Products


Adjudicative Desk Reference

The Adjudicative Desk Reference (ADR) is a comprehensive collection of background information on the 13 categories of behavior that are considered when determining an individual’s eligibility for a security clearance. This background information is not U.S. Government policy and may not be cited as authority for denial or revocation of access. It has been approved by the Security Executive Agent Advisory Committee as a job aid to assist security clearance adjudicators, personnel security investigators, and security managers in implementing personnel security policy. It has also proven useful to appeals panels and lawyers dealing with security clearance decisions, personnel officers making suitability and trustworthiness decisions, and Employee Assistance Program counselors.

The ADR had minor updating in June 2010. The Adjudicative Guidelines are now in the process of being reviewed and revised. The ADR will be updated with the revised guidelines as soon as they are available. A comprehensive updating of the background information about the behaviors associated with each of the guidelines is now in process.

View Product
Download Product
Back to list

Online Guide to Security Responsibilities

When you install this Online Security Guide on your network, almost everything your personnel might want to know about security, or that you might want them to know, is available on their computer desktop with a few clicks of a mouse. This is an updated version of a product previously called the Customizable Security Guide. You can customize it, if desired, to fit your organization’s specific needs. It is also a good source of material for security professionals preparing awareness briefings or articles for newsletters. The author’s goal was to make this Online Security Guide so interesting and user-friendly, and also so useful, that employees will want to read it. Extensive use of animated graphics helps set the user-friendly tone.

This product has over 600 pages of material covering procedures for protecting both classified and controlled unclassified information, standards of personnel conduct, ethics, employee assistance, foreign espionage threats and methods, risks associated with foreign travel, force protection, counterintelligence, spy stories, homegrown terrorism, computer vulnerabilities, and vulnerability to communications intercept and eavesdropping. This is version 5.2 dated April 2012.

View Product
Download Product
Back to list

Automated Briefing System

The Automated Briefing System (ABS) enables a security officer with good computer skills to develop automated security awareness briefings. It was developed at the request of security officers using the Online Security Guide (see above). They were sending emails to their personnel instructing them to read specified sections of the Security Guide and then to reply by email certifying that they had done so. The security officers became aware, however, that many personnel were certifying without actually doing the reading, so they wanted a convenient means to test them on what they should have learned. The briefing or training is created by entering links to the Online Security Guide or any other external material that employees are required to read, along with questions designed to test that the required reading has been done and the key points have been learned. ABS has the functionality of a standard computer-based training program, such as alternative ways of presenting the questions, scoring the results, keeping track of all who have taken the briefing, printing certificates of completion, etc.

Please note that although the ABS continues to be available, PERSEREC is no longer able to provide technical support if you encounter technical problems. Use of ABS also requires above average computer skills.

Detailed Product Description and Download
Back to list

Espionage and Other Compromises to National Security 1975-2008

The objective of this publication is to enhance security awareness among cleared employees and military service members by showing that espionage involves real people in workplace situations like their own. These cases demonstrate that loyal and conscientious employees continue to be the target of attempts by agents of foreign intelligence services to recruit them as sources of sensitive defense and intelligence information. Revised and expanded in 2009, this volume now includes summaries of 141 cases of publicly reported espionage and closely related offenses that can be downloaded and reprinted for training or use in security awareness programs.

View Cases
Download PDF
Back to list

Guide for Preventing and Responding to School Violence

In collaboration with the International Association of Chiefs of Police, PERSEREC produced a guide for preventing and responding to school violence. The guide brings together the expertise of over 500 school violence experts and school community members from around the country. Topics include prevention, threat assessment, crisis planning and preparation, roles during a major crisis, post-crisis actions, and legal considerations. The guide was distributed to every military base, police precinct, and sheriff’s department in the country, which in turn disseminated the information to local schools. Published in 1999.

Download PDF
Back to list

Combating Workplace Violence: Guidelines for Employers and Law Enforcement

In collaboration with the International Association of Chiefs of Police, PERSEREC produced guidelines for combating workplace violence for employers and for law enforcement officers. The guide focuses on violence committed by insiders—coworkers, supervisors, or family members of employees—within a common worksite. Guidelines for employees and for police departments are presented in separate sections that include guidance for prevention, for response to a threatening event in progress, and for managing the aftermath of an incident. Published in 1996.

Download PDF
Back to list

Security Training Providers Catalog

This database of providers of security training offers information to security practitioners who may wish to update or enhance their security training in one or more disciplines. The catalog includes information about training offered by Federal Government agencies, academic institutions, and commercial organizations. Contact information is provided in the catalog for all providers. Security practitioners can search for training in any of 16 security disciplines or professional specialties in the government group, 15 in the commercial categories group, and 11 in the academic group. For the government and commercial providers the user can obtain titles of courses offered by each organization. For the academic providers, since course names change so frequently, we recommend that the users seek current information from each institution’s website or online catalog. Similarly, detailed information about each course, since it is subject to change, should be obtained directly from each training provider. Clicking on the URL for any provider will link the user with that provider’s website. This catalog contains information only about academic and commercial providers of which we are aware and the inclusion of any such information does not constitute a government endorsement of the quality of training offered by an organization. We welcome any comments about the value of this tool to the community and its ease of use.

View Providers and Courses
Back to list

Insider Risk Evaluation and Audit Tool

This tool is designed to help the user gauge an organization’s relative vulnerability to insider threats and adverse behavior including espionage against the U. S., theft of intangible assets or intellectual property, sabotage or attacks against networks or information systems, theft or embezzlement, illegal export of critical technology, and domestic terrorism or collaboration with foreign terrorist groups. The tool is organized into six categories of internal preventative or mitigating management activities and the selection of evaluation and audit questions in each category is based on the authors’ distillation of empirical analysis from a relatively large number of insider cases, academic research, and organizational consultations on insider challenges. These research findings are discussed in a PERSEREC technical report, The Insider Risk Evaluation and Audit, TR 09-02, August 2009, found on this site under Selected Reports. The tool can be used for a number of purposes including self-audit of an organization’s current defenses against insider abuse, the development of a strategic risk mitigation plan, and employee training and awareness.

Download PDF
Back to list