Understanding the AR 600-9 Screening Table
The AR 600-9 screening table is a critical tool for ensuring that personnel have the necessary clearance and access to classified information based on their job requirements and need-to-know principles. The table is divided into several categories, each representing a different level of sensitivity and classification. The table is used to evaluate an individual's background and clearance status to determine their eligibility for access to sensitive information.
The AR 600-9 screening table is based on the Department of Defense (DoD) regulations for the classification, declassification, and safeguarding of DoD information. The table is used in conjunction with other security clearance procedures and guidelines to ensure that personnel with access to sensitive information have the necessary clearance and training to handle such information.
Categories and Levels of the AR 600-9 Screening Table
The AR 600-9 screening table is divided into several categories, each representing a different level of sensitivity and classification. The categories are:
- Top Secret (TS)
- Secret (S)
- Confidential (C)
- Unclassified (U)
- Need-to-Know (NTK)
Each category has its own set of requirements and guidelines for clearance and access to sensitive information. The table provides a clear and concise framework for evaluating an individual's background and clearance status to determine their eligibility for access to sensitive information.
Practical Steps for Implementing the AR 600-9 Screening Table
Implementing the AR 600-9 screening table requires a thorough understanding of its categories and levels. The following steps provide a practical guide on how to use the table:
- Identify the job requirements and need-to-know principles for the individual being screened.
- Evaluate the individual's background and clearance status using the AR 600-9 screening table.
- Determine the level of access to sensitive information based on the individual's clearance and need-to-know principles.
- Provide the necessary training and indoctrination for the individual to handle sensitive information.
It is essential to note that the AR 600-9 screening table is not a one-time process, but rather an ongoing process that requires regular evaluation and reassessment of an individual's clearance and access to sensitive information.
Comparison of Clearance Levels Using the AR 600-9 Screening Table
| Clearance Level | Security Clearance Requirements | Access to Sensitive Information |
|---|---|---|
| Top Secret (TS) | Background investigation, polygraph examination, and single scope background investigation | Access to Top Secret information and sensitive compartmented information (SCI) |
| Secret (S) | Background investigation and single scope background investigation | Access to Secret information and sensitive information that is not classified Top Secret |
| Confidential (C) | Background investigation | Access to Confidential information and unclassified information |
| Unclassified (U) | No security clearance required | Access to unclassified information only |
The table provides a clear and concise comparison of the clearance levels and their corresponding requirements and access to sensitive information. This table can be used as a reference guide for evaluating an individual's clearance and access to sensitive information.
Common Misconceptions and Challenges
One of the common misconceptions about the AR 600-9 screening table is that it is a one-time process. However, the table is an ongoing process that requires regular evaluation and reassessment of an individual's clearance and access to sensitive information. Another common challenge is the lack of understanding of the clearance levels and their corresponding requirements. The AR 600-9 screening table provides a clear and concise framework for evaluating an individual's clearance and access to sensitive information, but it requires a thorough understanding of its categories and levels.
It is also essential to note that the AR 600-9 screening table is not a substitute for other security clearance procedures and guidelines. It is used in conjunction with other security clearance procedures and guidelines to ensure that personnel with access to sensitive information have the necessary clearance and training to handle such information.