In the realm of National Security, the seamless integration and standardized security guidance across various branches of the United States Armed Forces is paramount. The Joint Air Force-Army-Navy (JAFAN) 6/0 form, encapsulated within the Special Access Program (SAP) Security Manual—Revision 1, dated 29 May 2008, serves as a cornerstone for this endeavor. This comprehensive manual extends its applicability to all Air Force, Army, and Navy Special Access Programs, outlining rigorous requirements, restrictions, and safeguards vital for the prevention of unauthorized disclosure of SAP information and controlling the authorized disclosure of classified information. As a foundational document, it establishes a uniform approach to security for service component SAPs, ensuring strict compliance with national-level policy and fostering reciprocity among the service components. At its core, the JAFAN 6/0 mandates consultations with the Government Program Security Officer (PSO) in cases of ambiguity or emergency, and under extraordinary circumstances, allows for the application of commensurate levels of protection to safeguard the government's interest and security of the program. The manual highlights mechanisms for seeking waivers, adjusting contractual documents, and delineates the roles of various offices and directives that fortify the protective measures surrounding Special Access Program information. It is the lifeline for security professionals navigating the complex landscapes of safeguarding classified information within the intricate architecture of the United States defense establishment.
Question | Answer |
---|---|
Form Name | Jafan 6 0 Form |
Form Length | 148 pages |
Fillable? | No |
Fillable fields | 0 |
Avg. time to fill out | 37 min |
Other names | jafan h, jafan, zzz jafans futos com, jafan 6 0 forms |
JOINT AIR FORCE - ARMY – NAVY
Manual
SpecialAccessProgram
29 May, 2008
JAFAN
FOREWORD
This manual standardizes security guidance for all Air Force, Army and Navy (hereafter referred to as service components) Special Access Programs (SAPs). This manual is applicable to all service component SAPs.
In cases of doubt over the requirements of this manual, users should consult the Government Program Security Officer (PSO) prior to taking any action or expending
In situations where conditions or unforeseen factors render full compliance to these standards unreasonable, the PSO may apply commensurate levels of protection. Applying commensurate protective measures to a particular SAP means that equivalent protections are being used rather than following the exact wording of this manual. Commensurate levels of protection will not be designed with the intent to reduce or lessen the security protection of the area of consideration. Within 90 days of implementing commensurate protective measures, the Government PSO will notify the service component Special Access Program Central Office (SAPCO) for validation and final approval.
On occasion, it may be necessary to waive the requirements in this manual. Requests for waivers will be provided to the appropriate service component SAPCO for approval. Adherence to the standards set forth in this manual will ensure compliance with national- level policy and allow for reciprocity between service component SAPs.
At a minimum, this manual will be implemented within six months of the date of publication. All contractual documents will be amended to reflect use of this manual. Any cost impacts will be forwarded to the appropriate contracting officer and forwarded to the cognizant service component SAPCO for resolution.
JOHN B. HENNESSEY |
MICHAEL KOBBE |
JOHN E. PIC |
Director, Security, CI, and Special |
Director, Technology Management |
Director, Special Programs |
Programs Oversight |
Office (TMO) |
Office (CNO (N89)) |
USAF |
USA |
USN |
JAFAN
TABLE OF CONTENTS
|
|
Page |
CHAPTER 1. GENERAL PROVISIONS AND REQUIREMENTS |
|
|
Section 1. |
Introduction |
1 |
Section 2. |
General Requirements |
3 |
Section 3. |
Reporting Requirements |
11 |
CHAPTER 2. SECURITY CLEARANCES |
|
|
Section 1. |
Facility Clearances |
15 |
Section 2. Personnel Clearances and Access |
15 |
|
Section 3. Foreign Ownership, Control, or Influence (FOCI) & |
|
|
National Interest Determinations (NIDs) |
20 |
|
CHAPTER 3. SECURITY TRAINING AND BRIEFINGS |
28 |
|
CHAPTER 4. CLASSIFICATION AND MARKING |
|
|
Section 1. |
Classification |
32 |
Section 2. |
Marking Requirements |
32 |
CHAPTER 5. SAFEGUARDING CLASSIFIED INFORMATION |
|
|
Section 1. General Safeguarding Requirements |
34 |
|
Section 2. Control and Accountability |
34 |
|
Section 3. Storage and Storage Equipment |
36 |
|
Section 4. |
Transmission |
36 |
Section 5. |
Disclosure |
41 |
Section 6. |
Reproduction |
42 |
Section 7. Disposition and Retention |
42 |
|
Section 8. |
Construction Requirements |
43 |
Section 9. Control of Portable Electronic Devices (PEDs) |
44 |
|
CHAPTER 6. VISITS AND MEETINGS |
|
|
Section 1. |
Visits |
45 |
Section 2. |
Meetings |
46 |
CHAPTER 7. SUBCONTRACTING |
48 |
|
CHAPTER 8. INFORMATION ASSURANCE |
49 |
|
|
i |
|
JAFAN
CHAPTER 9. INTERNATIONAL SECURITY REQUIREMENTS |
50 |
|
Section 1. |
General and Background Information |
50 |
Section 2. |
Disclosure of U.S. Information to Foreign Interests |
50 |
Section 3. Foreign Government Information (FGI) |
53 |
|
Section 4. |
International Transfers |
55 |
Section 5. |
International Visits and Control of Foreign Nationals |
60 |
Section 6. |
Contractor Operations Abroad |
64 |
Section 7. |
NATO Information Security Requirements |
65 |
CHAPTER 10. MISCELLANEOUS |
|
|
Section 1. |
TEMPEST |
71 |
Section 2. |
Government Technical Libraries |
72 |
Section 3. |
Independent Research and Development |
72 |
Section 4. |
Operations Security |
72 |
Section 5. |
Counterintelligence (CI) Support |
73 |
Section 6. Decompartmentation, Disposition, and Technology |
|
|
Transfer Procedures |
73 |
|
Section 7. |
74 |
|
Section 8. |
Patents |
74 |
Section 9. |
Telephone Security |
74 |
Section 10. |
Treaty Guidance |
75 |
APPENDICES
A.Handle Via Special Access Channels Only (HVSACO)
Procedures |
77 |
|
B. |
Standard Operating Procedures (SOP) - Topical Outline |
79 |
C. |
Security Documentation Retention |
85 |
D. |
Operations Security (OPSEC) Plan - Topical Outline |
89 |
E. |
Inspection Readiness Planning |
93 |
F. |
Security Inspection Checklist |
95 |
G. |
SAP Formats |
109 |
H. |
SAP NID Request Package (Sample) |
134 |
I. |
Inspection Data Call Letter (Sample) |
143 |
TABLES |
|
|
1. |
Training Requirements |
28 |
ii
JAFAN
Chapter 1
General Provisions and Requirements
Section 1. Introduction
a.This manual applies to all service component SAPs and participants within these SAPs. These procedures are also applicable to licensees, grantees, and certificate holders to the extent legally and practically possible within the constraints of applicable law and the Code of Federal Regulations.
b.This manual applies to and shall be used by service components and their contractors to safeguard classified information released during all phases of the contracting, licensing, and grant process, including bidding, negotiation, award, performance, and termination. This manual also applies to classified information not released under a contract, license, certificate or grant, and to foreign government information furnished to contractors that requires protection in the interest of national security. The manual implements applicable Federal Statutes, Executive orders, National Directives, international treaties, and certain
c.If a contractor determines that implementation of any provision of this manual is more costly than provisions imposed under previous U.S. Government policies, standards or requirements, the contractor shall notify the cognizant security authority (CSA) through the PSO (also see para
JAFAN |
1 |
d.In the interest of clarity, consistency and procedural guidance; all contractual requirements outlined in this manual and as directed by the government will be made official only when forwarded through contracting channels.
a.On occasion, it may be necessary to grant a waiver to the requirements of this
manual. Every effort will be made to avoid waivers to established SAP policies and procedures unless they are in the best interest of the Government. Waivers 1 can only be approved by the appropriate service component SAPCO.
b.In those cases where waivers are required, a request will be submitted to the service component SAPCO or designee via the PSO's chain of command. Submit the completed SAP Format 12 to the PSO, who will process the waiver to the cognizant service component SAPCO. Security Officers at all levels shall maintain a file of approved waivers. Attach maps, floor plans, photos, or drawings to waiver requests when necessary. Subcontractors submit SAP Format 12 through their prime contractor, who will sign as the "Reviewing Official". The requester ensures adequate compensatory measures are documented on the request and if approved, executed.
1Service SAPCOs will forward all requests for waivers which exceed the requirements outlined in this manual to the DoD SAPCO for approval.
JAFAN |
2 |
a.Categories. There are three categories of SAPs: (1) Acquisition; (2) Intelligence; and (3) Operations and Support.
b.Types. There are two types of service component SAPs, Acknowledged and Unacknowledged.
(1)An Acknowledged SAP is a program which may be openly recognized or known; however, specifics are classified within that SAP. An Acknowledged SAP is acknowledged to exist and whose purpose is identified (e.g., the
(2)An Unacknowledged SAP’s existence is protected as special access and the details, technologies, materials, techniques, etc., of the program are classified as dictated by their vulnerability to exploitation and the risk of compromise.
Program funding is often unacknowledged, classified, or not directly linked to the program.
Note: An unacknowledged SAP for which the Secretary of Defense has waived applicable reporting requirements under Title 10 U.S.C. 119(e) is identified as a
Section 2. General Requirements
a.Service Component and Contractor SAP Security Officer titles: Government:
(1)Program Security Officer (PSO): The PSO is responsible for the program security management and execution of all security policies and requirements for a specific SAP program,
(2)Government SAP Security Officer (GSSO): The individual appointed at a government program facility to provide security administration and management based on guidance provided by the PSO. GSSOs will be appointed in writing and assigned to specific facilities/projects/subcompartments. Copies of appointment letters will be provided to the PSO.
JAFAN |
3 |
Contractor:
(1)Contractor Program Security Officer (CPSO): The individual appointed at a contractor program facility to provide security administration and management based on guidance provided by the PSO.
(2)CPSOs will be appointed in writing and assigned to specific facilities/projects/subcompartments. Copies of appointment letters will be provided to the PSO.
b.Each activity associated with a SAP will assign one or more SAP Security
Officers to each SAP. SAP Security Officers are technical specialists and serve as the primary SAP security focal points at each government and contractor facility. They are appointed to perform the duties indicated below and responsible for implementing program SAP security policies within each facility. All SAP Security Officers will have the position, responsibility, and authority commensurate with the degree of SAP security support required for each organization.
c.GSSO/CPSOs will:
(1)Possess a personnel clearance at least equal to the highest level of classified information for which they require access.
(2)Possess access to all SAPs assigned to the facility(s) for which he/she is responsible.
(3)Provide facility security administration and management.
(4)Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and/or investigative requirements.
(5)Ensure adherence to the provisions of this manual.
(6)Oversee an information management system for each SAP used to facilitate the control of requisite information within each SAP.
(7)Conduct an annual accountable classified material inventory.
(8)Maintain a Special Access Program Facility (SAPF) IAW JAFAN 6/9.
(9)Ensure Information Systems (IS) are IAW JAFAN 6/3.
(10)Establish and oversee a visitor control program.
(11)Establish reproduction and destruction capability of SAP information.
(12)Ensure adherence to special communications capabilities within the SAPF.
JAFAN |
4 |
(13)Ensure the conduct of program indoctrination and annual refresher, briefings and debriefings of personnel.
(14)Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements.
(15)When required, ensure contractual specific SAP security requirements such as TEMPEST and Operations Security (OPSEC) are accomplished.
a.Contractors are not required to prepare an SOP for
(1)The material will be returned to the Government.
(2)The material will be inventoried, documented, and certified as destroyed and documentation will be provided to the PSO. In the case of TOP SECRET, a copy of the destruction certificate will be provided to the Government.
(3)Documentation can be retained by the contractor, provided a contractual relationship exists and if approved by the PSO/Program Contracting Officer (PCO). A DD Form 254 will be prepared and provided to the contractor outlining the retention, storage, reuse and continued access procedures. If information is retained, written security procedures are required.
b.Contractors are not required to prepare written SOPs when all work is performed at a government facility. Subcontractors are not required to prepare written SOPs when all work by is performed at a prime contractor facility. Storage normally is not authorized at the subcontractor location. Keep program access records and other program documentation at the prime contractor facility.
JAFAN |
5 |
in conjunction with badges and a means exists to lockout lost, unused, and/or relinquished badges, the PSO may negate the requirements stated above for badge inventory, accountability and destruction.
a.
(1)Phase One -
2Security inspections will not be conducted more frequently than every 12 months. However, if security risks warrant additional security oversight each service SAPCO reserves the right to conduct inspections more frequently.
JAFAN |
6 |