Promising Practices Promising PracticesPromising Practices
A forum for government's best ideas and most innovative leaders.

The Government Wants You to Stop the Next Edward Snowden

ARCHIVES
GongTo/Shutterstock.com.

If you have spent any time in Washington recently, you’re probably quite familiar with the ‘If you see something say something’ slogan promoted by the Homeland Security Department. For security clearance holders, the slogan is now more than a catchphrase. It’s a mandate.

Security Executive Agent Directive 3, or SEAD 3, is a part of the Insider Threat Program created by President Obama. It was signed on December 14, 2016, and will be implemented June 12. SEAD 3 standardizes reporting requirements for individuals with security clearances. Failing to comply with the new policy could cost you your job or your security clearance.

Government’s New Obsession: Insider Threats

At this point almost everyone in government has had some kind of insider threat awareness training. You can thank Chelsea Manning, Edward Snowden and Aaron Alexis for that. The greatest intelligence risks today aren’t necessarily from the outside—they’re from within the government itself, including the federal contractor community. The individuals with access to America’s secret hold the crown jewels. If they decide not to protect them, that creates serious problems.

Most research has determined insider threats aren’t born, they’re made. That means issues don’t generally present themselves upon an initial background investigation. In the five to 10 years between investigation and reinvestigation, a lot can happen. Uncle Sam is now making sure the policy is clear—it’s up to other cleared coworkers to report potentially troubling information; not just the clearance holders themselves.

What Needs to Be Reported?

This is not the time to start narking on your coworker who is repeatedly late. SEAD 3 outlines eight reportable issues coworkers should be aware of. They directly relate to the 13 adjudicative criteria all security clearance holders should be familiar with from filling out their SF86. They include:

  • Violating agency rules or security policies
  • Unexplained affluence
  • Alcohol or drug abuse
  • Misuse of government property or systems

You might wonder why SEAD 3 creates a separate list of reportable issues outside of the 13 adjudicative criteria at all. SEAD 3 does more than distill some of the security concerns addressed in the clearance application process, it calls out some of the issues research shows are common in insider threat cases. Specifically, a coworker known for following the rules who suddenly starts asking coworkers for their passwords could pose a security risk. Likewise, an individual who has always been careful to take care of government property who is now carelessly leaving it in his or her car may be more than forgetful. And just like the security clearance process itself generally includes multiple violations (a pattern of behavior), patterns of negative behavior are what the government is looking for in tracking the next insider threat.

Does the concept seem awkward to you? Many office conversations are, but just like telling Dave to please stop cooking fish in the office microwave, telling your security officer when your coworker suddenly starts asking for access to classified information they don’t need, or is driving a Corvette on a GS-11 salary is about the greater good.

And also keep in mind, reporting a potential issue is not going to get anyone fired. But if you see a pattern of behavior and knowingly, willingly look away because you don’t want to get a coworker in trouble, you could now be the one out of a job.

Lindy Kyzer is the editor of ClearanceJobs.com and a former Defense Department employee.

Image via GongTo/Shutterstock.com.

FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.