Intelligence & Security

Intelligence & Security

Validated Online Lifecycle Threat (VOLT)

The Validated Online Lifecycle Threat (VOLT) Report is a regulatory document for Acquisition Category (ACAT) I-III programs. These programs require a unique, system-specific VOLT Report to support capability development and PM assessments of mission needs and capability gaps against likely threat capabilities at Initial Operational Capability (IOC). Validated Online Lifecycle Threat (VOLT) Report Purpose The …

Intelligence & Security

Validated Online Lifecycle Threat (VOLT) Read More »

Intelligence & Security

Life-Cycle Mission Data Plan (LMDP)

The Life-Cycle Mission Data Plan (LMDP) defines specific Intelligence Mission Data (IMD) requirements for a program and becomes more detailed as the system progresses toward Initial Operational Capability (IOC). Definition:  The Life-Cycle Mission Data Plan (LMDP) is a statement of program needs that is applied throughout the life of an IMD-dependent acquisition program and potentially …

Intelligence & Security

Life-Cycle Mission Data Plan (LMDP) Read More »

Intelligence & Security

Initial Threat Environment Assessment

The Initial Threat Environment Assessment provides capability developers and Program Managers (PM) the ability to assess mission needs and capability gaps against likely adversary threat capabilities at Initial Operational Capability (IOC). It forms the basis for the initial System Threat Assessment Report (STAR) at Milestone A, and is superseded by the Milestone A STAR. The …

Intelligence & Security

Initial Threat Environment Assessment Read More »

Intelligence & Security

Technology Release Roadmap (TRR)

The Technology Release Roadmap (TRR) provides a projection of when export licenses will be required in support of the Acquisition Process and critical Milestones regarding national disclosure policy implementation on acquisition programs involving international involvement by foreign industry. The TRR is conducted prior to the Engineering, Manufacturing, and Development (EMD Phase.  The Program Manager (PM) …

Intelligence & Security

Technology Release Roadmap (TRR) Read More »

Intelligence & Security

Technology Assessment & Control Plan

The Technology Assessment/Control Plan (TA/CP) is prepared by the Program Manager (PM) when there will be foreign involvement on a program. It’s prepared after completing the identification of Critical Program Information (CPI) and the Security Classification Guide (SCG). The TA/CP does the following: [1] Assess the feasibility of U.S. participation in joint programs from a …

Intelligence & Security

Technology Assessment & Control Plan Read More »

Intelligence & Security

System Threat Assessment (STA)

A System Threat Assessment (STA) is obtained from the Intelligence community during the JCIDS shortfall identification process. It will be obtained primarily from the Capstone Threat Assessments (CTAs) and System Threat Assessment Report (STAR). The CTAs project foreign capabilities in particular warfare areas looking out 20 years. Once the JCIDS Process identifies a materiel solution …

Intelligence & Security

System Threat Assessment (STA) Read More »

Intelligence & Security

Threat-Assessment-Center-Report

  The Defense Intelligence Agency (DIA) Threat Assessment Reports provide specific and timely threat characterization of an identified suppliers to the Program Manager (PM) and Program Management Office (PMO). They are used to assist in selecting the supplier and/or architecture alternatives and developing appropriate mitigations for supply chain risks. [1]   Website: Defense Intelligence Agency …

Intelligence & Security

Threat-Assessment-Center-Report Read More »

Intelligence & Security

Technology Assessment & Control Plan

The Technology Assessment/Control Plan (TA/CP) is prepared by the Program Manager (PM) when there will be foreign involvement in a program. It’s prepared after completing the identification of Critical Program Information (CPI) and the Security Classification Guide (SCG). The TA/CP does the following: [1] Assess the feasibility of U.S. participation in joint programs from a …

Intelligence & Security

Technology Assessment & Control Plan Read More »