COMMUNITY-WIDE ADHERENCE TO DCID 1/14 (U)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP96M01138R000600030050-6
Release Decision:
RIFPUB
Original Classification:
C
Document Page Count:
3
Document Creation Date:
December 20, 2016
Document Release Date:
November 1, 2006
Sequence Number:
50
Case Number:
Publication Date:
July 29, 1977
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 165.64 KB |
Body:
DEPARTMENT OF THE ARMY
OFFICE OF THE ASSISTANT CHIEF OF STAFF FOR INTELLIGENCE
WASHINGTON. D.C. 20310
2 9 JUL 1977
MEMORANDUM FOR: MR. G. MARVIN GENTILE, CHAIRMAN, DCI SECURITY
COMMITTEE
SUBJECT: Community-Wide Adherence to DCID 1/14 (U)
1. (U) Reference is made to Memorandum, SECOM, Executive Secretary,
12 July 1977, subject as above.
2. (C) The following comments are keyed to the questions posed in
para 2, referenced memorandum:
a. Special Background Investigations (SBI's) are conducted for
Department of the Army by the Defense Investigative Service (DIS),
and usually meet DCID 1/14 standards. In those few instances where
cases are closed which reflect that the proper scope has not been
met or a significant lead has not been exploited, the case is returned
to DIS for completion prior to making a final determination. As
provided for in paragraph 15, DCID 1/14, existence of a minor inves-
tigative deficiency will not cause a case to be reopened.
b. Minimum standards expressed in DCID 1/14 would appear to
ensure comparability among all agencies except NSA and CIA. The
latter two agencies have the added feature of a polygraph examination,
which other agencies do not utilize. Accordingly, screening accomplished
by CIA and NSA should be acceptable to other agencies, but screening
accomplished by other agencies would probably not be acceptable to
NSA and CIA until the polygraph examination could be completed. From
the DA viewpoint, current DCID 1/14 standards are adequate and do not
require change.
c. Department of the Army has established a computer based system
to identify personnel having access to SCI. This roster includes
investigation dates, and is the medium which triggers servicing Special
Security Offices (SSO's) to initiate bring-up investigations. A review
of closed SBI-BU's referred to the US Army Intelligence Agency.for
review and adjudication reflects close adherence to the five-year
bring-up requirement.
d. Mutually supporting procedures, constituting DA's continuing
security program, consist essentially of three areas:
ARMY review(s) completed.
Approved For FOisC0 I4EN 1 It96M01138 0600030050-6
CI scif1 d by _/A!) A --------------'
EXEMPT FROM CENERAL DECt..SSIFICATION
#C}IEOULE OF EXECUTIVE Or EI 11G52
EXEMPTION CATS O9Y rb
Approved For Release 2007/ 3 L @06 Ot " "
Approved For F&40KWETIr4[M_P96M0113810600030050-6
DAMI-DOS
SUBJECT: Community-Wide Adherence to DCID 1/14 (U)
(1) Personnel being granted access to SCI for the first time
receive required indoctrination. Six months following the initial
indoctrination, a reindoctrination is presented to ensure full under-
standing of the program. Reindoctrination is given to all persons
having access to SCI two years after the date of last indoctrination..
Personnel who change duty stations are debriefed upon their departure
and reindoctrinated at their new location (if under Army cognizance),
thereby ensuring familiarity with access procedures in the new
environment while reinforcing their knowledge of safeguards and
procedures previously learned.
(2) Servicing SSO's are required by regulation to sustain close
and continuing relations with supported commanders to monitor the
activities and conduct of persons having access to SCI; through this
coordination, instances of mental instability, excessive drinking
habits, indebtedness, unexplained affluence and other-unusual conduct
or attitude which may bear on continued eligibility for access to SCI
surfaced and reported to adjudicative authority for review and/or
reinvestigation. Further, the Army's adjudication element advises
an SSO/local command of possible problem areas concerning an individual
at the time indoctrination authority is forwarded, and the SSO is
instructed to caution an individual about his conduct and to monitor
the individual's behavior through his. supervisor.
(3) By regulation, Army commanders are required to sustain close
supervision and observation of activities and behavior of personnel
having access to classified information (collateral as well as SCI)..
They are also required to establish security training programs within
their respective commands to ensure personnel knowledge of appropriate
security regulations and procedures and awareness of hostile element
operating techniques. This training takes the form of classic,"security
lectures," briefings to small groups on the hostile threat, incorpora-
tion into other areas of required military training, publicity in the
forms ofbrochures/pamphlets/entries in unit bulletins, desk-side
trouble shooting, and frequent unannounced inspections and spot checks.
A majority of commands require at least an annual attendance of a
formal security education program.
The measures noted in paragraph (1), above, apply to all persons having
access to SCI. As of 15 June 1977, approximately 24,500 persons were
identified as having such access, thus it follows that approximately
one-half of this number is involved annually in the reindoctrination
program. The measures in paragraph (3), above, apply across the board
to all members and employees of the Army, but exact annual numbers have
not been developed.
((((~~ ~~~~2
Approved For Release 2007/CQS'1 FL "Illn" IJ 38R000600030050-6
Approved For Fuse tV c EM'f PA 6M0113800600030050-6
DAMI-DOS
SUBJECT: Community-Wide Adherence to DCID 1/14 (U)
e. Within DA, when an individual nominated for SCI is denied
access, a memorandum summarizing the adverse information is prepared.
This item with supportive material is filed in the Army's Investigative
Records Repository (IRR), and this dossier number is recorded in the
Defense Central Investigative Index (DCII). A subsequent check of the
DCII by another Federal agency will disclose the existence of the IRR
dossier, and this item will be released to the agency upon request.
Feasibility of all DOD components and NSA using this procedure is
suggested. The "Third Agency Rule" would apply, but no significant
hurdles are foreseen. This centralization within DOD would constitute
a primary, single source reference point for all agencies to query
DOD. It is suggested that reciprocal exchange procedures among all
agencies may best be established by DCI Directive on the subject..
Such reciprocal procedures should include the voluntary notification
of one agency to another when adverse information is developed which
concerns a member of the second agency.
3
Approved For Release 2007 ffiF , f t rl38R000600030050-6