Thursday, May 15, 2014

So, What Could Happen? Social Media and Security Clearances Further Review

Social media is a great way to stay connected. Before social media, when the world was so big, we relied on letters and phone calls. These were time consuming endeavors to keep each other informed. If I went on a trip to Europe, I might be back stateside before friends and family ever receive my postcards. Now that we have social media, the world has shrunken significantly and it only takes moments to share information. And, we do that willingly.
As we go forward with the topic of security clearances and social media, let’s leave the more direct investigation process behind for a moment and discuss the continuous evaluation, the Defense Security Services annual review, or other less direct, but just as impacting ways social media can effect a cleared employee’s security clearance.
The continuous evaluation process is in place to ensure a cleared employee remains eligible for their clearance. Just think about how this system has been challenged as ineffective. Both military, government and contractor employees with security clearances have committed atrocious acts. People who have been vetted with a security clearance have committed espionage, mass murder and terror.
The continuous evaluation process should identify and report problems that can lead to dangerous behavior. However, these interactions usually only occur at the office where everyone is already so busy. In the continuous evaluation process, the behavior once demonstrated as trustworthy should continue as cleared employees perform on classified work.
Employees are relied upon to observe other cleared employees and report any information that might be reportable or suspicious. These are again related to the 13security clearance adjudication criteria that reflect a person’s trustworthiness. Most of this information is currently observed as employees serve at work. Does anyone show up under the influence? Is anyone suddenly displaying unexplained wealth? Is anyone staying late and using the copier a little more than normal? Are threats made or communicated? The chances of discovery are slim.
With social media the playing field is suddenly extended. Now we get a glimpse of a co-workers after hours activities. We might see posts from church, conferences or at play. We also might see them getting married, threatening enemies, bullying, travelling overseas, drinking every night or with a relationship every week. Under this possibility, cleared employees could report information to their FSOs based on what is displayed on social media pages.
Consider the DSS annual review. They usually interview employees to determine whether or not there are security vulnerabilities with the security program or cleared employees. They might ask questions about travel, briefings, security awareness and the protection of classified information. In the future they might access information on employees associated with the cleared facility through social media. That would be an easy task since most of us associate our profiles with our places of work. Now they could go in forearmed with information on foreign travel, changes in marital status, and more.
On the same topic, security clearance investigators could also use social media to research information on the subject of the investigation as well as develop character references. The information is available and the ease of obtaining that information would be beneficial to the investigator.
DoD continues to find answers to the question “What happened?” as they look into and try to prevent espionage and terror too many times committed by our trusted insiders. To better vet cleared employees, changes will need to be made. These changes must gain a more thorough “whole person” concept extending more into our observable behavior.

Enjoy the good life that your job has provided. But think seriously about what you want to post about yourself and how you want to world to perceive you. A little good judgment keeps you out of hot water. Bad decisions could possibly hold up or deny your chances of a security clearance.



Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".

No comments: