20 May 2004. See also DoD Oversight of Special Access Programs:
http://cryptome.org/32cfr159a-80.txt
19 May 2004. See also Bush Denies Oversight of Special Access Programs:
http://cryptome.org/bush-sap.htm
16 May 2004
Army Regulation 380-381
21 April 2004
Effective date: 21 May 2004
UNCLASSIFIED
Security
Special Access Programs (SAPs) and Sensitive Activities
SUMMARY of CHANGE
AR 380-381
Special Access Programs (SAPs) and Sensitive Activities
This regulation, dated 21 April 2004--
* Amends the title of the regulation to reflect more accurately the intent
and content.
* Realigns the regulation to match the requirements of Department of Defense
Directive
5220.22-M
.
* Makes administrative changes throughout.
* Clarifies misconceptions about Army-specific special access programs access
levels and SAP categories.
* Rescinds DA Forms 5399-R, 5401-R, and 5749-R.
* Formalizes the existing responsibilities of the Technology Management Office
to include sensitive activities, not just special access programs (
chap 1 ).
* Clarifies required coordination before an Army special access program can
provide resources to, or receive resources from, another Department of Defense
or Federal agency special access program or sensitive activity (
chap 2 ).
* Standardizes annual reporting requirements ( chap 4 ).
* Adds detail on special access program disestablishment (chap 4).
* Adds detail on automation support to special access programs by Headquarters,
Department of the Army and the relationship between the supported and supporting
offices (chaps 4 and 8 ).
* Adds detail on physical security requirements for special access program
facilities (chap 4).
* Adds reporting requirements for security incidents related to special access
programs ( chap 5 ).
* Adds baseline approval authorities ( chap 6 ).
* Clarifies the process to review and submit special access program resourcing
documents ( chap 9 ).
* Adds information on international special access programs, to provide guidance
on the unique issues involving special access programs with allies (
chap 10 ).
This regulation establishes implementing instructions and procedures for
the establishment, maintenance, support, disestablishment, and oversight
of Army special access programs (SAPs), sensitive activities, and Army
participation in other Department of Defense (DOD) or Federal agency programs
that restrict personnel access.
Required and related publications and prescribed and referenced forms are
listed in appendix A .
Abbreviations and special terms used in this regulation are explained in
the glossary .
a. See Army Regulation
(AR) 380-5 for a detailed discussion on security, excluding
sensitive compartmented information (SCI) programs.
b. Alternative
compensatory control measures (ACCMs) cannot use the extraordinary security
measures reserved for SAPs (that is, access approval authority, signed
indoctrination and termination statements, billet structures, and so on).
ACCMs may be established only in accordance with Department of Defense Directive
(DODD)
5200.1-R and only for intelligence and operations and support, when
information requires enforcement of strict need to know but does not rise
to the level requiring SAP protection. ACCMs are not authorized to protect
acquisition programs. The proponent for an ACCM is the major Army command
(MACOM) sponsoring the effort. Requests to establish ACCMs will be forwarded
from the proponent through the appropriate Army Staff principal (for example,
the Deputy
Chief of Staff G-2 (DCS, G-2) or
Deputy Chief
of Staff, G-3 (DCS, G-3) to the Technology Management Office (TMO). The
TMO will provide a working nickname for the ACCM and will forward requests
for ACCMs to the Secretary of the Army (SA) for approval. After SA approval,
the TMO will register the working nickname as an active nickname. Classification,
marking, and reporting requirements are contained in DODD 5200.1-R. All ACCMs
will be reported annually to the TMO in the annual SAP and sensitive activity
data call (see app B ).
c. Proponents of
acquisition, intelligence, or operations and support activities who identify
particularly sensitive information that is believed to merit SAP protection
should report this information through the chain of command for a security
policy review. If a determination is made that the information warrants SAP
controls, the DCS, G-2 and the DCS, G-3 report this to the Chief, TMO, while
the program executive office (PEO) (Acquisition) and the Army Materiel Command
(AMC) or the appropriate MACOM report to the Director, Secretary of the Army,
Acquisition, Logistics, and Technology-Systems Special Programs (SAAL-SSP),
who coordinates a security review at Headquarters, Department of the Army
(HQDA). SAPs are not programs or activities planned and executed with the
intent to influence U.S. political processes, public opinion, policies, or
media. The establishment of a SAP will be based on a determination that normal
security protections are not adequate based on the threat and/or vulnerability
or the information to be protected, and that enhanced security protections
are required. Examples of potential SAPs include, but are not limited to
(1) A specific technology with potential for
weaponization that gives the United States a significant technical lead or
tactical advantage over potential adversaries.
(2) Sensitive technology or unique capability especially
vulnerable to foreign intelligence exploitation without special protection.
(3) An emerging technology, proposed operation,
or intelligence activity risking the compromise of other SAPs.
(4) Exposure of sensitive activities that could
jeopardize the lives of U.S. citizens.
(5) Extremely sensitive activities conducted in
support of national foreign policy objectives abroad, which are planned and
executed so that the role of the U.S. Government is not apparent or acknowledged
publicly.
(6) Methods used to acquire foreign technology or
equipment.
(7) Sensitive support to DOD and non-DOD agencies.
d. Army SAP program
directors (PDs) or program managers (PMs) are strictly prohibited from providing
resources to, in support of, or receiving resources from other DOD components
or Federal agencies' SAPs or ACCMs until
(1) HQDA access to the DOD or Federal agency SAP
is provided in accordance with paragraph 4-7 of this
regulation.
(2) Memorandums of Agreement (MOAs) are reviewed
and approved by the TMO for security and oversight equities. MOAs are established
between the SAP PD/PM and the DOD or Federal agency SAP or component.
(3) This restriction is not intended to limit the
Army SAP PD/PM from providing SAP information to any properly cleared individual
with a need to know when Army SAP material is not stored by the other DOD
component or Federal agency.
e. HQDA, its MACOMs,
and its activities will not establish, disestablish, implement, fund, categorize,
create carve-out status, or change the mission or scope of a SAP without
written approval through the SA by the Deputy Secretary of Defense.
The SA has overall responsibility for SAPs within the Department of the Army
(DA) and will
a. Make recommendations
to the Deputy Secretary of Defense concerning the establishment,
disestablishment, carve-out status, and changes of mission and scope of Army
SAPs.
b. Ensure adequate
oversight of Army SAPs.
The Under Secretary of the Army will
a. Represent the
Secretary of the Army at Office of the Secretary of Defense (OSD) Special
Access Program Oversight Committee (SAPOC) meetings.
b. Serve as the approval
authority for the SAP Program Performance and Budget Execution Review System
(PPBERS).
The Assistant Secretary of the Army (Acquisition, Logistics and Technology)
(ASA(ALT)) will
a. Serve as the Army
acquisition executive for all Army programs, including SAPs, and as the principal
assistant to the SA for matters relating to acquisition SAPs.
b. Approve acquisition
SAP reprogramming actions.
c. Ensure a single
subordinate commander of a MACOM or PEO is responsible for each acquisition
SAP throughout its life cycle.
d. Conduct regular
reviews of secure environment contracting conducted in support of SAPs.
e. Ensure SAP protection
and procedures for procurement and fielding of systems, components, and
modifications are developed and acquired under SAP provisions.
f. Coordinate with
the Office of the
DCS, G-2 on
issues concerning technology transfer.
g. Coordinate within
Army and other DOD components to eliminate duplication of effort and ensure
consistent security classification for similar technologies.
h. Coordinate technical
review of acquisition prospective special access programs (PSAPs).
i. Ensure the occurrence
of, or ensure MACOMs and PEOs conduct, an annual programmatic review of all
acquisition SAPs. Such reviews will focus on security, cost, scheduling,
performance, and transitions.
j. Evaluate proposed
acquisition strategies and plans for Army SAPs.
k. Coordinate with
the Office of the
Deputy Chief
of Staff, G-4 (DCS, G-4) to integrate logistics support and property
accountability considerations into acquisition SAP efforts and products.
l. Develop staff
oversight procedures to ensure regulatory compliance for Army acquisition
SAPs and Army participation in other component and Federal agency acquisition
SAPs or similar programs that restrict personnel access.
The Assistant Secretary of the Army (Manpower and Reserve Affairs)
(ASA(M&RA)) will
a. Review and assist
in developing policy regarding personnel and personnel security support to
Army SAPs and Army supported SAPs.
b. Provide guidance
concerning the documentation process to ensure that tables of distribution
and allowances (TDA) accurately reflect Army requirements consistent with
approved SAP missions and the Army authorization document.
c. Evaluate and approve
requests for special pays, as appropriate, in support of SAP missions.
d. In coordination
with the Assistant Secretary of the Army (Financial Management and Comptroller)
(ASA(FM&C)), assist in establishing guidance to ensure proper control
and accountability of financial data pertaining to Army personnel assigned
to SAPs.
The ASA(FM&C) will
a. Provide financial
and budget policy and guidance for SAPs.
b. Provide liaison
with Congress for SAP budgets.
c. Coordinate with
Defense Finance and Accounting Service (DFAS) to ensure DFAS provides a secure
finance and accounting network to process sensitive financial transactions.
d. Provide financial
quality assurance oversight through the ASA(FM&C) Special Review Office
(SRO).
e. Coordinate the
Army's budget estimate submission for SAPs with the OSD.
The General Counsel will
a. Review Army SAPs,
PSAPs, ACCMs, and Army participation in other DOD and Federal agency SAPs
or programs that restrict personnel access, for legality and propriety.
b. Advise the SA
on legal and policy issues.
c. Conduct policy
reviews.
The Department of the Army Inspector General (DAIG) will
a. Evaluate managerial
procedures and practices pertaining to operations, personnel, materiel, financial
management, secure environment, contracting, and security of SAPs, sensitive
activities, and ACCMs.
b. Identify issues,
situations, or circumstances that affect SAP and sensitive activity mission
performance.
c. Provide a secure
system for program personnel to report fraud, waste, and abuse without fear
of reprisal or unnecessary disclosure of information.
d. Conduct noncriminal
investigations as directed by the SA.
e. Inspect Army SAPs
and sensitive activities and Army participation in DOD or Federal Agency
SAPs and sensitive activities.
f. Develop and coordinate
an annual inspection plan with the TMO, other inspection/audit agencies,
MACOMs, and PEOs.
The Auditor General will
a. Maintain auditors
with appropriate clearance and access to perform audits of SAPs, sensitive
activities, and ACCMs.
b. Coordinate with
the TMO and other inspection/audit agencies when planning and performing
audits of SAPs and sensitive activities.
c. Conduct audits
or reviews of Army SAPs, sensitive activities, and Army participation in
DOD or other Federal agency SAPs.
d. Maintain effective
liaison, through an individual well acquainted with SAP procedures, with
the TMO to ensure effective audit coverage of SAPs and sensitive activities.
The Chief of Public Affairs will
a. Staff media queries
on SAPs and provide releasable information.
b. Provide public
affairs guidance on SAP matters.
The Chief of Staff, Army (CSA) will
a. Develop, coordinate,
review, and conduct oversight of all Army SAPs.
b. Provide guidance
and direction to Chief, TMO.
The Vice Chief of Staff, Army (VCSA) will
a. Review SAPs through
the DA SAPOC and serve as chairman of the SAPOC.
b. Provide guidance
and direction to the Chief, TMO.
The Director of the Army Staff will serve as the chairman of the Executive
Fix-It Committee.
The Deputy
Chief of Staff, G-1 (DCS, G-1) will
a. Provide policy
on SAP personnel matters.
b. Coordinate with
the DCS, G-3
to establish procedures ensuring MACOM SAPs properly use allocated personnel
spaces to resource the SAPs.
c. Ensure that the
Human Resources Command coordinates designated DA-approved personnel assignment
actions for SAPs.
The DCS, G-2
will
a. Oversee Army
intelligence SAPs and serve as the intelligence SAP Army Staff proponent.
b. Approve intelligence
SAP reprogramming actions.
c. Establish security,
counterintelligence (CI), and intelligence policy for SAPs in coordination
with the TMO.
d. Coordinate necessary
CI support for the execution of Army SAPs.
e. Provide intelligence
threat assessments and CI vulnerability assessments for MACOMs and SAP PEOs,
and present these to the Working SAPOC for inclusion in the Executive SAPOC
as part of the annual revalidation.
f. Advise the SAPOC
on whether a program or activity warrants SAP protection.
g. Review SAP security
plans and guides for accuracy and completeness.
h. Coordinate
intelligence property issues for Army SAPs with the
Deputy Chief
of Staff, G-4 (DCS, G-4).
i. Coordinate policy
for CI polygraph support to Army SAPs.
j. Review and approve
disclosure of official Army information (classified and unclassified) for
release to foreign governments and international agencies. Coordinate with
the TMO and Director for Special Programs, Office of the Deputy Under Secretary
of Defense (Policy)(Policy Support)(ODUSD(P)(PS)) for release of information
and technology identified by SAP proponents for release to foreign governments
and international agencies.
k. Develop staff
oversight procedures to ensure regulatory compliance for Army intelligence
SAPs and Army participation in other DOD or Federal agency intelligence SAPs
or similar programs that restrict personnel access.
l. Review and coordinate
with the TMO SAP establishment/disestablishment actions, security plans,
and CI support plans.
The DCS, G-3
will
a. Oversee operations
and support SAPs and serve as the Army Staff proponent.
b. Approve operations
and support SAP reprogramming actions.
c. Provide policy
guidance and standards for operations security (OPSEC) measures appropriate
for Army SAPs.
d. Develop Army
policy and guidance for materiel requirements for SAPs.
e. Establish and
validate Army acquisition priorities for SAPs.
f. Coordinate and
approve manpower requirements, allocate manpower resources, and prepare TDA
documents for SAPs.
g. Conduct manpower
and workload validations of SAPs to support HQDA and PEO/PMs.
h. Task U.S. Army
Force Management Support Agency (USAFMSA) to provide necessary support and
analysis of SAP manpower requirements on a 2-year cycle.
i. Develop staff
oversight procedures to ensure regulatory compliance for Army operations
and support SAPs and Army participation in other DOD or Federal agency operations
and support SAPs and similar programs that restrict personnel access.
j. Provide OPSEC
assessments and support.
k. Responsible for
developing SAP apportionment documents for staffing through the joint planning
process in coordination with the SAAL-SSP for apportionment to the combatant
commander.
l. Responsible for
developing, reviewing, and staffing with Army Staff compartmented plans that
require review and approval by the Army executive offices (The Judge Advocate
General (TJAG), the Office of General Counsel, the VCSA, the Undersecretary
of the Army, the CSA, and the SA).
The DCS, G-4
will
a. Integrate logistics
support for all Army materiel development or acquisition for SAPs.
b. Provide policy
guidance on property accountability and logistics support for SAPs.
The Chief Information
Officer, G-6 (CIO/G-6) will
a. Serve as the
primary approval authority for SAP automated information systems (AIS).
b. Appoint a senior
military or Government representative (lieutenant colonel or GS-14 or above)
to serve as the designated accrediting authority (DAA) for SAP AISs.
c. Develop information
systems policy for SAPs.
d. Serve as the
single central office for coordination of information systems support for
SAPs. The CIO/G-6 will receive all requests for information technology (IT)
support, validate the requested support, prioritize the requests, and then
task the PEO Enterprise Information Systems Technology Applications
Office (EIS-TAO) or Network Enterprise Technology Command to provide the
requested and approved IT support.
e. Review all IT
support and acquisitions to ensure they comply with
40 USC 1401 .
f. Validate and
approve information system support plans and information management support
plans (IMSPs) for SAPs.
g. Through PEO EIS-TAO
(1) Provide information management support in preparing
Information Systems Requirements Packages (ISRPs) and IMSPs.
(2) Provide technical advice and support in preparing
ISRPs and IMSPs.
(3) Provide one-stop IT support to include but
not limited to the above and IT engineering, acquisition, implementation,
fielding, operations and maintenance, and logistics support for all IT that
processes SAP and/or sensitive activity information as defined in this
regulation.
(4) Oversee SAP IT systems to ensure they are properly
configured to protect SAP and sensitive data. This will be accomplished through
periodic inspections of SAP IT systems and assisting other inspection agencies
with developing inspection criteria and techniques.
h. Coordinate with
the proponent for intelligence issues, the
DCS, G-2 on
SAP IT systems that process SCI.
The Deputy Chief of Staff,
G-8 (DCS, G-8) will
a. Ensure that SAPs
compete with other Army programs for resources in the program objective
memorandum (POM) development process.
b. Coordinate with
the Army Staff and the TMO to develop SAP program funding profiles and provide
copies of approved profiles to the TMO.
c. Provide program
analyses for reprogramming actions.
d. Coordinate SAP
POM requirements during the program review process with OSD.
e. Participate in
the Planning Program Budget Execution Review for SAP Programs.
The Commander, U.S. Army Corps of Engineers (USACE) will provide secure
architectural engineering, construction, real estate, and contracting support
to SAPs and sensitive activities as required.
The Judge Advocate General (TJAG) will
a. Review Army SAPs,
prospective Army SAPs, ACCMs, and Army participation in other DOD and Federal
agency SAPs or programs that restrict personnel access, for legality and
propriety.
b. Provide legal
and policy advice on SAP matters to the CSA and the Army Staff.
c. In conjunction
with Office of the General Counsel (OGC), coordinate legal and policy issues
on SAP matters with DOD and Federal agency legal advisors as appropriate.
The Chief of Legislative Liaison (CLL) will
a. Coordinate
congressional briefings on Army SAPs.
b. Coordinate access
requirements with OSD, through the TMO, for each separate congressional visit.
c. Provide required
reports to selected congressional committees on Army SAPs.
d. Assist the TMO
in updating clearance information for individuals in Congress accessed to
Army SAPs.
e. Assist the TMO
in verifying access of individuals in Congress.
The Chief, TMO, will
a. Be designated
the Chief, Army SAP Central Office.
b. Be the point
of contact (POC) for Army sensitive support to DOD and non-DOD agencies.
c. Be an access
approval authority for all Army SAPs and, when delegated authority by another
component or Federal agency, for other component or Federal agency SAPs or
programs that restrict personnel access.
d. Be the approval
authority for establishment of PSAPs and establishment/disestablishment of
SAP subcompartments.
e. Be the approval
authority for billet structures for all Army SAPs and any billets allocated
to the Army from another component or Federal agency SAP or programs that
restrict personnel access.
f. Be authorized
to indoctrinate personnel into all Army SAPs and, when delegated authority
by another component or Federal agency, into other component or Federal agency
SAPs or programs that restrict personnel access.
g. Be designated
an original classification authority for information classified at the TOP
SECRET (and below) level.
h. Serve as the
single central office for oversight of Army sensitive activities, Army SAPs,
and Army support to other component or Federal agency SAPs or programs that
restrict personnel access.
i. Serve as the
single central office, in coordination with Programs, Analysis, and Evaluation
and Army Budget Office, through which all Army resource documents will be
coordinated prior to submission to OSD.
j. Review and staff
with the Army Executive Office (TJAG, OGC, VCSA, Under Secretary of the Army,
CSA, and SA) the
DCS, G-3 's
recommendations for apportionment of SAP capabilities in support of the combatant
commanders.
k. Coordinate with
DAIG, Army Audit Agency (AAA), SRO, and other Army or Federal agencies to
ensure that Army sensitive activities, SAPs, and Army support to other component
or Federal agency SAPs or limited access activities are appropriately inspected
and audited.
l. Coordinate briefings
and approve access for and indoctrinate Secretariat and Army Staff principals,
DOD and Army special panels, and other personnel, as the TMO determines
appropriate.
m. Review and staff
with the Army Executive Office (VCSA, CSA, Under Secretary of the Army, and
SA) all SAP and sensitive activity related actions, except for compartmented
plans.
n. Coordinate Army
agendas, brief or approve Army briefings and briefer, and approve Army attendance
for the OSD SAP Senior Review Group and OSD specified approval process.
o. Report annually
to the Chief of Staff and SA all Army SAPs, ACCMs, and participation in other
component or Federal agency SAPs or programs that restrict personnel access.
p. Coordinate and
approve all documents pertaining to the establishment, maintenance, and
disestablishment of SAPs. Additionally, coordinate the approval process for
ACCMs as defined in paragraph 1-4b .
q. Review and approve
all Army SAP security classification guides (SCGs) and program security guides
(PSGs). The TMO approves the classification guide format and content, not
the classification (this is the responsibility of the original classification
authority).
r. Approve the
establishment/disestablishment of SAP subcompartments when there is no change
to the carve-out status, mission, or scope of the parent SAP. In cases where
establishment/disestablishment of a subcompartment will change the mission
or scope of the parent SAP, the Chief, TMO will submit the action through
SA to the Deputy Secretary of Defense for approval.
s. Coordinate Army
SAPOC reviews.
t. Coordinate with
the DAIG, AAA, field investigative unit (FIU), SRO, and
DCS, G-2
quarterly the HQDA Fix-It process and report results to the Director,
Army Staff for authentication.
u. Coordinate a
quarterly financial review with the Army Acquisition Special Programs Office.
v. Provide regular
update reviews to the senior Army leadership and HQDA staff principals.
w. Assist CLL in
coordinating congressional SAP access briefings and congressional notifications.
x. Monitor budget
and financial actions associated with SAPs.
y. Review Army sensitive
activities, SAPs, prospective Army SAPs, ACCMs, and Army participation in
other DOD and Federal agency SAPs or programs that restrict personnel access
for compliance with applicable law and regulations, oversight, funding, and
continued enhanced security measures.
z. Serve as the
POC for Army sensitive support to DOD and non-DOD agencies.
aa. Maintain a
registry of Army sensitive activities, SAPs, and Army participation in other
component or Federal agency SAPs or programs that restrict personnel access.
ab. Maintain the
Army baseline billet roster.
ac. Accept, review,
process, archive, and destroy Army sensitive records in accordance with
DODD
O-5205.7 , this regulation, and
AR 25-400-2 . Respond to requests for information. Conduct
records review and disposition.
ad. Conduct Army-wide
document searches for sensitive information; compile and prepare document
indexes and responsive documents for forwarding to requesting agencies; and
coordinate declassification reviews.
ae. Establish policy
and provide oversight and management for the Army SAP Enterprise Portal (ASEP).
af. Maintain direct
contact with all Army SAPs to coordinate oversight issues. MACOMs and PEOs
will be kept appropriately informed.
ag. Participate
in the review and approval process of cover plans for non-Army SAPs and sensitive
activities.
ah. Represent the
coordinated Army position at the OSD Special Access Program Coordination
Office (SAPCO) senior review group for apportionment of Army SAP capabilities
into the Joint Planning System.
The Commanding General (CG), U.S. Army Training and Doctrine Command (TRADOC),
will
a. Institute procedures
to ensure early identification and protection of combat developments, concepts,
and systems with SAP potential.
b. Identify war-fighting
requirements and concepts that may warrant SAP protection.
c. Identify support
requirements for SAP-developed products deployed to the field.
d. Provide SAP
management and oversight to TRADOC installations.
e. Conduct an annual
review of SAPs to ensure technology is aligned with future needs.
The CG, AMC, will
a. Institute procedures
to ensure early identification and protection of potential research and
development breakthroughs that may warrant SAP protection. If AMC deems that
SAP protection is warranted for a new technology, a PSAP package will be
initiated by AMC and forwarded to the TMO using the procedures prescribed
in this regulation.
b. Review all SAPOC,
programmatic and security material relative to AMC SAPs, and sensitive activities
prior to that material being forwarded to the TMO, SAAL-SSP, and the Director
of Technology (ASA(ALT)).
c. Provide security
and oversight for AMC SAPs.
d. Conduct a thorough
security and programmatic review of all AMC SAPs and provide the results
to the Director of Technology (ASA(ALT)).
e. Initiate all
reprogramming actions for AMC SAPs and sensitive activities.
f. Ensure that all
AMC SAPs and sensitive activities adhere to the guidance of this regulation.
g. Conduct technical
reviews of technology base SAPs for continuation or redirection. Review and
approve prospective SAP programs prior to submission to the
DCS, G-2 and
the TMO.
h. Coordinate and
conduct regular review of secure environment contracting in support of SAPs.
i. Coordinate with
HQDA and other DOD components to eliminate duplication of effort and ensure
consistent security classification for similar technologies.
j. Coordinate technical
reviews by convening the Technical Review Committee (TRC) to assess the
technology base SAPs and recommend continuation or redirection of programs
based on program standing and prioritization of each SAP. Additionally, the
TRC will review and approve PSAPs prior to submitting to the DCS, G-2 and
the TMO. AMC organizations that anticipate the review of programs to be reviewed
as a SAP are required to contact the AMC DCS, G-2 to coordinate with the
Research, Development and Engineering Command to convene the TRC. Upon TRC
approval, proponents may submit written justification for PSAP status through
the AMC DCS, G-2 to Army Staff principal to the TMO.
k. Conduct and
coordinate an annual programmatic review of all AMC SAPs by convening a war
fighter technical council to evaluate the cost, scheduling, performance,
and transition of each SAP.
l. In coordination
with HQ TRADOC, conduct an annual review of new SAP initiatives focused on
validating Army requirements. This process is to review, prioritize, and
recommend new SAP initiatives to the TRADOC Deputy Command General for
Development; the Office of the ASA (ALT) through SAAL-TT (Research and
Technology); and the DCS,
G-8 .
The CG, U.S. Army Forces Command, will institute procedures to ensure early
identification and protection of activities, operational concepts, and combat
developments requiring SAP status.
The CG, U.S. Army Space and Missile Defense Command (USASMDC)/Army Strategic
Command, will
a. Institute procedures
to ensure early identification and protection of activities, operational
concepts, combat developments, and potential research and development
breakthroughs within USASMDC/Army Strategic Command that may warrant SAP
protection and will coordinate potential release of special access required
(SAR) information through the
DCS, G-2 to
SAAL-SSP and the TMO prior to initiating or engaging in preliminary discussions
with a foreign government or international organization. The DCS, G-2 will
coordinate, as required, with Director for Special Programs, ODUSD(P)(PS),
prior to any release.
b. Oversee command
SAPs and SAP activity.
c. Ensure all command
SAPs undergo required security and programmatic reviews and reports the results
appropriately.
d. Ensure proper
reporting of all reprogramming actions for command SAPs and sensitivities.
e. Ensure all command
SAPs and sensitive activities adhere to the guidance of this regulation.
f. Conduct technical
reviews of technology base SAPs for continuation or redirection.
g. Review and approve
prospective SAP programs prior to submission to the DCS, G-2 and the TMO.
h. Ensure compliance
with secure environment contracting requirements for SAPs.
i. Coordinate with
HQDA and other DOD components to eliminate duplication of effort and ensure
consistent security classification for similar/related efforts.
The CG, U.S. Army Intelligence and Security Command (USAINSCOM), will
a. Institute procedures
to ensure early identification and protection of sensitive intelligence
activities that may warrant SAP protection.
b. Provide dedicated
CI and security countermeasures support to commanders, PDs/PMs, or heads
of DA activities having proponency for Army SAPs or Army-supported SAPs.
c. Provide the DCS,
G-2 with CI assessments of the threat posed to SAPs by foreign intelligence
services and technology assessments of foreign research and development efforts
related to SAP technologies. Coordinate with the
DCS, G-2 to
provide this information to organizations and installations supporting SAPs.
d. Provide to the
DCS, G-2 an annual CI evaluation of Army SAPs and Army-supported SAPs.
e. Manage and execute
the Army CI polygraph program in support of SAPs.
f. Provide technical
surveillance countermeasures (TSCM), TEMPEST, AIS security and counter-signals
intelligence support to SAPs.
g. Review SAP
establishment/disestablishment actions, security plans, and CI support plans.
h. Conduct carve-out
security compliance reviews of contractor facilities when Defense Security
Service is restricted from inspection responsibilities.
i. Provide an annual
report identifying cover plans and contracting support to SAPs.
The CG, U.S. Army Criminal Investigation Command, will
a. Provide dedicated
criminal investigators with appropriate clearances and access to conduct
investigations of criminal activity in or directed against SAPs.
b. Maintain effective
liaison, through individuals well acquainted with special access program
procedures, with the TMO to ensure quick response to investigative requirements.
c. Conduct criminal
investigations in all instances of suspected criminal activity in or directed
against Army SAPs in accordance with applicable Federal statutes,
DODD
O-5205.7 , DOD Instruction
(DODI)
5505.2 , and
AR
195-2 .
d. Conduct periodic
economic crime threat assessments.
e. Conduct crime
prevention surveys on SAPs.
The Army Staff sections having SAP proponency or support requirements for
SAPs will
a. Designate a central
point of contact for SAPs.
b. Provide appropriate
staff oversight for the planning, programming, budgeting, and execution of
SAPs.
c. Act as SAP managers
when appointed to do so.
The MACOMS and PEOs that supervise managers of SAPs will
a. Assist PDs/PMs
in managing their programs.
b. Establish internal
inspection programs for SAPs and sensitive activities.
c. Conduct periodic
property reviews to validate new requirements and document materiel assets
in support of SAPs.
d. Coordinate with
the Army Staff for SAP intelligence, CI, and force protection assessments.
e. Ensure that all
SAPs are incorporated into the internal review and audit compliance (IRAC)
program as described in chapter 4 .
f. Coordinate potential
release of SAR information through the
DCS, G-2 to
ASA(ALT) and the TMO prior to initiating or engaging in preliminary discussions
with a foreign government or international organization. The DCS, G-2 will
coordinate with the Director for Special Programs, ODUSD(P)(PS), prior to
any release.
g. Coordinate with
USAFMSA for manpower support for TDA documentation.
SAP PDs/PMs and PDs/PMs of Army offices that participate in another non-DOD
or Federal agency SAP will
a. Appoint a program
security manager (PSM) who is a fully qualified Government/military individual
who works directly for and is rated or senior rated by the PD/PM.
b. Maintain essential
SAP information, including establishment, documentation, security plans,
access rosters, and security inspection records.
c. Plan, prepare,
and implement security and OPSEC programs designed to protect critical program
information.
d. Report annually
to the TMO any program participation in other DOD or Federal agency SAPs
or programs that restrict personnel access, when such participation includes
providing resources to, in support of, or receiving resources from, another
DOD or Federal agency SAP or sensitive activity.
e. Ensure all MOAs
are reviewed by the TMO (Intelligence, Operations and Support, and Acquisition)
and coordinated with SAAL-SSP (Acquisition) for security and oversight equities
established between the SAP PD/PM and any DOD SAPs. The PD/PM will ensure
all MOAs between the SAP PD/PM and any non-DOD or Federal agency SAP are
reviewed and approved by the TMO (Intelligence, Operations and Support, and
Acquisition) and coordinated with SAAL-SSP (Acquisition). This restriction
is not intended to limit the Army SAP PD/PM from providing SAP information
to any properly cleared individual with a need to know when Army SAP documents
or equipment are not stored by the other non-DOD component or Federal agency.
f. Coordinate with
the CIO/G-6 all information systems purchases, technical requests, and support.
g. Establish and
maintain a viable records management program in accordance with
AR 25-400-2 .
h. Coordinate with
the Defense Security Service (DSS) or USAINSCOM (when DSS is carved out)
for industrial facility reviews.
i. Coordinate potential
release of SAR information through
DCS, G-2 to
ASA(ALT) and the TMO prior to initiating or engaging in preliminary discussions
with a foreign government or international organization. The DCS, G-2 will
coordinate with Director for Special Programs, ODUSD(P)(PS), prior to any
release.
j. Submit to the
TMO request for approval any contracting agreement in which DSS will be excluded
from providing industrial security inspections (carve-out contracts).
a. The PSM is a
fully qualified Government/military individual who works directly for and
is rated or senior rated by the PD/PM (see para 4-5j ).
Each SAP will have a full time PSM. Programs requesting part-time or shared
PSMs will submit a fully justified waiver request to the TMO for approval.
PSMs
(1) Advise PDs/PMs on classification, declassification,
downgrading and upgrading of SAP information.
(2) Prepare and submit program security plans to
their PDs/PMs.
(3) Maintain a personnel access roster on the ASATS
database.
(4) Ensure through MACOM/PEO security officers
that personnel with access to the program have the appropriate level of personnel
security clearance (see para 5-4 ).
(5) Through the use of the Defense Clearance and
Investigation Index or Joint Personnel Adjudication System (or follow-on
DOD authorized system), ensure that personnel requesting access to the program
have the appropriate type/level of personnel security investigation.
Additionally, PSMs must verify that the clearance is based on the correct
type of investigation and that the clearance is current (see para 5-4 for
additional guidance). PSMs will verify at least yearly that all personnel
briefed to their program have a current security clearance. PSMs are not
responsible for conducting a yearly check on Army baseline briefed personnel
as these personnel are tracked by the TMO. MACOM security officers will assist
SAP security managers if, because of technical reasons (for example, AIS
failure), the SAP security manager is unable to conduct investigation type/level
verification.
(6) Serve as the program point of contact for all
security-, CI-, and OPSEC-related issues.
(7) Review SAP contract requirements, prepare and
sign the contract security classification specification (
DD
Form 254 )
(8) Review and report suspected and confirmed program
compromises and advise their PDs/PMs on required actions (see
para 5-9a ).
(9) Accredit (in writing) SAPFs for their program.
b. In cases of
Government and contractor facilities that maintain SAP material but are not
program officers, a full-time security manager will be designated in writing
as the SAP security manager. No facility may be accredited or maintain
accreditation as a SAPF without a full-time security manager. Waivers to
this policy may be approved only by the TMO.
The Chief, PEO EIS-TAO, after appropriate tasking by the
Deputy Chief of Staff,
G-6 (DCS, G-6), will
a. Provide centralized
life-cycle management, engineering, purchasing, fielding, testing, evaluating,
accrediting, maintaining, clearing, purging, destroying, and disposal of
IT systems and software supporting HQDA approved SAPs, sensitive activities,
and other Army agencies processing SAR information.
b. Provide technical
advice and assistance in preparing ISRPs, during the PSAP process.
c. Provide technical
support and advice in developing and implementing IMSPs for HQDA-approved
SAPs, sensitive activities, and other Army agencies processing SAR information.
d. Provide technical
support and advice to the CIO/G-6 and the TMO on strategies to securely implement
or prohibit technological advances in IT systems within the Army SAP and
sensitive activities community.
e. Provide life-cycle
management to include programming, budgeting, POM cycle management, engineering,
purchasing, accrediting, fielding, maintaining, disposal, network management
and help desk support for the ASEP.
f.
Engineer/design, field, operate, and maintain
the Army Special Access Tracking System (ASATS) for all Army SAPs as part
of the ASEP.
g. Develop and fund
user training modules for secure operation, proper use, and disposal of ASEP,
ASATS, and other IT systems/components.
h. Provide operational
support in identifying, developing, testing, and evaluating emerging technologies
(both hardware and software) for interoperability and integration into existing
and future IT systems and networks.
i. Provide technical
support and assistance to the
CIO/G-6 and the
DCS, G-2 (for
SCI), in the preparation and approval of the AIS accreditation packages for
all Army SAPs, sensitive activities, and other Army agencies processing SAR
information in accordance with applicable Army and OSD guidance.
j. Provide logistics
support consisting of property accountability and disposal of IT equipment
that processes SAP or sensitive information as defined herein. This support
will primarily consist of the equipment connected to the ASEP system that
processes SAP data and IT systems that operate in a stand-alone mode.
a. The SA will review
and approve the list of designated Army sensitive activities.
b. The SA will biennially
publish guidance for the DAIG and AAA specifying specific areas of interest
during assessments of sensitive activities.
c. The TMO is designated
the HQDA single central office to coordinate, review, and report oversight
of Army sensitive activities and SAPs.
a. The TMO, DAIG,
AAA, SRO, and CID-FIU will regularly schedule inspections and audits of Army
sensitive activities and Army participation in other DOD SAPs and Federal
Agency sensitive activities.
b. Reports of inspections
and audits of sensitive activities will be staffed through the TMO to the
Army executive office.
c. The TMO will co-chair,
with the DAIG, AAA, SRO, and CID-FIU as appropriate, a quarterly review,
with the inspected activity, of open inspection and audit findings. The Director
of the Army Staff will authenticate results of this review.
d. The Director of
the Army Staff will chair an annual executive review with the inspected
activities.
e. For Army SAP programs,
or Army participation in other DOD or Federal agency SAPs, the VCSA will
chair an annual SAPOC review to validate the continuation of the program
as a SAP or Army participation in other DOD or Federal agency SAPs.
f. For Army SAP programs,
the TMO will co-chair with the Director, SAAL-SSP a quarterly PPBERS to review
obligations and disbursements (see app C ).
a. Responsibility to
report. All Army (active, reserve, and National Guard when support
is provided during Federalized service) units have the responsibility to
respond accurately to the annual SAP data call (see app B
).
b. Process. The TMO
report mentioned in paragraph 4-5 provides the basis
to report and register the activity at the TMO. The basis of this report
is an annual reconciliation of the official Army TMO registry, against data
on SAPs and SAP-like activities collected from across the Army during an
annual data call issued by the TMO. The report format for the annual data
call (see app B) will at a minimum consist of a detailed program description
and quad chart (see app D ). The TMO consolidates these
SAP reports and submits them to Office of the Principal Deputy Under Secretary
of Defense (Acquisition and Technology) (OPDUSD(A&T)/Director, Special
Programs), which consolidates the reports of each service for submission
to Congress. These reports collectively become the justification book for
the classified portion of the president's budget. OSD publishes guidance
annually regarding format and suspense dates for SAP reports. It also becomes
the SA annual certification to the Secretary of Defense that
(1) The Army has reported to OSD and Congress every
SAP the Army sponsors.
(2) Any Army involvement in DOD-sponsored programs
is properly reported and registered at HQDA.
(3) The Army has reported to OSD and Congress all
ACCMs and other "SAP-like" control measures.
c. What is reported.
All Army involvement in acquisition, intelligence, operations and support
SAPs; ACCMs; and SAP-like programs (whether they are Army SAPs or Army
participation in other DOD and Federal agency SAPs) must be reported to HQDA,
the TMO, regardless of type, category, sponsor, executive agent, dollar cost,
or level of support. Army participation is defined as receiving resources
from, providing resources to, or supporting other DOD or Federal agency SAPs.
Resources are defined as: information (hard copy or electronic requiring
storage), technology, equipment, facilities, manpower, or funding (see
app B for additional guidance).
d. Sensitive
activities. Army organizations will report those activities that
meet the definition of a sensitive activity (para 1-3a) annually in November
to the TMO.
e. SAPs. Army SAP
directors or managers will report annually in November to the TMO other DOD
or Federal agency SAPs or programs from which the SAP has received resources
or to which the SAP has directly provided resources or supported. This report
is not intended to include "information sharing" when Army SAP documents
are not stored by the other DOD or Federal agency component. Resources are
defined as: information (hard copy or electronic requiring storage), technology,
equipment, facilities, manpower, or funding.
f. Security
incidents. These will be reported in accordance with guidance
in paragraph 5-9 of this regulation.
a. SAP. A SAP is
a security program established under the provisions of Executive Order (EO)
12958 and approved by the Deputy Secretary of Defense to apply extraordinary
security measures to protect extremely sensitive information. SAP status
is defined by
DODD
5200.1-R .
b. PSAP. A PSAP is
an interim security program to apply extraordinary security measures to protect
extremely sensitive information pending approval of SAP status by the Deputy
Secretary of Defense. The Chief, TMO approves PSAP status for Army programs.
a. The
DOD
5220.22-M Supplement Overprint (also referred to as the NISPOM Supplement
Overprint) recognizes three categories of SAPs: acquisition, intelligence,
and operations and support.
b. Acquisition SAPs
protect sensitive research, development, testing, modification, and evaluation
or procurement activities in support of sensitive military and intelligence
requirements. The Army Acquisition Executive is the Army proponent for
acquisition SAPs.
c. Intelligence SAPs
protect the planning and execution of especially sensitive intelligence or
CI units or operations, including the collection, analysis, and exploitation
of intelligence. Intelligence SAPs also protect especially sensitive programs
to procure and exploit foreign materiel. The
DCS, G-2 is
the Army proponent for intelligence SAPs.
d. Operations and
support SAPs protect the planning, execution, and support to especially sensitive
military operations. This type of SAP may protect organizations, property,
operational concepts, plans, or activities. The
DCS, G-3 is
the Army proponent for operations and support SAPs.
a. There are two
types of SAPs, acknowledged and unacknowledged. An acknowledged SAP may be
openly recognized or known, however, specifics within the SAP will be classified.
The existence of an unacknowledged SAP, or an unacknowledged portion of an
acknowledged SAP will be made known only to those personnel properly authorized
to receive the information.
b. Three levels of
SAP protection are applied: Waived SAP; unacknowledged SAP; and acknowledged
SAP. These levels of protection are further explained in
DODD
0-5205.7 and
DODI
0-5205.11 .
c. During the PSAP
process, based on the mission, the program will refer to this regulation
and the NISPOM Supplement Overprint.
a. As soon as an
organization determines that an activity needs SAP protection, it should
request approval to establish a PSAP. MACOM/PEO proponents route PSAP requests
through the MACOM commander (if applicable) and Army Staff proponent to the
TMO using the format shown in appendix E . The TMO reviews
the request and staffs it with the appropriate staff directorate(s). If the
review is favorable, the TMO notifies the proponent in writing of the PSAP
approval. This notification includes PSAP nickname and registration date,
critical program elements, PSAP category and protection level, funding guidance,
and date to present the PSAP to the SAPOC. The Army Staff proponent informs
appropriate activities and organizations of the requirement for increased
security procedures. Once the MACOM/PEO receives PSAP approval, the program
applies selected SAP security controls to the program.
b. PSAP status is
valid for 6 months from the date it is approved by the TMO. During that period,
the MACOM/PEO proponent, the Army Staff proponent, and the TMO determine
whether to recommend SAP status. The SA, through the Army SAPOC, recommends
approval to the Deputy Secretary of Defense. If the Deputy Secretary of Defense
does not approve SAP status within this 6-month period, authority to use
SAP security controls terminates unless OSD has granted an extension in writing.
c. PSAPs will not
obligate funds without written TMO approval. PSAPs will receive only those
minimum obligated funds necessary for program security and administration
until the Deputy Secretary of Defense grants SAP approval.
d. Proponents of
an approved PSAP apply SAP security controls to the prospective program with
one exception: they do not execute indoctrination statements until the SAP
is formally approved. However, to keep track of who knows of the PSAP, the
program office, the MACOM/PEO, and the TMO keep knowledgeability rosters
so that indoctrination statements can be executed if and when SAP status
is approved. If the Chief, TMO has determined that the PSAP will become part
of the Army baseline, it is not necessary to add baseline-briefed personnel
to the knowledgeability roster.
e. The SAP approval
process follows:
(1) The TMO authorizes the PSAP in writing and advises
the VCSA.
(2) The TMO furnishes written notification of the
approval of PSAP status to the Army Staff and MACOM/PEO proponent and other
appropriate Army organizations.
(3) The PSAP program office, MACOM/PEO proponent
and the TMO initiate separate knowledgeability rosters to maintain a record
of all personnel knowledgeable of the PSAP. The program will consolidate
these rosters and include them in the formal PSAP package to the TMO.
(4) The program prepares the necessary supporting
documentation (SCG and PSG, first draft) to request creation of a SAP and
submits it to the TMO prior to being granted PSAP status (see
para 5-8 and app E ). The MACOM/PEO
assists the PSAP program office in coordinating with the working SAPOC members
as indicated below.
(5) The ASA(ALT) evaluates the proposed acquisition
strategy and acquisition plan for acquisition SAPs.
(6) The ASA(ALT) conducts a technology feasibility
review for acquisition SAPs. This may be done through the appropriate MACOM
or directly with the PEO.
(7) The ASA(ALT),
DCS, G-3 ,
and DCS, G-2
evaluate the availability of funds, manpower, and reprogramming actions
for acquisition SAPs, operations and support SAPS, and intelligence SAPs,
respectively.
(8) The
CIO/G-6 validates
information management and secure communications requirements for the PSAP
and ensures these requirements are documented in the ISRP. The PSAP requestor
must include the ISRP as an appendix the initial PSAP package. The CIO/G-6
will task TAO to accomplish a site review to ensure compliance with standards
for compartmented information and assist the PSAP primary security officer
with creating all necessary accreditation documentation. IT systems used
by the PSAP will normally consist of secure voice, secure fax, and standalone
computer workstation(s) or local area network systems, and connection to
ASEP.
(9) The DCS, G-2 ensures USAINSCOM conducts an
assessment of the foreign collection threats to the program, and provides
a CI assessment of the program's vulnerability to that collection threat.
The DCS, G-3 ensures the program conducts force protection and OPSEC assessments,
using the intelligence and vulnerability assessments as a base for evaluation.
(10) The
DCS, G-1
evaluates the personnel assets required and conducts a personnel
affordability and supportability assessment.
(11) TJAG and OGC provide legal and policy evaluations.
(12) If applicable, the
DCS, G-4
evaluates the proposed SAP materiel development or acquisition plan in
light of integrated logistics support.
(13) The
DCS, G-8 , SAAL-SSP,
and ASA(FM&C) evaluate the proposed funding profile required and conduct
an affordability assessment.
(14) The TMO schedules the Working SAPOC to meet
within 90 days of granting a program PSAP status. The MACOM/PEO proponent
briefs the Working SAPOC on the PSAP, and the appropriate Army Staff elements
brief the Working SAPOC on the results of their detailed evaluations.
(15) The TMO schedules the SAPOC to meet at a date
between 10 and 30 days after theWorking SAPOC. The MACOM/PEO briefs the SAPOC.
If the SAPOC approves the program for SAP status, the TMO prepares a memorandum
to SA recommending submission of the PSAP through the OSD-level SAP central
office to the OSD SAPOC for SAP approval. This memorandum sets forth the
enhanced security measures intended for the SAP, any upgrade of adjudicative
requirements that may be intended, the SAPOC minutes, the report of establishment
of the SAP, and the congressional notification letters.
(16) If the prospective SAP deals with special
operations/low intensity conflict activities, the SA memorandum must be
coordinated with ASD Special Operations/Low Intensity Conflict before submission
to the respective OSD-level SAP central office.
(17) The TMO, with the staff proponent office or
the PD/PM, briefs the OSD senior review group. The OSD senior review group
recommends SAP approval and scheduling for the OSD SAPOC.
(18) The TMO, with the staff proponent office or
the PD/PM, briefs the OSD SAPOC. If the OSD SAPOC approves the SAP, the Deputy
Secretary of Defense notifies Congress. The PSAP becomes a SAP 30 days after
congressional notification unless Congress raises an objection.
a. Maintenance of Army-executed
SAPs. Maintenance of Army-executed SAPs includes periodic reviews
by senior leaders at HQDA; audits, inspections and investigations by DOD
and Army agencies; the management control program as executed in accordance
with the management control evaluation checklist (see app
O ); and the internal review and audit control program (under provisions
of
AR 11-7 as modified by this regulation).
b. Annual reports.
(1) Army organizations will report those activities
that meet the definition of a sensitive activity (para 1-3a) annually in
November to the TMO in accordance with paragraph 3-3c(1) of this regulation.
(2) Army SAP PDs/PMs or managers will report annually
in November to the TMO, other DOD or Federal agency SAPs or programs from
which the SAP has received resources or to which the SAP has directly provided
resources or supported, in accordance with paragraph 3-3c(1) of this regulation.
c. Reviews.
(1) SAPOC. The SAPOC oversees the establishment,
management, support, and disestablishment of SAPs.
(a) Composition. The SAPOC is a general officer-level
forum chaired by the VCSA. In the VCSA's absence, the senior standing member
of the SAPOC serves as chairman. The standing members of the SAPOC are the
ASA(ALT), OGC,
G-2 ,
DCS, G-3 ,
DCS, DAIG, and TJAG. Frequently invited members include the ASA(FM&C),
CIO/G-6 ,
DCS, G-4 ,
DCS, G-8 ,
DCS, G-1
, Chief of Engineers, program analysis and execution, CLL, Auditor General,
AMC, U.S. Army Criminal Investigation Division Command (USACIDC) and USAINSCOM.
(b) Executive secretary. The Chief, TMO is the
executive secretary of the SAPOC.
(c) SAPOC reviews. The SAPOC
(1) Reviews requests for the establishment,
restructure and disestablishment of SAPs and forwards these requests with
appropriate recommendations to SA.
(2) Reviews existing programs annually to determine
whether to revalidate them as SAPs.
(3) Reviews and recommends policy for management
of SAPs.
(d) Meetings. The committee meets at the call
of the chairman. Generally, the SAPOC meets monthly to review selected programs
so that all Army programs receive an annual review. The TMO prepares minutes
after each meeting, submits the minutes to VCSA for approval, and furnishes
copies of the minutes to all standing and invited members of the committee,
as requested.
(e) Costs. Costs of travel, per diem, and overtime
related to the SAPOC are the responsibilities of individual attendees and
their organizations.
(f) Working SAPOC. The Chief, TMO chairs the
Working SAPOC. The Working SAPOC is primarily a security review and as such
should be attended at a minimum by a program's PD/PM and program security
manager (PSM). Standing members include points of contact from SAAL-SSP,
the DCS, G-2, DCS, G-3, DAIG, TJAG, CIO/G-6, and OGC. Other attendees include
POCs from each of the major Army Staff elements and HQ Intelligence Command/902d
MI Group, AMC, DSS, and the AAA. The working SAPOC reviews each program prior
to its presentation to the SAPOC (format for the SAPOC briefing is shown
in app F ). During its review, the working SAPOC identifies
issues and formulates recommendations to present to the SAPOC.
(2) The SAP Program Performance and Budget Execution
Review System (PPBERS) Committee.
(a) Purpose. The SAP PPBERS Committee provides
oversight of SAP program and budget accomplishments. It convenes at the call
of the chairperson when special SAP budgetary or funding issues arise.
(b) Composition. Standing members of the committee
are the TMO, ASA(ALT), OGC, ASA(FM&C),
DCS, G-2 ,
DCS, G-3 ,
DCS, G-8 , and TJAG.
Additional members may include the
CIO/G-6 ,
DCS, G-4 ,
DCS, G-1
, Chief of Engineers, CLL, AAA, and DAIG, depending on the agenda. The
committee's executive secretary is the Chief, TMO. The executive secretary
will submit the results of the Working SAP PPBERS Committee to the VCSA and
the Undersecretary of the Army twice annually (the second and fourth quarter
of the fiscal year). The Under Secretary of the Army and the VCSA will jointly
authenticate the committee minutes.
(c) PPBERS review. The PPBERS reviews
(1) Overall program performance objectives.
(2) Obligation and disbursement data.
(3) Budget year issues or problems.
(4) Deviations from planned performance and
HQDA goals.
(5) Recommended corrective actions or reprogramming
of funds.
(d) Administrative support. The TMO provides
administrative support to the SAP PPBERS Committee
(e) Working PPBERS Committee. The Chief, TMO
chairs the working PPBERS Committee. It consists of representatives from
those staff agencies identified for the Executive PPBERS committee and other
activities and organizations invited by the Chief, TMO. The Working PPBERS
committee has the same general purpose as the executive PPBERS Committee
However, the working PPBERS committee is a recurring forum, meeting quarterly
to compare actual program performance with HQDA goals. Two weeks prior to
meetings of the working PPBERS committee, the SAP proponent, through the
MACOM, submits data to the TMO in the format given in appendix
C .
(3) Fix-It Committee.
(a) Purpose. The Fix-It Committee provides oversight
of sensitive activities, SAP audits and inspections. It convenes annually
to brief the Director of the Army Staff on progress made during the year
to resolve issues and correct deficiencies identified in audits and inspections.
Also reviewed are the SA areas of interest for possible trends, and a review
of the next fiscal year SA areas of interest.
(b) Composition. The Fix-It Committee is a general
officer forum chaired by the Director of the Army Staff. Standing members
are the ASA(ALT), ASA(FM&C), OGC,
DCS, G-2 ,
DCS, G-3 ,
TJAG, AAA, DAIG, DCS,
G-8 , and the USACIDC. The VCSA or the Director of the Army Staff designates
other members of the Fix-It Committee based on the agenda for a specific
meeting. Additional attendees may include representatives of the DCS, G-8,
CIO/G-6 ,
DCS, G-4 ,
and DCS,
G-1 and the CG, USAINSCOM; CG, AMC; CG, Military District of Washington;
and the Chief of Engineers. The Chief, TMO is the executive secretary of
the Fix-It Committee.
(c) Support. The TMO provides administrative
support to the Fix-It Committee.
(d) Working Fix-It Committee. The Chief, TMO
co-chairs the Working Fix-It with the DCS, G-2, DAIG, AAA, SRO, and FIU.
It meets quarterly to review actions taken to resolve findings from audits
and inspections. Respondents brief their open findings and the committee
decides whether actions taken by the respondents are adequate to close the
finding. Two weeks prior to a meeting of the working Fix-It Committee,
respondents provide the TMO with fix-it status sheets (see app
G ). If a respondent is recommending that a finding be closed, the respondent
must coordinate that recommendation with the issuing audit or inspection
organization prior to the meeting of the working committee. Additionally,
if the respondent is recommending closure of an audit finding, the respondent
must provide the results of the followup IRAC review (under provisions of
AR 11-7 ).
d. Audits. Audits
are detailed examinations of any SAP and or sensitive activity following
generally accepted auditing standards issued by the General Accounting Office
(GAO). Audits include financial audits, performance audits (economy and
efficiency audits, program audits), and the SA special area of interest.
(1) Internal audits. Internal audits include those
performed by the AAA as well as those done by IRACs. All Army SAPs and or
sensitive activities are subject to internal audit. The TMO integrates the
AAA audit plan with the DAIG inspection schedule, the SAPOC schedule, and
external audit and inspection requirements to minimize duplication of effort.
In developing their audit plans, IRAC organizations with SAP responsibilities
should contact the TMO to gain an appreciation of recent and planned audits
and inspections of their program.
(2) External audits. Organizations outside the Army
conduct external audits. These include the GAO, Office of the Inspector General,
and the Defense Contract Audit Agency. The TMO functions as the entry point
for all SAP-related external audits entering Army channels except standard
Defense Contract Audit Agency (DCAA) contract support audits. The TMO notifies
the cognizant MACOM SAP central office or IRAC after being notified of an
external audit. The TMO also ensures the Army provides written response to
draft external audit reports in a timely manner.
(3) Coordination. SAP proponents and program offices
coordinate directly with Defense Contract Management Agency and the DCAA
for contract audits as well as accounting and financial advisory services
regarding contracts for Army SAPs.
(4) Findings. Findings from AAA audits, DAIG
inspections, and SRO reviews of SAPs and sensitive activities and all non-Army
(for example, DAIG and the GAO) audits of Army SAPs and sensitive activities
are addressed in the fix-it process.
e. Inspections.
(1) The DAIG conducts inspections of SAPs and sensitive
activities under the authority of
AR 20-1 . These inspections include an assessment of
compliance with AR 380-381, command and control, program management, financial
management, security, contract management, intelligence oversight and SA
special areas of interest. DAIG inspectors will have full access to Army
participation in other component SAPs, to ensure complete reporting to the
SA.
(2) The Department of Defense Inspector General
(DODIG) or other DOD agencies conduct audits and inspections of SAPS or sensitive
activities on the basis of special concerns or unusual events. Programs should
coordinate with the TMO before contacting any DOD agencies concerning
inspections.
(3) The ASA(ALT), U.S. Army Contracting Agency,
conducts procurement management reviews of secure environment contracting
in support of SAPs and sensitive activities.
(4) USAFMSA conducts biennial manpower management
reviews. No later than 120 days prior to their annual SAPOC, SAP PDs/PMs
coordinate a manpower and workload validation with the USAFMSA SAP representative
to accommodate an onsite visit if USAFMSA deems it necessary. The PD/PM reports
findings of the USAFMSA during the annual SAP revalidation at the SAPOC.
(5) The SRO conducts quality assurance reviews of
financial activity under the authority of
AR 11-37 . SRO refers any serious or repeat deficiency
to the Fix-It Committee for resolution. SRO reviews the finance and accounting
offices that have sensitive support missions annually and quarterly reviews
those that have special mission funds.
(6) DSS conducts industrial security reviews of
contractors having SAP-related contracts. These DSS inspections cover security
vulnerabilities, compliance with security plans and contracts, security
violations, and security compromises.
(7) Army organizations responsible for SAPs are
required to include SAPs in their organizational inspection programs.
f.
Investigations.
(1) Each PD/PM, commander, or director of a SAP
or sensitive activity must publicize procedures for reporting fraud, waste,
abuse, and corruption without compromising sensitive information. The DAIG
Intelligence Oversight Office is the designated agency for these matters.
(2) When audits or inspections uncover criminal
wrongdoing or suspected wrongdoing, the lead inspector or auditors must notify
the TMO and the FIU, USACIDC, immediately.
(3) The DODIG and GAO also have investigative branches.
Before a DODIG or GAO investigation, the TMO must be notified. The TMO will
facilitate the granting of necessary SAP access for these investigations.
(4) Security related incidents involving SAPs are
investigated and reported in accordance with
AR 380-5 and SAP security guidelines. Items of CI interest
will be investigated by USAINSCOM in accordance with
AR 381-12 ,
AR 381-20 , and SAP security procedures. Summaries of
all CI investigations involving SAPs will be provided to TMO security. A
copy of the results of an investigation under the provisions of
AR 15-6 , involving SAP security-related incidents,
will be provided to the TMO and
DCS, G-2
within 30 days of approval by the appointing authority.
(5) PDs/PMs, commanders, or directors of Army SAPs
will immediately report all instances of suspected criminal activity in or
against a SAP through appropriately cleared channels to the FIU, USACIDC.
(6) Each SAP will have a written OPSEC program plan
from conception to disestablishment. The OPSEC survey is a method used to
determine what the critical information is and if there is adequate protection
of critical information during planning, preparation, and execution.
(a) OPSEC programs use the following evaluation
steps, but do not have to follow them in any particular sequence:
(1) Identification of critical elements.
(2) Analysis of the threat.
(3) Analysis of vulnerabilities.
(4) Assessment of risks.
(5) Applications of appropriate countermeasures
(OPSEC measures).
(b) The objective of the OPSEC survey is to identify
vulnerabilities in the program's operations or activities that an adversary
could exploit.
(c) The OPSEC survey checks how well a unit executes
its plan to protect critical program information. To be effective, an OPSEC
survey requires careful prior planning, thorough data collection, and thoughtful
analysis.
(d) The OPSEC survey attempts to reproduce the
intelligence that a specific program projects. From that image it identifies
exploitable information and sources. The objective of the survey is to assist
the PD/PM in identifying and correcting weaknesses, which could disclose
critical program information. The survey is conducted annually and a written
memorandum will be maintained identifying the results and findings. The program
is responsible for the conduct of this annual survey. USAINSCOM CI assets
may be called upon to assist in the process, but in accordance with
AR 530-1 , the program will use its own resources to
conduct the survey.
g. Management control
program. If Army participation in another DOD or Federal Agency
SAP requires deviation from the participating Army unit's management control
plan, the SAP sponsor will address the deviation in an MOA between the unit
and the SAP sponsor.
h. Internal review and audit
compliance program.
(1) The IRAC program (under provisions of
AR 11-7 ) applies to SAPs with the modification that
MACOMs that have established SAP central offices are authorized to designate
these offices as the focal point for SAP audits. In this capacity, SAP central
offices
(a) Serve as the POC for SAP audits by agencies
external to the MACOM.
(b) Secure support from MACOM IRAC offices to
assist during audits by agencies external to the MACOM. This assistance may
include liaison with external auditors, coordinating audit results, and audit
follow-on.
(c) Ensure that SAPs are included in the auditable
entity files of the responsible IRAC office.
(2) MACOMs/PEOs or Army Staff POCs responsible for
a SAP will
(a) Ensure that the SAP has adequate IRAC support,
including accessed auditors at supporting IRAC offices, to meet command and
program audit needs. The MACOM/PEO/Army Staff can arrange this support from
internal assets or from other DOD organizations capable of providing audit
support at SAP locations.
(b) Coordinate IRAC coverage when multiple commands
or installations have overlapping responsibility for a single SAP or sensitive
activity.
i. Restructure.
(1) SAPs may require restructuring to:
(a) Create a new subcompartment.
(b) Disestablish an existing subcompartment.
(c) Alter an existing charter or create a new
one.
(d) Change security requirements.
(2) A SAP PD/PM desiring to restructure the SAP
will submit a memorandum through the chain of command to the TMO. The memorandum
will include the specifics of the restructure, the reason for the restructure,
and a statement regarding impact on security, manpower, or funding, and a
POC for the restructure.
(3) The TMO reviews and staffs the request. If the
TMO determines that the proposed restructure does not change the scope or
mission of the SAP, the Chief, TMO can approve the restructure. If the Chief,
TMO determines that the restructure changes the scope or mission of the SAP,
the TMO will staff the proposed restructure through the Army leadership.
If the Army leadership concurs with the proposed restructure, Chief, TMO
will submit the proposed restructure to the OSD-level SAP central office
for their recommendation for approval by the Deputy Secretary of Defense.
j. Training. PSMs
follow the guidance in AR 380-5,
paragraph 9-12 . Additionally, Army SAP security personnel
must complete the DSS Academy basic course curriculum for SAP security
professionals within 12 months of assignment to a SAP or SAP oversight/support
office (for example, the TMO; DAIG;
DCS, G-2 ;
AMC, G-2; and so on). Security personnel who have been assigned continuous
full-time duties as an Army PSM for 5 or more years may request a waiver
to this requirement from the TMO. The DCS, G-2 will act as the quota manager
for Army positions and will verify accomplishment of DSS Academy set
prerequisites prior to forwarding student attendance requests to the DSS
Academy. Changes to required coursework for SAP security professionals will
be published by the TMO (in coordination with the DCS, G-2) as required.
a. Removal of SAP security
controls. The Army Staff/MACOM/PEO proponent recommends a SAP
for disestablishment when the SAP no longer requires extraordinary security
controls. The SAPOC may also identify a SAP for disestablishment at the annual
revalidation. Disestablishment does not equate to program cancellation. It
means removal of SAP security controls from the program.
b. Rationale. Rationale
for the disestablishment of a SAP includes, but is not limited to
(1) The research, development, test, and evaluation
procurement, training, or other requirements during a program's life cycle
significantly increase the number of personnel requiring knowledge.
(2) The tactical or strategic impact or value of
the system, operation, or activity lessens significantly from when it was
first established.
(3) Technological advances required to develop,
produce and field a system have not, or will not, reach the required levels.
(4) The resources required for continued enhanced
security procedures are excessive compared to the benefits achieved by continuing
to maintain SAP status.
(5) Other services or foreign nations are developing
similar technology or applications without equivalent levels of protection.
(6) A security compromise negates the protection
achieved by continued use of enhanced security.
(7) The program has met the tactical or strategic
mission of the system, operation, or activity and there is no further mission
requirement.
(8) The Army has fielded the system and operational
use at the tactical or strategic levels precludes continued use of extraordinary
security measures.
(9) The Army established the SAP to protect an
identified vulnerability but countermeasures have been developed eliminating
the vulnerability.
c. Procedures.
(1) Throughout the planning for SAP disestablishment,
the program limits knowledge of this considered course of action until the
Deputy Secretary of Defense approves the disestablishment and notifies Congress.
(2) Prior to recommending SAP disestablishment,
the MACOM/PEO conducts a risk assessment of the potential for compromise
of program information and the effects of such a compromise if SAP controls
are removed.
(3) The MACOM/PEO develops a disestablishment concept
(see app H ), staffs it with the MACOM/PEO for review
and concurrence, then submits it to the TMO.
(4) After favorable review by the PEO MACOM, the
TMO schedules the SAP disestablishment as a SAPOC topic. The SAPOC forwards
its recommendation to the SA.
(5) If the SA recommends disestablishment, the TMO
will forward the SA recommendation to OSD with congressional notification
letters. If Congress does not object within 14 days, the TMO notifies appropriate
Army Staff, MACOMs, and PEOs that disestablishment has been approved and
the program commences disestablishment actions.
(6) Disestablished SAPs return to the normal oversight
system within 6 months of approval to disestablish. After disestablishment,
the responsible MACOM/PEO certifies to the TMO that the actions specified
in appendix I have been accomplished. The TMO refers
to the Fix-It Committee for followup on all SAPs not completing disestablishment
actions and gaining certification (under provisions of app I) as disestablished
by the end of the 6-month period.
a. A DOD or other
Federal agency SAP for which the Army is designated the executive agent is
considered an Army SAP for purposes of this regulation and will fully comply
with this and all other Army regulations.
b. Army organizations
may participate in SAPs sponsored and executed by non-Army organizations
without establishing a separate Army-executed SAP. However, the Army organization
and the SAP sponsor must establish, and keep current, a MOA.
c. No DA organization,
command, activity, or individual will negotiate an MOA with any non-DOD activity
without prior coordination with the TMO. After the MOA has been drafted,
it will be forwarded to the TMO for review and approval prior to it being
signed by the Army entity entering into the MOA. These programs will be managed
based on their individual requirements and may have more limited access than
the Army baseline billet structure. All MOAs, including Army entities and
DOD activities, will be forwarded to the TMO for review.
d. The MOA must minimally
address program access, security, oversight, and financial resourcing and
management. At a minimum, the other DOD component or Federal agency must
consent to approve access when required for the following personnel:
(1) SA.
(2) Under Secretary of the Army.
(3) General Counsel, Deputy General Counsel, and
a special programs staff officer.
(4) Chief of Staff, Army.
(5) Vice Chief of Staff, Army.
(6) Appropriate principals of HQDA staff (for example,
the DCS, G-3
, DCS,
G-2 , ASA(ALT)).
(7) DAIG; Chief, Intelligence Oversight Division;
and appropriate intelligence oversight division action officers.
(8) TJAG and a special programs staff officer.
(9) The Chief, TMO; the Deputy Chief, TMO; the Director
of Security; the legal advisor; the finance officer; and appropriate action
officers.
(10) The SAAL-SSP Director, Deputy Director, and
appropriate action officers.
(11) AAA auditors as required.
(12) Appropriate principals of MACOM/PEO staff.
e. Any involvement
in DOD or Federal agency SAPs that does not afford at least the minimum access
defined above is prohibited unless the SA approves a specific exception in
writing. Requests for waivers are forwarded, with the proposed MOA, through
the appropriate MACOM/PEO activity to the Chief, TMO, for approval by the
SA.
f. This restriction
is not intended to limit the Army SAP PD/PM from providing SAP information
to any properly cleared individual with a need-to-know when Army SAP documents
are not stored by the other DOD component or Federal agency.
g. The MOA will comply
with the format of
AR 25-50 and includes the effective date and requirement
for biennial review. Army MOA signature authority is based on the level of
agreement. MOA/Memorandums of Understanding (MOUs) for annual support should
be in accordance with
DOD
Instruction 4000.19 , Interservice and Intergovernmental Support. Work
performed on a reimbursable basis should be in accordance with DOD 7000.14-R,
volume 11,
chapter
1 .
h. There are occasions
when the Army withdraws from SAPs but the programs continue to be managed
as SAPs by other agencies. In these cases, Army follows the procedures set
forth by the SAP sponsor for termination. While the program is still an approved
SAP, the Army protects the special access information in accordance with
the existing program security plan.
i. Army support to
other DOD and Federal agency SAPs is governed by
DODD
S-5210.36 .
j. See
paragraph 5-2 of this regulation and the NISPOM Supplement
Overprint for use of co-utilization agreements when SAPs from multiple programs
are stored in a single location.
Army SAPs will implement the provisions of the NISPOM Supplement Overprint
to ensure consistency within the Army, DOD, and industry. Conflicts among
Army intelligence, security regulations,
DOD
5220.22-M ,
DOD
5220.22-M Supplement , and the NISPOM Supplement Overprint will be resolved
by the TMO. All reference to a program security officer within the DOD 5220.22-M
Supplement and the NISPOM Supplement Overprint is intended to identify the
individual assigned as the Government program security manager for a specific
program. With respect to SAP security guidance, in cases involving policy
clarification, conflicts, or incomplete guidance, written requests must be
submitted to Director of Security, TMO. Written procedures or guidance will
be provided to the PM/PSM within 30 days.
a. Security level.
All Army SAP information will be stored in an accredited SAP facility (SAPF).
A SAPF is an area, room, building, or installation that is accredited to
store, use, discuss or electronically process SAP information. MOAs
(co-utilization agreements) are required prior to allowing other SAPs to
share spaces. SAP security managers are required to accredit (in writing,
documenting each standard prescribed below) all facilities to be used as
SAP facilities for their program, to include discussions, storage, and AIS
processing. As a general rule, SAPs base the level of physical security on
the classification level of the information processed or stored by the SAP.
The first SAP in the space is the senior SAP and will act as the cognizant
security authority for the space unless an alternate arrangement is specified
in the co-utilization agreement. The standards prescribed in the following
paragraphs pertain to continental U.S. SAPFs. SAPFs operating outside the
continental United States must meet the same minimum standards prescribed
for continental U.S. facilities as well as the standards prescribed in AR
380-5,
paragraph 7-7 . All Army SAPFs have 12 months from the
effective date of this publication to meet the physical security standards
prescribed herein.
(1) SAPs processing or storing TOP SECRET/SAR,
unacknowledged, or SCI adhere to standards established by Director, Central
Intelligence Directives (DCID) 6/9 and the applicable requirements of DOD
S-5105.21M-1. If a SAP is co-utilizing an SCI facility, the SAP security
manager must do so with the agreement of the cognizant senior official
intelligence community for the facility or a designee. A MOA will be entered
into between the senior official intelligence community and the SAP security
manager for security administration within the facility. This does not preclude
an Army office from establishing SCI standards (that is, establishing a DCID
for a SAP if the risk assessment completed for the PD/PM establishes the
requirement).
(2) SAPs processing or storing SECRET/SAR that do
not contain unacknowledged or SCI will establish a SAPF using the following
physical standards.
(a) Floor, walls, and roof. The walls, floor,
and roof construction of SAPFs must be of permanent construction materials
(plaster, gypsum wallboard, metal panels, hardboard, wood, plywood, or other
materials offering resistance to, and evidence of, unauthorized entry into
the area). Perimeter walls will be extended from the true floor to the true
ceiling and attached with permanent construction materials.
(b) Ceiling. The ceiling will be constructed
of plaster, gypsum, wallboard material, hardware, or other similar material
that the command security manager judges to be of equivalent strength.
(c) Doors.
(1) The access door to the room will be constructed
of wood or metal. Acceptable types of doors are:
(a) Solid wood core door, a minimum of 1-3/4
inches thick.
(b) Sixteen-gauge metal cladding over wood
or composition materials, a minimum of 1-3/4 inches thick (the metal cladding
will be continuous and cover the entire front of the door).
(c) Metal fire or acoustical protection doors,
a minimum of 1-3/4 inches thick (a foreign manufactured equivalent may be
used if approved by the General Services Administration (GSA)).
(d) A joined metal rolling door, minimum of
22 gauge, used as a loading dock or garage structure must be approved case
by case.
(2) The hinge pins of out-swing doors will be
pinned, brazed, or spot-welded to prevent removal.
(3) The access door will be equipped with a
built-in GSA-approved combination lock.
(4) For open storage areas approved under previous
standards, the lock can be the previously approved GSA combination lock.
However, upon retrofit, the door must be fitted with a GSA combination lock.
(5) Doors, other than the access door, will
be secured from the inside, for example, by using a deadbolt lock, panic
deadbolt lock, rigid wood or metal bar that extends across the width of the
door, or any other means that will prevent entry from the outside. Key operated
locks that can be accessed from the exterior side of the door are not authorized.
(d) Windows. Windows that are less than 18 feet
above the ground when measured from the bottom of the window, or are easily
accessible by means of objects directly beneath the windows, will be constructed
from or covered with materials that will provide protection from forced entry,
and must be permanently sealed. The protection provided to the windows need
be no stronger than the strength of the contiguous walls.
(e) Openings. Utility openings, such as ducts
and vents, will be kept at less than a person-passable, 96-square-inch opening.
Openings larger than 96 square inches will be hardened in accordance with
DCID 6/9 (para 3.3.4), which provides guidance to ensure that appropriate
physical security considerations are included in the design of facilities.
(f) Sound. All SAPF perimeter walls will meet
Sound Group 3 ( sound transmission class of 45 or better, where loud speech
can be faintly heard but not understood and normal speech is unintelligible),
unless additional protection is required for amplified sound. If compartmentation
is required within the SAPF, the dividing office walls must meet Sound Group
3.
(g) Establishing SAPFs. The following
Government/military personnel are authorized to establish Army SAPFs, SAP
secure working areas (no storage authorized), and temporary secure working
areas (temporary use as a SAPF): SAP security managers (for their program);
Chief, TMO (all Army programs); Director of Security, TMO (all Army programs);
Director, SAAL-SSP (all Army Acquisition programs); and security manager,
SAAL-SSP (all Army Acquisition programs).
(h) TOP SECRET/SAR, unacknowledged or SCI SAPs located
inside a tenant SCIF. Constructing a SAPF to DCID 6/9 standards inside
a tenant SCIF is not required if a determination (in writing) has been made
by an authorized command official (PD/PM or PSM) that a facility's security
program consists of layered and complementary security controls sufficient
to deter and detect unauthorized entry and movement within the facility (security
in depth). Examples include, but are not limited to use of perimeter fences,
employee and visitor access controls, use of an intrusion detection system,
random guard patrols throughout the facility, especially during nonworking
hours, closed circuit video monitoring, or other safeguards that mitigate
the vulnerability of unalarmed storage areas and security storage cabinets
during nonworking hours. If all personnel working in the SCIF are not briefed
to the SAP, and the PD/PM or PSM has determined that security in depth exists,
the SAPF must meet only the standards prescribed in
paragraph 5-2a(2)(a) through
(g) .
(i) Inactive SAPF. If a previously accredited
SAPF becomes inactive for a period not to exceed 1 year, the SAP accreditation
will be reinstated (in writing by the PSM) by the gaining accrediting agency,
provided the following is true:
(1) The threat in the environment surrounding
the SAPF has not changed.
(2) No modifications have been made to the SAPF
that affect the level of safeguarding.
(3) The level of safeguarding for the new program
is comparable to the previous program.
(4) The SAPF has not lost its SAP accreditation
integrity and the Government has maintained continuous control of the facility.
(j) Intrusion detection systems. SAP facilities
must comply with the requirements outlined in DCID 6/9, annex B.
b. Risk assessment.
(1) PDs/PMs of SAPs will conduct risk assessments
to determine the physical security standards (using para
5-2a(1) and (2) ) for program
facilities.
(2) Program offices coordinate this risk assessment
with supporting USAINSCOM CI elements and include the results in their SAP
security plan.
(3) The risk assessment incorporates
(a) Counterintelligence assessment. The CI assessment
is an indepth analysis of the program's vulnerability to foreign collection
efforts.
(b) Program security assessment. PDs/PMs will
review information from the CI assessment and the OPSEC assessment to determine
whether the program requires further technical protection. If required, the
PD/PM will request a TSCM survey.
c. Two-person
integrity. See the NISPOM Supplement Overprint, paragraph 1-204.
d. Entry/exit
searches. MACOM/PEOs, program offices, and the SAP central office
for the Army may establish entry/exit programs in accordance with
AR 380-5 and
DOD
5220.22-M .
a. Authorization.
The TMO is the only office authorized in the Army to store in one location
a list or compilation of all Army SAPS to include a briefing that outlines
all Army SAPs, or all Army SAPs in a single category (without waiver). In
order to avoid the compromise of a significant portion of Army SAPs, Government
and contract organizations are prohibited from assembling, in a single reference,
a significant compilation of Army SAP programs. A single reference includes,
but is not limited to, briefing books, reference books, reference lists,
and "cheat sheets." A significant compilation is the assembly of documents
for five or more SAPs. This prohibition is not intended to preclude the
centralized storage of documents from a significant number of SAPs (five
or more) when information from different SAPs are stored separately and not
assembled into a single reference. Requests for exception will be submitted
to the TMO for approval or disapproval.
b. Marking. Authors
of classified information will mark documents in accordance with
AR 380-5 and the NISPOM Supplement Overprint.
c. Transmission.
SAP material will be transmitted in accordance with NISPOM Supplement Overprint
procedures in paragraph 5, section 4-00.
d. Dissemination.
Programs must not release any classified SAP information to the public or
to any individual not approved for access without written approval from the
SA. Additionally
(1) All requests for congressional access or access
by other Government agencies must be staffed through the TMO for approval
by the appropriate OSD SAP central office. Army SAP PDs/PMs, or subordinates
are not authorized to grant access to Members of Congress or their professional
or personal staffs.
(2) DOD grants SAP access to select members of Congress
and their staffs. When indoctrinating these individuals, access approval
authorities use the procedures outlined in chapter 6 of
this regulation with the exception that DOD directives do not require members
of Congress to execute indoctrination statements. Offices that routinely
provide congressional briefings or SAP documents to Congress (for example,
the ASA(ALT)) maintain rosters of congressional members and their staffs
granted access to SAP material and ensure that SAP security managers receive
the information needed to keep their access rosters current.
(3) SAP managers and their supporting contracting
officers prohibit contractor release of SAP information by using contract
security classification specifications issued for each SAP-related contract.
Item 12 of
DD
Form 254 (Department of Defense Contract Security Classification
Specification) must state, "Public release of information concerning any
aspect of this contract is prohibited."
(4) Programs coordinate with MACOM/PEO and the TMO
for advice and assistance on all Freedom of Information Act (FOIA) requests
for SAP information.
(5) Programs and contractors will not release
information pertaining to an Army SAP to the Defense Technical Information
Center (DTIC) or any other information service. Programs must include this
restriction in DD Form 254.
(6) Patent applications containing SAP information
are submitted through ASA(ALT) to the TMO for VCSA approval prior to submission
to the U.S. Patent and Trademark Office. The contractor must notify the
contracting officer 30 days in advance before filing a patent classified
at the SECRET or higher level. The Government cannot stop a contractor from
filing a patent. However, the Government can recommend the imposition of
a secrecy order to the Patent Commissioner. To seal a case, the Patent Office
requires the signature of an assistant secretary or higher. If a release
in judicial proceedings is anticipated, the Chief, TMO will notify the Director,
OSD SAPCO, of the proposed release of SAP information.
e. Physical construction
standards. See 5-2a(1) and
(2) for guidance.
f. Destruction.
Responsible offices destroy SAP material in accordance with
AR 380-5 , the NISPOM Supplement Overprint,
AR 25-400-2 , and applicable program security classification
guides.
g. Archiving. The
TMO has the Army charter to archive and maintain a central repository for
information related to SAPs and sensitive activities. Program offices maintain
files and records in accordance with AR 25-400-2 and send SAP related documents
to the TMO for archiving.
h.
Accountability.
(1) Special access status does not add additional
accountability inventory requirements to those specified in AR 380-5
(2) Contractors account for documents in accordance
with the PSG and the NISPOM Supplement Overprint (in situations where the
two conflict, the more restrictive guidance applies until the conflict is
resolved by the TMO).
(3) Program PSGs set forth the accountability procedures
for each program.
i. Receipting. Use
classified information receipts for all TOP SECRET documents per
AR 380-5 . Documents classified SECRET/SAR and below
do not require a receipt unless mailed or couriered outside the command,
in which case transmitters and recipients follow the provisions of AR 380-5
and paragraph 5-3l.
j. Reproduction.
Special access status does not add additional Army restrictions on reproduction
to those specified in AR 380-5 and the NISPOM Supplement Overprint.
k. Courier. The PSM
will follow the courier instructions provided in AR 380-5,
chapter 8 . Additionally, personnel acting as couriers
of SAP material, whether inside or outside the continental United States,
must transport, directly and without delay, SAP material from one SAPF to
another SAPF. While transporting the material outside of a SAPF, designated
couriers will not open, examine, read, or otherwise expose SAP information
while in any public or private area (hallways, places of business, public
conveyance, and so on). A comprehensive list (
DA
Form 3964 (Classified Document Accocuntability Record)) of all material
transported, to include titles for all documents contained on AIS media,
will be prepared by the PSM (prior to courier departure). Couriers will receive
a courier briefing (which will include the information provided in AR 380-5,
as well as the information listed in this paragraph) prior to being authorized
to courier SAP material. Couriers are required to sign a statement acknowledging
the fact that they have received the briefing. PSMs will retain a copy of
the signed courier acknowledgement for 24 months.
a. Clearances. The
Army grants access to SAP information based on requirements in
AR 380-5 , the NISPOM Supplement Overprint, and
DOD
O-5205.7 . At a minimum, the following standards apply:
(1) Standard for TOP SECRET and SECRET. Candidates
must meet the standards prescribed in DOD O-5205.7 and must have a clearance
current within the past 5 years (entry national agency check and national
agency check with inquiries investigations and INTERIM Clearances do not
qualify for SAP access).
(2) Exceptions. If a candidate for access to a TOP
SECRET or SECRET SAP possesses a qualifying clearance older than five years,
an access approval authority may approve the candidate for access to the
SAP as long as ALL of the following information/actions are true/taken:
(a) The candidate meets the standards prescribed
in DOD O-5205.7, a periodic reinvestigation has been submitted, and verification
of receipt from the investigating organization has been received, and the
PM/PSM has reviewed the Standard Form
(SF) 86 for potentially derogatory information..
(b) The candidate has been in a continuously
cleared status during the time period after the 5-year mark expired.
(c) The 6-year mark has not been reached.
(3) Waivers. The TMO may grant waivers to these
requirements case by case and only for Army SAPs or for SAPs for which the
Army has been designated executive agent.
b. Reciprocity. For
purposes of SAP access, Army accepts clearance determinations made by the
appropriate clearance or adjudicative authority of other DOD components and
agencies of the Federal Government. The office requesting access to Army
SAPs agrees to abide by all other rules for access set forth in this regulation.
c. Derogatory
information. Individuals with derogatory information
information that constitutes a possible basis for taking an adverse or
unfavorable personnel security action on personnel with access to Army SAPs
will report this information in accordance with
AR 380-67 . The PD/PM must report valid derogatory
information to the
DCS, G-2 or
FIU as appropriate for an independent impartial investigation. The PD/PM
may also suspend access to the program in accordance with AR 380-67 during
the conduct of the investigation until completion of final clearance
adjudication. Contractor personnel will make reports of derogatory information
in accordance with
DD
Form 254 . At a minimum, contractors will report derogatory information
to their cognizant security agency and Government PSM.
a. Signal security.
Army SAP proponents request countersignals intelligence support from USAINSCOM
to assist in identifying information transmission needs and recommending
appropriate signal security requirements. Programs will
(1) Use systems listed in the National Security
Agency's Information Systems Security Products and Services Catalog. Refer
to AR 381-14 for specific requirements. Use of items not included in National
Security Agency's Information Systems Security Products and Services Catalog
must be requested and coordinated with the
CIO/G-6 to obtain
a waiver approved by the TMO.
(2) Limit nonsecure commercial telephones to the
minimum number essential for efficient operations.
(3) Utilize secure communications as much as possible.
(4) Programs using facilities to store, process
or discuss SCI will follow the standards specified in DCID 6/9.
b. TEMPEST. AR 381-14
implements national TEMPEST policies and procedures. SAP security managers
will utilize the decision matrix in AR 381-14, chapter 4, to determine if
a TEMPEST countermeasures review is required. A TEMPEST review will be performed
for new IT systems, as specified in previous reviews, and prior to the
programming and expenditure of funds for TEMPEST. The TAO (at the direction
of the CIO/G-6) will coordinate the requirement for any TEMPEST facility
and equipment test with USAINSCOM. Information copies of TEMPEST review requests
and reviews will be provided to the TMO and
DCS, G-2 .
To preclude unnecessary expenditures, program offices must consult with the
TAO (through the CIO/G-6) representative at the earliest possible stage in
the planning process regarding the application of TEMPEST countermeasures.
c. TSCM. Programs
should request TSCM support, with the assistance of the supporting USAINSCOM
CI element to expedite the process, to USAINSCOM, G-3. TSCM surveys requested
by the TMO will be conducted within 30 days of the date on the memo requesting
the survey (dependent upon asset availability). Offices of the senior leadership
will also receive a survey at least annually. Verification of senior leadership
office surveys will be provided to the TMO in the form of a postsurvey briefing
to the Director of Security, TMO (within 7 days of the survey). AR 381-14
prescribes the physical and technical security standards for implementation
in certain facilities where SAP information is electronically processed or
routinely discussed aloud.
(1) SAPs request TSCM services only when the facility
risk assessment indicates the threat or vulnerability of the facility requires
a technical security evaluation. PDs/PMs will include the risk-assessment
results in the SAP establishment package.
(2) Annually, USAINSCOM reviews the program facility
risk assessments and the TSCM schedules for each program. USAINSCOM provides
its results and recommendations to the PD/PM and
DCS, G-2 as
part of the working SAPOC brief.
(3) USAINSCOM will conduct TSCM surveys only on
finished facilities that have physical controls and access procedures already
in place. TSCM survey team members may require short-term SAP access. They
must submit the appropriate access paperwork and meet the personnel security
requirements set forth in paragraph 5-4 in order to
have access. Upon completion of TSCM surveys, the PD/PM maintains the physical
security integrity of the facility and limits access to authorized and properly
cleared personnel (see AR 381-14).
(4) To preclude unnecessary expenditures, program
offices will consult with USAINSCOM TSCM representatives at the earliest
possible stage in the planning process regarding the physical and technical
security measures required for planned construction of new SAP facilities
or renovations to existing facilities. TSCM personnel will conduct a
preconstruction advice and assistance service to identify required measures.
a. Treaty authority.
Army SAP facilities are subject to inspection and monitoring under select
arms control treaties.
b. Treaty proponent.
The DCS, G-3
is the Army staff proponent for implementation and compliance for arms
control treaties. The ASA (Installations, Logistics and Environment) serves
as the Army's arms control implementation and compliance review manager.
c. Treaty security
measures. Because of the short notification times and to maintain
security while complying with treaties, SAPs must maintain the ability to
react quickly in the event of any challenge inspection. Additionally, Army
installations and contractors that support SAPs must maintain the capacity
to alert SAPs resident in their facilities quickly.
(1) SAP PDs/PMs, assisted by supporting CI personnel,
must evaluate the potential threat posed by treaty inspections and overflights
and develop contingency plans as part of their security and OPSEC plans.
(2) PDs/PMs must educate program personnel on the
potential security threat treaties pose.
(3) The Army employs an installation-based approach
to treaty inspection notification. The DCS, G-3 alerts MACOMs and installations
that they are subject to an inspection during a specified time window. The
installation notifies subordinate and tenant activities. PDs/PMs ensure that
their offices, contractors (if applicable) and field sites are connected
with installation notification schemes. They validate this periodically through
direct coordination with MACOM/installation treaty POCs.
(4) The TMO,
DCS, G-2 ,
and the MACOMs monitor the adequacy of SAP notifications by reviewing SAP
notification plans, as necessary, during staff visits and inspections.
Additionally, SAP managers brief their notification plans, as required, at
working SAPOCs.
a. The DCS, G-2 exercises
approval authority for disclosure of official Army information, both classified
and controlled unclassified, to foreign governments and international
organizations. This authority may be delegated in writing to DA subordinate
elements (MACOMS and below).
b. Normally, Army
SAP information is not releasable to non-U.S. citizens, foreign governments,
or international organizations. In rare instances, the Army, in coordination
with OSD, approves discrete elements of SAP information for release to foreign
governments usually as part of a joint or collaborative program. Release
to foreign governments and international organizations will comply with this
regulation, the National Disclosure Policy (NDP-1),
DODD
5230.11 , and DODD C-5230.33 for military intelligence SAP information.
Release is not authorized without an approved international agreement (for
example, an MOA; data exchange agreement; information exchange agreement
in accordance with
DODD
5530.3 ; and a DCS, G-2 approved delegation of disclosure authority letter)
and, in cases of waived SAP information, Deputy Secretary of Defense approval.
c. PDs/PMs anticipating
the need for eventual release of information/technology to foreign governments
and international organizations must identify this requirement as early as
possible in the SAP's life cycle, preferably before SAP establishment, and
seek approval for release of program information early on. PDs/PMs must ensure
the program SCG and PSG clearly identify the release authority. As with all
international efforts, a subcompartment must be established to protect
information that will be exchanged.
d. PDs/PMs, MACOMs,
and SAP proponents that identify the need for foreign release of SAP and
SAP-related information/technology must submit the required documentation
to the DCS, G-2 for review and approval. The DCS, G-2 will coordinate with
SAAL-SSP and the TMO (see chap 10 of this regulation
for additional guidance).
e. The PD/PM will
not initiate or engage in preliminary discussions with a foreign government
or international organization regarding the establishment of an international
agreement or potential release or exchange of classified military
information/controlled unclassified information, SAP, or SAP-related information
without the written approval of the DCS, G-2 (see
AR
550-51 ).
f. Any person who
has any indication that a foreign government has compromised SAP information
will report the compromise immediately (within 24 hours) to the TMO and DCS,
G-2. The TMO will report to the OGC, TJAG, the VCSA, the CSA, the Under Secretary
of Defense, and the SA as well as to the National Disclosure Policy Committee.
The program affected will conduct a damage assessment (and may request assistance
from the DCS,
G-2 ) and provide copies of the completed case report and damage assessment
to the Chair, National Disclosure Policy Committee (see AR 550-51).
a. Security plan.
The PD/PM will develop and submit a final security plan to the TMO within
60 days of PSAP approval. The MACOM/PEO and Army Staff review the security
plan during the SAP approval process.
b. Plan contents.
At a minimum, each SAP security plan consists of a security classification
guide, program security guide, OPSEC plan, CI assessment, indoctrination
briefing, and a treaty plan (if applicable). Ensure submission of an initial
TEMPEST countermeasures review to PEO EIS-TAO CTTA during PSAP status, and
a TEMPEST countermeasures review to the USAINSCOM CTTA upon accreditation
as a SAPF. Update TEMPEST risk assessment to USAINSCOM CTTA every 3 years
or upon a substantive AIS equipment, network, or physical change to the SAPF.
c. SCG. The SCG describes
the critical elements within the SAP and explains in detail how to classify
program information. Additionally
(1) The PSM assists the PD/PM and program technical
personnel in preparing the SCG.
(2) The original classification authority signs
the SCG.
(3) The TMO, in conjunction with
DCS, G-2 and
the SAP Army Staff proponent, approves the SCG prior to original classification
authority signature and SAP approval.
(4) The PSM ensures everyone handling program
information has access to an SCG.
(5)
DD Form 254 for contractors references applicable SCGs.
(6) Significant changes to an approved SCG or an
SCG developed for a newly proposed subcompartment must be reviewed and approved
at HQDA. Revised or proposed SCGs should be submitted by the PD/PM through
the Army Staff proponent to the TMO for approval 60 days prior to implementation
unless otherwise directed by the Chief, TMO. The TMO will coordinate Army
Staff review and return the SCG with comments.
(7) The program office conducts an annual review
of the SCG to verify currency. The PSM completes a Memorandum for the Record
verifying the review has been conducted and forwards a copy through the MACOM/PEO
intelligence officer to the TMO (within 30 days of the review) for retention.
The SCG must be republished through the formal staffing process every 5 years.
d. PSG. The PD/PM
develops a PSG to provide indoctrinated personnel specific security procedures
for protecting program information. In addition to identifying the access
control authority (ACA) and access approval authorities, the PSG addresses
the following security disciplines: information system security, communication
security, emission security, operational security, personnel security,
information security, physical security, signal security, and TSCM. The PSG
also addresses treaty verification inspections and foreign travel/contact.
As with the SCG, the following occurs:
(1) The PSM prepares the PSG.
(2) The TMO approves the PSG prior to PD/PM signature
and PSAP approval.
(3) PSM ensures everyone handling program information
has access to a PSG.
(4) DD Form 254 for contractors references applicable
PSGs.
(5) The program office conducts an annual review
of the PSG to verify currency. The PSM completes a Memorandum for the Record
verifying the review has been conducted and forwards a copy to the TMO (within
30 days of the review) for retention. The PSG must be republished through
the formal staffing process every 5 years.
e. OPSEC assessment.
OPSEC is the responsibility of the SAP PD/PM. The PD/PM prepares and approves
an OPSEC annex to the security plan (in accordance with
AR 530-1 ) with the assistance of the TMO,
DCS, G-3 ,
and USAINSCOM. The program provides final copies to the TMO and
DCS, G-2 .
(1) SAP program offices and MACOM/PEO proponents
provide all activities, agencies, or organizations supporting their program
copies or appropriate extracts of the OPSEC annex.
(2) The program office reviews and updates the OPSEC
annex annually. At a minimum, the OPSEC annex addresses the critical elements
(formerly essential elements of friendly information), threat, travel/mail
procedures, testing, media and public release, and program signatures reduction.
a. Notification.
Individuals who become aware of a security incident involving classified
information and/or a serious incident that could reasonably impact program
security will contact the program office immediately. Upon learning of the
incident, the PD/PM and PSM will take immediate steps aimed to minimize further
damage and regain custody of the information, material or mitigate damage
to program security. Within 24 hours of notification of the incident, the
PD/PM will notify the DCS, G-2, the TMO (Security,) and the normal SAP reporting
chain of command (to include the covering CI agent). The PD/PM will provide
an updated report to the DCS, G-2 and TMO not later than 72 hours after the
incident. The PD/PM will provide the DCS, G-2 and the TMO a final report
in every case, however the due date is case specific (reasonable time period
to be decided by the DCS, G-2 and the TMO). With respect to the types of
incidents that must be reported to the DCS, G-2 and TMO (Security), refer
to
chapter 10 of AR 380-5.
b. Nickname or code word
compromise. If the association of a nickname or code word with
a specific classified activity is compromised, or is suspected of being
compromised, the program reports the incident in the manner described (see
para 5-9a ) and requests a new nickname or code word.
The TMO takes the necessary action to cancel the compromised nickname/codeword
and designates a new name(s) (in accordance with Chairman Joint Chiefs of
Staff Memo (CJCSM) 3150.29B).
c. Security incidents involving
AIS. In addition to the reporting requirements specified in 5-9a.,
if a compromise of SAP information involves AIS, the PD/PM will immediately
consult HQDA (
DCS, G-2 )
to determine if the incident should be brought to the attention of the
accreditation authority. The accreditation authority will, in turn, determine
if the automated information system should be allowed to continue to process
information. After the discovery of the incident (the DCS, G-2 will provide
guidance on timing), all accreditation packages will clearly identify the
incident (or type of incident if the fact of the incident is classified and
the accreditation document is unclassified), its status, and any corrective
action taken. The DCS, G-2 and the TMO will coordinate the response to the
security incident. The information assurance security officer or information
system security representative will comply with the procedures listed in
appendixes J and K .
d. Inadvertent
disclosure. In the event that a person inadvertently gains access
to classified information, the PD/PM of PSM will request that the person
read and sign a
DA
Form 5750 (Inadvertent Disclosure Oath) and discuss the disclosure with
the individual to ensure that the information is properly protected. If the
inadvertent disclosure was to a person with an appropriate level of clearance,
but without a need to know, further debriefing may not be necessary. If,
however, the disclosure was to a person without the appropriate level of
clearance, a formal debriefing is required. If the person refuses to sign
DA Form 5750, the PD/PM or PSM will advise the person that refusal to sign
is grounds for denying that person future access to classified materials,
and may be grounds for administrative action (see
AR 380-5 for additional information).
e. Special
situations. The TMO may direct that an investigation be initiated
in situations where the action taken by the SAP manager or proponent did
not fully address the potential compromise, or in other special situations.
f. Review and update.
The PSM will review and update PSGs and SCGs every 12 months (see
para 5-8 for additional direction).
g. SAP security incident response
team. At the discretion of the Chief, TMO, the DCS, G-2, TJAG,
USACIDC (FIU), reporting units, and other organizations will, on order, provide
a senior action officer (04/GS-13 or above) to the TMO to form a security
incident response team (SIRT). The SIRT will establish operations within
TMO office space in order to receive information updates on security incidents
affecting SAPs, provide guidance to program or unit security managers, and
provide a single, central point for information flow to the Army and DOD
senior leadership. The security incident response team works under the
administrative control of the Director of Security, TMO, who directs the
team's actions and assists in determining the duration of the team's mission.
SIRT duties take precedence over any other duties the team members may have
within their respective agencies/activities. The team stands down on order
of the Chief, TMO.
a. The SAPOC validates
each program's initial personnel access ceiling (PAC) or billet structure
requirements and revalidates them annually until program disestablishment.
b. The TMO provides
management and oversight of access control and
(1) Establishes the Army baseline billet structure
and manages baseline access as described in this chapter.
(2) Processes all requests for changes to program
PAC requirements. Approves or disapproves requests for changes above the
5 percent or 100-person annual change ceiling specified in
paragraph 6-3 .
(3) Directs and approves changes to program PAC
and billet structure.
(4) Reviews and approves requests to double slot
personnel for more than 90 days.
(5) Maintains a reference copy of access and billet
data from each program. These data are updated real time by the programs,
or no less than quarterly in accordance with paragraph 6-8
.
c. The TAO will
(1) Develop, document, maintain, develop training
for, distribute, and upgrade ASATS software that supports program PACs.
(2) Provide real-time updates of the data via wide
area network to PDs/PMs and other designated users.
(3) Maintain the central ASATS database for all
Army SAPs. The TMO will maintain a backup database.
(4) Provide customer service and training support
for ASATS users as required.
(5) Establish and maintain a central database of
all SAP and sensitive activity IT systems that process SAP information.
(6) Establish, test, and maintain a continuity of
operations plan for ASATS to enable the SAP automation backbone to remain
operational with minimal disruption in the event of natural or man made
catastrophes that render the primary ASATS site incapable of operations.
The ASATS continuation of operation plan will be tested annually under the
direction of the Chief, TAO and the Chief, TMO, with lessons learned documented
and implemented in order to validate the continuity of operations plan.
d. SAP proponents
(MACOM/PEO/Army Staff) will
(1) Appoint the ACA and identify the ACA in the
SAP PSG. The ACA is a general officer or Senior Executive Service (SES) employee
in the chain of command for that program or activity. When the PD/PM is a
general officer or SES employee, the ACA responsibility falls to the next
higher level general officer or SES employee. Besides the ACA, the SA, Under
Secretary of the Army, CSA, VCSA, and the Chief, TMO have authority to direct
changes to the PAC and billet structures, grant access and indoctrinate personnel
to all Army SAP information.
(2) Provide direction and guidance to the ACA regarding
management of access to the program.
e. SAP ACAs
(1) Specify access management controls in the PSG.
(2) Appoint access approval authorities in writing.
Appointment letters delineate the scope of the access approval authority's
authority and authorize each access approval authority to indoctrinate and
terminate access to the SAP. The authority of the access approval authority
cannot be further delegated. The Chief, TMO is an access approval authority
for all Army SAPs or DOD SAPs for which the Army is the executive agent.
The Deputy Chief, TMO and the Director of Security, TMO are access approval
authorities for all programs resident on the Army baseline.
(3) May delegate the authority to oversee access
approval authority day-to-day activities to the PD/PM but retain access control
responsibility for the program.
(4) Ensure that access approval authorities grant
access to program information only to those persons essential to conducting
the program, including those involved in management, execution, and oversight.
(5) Approve/disapprove program access requests after
verifying that they are correct and complete.
f. A SAP access approval
authority
(1) Must be an Army employee (Government or military).
Requests for waiver to this policy must be submitted to the TMO for approval.
(2) Approve/disapprove program access requests after
verifying that they are correct and complete.
(3) Use the program approved briefing materials
for indoctrinations.
(4) Send signed indoctrination and termination
agreements to the office of record designated by the ACA. Individuals
administratively debriefed will be notified in writing, if practical.
g. PSMs maintain
each program's master access roster (in ASATS) and are responsible for providing
up-to-date security indoctrination briefings to program access approval
authorities. Each program office is the office of record for program access.
a. Upon approval
by the TMO, proponents may devise subcompartments to limit knowledge of extremely
sensitive aspects of the program. Subcompartments may be established only
to conduct work that falls within the charter of the parent SAP. The TMO
determines whether or not the work being proposed or conducted meets this
standard. Proponents register all subcompartments with the TMO, which assigns
a nickname and/or a code word for each subcompartment.
b.
Subcompartments will not be established
to avoid oversight. ACAs ensure that sufficient access is afforded to all
subcompartments to allow effective oversight.
c. The PD/PM is
responsible for the following actions upon establishment of a subcompartment:
(1) The PD/PM will establish the criteria for access
to the subcompartment in accordance with SAPOC and TMO guidance.
(2) An individual accessed to only specific
subcompartments of a SAP will sign an indoctrination statement that lists
the specific subcompartments. The PSM will annotate ASATS records to show
subcompartment access.
(3) The PSM will assist the PD/PM in developing
a subcompartment SCG.
(4) If required, a separate subcompartment PD/PM
and PSM will be designated in writing by the proponent and approved by the
TMO as part of the subcompartment establishment process.
(5) The TMO will determine if a separate PSG is
required to address security responsibilities and countermeasures for personnel
accessed to that subcompartment.
(6) PDs/PMs review and inspect subcompartment management
practices and procedures.
(7) DSS or USAINSCOM (in case of carve-out) will
be granted access for facility clearance inspections and industrial security
reviews for all subcompartment contractor facilities.
a. Approval. The
TMO reviews and approves PACs and billet structures for Army SAPs and billets
allocated to Army by other DOD or Federal agency SAPs.
b. Personnel access ceiling
and updates. A PAC is an administrative recommendation made by
the proponent and initially approved by the TMO and validated through the
SAPOC. The PAC is an access ceiling that provides the total number of personnel
who require access to a program. The PAC is not duty position specific but
simply indicates the total number of personnel in a program authorized accessed.
Changes to the PAC will be made in accordance with paragraph
6-3h .
c. Billet structure and
updates. A billet structure is an administrative recommendation
made by the proponent and initially approved by the TMO and validated through
the SAPOC. The billet structure is duty position specific. Changes to the
billet structure will be made in accordance with paragraph 6-3h.
d. Billet structure and PAC
requirements. A billet structure is required only for waived SAPs
and the TMO administered "SAP baseline." Unacknowledged and acknowledged
Army SAPs are required to submit a PAC for review and approval to the TMO.
Proponents for unacknowledged and acknowledged SAPs may request approval
from the TMO for a billet structure in lieu of a PAC.
e. Process. Within
60 days following PSAP approval for a proposed SAP, the PD/PM develops and
submits to the TMO a proposed PAC. The PD/PM for the PSAP presents the PAC
to the SAPOC during the SAP approval process and makes adjustments as necessary
before the annual revalidation process. The TMO maintains a copy of all approved
PACs. The process is identical for those programs required to have (or are
requesting) a billet structure.
f. Army SAP baseline.
The Army SAP baseline billet structure identifies positions at HQDA, subordinate
commands, other DOD agencies and other Federal agencies that require access
to all baseline SAPs to fulfill leadership, oversight, and management
responsibilities. The TMO determines SAPs to be included in the baseline,
maintains the baseline billet structure, distributes changes to the structure,
and publishes the complete baseline billet structure annually. The Chief,
TMO is the only approval authority for restructure (for example, billet additions
and deletions) of the baseline. The Chief, Deputy Chief, and Director of
Security, TMO are the only personnel authorized to approve requests for access
to the Army SAP baseline.
g. PAC and billet structure
essential functions. Both the PAC and a billet structure provide
for essential program functions, to include contractor, security, clerical,
and communications support, as well as staffing for other organizations necessary
to implement and oversee the program. Personnel briefed to the Army SAP baseline
will not be counted against the PAC or billet structure of those programs
on the baseline. For nonbaseline programs, the PAC or billet structure must
include all program execution, management overview, and oversight positions.
h. Modifications.
Within a 12-month period, each PD/PM, on his or her own authority, may make
modifications to the PAC or billet structure that equate to 5 percent of
the personnel accessed to the program or 100 positions/billets, whichever
is less. If a PD/PM requires more than a 5-percent or 100-position/billet
modification during a 12-month period, the Chief, TMO must approve the
modification. PDs/PMs summarize changes to their PAC or billet structure
during SAPOC revalidation briefings. While not as rigidly structured as billet
plans, PACs still require a significant amount of management planning on
the part of the PD/PM and the PSM. PAC plans provided to the TMO for review
and approval will include a deliberate process for identifying the minimum
numbers of Government, contractor, and other support personnel necessary
to effectively execute the program.
i. Updates. As PAC
or billet structure changes occur, PDs/PMs forward updated pages to the
appropriate access approval authorities. The PAC or billet structure will
be reviewed during the Working SAPOC. Changes to the PAC or billet structure
will be approved during the executive SAPOC. After each SAPOC revalidation,
PDs/PMs provide the TMO with an updated PAC or billet structure.
a. Using ASATS software,
SAP PDs/PMs maintain the master roster of individuals with access to the
SAP. Access rosters contain full name, Social Security number, security
clearance, date granted, type of investigation, investigation date, MACOM,
organization, office, and date access granted, if appropriate. For personnel
holding TOP SECRET clearances, PSMs will also maintain the date each employee's
periodic reinvestigation is due to ensure accurate tracking of periodic
reinvestigation status and to avoid late periodic reinvestigation submission.
Additionally, PDs/PMs maintain an inactive roster listing all personnel debriefed
from their program, recording the date of debriefing.
b. PDs/PMs notify
access roster holders when individuals are debriefed and provide real-time
or quarterly updates of ASATS data to the TMO.
c. PDs/PMs must address
disposition of program access rosters in the disestablishment concept plan.
d. An individual's
access to Army SAP information may be verified by
(1) Contacting the program security staff.
(2) Contacting a duly appointed access approval
authority having cognizance over the individual's organization.
(3) Using a current access roster (provided by a
security staff member).
(4) Checking ASATS (through an authorized user).
a. Possession of
a valid security clearance does not by itself justify access to SAP information.
Individuals must have a valid need to know and approval from the program
ACA or designated access approval authority for access to a SAP (see
para 5-4 ). SCI will not be a prerequisite for access
to Army SAPs.
b. All PDs/PMs must
comply with the OSD SAP access matrix that requires specific access requests
be forwarded through the OSD SAPCO. A current copy of the matrix should be
requested from the TMO.
c. Individuals nominating
personnel for access to a SAP submit a
DD
Form 2835 (Program Access Request) to the program access approval authority.
An authorized security official (for example, the security manager) verifies
the individual's clearance data (accomplished through the use of Defense
Central Index of Investigations or Joint Personnel Adjudication System) before
signing and submitting the DD Form 2835 to commander or PD/PM for signature
concurrence. Final approval for access rests with the ACA or designated access
approval authority. The SAP PD/PM maintains DD form 2835 (RCS exempt, AR
335-15,
para 5-2b(4) ) for 2 years after debriefing an individual,
after which it is destroyed. Upon disestablishment of the SAP, the program
disestablishment concept plan must address disposition of DD forms 2835 less
than 2 years old at the time of disestablishment.
a. Once an access
approval authority has determined that an individual requires access to a
SAP, the access approval authority indicates approval on the DD Form 2835
and signs the form.
b. Access approval
authorities can limit the duration of an individual's access. In these cases,
the access approval authority or person conducting the read-on notifies the
individual of the date when their access will end. This expiration date is
annotated on
DD
Form 2836 (Special Access Program Indoctrination Agreement) (RCS exempt,
AR 335-15, para 5-2b(4)). The expiration date (if any) is included as an
entry in the ASATS database. When the expiration date arrives, the PSM arranges
for a debriefing. Examples of limited duration access are
(1) Short-term studies and analyses.
(2) Normal tour of duty.
(3) Limited duration operations.
c. Individuals authorized
to indoctrinate personnel will
(1) Verify the information on the DD Form 2836,
including the individual's data and the program's nicknames.
(Note "baseline" or "all Army SAPS" may be submitted for individual program
names when appropriate.)
(2) Utilize the program's approved standard
indoctrination briefing package.
(3) Require individuals to read, agree to, and sign
DD Form 2836 before being indoctrinated.
(4) Provide a copy of the signed initial security
briefing to the office of record, normally the program office.
(5) Include in the briefing program specific security
requirements (for example, what is sensitive about the program and why),
procedures for OPSEC and communications security, critical elements,
classification guidelines, subversion and espionage directed against the
army reporting, and how to report fraud, waste, and abuse without compromising
security.
(6) Sign DD Form 2836 as the witness.
a. PSMs ensure
individuals completing their duties with a SAP are debriefed by an authorized
program representative. Once debriefed, the individual is no longer authorized
access to SAP information and is not allowed to disclose program information
in the future. PSMs, access approval authorities, or their designated
representatives will use DD Form 2836 (Back) (RCS exempt, AR 335-15,
para 5-2b(4) ) for termination briefings.
Note. It is not recommended to fill in the electronic
forms on the unclassified AIS connected to the Internet. Print or download
these forms to your classified AIS for program use.
b. In those instances
when an individual cannot sign a termination briefing statement, the PSM
will administratively terminate the individual's access and place the
individual's name and date of termination on the inactive roster. Additionally,
the person making the determination that an individual should be debriefed
administratively will fill out a
DD
Form 2836 (Back) (except for the individual's signature) and forward
it to the office of record.
c. PDs/PMs and access
approval authorities continually review rosters, deleting individuals no
longer requiring access to the SAP. The PDs/PMs retain SAP-access briefing
and debriefing statements (for both actual and administrative debriefs) for
2 years after debriefing an individual, after which they are destroyed.
a. ASATS is an automated
system for maintaining access and billet roster information for Army SAPs.
ASATS will not be used to verify SCI access.
b. PDs/PMs will
(1) Use ASATS to manage and maintain access and
billet roster information.
(2) Provide real-time ASATS data updates to the
central ASATS database (contact the TMO).
(3) Perform a comprehensive review and reconciliation
of ASATS data at least annually, prior to the annual SAPOC.
For purposes of this regulation, a defense contractor is any individual or
entity that submits an offer for and is awarded a Government contract or
conducts business with the Government as an agent or representative of another
contractor.
a.
DOD 5220.22-M specifies baseline security procedures
for contractors working on Federal Government projects. The
DOD
5220.22-M Supplement specifies additional procedures that apply to SAPs.
b. The NISPOM Supplement
Overprint specifies required security enhancements for use by SAPs. The SAP
PSG and
DD
254 are the primary documents used to convey security requirements to
Army SAP contractors. In cases of conflict between the NISPOM Supplement
Overprint and the PSG and DD Form 254, the contractor will adhere to the
more restrictive rule until the PSM can resolve the conflict. In cases requiring
IT policy interpretation, the PSM will contact TMO Security, who will coordinate
with CIO/G-6 ,
for final resolution. Any security enhancements above those specified by
the NISPOM Supplement Overprint for Army Government facilities must be approved
by the TMO. Security enhancements above those specified by the NISPOM Supplement
Overprint for contractor facilities must be forwarded for approval through
the TMO to OSD.
a. The basic personnel
security requirements of DOD 5220.22-M and paragraph 5-4
of this regulation apply to contractors and subcontractors participating
in Army SAPs. Contractors are cleared at the minimum level of classification
commensurate with the level of work specified in the contract.
b. Defense contractor
personnel requiring access to Army SAP information must consent to undergo
random urinalysis and CI scope polygraph tests/examinations. The PD/PM must
remove contractor personnel who withdraw their consent to undergo a polygraph
from the program and report this action to the contracting officer.
a. DSS industrial
security representatives accredit SAPFs for Army SAPs under their inspection
cognizance. The 902d MI Group accredits Army SAPFs for SAPs that have been
carved out of DSS cognizance. In both cases, the accrediting agency will
adhere to the SAPF standards described in this regulation ( chap
5 ). Each SAP's PSG clarifies this basic guidance. After DSS or 902d
accreditation, the PSM issues a letter to the contractor (within 14 days)
referencing the accreditation and authorizing the contractor to store SAP
material based upon the accreditation.
b. DSS (or 902nd)
coordinates exceptions to contractor facility construction standards to ensure
standards do not conflict with
DOD
5220.22-M requirements.
c. DCID 6/9 and the
provisions of paragraph 5-2 of this regulation apply
to SAPs containing SCI.
a. It is Army policy
that the DSS conducts security inspections of contractors to eliminate the
potential for the appearance of impropriety between the Army program office
and the contractor.
b. SAPs require fully
documented comprehensive security inspections of contractors by qualified
Government industrial security specialists. The DSS conducts annual industrial
security reviews of all contractor and subcontractor facilities containing
Army SAP material. DSS has an inspection cadre for Army SAPs, which follow
contract security inspection standards set by DOD 5220.22-M, the NISPOM
Supplement Overprint, and the PSG.
c. SAP Government
offices or proponents coordinate DSS inspections with the contractor and/or
subcontractor. The SAP Government security office extracts appropriate security
procedures from the NISPOM Supplement Overprint, highlights these in the
SAP PSG, and provides them to the appropriately cleared DSS inspectors. SAP
Government offices may attend DSS inspections only in the following cases:
Initial industrial security inspection of a facility, a new
contractor/subcontractor, a new industrial security representative, a new
contract security officer, or a significant anticipated or unanticipated
security problem. In all other cases, SAP Government offices conducting visits
to contractor/subcontractor sites will conduct these visits separately from
DSS inspections. SAP Government offices may conduct announced/unannounced
security assistance visits with a frequency determined by the PD/PM. The
SAP Government office will not conduct SAP inspections. Exceptions authorizing
concurrent visits to contractor/subcontractor facilities by the SAP Government
office and DSS representative will be approved/disapproved case by case by
the TMO. In cases where DSS has been carved out (see 7-5d
), the concurrent visit policy will be applied in the same manner to
the alternate inspection authority.
d. Army contracts
excluding DSS are carve-out contracts and must be based on compelling reasons.
Requests to carve out DSS from the industrial security inspection requirement
for SAP contracts must include extensive justification and a detailed description
of proposed carve-out contracting procedures. Programs submit such requests
to the TMO for SA review and Deputy Secretary of Defense approval. Carve-out
procedures must comply with the NISPOM Supplement Overprint,
AR
380-49 , and the Federal, Defense, and Army acquisition regulations.
Normally, the Army does not approve carve-out requests.
(1) USAINSCOM will conduct industrial security
inspections for approved carve-out contracts.
(2) Army SAPs with approved carve-out contracts
report the status of these contracts at their annual SAPOC. This report includes
the number of active carve-out contracts, number of contracts awarded during
past year, total dollar value of all active carve-out contracts, the names
of each carved-out prime and subcontractor, the total number of employees
who have access to the SAP, justification for the need to continue the carve-out
status of each contract and a summary of the results of the industrial security
inspections conducted by USAINSCOM.
(3) When contracts no longer require carve-out status,
proponents transfer the industrial security inspection responsibility to
DSS and update the
DD
Form 254 to reflect this change. The proponent will provide a copy of
the updated DD Form 254 to the TMO.
e. If it is anticipated
that Army SAP material will be used or generated under a contract by a non-Army
activity or at a non-Army facility, and that activity will not allow DSS
to conduct the industrial security inspections, then the MOA/terms of reference
must state which organization will conduct the industrial security inspections,
and this must be approved by the TMO prior to entering into the arrangement.
In cases where such an arrangement already exists prior to the date of this
guidance, then the MOA/terms of reference must be modified to reflect the
industrial security arrangements, and be submitted to the TMO for review
and approval.
a. Any contract for
a SAP requiring a DD Form 254 to be completed must use secure environment
contracting procedures.
b. The DCAA Field
Detachment provides audit support by properly cleared auditors.
c. Supporting contracting
organizations report SAP contract awards by preparing and submitting a DD
Form 350 (Individual Contracting Action Report) in accordance with
AR 715-30 .
d. SAP research and
development contracts and materials/supplies and services contracts will
be assigned to the Defense Contract Management Agency for secure environment
contract administration under the Federal Acquisition Regulation System (FARS)
(48 CFR 42.2), the Defense Federal Acquisition Regulations Supplement (DFARS),
and the Army Federal Acquisition Regulation Supplement (AFARS).
e. PSMs will complete
and forward
DD
Form 254 to the contracting officer, who will then determine whether
or not a contract modification will need to be accomplished in consultation
with the PSM. The contracting officer forwards a copy of each completed DD
Form 254, including all revisions, to the TMO.
f. The PSM indoctrinates
personnel involved in soliciting, evaluating, negotiating, approving, and
awarding a SAP-related contract at an appropriate level. Those indoctrinated
include the contracting officer, a legal representative, and appropriate
contracting support personnel.
a. Contractor personnel
report incidents involving SAP information to the contractor security manager
(for the SAP), who, in turn, within 24 hours reports to the DSS industrial
security representative (or 902nd POC in case of carve-out status) and the
PD/PM who, in turn, reports to the PSM and DSS. The contractor is required
to conduct a preliminary investigation that outlines the details of the incident
and submit a copy of the report of investigation to the program office and
DSS. Contractors will report all security incidents that involve classified
information, regardless of level of severity, to DSS. DSS will conduct an
administrative inquiry if they determine further action is necessary, or
at the request of the program office. The PSM will follow the reporting
procedures in paragraph 5-9 .
b. The contractor
will include a statement of the administrative actions taken against an employee
in the report to DSS when an individual is found culpable and one or more
of the following factors are evident:
(1) The violation occurred because of a deliberate
disregard of security requirements.
(2) The violation involved a pattern of negligence
or carelessness.
(3) There was a violation of the security terms
of the contract.
c. Based on the
investigation results, the PD/PM makes a decision whether to terminate contractor
access to the program.
a. The following
security guidance is intended for industry.
(1) PSGs and SCGs outline security and classification
guidance.
(2)
DD Form 254 specifies OPSEC requirements determined
by the SAP PD/PM.
(3) SAP PSMs will prepare a DD Form 254 for each
SAP-related contract. The PSM will annotate block 16 of DD Form 254, adding
the TMO to the distribution, and either the PSM or the SAP PD/PM will sign
the form. The PSM will then forward the completed DD Form 254 to the contracting
officer who will, in consultation with the PSM, determine whether or not
a contract modification is necessary.
(4) For carve-out contracts, DD Form 254 identifies
all areas, material or information for which DSS retains security inspection
responsibility and those remaining under Army security administration. The
PSM annotates blocks 10c and d and block 15 of DD Form 254 stating the contract
contains certain carve-out information and provides a copy of the DD Form
254 to the responsible identified USAINSCOM inspection authority and the
TMO.
(5) Army SAP contracts list
AR 25-2 , the NISPOM Supplement Overprint, and this
regulation in block 15 of DD Form 254 as documents governing accreditation
of contractor's AIS.
(6) The program office conducts a review of DD Forms
254 in the following circumstances (not an inclusive list): every 2 years;
a change to the SCG; a change to Army or DOD security guidance that impacts
upon the guidance provided in the 254; or other reviews specified in contracting
regulations. Re-issue of DD Forms 254 is not necessary after the biennial
review unless changes to any of the DD Forms 254 are required. The PSM will
document the fact that the review was conducted and complete a Memorandum
for the Record (retain until next review conducted). A copy of the Memorandum
for the Record will be provided to all relevant contractors. In all cases
of DD Form 254 revisions, the PSM provides an information copy of revisions
to the TMO.
(7) The SAP PD/PM is responsible for resolving questions
or issues regarding the PSG,
DD
Form 254 , or the classification guide.
b. Once a contract
is complete, the contracting officer and PSM ensure that the contractor
(1) Inventories and returns all Government material
to Government control.
(2) Processes contractor requests for postcontract
retention of classified material. Only the VCSA can approve such requests
for contractor retention of documents other than that mandated by the FAR.
(3) Disposes of classified material according to
Army policies and regulations and provides a list of all material destroyed
to the PSM.
(4) Ensures that the procedures provided in
appendix H are followed.
a. DSS is the DAA
for contractor AIS. Contractors will prepare an accreditation package (using
a format prescribed by DSS) for each AIS (to include networks) used to support
Army SAP. After DSS grants accreditation for the system or network to be
used to process classified information, the Government PSM must issue a SAP
use authorization letter to the contractor for each system or network. The
contractor is not permitted to process SAP information on any SAP AIS unless
specifically authorized to do so by the PSM.
b. If conflict exists
between the published guidance provided by DSS and the PSM, the TMO (through
CIO/G-6 ) will
resolve the conflict (see para 7-2b for additional
guidance).
c. Contractor AIS
connected to a Government network must be approved by both the DAA for the
CIO/G-6 and the DSS. For the purpose of this paragraph, contractor AIS include
workstations or contractor owned networks that are connected to any
Government-owned AIS or IT network that processes SAP or sensitive data.
a. This chapter describes
the essential parameters and procedures to follow to ensure the IT support
provided to SAPs, sensitive activities, and agencies processing SAR information
on their IT systems is secure. The IT encompasses communications, AIS,
audio/visual support, records management, printing, and publications.
b. The CIO/G-6 is
the Army's executive agent for information systems support and serves as
the DAA for all Army SAP AIS (excluding contractor AIS see
7-9 ). The CIO/G-6 will coordinate with the
DCS, G-2 on
all AIS simultaneously processing SAP and SCI. Additionally, the
CIO/G-6 is the
DA focal point for staff management and is responsible for oversight of IT.
c. The PEO EIS-TAO
provides IT support to SAPs and sensitive activities and all other agencies
processing Army SAR information on their IT systems as directed by official
tasking of the CIO/G-6. This support includes engineering, fabrication,
installation, operation and maintenance, and life-cycle support of IT systems
and components.
d. The TMO and CIO/G-6
establish SAP-specific IT policy and validate new requests for IT support.
Validation of new IT support requests will include
(1) Verification that SAP or sensitive activity
is active and approved by the TMO.
(2) Assurance that an ISRP or IMSP was submitted
by the requestor prior to initiating the request for IT support or the request
is for development of an ISRP or IMSP.
e. CIO/G-6 approves
all requests for IT support by the PEO EIS-TAO to SAPs, sensitive activities,
and all other agencies processing SAR information on their IT systems.
f. All IT systems
and components purchased to support SAP IT systems requirements will be approved
by CIO/G-6 via
the IMSP ( para 8-3 ), the ISRP ( para
8-2 ), or an addendum to the IMSP ( para 8-3g ).
g. Requests for IT
support from PEO EIS-TAO will be sent to CIO/G-6 for approval through the
TMO for validation of SAP/SA status.
h. For approved IT
support requests, the PEO EIS-TAO will provide the following support:
(1) Assist PDs/PMs, commanders, or directors with
development of their ISRP and/or IMSP.
(2) Provide PDs/PMs to perform or assist in acquisition
and implementation of approved ISRP or IMSP IT projects.
(3) Assist PDs/PMs with identification of Information
Assurance requirements and implementation of IT solutions necessary to protect
SAP or sensitive activities AIS and data.
(4) Assist PDs/PMs with development of the AIS system
accreditation packages.
a. SAP activities
must document initial information management support requirements (for example,
secure voice, data, and facsimile systems) in an ISRP and submit it as an
enclosure to the initial request for PSAP status. A suggested format for
an ISRP is shown in appendix L .
b. The ISRP will
be reviewed by the Chief, TMO and approved by
CIO/G-6 .
a. Following SAP
establishment, listing as a sensitive activity, or determining the requirement
to process SAR information on an agency's IT systems, PDs/PMs, commanders,
or agency directors will prepare a detailed IMSP. This plan should be initiated
within 90 days of SAP establishment, listing as a sensitive activity, or
beginning to process SAR information on an agency's IT system and should
identify IT resources necessary to accomplish the assigned information mission
of the program, activity, or agency for the next 5 years or throughout its
anticipated life cycle if it is fewer than 5 years. The IMSP is comparable
to information resource management (IRM) planning accomplished in other
organizations. It provides a framework for the management, coordination,
and support of IT used by a program, activity, or agency over time. It identifies
challenges and opportunities for furthering the program, activity, or agency
goals and objectives and charts the overall direction of IRM during the life
of the program. The IMSP development process should guide IRM planning by
integrating the program's activities or the agency's IRM plans, performance
plans, financial management plans, and budget processes.
Appendix M outlines the suggested format for the IMSP.
b. The IMSP will
be formatted as two stand-alone documents. It will consist of a SAR classified
document that contains an executive summary (IMSP executive summary) of the
IMSP main body. The two documents will allow separation of the SAR and non-SAR
data. These documents will be structured as follows:
(1) The IMSP executive summary will contain executive
summaries of all the paragraphs in the main body plus any classified IT projects
and the Letter of Agreement, Letter of Understanding, MOA, and/or MOUs for
the SAP.
(2) The IMSP main body will contain all the detailed
information of the required IT projects but will not contain any SAR information.
If a SAP PDs/PM has an IT project(s) that must be classified SAR, these projects
will be put in the IMSP executive summary as an appendix.
c. The IMSP will
be reviewed annually to validate the appropriateness of the IT requirements
based on present requirements and impacts of industry technology advances.
Annual review is a process that will help PDs/PMs, commanders, or directors
link IT investments directly to their missions, to achieve measurable
improvements to their mission outcomes. It consists of prioritizing a list
of projects by specified capital planning criteria (compliance with IT
architecture, benefits, costs, performance measures, and so on) and then
selecting the best mix of projects in the IMSP that maximizes the return
based on the decision criteria. The process should not only give PDs/PMs,
commanders, or directors a view of a particular IMSP project for a system
or IRM investment, but also provide a view of systems and IRM investments
that are interdependent or codependent on each other. By preparing and
maintaining currency of the IMSP projects for major information systems,
the PD/PM is able to monitor investments and prevent redundancy of existing
or shared systems. The IMSP projects should provide information demonstrating
the impact of alternative IRM investment strategies and funding levels, identify
opportunities for sharing resources, and consider the program's inventory
of information resources. The annual reviews will be documented and a copy
provided to CIO/G-6
.
d. Failure to perform
annual reviews will result in the IMSP being invalidated and require the
PD/PM, commander, or director to initiate a new IMSP.
e. The IMSP should
draw from the ISRP (if applicable) and document present IT assets and objective
IT requirements of the PDs/PMs, commanders, or directors. The IMSP will document
(1) Present and proposed IT system architecture.
(2) Estimated cost of proposed IT projects.
(3) Management, command and control structure,
personnel, and organizations.
(4) Financial management, resource management, and
property accountability procedures and requirements.
(5) Information security plan.
(6) Information assurance requirements.
(7) Recommended implementation schedules for the
life of the IMSP.
(8) Operations and maintenance, and integrated logistics
support requirements
(9) All program support provided by external sources
by listing all MOUs, Letters of Agreement, and so on.
f. The PD/PM, commander,
or director is responsible for formulation and promulgation of the IMSP.
Upon request and approval by CIO/G-6 , in accordance with procedures contained
in paragraph 8-1 , the PEO EIS-TAO will provide technical
advice and support to a PD/PM, commander, or director in preparing and
implementing the IMSP.
g. PDs/PMs, commanders,
or directors will submit the IMSP through the TMO to CIO/G-6, for validation
and approval. Upon approval, the PD/PM, commander, or director will provide
a final copy of the IMSP to the TMO who retains the record copy of the plan
to facilitate oversight by HQDA. The TMO and CIO/G-6 will ensure that IT
procured and utilized by the program, activity, or agency is reflected in
the approved IMSP.
h. PDs/PMs, commanders,
or directors who find it necessary to procure IT to support mission requirements
not contained in their approved IMSP, will document such supplemental
requirements as an addendum to their IMSP as reflected in
appendix M and provide a copy through the TMO to CIO/G-6
for approval. CIO/G-6
will return the approved addendum to the PD/PM, commander, or director
for inclusion in their IMSP and provide a copy to the TMO for posting in
the record copy of the IMSP.
a. PDs/PMs are required
to have all IT that processes SAP information accredited under
AR 25-2 using the Defense Information Technology Security
Certification and Accreditation Process (DITSCAP). Additionally
(1) SAPs, sensitive activities, or other agencies
processing SAR information on their IT systems will operate them in accordance
with the NISPOM Supplement Overprint, chapter 8 .
(2) PDs/PMs, commanders, or directors will request
accreditation at the sensitivity level appropriate to the classification
of the material involved. The accreditation authority for systems processing
SAR information is the CIO/G-6. PDs/PMs, commanders, or directors whose IT
systems simultaneously process SAR and SCI information must accredit their
IT systems in accordance with DCID 6/3 using the DITSCAP. The CIO/G-6 and
the DCS, G-2
are the accreditation authorities for SAR/SCI systems. All initial and
revision requests should be forwarded to the CIO/G-6, who will ensure the
required coordination with the DCS, G-2.
b. PDs/PMs, commanders,
or directors provide a coordinated accreditation package, any coordination
reports, and their recommendations to the accrediting authority, who then
determines if the automated system may process SAR information. In accordance
with the DITSCAP the primary accreditation authority is CIO/G-6 and the
designated accreditation authority is CIO/G-6.
(1) Accreditation packages will be prepared without
including SAP information and then processed through the program, activity,
or agency security office to the appropriate accreditation authority. Security
personnel need not be in an approved SAP billet to process this documentation.
(2) The main body of the accreditation package will
be unclassified. If SAR information must be included, a SAR annex to the
plan will be created and staffed through the program's normal SAR distribution
channels (for example, mail).
a. When maintenance
or programming must be performed on AIS that process SAP information, only
the information assurance manager or information assurance officer for the
SAP, activity, or agency may authorize the removal of system components from
the automation site, to include magnetic media. Systems components that cannot
be declassified will not be removed from the automation site for maintenance.
b. Programmers and
maintenance personnel must have at minimum a SECRET security clearance based
upon a national agency check/local agency check/credit investigation and
be current within the last 5 years (see para 5-4 for
requirements).
c. Programmers and
maintenance personnel must
(1) Be escorted by a program-cleared person with
reasonable knowledge of the technical requirement to repair the system and
oversee the nonprogram cleared technician at all times.
(2) Be a program-briefed technician from TAO; or
be program briefed for the information being processed on the AIS.
(3) Be escorted by an individual defined in 8-5c
when installing, performing maintenance on, and programming internal telephone
switches and other devices used for signal isolation.
a. Army SAPs, sensitive
activities, and other agencies processing SAR information on their IT systems
requiring IT support (as authorized in an approved ISRP or IMSP) should submit
their request to the PEO EIS-TAO) through the TMO and
CIO/G-6 . The TMO
will review IT support requests to ensure that the requestor is a valid SAP
or sensitive activity. The CIO/G-6 will check the IT request for conformity
with an approved program IMSP/ISRP or, if appropriate, approve the use of
special procedures in lieu of normal/routine support procedures. PEO EIS-TAO
will redirect all tasks that are beyond the scope of an approved IMSP/ISRP
to CIO/G-6 for validation and approval with information copy to the TMO.
b. Army SAPs, sensitive
activities, and other agencies processing SAR information on their IT systems
requiring IM support and not reflected in an approved IMSP will submit requests
through the TMO for review and concurrence, to CIO/G-6 for validation and
approval. Approved requests will be posted to the approved IMSP/ISRP as an
appendix.
a. Information assurance
must be addressed in each IMSP project. The SAP PD/PM must ensure that all
reasonable procedures are taken to ensure the integrity of any SAR data stored
on AIS. Vendors are marketing computers that include removable media devices
such as CD-R, CD-RW, DVD-R, and zip drives that cost less than special-order
computers without these removable storage devices; however, these devices
will be disabled at the basic input/output system and operating system level
on all workstations except for the minimum essential number of positions.
The number of workstations that have the ability to produce removable media
containing SAR data should be limited to the maximum extent possible by the
PD/PM and PSM. Additional workstations may be provided the capability to
produce removable media only on a valid, justifiable mission need. The
justification for additional workstations with write capability to a removable
media will be included in the data IT security certification and accreditation
process package for review and validation by the designated accreditation
authority. Standard operating procedures will provide for other physical
controls to restrict the use of removable media. The AIS standard operating
procedure will provide audit procedures to document storage of all SAP data
on removable media. These procedures will require at least a two-level approval
before the data can be stored and removed from the SAP facility. The using
organization of the IT will be required to certify in their data IT security
certification and accreditation process accreditation package that these
devices have been disabled on all computers except for those with an approved
mission requirement. The mission requirement/justification must be included
in the accreditation package. They must also have and properly implement
training for personnel authorized to create removable media containing SAR
data.
b. All infrared ports
must be disabled and no wireless keyboards, mouses, or other wireless devices
will be used in the SAPF.
c. Personal data
assistants, cellular telephones, data diaries, long-range cordless telephones,
personally owned automated information systems, two-way pagers, two-way radios,
watches with communications software, and wireless network devices will not
be used in SAPFs.
d. Audit procedures
must be enforced for all IT systems that process SAP data. This requirement
includes stand-alone workstations as well as workstations connected to a
network. The audit procedures include a requirement for review of the automated
and manual audit reports for IT processing SAP data. The review procedures
must be included in the DITSCAP accreditation package. These procedures will
document the validation process used to ensure the audit is implemented and
properly reviewed.
e. Password procedures
must be established to meet length requirements. Operators will not share
passwords; must use a password with two or more numbers in it; and meet all
the requirements defined in AR 380-19, paragraph 2-14. These password controls
will be implemented on all AIS to include standalone workstations. Systems
administrators will not use a systems administration password; instead, a
unique logon name and password that will reflect their action in the system
audit as required above will be used.
f. Training of personnel
operating and or maintaining IT that processes SAR information is critical.
The SAP PD/PM is responsible for ensuring that all personnel operating and
or maintaining AIS have attended all required IT training. The requirements
for IT training can be found on Army Knowledge Online or
https://informationassurance.us.army.mil.
a. All SAP PDs/PMs
will develop a continuity of operations plan that addresses protecting the
SAR data stored on their AIS. The plan will address creation of backup data
on removable media. The removable media must be stored at another facility
that does not have a probable chance of being destroyed by the same event
that could destroy the original AIS data. This requirement precludes using
another building on the same post, camp, or station. The data must be stored
in a facility approved and authorized to store the SAR data.
b. All SAP PDs/PMs
will develop a business continuance plan that addresses how they would restore
operations after a event that destroys or prevents use of their AIS. At a
minimum, the plan should provide procedures for restoring the operating system
of the AIS, then restoring the SAR data from the removable media stored offsite
in accordance with the continuity of operations plan. It should, if appropriate,
address relocation of their operation to another approved facility.
a.
Understandably, many SAP PDs/PMs process
unclassified data on their SAR AIS because they do not have both unclassified
and SAR AIS. This practice is problematic in many situations to include when
a SAP is disestablished and the unclassified/non-SAR information is still
required. The PD/PM must request a waiver to allow removal of the
unclassified/non-SAR data from the AIS before the SAR data are destroyed
or archived. In cases where SAR and SCI are processed simultaneously, the
CIO/G-6 will coordinate
the waiver request with the
DCS, G-2 .
b. The waiver to
remove non-SAR data from approved AIS processing SAR data must be submitted
to the TMO through CIO/G-6 (the CIO/G-6 will coordinate with the DCS, G-2
in cases involving SCI). The waiver must include the formal procedures that
will be used to ensure SAR data are not removed along with the non-SAR data.
The CIO/G-6 will provide removal procedures and software that are technically
sound and that minimize the risk of SAR data being removed along with the
non-SAR data.
c. The Chief, TMO
is the only approval authority for this waiver and will sign the waiver based
only on assurances by the CIO/G-6 (and in cases involving SCI, the DCS, G-2)
that the procedures are appropriate to minimize the risk to SAR data.
a. The PD/PM, commander,
or director will determine the records that are necessary to maintain "adequate
and proper documentation" of the program, activity, or agency and its operations.
PDs/PMs, commanders, or directors will create and maintain a comprehensive
documentation system in the form of record files to explain how decisions
were reached and how business was conducted. Although access to these files
is restricted, the records remain subject to appropriate HQDA and DOD oversight
inspections. PDs/PMs, commanders, or directors must ensure that needed records
are recorded and maintained in official files. PDs/PMs, commanders, or directors
will also ensure that like requirements are included in the design and
implementation of electronic systems supporting their programs. Records
management provisions must be included in the establishment and disestablishment
planning process for each SAP.
b. Design of electronic
file systems will satisfy records management requirements contained in this
paragraph and must be included in the approved IMSP for the program, activity,
or agency. Network file servers as well as stand-alone computers should have
a file directory structure that supports easy identification of the categories
of records identified in paragraph 8-1c .
c. PDs/PMs, commanders,
or directors will maintain their record files in accordance with
AR 25-400-2 . As a minimum, the SAP record file will
include
(1) Written program approval(s) from the authority
initially establishing the SAP.
(2) Written approval for special management and
special delegation procedures when they exist.
(3) The program's annual SAP report to the SAPOC,
to include both parts 1 and 2 completed in accordance with the last-issued
SAPOC informational and format requirements.
(4) The POM and the president's budget decision
review of issue papers.
(5) Budget exhibits as required under
DOD
7000.14-R , vol. 2A-B.
(6) Legislative language history on the SAP.
(7) Identification of associated programs, if SAP
is, or under an umbrella SAP.
(8) Identification and location of prime contractor(s)
and subcontractor(s) performing classified work under the SAP.
(9) SAP access rosters (current and historical)
and records of inadvertent disclosure.
(10) Foreign disclosure case files.
(11) Current and historical security classification
guides and program security guides.
(12) Documented inspection reports of the results
of the review of each SAP under the cognizance of the Army SAPCO.
d. Archiving of
SAP material is required upon disestablishment of a SAP program. When a PD/PM
is preparing a SAP for disestablishment, the PD/PM must contact the TMO before
developing a disestablishment concept to coordinate disposition of historical
files. In addition, there are two further conditions under which a program
will archive SAP material:
(1) During the life cycle of the program, when
material holdings become too excessive to maintain on site. Programs should
review material at least every 3 years to determine if material needs archiving.
(2) When a program is instructed to merge with
another program.
e. Program will
contact the TMO in any of these situations for detailed guidance on proper
archiving procedures.
a. The Army will
fund only properly registered and approved SAPs. A new start is a term used
when the Army is pursuing a new effort (classified or unclassified) that
has not yet been appropriated by Congress. A new start may be created under
the protection of an existing SAP, or may require the establishment of a
new SAP. A new SAP is established when funds are placed against a program
that is not new work, but requires its own security structure, has gone through
the PSAP process, and has been approved by OSD as a SAP. The new SAP will
be a parent program and can have additional subcompartments.
b. Before providing
resources to or in support of or receiving resources from another DOD or
Federal agency SAP, the Army program office must establish an MOA which meets
the requirements of paragraph 4-7c and
4-7d of this regulation.
c. All Army resource
documents for SAPs will be coordinated with the TMO prior to submission to
OSD.
a. During the SAP
establishment phase, the MACOM/PEO submits a memorandum proposing the program
for SAP status (see app B ). This proposal must include
an estimated amount of funds needed for the program, listed by appropriation
(for example, RDT&E, procurement, and Operation and Maintenance, Army
(OMA) funds), by year, through the Future Years Defense Plan.
b. The Army Staff
proponent, ASA (ALT), DCS,
G-8 , Army Budget
Office, and ASA(FM&C) evaluate the proposed funding and management structure.
The management structure must specify distinct program elements, project
codes and standard study numbers. The Army Staff proponent also assigns the
program to the appropriate management decision package.
c.
MACOM/PEO/PDs/PMs are prohibited from providing
funds to PSAP requirements without prior written authorization of the Chief,
TMO. The Chief, TMO can authorize funds for administration and security purposes
for a PSAP until SAP status is granted by OSD (30 days after congressional
notification).
a. Annual POM/budget estimate
submission. PDs/PMs justify a continuing need to fund a program
by submitting a budget estimate submission every August. The budget estimate
submission identifies resources necessary to maintain the program and provides
information on the prior year, current year, and the two budget years. OSD
publishes guidance annually regarding the format and suspense dates for budget
exhibits. The ASA (FM&C) appointed personnel will collect the information
submitted from the MACOMs/PEOs. Once ASA (FM&C) has collected and assembled
this data, it will be reviewed by the TMO before submission to OSD.
b. Program budget
decision. Program budget decisions and program decision memorandums
are issued between October and December, after the OSD review of the POM
(budget estimate submission and Future Years Defense Plan). Using the program
budget decisions, OSD proposes changes to the Army POM submission. All program
budget decisions and program decision memorandums will be routed through
the ASA (FM&C), DCS, G-8, and TMO. The Army then has the opportunity
to submit reclamas (counterarguments) to OSD. To facilitate the preparation
of these reclamas, MACOMs/PEOs provide input to appropriate Army Staff proponents
who validate the input and forward reclamas through the DCS, G-8, the TMO
for all funding areas, and the ASA(FM&C).
c. SAP reprogramming.
Reprogramming includes transfers between appropriations, transfers between
program elements internal to an appropriation, and transfers within a program
element from one project code to another.
(1) Reprogramming requests must be evaluated in
terms of DOD guidance provided in DOD 7000.14-R,
vol.
3 , on requirements for congressional notification and/or prior approval.
If congressional notification or prior approval is required, the Undersecretary
of Army will be the Army's approval authority for reprogramming. Requests
en route to the Undersecretary of Army will also be reviewed by the VCSA.
(2) When Undersecretary of Army approval is not
required, the Army Staff proponent can approve SAP reprogramming requests
after review by the offices listed in 9-3c(3). Army Staff proponents for
SAPs at HQDA are: the ASA(ALT) for acquisition SAPs, the
DCS, G-2 for
intelligence SAPs, and the
DCS, G-3 for
operations and support SAPs (reprogramming format is shown in
app N .)
(3) Regardless of the approving official, all requests
to reprogram SAP funds must be reviewed by: the ASA (ALT), ASA(FM&C),
TMO, OTJAG, OGC, and DCS,
G-8 . ASA (FM&C) will ensure the reprogramming action complies with
HQDA directives and DOD guidance. During the final 3 days of the fiscal year,
each MACOM or PEO may reprogram up to a cumulative of $100K of expiring SAP
funds without prior coordination with the ASA (ALT), ASA(FM&C), TMO,
OTJAG, OGC, and DCS, G-8. By 15 October of the following fiscal year, the
MACOM and/or PEO must report all reprogrammings executed under the special
$100K provision to the Chief, TMO.
(4) The TMO will prepare a summary report in October
for the Undersecretary of the Army, listing all SAP reprogramming executed
during the fiscal year.
d. Congressional
notification. Congressional notification is required if a
reprogramming action exceeds the appropriation thresholds as stated in DOD
7000.14-R, volume 3,
chapter
6 , or if a project meets the definition of a "new start." All reprogramming
actions or new starts requiring congressional notification must be approved
by the Undersecretary of the Army. The TMO will provide the notification
letter to OSD Special Programs Coordination Office, which will then notify
the appropriate congressional subcommittees.
When disestablishing a SAP, the MACOM/PEO prepares a disestablishment concept
plan that addresses fiscal control ( app H ) and submits
it to the TMO for approval. The plan identifies SAP budget lines that will
have funds remaining when the program disestablishes and proposes disposition
of these funds.
In the first quarter of each fiscal year, SAP managers submit a SAP report
through the Army Staff proponent to the TMO. The OPDUSD(A&T) provides
the report format and preparation instructions in a memorandum to the Services.
SAP reports cover program activities and funding requirements, and justification
for continued SAP status. The TMO consolidates these SAP reports and submits
them to the OPDUSD(A&T), which consolidates the reports of each service
for submission to Congress. These reports collectively become the justification
book for the classified portion of the President's budget. OSD publishes
guidance annually regarding format and suspense dates for SAP reports.
This chapter provides management guidance and uniform procedures to be followed
when Army SAPs participate in international sharing and functional agreements
with partner nations.
a. International
efforts. International efforts with allied or other friendly countries
are an increasingly important part of U.S. national security and defense
acquisition strategies. Upon approval by the SA and Secretary of Defense,
Army acquisition SAPs may release SAP information as part of approved
international or functional agreements with specified foreign governments
or international organizations (see
AR
550-51 ).
b. Classified military
information. The disclosure or release of DA classified military
information, to include SAP information, to foreign governments or international
organizations may be the result of DA participation in activities stemming
from international and functional agreements negotiated and concluded in
accordance with applicable DOD and Army regulations (see AR 550-51).
c. Information
sharing. Information sharing characterizes an association or agreement
with an ally or allies in that selected U.S. SAP information is exchanged
(see AR 550-51 and
DODD
2040.2 ).
d. Cooperative
programs. A cooperative program characterizes an international
agreement between the United States and a foreign government for RDT&E
within a specified technology area(s) or for RDT&E to develop a weapon
system or component to achieve a jointly desired goal. In such a cooperative
effort, some, but not all, U.S. SAP information pertaining to the technology
area(s) or RDT&E development may be approved for disclosure or release
to the specified government(s). All information and material jointly generated
and funded pertaining to the cooperative program becomes foreground information
and is available for use by all participating governments in accordance with
the terms of the MOA (see AR 550-51 and DODD 2040.2).
e. Co-production
programs. A co-production program is characterized by an international
production agreement in which items intended for military application are
jointly (between U.S. SAP and allies) produced or assembled under provisions
of a formal agreement. The formal agreement will provide for transfer of
build-to-print and assembly information from the U.S. SAP to a foreign
government(s). In a co-production program, all U.S. SAP information pertaining
to the production or assembly may be approved for disclosure or release to
a specified government. All information and material jointly generated and
funded pertaining to the co-production program becomes foreground information
and is available for use by all participating governments in accordance with
the terms of the MOA (see DODD 2040.2).
a. To facilitate
the U.S. Army SAP oversight process, the following SAP architectures will
be used for all information sharing, cooperative programs, and production
efforts.
b. The security
architecture to protect SAP data under information sharing agreements and
cooperative programs will generally be protected under a subcompartment to
an existing U.S. parent SAP. Under this architecture, the U.S. subcompartment
will contain only the shared information and the nickname will generally
be the same nickname used by the ally. The ally will not be made knowledgeable
of the existence of or have access to SAP information protected by the U.S.
parent SAP, other subcompartments of the SAP, or any other contributing SAPs.
The security architecture will allow for the leverage of classified collateral
and SAP information (background information) from other programs for use
in the international effort. The architecture must also allow for the development
of collateral and SAP classified information within the international effort
(foreground information).
c. The security
architecture to protect SAP data during co-production efforts will generally
be a stand-alone U.S. SAP under which all SAP data provided to, or generated
by, the co-production SAP is jointly owned, releasable, or shared with the
ally or allies. The nickname assigned to this SAP will be the same nickname
used by the ally or allies in accordance with the jointly developed and approved
procedures for the effort. The information review team must approve data
for release because the stand-alone U.S. SAP protecting the co-production
may receive feeder information from other U.S. SAPs.
As the office of primary responsibility for the project, each sponsoring
U.S. SAP program office will establish an information review team. This team
will consist of technical and security experts indoctrinated to all SAP
information involved to review SAP information proposed for release to the
allied partner(s). The information review team will perform technical and
security reviews of information proposed for release, ensuring that it meets
the release criteria of the applicable MOA, any executive committee guidance
and the approved delegation of disclosure authority letter. The TMO will
review the proposed delegation of disclosure authority letter prior to approval
by the DCS,
G-2 . Prior to approval, the DCS, G-2 will review all proposed releases
to ensure compliance with existing delegation of disclosure authority letters
and executive committee guidance. The U.S. office designated as the office
of primary responsibility will develop written procedures, consistent with
this regulation, providing specific instructions, guidance and security
procedures to be followed by the command or agency during the information
review team and foreign disclosure office review and approval process. Once
developed, these procedures will be reviewed and approved by the DCS, G-2
and the TMO prior to implementation and will not be released to the allied
partner(s). The allied partners will not be made aware of any contributing
U.S. SAP(s) to the effort or project.
a. Documents submitted to the
information review team for a final release determination. These
will be marked in such a manner as to preclude the inadvertent or premature
release of information to the ally before it is approved by the foreign
disclosure office. Documents that have been reviewed and approved for release
to a foreign government(s) will be clearly marked by PSMs to distinguish
them from documents that have not been reviewed and/or approved for release.
b. Approval and disapproval
statements. The program office will maintain records of documents
that have been approved or disapproved for release; these will clearly indicate
the name of the person who made the decision and the date of the decision.
Documents provided to an ally will NOT display this approval/disapproval
statement and signature.
c. Receipts. All
documents, media, or other classified material transferred in support of
an approved project will be documented on an accountability record or other
form as specified in the program security instructions or MOA. Copies of
signed receipts for classified material will be maintained in the office
of primary responsibility local file area for a minimum of 5 years after
the date of the transfer, or longer if specified by the joint program security
instructions or MOA. If not otherwise specified in the program security
instructions or MOA,
DA
Form 3964 may be used to document transfers of classified information.
If another form is used it will provide
(1) Identification of the date and the name of
the individual by name and office to whom the information was provided.
(2) An unclassified description of the material,
to include the control number assigned by the office of primary responsibility
to the material and the format of the media used-document, 3.5-inch disk,
CD, and so on.
(3) Classification of the material released.
(4) Record copies of all information and material
transferred to allied partners and all documents considered but disapproved
for release will be maintained in the sponsoring U.S. SAP program office.
The TMO has the responsibility to maintain oversight of all SAP related foreign
disclosure decisions. These files will be filed, retained, and archived in
accordance with AR 25-40-2 and are subject to review during inspections and
audits.
d. Classified project foreground
information. Each document will be conspicuously marked or stamped
at the top and bottom of the front cover and the first page and the back
side of the last sheet/back cover and last page (for example, "SECRET/BIG
TREE" with the following added directly under the classification marking:
"BIG TREE Special Control and Access Requiremed (SCAR) Use Only," or as directed
in the program security instructions or MOA.
a. As an example,
the classification categories and markings used by the BIG TREE SCAR program
are as follows:
(1) SECRET/BIG TREE (Equivalent country
classification/BIG TREE).
(2) CONFIDENTIAL/BIG TREE (Equivalent country
classification/BIG TREE).
b. As appropriate,
only the first classification marking for each category (that is, SECRET
and CONFIDENTIAL) will be used in the narrative portion of this annex when
referring to the BIG TREE SCAR classification categories and markings outlined
above.
International SAP and associated subcompartment accesses will be granted
in accordance with the procedures directed by the governing program security
instructions. The sponsoring U.S. Army SAP program office is responsible
for recording, entering, and maintaining these accesses in the current version
of the ASATS. Access to classified information under information sharing,
cooperative programs, and production efforts are normally detailed in the
program security instructions and governed by an approved ceiling or maximum
number of individuals representing each participating country authorized
to have access to SAP information under the project. The U.S. SAP office
of primary responsibility, in coordination with the
DCS, G-2 ,
TMO, and SAAL-SSP (if the project is an acquisition effort), will assist
the U.S. office of primary responsibility in jointly developing the U.S.
access ceiling base on programmatic, security, and oversight requirements
for the effort. The access ceiling is independent of the Army baseline billet
structure and will account for that fact. Requests for formal billet structures
will be submitted to the Chief, TMO for approval.
U.S. Army cooperative programs, co-production, and information-sharing efforts
are subject to recurring and special inspections, audits, and reviews. Contractor
facilities located in the United States involved in cooperative programs,
co-production, and information-sharing possessing SAP information or material
under joint efforts must possess the required DOD facility and personnel
clearances. Contractor facilities in support of U.S. Army international and
cooperative efforts will undergo routine, annual, and, if necessary, followup
or special industrial security reviews by the DSS. DSS security review carve
outs must be approved by the TMO prior to the contract award of SAP classified
work at a contractor facility. The U.S. Army Program Office is required to
brief information on the international efforts involving SAP data as part
of the annual SAPOC process.
The Official Army Publications Web Sites.
-
Army Publishing
Directorate
-
Administrative Departmental Publications and Forms
-
(ARs, Cirs, Pams, OFs, SFs, DD & DA Forms)
US Army Training
and Doctrine Digital Library
-
Army Doctrinal and Training Publications (except engineering & medical)
-
(FMs, PBs, TCs & STPs)
US Army Logistics Support
Activity
-
Army Technical and Equipment Publications (except engineering & medical)
-
(TMs, TBs & SCs)
US Army
Corps of Engineers
-
Army Engineering Publications (except administrative)
-
(TMs & FMs)
US
Army Medical Department
-
Army Medical Publications (except administrative)
-
(TMs, FMs, and SB 8-75-Series Publications)
Army Knowledge Online
(AKO)
-
All departmental publications, including distribution-restricted items
U.S. Army Home Page (AHP)
-
All unrestricted departmental publications
DOD publications are available at
http://www.dtic.mil/whs/directives.
AR 11-2.
Management Control. (Cited in
para 4-5a .)
AR 25-400-2.
Army Records Information Management System (ARIMS).
(Cited in paras 2-22cc; 2-31f ;
5-3g and l; 8-10d ; and
10-5c(4) .)
AR 380-5.
Department of the Army Information Security Program.
(Cited in paras 1-4a ;
4-5f(4) ; 4-5j ;
5-2a and d ; 5-3b
, g , l, j ,
k , and i ; 5-4a
; 5-9a ; B-2b(3)(a) ;
B-3d(1); and H-2c .)
AR 25-2.
Information Assurance . (Cited in paras
7-8a(5) and 8-7e .)
AR 380-67.
The Department of the Army Personnel Security Program.
(Cited in para 5-4c .)
AR 381-2.
Subversion and Espionage Directed Against US Army (SAEDA).
(Cited in para 4-5f(4) .)
(U) AR 381-14.
Technical Counterintelligence (TCI) (S) . (Cited
in para 5-5a(1) , 5-5b ,
c(3) .)
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
AR 530-1.
Operations Security (OPSEC) . (Cited in paras
4-5f(6)(d) , 5-8c .)
AR 550-51.
International
Agreements. (Cited in 5-7 and
10-2 .)
AR 715-30.
Secure Environment Contracting . (Cited in para
7-6c .)
DOD 5220.22-M.
National
Industrial Security Program Operating Manual . (Cited in paras
4-2a ; 4-3c ;
4-7j ; 5-1a; 5-2c and
d ; 5-3b , d
, g , l, and k ;
5-4a ; 7-2a and b
; 7-3a ; 7-4b ;
7-5b , c , and d
; 7-8a(5) ; and 8-4a(1)
.)
DOD 5220.22-M Supplement.
National
Industrial Security Program Operating Manual Supplement . (Cited
in paras 5-7b and 7-5b and
d .)
DODD 2040.2.
International
Transfers of Technology, Goods, Services, and Munitions, 17 January 1984.
(Cited in para 10-2a and d
.)
DODD 5230.20.
Visits,
Assignments, and Exchange of Foreign Nationals, 24 April 1992.
(Cited in para 5-7b .)
(U) DODD C-5230.23.
Intelligence
Disclosure Policy (C) . (Cited in para 5-7b
.)
DODD 5530.3.
International
Agreements, 11 June 1987 . (Cited in para 5-7b
.)
DODI 4000.19.
Interservice
and Intergovernmental Support, 09 August 1995 . (Cited in
para 4-7g .)
DCID 6/3.
Protecting
Sensitive Compartmented Information within Information Systems.
(Cited in para 8-4 .) (Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
DCID 6/9.
Physical
Security Standards for Sensitive Compartmented Information Facilities.
(Cited in paras 5-2 ,
5-5a(4) , 7-4c , and
8-4a(2) .) (Available at
/www.us.army.mil/portal/portal_home.jhtml
.)
EO 12958.
Classified National Security Information . (Cited
in 4-1a .) (Available at
http://www.archives.gov/federal_register/executive_orders/1995.html.)
(U) NDP-1. National Policy and Procedures for the Disclosure
of Classified Military Information to Foreign Governments and International
Organizations (S), October 1988, as amended. (Cited in
para 5-7b .)
(Available on the SIPRNET.)
National Security Agency Quarterly Publication. Information
Systems Security Products and Services Catalog. (Cited in
para 5-5a(1) .)
(Available from the Superintendent of Documents, U.S. Government Printing
Office, Washington, DC.)
NISPOM Supplement (NISPOMSUP) Overprint. DOD Overprint to
the National Industrial Security Program Operating Manual Supplement (FOUO).
(Cited in paras 4-3c , 4-7j
, 5-1a, 5-2c , 5-3b ,
d , g , l(2), and
k , 5-4a and b
, 7-3a and b ,
7-5b and d ,
7-8a(5) , and 8-4a(1) .)
(Available through the Technology Management Office, Special Access Program
Central Office, 200 Army Pentagon, Rm. 2A-28, Washington, DC 20310-0200.)
40 USC 1401.
Public Buildings, Property, and Works: Definitions .
(Cited in para 2-17e .)
(Available at
http://www.gpoaccess.gov/uscode/index.html.)
A related publication is a source of additional information. The user does
not have to read a related publication in order to understand or use this
regulation. DOD publications are available at
http://www.dtic.mil/whs/directives.
AFARS.
Army Federal Acquisition Regulation Supplement.
(Available at
http://dasapp.saalt.army.mil/Ind_base_policy/AFARS%20conformed.htm.)
AR 1-1.
Planning,
Programming, Budgeting and Execution System
AR 11-7.
Internal Review and Audit Compliance Program
AR 20-1.
Inspector General Activities and Procedures
AR 25-1.
The Army Information Management
AR 25-55.
The Department of the Army Freedom of Information Act Program
AR 37-47.
Representation Funds of the Secretary of the Army
(U) AR 37-64.
Finance and Accounting for Sensitive Mission Funding (C))
.
(Available at
http://www.us.army.mil/portal/portal_home.jhtml.)
AR 70-1.
Acquisition Policy
AR 70-6.
Management of the Research, Development, Test, and Evaluation
Army Appropriation
AR 70-9.
Army Research Information Systems and Report
AR 71-9.
Materiel
Requirements
AR 195-2.
Criminal
Investigation Activities
AR 195-6.
Department
of the Army Polygraph Activities
AR 335-15.
Management Information Control System
AR 380-10.
Foreign Disclosure of Information and Contacts with Foreign
Representatives
(U) AR 380-28.
Department of the Army Special Security System (C) .
(Available at
http://www.us.army.mil/portal/portal_home.jhtml.)
AR 380-40.
Policy for Safeguarding and Controlling Communication Security
Materiel
AR 380-49.
Industrial
Security Program
AR 380-53.
Information Systems Security Monitoring
AR 381-10.
U.S. Army Intelligence Activities
AR 381-11.
Production Requirements and Threat Intelligence Support
to the U.S. Army
AR 381-20.
The Army Counterintelligence Program
(U) AR 381-26.
Foreign Materiel Exploitation Program (S) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
(U) AR 381-47.
U.S. Army Offensive Counterespionage Activities (S) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
(U) AR 381-100.
Army Human Intelligence Collections Programs (S) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
(U) AR 381-102.
U.S. Army Cover Program (S) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
(U) AR 381-141.
Intelligence Contingency Funds (ICF) (C) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
(U) AR 381-143.
Logistics Policies and Procedures (C) .
(Available at
https://www.us.army.mil/portal/portal_home.jhtml.)
DA Pam 70-3.
Army
Acquisition Procedures
CJCSM 3150.29B. Codeword, Nickname, and Exercise Terms (NICKA)
Systems.
(Available from DOD J-2 (JS/J33/CJOD).)
DFARS. Defense Federal Acquisition Regulations Supplement.
(Available at
http://www.acq.osd.mil/dp/dars/dfars.html.)
DFAS 37-1. Finance and Accounting Policy Implementation.
(Available at
http://www.asafm.army.mil/budget/di/di.asp.)
DFAS IN Manual 37-100-FY.
(Available at
http://www.asafm.army.mil/budget/di/di.asp.)
(U) DOD S-5105.21-M-1. Sensitive Compartmented Information
Administrative Security Manual (C).
(Available from the Defense Intelligence Agency (DIA/DAC-2B).)
DOD 7000.14-R , vols. 2a, 2b 3, 5, and 11 (chap 1).
Department
of Defense Financial Management Regulation (Disbursing Policy and Procedures)
.
DOD 7600.7-M.
Internal
Audit Manual
DODD 5200.1-R.
Information
Security Program
DODD 5200.2-R.
Personnel
Security Program
DODD O-5205.7.
Special
Access Programs
(U) DODD S-5210.36.
Provision
of DOD Sensitive Support to DOD Components and Other Departments and Agencies
of the U.S. Government (S)
DODD 5210.48-R.
DOD
Polygraph Program
DODD 5230.11.
Disclosure
of Classified Military Information to Foreign Governments and International
Organizations
DODD 5500.7.
Standards
of Conduct
DODI O-5205.11.
Management,
Administration, Oversight of DOD Special Access Programs (SAPs)
DODI 5210.74.
Security
of Defense Contractor Telecommunications
DODI 5505.2.
Criminal
Investigations of Fraud Offenses
FARS (48 CFR 52.227-10).
Filing of Patent ApplicationsClassified Subject Matter
(Available at
http://www.gpoaccess.gov/ecfr.)
FARS (48 CFR 200-299, Subpart 42.2). Contract Administration.
(Available at
http://www.gpoaccess.gov/ecfr.)
The following forms are available on the Army Electronic Library CD-ROM and
the APD Web site (
http://www.apd.army.mil/)
unless otherwise stated.
DD forms are available from the Office of Secretary of Defense Web site
(www.dir.whs.mil).
DA Form 5750. Inadvertent Disclosure Oath. (Cited
in para 5-9d .) (
PDF
) (
FormFlow
)
DD Form 2835.
Program
Access Request. (Cited in paras 6-5c and
6-6a .)
DD Form 2836.
Special
Access Program Indoctrination Agreement. (Cited in paras
6-6b , 6-6c(1) ,
6-6c(3) , 6-6c(6) , and
6-7a and b .)
DA Form 11-2-R. Management Control Evaluation Certification
Statement (
PDF
) (
FormFlow
)
DA Form 3964. Classified Document Accountability Record
( PDF
) (
FormFlow
)
DD Form 254.
Department
of Defense Contract Security Classification Specification
DD Form 350.
Individual
Contracting Action Report
SF 86.
Questionnaire for National Security Positions.
(Available at
http://contacts.gsa.gov/webforms.nsf.)
B-1. Headers for the data call sheet
part 1 chart:
a. Program nickname.
b. Codeword.
c. Army or Non-Army
Sponsor.
d. Army POC (name,
title, phone number, nonsecure internet protocol network and secure internet
protocol network (if available), e-mail.
e. Nondisclosure
forms required?
f. Central billet
or knowledgeability roster maintained?
g. Army $ or man-years
spent on program (previous FY).
h. MOA or TOR?
i. Date of MOA or
TOR.
j. MOA or TOR review
authority?
k. Foreign material
acquisition?
l. Current estimated
FMA $ values.
m. Type of sensitive
activity if not SAP.
n. Type of Army
involvement if not SAP.
B-2. Headers for the data call sheet
part 2 chart:
a. Program nickname.
b. Secure environment
contracting office.
c. Contract number.
d. Contractor name
and address.
e. Date of contract
award.
f. Contract length
(base year + option years).
g. Total estimated
contract amount.
h. Total $ obligated
to date.
i. DCMA utilized?
(1) Yes.
(2) No.
j. If DCMA utilized,
preaward, postaward, or both?
k. DSSN & location
of paying office.
l. Access to SCI
on
DD
254 ?
(1) Yes.
(2) No.
m. NISPOM options
issued in the DD 254?
(1) Yes.
(2) No.
n. DD 254 sent to
the TMO?
(1) Yes.
(2) No.
o. PCO, ACO, and
DCAA auditor names, phone numbers, and e-mail.
p. Brief narrative
of SAP leases.
Use the following instructions to complete the PPBERS charts (figs
C-1 and C-2 ).
C-1. Program appropriation
Prepare a PPBERS chart for each program appropriation on 8 1/2- by 11-inch
white bond paper and place proper security classification markings at the
top and bottom of each chart (see figure C-1).
a. Fiscal year and
quarter. In the upper left-hand side of second row labeled "FY"
and "QTR," enter the fiscal year and quarter under review.
b. Program nickname.
In the middle of the second row, after "PGM", enter actual program nicknames.
Do not use funding nicknames.
c. Program office.
In the upper right-hand side of the second row labeled PROPONENT, enter the
name of the program office, POC, and telephone number.
d. Current year.
Directly under OVERALL PROGRAM OBJECTIVES, display bar graphs of planned
and actual obligations and disbursements for current fiscal year funding.
Enter the type of appropriation (that is, RDT&E, OMA, or procurement)
at the top center of the bar graph. The "X" axis shows the quarters of the
fiscal year; the "Y" axis on the left side shows the program dollars in millions.
The columns represent amounts cumulative by quarter. The "Y" axis on the
right side shows the percent of total program.
e. Obligations and
disbursements. The block directly under the bar graph labeled
RESOURCE DETAILS contains cumulative amounts of OBLIGATIONS and DISBURSEMENTS,
with each divided as follows:
(1) QTR/FY. Use the first line to display the previous
year cumulative amounts (plan and actual obligations; actual disbursements).
Break out current year amounts by quarter.
(2) PLAN ($M). Equals the cumulative amount of funds
planned for obligation. This figure does not include prior year funding carried
over.
(3) ACTUAL ($M). Reflects actual cumulative obligations
and disbursements shown at the end of quarter in official accounting reports.
(4) DA GOAL (% PROG). Shows the DA goal percentage.
(5) ACTUAL (% PROG). Shows the percentage derived
by dividing the actual obligations/disbursements by the total programmed
amount for that fiscal year (that is, the amount shown in the resource summary
block). Address all deviations as less than 10 percent in the analysis section.
f. Deviation. In
the top upper right-hand corner of the chart, rate the program RED if deviation
is greater than 15 percent), AMBER (deviation 10 to 15 percent), or GREEN
(deviation less than 10 percent).
g. Funding. Directly
under PROPONENT is the RESOURCE SUMMARY" block. The first subheading shows
funds APPROPRIATED by Congress for the current and previous year. The PROGRAMMED
amount is the appropriated amount minus adjustments for small business innovation
research, closed account, and approved reprogrammings. In the upper right
corner of the block, after PE, enter the appropriate number.
h. Discussion. In
the ANALYSIS block, discuss
(1) Plans for funds carried over from the previous
fiscal year.
(2) Why actual obligations or disbursements differed
from plan (if less than 10 percent), and how and when the program will be
back on track.
(a) Disbursements. Brief comments to support
issues:
(1) Disbursements not reported by DFAS: $
(2) Not recorded or erroneously posted disbursements
DFAS: $
(3) Invoices and billings not yet paid by DFAS:
$
(4) Unit has not submitted acceptance/receiving
report to DFAS: $
(5) Work performed or goods received but not
yet billed: $
(6) Total unreported disbursements and accruals:
$
(b) Combined disbursements and accruals. $
(3) What unresolved issues remain.
(4) Difference between appropriated and programmed
amounts (that is, small business innovation research, closed account, and
reprogrammings).
(5) Current personnel strength for military and
civilian employees, including matrix support. Here all personnel who spend
at least 50 percent of their time in support of the program must be shown.
Totals must be in whole numbers and must be updated quarterly.
(6) Date of the last audit (DAIG, DOD IG, AAA, and
so forth).
i. OMA funds. Prepare
a separate PBBERS chart for OMA funds. Enter current fiscal year data only.
Track obligations only. See OMA sample at figure C-2 .
C-2. Procurement funds
Prepare a separate PBBERS chart for procurement funds. Enter the same data
as shown on the RDT&E sample PBBERS chart ( figure
C-1 ). Because procurement SAPS are funded for 3 years, prepare a summary
line for each of the 2 preceding years above the current year's quarterly
breakdown in the RESOURCE DETAILS box.
Figure C-1. RDT&E PBBERS chart
Figure C-2. PBBERS chart for procurement fund
The following is guidance to be used to prepare the standard QUAD Chart Slide
for the POM/budget estimate submission and the annual SAP report (the TMO
maintains the most current format).
D-1. Upper left-hand side
a. This should show
photo/line drawing/artist sketch of the item being developed. If a technology,
provide an illustration of the technology application. An explanatory caption
may be included.
b. "A picture is
worth a thousand words."
D-2. Upper right-hand side
a. Insert program
status.
b. Show important
issues affecting program status or progress.
D-3. Lower left-hand side
a. Insert brief program
description. What is it? Where is the program going? What need does it fill?
Why is it a SAP?
b. List the major
points and successes or problems.
D-4. Lower right-hand side
a. At a minimum,
include the current fiscal year and the next two fiscal years.
b. Include most recent
or next (whichever is closer) milestone or Defense Acquisition Board level
review.
c. Fiscal year total
includes all types of funds (research and development, procurement, operations
and maintenance, and so forth).
d. Schedule bars
should be accurate to the month if possible.
D-5. Format instructions
a. Generate a slide
using PowerPoint (or other presentation) software.
b. Slide should be
formatted using the SAPOC slide format as a guide (see fig
D-1 ).
Figure D-1. Sample slide format for Standard QUAD chart slide
E-1. Establishment of checklist/timeline
Table E-1 is a list of the major events required to
establish a SAP.
Table E-1. SAP establishment timeline
Day |
Event |
|
0
|
Memo requesting PSAP status and draft security plan sent to
TMO |
|
15
|
PSAP memo staffed within HQDA |
|
40
|
TMO approves PSAP and dispatches PSAP approval memo request
for SAP establishment memo given. Knowledgeability roster started |
|
60
|
Proponent submission of proposed structure and manning proposal
to USAFMSA for preliminary validation |
|
100
|
Final security plan, billet structure (waived programs), draft
SAPOC briefing slides, and request to establish SAP memo to TMO |
|
120
|
USAFMSA manpower report submitted |
|
130
|
TMO conducts working SAPOC |
|
160
|
HQDA SAPOC meets |
|
180
|
TMO submits SAPOC paperwork to OSD |
|
220
|
Deputy Secretary of Defense approves SAP |
|
TBD
|
OSD submits notification letters to Congress |
|
TBD+30
|
SAP can obligate funds |
E-2. Format for requesting establishment
of a prospective SAP
a. The proponent
submits a request to establish a PSAP in the format shown below through the
chain of command to the TMO.
b. Format of the
request follows.
(1) Agency/proponent of the PSAP and chain of command
from program office to HQDA.
(2) Relationship to other programs in DOD or other
Government agencies.
(3) Rationale for PSAP establishment.
(a) Critical elements (essential program information,
technologies, and systems) of the program that cannot be adequately protected
under the provisions of
AR 380-5 and reasons why collateral measures are inadequate.
(b) Recommendation and justification of category
for the SAP.
(4) Funding sources and funding profile by
appropriation.
(5) Key program personnel.
(a) Agency POC (position, address, and phone).
(b) PD/PM (address and phone).
(c) PSM (address and phone).
E-3. Format for requesting establishment
of a SAP
The proponent submits a request to establish a SAP to the TMO in the format
below:
a.
Agency/proponent and chain of command from
program office to HQDA.
b. PSAP establishment
date.
c. Relationship to
other programs in DOD or other Government agency.
d. Rationale for
SAP establishment.
(1) Critical elements of the program that cannot
be adequately protected under the provisions of
AR 380-5 and reasons why collateral measures are inadequate.
(2) Multidiscipline CI threat to the program.
(3) Recommended SAP category with rationale.
e. Access.
(1) Access control authority
(2) Access approval authorities.
(3) Estimated number of people with access.
f. Program security
plan (include SCG, security procedures guide, OPSEC Plan, billet structure,
and program indoctrination briefing).
g. Key program personnel
(include address and phone numbers).
(1) PD/PM.
(2) PSM.
(3) Contracting office and its location.
h. ISRP.
i. Any MOAs (if
applicable).
j. Anticipated cost,
proposed funding profile, and location of accounting support.
k. Management control
for the program.
l. Proposed manpower
requirements and personnel profile displayed by officer, warrant officer,
enlisted, and DA civilian. Include proposed grade and military occupational
specialty/job series.
m. Agency POC (position
or title, address, and telephone number).
Working SAPOC charts will be submitted in the following format (
fig F-1 , slides 1-37). Programs will not modify the
format. SAPOC charts will be created from slides submitted from WSAPOC. WSAPOC
slides will be submitted to the TMO on electronic media a minimum of 5 working
days prior to the scheduled Working SAPOC date.
Figure F-1. Formats for Working SAPOC charts, slides 1-37
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
Figure F-1. Formats for Working SAPOC charts, slides 1-37Continued
F-1. (Paragraph not used.)
F-2. (Paragraph not used.)
Figure G-1 is an example of a fix-it status sheet.
Figure G-1. Sample fix-it status sheet
G-1. (Paragraph not used.)
G-2. (Paragraph not used.)
H-1. Format
There is no prescribed format for the disestablishment concept plan.
H-2. Content
Plans must provide detailed information with respect to timelines and suspense
dates. Each disestablishment concept plan must address the following:
a. What is the
basis/rationale for disestablishment?
b. What are the fiscal
contrals for contractor close out and termination costs? What are the fiscal
controls for funds not obligated and funds obligated but not disbursed? What
are the fiscal controls for transfer and control of prior year accounting
records?
c. What is the
disposition of SAP records and files? What is the disposition of AIS media
(both Government and Contract) will be in accordance with
AR 380-5 ?
d. What is the
disposition of any Government-owned property, both Government-furnished equipment
and equipment purchased by vendors?
e. What is the
recommendation on security level of remaining program, if any (collateral,
incorporated into another SAP, unclassified, and so forth)?
f. What are the legal
considerations?
g. How is coordination
implemented with the appropriate Army Staff proponent,
DCS, G-2 ,
DSS, and TMO to ensure new security guidance is applied to any related DOD
program?
h. How are debriefings
to be handled and the number of individuals to be debriefed along with a
proposed timeline for those debriefings?
i. How are documents
to be remarked?
j. What are the
contracting considerations? How are close out and final contract payments
reconciled with funds obligated in accounting records?
Note. Contractor turns over all SAP material to the PSM.
k. What is the
disestablishment timeline with critical events highlighted?
l. What is the plan
for all international program information, AIS, or equipment?
m. What arrangements
have been made for inspections by the DAIG, DSS/USAINSCOM, DCAA, and other
applicable organizations (with TMO oversight assistance)?
H-3. Disestablishment timeline
This table shows the timeline for disestablishment of an Army SAP.
Table H-3. SAP component disestablishment timeline
Special access program |
Subcompartment (individual) |
Day |
Event |
Day |
Event |
|
-90
|
MACOM/PEO sends memo requesting disestablishment to the TMO
for staffing/approval.
|
-30 to
-90 (see event comments)
|
MACOM/PEO sends memo requesting disestablishment to the TMO
for staffing/approval. If closure of subcompartment will change the mission
or scope of the parent, must follow timeline for SAP Parent. |
|
-60
|
The TMO returns memo w/ approval to MACOM/PEO for execution
with a no later than date.
|
0
|
The TMO returns memo w/ approval to MACOM/PEO for execution
with a no later than date. |
|
-30
|
Executive SAPOC requesting disestablishment. SAPOC (thru TMO)
forwards recommendation to SA.
|
60
|
Program is closed out and inspected. MACOM/PEO sends certification
letter to TMO that disestablishment actions specified in
appendix I have been accomplished. |
|
0
|
SA recommendation to OSD, Deputy Secretary of Defense for
decision. Deputy Secretary of Defense forwards recommendation to Congress.
|
|
|
|
14
|
If no objection from Congress, the TMO notifies Army Staff,
MACOM, and PEO that disestablishment has been approved; program commences
disestablishment.
|
|
|
|
180
|
Program is closed out and inspected. MACOM/PEO sends certification
letter to the TMO that disestablishment actions specified in appendix I have
been accomplished.
|
|
|
I-1. Checklist
MACOMs/PEOs and PDs/PMs use this checklist to certify SAP disestablishment
is complete:
a. Access controls
eliminated.
b. Normal oversight
restored.
c. Disposition of
SAP funds finalized (current and prior year).
d. Letters of agreement
and expenditure authorization documents for special mission funds or intelligence
contingency funds canceled, if applicable.
e. Status of open
contracts compared with funds available.
f. Project funds
reprogrammed.
g. Nickname and/or
code words no longer in use.
h. Indoctrination
forms no longer used.
i. Special markings
no longer used.
j. Polygraph program
terminated (if applicable).
k. DSS/USAINSCOM
notified and DSS/USAINSCOM has performed contractor closeout inspections
in accordance with the disestablishment plan.
l. Updated SCG published
and distributed.
m. SAP security plan
no longer used.
n. SAP hardware properly
disposed.
o. SAP files and
records properly disposed.
p. Debriefings complete.
q. Updated
DD
Form 254 issued to the contractor by contracting officer detailing his
or her actions concerning program material and security.
r. CIO/G-6 contacted
for IT disestablishment procedures.
I-2. Certification memorandum
In coordination with USAINSCOM, after the MACOM/PEO certifies that
disestablishment is complete, the PDs/PMs will forward a memorandum through
the chain of command to the TMO specifying all actions specified in the
disestablishment plan are complete.
J-1. Security incident checklist
Use the AIS security incident checklist to document each step taken by personnel
discovering an AIS SAP related incident.
a. Name of person
reporting incident.
b. Date.
c. Type of incident
(vircle one):
(1) Data Spillage
(2) E-mail.
(3) Briefing.
(4) Memo.
(5) Spread Sheet.
d. Date and time
of incident.
f. On what network
did the incident occur (circle all that apply)?
(1) NIPERNET.
(2) SIPERNET.
(3) TS/SC.
(4) Wireless E-mail.
g. What is the
classification of the information?
h. Who was the
originator?
i. What was the subject
line?
j. Who is the data
owner?
k. When was the PSM/PD/PM
notified?
l. Was a risk assessment
conducted?
(1) Yes.
(2) No.
m. When was the covering
agent notified?
n. Who is the covering
agent?
o. When was the
DCS, G-2
notified?
p. When was TMO security
notified?
q. When was SAP chain
notified?
r. When was the
information system manager notified?
s. Who were all the
recipients of the document?
t. When was the network
taken offline?
u. What tools were
used to sanitize the system?
v. Was backup material
sanitized?
(1) Yes.
(2) No.
w. Were infected
hardware labeled and serial numbered for tracking purposes?
(1) Yes.
(2) No.
x. List the hardware
and associated serial numbers.
J-2. Completed report
PSM will maintain the completed report until the hardware has been degaussed
in accordance with the NISPOM Supplement Overprint program is declassified.
When an Army AIS is inadvertently contaminated with SAP data, the following
procedures will be taken.
K-1. Unauthorized access
Individuals not authorized access to SAP information who discover any documents,
e-mails, briefings, and so on that contains information with SAP markings
or is believed to be SAP information will contact their unit security manager
immediately. Within 24 hours, the unit security manager will contact the
DCS, G-2 and
TMO security. The DCS, G-2 will notify the respective PD/PM and/or PSM who
will ensure that the procedures outlined in this guidance are followed.
Individuals within the SAP community will immediately notify the SAP PSM
or the PD/PM of the incident. The PSM/PD/PM will review the data to validate
that the information in question is SAP material. Do not delete e-mail or
documents in question until directed by the PSM and do not allow access to
the workstation or storage site to any non-SAP-briefed personnel. After an
incident has occurred and a decision (see para 5-9c )
has been made that a piece of hardware is permitted for continued use
a. A unique sticker/label
will be created and affixed in a conspicuous location that identifies the
piece of hardware is permitted for use in its current environment and
classification level but needs to receive special handling for disposal.
b. Immediately notify
local information system managers to cease operation on affected systems
until all SAP data has been removed from the network. The information system
manager will take the following actions (documenting each step for later
review by security personnel):
(1) Isolate affected hardware and label with appropriate
classification marking until sanitizing efforts are complete. This will include
both the workstation of the individual reporting the incident and all network
servers associated with that workstation.
(2) Disable the exchange (or follow-on generation
software package) accounts of the sender and all recipients of e-mail (and
verify status of any blind courtesy copies sent) related information.
K-2. Level of compromise
a. Incident occurrence
on unclassified net. The information system manager will
(1) Immediately cease all operations on the network
until source and destination of information is determined.
(2) Isolate affected hardware.
(3) Determine level of material sent over system.
If material is TS or SCI caveated, remove hardware and control in accordance
with DCID 6/9 procedures. If material level is collateral SECRET, run word
search program for key words provided by the PSM.
(4) Sanitize the system in accordance with procedures
listed in K-3 and K-4.
(5) Record the serial number of the cleaned hardware.
Maintain internal log of hardware location to ensure hardware is never released
outside of Army channels. Prior to release outside of Army channels, hardware
must be degaussed in accordance with the NISPOM Supplement Overprint.
b. Incident occurrence
on SECRET net (SIPERNET). The information security manager will
(1) Immediately cease all operations on the network
until source and destination of information is determined.
(2) Isolate affected hardware.
(3) Determine level of material sent over system
and run word search program. If material is TS or SCI caveated, remove hardware
and control in accordance with DCID 6/9 procedures.
(4) Sanitize the system in accordance with procedures
listed in K-3 and K-4.
(5) Record serial number of cleaned hardware. Maintain
internal log of hardware location to ensure hardware is never released outside
of Army channels. Prior to release outside of Army channels, hardware must
be degaussed in accordance with the NISPOM Supplement Overprint.
c. Incident occurrence
on TS/SCI net. Follow procedures outlined in DCID 6/9.
K-3. Clean-up activities
These involve the inspection of each machine to determine if it has been
contaminated, sanitization of each workstation and hardware involved, and
re-inspecting each machine to verify effectiveness of the sanitization process.
Procedures for sanitizing workstations:
a. The information
security manager (timing is case specific) will
(1) Visit the user(s) who discovered and received
the SAP related document.
(2) Conduct a word search of the individual workstations
C drive to ensure document is not resident on the individual workstation.
(3) Search any additional drives connected to the
workstation for the relevant document(s).
(4) For e-mail violation search the individual
workstations for the following:
(5) Check outlook profile for personal folders.
(6) Search for .PST files on all local drives. If
personal folders exist, scan them and ensure that the offending message/data
are not present. If the offending message/data are found, the hard drive
needs to be pulled and sanitized.
b. Check to see if
Auto Archive is enabled. If Auto Archive is enabled, document the location
of the Auto Archive file and scan it for the offending message/data.
c. Check to see if
work offline is enabled. If work offline is enabled, document the file location
of .OST. Search local drives for .OST file. Document the modified date of
all .OST files found. If the modify date of the .OST file is on or after
the date of the incident the hard drive needs to be pulled and sanitized.
d. Ensure no rule
exists to forward e-mail; from Outlook, click on the user's mailbox and go
to Tools, Out of Office Assistant (search for rules).
e. Check mail forwarding
on the server side; check for Alternate Recipients.
K-4. Action on affected servers
The following procedures will be accomplished on all affected servers. The
tools listed are recommended, but are not the only tools available. Check
with CIO/G-6 for
the latest recommend tools. The information security manager will
a. Process for sanitizing
the server.
(1) Install On Track Power Controls 1.0 and Ultra
Wipe on the exchange server where the receiving mailbox of the offending
message/data resides.
(2) Search for the phrase of the offending message/data
using Power Controls software. The exchange server must be stopped to search
for the phrase.
(3) Stop unnecessary services to speed up the search
process.
(4) If an instance of the message/data is found,
start the exchange services and delete the message from its location.
(5) Defragment the information store of the exchange
server by running the following command:
C:\exchsrvr\bin\eseutil/d/tE:\TempPriv.edb/ispriv.
(6) Run Ultra Wipe and delete all free space on
the Server.
(7) Scan information store again for the phrase
(if an instance of the message is found repeat preceding steps).
b. Process for sanitizing
the backup media.
(1) Remove backup media from storage and wipe clean
of all data.
(2) Reformat media and verify all previous information
has been removed.
(3) Assign a serial number or other tracking number
(for example, label) to the media and place back in service.
(4) When media is finally removed from service dispose
of in accordance with national security requirements.
K-5. Wireless e-mail devices (Blackberry)
These are primarily used for processing information at the unclassified and
FOUO level, therefore the recommended response to an incident involving
classified information is to destroy the device in accordance with NISPOM
Supplement Overprint procedures for hardware and software destruction. Any
inadvertent processing of SAP information requires the following immediate
action:
a. Immediately notify
the PSM or the PD/PM of the incident. The PSM/PD/PM will review the data
to validate that the information in question is SAP material. Do not delete
e-mail or documents in question until directed by the PSM and do not allow
access to the wireless device to any non-SAP personnel.
b. Immediately notify
local information system managers, who will take the following actions:
(1) Isolate the affected hardware and label with
appropriate classification marking until sanitizing efforts are complete.
(2) Disable the exchange accounts of the sender
and all recipients of e-mail related information.
c. Document each
step taken.
d. Removal of specific
e-mail from Blackberry devices (see para K-5 ). The
information system manager will
(1) After receiving permission from the PSM, delete
the e-mail from the Blackberry device.
(2) Open the Desktop manager and place the device
in the cradle. If prompted to perform "automatic backup," click "NO".
(3) Open "Backup and Restore" utility within the
Desktop Manager.
(4) Click "Backup" to backup ALL the handheld databases.
The e-mail that was deleted will not be saved in the backup. Note the name
and location of the backup file.
(5) When the backup is completed, close the Desktop
Manager completely.
(6) Open a command prompt and switch to the directory
containing the programmer.exe application, which comes bundled with the
Blackberry version 2.1 software developers kit. You may need to specify the
serial port. Run the following command: C:\Program Files\Research in
Motion\Blackberry Handheld SDY 2.1\tools\programmer nuke.
(7) When the "nuke" program is completed, restart
the Desktop Manager and open "Application Loader" utility.
(8) Follow the install wizard to reinstall the operating
system and any applications desired.
(9) Finally, to restore the user's data, go into
the "Backup and Restore" utility again, and this time select "Restore." When
the file dialog box appears, be sure to select the correct backup file.
(10) Maintain a log of the serial number and return
device to the user. Serial numbers must be maintained to ensure the device
is not released outside of Army channels prior to degaussing the device in
accordance with the NISPOM Supplement Overprint.
K-6. Incident reporting
For incident reporting, see paragraph 5-9 . For additional
guidance for AIS incidents, see appendix J .
Use the following format when preparing an ISRP.
L-1. General
a. Unclassified name
or short title of program.
b. Name of project
proponent.
c. Project participants
(agency name, address, point of contact, and secure/nonsecure telephone numbers).
d. Format.
L-2. Scope of requirement
Hardware/software specifications for information systems.
L-3. Urgency
a. Priority need.
b. Implementation
c. Date initial
operational capability required.
d. Date final operational
capability required.
e. Impact if service
is not provided.
L-4. Existing capability
a. Common user or
dedicated information systems capabilities that presently exist or are available.
b. How capabilities
satisfy any portion of IM requirement in their present or modified state.
L-5. Security management
a. Name of security
manager.
b. Unique security
requirements.
c. Appropriate extracts
of the program security plan and classification guide.
L-6. Funding
Type and source of funds to be used for information systems acquisitions.
L-7. Procurement
Concept for procurement of information systems.
L-8. Accountability
Describe the concept for property accountability.
L-9. Technical requirements
a. Type of service
required.
b. Type of traffic
to be transported.
c. Interfaces with
existing systems, networks or equipment.
d. Different capabilities
required for different phases of the project.
e. For communications
security material/equipment, the supporting communications security account
number(s), name, address, and telephone number(s) of communications security
custodian(s).
f. Resource requirements,
engineering, fabrication, installation, operations, training, and maintenance
necessary to provide service.
Use the format for IMSP to identify the finite information management
requirements of a SAP or sensitive activity. The clarity provided in the
IMSP merely amplifies the information management requirements generally referred
to in the IMSP (see para 8-4 ). Prepare the plan in
the following format.
M-1. Executive summary
Describe project scope, background, overview, recommendations, and conclusions.
M-2. Main body
a. Purpose. Summarize
the proponent's requirements.
b. System
description. Describe, in detail, the general system, network,
facilities, equipment, services, and support required, both for current and
future proposed system(s), to satisfy the proponent's requirements.
c. Technical analysis and cost
estimates. Provide a technical analysis of future IT systems,
including a cost estimate covering five fiscal years and an annual estimate
for sustaining operations and maintenance over the life cycle of the project.
d. Management, command, and
control. Indicate the management, command, and control structure
of the project participants. Include personnel and organizations both internal
and external to the command structure.
e. Financial
management. Identify the financial management structure, procedures,
and methodologies to be applied against the project. It is the SAP manager's
responsibility to budget for information management support.
f. Resource
management.
(1) Manpower. Determine the realistic and prudent
manpower requirements to support the IS initiative throughout its life cycle.
(2) Material. Indicate the material required to
support the project and identify issues and details relevant to the acquisition
and implementation of the project.
(3) Funds. Indicate the methodologies to be applied
against the project, to include estimated cost(s) of proposed IT projects.
g. Security.
(1) Note billets and access.
(2) Describe, in detail, the information systems
security concept.
h. Operations
security. Describe the security plan for the project's information
systems.
i. Architecture and configuration
management.
(1) Identify systems, networks, and equipment fielded
to ensure compatibility with the Army information architecture.
(2) Establish an information systems configuration
control board and procedures for controlling changes, enhancements, and system
upgrades.
(3) Identify a configuration control manager for
the information systems project.
j. Project
implementation. Describe how the information systems project will
be implemented over initial, expanded, and final phases and how the project
will be prioritized by phase.
k. Operations and
maintenance. Identify roles, relationships, and responsibilities
concerning the operation and maintenance of the information systems, networks,
and equipment.
l. MOA/interservice support
agreements. Indicate any MOA/ interservice support agreements
that would be required to effectively execute the project.
m. Integrated logistic
support. Describe the integrated logistic support concept for
the information systems and technical activities in support of the equipment
and material during its life cycle.
n. Property
accountability. Provide details on how accountability of project
equipment and material is maintained.
o. Service/support
agreements. Provide listing by type (Letter of Agreement, MOA,
MOU, and so on) that provides as a minimum the effective dates, brief description
of the services/support provided or obtained, the parties signing the document,
and its classification.
p. Approvals and
coordination. After the proponent has developed the IMSP, the
IMSP is submitted via SAP channels through the MACOM or PEO, through the
TMO, to CIO/G-6 for
approval. Following approval, CIO/G-6 may task USACECOM-TAO to provide
information system support.
Figure N-1 is a sample reprogramming request.
Figure N-1. Sample reprogramming request
Figure N-1. Sample reprogramming requestContinued
N-1. (Paragraph not used.)
N-2. (Paragraph not used.)
O-1. Function
Use this management control evaluation checklist for SAPs, AR 380-381.
O-2. Purpose
Use of this checklist assists MACOM commanders, PEOs, and PDs/PMs in their
key management controls. It is not intended to cover all controls.
O-3. Instructions
Answers must be based on the actual testing of key management controls (for
example, document analysis, direct observation, interviewing, sampling,
simulation, other). Answers that indicate deficiencies must be explained
and corrective action indicated in the supporting documentation. These management
controls must be evaluated every 5 years. Certification that this evaluation
has been conducted must be accomplished on
DA
Form 11-2-R (Management Control Evaluation Certification Statement).
O-4. Test questions
The test questions below are divided into categories involving separate areas
of SAP management controls.
a. SAP Management.
(1) Has the Army SAPOC recommended the program for
SAP status?
(2) Has the Secretary of Defense or the Deputy Secretary
of Defense approved the program for SAP status?
(3) Does the PD/PM have a copy of the SAP approval
document?
(4) Have manpower authorizations been validated
by the DCS,
G-3 within the past 12 months?
(5) Is the program's nickname and subcompartment
nicknames or code words, if appropriate, assigned by the TMO?
(6) Is the SAP revalidation approval briefing presented
annually to the SAPOC?
b. SAP Security
Management.
(1) Are the program's security measures commensurate
with the program's category level (under provisions of AR 380-381) and the
threat?
(2) Is the security officer's status (full time
or part time) consistent with the program's category?
(3) Does the program have a current security plan,
which includes a security procedures guide, SCG, and OPSEC plan?
(4) Are program billet structures current, accurate
and sufficient (that is, meet security and operational needs)?
(5) Are program access rosters current and accurate?
(6) Is the classification guide current? Did the
TOP SECRET original classification authority approve the SCG?
(7) Does the program have required CI documentation
to include a CI vulnerability assessment, CI support plan, and technical
services plan (when required)?
(8) Has the ACA identified in writing all access
approval authorities for the program?
(9) Do all access approval authorities have a listing
of their duties and responsibilities?
c. Secure environment
contracting.
(1) Do vendors have adequate protection for SAP
material?
(2) Has the
DD
Form 254 been forwarded to the TMO and DSS?
(3) If a patent contains SAP information, was FARS
(48 CFR 52.227-10) included in the contract?
(4) Did the vendor forward the proposed patent through
the procuring contracting officer to the SAP PD/PM?
(5) Did the PD/PM forward the patent filing information
through HQDA , ASA (ALT), ATTN: SAAL-SO, to the TMO for VCSA approval?
d. Financial
management.
(1) Does the program report accurate information
to the HQDA SAP PPBERS committee?
(2) Are all reprogrammed funds approved by the Under
Secretary of the Army or by the Army Staff proponent?
(3) Are the program's SAP funding nicknames assigned
by the TMO?
(4) Does the program prepare and submit a congressional
descriptive summary annually?
(5) Are annual budgets submitted to support timely
receipt of funding for program operations?
e. Audits and
inspections.
(1) Has the PD/PM coordinated with the supporting
IRAC office to ensure SAP is included in the command's auditable entity file?
(2) Has an IRAC auditor reviewed the management
control plan annual assurance statement for SAP considerations?
(3) Do auditors have program access to conduct reviews?
(4) Has the SAP had an AAA audit or DAIG inspection
within the past 2 years?
(5) Are non-IRAC audit and inspection findings formally
incorporated into the Fix-It process and tracked until resolved?
f. Information systems and SAP
records management.
(1) Is the program IMSP current and has it been
submitted through the TMO for approval by
CIO/G-6 ?
(2) Are the program's AIS accredited?
(3) Does the program security procedures guide address
AIS and comply with appropriate regulations?
(4) Has the program office established SAP files
in accordance with
AR 25-400-2 ?
(5) Does the program office review and separate
permanent files and other appropriate documents for transfer to SRIA?
(6) Does the program office destroy SAP temporary
files and working documents in accordance with AR 25-400-2 and
AR 380-5 ?
g. Property
accountability.
(1) Has the program acquired accountable or reportable
property in support of the SAP and has that property been accounted for and
reported in accordance with existing regulatory guidance governing property
accountability?
(2) If the program is being disestablished, has
the program secured disposition instructions for previously accountable and/or
reportable material acquired during the life of the program?
O-5. Supersession
This checklist replaces the checklists for management controls previously
published in AR 380-81, dated 12 October 1998.
O-6. Comments
Help make this a better tool for evaluating management controls. Submit comment
to Office, Chief of Staff of the Army, TMO (DACS-ZDV-TMO), 200 Army Pentagon,
Washington, DC 20310-0200.
AAA
Army Audit Agency
ACA
Access control authority
ACCM
Alternatative compensatory control measure
AIS
Automated information systems
AMC
Army Materiel Command
AR
Army regulation
ASATS
Army Special Access Tracking System
ASA(ALT)
Assistant Secretary of the Army (Acquisition, Logistics and
Technology)
ASA(FM&C)
Assistant Secretary of the Army (Financial Management and Comptroller)
ASA(M&RA)
Assistant Secretary for Manpower and Reserve Affairs
ASEP
Army SAP Enterprise Portal
CG
Commanding general
CI
Counterintelligence
CID
Criminal Investigation Division
CIO/G-6
Chief information officer, G-6
CLL
Chief of Legislative Liaison
CSA
Chief of Staff, Army
CTTA
Certified TEMPEST Technical Authority
DA
Department of the Army
DAA
Designated accrediting authority
DAIG
Department of the Army Inspector General
DCAA
Defense Contract Audit Agency
DCID
Director, Central Intelligence Directives
DCS, G-1
Deputy Chief of Staff, G-1
DCS, G-2
Deputy Chief of Staff, G-2
DCS, G-3
Deputy Chief of Staff, G-3
DCS, G-4
Deputy Chief of Staff, G-4
DCS, G-6
Deputy Chief of Staff, G-6
DCS, G-8
Deputy Chief of Staff, G-8
DFAS
Defense Finance and Accounting Service
DITSCAP
Defense Information Technology Security Certification and
Accreditation Process
DOD
Department of Defense
DODD
Department of Defense Directive
DODI
Department of Defense Instruction
DODIG
Department of Defense Inspector General
DSS
Defense Security Service
DTIC
Defense Technical Information Center
EIS-TAO
Enterprise Information Systems Technology Applications
Office
EO
Executive Order
FAR
Federal Acquisition Regulation
FIU
Field investigative unit
FOIA
Freedom of Information Act
GAO
General Accounting Office
GSA
General Services Administration
HQ
Headquarters
HQDA
Headquarters, Department of the Army
IMSP
Information management support plan
IRAC
Internal review and audit compliance
IRM
information resource management
ISRP
Information Systems Requirements Package
IT
Information technology
MACOM
Major Army command
MOA
Memorandum of Agreement
MOU
Memorandum of Understanding
NISPOM
National Industrial Security Program Operating Manual
ODUSD(P)(PS)
Office of the Deputy Under Secretary of Defense (Policy) (Policy
Support)
OMA
Operation and Maintenance, Army
OPDUSD (A&T)
Office of the Principal Deputy Under Secretary of Defense (Acquisition
and Technology)
OPSEC
Operations security
OSD
Office of the Secretary of Defense
PAC
Personnel access ceiling
PD
Program director
PEO
Program executive office(r)
PM
Program manager
POC
Point of contact
POM
Program objective memorandum
PPBERS
Program Performance and Budget Execution Review System
PSAP
Prospective special access program
PSG
Program security guide
PSM
Program security manager
RDT&E
Research, development, test, and evaluation
SA
Secretary of the Army
SAAL-SSP
Secretary of the Army, Acquisition, Logistics, and Technology
Systems Special Programs
SAP
Special access program
SAPCO
Special Access Program Coordination Office (OSD)
SAPF
Special access program facility
SAPOC
Special Access Program Oversight Committee
SAR
Special access required
SCAR
Special control and access required
SCG
Security classification guide
SCI
Sensitive compartmented information
SES
Senior Executive Service
SIRT
Security incident response team
SRO
Special Review Office
TAO
Technology applications office
TDA
Tables of distribution and allowances
TJAG
The Judge Advocate General
TMO
Technology Management Office
TRADOC
U.S. Army Training and Doctrine Command
TRC
Technical review committee
TSCM
Technical surveillance countermeasures
USACE
U.S. Corps of Engineers
USACIDC
U.S. Army Criminal Investigation Division Command
USAFMSA
U.S. Army Force Management Support Agency
USAINSCOM
U.S. Army Intelligence and Security Command
USASMDC
U.S. Army Space and Missile Defense Command
VCSA
Vice Chief of Staff, Army
Acquisition SAP
A special access program established primarily to protect sensitive
RDT&E or procurement activities in support of sensitive military and
intelligence requirements.
Alternative compensatory control measures (ACCMs)
Used to safeguard sensitive intelligence or operations and support
information (acquisition programs do not qualify) when normal measures are
insufficient to achieve strict need-to-know controls, and where SAP controls
are not required.
Carve-out contracts
Contracts that support Army SAP requirements, which exclude DSS
from performing contractor industrial security inspections.
Classified national security information
Information classified in accordance with EO 12958, as amended
by EO 13292, 25 March 03, that could reasonably be expected to cause damage
to national security if disclosed outside official Government channels.
Collateral information
Classified information that can be adequately safeguarded using
the ordinary security measures outlined in
AR 380-5
Extraordinary security measures
A security measure necessary to adequately protect particularly
sensitive information but which imposes a substantial impediment to normal
staff management and oversight. Extraordinary security measures are
a. Program access
nondisclosure agreements (read-on statements).
b. Specific officials
authorized to determine "need to know" (ACA/access approval authority).
c.
Nicknames/codewords for program identification.
d. Special access required
markings.
e. Program billet structure.
f. Access roster.
g. Use of cover.
h. Use of special mission
funds or procedures.
i. Use of a SAP
facility/vault.
j. Use of a dedicated
SAP security manager.
k. Any other security
measure beyond those required to protect collateral
l. information in accordance
with
AR 380-5 .
Foreground information
All information and material jointly generated and funded pertaining
to the cooperative program. This information is available for use by all
participating governments in accordance with the terms of an MOA.
Intelligence SAP
A SAP established primarily to protect the planning and execution
of especially sensitive intelligence or CI operations or collection activities.
Operations and support SAP
A SAP established to protect the planning for, execution of, and
support to especially sensitive military operations. An operations and support
SAP may protect organizations, property, operational concepts, plans, or
activities.
Program executive officeenterprise information systems
(PEO-EIS)
The PEO responsible for developing, acquiring, and deploying tactical
and nontactical IT systems and communications for the Army (examples include
transportation, medical, personnel, and supply automated tracking and
communications systems).
Security compromise
The disclosure of classified information to persons not authorized
access thereto.
Security incident
A security compromise, infraction, or violation.
Security infraction
Any other incident that is not in the best interest of security
and does not involve the loss, compromise, or suspected compromise of classified
information.
Security violation
Any incident involving the loss, compromise, or suspected compromise
of classified information.
Sensitive activities
Programs that restrict personnel access, such as ACC measures;
sensitive support to other Federal agencies; clandestine or covert operational
or intelligence activities; sensitive research, development, acquisition,
or contracting activities; special activities; and other activities excluded
from normal staff review and oversight because of restrictions on access
to information.
Sensitive compartmented information (SCI)
Classified information that can be protected only with security
measures authorized by AR 380-28.
Special access programs (SAPS)
A security program established under the provisions of EO 12958
and approved by the Deputy Secretary of Defense to apply extraordinary security
measures to protect extremely sensitive information. SAP status is defined
by
DODD
5200.1-R . Army SAPS include SAPS sponsored by others but for which the
Army is designated executive agent.
This section contains no entries.