DL1.1.11. Foreign Intelligence Collection Threat. The potential
of a foreign power, organization, or person to overtly or covertly collect
information about U.S. acquisition program technologies, capabilities, and
methods of employment that could be used to develop a similar weapon system or
countermeasures to the U.S. system or related operations.
DL1.1.12. Infrastructure. Those items that are used by more
than one acquisition program in the pursuit of the development of defense
systems. The infrastructure includes laboratories, test facilities, the
policy and procedure structure, and education and training organizations.
DL1.1.13. Matrix Support Element. (See definition DL1.1.7., above,
Counterintelligence and Security Countermeasures (CI/SCM) Support
DL1.1.14. Milestone Decision Authority. The individual
designated in accordance with criteria established by the Under Secretary of
Defense for Acquisition and Technology to approve entry of an acquisition
program into the next phase of the acquisition process.
DL1.1.15. Multi-Discipline Counterintelligence (MDCI) Threat
Assessment. An assessment made by the cognizant DoD Component that
describes those foreign governments, entities, or activities that have the
interest and capability to collect information about a system under
DL1.1.16. Operations Security (OPSEC). A process of analyzing
friendly actions attendant to military operations and other activities to:
DL22.214.171.124. Identify those actions that can be observed by adversary
DL126.96.36.199. Determine the indicators hostile intelligence systems might
obtain that could be interpreted or pieced together to derive critical
information in time to be useful to adversaries.
DL 188.8.131.52. Select and execute measures that eliminate or reduce to an
acceptable level the vulnerabilities of friendly actions to adversary
DL1.1.17. Program Information. For the purposes of this
program, information that includes programmatic data and/or information and
weapons system, subsystem, or component information.
DL1.1.18. Program Protection. The safeguarding of defense
systems and technical data anywhere in the acquisition process to include the
technologies being developed, the support systems (e.g., test and simulation
equipment), and research data with military applications. This
protection activity involves integrating all security disciplines,
counterintelligence, and other defensive methods to protect the essential
program information, technologies, and systems data from intelligence
collection and unauthorized disclosure.
DL1.1.19. Program Protection Inspection. An inspection,
conducted at a defense contractor facility, to assess compliance with the
contractually imposed countermeasures requirements developed by the program
protection planning process. These inspections will normally be conducted by
the Defense Investigative Service as part of its periodic industrial security
inspections of the facility.
DL1.1.20. Program Protection Plan (PPP). A comprehensive protection
and technology control management plan established for each defense
acquisition program to identify and protect classified and other sensitive
information from foreign intelligence collection or unauthorized
disclosure. (The PPP is designed to negate the Program Protection Threats