DCID 1/14, Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information (SCI) was approved by the Director of Central Intelligence (DCI) on 22 January 1992. DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 1/14
PREFACE TO REVISED DCID 1/14:Portions of DCID 1/14 have been revised and a new annex added. A complete copy of DCID 1/14 consists of the basic DCID and Annexes A through D. The annexes are as follows:
Note: On 12 August 1994, the DCI also approved amending Section 10, Periodic Reinvestigations, of DCID 1/14 to eliminate the requirement for technical fingerprint checks as part of the national agency check, if technical fingerprint checks were previously submitted during the initial background investigation.
- Annex A - Adjudication Guidelines (revised/approved effective 12 August 1994)
- Annex B - Appeals (revised/approved effective 14 April 1994)
- Annex C - Standards for SCI Security Awareness Programs in the US Intelligence Community (approved with basic DCID, effective 22 January 1992)
- Annex D - Quality Control Guidelines for the Single Scope Background Investigation (new and approved on 12 August 1994)
Pursuant to the provisions of Section 102 of the National Security Act of 1947 and Executive Order 12333, the following personnel security standards, procedures, and continuing security programs are hereby established for all US Government civilian and military personnel, consultants, contractors, employees of contractors, and other individuals who require access to sensitive compartmented information (SCI). Individual departments and agencies may establish such additional security steps as may be deemed necessary and appropriate to resolve issues and/or address employment standards unique to them to ensure that effective security is maintained. DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 1/14 1
PERSONNEL SECURITY STANDARDS AND
PROCEDURES GOVERNING ELIGIBILITY FOR
ACCESS TO SENSITIVE COMPARTMENTED
INFORMATION (SCI) (Effective 22 January 1992)1. Definitions
a. Cohabitant--A person living in a spouse-like relationship with the individual requiring sensitive compartmented information, but not necessarily dependent on sexual relations.
2. Purposeb. Compelling Need--A signed determination by a Senior Official of the Intelligence community or his/her designee that the services of an individual are deemed essential to operation or mission accomplishment.
c. Determination Authority--A designee of a Senior Official of the Intelligence community authorized to render a decision with respect to sensitive compartmented information access eligibility or ineligibility.
d. Immediate Family--The spouse, parents, sisters, children, and cohabitant of the individual requiring sensitive compartmented information access.
e. Intelligence Community--Those US Government organizations and activities identified in EO 12333 or successor orders as making up such Community.
f. Senior Officials of the Intelligence Community (SOICs)--The heads of organizations within the Intelligence Community, as defined by EO 12333, or their designated representatives.
g. Sensitive Compartmented Information--Classified information concerning or derived from intelligence sources, methods, or analytical processes requiring handling exclusively within formal access control systems established by the Director of Central Intelligence.
The purpose of this directive is to enhance the security protection of SCI through the application of personnel security standards, procedures, and continuing security programs and to facilitate the security certification process among government departments and agencies.
3. Applicability
The provisions of this directive will apply to all persons (other than elected officials of the US Government, Federal judges, and those individuals for whom the Director of Central Intelligence [DCI] makes a specific exception) without regard to a civilian or military status, form of employment, official rank or position, or length of service. This directive does not apply to situations involving the duly authorized disclosure of SCI to representatives of foreign governments and international organizations.
4. General
a. Individuals who do not meet the security criteria contained herein and who are, therefore, denied access to other classified information. Individuals whose access to SCI has been authorized as an exception granted in accordance with paragraph 6 of this directive will not solely for that reason, be considered eligible for access to other classified information.
5. Personnel Security Standardsb. The granting of access to SCI will be controlled under the strictest application of the "need-to-know" principle and in accordance with the personnel security standards and procedures set forth in this directive. In accordance with National Security Decision Directive 84 and the supplement to DCID 1/19, DCI Security Policy Manual for SCI Control Systems, signature of a DCI-authorized nondisclosure agreement that includes a provision for prepublication review is a condition of access to SCI.
Criteria for security approval of an individual on a need-to-know basis for access to SCI follow:
a. The individual must be stable; trustworthy; reliable; of excellent character, judgment,and discretion; and of unquestioned loyalty to the United States.
6. Exceptions to Personnel Security Standardsb. The individual requiring access to SCI must be a US citizen.
c. The individual's immediate family must also be US citizens. An exception to this requirement may be granted when compelling need exists as defined in paragraph 1.b., and a determination has been made by a competent authority as described in paragraph 6 below that under the circumstances the security risk is negligible.
d. Members of the individual's immediate family and any other persons to whom he or she is bound by affection or obligation should neither be subject to physical, mental, or other forms of duress by a foreign power or by persons who may be or have been engaged in criminal activity, nor advocate the use of force or violence to overthrow the Government of the United States or the alteration of the form of Government of the United States by unconstitutional means.
Exceptions to paragraph 5.e. and d. above may be granted only by the SOIC of the appropriate organization or his/her designee unless such authority has been specifically delegated to the head of an office or organization as set forth in interdepartmental agreements. All exceptions granted will be common sense determinations based on all available information that the risk to national security is negligible and will be recorded by the organization making the exception. In those eases in which the individual has lived outside of the United States for a substantial period of his or her life, a thorough assessment of the adequacy of the investigation in terms of fulfillment of the investigative requirements and judicious review of the information therein must be made before an exception is considered.
7. Investigative Requirements
a. The investigation conducted on an individual under consideration for access to SCI will be thorough and designed to develop information as to whether the individual clearly meets the SCI personnel security standards.
8. Standards for the Investigationb. The investigation will be accomplished through records checks and personal interviews of various sources by trained investigative personnel in order to establish affirmatively to the adjudicating agency complete continuity of identity to include birth, residences, education, employment, unemployment, and military service.
c. The individual will furnish a current signed personal history statement, fingerprints of a quality acceptable to the Federal Bureau of Investigation, and signed release(s), as necessary, authorizing custodians of police, credit, financial, education, and medical records to provide record information to the investigative agency. Photographs of the individual will also be obtained where additional corroboration of identity is required.
d. When conditions indicate, investigation of immediate family members will be conducted to the extent necessary to permit a determination by the adjudicating agency that the provisions of paragraph 5 of this directive are met.
e. Where a previous investigation has been conducted within the past five years that meets the standards in paragraph 8, it will serve as a basis for granting access approval provided a review of the security file or other information source does not reveal substantial changes in the individual's security eligibility. If a previous investigation does not meet the paragraph 8 standards or if it is more than five years old, a current investigation will be required but may be limited to that necessary to bring the individual's file up-to-date in accordance with the investigative requirements set forth in paragraph 8 of this directive. Should new information be developed during the current investigation that bears unfavorably on the individual's activities covered by the previous investigation, the current inquiries will be expanded as necessary to develop full details of this information. Notwithstanding the status of an individual's background investigation, departments and agencies with policies sanctioning the use of the polygraph for personnel security purposes may require polygraph examinations when deemed necessary by the department or agency head to be in the national security interest of the United States.
a. Scope--Past 10 years or to age 18, whichever is less.
b. Expansion of Investigation--When conditions indicate, and to the extent necessary to permit a determination by the adjudicating agency that the provisions of the SCI personnel security standards are met, the investigation may be expanded to resolve issues and/or address employment standards unique to individual agencies.
c. National Agency Check--Check on subject and spouse/cohabitant of investigative and criminal history files of the Federal Bureau of Investigation, including submission of subjects fingerprint charts, and such other national agencies (Defense Central Index of Investigations, Immigration and Naturalization Service, Office of PersonnelManagement, Central Intelligence Agency etc.) as appropriate to the individual's background.
d. Subject Interview--A subject interview will be required in all cases and will be conducted by trained security, investigative, or counterintelligence personnel to ensure full investigative coverage. An additional personal interview will be conducted when necessary to resolve any significant adverse information and/or inconsistencies developed during the investigation. In departments or agencies with policies sanctioning the use of the polygraph for personnel security purposes, the personal interview may include a polygraph examination conducted by a qualified polygraph examiner.
e. Birth--Independent certification of date and place of birth received directly from appropriate registration authority.
f. Citizenship--Independent verification of citizenship will be accomplished directly from appropriate registration authority. For foreign-born immediate family members, verification of citizenship or legal status is also required.
g. Education--Independent verification of the most recent or significant claimed attendance at an educational institution and/or degree/diploma within the past 10 years will be accomplished via sealed transcript received directly from the institution. If all education is outside of the investigative scope, the last education above high school will be verified.
h. Employment--Direct verification of all periods of employment during the past 10 years or since age 18, whichever is the shorter period, but in any event the most recent two years. Personal interviews with two sources (supervisor/coworker) for each employment of six months or more shall be attempted. In the event no employment exceeds six months, interviews of supervisor/coworker shall be attempted. The investigation conducted on an individual under consideration for access to SCI will be thorough and designed to develop information as to whether the individual clearly meets the SCI personnel security standards.
i. References--Interviews with a sufficient number of knowledgeable sources (a minimum of one listed and three developed) having, to the extent practical, social knowledge of the subject and collectively span the 10 years or scope of the investigation. As appropriate, additional interviews may include cohabitant, ex-spouse(s), and relatives. Interviews with psychological/medical personnel are to be accomplished as required to resolve issues.
j. Neighborhood--Interviews with neighbors in the vicinity of all of subject's residences in excess of six months throughout the most recent five-year period. Confirmation of current residence will be accomplished regardless of length, to include a review of rental records if necessary. In the event no residence exceeds six months, interviews of neighbors should be undertaken.
k. Credit--Verification of the subject's financial status and credit habits through checks of appropriate credit and/or financial institutions where subject has resided, been employed, or attended school for six months or more for the last seven years.
1. Local Agency Checks--A check of appropriate police records covering all locations where the subject has resided, been employed, or attended school for six months or more, to the most recent 10 years or since age 18, whichever is the shorter period. In the event that no residence, employment, or education exceeds six months, local agency checks should be performed.
m. Public Records--All prior Federal/military service and type of discharge(s) shall be verified. Verification of divorce(s), bankruptcy, etc., and any other court (civil or criminal) actions to which the subject has been or is a party within the scope of the investigation, when known or developed.
n. Overseas Verification Procedure--Where employment, education, or residence has occurred in foreign countries (except for periods of less than one year for personnel on US Government assignment and less than 90 days for other purposes) during the past 10 years or since age 18, a cheek of the records will be made at the Department of State and/or other appropriate agencies. Efforts shall be made to develop sources, generally in the United States, who knew the subject overseas in order to cover significant employment, education, or residence and to attempt to determine if any lasting foreign contacts or connections were established during this period. However, in all cases where the subject has worked or lived outside the US continuously for over one year, the investigation will be expanded to cover fully this period in his or her life through the use of such investigative assets and checks of record sources as may be available to the US Government in the foreign country(ies) in which the subject resided.
o. Transferability--Paragraph 7e. above outlines transferability requirements.
9. Exception to Investigative Requirements
a. In exceptional cases, including national emergency situations and hostilities involving US personnel, the SOIC or his designee may determine that it is necessary or advisable in the national interest to authorize access to SCI before completion of the full Iinvestigation noted in paragraph 8. In this situation, such investigative checks as are immediately possible will be made at once and will include a personal interview of the individual by trained security, investigative, or counterintelligence personnel. Access in such cases will be strictly controlled. A full investigation and final evaluation will be completed at the earliest practicable moment unless an exception is granted by the DCI. Certification to other organizations of individuals authorized access in such cases will include explicit notification of the exception.
10. Periodic Reinvestigationsb. In extremely rare instances, the SOIC or his designee may approve one-time, limited access to SCI, which is deemed necessary to accomplish unique mission requirements. Limited SCI access may only be considered for individuals who have been granted a Top Secret clearance based on a background investigation and who have undergone a favorable personnel security interview. SCI access will not exceed 90 days and will be limited to the absolute minimum duration to accomplish the task or assignment.Indoctrination briefings will be modified to the basic information necessary to ensure protection of the SCI to which exposed, and appropriate nondisclosure agreements will be signed by the individual gaining access.
a. Programs will be instituted requiring the periodic reinvestigation of personnel provided access to SCI. These reinvestigation will be conducted on a five-year recurrent basis, but on a more frequent basis where the individual has shown some questionable behavioral pattern, or his or her activities are otherwise suspect. A reinvestigation may also be conducted when a break in service of one year or more has occurred, or as otherwise deemed necessary by the SOIC or his designee.
11. Outside Activitiesb. The scope of reinvestigations will be determined by the SOIC concerned based on such considerations as the potential damage that might result from the individual's defection or willful compromise of SCI and the availability and probable effectiveness of other means to evaluate continually those factors related to the individual's suitability for continued access. The individual will furnish a current signed personal history statement and signed releases as necessary. In all cases, the reinvestigation will include reference interviews, appropriate residence coverage, national Investigative Requirements and local agency cheeks, overseas checks where appropriate, and credit cheeks. A personal interview with the individual will be conducted by trained investigative, security, or counterintelligence personnel. In departments or agencies with policies sanctioning the use of the polygraph for personnel security purposes, the personal interview may include a polygraph examination conducted by a qualified polygraph examiner. When conditions so indicate, additional investigation may be conducted as determined by the SOIC or his designee.
Individuals who hold, or are being considered for, SCI access approval will have made available to them for reading, the second and third paragraphs of the "Outside Activities" section of Annex A of this directive and will be instructed to report in writing to their security officer any existing or contemplated outside employment or activity that appears to meet the criteria of those paragraphs. Written reports must be submitted before accepting any outside employment or participating in any activity as defined in Annex A of this directive. In addition, initial or updated personal history statements must include details of outside employment or activities (as defined in Annex A). Investigation must cover the reported outside employment or activities. Information concerning actual or planned outside employment or activities that would create a potential risk to the security of SCI will be evaluated in accordance with the factors specified in Annex A to determine whether the circumstances create an unacceptable risk of unauthorized disclosure.
12. Determinations of Access Eligibility
The evaluation the information developed by investigation of an individual's loyalty and suitability will be accomplished under the cognizance of the SOIC concerned by analysts of broad knowledge, good judgment, and wide experience in personnel security and/or counterintelligence information developed on an individual is favorable , a minor investigative requirement that has not should not preclude favorable adjudication [sic]. In all evaluations, the protection of the national interest is paramount. Any doubt concerning personnel having access to SCI should be resolved in favor of the national security, and the access should be denied or revoked. The ultimate determination of whether the granting of access is clearly consistent with the interest of national security will be an overall commonsense determination based on all available information.
13. Appeals Procedures
Annex B prescribes common appeals procedures to be followed when an individual's SCI access has been denied or revoked.
14. Continuing Security Programs
a. In order to facilitate attainment of the highest standard of personnel security and to augment both the access approval criteria and the investigative requirements established by this directive, member departments and agencies shall institute continuing security programs for all individuals having access to SCI. In addition to security indoctrinations (see Annex C, "Standards for SCI Security Awareness Programs in the US Intelligence Community"), these programs will be tailored to create mutually supporting procedures under which no issue will escape notice or be left unresolved that brings into question an individual's loyalty and integrity or suggests the possibility of his or her being subject to undue influence or duress through foreign relationships or exploitable personal conduct. When an individual is assigned to perform sensitive work requiring access to SCI, the SOIC for the department, agency, or government program to which the individual is assigned will assume security supervision of that individual throughout the period of his or her assignment.
15. Implementationb. The continuing security programs will include the following:
(1) Individuals are required to inform the department or agency that grants their SCI access about any personal problem or situation that may have a possible bearing on their eligibility for continued access to SCI and to seek appropriate guidance and assistance. Security counseling should be made available. This counseling should be conducted by individuals having extensive background and experience regarding the nature and special vulnerabilities of the particular type of compartmented information involved.
c. Whenever adverse or derogatory information is discovered or inconsistencies arise that could impact on an individual's security status, appropriate investigation will be conducted on a timely basis. The investigation will be of sufficient scope necessary to resolve the specific adverse or derogatory information or inconsistency in question so that a determination can be made as to whether the individual's continued utilization in activities requiring SCI is dearly consistent with the interest of national security.(2) SCI security education programs of the member departments and agencies will be established and maintained pursuant to the requirements of Annex C of this directive.
(3) Security supervisory programs will be established and maintained to ensure that supervisory personnel recognize and discharge their special responsibility to safeguard SCI, including the need to assess continued eligibility for SCI access.These programs will provide practical guidance on indicators that may signal matters of security concern. Specific instructions concerning reporting procedures will be disseminated to enable the appropriate authority to take timely corrective action to safeguard the security of the United States as well as to provide all necessary help to the individual concerned to neutralize his or her vulnerability.
(4) Security review programs to ensure that appropriate security authorities always receive and exchange, in a timely manner, all information bearing on the security posture of persons having access to SCI. Personal history information will be kept current. Security and related files will be kept under continuing review.
(5) Where permitted by agency policy, security review programs may include the use of polygraph examinations conducted by a qualified polygraph examiner.
Existing directives, regulations, agreements, and other guidance governing access to SCI as defined herein will be revised accordingly.
1 This directive supersedes DCID 1/14, effective 14 April 1986.
DCID 1/14
ANNEX AAdjudicative Guidelines for Determining Eligibility for
Access to Sensitive Compartmented Information (SCI)(Effective 12 August 1994)
PURPOSE
The following adjudicative guidelines are established for all U.S. government civilian and military personnel, consultants, contractors, employees of contractors and other individuals who require access to SCI. They apply to persons being considered for initial or continued eligibility for access to SCI and are to be used by government departments and agencies in all final SCI access determinations.
ADJUDICATIVE PROCESS
The adjudicative process is an examination of a sufficient period of a person's life to make an affirmative determination that the person is an acceptable security risk. Eligibility for access to SCI is predicated upon the individual meeting these personnel security guidelines. The adjudication process is the careful weighing of a number of variables known as the whole person concept. All available, reliable information about the person, past and present, favorable and unfavorable, should be considered in reaching a determination. In evaluating the relevance of an individual's conduct, the adjudicator should consider the following factors:
The nature, extent, and seriousness of the conduct
Each case must be judged on its own merits and final determination remains the responsibility of the specific department or agency. Any doubt concerning personnel being considered for access to SCI will be resolved in favor of the national security and considered final.The circumstances surrounding the conduct, to include knowledgeable participation
The frequency and recency of the conduct
The individual's age and maturity at the time of the conduct
The voluntariness of participation
The presence or absence of rehabilitation and other pertinent behavioral changes
The motivation for the conduct
The potential for pressure, coercion, exploitation, or duress
The likelihood of continuation or recurrence
The ultimate determination of whether the granting or continuing of SCI access eligibility is clearly consistent with the interests of national security must be an overall common sense determination based upon careful consideration of the following:
A. Allegiance to the United States
Each of the foregoing should be evaluated in the context of the whole person. Although adverse information concerning a single criterion may not be sufficient for an unfavorable determination, the individual may be disqualified if available information reflects a recent or recurring pattern of questionable judgment, irresponsibility, or emotionally unstable behavior. However, notwithstanding the whole person concept, pursuit of further investigation may be terminated by an appropriate adjudicative agency in the face of reliable, significant, disqualifying, adverse information on.B. Foreign influence
C. Foreign preference
D. Sexual behavior
E. Personal conduct
F. Financial considerations
G. Alcohol consumption
H. Drug involvement
I. Emotional, mental, and personality disorders
J. Criminal conduct
K. Security violations
L. Outside activities
When information of security concern becomes known about an individual who is currently eligible for access to SCI, the adjudicator should consider whether the person: (1) voluntarily reported the information; (2) sought assistance and followed professional guidance, where appropriate; (3) resolved or appears likely to favorably resolve the security concern; (4) has demonstrated positive changes in behavior and employment; (5) should have his or her SCI access temporarily suspended pending final adjudication of the information.
If after evaluating information of security concern, the adjudicator decides that the information is not serious enough to warrant a recommendation of disapproval or revocation of SCI access, it may be appropriate to recommend approval with a warning that future incidents of a similar nature may result in revocation of access.
The information in bold print at the beginning of each adjudicative guideline provides a brief explanation of its relevance in determining whether it is clearly consistent with the interest of national security to grant or continue a person's eligibility for access to SCI.
A. ALLEGIANCE TO THE UNITED STATES ADJUDICATIVE GUIDELINES
An individual must be of unquestioned allegiance to the United States. The willingness to safeguard classified information is in doubt if there is any reason to suspect an individual's allegiance to the United States.
Conditions that signal security concern and may be disqualifying include: (1) involvement in any act of sabotage, espionage, treason, terrorism, sedition, or other act whose aim is to overthrow the Government of the United States or alter the form of government by unconstitutional means; (2) association or sympathy with persons who are attempting to commit, or who are committing, any of the above acts; (3) association or sympathy with persons or organizations that advocate the overthrow of the United States Government, or any state or subdivision, by force or violence or by other unconstitutional means; (4) involvement in activities which unlawfully advocate or practice the commission of acts of force or violence to prevent others from exercising their rights under the Constitution or laws of the United States or of any state.
Conditions that could mitigate security concerns include: (1) the individual was unaware of the unlawful aims of the individual or organization and severed ties upon learning of these; (2) the individual's involvement was only with the lawful or humanitarian aspects of such an organization; (3) involvement in the above activities occurred for only a short period of time and was attributable to curiosity or academic interest; (4) the person has had no recent proscribed involvement or association with such activities.
B. FOREIGN INFLUENCE
A security risk may exist when an individual's immediate family, including cohabitants, and other persons to whom he or she may be bound by affection, influence, or obligation are: (1) not citizens of the United States or (2) may be subject to duress. These situations could create the potential for foreign influence that could result in the compromise of classified information. Contacts with citizens of other countries or financial interests in other countries are also relevant to security determinations if they make an individual potentially vulnerable to coercion, exploitation, or pressure.
Conditions that signal security concern and may be disqualifying include: (1) an immediate family member, or a person to whom the individual has close ties of affection or obligation, is a citizen of, or resident or present in, a foreign country; (2) sharing living quarters with a person or persons, regardless of their citizenship status, if the potential for adverse foreign influence or duress exists; (3) relatives, cohabitants, or associates who are connected with any foreign government; (4) failing to report, where required, associations with foreign nationals; (5) unauthorized association with a suspected or known collaborator or employee of a foreign intelligence service; (6) conduct which may make the individual vulnerable to coercion, exploitation, or pressure by a foreign government; (7) indications that representatives or nationals from a foreign country are acting to increase the vulnerability of the individual to possible future exploitation, coercion or pressure; (8) a substantial financial interest in a country, or in any foreign owned or operated business that could make the individual vulnerable to foreign influence.
Conditions that could mitigate security concerns include: (1) a determination that the immediate family member(s), cohabitant, or associate(s) in question would not constitute an unacceptable security risk; (2) contacts with foreign citizens are the result of official U.S. Government business; (3) contact and correspondence with foreign citizens are casual and infrequent; (4) the individual has promptly reported to proper authorities all contacts, requests, or threats from persons or organizations from a foreign country, as required; (5) foreign financial interests are minimal and not sufficient to affect the individual's security responsibilities.
C. FOREIGN PREFERENCE
When an individual acts in such a way as to indicate [less than complete loyalty to the United States or] a preference for a foreign country over the United States, then he or she may be prone to provide information or make decisions that are harmful to the interests of the United States.
Conditions that signal security concern and may be disqualifying include: (1) the exercise of dual citizenship; (2) possession and/or use of a foreign passport; (3) military service or a willingness to bear arms for a foreign country; (4) accepting educational, medical, or other benefits, such as retirement and social welfare, from a foreign country; (5) residence in a foreign country to meet citizenship requirements; (6) using foreign citizenship to protect financial or business interests in the country; (7) seeking or holding political office in the foreign country; (8) voting in foreign elections; and (9) acting as an agent or representative of a foreign country.
Conditions that could mitigate security concerns include: (1) dual citizenship is based solely on parents' citizenship or birth in a country; (2) indicators of possible foreign preference (e.g., foreign military service) occurred before obtaining United States citizenship; (3) activity is sanctioned by the United States; (4) individual has expressed a willingness to renounce dual citizenship.
D. SEXUAL BEHAVIOR
Sexual behavior is a security concern if it involves a criminal offense, indicates a personality or emotional disorder, subjects the individual to undue influence or coercion, or reflects lack of judgment or discretion. *
Conditions that signal security concern and may be disqualifying include: (1) sexual behavior of a criminal nature, whether or not the individual has been prosecuted; (2) compulsive or addictive sexual when the person is unable to stop a pattern of self-destructive or high-risk behavior or that which is symptomatic of a personality disorder; (3) sexual behavior that causes an individual to be vulnerable to undue influence or coercion; (4) sexual behavior of a public nature and/or that which lack of discretion or judgment [sic].
Conditions.that could mitigate security concerns include: (1) the behavior occurred during or prior to adolescence and there is no evidence of subsequent conduct of a similar nature; (2) the behavior was not and there is no evidence of subsequent conduct of a similar nature; (3) there is no other evidence of questionable judgment, irresponsibility, or emotional instability; (4) the behavior no longer serves as a basis for undue influence or coercion.
* The adjudicator should also consider guidelines pertaining to criminal conduct (criterion J), or emotional, mental, and personality disorders (criterion I), in determining how to resolve the security concerns raised by sexual behavior.
E. PERSONAL CONDUCT
Conduct involving questionable judgment, untrustworthiness, unreliability, or unwillingness to comply with rules and regulations could indicate that the person may not properly safeguard classified information.
The following will normally result in an unfavorable SCI access action or administrative termination of further processing for access eligibility: (1) Refusal to undergo or cooperate with required security processing, including medical and psychological testing; or (2) refusal to complete required security forms, releases, or provide full, frank and truthful answers to lawful questions of investigators, security officials or other official representatives in connection with a personnel security or trustworthiness determination.
Conditions that signal security concern and may be disqualifying also include: (1) reliable, unfavorable information provided by associates, employers, coworkers, neighbors, and other acquaintances; (2) the deliberate omission, concealment, or falsification of relevant and material facts from any personnel security questionnaire, personal history statement, or similar form used to conduct investigations, determine employment qualifications, award benefits or status, determine SCI access eligibility or trustworthiness, or award fiduciary responsibilities; (3) deliberately providing false or misleading information concerning relevant and material matters to an investigator, security official, competent medical authority, or other official representative in connection with a personnel security or trustworthiness determination; (4) personal conduct or concealment of information that increases an individual's vulnerability to coercion, exploitation or pressure; (5) a pattern of dishonesty or rule violations*; (6) association with persons involved in criminal activity.
* To include violation of any written or recorded agreement made between the individual and the agency.
Conditions that could mitigate security concerns include: (I ) the information was unsubstantiated or not pertinent to a determination of judgment, trustworthiness, or reliability;(2) the falsification was an isolated incident, was not recent, and the individual has subsequently provided correct information voluntarily; (3) the individual made prompt, good-faith efforts to correct the falsification before being confronted with the facts; (4) omission of material facts was caused or significantly contributed to by improper or inadequate advice of authorized personnel,and the previously omitted information was promptly and fully provided; (5) the individual has taken positive steps to significantly reduce or eliminate vulnerability to coercion, exploitation, or pressure; (6) a refusal to cooperate was based on advice from legal counsel or over officials that the individual was not required to comply with security processing requirements and, upon being made aware of the requirement, fully and truthfully provided the requested information; (7) association with persons involved in criminal activities has ceased.F. FINANCIAL CONSIDERATIONS
An individual who is financially overextended is at risk of having to engage in illegal acts to generate funds. Unexplained affluence is often linked to proceeds from financially profitable criminal acts.
Conditions that signal security concern and may be disqualifying include: (1) a history of not meeting financial obligations; (2) deceptive or illegal financial practices such as embezzlement, employee theft, check fraud, income tax evasion, expense account fraud, filing deceptive loan statements, and other intentional financial breaches of trust; (3) inability or unwillingness to satisfy debts; (4) unexplained affluence; (5) financial problems that are linked to gambling, drug abuse, alcoholism, or other issues of security concern.
Conditions that could mitigate security concerns include: (1) the behavior was not recent; (2) it was an isolated incident; (3) the conditions that resulted in the behavior were largely beyond the person's control (e.g., loss of employment, a business downturn, unexpected medical emergency, or a death, divorce or separation); (4) the person has received or is receiving counseling for the problem and there are clear indications that the problem is being resolved or is under control; (5) the affluence resulted from a legal source; and (6) the individual initiated a good-faith effort to repay overdue creditors or otherwise resolve debts.
G. ALCOHOL CONSUMPTION
Excessive alcohol consumption often leads to the exercise of questionable judgment, unreliability, failure to control impulses, and increases the risk of unauthorized disclosure of classified information due to carelessness.
Conditions that signal security concern and may be disqualifying include: (1) alcohol-related incidents away from work, such as driving while under the influence, fighting, child or spouse abuse, or other criminal incidents related to alcohol use; (2) alcohol-related incidents at work, such as reporting for work or duty in an intoxicated or impaired condition, or drinking on the job; (3) diagnosis by a credential medical professional* of alcohol abuse or alcohol dependence; (4) habitual or binge consumption of alcohol to the point of impaired judgment; (5) consumption of alcohol, subsequent to a diagnosis of alcoholism by a credentialed medical professional* and following completion of an alcohol rehabilitation program.
Conditions that could mitigate security concerns include: (1) the alcohol related incidents do not indicate a pattern; (2) the problem occurred a number of years ago and there is no indication of a recent problem; (3) positive changes in behavior supportive of sobriety; (4) following diagnosis of alcohol abuse or alcohol dependence, the individual has successfully completed inpatient or outpatient rehabilitation along with aftercare requirements, participates frequently in meetings of Alcoholics Anonymous or a similar organization, abstained from alcohol for a period of at least 12 months, and received a favorable prognosis by a credentialed medical professional.*
* Credentialed medical professional: licensed physician, licensed clinical psychologist,or board certified psychiatrist
H. DRUG INVOLVEMENT
Improper or illegal involvement with drugs, raises questions regarding an individual's willingness or ability to protect classified information. Drug abuse or dependence may impair social or occupational functioning, increasing the risk of an unauthorized disclosure of classified information.
Drugs are defined as mood and behavior altering: (a) drugs, materials, and other chemical compounds identified and listed in the Controlled Substances Act of 1970, as amended (e.g., marijuana or cannabis, depressants, narcotics, stimulants, and hallucinogens) and (b) inhalants and other similar substances. Drug abuse is the illegal use of a drug or use of a legal drug in a manner that deviates from approved medical direction.
Conditions that signal security concern and may be disqualifying include: (1) any drug abuse (see above definition); (2) illegal drug possession, including cultivation, processing, manufacture, purchase, sale, or distribution; (3) failure to successfully complete a drug treatment program prescribed by a credentialed medical professional. Current drug involvement, especially following the granting of SCI access, or an expressed intent not to discontinue use, will normally result in an unfavorable determination.
Conditions that could mitigate security concerns include: (1) the drug involvement was not recent; (2) the drug involvement was an isolated or infrequent event; (3) a demonstrated intent not to abuse any drugs in the future; (4) satisfactory completion of a drug treatment program prescribed by a crcdentialed medical professional.*
* Credentialed medical professional: licensed physician, licensed clinical psychologist, or board certified psychiatrist
I. EMOTIONAL, MENTAL, AND PERSONALITY DISORDERSEmotional, mental, and personality disorders can cause a significant deficit in an individual's psychological, social and occupational functioning. These disorders are of security concern because they may indicate a defect in judgment, reliability or stability.
When appropriate, a credentialed mental health professional*, acceptable to or approved by the government, should be consulted so that potentially disqualifying and mitigating information may be fully and properly evaluated.
Conditions that signal security concern and may be disqualifying include: (1) a diagnosis by a credentialed mental health professional* that the individual has a disorder that could result in a defect in psychological, social, or occupational functioning; (2) information that suggests that an individual has failed to follow appropriate medical advice relating to treatment of a diagnosed disorder, e.g. failure to take prescribed medication; (3) a pattern of high-risk, irresponsible, aggressive, antisocial or emotionally unstable behavior; (4) information that suggests that the individual's current behavior indicates a defect in his or her judgment or reliability.
Conditions that could mitigate security concerns include: (1) there is no indication of a current problem; (2) recent diagnosis by a credentialed mental health professional* that an individual's previous emotional, mental, or personality disorder is cured or in remission and has a low probability of recurrence or exacerbation; (3) the past emotional instability was a temporary condition (e.g., one caused by a death, illness, or marital breakup), the situation has been resolved, and the individual is no longer emotionally unstable.
* credentialed mental health professional: licensed clinical psychologist, licensed socialworkers or board certified psychiatrist
J. CRIMINAL CONDUCTA history or pattern of criminal activity creates doubt about a person's judgment, reliability and trustworthiness.
Conditions that signal security concern and may be disqualifying include: (1) any criminal conduct, regardless of whether the person was formally charged; (2) a single serious crime or multiple lesser offenses.
Conditions that could mitigate security concerns include: (1) the criminal behavior was not recent; (2) the crime was an isolated incident; (3) the person was pressured or coerced into committing the act and those pressures are no longer present in that person's life; (4) the person did not voluntarily commit the act and/or the factors leading to the violation are not likely to recur, (5) there is clear evidence of successful rehabilitation.
K. SECURITY VIOLATIONS
Noncompliance with security regulations raises doubt about an individual's ability to safeguard classified information.
Conditions that signal security concern and may be disqualifying include: (1) unauthorized disclosure of classified information; (2) violations that are deliberate or multiple or due to negligence.
Conditions that could mitigate security concerns include actions that: (1) were inadvertent; (2) were isolated or infrequent; (3) were due to improper or inadequate training; (4) demonstrate a positive attitude towards the discharge of security responsibilities.
L. OUTSIDE ACTIVITIES
Involvement in certain types of outside employment or activities is of security concern if it poses a conflict with an individual's security responsibilities and could create an increased risk of unauthorized disclosure of classified information.
Conditions that signal security concern and may be disqualifying include any service, compensated or volunteer, or employment with: (1) a foreign country; (2) any foreign national; (3) a representative of any foreign interest; (4) any foreign, domestic, or international organization or person engaged in analysis, discussion, or publication of material on intelligence, defense, foreign affairs, or protected technology.
Conditions that could mitigate security concerns include: (1) evaluation of the outside employment or activity indicates that it does not pose a conflict with an individual's security responsibilities; (2) the individual terminates the employment or discontinues the activity upon being notified that it is in conflict with his or her security responsibilities.
DCID 1/14
ANNEX BAPPEALS
(Effective 14 April 1994)
POLICY
This annex establishes common appeals procedures for the denial or revocation of access to sensitive compartmented information (SCI) by entities of the Intelligence Community after adjudication pursuant to the provisions of DCID 1/14. This annex is promulgated pursuant to Executive Order 12333, Executive Order 12356, and Section 102 of the National Security Act of 1947. For the purposes of this annex, all references to DCID 1/14 include the basic document and all of its annexes. Any individual who has been considered for initial or continued access to SCI pursuant to the provisions of DCID 1/14 shall, to the extent provided below, be afforded an opportunity to appeal the denial or revocation of such access. This annex supersedes any and all other practices and procedures for the appeal of the denial or revocation of SCI access. This annex will not be construed to require the disclosure of classified information or information concerning intelligence sources and methods, nor will it be construed to afford an opportunity to appeal before the actual denial or revocation of SCI access. In addition, the provisions of DCID 1/14, or any other document or provision of law, will not be construed to create a property interest of any kind in the access of any individual to SCI. Further, since the denial or revocation of access to SCI cannot by the terms of DCID 1/14 render an individual ineligible for access to other classified information solely for that reason, the denial or revocation of SCI access pursuant to the provisions of DCID 1/14 will not beconstrued to create a liberty interest of any kind.
APPLICABILITY
This annex applies to all United States Government civilian and military personnel, as well as any other individuals, including contractors and employees of contractors, who are considered for initial or continued access to SCI. This annex does not apply to decisions regarding employment and will not be construed to affect or impair Public Law 88-290 or the authority of any entity to effect applicant or personnel actions pursuant to Public Law 88-290, Public Law 86-36, or other applicable law.
SCI ACCESS DETERMINATION AUTHORITY
Adjudications for access to SCI will be made in accordance with DCID 1/14 by a Determination Authority designated by the Senior Official of the Intelligence Community (SOIC) of each entity. Access to SCI shall be denied or revoked whenever it is determined that a person does not meet the security standards provided for in DCID 1/14.
PROCEDURES
1. Individuals will be:
provided a written statement of the reasons why denial or revocation of SCI access is being taken; and afforded an opportunity to appeal,
unless such actions would reveal a covert source, or reveal or verify a particular US Government affiliation with industry that is classified pursuant to Executive Order 12356 and is not otherwise protectable; and in other circumstances where the SOIC determines in writing that an appeal cannot be offered consistent with the nationalsecurity.
2. Any individual who is given notification and afforded an opportunity to appeal pursuant to paragraph 1 of this annex may, within 45 days of the date on which such individual is notified of the reasons for denial or revocation of SCI access, submit a written appeal of that denial or revocation to the Determination Authority. The written material submitted for consideration may include any information the individual believes will assist the Determination Authority in reviewing the case.
3. After a further review of the case in the light of the written appeal, the individual will be notified of the decision of the Determination Authority.
4. If the Determination Authority reaffirms a denial or revocation of access, the individual may, within 30 days of the date on which such individual is notified of the Determination Authority's reaffirmation, request a final review of the case. In that event, the SOIC or his or her designee, will personally review the case and exercise his or her discretion pursuant to the provisions of DCID 1/14, and will inform the individual of his or her decision, which action will be final and unreviewable.
DCID 1/14
ANNEX CSTANDARDS FOR SCI SECURITY AWARENESS
PROGRAMS IN THE US INTELLIGENCE COMMUNITY(Effective 22 January 1992)
Consistent with controls and procedures set forth in DCID 1/19 and its supplement, DCI Security Policy Manual for SCI Control Systems, standards are hereby established for the SCI security education programs designed to enhance the security awareness of the US Government civilian and military personnel and private contractors working in the US Intelligence Community. Compliance with these standards is required for all departments/agencies within the Intelligence Community. Existing security awareness programs will be modified to conform with these standards. Departments/agencies will establish a documented program to ensure that training has been presented to all personnel.
All individuals nominated for or holding SCI access approval will be notified initially and annually thereafter of their responsibility to report to their cognizant security officers any outside employment or activities (described in DCID 1/14, Annex A) that could conflict with their duty to protect classified information from unauthorized disclosure. Any other outside employment or activities that could create real or apparent conflicts with their responsibility to protect classified information also must be reported. Individuals granted SCI access approvals will be advised:
Who they may consult to determine if particular outside employment or activity might be of security concern.
The security awareness requirements set forth herein are divided into three phases. Phase I concerns the initial indoctrination of individuals, which is normally administered before access to SCI. Phase 2 concerns the continuing security awareness program required to maintain an increased security awareness throughout the period of access. Phase 3 sets forth the final guidelines and instructions when access to SCI is terminated.Of the need to exercise security caution in their activities as members of professional, commercial, scholarly, or advocacy organizations that publish or discuss information on intelligence, defense, or foreign affairs.
Of their continuing obligation to submit for review any planned articles, books, speeches, or public statements that contain or purport to contain SCI or information relating to or derived from SCI, as specified by the nondisclosure agreements that are a prerequisite for access to SCI.
1. Initial Indoctrination--As soon as practicable after being approved for access to SCI, personnel will receive an initial security indoctrination that will include:
a. The need for and purpose of SCI, and the adverse effect on the national security that could result from unauthorized disclosure.
2. Periodic Awareness--Enhancement Each department/agency will establish a continuing security awareness program that will provide for frequent exposure of personnel to security awareness material. Implementation of a continuing program may include live briefings, audiovisual presentations (e.g., video tapes, films, and slide/tape programs), printed material (e.g., posters, memorandums, pamphlets, fliers), or a combination thereof. It is essential that current information and materials be utilized. Programs should be designed to meet the particular needs of the department/agency.b. The intelligence mission of the department/agency to include the reasons why intelligence information is sensitive.
c. The administrative, personnel, physical, and other procedural security requirements of the department/agency and those requirements peculiar to specific duty assignments.
d. Individual classification management responsibilities as set forth in appropriate directives and regulations to include classification/declassification guidelines and marking requirements.
e. The definitions and criminal penalties for espionage, including harboring or concealing persons; gathering, transmitting, or losing defense information; gathering or delivering defense information to aid foreign governments; photographing and sketching defense installations; unauthorized disclosure of classified information (Title 18, U.S.C., Sections 792 through 795, 797, and 798), the Internal Security Act of 1950 (Title 50, U.S.C., Section 783), the Intelligence Identities Protection Act of 1982 (Title 50, U.S.C., Sections 421 through 426) and, when appropriate, the Atomic Energy Act (Sections 224 through 227).
f. The administrative sanctions for violation of or disregard for security procedures.
g. A review of the techniques employed by foreign intelligence organizations in attempting to obtain national security information.
h. Individual security responsibilities including:
(1) The prohibition against discussing SCI in a nonsecure area, over a nonsecure telephone, or in any other manner that permits access by unauthorized persons.
(5) Identification of the elements in the department/agency to which matters of security interest are to be referred.(2) The need to determine, before disseminating SCI, that the prospective recipient has the proper security access approval, that the SCI is needed in order to perform official duties and that the recipient can properly protect the information.
(3) Administrative reporting requirements such as foreign travel, contacts with foreign nationals, attempts by unauthorized persons to obtain national security information, physical security deficiencies, and loss or possible compromise of SCI material.
(4) Obligation to report to proper authorities any information which could reflect on the trustworthiness of an individual who has access to SCI such as:
(a) Willful violation of security regulations.
(b) Unexplained affluence or excessive indebtedness.
(c) Serious unlawful acts.
(d) Apparent mental or emotional problems.
(e) Coercion or harassment attempts.
(f) Blackmail attempts.
a. The basic elements for this program will include, but are not limited to, the following:
3. Debriefing--When a department/agency has determined that access to SCI is no longer required, final instructions and guidelines will be provided to the individual. As a minimum these will [include]:(1) The foreign intelligence threat.
b. Special security briefings/debriefings are required to supplement the existing security awareness programs in the following situations:(2) The technical threat.
(3) Administrative, personnel, physical, and procedural security.
(4) Individual classification management responsibility.
(5) Criminal penalties and administrative sanctions.
(6) Individual security responsibilities.
(7) A review of other appropriate department/agency requirements.
(1) When an individual is designated as a courier.
(2) When an individual travels, officially or unofficially, to or through countries listed in the annex to DCID 1/20, Countries in Which Visits, Travel, and Assignments Are Considered To Be Hazardous.
(3) When an individual has, or anticipates, contact with representatives of countries listed in the annex to DCID 1/20, Countries and Areas in Which Visits, Travel,and Assignments Are Considered To Be Hazardous.
(4) When any other situation arises for which a special briefing/debriefing is required by the department/agency.
a. A requirement that the individual read appropriate sections of Titles 18 and 50,U.S.C., and that the intent and criminal sanctions of these laws relative to espionage and unauthorized disclosure be clarified.
b. The continuing obligation, under the prepublication and other provisions of the nondisclosure agreement for SCI, never to divulge; publish; or reveal by writing, word, conduct, or otherwise, to any unauthorized persons any SCI, without the written consent of appropriate department/agency officials.
c. An acknowledgment that the individual will report without delay to the Federal Bureau of Investigation, or the department/agency, any attempt by an unauthorized person to solicit national security information.
d. A declaration that the individual no longer possesses any documents or material containing SCI.
e. A reminder of the risks associated with foreign travel and certain hazardous activities as defined in DCI Directive 1/20, Countries and Areas in Which Visits, Travel, and Assignments Are Considered To Be Hazardous, and department/agency reporting requirements as applicable.
DCID 1/14
ANNEX DQUALITY CONTROL GUIDELINES
FOR THE
SINGLE SCOPE BACKGROUND INVESTIGATION(Effective 12 August 1994)
GUIDELINES
In accordance with the requirements of DCI Directive 1/14 and National Security Directive 63, this document sets out guidelines to maintain quality standards for the Single Scope Background Investigation (SSBI). These guidelines assume the adjudicator's perspective because the adjudicator is the ultimate customer for the SSBI. The guidelines are divided into:
- Definition of Quality
- Conduct of the Interview
- Collection Requirements (Coverage)
- Quality Control Activities
DEFINITION OF QUALITY
A quality investigation is a thorough and comprehensive collection of favorable and unfavorable information from a variety of sources, past and present, that may include employment(s), reference(s), neighborhood(s), credit, police, and the subject. A quality investigative report should provide an adjudicator with a complete set of variables from which she/he can carefully weigh the whole person in determining a person's fitness for access to classified information.
The investigation may include record sources and interviews with the subject of the investigation, supervisors, coworkers, social acquaintances, and neighbors.
CONDUCT OF THE INTERVIEW
The quality of the investigation depends on the investigator's ability to elicit information from a source knowledgeable about the subject. This is basic to the conduct of any interview. The investigator should plan and execute each interview so as to obtain the maximum amount of information from a source. Available sources should be selected from each area of coverage to ensure that pertinent information about the subject's entire background is developed.
The investigator should conduct the interview in person and find a suitable location that protects privacy. Telephonic interviews are strongly discouraged; however, occasionally circumstances may dictate that the interviews be conducted by telephone. If a telephonic interview is necessary, the report should always state why the interview was not conducted in person.
The investigator should initially advise the source of the reason/purpose for the investigation and should attempt to establish a degree of confidence in the source(s) that will promote a high level of rapport and cooperation.
The investigator should also advise the source about the Privacy Act of 1974, before completing the interview, since the source needs to understand that the subject of the investigation has the right to review information provided by a source and has the right to know a sources identity, unless the source requests confidentiality.
COLLECTION REQUIREMENTS (COVERAGE)
1. FOR ALL SOURCES
Investigators should establish the source's duration and nature of association with the subject, thereby establishing the knowledgability of the source. The investigator should always secure the source's full name and any other appropriate identifying data, particularly in the case of a source with a common name. All derogatory or noteworthy information concerning the subject of the investigation that is provided by a source should be fully explored in the interview, including elicitation of the names of any corroborating sources or record information that will substantiate any derogatory testimony provided by the source.
For all sources, the report should indicate what issue areas were covered and whether the information provided was favorable or unfavorable.
2. FOR REFERENCES AND NEIGHBORS
Depending on the source's degree of association, investigators should ask each reference or neighbor relevant information regarding the subjects:
If a subject has had access to classified information and a source is in a position to know, the investigator should ask whether the subject properly handles classified information or has ever had a security violation. Finally, the investigator should ask if the source can recommend the subject for a position of trust and responsibility with the US Government or, in the case of a contractor, can the subject be trusted with classified information. The investigator should conclude the interview by asking the source to provide names of additional references.
- Family, citizenship, education, employment, residence history, and military service.
- Reputation, character, honesty, trustworthiness, integrity, discretion, reliability, and temperament.
- Financial stability, organizational affiliations, and whether there is a history of mental, emotional, or physical health problems.
- Whether the subject exhibits a pattern of excessive use of alcohol or has ever used illegal drugs or abused prescription drugs.
- Activities which indicate a lack of discretion or demonstrates poor judgment, a character flaw, or a personality disorder.
- Participation in criminal activity or an altercation with law enforcement agencies.
- Travels abroad for business or pleasure and degree of contact with foreign nationals.
- Unquestioned loyalty to the United States.
3. FOLLOW-UP QUESTIONS
If a source provides noteworthy or derogatory information to questions in any of the above areas of consideration, the investigator should ask follow-up questions as necessary to elicit all available information. The investigator should report as fully as possible:
If the subject has ended the questionable conduct, the investigator should attempt to determine the motivation for positive change. The investigator should also attempt to establish whether there may be personal animosity or bias towards the subject on the part of the source(s). The investigator should supply any available documentary evidence relating to the conduct in addition to the report of the source.
- The nature, extent, and seriousness of the conduct.
- The motivation for and the circumstances surrounding the conduct.
- The frequency and recency of the conduct.
- The subject's age and maturity at the time of the conduct.
- Whether the conduct was voluntary or whether there was pressure, coercion, or exploitation leading to the conduct.
- Whether the subject has been rehabilitated or has exhibited other pertinent behavioral changes since the conduct.
4. FOR EMPLOYMENT REFERENCES
The investigator should identify and interview the best source(s) available. These employment references should include, but are not limited to, the subject's immediate supervisor, coworker(s), and other persons with ftequent professional contact. Where appropriate, the investigator should pursue the same line of inquiry as with references and neighbors. In particular, the investigator should inquire regarding:
The investigator should provide any available documentary evidence to support the report of the source(s).
- Whether the subject is willing to abide by company policies and regulations.
- Whether the subject appropriately safeguards the employer's proprietary/sensitive information.
- Whether the subject is financially stable.
- Whether the subject has a history of substance abuse, to include alcohol, and/or prescription drugs.
- Whether the subject has been involved in any criminal activity.
- Whether the subject is reliable and eligible for re-hire.
5. FOR SUBJECT INTERVIEW
The subject is the best source of information about himself/herself. Hence, the investigator should explore with the subject the same line of inquiry she/he pursues with a reference, neighborhood, and employment source(s). The investigator should obtain the subject's version of the details surrounding all issues arising either in the course of the interview or in other parts of the investigation that have been completed by the time of the subject interview and report them completely. The investigator should inquire:
Of particular value to the adjudicator is evidence that the subject is being contradictory or dissembling. If the subject claims to have ended the conduct, the investigator should attempt to determine the motivation for positive change. The investigator should report only the facts.
- What happened
- Where, when, and how it happened
- Who else was involved.
QUALITY CONTROL ACTIVITIES
Quality control activities are designed to ensure adjudicators that a high quality investigation and report has been provided to them. The following management tools for investigative agencies are included but not limited to ensure quality investigations.
1. CASE REVIEW
Case review consists of some sort of supervisory review of the investigative requirements and the investigation to ensure that all coverages have been met using the best available sources. Depending on the agency, the investigative review may be conducted by the investigator's supervisor or by a quality assurance or assessment team.
2. RIDE-ALONG PROGRAM
In ride-along programs, supervisors and/or senior agents accompany the investigator, observing the investigator's performance, focusing on whether the investigator:
3. SOURCE RECONTACT
- Uses proper/acceptable investigative techniques.
- Explores all relevant issues.
- Possesses a demeanor that reflects positively on the investigative agency.
The supervisory element may select from a sample of an investigator's cases and contact some or all of the sources. The source is queried regarding the investigator's professionalism, line of questioning, adherence to established policies and procedures, and thoroughness. Both written and telephonic recontact are acceptable.
These recommended monitoring activities ensure adequate training of investigators, acceptable supervisory oversight, and proper professionalism while conducting the investigation. They also ensure that the standards of investigative coverage are satisfactorily met.
Source: Central Intelligence Agency (hardcopy)
Classification: Unclassified
MORI Document ID Number: 123836
HTML by Steven Aftergood