What It's Like to Work for a Background Check Contractor

Jacquelyn Martin/AP

The contractor responsible for vetting Edward Snowden in 2011 and Navy Yard shooter Aaron Alexis in 2007, already under criminal investigation for "routine" background check failures, is coming under fire about the way they handle information and operate. Workers are expected to turn out clearances and fast as humanly possible, with little regard for oversight and security.

"People were leaving their laptops at Starbucks," a former USIS investigator told The Washington Post. A number of former USIS workers told the Post about the pressures they faced to churn out background checks, the little oversight from their bosses, and the lack of security placed on personal information collected for the checks. USIS rules say any personal information collected for a background check must be kept behind two layers locks: "for instance, a locked file cabinet in a home, plus a locked front door would qualify," the Post explains. But in practice, things are much, much different. "People were leaving cases on top of their cars, information blowing off. We had a lady that left her files at Chuck E. Cheese with her kids," the same former employee said. 

Two others described a workplace that put pressure on producing as many clearances as possible, paying little attention to "red flags" that should warrant a more thorough investigation. "It was like wink, wink, do this as fast as humanly possible... There was this intense pressure to do more and faster," one former employee said. "It’s very: 'Here’s a sheet of questions, ask the questions, hurry and get the answers, submit them and move forward,' said another. "There’s just not a lot of paying attention to potential red flags and that sort of thing."

Read more on The Atlantic Wire

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • The Big Data Campaign Trail

    With everyone so focused on security following recent breaches at federal, state and local government and education institutions, there has been little emphasis on the need for better operations. This report breaks down some of the biggest operational challenges in IT management and provides insight into how agencies and leaders can successfully solve some of the biggest lingering government IT issues.

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download
  • Ongoing Efforts in Veterans Health Care Modernization

    This report discusses the current state of veterans health care

    Download

When you download a report, your information may be shared with the underwriters of that document.