AJ's Consulting

* Industrial Security * Marketing * Training *

Industrial Security & You
Revitalize, Update & Facilitate the Bottom Line
May 2008

* http://home.earthlink.net/~ajsconsulting/ *

Greetings!
 
 Are you looking for a chance to revitalize your security department, update your training for your staff, improve your processes and better facilitate your company's bottom line?  Have you taken the time to visualize Spring 2008 and your goals as a security professional and as a part of your overall facility?  Let me assist you with our on-demand consulting and training sessions.
 
Welcome to the first issue of Industrial Security & You
Ann [is] very knowledgeable not only in JPAS, but also DISCO information and Reg's, etc.  She conducts the training in a clear & concise manner.
Elizabeth Marcotte
Little Rock, AR
Our Focus This Month
Lady Justice & Security
DSS News & JPAS Updates
JPAS Tips & Techniques
What is Security's Role?
Acronyms Defined
Lady Justice & Security
by John Hille, ISP, Facility Security Officer
 
Lady Justice
When reevaluating  your security training, remember that the NISPOM Chapter 3 Security Training and Briefings Section 107 Refresher Training holds the contractor [FSO] responsible for providing their employees some form of security education at least annually.  This requirement may be satisfied with a variety of options, one of which is a simple email.  Knowing our IS Rep's are always looking for 'above and beyond' compliance with the NISPOM, how about providing training multiple times this year, once each month?  The article below is an example of the resources available from networking with other FSOs via brown bags or NCMS meetings.  Remember to document any and all training provided to your staff.
 
     Lady Justice ranks as one of the most well known statues in the world.  Although, this work of art is not typically attributed to any famous sculptor, the fact that it adorns so many of the world's courthouses has rendered it one of the more well known icons.  The statue's origin is from ancient Greek/Roman times as the lady represented is Themis (meaning "law of nature" rather than "human ordinance"), she "of good counsel," was the embodiment of divine order, law and custom.  Well known for her clear sightedness, she typically holds a sword in one hand and scales in the other.  The scales represent the impartiality with which justice is served and the sword signifies the power that is held by those making the decision.  During the 16th century, artists started showing the lady blindfolded to indicate that justice is not subject to influence.  From this, the statue earned the name Blind Justice.  Blind Justice is the theory that law should be viewed objectively.  that means that determination of innocence or guilt should be made without bias or prejudice.  It is the idea behind the United States Supreme Court motto "Equal Justice Under Law."  Being engraved on the front of the supreme Court building in Washington D.C. these words are apparently paraphrased from an earlier expression coined by Chief Justice Melville Fuller in the case of Caldwell v. Texas, 1891.  So, what does 'blind or equal justice' have to do with our security modus operandi (our rule to live by and mode of conduct to achieve the rule)?  Well, security is abstract in nature, or at the least difficult to see clearly.  Policy, Law, and requirements are subject to interpretation.  For one citizen to comply with a security component they might do a-b-c, but another person would do x-y-z.  This doesn't mean we operate blindly nor does it prove inequality; it shows flexibility and diversity within the same program.  What we have are the balance scales to equal out differing conditions.  The same laws and power, of the sword, govern a given classified contract condition, but equal justice plays out as individuals approach how they will accomplish an end.  The National Security program has a standard set of guidelines that define the boundaries within which classified materials are handled.  The actual handling of such materials is left up to each facility or company employee, in good faith practices and determinations to safeguard the materials.  The U.S. Government does not tell you how-to accomplish the act, only that you must, by reason of the material's importance to the safety of our nation.  It is as if the government with all power and authority describe the necessary precautions to safeguard classified information, then blindfold themselves and allow industry to place in the balance, its financials and corporate operations to one side, and contractual obligations to the other.  It is the government making industry equal in a very just cause; National Security.
Great job and great supporting materials, much easier to understand....
Gerry McCone
Austin, TX
DSS News & JPAS Updates
 
  • LookPosted on the DSS webpage (https://www.dss.mil)
    • System Access Requests (SAR):  Effective immediately, please submit all new SARs and SAR-related correspondence via fax number (614) 827-1544, e-mail address account.request@dss.mil, or mailing address: Defense Security Service, Attn: Customer Service, 2780 Airport Drive, Ste 400, Columbus, OH, 43219-2268.
    • Recent videos available for download:
      • Tips for E-QIP Submission
      • Operating X-O7 & X-O9 Locks
      • Changing the Combinations for X-O7 & X-O9 Locks
    • PSI Survey: Date has been extended until May 9, 2008
    • PSC Update April 21, 2008: Maintaining a Personnel Security Clearance, SMO Relationships in JPAS when Sensitive Compartmented Information Access is Involved
    • SF 86 Question 21 -- Major Change: Robert M. Gates' memo was posted on April 18, 2008
  • The JPAS JCAVS Desktop Resource has been revised
    • Introduction & Chapter 13 (JPAS Interface with e-QIP) were last modified on March 4, 2008
    • Chapters 1-23 and 14-23 were last modified as of December 19, 2008

For more tips & techniques, to refresh your JPAS knowledge, or to learn how to effectively use JPAS, Register Now for either JPAS & e-QIP Immersion or JPAS & e-QIP Proficiency & Troubleshooting.

[V]ery knowledgeable and gave a good training session.  [A] valuable resource for me in furthering my education.
Beverly Hartson
Reisterstown, MD
JPAS Tips & Techniques
 
Q & APlease send your questions or tips and techniques you wish to share to ajsconsulting@earthlink.net.
 
Q:  I am having difficulty adding someone to my PSM Net -- What am I doing wrong?
 
A: There are two ways to add an individual to your PSM Net (see the JPAS JCAVS Desktop Resource), but the most efficient and effective way for Industry contractors to add individuals is as follows --
  1. Login as User (i.e., Level 4)
  2. Select "Select Person" from the Left menu
  3. Enter the individual's Social Security Number (with or without dashes)
  4. Click the "Display" button
    1. If notified that the individual is not currently in JPAS you will need to "Add A Record"
    2. If the individual is in JPAS, their "Personal Summary" screen will display
      1. Verify that the "Person Category" indicates "Industry (your CAGE Code)"
      2. If not, use the dropdown option and look for your CAGE Code
      3. If an Industry category with your CAGE Code is not available, you will need to "Add A Category" with your Cage Code.
    3. Scroll down to the 3rd section, "Person Category Information," and click on the "In/Out Process" hyperlink and "In Process" the individual into your PSM Net.

Q: I want to "Out Process" an individual -- Does this mean they have left my company?

A: Out processing an individual only means that the individual has been debriefed and no longer requires access to classified materials within your facility.  This in no way indicates whether the individual is still employed by your facility.  There are two ways to "Out Process" an individual from your PSM Net (see the JPAS JCAVS Desktop Resource)
 
TIP: (or update for those who have attended J3S's JPAS training sessions)  The order for out processing and separating individuals in JPAS has been described in the most recent update in the JPAS JCAVS Desktop Resource.  First you "Debrief" the individual, then "Out Process" him from your PSM Net, and then you "Separate" the individual from JPAS.
 
For more tips & techniques, to refresh your JPAS knowledge, or to learn how to effectively use JPAS, register now for either JPAS & e-QIP Immersion or JPAS & e-QIP Proficiency & Troubleshooting
 Ann made me feel very welcome - very personalized assistance.  I was able to ask lots of specific questions. 
Suzanne Chime
Milan, OH
Thank you for reading my newsletter.  If you know of someone who could benefit from the information shared, please pass it on.  If you have a topic suggestion, or a how-to-question, please submit it to ajsconsulting@earthlink.net.
 
What I do best is assist you with solutions to difficult industrial security challenges.  How can I assist you today?
 
Sincerely,
 

Ann J. Martick, ISP
AJ's Consulting
What is Security's Role?
Team Player
When do you schedule time to reflect on what your role is and what it should be?  At the beginning of the year, at some midpoint, or the end of the year?  Does it make a difference?
 
According to Edward P. Halibozek and Dr. Gerald I. Kovacich (the Manager's Handbook for Corporate Security: Establishing and Managing A Successful Assets Protection Program,  pages 67-68.):
 
The role of the corporate security professional is a protective role:  the protection of people, information, physical security assets that belong to or are a part of any corporation.  It is more than a checklist of duties to be performed and responsibilities to be met.  It is a commitment to a corporation's management and employees to provide a safe and secure work environment.  A safe and secure work environment reduces the chances of disruption to the business.
 
Your role ranges from mere protection of classified materials handled at your facility to physical security protection of the facility and it's assets.  Regardless of when you review your role and your security department's role, security should network across all levels of the business to ensure efficient and effective teaming resulting in a better bottom line.
 
Register Now for a FSO/SSO Personnel Security Administration training session to learn more.
Quick Links
What I Do Best
Consulting
AJ's Consulting
17+ years experience in the Industrial Security services.
  • On-Demand JPAS & e-QIP Support
  • On-Demand FSO Surrogate Support
  • Industrial Security Training
    • JPAS & e-QIP Immersion
    • JPAS & e-QIP Proficiency & Troubleshooting
    • FSO/SSO Personnel Security Administration
  • Marketing
    • Internal Newsletters
    • External Newsletters

Call (512) 388-9543 or email ajsconsulting@earthlink.net for a solution to your industrial security challenges.

Join Our Mailing List
Acronyms Defined
Security relevant acronyms
AIARG:  Austin Information Assurance Resource Group is a group of ISSM, ISSO, and/or FSOs who meet every other month to discuss NISPOM Chapter 8 and solve challenges.
ASIS: ASIS International (formerly known as American Society of Industrial Security) is a professional organization for a broad range of security professionals and government security representatives.
CAF: Central Adjudication Facility
CAGE Code: commercial and Government Entity code
CD: Compact Disc
COSR: Cognizant Office of Security Representative
DISCO: Defense Industrial Security Clearance Office (PSCO)
DoD: Department of Defense
DSSA: Defense Security service Academy (ENROL)
DSS: Defense Security Service
e-QIP: Electronic Questionnaire for Investigations Processing
ENROL: Electronic Network and Registration On-Line Learning
FAQ: Frequently Asked Questions
FSO: Facility Security Officer
ISFD: Industrial Security Facilities Database
ISSO: Information Security Oversight Office
ISP: Industrial Security Professional
IS Rep: DSS Industrial Security Representative
ISSM: Information System Security Manager or person charged with ensuring that classified information systems comply with NISPOM Chapter 8.
ISSO: Information System security Officer - an assistant to the ISSM.
JPAS: Joint Personnel Adjudication System - "CSA designated system of record."
JSAC: Joint Security Awareness Council of Dallas/ Fort Worth is a committee of government and contractor personnel committed to security training.
KMP: Key Management Personnel
NCMS: NCMS, Inc. (formerly known as National Classification Management Society) is a professional organization for Industrial Security professionals and government security.
NISP: National Industrial Security Program
NISPOM: National Industrial Security Program Operating Manual
PSC: Personnel Security Clearance
PSCD: Protecting Secret and Confidential Documents
PSCO: Personnel Security Clearance Office
PSM Net: Personnel Security Maintenance Network (formerly the Mead Listing) is the listing of cleared employees and consultants sponsored for access to classified information by your facility.
OPSEC: Operational Security or the practice of protecting unclassified and sensitive information including company proprietary or trade secrets.
SSO: Special Security Officer