NSS AND ITS
SYSTEM SPECIFIC POLICIES
1. Purpose. Identify NSS and ITS related policies that
impact J-6 certifications.
2. Policies. Requirements documents (MNSs, CRDs, and ORDs)
need to address the NSS and ITS related policies detailed below.
a. Electromagnetic Environmental Effects and Spectrum Management Policy
(1) All NSS and ITS systems must be mutually compatible with other systems in
the electromagnetic environment and not be degraded below operational
performance requirements due to electromagnetic environmental effects (reference
(2) All NSS and ITS systems must comply with reference k.
(3) All proposed NSS and ITS systems that include spectrum- dependent hardware
must document spectrum certification of the hardware (reference k).
(4) Commercial and nondevelopmental items must also comply with the
aforementioned policy statements (reference k and l).
b. Host-nation Approval (HNA). To ensure
compatibility as well as interoperability, all NSS and ITS and equipment that
are intended for operation in host nations will require HNA coordinated by the
MCEB and the appropriate CINCs prior to use. Hardware that does not have HNA can
be confiscated or denied operation by host nations (reference l).
c. Joint Tactical Radio System (JTRS). All future
requirements for radio-based communications will be satisfied by inclusion in
the JTRS ORD unless a waiver is granted by ASD (C3I). No preplanned product
improvements or in-service modifications should be undertaken that duplicate
JTRS without prior approval and waiver from ASD (C3I) (reference m).
d. Selective Availability Anti-Spoofing Module (SAASM). All systems that include NAVSTAR GPS and PPS will develop and
procure only SAASM-based equipment after 1 October 2002 (reference
e. Information Assurance. NSS and ITS, including
commercial and nondevelopmental items, must comply with applicable DOD IA
policies and regulations. This includes implementation of public key (PK) when
required to ensure information security over all voice, video, and data
transmission. Interconnection of systems operating at different classification
levels will be accomplished by processes (e.g., SECRET and Below
Interoperability (SABI) and TOP SECRET and Below Interoperability (TSABI)) that
have been approved by the DOD chief information officer (CIO). IA will be an
integral part of all interoperability efforts thus allowing appropriate security
measures to protect mission data and system resources from all known threats
(reference o, p, and q).