SCHOOL THESIS
?view&did=768625
?view&did=768625
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Use of Information Technology Systems<br />
Unauthorized entry into any compartmented computer system; storing or<br />
processing classified information on any system not explicitly approved<br />
for classified processing; or attempting to circumvent or defeat security or<br />
auditing systems, without prior authorization from the system<br />
administrator, other than as part of a legitimate system testing or security<br />
research. 159<br />
After an employee receives a security clearance, that individual will participate in<br />
the Continuous Evaluation Program (CEP or more often simply referred to as CE.)<br />
According to the Defense Security Service (DSS), “CEP involves the uninterrupted<br />
assessment of a person for retention of a security clearance or continuing assignment to<br />
sensitive duties.” 160 Continuing evaluation is a critical part of the personnel security<br />
process. The clearance holder is subject to periodic reinvestigation (every five years for<br />
top secret level clearances, 10 years for secret level, and 15 years for confidential) and<br />
to a reasonable degree of monitoring by supervisors, co-workers, and<br />
security professionals between investigations. These safeguards are<br />
necessary because situations and behaviors change over time. Experience<br />
shows that individuals approved for a security clearance or position of<br />
trust sometimes fall into a pattern of unreliable or untrustworthy behavior<br />
after being granted an initial clearance. 161<br />
Additionally, “the vital need in protect[ing] national security secrets must include<br />
rigorous investigation of unauthorized disclosures of classified information to identify the<br />
individuals who commit them, and vigorous enforcement of the applicable<br />
administrative, civil, and criminal provisions already available.” 162<br />
According to a letter from Office of the Attorney General:<br />
The responsibility for correcting the problem of unauthorized disclosures<br />
of classified information falls squarely upon the shoulders of all<br />
Government officers and employees who are privileged to handle<br />
classified Government information. Department and agency heads have<br />
substantial authority to address the problem of persons who engage in the<br />
159 Ibid.<br />
160 Ibid., 9.<br />
161 Ibid.<br />
162 Office of the Attorney General, Letter to the Honorable J. Dennis Hastert, 3.<br />
49