[House Hearing, 113 Congress]
[From the U.S. Government Publishing Office]



 
                    THE INSIDER THREAT TO HOMELAND SECURITY: 
                      EXAMINING OUR NATION'S SECURITY CLEAR-
                      ANCE PROCESSES
=======================================================================

                                HEARING

                               BEFORE THE 

                    SUBCOMMITTEE ON COUNTERTERRORISM
                            AND INTELLIGENCE

                                 OF THE

                     COMMITTEE ON HOMELAND SECURITY
                        HOUSE OF REPRESENTATIVES

                    ONE HUNDRED THIRTEENTH CONGRESS

                             FIRST SESSION

                               __________

                           NOVEMBER 13, 2013

                               __________

                           Serial No. 113-42

                               __________

       Printed for the use of the Committee on Homeland Security
                                     

[GRAPHIC NOT AVAILABLE IN TIFF FORMAT]


                                     

      Available via the World Wide Web: http://www.gpo.gov/fdsys/

                               __________


                    U.S. GOVERNMENT PRINTING OFFICE
87-372 PDF                    WASHINGTON : 2014
___________________________________________________________________________
For sale by the Superintendent of Documents, U.S. Government Printing Office, 
http://bookstore.gpo.gov. For more information, contact the GPO Customer Contact Center, U.S. Government Printing Office. Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, [email protected].  



                     COMMITTEE ON HOMELAND SECURITY

                   Michael T. McCaul, Texas, Chairman
Lamar Smith, Texas                   Bennie G. Thompson, Mississippi
Peter T. King, New York              Loretta Sanchez, California
Mike Rogers, Alabama                 Sheila Jackson Lee, Texas
Paul C. Broun, Georgia               Yvette D. Clarke, New York
Candice S. Miller, Michigan, Vice    Brian Higgins, New York
    Chair                            Cedric L. Richmond, Louisiana
Patrick Meehan, Pennsylvania         William R. Keating, Massachusetts
Jeff Duncan, South Carolina          Ron Barber, Arizona
Tom Marino, Pennsylvania             Dondald M. Payne, Jr., New Jersey
Jason Chaffetz, Utah                 Beto O'Rourke, Texas
Steven M. Palazzo, Mississippi       Tulsi Gabbard, Hawaii
Lou Barletta, Pennsylvania           Filemon Vela, Texas
Chris Stewart, Utah                  Steven A. Horsford, Nevada
Richard Hudson, North Carolina       Eric Swalwell, California
Steve Daines, Montana
Susan W. Brooks, Indiana
Scott Perry, Pennsylvania
Mark Sanford, South Carolina
                       Greg Hill, Chief of Staff
          Michael Geffroy, Deputy Chief of Staff/Chief Counsel
                    Michael S. Twinchek, Chief Clerk
                I. Lanier Avant, Minority Staff Director
                                 ------                                

           SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE

                   Peter T. King, New York, Chairman
Paul C. Broun, Georgia               Brian Higgins, New York
Patrick Meehan, Pennsylvania, Vice   Loretta Sanchez, California
    Chair                            William R. Keating, Massachusetts
Jason Chaffetz, Utah                 Bennie G. Thompson, Mississippi 
Chris Stewart, Utah                      (ex officio)
Michael T. McCaul, Texas (ex 
    officio)
             Kerry Ann Watkins, Subcommittee Staff Director
                    Dennis Terry, Subcommittee Clerk
                  Hope Goins, Minority Staff Director
                            C O N T E N T S

                              ----------                              
                                                                   Page

                               Statements

The Honorable Peter T. King, a Representative in Congress From 
  the State of New York, and Chairman, Subcommittee on 
  Counterterrorism and Intelligence:
  Oral Statement.................................................     1
  Prepared Statement.............................................     2
The Honorable Brian Higgins, a Representative in Congress From 
  the State of New York, and Ranking Member, Subcommittee on 
  Counterterrorism and Intelligence:
  Oral Statement.................................................     3
  Prepared Statement.............................................     4
The Honorable Bennie G. Thompson, a Representative in Congress 
  From the State of Mississippi, and Ranking Member, Committee on 
  Homeland Security:
  Prepared Statement.............................................     5

                               Witnesses

Mr. Merton W. Miller, Associate Director of Investigations, 
  Federal Investigative Services, U.S. Office of Personnel 
  Management:
  Oral Statement.................................................     7
  Prepared Statement.............................................     9
Mr. Gregory Marshall, Chief Security Officer, U.S. Department of 
  Homeland Security:
  Oral Statement.................................................    11
  Prepared Statement.............................................    13
Mr. Brian A. Prioletti, Assistant Director, Special Security 
  Directorate, National Counterintelligence Executive, Office of 
  Director of National Intelligence:
  Oral Statement.................................................    15
  Prepared Statement.............................................    18
Ms. Brenda S. Farrell, Director, Defense Capabilities and 
  Management, Military and DOD Civilian Personnel Issues, U.S. 
  Government Accountability Office:
  Oral Statement.................................................    20
  Prepared Statement.............................................    21

                                Appendix

Questions From Honorable Peter T. King for Merton W. Miller......    47
Questions From Honorable Peter T. King for Gregory Marshall......    47
Questions From Honorable Peter T. King for Brian A. Prioletti....    49
Questions From Honorable Peter T. King for Brenda S. Farrell.....    50


    THE INSIDER THREAT TO HOMELAND SECURITY: EXAMINING OUR NATION'S 
                      SECURITY CLEARANCE PROCESSES

                              ----------                              


                      Wednesday, November 13, 2013

             U.S. House of Representatives,
                    Committee on Homeland Security,
         Subcommittee on Counterterrorism and Intelligence,
                                                    Washington, DC.
    The subcommittee met, pursuant to call, at 2:29 p.m., in 
Room 311, Cannon House Office Building, Hon. Peter T. King 
[Chairman of the subcommittee] presiding.
    Present: Representatives King, Higgins, and Keating.
    Mr. King. This Monday, our Nation celebrated Veteran's Day 
to honor the men and women who have fought, and continue to 
fight, for our country. In addition to these brave individuals, 
other Federal employees from the Department of Homeland 
Security, FBI, CIA, the NSA, and many other agencies work every 
day to protect Americans and U.S. interests from threats. These 
patriots deserve our gratitude for their tireless work.
    The unfortunate reality is that they must also guard 
against internal threats. Appalling events over recent years 
involving trusted individuals who have damaged National 
security or committed tragic acts of violence have put a 
spotlight on the need for reforms and rigorous oversight over 
the security clearance process and programs to detect insider 
threats.
    PFC Bradley Manning is serving a 35-year sentence for 
leaking Classified information to WikiLeaks. The next step is 
to prosecute Julian Assange who published the documents.
    In May, media outlets reported that former CIA analyst and 
current NSA contractor Edward Snowden had fled to Hong Kong and 
released a large amount of data on Classified NSA surveillance 
programs.
    On September 16, barely 2 months ago, Aaron Alexis, a DOD 
contractor, shot his way into the Washington, DC Navy Yard and 
killed 12 people.
    All of these individuals were trusted, vetted U.S. security 
professionals who abused that trust and committed heinous acts. 
It is vital that more be done to identify potential insider 
threats.
    While none of these examples involve DHS or DHS personnel, 
the Department of Homeland Security has over 120,000 employees 
with a security clearance. It is vital that we continually 
evaluate the internal processes and procedures for how those 
clearances are investigated, adjudicated, and reviewed.
    In addition to our review of DHS security practices, 
today's witnesses will be asked to evaluate the quality and 
standards for security clearance investigations and 
adjudications, as well as address potential problems limiting 
information sharing between agencies on employees with 
clearances.
    For example, in the Snowden case the after-action review 
completed by the ODNI disclosed that the 2011 background check 
was incomplete. According to press reports, the investigation 
did not verify Snowden's account of a security violation while 
at the CIA, review travel to India Snowden failed to disclose, 
and include interviews with anyone outside of his mother and 
girlfriend. If the investigation had been done properly it 
could have impacted Snowden's clearance. This also raises 
serious questions about what standards are used in reviewing 
the background investigation and adjudicating a case, and why 
one wasn't sent back to the investigator for a more thorough 
review.
    There were nearly 5 million U.S. Government employees or 
contractors with security clearances, including over 1.4 
million with a Top Secret clearance.
    Now is the time to reinforce the message that a security 
clearance is a privilege granted so that individuals can 
protect the United States from threats. Not only can a 
clearance be revoked for cause, but violations must be 
prosecuted to the fullest extent of the law.
    There are a number of reviews underway in the aftermath of 
the Manning, Snowden, and Alexis incidents. It is vital that 
necessary reforms are implemented expeditiously to detect and 
disrupt future insider threat situations.
    These reforms must include an update to the Federal 
guidance for background investigations. in a post-9/11 world, 
security clearances must address evolving threats such as 
radical Islam and cyber crime. Had investigators looked 
differently into Snowden's background they might have 
identified disturbing trends that made him unfit to hold a 
clearance of any kind and a potential insider threat to U.S. 
National security.
    I look forward to hearing more from the witnesses on these 
efforts, including whether or not the 5-year reinvestigation 
for Top Secret clearance-holders is appropriate, what 
additional periodic or continuous monitoring capability exists, 
and what more can be done to safeguard our Classified 
information technology systems from abuse.
    I want to thank all the witnesses for being here today and 
for your work to detect and prevent insider threats.
    [The statement of Chairman King follows:]
                  Statement of Chairman Peter T. King
    This Monday our Nation celebrated Veteran's Day to honor the men 
and women who have fought, and continue to fight, for our country. In 
addition to these brave individuals, other Federal employees from the 
Department of Homeland Security, FBI, CIA, the NSA, and many other 
agencies work every day to protect Americans and U.S. interests from 
threats. These patriots deserve our gratitude for their tireless work.
    The unfortunate reality is that they must also guard against 
internal threats. Appalling events over recent years involving trusted 
individuals who have damaged National security or committed tragic acts 
of violence have put a spotlight on the need for reforms and rigorous 
oversight over the security clearance process and programs to detect 
insider threats.
   PFC Bradley Manning is serving a 35-year sentence for 
        leaking Classified information to WikiLeaks. The next step is 
        to prosecute Julian Assange who published the documents.
   In May, media outlets reported that former CIA analyst and 
        current NSA contractor Edward Snowden had fled to Hong Kong and 
        released a large amount of data on Classified NSA surveillance 
        programs.
   On September 16, just shy of 2 months ago, Aaron Alexis--a 
        DOD contractor shot his way into the Washington, DC Navy Yard 
        and killed 12 people.
    All of these individuals were vetted, trusted U.S. security 
professionals who abused that trust and committed heinous acts. It is 
vital that more is done to identify potential insider threats.
    While none of those examples involved DHS or DHS personnel, the 
Department of Homeland Security has over 120,000 employees with a 
security clearance. It is vital that we continually evaluate the 
internal processes and procedures for how those clearances are 
investigated, adjudicated, and reviewed.
    In addition to our review of DHS security practices, today's 
witnesses will be asked to evaluate the quality and standards for 
security clearance investigations and adjudications, as well as address 
potential problems limiting information sharing between agencies on 
employees with clearances. For example, in the Snowden case the after-
action review completed by the Office of the Director of National 
Intelligence (ODNI) disclosed that the 2011 background check was 
incomplete. According to the Wall Street Journal, the investigation did 
not verify Snowden's account of a security violation while at the CIA, 
review travel to India Snowden failed to disclose, and include 
interviews with anyone outside of his mother and girlfriend. If the 
investigation had been done properly it could have impacted Snowden's 
clearance. This also raises serious questions about what standards are 
used in reviewing the background investigation and adjudicating a case, 
and why this one wasn't sent back to the investigator for a more 
thorough review.
    There are nearly 5 million U.S. Government employees or contractors 
with security clearances, including over 1.4 million with a Top Secret.
    Now is the time to reinforce the message that a security clearance 
is a privilege granted so that individuals can protect the United 
States from threats. Not only can a clearance be revoked for cause, but 
violations must be prosecuted to the fullest extent of the law.
    There are a number of reviews underway in the aftermath of the 
Manning, Snowden, and Alexis incidents. It is vital that necessary 
reforms are implemented expeditiously to detect and disrupt future 
insider threat situations.
    These reforms must include an update to the Federal guidance for 
background investigations. In a post-9/11 world, security clearances 
must address evolving threats such as radical Islam and cyber crime. 
Had investigators looked differently into Edward Snowden's background 
they might have identified disturbing trends that made him unfit to 
hold a clearance of any kind and a potential insider threat to U.S. 
National security.
    I look forward to hearing more from the witnesses on these efforts, 
including whether or not the 5-year reinvestigation for Top Secret 
clearance holders is appropriate, what additional periodic or 
continuous monitoring capability exists, and what more can be done to 
safeguard our classified information technology (IT) systems from 
abuse.

    Mr. King. I now recognize the Ranking Member, Mr. Higgins, 
for his opening statement, and thank him and his staff for 
their cooperation in preparing for this subcommittee hearing.
    Mr. Higgins. Thank you, Mr. Chairman.
    I would like to thank Chairman King for holding today's 
hearing. I would also like to thank the witnesses for their 
testimony and for their public service.
    This summer the public became very concerned about the 
surveillance tactics the National Security Agency currently 
takes in the interest of security. Former National Security 
Agency contractor Edward Snowden revealed details about the 
National Security Agency surveillance program that collects 
phone calls and monitors records of millions of Americans.
    This prompted Americans to become very interested in 
whether the right to privacy trumps the need for National 
security. Finding this balance is difficult, and according to 
the director of the National Security Agency, General Keith 
Alexander, these Classified programs have been successful. 
According to Alexander, people like Snowden, who reveal 
sensitive information about this country, can cause a grave 
damage to the Nation.
    The widespread questions remain, however: How could Snowden 
have this type of access to National security secrets? Was 
there anything in his background that showed a lack of 
integrity? What does it take to get a security clearance?
    As Congress and the Executive branch were searching for 
answers, a few blocks from the U.S. Capitol Aaron Alexis, a 
lone gunman, took up arms against fellow employees at the Navy 
Yard. Alexis, a contractor, not only had a security clearance, 
but also had a history of arrests and gun infractions.
    As we have pervasive incidents such as these, it is 
imperative that we look at the security clearance process. 
According to the Office of Personnel Management, 4.9 million 
Federal workers and contractors are eligible to hold security 
clearance. At Department of Homeland Security, approximately 
124,000 employees hold clearances.
    These vast numbers grow year by year. It lends to the 
conversation of how these clearances are determined and given.
    In its report to the Ranking Member of the full committee, 
the Government Accountability Office found that the Office of 
Director of National Intelligence has not provided agencies 
with a clearly-defined guidance and procedures to determine if 
a position requires a security clearance. The GAO also noted 
that since the 1990s, quality in the security clearance 
investigations has not been a priority. These are just two 
detrimental flaws in the security clearance process.
    I am pleased to hear that the Office of Management and 
Budget is heading a 120-day review of the Federal clearance 
process. However, it seems a little bit too little, too late. 
The intelligence community has grown greatly since September 11 
and there are examples of their outstanding work.
    In August the efforts of the intelligence community, along 
with Royal Canadian Mounted Police, disrupted a terrorist plot 
in Western New York. Unfortunately, the lack of consistency and 
quality in the security clearance process can place the 
international community in great danger from an insider threat.
    We expect quality performance from our Federal employees. 
Holding a security clearance should be a privilege. It is my 
hope that this hearing can yield solutions that can be included 
in the restoration of the security clearance process.
    I look forward to the witnesses' testimony.
    With that I yield back.
    [The statement of Ranking Member Higgins follows:]
               Statement of Ranking Member Brian Higgins
                           November 13, 2013
    This summer, the public became very concerned about surveillance 
tactics that the National Security Agency currently takes in the 
interest of security. Former National Security Agency contractor, 
Edward Snowden, revealed details about National Security Agency 
surveillance programs that collect phone calls and monitor records of 
millions of Americans.
    This prompted Americans to become very interested in whether the 
right to privacy trumps the needs of the country. Finding this balance 
is difficult and according to the director of the National Security 
Agency, General Keith Alexander, these Classified programs have been 
successful. According to Alexander, people like Snowden who reveal 
sensitive information about this country can cause grave damage to the 
Nation.
    The widespread questions remain, however: How could Snowden have 
this type of access to National security secrets? Was there anything in 
his background that showed a lack of integrity? What does it take to 
get a security clearance?
    As Congress and the Executive branch were searching for answers, a 
few blocks from the U.S. Capitol, Aaron Alexis, a lone gunman took up 
arms against fellow employees at the Navy Yard. Alexis, a contractor, 
not only had a security clearance, but also had a history of arrests 
and gun infractions. As we have pervasive incidents such as these, it 
is imperative that we look at the security clearance process.
    According to the Office of Personnel Management 4.9 million Federal 
workers and contractors are eligible to hold a security clearance. At 
the Department of Homeland Security, approximately 124,000 employees 
hold clearances.
    These vast numbers grow year by year. It lends to the conversation 
of how these clearances are determined and given. In its report to the 
Ranking Member of the Full committee, the Government Accountability 
Office found that the Office of the Director of National Intelligence 
has not provided agencies with clearly-defined guidance and procedures 
to determine if a position requires a security clearance.
    GAO has also noted that since the 1990s quality in the security 
clearance investigations has not been a priority. These are just two 
detrimental flaws in the security clearance process. I am pleased to 
hear that the Office of Management and Budget is heading a 120-day 
review of the Federal clearance process. However, it seems as if this 
is a ``better late than never'' opportunity.
    The intelligence community has grown greatly since September 11 and 
there are examples of their outstanding work. In August, the efforts of 
the intelligence community, along with the Royal Canadian Mounted 
Police, disrupted a terrorist plot in Western New York.
    Unfortunately, the lack of consistency and quality in the security 
clearance process can place the IC in grave danger from an insider 
threat. We expect quality performance from our Federal employees. 
Holding a security clearance should be a privilege. It is my hope that 
this hearing can yield solutions that can be included in the 
restoration of the security clearance process.

    Mr. King. I thank the Ranking Member, Mr. Higgins, for his 
statement.
    Other Members of the committee, whether here or not, are 
reminded that opening statements may be submitted for the 
record.
    [The statement of Ranking Member Thompson follows:]
             Statement of Ranking Member Bennie G. Thompson
                           November 13, 2013
    My years in leadership on this committee have given me great 
insight into the American public's evolving interest in homeland 
security. Matters such as aviation security and emergency preparedness 
usually remain at the forefront of the minds of vast majority of 
Americans, while employment matters may usually strike those who are 
affected. After September 11, the public wanted to know what could be 
done to make sure that another devastating attack did not take place.
    The public also wanted to know how they could help this country 
through either military or civilian service. As the Government began to 
develop solutions, the Department of Homeland Security was established 
to secure the Nation from the many threats it faces. Other Executive 
Orders increased the Government's ability to track Americans who 
engaged with people overseas.
    A sweeping change came to the Federal workforce. The 9/11 
Commissioners recommended that the United States improve its 
intelligence-gathering and information-sharing activities. More and 
more civilians began to be employed in positions that allowed access to 
Classified information that required them to have security clearances.
    Ten years after September 11, the sheer volume of Americans holding 
security clearances was astonishing. According to the Government 
Accountability Office, in 2011, the Office of the Director of National 
Intelligence, the Nation's executive security agent, reported that over 
4.9 million Federal contractors and Government workers held or were 
eligible to hold a security clearance. Many people contact Congress and 
inquire about the clearance process. For some, successful completion of 
the clearance process is a badge of honor. For others, due to various 
circumstances, obtaining a clearance was a hurdle to employment. Some 
questioned why clearances were necessary to perform certain duties that 
may not involve access to Classified material.
    Some long-time Federal employees were concerned that they might be 
required to redo the process when they switch employment at different 
agencies within the Federal Government. The volume of security 
clearances gave me pause. Last summer, I asked the Government 
Accountability Office to conduct an investigation into security 
clearances. GAO found that throughout the Federal Government that there 
are essentially no agreed-upon standards for requiring security 
clearances for Federal jobs. The lack of clear criteria and commonly-
accepted standards may contribute to the exponential growth in Federal 
jobs requiring a security clearance. GAO also found that security 
clearance requirements for Federal jobs that do not involve handling 
National security information may hinder transparency and openness in 
Government. The security clearance issue was at the forefront of my 
mind and the minds of employment-seekers the past few years; however, 
May 2013 changed the game.
    An overwhelming number of Americans became concerned when former 
NSA contractor Edward Snowden leaked the details of classified programs 
to the British newspaper The Guardian. Snowden's security clearance was 
vetted by an outside contractor and, in hindsight, many still wonder if 
Snowden should have had access to such sensitive information. There are 
several reports that Snowden may have omitted or embellished 
information on his personnel background form.
    The same firm that vetted outside contractor Edward Snowden vetted 
Navy Yard shooter Aaron Alexis. On September 16, Alexis, a civilian 
contractor, opened fire at Navy Yard here in Washington, DC. After the 
Navy Yard shooting, it was discovered that Alexis failed to disclose 
information about felony charges, and a Federal personnel report had no 
information about a his previous arrests.
    It is difficult to believe that the Executive branch spends over $1 
billion dollars on background investigations for suitability and 
security clearances, but could not yield Alexis's felony gun charges. 
Despite GAO's insistence, it took leaks and a horrific lone gunman to 
get an Executive branch review. I look forward to the panel's review 
and remind them that access to National security information is a 
privilege that should be regarded with the highest integrity.
    There needs to be uniformity with how security clearances are given 
and in how they are revoked. If revocation or suspension is the rule 
for leaking information, it needs to be applied across the board.

    Mr. King. Right now we are pleased to have a very 
distinguished panel of witnesses before us today on this vital 
topic.
    Mr. Merton Miller serves as the associate director of 
investigations for the Office of Personnel Management Federal 
Investigative Services. OPM's Federal Investigative Services is 
the Federal Government's largest provider of background 
investigations and services, supporting more than 100 Federal 
agencies' personnel security programs. He is responsible for 
FIS operations, policy development, and contract oversight of 
OPM's investigations program, which completes over 2 million 
investigations annually.
    Before joining OPM FIS, Mr. Miller served in the United 
States Air Force, reaching the rank of full colonel before his 
retirement in 2005. During his career, Colonel Miller served 
with the Air Force Office of Special Investigations, 
specializing in criminal counterintelligence, counterterrorism, 
and security investigations and operations. Upon his retirement 
from the military Colonel Miller joined the Department of 
Defense's counterintelligence field activity, directing DOD's 
counterintelligence programs.
    Mr. Gregory Marshall is the chief security officer for the 
Department of Homeland Security. In this capacity Mr. Marshall 
is responsible for security-related issues affecting the 
Department's personnel security, physical security, special 
security, special access programs, and security training and 
awareness.
    Mr. Marshall began his Federal career as a police officer 
with the United States Capitol Police in 1984 and later 
transferred to the Howard County, Maryland Police Department, 
where he retired in 2007. He returned to Federal service when 
he joined DHS as the deputy chief of physical security and was 
later promoted to deputy chief security officer.
    Mr. Brian Prioletti is the assistant director for the 
Special Security Directorate and the National 
counterintelligence executive in the Office of the Director of 
National Intelligence. Mr. Prioletti is responsible for the 
policies and procedures governing the conduct of investigations 
as well as assisting the DNI on determining which agencies 
conduct background investigations and determine eligibility for 
access to Classified information. Prior to joining the ODNI, 
Mr. Prioletti worked at the Central Intelligence Agency from 
1981 until 2013.
    Ms. Brenda Farrell is a director in the Government 
Accountability Office's Defense Capabilities and Management, a 
position she has held since 2007. Her work focuses on military 
and civilian personnel issues, including personnel security 
clearance process concerns.
    Ms. Farrell began her career with GAO in 1981 and has 
served in a number of issue areas associated with National 
security. Prior to her appointment as director, she served as 
an acting director for GAO's strategic issues team, where she 
was responsible for overseeing three major bodies of work 
related to strategic human capital management, Government 
regulation, and decennial census issues.
    I want to thank all of the witnesses for being here today.
    We will begin with Mr. Miller, who is recognized for 5 
minutes. Thank you.

     STATEMENT OF MERTON W. MILLER, ASSOCIATE DIRECTOR OF 
INVESTIGATIONS, FEDERAL INVESTIGATIVE SERVICES, U.S. OFFICE OF 
                      PERSONNEL MANAGEMENT

    Mr. Miller. Thank you, Chairman King, Ranking Member 
Higgins. I want to thank you for letting me testify here today. 
I share your commitment and that of my colleagues here to 
examine the processes and procedures for determining who shall 
be allowed access to our Nation's secrets, granted the 
privilege of serving in a position of public trust, and given 
routine physical and logical access to our Federal facilities.
    Presently, there is a series of steps that must be taken to 
determine whether an individual should be granted a security 
clearance. The process begins when a Federal agency determines 
whether the duties of a particular Federal civilian position, 
military position, or contract position requires access to 
Classified information to perform their duties.
    Once an agency determines that an individual will perform 
work requiring access to Classified information and also has 
determined the level of access--either Confidential, Secret, or 
Top Secret--the agency submits a request to OPM to perform a 
background investigation. The background investigation we 
conduct must conform to Government-wide rules that meet 
investigative standards, adjudicative guidelines, and 
reciprocity mandates.
    The Federal Investigative Standards outline the required 
elements of the investigation. These elements include the 
completion of a questionnaire by the applicant and specify 
investigative leads to be performed by OPM depending on the 
level of clearance sought.
    The completion of a background investigation is dependent 
in part on the voluntary cooperation of sources and of record 
providers. In some instances, essential personnel are not 
available for an interview; members of the public, such as 
former employers or educational institutions are unwilling to 
provide interviews to investigators or to complete forms or 
make records available. For OPM investigators who have 
performed work on the investigative process, they are required 
to perform and complete a detailed summary of the work they 
accomplished.
    Once the investigator completes his or her work and the 
results are reviewed for completeness and delivered to the 
customer agency, OPM's role in the process is complete. 
Following investigative phase of the process, the agency which 
requested the investigation moves into the adjudicative phase. 
It is during this adjudicative phase when a determination is 
made on whether an individual is eligible for access to 
Classified information.
    The decision that an individual shall receive access to 
Classified information is the responsibility of the head of the 
agency employing the individual or his or her designee. The 
agency for which the work is to be performed makes the decision 
to grant eligibility based in part upon the background 
investigation and in part upon other information that may be 
available to the agency, such as the results of a polygraph 
examination if that is required for the position.
    Although there are considerable processes and procedures in 
place today to vet individuals for a security clearance, the 
recent tragic events of the Navy Yard and the high-profile 
security breaches highlights the need to be ever-vigilant in 
assuring that individuals entrusted with access to Classified 
information and individuals with physical and logical access to 
Federal facilities do not present a risk of harm to National 
security or to the safety of our employees.
    At the President's direction and under the leadership of 
OMB, OPM is presently working with its colleagues to identify 
potential improvements in suitability fitness, clearance 
determination procedures, and anything that might help enhance 
employee safety and National security.
    I want to thank you again for the opportunity to testify 
regarding this important issue. I look forward to answering any 
questions you might have.
    [The prepared statement of Mr. Miller follows:]
                 Prepared Statement of Merton W. Miller
                           November 13, 2013
    Chairman King, Ranking Member Higgins, and Members of the 
subcommittee, thank you for asking me to be here today.
    To that end, this subcommittee has asked the Office of Personnel 
Management (OPM) questions about security clearances. I appreciate the 
opportunity to give you a better understanding of OPM's role in the 
security clearance process.
                   1. the security clearance program
    There is a series of steps that must be taken to determine whether 
an individual should be granted a security clearance. The process 
begins when a Federal agency determines whether the duties of a 
particular Federal civilian position or position in the military will 
require the incumbent to have access to Classified information, or that 
an employee of a contractor will require access to Classified 
information in order to perform work under a Government contract. If 
such a determination is made, and if there is no prior eligibility 
determination that is sufficient, under applicable directives, to meet 
that need, the agency will need to determine such eligibility itself.
    OPM conducts 95 percent of the Government background 
investigations. Once an agency determines that the subject will perform 
work that requires a demonstrated, foreseeable need for access to 
Classified information, and that an investigation is required, the 
agency submits a request to OPM that it perform the background 
investigation. OPM performs the investigation on a reimbursable basis 
in accordance with established investigative standards and then 
delivers the report of investigation to the requesting agency.
    I want to emphasize that OPM is not charged with deciding whether 
an individual should or will be found eligible for access to Classified 
information or even with making any recommendation with respect to that 
decision. The decision that an individual should receive access to 
Classified information is ultimately, pursuant to Executive Order 
12968, the exclusive responsibility of the head of the agency employing 
the individual, or his or her designee, following a National security 
adjudication (either by that agency or by a central adjudicative 
facility working on its behalf). The agency for which the work is to be 
performed makes the decision to grant eligibility, based, in part, upon 
the background investigation, and, in part upon other information that 
may be available to the agency, such as a polygraph if required for the 
position. Further, the agency can reopen the investigation or order 
additional investigative work from OPM if it does not have enough 
information to make a determination.
    The security clearance process must conform with Government-wide 
rules that include investigative standards (which may vary, based on 
the level of Classified information to which the individual will have 
access), adjudicative guidelines, and reciprocity mandates. The 
standards outline the required elements of the investigation. These 
elements include the completion of a questionnaire by the applicant and 
specified record and other checks to be performed by OPM depending on 
the level of clearance sought.
    Background investigations are dependent on the voluntary 
cooperation of sources and of records providers, as well as the 
availability and accessibility of references and records. In some 
instances, essential personnel are not available for an interview (for 
example, when members of the Armed Forces are deployed in dangerous 
locations overseas); members of the public are unwilling to provide 
interviews to investigators or to complete inquiry forms; or records 
are not made available (for example, Federal, State, and local records 
may not be accessible to our investigators for a variety of reasons).
    Each OPM investigator who has performed work on the investigation 
prepares a report of investigation that details all work attempted and 
all work completed. These reports of investigation are combined with 
the results of records checks that OPM conducts of record repositories 
specified in the investigative standards. Further, OPM uses ``issue 
codes'' to alert the sponsoring agency of areas of potential 
adjudicative concern. Once the investigator completes his or her work, 
OPM reviews the results package for completeness (and, when efforts to 
complete items were unsuccessful, reporting those efforts) and delivers 
it to the customer agency. The delivery is generally accomplished by 
electronic means to support electronic adjudication processes in place 
at Federal agencies. Once OPM has completed its work and transmitted 
the final investigation file to the customer agency, OPM's role in the 
investigation concludes.
              2. staffing and oversight of investigations
    Adapting to change within the background investigation program is 
not new to the investigative community. For example, during the Clinton 
administration, the decision was made to move large amounts of the 
background investigations work performed by OPM to a contractor 
workforce. The decision was made that OPM should absorb a background 
investigations function performed by the Department of Defense (DoD) 
(with a Federal workforce) into the OPM workforce, leaving OPM with a 
blended workforce of investigators. Today, OPM continues to use a 
combination of Federal employees and contractors to complete background 
investigations. The background investigation workforce has dealt with 
factors that have driven down the need for background investigations--
for example, declines in the size of the Federal workforce that have 
limited hiring, and thus the need for new background investigations to 
factors that have dramatically driven up the need for background 
investigations--for example, background investigation security needs 
following September 11, 2001. OPM and its partners in the background 
investigation community are aware of shifting demands for the 
investigation workforce, and working with a blend of contractors and 
Federal employees allows OPM to adjust its needs according to the 
demands of its customers.
    OPM's contract investigators must conduct investigations to the 
same Federal investigative standards as their Federal counterparts. The 
training curriculum is the same for both. OPM employs a professional 
Federal cadre of certified instructors and instructional system 
specialists to develop and provide an accredited Background 
Investigator Training program, recognized by the Executive branch as 
the National training standard. All of OPM's trainers and a number of 
the other agencies' trainers for the contract investigators attend 
courses at OPM's Federal Investigative Services' National Training 
Center and then administer the same courses to the employees of the 
contractors. OPM conducts oversight to ensure all the terms of the 
contract are being met, including review of contract quality control 
plans, audits, and inspections, including ``check rides'' to observe 
investigators during the investigation process. OPM is vigilant about 
the potential for fraud and falsification both by Government employees 
and by employees of contractors. OPM has taken affirmative steps to 
detect and root out abuses. When instances of fraud or falsification 
are found, OPM takes all appropriate steps to address them. We also 
work closely with our Inspector General and the Department of Justice 
to cooperate with any subsequent investigations. We have taken steps in 
recent years to prevent and detect fraud and falsification both through 
improved workforce training and through additional levels of reviews to 
ensure the integrity of background security clearance investigations.
    The agencies for which work is being performed control who has 
access to their buildings and systems, not OPM, and if an agency has 
concerns relating to a particular employee of a contractor, there are 
avenues available for that agency to take action. The agency may revoke 
the individual's credential and, if appropriate, direct the contractor 
to remove that individual from work on the contract. The agency also 
may request that OPM conduct a reimbursable investigation. And, of 
course, there are avenues for agencies to alert oversight or other law 
enforcement entities if there are potential criminal conduct concerns.
                         3. steps going forward
    During the last 5 years, the Office of Management and Budget (OMB), 
OPM, DoD, and the Office of the Director of National Intelligence 
(ODNI) have worked together on a reform effort to ensure that there is 
an efficient, aligned system for assessing suitability or fitness for 
Federal employment, eligibility for logical and physical access to 
Federal systems and facilities, eligibility for access to Classified 
information, or fitness to perform work under a Federal contract (where 
required by the contract) through background investigations and 
appropriate adjudications. At the direction of Executive Order 13467, 
the Performance Accountability Council (PAC), including OPM, OMB, and 
ODNI, was established to ensure that the work of security clearance 
reform be accomplished in this context and throughout the Executive 
branch.
    Our work together with the PAC has done much to improve reciprocity 
so that agencies can place individuals who have already been vetted 
into new positions without delay and without further expense. In the 
last 3 years, we have enhanced OPM's Central Verification System, 
established as directed by the Intelligence Reform and Terrorism 
Prevention Act to support reciprocity, by expanding the reporting of 
credentialing, suitability, and security determinations from agencies, 
adding new data fields, and enabling enterprise access for intelligence 
community users to search relevant details. We have enhanced and 
professionalized the training of investigators and adjudicators to 
ensure consistency across the Executive branch and promote confidence 
when reciprocity is applied. And our work to create an aligned system 
for investigations will enable greater reciprocity opportunities as we 
now begin to implement revised investigative standards.
    Pursuant to Executive Order 13467, the Director of National 
Intelligence, as the Security Executive Agent, provides guidance and 
oversight of the process that Government agencies use to make 
determinations of eligibility for access to Classified information and 
may amend the current adjudicative criteria (established by the 
President) if the need arises. In addition, the Security Executive 
Agent is responsible for establishing the criteria governing the 
conduct of background investigations related to determinations of 
eligibility for access to Classified information.
    OPM, DoD, and ODNI co-chair the interagency working group chartered 
with establishing the first Federal standards for assessing the quality 
of National security and suitability background investigations 
Government-wide. The proposed standards are currently under Department 
and agency review with a pilot exercise to be initiated in this year to 
validate ease and consistency in application of the standards.
    At the President's direction, under the leadership of the Director 
of OMB, OPM is working with its colleagues on the PAC to review the 
oversight, nature, and implementation of National security, 
credentialing, and fitness standards for individuals working at Federal 
facilities. Our review is focused on steps that can be taken to 
strengthen these processes and implementation of solutions identified 
during the course of recent reform efforts. In particular, we recognize 
that evolution of the security clearance process must include the 
ability to obtain and easily share relevant information on a more 
frequent or real-time basis.
                             4. conclusion
    Thank you for this opportunity to testify, and I would be happy to 
answer any questions you may have.

    Mr. King. Thank you, Mr. Miller.
    Mr. Marshall, you are recognized. Thank you.

  STATEMENT OF GREGORY MARSHALL, CHIEF SECURITY OFFICER, U.S. 
                DEPARTMENT OF HOMELAND SECURITY

    Mr. Marshall. Thank you, Chairman King, Ranking Member 
Higgins. Good afternoon.
    Thank you for the opportunity to provide testimony on 
personnel security vetting for Federal employees and contract 
personnel for the U.S. Department of Homeland Security. I am 
Greg Marshall, chief security officer of Homeland Security. I 
lead the dedicated men and women who make up the Office of the 
Chief Security Officer.
    I am a career official with nearly 30 years of law 
enforcement experience.
    The mission of my office is to safeguard the Department's 
people, property, and information. Accordingly, I am 
responsible for security-related issues affecting more than 
235,000 DHS employees that comprise the Department.
    The security oversight and guidance authority of my office 
applies across the Department. However, DHS operational 
components play a significant role in managing their workforce, 
including personnel vetting.
    The diverse missions and responsibilities of the Department 
and the personnel used to meet these missions underscore the 
challenges involved with the personnel security discipline. The 
tragic events of Monday, September 16 at the Navy Yard have 
placed the issues of physical security, access control, and 
personnel vetting front and center in the minds of security 
professionals across the Federal landscape.
    I need to make clear, however, that security aims to manage 
risk, not eliminate it. Our job is to do everything we can to 
keep our employees safe, and in doing so we have the benefit of 
policies and procedures, processes and technologies, both 
proven and emerging, to guide and improve our key security 
programs.
    When we consider the security for a Federal facility, 
including access control, we follow the Interagency Security 
Committee standards. Facilities are assessed for risk and 
appropriate countermeasures are employed. The outcome of these 
risk assessments drive the level of protection to include an 
appropriate access control posture. A one-size security 
solution does not and cannot fit all.
    For employees to qualify for access to facilities they must 
undergo a background investigation to establish suitability for 
employment. These investigations are, for the most part, 
conducted by OPM. Contractors are screened in a similar process 
to determine fitness to work on a DHS contract and have 
facility access.
    Background investigations for suitability and fitness 
examine character and conduct, and based upon all available 
information, we make an adjudicative decision concerning a 
person's suitability or fitness for employment or access to 
Classified information.
    It is important to note that any background investigation, 
no matter how rigorous, is no guarantee that all relevant 
information is known, available, or has been included. Also, a 
background investigation may not reliably predict future 
behavior. A background investigation is an exercise in risk 
management establishing some basic facts, but cannot guarantee 
any individual's continuing fitness to carry out their duties 
or to behave in a lawful or safe manner.
    Recent improvements in our ability to manage these inherent 
risks include Homeland Security Presidential Directive 12, 
which mandated a Government-wide standard for secure and 
reliable credential to be used when accessing Federal 
facilities. This credential, known as a PIV card, represents a 
marked improvement over legacy identity cards.
    The background investigation process itself is undergoing 
major Government-wide reform with phased implementation to 
begin this fiscal year. The concept of continuous evaluation 
has been developed to supplement normal reinvestigation reviews 
with a process that examines conduct between normal 
reinvestigation time frames. Relevant security information, 
like a recent arrest, would become available in near-real time, 
helping to ensure that Classified information and/or Federal 
facilities are appropriately safeguarded.
    Finally, this administration's recent information-sharing 
and safeguarding initiative, also known as Insider Threat, 
seeks to complement background investigations and continuous 
evaluation with continuous monitoring. This program will 
incorporate and analyze data in near-real time from a much 
broader set of sources. Its focus is the protection of 
Classified information but its applicability to suitability and 
contractor fitness is evident.
    To conclude, suitability and clearance determinations and 
access control to Federal facilities remains a work in progress 
but are evolving towards dramatic improvement. We have made 
progress but managing employee and facility risks will continue 
to be a challenge.
    Thank you again for the opportunity to testify today and I 
look forward to your questions.
    [The prepared statement of Mr. Marshall follows:]
                 Prepared Statement of Gregory Marshall
                           November 13, 2013
    Chairman King, Ranking Member Higgins, Members of the committee, 
good morning and thank you for the opportunity to provide testimony on 
personnel security.
    I am Greg Marshall, chief security officer of the U.S. Department 
of Homeland Security (DHS). I lead the dedicated men and women who make 
up the Office of the Chief Security Officer. My office is an element of 
the Department's Management Directorate, and I report to the under 
secretary for management.
    The mission of our office is to safeguard the Department's people, 
property, information, and systems. Accordingly, the DHS chief security 
officer is responsible for security-related issues affecting the more 
than 235,000 DHS employees that compose the Department. I exercise DHS-
wide security program authorities in the areas of personnel security, 
physical security, administrative security, special security, identity 
management, special access programs, and security training and 
awareness. I also support the chief information officer in the area of 
IT security policy and the under secretary for intelligence and 
analysis in the protection of intelligence sources and methods, and 
accreditations of Classified facilities.
    The security oversight and guidance authority of my office applies 
across the Department. However, Operational components play a 
significant role in managing the facilities which they inhabit, 
including access to those facilities. The diverse missions and 
responsibilities of the Department underscore the challenges involved 
within the physical security and access control disciplines.
    The tragic events of Monday, September 16 at the Washington Navy 
Yard have placed the issue of physical security, access control, and 
personnel vetting front and center in the minds of security 
professionals across the Federal landscape.
    Shortly after the Navy yard incident, I convened a meeting of the 
Department's Chief Security Officer Council. Each component chief 
security officer (CSO) acknowledged the significance of the Navy Yard 
tragedy to access control and the underlying vetting processes and each 
CSO commented on the complexities of vetting and access, including the 
costs involved. With this in mind, the Department remains committed to 
ensuring that only those persons with a legitimate need to access any 
given facility are allowed to enter, that those persons possess no 
prohibited items, and that the backgrounds of those persons who do 
enter have been vetted to an appropriate level of rigor.
    I would make clear, however, that security involves risk 
management. Our job is to do everything we can to reduce the risk and 
keep our employees safe. In pursuit of our mission, please be assured 
that DHS security leadership and the professionals we manage have the 
benefit of extensive knowledge, training, and experience. We also have 
the benefit of comprehensive policies, procedures, processes, and 
emerging technologies to help guide and improve our key security 
programs.
    For example, when we consider the security posture for a Federal 
facility, including access control, we at DHS follow Interagency 
Security Committee standards. During this process, facilities are 
assessed for risk, and appropriate countermeasures are employed to 
mitigate the risks. Using a decision matrix involving mission 
criticality, the sensitivity of the activities conducted, threats to 
the facility, facility population of persons who work and visit there, 
and other factors, an appropriate Federal Security Level is assigned to 
each facility. Accordingly, the outcomes of these risk assessments 
drive the level of protection for each facility, to include an 
appropriate access control posture. Simply put, a one-size security 
solution does not and cannot fit all facilities.
    For our employees to qualify for access to a Federal DHS facility, 
an employee must undergo a background investigation to establish his or 
her suitability for employment. These investigations are, for the most 
part, conducted by OPM on behalf of DHS. Contractors are screened in a 
process similar to employees in order to determine their fitness to 
work on a DHS contract and have unescorted access to DHS facilities. 
Background investigations for suitability and fitness examine character 
and conduct behaviors, such as criminal history, alcohol and drug use, 
and employment history, among others. Based upon all available 
information, a personnel security specialist makes an adjudicative 
decision concerning a person's suitability or fitness for employment, 
including access to facilities.
    It is important to understand that a background investigation for 
suitability and one for a security clearance processes with multiple 
levels of investigation dependent upon the access required and level of 
risk. A security clearance allows access to Classified information, 
while a favorable suitability or fitness determination allows 
employment and access to facilities. On its own, a background 
investigation for suitability does not permit access to Classified 
information.
    It is also important to note that a background investigation for 
either a suitability determination or a security clearance, no matter 
how rigorous, is no guarantee that every bit of relevant information 
about the individual is available or has been included. For example, 
prior criminal convictions and/or arrest information may not be 
reported in State and/or Federal repositories, often simply due to data 
entry resource constraints. It is these types of checks that are basic 
elements of any Federal employment background investigation.
    Also, it is important to note that a background investigation may 
not be an indicator of future behavior. Even those who have 
successfully undergone the most rigorous set of background checks 
available--even a comprehensive polygraph examination--may someday 
prove untrustworthy. Ultimately, a Federal background investigation 
only examines past behavior and is sometimes based on limited available 
information.
    A Federal background investigation is an exercise in risk 
management, establishing some basic facts such as identity, 
citizenship, criminal history, etc. However, a background investigation 
cannot be characterized, in and of itself, does not guarantee any 
single individual's continuing day-to-day fitness to carry out his or 
her employment responsibilities or to behave in a lawful and safe 
manner.
    With these limitations in mind, there have been several recent 
improvements to the ability of the Government to manage these inherent 
risks.
    First, Homeland Security Presidential Directive 12 (HSPD-12) 
mandated the development and implementation of a Government-wide 
standard for a secure and reliable Personal Identity Verification (PIV) 
card for gaining access to Federally-controlled facilities. To date, 
DHS Headquarters and components have issued over 250,000 PIV cards to 
Federal employees and contractors. For the first time, this process has 
effectively linked the completion of a person's background 
investigation with the issuance to that person of a unique Federal 
identity credential. The PIV card represents a marked improvement over 
the various legacy access/identity cards, but is only a part of any 
solution. As a result, Federal facility access control processes use 
this PIV card and its various authentication mechanisms to verify the 
identity of the holder, link the holder to the card, and link the card 
itself to a database of valid employees and contractors having 
legitimate business at any given facility.
    Second, the background investigation process itself is undergoing a 
major Government-wide reform effort, to include revised Federal 
investigative standards signed jointly by the Director of National 
Intelligence and the Director of the Office of Personnel Management in 
2012, and phased implementation to begin this fiscal year. With the 
Federal investigative standards, the concept of ``continuous 
evaluation'' is being developed to supplement the normal re-
investigation reviews of employees which, under the revised standards, 
will be in 5-year increments, with a Government-led process that 
examines a person's conduct within his or her normal re-investigation 
time frames. As such, relevant security information like a recent 
arrest or conviction for a crime outside of the Federal system, for 
example, would become available on a timelier basis to security 
officials responsible for assessing a person's eligibility for access 
to Classified information, thereby helping to ensure that Classified 
information and/or Federal facilities are appropriately safeguarded. 
``Continuous evaluation'' represents a significant process improvement 
over current capabilities and will mitigate some of the limitations in 
the existing background investigation process discussed above.
    Finally, this administration's recent Information Sharing and 
Safeguarding initiative, also known as ``Insider Threat,'' seeks to 
complement background investigations and continuous evaluation with 
continuous monitoring. Continuous monitoring will incorporate data in 
near-real time from a much broader set of data sources, as compared to 
information that was previously available in the background 
investigation process. The initiative focuses on monitoring certain IT 
systems and incorporates analysis and collation software to aid in the 
identification of behavioral trends that could be indicative of an 
insider threat problem. Strict referral protocols are in place to 
investigate abnormalities. The aim is the detection and mitigation of 
threats to Classified information before any damage can be done. The 
focus of this program is the protection of Classified information, but 
its applicability to other behavioral issues, including suitability and 
contractor fitness, is evident.
    In conclusion, the suitability determinations of and access control 
to Federal facilities by Federal employees and contractors remains a 
work in progress, but is evolving toward dramatic improvement. It is 
our responsibility as DHS security leaders, with the support of 
Congress, to ensure a safe and secure workplace. We have made important 
strides, but assessing and managing employee and facility risks will 
continue to be a challenge in the future. We will continue to work 
every day to meet these challenges. Thank you again for the opportunity 
to testify today.

    Mr. King. Thank you, Mr. Marshall.
    Mr. Prioletti please, 5 minutes. Again, if you go over 5 
minutes don't worry about it. Just a general guideline.

 STATEMENT OF BRIAN A. PRIOLETTI, ASSISTANT DIRECTOR, SPECIAL 
 SECURITY DIRECTORATE, NATIONAL COUNTERINTELLIGENCE EXECUTIVE, 
          OFFICE OF DIRECTOR OF NATIONAL INTELLIGENCE

    Mr. Prioletti. Chairman King, Ranking Member Higgins, and 
distinguished Members of the subcommittee, thank you for the 
invitation to provide information on the Government's practices 
and procedures regarding security clearances and background 
investigations. My statement will address the role of the DNI--
Director of National Intelligence, as a security executive 
agent, his authorities and responsibilities for oversight of 
the security clearance process across the Government, areas in 
need of attention in the current process, and initiatives 
underway to address those areas.
    Pursuant to Executive Order 13467, the DNI, as the security 
executive agent, is responsible for the development and 
oversight of effective, efficient, uniform policies and 
procedures governing the timely conduct of investigations and 
adjudications for eligibility to access Classified information 
or eligibility to hold a sensitive position. The security 
executive agent also serves as the final authority to designate 
agencies to conduct background investigations and determine 
eligibility for access to Classified information, and ensures 
reciprocal recognition of investigations and adjudication 
determinations among agencies.
    A background check is an essential component of the 
security clearance process. It is required prior to making a 
determination for eligibility for access to Classified or 
eligibility to occupy a sensitive position. The 1997 Federal 
Investigative Standards, as amended in 2004, are the current 
standards used to conduct background investigations. The scope 
of the background investigation is dependent upon the level of 
security clearance required.
    For example, a Secret clearance includes National agency, 
local agency, and credit checks. An interview with an 
individual being considered for the clearance is conducted if 
necessary to resolve issues resulting from the required checks.
    A Top Secret clearance requires the above checks as well as 
interviews of the individual being considered for the 
clearance, his or her references, coworkers, supervisors, 
neighbors, and other individuals.
    Regardless of the type of clearance involved, identified 
issues must be fully investigated and resolved prior to any 
adjudication.
    The adjudicative guidelines issued by the White House in 
2005 currently serve as the Government-wide guide for most 
eligibility decisions. The DNI has issued separate adjudicative 
guidelines for sensitive compartmented information, known as 
SCI, and Special Access Program access. Adjudicative decisions 
are made by utilizing the whole-person concept, which is a 
careful weighing of available, reliable information about the 
person, past and present, favorable and unfavorable.
    Recent events involving individuals with clearances have 
further emphasized the importance of a robust security 
clearance program and areas in need of attention in the current 
security clearance process. Under the direction of the 
Performance Accountability Council, known as the PAC, the ODNI, 
in collaboration with OMB, OPM, DOD, and other Federal 
partners, have been leading security clearance reform efforts 
for several years. Although these efforts are still a work in 
progress, when mature they will mitigate adjudicative gaps and 
enhance the Nation's security posture.
    One critical element for a robust security clearance 
process is to establish an effective capability to assess an 
individual's continuing eligibility on a more frequent basis. 
Under current policies and practices, an individual's continued 
eligibility for access to Classified information relies heavily 
on a periodic reinvestigation--essentially a background 
investigation and adjudication conducted every 5 years for a 
Top Secret clearance or every 10 years for Secret clearances.
    The time interval between periodic reinvestigations leaves 
the U.S. Government potentially uninformed as to the behavior 
that could pose a security or counterintelligence risk. 
Continuous evaluation, known as C.E., is a tool that will 
assist in closing this information gap. Per Executive Order 
13467 and the revised Federal Investigation Standards, which 
were signed in 2012, C.E. allows for a review at any time of an 
individual with eligibility or access to Classified information 
or in a sensitive position to ensure that that individual 
continues to meet the requirements for eligibility.
    C.E., as envisioned in the reformed security clearance 
process, includes automated record checks of commercial 
databases, Government databases, and other information lawfully 
available. Manual checks are inefficient and resource-
intensive. The C.E. initiative currently under development will 
enable us to more reliably determine an individual's 
eligibility to hold a security clearance or a sensitive 
position on an on-going basis.
    The DNI's C.E. tool must provide an enterprise-wide 
solution that will ensure timely sharing of relevant 
information across security elements of the Federal Government 
as appropriate. There are a number of on-going pilot studies to 
assess the feasibility of selected automated record checks and 
the utility of publicly-available electronic information to 
include social media sites in the personnel security process.
    While we fully recognize the value of publicly-available 
electronic information and its relevancy from an adjudicative 
perspective, there are resource, privacy, and civil liberty 
concerns that must be addressed as we incorporate such checks 
into our security processes.
    In addition to supporting security clearance 
determinations, robust C.E. initiatives will also support and 
inform the Insider Threat programs. Damage assessments 
regarding individuals involved in unauthorized disclosures of 
Classified information or acts of workplace violence have 
uncovered information that was not discovered during the 
existing security clearance process. Timely knowledge of such 
information might have prompted a security review or increased 
monitoring of that individual.
    We must build an enterprise-wide C.E. program that will 
promote the sharing of trustworthiness, eligibility, and risk 
data within and across agencies to ensure the information is 
readily available for analysis and action.
    Consistency in the quality of these investigations and 
adjudications is another area in need of attention. The revised 
Federal Investigative Standards will provide clear guidance on 
issue identification and resolution. They will also create an 
aligned system for consistent assessment of suitability, 
fitness, or eligibility for access to Classified information 
for Federal employment or to perform work under a Federal 
contract.
    These standards will be implemented through a phased 
approach beginning in 2014 and continuing through 2017. In 
addition, the ODNI, OPM, and DOD are co-chairing a working 
group to develop common standards and metrics for evaluating 
quality and comprehensiveness for background investigations. In 
addition, the DNI has hosted a working group to refine the 
adjudicative guidelines, and recommendations regarding these 
guidelines are in the policy development stage.
    Another initiative supporting a more robust security 
clearance process was the development of the National Training 
Standards, which were approved in August 2012 by the DNI and 
the director of OPM. These training standards create uniform 
training criteria for background investigators, National 
security adjudicators, and suitability adjudicators. Personnel 
mobility makes the application of uniform standards for 
conducting a background investigation and rendering an 
eligibility determination essential.
    The training standards and revised investigative standards 
complement each other and, when both begin implementation in 
2014, will result in a more robust security clearance process 
that supports security clearance reciprocity.
    As a final note, OMB, the DNI, and OPM are engaged in two 
further initiatives that will enhance security clearance 
processing. We are currently revising 5 Code of Federal 
Regulation 732, which will be reissued as 1400, to provide 
clarifying guidance to departments and agencies when 
designating National security-sensitive positions.
    Guidance from the reissued regulation will be used to 
update OPM's position designation tool. This will assist 
departments and agencies in determining position sensitivity 
and the type of clearance processing that will be required for 
each position.
    The DNI is also working with OMB and OPM to revise the 
Standard Form 86, which is the questionnaire for National 
security positions. This form is completed by individuals 
requiring security clearances and is a starting point for the 
security background investigation.
    In accordance with the President's directive, OMB is 
conducting a 120-day review of the security and suitability 
processes. In support of that effort, the DNI, as security 
executive agent, will work in coordination with OPM, DOD, and 
the other agencies to review the policies, procedures, and 
processes related to the initiation, investigation, and 
adjudication of background investigations for personnel 
security, suitability for employment, and fitness for perform 
on a contract.
    I want to emphasize the DNI's resolve to lead these 
initiatives discussed today and to continue the collaborative 
efforts established with OMB, DOD, OPM, and our other Federal 
partners. Thank you for the opportunity to update the 
subcommittee.
    [The prepared statement of Mr. Prioletti follows:]
                Prepared Statement of Brian A. Prioletti
                           November 13, 2013
    Chairman King, Ranking Member Higgins, and distinguished Members of 
the subcommittee, thank you for the invitation to provide information 
on the Government's practices and procedures regarding security 
clearances and background investigations. My statement will address the 
role of the Director of National Intelligence (DNI), as Security 
Executive Agent, his authorities and responsibilities for oversight of 
the security clearance process across Government, areas in need of 
attention in the current process, and initiatives underway to address 
those areas.
            the dni's role in the security clearance process
    Pursuant to Executive Order 13467, the DNI, as the Security 
Executive Agent, is responsible for the development and oversight of 
effective, efficient, uniform policies and procedures governing the 
timely conduct of investigations and adjudications for eligibility for 
access to Classified information or eligibility to hold a sensitive 
position. The Security Executive Agent also serves as the final 
authority to designate agencies to conduct background investigations 
and determine eligibility for access to Classified information, and 
ensures reciprocal recognition of investigations and adjudication 
determinations among agencies.
 the relationship between background checks and the security clearance 
                                process
    A background check is an essential component of the security 
clearance process. It is required prior to making a determination for 
eligibility for access to Classified information or eligibility to 
occupy a sensitive position. The 1997 Federal Investigative Standards, 
as amended in 2004, are the current standards used to conduct 
background investigations. The scope of the background investigation is 
dependent upon the level of security clearance required. A SECRET 
clearance includes National agency, local agency, and credit checks. An 
interview with the individual being considered for the clearance is 
conducted if necessary to resolve issues resulting from the required 
checks. A TOP SECRET clearance requires the above checks as well as 
interviews of the individual being considered for the clearance, and 
his or her references, co-workers, supervisors, neighbors, and other 
individuals. Regardless of the type of clearance involved, identified 
issues must be fully investigated and resolved prior to any 
adjudication.
 the odni's standards and policies for adjudicating security clearance 
                              applications
    The Adjudicative Guidelines issued by the White House in 2005, 
currently serve as the Government-wide guide for most eligibility 
decisions. The DNI has issued separate Adjudicative Guidelines for 
Sensitive Compartmented Information (SCI) and Special Access Program 
access. Adjudicative decisions are made by utilizing the whole-person 
concept, which is the careful weighing of available, reliable 
information about the person, past and present, favorable and 
unfavorable.
   areas of the security clearance process in need of attention and 
                          potential solutions
    Recent events involving individuals with clearances have further 
emphasized the importance of a robust security clearance program and 
areas in need of attention in the current security clearance process. 
Under the direction of the Performance Accountability Council, the 
ODNI, in collaboration with OMB, OPM, DoD, and other Federal partners, 
has been leading security clearance reform efforts for several years. 
Although these efforts are still a work in progress, when mature, they 
will mitigate adjudicative gaps and enhance the Nation's security 
posture.
    One critical element for a robust security clearance process is to 
establish an effective capability to assess an individual's continuing 
eligibility on a more frequent basis. Under current policies and 
practices, an individual's continued eligibility for access to 
Classified information relies heavily on a periodic reinvestigation; 
essentially a background investigation and adjudication conducted every 
5 years for Top Secret clearances or every 10 years for Secret 
clearances. The time interval between periodic reinvestigations leaves 
the U.S. Government potentially uninformed as to behavior that poses a 
security or counterintelligence risk.
    Continuous Evaluation (CE) is a tool that will assist in closing 
this information gap. Per Executive Order 13467 and the revised Federal 
Investigative Standards signed in 2012, CE allows for a review at any 
time of an individual with eligibility or access to Classified 
information, or in a sensitive position, to ensure that the individual 
continues to meet the requirements for eligibility.
    CE, as envisioned in the reformed security clearance process, 
includes automated records checks of commercial databases, Government 
databases, and other information lawfully available. Manual checks are 
inefficient and resource-intensive. The CE initiative currently under 
development will enable us to more reliably determine an individual's 
eligibility to hold a security clearance or sensitive position on an 
on-going basis. The DNI's CE tool must provide an enterprise-wide 
solution that will ensure timely sharing of relevant information across 
security elements of the Federal Government, as appropriate. There are 
a number of on-going pilot studies to assess the feasibility of select 
automated records checks and the utility of publicly available 
electronic information, to include social media sites, in the personnel 
security process. While we fully recognize the value of publicly-
available electronic information and its relevancy from an adjudicative 
perspective, there are resource, privacy, and civil liberty concerns 
that must be addressed as we incorporate such checks into our security 
processes.
    In addition to supporting security clearance determinations, robust 
CE initiatives will also support and inform Insider Threat Programs. 
Damage assessments regarding individuals involved in unauthorized 
disclosures of Classified information or acts of workplace violence 
have uncovered information that was not discovered during the existing 
security clearance process. Timely knowledge of such information might 
have prompted a security review or increased monitoring of the 
individual. We must build an enterprise-wide CE program that will 
promote the sharing of trustworthiness, eligibility, and risk data 
within and across agencies to ensure that information is readily 
available for analysis and action.
    Consistency in the quality of investigations and adjudications is 
another area in need of attention. The revised Federal Investigative 
Standards will provide clear guidance on issue identification and 
resolution. They will also create an aligned system for consistent 
assessment of suitability, fitness, or eligibility for access to 
Classified information for Federal employment or to perform work under 
a Federal contract. The standards will be implemented through a phased 
approach beginning in 2014 and continuing through 2017. In addition, 
ODNI, OPM, and DOD are co-chairing a working group to develop common 
standards and metrics for evaluating quality and comprehensiveness of 
background investigations. Furthermore, ODNI has hosted a working group 
to refine the Adjudicative Guidelines; recommendations regarding these 
guidelines are in the policy development phase.
    Another initiative supporting a more robust security clearance 
process was the development of the National Training Standards, which 
were approved in August 2012 by the DNI and Director of OPM. These 
training standards create uniform training criteria for background 
investigators, National security adjudicators, and suitability 
adjudicators. Personnel mobility makes the application of uniform 
standards for conducting a background investigation and rendering an 
eligibility determination essential. The training standards and the 
revised investigative standards complement each other and when both 
begin implementation in 2014, will result in a more robust security 
clearance process that support security clearance reciprocity.
    As a final note, OMB, the ODNI, and OPM are engaged in two further 
initiatives that will enhance security clearance processing. We are 
currently revising 5 Code of Federal Regulation 732, which will be 
reissued as 1400, to provide clarifying guidance to departments and 
agencies when designating National security sensitive positions. 
Guidance from the reissued regulation will be used to update OPM's 
Position Designation Tool. This will assist departments and agencies in 
determining position sensitivity and the type of security clearance 
processing that will be required for each position. ODNI is also 
working with OMB and OPM to revise the Standard Form 86, Questionnaire 
for National Security Positions. This form is completed by individuals 
requiring security clearances and is the starting point for a 
background investigation. It is imperative that we collect accurate 
information pertinent to today's security and counterintelligence 
concerns.
the dni's role in the president's directive for inter-agency review of 
                         the clearance process
    In accordance with the President's directive, OMB is conducting a 
120-day review of security and suitability processes. In support of 
that effort, the DNI, as Security Executive Agent, will work in 
coordination with the OPM, DoD, and other agencies to review the 
policies, processes, and procedures related to the initiation, 
investigation, and adjudication of background investigations for 
personnel security, suitability for employment, and fitness to perform 
work on a contract.
                                closing
    Over the last 5 years, significant strides have been made in 
improving the security clearance process, particularly in the terms of 
timeliness and aligned National policies that provide the framework for 
consistency across Government. I want to emphasize the DNI's resolve to 
lead the initiatives discussed today and to continue the collaborative 
efforts established with OMB, DoD, OPM, and our other Federal partners. 
I thank you for the opportunity to update the subcommittee at this time 
and ODNI looks forward to working with you on these matters.

    Mr. King. Thank you, Mr. Prioletti.
    Ms. Farrell, you are recognized. Thank you.

STATEMENT OF BRENDA S. FARRELL, DIRECTOR, DEFENSE CAPABILITIES 
  AND MANAGEMENT, MILITARY AND DOD CIVILIAN PERSONNEL ISSUES, 
             U.S. GOVERNMENT ACCOUNTABILITY OFFICE

    Ms. Farrell. Chairman King, Ranking Member Higgins, thank 
you for the opportunity to be here today to discuss the quality 
of the Federal Government's personnel security clearance 
process. Let me briefly summarize my written statement for the 
record.
    Personnel security clearances allow for access to 
Classified information on a need-to-know basis. Recent events, 
such as unauthorized disclosures of Classified information, 
have shown that there is much more work to be done by Federal 
agencies to help ensure the process functions effectively and 
efficiently so that only trustworthy individuals hold security 
clearances.
    Over the years, GAO has conducted a broad body of work on 
personnel security clearance issues that gives us a unique 
historical perspective. My remarks today are based on our 
reports issued between 2008 and 2013 on DOD's personnel 
security clearance program and Government-wide reform efforts. 
My main message today is that quality--and importantly, quality 
metrics--should be built into every step of the process.
    My written statement is divided into three parts. The first 
addresses the roles and responsibilities of several Executive 
branch agencies involved in the security clearance process.
    For example, in 2008 Executive Order 13467 designated the 
DNI as the security executive agent. As such, the DNI is 
responsible for policies and procedures to help ensure the 
effective, efficient, and timely completion of background 
investigations and adjudications related to determinations of 
eligibility for access to Classified information. Importantly, 
since 2008 reform efforts to improve the personnel security 
clearance process throughout the Government have been 
principally driven and overseen by the Performance 
Accountability Council, which is chaired by the deputy director 
for management at OMB. Executive Order 13467 established this 
governance structure.
    The second part of my written statement addresses the 
different phases of the clearance process. Executive branch 
agencies rely on a multi-phased process that includes 
requirements determination; application; investigation; 
adjudication; appeals, if applicable, where a clearance has 
been denied; and reinvestigation for renewals or upgrade of an 
existing clearance.
    The first step of the process is for the Executive branch 
agency, such as Homeland Security, to determine whether a 
position requires access to Classified information. After an 
individual has been selected for a position that requires a 
personnel security clearance he or she submits an application 
for a clearance. OPM--often contractors--conducts the 
background investigation. Adjudicators from the requesting 
agency use the resulting OPM investigation report and consider 
Federal guidelines to determine whether an applicant is 
eligible for a clearance.
    The last part of my written statement addresses the extent 
to which the Executive branch assesses quality of the process. 
For more than a decade GAO has emphasized the need to build and 
monitor quality throughout the clearance process to promote 
oversight and positive outcomes, such as maximizing the 
likelihood that individuals who are security risk will be 
scrutinized more closely.
    For example, in 2009 we reported concerns with the quality 
of OPM's investigations. We reported that with respect to 
initial Top Secret clearances adjudicated in July 2008 for DOD, 
documentation was incomplete for most of OPM's investigative 
reports.
    We independently estimated that 87 percent of 3,500 
investigative reports that DOD adjudicators used to make a 
clearance eligibility decisions were missing some required 
documentation, such as the verification of all of the 
applicant's employment. We also estimated that about 12 percent 
of the 3,500 reports did not contain the required applicant's 
interview.
    In 2009 we recommended that OPM measure the frequency with 
which its investigative reports met Federal Investigative 
Standards in order to improve the quality of the investigative 
documentation. As of August 2013 OPM had not implemented this 
recommendation.
    In summary, the large number of personnel eligible to hold 
clearances--over 4.9 million--coupled with risk to National 
security underscores the need for a high-quality personnel 
security clearance process.
    Mr. Chairman, this concludes my remarks. I will be pleased 
to take questions when you are ready.
    [The prepared statement of Ms. Farrell follows:]
                Prepared Statement of Brenda S. Farrell
                           November 13, 2013
                             gao highlights
    Highlights of GAO-14-186T, a testimony before the Subcommittee on 
Counterterrorism and Intelligence, Committee on Homeland Security, U.S. 
House of Representatives.
Why GAO Did This Study
    In 2012, the DNI reported that more than 4.9 million Federal 
Government and contractor employees held or were eligible to hold a 
personnel security clearance. Furthermore, GAO has reported that the 
Federal Government spent over $1 billion to conduct more than 2 million 
background investigations in fiscal year 2011. A high-quality process 
is essential to minimize the risks of unauthorized disclosures of 
Classified information and to help ensure that information about 
individuals with criminal activity or other questionable behavior is 
identified and assessed as part of the process for granting or 
retaining clearances. Security clearances may allow personnel to gain 
access to Classified information that, through unauthorized disclosure, 
can in some cases cause exceptionally grave damage to U.S. National 
security. Recent events, such as unauthorized disclosures of Classified 
information, have illustrated the need for additional work to help 
ensure the process functions effectively and efficiently.
    This testimony addresses the: (1) Roles and responsibilities of 
different Executive branch agencies involved in the personnel security 
process; (2) different phases of the process; and (3) extent that 
agencies assess the quality of the process. This testimony is based on 
GAO work issued between 2008 and 2013 on DOD's personnel security 
clearance program and Government-wide suitability and security 
clearance reform efforts. As part of that work, GAO: (1) Reviewed 
statutes, Executive Orders, guidance, and processes; (2) examined 
agency data on timeliness and quality; (3) assessed reform efforts; and 
(4) reviewed samples of case files for DOD personnel.
personnel security clearances.--opportunities exist to improve quality 
                         throughout the process
What GAO Found
    Several agencies in the Executive branch have key roles and 
responsibilities in the personnel security clearance process. Executive 
Order 13467 designates the director of National Intelligence (DNI) as 
the Security Executive Agent, who is responsible for developing 
policies and procedures for background investigations and 
adjudications. The Office of Personnel Management (OPM) conducts 
investigations for most of the Federal Government. Adjudicators from 
agencies, such as the Departments of Defense (DOD) and Homeland 
Security, that request background investigations use the investigative 
report and consider Federal adjudicative guidelines when making 
clearance determinations. Reform efforts to enhance the personnel 
security process throughout the Executive branch are principally driven 
and overseen by the Performance Accountability Council, which is 
chaired by the Deputy Director for Management at the Office of 
Management and Budget (OMB).
    Executive branch agencies rely on a multi-phased personnel security 
clearance process that includes requirements determination, 
application, investigation, adjudication, appeals (if applicable, where 
a clearance has been denied), and reinvestigation (for renewal or 
upgrade of an existing clearance). In the requirements determination 
phase, agency officials must determine whether positions require access 
to Classified information. After an individual has been selected for a 
position that requires a personnel security clearance and the 
individual submits an application for a clearance, investigators--often 
contractors--from OPM conduct background investigations for most 
Executive branch agencies. Adjudicators from requesting agencies use 
the information from these investigations and consider Federal 
adjudicative guidelines to determine whether an applicant is eligible 
for a clearance. If a clearance is denied or revoked by an agency, 
appeals of the adjudication decision are possible. Individuals granted 
clearances are subject to reinvestigations at intervals that are 
dependent on the level of security clearance.
    Executive branch agencies do not consistently assess quality 
throughout the security clearance process, in part because they have 
not fully developed and implemented metrics to measure quality in key 
aspects of the process. For example, GAO reported in May 2009 that, 
with respect to initial Top Secret clearances adjudicated in July 2008 
for DOD, documentation was incomplete for most of OPM's investigative 
reports. GAO also estimated that 12 percent of the 3,500 reports did 
not contain the required personal subject interview. To improve the 
quality of investigative documentation, GAO recommended that OPM 
measure the frequency with which its reports met Federal investigative 
standards. OPM did not agree or disagree with this recommendation, and 
as of August 2013 had not implemented it. Further, GAO reported in 2010 
that agencies do not consistently and comprehensively track the 
reciprocity of personnel security clearances, which is an agency's 
acceptance of a background investigation or clearance determination 
completed by any authorized investigative or adjudicative agency. OPM 
created a metric in early 2009 to track reciprocity, but this metric 
does not track how often an existing security clearance was 
successfully honored. GAO recommended that OMB develop comprehensive 
metrics to track reciprocity. OMB agreed with the recommendation, but 
has not yet fully implemented actions to implement this recommendation.
    Chairman King, Ranking Member Higgins, and Members of the 
subcommittee: Thank you for the opportunity to be here to discuss the 
quality of the Federal Government's personnel security clearance 
process. In 2012, the Director of National Intelligence (DNI) reported 
that more than 4.9 million Federal Government and contractor employees 
held or were eligible to hold a security clearance,\1\ posing 
formidable challenges to those responsible for deciding who should be 
granted a clearance. Personnel security clearances allow for access to 
Classified information on a need-to-know basis. Federal agencies also 
use other processes and procedures to determine if an individual should 
be granted access to certain Government buildings or facilities or be 
employed as a military, Federal civilian, or contractor employee for 
the Federal Government. Separate from, but related to, personnel 
security clearances are determinations of suitability that the 
Executive branch uses to ensure individuals are suitable, based on 
character and conduct, for Federal employment in their agency or 
position. We have reported that the Federal Government spent over $1 
billion to conduct more than 2 million background investigations (in 
support of both personnel security clearances and suitability 
determinations for Government employment outside of the intelligence 
community) in fiscal year 2011.\2\
---------------------------------------------------------------------------
    \1\ Office of the Director of National Intelligence, 2012 Report on 
Security Clearance Determinations (January 2013).
    \2\ GAO, Background Investigations: Office of Personnel Management 
Needs to Improve Transparency of Its Pricing and Seek Cost Savings, 
GAO-12-197 (Washington, DC: Feb. 28, 2012).
---------------------------------------------------------------------------
    A high-quality process is essential in order to minimize the risks 
of unauthorized disclosures of Classified information and to help 
ensure that information about individuals with criminal activity or 
other questionable behavior is identified and assessed as part of the 
process for granting or retaining clearances. Security clearances may 
allow personnel to gain access to Classified information that, through 
unauthorized disclosure, can in some cases cause exceptionally grave 
damage to U.S. National security. Recent events, such as unauthorized 
disclosures of Classified information, have illustrated both the 
potential consequences of such disclosures and the need for additional 
work on the part of Federal agencies to help ensure the process 
functions effectively and efficiently, so that only trustworthy 
individuals obtain and keep security clearances and the resulting 
access to Classified information that clearances make possible. We have 
an extensive body of work on issues related to the personnel security 
clearance process going back over a decade. Since 2008, we have focused 
on the Department of Defense's (DOD) clearance program and the 
Government-wide effort to reform the security clearance process, and 
have reported repeatedly on the need to build quality into the process.
    My testimony today will focus on three topics related to personnel 
security clearances: (1) The roles and responsibilities of the 
different Executive branch agencies involved in the personnel security 
clearance process, (2) the different phases of the security clearance 
process that are typically followed by most Executive branch agencies, 
and (3) the extent that Executive branch agencies assess the quality of 
the security clearance process during these different phases.
    This testimony is based on our reports and testimonies issued from 
2008 through 2013 on DOD's personnel security clearance program and 
Government-wide suitability and security clearance reform efforts. A 
list of these related products appears at the end of my statement. As 
part of the work for these products, we reviewed relevant statutes and 
Executive Orders, Federal guidance, and processes; examined agency 
personnel security clearance policies; examined agency data on the 
timeliness and quality of investigations and adjudications; assessed 
reform efforts; and reviewed a sample of investigative and adjudication 
files for DOD personnel. Further, as part of our on-going effort to 
determine the status of agency actions to address our prior 
recommendations, we reviewed the current proposal to revise a relevant 
Federal regulation regarding position designation.
    The work upon which this testimony is based was conducted in 
accordance with generally accepted Government auditing standards. Those 
standards require that we plan and perform the audit to obtain 
sufficient, appropriate evidence to provide a reasonable basis for our 
findings and conclusions based on our audit objectives. We believe that 
the evidence obtained provides a reasonable basis for our findings and 
conclusions based on our audit objectives. Additional details about the 
scope and methodology can be found in each of these related products.
    agencies' roles and responsibilities in the personnel security 
                           clearance process
    Several agencies in the Executive branch have key roles and 
responsibilities in the Federal Government's personnel security 
clearance process. In a 2008 memorandum, the President called for a 
reform of the security clearance and suitability determination 
processes and subsequently issued Executive Order 13467,\3\ which 
designates the Director of National Intelligence (DNI) as the Security 
Executive Agent. As such, the DNI is responsible for developing 
policies and procedures to help ensure the effective, efficient, and 
timely completion of background investigations and adjudications 
relating to determinations of eligibility for access to Classified 
information and eligibility to hold a sensitive position. Positions 
designated as sensitive are any positions within a department or agency 
where the occupant could bring about, by virtue of the nature of the 
position, a material adverse effect on National security.
---------------------------------------------------------------------------
    \3\ Executive Order No. 13467, Reforming Processes Related to 
Suitability for Government Employment, Fitness for Contractor 
Employees, and Eligibility for Access to Classified National Security 
Information (June 30, 2008).
---------------------------------------------------------------------------
    Further, Executive Order 13467 established a Suitability and 
Security Clearance Performance Accountability Council, commonly called 
the Performance Accountability Council, that is accountable to the 
President for achieving the goals of the reform effort, which include 
an efficient, practical, reciprocal, and aligned system for 
investigating and determining eligibility for access to Classified 
information. Under the Executive Order, this council is responsible for 
driving implementation of the reform effort, including ensuring the 
alignment of security and suitability processes, holding agencies 
accountable for implementation, and establishing goals and metrics for 
progress. The Order also appointed the Deputy Director for Management 
at the Office of Management and Budget (OMB) as the chair of the 
council.\4\ In addition, the Executive Order states that agency heads 
shall assist the Performance Accountability Council and executive 
agents in carrying out any function under the Order, as well as 
implementing any policies or procedures developed pursuant to the 
Order.
---------------------------------------------------------------------------
    \4\ The Performance Accountability Council is comprised of the 
Director of National Intelligence as the Security Executive Agent, the 
Director of OPM as the Suitability Executive Agent, and the Deputy 
Director for Management, Office of Management and Budget, as the chair 
with the authority to designate officials from additional agencies to 
serve as members. As of June 2012, the council included representatives 
from the Departments of Defense, Energy, Health and Human Services, 
Homeland Security, State, Treasury, and Veterans Affairs, and the 
Federal Bureau of Investigation.
---------------------------------------------------------------------------
    Executive branch agencies that request background investigations 
use the information from investigative reports to determine whether an 
applicant is eligible for a personnel security clearance. Two of the 
agencies that grant the most security clearances are DOD and the 
Department of Homeland Security (DHS). DOD accounts for the majority of 
all personnel security clearances, and spent $787 million on 
suitability and security clearance background investigations in fiscal 
year 2011.\5\ Investigators--often contractors--from Federal 
Investigative Services within the Office of Personnel Management (OPM) 
\6\ conduct the investigations for most of the Federal Government.\7\ 
DOD is OPM's largest customer, and its Under Secretary of Defense for 
Intelligence (USD(I)) is responsible for developing, coordinating, and 
overseeing the implementation of DOD policy, programs, and guidance for 
personnel, physical, industrial, information, operations, chemical/
biological, and DOD Special Access Program security. Additionally, the 
Defense Security Service, under the authority, direction, and control 
of USD(I), manages and administers the DOD portion of the National 
Industrial Security Program \8\ for the DOD components and other 
Federal agencies by agreement, as well as providing security education 
and training, among other things.
---------------------------------------------------------------------------
    \5\ GAO, Background Investigations: Office of Personnel Management 
Needs to Improve Transparency of Its Pricing and Seek Cost Savings, 
GAO-12-197 (Washington, DC: Feb. 28, 2012).
    \6\ OPM's Federal Investigative Services employs both Federal and 
contract investigators to conduct work required to complete background 
investigations. The Federal staff constitutes about 25 percent of that 
workforce, while OPM currently also has contracts for investigative 
fieldwork with several investigation firms, constituting the remaining 
75 percent of its investigative workforce.
    \7\ In 2005, the Office of Management and Budget designated OPM as 
the agency responsible for, among other things, the day-to-day 
supervision and monitoring of security clearance investigations, and 
for tracking the results of individual agency-performed adjudications, 
subject to certain exceptions. However, the Office of the Director of 
National Intelligence can designate other agencies as an ``authorized 
investigative agency'' pursuant to 50 U.S.C.  3341(b)(3), as 
implemented through Executive Order 13467. Alternatively, under 5 
U.S.C.  1104(a)(2), OPM can redelegate any of its investigative 
functions subject to performance standards and a system of oversight 
prescribed by OPM under 5 U.S.C.  1104(b). Agencies without delegated 
authority rely on OPM to conduct their background investigations while 
agencies with delegated authority--including the Defense Intelligence 
Agency, National Security Agency, National Geospatial-Intelligence 
Agency, Central Intelligence Agency, Federal Bureau of Investigation, 
National Reconnaissance Office, and Department of State--have been 
authorized to conduct their own background investigations.
    \8\ The National Industrial Security Program was established by 
Executive Order 12829 to safeguard Federal Government Classified 
information that is released to contractors, licensees, and grantees of 
the United States Government. Executive Order 12829, National 
Industrial Security Program (Jan. 6, 1993, as amended).
---------------------------------------------------------------------------
    DHS spent more than $57 million on suitability and security 
clearance background investigations in fiscal year 2011. Within DHS, 
the Chief Security Officer develops, implements, and oversees the 
Department's security policies, programs, and standards; delivers 
security training and education to DHS personnel; and provides security 
support to the DHS components. The Chief of DHS's Personnel Security 
Division, under the direction of the Chief Security Officer, has 
responsibility for personnel security and suitability policies, 
programs, and standards, including procedures for granting, denying, 
and revoking access to Classified information as well as initiating and 
adjudicating personnel security and suitability background 
investigations and periodic reinvestigations of applicants. Within the 
DHS components, the component Chief Security Officers implement 
established personnel security directives and policies within their 
respective components.
    The personnel security clearance process has also been the subject 
of Congressional oversight and statutory reporting requirements. 
Section 3001 of the Intelligence Reform and Terrorism Prevention Act of 
2004 \9\ prompted Government-wide suitability and security clearance 
reform. The act required, among other matters, an annual report to 
Congress--in February of each year from 2006 through 2011--about 
progress and key measurements on the timeliness of granting security 
clearances. It specifically required those reports to include the 
periods of time required for conducting investigations and adjudicating 
or granting clearances. However, the Intelligence Reform and Terrorism 
Prevention Act requirement for the Executive branch to report annually 
on its timeliness expired in 2011. More recently, the Intelligence 
Authorization Act of 2010 \10\ established a new requirement that the 
President annually report to Congress the total amount of time required 
to process certain security clearance determinations for the previous 
fiscal year for each element of the intelligence community.\11\ The 
Intelligence Authorization Act of 2010 additionally requires that those 
annual reports include the total number of active security clearances 
throughout the United States Government, to include both Government 
employees and contractors. Unlike the Intelligence Reform and Terrorism 
Prevention Act of 2004 reporting requirement, the requirement to submit 
these annual reports does not expire.
---------------------------------------------------------------------------
    \9\ Pub. L. No. 108-458 (2004) (relevant sections codified at 50 
U.S.C.  3341).
    \10\ Pub. L. No. 111-259,  367 (2010) (codified at 50 U.S.C.  
3104).
    \11\ This timeliness reporting requirement applies only to the 
elements of the intelligence community; it does not cover non-
intelligence agencies that were covered by the reporting requirements 
in the Intelligence Reform and Terrorism Prevention Act of 2004.
---------------------------------------------------------------------------
                phases of the personnel security process
    To help ensure the trustworthiness and reliability of personnel in 
positions with access to Classified information, Executive branch 
agencies rely on a personnel security clearance process that includes 
multiple phases: Requirements determination, application, 
investigation, adjudication, appeals (if applicable, where a clearance 
has been denied), and reinvestigation (where applicable, for renewal or 
upgrade of an existing clearance). Figure 1 illustrates the steps in 
the personnel security clearance process, which is representative of 
the general process followed by most Executive branch agencies and 
includes procedures for appeals and renewals. While different 
departments and agencies may have slightly different personnel security 
clearance processes, the phases that follow are illustrative of a 
typical process.\12\ Since 1997, Federal agencies have followed a 
common set of personnel security investigative standards and 
adjudicative guidelines for determining whether Federal civilian 
workers, military personnel, and others, such as private industry 
personnel contracted by the Government, are eligible to hold a security 
clearance.
---------------------------------------------------------------------------
    \12\ The general process for performing a background investigation 
for either a Secret or Top Secret clearance is the same; however, the 
level of detail and types of information gathered for a Top Secret 
clearance is more substantial than a Secret clearance. 


Requirements Determination Phase
    Executive branch agencies first determine which of their 
positions--military, civilian, or private-industry contractors--require 
access to Classified information and, therefore, which people must 
apply for and undergo a personnel security clearance investigation. 
This involves assessing the risk and sensitivity level associated with 
that position, to determine whether it requires access to Classified 
information and, if required, the level of access. Security clearances 
are generally categorized into three levels: Top Secret, Secret, and 
Confidential.\13\ The level of classification denotes the degree of 
protection required for information and the amount of damage that 
unauthorized disclosure could reasonably be expected to cause to 
National defense.\14\
---------------------------------------------------------------------------
    \13\ A Top Secret clearance is generally also required for access 
to Sensitive Compartmented Information--Classified intelligence 
information concerning or derived from intelligence sources, methods, 
or analytical processes that is required to be protected within formal 
access control systems established and overseen by the Director of 
National Intelligence.
    \14\ Unauthorized disclosure could reasonably be expected to cause: 
(1) ``Damage,'' in the case of confidential information; (2) ``serious 
damage,'' in the case of secret information; and (3) ``exceptionally 
grave damage,'' in the case of Top Secret information. Exec. Order No. 
13526, 75 Fed. Reg. 707 (Dec. 29, 2009).
---------------------------------------------------------------------------
    A sound requirements process is important because requests for 
clearances for positions that do not need a clearance or need a lower 
level of clearance increase investigative workloads and costs. A high 
volume of clearances continue to be processed and a sound requirements 
determination process is needed to effectively manage costs, since 
agencies spend significant amounts annually on National security and 
other background investigations. In addition to cost implications, 
limiting the access to Classified information and reducing the 
associated risks to National security underscore the need for Executive 
branch agencies to have a sound process to determine which positions 
require a security clearance.
    Agency heads are responsible for designating positions within their 
respective agencies as sensitive if the occupant of that position 
could, by virtue of the nature of the position, bring about a material 
adverse effect on National security.\15\ In addition, Executive Order 
12968, issued in 1995, makes the heads of agencies--including Executive 
branch agencies and the military departments--responsible for 
establishing and maintaining an effective program to ensure that access 
to Classified information by each employee is clearly consistent with 
the interests of National security. This order also states that, 
subject to certain exceptions, eligibility for access to Classified 
information shall only be requested and granted on the basis of a 
demonstrated, foreseeable need for access. Further, part 732 of Title 5 
of the Code of Federal Regulations provides requirements and procedures 
for the designation of National security positions, which include 
positions that: (1) Involve activities of the Government that are 
concerned with the protection of the Nation from foreign aggression or 
espionage, and (2) require regular use of or access to Classified 
National security information.\16\
---------------------------------------------------------------------------
    \15\ Sensitivity level is based on the potential of the occupant of 
a position to bring about a material adverse effect on National 
security. Some factors include whether the position requires access to 
Classified information or involves the formulation of security-related 
policy. The sensitivity level of a position then informs the type of 
background investigation required of the individual in that position. 
The relationship between sensitivity and resulting clearances is 
detailed in Figure 2.
    \16\ Those requirements in Part 732 apply to National security 
positions in the competitive service, Senior Executive Service 
positions filled by career appointment within the Executive branch, and 
certain excepted service positions.
---------------------------------------------------------------------------
    Part 732 of Title 5 of the Code of Federal Regulations also states 
that most Federal Government positions that could bring about, by 
virtue of the nature of the position, a material adverse effect on 
National security must be designated as a sensitive position and 
require a sensitivity level designation. The sensitivity-level 
designation determines the type of background investigation required, 
with positions designated at a greater sensitivity level requiring a 
more extensive background investigation. Part 732 establishes three 
sensitivity levels--special-sensitive, critical-sensitive, and 
noncritical-sensitive--which are described in figure 2. According to 
OPM, positions that an agency designates as special-sensitive and 
critical-sensitive require a background investigation that typically 
results in a Top Secret clearance. Noncritical-sensitive positions 
typically require an investigation that supports a Secret or 
Confidential clearance. OPM also defines non-sensitive positions that 
do not have a National security element, and thus do not require a 
security clearance, but still require a designation of risk for 
suitability purposes. That risk level informs the type of investigation 
required for those positions. Those investigations include aspects of 
an individual's character or conduct that may have an effect on the 
integrity or efficiency of the service.
    Figure 2 illustrates the process used by both DOD and DHS to 
determine the need for a personnel security clearance for a Federal 
civilian position generally used Government-wide. 
[GRAPHICS NOT AVAILABLE IN TIFF FORMAT]

Application Phase
    Once an applicant is selected for a position that requires a 
personnel security clearance, the applicant must obtain a security 
clearance in order to gain access to Classified information. To 
determine whether an investigation would be required, the agency 
requesting a security clearance investigation conducts a check of 
existing personnel security databases to determine whether there is an 
existing security clearance investigation underway or whether the 
individual has already been favorably adjudicated for a clearance in 
accordance with current standards. If such a security clearance does 
not exist for that individual, a security officer from an Executive 
branch agency: (1) Requests an investigation of an individual requiring 
a clearance; (2) forwards a personnel security questionnaire (Standard 
Form 86) to the individual to complete using OPM's electronic 
Questionnaires for Investigations Processing (e-QIP) system or a paper 
copy; (3) reviews the completed questionnaire; and (4) sends the 
questionnaire and supporting documentation, such as fingerprints and 
signed waivers, to OPM or its investigation service provider.
Investigation Phase
    During the investigation phase, investigators--often contractors--
from OPM's Federal Investigative Services use Federal investigative 
standards and OPM's internal guidance to conduct and document the 
investigation of the applicant. The scope of information gathered in an 
investigation depends on the needs of the client agency and the 
personnel security clearance requirements of an applicant's position, 
as well as whether the investigation is for an initial clearance or a 
reinvestigation to renew a clearance. For example, in an investigation 
for a Top Secret clearance, investigators gather additional information 
through more time-consuming efforts, such as traveling to conduct in-
person interviews to corroborate information about an applicant's 
employment and education. However, many background investigation types 
have similar components. For instance, for all investigations, 
information that applicants provide on electronic applications are 
checked against numerous databases. Both Secret and Top Secret 
investigations contain credit and criminal history checks, while Top 
Secret investigations also contain citizenship, public record, and 
spouse checks as well as reference interviews and an Enhanced Subject 
Interview to gain insight into an applicant's character. Table 1 
highlights the investigative components generally associated with the 
Secret and Top Secret clearance levels. After OPM, or the designated 
provider, completes the background investigation, the resulting 
investigative report is provided to the requesting agencies for their 
internal adjudicators.

 
----------------------------------------------------------------------------------------------------------------
                                                                       Type of Background Investigation
          Type of Information Gathered by Component          ---------------------------------------------------
                                                                       Secret                  Top Secret
----------------------------------------------------------------------------------------------------------------
(1) Personnel security questionnaire: The reported answers    X                         X
 on an electronic SF-85P or SF-86 form.
(2) Fingerprints: Fingerprints submitted electronically or    X                         X
 manually.
(3) National agency check: Data from Federal Bureau of        X                         X
 Investigation, military records, and other agencies as
 required (with fingerprint).
(4) Credit check: Data from credit bureaus where the subject  X                         X
 lived/worked/attended school for at least 6 months.
(5) Local agency checks: Data from law enforcement agencies   X                         X
 where the subject lived/worked/attended school during the
 past 10 years or--in the case of reinvestigations--since
 the last security clearance investigation.
(6) Date and place of birth: Corroboration of information                               X
 supplied on the personnel security questionnaire.
(7) Citizenship: For individuals born outside of the United                             X
 States, verification of U.S. citizenship directly from the
 appropriate registration authority.
(8) Education: Verification of most recent or significant     M                         X
 claimed attendance, degree, or diploma.
(9) Employment: Review of employment records and interviews   M                         X
 with workplace references, such as supervisors and
 coworkers.
(10) References: Data from interviews with subject-           M                         X
 identified and investigator-developed leads.
(11) Data from Federal Bureau of Investigation, military                                X
 records, and other agencies as required (without
 fingerprint).
(12) Former spouse: Data from interview(s) conducted with                               X
 spouse(s) divorced within the last 10 years or since the
 last investigation or reinvestigation.
(13) Neighborhoods: Interviews with neighbors and             M                         X
 verification of residence through records check.
(14) Public records: Verification of issues, such as                                    X
 bankruptcy, divorce, and criminal and civil court cases.
(15) Enhanced Subject Interview: Collection of relevant       \1\                       X
 data, resolution of significant issues or inconsistencies.
----------------------------------------------------------------------------------------------------------------
Source.--DOD and OPM.
Note.--The content and amount of information collected as part of a personnel security clearance investigation
  is dependent on a variety of case-specific factors, including the history of the applicant and the nature of
  the position; however, items 1-15 are typically collected for the types of investigations indicated.
M=Components with this notation are checked through requests for information sent by OPM's Federal Investigative
  Services through the mail.
\1\ The Enhanced Subject Interview was developed by the Joint Reform Team and implemented by OPM in 2011 and
  serves as an in-depth discussion between the interviewer and the subject to ensure a full understanding of the
  applicant's information, potential issues, and mitigating factors. It is included in a Minimum Background
  Investigation, one type of suitability investigation, and can be triggered by the presence of issues in a
  Secret-level investigation.

    In December 2012, the Office of the Director of National 
Intelligence (ODNI) and OPM jointly issued a revised version of the 
Federal investigative standards for the conduct of background 
investigations for individuals that work for or on behalf of the 
Federal Government. According to October 31, 2013 testimony by an ODNI 
official, the revised standards will be implemented through a phased 
approach beginning in 2014 and continuing through 2017.\17\
---------------------------------------------------------------------------
    \17\ Brian A. Prioletti, Assistant Director, Special Security 
Directorate, National Counterintelligence Executive, Office of the 
Director of National Intelligence, Statement for the Record: Open 
Hearing on Security Clearance Reform, testimony before the Senate 
Committee on Homeland Security and Governmental Affairs, 113th Cong., 
1st sess., October 31, 2013.
---------------------------------------------------------------------------
Adjudication and Appeals Phases
    During the adjudication phase, adjudicators from the hiring agency 
use the information from the investigative report along with Federal 
adjudicative guidelines to determine whether an applicant is eligible 
for a security clearance.\18\ To make clearance eligibility decisions, 
the adjudicative guidelines specify that adjudicators consider 13 
specific areas that elicit information about: (1) Conduct that could 
raise security concerns and (2) factors that could allay those security 
concerns and permit granting a clearance.\19\ The adjudication process 
is a careful weighing of a number of variables, to include 
disqualifying and mitigating factors, known as the ``whole-person'' 
concept. For example, when a person's life history shows evidence of 
unreliability or untrustworthiness, questions can arise as to whether 
the person can be relied on and trusted to exercise the responsibility 
necessary for working in a secure environment where protecting National 
security is paramount. As part of the adjudication process, the 
adjudicative guidelines require agencies to determine whether a 
prospective individual meets the adjudicative criteria for determining 
eligibility, including personal conduct and financial considerations. 
If an individual has conditions that raise a security concern or may be 
disqualifying, the adjudicator evaluates whether there are other 
factors that mitigate such risks (such as a good-faith effort to repay 
a Federal tax debt). On the basis of this assessment, the agency may 
make a risk-management decision to grant the security-clearance 
eligibility determination, possibly with a warning that future 
incidents of a similar nature may result in revocation of access.
---------------------------------------------------------------------------
    \18\ For industry personnel, the Defense Security Service (DSS) 
adjudicated clearance eligibility for DOD and 24 other Federal 
agencies, by agreement, using OPM-provided investigative reports. 
However, DOD is in the process of consolidating its adjudication 
facilities, including those for industry personnel. Per DOD 5220.22-M, 
National Industrial Security Program: Operating Manual (Feb. 28, 2006 
incorporating changes Mar. 28, 2013), those agencies are: (1) National 
Aeronautics and Space Administration; (2) Department of Commerce; (3) 
General Services Administration; (4) Department of State; (5) Small 
Business Administration; (6) National Science Foundation; (7) 
Department of the Treasury; (8) Department of Transportation; (9) 
Department of the Interior; (10) Department of Agriculture; (11) 
Department of Labor; (12) Environmental Protection Agency; (13) 
Department of Justice; (14) Federal Reserve System; (15) U.S. 
Government Accountability Office; (16) U.S. Trade Representative; (17) 
U.S. International Trade Commission; (18) U.S. Agency for International 
Development; (19) Nuclear Regulatory Commission; (20) Department of 
Education; (21) Department of Health and Human Services; (22) 
Department of Homeland Security; (23) Federal Communications 
Commission; and (24) Office of Personnel Management.
    \19\ Federal guidelines state that clearance decisions require a 
common-sense determination of eligibility for access to Classified 
information based upon careful consideration of the following 13 areas: 
Allegiance to the United States; foreign influence; foreign preference; 
sexual behavior; personal conduct; financial considerations; alcohol 
consumption; drug involvement; emotional, mental, and personality 
disorders; criminal conduct; security violations; outside activities; 
and misuse of information technology systems. Further, the guidelines 
require adjudicators to evaluate the relevance of an individual's 
overall conduct by considering factors such as the nature, extent, and 
seriousness of the conduct; the circumstances surrounding the conduct, 
to include knowledgeable participation; the frequency and recency of 
the conduct; and the individual's age and maturity at the time of the 
conduct, among others.
---------------------------------------------------------------------------
    If a clearance is denied or revoked, appeals of the adjudication 
decision are generally possible. We have work underway to review the 
process for security clearance revocations. We expect to issue a report 
on this process in the spring of 2014.
Reinvestigation Phase
    Once an individual has obtained a personnel security clearance and 
as long as they remain in a position that requires access to Classified 
National security information, that individual is reinvestigated 
periodically at intervals that are dependent on the level of security 
clearance. For example, Top Secret clearance-holders are reinvestigated 
every 5 years, and Secret clearance-holders are reinvestigated every 10 
years. Some of the information gathered during a reinvestigation would 
focus specifically on the period of time since the last approved 
clearance, such as a check of local law enforcement agencies where an 
individual lived and worked since the last investigation.
    Further, the Joint Reform Team \20\ began an effort to review the 
possibility of continuous evaluations, which would ascertain on a more 
frequent basis whether an eligible employee with access to Classified 
information continues to meet the requirements for access. 
Specifically, the team proposed to move from periodic review to that of 
continuous evaluation, meaning annually for Top Secret and similar 
positions and at least once every 5 years for Secret or similar 
positions, as a means to reveal security-relevant information earlier 
than the previous method, and provide increased scrutiny on populations 
that could potentially represent risk to the Government because they 
already have access to Classified information. The revised Federal 
investigative standards state that the Top Secret level of security 
clearances may be subject to continuous evaluation.
---------------------------------------------------------------------------
    \20\ In 2007, DOD and the Office of the Director of National 
Intelligence (ODNI) formed the Joint Security Clearance Process Reform 
Team, known as the Joint Reform Team, to improve the security clearance 
process Government-wide.
---------------------------------------------------------------------------
 agencies do not consistently assess quality throughout the personnel 
                       security clearance process
    Executive branch agencies do not consistently assess quality 
throughout the personnel security clearance process, in part because 
they have not fully developed and implemented metrics to measure 
quality in key aspects of the personnel security clearance process. To 
promote oversight and positive outcomes, such as maximizing the 
likelihood that individuals who are security risks will be scrutinized 
more closely, we have emphasized, since the late 1990s,\21\ the need to 
build and monitor quality throughout the personnel security clearance 
process. While our work historically was focused on DOD, particularly 
since we placed DOD's personnel security clearance program on our high-
risk list \22\ in 2005 because of delays in completing clearances,\23\ 
we have included DHS in our most recent reviews of personnel security 
clearance issues. Having assessment tools and performance metrics in 
place is a critical initial step toward instituting a program to 
monitor and independently validate the effectiveness and sustainability 
of corrective measures.
---------------------------------------------------------------------------
    \21\ GAO, DOD Personnel: Inadequate Personnel Security 
Investigations Pose National Security Risks, GAO/NSIAD-00-12 
(Washington, DC: Oct. 27, 1999).
    \22\ Every 2 years at the start of a new Congress, GAO issues a 
report that identifies Government operations that are high-risk due to 
their vulnerabilities to fraud, waste, abuse, and mismanagement, or are 
most in need of transformation to address economy, efficiency, or 
effectiveness.
    \23\ GAO, High-Risk Series: An Update, GAO-05-207 (Washington, DC: 
Jan. 1, 2005).
---------------------------------------------------------------------------
Guidance Not Developed for Determining if Positions Require a Clearance 
        or for Reviewing Existing Position Designations
    In July 2012, we reported that the DNI, as the Security Executive 
Agent, had not provided agencies clearly-defined policy and procedures 
to consistently determine if a position requires a personnel security 
clearance, or established guidance to require agencies to review and 
revise or validate existing Federal civilian position designations.\24\ 
As a result, we concluded that DHS and DOD, along with other Executive 
branch agencies, do not have reasonable assurance that security 
clearance position designations are correct, which could compromise 
National security if positions are underdesignated, or create 
unnecessary and costly investigative coverage if positions are 
overdesignated.
---------------------------------------------------------------------------
    \24\ GAO, Security Clearances: Agencies Need Clearly Defined Policy 
for Determining Civilian Position Requirements, GAO-12-800 (Washington, 
DC: July 12, 2012).
---------------------------------------------------------------------------
    In the absence of clear guidance, agencies are using a position 
designation tool that OPM designed to determine the sensitivity and 
risk levels of civilian positions that, in turn, inform the type of 
investigation needed.\25\ This tool--namely, the Position Designation 
of National Security and Public Trust Positions--is intended to enable 
a user to evaluate a position's National security and suitability 
requirements so as to determine a position's sensitivity and risk 
levels, which in turn dictate the type of background investigation that 
will be required for the individual who will occupy that position. Both 
DOD and DHS components use the tool. In addition, DOD issued guidance 
in September 2011 \26\ and August 2012 \27\ requiring its personnel to 
use OPM's tool to determine the proper position sensitivity 
designation. A DHS instruction requires personnel to designate all DHS 
positions--including positions in the DHS components--by using OPM's 
position sensitivity designation guidance, which is the basis of the 
tool.\28\
---------------------------------------------------------------------------
    \25\ According to OPM's Federal Investigations Notice No. 10-06, 
Position Designation Requirements (Aug. 11, 2010), the tool is 
recommended for all agencies requesting OPM investigations and required 
for all positions in the competitive service, positions in the excepted 
service where the incumbent can be noncompetitively converted to the 
competitive service, and career appointments in the Senior Executive 
Service.
    \26\ DOD, Washington Headquarters Services, Implementation of the 
Position Designation Automated Tool (Sept. 27, 2011).
    \27\ DOD Instruction 1400.25, Volume 731, DOD Civilian Personnel 
Management System: Suitability and Fitness Adjudication For Civilian 
Employees (Aug. 24, 2012).
    \28\ DHS Management Instruction 121-01-007, Department of Homeland 
Security Personnel Suitability and Security Program (June 2009).
---------------------------------------------------------------------------
    OPM audits, however, have found inconsistency in these position 
designations, and some agencies described problems implementing OPM's 
tool. For example, during the course of our 2012 review, DOD and DHS 
officials raised concerns regarding the guidance provided through the 
tool and expressed that they had difficulty implementing it. 
Specifically, officials from DHS's U.S. Immigration and Customs 
Enforcement stated that the use of the tool occasionally resulted in 
inconsistency, such as over- or under-designating a position, and 
expressed a need for additional clear, easily-interpreted guidance on 
designating National security positions. DOD officials stated that they 
have had difficulty implementing the tool because it focuses more on 
suitability than security, and the National security aspects of DOD's 
positions are of more concern to them than the suitability aspects. 
Further, although the DNI was designated as the Security Executive 
Agent in 2008, ODNI officials noted that the DNI did not have input 
into recent revisions of OPM's position designation tool.
    As a result, we recommended that the DNI, in coordination with the 
Director of OPM and other Executive branch agencies as appropriate, 
issue clearly-defined policy and procedures for Federal agencies to 
follow when determining if Federal civilian positions require a 
personnel security clearance. In written comments on our July 2012 
report, the ODNI concurred with this recommendation. In May 2013, ODNI 
and OPM jointly drafted a proposed revision to the Federal regulations 
on position designation which, if finalized in its current form, would 
provide additional requirements and examples of position duties at each 
sensitivity level. We also recommended that once those policies and 
procedures are in place, the DNI and the Director of OPM, in their 
roles as executive agents, collaborate to revise the position 
designation tool to reflect the new guidance. ODNI and OPM concurred 
with this recommendation and recently told us that they are in the 
process of revising the tool.
    In July 2012, we also reported that the Executive branch did not 
have a consistent process for reviewing and validating existing 
security clearance requirements for Federal civilian positions.\29\ 
According to Executive Order 12968, the number of employees that each 
agency determines is eligible for access to Classified information 
shall be kept to the minimum required, and, subject to certain 
exceptions, eligibility shall be requested or granted only on the basis 
of a demonstrated, foreseeable need for access. During our 2012 review 
of several DOD and DHS components, we found that officials were aware 
of the need to keep the number of security clearances to a minimum but 
were not always subject to a standard requirement to review and 
validate the security clearance needs of existing positions on a 
periodic basis. We found, instead, that agencies' policies provided for 
a variety of practices for reviewing the clearance needs of Federal 
civilian positions. In addition, agency officials told us that their 
policies were implemented inconsistently.
---------------------------------------------------------------------------
    \29\ GAO-12-800.
---------------------------------------------------------------------------
    DOD's personnel security regulation and other guidance \30\ 
provides DOD components with criteria to consider when determining 
whether a position is sensitive or requires access to Classified 
information, and some DOD components also have developed their own 
guidance. According to DHS guidance, supervisors are responsible for 
ensuring that: (1) Position designations are updated when a position 
undergoes major changes (e.g., changes in missions and functions, job 
responsibilities, work assignments, legislation, or classification 
standards), and (2) position security designations are assigned as new 
positions are created. Some DHS components have additional requirements 
to review position designation more regularly to cover positions other 
than those newly created or vacant. For example, U.S. Coast Guard 
guidance \31\ states that hiring officials and supervisors should 
review position descriptions even when there is no vacancy and, as 
appropriate, either revise or review them. In addition, according to 
officials in U.S. Immigration and Customs Enforcement, supervisors are 
supposed to review position descriptions annually during the 
performance review process to ensure that the duties and 
responsibilities on the position description are up-to-date and 
accurate. However, officials stated that U.S. Immigration and Customs 
Enforcement does not have policies or requirements in place to ensure 
any particular level of detail in that review.
---------------------------------------------------------------------------
    \30\ DOD 5200.2-R, Department of Defense Personnel Security Program 
(January 1987, reissued incorporating changes Feb. 23, 1996), as 
modified by Under Secretary of Defense Memorandum, Implementation of 
the Position Designation Automated Tool (May 10, 2011).
    \31\ U.S. Coast Guard, CG-121, Civilian Hiring Guide for 
Supervisors and Managers, ver. 2 (June 11, 2010).
---------------------------------------------------------------------------
    During our 2012 review, DOD and DHS officials acknowledged that 
overdesignating a position can result in expenses for unnecessary 
investigations. When a position is overdesignated, additional resources 
are unnecessarily spent conducting the investigation and adjudication 
of a background investigation that exceeds agency requirements. Without 
a requirement to consistently review, revise, or validate existing 
security clearance position designations, we concluded that Executive 
branch agencies--such as DOD and DHS--may be hiring and budgeting for 
both initial and periodic security clearance investigations using 
position descriptions and security clearance requirements that do not 
reflect National security needs. Moreover, since reviews were not being 
done consistently, DOD, DHS, and other Executive branch agencies did 
not have reasonable assurance that they were keeping to a minimum the 
number of positions that require security clearances on the basis of a 
demonstrated and foreseeable need for access.
    Therefore, we recommended in July 2012 that the DNI, in 
coordination with the Director of OPM and other Executive branch 
agencies as appropriate, issue guidance to require Executive branch 
agencies to periodically review and revise or validate the designation 
of all Federal civilian positions. In written comments on that report, 
the ODNI concurred with this recommendation and stated that as duties 
and responsibilities of Federal positions may be subject to change, it 
planned to work with OPM and other Executive branch agencies to ensure 
that position designation policies and procedures include a provision 
for periodic reviews. OPM stated in its written comments to our report 
that it would work with the DNI on guidance concerning periodic reviews 
of existing designations.
    ODNI and OPM are currently in the process of finalizing revisions 
to the position designation Federal regulation. As part of our on-going 
processes to routinely monitor the status of agency actions to address 
our prior recommendations, we note that the proposed regulation would 
newly require agencies to conduct a one-time reassessment of position 
designations within 24 months of the final regulation's effective date, 
which is an important step towards ensuring that the current 
designations of National security positions are accurate. However, the 
National security environment and the duties and descriptions of 
positions may change over time, thus the importance of periodic review 
or validation. The proposed regulation, if finalized in its current 
form, would not require a periodic reassessment of positions' need for 
access to Classified information as we recommended. We believe this 
needs to be done and, as part of monitoring the status of our 
recommendation, we will continue to review the finalized Federal 
regulation and any related guidance that directs position designation 
to determine whether periodic review or validation is required.
Quality of OPM Investigative Reports Not Measured
    As of August 2013, OPM had not yet implemented metrics to measure 
the completeness of its investigative reports--results from background 
investigations--although we have previously identified deficiencies in 
these reports. OPM supplies about 90 percent of all Federal clearance 
investigations, including those for DOD. For example, in May 2009 we 
reported that, with respect to DOD initial Top Secret clearances 
adjudicated in July 2008, documentation was incomplete for most OPM 
investigative reports. We independently estimated that 87 percent of 
about 3,500 investigative reports that DOD adjudicators used to make 
clearance decisions were missing at least one type of documentation 
required by Federal investigative standards.\32\ The type of 
documentation most often missing from investigative reports was 
verification of all of the applicant's employment, followed by 
information from the required number of social references for the 
applicant and complete security forms. We also estimated that 12 
percent of the 3,500 investigative reports did not contain a required 
personal subject interview. Officials within various Executive branch 
agencies have noted to us that the information gathered during the 
interview and investigative portion of the process is essential for 
making adjudicative decisions.
---------------------------------------------------------------------------
    \32\ Estimates in our May 2009 report were based on our review of a 
random sample of 100 OPM-provided investigative reports for initial Top 
Secret clearances granted in July 2008 by the U.S. Army, U.S. Navy, and 
U.S. Air Force central adjudication facilities and have margins of 
error, based on a 95 percent confidence interval, of +/- 10 percentage 
points or fewer.
---------------------------------------------------------------------------
    At the time of our 2009 review, OPM did not measure the 
completeness of its investigative reports, which limited the agency's 
ability to explain the extent or the reasons why some reports were 
incomplete. As a result of the incompleteness of OPM's investigative 
reports on DOD personnel, we recommended in May 2009 that OPM measure 
the frequency with which its investigative reports meet Federal 
investigative standards, so that the Executive branch can identify the 
factors leading to incomplete reports and take corrective actions.\33\ 
OPM did not agree or disagree with our recommendation.
---------------------------------------------------------------------------
    \33\ GAO, DOD Personnel Clearances: Comprehensive Timeliness 
Reporting, Complete Clearance Documentation, and Quality Measures Are 
Needed to Further Improve the Clearance Process, GAO-09-400 
(Washington, DC: May 19, 2009).
---------------------------------------------------------------------------
    In a subsequent February 2011 report, we noted that OMB, ODNI, DOD, 
and OPM leaders had provided Congressional members with metrics to 
assess the quality of the security clearance process, including 
investigative reports and other aspects of the process.\34\ For 
example, the Rapid Assessment of Incomplete Security Evaluations was 
one tool the Executive branch agencies planned to use for measuring 
quality, or completeness, of OPM's background investigations.\35\ 
However, according to an OPM official in June 2012, OPM chose not to 
use this tool. Instead, OPM stated that it opted to develop another 
tool. In following up on our 2009 recommendations, as of August 2013, 
OPM had not provided enough details on its tool for us to determine if 
the tool had met the intent of our 2009 recommendation, and included 
the attributes of successful performance measures identified in best 
practices, nor could we determine the extent to which the tool was 
being used.
---------------------------------------------------------------------------
    \34\ GAO, High-Risk Series: An Update, GAO-11-278 (Washington, DC: 
Feb. 2011).
    \35\ The Rapid Assessment of Incomplete Security Evaluations tool 
was developed by DOD to track the quality of investigations conducted 
by OPM for DOD personnel security clearance investigations, measured as 
a percent of investigations completed that contained deficiencies.
---------------------------------------------------------------------------
    OPM also assesses the quality of investigations based on voluntary 
reporting from customer agencies. Specifically, OPM tracks 
investigations that are: (1) Returned for rework from the requesting 
agency, (2) identified as deficient using a web-based customer 
satisfaction survey, or (3) identified as deficient through adjudicator 
calls to OPM's quality hotline. However, in our past work, we have 
noted that the number of investigations returned for rework is not by 
itself a valid indicator of the quality of investigative work because 
DOD adjudication officials told us that they have been reluctant to 
return incomplete investigations in anticipation of delays that would 
impact timeliness. Further, relying on agencies to voluntarily provide 
information on investigation quality may not reflect the quality of 
OPM's total investigation workload. We are beginning work to further 
review OPM's actions to improve the quality of investigations.
    We have also reported that deficiencies in investigative reports 
affect the quality and timeliness of the adjudicative process. 
Specifically, in November 2010, we reported that agency officials who 
utilize OPM as their investigative service provider cited challenges 
related to deficient investigative reports as a factor that slows 
agencies' abilities to make adjudicative decisions. The quality and 
completeness of investigative reports directly affects adjudicator 
workloads, including whether additional steps are required before 
adjudications can be made, as well as agency costs. For example, some 
agency officials noted that OPM investigative reports do not include 
complete copies of associated police reports and criminal record 
checks. Several agency officials stated that in order to avoid further 
costs or delays that would result from working with OPM, they often 
choose to perform additional steps internally to obtain missing 
information. According to ODNI and OPM officials, OPM investigators 
provide a summary of police and criminal reports and assert that there 
is no policy requiring inclusion of copies of the original records. 
However, ODNI officials also stated that adjudicators may want or need 
entire records as critical elements may be left out of the 
investigator's summary. For example, according to Defense Office of 
Hearings and Appeals officials, in one case, an investigator's summary 
of a police report incorrectly identified the subject as a thief when 
the subject was actually the victim.
Some Steps Taken to Determine Completeness of Adjudicative Files
    To address issues identified in our 2009 report regarding the 
quality of DOD adjudications, DOD has taken some intermittent steps to 
implement measures to determine the completeness of its adjudicative 
files. In 2009, we reported that some clearances were granted by DOD 
adjudicators even though some required data were missing from the OPM 
investigative reports used to make such determinations.\36\ For 
example, we estimated that 22 percent of the adjudicative files for 
about 3,500 initial Top Secret clearances that were adjudicated 
favorably did not contain all the required documentation, even though 
DOD regulations require that adjudicators maintain a record of each 
favorable and unfavorable adjudication decision and document the 
rationale for granting clearance eligibility to applicants with 
security concerns revealed during the investigation.\37\ Documentation 
most frequently missing from adjudicative files was the rationale for 
granting security clearances to applicants with security concerns 
related to foreign influence, financial considerations, and criminal 
conduct. At the time of our 2009 review, DOD did not measure the 
completeness of its adjudicative files, which limited the agency's 
ability to explain the extent or the reasons why some files are 
incomplete.
---------------------------------------------------------------------------
    \36\ GAO, DOD Personnel Clearances: Comprehensive Timeliness 
Reporting, Complete Clearance Documentation, and Quality Measures Are 
Needed to Further Improve the Clearance Process, GAO-09-400 
(Washington, DC: May 19, 2009).
    \37\ DOD Regulation 5200.2-R, DOD Personnel Security Program (Jan. 
1987, incorporating changes Feb. 23, 1996).
---------------------------------------------------------------------------
    In 2009, we made two recommendations to improve the quality of 
adjudicative files. First, we recommended that DOD measure the 
frequency with which adjudicative files meet requirements, so that the 
Executive branch can identify the factors leading to incomplete files 
and include the results of such measurement in annual reports to 
Congress on clearances. In November 2009, DOD subsequently issued a 
memorandum that established a tool to measure the frequency with which 
adjudicative files meet the requirements of DOD regulation. 
Specifically, the DOD memorandum stated that it would use a tool called 
the Review of Adjudication Documentation Accuracy and Rationales, or 
RADAR, to gather specific information about adjudication processes at 
the adjudication facilities and assess the quality of adjudicative 
documentation. In following up on our 2009 recommendations, as of 2012, 
a DOD official stated that RADAR had been used in fiscal year 2010 to 
evaluate some adjudications, but was not used in fiscal year 2011 due 
to funding shortfalls. DOD stated that it restarted the use of RADAR in 
fiscal year 2012.
    Second, we recommended that DOD issue guidance to clarify when 
adjudicators may use incomplete investigative reports as the basis for 
granting clearances. In response to our recommendation, DOD's November 
2009 guidance that established RADAR also outlines the minimum 
documentation requirements adjudicators must adhere to when documenting 
personnel security clearance determinations for cases with potentially 
damaging information. In addition, DOD issued guidance in March 2010 
that clarifies when adjudicators may use incomplete investigative 
reports as the basis for granting clearances. This guidance provides 
standards that can be used for the sufficient explanation of incomplete 
investigative reports.
Extent of Clearance Reciprocity Not Measured
    Executive branch agencies have not yet developed and implemented 
metrics to track the reciprocity of personnel security clearances, 
which is an agency's acceptance of a background investigation or 
clearance determination completed by any authorized investigative or 
adjudicative agency, although some efforts have been made to develop 
quality metrics. Executive branch agency officials have stated that 
reciprocity is regularly granted, as it is an opportunity to save time 
as well as reduce costs and investigative workloads; however, we 
reported in 2010 that agencies do not consistently and comprehensively 
track the extent to which reciprocity is granted Government-wide.\38\ 
ODNI guidance requires, except in limited circumstances, that all 
intelligence community elements ``accept all in-scope \39\ security 
clearance or access determinations.'' Additionally, OMB guidance \40\ 
requires agencies to honor a clearance when: (1) The prior clearance 
was not granted on an interim or temporary basis; (2) the prior 
clearance investigation is current and in-scope; (3) there is no new 
adverse information already in the possession of the gaining agency; 
and (4) there are no conditions, deviations, waivers, or unsatisfied 
additional requirements (such as polygraphs) if the individual is being 
considered for access to highly-sensitive programs.
---------------------------------------------------------------------------
    \38\ In addition to establishing objectives for timeliness, the 
Intelligence Reform and Terrorism Prevention Act of 2004 established 
requirements for reciprocity, which is an agency's acceptance of a 
background investigation or clearance determination completed by any 
authorized investigative or adjudicative Executive branch agency, 
subject to certain exceptions such as completing additional 
requirements like polygraph testing. Further, in October 2008, ODNI 
issued guidance on the reciprocity of personnel security clearances. 
ODNI, Intelligence Community Policy Guidance 704.4, Reciprocity of 
Personnel Security Clearance and Access Determinations (Oct. 2, 2008).
    \39\ Although there are broad Federal investigative guidelines, the 
details and depth of an investigation varies by agency depending upon 
its mission.
    \40\ Office of Management and Budget, Memorandum for Deputies of 
Executive Departments and Agencies: Reciprocal Recognition of Existing 
Personnel Security Clearances (Dec. 12, 2005); Office of Management and 
Budget, Memorandum for Deputies of Executive Departments and Agencies: 
Reciprocal Recognition of Existing Personnel Security Clearances (July 
17, 2006).
---------------------------------------------------------------------------
    While the Performance Accountability Council has identified 
reciprocity as a Government-wide strategic goal, we have found that 
agencies do not consistently and comprehensively track when reciprocity 
is granted, and lack a standard metric for tracking reciprocity.\41\ 
Further, while OPM and the Performance Accountability Council have 
developed quality metrics for reciprocity, the metrics do not measure 
the extent to which reciprocity is being granted. For example, OPM 
created a metric in early 2009 to track reciprocity, but this metric 
only measures the number of investigations requested from OPM that are 
rejected based on the existence of a previous investigation and does 
not track the number of cases in which an existing security clearance 
was or was not successfully honored by the agency. Without 
comprehensive, standardized metrics to track reciprocity and consistent 
documentation of the findings, decision makers will not have a complete 
picture of the extent to which reciprocity is granted or the challenges 
that agencies face when attempting to honor previously granted security 
clearances.
---------------------------------------------------------------------------
    \41\ GAO, Personnel Security Clearances: Progress Has Been Made to 
Improve Timeliness but Continued Oversight Is Needed to Sustain 
Momentum, GAO-11-65 (Washington, DC: Nov. 19, 2010).
---------------------------------------------------------------------------
    In 2010, we reported that Executive branch officials routinely 
honor other agencies' security clearances, and personnel security 
clearance information is shared between OPM, DOD, and, to some extent, 
intelligence community databases.\42\ However, we found that some 
agencies find it necessary to take additional steps to address 
limitations with available information on prior investigations, such as 
insufficient information in the databases or variances in the scope of 
investigations, before granting reciprocity. For instance, OPM has 
taken steps to ensure certain clearance data necessary for reciprocity 
are available to adjudicators, such as holding interagency meetings to 
determine new data fields to include in shared data. However, we also 
found that the shared information available to adjudicators contains 
summary-level detail that may not be complete. As a result, agencies 
may take steps to obtain additional information, which creates 
challenges to immediately granting reciprocity.
---------------------------------------------------------------------------
    \42\ GAO-11-65.
---------------------------------------------------------------------------
    Further, in 2010 we reported that because there is no Government-
wide standardized training and certification process for investigators 
and adjudicators, according to agency officials, a subject's prior 
clearance investigation and adjudication may not meet the standards of 
the inquiring agency. Although OPM has developed some training, 
security clearance investigators and adjudicators are not required to 
complete a certain type or number of classes. As a result, the extent 
to which investigators and adjudicators receive training varies by 
agency. Consequently, as we have previously reported, agencies are 
reluctant to be accountable for investigations and/or adjudications 
conducted by other agencies or organizations.\43\ To achieve fuller 
reciprocity, clearance-granting agencies seek to have confidence in the 
quality of prior investigations and adjudications.
---------------------------------------------------------------------------
    \43\ GAO, Personnel Clearances: Key Factors to Consider in Efforts 
to Reform Security Clearance Processes, GAO-08-352T (Washington, DC: 
Feb. 27, 2008).
---------------------------------------------------------------------------
    Consequently, we recommended in 2010 that the Deputy Director of 
Management, OMB, in the capacity as chair of the Performance 
Accountability Council, should develop comprehensive metrics to track 
reciprocity and then report the findings from the expanded tracking to 
Congress. Although OMB agreed with our recommendation, a 2011 ODNI 
report found that intelligence community agencies experienced 
difficulty reporting on reciprocity. The agencies are required to 
report on a quarterly basis the number of security clearance 
determinations granted based on a prior existing clearance as well as 
the number not granted when a clearance existed. The numbers of 
reciprocal determinations made and denied are categorized by the 
individual's originating and receiving organizational type: (1) 
Government-to-government, (2) government-to-contractor, (3) contractor-
to-government, and (4) contractor-to-contractor. The report stated that 
data fields necessary to collect the information described above do not 
currently reside in any of the datasets available and the process was 
completed in an agency-specific, semi-manual method. Further, the 
Deputy Assistant Director for Special Security of the Office of the 
Director of National Intelligence noted in testimony in June 2012 that 
measuring reciprocity is difficult, and despite an abundance of 
anecdotes, real data is hard to come by. To address this problem, ODNI 
is developing a web-based form for individuals to submit their 
experience with reciprocity issues to the ODNI. According to ODNI, this 
will allow them to collect empirical data, perform systemic trend 
analysis, and assist agencies with achieving workable solutions.
Recent Efforts and Sustained Leadership Could Facilitate Progress in 
        Assessing Quality
    Several efforts are underway to review the security clearance 
process, and those efforts, combined with sustained leadership 
attention, could help facilitate progress in assessing and improving 
the quality of the security clearance process. After the September 16, 
2013 shooting at the Washington Navy Yard, the President directed the 
Office of Management and Budget, in coordination with ODNI and OPM, to 
conduct a Government-wide review into the oversight, nature, and 
implementation of security and suitability standards for Federal 
employees and contractors. In addition, in September 2013, the 
Secretary of Defense directed an independent review to identify and 
recommend actions that address gaps or deficiencies in DOD programs, 
policies, and procedures regarding security at DOD installations and 
the granting and renewal of security clearances for DOD employees and 
contractor personnel. The primary objective of this review is to 
determine whether there are weaknesses in DOD programs, policies, or 
procedures regarding physical security at DOD installations and the 
security clearance and reinvestigation process that can be strengthened 
to prevent a similar tragedy.
    As previously discussed, DOD and DHS account for the majority of 
security clearances within the Federal Government. We initially placed 
DOD's personnel security clearance program on our high-risk list in 
2005 because of delays in completing clearances.\44\ It remained on our 
list until 2011 because of on-going concerns about delays in processing 
clearances and problems with the quality of investigations and 
adjudications. In February 2011, we removed DOD's personnel security 
clearance program from our high-risk list largely because of the 
Department's demonstrated progress in expediting the amount of time 
processing clearances.\45\ We also noted DOD's efforts to develop and 
implement tools to evaluate the quality of investigations and 
adjudications.
---------------------------------------------------------------------------
    \44\ GAO, High-Risk Series: An Update, GAO-05-207 (Washington, DC: 
Jan. 1, 2005).
    \45\ GAO, High-Risk Series: An Update, GAO-11-278 (Washington, DC: 
Feb. 2011).
---------------------------------------------------------------------------
    Even with the significant progress leading to removal of DOD's 
program from our high-risk list, the Comptroller General noted in June 
2012 that sustained leadership would be necessary to continue to 
implement, monitor, and update outcome-focused performance 
measures.\46\ The initial development of some tools and metrics to 
monitor and track quality not only for DOD but Government-wide were 
positive steps; however, full implementation of these tools and 
measures Government-wide have not yet been realized. While progress in 
DOD's personnel security clearance program resulted in the removal of 
this area from our high-risk list, significant Government-wide 
challenges remain in ensuring that personnel security clearance 
investigations and adjudications are high-quality. However, if the 
oversight and leadership that helped address the timeliness issues 
focuses now on the current problems associated with quality, we believe 
that progress in helping Executive branch agencies to assess the 
quality of the security clearance process could be made.
---------------------------------------------------------------------------
    \46\ GAO, Personnel Security Clearances: Continuing Leadership and 
Attention Can Enhance Momentum Gained from Reform Effort, GAO-12-815T 
(Washington, DC: June 21, 2012).
---------------------------------------------------------------------------
    In conclusion, to avoid the risk of damaging, unauthorized 
disclosures of Classified information, oversight of the reform efforts 
to measure and improve the quality of the security clearance process 
are imperative next steps. The progress that was made with respect to 
expediting the amount of time processing clearances would not have been 
possible without committed and sustained Congressional oversight and 
the leadership of the Performance Accountability Council. Further 
actions are needed now to fully develop and implement metrics to 
oversee quality at every step in the process. We will continue to 
monitor the outcome of the agency actions discussed above to address 
our outstanding recommendations.
    Chairman King, Ranking Member Higgins, and Members of the 
subcommittee, this concludes my prepared statement. I would be pleased 
to answer any questions that you or other Members of the subcommittee 
may have at this time.

    Mr. King. Thank you, Ms. Farrell.
    Let me thank all the witnesses for their testimony and 
their level of cooperation. I appreciate it very much.
    You may have covered this in some of your testimonies, but 
let me just start. There are several cases I am aware of where 
a person receives a security clearance while they are at one 
agency and then they transfer to another agency. In the mean 
time, the first agency is advised of a problem that has 
developed and that was not passed on to the second agency. Then 
the individual may leave the second agency and go to the 
private sector but they still maintain their clearance.
    In other words, how much cooperation is there between one 
Federal agency and another? If you learned something about an 
employee that was in that particular agency or department who 
had a clearance and they moved on to another one. In other 
words, does it follow the clearance or does it, you know, just 
stay with the departments? Am I making it clear what I am 
saying?
    I don't want to go into the specifics of the case, but 
there is at least one individual who was with a particular 
agency, got his clearance, moved onto another one. After he 
went to the second agency the first agency was advised of 
problems that may have prevented him from getting a clearance 
in the first place, but those problems were never passed on to 
the second agency. Then he went to the private sector after 
that, again, keeping the same Top Secret clearance.
    So I am going to just go across the board and see if any of 
you have any--yes?
    Ms. Farrell. I believe you are talking about reciprocity, 
which is honoring the investigation conducted when one 
transfers from one agency to another, and that is an issue that 
we have raised. The extent to which reciprocity is met is 
unknown because there are no metrics that tell us how many 
people are accepted or how many people are stopped.
    Reciprocity is important because by statute, the 
Intelligence Reform Terrorism Prevention Act of 2004 stated 
that agencies should honor one another's investigations and 
adjudications to the extent possible. There have been other 
guidance from the DNI, from OMB, making it clear when there are 
exceptions to such granting of those clearances, but we do not 
know how well it works.
    There are anecdotes, as you have anecdotes. There are 
stories of someone who has a clearance and it is not accepted 
and they have three clearances done in a year, especially with 
contractors. But the extent to which these clearances are 
accepted, are not accepted is really unknown.
    Mr. King. Well, let's say a person has the clearance, moves 
onto another agency with that clearance, and the first agency 
then is advised that something has come up after the clearance 
was given. I assume that agency is supposed to pass that on to 
the second, right?
    Ms. Farrell. That is something that is specified in 
guidance, that when the attention comes of new information, if 
it is disclosed to the gaining agency then that would be a 
reason not to honor such a clearance. But how often--again, how 
often information is passed along is unknown.
    Mr. King. Anybody else want to comment on this?
    Mr. Prioletti.
    Mr. Prioletti. I just wanted to add to what Brenda said 
that there is an on-going research right now going on through 
the DNI's office where we are meeting with the 16 members of 
the I.C. and gaining information on their reciprocity--how was 
it enacted? How did they make the guidelines? How did they 
determine which people are going to be crossover and which ones 
are not--to try to get a better feel and to gain some of the 
very metrics that Brenda is referring to there, sir.
    Mr. King. Mr. Marshall or Mr. Miller.
    Mr. Marshall.
    Mr. Marshall. Yes, sir. Thank you.
    In DHS we obviously accept reciprocity on its face by 
Executive Order. When we can point to an existing 
investigation, an in-scope investigation, we will honor it on 
its face.
    One of the gaps that we see within DHS is that we are not 
allowed to do any additional checks unless we have derogatory 
information to the contrary. So it would be critical in the 
situation that you describe that that first agency pass that 
information along to the second agency in order for us to take 
an action with respect to the clearance.
    Mr. King. Mr. Miller.
    Mr. Miller. Chairman King, your question is spot-on, the 
issue of where the gaps exist once an investigation has closed 
and then there is a reciprocity decision. For instance, 
somebody with a Top Secret clearance can go 5 years without a 
reinvestigation; however, that doesn't preclude potential new 
criminal history record information, financial problems, or 
other things developing. However, if that information is not 
reported in some way or captured, that remains a gap.
    So, as Greg mentioned, within DHS you can only go--make a 
reciprocity decision based on the last investigation and not 
knowing what may have developed in the mean time. So that 5-
year window becomes a gap, and potentially information could be 
developed that may result in, actually, a different 
adjudication being made if you were aware of it.
    Mr. King. Ms. Farrell and Mr. Prioletti I think both 
mentioned guidance. Is that a directive? Is that required or is 
it just suggested?
    Ms. Farrell. The statute that I mentioned, IRTPA 2004, did 
require that reciprocity be honored. There is guidance in OMB 
guidelines that has certain exceptions that can be extended, 
such as the clearance background investigation is not up-to-
date or additional information has come to light regarding the 
individual.
    There is also DNI guidance that specifies things such as 
the particular position requires a different type of scope of 
background investigation. So there are exceptions for the 
agencies to consider when they are--before they grant such a 
reciprocity.
    Mr. King. Mr. Higgins.
    Mr. Higgins. Thank you, Mr. Chairman.
    Just, you know, for the whole panel, you know, according to 
the Office of Personnel Management, almost 5 million Federal 
workers and contractors are eligible to hold a security 
clearance, and at the Department of Homeland Security 
approximately 125,000 employees hold clearances. Given the fact 
that this Aaron Alexis, a lone gunman, took up arms against 
fellow employees at the Navy Yard, Alexis was a contractor and 
he had security clearance but he also had a history of 
arrests--plural. More than one. He had a history of gun 
infractions--plural. More than one.
    In published reports there were other incidences calling 
into question, you know, his mental health. So I suppose my 
question is, how did he get a security clearance in the first 
place?
    Go ahead.
    Mr. Marshall. Yes, sir. I will start. Thank you.
    With respect to Mr. Alexis, and based on what I understand, 
and granted, I don't have any first-hand knowledge; I wasn't 
particularly briefed on it, but based on what I know from media 
accounts and some anecdotal conversations I have had with some 
other folks who had some information, it appears that he had a 
clearance with the Navy and that when he left the Navy and went 
to the contracting firm the clearance was accepted on 
reciprocity, because they had an investigation that they can 
point to.
    In that context let me explain how we do it in Department 
of Homeland Security. The Department of Homeland Security does 
all the fitness adjudications for contractors in the 
Department. The actual adjudication of the investigations, 
however, reside in the Department of Defense.
    So while we have the ability to do the fitness 
determination, the adjudication is done there. So that is how 
it works in Homeland Security.
    Mr. Higgins. Anybody else?
    Go ahead.
    Mr. Miller. Yes. I would like to make a comment just as 
background on Alexis. The investigation that was completed for 
him was completed in 2007. In fact, he was adjudicated in 2008 
by the Department. I am sorry DOD is not here to respond.
    Some of the criminal history information you refer to 
occurred after that 2007 completed investigation, and that is 
the gap. In fact, Mr. Alexis was not due for reinvestigation 
until 10 years after the completion of the case in 2007, so 
that would have been 2017 before there would have been any 
review of what may have developed once he had been cleared.
    Now, Mr. Prioletti has talked about the continuous 
evaluation, the critical need to be able to fill the gap, and 
that is one of the solutions being proposed not only by the DNI 
but by the community is to be able to capture any new criminal 
history record information that might come about.
    Mr. Higgins. Go ahead.
    Mr. Miller. I just wanted to say, one of the initiatives 
on-going right now--if the FBI were here they would talk about 
a program called Rap Back. Rap Back is going to provide a 
capability within the Department--within the Executive branch 
and across Federal Government--that if there has been a 
fingerprint check done on an individual for a background 
investigation and in the future should new criminal history 
information become developed, the FBI will be notifying, 
actually the OPM to notify the Federal agency that you have new 
results. So that could occur a week after the close of an 
investigation, a year, 2 years.
    So with Alexis, that criminal history record that was 
developed in Texas of that incident with a weapon would have 
been notified through the FBI back to the Department to let 
them know there is an individual that has new criminal history 
record information. So that is part of the C.E. solution in the 
future and we are looking to find other ways to provide 
information to fill those gaps.
    Mr. Higgins. Yes. I would say, look, this is not an exact 
science, but it is a pretty sensitive issue when you process 
people for security clearance. That should be a pretty tight 
criteria. My sense is that while it is good that they are 
looking at ways to tighten that up, I am shocked that, you 
know, somebody that has a security clearance that any arrest 
incident prospectively would not trigger something to the 
respective authorities to remove or at least suspend that 
clearance so that, you know, the issue could be adjudicated.
    It just seems to me, again, that when you are issuing so 
many of these or making eligible so many people for security 
clearances that, forget about reinvestigations, there should be 
a better process in place to ensure that instantaneously, 
should something occur that would, you know, result in somebody 
being denied clearance, that information should be made 
available to determine whether or not that clearance can be 
continued and/or at least suspended until such time as there is 
a clarity about, you know, what had occurred here.
    That is all I have, Mr. Chairman.
    Mr. King. Gentleman from Massachusetts, Mr. Keating.
    Mr. Keating. Thank you, Mr. Chairman.
    I guess the best person that I would ask is Mr. Prioletti 
this question: What essential information do background checks 
neglect to include in the existing process, which largely 
depends on a huge component of self-reporting by persons 
applying for it? Are there things that you can highlight that 
might be more helpful or areas that are, you know, not included 
but that--could you share with us the reason for that?
    Mr. Prioletti. Sir, the information that is gained during 
the investigative process is based upon the adjudicative 
standards that we mentioned earlier that came out in 2005 from 
the White House, and they cover 13 generic areas ranging from 
finances to foreign national contacts and everything in 
between. We do our adjudicative--excuse me--we do the 
investigative process based upon information that will gain us 
insight into those areas so that we can make an informed 
adjudicative decision.
    I don't believe it is the areas that we are missing as much 
as the comprehensiveness of gaining that information. I believe 
Mr. Marshall and Mr. Miller both have commented on the ability 
to get that information, and there are some areas where we 
could improve on.
    One of the biggest areas, I believe, where we need to 
improve on are some of our National and local agency checks--
the ability to get criminal responses on individuals. Based on 
a conversation earlier, there are somewhere in the area of 
17,000-plus local law enforcement and Federal law enforcement 
agencies that have information on individuals. They are not all 
electronically connected to an ability to get that information 
and that would certainly help improve our ability.
    Mr. Keating. Yes. I was thinking, I was a prosecutor before 
I was here in office, and sometimes we would have cases and 
they would reflect on a person's status in State government and 
there really wasn't that linkage there either electronically, 
as well. We would affirmatively do that but it is not a precise 
science because there was not a requirement.
    So I think we have an idea that everything can be done 
electronically and technologically today, but it just doesn't 
work that well. Particularly if you are dealing with State 
crimes or State activities, the process of that often is so 
slow just to get into the State, let alone to try and link it 
to the Federal. There would be quite serious delays.
    Here is one more question I think I have a sense of, but in 
the last stage of appeals on security clearance issues it 
leaves DHS and goes to the Secret Service. Is that correct?
    Could you explain, anyone, why that decision was made there 
instead of keeping it in a panel within DHS or--and why Secret 
Service would be that last? How cumbersome is that, given the 
staffing there?
    Mr. Marshall. Yes, sir. I can answer that.
    It varies. There are three stages to the security appeal 
process. There is the personnel security chief; and then it 
goes to the second-level deciding authority, and in my 
organization I am that person; and then if it is not resolved 
at the second level it goes to the, what I call the three-judge 
panel at the Secret Service.
    The reason it is in the Secret Service is because that is 
where it was when DHS was formed. Obviously we are a legacy 
agency comprised of many organizations and they already had 
that function within the Secret Service, so it just made sense 
at the time to, because it was already a functioning body and 
already had their policies and procedures in place, just to 
leave it there.
    I know there has been some question since on whether or not 
that is appropriate and whether they should be rotated in and 
out and made up of members of other agencies who may sit on 
that, and that is still being discussed. But that is how it 
evolved to the three-judge panel at the Secret Service.
    Mr. Keating. Thank you. It is amazing the legacy issues 
with Homeland Security.
    I will yield back, Mr. Chairman.
    Mr. King. Thank you, Mr. Keating.
    As a follow-up to what Mr. Keating was asking you about, 
you know, the electronic records, assuming that everything 
could be done electronically, how cooperative do you find State 
and local governments in giving you the information if you ask 
for it?
    Mr. Prioletti. Well, sir, quite honestly, I believe that I 
would have to defer to Mr. Miller on that one, as he directly 
deals with those organizations.
    Mr. King. Mr. Miller.
    Mr. Miller. Chairman King, it varies candidly with over 
17,000-plus law enforcement entities out there. It varies from 
from location to location, State to State. In fact, there are 
different statutes.
    There is a 5 U.S. Code 9101 actually requires agencies to 
share criminal history record information with the Federal 
Government. However, 9101 doesn't go far enough to actually 
outline specifically the information, so the preponderance of 
the information being shared today actually just addressed the 
charge and the disposition, not necessarily the facts 
surrounding and the circumstances of the arrest.
    So again, it varies from State to State. In fact, not to go 
over old history, but we actually had to go to court in one 
location to actually force the local government to share 
criminal history record information with the Federal 
Government, and we were successful.
    Mr. King. Anybody else wish to comment on that?
    Ms. Farrell.
    Ms. Farrell. I think Mr. Miller can speak to the actual 
information sharing, but we are aware when we did our work in 
2010 and at other times, agency adjudicators--and this is from 
a number of agencies--12, 14--would comment to us that the 
summary information in the background investigations did not 
give the details regarding police or criminal records that was 
available, that that information had been summarized by the OPM 
investigator to a point that it raised a lot of questions for 
the adjudicators.
    So this goes back to the issue of quality with what is 
required. Are we getting the best quality from what is required 
before we start expanding it and adding additional 
requirements?
    Mr. King. On a separate issue on this, without starting any 
interdepartmental feuds or anything else, but are there any 
agencies within the intelligence community or within the 
Federal Government who are not willing to cooperate as far as 
giving personnel records of their former employees--like, for 
instance, going from one intelligence component to another or 
to somebody else in the Federal Government? Is it your 
experience that anyone is more reluctant than others to fully 
cooperate as far as giving personnel information?
    Mr. Prioletti. Sir, to the best of my knowledge they all 
are cooperating at various levels, depending upon the 
information to be shared. But I have not encountered any 
specific incidences where one I.C. organization would not share 
with another.
    Mr. King. Yes.
    Ms. Farrell. I can add to that.
    During the course of our work with the I.C. we are aware 
that they use the Scattered Castles database, and nothing was 
brought to our attention within the I.C. community having 
access to that. I think the issues evolve more when you are 
crossing from the non-I.C. world into the I.C. and what is 
shared and what is not shared or back from the I.C. to a non-
I.C.
    Because there are different databases. OPM has a database; 
DOD has a database; the I.C. has a database. That sometimes can 
present issues with reciprocity and some of the issues that we 
have discussed.
    Mr. King. Apart from the need for improvement on the actual 
investigative reports, do you think any improvements are needed 
on the adjudicative end as to what standards should be used, 
what thresholds there should be?
    Ms. Farrell. Our work is concentrated at DOD on the 
adjudication portion and we have found issues with the 
adjudication when we did our work back in 2006 and 2008. We 
found similar issues with the adjudication files as we did with 
OPM's investigative files.
    We made recommendations regarding guidance that was needed 
to document when perhaps an applicant was not available for an 
interview, to document what attempts had been made to do so and 
why that applicant was not available. DOD developed such 
guidance. DOD also took steps to measure the frequency for 
which their adjudication reports met the Federal adjudicative 
guidelines and other actions to monitor and oversee that 
adjudication process.
    I cannot speak to the Homeland Security adjudication 
process.
    Mr. King. Mr. Marshall.
    Mr. Marshall. Yes, sir. Thank you.
    One of the issues that is troubling to me and a gap that I 
recognize--and it is probably something that we are all going 
to be working on in this 120-day review that the President 
ordered--is a gap I see in suitability adjudication. Mental 
health is not one of the adjudicative criteria within 
suitability or fitness and I really think that needs to be 
addressed.
    It is addressed in the revised guidelines for National 
security clearances, and Mr. Prioletti mentioned that. But we--
it doesn't appear in 5 CFR 731 for suitability, and the 
suitability like criteria we apply to contractors, and I really 
think it needs to be.
    Mr. King. You know, considering the large number--I think 
Mr. Higgins and I said 4.9 million, 5 million people with these 
clearances, and obviously a lot of the investigative work is 
done by private contractors. We have seen that. Can any of you 
comment on whether there is a different level of quality--
better or worse--between the Government carrying out the 
investigation or private contractors? Are there other standards 
for the private contractors? Are they uniform standards?
    Mr. Miller. I can speak to that.
    Mr. King. Yes, sir.
    Mr. Miller. I managed the contract at Federal workforce. 
First off, there is no difference in the way we clear contract 
workforce versus Federal workforce relative to background 
investigations. Second is the quality of investigations are the 
same. They have got to investigate to the same standards and 
they have got to meet the same quality standards, both Federal 
and contract employees.
    Mr. King. Anybody else wish to comment?
    Yes, Ms. Farrell.
    Ms. Farrell. Our work has found that the--it is unknown, 
really, the extent to the quality of investigations. We have 
data that does show incompleteness when you look at OPM's 
investigations compared to the Federal Investigative 
Guidelines.
    Is there a difference between the oversight when a 
contractor conducts the investigation and a Federal employee? 
What we are saying is there are not measures or steps put in 
place to make sure that that background investigation does meet 
Federal standards regardless of whether it is conducted by a 
contractor or a Federal employee.
    Mr. King. What standards are there in selecting a 
contractor to carry out the investigation? Are they uniform?
    Mr. Miller. Yes. The standards are uniform for contractors 
that perform background investigative work. They all have to be 
trained to the same level, and obviously through the contract 
process, when they come in to actually compete for the work 
they all have to meet the same standards when they are selected 
to do contract work for the Government.
    Mr. King. Mr. Higgins.
    Mr. Higgins. I have no further questions. Does the staff 
have any suggested questions?
    Mr. King. Okay. I want to thank you for your testimony 
today. Sorry for the delay at the beginning. We got called over 
for votes. It seems it never fails. There are never any votes 
until we have witnesses here to testify at a hearing, so I 
regret that.
    I want to thank you for your patience. I want to thank you 
for your testimony.
    Again, I think all of us appreciate--I am sure I can speak 
for Mr. Higgins on this--the level of cooperation and the fact 
that all of you appreciate the importance and the significance 
of this and the cooperation you have given to the staff. So I 
thank you for your testimony.
    Brian, do you have anything?
    Mr. Higgins. Nope.
    Mr. King. Okay. With that, without objection, the 
subcommittee stands adjourned. Thank you very much.
    [Whereupon, at 3:28 p.m., the subcommittee was adjourned.]


                            A P P E N D I X

                              ----------                              

      Questions From Honorable Peter T. King for Merton W. Miller
    Question 1. As I understand it, the adjudicating agency only gets a 
summary of the information that has been gathered during the background 
investigation. What entity does the actual packaging of the summary 
that is in turn submitted to the adjudicating agency?
    Answer. Response was not received at the time of publication.
    Question 2. In terms of the background investigators themselves, 
whether they are a Government employee or a contracted employee, what 
types of standards are they held to in order to complete their jobs? In 
other words, have these individuals been subjected to the scrutiny of 
background investigations?
    Answer. Response was not received at the time of publication.
    Question 3. Are the forms that applying individuals use to fill out 
during the background investigation phase considered antiquated? If so, 
what types of updates to these forms may be necessary to address the 
needs of background investigators to adequately gather pertinent and 
meaningful information?
    Answer. Response was not received at the time of publication.
    Question 4. Is there a current backlog in background investigations 
for security clearances? If so, how numerous is the backlog and what 
effect does the sequestration have on this process?
    Answer. Response was not received at the time of publication.
    Question 5. How much of OPM's work is contracted out to private 
companies to complete background checks? How often are these 
contractors reviewed by OPM, in terms of quality control of their 
product?
    Answer. Response was not received at the time of publication.
    Question 6. What difficulties are created by the substantial 
dependence of OPM on contractors to execute background checks and what 
are the benefits of that dependence?
    Answer. Response was not received at the time of publication.
      Questions From Honorable Peter T. King for Gregory Marshall
    Question 1. How successful has DHS been at producing quality 
results in security clearance background checks and by what measure do 
use to make this assessment?
    Answer. DHS has a successful and robust suitability and security 
program. To measure the quality of the background investigations, DHS 
relies on its trained adjudicative staff to review the investigative 
product for completeness and to render the adjudicative determination. 
DHS has incorporated levels of review in the adjudicative process 
whereas senior-level adjudicators, including managers, review the work 
of the lesser-experienced adjudicators to ensure quality and adherence 
to policy and guidelines.
    In addition, DHS, as an authorized investigative agency, adheres in 
the conduct of its security investigations to the Federal Investigative 
Standards. DHS is also an active participant in an Office of Personnel 
Management (OPM) and Office of the Director for National Intelligence 
Quality Assessment Working Group which was established to create a 
standard by which all investigating entities would assess quality 
investigations and develop a tool to make the assessment.
    Question 2. Where does DHS stand with regard to security clearance 
reciprocity, i.e. are you completely accepting security clearances at 
all levels for individuals coming from other Federal agencies? If not, 
what is your reasoning for not yielding to reciprocity?
    Answer. DHS accepts security clearance reciprocity at all levels 
for individuals coming from other Federal agencies. However, based on 
the responsibilities of the positions, additional higher levels of 
investigation may be required, consistent with the OMB memoranda of 
December 12, 2005, July 17, 2006, and November 14, 2007, and the 
Intelligence Community Policy Guidance Number 704.4. Also, some law 
enforcement organizations utilize the polygraph for employment 
screening and personnel investigations for positions requiring a 
polygraph examination prior to entry into the position.
    Security reciprocity should not be confused with suitability or 
fitness for appointment, or, alternatively, the ability to meet a 
qualification standard in the hiring process. There are additional 
considerations that may need to be addressed in order for an applicant 
to gain employment. The following is a list of considerations that the 
Department must address:
   Due to their mission, components that enforce drug laws--
        e.g., the U.S. Immigration and Customs Enforcement (ICE) and 
        the U.S. Customs and Border Protection (CBP)--must adhere to 
        more stringent guidelines on frequency and recency of illegal 
        drug use than other components.
   Components that have weapon-carrying positions (e.g., ICE, 
        CBP, TSA, USSS, and FLETC) must adhere to the ``Lautenberg 
        Amendment'', which provides that it is unlawful ``for any 
        person to sell or otherwise dispose of any firearm or 
        ammunition to any person knowing or having reasonable cause to 
        believe that such person has been convicted in any court of a 
        misdemeanor crime of domestic violence.'' 18 U.S.C. 992(d)(9). 
        If an applicant were to be prohibited from possessing a firearm 
        or ammunition, under the Lautenberg Amendment, that applicant 
        would therefore be ineligible for the weapon-carrying position.
   TSA is required to consider 28 statutory criminal types of 
        ``Disqualifying offenses that, if committed, would disqualify 
        an individual from employment with the agency.'' See listed in 
        49 U.S.C.  44936(b)(1)(B), eligible for employment with TSA.
   OPM's regulations on suitability reciprocity contain 
        exceptions when, for example, the investigative record shows 
        conduct that is incompatible with the core duties of the 
        position. See 5 C.F.R. 731.202(d).
    While the Department adheres to security reciprocity, it must also 
comply with other laws affecting employment and suitability related to 
the specific requirements of the position.
    Question 3. It is the committee's understanding that the last stage 
of appeals for suspensions and revocations of security clearances are 
heard before a panel at the U.S. Secret Service for all security 
clearance-holders at DHS headquarters and its components. Why is this 
the case and why has this authority not been given to a panel comprised 
of DHS headquarter officials?
    Answer. In accordance with the requirement under Executive Order 
12968 that Federal agencies provide applicants and employees denied 
clearances the opportunity to appeal the decision, DHS leveraged the 
U.S. Secret Service as the Department's Security Appeals Board. The 
U.S. Secret Service has a robust and long-standing functioning Appeals 
Board. As the Board performed the functions appropriately and in 
accordance with all Federal guidelines, there was not an immediate need 
to change the composition of the Board. We will revisit the composition 
of the Board and determine potential adjustments to the practice.
    Question 4. Do you think that existing policies and processes 
related to reinvestigations of individuals who hold security clearances 
meet the ``appropriate level of rigor'' mentioned in your earlier 
testimony?
    Answer. DHS believes there are gaps in the process that create 
vulnerabilities to the Department. For one, the current interval for 
periodic reinvestigations (5, 10, 15 years depending on the level of 
clearance) is insufficient, though this has been addressed in the 2012 
Federal Investigative Standards approved and signed in December 2012, 
and will be implemented fully by 2017. Also, based on the level of 
reinvestigation and records collected, security offices are not always 
provided relevant information on individuals of incidents occurring in 
their employment. Another large gap is the lack of participation and 
timeliness of local law enforcement jurisdictions reporting criminal 
activity into the State and National repositories on which security 
investigators rely. We note that Congress expressed awareness of this 
issue when it recently passed the National Defense Authorization Act, 
2014, section 907 of which establishes a task force on records access 
composed of both Federal and State and local law enforcement officials 
to make recommendations for improving the degree of cooperation and 
records sharing. This issue is also being examined as part of the 
``120-day review'' of security and suitability policies and procedures 
now underway that the President has directed.
    Question 5. In your view, are reinvestigations currently conducted 
with the appropriate frequency (currently, 15, 10, and 5 years for 
Confidential-, Secret-, and Top Secret-level clearances, respectively), 
or should reinvestigations occur more frequently?
    Answer. The current policies for reinvestigations are not stringent 
enough due to the current time frames. Those policies had been in place 
since the late 1990s and were in need of reform. In December 2012 the 
Office of the Director of National Intelligence and the Office of 
Personnel Management jointly issued new Federal investigative standards 
establishing a 5-year reinvestigation cycle even for Confidential and 
Secret clearances. The new standards are subject to an implementation 
plan. Further, ODNI has been given authority under Executive Order 
13467 to develop the Continuous Evaluation (CE) program to evaluate 
National security risks involving cleared personnel between periodic 
reinvestigations, and the December 2012 Federal investigative standards 
require CE for Top Secret-cleared personnel. Likewise OPM is piloting 
the ``Rap Back'' program by which the FBI furnishes real-time arrest 
information on current employees. Full implementation of the 2012 
revised standards is expected by 2017. DHS is an active participant in 
Federal personnel security community discussions and activities to 
address the need for a more frequent/current review of individuals who 
hold security clearances, including continuous evaluation.
    Question 6. As you noted in your earlier testimony, background 
investigations only examine past behavior and may be an inadequate 
predictor of future behavior. One potential element of the Insider 
Threat Program is the use of analytics to identify and even predict 
potential breaches of information systems based on an individual's 
pattern of system access. Have you or other members of DHS's Chief 
Security Officer Council explored the possibility of using similar 
analytics or behavioral modeling techniques as part of the security 
clearance adjudication process?
    Answer. As personnel security is an integral part of the Insider 
Threat Program, DHS recognizes the need to use analytics in its 
personnel security process. Under the concept of Continuous Evaluation 
and Continuous Monitoring, personnel security will be more proactive in 
making individual assessments than the traditional reactive approach. 
The Continuous Evaluation will be a tool to evaluate patterns of 
behavior. DHS is awaiting guidance from the Office of the Director for 
National Intelligence (ODNI), as the Security Executive Agent, to 
release policy on the execution of the Continuous Evaluation model. 
ODNI, through the National Insider Threat Task Force, convenes various 
forums to assist departments and agencies as they work to establish 
their insider threat programs under Executive Order 13587 and the 
President's National insider threat policy and minimum standards. In 
the interim, the Department has held discussions with private firms 
that look at behavioral modeling through continuous evaluation to 
explore automated options and their availability/compatibility with 
current systems. DHS participated in a Department of Defense hosted 
Behavioral Analysis/Insider Threat Tabletop Exercise (TTX) to review 
best practices, including programs outside the U.S. Government, to 
determine whether elements of those programs could be adopted to detect 
persons who may pose a threat; as well as review leading edge tools and 
technologies that augment existing security processes and capabilities. 
A range of predictive analytics and risk assessment tools were 
discussed. For example, the Identity Management Enterprise Services 
Architecture (IMESA) was identified as a potential capability to 
continuously monitor personnel that have authorized access to DoD 
installations and assets against authoritative data sources. IMESA will 
enable the sharing of identity and physical access control information 
complementing on-going continuous evaluation concept demonstration 
efforts.
     Questions From Honorable Peter T. King for Brian A. Prioletti
    Question 1. Under Section 6 of Executive Order 13587, the 
Interagency Insider Threat Task Force is to conduct ``independent 
assessments'' of agencies' insider threat programs. What is the status 
of the task force's effort to develop procedures for these assessments? 
How many assessments has the task force conducted?
    Answer. Response was not received at the time of publication.
    Question 2. Could you summarize the results of those assessments? 
In your response, could you discuss the following: How many agencies 
have acceptable programs? How many do not? For agencies that do not 
have acceptable insider threat programs, what are the deficiencies?
    Answer. Response was not received at the time of publication.
    Question 3. What differences, if any, exist regarding the threat to 
National security posed by contractor employees with access to 
Classified material and Federal employees with access to Classified 
material?
    Answer. Response was not received at the time of publication.
    Question 4. Is there a need to expand the areas of risk factors 
when adjudicating security clearance applicants to address the issues 
that we have seen in recent events?
    Answer. Response was not received at the time of publication.
    Question 5. In your testimony, you mentioned the need for 
Continuous Evaluation for those persons that hold security clearances. 
Would this process be regulated by time frames or will they be 
triggered by information discovered about a security clearance holder 
by the agency security office?
    Answer. Response was not received at the time of publication.
    Question 6. What essential information do background checks neglect 
to include in the existing process, which depends largely on self-
reporting by the persons applying for a security clearance?
    Answer. Response was not received at the time of publication.
      Questions From Honorable Peter T. King for Brenda S. Farrell
    Question 1. You mentioned in your testimony that agencies are 
``revisiting the Federal investigative standards.'' Can you explain the 
investigative standards that are currently being revisited by Federal 
agencies? Is the proposed OPM/ODNI rule one of the agency actions 
referred to in your statement?
    Answer. Response was not received at the time of publication.
    Question 2. What possible impact, if any, could the proposed OPM/
ODNI rule have on the overall security clearance background 
investigation process?
    Answer. Response was not received at the time of publication.
    Question 3. What elements of the security clearance process do you 
find the most problematic with regards to conducting fair and thorough 
background investigations?
    Answer. Response was not received at the time of publication.
    Question 4. In your research, have you found that agencies are 
fully complying with the guidelines for reciprocity? If not, what are 
the reasons for non-compliance?
    Answer. Response was not received at the time of publication.
    Question 5. In your testimony, you mentioned that your study 
involved looking into the metrics needed to measure quality of the 
security clearance process. Are there any agencies in particular that 
stood out as doing at least a fairly exceptional job with measuring its 
process quality and if so, why is this the case with that particular 
agency and not others?
    Answer. Response was not received at the time of publication.