Intelligence & Security

Intelligence & Security

System Security Engineering

Systems Security Engineering (SSE) is an element of Systems Engineering (SE) that applies scientific and engineering principles in a standardized, repeatable, and efficient manner to identify security vulnerabilities, requirements, and methods of verifications that minimize risks.  SSE delivers systems that satisfy stakeholder security needs for weapon system operation in today’s cyber-contested environments. [1] Definition: Systems …

Intelligence & Security

System Security Engineering Read More »

Intelligence & Security

Technology Release Roadmap

The Technology Release Roadmap (TRR) provides a projection of when export licenses will be required in support of the Acquisition Process and critical Milestones regarding national disclosure policy implementation on acquisition programs involving international involvement by foreign industry. The TRR is conducted prior to the Engineering, Manufacturing, and Development (EMD Phase.  The Program Manager (PM) …

Intelligence & Security

Technology Release Roadmap Read More »

Intelligence & Security

Special Access Program

Special Access Programs (SAP) is a compartmentalized source of information that has limited access for selected Critical Program Information (CPI). SAPs are created by departments and agencies and has protocols and safeguards from unintended disclosure that exceed normal (collateral) classified information. A SAP may impose more stringent investigative or adjudicative requirements, specialized nondisclosure agreements, special …

Intelligence & Security

Special Access Program Read More »

Intelligence & Security

Sensitive Compartmented Information (SCI)

Sensitive Compartmented Information (SCI) is a classification label that is put on data and information that is sensitive in nature and belongs to a certain program or department. The data can be derived from multiple sources as Critical Program Information (CPI), analysis data and/or intelligence data. The SCI moniker is normally used by the National …

Intelligence & Security

Sensitive Compartmented Information (SCI) Read More »

Intelligence & Security

Single Scope Background Investigation (SSBI)

A Single Scope Background Investigation (SSBI) is a type of security investigation conducted by the US Government to obtain a Top Secret (TS) clearance and access to Sensitive Compartmented Information (SCI).  Standard Form 86 (SF86) is required to begin the background check process. The SSBI examines information from the past ten (10) years about finances, …

Intelligence & Security

Single Scope Background Investigation (SSBI) Read More »

Intelligence & Security

National Industrial Security Program Operating Manual (NISPOM)

The National Industrial Security Program Operating Manual (NISPOM) establishes the standard procedures and requirements for all government contractors regarding classified information. It covers the entire field of government-industrial security-related matters. The NISPOM came from DoD 5220.22-M “National Industry Security Program Operating Manual (NISPOM)” but has been replaced by 32 Federal Regulation Part 117.” The website …

Intelligence & Security

National Industrial Security Program Operating Manual (NISPOM) Read More »

Intelligence & Security

Program Security Instruction

  A Program Security Instruction (PSI) details security arrangements for the program and harmonizes the requirements of the participants’ national laws and regulations. The PSI contains all of the security procedures that form the security “Standard Operating Procedures” for an international program. Using the Under Secretary of Defense OSD) for Acquisition, Technology and Logistics (AT&L) …

Intelligence & Security

Program Security Instruction Read More »

Intelligence & Security

Information Security (InfoSec)

Information Security (InfoSec) is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording, or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc…) [1] Three (3) security initiatives that fall under InfoSec are: Computer Security (COMPUSEC): is …

Intelligence & Security

Information Security (InfoSec) Read More »