13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Delta ForceBackground investigations. The PSI program of the DSSoversees background investigations on military, civilian,<strong>and</strong> contractor personnel affiliated with DOD. PSIs areused to determine the suitability of an individual for entranceinto the armed services, for access to classifiedinformation, <strong>and</strong> for appointment to sensitive positionswithin DOD. PSIs conducted by DSS special agents aresubmitted to the agency’s Personnel Investigations Centerat Fort Meade, Maryl<strong>and</strong>, where they are processed.When completed, PSIs are sent to the appropriate DODadjudicative facility, which makes the determination as tothe individual’s suitability. DSS is thus purely a reporting<strong>and</strong> screening agency, <strong>and</strong> has no power to choose orreject individuals for positions within DOD.The work of processing security clearances, the mostprominent service of DSS, has also provided the occasionfor a number of frustrations. In July 2000, the agencyexperienced the breakdown of a $100 million computersystem, thus temporarily bringing to a halt its backgroundchecks. Also in that month, a review panel that includedrepresentatives of DSS came under fire for approving anaward to Loral Space & Communications Corporation “foroutst<strong>and</strong>ing security performance <strong>and</strong> practices.” In 1996,Loral had forwarded a report on a Chinese rocket to theChinese government without first obtaining State Departmentclearance, a situation that had led to a gr<strong>and</strong> juryinvestigation. The backlog of security clearance investigationsforced DSS to turn to civilian contractors for help. InJune 2002, DOD investigators learned that one of the firmsDSS had used, Government Business Services Group,may have submitted false reports to DSS <strong>and</strong> claimed tohave completed work it had not done. As of fiscal year2004, DOD had transferred responsibility for conductingmost background checks from DSS to the Office of PersonnelManagement (OPM).Other DSS programs. Under the ISP heading in DSS are threeindustrial security programs, the largest of which is theNational Industrial <strong>Security</strong> Program, or NISP. DSS representativesworking in the NISP oversee security at clearedcontractor facilities, <strong>and</strong> assist the contractor’s staff informulating <strong>and</strong> maintaining security programs. The othertwo ISP sections are the Arms, Ammunition, <strong>and</strong> Explosives(AA&E) Program, which provides protection for munitions,<strong>and</strong> the Critical Infrastructure Program (CIP), whichoversees systems vital to the operation of DOD. Additionally,the Defense Industrial <strong>Security</strong> Clearance Office(DISCO) in Columbus, Ohio, processes, issues, <strong>and</strong> maintainsISP facility <strong>and</strong> personnel clearances.The <strong>Security</strong>, Education, Training, <strong>and</strong> AwarenessProgram includes instruction in counterintelligence <strong>and</strong>other areas. Training takes place at the DSS Academy, orDSSA, in Linthicum, Maryl<strong>and</strong>, where some 10,000 studentsfrom DOD <strong>and</strong> the defense industry learn coresecurity disciplines that integrate training in CI <strong>and</strong> informationsystems. Education is provided through combinationsof formal classroom teaching, computer-based learning,<strong>and</strong> correspondence, distance, or tele-training.In the realm of counterintelligence, the DSS CounterintelligenceOffice, established in May 1993, seeks to integratean awareness of counterintelligence with DSS coremission areas. Its aims are to infuse the defense workforcewith counterintelligence knowledge, to increase awarenessof counterintelligence throughout DOD <strong>and</strong> the contractorbase, <strong>and</strong> to assist those it trains in recognizing <strong>and</strong>reporting intelligence collection activities conducted byforeign powers or groups.❚ FURTHER READING:PERIODICALS:Barr, Stephen. “Defense Department Agrees to Have OPMTake Over Background Checks.” Washington Post. (February5, 2003): B2.Pincus, Walter. “Computer Shutdown Hits Defense <strong>Security</strong>Service; Backlog of Background Checks Grows.”Washington Post. (July 8, 2000): A10.———. “A Pentagon ‘Embarrassment’: Loral Wins, IsStripped of Award for <strong>Security</strong> Practices.” WashingtonPost. (July 19, 2000): A21.Pound, Edward T. “Keeping Secrets Secret.” U.S. News &World Report. (June 3, 2002): 22.ELECTRONIC:Defense <strong>Security</strong> Service. (February22, 2003).SEE ALSOClassified InformationCounter-<strong>Intelligence</strong>DOD (United States Department of Defense)<strong>Security</strong> Clearance InvestigationsDelta ForceDelta Force is one of the two principal United Statescounter-terrorism units, the other being the Naval SpecialWarfare Development Group, formerly known as SealTeam Six. Created in 1977 by Colonel Charles “Charlie”Beckwith, Delta Force is headquartered at Fort Bragg,North Carolina. Little is known about the elite unit, whichis highly trained <strong>and</strong> well equipped with state-of-the-artweaponry, airborne insertion equipment, <strong>and</strong> other formsof technology. Delta Force has participated in a multitudeof counter-terrorist actions from 1979 onward.Formation. In forming Delta Force, which was activated inNovember 1977, Beckwith drew on his experience withthe British 22nd Regiment Special Air Service (SAS), withwhich he worked in an exchange program in 1962 <strong>and</strong>1963. Despite the heavy influence of SAS, with which it322 Encyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!