Contractors who apply for jobs that require a security clearance and don’t already have one may be eligible for an interim clearance while the background investigation is in progress. Depending on the agency for whom the work is being done, interim clearances can be granted at both the Secret and Top Secret level. Here is how it works:
The man who blew the lid off of security clearance fraud committed by former OPM Contractor USIS finally got compensated for his perseverance and courage to speak up and do the right thing. An article in the Washington Post detailed how Blake Percival, a former USIS Director of Fieldwork Services, went from an extravagant office in western Pennsylvania making $110,000 a year, to getting fired and his family having to live at his parents’ house in Alabama with barely enough money to feed his family. Percival filed a civil lawsuit against USIS and after 4 and-a-half years of dealing with the justice system, Percival was awarded a little bit over six million dollars–of which he will get 3.3 million after paying off all of his legal fees.
As we all know, anyone who holds a security clearances must report certain types of information to their Security Officer. This includes such things as a change in marital or cohabitation status, foreign travel and contacts, criminal charges, financial issues, and drug or alcohol abuse. Depending on your agency or company, there may be additional information that needs to be reported. The Department of Energy (DOE) has labs and sites across the U.S. work involving highly classified nuclear weapons information with a large cleared contractor workforce. Because of the highly sensitive nature of their work, the DOE has one of the most robust security clearance continuous evaluation programs across the government and are an excellent model other agencies might consider mirroring.
The Department of Justice (DOJ) announced that the Defense Information Systems Agency (DISA) Inspector General’s Office, in collaboration with the DOJ, completed an investigation into two federal contracting companies, NetCracker Technology Corp. and Computer Sciences Corp. (CSC), and found evidence that from 2008 through 2013, they used employees on a DISA contract without them having the required security clearances.