Security-Cleared Population Rises to 5.1 Million

The number of Americans who have been investigated and deemed eligible for access to classified information rose last year to a total of 5,150,379 as of October 2013. It was the fourth consecutive year of growth in the security-cleared population.

The new total includes civilian and military government employees (3.7 million) and contractor personnel (1 million), as well as indeterminate others (0.4 million). It represents an increase of 4.7% from the previous year’s total of 4.9 million. Of the 5.1 million persons who were found eligible for access to classified information, 60% had access in fact.

An Office of Management and Budget review said that the continuing growth of the security clearance system is problematic both for financial and security reasons.

“[The] growth in the number of clearance-holders increases costs and exposes classified national security information, often at very sensitive levels, to an increasingly large population,” said the OMB review, which was released last week.

Accordingly, the OMB review recommended that the government “reduce [the] total population of 5.1M Secret and TS/SCI clearance holders to minimize risk of access to sensitive information and reduce cost.”

The number of security clearances is supposed to be reported to Congress each year by the Office of the Director of National Intelligence. But ODNI said it has not yet filed its 2013 report. [Update: The report is available here.] However, the data were provided in the OMB review.

“Since 9/11, the number of clearances annual approved by DoD [the Department of Defense] has tripled, and continues to grow,” according to an independent review of the Washington Navy Yard Shooting in September 2013 that was also released last week.

“This growth magnifies the challenge of investigating clearance seekers, judging their applications, and periodically reviewing them after they are approved.”

“The continuing expansion of the cleared population has created a culture in which once-rare security clearances are now too often granted by default.” (Actually, security clearances have not been “rare” for quite a few decades.)

The independent review proposed that “DoD should seek to make a 10 percent cut in the number of positions that require access to material classified as Secret.”

“As soon as this reduction is attained, a follow-on review should determine whether further reductions can be realized.”

The independent review also identified “a growing culture of over-classification” as a related issue that “merit[s] additional focused study.” See Security From Within: Independent Review of the Washington Navy Yard Shooting, Department of Defense, November 2013 (released March 18, 2014).

Another review conducted by the Under Secretary of Defense for Intelligence concurred that there are too many people with security clearances. But it said that reducing the cleared population will not necessarily improve quality control or significantly reduce the burden on background investigators and adjudicators, because they are also responsible for a large number of “suitability” investigations in addition to security clearance investigations.

“The workload challenge will not be eliminated by reducing the number of security clearances because of the pending impacts of the alignment of suitability and security investigations and reinvestigations required by Executive Order 13467 and the 2012 Revised Federal Investigative Standards.”

“The net effect of the new standards will be to increase the Department’s investigative and adjudicative workload, regardless of the number of security clearances.” See Internal Review of the Washington Navy Yard Shooting, Report to the Secrecy of Defense, November 20, 2013.

Last week, the Department of Defense issued updated policy on the DoD Personnel Security Program (PSP), DoD Instruction 5200.02, March 21, 2014.

Among other things, the updated policy dictates that “All personnel in national security positions shall be subject to continuous evaluation,” referring to a process of collecting, reporting and evaluating security-relevant information about cleared individuals on an ongoing basis.

But this policy is aspirational rather than descriptive of current practice, which is limited to small-scale pilot projects to develop such a capacity. Full implementation of the “continuous evaluation” process is at least several years away, according to last week’s OMB report.

Secretary of Defense Chuck Hagel said last week that “We will consider reducing the number of personnel holding Secret security clearances by at least 10 percent, a recommendation in line with the October 2013 guidance from the Director of National Intelligence.”

Reducing the number of “personnel” that hold security clearances is a slightly different objective than reducing the number of “positions” that require access to classified information, as recommended by the Independent Review. It is not clear if the Secretary intended to make such a distinction.

In response to a request from Secrecy News, ODNI public affairs refused to provide a copy of the October 2013 DNI guidance. (Update: The DNI guidance was described further in this article from Politico.)

HPSCI Seeks “Continuous Evaluation” of Security-Cleared Employees

Recent unauthorized disclosures of classified information might have been prevented if U.S. intelligence agencies “continuously evaluated the backgrounds of employees and contractors,” according to the House Permanent Select Committee on Intelligence (HPSCI).

In its new report on the FY 2014 intelligence authorization bill, the Committee would require intelligence agencies to “continuously determine whether their employees and contractors are eligible for access to classified information” by using all available transactional records and social media.

“Continuous evaluation allows the IC to take advantage of lawfully available government and public information to detect warning signals that the current system of five-year periodic reinvestigation misses,” the HPSCI report said.

“That information might include: foreign travel; reports of foreign contacts financial disclosure information; checks of criminal, commercial marketing, and credit databases; and other appropriate publicly available information.”

The recently developed concept of continuous evaluation (CE) “allows for a review at any time of an individual with eligibility or access to classified information or in a sensitive position to ensure that that individual continues to meet the requirements for eligibility,” said Brian Prioletti of the ODNI National Counterintelligence Executive at a November 13 hearing of the House Homeland Security Committee.

“As envisioned in the reformed security clearance process, [continuous evaluation] includes automated record checks of commercial databases, government databases, and other information lawfully available,” Mr. Prioletti said. “Manual checks are inefficient and resource-intensive. The C.E. initiative currently under development will enable us to more reliably determine an individual’s eligibility to hold a security clearance or a sensitive position on an ongoing basis.”

“There are a number of ongoing pilot studies to assess the feasibility of selected automated record checks and the utility of publicly available electronic information to include social media sites in the personnel security process,” he added.

“While we fully recognize the value of publicly available electronic information and its relevancy from an adjudicative perspective, there are resource, privacy, and civil liberty concerns that must be addressed as we incorporate such checks into our security processes,” Mr. Prioletti acknowledged.

Up Next: Continuous Monitoring

“Continuous evaluation” itself is just an interim stage, said Gregory Marshall, chief security officer at the Department of Homeland Security.  It is a stepping stone to the desired end state of “continuous monitoring,” which involves more extensive collection directed at the individual subject. [Update: This is a non-standard use of the term “continuous monitoring,” which normally refers to monitoring of information systems, not persons.]

“This administration’s recent information-sharing and safeguarding initiative, also known as Insider Threat, seeks to complement background investigations and continuous evaluation with continuous monitoring,” Mr. Marshall said. “This program will incorporate and analyze data in near-real time from a much broader set of sources. Its focus is the protection of classified information but its applicability to suitability and contractor fitness is evident.”

Indeed, the “applicability” of this approach to all sorts of concerns is evident. If leaks of national security information are deemed to be a counterintelligence threat, why wouldn’t the full arsenal of surveillance tools, including the NSA’s PRISM, be employed against them?

An NSA memorandum reported in the Huffington Post today noted that “vulnerabilities of character” revealed through intelligence gathering can be effectively used to discredit individual “radicalizers.”  In one particularly horrifying case, it was found that a suspect “publishes articles without checking facts.” (“Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit ‘Radicalizers’,” by Glenn Greenwald, Ryan Gallagher, and Ryan Grim, November 26).

The Director of National Intelligence recently ordered a review to see whether the number of persons who hold security clearances — nearly 5 million persons — could be reduced. (“Obama Administration Looks to Scrub Security Clearance List” by Josh Gerstein, Politico, November 21).

That objective could be inadvertently advanced by efforts to ratchet up personnel security procedures. Facing continuous evaluation and the prospect of continuous monitoring, some individuals might decide to opt out of the security clearance system voluntarily.

The Security Clearance Process, and More from CRS

An introduction to the process for granting security clearances for access to classified information was presented in a new report from the Congressional Research Service. See Security Clearance Process: Answers to Frequently Asked Questions, September 9, 2013.

A related CRS report on leaks and the law was also updated this week.  See Criminal Prohibitions on the Publication of Classified Defense Information, updated September 9, 2013.

And for good measure, there is this new CRS report:  The Potential Federal Tax Implications of United States v. Windsor (Striking Section 3 of the Defense of Marriage Act (DOMA)): Selected Issues, September 9, 2013.

Security Clearance Denials and Constitutional Rights

It is generally understood that there is no legally enforceable “right” to be granted a security clearance for access to classified information.  And a landmark 1988 U.S. Supreme Court ruling in Department of the Navy v. Egan has often been interpreted to preclude judicial review of the merits of an agency decision to deny or revoke a security clearance.

But can a court review the denial of a security clearance if it involves an unconstitutional act of discrimination or a restriction of constitutionally guaranteed rights?

A new petition for certiorari asks the U.S. Supreme Court to clarify this issue, which has been a recurring source of confusion.

In a lawsuit filed against the National Geospatial-Intelligence Agency in 2011, petitioner Mahmoud Hegab argued that his security clearance had been improperly revoked by NGA in violation of his constitutional rights.  Specifically, Hegab alleged that he was being punished because his wife was employed by an Islamic faith-based charity (Islamic Relief USA), that she had attended a Saudi-funded academic institution, and that she had participated in an anti-war demonstration. (All government allegations against her were based on open sources, not classified intelligence.)

In short, Mr. Hegab argued the security process was being used punitively to violate his constitutional freedom of religion, freedom of speech and freedom of association.  (“Clearance Lost Due to Anti-Islamic Prejudice, Lawsuit Says,” Secrecy News, October 6, 2011).

The National Geospatial-Intelligence Agency disputed this characterization, and a court declined to review the matter.  Judge James C. Cacheris of the Eastern District of Virginia said that even if it were true that the government had violated the Constitution, the court was barred by Egan and prior precedent from reviewing the NGA decision to revoke Hegab’s security clearance. (“Court Says Review of Security Clearance Dispute is ‘Prohibited’,” Secrecy News, January 23, 2012).  An appeals court upheld dismissal of the case.

This holding would seem to leave an entire domain of potentially unconstitutional government action beyond judicial review.  It is also arguably contrary to another U.S. Supreme Court ruling in a case called Webster v. Doe, in which the Court held that security-based employment decisions could be reviewed where an employee alleged that his constitutional rights had been violated.  In Webster v. Doe, a CIA employee challenged his dismissal on grounds of his homosexuality, and the Supreme Court ruled that the matter was judicially reviewable.

In an August 20, 2013 petition to the Supreme Court, Mr. Hegab’s attorney Sheldon I. Cohen asked the Court to rule that the Hegab case is likewise judicially reviewable.  The Court is not asked to adjudicate the specific claims of discrimination made by Mr. Hegab but simply to affirm that his claims are eligible for judicial review.

The case law in this area is in “disarray,” Mr. Cohen wrote, and there is “confusion among the lower courts on the permissibility of judicial review of challenges to security clearance determinations where constitutional rights are alleged to have been violated.”

“This case is of exceptional importance because close to five million federal civilian employees, members of the military and employees of defense contractors hold security clearances,” Mr. Cohen wrote.  Affirming a right of judicial review in cases like Mr. Hegab’s “would not only protect and uphold the constitutional rights of the affected individual, but would put agency decision makers on notice that they do not have carte blanche to violate the Constitution in this realm.”

A government response to the Hegab petition is due by September 25.

An internal Justice Department working group acknowledged in 1997 that the Webster case “appears to authorize, indeed require, judicial review of equitable constitutional claims.”  In a candid Discussion Paper obtained by Secrecy News that was not intended for public release, the working group proposed a narrow form of judicial review in security clearance cases where constitutional claims were raised.  But that proposal does not appear to have been accepted or acted upon.  See Judicial Review of Claims of Discrimination in Security Clearance Determinations, Department of Justice working group, 1997.

A critical account of the impact of the Supreme Court ruling in Department of the Navy v. Egan was presented in Judicial Interpretations of Egan by Louis Fisher, Law Library of Congress, November 13, 2009.