DATE: November 22, 2006


In re:

----------------------

SSN: -----------

Applicant for Security Clearance


CR Case No. 04-04264

REMAND DECISION OF ADMINISTRATIVE JUDGE

ROGER C. WESLEY

APPEARANCES

FOR GOVERNMENT

Jennifer I. Campbell, Department Counsel

FOR APPLICANT

Pro Se

SYNOPSIS

Applicant, with an otherwise unblemished record of protecting and safeguarding classified information, committed a deliberate security violation by downloading unclassified files from his facility's classified computer onto his pocket computer, without complying with his company's trusted downloading procedures. While a subsequent investigation by his facility failed to find any classified information in the transferred files, Applicant's actions constituted a deliberate and express security violation. His actions are isolated, though, and successfully mitigated by re-briefing in April 2003 and demonstrated overall judgment and reliability in handling classified systems and information. Clearance is granted.

STATEMENT OF THE CASE

On August 5, 2005, the Defense Office of Hearings and Appeals (DOHA), pursuant to Executive Order 10865 and Department of Defense Directive 5220.6 (Directive), dated January 2, 1992, issued a Statement of Reasons (SOR) to Applicant, which detailed reasons why DOHA could not make the preliminary affirmative finding under the Directive that it is clearly consistent with the national interest to grant or continue a security clearance for Applicant, and recommended referral to an administrative judge to determine whether clearance should be granted, continued, denied or revoked.

Applicant responded to the SOR on August 31, 2005, and requested a hearing. The case was assigned to me on October 31, 2005. Pursuant to notice of November 3, 2005, a hearing was scheduled for November 15, 2005, for the purpose of considering whether it would be clearly consistent with the national interest to grant, continue, deny or revoke Applicant's security clearance. A hearing was convened as scheduled on November 15, 2005. At hearing, the Government's case consisted of four exhibits; Applicant relied on one witness (himself) and three exhibits. DOHA received the transcript (R.T.) on December 1, 2005. The decision granting Applicant's security clearance was issued on January 12, 2006.

Department Counsel timely appealed my favorable decision, and an order of remand issued on September 8, 2006 from the Appeal Board. The Board's order directed issuance of a new decision which is unambiguous, supported by substantial evidence, and reasonable in light of all the contrary record evidence on the raised questions of how many incidents occurred, Applicant's level of knowledge of the propriety of his conduct at the time it occurred, and Applicant's willingness to accept responsibility for his conduct. Reconsideration is undertaken anew in full deference to the Board's mandate.

PROCEDURAL ISSUES

Before the close of the hearing, Department Counsel moved to amend the subparagraph 1.a to conform with applicant's testimony as follows: Applicant was suspended without pay for one week and placed on six months probation, substituting one week for the alleged two weeks. There being no objection, and good cause being shown, Department Counsel's amendment motion was granted. Applicant's answer remained unchanged by the substitution.

SUMMARY OF PLEADINGS

Under Guideline K, Applicant is alleged to have downloaded files from the classified network to his personally owned USB storage device without authorization in March 2003, in violation of paragraph 5-100 of the DoD 5220.22-M of the National Industrial Security Program Operating Manual (NISPOM) of January 1995, in order to expedite work at home after normal duty hours, for which he was suspended without pay for two weeks and placed on six months probation.

For his answer to the SOR, Applicant admitted downloading his files to his personally-owned storage device in March 2003, in order to expedite work at home after normal duty hours, but denied being suspended without pay for two weeks (claiming just one week of suspension without pay). He claimed to have had no subsequent or prior security clearance violations.

STATEMENT OF FACTS

The findings entered in my decision of January 12, 2006, having been reconsidered, are incorporated anew by reference and accorded full weight (subject to correcting, clarifying and supplementing findings as needed) as follows:

Applicant is a 41-year old senior software engineer for a defense contractor who seeks to retain his security clearance. He spent 11 years of active duty in the Air Force before joining his current defense contractor in 1997. For the Air Force, he wrote soft-ware programs as a trained computer programmer. Cleared to work in classified environments, he regularly serviced classified computer systems (R.T., at 30) without ever violating security procedures (R.T., at 35).

While working late at his work site in March 2003, Applicant experimented with a memory card transfer procedure on his classified computer. He wanted to see if he could download unclassified files from his company's classified system to his personally owned USB storage device (or memory card reader) and then check the card through his digital assister (PDA).

Previously, Applicant had removed unclassified files from his classified company computer in accordance with established security procedures. Having small children at home, this enabled him to work on projects in his residence and avoid longer on-duty hours. But he had never before experimented with removing unclassified files from his classified computer using a memory card reader and wasn't sure he could do it.

To perfect his experiment, Applicant first inserted the memory card into the system administrator's personal computer (PC). Because this PC is controlled so that only the system administrator can log on, he could not log in (see exs. 2 and 3; R.T., at 24). So, he then tried logging in on a colleague's PC that was configured for users. Once he successfully logged in to the PC, he installed the memory card reader into this classified computer and accessed the device (exs. 2 and 3). From here, Applicant downloaded unclassified files he created to the memory card reader and verified the file transfer by inserting the memory card into his personal digital assister (PDA), a pocket computer device he obtained outside the facility (R.T., at 24, 41-42). Confident he had not downloaded any classified materials into his memory card reader (R.T., at 24), he removed his memory card reader and PDA, secured the area, and left the facility for home.

The following morning (March 7, 2003), Applicant deleted his downloaded files from his memory card reader through the use of his PDA. Shortly thereafter, the system administrator tried to log onto her office's PC and was unsuccessful. Her PC advised her that it needed rebooting because someone had hooked up an unapproved device in the PC (R.T. , at 36, 56). When the FSO was notified of the system administrator's log in problems later in the same day, he asked a security representative in his office to request Applicant to immediately retrieve his memory card reader, his PDA and his personal home computer and bring them to the security office for the FSO to examine (exs. 2 and 3; R.T., at 56).

Several days later (i.e., on March 12, 2003), the FSO and others in the office installed Applicant's memory card reader (identified by the FSO as a "thumb drive") to ascertain what data was on the memory card (R.T., at 51-52, 56). Unable to spot any files Applicant had downloaded from the classified system, the FSO and his system team conducted a forensic evaluation of Applicant's PDA to check for files downloaded by Applicant. The team found all of the data on Appellant's memory card to be unclassified (R.T., at 54) and none of Applicant's downloaded files on his personal PC (see ex. 3; R.T., at 56).

Applicant acknowledges he failed to utilize the trusted downloading procedures approved for removing files from a classified computer. Trusted downloading procedures entail use of a witness and approved downloading equipment to download files from a classified system into unclassified media (R.T., at 38). By deliberately introducing a personal memory card reader and a PDA into a DoD closed classified network system without utilizing a witness or consulting security or system administrator personnel, Applicant disregarded in-place security procedures in violation of paragraph 5-100 of the DoD 5220.22-M of the NISPOM. He neither availed himself of approved trusted downloading procedures, designed to prevent inadvertent downloading of classified data, nor double-checked his PDA for classified information before departing for home with the USB and PDA devices in his possession.

While confident at the time that the work files he downloaded did not contain classified materials, he knew he was not complying with the company's trusted downloading procedures. Because his USB and PDA were new devices, he thought his experimenting with the devices to further his understanding of the equipment and keep abreast of technology advances might be a gray area (R.T., at 32). His intention at the time in downloading files from his classified network and placing them in his memory card reader and PDA was to see if the classified computers would recognize and allow access to the memory card device. He had no intention of keeping the unclassified files, only to verify that the procedure would work (see ex. 2). In retrospect, though, he admits to using poor judgment and accepts full responsibility for his un-excused transgressions. (R.T., at 31, 39-42, 66). Implicit in his explanations are his admissions of disregarding established downloading procedures and using poor judgment in doing so.

Applicant's records do not reveal any prior security incidents or violations. His assurances there were no classified data in the unclassified files he created and subsequently downloaded to his memory card reader are corroborated by his FSO who completed a forensic investigation of Applicant's downloaded files (compare R.T., at 24-25, 38, 54). While the facility's adverse information report confirmed only that the FSO's review uncovered no DoD classified or proprietary information on the PC hard drives (see ex. 3; R.T., at 34), the FSO confirmed in his hearing testimony that Applicant's recovered downloaded files contained no classified information (R.T., at 46). The FSO's hearing clarification sufficiently corroborates Applicant's no-classified assurances to make them fully credible and worthy of acceptance. Inferences warrant that none of the data transferred to Applicant's memory card reader and PDA contained classified information.

Before the March 2003 incident, Applicant received annual briefings on handling classified information in compliance with his employer's security policy manual and established NISPOM procedures (see ex. 3: R.T., at 37). His most recent such briefing of his security responsibilities prior to the covered incident in issue was in June 2002. Applicant acknowledged this June 2002 briefing in writing (see exs. 3 and C; R.T., at 28-29). The briefing included instructions on approved downloading procedures and the barring of personal computing devices in the facility. After his suspension was lifted, he was administered the normal security refresher briefing upon his return to work in April 2003 (R.T., at 35) and has continued to receive annual security briefings.

Both the memory card and PDA used by Applicant to download unclassified files were secured in a company safe located in the company's security office, pending completion of the investigation (see ex. 3). The memory card was permanently confiscated, and its contained data was deleted. Applicant's PDA and personal computer have since been returned to Applicant. Due to the circumstances of his deliberate security violation, he was sanctioned by his manager (who cited the nature of the violation and explained the consequences for future violations, up to and including employment dismissal) and subjected to one week of administrative leave with pay and a week of suspension without pay (see exs. 3 and 4; R.T., at 34). In April 2003, Applicant signed the agreement of understanding outlining the nature of the security violation and potential future consequences for any repeated security violations.

Since his March 2003 security incident, Applicant has performed above expectations and has regained much of the trust he enjoyed with his software team before the incident (see exs. A and B). He is valued by his contractor team for both his technical and trouble shooting skills. His FSO credits him with being a model employee since the incident with proven integrity and trust in administering classified systems (R.T., at 47-48).

POLICIES

The Adjudicative Guidelines of the Directive (Change 4) list Guidelines to be considered by judges in the decision making process covering DOHA cases. These Guidelines require the judge to consider all of the "Conditions that could raise a security concern and may be disqualifying" (Disqualifying Conditions), if any, and all of the "Mitigating Conditions," if any, before deciding whether or not a security clearance should be granted, continued or denied. The Guidelines do not require the judge to assess these factors exclusively in arriving at a decision. In addition to the relevant Adjudicative Guidelines, judges must take into account the pertinent considerations for assessing extenuation and mitigation set forth in E.2.2 of the Adjudicative Process of Enclosure 2

of the Directive, which are intended to assist the judges in reaching a fair and impartial common sense decision.

Viewing the issues raised and evidence as a whole, the following adjudication policy factors are pertinent herein:

Security Violations

The Concern: Noncompliance with security regulations raises doubt about an individual's trustworthiness, willingness, and ability to safeguard classified information.

Burden of Proof

By virtue of the precepts framed by the Directive, a decision to grant or continue an Applicant's for security clearance may be made only upon a threshold finding that to do so is clearly consistent with the national interest. Because the Directive requires Administrative Judges to make a common sense appraisal of the evidence accumulated in the record, the ultimate determination of an applicant's eligibility for a security clearance depends, in large part, on the relevance and materiality of that evidence. As with all adversary proceedings, the Judge may draw only those inferences which have a reasonable and logical basis from the evidence of record. Conversely, the Judge cannot draw factual inferences that are grounded on speculation or conjecture.

The Government's initial burden is twofold: (1) It must prove any controverted fact[s] alleged in the Statement of Reasons and (2) it must demonstrate that the facts proven have a material bearing to the applicant's eligibility to obtain or maintain a security clearance. The required showing of material bearing, however, does not require the Government to affirmatively demonstrate that the applicant has actually mishandled or abused classified information before it can deny or revoke a security clearance. Rather, consideration must take account of cognizable risks that an applicant may deliberately or inadvertently fail to safeguard classified information.

Once the Government meets its initial burden of proof of establishing admitted or controverted facts, the burden of persuasion shifts to the applicant for the purpose of establishing his or her security worthiness through evidence of refutation, extenuation or mitigation of the Government's case.

CONCLUSION

Appellant comes to these proceedings as an software engineer who violated established procedures in place for downloading materials from classified computer systems. Security issues are raised pertaining to his March 2003 security incident: a one-time violation of NISPOM procedures by downloading unclassified computer files from his classified computer and transferring the files to his personal memory card reader and PDA without following approved downloading procedures or double-checking his PDA for classified information. Although no classified information was actually found in Applicant's downloaded files, his deliberate violation of NISPOM downloading procedures is security significant.

Moreover, although the files Applicant downloaded from his classified PC in March 2003 contained no classified information, the memory card reader and PDA containing the downloaded files posed some risk of including classified materials. For even though Applicant was certain at the time the files he was about to download were unclassified, he made no documented double-check of either storage unit before downloading to ascertain whether classified information was included. That neither of Applicant's downloading and transmission violations involved knowing mishandling of classified information does not deprive them of security concerns.

Under the Directive's security violation guidelines in force, persons responsible for safeguarding classified information in their custody and control are required to keep the materials secured in designated areas and to avoid actions that might place classified information under their custody and control at risk to compromise. Applicant's deliberate downloading actions expressly violated the procedural requirements of paragraph 5-100 of the NISPOM for using network systems selected for storing classified information. His actions warrant one of the disqualifying conditions (DC) of the Adjudicative Guidelines for security violations: DC E2.A11.1.2.2 (Violations that are deliberate or multiple or due to negligence).

The importance of safeguarding classified information cannot be overemphasized. Protecting the nation's security interests against the risks of foreign coercion and intimidation remains a core governmental responsibility that finds roots in our earliest Constitutional history and enjoys the sustaining force of the courts. Cf. United States v. Curtiss-Wright Corp., 299 U.S. 304, 319-20 (1936). Applicant's failures to utilize his employer's trusted downloading procedures, seek prior counseling for his intended downloading actions, and/or double-check the classified PC and transfer units for included classified information increased the security risks for potential compromise of classified information.

In appraising the security significance of Applicant's security violations, careful consideration was given to Applicant's full and open disclosure of his actions in the internal review that followed his actions, his corroborated assurances there were no classified materials in the files he downloaded, his otherwise clean record of observing security procedures for protecting classified information, and his positive contributions to his employer's classified software program. This whole person assessment is consistent with the guidance prescribed in the Directive.

Based on the isolated nature of his imprudent action in handling classified equipment, Applicant may take advantage of two of the mitigating conditions under the guidelines for security violations: E2.A11.1.2.2 (Were isolated or infrequent) and E2.A11.1.2.4 (Demonstrate a positive attitude towards the discharge of security responsibilities). Each mitigating condition is applicable to Applicant's situation.

Furthermore, Applicant has exhibited remorse and renewed understanding about the importance of protecting classified information in his custody and control. His avoidance of any other security violations, his contributions to his employer, and his exhibited attitudinal changes are noted. Based on his otherwise good track record for protecting classified information, his expressed remorse, and his avoidance of any recurrent violations in over two years, he can be assured of complying with security procedures and requirements in the future. Applicant carries his evidentiary burden in demonstrating he mitigated the security concerns raised by subparagraph 1.a of Guideline K.

In reaching my decision, I have considered the evidence as a whole, including each of the E2. 2.2 factors enumerated in the Adjudicative Guidelines of the Directive.

FORMAL FINDINGS

In reviewing the allegations of the SOR and ensuing conclusions reached in the context of the FINDINGS OF FACT, CONCLUSIONS, CONDITIONS, and the factors listed above, this Administrative Judge makes the following FORMAL FINDINGS:

GUIDELINE K (SECURITY VIOLATIONS): FOR APPLICANT

Sub-para. 1.a: FOR APPLICANT

DECISION

In light of all the circumstances presented by the record in this case, it is clearly consistent with the national interest to grant or continue Applicant's security clearance. Clearance is granted.

Roger C. Wesley

Administrative Judge