14.02.2016 Views

SCHOOL THESIS

?view&did=768625

?view&did=768625

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Use of Information Technology Systems<br />

Unauthorized entry into any compartmented computer system; storing or<br />

processing classified information on any system not explicitly approved<br />

for classified processing; or attempting to circumvent or defeat security or<br />

auditing systems, without prior authorization from the system<br />

administrator, other than as part of a legitimate system testing or security<br />

research. 159<br />

After an employee receives a security clearance, that individual will participate in<br />

the Continuous Evaluation Program (CEP or more often simply referred to as CE.)<br />

According to the Defense Security Service (DSS), “CEP involves the uninterrupted<br />

assessment of a person for retention of a security clearance or continuing assignment to<br />

sensitive duties.” 160 Continuing evaluation is a critical part of the personnel security<br />

process. The clearance holder is subject to periodic reinvestigation (every five years for<br />

top secret level clearances, 10 years for secret level, and 15 years for confidential) and<br />

to a reasonable degree of monitoring by supervisors, co-workers, and<br />

security professionals between investigations. These safeguards are<br />

necessary because situations and behaviors change over time. Experience<br />

shows that individuals approved for a security clearance or position of<br />

trust sometimes fall into a pattern of unreliable or untrustworthy behavior<br />

after being granted an initial clearance. 161<br />

Additionally, “the vital need in protect[ing] national security secrets must include<br />

rigorous investigation of unauthorized disclosures of classified information to identify the<br />

individuals who commit them, and vigorous enforcement of the applicable<br />

administrative, civil, and criminal provisions already available.” 162<br />

According to a letter from Office of the Attorney General:<br />

The responsibility for correcting the problem of unauthorized disclosures<br />

of classified information falls squarely upon the shoulders of all<br />

Government officers and employees who are privileged to handle<br />

classified Government information. Department and agency heads have<br />

substantial authority to address the problem of persons who engage in the<br />

159 Ibid.<br />

160 Ibid., 9.<br />

161 Ibid.<br />

162 Office of the Attorney General, Letter to the Honorable J. Dennis Hastert, 3.<br />

49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!