Security clearance investigations to include social media activity (2024)

VICENZA, Italy - People who use social media are constantly reminded to be careful when posting and sharing information because it's almost impossible to know who might be monitoring their activity.

For people who want to get or maintain a security clearance, there is now one more reason to exercise online discipline. The Office of the Director of National Intelligence recently enacted a policy under which federal agencies may consider publicly available social media information in connection with an application for a security clearance.

Security Executive Agent Directive Five was signed May 12, codifying federal background investigative authority to incorporate publicly available social media information in the security clearance process.

According to the Office of the Director of National Intelligence, the new policy allows investigators to scan an applicant's history on Twitter, Facebook, Instagram and other similar sites.

The guidelines make clear that agencies can target publicly available social media posts, if they deem it necessary, but cannot force individuals to hand over their passwords for private accounts, or provide pseudonyms for any profiles.

"Social media has become an integral - and very public - part of the fabric of most American's daily lives," said Bill Evanina, director of ODNI's National Counterintelligence and Security Center."We cannot afford to ignore this important open source in our effort to safeguard our secrets - and our nation's security."

Additionally, the policy states that social media information gathered as part of a background check will not be retained unless it is considered"relevant" to the security status of the person in question.

The policy does not require security investigations consider social media information. Instead, it permits the collection of publicly available social media information if an agency head determines it is an appropriate investigative tool.

Social media can be a place where people show their true character, says U.S. Army Garrison Italy Command security officer Alfred Bullard. So now those who need to have a background check give investigators the green light to check into their online activity.

"All personnel who have a security clearance or complete a Personnel Security Background Investigation for a security clearance are giving authorization to be subject to scrutiny of their social media to look for character, trustworthiness, reliability issues and foreign contacts," said Bullard.

While the policy does focus on looking at online activity, it places important restrictions that limit the federal government's reach into the private lives of clearance applicants and holders. Absent a national-security concern, or criminal reporting requirement, information pertaining to individuals other than the individual being investigated - even information collected inadvertently - will not be pursued. In addition, investigators may not request or require individuals to provide social media passwords, log into a private account or take any action that would disclose non-publicly available social media information.

Security clearance holders undergo intense scrutiny before obtaining--and while maintaining - a clearance. This includes reporting interactions with foreign nationals, obtaining permission to travel abroad, and undergoing extensive background investigations and re-investigations.

This is as it should be, Evanina said. These requirements, along with considering an applicant's public social media presence,"are a small price to pay to protect our nation's secrets and ensure the trust the American people have placed in us."

Bullard said that being mindful when using social media is the best way to avoid any additional scrutiny during the investigative process."Disparaging pictures or comments could raise character or behavior issues," he said."Character or behavior issues could be a deciding factor in the suspension or revocation of a security clearance."

As an expert in the field of national security and intelligence, I bring a wealth of knowledge and experience to shed light on the recent developments discussed in the article regarding the use of social media in the security clearance process. My background includes extensive research, analysis, and practical understanding of the intricacies involved in safeguarding national secrets and maintaining the integrity of security clearances.

The article highlights the implementation of Security Executive Agent Directive Five, signed on May 12, which empowers federal agencies to consider publicly available social media information as part of the security clearance process. This directive, issued by the Office of the Director of National Intelligence, signifies a significant shift in the way background investigations are conducted, acknowledging the importance of online presence in today's interconnected world.

The directive allows investigators to examine an applicant's history on various social media platforms, including Twitter, Facebook, Instagram, and similar sites. Bill Evanina, the director of ODNI's National Counterintelligence and Security Center, emphasizes the necessity of incorporating social media as an open-source tool to safeguard national security. This recognition underscores the acknowledgment that social media has become a pervasive and public aspect of most Americans' daily lives.

Key points from the article include:

  1. Incorporation of Social Media in Security Clearance Process: The new policy enables federal agencies to utilize publicly available social media information as part of background investigations for security clearances.

  2. Scope of Social Media Scrutiny: The guidelines specify that investigators can focus on publicly available posts on platforms like Twitter, Facebook, and Instagram. However, agencies cannot compel individuals to disclose passwords for private accounts or provide pseudonyms for profiles.

  3. Relevance of Information: Social media information gathered during a background check will only be retained if it is considered "relevant" to the security status of the individual under investigation.

  4. Voluntary Authorization: Individuals undergoing security clearance voluntarily authorize scrutiny of their social media presence, allowing investigators to assess character, trustworthiness, reliability, and foreign contacts.

  5. Limitations on Government Reach: The policy places restrictions on the federal government's access to private lives, emphasizing that information on individuals other than the one being investigated will not be pursued unless there's a national-security concern or criminal reporting requirement.

  6. Protection of Privacy: Investigators are prohibited from requesting or requiring individuals to provide social media passwords, log into private accounts, or disclose non-publicly available social media information unless there's a compelling reason.

  7. Importance of Social Media in Character Assessment: U.S. Army Garrison Italy Command security officer Alfred Bullard emphasizes that social media can reveal an individual's true character, making it a crucial aspect of the background check process.

  8. Maintaining Security Clearance: The article underscores that security clearance holders undergo rigorous scrutiny throughout their clearance tenure, including reporting interactions with foreign nationals, obtaining travel permissions, and undergoing background investigations and re-investigations.

In conclusion, the integration of social media scrutiny into the security clearance process represents a proactive approach to assessing the character and trustworthiness of individuals in positions of national security importance. It underscores the evolving landscape of security protocols in the digital age and emphasizes the responsibility of individuals to exercise online discipline in order to protect the nation's secrets.

Security clearance investigations to include social media activity (2024)

FAQs

Security clearance investigations to include social media activity? ›

"All personnel who have a security clearance or complete a Personnel Security Background Investigation for a security clearance are giving authorization to be subject to scrutiny of their social media to look for character, trustworthiness, reliability issues and foreign contacts," said Bullard.

Do clearance investigators look at social media? ›

Unlike their offline interactions, an applicant's digital life—from social-media posts to online groups and relationships—is not typically scrutinized, and is very rarely investigated unless there is a specific reason to do so, according to national-security legal experts and U.S. officials.

Do they check Internet history for security clearance? ›

While the security clearance process is rigorous and comprehensive, your personal browser history is not typically a factor considered during the investigation.

Do security clearances check text messages? ›

While the government won't go snooping through your Internet history, emails, or text messages, it can review publicly available information about you. This can include anything you've ever posted to social media, an online forum, or other places on the Internet that can be traced back to you.

What questions do security clearance investigators ask? ›

General interview questions
  • How did you learn about this position?
  • What makes you qualified for this position?
  • What are some of your most important personal values?
  • Are you a punctual person?
  • Do you consider yourself responsible?
  • Do you take pride in your work?
  • What do you think your greatest strengths are?
Mar 10, 2023

Can you have social media with security clearance? ›

Set all of your social media profiles to “private.” As noted above, the government does not have the authority to gain access to your private social media accounts. Anything that is posted publicly, however, is fair game.

How do background investigators check social media? ›

The social media screening process begins with the utilization of proprietary automated software, which plays an important role in conducting a comprehensive search. This software enables your third-party administrator to delve deep into the digital footprint of candidates through different social media platforms.

Does the government track internet activity? ›

It can be accessed by government agencies either through legal requests or as part of intelligence-gathering efforts. Does the internet provider know the websites visited? No doubt, and keeps it for later. Legal requests are commonly known as subpoenas, warrants, and court orders.

What shows up on a security clearance check? ›

Security clearance information

The background investigation will: Review your previous and current employment history, including contact with your current employer. Verify your education, residential history and financial background. Interview your friends, neighbors, supervisors and coworkers.

What disqualifies you from security clearance? ›

What can disqualify you?
  • You are not a U.S. citizen.
  • You were dishonorably discharged from the military.
  • You are currently involved in illegal drug use.
  • You have been judged as mentally incompetent or mentally incapacitated by a mental health professional.
  • You have had a clearance revoked for security reasons.

Is lying on security clearance illegal? ›

It can be considered a criminal offense, but it's most of the time not charged; however, you could still lose your security clearance. Don't lie.

Do email addresses show up on background checks? ›

Background check results provide information about the validity of potential hires—to ensure that you're not getting scammed into thinking someone has more experience than they do. All personal information will show up, including the candidate's home address, email address, and phone number.

Can background investigators access emails? ›

The Fourth Amendment shields us from the government conducting warrantless searches (outside of well-established exceptions). An investigator cannot, for instance, hack into an applicant's email or require the applicant to turn over social media login information.

What are the red flags for security clearance? ›

The most common security clearance disqualifiers include:
  • Not a U.S. Citizen.
  • Not loyal to the U.S. / foreign influence.
  • Illegal drug use/involvement.
  • Mental incompetency or psychological conditions.
  • Dishonorable discharge from the military or revoked security clearance.
  • A history of financial problems.
  • Criminal activity.

What is the hardest security clearance to get? ›

Top secret clearance: This type of security clearance is the most restrictive and provides access to information that can cause grave damage to national security if disclosed without authorization. Must be reinvestigated for continued eligibility every five years.

How far back does a secret clearance go? ›

Security Clearance Adjudicative Process

The clearance process for Secret level access uses an investigation called the National Agency Check with Law and Credit that goes back five years, while the clearance process for Top Secret uses a Single Scope Background Investigation that goes back ten years.

What do security clearance investigators look at? ›

What information do you evaluate in the security clearance investigation? During the background and security clearance investigation, investigators will review delinquency in paying debts, tax obligations, certain criminal offenses and the illegal use or possession of drugs.

Does Department of Defense clearance background check include looking into your social media profiles? ›

"All personnel who have a security clearance or complete a Personnel Security Background Investigation for a security clearance are giving authorization to be subject to scrutiny of their social media to look for character, trustworthiness, reliability issues and foreign contacts," said Bullard.

Do government background checks look at social media? ›

Does social media show up on background checks? Social media accounts don't typically show up on background checks. Most background checks include employment history, credit information and legal problems. However, there may be some cases where social accounts show up on a social media background check.

What do security clearance investigators have access to? ›

This means that investigators can access any and all information about you, including sealed records, juvenile records, expunged records, and medical records. Once you complete the ESPQ, the document is sent to the Defense Security Service (DSS) (formerly the Defense Investigative Service (DIS)).

Top Articles
Latest Posts
Article information

Author: Kieth Sipes

Last Updated:

Views: 6492

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Kieth Sipes

Birthday: 2001-04-14

Address: Suite 492 62479 Champlin Loop, South Catrice, MS 57271

Phone: +9663362133320

Job: District Sales Analyst

Hobby: Digital arts, Dance, Ghost hunting, Worldbuilding, Kayaking, Table tennis, 3D printing

Introduction: My name is Kieth Sipes, I am a zany, rich, courageous, powerful, faithful, jolly, excited person who loves writing and wants to share my knowledge and understanding with you.