New technologies and emerging threats: personnel security adjudicative guidelines in the age of social networking

Loading...
Thumbnail Image
Authors
Festa, James P.
Subjects
Personnel security
adjudicative guidelines
security clearance
government employment
suitability
background investigation
cybervetting
computers
social media
social networking
insider threat
espionage
terrorism
hacking
Internet crime
cyber bullying
doxing
phishing
operations security (OPSEC)
Defense Office of Hearings and Appeals (DOHA)
Guideline M
Use of Information Technology Systems
online gaming
virtual worlds
Advisors
Josefek, Robert
Date of Issue
2012-12
Date
Dec-12
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
Publicized incidents involving espionage or violence by government employees with security clearances have raised concern for the personnel security community. The guidelines used to adjudicate security clearances were last updated in 2005; since that time, significant technological developments, especially in social media and communications, have emerged. This thesis developed a comprehensive list of current Internet behaviors, and used the list to examine Internet behavior in cases of cleared government employees who have been charged with espionage or terrorism-related crimes since 2008. Cases showed a trend of increasing variety of behaviors in these cases with time. In contrast, data from the Defense Office of Hearings and Appeals (DOHA) pertaining to proposed security clearance denials related to the Use of Information Technology Systems guideline showed a slight decrease. Incorporation of cybervetting into the background investigation process is proposed as a measure to enhance mitigation of questionable Internet behaviors, and may result in an increase in security clearance denials. Examination of the list of Internet behaviors against the current adjudicative guidelines resulted in recommended improvements for the Foreign Influence, Financial Considerations, Personal Conduct, Handling Protected Information, and Use of Information Technology Systems guidelines. Operations Security is proposed as a completely new adjudicative guideline.
Type
Thesis
Description
Series/Report No
Department
Homeland Security
Organization
Identifiers
NPS Report Number
Sponsors
Funder
Format
Citation
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Copyright is reserved by the copyright owner.
Collections