel)
U.S. national a DOD building pass prior to issuance
Foreign national employed overseas no access to classified information prior to employment (see note 4)

Notes:
1. Request ENTNAC only.
2. Except when personnel whose country of origin is listed at appendix H , a BI will be required (see para 3-50 ).
3. A NAC not over 5 years old suffices unless there has been a break in employment over 12 months. Then a current NAC is required.
4. In such cases, the NAC shall consist of: (a) host government law enforcement and security agency record checks at the city, State (Province), and national level, and (b) DCII.

.

Appendix E
Reporting of Nonderogatory Cases

Rescinded.

.

.

Appendix F
Personnel Security Determination Authorities

F-1. Officials authorized to grant, deny, or revoke personnel security clearances (TOP SECRET, SECRET, and CONFIDENTIAL):

a. Secretary of Defense and/or designee.

b. Secretary of the Army and/or designee.

c. Secretary of the Navy and/or designee.

d. Secretary of the Air Force and/or designee.

e. Chairman, Joint Chiefs of Staff, and/or designee.

f. Directors of the Defense Agencies and/or designee.

g. Commanders of the Unified and Specified Commands and/or designee.

h. DCS, G-2 and/or designee.

i. Commander, CCF, and/or designee.

F-2. Officials authorized to grant limited access authorizations:

a. Secretaries of the Military Departments and/or designees.

b. Director, Washington Headquarters Services, for OSD and/or designee.

c. Chairman, JCS, and/or designee.

d. Directors of the Defense Agencies and/or designees.

e. Commanders, Unified and Specified Commands, and/or designees.

f. Heads of HQDA Staff agencies.

g. Commanders of MACOMs.

h. Commander, CCF.

F-3. Officials authorized to grant access to sensitive compartmented investigation

a. Director, NSA for NSA.

b. Director, DIA for OSD, OJCS, and Defense Agencies.

c. Senior Officers of the Intelligence Community of the Army (DCS, G-2), Navy, and Air Force for their respective Military Departments, or their single designee.

d. Commander, CCF.

F-4. Officials authorized to certify personnel under their jurisdiction for access to restricted data (to include critical nuclear weapon design information)

See enclosure to DODD 5210.2 ( AR 380-5 ) .

F-5. Officials authorized to approve personnel for assignment to Presidential support activities

a. The Executive Secretary to the Secretary.

b. Deputy Secretary of Defense or designee.

F-6. Officials authorized to grant access to SIOP-ESI

a. Director of Strategic Target Planning.

b. Director, Joint Staff, OJCS.

c. Chief of Staff, U.S. Army.

d. Chief of Naval Operations.

e. Chief of Staff, U.S. Air Force.

f. Commandant of the Marine Corps.

g. Commanders of Unified and Specified Commands.

h. The authority to grant access delegated above may be further delegated in writing by the above officials to the appropriate subordinates.

F-7. Officials authorized to designate sensitive positions

a. Heads of DOD Components or their designees for critical-sensitive positions.

(1) Under Secretary of the Army.

(2) Assistant secretaries of the Army.

(3) Deputy assistant secretaries of the Army.

(4) Chief of Staff.

(5) Heads of HQDA Staff agencies.

(6) Commanders of MACOMs. Note: These officials may redelegate this authority to subordinate commanders as deemed necessary.

b. Organizational commanders for noncritical-sensitive positions.

F-8. Nonappropriated Fund positions of trust

Officials authorized to designate Nonappropriated Fund positions of trust: Heads of DOD Components and/or their designees.

a. Under Secretary of the Army.

b. Assistant secretaries of the Army.

c. Deputy assistant secretaries of the Army.

d. Chief of Staff.

e. Heads of HQDA Staff agencies.

f. Commanders of MACOMs.

g. Organizational commanders.

Appendix G
Guidelines for Conducting Prenomination Personal Interviews

Deleted.

.

.

Appendix H
List of Designated Countries

Deleted.

.

.

Appendix I
Adjudicative Guidelines for Determining Eligibility for Access to Collateral Classified Information and Sensitive Compartmented Information and Controlled Access Program Information

I-1. Introduction

a. The following adjudicative guidelines are established for all U.S. Government civilian and military personnel, consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified information. They apply to persons being considered for initial or continued eligibility for access to classified information, to include sensitive compartmented information and special access programs, and are to be used by Government departments and agencies in all final clearance determinations. Government departments and agencies may also choose to apply these guidelines to analogous situations regarding persons being considered for access to other types of protected information.

b. Decisions regarding eligibility for access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her commitment to the United States, including the commitment to protect classified information, and any other compelling loyalty. Access decisions also take into account a person's reliability, trustworthiness, and ability to protect classified information. No coercive policing could replace the self-discipline and integrity of the person entrusted with the nation's SECRETs as the most effective means of protecting them. When a person's life history shows evidence of unreliability or untrustworthiness, questions arise whether the person can be relied on and trusted to exercise the responsibility necessary for working in a secure environment where protecting classified information is paramount.

I-2. Adjudicative Process

a. The adjudicative process is an examination of a sufficient period of a person's life to make an affirmative determination that the person is an acceptable security risk. Eligibility for access to classified information is predicated upon the individual meeting these personnel security guidelines. The adjudication process is the careful weighing of a number of variables known as the whole-person concept. Available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination. In evaluating the relevance of an individual's conduct, the adjudicator should consider the following factors:

(1) The nature, extent, and seriousness of the conduct.

(2) The circumstances surrounding the conduct, to include knowledgeable participation.

(3) The frequency and recency of the conduct.

(4) The individual's age and maturity at the time of the conduct.

(5) The extent to which participation is voluntary.

(6) The presence or absence of rehabilitation and other permanent behavioral changes.

(7) The motivation for the conduct.

(8) The potential for pressure, coercion, exploitation, or duress.

(9) The likelihood of continuation or remain.

b. Final determinations for Army personnel remains the responsibility of the CCF or Army PSAB, as appropriate. The Command may provide supporting documentation for CCF or Army PSAB consideration. Any doubt concerning personnel being considered for access to classified information will be resolved in favor of national security.

c. The ability to develop specific thresholds for action under these guidelines is limited by the nature and complexity of human behavior. The ultimate determination of whether the granting or continuing of eligibility for security clearance eligibility is clearly consistent with the interests of national security must be an overall common sense judgment based upon careful consideration of the following guidelines, each of which is to be evaluated in the context of the whole person.

(1) Guideline A: Allegiance to the United States.

(2) Guideline B: Foreign Influence.

(3) Guideline C: Foreign Preference.

(4) Guideline D: Sexual Behavior.

(5) Guideline E: Personal Conduct.

(6) Guideline F: Financial Considerations.

(7) Guideline G: Alcohol Consumption.

(8) Guideline H: Drug Involvement.

(9) Guideline I: Psychological Conditions.

(10) Guideline J: Criminal Conduct.

(11) Guideline K: Handling Protected Information.

(12) Guideline L: Outside Activities.

(13) Guideline M: Use of Information Technology Systems.

d. Although adverse information concerning a single criterion may not be sufficient for an unfavorable determination, the individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility, or emotionally unstable behavior. Notwithstanding the whole-person concept, pursuit of further investigation may be terminated by an appropriate adjudicative agency in the face of reliable, significant, disqualifying, adverse information.

e. When information of security concern becomes known about an individual who is currently eligible for access to classified information, the adjudicator should consider whether the person:

(1) Voluntarily reported the information.

(2) Was truthful and complete in responding to questions.

(3) Sought assistance and followed professional guidance, where appropriate.

(4) Resolved or appears likely to favorably resolve the security concern.

(5) Has demonstrated positive changes in behavior and employment.

(6) Should have his or her access temporarily suspended pending final adjudication of the information.

f. If after evaluating information of security concern, the adjudicator decides that the information is not serious enough to warrant a recommendation of disapproval or revocation of the security clearance eligibility, it may be appropriate to recommend approval with a warning that future incidents of a similar nature may result in revocation of access.

I-3. Guideline A: Allegiance to the United States

a. The concern. An individual must be of unquestioned allegiance to the United States. The willingness to safeguard classified information is in doubt if there is any reason to suspect an individual's allegiance to the United States.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Involvement in, support of, training to commit, or advocacy of any act of sabotage, espionage, treason, terrorism, or sedition against the United States of America.

(2) Association or sympathy with persons who are attempting to commit, or who are committing, any of the above acts;

(3) Association or sympathy with persons or organizations that advocate, threaten, or use force or violence, or use any other illegal or unconstitutional means, in an effort to:

(a) Overthrow or influence the Government or any State or local government.

(b) Prevent Federal, State, or local government personnel from performing their official duties.

(c) Gain retribution for perceived wrongs caused by the Federal, State, or local government.

(d) Prevent others from exercising their rights under the Constitution or laws of the United States or of any State.

c. Conditions that could mitigate security concerns include:

(1) The individual was unaware of the unlawful aims of the individual or organization and severed ties upon learning of these.

(2) The individual's involvement was only with the lawful or humanitarian aspects of such an organization.

(3) Involvement in the above activities occurred for only a short period of time and was attributable to curiosity or academic interest.

(4) The involvement or association with such activities occurred under such unusual circumstances, or so much times has elapsed, that it is unlikely to recur and does not cast doubt on the individual's current reliability, trustworthiness, or loyalty.

I-4. Guideline B: Foreign Influence

a. Concern. Foreign contacts and interests may be a security concern if the individual has divided loyalties or foreign financial interests, may be manipulated or induced to help a foreign person, group, organization, or government in a way that is not in U.S. interests, or is vulnerable to pressure or coercion by any foreign interest. Adjudication under this guideline can and should consider the identity of the foreign country in which the foreign contact or financial interest is located, including, but not limited to, such considerations as whether the foreign country is known to target United States citizens to obtain protected information and/or is associated with a risk of terrorism.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Contact with a foreign family member, business or professional associate, friend, or other person who is a citizen of or resident in a foreign country if that contact creates a heightened risk of foreign exploitation, inducement, manipulation, pressure, or coercion;

(2) Connections to a foreign person, group, government, or country that create a potential conflict of interest between the individual's obligation to protect sensitive information or technology and the individual's desire to help a foreign person, group, or country by providing that information;

(3) Counterintelligence information, that may be classified, indicates that the individual's access to protected information may involve unacceptable risk to national security;

(4) Sharing living quarters with a person or persons, regardless of citizenship status, if that relationship creates a heightened risk of foreign inducement, manipulation, pressure, or coercion;

(5) A substantial business, financial, or property interest in a foreign country, or in any foreign-owned or foreign-operated business, which could subject the individual to heightened risk of foreign influence or exploitation;

(6) Failure to report, when required, association with a foreign national;

(7) Unauthorized association with a suspected or known agent, associate, or employee of a foreign intelligence service;

(8) Indications that representatives or nationals from a foreign country are acting to increase the vulnerability of the individual to possible future exploitation, inducement, manipulation, pressure, or coercion;

(9) Conduct, especially while traveling outside the United States, which may make the individual vulnerable to exploitation, pressure, or coercion by a foreign person, group, government, or country.

c. Conditions that could mitigate security concerns include:

(1) The nature of the relationships with foreign persons, the country in which these persons are located, or the positions or activities of those persons in that country are such that it is unlikely the individual will be placed in a position of having to choose between the interests of a foreign individual, group, organization, or government and the interests of the United States.

(2) There is no conflict of interest, either because the individual's sense of loyalty or obligation to the foreign person, group, government, or country is so minimal, or the individual has such deep and longstanding relationships and loyalties in the United States, that the individual can be expected to resolve any conflict of interest in favor of the U.S. interest.

(3) Contact or communication with foreign citizens is so casual and infrequent that there is little likelihood that it could create a risk for foreign influence or exploitation.

(4) The foreign contacts and activities are on U.S. Government business or are approved by the cognizant security authority.

(5) The individual has promptly complied with existing agency requirements regarding the reporting of contacts, requests, or threats from persons, groups, or organizations from a foreign country.

(6) The value or routine nature of the foreign business, financial, or property interests is such that it is unlikely to result in a conflict and could not be used effectively to influence, manipulate, or pressure the individual.

I-5. Guideline C: Foreign Preference

a. Concern. When an individual acts in such a way as to indicate a preference for a foreign country over the United States, then he or she may be prone to provide information or make decisions that are harmful to the interests of the United States.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Exercise of any right, privilege, or obligation of foreign citizenship after becoming a U.S. citizen or through the foreign citizenship of a family member. This includes but is not limited to:

(a) Possession of a current foreign passport.

(b) Military service or a willingness to bear arms for a foreign country.

(c) Accepting educational, medical, retirement, social welfare, or other such benefits from a foreign country.

(d) Residence in a foreign country to meet citizenship requirements.

(e) Using foreign citizenship to protect financial or business interests in another country.

(f) Seeking or holding political office in a foreign country.

(g) Voting in a foreign election.

(2) Action to acquire or obtain recognition of a foreign citizenship by an American citizen;

(3) Performing or attempting to perform duties, or otherwise acting, so as to serve the interests of a foreign person, group, organization, or government in conflict with the national security interest;

(4) Any statement or action that shows allegiance to a country other than the United States: for example, declaration of intent to renounce U.S. citizenship; renunciation of U.S. citizenship.

c. Conditions that could mitigate security concerns include:

(1) Dual citizenship is based solely on parents' citizenship or birth in a foreign country.

(2) The individual has expressed a willingness to renounce dual citizenship.

(3) Exercise of the rights, privileges, or obligations of foreign citizenship occurred before the individual became a U.S. citizen or when the individual was a minor.

(4) Use of a foreign passport is approved by the cognizant security authority.

(5) The passport has been destroyed, surrendered to the cognizant security authority, or otherwise invalidated.

(6) The vote in a foreign election was encouraged by the U.S. Government.

I-6. Guideline D: Sexual Behavior

a. The concern. Sexual behavior that involves a criminal offense, indicates a personality or emotional disorder, reflects lack of judgment or discretion, or which may subject the individual to undue influence or coercion, exploitation, or duress can raise questions about an individual's reliability, trustworthiness, and ability to protect classified information. No adverse inference concerning the standards in the Guideline may be raised solely on the basis of the sexual orientation of the individual.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Sexual behavior of a criminal nature, whether or not the individual has been prosecuted.

(2) A pattern of compulsive, self-destructive, or high-risk sexual behavior that the person is unable to stop or that may be symptomatic of a personality disorder.

(3) Sexual behavior that causes an individual to be vulnerable to coercion, exploitation, or duress.

(4) Sexual behavior of a public nature and/or that which reflects lack of discretion or judgment.

c. Conditions that could mitigate security concerns include:

(1) The behavior occurred prior to or during adolescence and there is no evidence of subsequent conduct of a similar nature.

(2) The sexual behavior happened so long ago, so infrequently, or under such unusual circumstances, that it is unlikely to recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment.

(3) The behavior no longer serves as a basis for coercion, exploitation, or duress.

(4) The sexual behavior is strictly private, consensual, and discreet.

I-7. Guideline E: Personal Conduct

a. The concern. Conduct involving questionable judgment, lack of candor, dishonesty, or unwillingness to comply with rules and regulations can raise questions about an individual's reliability, trustworthiness, and ability to protect classified information. Of special interest is any failure to provide truthful and candid answers during the security clearance eligibility process or any other failure to cooperate with the security clearance eligibility process. The following will normally result in an unfavorable clearance action or administrative termination of further processing for clearance eligibility:

(1) Refusal, or failure without reasonable cause, to undergo or cooperate with security processing, including but not limited to meeting with a security investigator for subject interview, completing security forms or releases, and cooperation with medical or psychological evaluation.

(2) Refusal to provide full, frank, and truthful answers to lawful questions of investigators, security officials, or other official representatives in connection with a personnel security clearance or trustworthiness determination.

b. Conditions that could raise a security concern and may be disqualifying also include:

(1) Deliberate omission, concealment, or falsification of relevant facts from any personnel security questionnaire, personal history statement, or similar form used to conduct investigations, determine employment qualifications, award benefits or status, determine security clearance eligibility or trustworthiness, or award fiduciary responsibilities;

(2) Deliberately providing false or misleading information concerning relevant facts to an employer, investigator, security official, competent medical authority, or other official Government representative;

(3) Credible adverse information in several adjudicative issue areas that is not sufficient for an adverse determination under any other single guideline, but which, when considered as a whole, supports a whole-person assessment of questionable judgment, untrustworthiness, unreliability, lack of candor, unwillingness to comply with rules and regulations, or other characteristics indicating that the person may not properly safeguard protected information;

(4) Credible adverse information that is not explicitly covered under any other guideline and may not be sufficient by itself for an adverse determination, but which, when combined with all available information supports a whole-person assessment of questionable judgment, untrustworthiness, unreliability, lack of candor, unwillingness to comply with rules and regulations, or other characteristics indicating that the person may not properly safeguard protected information. This includes but is not limited to consideration of:

(a) Untrustworthy or unreliable behavior to include breach of client confidentiality, release of proprietary information, unauthorized release of sensitive corporate or other Government protected information.

(b) Disruptive, violent, or other inappropriate behavior in the workplace.

(c) A pattern of dishonesty or rule violations.

(d) Evidence of significant misuse of Government or other employer's time or resources.

(5) Personal conduct or concealment of information about one's conduct, that creates a vulnerability to exploitation, manipulation, or duress, such as (1) engaging in activities which, if known, may affect the person's personal, professional, or community standing, or (2) while in another country, engaging in any activity that is illegal in that country or that is legal in that country but illegal in the United States and may serve as a basis for exploitation or pressure by the foreign security or intelligence service or other group.

(6) Violation of a written or recorded commitment made by the individual to the employer as a condition of employment.

(7) Association with persons involved in criminal activity.

c. Conditions that could mitigate security concerns include:

(1) The individual made prompt, good-faith efforts to correct the omission, concealment, or falsification before being confronted with the facts.

(2) The refusal or failure to cooperate, omission, or concealment was caused or significantly contributed to by improper or inadequate advice of authorized personnel or legal counsel advising or instructing the individual specifically concerning the security clearance eligibility process. Upon being made aware of the requirement to cooperate or provide the information, the individual cooperated fully and truthfully.

(3) The offense is so minor, or so much time has passed, or the behavior is so infrequent, or it happened under such unique circumstances that it is unlikely to recur and does not cast doubt on the individual's reliability, trustworthiness, or good judgment.

(4) The individual has acknowledged the behavior and obtained counseling to change the behavior or taken other positive steps to alleviate the stressors, circumstances, or factors that caused untrustworthy, unreliable, or other inappropriate behavior, and such behavior is unlikely to recur.

(5) The individual has taken positive steps to reduce or eliminate vulnerability to exploitation, manipulation, or duress.

(6) The information was unsubstantiated or from a source of questionable reliability.

(7) Association with persons involved in criminal activities has ceased or occurs under circumstances that do not cast doubt upon the individual's reliability, trustworthiness, judgment, or willingness to comply with rules and regulations.

I-8. Guideline F: Financial Considerations

a. The concern. Failure or inability to live within one's means, satisfy debts, and meet financial obligations may indicate poor self-control, lack of judgment, or unwillingness to abide by rules and regulations, all of which can raise questions about an individual's reliability, trustworthiness, and ability to protect classified information. An individual who is financially overextended is at risk of having to engage in illegal acts to generate funds. Compulsive gambling is a concern as it may lead to financial crimes including espionage. Affluence that cannot be explained by known sources of income is also a security concern. It may indicate proceeds from financially profitable criminal acts.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Inability or unwillingness to satisfy debts.

(2) Indebtedness caused by frivolous or irresponsible spending and the absence of any evidence of willingness or intent to pay the debt or establish a realistic plan to pay the debt.

(3) A history of not meeting financial obligations.

(4) Deceptive or illegal financial practices such as embezzlement, employee theft, check fraud, income tax evasion, expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust.

(5) Consistent spending beyond one's means, which may be indicated by excessive indebtedness, significant negative cash flow, high debt-to-income ratio, and/or other financial analysis.

(6) Financial problems that are linked to drug abuse, alcoholism, gambling problems, or other issues of security concern.

(7) Failure to file annual Federal, state, or local income tax returns as required or the fraudulent filing of the same.

(8) Unexplained affluence, as shown by a lifestyle or standard of living, increase in net worth, or money transfers that cannot be explained by subject's known legal sources of income.

(9) Compulsive or addictive gambling as indicated by an unsuccessful attempt to stop gambling, "chasing losses" (that is, increasing the bets or returning another day in an effort to get even), concealment of gambling losses, borrowing money to fund gambling or pay gambling debts, family conflict, or other problems caused by gambling.

c. Conditions that could mitigate security concerns include:

(1) The behavior happened so long ago, was so infrequent, or occurred under such circumstances that it is unlikely to recur and does not cast doubt on the individual's current reliability, trustworthiness, or good judgment.

(2) The conditions that resulted in the financial problem were largely beyond the person's control (for example, loss of employment, a business downturn, unexpected medical emergency, or a death, divorce or separation), and the individual acted responsibly under the circumstances.

(3) The person has received or is receiving counseling for the problem and/or there are clear indications that the problem is being resolved or is under control.

(4) The individual initiated a good-faith effort to repay overdue creditors or otherwise resolve debts.

(5) The individual has a reasonable basis to dispute the legitimacy of the past-due debt which is the cause of the problem and provides documented proof to substantiate the basis of the dispute or provides evidence of actions to resolve the issue.

(6) The affluence resulted from a legal source of income.

I-9. Guideline G: Alcohol consumption

a. The concern. Excessive alcohol consumption often leads to the exercise of questionable judgment or the failure to control impulses, and can raise questions about an individual's reliability and trustworthiness.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Alcohol-related incidents away from work, such as driving while under the influence, fighting, child or spouse abuse, disturbing the peace, or other incidents of concern, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent.

(2) Alcohol-related incidents at work, such as reporting for work or duty in an intoxicated or impaired condition, or drinking on the job, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent.

(3) Habitual or binge consumption of alcohol to the point of impaired judgment, regardless of whether the individual is diagnosed as an alcohol abuser or alcohol dependent.

(4) Diagnosis by a duly qualified medical professional (for example, physician, clinical psychologist, or psychiatrist) of alcohol abuse or alcohol dependence.

(5) Evaluation of alcohol abuse or alcohol dependence by a licensed clinical social worker who is a staff member of a recognized alcohol treatment program.

(6) Relapse after diagnosis of alcohol abuse or dependence and completion of an alcohol rehabilitation program.

(7) Failure to follow any court order regarding alcohol education, evaluation, treatment, or abstinence.

c. Conditions that could mitigate security concerns include:

(1) So much time has passed, or the behavior was so infrequent, or it happened under such unusual circumstances that it is unlikely to recur or does not cast doubt on the individual's current reliability, trustworthiness, or good judgment.

(2) The individual acknowledges his or her alcoholism or issues of alcohol abuse, provides evidence of actions taken to overcome this problem, and has established a pattern of abstinence (if alcohol dependent) or responsible use (if an alcohol abuser).

(3) The individual is a current employee who is participating in a counseling or treatment program, has no history of previous treatment and relapse, and is making satisfactory progress.

(4) The individual has successfully completed inpatient or outpatient counseling or rehabilitation along with any required aftercare, has demonstrated a clear and established pattern of modified consumption or abstinence in accordance with treatment recommendations, such as participation in meetings of Alcoholics Anonymous or a similar organization and has received a favorable prognosis by a duly qualified medical professional or a licensed clinical social worker who is a staff member of a recognized alcohol treatment program.

I-10. Guideline H: Drug Involvement

a. The concern. Use of an illegal drug or misuse of a prescription drug can raise questions about an individual's reliability and trustworthiness, both because it may impair judgment and because it raises questions about a person's ability or willingness to comply with laws, rules, and regulations.

(1) Drugs are defined as mood and behavior altering substances, and include:

(a) Drugs, materials, and other chemical compounds identified and listed in the Controlled Substances Act of 1970, as amended (for example, marijuana or cannabis, depressants, narcotics, stimulants, and hallucinogens), and

(b) Inhalants and other similar substances.

(2) Drug abuse is the illegal use of a drug or use of a legal drug in a manner that deviates from approved medical direction.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Any drug abuse (see above definition).

(2) Testing positive for illegal drug use.

(3) Illegal drug possession, including cultivation, processing, manufacture, purchase, sale, or distribution; or possession of drug paraphernalia.

(4) Diagnosis by a duly qualified medical professional (for example, physician, clinical psychologist, or psychiatrist) of drug abuse or drug dependence.

(5) Evaluation of drug abuse or drug dependence by a licensed clinical social worker who is a staff member of a recognized drug treatment program.

(6) Failure to successfully complete a drug treatment program prescribed by a duly qualified medical professional.

(7) Any illegal drug use after being granted security clearance eligibility.

(8) Expressed intent to continue illegal drug use, or failure to clearly and convincingly commit to discontinue drug use.

c. Conditions that could mitigate security concerns include:

(1) The behavior happened so long ago, was so infrequent, or happened under such circumstances that it is unlikely to recur or does not cast doubt on the individual's current reliability, trustworthiness, or good judgment.

(2) A demonstrated intent not to abuse any drugs in the future, such as:

(a) Dissociation from drug-using associates and contacts.

(b) Changing or avoiding the environment where drugs were used.

(c) An appropriate period of abstinence.

(d) A signed statement of intent with automatic revocation of clearance for any violation.

(3) Abuse of prescription drugs was after a severe or prolonged illness during which these drugs were prescribed, and abuse has since ended.

(4) Satisfactory completion of a prescribed drug treatment program, including but not limited to rehabilitation and aftercare requirements, without recurrence of abuse, and a favorable prognosis by a duly qualified medical professional.

I-11. Guideline I: Psychological Conditions

a. The concern. Certain emotional, mental, and personality conditions can impair judgment, reliability, or trustworthiness. A formal diagnosis of a disorder is not required for there to be a concern under this guideline. A duly qualified mental health professional (for example, clinical psychologist or psychiatrist) employed by, or acceptable to and approved by the U.S. Government, should be consulted when evaluating potentially disqualifying and mitigating information under this guideline. No negative inference concerning the standards in this guideline may be raised solely on the basis of seeking mental health counseling.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Behavior that casts doubt on an individual's judgment, reliability, or trustworthiness that is not covered under any other guideline, including but not limited to emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre behavior.

(2) An opinion by a duly qualified mental health professional that the individual has a condition not covered under any other guideline that may impair judgment, reliability, or trustworthiness.

(3) The individual has failed to follow treatment advice related to a diagnosed emotional, mental, or personality condition (for example, failure to take prescribed medication).

c. Conditions that could mitigate security concerns include:

(1) The identified condition is readily controllable with treatment, and the individual has demonstrated ongoing and consistent compliance with the treatment plan.

(2) The individual has voluntarily entered a counseling or treatment program for a condition that is amenable to treatment, and the individual is currently receiving counseling or treatment with a favorable prognosis by a duly qualified mental health professional.

(3) Recent opinion by a duly qualified mental health professional employed by, or acceptable to and approved by the U.S. Government that an individual's previous condition is under control or in remission, and has a low probability of recurrence or exacerbation.

(4) The past emotional instability was a temporary condition (for example, one caused by a death, illness, or marital breakup), the situation has been resolved, and the individual no longer shows indications of emotional instability.

(5) There is no indication of a current problem.

I-12. Guideline J: Criminal Conduct

a. The concern. Criminal activity creates doubt about a person's judgment, reliability, and trustworthiness. By its very nature, it calls into question a person's ability or willingness to comply with laws, rules, and regulations.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) A single serious crime or multiple lesser offenses.

(2) Discharge or dismissal from the Armed Forces under dishonorable conditions.

(3) Allegation or admission of criminal conduct, regardless of whether the person was formally charged, formally prosecuted, or convicted.

(4) Individual is currently on parole or probation.

(5) Violation of parole or probation, or failure to complete a court-mandated rehabilitation program.

c. Conditions that could mitigate security concerns include:

(1) So much time has elapsed since the criminal behavior happened, or it happened under such unusual circumstances that it is unlikely to recur or does not cast doubt on the individual's reliability, trustworthiness, or good judgment.

(2) The person was pressured or coerced into committing the act and those pressures are no longer present in the person's life.

(3) Evidence that the person did not commit the offense.

(4) There is evidence of successful rehabilitation; including but not limited to the passage of time without recurrence of criminal activity, remorse or restitution, job training or higher education, good employment record, or constructive community involvement.

I-13. Guideline K: Handling Protected Information

a. The concern. Deliberate or negligent failure to comply with rules and regulations for protecting classified or other sensitive information raises doubt about an individual's trustworthiness, judgment, reliability, or willingness and ability to safeguard such information, and is a serious security concern.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Deliberate or negligent disclosure of classified or other protected information to unauthorized persons, including but not limited to personal or business contacts, to the media, or to persons present at seminars, meetings, or conferences.

(2) Collecting or storing classified or other protected information in any unauthorized location.

(3) Loading, drafting, editing, modifying, storing, transmitting, or otherwise handling classified reports, data, or other information on any unapproved equipment including but not limited to any typewriter, word processor, or computer hardware, software, drive, system, game board, handheld, "palm" or pocket device or other adjunct equipment.

(4) Inappropriate efforts to obtain or view classified or other protected information outside one's need to know.

(5) Copying classified or other protected information in a manner designed to conceal or remove classification or other document control markings.

(6) Viewing or downloading information from a secure system when the information is beyond the individual's need to know.

(7) Any failure to comply with rules for the protection of classified or other sensitive information.

(8) Negligence or lax security habits that persist despite counseling by management.

(9) Failure to comply with rules or regulations that results in damage to the National Security, regardless of whether it was deliberate or negligent.

c. Conditions that could mitigate security concerns include:

(1) So much time has elapsed since the behavior, or it happened so infrequently or under such unusual circumstances that it is unlikely to recur or does not cast doubt on the individual's current reliability, trustworthiness, or good judgment.

(2) The individual responded favorably to counseling or remedial security training and now demonstrates a positive attitude toward the discharge of security responsibilities.

(3) The security violations were due to improper or inadequate training.

I-14. Guideline L: Outside Activities

a. The concern. Involvement in certain types of outside employment or activities is of security concern if it poses a conflict of interest with an individual's security responsibilities and could create an increased risk of unauthorized disclosure of classified information.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Any employment or service, whether compensated or volunteer, with:

(a) The government of a foreign country.

(b) Any foreign national, organization, or other entity.

(c) A representative of any foreign interest.

(d) Any foreign, domestic, or international organization or person engaged in analysis, discussion, or publication of material on intelligence, defense, foreign affairs, or protected technology;

(2) Failure to report or fully disclose an outside activity when this is required.

c. Conditions that could mitigate security concerns include:

(1) Evaluation of the outside employment or activity by the appropriate security or counterintelligence office indicates that it does not pose a conflict with an individual's security responsibilities or with the national security interests of the United States.

(2) The individual terminates the employment or discontinued the activity upon being notified that it was in conflict with their security responsibilities.

I-15. Guideline M: Use of Information Technology Systems

a. Concern. Noncompliance with rules, procedures, guidelines, or regulations pertaining to information technology systems may raise security concerns about an individual's reliability and trustworthiness, calling into question the willingness or ability to properly protect sensitive systems, networks, and information. Information technology systems include all related computer hardware, software, firmware, and data used for the communication, transmission, processing, manipulation, storage, or protection of information.

b. Conditions that could raise a security concern and may be disqualifying include:

(1) Illegal or unauthorized entry into any information technology system or component thereof.

(2) Illegal or unauthorized modification, destruction, manipulation, or denial of access to information, software, firmware, or hardware in an information technology system.

(3) Use of any information technology system to gain unauthorized access to another system or to a compartmented area within the same system.

(4) Downloading, storing, or transmitting classified information on or to any unauthorized software, hardware, or information technology system.

(5) Unauthorized use of a Government or other information technology system.

(6) Introduction, removal, or duplication of hardware, firmware, software, or media to or from any information technology system without authorization, when prohibited by rules, procedures, guidelines, or regulations.

(7) Negligence or lax security habits in handling information technology that persist despite counseling by management.

(8) Any misuse of information technology, whether deliberate or negligent, that results in damage to the national security.

c. Conditions that could mitigate security concerns include:

(1) So much time has elapsed since the behavior happened, or it happened under such unusual circumstances, that it is unlikely to recur or does not cast doubt on the individual's reliability, trustworthiness, or good judgment.

(2) The misuse was minor and done only in the interest of organizational efficiency and effectiveness, such as letting another person use one's password or computer when no other timely alternative was readily available.

(3) The conduct was unintentional or inadvertent and was followed by a prompt, good-faith effort to correct the situation and by notification of supervisor.

Appendix J
Overseas Investigations

J-1. Purpose

The purpose of this appendix is to establish, within the framework of this regulation, DODD 5105.42 and DIS 20-1-M, standardized procedures for the military investigative agencies to follow when they perform administrative and investigative functions on behalf of DIS at overseas locations.

J-2. Type investigation

This regulation describes in detail background investigations (BIs) which are conducted for limited access authorizations and those special investigative inquiries conducted for postadjudicative purposes. Hereafter they are referred to as LAA and postadjudicative cases and are briefly described in paragraphs a and b , below:

a. Limited access authorization. A level of access to classified defense information that may be granted to a non-U.S. citizen under certain conditions, one of which is that a BI must have been completed with satisfactory results. Paragraph 3-403 further describes LAA cases.

b. Postadjudication investigation. A PSI predicated on new, adverse, or questionable security, suitability or hostage information that arises and requires the application of investigation procedures subsequent to adjudicative action on a DOD-affiliated person's eligibility for continued access to classified information, assignment to or retention in sensitive duties or other designated duties requiring such investigation. While these cases are normally predicated on the surfacing of unfavorable information subsequent to favorable adjudication, they may also be opened when favorable information is offered to counter a previous unfavorable adjudication. Paragraph 2-17 c further describes these cases.

J-3. General

a. As a rule, investigative activity in most PSIs occurs in the United States even when the subject is at an overseas location. Therefore, the submission of requests for investigation to the PIC at Baltimore is a required procedure as it ensures uniform application of DOD PSI policy and the efficient dispatch and coordination of leads.

b. When the purpose of the investigation is for an LAA or postadjudication on a subject overseas, much, if not all of the leads are at an overseas location. While these cases also may be submitted directly to PIC for action, there is an inherent delay in the mailing of the request, the exchange of leads and reports with PIC, and transmittal of the reports back to the requester. To avoid this delay, the military investigative agencies, when acting for DIS overseas in accordance with DODD 5105.42 may, with their headquarters approval, accept these requests for investigations, initiate them and disseminate the results from the same level as they open, close, and disseminate their own cases. Usually this will greatly improve response time to the requester.

c. Under the procedures in paragraph b , above, DIS will not often be in a position to directly exercise its responsibility for control and direction until the case or lead is in progress or even completed; therefore, adherence to the policy stated in referenced documents, and as modified herein, is mandatory. When the policy of the military investigative agency is at variance with the above, the matter will be referred to the respective headquarters for resolution.

d. Since DIS is ultimately responsible for the personnel security product, it must be kept informed of all such matters referred to in this appendix. For instance, when the investigative agency overseas receives a DD Form 1879 (Request for Personnel Security Investigation), which sets forth an issue outside DIS jurisdiction, it will reject the request, inform the requester of the reason and furnish an information copy of the DD Form 1879 and rejection letter to PIC. When the issue/jurisdiction is unclear to the investigative agency, the DD Form 1879 and the perceived jurisdictional question should be promptly forwarded to DIS for action and, if appropriate, to the Component's headquarters for information. Questions on the interpretation of DIS or DOD policy and directives pertaining to individual PSI cases can usually be resolved through direct communications with PIC.

e. DODD 5105.42 , establishes the supporting relationship of the military investigative agencies to DIS in overseas areas, and DIS provides these agencies with copies of relevant policy and interpretive guidance. For these reasons, the investigative agency vice the requester, is responsible for evaluating the request, processing it, collecting and evaluating the results within their jurisdiction for sufficiency, and forwarding the completed product to the appropriate activity.

f. The magnitude of operations at PIC requires that methods of handling LAA and postadjudicative cases be consistent to the maximum extent possible. For this reason, the procedures for LAA cases are nearly identical to those for postadjudicative cases. Briefly, the main exceptions are:

(1) The notification to PIC that a postadjudication case has been opened will be by message, since an issue is present at the outset, whereas notification of an LAA case should normally be by mail.

(2) The scope of the LAA investigation is 10 years or since the person' s 18th birthday, whichever is shortest, whereas the leads in a postadjudication case are limited to resolving the issue.

J-4. Jurisdiction

a. As set forth in DODD 5105.42 , DIS is responsible for conducting all DOD PSIs in the 50 States, District of Columbia, and Puerto Rico, and will request the military departments to accomplish investigative requirements elsewhere. The military investigative agencies in overseas locations routinely respond to personnel security investigative leads for DIS.

b. The DIS jurisdiction also includes investigation of subversive affiliations, suitability information, and hostage situations when such inquiries are required for personnel security purposes; however, jurisdiction will rest with the military investigative agencies, FBI and/or civil authorities as appropriate when the alleged subversion or suitability issue represents a violation of law or, in the case of a hostage situation, there is an indication that the person concerned is actually being pressured, coerced, or influenced by interests inimical to the United States, or that hostile intelligence is taking action specifically directed against that person. Specific policy guidance on the applicability of these procedures and the jurisdictional considerations are stated in chapter II, section 4.

J-5. Case opening

a. A request for investigation must be submitted by using DD Form 1879 and accompanied by supporting documentation unless such documentation is not immediately available, or the obtaining of documentation would compromise a sensitive investigation. Upon receipt of the request, the military investigative component will identify the issue(s), scope the leads, and ensure that the proposed action is that which is authorized for DIS as delineated in this regulation, DODD 5105.42 , and DIS 20-1-M.

b. Upon such determination, the component will prepare an ALS which fully identifies the subject and the scope of the case, and specifies precisely the leads which each investigative component (including DIS/PIC when appropriate) is to conduct.

c. Case-opening procedures described above are identical for LAA and postadjudication cases except with respect to notification of case opening to PIC:

(1) Postadjudication cases. These cases, because they involve an issue, are potentially sensitive and must be examined as early as possible by PIC for conformity to the latest DOD policy. Accordingly, the initial notification to PIC of case openings will always be by message. The message will contain at a minimum:

(a) Full identification of the subject;

(b) A narrative describing the allegation/facts in sufficient detail to support opening of the case; and

(c) A brief listing of the leads that are planned. The DD Form 1879 and supporting documents, along with the agency's ALS, should be subsequently mailed to PIC.

(2) Limited access authorization cases. The notification to PIC of case opening will normally be accomplished by mailing the DD Form 1879 , DD Form 398 (Personal History Statement), a copy of the ALS, and any other supporting documents to PIC. Message notification to PIC in LAA cases will only be required if there is a security or suitability issue apparent in the DD Form 1879 or supporting documents.

d. Beyond initial actions necessary to test allegation for investigative merit and jurisdiction, no further investigative action should commence until the notification of case opening to PIC has been dispatched.

e. The PIC will promptly respond to the notification of case opening by mail or message specifying any qualifying remarks along with a summary of previously existing data. PIC will also provide a DIS case control number (CCN). This number must be used by all Components on all case-related paperwork/reports.
(The investigating agency may assign its unique service CCN for interim internal control; however, the case will be processed, referenced, and entered into the DCII by the DIS case control number.) The first five digits of the DIS CCN will be the Julian date of the case opening when received at DIS.

J-6. Case processing

a. The expected completion time for leads in LAA cases is 50 calendar days and for postadjudication cases, 30 days, as computed from the date of receipt of the request. If conditions preclude completion in this time period, a pending report of the results to date, along with an estimated date of completion will be submitted to PIC.

b. Copies of all ALSs will be furnished to PIC. In addition, PIC will be promptly notified of any significant change in the scope of the case, or the development of an investigative issue.

c. The procedures for implementing the Privacy Act in PSI cases are set in DIS 20-1-M. Any other restrictions on the release of information imposed by an overseas source or by regulations of the country where the inquiry takes place will be clearly stated in the report.

d. The report format for these cases will be that used by the military investigative agency.

e. Investigative action outside the jurisdictional area of an investigative Component office may be directed elsewhere by ALS as needed in accordance with that agency's procedures and within the following geographical considerations:

(1) Leads will be sent to PIC if the investigative action is in the United States, District of Columbia, Puerto Rico, American Samoa, The Bahamas, the U.S. Virgin Islands, and the following islands in the Pacific: Wake, Midway, Kwajalin, Johnston, Carolines, Marshalls, and Eniwetok.

(2) Leads to areas not listed above may be dispatched to other units of the investigative agency or even to another military agency's field units if there is an agreement or memorandum of understanding that provides for such action. For case accountability purposes, copies of such "lateral" leads must be sent to the PIC.

(3) Leads that cannot be dispatched as described in paragraph (2), above, and those that must be sent to a non-DOD investigative agency should be sent to PIC for disposition.

f. The DIS 20-1-M calls for obtaining PIC approval before conducting a subject interview on a postadjudicative investigation. To avoid the delay that compliance with this procedure would create, a military investigative component may conduct the interview provided:

(1) All other investigative leads have been completed and reviewed.

(2) The CCN has been received, signifying DIS concurrence with the appropriateness of the investigation.

(3) Contrary instructions have not been received from the PIC.

(4) The interview is limited to the resolution of the relevant issues disclosed by the investigation.

g. Notwithstanding the provisions of paragraphs f (1) through (4), above, if time is of the essence due to imminent transfer of the subject, a subject interview may be conducted at the discretion of the investigative agency.

J-7. Case responsibility limited access authorization and PA

Paragraph J- 3, above, describes the advantages of timely handling which accrue when the military investigative Components act for DIS overseas. These actions for DIS may, however, be limited by the component's staffing and resource limitations, especially since some cases require more administration and management than others. Postadjudication case leads, for instance, will normally be within the geographical jurisdiction of the component that accepted the request for investigation; therefore, relatively little case management is required. In contrast, LAA cases may require leads worldwide, and, therefore, create more complex case management and administration, especially in the tracking, monitoring and reviewing of leads outside the component's geographical area. Accordingly, an investigative component will accept the case from the requester, but only assign itself the appropriate leads within its own geographical jurisdiction and send the balance to PIC for appropriate disposition in accordance with the following:

a. The investigative agency will accept the request for investigation (thereby saving time otherwise lost in mailing to PIC) but limit its involvement in case management by extracting only those leads it will conduct or manage locally.

b. The agency should then prepare an ALS that shows clearly what leads it will cover and send PIC a copy of this ALS, along with the request for investigation and any other appropriate documentation. It must be clear in the ALS that PIC is to act on all those leads that the unit has not assigned to itself.

c. PIC, as case manager, will assume responsibility for the complete investigative package and, upon receipt of the last lead, will send the results to the appropriate activity.

d. The agency that accepted the case and assigned itself leads may send a copy of its report to the activity in the "Results to" block at the same time it sends the originals to PIC. If so, the letter of transmittal must inform the recipient that these reports are only a portion of the investigation, and that the balance will be forthcoming from PIC. Similarly, PIC must be informed of which investigative reports were disseminated. (This is normally done by sending PIC a copy of the letter of transmittal.)

J-8. Scope

a. Limited access authorization. The scope of investigation is 10 years or from age 18, whichever is the shortest period.

b. Postadjudication cases. There is no standard scope. The inquiries conducted will be limited to those necessary to resolve the issue(s).

J-9. Case closing: limited access authorization and PA

a. Whether the investigative component or PIC closes out an investigation, there are three key elements to consider:

(1) The investigative results must be reviewed for quality and conformance to policy.

(2) The results must be sent to the activity listed in the "Results to" block of the DD Form 1879 .

(3) PIC must be informed whether or not any dissemination was made by the investigative agency and, if so, what reports were furnished.

b. Investigative results may also be sent to a requester or higher level activity that makes a statement of need for the results. In such instances, a copy of the letter requesting the results and the corresponding letter of transmittal must be sent to PIC for retention.

c. When an investigative agency disseminates reports for PIC, it may use the transmittal documents, letters, or cover sheets it customarily uses for its own cases.

d. The material that is to be provided to PIC will consist of: The originals of all reports, and all other case documentation such as original statements, confidential source sheets, interview logs, requests for investigation, letters of transmittal to adjudicators/requesters, or communications with the requester, such as those that modify the scope of the investigation.

e. For DIS to fulfill its responsibilities under DOD 5220.22-R ( AR 380-49 ) and the Privacy Act of 1974, all inquiries conducted in its behalf must be set forth in a Report of Investigation for the permanent file, whether the case is completed, terminated early, or referred to another agency.

J-10. Referral

A case may require premature closing at any time after receipt of the DD Form 1879 by the investigative Component if the information accompanying the request, or that which is later developed, is outside DIS jurisdiction. For example, alleged violations of law, a counterintelligence matter, or actual coercion/influence in a hostage situation (see para J- 4 b above) must be referred to the appropriate agency, and DIS involvement terminated. The requester will be informed by letter or endorsement to the DD Form 1879 of the information developed that, due to jurisdictional consideration, the case was referred to (fill in appropriate address) and that the DIS case is closed. The agency to which referral was made and PIC will be furnished with the results of all investigations conducted under DIS auspices. DIS, however, has an interest in the referral agency's actions and no information should be solicited from that agency.

Appendix K
ADP Position Categories and Criteria for Designating Positions

OMB Circular A-71 (and Transmittal Memo #1), July 1978, OMB Circular A-130, December 12, 1985 , and FPM Letter 732, November 14, 1978 contain the criteria for designating positions under the existing categories used in the personnel security program for Federal civilian employees as well as the criteria for designating ADP and ADP-related positions. This policy is outlined below:

K-1. Automated data processing position categories

a. Critical-sensitive positions (ADP-I positions).. Those positions in which the incumbent is responsible for the planning, direction, and implementation of a computer security program; major responsibility for the direction, planning and design of a computer system, including the hardware and software; or, can access a system during the operation or maintenance in such a way, and with a relatively high risk for causing grave damage, or realize a significant personal gain.

b. Noncritical-sensitive positions (ADP-II positions.) Those positions in which the incumbent is responsible for the direction, planning, design, operation, or maintenance of a computer system, and whose work is technically reviewed by a higher authority of the ADP-I category to ensure the integrity of the system.

c. Nonsensitive positions (ADP-III positions.) All other positions involved in computer activities.
In establishing the categories of positions, other factors may enter into the determination, permitting placement in higher or lower categories based on the agency's judgment as to the unique characteristics of the system or the safeguards protecting the system.

K-2. Criteria for designating positions

Three categories have been established for designating computer and computer-related positions ADP-I, ADP-II, and ADP- III. Specific criteria for assigning positions to one of these categories are as follows:

a. ADP-I.

(1) Responsibility for the development and administration of agency computer security programs, including direction and control of risk analysis and/or threat assessment.

(2) Significant involvement in life-critical or mission-critical systems.

(3) Responsibility for the preparation or approval of data for input into a system which does not necessarily involve personal access to the system, but with relatively high risk for effecting grave damage or realizing significant personal gain.

(4) Relatively high risk assignments associated with or directly involving the accounting, disbursement, or authorization for disbursement from systems of (1) dollar amounts of $10 million per year or greater, or (2) lesser amounts if the activities of the individual are not subject to technical review by higher authority in the ADP-I category to ensure the integrity of the system.

(5) Positions involving major responsibility for the direction, planning, design, testing, maintenance, operation, monitoring, and/or management of systems hardware and software.

(6) Other positions as designated by the agency head that involve relatively high risk for effecting grave damage or realizing significant personal gain.

b. ADP-II. Responsibility for systems design, operation, testing, maintenance, and/or monitoring that is carried out under technical review of higher authority in the ADP-I category, includes, but is not limited to:

(1) access to and/or processing of proprietary data, information requiring protection under the Privacy Act of 1974, and Government-developed privileged information involving the award of contracts;

(2) accounting, disbursement, or authorization for disbursement from systems of dollar amounts less than $10 million per year. Other positions are designated by the agency head that involve a degree of access to a system that creates a significant potential for damage or personal gain less than that in ADP-I positions.

c. ADP-III. All other positions involved in Federal computer activities.

Appendix L
Defense Security Briefing Provided U.S. Government Employees Traveling to Communist-Controlled Countries

L-1. Introduction

All U.S. Government employees, regardless of position or assignment, are likely to be of interest to intelligence services of communist-controlled countries. Hostile intelligence networks make it their business to learn the identities of Americans, and frequently try to target them for intelligence approaches when they travel abroad. The approach may be direct or indirect, highly sophisticated or crudely obvious. In any case, U.S. personnel traveling to communist-controlled countries should be constantly alert to the problems that can befall them. The purpose of this briefing is to make employees aware of pitfalls associated with such travel, and to advise them on defensive measures against hostile intelligence exploitation.

L-2. Before departure

a. The Bureau of Consular Affairs, U.S. Department of State, frequently publishes advisory material on current travel conditions in communist-controlled countries. This material should be available through your agency, and you should carefully review any such information covering a country you will be visiting. It is especially important that you are aware of the items that you may or may not take into a country.

b. Visa applications are routinely scrutinized by intelligence services of communist-controlled countries. To avoid difficulties in this area, it is important that you complete the forms truthfully and accurately. It is especially important that you name any relatives that you intend to visit in the host country.

c. When obtaining visas, ask the appropriate consular officer how much foreign currency (United States and other) and what valuables you may take into and out of the communist country or countries to be visited. Make sure you have enough money for the trip, and strictly follow the approved itinerary. You may not import local currency into a country you will be visiting.

d. If you are a naturalized American citizen of East European origin, please note that there have been instances in which an East European country has not recognized the U.S. citizenship of former nationals and has taken the position that such persons retain their original nationality and are therefore subject to treatment as citizens of that country upon reentry into its jurisdiction. If this situation applies to you, consult first with the U.S. Department of State for advice and clarification of your status.

e. You may wish to carry with you gifts for friends or relatives. Such gifts should be neither controversial nor prohibited. Do not bring pornography, narcotics, or political material. Communist pornography laws are more strict than those in the United States, and you should avoid taking with you magazines or other materials that might be considered pornographic. Any patent medicines or prescription drugs should be clearly for your own use and in quantities reasonable enough to convince authorities that they are for your personal consumption.

f. Do not carry with you, on behalf of a third party, any letters, messages, or packages for private individuals in Communist countries. You may be deemed guilty of circumventing normal channels of communication, or you may be regarded as a courier for illegal or subversive purposes.

g. Carry only essential forms of identification. Leave Government badges, building passes, and so forth, at home. Write down your passport number and keep it separate from your passport. Do the same with the address and telephone number of the American Embassy.

h. DO NOT TAKE THIS DOCUMENT WITH YOU| Study, think about, and remember its warnings during your visit, but leave the document at home.

L-3. Upon arrival

a. Rules governing declaration of valuables and currency and those relating to transactions are strictly enforced. Make an accurate declaration at entry of all money and valuables, including travelers checks. Some countries give the traveler a copy of the declaration, which must be surrendered upon leaving. It is important to keep receipts of all money changes, as these are frequently requested upon departure. Undeclared sums of U.S. or other currency are most likely to cause difficulty with authorities and may be confiscated upon departure.

b. You will generally be permitted to take in such items as cameras, transistor radios, and so forth. It is wise to declare such items as you enter, however, to preclude possible explanations, customs charges, or confiscations when you leave. Baggage inspections may be extremely thorough or only perfunctory. On occasion, your baggage may not even be opened at entry.

c. As soon as possible after arrival, you should contact the American Embassy or consulate, either by telephone or in person, and provide your local address and the probable length of your visit.

d. It is unwise for you to drive in a communist country. Try to use public transportation or hire a driver, as local traffic regulations may be confusing. There have been incidents when traffic accidents were deliberately provoked to incriminate or embarrass a visitor.

L-4. Activities while in communist countries

a. Assume that your hotel room is equipped with devices to overhear or record your conversations. There may be devices installed through which you can be physically observed, even while your room is in darkness. In addition to the usual microphones, telephone tapes, miniature recording devices, and so forth, intelligence operatives today use infrared cameras, infrared "snooper-scopes" and optical lenses, closed-circuit TV, and other highly advanced equipment. Do not search for such devices, and do not make an issue of it if you should by chance find one. The presence of such equipment may not necessarily concern you. A device may or may not be monitored during your visit, or it may be monitored only on a "spot check" basis. Do not try to neutralize such a device by running tap water, playing your radio, and so forth. Some modern devices are so sophisticated that they cannot be neutralized. Efforts to combat such penetration will only make the intelligence service more suspicious of you. The best defense against such devices is to keep your conversations light and uninformative.
IMPORTANT: Should you discover any device of the above kind, take no overt action against it. Continue your normal conversation, giving no indication of your discovery, and report your findings to the American Embassy or consulate or to your security officer upon your return.

b. Beyond your hotel room, you should assume that conversations in vehicles (including Embassy vehicles), train compartments, restaurants, conference rooms, and other public places may be monitored. Miniature microphones with transmitters or recorders can easily be secreted on the person of an individual in your group. It is even technically possible to record your conversations in open, outdoor areas; however, those areas are normally more secure than indoor locations.

c. Avoid unnecessary discussions of your job, your workplace, and other official matters. Also avoid discussing other U.S. employees' habits, character, or other matters that reveal weaknesses or idiosyncrasies.

d. Assume that your personal luggage will be searched at some time in your hotel room. If you discover evidence of this, do not make a big issue of it. You should, however, report positive evidence of such activity to the American Embassy and to your security officer upon your return. It is just as well not to bother locking your luggage since most locks will be readily picked. Locked luggage will only increase the curiosity of the intelligence agent and the lock may be broken. Never leave unattended luggage containing valuable papers or documents you do not wish anyone else to read. If you surprise someone searching your possessions, don't take any violent or physical action, but report the incident to local and U.S. authorities.

e. You may receive a "wrong number" or otherwise mysterious telephone call in the hotel room at any hour. Do not let this unduly upset you. It may be a crude but effective method of determining whether you are in your room, or it may be only a result of poor telephone service.

f. Do not rely on hotel employees for protection service. Assume that they, as well as restaurant employees, are in the employ of the intelligence services. Be particularly circumspect in your relations with guides, interpreters, and Communist travel agency personnel, since these people are invariably used by intelligence agencies.

g. You may be under physical surveillance when you travel, whether on foot or in a vehicle. Or you may suspect you are being observed when actually you are not. In either event, the best tactic is to ignore it. Communist intelligence agents at various times observe visitors on a spot check basis for no apparent reason. On the other hand, they may be collecting detailed data concerning your activities in preparation for a more direct intelligence approach. Do not attempt to lose surveillance agents. If you are actually being followed for intelligence objectives, you will be covered by a team of several agents, and your evasion attempts will make them more suspicious.

h. You will be permitted to take photographs with your personal camera, but be careful not to photograph restricted areas. You should not take photographs from aircraft, or of military and police installations and personnel, industrial structures, harbors, rail and airport facilities, and border areas. Communist officials also resent your photographing items that put them in a bad light, such as slum areas, public drunks, scenes of civil disorder, or public disturbances. If you do take such photographs, your film may be confiscated.

i. Be particularly circumspect in approaches from persons offering social companionship, especially of a sexual nature. Many of these persons are"plants" from communist intelligence agencies and will attempt to entice you into a compromising situation, which they can use to blackmail you to force your cooperation in intelligence activities. Under no circumstances should you seek or accept this kind of companionship in a communist country. The intelligence services will capitalize immediately on any indication of immoral or indiscreet behavior of American travelers. Even when failing to detect a vulnerability, communist agents have attempted to entrap innocent travelers. For this reason, you should maintain the highest level of personal behavior at all times, avoid long walks at night alone, and endeavor always to be in the company of someone you can trust. Be especially careful not to drink too heavily so as not to weaken your defense or lose your self-control.

j. Do not accept from anyone (including friends, relatives, or professional contacts) letters, photographs, packages, or any other material to be smuggled out of the country or carried in your effects when you depart. Be firm in your denials in these matters, since such requests may be acts of intelligence agents seeking to entrap you.

k. Bear in mind that there are many political, cultural, and legal differences between the United States and Communist countries. Actions that are innocent or, at worst, carry wrist-slapping penalties in the United States, are often considered serious offenses against the law in communist-dominated societies. Persons violating the law, even unknowingly, run the risk of arrest or expulsion. Do not, for instance, take "souvenirs" from hotels or institutions, however insignificant in value they may appear.

l. Do not engage in any private currency transactions with individual citizens. Do not try to sell or trade any personal item, including clothing, which you have brought into the country, or purchase bargains from street peddlers or questionable vendors. Do not engage in black-market activities. Many communist countries have laws governing exportation of artwork and historic relics. Be familiar with these laws if you intend to purchase such items, and make these purchases only at official establishments.

m. Should you be detained or arrested for any reason by police or other officials of these countries, be cooperative, but insist politely and repeatedly, if necessary, that the American Embassy or consulate be notified promptly. Do not make any statements or sign any documents that you do not fully understand until you have had an opportunity to confer with an Embassy representative. You may possibly be accused of having some connection with an American intelligence service or of having accepted an assignment from such service to be carried out in the host country. You should make no admission that you had any dealings, under any circumstances, with any U.S. intelligence agency.

n. Mail you receive or send in a communist country is subject to censorship. In any correspondence before, during, or after your visit, make no reference to classified information nor reveal information of possible value to a hostile intelligence service. Be careful in writing to or about relatives or friends in these countries, since they may become targets for investigation or exploitation.

o. There have been several incidents in communist countries wherein speech-inducing drugs, medicines, and so forth, have been used to aid in interrogation. In nonemergency situations, make every effort to avoid communist hospitals or medical facilities without first notifying the American Embassy or consulate.

p. Report immediately any attempt to pressure or compromise you, or any action that might lead to such pressure or compromise, to the American Embassy security officer in the country being visited. Report to your security manager immediately if you have unusual subsequent contacts with nationals of a communist country.

L-5. Conclusion

This briefing covers many, but not necessarily all, pitfalls that an American traveler may encounter. New espionage techniques and tactics are constantly being developed, and you should always be alert for them. Although the techniques employed by communist countries' intelligence services may seem farfetched or taken from spy novels, they are in fact used in day-to-day activities and operations. American travelers must recognize that these techniques; however distasteful, are part of the communist system and be prepared to counter them.
The pitfalls outlined above reflect possibilities, not probabilities, however. You probably will not have any problems if you respect local laws and customs, act honestly in your dealings, and behave discreetly. You can expect friendly treatment from most of the citizens you meet, and you will find that they are very interested in all aspects of American life. You can therefore serve as a valuable goodwill ambassador for the United States while you are traveling in communist countries. Be open to this experience, have a good trip, and come home safely.

Appendix M
Internal Control Evaluation

M-1. Function

The function covered by this evaluation is the Army Personnel Security Program.

M-2. Purpose

The purpose of this evaluation is to assist commanders and organizations in evaluating key internal controls outlined below. It is not intended to address all internal control elements.

M-3. Instructions

Answers must be based upon the actual testing of key internal controls (for example, document analysis, direct observation, sampling, and simulation). Answers that indicate deficiencies must be explained and the corrective action indicated in the supporting documentation. These internal controls must be evaluated at least once every 5 years. Certification that this evaluation has been conducted must be accomplished on DA Form 11-2 (Internal Control Evaluation Certification).

M-4. Test questions

a. Are Security Managers appointed in writing?

b. Is personal identifiable information protected in accordance with AR 340-21 ?

c. Has a Joint Personnel Adjudication System Account been established for Security Managers, email addresses current, and security management office owning/servicing relationships in the JPAS reviewed/updated annually?

d. Are classified reports stored in accordance with AR 380-381 and AR 380-5 ?

e. When transported, are reports of personnel security information sealed in double envelopes when transmitted by mail or when carried by persons and the package labeled "TO BE OPENED ONLY BY OFFICIALS DESIGNATED TO RECEIVE REPORTS OF PERSONNEL SECURITY INVESTIGATION" noted on the package?

f. Is the DCS, G-2 monitoring, evaluating, and reporting on the administration of the Army Personnel Security Program?

g. Did the commander establish written local security policies and procedures?

h. Has the commander established a self inspection security program for his or her headquarters and subordinate programs?

i. Does the security manager advise, update, and communicate with the commander to ensure matters related to security clearance actions are presented for a final decision?

j. Do security managers promptly and appropriately report security incidents, violations, and compromises, related to classified and sensitive information, as directed by AR 380-5 to the commander?

k. Does the security manager adhered to deadlines and provide consultation to personnel who receive a letter of intent or statement of reason on the seriousness of the action; provide support to such persons to ensure due process is afforded?

l. Are personnel submitted for periodic reviews in a timely manner?

m. Are security managers trained?

n. Have supervisors ensured that subordinate personnel are trained in, understand, and follow requirements of this regulation, local command policy, and procedures concerning the Personnel Security Program?

o. Has the commander established annual security training for personnel having continued access to classified information?

p. Has the commander ensured personnel security investigations are initiated through the Personnel Security Investigation Center of Excellence as authorized?

q. Has the commander ensured prior to indoctrination, conduct initial security briefings, educating personnel on their security responsibilities?

r. Has the commander ensured supervisors are familiar with special responsibilities in matters pertaining to indicators that may signal matters of personnel security concern and reinforce the requirements for self, supervisor, and command reporting of security incidents via the JPAS?

s. Has the commander ensured personnel holding a security clearance report all foreign travel to the security office?

t. Has the commander immediately documented in writing any unfavorable incidents and made the recommendation on the DA Form 5248-R and subsequently submitted an incident report via the JPAS to the DOD Consolidated Adjudication Facility?

M-5. Supersession

Not applicable.

M-6. Comments

To make this evaluation a more useful tool for internal controls, submit comments to DCS, G-2, 1000 Army Pentagon, Washington, DC 20310-1000.

Glossary

Section I

Abbreviations

ADP

automated data processing

ALS

action lead sheet

ARNG

Army National Guard

BI

background investigation

BVS

Bureau of Vital Statistics

CAP

centralized assignment procedure

CCF

U.S. Army Central Clearance Facility

CIA

Central Intelligence Agency

CMF

career management field

DA

Department of the Army

DASEB

Department of the Army Suitability Evaluation Board

DCII

defense central investigations index

DCID

Defense Criminal Investigative Service

DCS, G-1

Deputy Chief of Staff , G-1

DCS, G-2

Deputy Chief of Staff, G-2

DDPSS

department-determined personnel security status

DIS

Defense Investigative Service

DISCO

Defense Industrial Security Clearance Office

DNACI

DOD National Agency Check and written inquiries

DOE

Department of Energy

DOHA

Defense Office of Hearings and Appeals

DPOB

date and place of birth

DUSD(P)

Deputy Under Secretary of Defense for Policy

ENTNAC

Entrance National Agency Check

FBI

Federal Bureau of Investigation

HQDA

Headquarters, Department of the Army

INS

Immigration and Naturalization Service

IRR

Individual Ready Reserve

LAA

limited access authorization

LAC

local agency check

LCR

listed character reference

LOI

letter of intent

MACOM

major Army command

MOS

military occupational specialty

MPRJ

Military Personnel Records Jacket

MTOE

modification table of organization and equipment

NAC

National Agency Check

NACI

National Agency Check and written inquiries

NAFI

nonappropriated fund instrumentality

NATO

North Atlantic Treaty Organization

NRC

Nuclear Regulatory Commission

NSA

National Security Agency

ODCS, G-1

Officer of the Deputy Chief of Staff, G-1

OJCS

Office of the Joint Chiefs of Staff

OMPF

official military personnel file

OPF

official personnel folder

OPM

Office of Personnel Management

OSS

Office of Strategic Services

PIC

personnel investigation center

PR

periodic reinvestigation

PRP

Personnel Reliability Program

PSAB

Personnel Security Appeals Board

PSI

personnel security investigation

PSQ

personal security questionnaire

ROTC

Reserve Officer Training Corps

SA

Secretary of the Army

SBI

special background investigation

SCI

sensitive compartmented information

SIDPERS

Standard Installation/Division Personnel

SII

special investigative inquiry

SIOP-ESI

Single Integrated Operation Plan-Extra Sensitive Information

SSN

social security number

SSO

special security officer

TAPA

Total Army Personnel Agency

UCMJ

uniform code of military justice

USO

United Services Organization

WHLO, OCSA

White House Liaison Office, Office of the Chief of Staff, Army

Section II

Terms

Access

The ability and opportunity to obtain knowledge of classified information. An individual, in fact, may have access to classified information by being in a place where such information is kept, if the security measures that are in force do not prevent him from gaining knowledge of such information.

Adverse action

A removal from employment, suspension from employment of more than 14 days, reduction in grade, reduction in pay, or furlough of 30 days or less.

Applicant

A person not currently employed by the DA or serving in the Armed Forces, or a person being considered for employment for a sensitive position.

Background investigation

A PSI consisting of both record reviews and interviews with sources of information as prescribed in paragraph B-3 , appendix B, this regulation, covering the most recent 5 years of an individual's life or since the 18th birthday, whichever is shorter, provided that at least the last 2 years are covered and that no investigation will be conducted prior to an individual' s 16th birthday.

Classified information

Official information or material that requires protection in the interests of national security and that is classified for such purpose by appropriate classifying authority in accordance with the provisions of Executive Order 12356 (reference (j)).

Close and continuous relationship

Persons to whom subject is bound by affection or obligation. May include sharing living quarters with an individual even though no intimate relationship exists.

Close foreign ties

Recurring contact, either personal or by correspondence, with foreign nationals residing in a foreign country.

Compelling need

ccess to Sensitive Compartmented information (SCI) is urgently required by an individual to prevent failure or serious impairment of missions or operations that are in the best interest of national security.

Competent medical authority

A board-eligible or board-certified psychiatrist or clinical psychologist employed by or under contract to the U.S. military or U.S. Government.

Defense Central Index of Investigation

An alphabetical index of personal names and impersonal titles that appear as subjects of incidents in investigative documents held by the criminal, counterintelligence, fraud, and personnel security investigative activities of the Defense Investigative Service (DIS), the Defense Criminal Investigative Service (DCIS), and the NSA. DCII records will be checked on all subjects of DOD investigations.

Defense Central Security Index

An automated subsystem of the Defense Central Index of Investigations (DCII) designed to record the issuance, denial or revocation of security clearances, access to classified information, or assignment to a sensitive position by all DOD Components for military, civilian, and contractor personnel. The DCSI will serve as the central DOD repository of security-related actions in order to assist DOD security officials in making sound clearance and access determinations. The DCSI shall also serve to provide accurate and reliable statistical data for senior DOD officials, Congressional committees, the General Accounting Office and other authorized Federal requesters.

Denial of security clearance

The refusal to grant a security clearance or to grant a higher level of clearance to a person who possesses a clearance of a lower degree.

Department-determined personnel security status

Information that constitutes a possible basis for taking an adverse or unfavorable personnel security action.

a. Adverse loyalty information (see paras 2-4 a-f, k , and app E, para 3).

b. Adverse suitability information (see paras 2-200 g through j and 2-4 through q and app E, paras 1, 2, 4, 5, and 6).

DOD component

Includes the Office of the Secretary of Defense; the military departments; Organization of the Joint Chiefs of Staff; Directors of Defense Agencies and the United and Specified Commands.

Entrance national agency check

A PSI scoped and conducted in the same manner as a national agency check except that a technical fingerprint search of the files of the Federal Bureau of Investigation is not conducted.

Federal service

Federal service consists of active duty in the military services, Federal civilian employment, membership in the ARNG or U.S. Army Reserve (includes Troop Program Units, Individual Mobilization Augmentee (IMA), and Individual Ready Reserve), membership in the ROTC Scholarship Program, Federal contractor employment with access to classified information under the Industrial Security Program, or a combination thereof, without a break exceeding 12 months.

Head of DOD component

The Secretary of Defense; the Secretaries of the Military Departments; the Chairman, Joint Chiefs of Staff; and the Commanders of Unified and Specified Commands; and the Directors of Defense Agencies.

Immediate family

Includes subject's spouse, parents, brothers, sisters, and children.

Immigrant alien

Any alien lawfully admitted into the United States under an immigration visa for permanent residence.

Interim security clearance

A security clearance based on the completion of minimum investigative requirements, which is granted on a temporary basis, pending the completion of the full investigative requirements.

Limited access authorization

Authorization for access to CONFIDENTIAL or SECRET information granted to non-U.S. citizens and immigrant aliens, which is limited to only that information necessary to the successful accomplishment of their assigned duties and based on a background investigation scoped for 10 years (see app J ).

Local records check

A review of local personnel, post military police, medical records, and other security records, as appropriate.

Major Army command (MACOM)

A command directly subordinate to, established by authority of, and specifically designated by HQDA. Army component of Unified and Specified Commands are MACOMs.

Minor derogatory information

Information that, by itself, is not of sufficient importance or magnitude to justify an unfavorable administrative action in a personnel security determination.

National Agency Check

A PSI consisting of a records review of certain national agencies as prescribed in paragraph 1, appendix B , this regulation, including a technical fingerprint search of the files of the FBI.

National Agency Check and written inquiries

A personnel security investigation conducted by the Office of Personnel Management, combining a NAC and written inquiries to law enforcement agencies, former employers and supervisors, references and schools.

DOD National Agency Check and written inquiries

A personnel security investigation conducted by the DIS for access to SECRET information consisting of a NAC, a credit bureau check, and written inquiries to current and former employers (see para B-2 , app B), covering a 5-year scope.

National of the United States

A citizen of the United States or a person who, though not a citizen, owes permanent allegiance to the United States. The provisions of this regulation are equally applicable to U.S. citizens and U.S. nationals.

National security

National security means the national defense and foreign relations of the United States.

Need to know

A determination made by a possessor of classified information that a prospective recipient, in the interest of national security, has a requirement for access to, knowledge, or possession of the classified information in order to perform tasks or services essential to the fulfillment of an official U.S. Government program. Knowledge of, possession of, or access to, classified information shall not be afforded to any individual solely by virtue of the individual's office, position, or security clearance.

Periodic reinvestigation

An investigation conducted every 5 years for the purpose of updating a previously completed background or special background investigation on persons occupying positions referred to in paragraphs 3-55 through 3-67. The scope will consist of a personal interview, NAC, LACs, credit bureau checks, employment records, employment references and developed character references and will normally not exceed the most recent 5-year period.

Personnel security

The application of standards and criteria to determine whether or not an individual is eligible for access to classified information, qualified for assignment to or retention in sensitive duties, and suitable for acceptance and retention in the total Army consistent with national security interests.

Personnel security investigation

Any investigation required for the purpose of determining the eligibility of DOD military and civilian personnel, contractor employees, consultants, and other persons affiliated with the DOD, for access to classified information, acceptance or retention in the Armed Forces, assignment or retention in sensitive duties, or other designated duties requiring such investigation. PSIs include investigations of affiliations with subversive organizations, suitability information, or hostage situations (see para 2-18 ) conducted for the purpose of making personnel security determinations. They also include investigations of allegations that arise subsequent to adjudicative action and require resolution to determine an individual's current eligibility for access to classified information or assignment or retention in a sensitive position.

Polygraph examination

A voluntary examination by qualified examiners using polygraph equipment approved by the DA. ( AR 195-6 applies).

Revocation of security clearance

The cancellation of a person's eligibility for access to classified information.

Scope

The time period to be covered and the sources of information to be contacted during the prescribed course of a PSI.

Security clearance

A determination that a person is eligible under the standards of this regulation for access to classified information.

Senior officer of the Intelligence Community

The DOD Senior Officers of the Intelligence Community include: the Director, National Security Agency/Central Security Service; Director, Defense Intelligence Agency; DCS, G-2, U.S. Army; Assistant Chief of Staff for Intelligence, U.S. Air Force; and the Director of Naval Intelligence, U.S. Navy.

Sensitive compartmented information

Classified information concerning or derived from intelligence sources, methods, or analytical processes that must be handled exclusively within formal access control systems established by the DCI. DCID Directive (DCID) 1/14 contains the minimum personnel security standards and procedures governing eligibility for access to SCI.

Sensitive position

Any position so designated within the DOD, the occupant of which could bring about, by virtue of the nature of the position, a materially adverse effect on the national security. All civilian positions are either critical-sensitive, noncritical-sensitive, or non-sensitive as described in paragraph 3 .

Significant derogatory information

Information that could, in itself, justify an unfavorable administrative action, or prompt an adjudicator to seek additional investigation or clarification.

Special access program

Any program imposing "need-to-know" or access controls beyond those normally provided for access to CONFIDENTIAL, SECRET, OR TOP SECRET information. Such a program may include, but not be limited to, special clearance, adjudication, investigative requirements, material dissemination restrictions, or special lists of persons determined to have a need to know.

Special background investigation

A PSI consisting of all of the components of a BI plus certain additional investigative requirements as prescribed in paragraph B-4 , appendix B, this regulation. The period of investigation for an SBI is the last 15 years or since the 18th birthday, whichever is shorter, provided that the last 2 full years are covered and that no investigation will be conducted prior to an individual' s 16th birthday.

Special investigative inquiry

A supplemental PSI of limited scope conducted to prove or disprove relevant allegations that have arisen concerning a person upon whom a personnel security determination has been previously made and who, at the time of the allegation, holds a security clearance or otherwise occupies a position that requires a personnel security determination under the provisions of this regulation.

Special geographic area

The assignment location of a person. It is determined by the Commanding General, U.S. Army Human Resources Command with the DCS, G-2.

Service

Honorable active duty (including attendance at the military academies), membership in ROTC Scholarship Program, Army and Air Force National Guard, Military Reserve Force (including active status and ready reserve), civilian employment in Government service, or civilian employment with a DOD contractor or as a consultant involving access under the DOD Industrial Security Program. Continuity of service is maintained with change from one status to another as long as there is no single break in service greater than 12 months. Service for nuclear and chemical surety positions is defined in AR 50-5 and AR 50-6 and in this regulation.

Suspension of access

The temporary withdrawal of a person's eligibility for access to classified information. Access is suspended when information becomes known that casts doubt on whether continued access is consistent with national security interests.

Unfavorable administrative action

Adverse action taken as the result of personnel security determinations and unfavorable personnel security determinations as defined in this regulation.

Unfavorable personnel security determination

A denial or revocation of clearance for access to classified information; denial or revocation of access to classified information; denial or revocation of a special access authorization (including access to SCI); retention, non-appointment to or non-selection for appointment to a sensitive position; retention, non-appointment to or non-selection for any other position requiring a trustworthiness determination under this regulation; reassignment to a position of lesser sensitivity or to a non-sensitive position; and nonacceptance for or discharge from the Armed Forces when any of the foregoing actions are based on derogatory information of personnel security significance.

United States citizen

a. Native born. A person born in one of the 50 United States, Puerto Rico, Guam, American Samoa, Northern Marina Islands; U.S. Virgin Islands; or Panama Canal Zone (if the father or mother (or both) was or is a citizen of the United States).

b. Naturalized. A person born outside of the United States who has completed naturalization procedures and has been given U.S. citizenship by duly constituted authority.

c. Derivative birth. A person born outside the United States who acquires U.S. citizenship at birth because one or both of their parents are U.S. citizens at the time of the person's birth.

d. Derivative naturalization. A person who acquires U.S. citizenship after birth through naturalization of one or both parents.

Section III

Special Terms

There are no special terms.