Social
media is a great way to stay connected. Before social media, when the world was
so big, we relied on letters and phone calls. These were time consuming
endeavors to keep each other informed. If I went on a trip to Europe, I might
be back stateside before friends and family ever receive my postcards. Now that
we have social media, the world has shrunken significantly and it only takes
moments to share information. And, we do that willingly.
As we go
forward with the topic of security clearances and social media, let’s leave the
more direct investigation process behind for a moment and discuss the
continuous evaluation, the Defense Security Services annual review, or other
less direct, but just as impacting ways social media can effect a cleared
employee’s security clearance.
The
continuous evaluation process is in place to ensure a cleared employee remains
eligible for their clearance. Just think about how this system has been
challenged as ineffective. Both military, government and contractor employees
with security clearances have committed atrocious acts. People who have been
vetted with a security clearance have committed espionage, mass murder and
terror.
The
continuous evaluation process should identify and report problems that can lead
to dangerous behavior. However, these interactions usually only occur at the
office where everyone is already so busy. In the continuous evaluation process,
the behavior once demonstrated as trustworthy should continue as cleared
employees perform on classified work.
Employees
are relied upon to observe other cleared employees and report any information
that might be reportable or suspicious. These are again related to the 13security clearance adjudication criteria that reflect a person’s
trustworthiness. Most of this information is currently observed as employees
serve at work. Does anyone show up under the influence? Is anyone suddenly
displaying unexplained wealth? Is anyone staying late and using the copier a
little more than normal? Are threats made or communicated? The chances of
discovery are slim.
With
social media the playing field is suddenly extended. Now we get a glimpse of a
co-workers after hours activities. We might see posts from church, conferences
or at play. We also might see them getting married, threatening enemies,
bullying, travelling overseas, drinking every night or with a relationship
every week. Under this possibility, cleared employees could report information
to their FSOs based on what is displayed on social media pages.
Consider
the DSS annual review. They usually interview employees to determine whether or
not there are security vulnerabilities with the security program or cleared employees. They might ask questions about travel, briefings, security awareness
and the protection of classified information. In the future they might access
information on employees associated with the cleared facility through social
media. That would be an easy task since most of us associate our profiles with
our places of work. Now they could go in forearmed with information on foreign
travel, changes in marital status, and more.
On the
same topic, security clearance investigators could also use social media to
research information on the subject of the investigation as well as develop
character references. The information is available and the ease of obtaining
that information would be beneficial to the investigator.
DoD
continues to find answers to the question “What happened?” as they look into
and try to prevent espionage and terror too many times committed by our trusted
insiders. To better vet cleared employees, changes will need to be made. These
changes must gain a more thorough “whole person” concept extending more into
our observable behavior.
Enjoy the
good life that your job has provided. But think seriously about what you want
to post about yourself and how you want to world to perceive you. A little good
judgment keeps you out of hot water. Bad decisions could possibly hold up or
deny your chances of a security clearance.
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
No comments:
Post a Comment