We’ve been telling readers for years that you need to be very careful about what you say and post on social media, whether Facebook, Twitter, Snapchat, Instagram, or other sites. It can be used against you in divorce proceedings, in lawsuits and criminal trials, and, of course, in the court of popular opinion. Now add another place it can be used against you to the list: during the background check for your Federal security clearance. (Full text of directive below.)
Not to put too fine a point on it, but before we get into talking about the new Federal rule about using social media statements when processing security clearance applications, let’s review a few of the situations – ranging from inane to incriminating – which posts on Twitter and Facebook have led to.
At this point, Facebook, Twitter, and, yes, even MySpace posts have been used to convict defendants and increase sentences in too many cases to count. In some cases it seems like it should have been obvious – in fact maybe even anticipated – that a post on social media would lead to arrest and conviction, such as in the case of the guy who killed his wife and posted pictures and a confession on Facebook, and the fugitive who commented on his own ‘wanted’ poster on Facebook.
But some situations are not only not so obvious, but could not possibly have been anticipated, such as the kid who jokingly made a threat on Facebook he couldn’t have carried out (and in which he included that he was just kidding, and “LOL”), and who is now being charged with terrorism and facing years in prison.
Or the teenager who threatened to blow his own brains out on Twitter – from the time he posted the tweet from his classroom in Austin, Texas, to the time that an agency in Washington, D.C. monitored the tweet, and contacted the police in Austin, it was just over two hours. Finding that 18-year-old Mark Bocanegra had no weapons whatsoever, and no way to carry out the threat, his bail was set at ‘only’ $20,000, and he is still awaiting trial.
And make no mistake – as soon as you hit ‘submit’ or ‘publish’, that’s it. It’s as good as permanent. In fact, even if you delete your post on, for example, Facebook, it is still discoverable during a legal action.
So, with that as background, perhaps it should come as no surprise that the Federal Department of National Intelligence has issued a directive (Security Executive Agent Directive 5), that says that the social media accounts of applicants for national security clearances may – and in fact should – be scrutinized for “discrepant information or potentially disqualifying” information related to the applicant.
“When publicly available social media information pertaining to the covered individual identifies discrepant information or potentially disqualifying issues relevant to one or more of the adjudicative guidelines, the investigation shall be expanded to fully resolve all issues,” says the directive, signed by Director of National Intelligence, James Clapper, and which became effective on May 12, 2016.
According to William R. Evanina, Director of the National Counterintelligence and Security Center, during his testimony the following day (May 13, 2016) before the United States House of Representatives Subcommittee on Government Operations and Subcommittee on National Security Committee on Oversight and Government Reform, “The data gathered via social media will enhance our ability to determine initial or continued eligibility for access to classified national security information and eligibility for sensitive positions, adding that “The use of social media has become an integral, and very public, part of the fabric of most Americans’ daily lives, and it is critical that we use this important source of information to help protect our nation’s security.”
The bottom line is that pretty much anything that you say on social media can be used against you. Whether in a court of law, for a background check, or, as we point out here, when you apply for a job or have a date with someone new, as the Police put it so succinctly, every single day, every word you say, they’ll be watching you.
Here’s the full text of the Directive:
Full Text of Security Executive Agent Directive 5: Collection, Use and Retention of Publicly Available Social Media Information in Personnel Security Background Investigations and Adjudications
(VERSION:5.4 – 05MAY2016) (EFFECTIVE: 12MAy2016)
Note: This was transcribed from the PDF of the original document by The Internet Patrol – any odd characters or apparent typos are due to the transcription process
|Get notified of new Internet Patrol articles for free!
|Or Read Internet Patrol Articles Right in Your Inbox!
as Soon as They are Published! Only $1 a Month!
Imagine being able to read full articles right in your email, or on your phone, without ever having to click through to the website unless you want to! Just $1 a month and you can cancel at any time!
A. AUTHORITY: The National Security Act of 47, as amended; Intelligence Reform and Terrorism Prevention Act of 04, as amended; Executive Order (EO) 10450, Security Requirements for Government Employment, as amended; EO 968, Access to Classified Information, as amended; EO 467, Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information; EO 549, Classified National Security Information Program for State, Local, Tribal and Private Sector Entities; Performance Accountability Council Memorandum, Assignment of Functions Relating to Coverage of Contractor Employee Fitness in the Federal Investigative Standards, 6 December ; and other applicable provisions of law. B. PURPOSE: This Security Executive Agent (SecEA) Directive addresses the collection and use of publicly available social media information during the conduct of personnel security background investigations and adjudications for determining initial or continued eligibility for access to classified national security information or eligibility to hold a sensitive position and the retention of such information. Nothing in this Directive prohibits agencies from conducting other legally permissible investigations or inquiries. C. APPLICABILITY: This Directive applies to "authorized investigative agencies" and "authorized adjudicative agencies" as defined below. This directive also applies to "covered individuals," as defined below, seeking initial or continued eligibility for access to classified information or eligibility to hold a sensitive position. D. DEFINITIONS: As used in this Directive, the following terms have the meanings set forth below: 1. "Agency": Any "executive agency" as defined in 5 U.S.C. § 105, the "military departments," as defined in 5 U.S.C. § 102, and any other entity within the executive branch that comes into possession of classified national security information or has positions designated as sensitive. 2. "Authorized adjudicative agency": An agency authorized by law, executive order, or designation by the SecEA to determine eligibility for access to classified information in accordance with EO 968, as amended, or eligibility to hold a sensitive position. 3. "Authorized investigative agency": An agency authorized by law or regulation to conduct a counterintelligence investigation or investigation of persons who are proposed for access to classified information to ascertain whether such persons satisfy the criteria for obtaining and retaining access to such information. 4. "Classified national security information" or "classified information": Information that has been determined, pursuant to EO 5, any predecessor or successor order, or the Atomic Energy Act of 54, as amended, to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. 5. "Covered individual": a. A person who performs work for or on behalf of the executive branch or who seeks to perform work for or on behalf of the executive branch, but does not include the President or (except to the extent otherwise directed by the President) employees of the President under 3 U.S.C. § 105 or § 107, the Vice President or (except to the extent otherwise directed by the Vice President) employees of the Vice President under 3 U.S.C. §106 or annual legislative branch appropriations acts; b. A person who performs work for or on behalf of a state, local, tribal or private sector entity. as defined in EO 549, but does not include duly elected or appointed governors of a state or territory, or an official who has succeeded to that office under applicable law; c. A person working in or for the legislative or judicial branches and the investigation or determination is conducted by the executive branch, but does not include Members of Congress; Justices of the Supreme Court; and Federal judges appointed by the President. d. Employees of the U.S. Government; industrial, commercial, or personal services contractors; licensees; certificate holders; grantees; experts or consultants; and all subcontractors or any other category of person who acts for or on behalf of the U.S. Government as determined by an appropriate U.S. Government official. 6. "Investigative record": The official record of all data obtained on the covered individual from Trusted Information Providers,' suitability and security applications and questionnaires, and any investigative activity conducted under the Federal Investigative Standards or as approved by the executive agent. 7. "Publicly available social media information": Any electronic social media information that has been published or broadcast for public consumption, is available on request to the public, is accessible on-line to the public, is available to the public by subscription or purchase, or is otherwise lawfully accessible to the public. As defined in the Federal Investigative Standards. 8. "Reasonably exhaustive efforts": The appropriate level of efforts to resolve issues or corroborate discrepant information. They may include multiple attempts or techniques to satisfy the issue, attempts to corroborate the activity through references from the background investigation, and/or attempts to obtain and pursue additional leads through other aspects of the investigation. 9. "Sensitive position": Any position within or in support of an agency in which the occupant could bring about, by virtue of the nature of the position, a material adverse effect on national security regardless of whether the occupant has access to classified information and regardless of whether the occupant is an employee, military service member, or contractor. 10. "Social media": Websites, applications, and web-based tools that allow the creation and exchange of user generated content. Through social media, people or groups can engage in dialogue, interact, and create, organize, edit, comment on, combine, and share content. E. POLICY: Agencies may choose to collect publicly available social media information in the personnel security background investigation process, which pertains to the covered individual's associations, behavior and conduct, as long as the information pertains to the adjudicative guidelines for making determinations of initial or continued eligibility for access to classified information or eligibility to hold a sensitive position. 1. Authorized investigative agencies may collect, use, and retain publicly available social media information as part of a covered individual's background investigation and, if collected, shall incorporate the relevant results in the investigative record. The period of coverage for publicly available electronic information will be consistent with the scope of the investigation. 2. Authorized adjudicative agencies may use and retain publicly available social media information when determining initial or continued eligibility of a covered individual for access to classified information or eligibility to hold a sensitive position. 3. Collection of publicly available social media information shall only he conducted after obtaining the signed Authorization for Release of Information form of the Standard Form 86, Questionnaire for National Security Positions, which includes notice of the collection of such information. 4. Only publicly available social media information pertaining to the covered individual under investigation shall intentionally be collected. Absent a national security concern, or criminal reporting requirement, information pertaining to individuals other than the covered individual will not be investigated or pursued. Information inadvertently collected relating to other individuals will not be retained unless that information is relevant to a security determination of the covered individual. 5. Covered individuals shall not be requested or required to: a. Provide passwords; b. Log into a private account; or c. Take any action that would disclose non-publicly available social media information. 6. Agencies shall not create accounts or use existing accounts on social media for the purpose of connecting (e.g., "friend", "follow") to a covered individual or enlist the assistance of a third party in order to bypass privacy controls and/or access otherwise non-publicly available social media information. Agencies shall not request that a covered individual connect to an agency account or access their account from an agency system in order to provide access to information which would otherwise be protected from public view. 7. Authorized investigative agencies shall make reasonably exhaustive efforts to verify that any information collected that is discrepant or potentially disqualifying pertains to the covered individual. When publicly available social media information pertaining to the covered individual identifies discrepant information or potentially disqualifying issues relevant to one or more of the adjudicative guidelines, the investigation shall be expanded to fully resolve all issues. 8. Any potentially disqualifying issue(s) shall be adjudicated using the National Security Adjudicative Guidelines, reference 3. No unfavorable personnel security actions shall be taken solely on uncorroborated or unverified discrepant information collected pursuant to this Directive. When an adjudicative determination is made to deny or revoke eligibility for access to classified information or eligibility to hold a sensitive position, the covered individual shall be afforded the review proceedings in EO 968, as amended, Part 5. 9. Agencies that use publicly available social media information pursuant to this policy shall reciprocally accept existing investigations or adjudications, that otherwise meet requirements for reciprocity, performed by an agency that does not collect or use publicly available social media information. The gaining agency may collect social media information on the covered individual pursuant to this policy. F. RESPONSIBILITIES: 1. The SeeEA is responsible for: a. Development of standard requirements for the collection, use, and retention of information obtained from social media sources. b. Ensuring policies and procedures governing the collection, use, and retention of publicly available social media information are in accordance with this Directive. c. Issuing guidelines and instructions to ensure appropriate uniformity, efficiency, effectiveness, and timeliness in processes and procedures relating to the collection and use of publicly available social media information. d. Overseeing policies and procedures governing uniform investigator and adjudicator training in the collection, use, and retention of publicly available social media information. 2. Heads of Agencies shall: a. Inform the SecEA of their intent to collect, use, and retain publicly available social media information in determinations for persons requiring initial or continued eligibility for access to classified information or eligibility to hold a sensitive position. h. Ensure that agency policies and procedures governing the collection, use, and retention of publicly available social media information are in accordance with all applicable laws, executive orders, and implementing guidance, and include appropriate protections for privacy and civil liberties, including any necessary changes to documentation required by applicable law (e.g., Privacy Impact Assessments required by the E-government Act or System of Records Notices required by the Privacy Act). c. Ensure that the collection, analysis, reporting, and retrieval of publicly available social media information are automated to the greatest extent practicable. d. Promptly advise the SecEA of any challenges or impediments to the implementation of this policy. e. Ensure that authorized investigative and adjudicative personnel are provided training on the collection, use, and retention of publicly available social media information governed by this policy. f. Act upon and share relevant information of a security, counterintelligence (CI), or law enforcement concern with appropriate security, CI, insider threat, or law enforcement officials. g. Share best practices for more secure, effective, and efficient methods for the collection and use of publicly available social media information. G. EFFECTIVE DATE: This Directive becomes effective on the date of signature.
No Paywall Here!
The Internet Patrol is and always has been free. We don't hide our articles behind a paywall, or restrict the number of articles you can read in a month if you don't give us money. That said, it does cost us money to run the site, so if something you read here was helpful or useful, won't you consider donating something to help keep the Internet Patrol free? Thank you!
|Get notified of new Internet Patrol articles!