Question: Does DHS Use Scattered Castles?

What scattered castles?

Scattered Castles is an Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.

ICPG 704.5 (Signed Oct 08) mandates the recognition, use and reciprocity of the Scattered Castles Database across all components of the IC..

How do I check the status of my background investigation?

If the agency has submitted an investigation request on you, you can check the status of your case by calling 724-794-5612, extension 7000.

What agencies use scattered castles?

Scattered Castles is a database used by the Intelligence Community (IC) to record eligibility and accesses to Sensitive Compartmented Information (SCI) and other caveated programs. These databases are distinctly different in many ways and are not connected.

How do I get a copy of my security clearance investigation?

To request a copy of your own background investigation you may submit request to the FIS FOI/PA office. You may use the Freedom of Information, Privacy Act Record Request Form (PDF file) or submit a handwritten request.

What are the 5 levels of security clearance?

These are confidential, secret, top secret and sensitive compartmented information.Confidential. This type of security clearance provides access to information that may cause damage to national security if disclosed without authorization. … Secret. … Top Secret.

How long does it take to upgrade from Secret to Top Secret?

In the past three years, DoD has had a significant backlog of security clearances and reinvestigations pending, most especially for TOP SECRET level access. In general, expect a CONFIDENTIAL or SECRET clearance to take between 1 and 3 months. A TOP SECRET will probably take between 4 and 8 months.

How long does a clearance crossover take?

one to two weeksWhat is the average delay in clearance crossover processing? The timeline for a security clearance crossover depends on the customer. On average, the process takes one to two weeks, but is subject to change due to customer constraints or delays.

What is Jpas security clearance?

The Joint Personnel Adjudication System (JPAS) is the Department of Defense (DoD) personnel security clearance and access database. … JPAS is the system of record for personnel security ad- judication, clearance and verification and history.

What does the intelligence community do?

The United States Intelligence Community (IC) is a group of separate United States government intelligence agencies and subordinate organizations, that work separately and together to conduct intelligence activities to support the foreign policy and national security of the United States.

What system is replacing Jpas?

Defense Information System for Security DISS is a component of the National Background Investigation Services supporting adjudication and subject management services. Once fully deployed, DISS will replace the Joint Personnel Adjudication System (JPAS). For access requirements and procedures, go to the DMDC website.

How do I check my security clearance?

For DoD clearances only your security officer may inquire about the status of your security clearance application. This can be done by checking the Joint Personnel Adjudication System (JPAS) and/or the Security and Investigations Index (SII) or by telephoning the DoD Security Service Center at 888-282-7682.

What replaced Jpas?

The Defense Information System for Security (DISS), once fully deployed, will replace the Joint Personnel Adjudication System (JPAS), to serve as the system of record to perform comprehensive personnel security, suitability and credential eligibility management for all military, civilian, and DOD contractor personnel.

What is needed for classified information?

Classified information may be made available to a person only when the possessor of the information establishes that the person has a valid “need to know” and the access is essential to the accomplishment of official government duties.

Which level of classified information could cause damage?

Levels of Classification The unauthorized disclosure of Secret information could reasonably be expected to cause serious damage to national security. The unauthorized disclosure of Top Secret information could reasonably be expected to cause exceptionally grave damage to national security.

What is the difference between Jpas and scattered castles?

JPAS is the DOD’s clearance repository. Scattered Castles serves essentially the same purpose for the Intelligence Community (IC). … Scattered Castles is an Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.

How long does it take to transfer a security clearance?

“One large firm alone reported that it currently had more than 700 employees waiting for clearance transfers, and that on average its employees wait 94 days for their clearances to be accepted by a new agency.”

How much is a Top Secret SCI clearance worth?

A Secret clearance investigation in 2018 runs a whopping $433 dollars. A Top Secrets runs $5,596. And in any case, the government foots the bill on said clearance costs; contractors or individual employees are not paying for them.

Why would a security clearance be denied?

You may be denied security clearance for any number of reasons, including drug involvement, financial debt or affluence (being overly acquisitive), gambling addiction, undue foreign influence, reckless sexual behavior, technology misuse, or other behavior the government deems as a risk to national security.

What is beyond top secret?

Public Trust Positions can either be moderate-risk or high-risk. Information “above Top Secret” is either Sensitive Compartmented Information (SCI) or special access program (SAP) which are phrases used by media. It is not truly “above” Top Secret, since there is no clearance higher than Top Secret.

Who has the highest security clearance?

DoD issues more than 80% of all clearances. There are three levels of DoD security clearances: TOP SECRET – Will be applied to information in which the unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to the national security.