The DoD Suitability and Fitness Guide outlines resources, procedures, and guidelines for making employment suitability and fitness determinations for DoD civilian employees. It is intended to serve as a supplement to the Office of Personnel Management (OPM) Suitability Processing Handbook and should help ensure compliance with suitability and fitness policy and promote consistent application of suitability principles across the Department. It includes details on end-to-end processing of DoD suitability and fitness cases (from position designation through final adjudication and appeal) as well as links to references and supporting materials. It also describes how suitability and fitness cases are processed by the DoD Consolidated Adjudications Facility (CAF). Note that although the procedures and guidance in this guide were developed to conform specifically to DoDI 1400.25 v731, instruction in 5 CFR § 731 and any OPM issuances regarding suitability take precedence over information presented here.
The Adjudicative Desk Reference (ADR) is a comprehensive collection of background information on the 13 categories of behavior considered when determining an individual’s eligibility for a security clearance. For each category of behavior, the ADR provides information that an adjudicator or manager might want to know about that behavior before making a decision, or that an investigator should know in order to formulate appropriate questions. This background information is not U.S. Government policy and may not be cited as authority for denial or revocation of access. The ADR recently was updated to reflect changes in the adjudicative guidelines and new academic research on the topics covered by these guidelines. It has been recommended by the Security Executive Agent Advisory Committee as a job aid to assist security clearance adjudicators, personnel security investigators, and security managers in implementing personnel security policy. It has also proven useful to appeals panels and lawyers dealing with security clearance decisions, personnel officers making suitability and trustworthiness decisions, and Employee Assistance Program counselors.
When you install the Online Guide to Security Responsibilities on your network, almost everything your personnel might want to know about security, or that you might want them to know, is available on their computer desktop with a few clicks of a mouse. This is an updated version of a product previously called the Customizable Security Guide. You can customize it, if desired, to fit your organization’s specific needs. It is also a good source of material for security professionals preparing awareness briefings or articles for newsletters. The author’s goal was to make the Online Guide to Security Responsibilities so interesting and user-friendly, and also so useful, that employees will want to read it. Extensive use of animated graphics helps set the user-friendly tone.
This product has over 600 pages of material covering procedures for protecting both classified and controlled unclassified information, standards of personnel conduct, ethics, employee assistance, foreign espionage threats and methods, risks associated with foreign travel, force protection, counterintelligence, spy stories, homegrown terrorism, computer vulnerabilities, and vulnerability to communication intercepts and eavesdropping.
Download ProductBack to list
The objective of this publication is to enhance security awareness among cleared employees and military service members by showing that espionage involves real people in workplace situations like their own. These cases demonstrate that loyal and conscientious employees continue to be the target of attempts by agents of foreign intelligence services to recruit them as sources of sensitive defense and intelligence information. Revised and expanded in 2009, this volume now includes summaries of 141 cases of publicly reported espionage and closely related offenses that can be downloaded and reprinted for training or use in security awareness programs.
In collaboration with the International Association of Chiefs of Police (IACP), PERSEREC produced a guide for preventing and responding to school violence. The guide brings together the expertise of over 500 school violence experts and school community members from around the country. Topics include prevention, threat assessment, crisis planning and preparation, roles during a major crisis, post-crisis actions, and legal considerations. The guide was distributed to every military base, police precinct, and sheriff’s department in the country, which in turn disseminated the information to local schools. Published in 1999.
In collaboration with the International Association of Chiefs of Police (IACP), PERSEREC produced guidelines for combating workplace violence for employers and for law enforcement officers. The guide focuses on violence committed by insiders—coworkers, supervisors, or family members of employees—within a common worksite. Guidelines for employees and for police departments are presented in separate sections that include guidance for prevention, for response to a threatening event in progress, and for managing the aftermath of an incident. Published in 1996.
This tool is designed to help the user gauge an organization’s relative vulnerability to insider threats and adverse behavior including espionage against the U.S., theft of intangible assets or intellectual property, sabotage or attacks against networks or information systems, theft or embezzlement, illegal export of critical technology, and domestic terrorism or collaboration with foreign terrorist groups. The tool is organized into six categories of internal preventative or mitigating management activities and the selection of evaluation and audit questions in each category is based on the authors’ distillation of empirical analysis from a relatively large number of insider cases, academic research, and organizational consultations on insider challenges. These research findings are discussed in a PERSEREC technical report, The Insider Risk Evaluation and Audit, TR 09-02, August 2009, found on this site under Selected Reports. The tool can be used for a number of purposes including self-audit of an organization’s current defenses against insider abuse, the development of a strategic risk mitigation plan, and employee training and awareness.