recommended reading

Getting on Military Bases Is About to Involve FBI Background Checks

SOMMAI/Shutterstock.com

Members of the defense community, starting this Friday, automatically will be screened against the FBI's criminal database when they try enter military installations and pulled aside if the system shows an arrest, felony or outstanding warrant.

The new Defense Department tool is part of a larger, governmentwide effort to continuously vet people with access to secure facilities, following shootings at Fort Hood and the Navy Yard.

Identification smartcards issued to troops, veterans, relatives and other individuals permitted to enter military bases have long been checked against a DOD database before access is granted. But an instant FBI background check has never been part of the process.

Beginning this week, DOD's information technology system will tap the FBI’s National Crime Information Center system, Nextgov has learned. 

This linkage had been in the works for several years but took on renewed urgency after the Sept. 16, 2013, Navy Yard slaying. Gunman Aaron Alexis entered secure areas using a valid ID card, despite having an arrest record and a history of other infractions.

"This all comes back to the Washington Navy Yard process, which was a big deal -- but the real change that happened was the physical security community and the IT guys talked to each other and said, ‘You know what, it’s not a physical security problem; it’s an identity problem," said Michael Butler, deputy director for identity services at the Defense Manpower Data Center. "When you look at it that way, it completely changes the game." He was speaking Thursday evening at a Smart Card Alliance event

Butler said the accuracy of a trial run of the system, called the Identity Management Capability Enterprise Services Application, has been "stunning.” He declined to disclose figures on matches.

“On Aug. 8, the Identity Matching Engine for Security and Analysis will be functional for any installation with the capability to scan persons entering the installation and have implemented the IMESA interface with Defense Manpower Data Center,” Pentagon spokeswoman Lt. Col. Valerie Henderson said Friday in an email.  

IMESA will be operational on Air Force, Army, Marine, and Defense Logistics Agency installations that day, she added.

The measured rollout has more to do with policy issues than technological challenges.

In April, Pentagon top brass released an official memorandum establishing the right for IMESA to check FBI records. It states system users only can conduct searches against the FBI databases for "maintaining law and order" and for "crime prevention." IMESA will keep track of all users who query the database.

The tool will run an FBI background check regardless of "whether you are going to the commissary or to work," Butler told Nextgov during an interview. 

For example, he said, if a military employee is caught by police driving under the influence one night, that information will flow into the system, even if the employee fails to report it to DOD. The guard at the base will get a red flag, stop the employee from entering, and then law enforcement will study the situation further.

IMESA only has the ability to search FBI records right now, but the plan is to loop in law enforcement records from state and local jurisdictions eventually.

A November independent review of the Navy Yard incident recommended IMESA be deployed at all DOD facilities.

“The systems and processes for admitting cleared and uncleared personnel through the gates to DOD facilities are insufficient to ensure on-base security,” the report found. “Currently, each service is implementing its own automated system for its own facilities . . . We recommend the joint approach of the Identity Management Enterprise Services Architecture effort.”

An internal review conducted at the same time concluded the same. The Pentagon report advised officials “accelerate” development of IMESA “to enable DOD components to share access control information and continuously vet individuals against U.S. government authoritative databases.”

(Image via SOMMAI/Shutterstock.com)

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Modernizing IT for Mission Success

    Surveying Federal and Defense Leaders on Priorities and Challenges at the Tactical Edge

    Download
  • Communicating Innovation in Federal Government

    Federal Government spending on ‘obsolete technology’ continues to increase. Supporting the twin pillars of improved digital service delivery for citizens on the one hand, and the increasingly optimized and flexible working practices for federal employees on the other, are neither easy nor inexpensive tasks. This whitepaper explores how federal agencies can leverage the value of existing agency technology assets while offering IT leaders the ability to implement the kind of employee productivity, citizen service improvements and security demanded by federal oversight.

    Download
  • Effective Ransomware Response

    This whitepaper provides an overview and understanding of ransomware and how to successfully combat it.

    Download
  • Forecasting Cloud's Future

    Conversations with Federal, State, and Local Technology Leaders on Cloud-Driven Digital Transformation

    Download
  • IT Transformation Trends: Flash Storage as a Strategic IT Asset

    MIT Technology Review: Flash Storage As a Strategic IT Asset For the first time in decades, IT leaders now consider all-flash storage as a strategic IT asset. IT has become a new operating model that enables self-service with high performance, density and resiliency. It also offers the self-service agility of the public cloud combined with the security, performance, and cost-effectiveness of a private cloud. Download this MIT Technology Review paper to learn more about how all-flash storage is transforming the data center.

    Download

When you download a report, your information may be shared with the underwriters of that document.