Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (40)
Special Access Program:
program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level.
is a classified program with enhanced safeguarding and access requirements.
SAPs are established only when:
the program is required by statute, or upon the finding of exceptional vulnerability of, or threat to, specific information, and if the normal criteria for determining access to information classified at the same level are insufficient. SAPs use the standard levels of classified information, that is, Top Secret, Secret, and Confidential.
SAP can be used to
- ensure that the knowledge of the exploitation remains secure and the adversary does not develop a countermeasure or cover exploitation of adversary vulnerabilities
- to ensure sensitive operational plans are completed without disclosure
- protect intelligence information, which is often the key to a successful mission or reduce intelligence oversight
- protect technology breakthroughs and ensure the U.S. maintains its leading technological edge
Access to SAP requires:
Formal Access Approval
- Maintain enhanced security top protect SAPs work and keep knowledge within SAP
- Enhance other security measures as needed
- Keep access to a minimum
- Enforce Need-to-Know
- Identify who has and has had access
SAP oversight is outlined in:
Section 119, Title 10 U.S. Code
reported annually to Congress
SAP Reports include:
notice of the designation of the program as a SAP and the justification for such designation; the current estimate of the total cost for the program; and identification of existing programs or technologies that are similar to the new SAP technology or mission.
Existing SAPs must submit annual report to Congress no later than 01 Mar of each year
Reports for existing SAPs include:
the estimated total budget requested for the current and next fiscal years; a brief description of the program, including the numbers of individuals involved; a brief discussion of the major milestones for the SAP, such as current issues or significant changes; and the actual cost of the program for each previous fiscal year. Submitted to Congress no later than 01 Feb
3 SAP Categories:
Acquisition, Intelligence, Operations & Support
Who is responsible for ensuring there are no duplicative efforts across SAPs?
Senior Review Group
The Senior SAP Working Group services to coordinate, de-conflict and integrate SAPs.
SAP Oversight Committee (SAPOC) is the formal SAP approving body?
Who communicated the approval to congress, when an agreement has been reached?
Special Access Programs Central Office (SAPCO)
What are SAPCOs functions?
- develops, coordinates, and publishes policy
- is the principle DoD POC for all SAP resources
- Director serves as Executive Secretary SAP Oversight Committee (SAPOC)
- Is the DoD SAP legislative liaison
- Ensures "one voice" to Congress
Only members of the Authorization and Appropriations Committees and their Defense Subcommittees are authorized access to SAPs
SAPs are subject to
- Inspections and audits
- Federal acquisition Regulation
- Defense Federal Acquisitions Regulation Supplement (DFARS)
- Defense Contract Management Agency Policy
The goal of a SAP is to maintain enhanced security to protect the SAPs mission and maintain knowledge within the SAP.
In which phase of the Special Access Program (SAP) life cycle does the annual review occur where it is decided if the program will be revalidated and continue operation, be restructured, or be transitioned to the disestablishment phase?
. Management & Administration
You have just been appointed at a government facility to provide security administration and management. You will receive guidance from the Program Security Officer (PSO). What is your role?
Government SAP Security Officer (GSSO)
Which of the following is true about the Department of Defense (DoD) Special Access Program (SAP) life cycle?
All Special Access Programs (SAPs) follow the same life cycle
Which of the following most completely describes the circumstances under which Special Access Programs (SAPs) are established?
The program is required by statute, the vulnerability of or threat to specific information is exceptional, and the normal criteria for determining access are insufficient.
Which of the following is not a goal of Special Access Programs (SAPs)?
Open access to the largest number and variety of personnel possible
Which entity is chaired by the Deputy Secretary of Defense?
Special Access Program Oversight Committee (SAPOC)
Need-to-know is the determination by an authorized holder of classified information that access to the information is required by another appropriately cleared individual to perform "OFFICIAL DUTIES."
Which of the following operations led to greater Special Access Program (SAP) oversight?
The Special Access Program (SAP) Dan works on is developing and building a new aircraft. What category of SAP is Dan most likely working on
Acquisition Special Access Program (SAP)
The initial need for a SAP can be initiated by:
Civilians, War fighters and Industry
You are a government employee about to begin work on a Special Access Program (SAP). You are reviewing policy and guidance. Which guidance outlines the baseline responsibilities of personnel to safeguard classified information?
DoD 5200.2-R, Personnel Security Program
We have Special Access Programs because they can _____________.
A. Protect technological breakthroughs
B. Cover exploitation of adversary vulnerabilities
C. Protect sensitive operational plans
D. Reduce intelligence on U.S. force capabilities
All the above
Which entities serve as the oversight authority for Acquisition, Intelligence, and Operations and Support SAPs?
DoD Special Access Program Central Office (SAPCO) X
In which phase of the Special Access Program (SAP) life cycle does the program undergo the closeout inspection?
An unacknowledged SAP for which the Secretary of Defense has waived applicable reporting requirements under Title 10 U.S.C. 119(e) is identified as an "Unacknowledged Waived SAP" and, therefore, has more restrictive Congressional reporting.
The vast majority of Department of Defense (DoD) Special Access Programs (SAPs) fall under which category?
Acquisition Special Access Programs (SAPs)
Program ABC is in the process of developing a super-secret new technology that could completely revolutionize the way wars are fought. The name of the program remains classified and its funding is not directly linked to that program. Which type of Special Access Program (SAP) does this most likely describe?
An Unacknowledged Acquisition SAP
Mary needs to review guidance directly applicable to all Department of Defense (DoD) Special Access Programs (SAPs). What should she review?
DoD published DoD Manual 5205.07, Volumes 1-4 which provides additional guidance and applies to all DoD SAPs
Carlo has just been assigned to an Unacknowledged Waived SAP. What should be expected in terms of reporting requirements?
The Secretary of Defense has waived applicable reporting requirements and, therefore, waived SAPs have more restrictive Congressional reporting requirements.
You have a question about guidance received from the Special Access Program Central Office (SAPCO) and need to speak with the government official who exercises authority on behalf of SAPCO or the service component designee of the Special Access Program (SAP). With whom should you speak?
Program Security Officer (PSO
Department of Defense (DoD) Special Access Programs (SAPs) are categorized and managed by the Under Secretaries of Defense. Which Under Secretary oversees DoD Intelligence SAPs?
Under Secretary of Defense, Intelligence (USD (I))
Some Special Access Programs (SAPs) are not assigned to a SAP category (Acquisition, Intelligence, or Operations and Support).
True or False? Data mining refers to the use of Web sites to disseminate propaganda to current and potential supporters, to influence international public opinion, and to notify potential enemies of pending plans.
True or False: All web sites always strictly adhere to their privacy policies.
"In its study of various organizations, the Ponemon Institute found that the most common cause of data breaches was:"
Malware payload allows an attacker to execute virtually any command on the the victim's computer; this is called
Sets with similar terms
SPēD SAPPC: General Security (copied)
DoD Directive 5205.07-1
SAPPC - Personnel Security
Other sets by this creator
DoD Mandatory Controlled Unclassified Info. (CUI)…
SAP Roles and Responsibilities
UD for CUI
Sensitive Compartmented Information Training
Other Quizlet sets
CSCS Ch 1-2 test questions
ROBLES 5a hora en la ciudad U3
Business Finance Final Quizzes
A high school teacher who simply goes through the motions of teaching classes without any thought of success is an example of which response in strain theory?
Read the following scenario, and then answer the questions: Two people are in a twenty-mile race. The winner will receive a prize of $100,000. Two of the competitors – Lynn and Tony – are very good runners, and both are good physical condition. At the beginning of the race Tony is told to put a set of ten-pound ankle weights on each leg, but Lynn is not. In fact, Lynn does not even know about the weights. When Lynn reaches the thirteen-mile marker, Tony is two miles behind. He is not only exhausted but is also experiencing a shortened running stride and is off-rhythm because of the weights. The judges decide to remove the ankle weights. a. Is it fair to continue the race with each runner finishing from his or her present position, or should Tony be moved forward in the race? b. What is fair to both parties? c. Assume that the race cannot be restarted. How do we compensate the runner who had to carry extra weights for over half of the race? d. are there solutions to the problem? e. Since the problem is difficult to solve, would it be fair simply to ignore it and conclude that things will eventually work out?
What factor determines a boat's required equipment? storage capacity rate of speed fuel tank weight length of boat
Bill gates has an estimated net worth of $51 billion. How would sociologists label Gates in terms of social class?