SAP Basics Flashcards
Definition of SAP
A program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level.
When is a SAP established?
When the program is required by statute
OR
Upon finding of exceptional vulnerability of, or threat to, specific information
AND
When the normal criteria for determining access to information classified at the same level is insufficient
What are the levels of classification for SAPs?
Top Secret
Secret
Confidential
In addition to classification level, what else is required for SAP classification?
- Assigned nickname and/or codeword
- Identification of any special handling procedures
Define a SAP in the simplest terms
A classified program with enhanced safeguarding and access requirements
When were SAPs publicly acknowledged?
1980s
Why were SAPs originally established?
- To protect DoD acquisition programs
- To hide sensitive operations
What were SAPs originally called?
Black Programs
SAP changes in the 1990s
- Black Program replaced with Special Access Program (SAP)
- SAP security procedures were modified to include intelligence programs and operations and support programs (not just acquisition programs)
What is a well known Black Program?
- Skunk Works (code name for Lockheed Martin’s Advanced Development Programs)
- Responsible for the design of many famous and technologically advanced aircrafts, including the F-117A Nighthawk stealth fighter
What is the reason for greater oversight of SAPs?
An operation went ary and investigation prooved illegal use of funds, court martial and imprisonment of personnel and lack of oversight.
What is Operation Yellow Fruit?
- Army operation dealing with Iran Contra
- In 1983, an Army civilian stumbled onto billing irregularities at a U.S. intelligence front company that was handling secret supplies for Central America.
- Discovery led to the uncovering of the Yellow Fruit operation and the mismanagement of $300 million in funds over a 5 yr period
- Investigation proved illegal use of funds and lack of SAP oversight
- Personnel involved were court martialed and imprisoned
- Attracted the interest of Army’s Joint Chief of Staff and Congress
- Resulted in greater oversight of SAPs
Common SAP Misconceptions
- SAPs are used as a means to hide money spent on certain programs.
- SAPs are not a place to hide money; they are used to ensure the security and accountability of a specific project is maintained to the highest level. - SAPs are used to avoid taxpayer scrutiny.
- That is also not true. In fact, taxpayer understanding and awareness is often a key to an acknowledged program’s success. - SAPs are also believed to lack Congressional oversight.
- Following Yellow Fruit, Congressional oversight increased significantly and now requires reports on every DoD SAP be submitted to Congress annually.
Reasons for enhanced protections via SAP
Classification as a SAP is dictated by a program’s vulnerability to exploitation and the risk of compromise.
- Protect technology breakthroughs and ensure the U.S. maintains its leading technological edge.
- Ensure once we discover and exploit an adversary’s vulnerabilities, the knowledge of the exploitation remains secure and the adversary does not develop a countermeasure.
- Ensure sensitive operational plans are completed without disclosure. Of equal importance
- Protect intelligence information, which is often the key to a successful mission. Reducing the amount of intelligence gathered on U.S. forces significantly enhances our success on the battlefield.
F-117A Information
- Designed and built to go undetected by radar, the F-117A stealth fighter dramatically changed U.S. strategic advantage.
- During Operation Desert Storm, the F117A made up only two percent of the sorties, yet accounted for forty percent of the bomb damage.
- The importance and power of what can be accomplished through the use of SAPs should not be understated.
Importance of SAP Security - Example 1
In 1987, the USSR began deployment of the MiG-29 to its allies. It bore a striking resemblance to the U.S. F-15.
We have several examples of the Russians emulating U.S. military jets.
Importance of SAP Security - Example 2
In the late 1970s and early 1980s, the U.S. spent well over a million dollars developing the technology to allow aircraft to transport the space shuttle. A few years later, the Russians “borrowed” our technology, requiring far less research and development dollars.
Importance of SAP Security - Example 3
- In 2001, former FBI agent Robert Hanssen was arrested for selling American secrets to Russia. During his liaison with the DoD, Mr. Hanssen had access to SAPs.
- Due to the accountability mechanisms built into the SAP environment, it could easily be determined when and to what programs Mr. Hanssen had access.
- Such measures are essential to knowing the people involved in your programs and help facilitate damage assessment when necessary.