(a)
(1) Department of Defense personnel and Department of Defense contractor personnel who are engaged in sensitive duties that are critical to the national security; and
(2) any individual who—
(A) submits an application for a position as an employee of the Department of Defense for which—
(i) the individual is qualified; and
(ii) a security clearance is required; and
(B) is—
(i) a member of the armed forces who was retired or separated, or is expected to be retired or separated, for physical disability pursuant to chapter 61 of this title;
(ii) the spouse of a member of the armed forces who retires or is separated, after January 7, 2011, for a physical disability as a result of a wound, injuries or illness incurred or aggravated in the line of duty (as determined by the Secretary concerned); or
(iii) the spouse of a member of the armed forces who dies, after January 7, 2011, as a result of a wound, injury, or illness incurred or aggravated in the line of duty (as determined by the Secretary concerned).
(b)
(1) Quantification of the requirements for background investigations necessary for grants of security clearances for Department of Defense personnel and Department of Defense contractor personnel.
(2) Categorization of personnel on the basis of the degree of sensitivity of their duties and the extent to which those duties are critical to the national security.
(3) Prioritization of the processing of background investigations on the basis of the categories of personnel determined under paragraph (2).
(c)
(A) conviction of that individual by a court of competent jurisdiction for—
(i) sexual assault;
(ii) sexual harassment;
(iii) fraud against the United States; or
(iv) any other violation that the Secretary determines renders that individual susceptible to blackmail or raises serious concern regarding the ability of that individual to hold a security clearance; or
(B) determination by a commanding officer that that individual has committed an offense described in subparagraph (A).
(2) An individual described in this paragraph in 1 an individual who has a security clearance and is—
(A) a flag officer;
(B) a general officer; or
(C) an employee of the Department of Defense in the Senior Executive Service.
(3) The Secretary shall ensure that relevant information on the conviction or determination described in paragraph (1) of an individual described in paragraph (2) during the preceding year, regardless of whether the individual has retired or resigned or has been discharged, released, or otherwise separated from the armed forces, is reported into Federal law enforcement records and security clearance databases, and that such information is transmitted, as appropriate, to other Federal agencies.
(4) In this subsection:
(A) The term "sexual assault" includes rape, sexual assault, forcible sodomy, aggravated sexual contact, abusive sexual contact, and attempts to commit such offenses, as those terms are defined in chapter 47 of this title (the Uniform Code of Military Justice).
(B) The term "sexual harassment" has the meaning given that term in section 1561 of this title.
(C) The term "fraud against the United States" means a violation of section 932 of this title (article 132 of the Uniform Code of Military Justice).
(d)
(e)
(f)
(g)
Amendments
2018—Subsecs. (c) to (g). Pub. L. 115–232 added subsec. (c) and redesignated former subsecs. (c) to (f) as (d) to (g), respectively.
2013—Subsec. (a)(2)(B)(ii), (iii). Pub. L. 112–239 substituted "January 7, 2011" for "the date of the enactment of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011".
2011—Subsec. (a). Pub. L. 111–383, §351(a)(1), added subsec. (a) and struck out former subsec. (a). Prior to amendment, text read as follows: "The Secretary of Defense shall prescribe a process for expediting the completion of the background investigations necessary for granting security clearances for Department of Defense personnel and Department of Defense contractor personnel who are engaged in sensitive duties that are critical to the national security."
Subsec. (f). Pub. L. 111–383, §351(a)(2), added subsec. (f).
Effective Date of 2011 Amendment
Pub. L. 111–383, div. A, title III, §351(b), Jan. 7, 2011, 124 Stat. 4193, provided that: "The amendments made by subsection (a) [amending this section] shall apply with respect to a background investigation conducted after the date of the enactment of this Act [Jan. 7, 2011]."
Defense Counterintelligence and Security Agency Activities on Facilitating Access to Local Criminal Records Historical Data
Pub. L. 116–92, div. A, title XVI, §1625, Dec. 20, 2019, 133 Stat. 1736, provided that:
"(a)
"(b)
"(c)
"(1)
"(2)
"(3)
"(4)
"(d)
"(1)
"(2)
Reports on Consolidated Adjudication Facility of the Defense Counterintelligence and Security Agency
Pub. L. 116–92, div. A, title XVI, §1627, Dec. 20, 2019, 133 Stat. 1740, provided that:
"(a)
"(1) metrics used by the Director to evaluate the inventory and timeliness of adjudicating security clearance cases; and
"(2) details on the resources used by the Director in carrying out the security clearance mission of the Consolidated Adjudication Facility.
"(b)
"(1) notify the congressional defense committees of such determination; and
"(2) provide to such committees a briefing on the progress made by the Director with respect to security clearance adjudications."
Termination of Requirement for Department of Defense Facility Access Clearances for Joint Ventures Composed of Previously-Cleared Entities
Pub. L. 116–92, div. A, title XVI, §1629, Dec. 20, 2019, 133 Stat. 1741, provided that: "A clearance for access to a Department of Defense installation or facility may not be required for a joint venture if that joint venture is composed entirely of entities that are currently cleared for access to such installation or facility."
Background and Security Investigations for Department of Defense Personnel by Defense Counterintelligence and Security Agency
Pub. L. 115–91, div. A, title IX, §925, Dec. 12, 2017, 131 Stat. 1526, as amended by Pub. L. 115–232, div. A, title IX, §937, Aug. 13, 2018, 132 Stat. 1940, provided that:
"(a)
"(1)
"(2)
"(3)
"(A) provide for the transition of the conduct of investigations to the Defense Security Service [now Defense Counterintelligence and Security Agency] using a risk management approach; and
"(B) be consistent with the transition from legacy information technology operated by the Office of Personnel Management to the new information technology, including the National Background Investigations System, as described in subsection (f).
"(b)
"(c)
"(1)
"(A) The Consolidated Adjudications Facility.
"(B) Other organizations identified by the Secretary for purposes of this paragraph.
"(2)
"(A) The Office of Cost Analysis and Program Evaluation.
"(B) The Defense Digital Service.
"(C) Other organizations designated by the Secretary for purposes of this paragraph.
"(3)
"(A) may carry out the transfer required by paragraph (1) at any time before the date specified in subsection (b) that the Secretary considers appropriate for purposes of this section; and
"(B) shall carry out the transfer in a manner designed to minimize disruptions to the conduct of background investigations for personnel of the Department of Defense.
"(d)
"(1)
"(2)
"(A) Any personnel security investigations functions transferred by the Secretary to the Director of the Office of Personnel Management pursuant to section 906 of the National Defense Authorization Act for Fiscal Year 2004 (Public Law 108–136; 5 U.S.C. 1101 note).
"(B) Any other functions of the Office of Personnel Management in connection with background investigations initiated by the Department of Defense that the Secretary and the Director jointly consider appropriate.
"(3)
"(4)
"(5)
"(e)
"(1) A single capability for the centralized funding, submissions, and processing of all background investigations, from within the Defense Security Service [now Defense Counterintelligence and Security Agency].
"(2) The discharge by the Consolidated Adjudications Facility, from within the Defense Security Service [now Defense Counterintelligence and Security Agency] pursuant to transfer under subsection (c), of adjudications in connection with the following:
"(A) Background investigations.
"(B) Continuous evaluation and vetting checks.
"(f)
"(1)
"(A) Support for background investigations pursuant to this section and section 951 of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114–328; 130 Stat. 2371; 10 U.S.C. 1564 note).
"(B) Support of the National Background Investigations Bureau.
"(C) Execution of the conduct of background investigations initiated by the Department of Defense pursuant to this section, including submissions and adjudications.
"(2)
"(3)
"(4)
"(g)
"(1) Financial information, including credit scores and credit status.
"(2) Criminal records.
"(3) Drug screening.
"(4) Verifications of information on resumes and employment applications, such as previous employers, educational achievement, and educational institutions attended.
"(5) Other publicly available electronic information.
"(h)
"(1)
"(2)
"(i)
"(j)
"(1)
"(A) An assessment of the feasibility and advisability of periodic reinvestigations of backgrounds of Government and contractor personnel with security clearances, including lessons from all of the continuous evaluation pilots being conducted throughout the Government, and identification of new or additional data sources and data analytic tools needed for improving current continuous evaluation or vetting capabilities.
"(B) A plan to provide the Government with an enhanced risk management model that reduces the gaps in coverage perpetuated by the current time-based periodic reinvestigations model, particularly in light of the increasing use of continuous background evaluations of personnel referred to in subparagraph (A).
"(C) A plan for expanding continuous background vetting capabilities, such as the Installation Matching Engine for Security and Analysis, to the broader population, including those at the lowest tiers and levels of access, which plan shall include details to ensure that all individuals credentialed for physical access to Department of Defense facilities and installations are vetted to the same level of fitness determinations and subject to appropriate continuous vetting.
"(D) A plan to fully integrate and incorporate insider threat data, tools, and capabilities into the new end-to-end vetting processes and supporting information technology established by the Defense Security Service [now Defense Counterintelligence and Security Agency] to ensure a holistic and transformational approach to detecting, deterring, and mitigating threats posed by trusted insiders.
"(2)
"(k)
"(1)
"(A) The average periods of time taken by each authorized investigative agency and authorized adjudicative agency to initiate cases, conduct investigations, and adjudicate cases as compared with established timeliness objectives, from the date a completed security clearance application is received to the date of adjudication and notification to the subject and the subject's employer.
"(B) The number of initial investigations and periodic reinvestigations initiated and adjudicated by each authorized adjudicative agency.
"(C) The number of initial investigations and periodic reinvestigations carried over from prior fiscal years by each authorized investigative and adjudicative agency.
"(D) The number of initial investigations and periodic reinvestigations that resulted in a denial or revocation of a security clearance by each authorized adjudicative agency.
"(E) The costs to the executive branch related to personnel security clearance initiations, investigations, adjudications, revocations, and continuous evaluation.
"(F) A discussion of any impediments to the timely processing of personnel security clearances.
"(G) The number of clearance holders enrolled in continuous evaluation and the numbers and types of adverse actions taken as a result by each authorized adjudicative agency.
"(H) The number of personnel security clearance cases, both initial investigations and periodic reinvestigations, awaiting or under investigation by the National Background Investigations Bureau.
"(I) Other information as appropriate, including any recommendations to improve the timeliness and efficiency of personnel security clearance initiations, investigations, and adjudications.
"(2)
"(3)
"(A) The status of the Secretary in meeting the requirements in subsections (a), (b), and (c).
"(B) The status of any transfers to be carried out pursuant to subsection (d).
"(C) An assessment of the personnel security capabilities of the Department of Defense.
"(D) The average periods of time taken by each authorized investigative agency and authorized adjudicative agency to initiate cases, conduct investigations, and adjudicate cases as compared with established timeliness objectives, from the date a completed security clearance application is received to the date of adjudication and notification to the subject and the subject's employer.
"(E) The number of initial investigations and periodic reinvestigations initiated and adjudicated by each authorized adjudicative agency.
"(F) The number of initial investigations and periodic reinvestigations carried over from prior fiscal years by each authorized investigative and adjudicative agency.
"(G) The number of initial investigations and periodic reinvestigations that resulted in a denial or revocation of a security clearance by each authorized adjudicative agency.
"(H) The number of denials or revocations of a security clearance by each authorized adjudicative agency that occurred separately from a periodic reinvestigation.
"(I) The costs to the Department of Defense related to personnel security clearance initiations, investigations, adjudications, revocations, and continuous evaluation.
"(J) A discussion of any impediments to the timely processing of personnel security clearances.
"(K) The number of clearance holders enrolled in continuous evaluation and the numbers and types of adverse actions taken as a result.
"(L) The number of personnel security clearance cases, both initial investigations and periodic reinvestigations, awaiting or under investigation by the National Background Investigations Bureau.
"(M) Other information that the Secretary considers appropriate, including any recommendations to improve the timeliness and efficiency of personnel security clearance initiations, investigations, and adjudications.
"(4)
"(l)
"(1) the Committees on Armed Services, Appropriations, Homeland Security and Governmental Affairs, and the Select Committee on Intelligence of the Senate; and
"(2) the Committees on Armed Services, Appropriations, Oversight and Government Reform, and the Permanent Select Committee on Intelligence of the House of Representatives."
Enhanced Security Programs for Department of Defense Personnel and Innovation Initiatives
Pub. L. 114–328, div. A, title IX, §951, Dec. 23, 2016, 130 Stat. 2371, provided that:
"(a)
"(1)
"(2)
"(3)
"(4)
"(A) Personnel security.
"(B) Physical security.
"(C) Information security.
"(D) Law enforcement.
"(E) Counterintelligence.
"(F) User activity monitoring.
"(G) Information assurance.
"(H) Such other data sources as the Secretary considers necessary and appropriate.
"(b)
"(1)
"(A) conduct a review of security clearance business processes and, to the extent practicable, modify such processes to maximize compatibility with the security clearance information technology architecture to minimize the need for customization of the system;
"(B) conduct business process mapping of the business processes described in subparagraph (A);
"(C) use spiral development and incremental acquisition practices to rapidly deploy the system, including through the use of prototyping and open architecture principles;
"(D) establish a process to identify and limit interfaces with legacy systems and to limit customization of any commercial information technology tools used;
"(E) establish automated processes for measuring the performance goals of the system;
"(F) incorporate capabilities for the continuous monitoring of network security and the mitigation of insider threats to the system;
"(G) institute a program to collect and maintain data and metrics on the background investigation process; and
"(H) establish a council (to be known as the 'Department of Defense Background Investigations Rate Council') to advise and advocate for rate efficiencies for background clearance investigation rates, and to negotiate rates for background investigation services provided to outsides [sic] entities and agencies when requested.
"(2)
"(c)
"(1)
"(2)
"(3)
"(4)
"(d)
"(1)
"(A) the results of the review; and
"(B) recommendations, if any, for consolidating and clarifying laws, regulations, and executive orders relating to the maintenance of personnel security clearance information by the Federal Government.
"(2)
"(3)
"(A) completing the implementation of the National Security Sensitive Position designations required by section 1400 of title 5, Code of Federal Regulations; and
"(B) aligning to the maximum practical extent the investigative and adjudicative standards and criteria for positions requiring access to classified information and national security sensitive positions not requiring access to classified information to ensure effective and efficient reciprocity and consistent designation of like-positions across the Federal Government.
"(e)
"(f)
"(1) The term 'appropriate committees of Congress' has the meaning given that term in section 3001(a)(8) of the Intelligence Reform and Prevention of Terrorism Act of 2004 (50 U.S.C. 3341(a)(8)).
"(2) The term 'business process mapping' has the meaning given that term in section 2222(i) of title 10, United States Code.
"(3) The term 'insider threat' means, with respect to the Department, a threat presented by a person who—
"(A) has, or once had, authorized access to information, a facility, a network, a person, or a resource of the Department; and
"(B) wittingly, or unwittingly, commits—
"(i) an act in contravention of law or policy that resulted in, or might result in, harm through the loss or degradation of government or company information, resources, or capabilities; or
"(ii) a destructive act, which may include physical harm to another in the workplace."
Reform and Improvement of Personnel Security, Insider Threat Detection and Prevention, and Physical Security
Pub. L. 114–92, div. A, title X, §1086, Nov. 25, 2015, 129 Stat. 1006, as amended by Pub. L. 114–328, div. A, title X, §1081(c)(7), Dec. 23, 2016, 130 Stat. 2420, provided that:
"(a)
"(1)
"(A) to implement a continuous evaluation capability for the national security population for which clearance adjudications are conducted by the Department of Defense Central Adjudication Facility, in coordination with the heads of other relevant agencies;
"(B) to produce a Department-wide insider threat strategy and implementation plan, which includes—
"(i) resourcing for the Defense Insider Threat Management and Analysis Center and component insider threat programs, and
"(ii) alignment of insider threat protection programs with continuous evaluation capabilities and processes for personnel security;
"(C) to centralize the authority, accountability, and programmatic integration responsibilities, including fiscal control, for personnel security and insider threat protection under the Under Secretary of Defense for Intelligence [now Under Secretary of Defense for Intelligence and Security];
"(D) to develop a defense security enterprise reform investment strategy to ensure a consistent, long-term focus on funding to strengthen all of the Department's security and insider threat programs, policies, functions, and information technology capabilities, including detecting threat behaviors conveyed in the cyber domain, in a manner that keeps pace with evolving threats and risks;
"(E) to resource and expedite deployment of the Identity Management Enterprise Services Architecture; and
"(F) to implement the recommendations contained in the study conducted by the Director of Cost Analysis and Program Evaluation required by section 907 of the National Defense Authorization Act for Fiscal Year 2014 (Public Law 113–66; 10 U.S.C. 1564 note), including, specifically, the recommendations to centrally manage and regulate Department of Defense requests for personnel security background investigations.
"(2)
"(b)
"(1) the Secretary of Defense shall define physical and logical access standards, capabilities, and processes applicable to all personnel with access to Department of Defense installations and information technology systems, including—
"(A) periodic or regularized background or records checks appropriate to the type of physical or logical access involved, the security level, the category of individuals authorized, and the level of access to be granted;
"(B) standards and methods for verifying the identity of individuals seeking access; and
"(C) electronic attribute-based access controls that are appropriate for the type of access and facility or information technology system involved;
"(2) the Director of the Office of Management and Budget and the Chair of the Performance Accountability Council, in coordination with the Secretary of Defense, the Administrator of General Services, and, when appropriate, the Director of National Intelligence, and in consultation with representatives from stakeholder organizations, shall design a capability to share and apply electronic identity information across the Government to enable real-time, risk-managed physical and logical access decisions; and
"(3) the Director of the Office of Management and Budget, in conjunction with the Director of the Office of Personnel Management and in consultation with representatives from stakeholder organizations, shall establish investigative and adjudicative standards for the periodic or regularized reevaluation of the eligibility of an individual to retain credentials issued pursuant to Homeland Security Presidential Directive 12 (dated August 27, 2004), as appropriate, but not less frequently than the authorization period of the issued credentials.
"(c)
"(1) formalize the Security, Suitability, and Credentialing Line of Business; and
"(2) submit to the appropriate congressional committee a report that describes plans—
"(A) for oversight by the Office of Management and Budget of activities of the executive branch of the Government for personnel security, suitability, and credentialing;
"(B) to designate enterprise shared services to optimize investments;
"(C) to define and implement data standards to support common electronic access to critical Government records; and
"(D) to reduce the burden placed on Government data providers by centralizing requests for records access and ensuring proper sharing of the data with appropriate investigative and adjudicative elements.
"(d)
"(1) a centralized system is available to serve as the reciprocity management system for the Federal Government; and
"(2) the centralized system described in paragraph (1) is aligned with, and incorporates results from, continuous evaluation and other enterprise reform initiatives.
"(e)
"(1) implement the Security Executive Agent Directive on common, standardized employee and contractor security reporting requirements;
"(2) establish and implement uniform reporting requirements for employees and Federal contractors, according to risk, relative to the safety of the workforce and protection of the most sensitive information of the Government; and
"(3) ensure that reported information is shared appropriately.
"(f) Access to Criminal History Records for National Security and Other Purposes.—
"(1)
"(2)
"(3)
"(4)
"(5)
"(6)
"(A)
"(B)
"(i)
"(ii)
"(I) not later than 45 days after the date of enactment of this Act [Nov. 25, 2015], and in conjunction with the Suitability Executive Agent and the Attorney General, begin developing regulations to implement the amendments made by subparagraph (A); and
"(II) not later than 120 days after the date of enactment of this Act, promulgate regulations to implement the amendments made by subparagraph (A).
"(C)
"(i) sealed or expunged criminal records; or
"(ii) juvenile records.
"(7)
"(8)
"(9)
"(10)
"(11)
"(A)
"(B)
"(i) a summary of the major characteristics of each such Federal program, including the types of infrastructure and resources covered;
"(ii) a comparison of the requirements, whether mandatory or voluntary in nature, for regulated entities under each such program to—
"(I) conduct background checks on employees, contractors, and other individuals;
"(II) adjudicate the results of a background check, including the utilization of a standardized set of disqualifying offenses or the consideration of minor, non-violent, or juvenile offenses; and
"(III) establish access control systems to deter unauthorized access, or provide a security credential for any level of access to a covered facility or resource;
"(iii) a review of any efforts that the Screening Coordination Office of the Department of Homeland Security has undertaken or plans to undertake to harmonize or standardize background check, access control, or credentialing requirements for critical infrastructure and key resource protection programs overseen by the Department; and
"(iv) recommendations, developed in consultation with appropriate stakeholders, regarding—
"(I) enhancing the interoperability of security credentials across critical infrastructure and key resource protection programs;
"(II) eliminating the need for redundant background checks or credentials across existing critical infrastructure and key resource protection programs;
"(III) harmonizing, where appropriate, the standards for identifying potentially disqualifying criminal offenses and the weight assigned to minor, nonviolent, or juvenile offenses in adjudicating the results of a completed background check; and
"(IV) the development of common, risk-based standards with respect to the background check, access control, and security credentialing requirements for critical infrastructure and key resource protection programs.
"(g)
"(1) the term 'appropriate committees of Congress' means—
"(A) the congressional defense committees [Committees on Armed Services and Appropriations of the Senate and the House of Representatives];
"(B) the Select Committee on Intelligence and the Committee on Homeland Security and Governmental Affairs of the Senate; and
"(C) the Permanent Select Committee on Intelligence, the Committee on Oversight and Government Reform, and the Committee on Homeland Security of the House of Representatives; and
"(2) the term 'Performance Accountability Council' means the Suitability and Security Clearance Performance Accountability Council established under Executive Order 13467 (73 Fed. Reg. 38103) [50 U.S.C. 3161 note], or any successor thereto."
[Pub. L. 114–328, div. A, title X, §1081(c), Dec. 23, 2016, 130 Stat. 2419, provided that the amendment made by section 1081(c)(7) to section 1086 of Pub. L. 114–92, set out above, is effective as of Nov. 25, 2015, and as if included in Pub. L. 114–92 as enacted.]
Personnel Security
Pub. L. 113–66, div. A, title IX, §907, Dec. 26, 2013, 127 Stat. 818, as amended by Pub. L. 115–91, div. A, title X, §1051(s)(1), Dec. 12, 2017, 131 Stat. 1566, provided that:
"(a)
"(1)
"(2)
"(A) Determine and compare, for each of the Office of Personnel Management and the components of the Department that conduct personnel security investigations as of the date of the analysis, the quality, cost, and timeliness associated with personnel security investigations and reinvestigations of each type and level of clearance, and identify the elements that contribute to such cost, schedule, and performance.
"(B) Identify mechanisms for permanently improving the transparency of the cost structure of personnel security investigations and reinvestigations.
"(b)
"(c)
"(1)
"(2)
"(3)
"(4)
"(A) Elimination of manual or inefficient processes in investigations and reinvestigations for personnel security, wherever practicable, and automating and integrating the elements of the investigation and adjudication processes, including in the following:
"(i) The clearance application process.
"(ii) Investigation case management.
"(iii) Adjudication case management.
"(iv) Investigation methods for the collection, analysis, storage, retrieval, and transfer of data and records from investigative sources and between any case management systems.
"(v) Records management for hiring and clearance decisions.
"(B) Elimination or reduction, where possible, of the use of databases and information sources that cannot be accessed and processed automatically electronically, or modification of such databases and information sources, if appropriate and cost-effective, to enable electronic access and processing.
"(C) Access and analysis of government, publically available, and commercial data sources, including social media, that provide independent information pertinent to adjudication guidelines and termination standards to improve quality and timeliness, and reduce costs, of investigations and reinvestigations.
"(D) Use of government-developed and commercial technology for continuous monitoring and evaluation of government and commercial data sources that can identify and flag information pertinent to hiring and clearance determinations.
"(E) Standardization of forms used for routine reporting required of cleared personnel (such as travel, foreign contacts, and financial disclosures) and use of continuous monitoring technology to access databases containing such reportable information to independently obtain and analyze reportable data and events.
"(F) Establishment of an authoritative central repository of personnel security information that is accessible electronically at multiple levels of classification and eliminates technical barriers to rapid access to information necessary for eligibility determinations and reciprocal recognition thereof, including the ability to monitor the status of an individual and any events related to the continued eligibility of such individual for employment or clearance during intervals between investigations.
"(G) Elimination or reduction of the scope of, or alteration of the schedule for, periodic reinvestigations of cleared personnel, when such action is appropriate in light of the information provided by continuous monitoring or evaluation technology.
"(H) Electronic integration of personnel security processes and information systems with insider threat detection and monitoring systems, and pertinent law enforcement, counterintelligence and intelligence information, for threat detection and correlation, including those processes and systems operated by components of the Department of Defense for purposes of local security, workforce management, or other related purposes.
"(5)
"(A) include the development of a risk-based approach to monitoring and reinvestigation that prioritizes which cleared individuals shall be subject to frequent reinvestigations and random checks, such as the personnel with the broadest access to classified information or with access to the most sensitive classified information, including information technology specialists or other individuals with such broad access commonly known as 'super users';
"(B) ensure that if the system of continuous monitoring for all cleared individuals described in paragraph (4)(D) is implemented in phases, such system shall be implemented on a priority basis for the individuals prioritized under subparagraph (A); and
"(C) ensure that the activities of individuals prioritized under subparagraph (A) shall be monitored especially closely.
"(d)
"(e)
"(1)
"(2)
"(A) Differences between the metrics used by the Department of Defense and other departments and agencies that grant security clearances in granting reciprocity for security clearances, and the manner in which such differences can be harmonized.
"(B) The extent to which existing Federal Investigative Standards are relevant, complete, and sufficient for guiding agencies and individual investigators as they conduct their security clearance background investigations.
"(C) The processes agencies have implemented to ensure quality in the security clearance background investigation process.
"(D) The extent to which agencies have developed and implemented outcome-focused performance measures to track the quality of security clearance investigations and any insights from these measures.
"(E) The processes agencies have implemented for resolving incomplete or subpar investigations, and the actions taken against government employees and contractor personnel who have demonstrated a consistent failure to abide by quality assurance measures.
"(3)
"(f)
"(1)
"(2)
"(A) The Chair of the Suitability and Security Clearance Performance and Accountability Council, who shall serve as chair of the task force.
"(B) A representative from the Office of Personnel Management.
"(C) A representative from the Office of the Director of National Intelligence.
"(D) A representative from the Department of Defense responsible for administering security clearance background investigations.
"(E) Representatives from Federal law enforcement agencies within the Department of Justice and the Department of Homeland Security involved in security clearance background investigations.
"(F) Representatives from State and local law enforcement agencies, including—
"(i) agencies in rural areas that have limited resources and less than 500 officers; and
"(ii) agencies that have more than 1,000 officers and significant technological resources.
"(G) A representative from Federal, State, and local law enforcement associations involved with security clearance background administrative actions and appeals.
"(H) Representatives from Federal, State, and local judicial systems involved in the sharing of records to support security clearance background investigations.
"(3)
"(4)
"(A) Analyze the degree to which State and local authorities comply with investigative requests made by Federal Government employees or contractor employees carrying out background investigations to determine an individual's suitability for access to classified information or secure government facilities, including the degree to which investigative requests are required but never formally requested.
"(B) Analyze limitations on the access to public records provided by State and local authorities in response to investigative requests by Federal Government employees and contractor employees described in subparagraph (A), including, but not be limited to, limitations relating to budget and staffing constraints on State and local authorities, any procedural and legal obstacles impairing Federal access to State and local law enforcement records, or inadequate investigative procedural standards for background investigators.
"(C) Provide recommendations for improving the degree of cooperation and records-sharing between State and local authorities and Federal Government employees and contractor employees described in subparagraph (A).
"(5)
"(g)
"(1) the Committee on Armed Services, the Committee on Homeland Security and Governmental Affairs, the Committee on Appropriations, and the Select Committee on Intelligence of the Senate; and
"(2) the Committee on Armed Services, the Committee on Oversight and Government Reform, the Committee on Appropriations, and the Permanent Select Committee on Intelligence of the House of Representatives."
Required Notification Whenever Members of the Armed Forces Are Completing Standard Form 86 of the Questionnaire for National Security Positions
Pub. L. 113–66, div. A, title XVII, §1747, Dec. 26, 2013, 127 Stat. 983, provided that:
"(a)
"(b)
"(1) the individual is a victim of a sexual assault; and
"(2) the consultation occurred with respect to an emotional or mental health condition strictly in relation to the sexual assault."
Deadline for Prescribing Process for Prioritizing Background Investigations for Security Clearances
Pub. L. 106–398, §1 [[div. A], title X, §1072(c)], Oct. 30, 2000, 114 Stat. 1654, 1654A–277, provided that the process required by subsec. (a) of this section for expediting the completion of security clearance background investigations was to be prescribed by Jan. 1, 2001.
Ex. Ord. No. 13869. Transferring Responsibility for Background Investigations to the Department of Defense
Ex. Ord. No. 13869, Apr. 24, 2019, 84 F.R. 18125, provided:
By the power vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:
(a) Determinations. Pursuant to section 7103(b)(1) of title 5, United States Code, the DCSA, previously known as the DSS, is hereby determined to have as a primary function intelligence, counterintelligence, investigative, or national security work. It is further determined that chapter 71 of title 5, United States Code, cannot be applied to the DCSA in a manner consistent with national security requirements and considerations.
(b) Exclusion. [Amended Ex. Ord. No. 12171, set out as a note under section 7103 of Title 5, Government Organization and Employees.]
(i) the authority granted by law to an executive department or agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.
(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations.
(c) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.
Donald J. Trump.
1 So in original. Probably should be "is".