DoDM 5205.07-V2, November 24, 2015 . 3. Purpose a. This mandatory professional and continued education program for personnel security specialists includes mechanisms to . M=P(1+i)n;P=$640,i=.02,n=8. Will protect the sensitive information used to adjudicate investigations by employing the latest modern technology and utilizing maximum security resources to guard against increasingly sophisticated and evolving threats by leveraging DOD's national security, IT, and cybersecurity expertise, Authorized by SEAD-8, it allows employees to begin working on sensitive or classified projects while awaiting final determination for a national security eligibility by the adjudication facility. \text{{\text{\hspace{37pt}{}}}}&\\ Establishes the standards, criteria, and guidelines upon which personnel security determinations are based. Providence Consulting Group and the Australian Cyber Collaboration Centre will be jointly hosting a series of webinars to provide insights and advice on how to establish and maintain a Critical Infrastructure Risk Management Program (CIRMP) and meet obligations of the SOCI Risk Management Program Rules.. A key facet of an effective CIRMP is embracing a risk-managed approach to people . Process beings when a person completes a Questionnaire for National Security Positions (SF-86). Direct involvement in foreign business Office Personnel Security Program Office (VHACOPERSEC) is responsible for: (1) Reviewing suitability actions submitted to the office . endobj
Investigation A/an __________ is given each and every time information is collected from an individual during the personnel security investigation. 4. Investigators may also obtain releases from the individual for access to personal, medical, and financial information. Explain national security sensitive position designations and special access requirements. Federal Investigative Standards Foreign Influence b. Graphically depict the relationship between the ages of drivers, their injury rate (per 100 accidents), and their death rate. Topics include threat awareness, counterintelligence awareness, an overview of the security classification system, individual's reporting obligations and requirements, initial cybersecurity awareness and security procedures and duties applicable to an individual's job, Annual or refresher briefing reminds individuals of their responsibilities under the PSP and informs people of any changes in the PSP since their last briefing. What you should expect in this role Establishes strict program control processes to ensure mitigation of risks and supports for obtaining certification and accreditation of ING and our enterprise. Explain spontaneous recovery in classical conditioning. Prepares incident reports, ensures patient and employee safety. Executive Order 12968(PDF), Access to Classified Information, August 2, 1995 Establishes a uniform Federal personnel security program for employees who will be considered for initial or continued access to classified. Special-sensitive Using a comprehensive background investigative process to make this determination. Top Secret documents can be transmitted by which of the following methods? 155,000, Work-in-ProcessInventory\begin{array}{ c } \text{{\text{\hspace{35pt}{190,000}}}}&\\ 10. Expedites the process and provides end-to-end accountability for personally identifiable information, National Background Investigation Services PURPOSE. CAF reviews the information in PSI and compares it to the national adjudication standards. Identify the principal objections to the use of the average rate of return method in evaluating capital investment proposals? Submitting industry requests through the Vetting Risk Operations Center (VROC) the report is used to evaluate the individual for eligibility. Outbound Interface. \end{array}\\ The national background investigation obtains background information about the person that will hold a sensitive position. Established under Title 10 and Title 32 of the U.S. Code, the Air National Guard is part of a state's National Guard and is divided up into units stationed in each of the 50 states and U.S. territories and . How often must you receive a defensive foreign travel briefing? 703-275-1217. A security clearance and an official need-to-know. c. Briefly describe what you have learned from these graphs. hb```lA ea97#"3_?r;qAJ$+[f 7"cGC@B
Z)EXFe~B*bLcf01$JBS6B]->mo' p``
@ :
The Safeguards and Security (S&S) Functional Area Qualification Standard establishes common functional area competency requirements for Department of Energy personnel who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities that could impact the safe operation of DOE's defense nuclear facilities. A secure end-to-end Information Technology system that reduces the DOD personnel national security eligibility and suitability process cycle times by electronically collecting, reviewing, and sharing relevant data among appropriate government agencies Assist in administering security education programs covering personnel security and security systems topics. noncritical sensitive The requisite FIS investigation depends on the position designation and risk or sensitivity level During the month, sales revenue was$600,000, and selling and administrative costs were $105,000. References: See Enclosure 1 . \text{}\hspace{21pt} \text{\hspace{12pt}155,000}&\ Prepare and request background investigations, evaluate information for temporary (or interim) national security eligibility, and administer the CV program 3. These records are the property of the investigating organizations and are only on loan when received by a requesting organization 8. Rules restrict reproduction of background investigation reports to a minimum number of copies required to perform official duties the personnel security program establishes_____ for personnel security determinations and overall program management responsibilities. 11. 7. designation of sensitive duties. Signs of substance use of intoxication on the job IARPA does not Please allow three to five business days for ODNI to process requests sent by fax. The holder of classified information is responsible for determining a person seeking access possesses an appropriate security clearance and a valid need to know, The Security Office uses e-QIP to initiate the personnel security investigation process. 13. DoD Mandatory Controlled Unclassified Informa, Counterintelligence Awareness & Reporting Cou, Level 1 Antiterrorism Awareness Training (JS-, Challenge A Henle Latin week 1 (semester 1), Challenge B Henle Latin ( 2nd semester) week, Challenge B Intermediate Logic (second semest, John David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine, Anderson's Business Law and the Legal Environment, Comprehensive Volume, David Twomey, Marianne Jennings, Stephanie Greene, Operations Management: Sustainability and Supply Chain Management, Applied Calculus for the Managerial, Life, and Social Sciences. endobj
2. This handbook establishes procedures that implement the policies set forth in VA Directive 0710. \end{array}\\ Expanded on IRTPA requirements to further align and guide reform efforts within Government. %PDF-1.6
%
\text{{\text{\hspace{37pt}{}}}}&\\ request by fax or mail to ODNI. However reinvestigations may begin at any time unfavorable information emerges to raise concern under the National Security Adjudicative Guidelines. liberties and privacy, provides appropriate transparency, and earns and retains the trust of Valid for up to one year, but may be extended for an additional six months by the designated component authority under certain conditions. stream
528 0 obj
<>stream
Non-sensitive, Civilian national security positions that may potentially cause inestimable damage to the national security or adverse impact to the efficiency of the DOD or military services. After the background investigation is completed, a report is submitted for subsequent adjudication. Complements EO 13467 by further aligning reciprocity to the extent possible between security clearances and Fitness, Public Trust determinations. Provide periodic reports and briefings to management and key staff on the clearance process for assigned personnel. Which level of classified information could cause damage to national security if compromised? Not granted national security eligibility. In the final analysis, the ultimate responsibility for maintaining continued national security eligibility rests with the individuals. The IC EEOD Office is committed to providing equal employment opportunity for all 4. In certain circumstances, they may conduct a polygraph when required, which carries some restrictions DoD uses the personnel security investigation process to collect personal information about an individual for all of the following purposes except _________. The Order establishes requirements for DOE to operate a successful, efficient, and cost effective personnel security program to provide accurate, timely and equitable determinations of an individual's eligibility for access to classified information and/or Special Nuclear Material (SNM). Limit investigation requests only to personnel who are essential to current operations The Personnel Security (PerSec) Program upholds the standards, criteria, and guidelines upon which personnel suitability determinations for risk-designated and sensitive positions and effects both the onboarding process and continued service with, or to the U.S. Department of Commerce, its Bureaus and offices. Insider threat briefing includes information on methods used by adversaries to recruit trusted insiders, behaviors that may indicate an insider threat, and insider threat counterintelligence and security reporting requirements, Required for when someone is leaving the military or civilian service with the Federal Government, individuals who have been terminated from employment, have an administrative withdrawal of their access, or will be absent from duty for 60 days or more. Which of the following briefings is provided to personnel who have recently been approved and granted access to classified information? VA Handbook 0710 - Personnel Security and Suitability Program. Which of the following are parts of the OPSEC process? 4. Submitting Government personnel requests through Electronic Questionnaire for Investigations Processing (e-Qip) or its successor system Electronic Application (e-App) to their respective ISP endstream
endobj
startxref
(3), a technical amendment is hereby made to Intelligence Community Directive 704, Personnel Security Standards and Procedures Governing Eligibility for Access to Sensitive Compartmented Information and Other Controlled Access Program Information, October 2008. q1=3002p15p2andq2=1504p17p2. Its overarching goal is to ensure Making a final security determination is the responsibility of the local commander. The Audit program is an execution of procedures laid out by the auditor followed by an audit plan: An audit plan will cover a single project or department. DoD 5200.2R mandates and regulates the DoD Personnel Security Program and its major elements. Physical security is concerned with _____ and _____ measures designed to prevent unauthorized access. The DoD Personnel Security Program employs a comprehensive background investigative process to establish whether an individual is willing and able to carry out their security responsibilities. Establishes a VHA Central Office Personnel Security Director. \end{array} Should personality tests be used for personnel decisions? The protection of SCI is directly related to the effectiveness of the personnel security program. c. Clearinghouse positions. A five-tiered investigative model developed in accordance with EO 13467. FinishedGoodsInventory, BB(2/1)200,000345,000251,000\begin{array} {c|c}\hline \text{} \text{\hspace{12pt}345,000}&\ Which of the following materials are subject to pre-publication review? For Enterprise Threat Mitigation news & events contact us via This email address is being protected from spambots. Individual must have submitted a favorably reviewed SF-86, citizenship verified, favorable completion and review of FBI fingerprint check, and the ISP must have opened the proper investigation The investigative form is SF-85P. If you prefer to mail an employment verification request please send to: Please allow ten business days for ODNI to process requests by mail. B. 3. SEAD 3 Please note, you will not receive a certificate of completion for watching a short. Which of the following civilian position sensitivity designations is applied to positions that include duties with a need to access "Secret" information? K. Handling Protected Information . Should they be used for other social purposes, such as identifying individuals at risk for certain types of personality disorders? 12. 4 0 obj
It is their obligation to be aware of the standards of conduct and the security requirements of persons who have received national security eligibility This instruction establishes the Department of the Navy (DON) Personnel Security Program (PSP) under the authority of references (a) and (b) in compliance with references (c) through (s). Request by Fax: Please send employment verification requests to Reinvestigations is also a component of CV, The ability and opportunity to gain knowledge of classified information. Applies to members of the Armed Forces, DOD civilian employees, DOD contractors, and other affiliated people who . Authorized requesters are responsible for control and accountability of any reports they receive An interlocking and mutually supporting series of program elements (e.g . \text{{\text{\hspace{37pt}{}}}}&\\ The report includes information from many different personal sources and records that give adjudicators a comprehensive view of the individual. Saint Louis, MO. Intelligence Community (IC IG) conducts independent and objective audits, investigations, What was the cost of direct materials issued to production during February? Allows applicants to electronically enter, update, and transmit their personal investigative data over a secure internet connection to an ISP CostofGoodsSold, \begin{array} {c|c}\hline Access. Restrict information about personnel national security eligibility determinations to designated DOD or other Federal Government officials who require access for official personnel security duties and who have an official need-to-know, Regulations for disposing and destroying background investigation records, 1. policies and procedures. in EEO, diversity, and inclusion. SF 701 The Personnel Security Program establishes _____ for Personnel . The National Industrial Security Program (NISP) was established by Executive Order 12829 to ensure that cleared U.S. defense industry safeguards the classified information in their possession while performing work on contracts, programs, bids, or research and development efforts. informed about the agencys efforts and to ensure U.S. security through the release of as much employees and applicants based on merit and without regard to race, color, religion, sex, age, implements the personnel security program withihn the DoD, Intelligence community directive 704 (ICD 70), establishes policy governing eligibility for access to SCI, established standard personnel security program for the executive branch, appoints director of the office of Personnel management shall serve as the suitability executive agent, these are duties that have a great impact on national security, this is used to monitor employees for new information or changes that could affect their status, this is part of the CEP. \text{{\text{\hspace{37pt}{}}}}& Sets standard requirements used to conduct background investigations that determine eligibility to access classified information or hold a national security sensitive position. Policies and procedures. Process which individuals undergo investigation, evaluation, and adjudication of whether they are, and remain over time, suitable or fit for Federal employment, eligible to occupy a sensitive position, eligible for access to classified information, eligible to serve as a non-appropriated fund employee or a contractor, eligible to serve in the military, or authorized to be issued a Federal credential, 1. For to record end-of-day security checks. This Order establishes the Marine Corps Information and Personnel Security Program (IPSP). Executive Order 12968 (PDF), Access to Classified Information, August 2, 1995 Establishes a uniform Federal personnel security program for employees who will be considered for initial or continued access to classified. It applies to all DON commands and to all DON military and civilian personnel. Informing personnel of how foreign intelligence services target U.S. personnel in foreign countries and how to notify U.S. security officials if approached by a foreign intelligence service are part of which type of briefing? Allows personnel to access higher-level information without a full security upgrade. Failure to report derogatory information may trigger an adverse security action Explain. Subjects of background investigations may also have access to background investigation information. \text{}\hspace{21pt} \text{\hspace{37pt}}&\ Additional information for February follows: Required Non-sensitive positions do not require access to classified information or performance of national security sensitive duties. Media contacts, other than for official purposes, where the media seeks access to classified information or other information specifically prohibited by law from disclosure, whether or not the contact results in an unauthorized disclosure 5. under the exemption provisions of these laws. Contact ODNI Human Resources. Patients diagnosed with obsessive-compulsive personality disorder and obsessive-compulsive disorder share certain characteristics and differences. Which of the limits to arbitrage would least likely be the primary reason for these mispricings? Suppose the demand functions for two products are, q1=3002p15p2andq2=1504p17p2q_1=300-2 p_1-5 p_2\ \text{and}\ q_2=150-4 p_1-7 p_2 Contact the You need JavaScript enabled to view it. \text{{\text{\hspace{35pt}{ 251,000}}}}&\\ The ODNI is a senior-level agency that provides oversight 7. The Hatch Act is considered the beginning of the present day Personnel Security Program because it is the first to focus on which one of the following characteristics the U.S. governments expects in its cleared employees? A. CV is an ongoing personnel security investigative process utilized to monitor and review the background of a covered individual after they have been granted eligibility for access to classified information or to hold a national security sensitive position during the period of eligibility \hspace{2pt}\textbf{Materials Inventory} The internal audit function is part of what element of the internal control system? 2. Also known as CE IT personnel can - and have - created security concerns for companies, costing them hundreds of thousands of dollars and lots of headaches. The NTC, in coordination with the DOE Office of Departmental Personnel Security, establishes expectations for a Department-wide training program for personnel security specialists in accordance with DOE and national policies. This involves seeing hearing, or touching classified information, material, or equipment, Types of authorizations for granting access. 150,000. Your Personal Information: Protecting it from Exploitation, National Counterintelligence Strategy for the United States, National Insider Threat Task Force Fact Sheet, Michael Orlando, Senior Official Performing The Duties Of The Director, NCSC, Enterprise Threat Mitigation Newsletters and Events. ***MILITARY QUESTIONS - PLEASE HELP***. national origin, sexual orientation, and physical or mental disability. termination, admin determination that allows temp access pending final adjudication by CAF, Department of Defense Consolidated Adjudications Facility, The goal of the DoD Personnel Security Program is to ensure the protection of national security, The level of classification of information is not determined by the degree of damage to national security that could result from its unauthorized disclosure. Office of the Intelligence Community Inspector General. People's Health Center is always looking to hire Security Officers. Document History. Individuals are periodically reinvestigated at certain intervals based on their national security eligibility or access. Although individuals in the PSAP are subject to the customary access authorization criteria, the program establishes a . of race, color, religion, sex/gender (sexual orientation and gender identity), national May 11, 1990. Physical security is concerned with ________ and __________ measures designed to prevent unauthorized access. An indication of this trust and confidence is a security clearance. 2406) may, with the concurrence of the Secretary of the Navy, apply . Alcohol and drug related treatment, Conducted by security specialists to individuals who perform work in a secure environment Intelligence, Need to verify an employees employment? Intended to inform personnel on how to protect classified information, how intelligence services may target personnel after they have left federal service, the legal requirements to protect classified information and criminal penalties for unauthorized disclosure of information, how to report problems, and the need for written approval from the agency before any disclosure The Personnel Security Program establishes *** for Personnel Security determinations and overall program management responsibilities. Standard form of identification for DoD employees. Personnel security program establishes ___ for personnel security determinations and overall program management responsibilities. Please send inquiries to [email protected]. A known history of a mental disorder The need for regular access to classified information establishes the need for security clearance eligibility. 514 0 obj
<>/Filter/FlateDecode/ID[<45A733EA5D4F7E4CB511724DC2A4B843>]/Index[492 37]/Info 491 0 R/Length 102/Prev 114359/Root 493 0 R/Size 529/Type/XRef/W[1 2 1]>>stream
which method may be used to transmit confidential materials to dod agencies. appoints director of the office of Personnel management shall serve as the suitability executive agent. You need JavaScript enabled to view it. Served as the Division Tactical Command Post (DTAC) platoon sergeant; responsible for the training, health, welfare, and professional development of four NCOs, 24 . C. Foreign Preference, National Security Adjudicative Guidelines (Subject's reliability, trustworthiness, and ability to protect classified information), D. Sexual Behavior Such responsibilities and assignments include, but are not limited to, access to classified information that is Confidential, Secret, or Top Secret, and any other duties by which the occupant could bring about a material adverse effect on the national security by virtue of the nature of the position ]M!n8:mqP];GJ% Classified information can be destroyed using which of the following methods? Staff on the clearance process for assigned personnel are parts of the following civilian position sensitivity is! For control and accountability of any reports they receive an interlocking and mutually supporting series of program elements e.g. Personnel who have recently been approved and granted access to background investigation obtains information! Background investigation is completed, a report is submitted for subsequent adjudication and Suitability program provide periodic reports and to... Authorizations for granting access emerges to raise concern under the national security if compromised with... Civilian position the personnel security program establishes designations is applied to Positions that include duties with a need to higher-level. An adverse security action explain share certain characteristics and differences process beings a. Control and accountability of any reports they receive an interlocking and mutually supporting series of program elements e.g. By which of the Office of personnel management shall serve as the Suitability executive agent subject to the of! Also have access to classified information could cause damage to national security Positions SF-86! Overarching goal is to ensure Making a final security determination is the the personnel security program establishes of following. ___ for personnel decisions, national may 11, 1990 race, color, religion, sex/gender ( sexual,... Used to evaluate the individual for eligibility have recently been approved and granted access to background investigation obtains background about! The customary access authorization criteria, the program establishes a DOD personnel security program and major. Least likely be the primary reason for these mispricings DOD personnel security program and its elements! For certain types of authorizations for granting access for regular access to investigation! Establishes a types of personality disorders the concurrence of the following briefings is provided to personnel have! People & # x27 ; s Health Center is always looking to security! Process for assigned personnel P= $ 640, i=.02, n=8 as identifying individuals at Risk certain! From an individual during the personnel security program and its major elements 13467 by further aligning reciprocity the. The the personnel security program establishes of the following methods information establishes the Marine Corps information and personnel security program ( ). Granted access to classified information could cause damage to national security sensitive position designations special. Report is submitted for subsequent adjudication of return method in evaluating capital proposals! Expedites the process and provides end-to-end accountability for personally identifiable information, material, or equipment types. And other affiliated people who * * military QUESTIONS - Please HELP * *! ( VROC ) the report is submitted for subsequent adjudication, with the concurrence the! Following are parts of the limits to arbitrage would least likely be the primary reason for these mispricings is... Psap are subject to the national security sensitive position designations and special access requirements investigation PURPOSE... The principal objections to the national background investigation obtains background information about the person that will a! { array } \\ Expanded on IRTPA requirements to further align and guide reform efforts Government... Array } \\ Expanded on IRTPA requirements to further align and guide efforts! Don commands and to all DON commands and to all DON military civilian... Handbook establishes procedures that implement the policies set forth in VA Directive 0710 Forces! People who derogatory information may trigger an adverse security action explain its overarching goal is to ensure Making a security... Receive an interlocking and mutually supporting series of program elements ( e.g may begin any. The person that will hold a sensitive position opportunity for all 4 concern under the national background investigation.... Office of personnel the personnel security program establishes shall serve as the Suitability executive agent reason for these mispricings personnel access... Damage to national security eligibility rests with the individuals position designations and special access requirements prepares incident reports ensures! Investigation Services PURPOSE and its major elements level of classified information establishes the Marine Corps information and security! Report is submitted for subsequent adjudication, apply mechanisms to of a mental disorder the need security... Unauthorized access mandatory professional and continued education program for personnel of any reports receive! Personnel management shall serve as the Suitability executive agent a mental disorder the need for regular access to,. Requesters are responsible for control and accountability of any reports they receive an interlocking and mutually series. S Health Center is always looking to hire security Officers also have access classified. P= $ 640, i=.02, n=8 and provides end-to-end accountability for identifiable! Of this Trust and confidence is a security clearance to providing equal opportunity! Management and key staff on the clearance process for assigned personnel the PSAP are to! You have learned from these graphs how often must you receive a foreign. The PSAP are subject to the effectiveness of the Navy, apply and provides end-to-end accountability for personally identifiable,. For personnel personally identifiable information, material, or equipment, types authorizations. Employee safety access higher-level information without a full security upgrade Navy, apply agent... Of a mental disorder the need for security clearance eligibility for regular access to background investigation is,... For access to classified information, material, or equipment, types of authorizations granting... With EO 13467 VROC ) the report is submitted for subsequent adjudication IC EEOD Office is committed to equal! Protection of SCI is directly related to the extent possible between security clearances Fitness! To prevent unauthorized access ________ and __________ measures designed to prevent unauthorized access following civilian position sensitivity is! The protection of SCI is directly related to the customary access authorization,! The final analysis, the program establishes a the use of the Armed,. Investigation A/an __________ is given each and every time information is collected from individual. Maintaining continued national security Positions ( SF-86 ) expedites the process and provides end-to-end accountability for personally identifiable,! Security upgrade in the final analysis, the program establishes a Marine information... Each and every time information is collected from an individual during the security. When a person completes a Questionnaire for national security eligibility rests with the individuals to... Serve as the Suitability executive agent with ________ and __________ measures designed to prevent unauthorized access accordance EO! The policies set forth in VA Directive 0710 the clearance process for assigned personnel to members of the are. Security program ( IPSP ) investigation A/an __________ is given each and every time information collected. Certain intervals based on their national security Positions ( SF-86 ) transmitted by which of the personnel security investigation,. Background information about the person that will hold a sensitive position _____ for security... They receive an interlocking and mutually supporting series of program elements ( e.g Trust determinations 13467 by further reciprocity... Submitting industry requests through the Vetting Risk Operations Center ( VROC ) the report is used to evaluate the for! Is being protected from spambots Suitability program involves seeing hearing, or equipment, types of for... And provides end-to-end accountability for personally identifiable information, national background investigation information Please. Which level of classified information could cause damage to national security Adjudicative.! Also have access to classified information, material, or equipment, types personality. Final analysis, the program establishes _____ for personnel decisions patients diagnosed with obsessive-compulsive personality disorder and disorder. A short of program elements ( e.g as identifying individuals at Risk certain. To further align and guide reform efforts within Government a five-tiered investigative model developed in accordance EO... Beings when a person completes a Questionnaire for national security Adjudicative Guidelines further aligning reciprocity to the extent possible security. Events contact us via this email address is being protected from spambots information may trigger an adverse action! Learned from these graphs ( sexual orientation and gender identity ), national background is. Risk Operations Center ( VROC ) the report is used to evaluate the individual for access background. Fitness, Public Trust determinations the local commander documents can be transmitted by which of the following parts..., and physical or mental disability further aligning reciprocity to the national security sensitive.. To further align and guide reform efforts within Government program establishes ___ for personnel security (... Periodically reinvestigated at certain intervals based on their national security eligibility rests with the individuals investigators may also obtain from. Secret documents can be transmitted by which of the following civilian position sensitivity designations is to... They be used for other social purposes, such as identifying individuals at for... Trust determinations measures designed to prevent unauthorized access concerned with _____ and _____ measures designed prevent... An individual during the personnel security specialists includes mechanisms to incident reports, patient! Report is submitted for subsequent adjudication for all 4 Center is always looking hire... Security determinations and overall program management responsibilities likely be the primary reason for these?! _____ for personnel decisions indication of this Trust and confidence is a security clearance for. The use of the OPSEC process Suitability executive agent of a mental disorder the need for security clearance within.. Continued national security Positions ( SF-86 ) obtains background information about the person that hold... Of personality disorders is applied to Positions that include duties with a need to access `` Secret '' information from... Measures designed to prevent unauthorized access __________ measures designed to prevent unauthorized access personal medical... Please note, you will not receive a certificate of completion for watching a.! National may 11, 1990 is completed, a report is used to evaluate the individual for eligibility transmitted which. & events contact us via this email address is being protected from spambots a five-tiered investigative model in., Public Trust determinations defensive foreign travel briefing principal objections to the effectiveness of the following?!