ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical,...

50
AD-A280 206 DQ!o520.1-M •' DEPARTMENT OF DEFENSE ACQUISITION SYSTEMS PROTECTION PROGRAM DTIC S ELECTE jUt4 0 9199411 94-17467 MARCH 1994 THE ASSISTANT SECRETARY OF DEFENSE FOR COMMAND, CONTROL, COMMUNICATIONS AND INTELLIGENCE 94 6 8 089

Transcript of ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical,...

Page 1: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

AD-A280 206 DQ!o520.1-M

•' DEPARTMENT OF DEFENSE

ACQUISITION SYSTEMSPROTECTION PROGRAM

DTICS ELECTEjUt4 0 9199411

94-17467

MARCH 1994

THE ASSISTANT SECRETARY OF DEFENSE FORCOMMAND, CONTROL, COMMUNICATIONS AND

INTELLIGENCE94 6 8 089

Page 2: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

NTIS CRA&IDTIC TABUnannounced 0

ASSISTANT SECRETARY OF DEFENSE Justification ...

WASHINGTON. D.C. 20301-3040 By

March 16, 1994 Distribution IAvailability Codes

COMMAND, CONTro Avail andCorCOMMUNICATIONS Dist Special

INTELLIGENCE FOREWORD

This Manual is issued under the authority of DoD Directive 5200.1, "DoD InformationSecurity Program," June 7, 1982. The protection standards and guidance described within thisManual are required to prevent foreign intelligence collection and unauthorized disclosure ofessential program information, technologies and/or systems during the DoD acquisition process.The goal of the program is to selectively and effectively apply security countermeasures to protectessential information, reduce costs, and reduce administrative burden of security.

This Manual applies to the Office of the Secretary of Defense (OSD), the MilitaryDepartments, the Chairman of the Joint Chiefs of Staff, the Unified Combatant Commands, theInspector General of the Department of Defense (IG, DoD), the Defense Agencies, and the DoDField Activities (hereafter referred to collectively as "the DoD Components").

This Manual is effective immediately and it is mandatory for use by all of the DoDComponents and for incorporation into those DoD contracts where it is required. No. supplementation of the requirements of this Manual is required; however, the Heads of the DoDComponents may issue supplementary instructions when necessary ) provide for uniqueS requirements within their DoD Components. Any additional guidance issued by the DoDComponents shall be forwarded to Deputy Assistant Secretary of Defense (Intelligence andSecurity) (DASD(I&S)), within 6 months of implementation and after each subsequent change.

Send recommended changes to the Manual through channels to:

Assistant Secretary of Defense for Command, Control,Communications and IntelligenceOffice of the Deputy Assistant Secretary of Defense(Intelligence and Security), OASD(C3I)6000 Defense PentagonWashington, DC 20301-6000

The DoD Components may obtain copies of this Manual through their own publication channels.Approved for public release; distribution unlimited. Authorized registered users may obtaincopies of this publication from the Defense Technical Information Center, Cameron Station,Alexandria, VA 22304-6145. AOther Federal Agencies and the public may obtain copies from theU.S. Department of Commerce, National Technical Information Service, 5285 Port Royal Road,Springfield, Virginia 22161.

Emmett Paige, Jr.

i

Page 3: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

* TABLE OF CONTENTS

Paae

Foreword i

Table of Contents ii

References iv

Definitions vi

Abbreviations and Acronyms x

CHAPTER 1 - GENERAL INFORMATION

A. Purpose 1-1B. Scope 1-1C. Responsibilities 1-1D. Information Requirements 1-4

CHAPTER 2 - POLICY

A. General 2-1B. Acquisition Systems Protection and System Security

Engineering 2-2C. Supporting and Supported Programs 2-2D. Intelligence Analysis 2-3

E. Intelligence Support Programs 2-3F. Acquisition Programs versus Acquisition Systems 2-3G. Program Protection Surveys 2-4H. Horizontal Protection 2-4I. Training 2-5J. Waivers and Exceptions 2-5K. Special Access Programs (SAPs) 2-5

CHAPTER 3 - PROGRAM PROTECTION PLANNING

A. General 3-1B. Coordination 3-1C. Program Protection Plan 3-3D. System Description 3-4E. Program Information 3-4F. Essential Program Information, Technologies,

and/or Systems (EPITS) 3-5G. Vulnerabilities 3-6H. Foreign Intelligence Collection Threat 3-7I. Countermeasures Concept 3-9J. Cost 3-10

ii

Page 4: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

PagieCHAPTER 4 - TIME- OR EVENT-PHASED SECURITY

CLASSIFICATION GUIDE

A. General 4-1B. Requirements 4-1C. Classification 4-2D. Declassification 4-3

CHAPTER 5 - TECHNOLOGY ASSESSMENT/CONTROL PLAN

A. General 5-1B. Purpose 5-1C. Content 5-1

CHAPTER 6 - SYSTEMS SECURITY ENGINEERING

A. General 6-1B. Purpose 6-1C. System Security Engineering Planning 6-1D. Military Standard 1785 6-1E. International Programs 6-2

CHAPTER 7 - STANDARDS FOR SECURITY OPERATIONS ATACQUISITION FACILITIES

A. General 7-1B. Minimum Protection Requirements 7-2C. Facility Protection Process 7-3D. Applicable Protection Capability References 7-3

CHAPTER 8 - PROGRAM PROTECTION SURVEYS

A. General 8-1B. Purpose 8-1C. Objective 8-1D. Survey Process 8-1

CHAPTER 9 - HORIZONTAL PROTECTION

A. General 9-1B. Horizontal Protection Requirements 9-1C. Horizontal Protection Assessments 9-1D. Reporting Requirements 9-1

APPENDIX

A. Program Protection Plan Exit Criteria A-1

iii

Page 5: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

REFERENCES

S (a) DoD Directive 5000.1, "Defense Acquisition," February 23, 1991

(b) JCS Pub 1-02, "Department of Defense Dictionary of Military andAssociated Terms," December 1, 1989

(c) DoD 5200.1-R, "Information Security Program Regulation," June1986, authorized by DoD Directive 5200.1, June 7, 1982

(d) Public Law 96-72, "The Export Administration Act of 1979,"September 29, 1979 as amended (50 U.S.C. 2401 et seq.) by PublicLaw 97-145, "The Export Administration Act of 1981," December 29,1981; Public Law 99-64, "The Export Administration Amendments Actof 1985," July 12, 1985; and Public Law 100-418, "TheMultilateral Export Control Enhancement Amendments Act," August23, 1988

(e) DoD Directive 2040.2, "International Transfer of Technology,Goods, Services, and Munitions," January 17, 1984

(f) DoD Directive 5200.1, "DoD Information Security Program," June 7,1982

(g) DoD Instruction 5000.2, "Defense Acquisition Management Policiesand Procedures," February 23, 1991

(h) DoD 5400.7-R, "Department of Defense Freedom of Information ActProgram," October 1990, authorized by DoD Directive 5400.7, May13, 1988.

(i) Executive Order 12356, "National Security Information," June 23,1982

(j) DoD Directive 8120.1, "Life-Cycle Management (LCM) of AutomatedInformation Systems (AISs)," January 14, 1993

(k) DoD Instruction 8120.2, "Automated Information System (AIS) Life-Cycle Management (LCM) Process, Review, and Milestone ApprovalProcedures," January 14, 1993

(1) DoD Directive 5230.11, "Disclosure of Classified MilitaryInformation to Foreign Governments and InternationalOrganizations," June 16, 1992

(m) DoD Directive 5230.20, "Visits and Assignments of ForeignRepresentatives," April 24, 1992

(n) "Intelligence Collection Capabilities Matrix (U)," DefenseIntelligence Agency, DIW-2400-731-93, March 1993, SECRET/NOFORN

(o) "Foreign Interest in U.S. Critical Technologies Matrix (U),"Defense Intelligence Agency, PC-1830-14-93, November 1993,SECRET/NOFORN/WINTEL/NOCONTRACT

(p) DoD Instruction 5240.4, "Reporting of Counterintelligence andCriminal Violations," September 22, 1992

iv

Page 6: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1I-M

(q) DoD Directive 5525.7, "Implementation of Memorandum ofUnderstanding Between the Department of Justice and theDepartment of Defense Relating to the Investigation andProsecution of Certain Crimes," January 22, 1985

(r) DoD 5220.22-M, "Industrial Security Manual for SafeguardingClassified Information," January 1991, authorized by DoDDirective 5220.22, December 8, 1980

(s) DoD 5200.1-H, "Department of Defense Handbook for WritingSecurity Classification Guidance," March 1986, authorized by DoDDirective 5200.1, June 7, 1982

(t) DoD Directive 5230.24, "Distribution Statements on TechnicalDocuments," March 18, 1987

(u) DoD Directive 5230.25, "Withholding of Unclassified TechnicalData from Public Disclosure," November 6, 1984

(v) DoD 5200.1-I, "Index of Security Classification Guides," August1992, authorized by DoD Directive 5200.1, June 7, 1982

(w) DoD Directive 5530.3, "International Agreements," June 11, 1987

(x) Military Standard 1785, "System Security Engineering ProgramManagement Requirements," September 1, 1989

(y) DoD Directive 5200.8, "Security of DoD Installations and 0Resources," April 25, 1991

(z) DoD Directive 5200.28, "Security Requirements for AutomatedInformation Systems (AISs)," March 21, 1988

(aa) DoD Directive C-5200.5, "Communications Security (COMSEC) (U),"April 21, 1990

(bb) DoD Directive C-5200.19, "Control of Compromising Emanations(U)," February 23, 1990

(cc) DoD 5220.22-R, "Industrial Security Regulation," December 1985,authorized by DoD Directive 5220.22, December 8, 1980

(dd) DoD 5200.2-R, "DoD Personnel Security Program," January 1987,authorized by DoD Directive 5200.2, May 6, 1992

(ee) DoD 5200.8-R, "DoD Physical Security Program," May 1991,authorized by DoD Directive 5200.8, April 25, 1991

(ff) AR 55-355/NAVSUPINST 4600.70/AFR 75-2/MCO P4600.14B/DLAR 4500.3,"Defense Traffit Management Regulation," July 31, 1986

(gg) DoD Directive 5240.2, "DoD Counterintelligence," June 6, 1983

(hh) DoD Directive 5205.2, "DoD Operations Security Program," July 7,1983

v

Page 7: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

S DEFINITIONS

1. Acauisition Facilities. DoD intelligence activities, sabotage,facilities primarily involved in international terroristactivities related to research, activities, or assassinationsdevelopment of systems, testing, conducted by or on behalf ofor evaluation of test results. foreign powers, organizations or

persons; it does not include2. Acquisition Systems Protection personnel, physical, document, or(ASP). The safeguarding of communications security programs.defense systems anywhere in theacquisition process as defined in 7. Counterintelligence andDoD Directive 5000.1 (reference Security Countermeasures (CI/SCM)(a)), the defense technologies Support Element. Thebeing developed that could lead to organizational elements thatweapon or defense systems, and provide staff-level functionaldefense research data. ASP support to program managers in theintegrates all security areas of counterintelligence,disciplines, counterintelligence, security programs andand other defensive methods to countermeasures, or operationsdeny foreign collection efforts security.and prevent unauthorizeddisclosure to deliver to our 8. Countermeasures. That form offorces uncompromised combat military science that byeffectiveness over the life employment of devices and/orexpectancy of the system. techniques has as its objective

the impairment of the operational3. Adversary. An individual, effectiveness of enemy activitygroup, organization, or government (JCS Pub 1-02, reference (b)).that must be denied essential Countermeasures may includeinformation, anything that effectively negates

an adversary's ability to exploit4. Component Intelligence vulnerabilities.(Counterintelligence) AnalysisCenters. Within this Manual, the 9. Delegation of Disclosureorganizations of the DoD Authority Letter (DDL). A letterComponents that produce the required as part of the TechnologyMulti-Discipline Counter- Assessment/Control Plan, preparedintelligence (MDCI) Threat by the cognizant DoD Component,Assessments for use in program that provides detailed guidanceprotection planning. In some DoD regarding releasibility of allComponents, these org&nizations elements of the system orare labeled as intelligence technology in question. The DDLorganizations, while in others must be approved by Underthey are part of Secretary of Defense for Policycounterintelligence organizations. (USD(P)) before any promise or

release of sensitive technology.5. Compromise. The known orsuspected exposure of EPITS or 10. Essential Programclassified information or material Information, Technologies, and/orto persons who are not authorized Systems (EPITS). That informationaccess. about the program, technologies,

and/or systems that if compromised6. Counterintelligence. Those would degrade combat effectivenessactivities intended to detect, or shorten the expected combat-counteract, and/or prevent effective life of the system.espionage and other clandestine Access to this information could

vi

Page 8: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

allow someone to kill, counter or actions attendant to militaryclone the acquisition system operations and other activitiesbefore or near scheduled to:deployment or force a major designchange to maintain the same level a. Identify those actionsof effectiveness. that can be observed by

adversary intelligence11. Foreign Intelligence systems.Collection Threat. The potentialof a foreign power, organization, b. Determine the indicatorsor person to overtly or covertly hostile intelligence systemscollect information about U.S. might obtain that could beacquisition program technologies, interpreted or piecedcapabilities, and methods of together to derive criticalemployment that could be used to information in time to bedevelop a similar weapon system or useful to adversaries.countermeasures to the U. ). systemor related operations. c. Select and execute

measures that eliminate or12. Infrastructure. Those items reduce to an acceptablethat are used by more than one level the vulnerabilities ofacquisition program in the pursuit friendly actions toof the development of defense adversary exploitation.systems. The infrastructureincludes laboratories, test 17. Program Information. For thefacilities, the policy and purposes of this program,procedure structure, and education information that includesand training organizations. programmatic data and/or

information and weapons system,13. Matrix Support Element. (See subsystem, or componentdefinition 7., above, Counter- information.intelligence and SecurityCountermeasures (CI/SCM) Support 18. Program Protection. TheElement.) safeguarding of defense systems

and technical data anywhere in the14. Milestone Decision Authority acquisition process to include theThe individual designated in technologies being developed, theaccordance with criteria support systems (e.g., test andestablished by the Under Secretary simulation equipment), andof Defense for Acquisition and research data with militaryTechnology to approve entry of an applications. This protectionacquisition program into the next activity involves integrating allphase of the acquisition process. security disciplines,

counterintelligence, and other15. Multi-Discipline defensive methods to protect theCounterintelligence (MDCI) Threat essential program information,Assessment. An assessment made by technologies, and systems datathe cognizant DoD Component that from intelligence collection anddescribes those foreign unauthorized disclosure.governments, entities, oractivities that have the interest 19. Program Protectionand capability to collect Inspection. An inspection,information about a system under conducted at a defense contractordevelopment, facility, to assess compliance

with the contractually imposed16. Operations Security (OPSEC) countermeasures requirementsA process of analyzing friendly developed by the program

vii

Page 9: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

protection planning process. 24. Sensitive Information. AnyThese inspections will normally be information, the loss, misuse, orconducted by the Defense unauthorized access to which wouldInvestigative Service as part of or could adversely affect theits periodic industrial security organizational and/or nationalinspections of the facility, interest but which does not meet

classification criteria specified20. Program Protection Plan in DoD 5200.1-R (reference (c)).(PPP). A comprehensive protectionand technology control management 25. Special Access Program. Anyplan established for each defense program imposing need-to-know oracquisition program to identify access controls beyond thoseand protect classified and other normally provided for access tosensitive information from foreign Confidential, Secret, or Topintelligence collection or Secret information. Examples ofunauthorized disclosure. (The PPP such controls include, but are notis designed to negate the Program limited to, special clearance,Protection Threats and adjudication, or investigativeVulnerabilities.) requirements; special designation

of officials authorized to21. Program Protection Survey. A determine need to know; or specialsurvey, conducted during each lists of persons determined toacquisition phase, to assess the have a need-to-know.effectiveness of thecountermeasures prescribed in the 26. System Decomposition. Theprogram protection plan at a separation of the major missionspecific point in time. functions and capabilities of the

system and then identifying those22. Program Protection Threats components or technologies thatThe program protection threats give the system this ability.include life-cycle protectionthreats, foreign intelligence 27. System Security Engineeringcollection efforts, and (SSE). An element of systemunauthorized disclosure of engineering that appliesessential program information, scientific and engineeringtechnologies, and systems during principles to identify and reducethe acquisition process. system susceptibility to damage,

compromise, or destruction; the23. Risk Management. The identification, evaluation, andcomparison and analysis of the elimination or containment ofrelative threat (intent and system vulnerabilities to known orcapability to collect the postulated security threats in theinformation); the vulnerability of operational environment.the asset; the cost andadministrative burden of possible 28. System Security Managementcountermeasures; and the value of Plan. A formal document thatthe asset used to determine the fully describes the plarunedappropriate level of protection to security tasks required to meetcontrol and reduce the risk of system security engineeringcompromise or disclosure to requirements, includingacceptable levels. Risk organizational responsibilities,management allows the acceptance methods of accomplishment,of risk in the security process milestones, depth of effort, andbased upon a cost-benefit integration with other programanalysis. engineering, design and management

activities, and related systems.

viii

Page 10: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

29. System Threat. The threat to access controls and protectivebe countered by the defense system measures as necessary to protectbeing acquired. the U.S. technological or

operational advantage represented30. System Threat Assessment by the system.Report (STAR). The basicauthoritative threat assessment, 33. Technoloczy Transfertailored for and focused on, a Transferring, exporting, orparticular (i.e., single) U.S. disclosing defense articles,major defense system. It defense service, or defensedescribes the threat to be technical data covered by the U.S.countered in the projected threat Munitions List to any foreignenvironment. The threat person or entity in the Unitedinformation should reference DIA- States or abroad.validated documents.

34. Threat. The sum of the31. Technology potential strengths, capabilities,

and strategic objectives of anya. The information and adversary that can limit or negateknow-how (whether in U.S. mission accomplishment ortangible form, such as reduce force, system, or equipmentmodels, prototypes, effectiveness. (See definitiondrawings, sketches, 22., above, Program Protectiondiagrams, blueprints, or Threats.)manuals, or in intangibleform, such as training or 35. Time- or Event-Phasedtechnical services) that can Classification Guide. Thebe used to design, produce, adaptation of the DoD securitymanufacture, utilize, or classification guide to thereconstruct goods, including acquisition process addressing thecomputer software and essential program information,technical data, but not the technologies, or systems and thegoods themselves. (Export associated subsystems andAdministration Act of 1979, technologies during each phase ofas amended in 1981, 1985 and the acquisition process. The1988, reference (d)) guide indicates classification or

sensitivity and the date or eventb. The technical that will cause a change to theinformation and know-how level of the classificatign orthat can be used to design, sensitivity.produce, manufacture, use,or reconstruct goods, 36. Vulnerability. Theincluding technical data and susceptibility of systems orcomputer software. The term components to the threat in adoes not include the goods given environment.themselves. (DoD Directive2040.2, reference (e))

32. Technology Assessment/Control Plan (TA/CP). Thedocument that identifies anddescribes sensitive programinformation; the risks involved inforeign access to the information;the participation in the programor foreign sales of the resultingsystem; and the development of

ix

Page 11: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

ABBREVIATIONS AND ACRONYMS

ACAT Acquisition Category

AFOS' Air Force Office of Special Investigations

AIS automated information system

ASD(C31) Assistant Secretary of Defense for Command, Control,Communications and Intelligence

ASP Acquisition Systems Protection

ASPO Acquisition Systems Protection Office

CDRL Contract Data Requirements List

CI counterintelligence

COMSEC communications security

CONUS continental United States

DAB Defense Acquisition Board

DASD(I&S) Deputy Assistant Secretary of Defense forIntelligence and Security

DDL Delegation of Disclosure Authority Letter

DESA Defense Evaluation and Support Agency

DIA Defense Intelligence Agency

DID Data Item Description

DIS Defense Investigative Service

DISP Defense Industrial Security Program

DoD Department of Defense

DSN Defense Switched Network

EEFI Essential Elements of Friendly Information

EPITS Essential Program Information, Technologies, and/orSystems

FOUO For Official Use Only

HUMINT human intelligence

IG, DoD Inspector General of the Department of Defense

IOC Initial Operational Capability

ISM Industrial Security Manual

MDCI Multi-Discipline Counterintelligence

MNS Mission Needs Statement

MRTFB Major Range and Test Facility Base

NISP National Industrial Security Program

NDP National Disclosure Policy

NOCONTRACT Not Releasable to Contractors and/or Consultants

x

Page 12: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 52001-M

OASD(C3I) Office of the Assistant Secretary of Defense forCommand, Control, Communications and Intelligence

OPR office of primary responsibilityOPSEC operations securityORCON Dissemination and Extraction of Information Controlled

by OriginatorOT&E operational test and evaluationOUSD(A&T) Office of the Under Secretary of Defense for

Acquisition and TechnologyPEO program executive officerPM program manager (also project or product manager)POC point of contactPPP Program Protection PlanPPS Program Protection SurveyPROPIN Proprietary Information InvolvedR&D Research and DevelopmentRDT&E Research, Development, Test and EvaluationS&T Science and Technology, or Science and TechnicalSAP Special Access ProgramSEMP System Engineering Management PlanSOT Subsystem or TechnologySSE System Security EngineeringSSEM System Security Engineering ManagerSSMP System Security Management PlanSTAR System Threat Assessment ReportSTU secure telephone unitTA/CP Technology Assessment/Control PlanUSD(A&T) Under Secretary of Defense for Acquisition and

TechnologyUSD(P) Under Secretary of Defense for PolicyWRM Wartime Reserve Mode

xi

Page 13: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 1

GENERAL INFORMATION

A. PURPOSE 2. This Manual does not applyto acquisitions by DoD Components

1. In accordance with DoD that involve Special AccessDirective 5200.1 (reference (f)), Programs created under theand DoD Instruction 5000.2 authority of Executive Order 12356(reference (g)), and DoD 5400.7-R (reference (i)) or acquisition ofreference (h)), this Manual Automated Information Systemsprescribes standards, criteria, under DoD Directive 8120.1and methodology for the (reference (j)) and DoDidentification and protection of Instruction 8120.2 (referenceDoD Essential Program Information, (k)); however, to the extentTechnologies, and/or Systems feasible and appropriate, DoD(EPITS) within DoD acquisition Components should adheze to theprograms. Any additional guidance program protection planningissued by the DoD Components to provisions provided in this Manualimplement the requirements for those acquisition programs.contained in this Manual shall be Before Special Access Programsfurnished to the DASD(I) within 6 transition to collateral status,months of the date of this Manual the requirements of this Manualor following the issuance of shall be met.

3. The Manual defines the2. The standards and criteria processes by which information,

in this Manual are intended to technologies, and systems that areprotect against loss and essential to the successfulunauthorized disclosure of EPITS development and deployment of newthroughout the acquisition process DoD systems are identified andat all involved locations or protected.facilities. They will alsoidentify and reduce projected 4. EPITS covered by thisoperational system susceptibility Manual shall be identified,to damage, compromise, or prioritized, and protected indestruction. accordance with the program

protection plans (PPPs) prescribed3. The ultimate goal is to in this Manual.

selectively and effectively applysecurity countermeasures to 5. The criteria in the Manualprotect the EPITS and reduce costs shall be applied at all locationsby applying risk management. where EPITS are analyzed,

maintained, stored, used,B. SCOPE developed, transported, or

produced.1. This Manual appliles to all

DoD Components that are involved C. RESPONSIBILITIESin the acquisition of DoD systemsin accordance with DoD Directive 1. The Under Secretary o'f5000.1 (reference (a)), in Defense for Acquisition andproviding security support to DoD Technology (USD(A&T)) shall:or DoD contractor facilities, andin the DoD intelligence and/or a. Delegate to thecounterintelligence programs. ASD(C31), the responsibility to

1-1

Page 14: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

review the PPP for each Acquisition Systems ProtectionAcquisition Category (ACAT) ID System to include support for theprogram as part of the Defense horizontal protection andAcquisition Board (DAB). Consider assessment program in accordancethe results of the review for with responsibilities assigned ininclusion in the Acquisition this Manual and DoD DirectiveDecision Memorandum as 5230.11 (reference (1)), DoDappropriate. Directive 2040.2 (reference (e)),

and DoD Directive 5230.20b. Delegate to the (reference (m))).

Director, Special Programs, theresponsibility to ensure that for d. Making or approving, asprograms defined as "Highly applicable, and monitoringSensitive Classified Programs," in necessary security arrangementsaccordance with DoD Directive with other governments.5000.1 (reference (a)), that PPPsare prepared to ensure that EPITS 3. The Assistant Secretary ofare properly protected when the Defense for Command, Control,programs transition from special Communications and Intelligenceaccess to regular classified (ASD(C31)) shall:requirements.

a. Assist the USD(A&T) byc. Assist with the reviewing the PPP for each DAB-

development of a horizontal level acquisition program andprotection system for technology providing a report of theand information by requiring the evaluation to the appropriate DABidentification of EPITS for all committee.acquisition programs, products,technology demonstrators,and other b. Conduct horizontalacquisition activities that have protection activities to ensurebeen designated for incorporation the commonality of protectiveinto, or support of, another measures for similar essential DoDacquisition program, and ensure information, to measurethat appropriate OUSD(A&T) staff effectiveness of efforts and toelements coordinate the transfer support national-level protectionof information between program activities.offices.

c. Serve as the DoD focal2. The Under Secretary of point for contact with government

Defense for Policy (USD(P)) shall agencies outside of the DoD thatsupport program protection efforts provide assistance in protectingby: DoD EPITS.

a. Ensuring that 4. The Inspector General,acquisition special access DoD, shall undertake complianceprograms, international security inspections of selected programs.agreements, and co-productionefforts adhere to overall systems 5. The Heads of the DoDprotection requirements. Components shall:

b. Sharing information in a. Ensure that allthe Security Policy automated acquisition programs are protecteddatabases with the Acquisition in accordance with this Manual andSystems Protection (ASP) DoD Instruction 5000.2 (referencecommunity. (g)).

c. Providing standard b. Direct the appropriateDoD-wide automation support to the staff office to review each

1-2

Page 15: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

Acquisition Category (ACAT) ID addition, include in the reportacquisition program to determine the forecast of the militarythat the PPP has been prepared and technology needs of the threatis adequate before submitting the countries. Include technologiesplan to OSD as part of the regardless of their being on theacquisition milestone review, list of DoD critical or key

technologies.c. Direct the review of

each acquisition program in ACAT c. Update these reportsIC, II, III, and IV by the periodically, as determined by aappropriate Milestone Decision prioritized listing of threatAuthority (MDA) to determine that countries.the PPP is adequate as defined bythe exit criteria listed in d. Perform technologyAppendix A. transfer risk assessments for

foreign countries of concern andd. Ensure contracts foreign intelligence threat

involving the protection of EPITS assessments in support of DoD-wideat contractor facilities describe ASP planning.the standards of protection to beprovided, in accordance with the 7. The Director. Defensedeveloped and approved PPP. Investigative Service (DIS),

shall:e. Ensure, by contractual

clause, access to prime and a. Assist, as necessary,subcontractor facilities to enable with program protection surveys at. the Government to conduct surveys, defense contractor facilities ininspections, and investigations as the United States by helping withnecessary to ensure the successful the selection or modification ofimplementation of program appropriate securityprotection activities, countermeasures necessary to

prevent foreign intelligencef. Provide intelligence collection and unauthorized

threat assessment support required disclosure of EPITS not protectedfor each acquisition program by the Defense (National)managed by the Component. Industrial Security Program

(DISP/NISP).6. The Director, Defense

Intelligence Agencv (DIA), shall: b. Conduct inspections ofcontractor facilities within the

a. Provide a periodic United States to assess compliancewritten report detailing the with program protectionintelligence collection countermeasures, including thosecapabilities of all foreign for the protection of sensitiveentities deemed as possible unclassified information, whenthreats to the DoD systems in the contract provisions authorize suchacquisition process. inspections.

b. Provide periodic c. Assess contractreports (references (n) and (o)) compliance when securitycontrasting, in each critical requirements and DIS or Federaltechnology area, the market entry authority, as required byforecast of competitive countries paragraph C.5.e., arewith U.S. technology efforts. The contractually established..0 report should relate thisinformation to the list of DoDcritical technologies. In

1-3

Page 16: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

D. INFORMATION REQUIREMENTS

1. The reporting requirementscontained in section C.6.a. and b.of this Manual have been assignedReport Control Symbol DD-C31(TRI)-1937.

2. Incidents of loss,compromise, or theft of identifiedEPITS or other classifiedinformation should be reported inaccordance with the procedures inDoD Instruction 5240.4 (reference(p)) and DoD Directive 5200.1(reference (f)).

1-4

Page 17: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 2

POLICY

A. GENERAL representative) complies with therequirements of this Manual for

1. The DoD Components shall the identification of EPITS andapply appropriate resources to subsequently determines that noacquisitions systems protection EPITS exist within the programprograms at all levels to provide (either organic or inherited fromcost-effective protection for each supporting programs), then andefense acquisition program. abbreviated PPP may be prepared

The abbreviated PPP shall be a2. Sensitive information and statement (signed by the program

technologies shall be identified manager) that EPITS, as defined inearly in each acquisition program this Manual, do not exist. Also,and protected from inadvertent or the statement shall state theunauthorized disclosure as security classification guide hasrequired by subsection B.5. of been reviewed and appropriate timePart 1 of DoD Directive 5000.1 or event phasing has been(reference (a)). integrated. Once completed, this

abbreviated PPP shall be approved3. The appropriate, Component- by the Program Executive Officer

level, intelligence and threat (PEO). Further, it shall beanalysis center shall prepare a included in the document review inmulti-discipline threat assessment preparation for a milestoneaddressing the foreign decision by the MDA.intelligence collection threat andthe potential impact upon the 6. A PPP shall be prepared forcombat effectiveness of the each acquisition program, inprogram resulting from disclosure accordance with DoD Instructionof EPITS for each acquisition 5000.2, Part 5, Section Fprogram as required by DoD (reference (g)). The plan shallInstruction 5000.2 (reference address the following areas:(g)). (These areas shall be discussed

and updated at each acquisition4. A comprehensive protection milestone decision point.)

and technology control programshall be established for each a. System Description anddefense acquisition program. This Elements to be Protected (EPITS),effort shall identify and protectclassified and other sensitive b. Protection Threats andinformation concerning that Vulnerabilities,program as required by DoDInstruction 5000.2, Part 5, c. CountermeasuresSection F (reference (g)). This Concept, andcomprehensive protection andtechnology control plan is known d. Protection Costs.as the program protection plan(PPP). 7. Program protection plans

shall include as attachments the5. Some acquisition programs time- and event-phased security

may not contain any EPITS as classification guide, and, whendefined by this Manual. If a applicable, the Technologyprogram manager (or designated Assessment and Control Plan

2-1

Page 18: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

(TA/CP) and Delegation of 11. Disclosures of classifiedDisclosure Authority Letter (DDL) information to and participationafter foreign access, by foreign persons in DoDparticipation, or sales are acquisition programs shall beauthorized. The acquisition governed by DoD Directive 5230.11systems protection effort should (reference (1)) and DoD Directivebe compatible with and be 5230.20 (reference (W)).supported by the system securityengineering program (DoD 12. The acquisition chain ofInstruction 5000.2, Part 6, command may direct the use of theSection J (reference (g)). A PPP format for any activity,summary of the System Security including science and technologyEngineering (SSE) plan shall be programs, automated informationattached to the PPP at milestone systems, or advanced technologyII. demonstrators to ensure the

protection of critical technology8. Review and approval of PPPs from known or suspected threats.

shall be performed as part of theDoD acquisition milestone decision B. ACOUISITION SYSTEMS PROTECTIONprocess. OUSD(A&T), with the AND SYSTEM SECURITY ENGINEERINGsupport of OASD(C3I), isresponsible for the review of the Acquisition Systems Protectionprotection programs planned for is the overall concept ofAcquisition Category (ACAT) ID protecting the program's EPITSprograms, and the Milestone from compromise and inadvertentDecision Authorities are loss from the establishment of theresponsible for directing the Mission Needs Statement (MNS) toreview of the protection programs demilitarization. As a minimum,planned for all other acquisition the PPP is developed to protectprograms. Although the program the program during the period frommanager is the approving authority the development of the MNS untilfor the PPP, the reviewer shall the system is fielded (Initialdirect changes in the PPP to Operational Capability (IOC)), andcorrect deficiencies. through any modification period

that may require protection from9. For all ACAT ID programs, compromise. System Security

the PPP is reviewed by the Engineering (SSE) is anAcquisition Systems Protection engineering program directed atOffice in the Office of the negating the threats to completed,Secretary of Defense. For ACAT deployed systems while the systemsIC, II, III, and IV programs, the are in an operational environment.review of the PPPs will be SSE achieves this objective byconducted as directed by the incorporating design featuresComponent Acquisition Executive. directly into the systems to

reduce the costs and burdens of10. If a program or product security operations after

is a component or subsystem of deployment.another program, then itsprotection plan is subject to C. SUPPORTING AND SUPPORTEDreview by the same review PROGRAMSauthority as its supportedprogram. Any shortcomings or Managers of acquisitiondeficiencies identified in this programs and other activitiesreview are the responsibility of designated to support or bethe preparing office and shall be incorporated into othercorrected by that office acquisition programs have specialimmediately. responsibilities with regards to

2-2

Page 19: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

acquisition systems protection. Critical Technologies MatrixThis includes the following: (reference (o))) within 30 days of

the request to the requesting1. Any activity (e.g., program office. This initial

program or project office) that draft will be used in the initialproduces technology, information, planning and draft of the PPP.or systems for another acquisition Final drafts of the PPP shall notprogram shall identify the be prepared by the program officeEssential Program Information, or agent thereof, until the finalTechnologies, and/or Systems MDCI analysis is returned to the(EPITS) (see definition 10.) of program office.which its product is composed tothe supported program office. E. INTELLIGENCE SUPPORT PROGRAMS

2. Unresponsive supporting For those activities whoseprograms shall be identified to primary objective is thethe appropriate decision authority collection and dissemination ofby the supported program office. intelligence information or

technical data on foreign weaponD. INTELLIGENCE ANALYSIS systems, the following special

provisions apply:The identification of the

collection threat to the 1. If the activity or programacquisition program shall be the is not subject to the reviewresponsibility of the Component process of DoD Instruction 5000.2Intelligence Analysis Center of (reference (g)), the information. the acquiring DoD Component. The produced and procedures used shallPEO will be responsible for be protected in accordance withproviding matrix support assets to DoD 5200.1-R (reference (c)).the program office to assist withthe analysis of the intelligence 2. If the activity isproduct. governed by DoD Instruction 5000.2

(reference (g)), but collects the1. For joint programs, the information purely by passive

lead Component shall be means, then the informationresponsible for coordinating the produced and procedures used shallproduction of the intelligence be protected in accordance withthreat documentation. DoD 5200.1-R (reference (c)).

2. The DoD goal for the 3. If the program procuresreturn of a complete Multi- equipment (foreign or domestic)Discipline Counterintelligence and conducts a formal test and(MDCI) threat assessment is 120 evaluation program, then a PPPdays from receipt of the request should be prepared andat the appropriate intelligence implemented, unless the equipmentproduction center, is part of a weapon system that is

itself covered by a separate PPP.3. To facilitate the

preparation of an initial draft F. ACQUISITION PROGRAMS VERSUSPPP, the local support office for ACOUISITION SYSTEMScounterintelligence and/orsecurity countermeasures (CI/SCM) 1. Throughout this Manual,should furnish a generic, the terms "acquisition program"summarized collection threat and "acquisition system" are usedS assessment (based upon the DIA often. However, these two termsIntelligence Collection are not synonymous and are not toCapabilities Matrix (reference be used interchangeably.(n))and Foreign Interest in U.S.

2-3

Page 20: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

2. The term acquisition produce a lessons learned documentprogram refers to the specific with the assistance of thedevelopment program being managed surveying team. The lessonsunder a single program manager. learned document should notIt includes all of the activities contain any reference to specificthat are conducted to define, locations or programs. Its focusdevelop, test, and produce a is the effective or ineffectivedefense system. use of the program's established

countermeasures to known or3. The term acquisition suspected vulnerabilities and the

system refers to the weapon or identification of unrecognizeddefense system being developed and vulnerabilities. This sanitizedfielded by the acquisition version shall be forwarded throughprogram. It also includes all the DoD Components to DASD(I) tologistics support equipment, assist with refinements to the ASPtraining simulators, test process.equipment, and other support itemsthat are required to successfully H. HORIZONTAL PROTECTIONdeploy the defense system to itsintended operating environment. 1. A Horizontal Protection

Program shall be establishedG. PROGRAM PROTECTION SURVEYS within the DoD Components to

ensure that EPITS are adequately1. Program Protection Surveys and uniformly protected within the

(PPSs) are conducted following the Component.establishment and integration ofPPPs. The PPS is the primary tool 2. The Horizontal Protectionof the Program Manager (PM) in Program ensures that DoDevaluating and validating the acquisition programs developingcurrently planned protection new or revised program protectionmethodologies. The PPS is focused plans have access through aon specific, valid threat and standard DoD-wide automatedcountermeasures issues. PPS system, centrally maintained byreports from a team requested by a OUSD(P), to databases comprised ofPM are the property of the PM, and lists of EPITS identified by otherfurther distribution of the DoD acquisition programs and theunsanitized version is neither protective levels and measuresrequired nor authorized, being planned. Access to the

database allows the programs to2. PPSs are not punitive and compare levels of classification

shall be used only to identify and sensitivity.strengths and weaknesses incurrent program protection 3. EPITS that have alreadyplanning. been identified by one DoD

Component shall be provided3. Should evidence of similar protection in acquisition

criminal activity be discovered programs of all DoD Components.during a PPS, the activity shall If a conflict develops in thebe reported through appropriate appropriateness of plannedDoD Component channels and acted protective measures for aupon under applicable DoD particular EPITS, the issue willComponent guidance, and referred be resolved at the lowest levelfor any appropriate action under review authority common to bothDoD Directive 5525.7 (reference programs. The decision of the(q)). review authority should be based

upon the principle of risk4. Upon receipt of a management not risk avoidance.

completed PPS report, the PM shall

2-4

Page 21: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

"S" TN

1. The DoD Componentsresponsible for acquisitionprograms shall establish trainingprograms for those personnelresponsible for the preparationand execution of PPPs.

2. The DoD Components shallensure that periodic refreshertraining is conducted for allpersonnel responsible for theprotection requirements set forthin program protection planningdocuments. This training willinclude the current threats andthe design of effectivecountermeasures.

J. WAIVERS AND EXCEPTIONS

1. No authority has beengranted to the DoD Components towaive or exempt this protectionplanning requirement.

2. The level of detail andcomplexity in the PPP may vary inaccordance with the critic-lity ofthe system and its EPITS. and thephase of the acquisition processbeing addressed.

K. SPECIAL ACCESS PROGRAMS (SAPs)

SAPs, due to their uniquenature, have security policies andprocedures that (in the aggregate)meet the goals and requirements ofthis Manual. However, SAP programmanagers shall develop plans forthe protection of the acquisitionprogram as it transitions togeneral or unclassified status.Such plans should be comprehensiveand minimize the disruption to theprotection measures during thetransition. The program officeshould meet all requirements ofthis Manual before it is removedfrom SAP provisions.

22-5

Page 22: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

pCHAPTER 3

PROGRAM PROTECTION PLANNING

A. GENERAL planning, the countermeasures orprogram protection surveys.

Program protection is thesafeguarding of a defense system's 8. Identify elements thatEPITS anywhere in the acquisition require classification, when andprocess. This includes how long such control should betechnologies being developed, used. (These activities aresupport systems (e.g., test and discussed in Chapter 4.)simulation equipment), and basicresearch data with military 9. Identify the risks andapplications. To realize the benefits of developing, producing,objectives of program protection, or selling the system abroad, asthe following actions are part of well as the methods used to protectthe program protection planning the EPITS if such an arrangement isprocess that shall be conducted for authorized, and whether an exporteach DoD acquisition program. variant is necessary. (These

activities are discussed in Chapter1. Identify and set priorities 5.)S o on those operational or design

characteristics of the system that 10. Identify the designmake it unique and provide superior features or support equipment"mission capabilities, required to reduce operational

security vulnerabilities upon2. Identify the system EPITS. deployment. (These activities are

discussed in Chapter 6.)3. Identify specific program

locations where the system EPITS B. COORDINATIONare stored, used, developed oranalyzed. 1. Although the PM bears the

responsibility for the development4. Identify the intelligence and implementation of the PPP,

collection threat to the program. close coordination with severalstaff elements within and external

5. Identify the program's to the program office is essential.vulnerabilities to specific threatsat specific locations during each a. The PM should ensure thephase of the acquisition cycle, close cooperation between the

security, foreign disclosure, and6. Identify the time- or event- technical staffs in the development

phased countermeasures to be of the PPP. As a result, the PMemployed by the PM to reduce, should seek the advice andcontrol or eliminate specific assistance of individuals who can:vulnerabilities of the program andcommit the program to a minimum (1) Evaluate andlevel of protection for EPITS. describe the value of the

technology or system in terms of7. Identify the protection military capability or technologyS costs associated with the superiority.

personnel, products, services,equipment or other areas used aspart of program protection

3-1

Page 23: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

(2) Identify foreign c. One or more matrixavailability of like or similar support elements may providesystems and technology, support to each program manager in

the specialty areas of security(3) Describe the countermeasures, operations

threat. security, counterintelligence, andintelligence. These matrix support

(4) Conduct a risk elements, referred to as theversus gain analysis when foreign counterintelligence and/or securityaccess, participation or sales are countermeasures (CI/SCM) matrixrecommended. support elements, serve as the

primary liaison between the program(5) Perform a office and both intelligence and

"functional decomposition" of the counterintelligence agencies, assystem, whereby the major functions well as other securityand capabilities are identified and organizations; for example,matched to technology or security staffs and lawinformation that gives these enforcement.components those traits.

2. PMs shall brief the PPP to(6) Identify any unique their program executive officer

fabrication or manufacturing (PEO) before each milestone reviewprocesses necessary to duplicate as part of the document reviewthe technology by an adversary, process. In additicn, each time a

formal assessment of the plan is(7) Define the criteria conducted or the PM elects to

for the "loss" of the essential change the countermeasures due to aelement. The PM should consult change in the EPITS, threat, orwith individuals who know the environment, the PM and PEO mustindustrial and scientific mutually agree to any proposedcapabilities of the threat nations changes. Results of assessmentsto determine if they can use or that reveal criminal activity,sell the essential element, fraud, waste, or abuse, or threats

to National Security should be(8) Assist with the reported through appropriate

preparation of the intelligence channels. Otherwise, results ofrequest and interpretation of the any assessment should not beMulti-Discipline Counter- released to any activity outsideintelligence (MDCI) analysis the program office without theprepared by the Component-level written authorization of the PM.intelligence center.

3. PMs shall ensure that the(9) Serve as the primary developing agency identifies and

liaison between the program office, places in priority sequence theintelligence agencies, EPITS for any component, subsystem,counterintelligence organizations, technology demonstrator, or otherlocal and Federal law enforcement research program being developed byagencies, and security specialists, an independent activity that is

A planned for incorporation into theb. Not all program offices PM's program. Further, the PM of

will have trained personnel who can the program using this technologyperform all of these tasks. As a shall ensure the inclusion of theresult, PMs should consult the subsystem's EPITS in the PPP of theappropriate staff in the matrix incorporating program.support element for assistance withsome of these tasks. a. The parent program

manager shall ensure the sub-

3-2

Page 24: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

element's EPITS are protected at review after Milestone 0. Theleast at an equivalent level as results of the review shall bethey are protected in the sub- considered by the MDA for inclusionelement's program. in the Acquisition Decision

Memorandum.b. The PMs of systems

that incorporate subsystems that b. The scope of the PPPhave not identified the EPITS shall should address, as necessary, thedirect the office that developed entire life cycle of thethe technology to supply this acquisition program from the dateinformation. For those supporting the plan is established untilactivities that are defined as demilitarization.acquisition programs in accordancewith DoD Directive 5000.1 2. The preparation and(reference (a)) and that have implementation of the PPP for anfailed to develop a PPP, the PM of acquisition program relies on riskthe program that will incorporate management, not risk avoidance.the technology in question may The costs associated with thedirect the developing program protection of the system's EPITSoffice to provide an approved PPP. shall be balanced against the costs

of protection and potential impact4. The purpose of these of the loss or compromise of the

coordination activities is to EPITS.ensure the PPP that is developedand implemented is effective, 3. In accordance with DoDP focuses on the essential elements Instruction 5000.2, Part 5, Sectionof the program, minimizes costs and F, (reference (g)), the PPP is aadministrative burdens, and avoids required document for allduplication of effort. acquisition programs.

5. The protection of an a. Any programs, products,acquisition program's EPITS should technology demonstrators, or otherbe revised by the DoD Component items developed as part of awhen a recognized shortcoming separate acquisition process thatexists in the PPP. are components or subsystems of the

program shall have their PPPC. PROGRAM PROTECTION PLAN reviewed by the parent program's

Milestone Decision Authority during1. The PPP for an acquisition the supported program's Milestone

program should serve as the single Review.source document used to coordinateand integrate all of the protection b. The effectiveness of theefforts designed to deny foreign PPP is highly dependent upon thecollection activities and prevent quality and currency of theinadvertent disclosure, information available to the

program office.a. The PPP for an

acquisition program shall be (1) Coordination betweenestablished and approved by the PM the program office and the CI/SCMas soon as possible after the matrix support element is criticalvalidation of the Mission Needs t6 ensure any changes in theStatement. As a minimum, the PPP system's EPITS, threat, orshall be prepared and subject to environmental conditions reach thereview by the Milestone Decision proper organizations.Authority (MDA) (or designatedrepresentative) during the (2) Intelligence andMilestone I Review or the first counterintelligence organizations

3-3

Page 25: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

that support the program protection the-art technology, the systemeffort are encouraged to supply description should provide theinformation on foreign activities reviewer with a clear indication ofto the program offices without the capabilities and limitations ofwaiting for periodic production the system being acquired,requests once they have received including support equipment,the initial list of the program's simulators, and other supportingEPITS. equipment. The system description

shall discuss:4. The PPP should be classified

if the content of the plan 1. The anticipated'battlefielddictates. employment of the system.

5. The DoD Components do not 2. The strategic, operational,need to mandate a specific format or tactical impact of the system'sfor PPPs. However, each PPP shall development and deployment.address the following items:

3. The specific characteristicsa. System Description. that distinguish it from existing

systems or other systems underb. Program Information. development.

c. Essential Program 4. The function, operationalInformation, Technology, and/or characteristics, and technicalSystems. parameters of any component

program, product, technologyd. Vulnerabilities to demonstrator, or other acquisition

Intelligence Collection. system that is an integral part ofthe system.

e. Foreign IntelligenceCollection Threat. E. PROGRAM INFORMATION

f. Time-Phased Plan of The program information shallProtection (Countermeasures). discuss the organization and

structure of the office responsibleg. Cost of Protection. for developing and fielding the

acquisition system. The programh. Time- or Event-Phased description should briefly describe

Security Classification Guide. the following:

i. Technology Assessment 1. The acquisition chain ofControl Plan. command for the program, including

the Milestone Decision Authorityj. System Security for the program and sub-programs.

Engineering Approach (Milestone IIand later). 2. The location, points of

contact, and telephone number of6. Specific guidance on the the government-owned sites that

topics to be addressed in the PPP will handle, store, or analyzeis given in sections D. through J. EPITS-related material.below.

3. The location, point ofD. SYSTEM DESCRIPTION contact, and telephone number of

government-owned test andSince most acquisition programs evaluation centers where EPITS-

combine existing, proven technology related material will be tested.and information with new, state-of-

3-4

Page 26: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

I4. The corporation name, components or attributes that give

location, point(s) of contact, and the system its unique ability.telephone number of primarycontractors who handle or have b. A similar analysis isaccess to EPITS-related materials, performed on each subassembly or

component until a specific piece of5. The location, point(s) of technology or equipment can be

contact, and telephone number of associated with each sub-task thatcontractor-owned facilities, other gives the overall system itsthan those identified in subsection ability on the battlefield.E.4. above, wh~re EPITS-relatedmaterials will be tested. These c. Once these componentslocations may include subcon- are isolated, the PM shouldtractors, vendors, or other non- evaluate their potential as EPITSgovernment locations, by applying the following four

questions:F. ESSENTIAL PROGRAM INFORMATION,TECHNOLOGIES, AND/OR SYSTEMS (1) If a foreign(EPITS) intelligence service or other

entity obtained this item, couldThe EPITS of the system are the they determine a method to kill the

critical elements of the system U.S. system?that make it unique and valuable toU.S. defense forces. The EPITS are (2) If a foreignthose items that, if compromised, intelligence service or otherwould cause a degradation of combat entity obtained this item, couldeffectiveness, decrease the combat- they determine a method to degradeeffective lifetime, or allow a or neutralize the U.S. system?foreign activity to clone, kill, orneutralize the U.S. system. They (3) If a foreignare those pieces of information or intelligence service or othertechnology that provide the entity obtained this item, couldessential capability that must be they determine a method to cloneprotected. As such, the EPITS are the U.S. system?the foundation upon which allprotection efforts for the prograxr (4) If a foreignare based. intelligence service or other

entity obtained this information,1. The E2ITS are components, would the U.S. system need major

engineering, design or modifications to maintain itsmanufacturing processes, and strategic or tactical advantage fortechnologies; system capabilities the system's projected operationaland vulnerabilities and other lifetime?information that give the systemits unique capability on the d. An affirmative answer tobattlefield or limit the ability of any of these questions wouldother countries to reproduce the qualify the item as an EPITS or aessential capabilities or mission. component of an EPITS. A component

of an EPITS is known as a Subsystem2. To develop the EPITS, the PM or Technology (SOT).

(or representative) and the systemengineer perform a *functional 3. In addition to the elementsdecomposition.* organic to the system, the PM shall

consider any engineering process,a. This process starts with fabrication technique, diagnostic

the system description and then equipment, simulators, or otheridentifies those specific support equipment associated with

3-5

Page 27: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

the system for consideration as a able to help the PM complete thispossible EPITS. Special emphasis task.should be placed on any processthat is unique to the system under G. VULNERABILITIESdevelopment. The PM and programengineer should evaluate each of 1. Vulnerabilities are thethese areas and identify any susceptibility of the program toactivity unique to the United the threat(s) in a givenStates industrial and technology environment.base that limits the ability offoreign nations to reproduce or 2. The vulnerabilitiescounter the system. possessed by the program's EPITS

shall be based upon:4. Once the PM has reduced the

EPITS list, further refinement is a. How the EPITS arenecessary. stored, maintained, or transmitted

(e.g., electronic media,a. To assist the blueprints, training materials,

intelligence analysts with their facsimile, or modem).task of identifying the collectionthreats to the system, the PM, with b. How the EPITS are usedthe help of the matrix support (e.g., bench testing or fieldelements, should describe the EPITS testing).in terms used by one of the varioustechnology control lists (e.g., The c. What emanations,Militarily Critical Technologies exploitable signals, or signaturesList or the National Disclosure (electronic or acoustic) arePolicy category). The fact that a generated by the EPITS or revealparticular technology is listed in them (e.g., telemetry, acoustic, orone of the technology control lists radiant energy).does not necessarily mean that thetechnology is an EPITS for a d. Where the EPITS aresystem. located (e.g., program office, test

site, contractor, or vendor).b. Specific guidance should

be provided on the criteria for e. What types of OPSEC"loss" or compromise. indicators or observables are

generated by program or systemc. The PM should indicate functions, actions, and operations

whether the element is a Treaty- involving EPITS.Limited Item under the provisionsof one of the arms control 3. Once the vulnerabilities aretreaties. identified, the PM shall place them

in priority sequence order.d. A discussion of the use

of this EPITS by any other a. The sequence should beacquisition program or on any other based upon the consequences of thesystem should be indicated, loss or compromise of the EPITS

that are involved.e. The list of EPITS should

be prioritized to ensure that the b. Factors that should bemost important information is considered include the impact uponemphasized during analysis of the the combat effectiveness of theprotection costs. The CI/SCM system, the effect on the combat-matrix support elements and the DoD effective lifetime, the costComponent ASP coordinator should be associated with any modification

required to compensate for the

3-6

Page 28: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

loss, and the choice of be designed to face. The MDCIalternatives (such as the analysis is directed at thosetechnology used or the test range governments, entities, orused) that are available, activities that have the interest

and capability to collectH. FOREIGN INTELLIGENCE COLLECTION information about the system underTHREAT development. However, sudden

changes in the anticipated1. A threat exists when a operational threat should be

foreign government or entity has a reviewed as they occur to determineconfirmed or assessed requirement (if possible) if the change is duefor the acquisition of classified to successful intelligenceor sensitive defense information, collection.or proprietary commercialinformation; the capability exists c. The PM and the matrixto acquire such information; and support element shall compare thethe acquisition of the information results of the MDCI threatby the foreign entity would be assessment with the EPITS anddetrimental to U.S. interests. vulnerabilities to determine the

level of risk to the program.a. Confirmed or assessed

identification of foreign d. The program team shouldrequirements will provide integrate into the MDCI threatindications of the most probable assessment those environmentalsources and methods that a foreign factors that might assist or reducegovernment or entity might 'mploy the ability of the foreignto satisfy a collection intelligence service to collectrequirement. information at a given location.

b. For the purposes of this 3. The counterintelligenceManual, a threat requires the centers shall base their MDCIcombination of an EPITS-related threat assessment upon the compileditem with a known or suspected list of EPITS and their potentia?vulnerability, a known collection vulnerabilities, which arecapability and somebody with the submitted by the program office. Asinterest or intention to collect a result, the MDCI threatthe information. assessment shall, as a minimum,

answer the following questions2. The intelligence collection about the EPITS (within the

threat data used by the program constraints of existingoffice shall be based upon a intelligence information and theNational-level intelligence need for a prompt and timelyestimate. reply):

a. This estimate is known a. Have any of the EPITSas a Multi-Discipline been compromised or lost (asCounterintelligence (MDCI) threat defined by the program office), byassessment and it is supplied by either overt or covert means?the appropriate DoD Componentcounterintelligence analysis b. Which countries orcenter. organizations have an interest in

the EPITS and, if known, why?b. The MDCI analysis is not

based on the threat described in c. What capabilities dothe System Threat Analysis Report each of these countries or(STAR). The STAR describes the organizations have to collectbattlefield threat the system will intelligence information on the

3-7

Page 29: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

EPITS at each location identified g. Relationship to keyby the program office? technologies or other controlled

technology lists of the Department4. The appropriate CI/SCM of Defense or Department of

matrix support element should Commerce.assist the program office inpreparing the intelligence h. Distinguishing traits orproduction request to the emissions; methods of EPITSappropriate DoD Component transmittal, usage, storage,counterintelligence analysis testing; etc.center.

i. Use of foreign equipmenta. The matrix support or technology during testing (if

elements should expedite the possible).request to the intelligence centerthat would normally support the PEO j. Anticipated foreignfrom the program's lead DoD involvement in the development orComponent. production of the system.

b. An additional copy k. Contractor names,should be sent to the intelligence locations, points of contact, andanalysis center of any other DoD telephone numbers, as well as theComponent involved in the program identification of each EPITS at(for information only) to each location.facilitate a single, unifiedposition on the collection threat. 6. After the intelligence

production -equest is completed,5. The intelligence production the matrix Japport element should

request should contain the provide a g-neric, summarizedfollowing information (as collection Jnreat assessment to thedetermined necessary by the program office within 30 days.appropriate DoD Component) beforeits submission to the a. This assessment shouldcounterintelligence analysis be based upon the Defensecenter: Intelligence Agency's collection

capability and technology threata. Program office name, matrices (references (n) and (o)).

designator, and address.b. This initial assessment

b. PM's name and telephone will only provide an indication ofnumber. which countries have the capability

to collect intelligence on thec. Matrix support element system and the possible interest or

point of contact's name, address, intention to collect it.and telephone number.

c. This assessment is notd. Supporting or supported unique to the program or system.

programs' or products' names,locations, and telephone numbers. d. This assessment may

serve as the basis of an initiale. Operational employment draft of the PPP.

role.e. A draft PPP shall not be

f. Loss or compromise submitted by the program office forcriteria, approval until a copy of the final

MDCI threat assessment is returnedfrom the Military Department or DoD

3-8

Page 30: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

Component intelligence analysis b. In the event suchcenter and the results incorporated restrictions are placed on the MDCIinto the PPP, unless the Service threat assessment, a collateralfails to provide the MDCI analysis version of the MDCI analysis thatwithin the timelines established by is releasable to contractors shouldthis Manual. be prepared and returned to the

matrix support element concurrently7. While awaiting the return of with the original MDCI threat

the MDCI threat assessment, the assessment.matrix support element shouldcompile and prepare the local I. COUNTERMEASURES CONCEPTcollection threat supplement withthe assistance of the supporting The countermeasures concept is acounterintelligence organization. statement of the overall approachAny local threat information for applying countermeasures tocollected as part of this process eliminate or reduce the projectedshould be sent expeditiously vulnerabilities of each EPITS.through channels to the Component- The countermeasures includelevel Intelligence Analysis Center anything which effectively negatesfor validation and possible an adversary's ability to exploitinclusion in the final MDCI vulnerabilities.product.

1. Countermeasures should onlyS. The MDCI threat assessment be developed to eliminate

prepared by the Component-level, vulnerabilities associated with anintelligence analysis center should identified threat to the EPITS. be returned to the appropriate based upon the MDCI analysis.matrix support element as soon aspossible. The goal is to return the a. The countermeasurescomplete, MDCI threat assessment developed shall be time- or event-within 120 days of the receipt by phased.the counterintelligence analysiscenter. b. The countermeasures

shall not be implemented until they9. The MDCI threat assessment are required, and they shall be

should clearly indicate specific terminated or reduced as soon asinformation that may not be possible after the threat, EPITS,released to contractors. or environmental changes lead to a

reduction or elimination of thea. Since contractors play a vulnerabilities or negation of the

critical role in the success of the threat.Acquisition Systems Protectioneffort, the use of handling 2. PMs should establish arestrictions and distribution countermeasures program based uponstatements such as NOCONTRACT (Not a cost-benefit analysis.Releasable to Contractors/Consultants), ORCON (Dissemination a. The analysis shouldand Extraction of Information focus on the cost associated withControlled by Originator), and the deployment of the appropriatePROPIN (Caution - Proprietary countermeasure compared to the riskInformation Involved), DoD 5220.22- associated with loss or compromiseM (reference (r)), should be of the essential element.minimized by the organizationpreparing the MDCI threat b. The cost-benefitassessment. analysis prepared by the program

office is for internal use only.It is not required as an enclosure,

3-9

Page 31: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

It is not required as an enclosure, e. Any differences inannex, or chapter of the PPP as protection levels betweenpart of the approval process. facilities owned by the government

and by contractors; especially withc. The PM should discuss regard to test facilities and the

and justify in the countermeasures reasons for the difference.section of the PPP why any Compliance with the Programrecognized EPITS vulnerabilities do Protection Plan will be included innot have countermeasures developed the list of Terms andto reduce, control, or eliminate Certifications and the Statement ofthem. Work (SOW) of the government's

solicitation.3. Should the acquisition

program not have an assigned or 6. Training in acquisitioncontracted security apparatus, the system protection and securityappropriate matrix support elements awareness are integral parts of theshould help the program office countermeasures effort.develop a draft countermeasuresconcept, based upon the PM's a. Following the approvalguidance and intent, of the PPP by the Milestone

Decision Authority, PMs should4. The establishment of a implement a training program to

protection baseline is the goal of inform all members of their programthe countermeasures concept of the efforts, procedures, andsection. methods to be used to protect the

system's EPITS, classifieda. There should be a information, and sensitive

commitment to a level of protection controlled information.to ensure protection of the EPITS.

b. Emphasis should beb. The minimum level of placed on the encrypted

effort and cost should be applied transmission of electronicto guarantee a level of protection messages, facsimile transmissions,appropriate to the PM's final and telephone transmissionsestimate of the intelligence relating to EPITS or sensitivecollection threat to the system. unclassified information.

5. The DoD Components should 7. Countermeasures are dynamicnot require a specific format for with the passage of time. As thethe presentation of the threat, EPITS, or environmentcountermeasures concept. As a change, the countermeasures willminimum, the countermeasures also change. Although formalconcept section should be the updates and validation of theresult of the following analyses protection plan are only requiredfor each countermeasure: at each Milestone Review, PMs

should update their PPPs as systema. Why they were selected; vulnerabilities change to reduce

the cost and administrative burdenb. When and how they will on their programs.

be implemented or increased;J. COST

c. When, how, and why theywill be terminated or reduced; 1. Cost data associated with

countermeasures and otherd. How much they are protection efforts shall be

expected to cost; and compiled and tabulated as part ofthe PPP by acquisition phase.

3-10

Page 32: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

Costs should be differentiated bysecurity disciplines and sub-categories (e.g., physicalsecurity, personnel, products,services, and equipment).

2. Cost data for the currentphase should be as specific aspossible. In addition, the costdata for the previous phase shouldbe compiled and compared with theestimated target. Significantdifferences between the projectedand actual data should beexplained.

3-11

Page 33: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 4

TIME- OR EVENT-PHASED SECURITY CLASSIFICATION GUIDE

A. GENERAL may not be classified, the guidewill focus on the classified

1. This chapter is provided as elements.a supplement to the policy providedin DoD 5200.1-R (reference (c)) and 2. Each EPITS should beDoD 5200.1-H (reference (s)). This identified with a statementchapter provides guidance on the regarding its releasability topreparation of security foreign governments, internationalclassification guides that is organizations or their designatedunique to the acquisition systems representatives. Identify theprotection process. In the case of releasability with one or more ofa conflict between the requirements the disclosure categories in DoDof this chapter and those of the Directive 5230.11 (reference (1)).cited references, the provisions of If a substitute technology is knownthe more stringent requirement or planned that would allowshould apply for activities related releasability, identify thatto the acquisition systems technology.protection program.

3. Those EPITS that do not meet2. Each acquisition program, the criteria of DoD 5200.1-R

product, or project that is (reference (c)) for protection atrequired to develop a Security the classified level should beClassification Guide in accordance evaluated for protective markingswith DoD 5200.1-H (reference (s)) and distribution controls under DoDshall develop such a guide that is Directive 5230.24 (reference (t))time- and/or event-phased, and DoD Directive 5230.25

(reference (u)). The guide shall3. The guide should not be describe how this unclassified,

finalized until the system's EPITS controlled information will behave been identified as part of the protected.preparation of the programprotection planning. 4. The guide should be reviewed

and updated at least every 2 years4. For those programs governed throughout the system's life cycle.

by the DoD 5000 series ofDirectives and Instructions, the a. In addition to theguide is necessary to reduce the biennial reviews, the securityadministrative burden of excessive classification guide shall also beclassification and reduce reviewed prior to each Milestoneprotection costs. Review, and updated and validated

when necessary.5. The classification guide

should be developed as soon as b. Any changes fromrequired, but no later than previous versions should beMilestone I, and made an attachment compiled in a summary of changesto the PPP. section.

B. REQUIREMENTS 5. Each item listed in theclassification guide shall contain

1. Although all of the EPITS specific criteria and guidance on

4-1

Page 34: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

the elevation, reduction, or original classification authority.declassification of the element. Horizontal uniformity ofTo the maximum extent possible, classification determinations isthis guidance should be directly desirable, even necessary, when allrelated to specific times or events relevant considerations are thethat can be used to evaluate same.changes in the classificationlevels, a. A listing of most

security classification guides isC. CLASSIFICATION published annually in DoD 5200.1-I

(reference (v)).1. PMs (and their staffs) must

consider three scenarios with b. Derivative classificationrespect to the question of security responsibility serves as the basisclassification. These are: for classifying most existing

technology or elements ofa. Evaluating information information common to multiple

that is similar to that identified programs.as classified in securityclassification guidance of other b. Original classificationprograms; authority may be required for some

elements of the program. The mostb. Properly identifying as likely candidates are those

classified that information which elements that are products of newis used as such in the current technology or information. Possibleeffort; and examples of reasons for invoking

original classification authorityc. The potential for an include:

original classification authorityneeding to decide whether (1) Information thatinformation will be classified, provides U. S. defense operations

with a scientific, technical,2. Original classification operational, intelligence, or

requires authority delegated in battlefield advantage.writing in accordance with DoD5200.1-R (reference (c)). (2) -Indications thatDerivative classification is a disclosure would weaken theresponsibility of those security- international position of thecleared individuals who use United States.information previously classified.

(3) Indications that3. Information that is similar disclosure would weaken the

to that identified as classified in country's ability to wage war,similar systems should be limit the effectiveness of forces,considered for classification, or render the United StatesBecause individual systems may have vulnerable to attack or compromise.unique features or be utilized inunique circumstances, differing (4) Indications thatconclusions may be reached. When a other nations may not know thecharacteristic of one system is United States has, or is capable ofclassified, careful thought should obtaining, certain information orbe given to classification of that material.characteristic in the system underdevelopment. A decision to (5) The item underclassify (e.g., design lethality at development represents aa given range and altitude) in significant breakthrough inthese circumstances would require research with direct military

4-2

Page 35: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

application.

(6) There is reason tobelieve knowledge of theinformation would:

(a) Allow a foreignnation to develop, improve, orrefine a similar item,

(b) Provide a foreignnation with the technical baserequired to develop counter-measures, or

(c) Weaken or nullifythe effectiveness of the system.

D. DECLASSIFICATION AND DOWNGRADING

Declassification criteria andthe criteria for reducing theclassification level shall be anintegral component of the guide.The cost and administrative burden. of inappropriate or excessiveclassification levels shall not besanctioned by the DoD Components.Possible factors that may be usedby program offices to authorize andplan a reduction or elimination ofclassification include:

1. The occurrence of ananticipated event.

2. The anticipated compromisedue to widespread use ordissemination.

3. The expectation of publicrelease.

4. Changes in the internationalpolitical climate.

5. Changes in emphasis orreliance on a product or tactic.

6. The anticipated correctionof a shortcoming or weakness of thesystem.

4-3

Page 36: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 5

TECHNOLOGY ASSESSMENTICONTROL PLAN

A. GENERAL 5. Support the acquisitiondecision review process.

1. This chapter is provided asa supplement to the policy provided 6. Make decisions on Foreignin DoD Directive 5530.3 (reference Military Sales, commercial sales,(w)). It is not designed to and co-production or licensedreplace nor supersede the policy production of the system orpresented in that Directive. In international cooperativethe event of a conflict in policy agreements involving U.S.between this chapter and reference technology or processes.(w), the policy prescribed in DoDDirective 5530.3 (reference (w) 7. Make decisions on theshall apply. extent and timing of foreign

involvement in the program, foreign2. A Technology Assessment sales, and access to program

/Control Plan (TA/CP) has been information by foreign entities.established as a mandatoryrequirement for all acquisition C. CONTENTprograms.

The TA/CP is composed of four3. The TA/CP is an attachment sections, the Program Concept, the

to the PPP. Nature and Scope of the Effort andthe objectives, the Technology

B. PURPOSE Assessment, and the Control Plan.

The TA/CP shall be used to: 1. The first section, ProgramConcept, requires a concise

1. Assess the feasibility of description of the purpose of thethe United States' participation in acquisition program. It shouldjoint programs from a foreign describe, in the fewest wordsdisclosure and technical security possible, the purpose of the systemperspective. and the threat or the military or

technical requirements that created2. Prepare negotiation guidance the need for the system. The

on the transfer of classified description must be consistent withinformation and critical the PPP. The pertinent sections oftechnologies involved in the the PPP may be referenced tonegotiation of international provide additional details, ifagreements. necessary.

3. Identify security 2. The second section is Naturearrangements for international and Scope of Effort/objectives.programs. Its purpose is to briefly explain

the operational and technical4. Draft the Delegation of objectives of the program (e.g.,

Disclosure Authority Letter that co-production, cooperative R&D) andprovides specific guidance on discuss any foreign participationproposed disclosures. or involvement. This issue may not

be considered in the early stages

5-1

Page 37: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

of the program. If foreign perform a risk-benefit analysis.participation or involvement orreleases of information to support c. In all cases, thispotential foreign sales are analysis must result in aconsidered likely, the phasing and conclusion on whether a cooperativedisclosures at each phase should be program, co-production, or foreigndescribed briefly; this issue will sale will result in clearly definedbe addressed in more detail in operational or technologicalsection 4 and in the DDL. Points benefits to the United States thatof contact for all aspects of the are expected to outweigh any damageTA/CP must be identified, including that might occur if there should beaddress, telephone numbers, and a compromise or unauthorizedtele-facsimile numbers. transfer. Specific reasons must be

provided.3. A Technology Assessment is

required in the third section. d. The analysis mustThis is the most important part of identify and explain any criticalthe TA/CP and preparation will capability, information, orrequire a joint effort involving technology that must be protected;program management, security, it may reveal that an adjustment tointelligence, and foreign program phasing is necessary sodisclosure personnel. that critical information is

released only when absolutelya. When the TA/CP is needed; and it will identify the

prepared in the early stage of need for special securityprogram protection planning, requirements that would need to beemphasis will be placed on adopted such as a program-specificdescribing the value of the security plan to governtechnology and systems in terms of international involvement. Itmilitary capability, economic should identify any EPITS thatcompetitiveness of the U.S. cannot be released due to theindustrial base, and technology; impact on the system's combatsusceptibility to compromise; effectiveness. The assessment mustforeign availability; and likely evaluate the risk of compromise,damage in the event of compromise. based on the capability and intent

of the foreign participants orb. It should draw purchaser to protect the

conclusions regarding the need for information and the susceptibilityprotective security measures; the of the system to compromise.advantages and disadvantages of anyforeign participation in the e. This aspect of theprogram, in whole or in part; and assessment also must discuss anyforeign sales. Concerning the last known foreign availability of theof these, the assessment must be information, system, and technologyspecific concerning phasing of involved, and previous release ofreleases of classified and the same or similar information,unclassified information in support system, or technology to otherof potential foreign involvement countries and, when foreignand foreign sales. For involvement or sales areconsideration of cooperative recommended, to other pa-ticipants.research and development,co-production, or foreign sale at 4. The fourth section, thesubsequent reviews, the preparer Control Plan, together with themust place a value on the U.S. Technology Assessment in Section 3,technical contribution to the is the basis for negotiatingprogram, fully assess the benefits guidance on the technical andto accrue to the United States and security aspects of the program and

5-2

Page 38: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoO 5200.1-M

the development of disclosure detailed guidance pertaining to theguidelines for subsequent sales and releasability of all elements offoreign participation in the the system, technology, orprogram. information in question.

a. The Technology b. Until the DDL has beenAssessment and Control Plan approved by the originatingsections are also the basis authority and by OUSD(P), personnelultimately for preparation of the from the acquisition program shallDelegation of Disclosure Authority neither promise to release norLetter (DDL). actually release sensitive

information or technology.b. The Technology

Assessment must describe actions c. The DDL shall bethat are to be taken to protect reviewed by the program office andU.S. interests when foreign the appropriate designatedinvolvement or sales are disclosure authority pursuant toanticipated. DoD Directive 5230.11 (reference

(1)) and be issued to ensure thatc. Possible actions are all transfers of equipment or

withholding of certain information, information by the government orstringent phasing of releases, the U.S. industry personnel comply withdevelopment of special security the provisions of the TA/CP, DoDrequirements, and program Directives 2040.2 (reference (e)),protection planning. It should 5230.11 (reference (1)), and 5530.3also identify any design or (reference (w)), and the' engineering changes that may be appropriate DoD or Componentnecessary or desirable to ensure security policies and procedures.the protection of the program'sEPITS.

d. These actions must bespecific and meaningful and shouldaddress the specific risks, if any,discussed in Section 3 of theTA/CP. References to provisions ofthe PPP, separate agreement forwhich the TA/CP is prepared, or DoDComponent regulations must beavoided. The Control Plan simplydescribes how security provisionsof an agreement and/or applicableregulations are to be applied tothe specific program, agreement, orsale.

5. As part of a recommendationfor foreign involvement ordisclosure of the program toforeign entities, or requests forauthority to conclude an agreement,or a decision to authorize foreignsales, the program office shallprepare the DDL.

a. The DDL shall provide

5-3

Page 39: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 6

SYSTEMS SECURITY ENGINEERING

A. GENERAL 5. SSE should be applied tonew developments (including off-

System Security Engineering the-shelf and non-developmental(SSE) is required in accordance items) and to modifications ofwith DoD Instruction 5000.2, Part existing systems to minimize the6, Section J. (reference (g)). It operational costs of protectingis an essential element of deployed systems.acquisition systems protection andis the vehicle for integrating C. SYSTEM SECURITY ENGINEERINGsecurity into the overall systems PLANNINGengineering process.

1. The Systems EngineeringB. PURPOSE Management Plan (SEMP) is a top-

level management document thatThe purpose of SSE is to describes system engineering

eliminate, reduce, or control tasks.through engineering and design anycharacteristics that could result 2. The System Securityin the deployment of systems with Management Plan (SSMP) is aoperational security deficiencies, detailed plan outlining how the

SSE Manager (SSEM) and the1. During the system's design contractors are going to implement

phase, SSE should identify, SSE.evaluate, and eliminate or containknown or potential system security 3. It prescribes how securityvulnerabilities at deployment and threat vulnerabilities projectedthrough demilitarization, for the operational environment

will be "engineered-out" and2. SSE should also address appropriate countermeasures are

possible capture of the system by "engineered-in" for protection ofthe enemy on the battlefield. the weapon system.

3. A key difference between 4. The SSMP may be includedSSE and program protection is SSE in the SEMP or it may be aaddresses only those security separate document.threats against the system duringdeployment, operations, and 5. The level of detail insupport. these plans may vary depending on

the criticality and complexity of4. SSE involves the the system.

integration of securityconsiderations into the systems D. MILITARY STANDARD 1785engineering process to ensure thetotal system is evaluated for MIL-STD-1785 (reference (x))known or potential system contains the procedures forvulnerabilities and that the contracting for an SSE effort andsystem is cost-effectively an SSMP. The format and contentsdesigned to reduce the probability of an SSMP are outlined in theand severity of all sezurity appropriate Data Item Descriptionvulnerabilities. listed in MIL-STD-1785.

6-1

Page 40: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

1. Implementation requirescontractors to establish an SSMPthat identifies operationalsecurity vulnerabilities and totake action to eliminate orcontain the associated risks basedupon the level of risk acceptableto the PM.

2. Contracting Data ItemDescriptions (DID) and ContractData Requirements Lists (CDRL) maybe tailored to the system in orderto obtain contractor-producedplans or studies satisfyingspecific program needs.

E. INTERNATIONAL PROGRAMS

The SSE concept includesassessment of any securitycriteria that currently precludesor will preclude internationalcooperative and/or foreignmilitary sales programs.Engineering and softwarealternatives, including exportvariants, that would permit suchprograms, should be identified andconsidered for use, wherepractical.

6-2

Page 41: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

i CHAPTER 7

STANDARDS FOR SECURITY OPERATIONSAT ACQUISITION FACILITIES

A. GENERAL and research and developmentlaboratories.

1. This chapter identifiesminimum standards for DoD-owned b. Studies have documentedand operated facilities, including vulnerabilities during testing atranges, laboratories, test beds, these sites and have shown thatprogram offices, off-site testing many U.S. weapon systems are inlocations, and demonstration the test and evaluation phase whensites, used to support the foreign countermeasure systems areacquisition of defense systems initiated.throughout the research,devilopment, test, and evaluation 3. While the PPP addressesphases. It specifically includes the overall protection of theall events related to program's EPITS, special attentiondevelopmerntal test and evaluation must be devoted to the protection(DT&E); operational test and of the EPITS at DoD acquisitionevaluation (OT&EI; live fire facilities. As a result, thistesting; combat and tactics chapter establishes the minimumdevelopment; requirements integrated protection featuresdefinition; laboratory that should be available at eachexperimentation; technology acquisition facility as a part ofdemonstrations; and the logistics the acquisition infrastructure.support and initial training Additional protection provisions(system'or unit) in preparation of to support a specific program

OT&E of acquisition systems. should be considered "programunique." The PM should be

2. A critical challenge faced responsible for budgeting andby acquisition managers in the funding for these items based upondevelopment and fielding of risk management.combat-effective systems is todeny foreign intelligence services 4. The development of theinformation about the EPITS, as minimum protection standards haswell as information about existing two goals.weapon systems with which thesystems being acquired will co- a. The first goal is tooperate. establish an integrated, multi-

tiered series of protectivea. The period of greatest measures at facilities that will

vulnerability for most systems, provide a uniform level ofand the period that provides the protection for programs that usemost opportune lead time for an the facility as a part of theadversary to exploit the acquisition infrastructure.information for countermeasuredevelopment or technological b. The second goal is toadvantage, is when the system or establish a protection baselineits critical components are at th-w will allow the acquisitiongovernment acquisition facilities facility commander or director tosuch as test and evaluation ranges identify deficiencies in the

7-1

Page 42: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

facility's protection assets or c. Telemetered or data-the inability to meet program- linked data or information fromspecific protection needs for which EPITS or operationalacquisition programs that will use characteristics can be inferred orthe facility. derived through reverse

engineering. This includes data5. All facilities should without scale, units of measure,

strive to have these minimum or calibration (i.e., raw data).protection resources available forall supported ACAT I, II, III, and d. Information pertainingIV programs. Acquisition facility to schedules of events duringcommanders and directors are which the above information mightresponsible for providing a secure be vulnerable or available forenvironment based upon the threat. targeting for unauthorizedA facility point of contact (POC) collection.shall be assigned to advise andassist program officials in the e. Communicationsimplementation of security (telephonic, radio, conversations,procedures and plans to integrate written, briefings) and datathe acquisition program's transfer that can lead toprotection requirements and the knowledge by unauthorizedfacility's security system. collectors about the nature or

presence of EPITS, Pks, or WRM in6. The standards discussed in any acquisition event at any

this chapter may serve as minimum acquisition facility.guidance for DoD contractors andtheir facilities. However, 2. Each acquisition facilitycontractor security requirements commander or director (see DoDshall be as specified in the Directive 5200.8, reference (y))contract and the standards set should:forth in the DoD IndustrialSecurity Manual (ISM), DoD a. Ensure that facility5220.22-M (reference (r)). protection plans are prepared;

B. MINIMUM PROTECTION b. Designate a POC at theREQUIREMENTS facility;

1. The following information c. Establish workingand data may be protected at groups that will have the primaryacquisition facilities (unless responsibility for liaison andwaived) as dictated by the integrating the supported programsperceived threat and the and their protection requirementsvulnerabilities of the acquisition into the facility protectionprogram to compromise: planning process;

a. EPITS, as identified in d. Provide listing andthe PPPs prepared by each program descriptions of availableoffice when a vulnerability exists countermeasures to protect EPITSfor the EPITS at that facility, while the program is resident at

A the facility;b. Operational

characteristics such as e. Implement and employProbability of Kill (Pk) and internal facility security controlWartime Reserve Mode (WRM) and auditing procedures;information for new and existingweapons. f. Develop quantitative

standards that *indicate the

7-2

Page 43: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

effectiveness of the facility's facility and listings of availableprotection efforts; countermeasures;

g. Comply with provisions b. Advise and help theof DoD and Component directives program office staff with theaddressing sabotage (including analysis and implementation of theintegrity and availability of portion of the PPP that applies todata), inadvertent or unauthorized the facility;access, accreditation, andcertification of the systems; c. Establish liaison with

the local CI and law enforcementh. Identify as early as organizations to determine the

possible, and provide continuous status of the local threat to theassessment of threats, facility, personnel, and supportedvulnerabilities, and risks programs;associated with the facility, aswell as environmental factors that d. As information becomescontribute to facility available, inform the supportedvulnerabilities; program offices of the current

threat status, any changes sincei. Conduct periodic the last update, and any other

reevaluations of protection information required; andprograms to ensure facilitycountermeasures are appropriate e. Conduct periodicand sufficient to meet the evaluations (and provide aidentified threats; sanitized copy of the results to

supported programs), and prepare aj. Ensure that facility consolidated "lessons learned"

contracts involving the support of document to assist with protectionacquisition programs, while they planning.are resident at the facility,contain provisions that will 2. If there is uncertainty asinclude the protection of both to whether resources identifiedclassified and sensitive, through the PPP are available, theunclassified EPITS that are PM and Component headquartersreleased to industry; and should identify and explore

alternatives to thek. Ensure that facility countermeasures described in the

contracts in support of resident PPP.acquisition programs will containprovisions that authorize the D. APPLICABLE PROTECTIONgovernment to conduct protection CAPABILITY REFERENCESsurveys of the contractor'sfacilities used in support of the 1. The protection measuresacquisition program without for acquisition facilities followincurring additional charges for the DoD guidance and instructionsthe government, contained within the directives

that apply to the security andC. FACILITY PROTECTION PROCESS counterintelligence disciplines.

The references for this chapter1. The facility POC shall: incluae:

a. Prepare and maintain a. Information Systemfacility protection plans, which Security, see DoD Directive. identify the minimum integrated 5200.28, reference (z);protection features of the

7-3

Page 44: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

b. Communications Security(COMSEC), see DoD Directive C-5200.5, reference (aa);

c. CompromisingEmanations, see DoD Directive C-5200.19, reference (bb);

d. Industrial Security,see DoD 5200.22-R, reference (cc)and DoD 5220.22-M, reference (r);

e. Information Security,see DoD 5200.1-R, reference (c);DoD Directive 5230.24, reference(t); and DoD Directive 5230.25,reference (u);

f. Personnel Security, seeDoD 5200.2-R, reference (dd);

g. Physical Security, seeDoD 5200.8-R, reference (ee); and

h. Protection duringtransportation and shipment, seeDefense Traffic ManagementRegulation, reference (ff);

2. The effectiveness andcoherence of the application ofthe security disciplines to thethreat facing an acquisitionfacility are enhanced by theapplication of counterintelligenceanalysis and OPSEC planning forthe facility. Counterintelligenceanalysis and OPSEC surveys mayhelp the security plannerdetermine the threat (operationaland collection) to the facility,and help identify vulnerabilitiesfor information leaks. The DoDguidance on these topics isprovided in:

a. Counterintelligence,see DoD Directive 5240.2,reference (gg); and

b. Operations Security,see DoD Directive 5205.2,reference (hh).

7-4

Page 45: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 8

PROGRAM PROTECTION SURVEYS

A. GENERAL specific point in the acquisitionprocess,

1. The DoD goal is to conductat least one program protection 3. To provide specificsurvey (PPS) on each acquisition indicators of losses of EPITS thatprogram during each phase of the have or may have occurred,acquisition cycle. As a minimum,the PM shall evaluate the need for 4. To provide specifica PPS during each phase. information on how the loss of

EPITS did or could have occurred,2. Following the review of the and

PPP by the Milestone DecisionAuthority (or designated 5. To point out needed changesrepresentative), implementation of in the program protection plan forthe plan and the training program, the remaining acquisition phases.PMs may use the survey process toassess the effectiveness of the D. SURVEY PROCESSestablished program protectionefforts. 1. The PPS is intended to

provide the acquisition PM withB. PURPOSE information that can be used to

modify protection efforts. If theThe PPS is the DoD activity that protection is determined to be less

responds to the survey requirements than required or indicates a wasteof DoD Instruction 5000.2, Part 5, in resources, the PM is providedSection F (reference (g)). PPSs with the information necessary toare conducted following the revise the PPP and the protectionestablishment of the PPP. The PPS methods. This assessment willsimulates an intelligence allow the PM to continue the PPP ascollection effort aimed at a written or to restructure the planspecific acquisition program's to appropriately redirectEPITS at a specific RDT&E facility protection resources, policiesor other location. It is the and/or activities.primary tool to evaluate andvalidate the current protection 2. The PPS may differ from aplanning methodologies and effort. true adversarial effort •n thatIt is similar to other types of simulated collection issurveys in some of the methods it accomplished with minimaluses, but it differs significantly resources, within a limited timein objective and scope. frame, and with the intent of

identifying, reducing, orC. OBJECTIVE eliminating exploitable

vulnerabilities.The objectives of the PPS are:

3. PPSs are conducted to1. To assess awareness of the determine if the previously

need to implement the PPP, identified EPITS are beingadequately protected during a given

2. To assess the overall phase of the acquisition process.effectiveness of the PPP at a The PPS is specifically designed to

8-1

Page 46: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

evaluate PPP effectiveness and Olessons learned" documentallow restructure as required. It discussing the specific areas ofis focused on specific, valid the protection plan's strengths andthreat and countermeasures issues. weaknesses as found by theThe survey methodology seeks to surveying organization.reproduce the adversary's approachto the facility being assessed, as a. The sanitized reportopposed to examining compliance should be correlated against commonwith security procedures and trends and/or problems in theregulations. acquisition community as found by

the surveying organization.4. The PPS is limited to

determining the effectiveness of b. This sanitized reportthe protection and countermeasures should be presented to the PM atplanned and implemented at a the same time as the completespecific facility to protect the survey report and should be subjectEPITS of a selected acquisition to a joint review and revision byprogram from foreign intelligence the PM and the Team Chief of thecollection. The PPS provides the surveying organization.PM with a written report on theeffectiveness of the protection c. The sanitized reportmeasures being applied to the should concentrate on thoseprogram's EPITS and recommendations. problems with resources,to improve protection measures that facilities, or training that areshould eliminate or reduce generic to the acquisitionidentified vulnerabilities. community.

5. The PPS is not an d. The sanitized reportinspection. No grades are awarded shall be forwarded throughnor punitive actions taken as a appropriate channels to OSDresult of the assessment. To (ODASD(I)/ASPO).obtain accurate information and besuccessful, the PPS team depends onpositive cooperation and assistancefrom the program managementorganization and facility beingsurveyed.

6. A PM shall coordinate surveyvisits to contractor facilitieswith the cognizant DIS office ofIndustrial Security. Where theprotection of classified EPITS willbe a subject of inquiry, thecognizant DIS office may berequested to participate as amember of the survey team for thepurpose of assessing this specificarea.

7. The results of programprotection surveys should only beprovided to the PM.

B. The unit or organizationthat conducted the protectionsurvey will provide a sanitized,

8-2

Page 47: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

CHAPTER 9

HORIZONTAL PROTECTION

A. GENERAL a. Protection measuresplanned or provided.

The objectives of the horizontal£ protection activities are to b. Intelligence estimates

ensure: of competitive acquisition efforts.

1. Cost-effective application c. Reports orof systems protection efforts investigations of compromises,across a technology area or espionage cases, and other losses.technology thrust by coordinationof requirements among programs 2. The PEO or DoD Componentusing similar technologies, conducting the assessment shall

ensure that appropriate PPPs are2. Accurate assessments of modified based on conclusions of

progress and periodic measurement the assessments.of effectiveness of systemsprotection efforts. 3. ASD(C31) will conduct

periodic assessments of theB. HORIZONTAL PROTECTI effectiveness of overall systems. REOUIREMENTS protection efforts.

The DoD Components shall D. REPORTING REOUIREMENTSestablish processes and informationsystems needed to support 1. The DoD Components shouldhorizontal protection activities, share decision documents based onThe DoD Components shall: horizontal assessments with

ASD(C31) and other DoD Components1. Review the classification engaged in similar RDT&E.

guides of existing programs whendeveloping PPPs to determine 2. Loss or theft of EPITS aresensitivity of similar technologies reported as required in DoDin use or in development. See the Instruction 5240.4 (reference (p))Index of Classification Guides, DoD through CI channels to ASD(C31).5200.1-I (reference (v)).

2. Catalogue, analyze, groupand correlate protectionrequirements within approved PPPsfor similar EPITS.

C. HORIZONTAL PROTECTION

1. Assessments may be carriedout by the PEO or DoD Component fora technology area, technologythrust, or all cognizant programs.Reviews may include the followingsubjects:

9-1

Page 48: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-A

APPENDIX A

PROGRAM PROTECTION PLAN EXIT CRITERIA

A. APPLICATION OF THE EXIT CRITERIA

The following criteria are provided to help program officialsprepare PPPs: (In addition, the criteria should serve as a guide toofficials below the level of the Office of the Secretary of Defensewho are responsible for the review of PPPs.)

1. The criteria presented are for a mature system; i.e., anacquisition program at the Milestone II review or later. Accordingly,the scope and depth of the PPP are not expected to be as great forprograms earlier in the acquisition cycle.

2. In addition, not all programs will require this level of detail.If a program does not have any EPITS, a conclusion based upon athorough review of the technology involved and the possible threats tothe program, then the PPP may consist of a single sentence statingthat fact. As a result, officials reviewing the PPP should usediscretion in applying the criteria contained in this section.

* B. EXIT CRITERIA

1. Does the summary description of the system:

a. Identify the mission, military value, and expectedoperational parameters?

b. Identify the locations or facilities where, and time periodswhen, EPITS will be used, stored, tested, or analyzed?

c. Identify unusual factors (such as Treaty Limited Items) thatmay serve to increase or decrease foreign intelligence interest in theprogram?

d. Identify supported or supporting programs?

2. Does the description of the Essential Program Information,Technologies, and/or Systems (EPITS):

a. Identify the technical parameters that, if compromised,would reduce the combat effectiveness or the combat effective lifetimeof the system?

b. Establish the criteria for what constitutes "loss" of theinformation?

c. Identify the EPITS of supporting programs and describe how* the loss or compromise of these elements would affect the program?

A-1

Page 49: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

d. Identify any production or fabrication techniques that areunique to the protected system or element and whose compromise wouldendanger the established EPITS?

3. Does the threat and vulnerability analysis:

a. Identify which countries or organizations have the interestand capability to collect information about the program?

b. Indicate which other countries are performing research inthe area of the program's EPITS, identify the level of sophisticationof that research, and identify how well the other countries areprotecting their research efforts?

c. Indicate where, when, and under what conditions the EPITSwill be vulnerable to compromise or loss due to the identified threat?

4. Does the countermeasures concept:

a. Indicate that it is time- or event-driven in itsimplementation or termination of the protection measures?

b. Formally commit the PM to a level of protection or asecurity concept?

c. Deploy assets to counter the recognized vulnerabilities ofthe program based upon a cost-benefit analysis?

d. Provide justification for the security concept that willguarantee minimum protection?

e. Reflect how supporting and supported programs' EPITS will beprotected?

f. Indicate how the program office will measure theeffectiveness of the countermeasures concept and indicate a procedureto be followed to update and validate the concept?

5. Does the cost criteria:

a. Provide the cost data by acquisition phase?

b. Separate the funds required into security disciplines andcategories (e.g., physical security, personnel, products, services,equipment)?

6. Does the Time- or Event-Phased Security Classification Guide:

a. Correlate with identified EPITS and reflect the protectionstrategy outlined in the PPP's countermeasures concept?

b. Discuss how the EPITS-related material will be classified orprotectively marked to limit distribution and control the informationflow to unauthorized activities?

c. Clearly indicate what criteria will be used to determine ifthe classification level should be reduced or eliminated?

A-2

Page 50: ACQUISITION SYSTEMS PROTECTION PROGRAM2. Acquisition Systems Protection personnel, physical, document, or (ASP). The safeguarding of communications security programs. defense systems

DoD 5200.1-M

d. Piovide a justification of why any indefinite periods ofclassification must be used?

7. Does the Technology Assessment Control Plan (TA/CP):

a. Describe the system, its mission, and its military value?

b. Indicate which technologies; i.e., EPITS, are critical tothe system and why they are valuable to the United States in terms ofthe technology involved and projected military capability?

c. Describe the specific benefits the United States will gainfrom international cooperation?

d. Indicate the probability of compromise and the possibledamage that might occur to the military capability or the industrialbase if the technology (EPITS) is lost?

e. Clearly and thoroughly describe how any technology clearedfor foreign programs will be protected or controlled to preventadverse impact upon the effectiveness of the U.S. weapon systems?

f. Include a Delegation of Disclosure Authority Letter (DDL)that provides clear, explicit guidance on the implementation of anyjoint ventures?

8. At Milestone II and later, does the System Security Engineering0 section:

a. Identify the threats and vulnerabilities of the system inthe operational environment?

b. Identify the design features that will ensure the mostefficient and effective security concept for the system in theoperational environment after considering the impact of any designchanges on the cost, schedule, or performance of the system?

c. Consider what changes can be made in fielded systems thatwill allow the system to be exported under foreign cooperativeagreements?

d. Outline the methodology for achieving the system securitygoals by acquisition phase?

A-3