Posts

Showing posts from February, 2020

An interview with Ray DICE Man Semko

Image
You might already be aware that I run two podcasts : DoDSecure and Running and Obstacle Race Training . I recently interviewed Ray D*I*C*E Man Semko on my podcast DoDSecure. I hope you are able to get to the podcast as there are many topics covered from security clearances to protecting classified information . What struck me most was his drive and focus leading him to his branding of D*I*C*E which stands for Defensive Information Countering Everything. This is what he calls the “anchor point” and so much is built around it. He wanted a way for folks to focus on what is important concerning national security. DICE provides more than just a bumper sticker or slogan, but rather a movement that has created more reporting opportunities and has actually led to the capture of a spy. The DICE concept took a while to develop and catch on. Initially, Ray was scheduled to provide a security awareness briefing and he realized he had to have an anchor or something to build the focus around. A...

NISPOM Questions for Security Certification

Image
Get your copy @ www.redbikepublishing.com These NISPOM based questions could be helpful in passing the NCMS ISP Certification and the DoD's SPeD Certification exams including the most recent Industrial Security Oversight Certification ( ISOC) . Taking practice tests is a great way to prepare for an exam. Successful students in grade school and college study using guides and exam preparation questions based on the test subject material. This same successful methodology can also help prepare for professional exams like ISP Certification and SPeD Certification.  Practice tests augment certification exam preparation.  Red Bike Publishing's Unofficial Study Guide  features four complete test length practice exams based on  NISPOM .  We've updated our manual for NISPOM Change 2.  1. The highest level of classified information that can be hand carried outside the U.S. is: a. ...

The Applicant’s Role in Security Clearance Decisions

Image
Let’s consider the following from the adjudicator’s point of view. Each of the following nine topics can be applied to identify which mitigations would be appropriate for each of the 13 Adjudicative topics from foreign influence to computer usage. For the sake of this writing, let’s apply to drug usage specifically. The reader can expand the application to whichever adjudicative topic(s) they need to cover. the nature, extent, and seriousness of the conduct. The adjudicator would want to know what type of drugs were being used, and the amount of drugs being used at each occurrence.  the circumstances surrounding the conduct, to include knowledgeable participation. This is where you can explain why you used drugs. Was it a one-time use after coercion from a peer group, or part of a religious practice? Was it a bad decision based on a drunken event or just something you wanted to do? The point is to paint a picture of the motivation behind the drug use so that later you can expl...

The Adjudicator's Role in Security Clearance Decisions

Image
When an uncleared employee is hired to perform on classified contracts, the Facility Security Officer (FSO) requests a security clearance investigation. If a new employee already has an active security clearance, then the action is administrative; just a transfer. In the case of a security clearance request, the applicant completes and submits the SF-86 with the security officer’s assistance and the investigation begins. Next, the adjudicators apply the “whole person” concept to determine suitability and make a security clearance decision. The applicant has some control over the timeliness of the application and duration of investigation when they put in the effort to prepare ahead of time with all the references necessary to answer questions accurately and completely. Additionally they can also gather references that may help the adjudicators understand whether or not any derogatory information can be overcome. Any answers to the questions indicating a risk should be explained i...