09.12.2012 Views

2003 IMTA Proceedings - International Military Testing Association

2003 IMTA Proceedings - International Military Testing Association

2003 IMTA Proceedings - International Military Testing Association

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

282<br />

whether or not such coverage surfaces information of a security concern. For this study,<br />

the rating forms are expected to provide the bulk of the data needed for a thorough<br />

analysis as to the overall effectiveness of the enhanced interview questions. However, at<br />

the time of this writing, the sample cases have yet to be adjudicated. Once the rating<br />

forms have been completed, comparisons will be made between the adjudicator rating<br />

forms for the baseline sample and the adjudicator rating forms for the enhanced interview<br />

sample. The rating forms completed by the investigators will also be analyzed to<br />

determine how well the enhanced interview protocol performed in comparison to the<br />

traditional approach to conducting interviews.<br />

Conclusion<br />

There is an inherent tension in the PSI program between needing to validate<br />

information provided on the subject’s security form; a non-confrontational approach,<br />

versus an interview approach which involves probing deeper into areas in the subject’s<br />

life that may be of security concern; an investigative approach. This study intends to<br />

reconcile some of that tension as well as the tension between conducting effective,<br />

thorough interviews and those that are completed and adjudicated in a timely manner.<br />

A number of important findings are expected to emerge from this study. In<br />

determining what makes one interview method superior to another the rating data will<br />

provide meaningful information on improving interview and overall investigative<br />

effectiveness. Because the relative productivity of the subject and workplace interviews is<br />

similar across federal agencies the findings from this study could have implications for<br />

improving interviewing techniques across all the agencies that conduct security<br />

background investigations.<br />

References<br />

Bosshardt, M.J., & Lang, E.L. (2002, November). Improving the subject and employment<br />

interview processes: A review of research and practice. Minneapolis, MN: Personnel<br />

Decisions Research Institutes, Inc.<br />

Carney, R.M. (1996, March). SSBI source yield: An examination of sources contacted<br />

during the SSBI. (PERS-TR-96-001). Monterey, CA: Defense Personnel Security<br />

Research Center.<br />

Defense Security Service. (2001, September 10). DSS Investigations Manual.<br />

Director of Central Intelligence. (1998). Adjudicative Guidelines for Determining<br />

Eligibility to Access to Classified Information (DCID 6/4, Annex C, Jul. 2, 1998).<br />

Washington, D.C.: Author.<br />

Executive Order 12968, “Access to Classified Information,” August 2, 1995.<br />

Kramer, L.A., Crawford, L.S., Heuer, Jr., R.J. & Hagen, R.R. (2001, August). SSBI-PR<br />

source yield: An examination of sources contact during the SSBI-PR. (PERS-TR-01-6).<br />

Monterey CA: Defense Personnel Security Research Center.<br />

Defense Personnel Security Research Center. (<strong>2003</strong>). Unpublished analyses. Monterey,<br />

CA: Author<br />

Privacy Act, 5 U.S.C. 552a (1974).<br />

45 th Annual Conference of the <strong>International</strong> <strong>Military</strong> <strong>Testing</strong> <strong>Association</strong><br />

Pensacola, Florida, 3-6 November <strong>2003</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!