Information for the CIO, CSO, FSO, ISSO and other security professionals. Understanding NISPOM and ITAR compliance is tough. With over 12,000 cleared defense contractors, a majority of those don't have a security staff. We'll hope to help fill the gap. From security clearances to performing on classified contracts, you can find help here.
Thursday, February 27, 2020
An interview with Ray DICE Man Semko
You might already be aware that I run two podcasts: DoDSecure and Running and Obstacle Race Training. I recently interviewed Ray D*I*C*E Man Semko on my podcast DoDSecure. I hope you are able to get to the podcast as there are many topics covered from security clearances to protecting classified information.
What struck me most was his drive and focus leading him to his branding of D*I*C*E which stands for Defensive Information Countering Everything. This is what he calls the “anchor point” and so much is built around it. He wanted a way for folks to focus on what is important concerning national security. DICE provides more than just a bumper sticker or slogan, but rather a movement that has created more reporting opportunities and has actually led to the capture of a spy.
The DICE concept took a while to develop and catch on. Initially, Ray was scheduled to provide a security awareness briefing and he realized he had to have an anchor or something to build the focus around. At the time, the U.S. Army had a slogan well underway at the time and many may remember Subversion And Espionage Directed Against the Army or SAEDA. This was a hard acronym to remember for many. I remember the difficulty I had applying it as a cold war soldier and whenever asked ended up replying. “Syrup And Eggs Do not Agree (SAEDA)”.
Now Ray had an opportunity to develop something original and jumped at the chance after being commissioned by his employer to do so. “So this is my chance to be original, to think outside the box. And I'm thinking, OK, what am I going to do and this is where anchoring entered my mind,” he says. “If you are prepared for that moment, you don't know what that moment's going to be. You don't know what it what is going to entail, but if you are as prepared as you can be by knowing your job by having confidence in yourself to perform your job, all aspects of it, whatever you're called upon to do,” he continued.
It took him 14 years to get to that point. Now he had the anchor point or something to remember. One result of that particular anchor point, D*I*C*E is that a DIA employee felt that they needed to report concerns about Ana Montes, a senior Cuban analyst at the Defense Intelligence Agency. She turned out to be a high-level, long-term penetration of the US Intelligence Community by the Cuban intelligence service.
“…it's actually written in the book (sic. True Believer: Inside the Investigation and Capture of Ana Montes, Cuba’s Master Spy). I mean, there have been several people who have reported because people who listen to my briefings and it sticks with them. They see something strange here, suspicious. They reported it to the security people and security people did the right thing and investigated in every aspect.”
Now when people see dice in a game, hanging from a rear view mirror, or at a flea market in Greece, they think of Ray D*I*C*E Man Semko, and for good reason; he created the anchor point.
During the interview, I asked Ray one more question:
“So let me let me pull that thread a little bit because I think that that's a good point. We talked last week and you mentioned that. ‘You know, Jeff, I'm not security, but I'm counterintelligence’, and that was a good point because you know things that security people don't know and all we get our briefings about Walker and Montas and all these other people. But how do you get relevant up to date information? Is that available to security managers?”
Well, that's how we have for this week's episode of DoDSecure. So join our podcast or read our upcoming article where Ray answers the question, “what other resource is are out there that security managers can pull from to give relevant and realistic training?”
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
-->
Tuesday, February 4, 2020
NISPOM Questions for Security Certification
Get your copy @ www.redbikepublishing.com |
These NISPOM based questions could be helpful in passing the NCMS ISP Certification and the DoD's SPeD Certification exams including the most recent Industrial Security Oversight Certification (ISOC).
Taking practice tests is a great way to prepare for an exam. Successful students in grade school and college study using guides and exam preparation questions based on the test subject material. This same successful methodology can also help prepare for professional exams like ISP Certification and SPeD Certification.
Practice tests augment certification exam preparation. Red Bike Publishing's Unofficial Study Guide features four complete test length practice exams based on NISPOM.
We've updated our manual for NISPOM Change 2.
1. The highest level of classified information that can be hand carried outside the U.S. is:
a. CONFIDENTIAL
b. FOUO
c. SECRET
d. TOP SECRET
e. RESTRICTED
2. A U.S. company is under FOCI when?
a. A foreign interest exercises power than may result in unauthorized disclosure of classified information
b. A foreign interest exercises power that may result in unauthorized disclosure of classified information
c. A U.S. company markets product oversees
d. A foreign interests visit cleared facilities
e. A foreign involvement causes stock prices to fall
3. According to the Certificate Pertaining to Foreign Interests (SF 328), indicators that require reporting to the CSA include:
a. Organization has 10% or more of total revenue or net income from any single foreign person
b. Five percent or more of voting securities held in shares that do not identify the beneficial owner
c. Organization owns 10 percent or more of any foreign interest
d. Organization has three or more contracts with a foreign person.
KMPs make frequent visits to foreign countries
Scroll Down For Answers
1. The highest level of classified information that can be hand carried outside the U.S. is:
a. CONFIDENTIAL
b. FOUO
c. SECRET (NISPOM 10-405)
d. TOPSECRET
e. RESTRICTED
2. A U.S. company is under FOCI when?
a. A foreign interest exercises power than may result in unauthorized disclosure of classified information
b. A foreign interest exercises power that may result in unauthorized disclosure of classified information (NISPOM 2-300a)
c. A U.S. company markets product oversees
d. A foreign interests visit cleared facilities
e. A foreign involvement causes stock prices to fall
3. According to the Certificate Pertaining to Foreign Interests (SF 328), indicators that require reporting to the CSA include:
a. Organization has 10% or more of total revenue or net income from any single foreign person
b. Five percent or more of voting securities held in shares that do not identify the beneficial owner
c. Organization owns 10 percent or more of any foreign interest (SF 328)
d. Organization has three or more contracts with a foreign person.
KMPs make frequent visits to foreign countries
So, how did you do? These questions and more can be found in Red Bike Publishing's Unofficial Guide to ISP Certification,
DoD Security Clearance and Contracts Guidebook, as well as in NISPOM Training. Both resources provide excellent study material that may help with passing the ISP and SPeD certification exams.
According to reader comments and emails to the author, many who have bought this book used our techniques to augment their preparation have performed very well on certification exams.
Check out our newest resource, on line testing. Simulates testing environments for the ISOC and ISP.
For practice purposes, download the electronic version of the NISPOM and use it to help search the answers to the provided test questions. Use a timer to count down 120 minutes for each practice exam.
Register for the exam here: https://www.classmarker.com/online-test/start/?quiz=jdm5dbdb6cb9c613
You can find additional certification training and resources at http://www.redbikepublishing.com/ispcertification/
NISPOM link
https://www.esd.whs.mil/portals/54/documents/dd/issuances/dodm/522022m.pdf
Just select the “edit” tab and then “find”. Then type the key word or phrase from the test question to help find the answers.
Sample screen shot:
Sample screen shot:
Consider visiting Red Bike Publishing for training that you can download and present to cleared employees as well as present to DSS during the annual review.
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
The Applicant’s Role in Security Clearance Decisions
Let’s consider the following from the adjudicator’s point of view. Each of the following nine topics can be applied to identify which mitigations would be appropriate for each of the 13 Adjudicative topics from foreign influence to computer usage. For the sake of this writing, let’s apply to drug usage specifically. The reader can expand the application to whichever adjudicative topic(s) they need to cover.
- the nature, extent, and seriousness of the conduct. The adjudicator would want to know what type of drugs were being used, and the amount of drugs being used at each occurrence.
- the circumstances surrounding the conduct, to include knowledgeable participation. This is where you can explain why you used drugs. Was it a one-time use after coercion from a peer group, or part of a religious practice? Was it a bad decision based on a drunken event or just something you wanted to do? The point is to paint a picture of the motivation behind the drug use so that later you can explain whether or not the circumstances still apply.
- the frequency and recency of the conduct. Here is where the adjudicator views how often the drug use occurred and when the last time drugs was used. If enough time has passed since the last drug use (a year or more) the drug use risk could be mitigated.
- the individual’s age and maturity at the time of the conduct. This again points to reasons behind the drug use. If it occurred many years previously and while the applicant was younger and the result of a few bad decisions while in school, then it could be mitigated.
- the extent to which participation is voluntary. This extend could cover being a participant during a group experiment to actually supplying drugs to the party goers. The adjudicator will want to have a good understanding of the behavior that led to drug usage contrasted with your current potential to reengage.
- the presence or absence of rehabilitation and other permanent behavioral changes. Completing a rehabilitation program demonstrates a motivation toward positive change. Voluntary rehabilitation and completion is a positive endeavor. Quitting rehabilitation is going to be a concern. If you attended rehabilitation, you may want to explain the circumstances to include counselors’ notes, certificates, and letters of recommendation or other artifacts that support or demonstrate a permanent change in attitude or behavior.
- the motivation for the conduct. This is a direct request for information. The adjudicator much understand the mental attitude behind the behavior. Was the attitude cavalier, did it reflect entitlement, or was it a weak moment never to be repeated. The thought is that past motivation could reoccur if not mitigated. An applicant could provide statements from friends, co-workers, contemporaries or other influential people supporting a character change. This will help the adjudicator visualize a change in motivation or attitude.
- the potential for pressure, coercion, exploitation, or duress. If the applicant has an attitude in favor of drug use, a feeling of entitlement to use drugs, or has a drug positive ideal, this could be a huge factor. However, statement, letters of recommendation, or completion of rehabilitation programs could prove to mitigate this potential in the eyes of the adjudicator.
- the likelihood of continuation or recurrence. The adjudicator has to put all 8 points to the test. Once they consider the whole person concept, they’ve got to rule in favor of national security on this one. If the likelihood of recurrence or continuation exists, the clearance will be denied.
Regarding each of the 13 Adjudicative Criteria, the applicant should gather all information available to explain the behavior that could cause a denial of a security clearance. The information should be presented during follow up interviews or as requested for review. Being well prepared will help with the adjudicative process and may result in a favorable decision. However, a lack of preparation may not fare so well. Remember, the adjudicator makes decisions with the priority being on risk to national security
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
The Adjudicator's Role in Security Clearance Decisions
In the case of a security clearance request, the applicant completes and submits the SF-86 with the security officer’s assistance and the investigation begins. Next, the adjudicators apply the “whole person” concept to determine suitability and make a security clearance decision.
The applicant has some control over the timeliness of the application and duration of investigation when they put in the effort to prepare ahead of time with all the references necessary to answer questions accurately and completely. Additionally they can also gather references that may help the adjudicators understand whether or not any derogatory information can be overcome.
Any answers to the questions indicating a risk should be explained in as much detail as possible. Where there is doubt or question, the applicant should err on the side of over explaining instead of under explaining answers. Aside from artifacts explaining situations, the applicant may seek legal advice to assist in completing the document.
If an applicant is indeed concerned that past events may lead to the denial of a security clearance, they should provide as much information as possible explaining or demonstrating that the events are in the past, will not be repeated, completely overcome with rehabilitation, and successfully an non-issue as far as motivation to do it again, ability to be coerced or exploited, or a temptation to do again.
The adjudicators consider the following as they try to make a decision as to whether or not the applicant will be a national security risk. They make security clearance decisions based on interest to national security. Consequently, the applicant is required to demonstrate they are not a threat to national security and should provide artifacts demonstrating that though they may have been a risk to national security at one point, that risk has been mitigated.
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . He regularly consults, presents security training, and recommends export compliance and intellectual property protection countermeasures. He is an accomplished writer of non-fiction books, novels and periodicals. Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training".
Subscribe to:
Posts (Atom)