Collateral Classified Information
With collateral clearances, the cleared employee is provided access to CONFIDENTIAL, SECRET, or TOP SECRET information, and is granted after undergoing a security clearance investigation and adjudication to determine suitability. For collateral classified information, those granted Top Secret clearances can access Confidential, Secret and Top Secret information. Those granted Secret clearances can access Confidential and Secret, while those granted Confidential can only access CONFIDENTIAL information. However, collateral clearances do not include access to SCI or SAP information.
SCI or SAP Classified Information = code word clearance
The “code word” clearance requires a higher level or more thorough investigation. That is because the “code word” clearance is used when an employee is briefed into a program requiring SCI or SAP. With the SCI or SAP designation, the classified document marked not only with the collateral designation, but also with the code word. For example, at the Secret level, a document might be marked “Secret (Code Word)”. For cleared defense contractors, permission to be briefed into a program with a required a code word is dictated in the DD254. This document tells security and the employee the level of clearance and any higher briefings required to perform the work, such as SCI and SAP.
Approval to access SCI and SAP information is provided after the Single Scope Background Investigation (SSBI). The SSBI is typically required for Top Secret security clearances and the same investigation is used for SCI compartmentalization. Normally a Secret clearance does not require an SSBI. However, if access to SCI or SAP is required, then the SSBI will be necessary to access Secret (Code Word) information.
A Fun Fact about code word clearances
To put a “code word” into perspective, let’s consider the History Channel’s, “Project Blue Book”. This show is based on a factual government classified program using the code word “Blue Book”. Those working on the program had the required clearance, were briefed to the program and were the only ones who knew the project details.
The personnel security clearances (PCL) are granted after a lengthy investigation and adjudication process. The interim clearance can be granted within a few weeks and the final decision can take many months. This security clearance journey begins with the applicant completing the Questionnaire for National Security Positions, also known as Standard Form (SF-86). This is a lengthy form that requires the population of some very personal information to include family members, places lived, academic institutes attended, arrests, drug and alcohol incidents, debt, and more.
Train your employees on the Insider Threat with a downloadable presentation http://www.redbikepublishing.com
Did you know that we can personalize NISPOM and ITAR for your employees?
Just order your copy from Red Bike Publishing and send us an email to incorporate a dedication page. Editor@redbikepublishing.com A perfect gift to keep your cleared employees informed.
ITAR http://www.redbikepublishing.com/itar/
NISPOM http://www.redbikepublishing.com/nispom/
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
No comments:
Post a Comment