SAP Overview for DoD Personnel
SAP Overview for DoD Personnel
2. Course Overview
Special Access Programs, referred to as SAPs, aim to protect national security by
employing enhanced security measures to strictly enforce need-to-know. They
also have safeguarding and access requirements that exceed those normally
required for information at the same classification level.
In this course, you will learn why we have SAPs, how they are authorized, and the
basics of how they operate. This course will look at the policy documents governing
SAPs and the many agencies and individuals involved in SAP oversight and
support.
3. Course Objectives
Here are the course objectives:
4. Course Structure
• Course Introduction
• Introduction to Special Access Programs
• SAP Lifecycle and Structure
• SAP Approval
• SAP Operations
• Course Conclusion
Page 2
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
Student Guide
Course: Special Access Program (SAP) Overview
Lesson 2: Introduction to Special Access Programs
Introduction
Throughout our nation’s history, our military and strategic advantage hasrelied upon the
quiet work of sensitive programs and operations. These programs have revolutionized
industries and changed technology. They have made the impossible, possible. Each
program came with its own unique challenges and required the dedication of people like
you to safeguard its many secrets. Together, these programs have played a crucial role in
the defeat of great powers and have changed history. We refer to these programs as
Special Access Programs.
Objectives
The lesson objective is:
• Identify the definition, purpose, and history of Special Access Programs (SAPs)
SAPs are established only when the program is required by statute, or upon the finding
of exceptional vulnerability of, or threat to, specific information, and if the normal criteria
for determining access to information classified at the same level are insufficient.
SAPs use the standard levels of classified information; that is, Top Secret, Secret, and
Confidential. SAPs also require an assigned nickname and/or codeword and
identification of any special handling procedures.
2. History of SAPs
SAPs have existed for many years, though they have not always been called SAPs.
It was not until the 1980s that their existence was publicly acknowledged.
They were originally established to protect DoD acquisition programs and often used to
hide sensitive operations. Through the 1980s, these programs were referred to as
“Black Programs” and were generally restricted to protecting DoD acquisition programs.
They were “Black Programs” due to the fact they were close-hold, people were unaware
of their existence, and were conducted in tight-knit organizations.
Page 1
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
When a controversial covert special operations activity called “Yellow Fruit” became public
in the 1980s, it became apparent that there was a need to significantly increase the
oversight of these programs.
During the 1990s, the term Special Access Program replaced Black Program. SAP
security procedures were modified to include the protection of not just DoD acquisition
programs, but also intelligence programs and operations and support programs.
a. Greenbrier Hotel
The Greenbrier Hotel is located in the mountains of West Virginia. Built at the
request of Congress in the late 1950s and early 1960s, the hotel’s purpose was to
function as a safe haven for members of Congress in the event of a nuclear attack
on the U.S.
Its construction posed many challenges and serves as an example of the unique
challenges facing SAP security officials as they strive to protect SAP assets.
Greenbrier Hotel:
• Construction: Began 1958, completed 1961
• Cost: $86,000,000
• Public became aware: 1992
b. Black Programs
Up through the 1980s, SAPs were referred to as Black Programs. They largely
protected DoD acquisition programs. Well-known Black Programs include Skunk
Works, the code name for Lockheed Martin’s Advanced Development Programs.
Skunk Works is responsible for the design of many famous and technologically
advanced aircrafts, including the F-117A Nighthawk stealth fighter.
c. Yellow Fruit
Yellow Fruit was the code name for a U.S. Army operation that was conducting work
for the Army and Iran Contra. However, allegedly illegal misuse of funds drew the
attention of not only the Army’s Joint Chief of Staff, but Congress as well.
Page 2
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
The operation led to investigations about the mismanagement of some $300 million
in black operations funds over a five-year period. Investigations into the spending
led to the court martial of three Army officers and a sergeant. In the most severe
punishment, one of the accused was sentenced to 10 years in prison, fined $50,000,
ordered to forfeit over $35,000 in salary, and dismissed from the service. Military
court later reversed the conviction, citing little guidance from higher echelons
concerning the handling of funds.
Following the Yellow Fruit operation and controversy, oversight for SAPs increased
significantly.
Yellow Fruit:
• Alleged illegal use of funds
• Investigation led to court martial and imprisonment of
personnel
• Further investigation revealed lack of oversight
• Led to greater oversight of SAPs
During the 1990s, Black Programs became SAPs. Security procedures were
modified significantly and included increased oversight. SAP operations expanded
to include intelligence and operations and support programs in addition to
acquisition programs.
In 1983, an Army civilian stumbled onto billing irregularities at a U.S. intelligence front
company that was handling secret supplies for Central America. The discovery led to
the uncovering of the Yellow Fruit operation.
Given the circumstances of operations like Yellow Fruit, it is not surprising that
misperceptions about SAPs exist. There are several common misperceptions
about SAPs.
First, many believe SAPs are used as a means to hide money spent on certain
programs. SAPs are not a place to hide money; they are used to ensure the
security and accountability of a specific project is maintained to the highest level.
Page 3
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
Another misperception is that SAPs are used to avoid taxpayer scrutiny. That is also
not true. In fact, taxpayer understanding and awareness is often a key to an
acknowledged program’s success.
SAPs are also believed to lack Congressional oversight. However, following Yellow
Fruit, Congressional oversight increased significantly and now requires reports on every
DoD SAP be submitted to Congress annually.
2. Importance
Designed and built so that it cannot be detected by radar, the F-117A stealth fighter
dramatically changed U.S. strategic advantage. During Operation Desert Storm, the F-
117A made up only two percent of the sorties, yet accounted for forty percent of the
bomb damage. The importance and power of what can be accomplished through the
use of SAPs should not be understated.
SAPs are important for several reasons. Some SAPs protect technology breakthroughs
and ensure the U.S. maintains its leading technological edge. Some SAPs ensure once
we discover and exploit an adversary’s vulnerabilities, the knowledge of the exploitation
remains secure and the adversary does not develop a countermeasure. Some SAPs
also ensure sensitive operational plans are completed without disclosure. Of equal
importance, some SAPs protect intelligence information, which is often the key to a
successful mission. Reducing the amount of intelligence gathered on U.S. forces
significantly enhances our success on the battlefield.
3. Goals
In 1987, the USSR began deployment of the MiG-29 to its allies. It bore a striking
resemblance to the U.S. F-15. In fact, we have several examples of the
Russians emulating U.S. military jets. How does this happen?
In the late 1970s and early 1980s, the U.S. spent well over a million dollars developing
the technology to allow aircraft to transport the space shuttle. Just a few years later,
the Russians “borrowed” our technology, requiring far less research and development
dollars. How did this happen?
In 2001, former FBI agent Robert Hanssen was arrested for selling American secrets to
Russia. During his liaison with the DoD, Mr. Hanssen had access to SAPs. However,
because of the accountability mechanism built into the SAP environment, it could easily
be determined when and to what programs Mr. Hanssen had access. Such measures
are essential to knowing the people involved in your programs and help facilitate
damage assessment when necessary.
Page 4
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
We have established SAPs due in part for the need for enhanced measures to protect
our national security. SAPs employ enhanced security measures beyond those required
in baseline regulations and directives. To protect the work of SAPs, the number of
personnel who have access to a SAP is kept to an absolute minimum. If an individual
will not materially and directly contribute to a SAP, that person is not authorized access.
Access to SAPs is not granted on a convenience basis. In addition, records of
individuals who have or have had access to a SAP are maintained. This record-keeping
capability far exceeds what is required for collateral programs. An individual’s need-to-
know is a key piece of maintaining the security of SAPs.
Need-to-know
1. What is Need-to-know?
Brian Patrick Regan, a retired U.S. Air Force Sergeant, asked questions about
information he did not need to know about, and subsequently sold detailed,
comprehensive classified documents and photos containing U.S. reconnaissance
mission information to China, Iraq, and Libya. This act caused a grave risk of death
to U.S. Air Force reconnaissance pilots.
The authorized holder of classified information is you. You are responsible for
determining whether someone does or does not legitimately require access to the
information you have in order to perform or assist in a lawful and authorized
governmental function.
You must also make sure that person has the appropriate clearance for the information.
You are obligated to ask for sufficient information so you can make an informed decision
whether or not to share your classified information with the requestor. Don’t assume
when someone asks you for information that he or she has a legitimate need-to-know.
Verify that individual needs the information specifically to do their work, they have the
appropriate clearance, and that someone in a position of authority has given them the
permission to access the information. If you are unsure of someone’s need-to-know,
withhold your information until you can establish the need-to-know is legitimate.
2. Sample Situations
Page 5
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
No. Ted does not have a valid need-to-know that would justify his seeing your
classified materials. Even though he is working on a similar project, he has no need to
work with your information as part of his job, and no one has authorized him to see it.
Sharing it with him could compromise the information. You don’t know what he will do
with it.
Now consider this: Ann’s supervisor tells you that Ann has been assigned to your
project as a technical writer and will need access to all your project materials. Ann later
asks to see your project plan, which is classified.
Yes. Ann does have a valid security clearance and need-to-know, because she has
been authorized by her supervisor to work on your project and to have access to all of
your project materials, whether classified or not. Because her supervisor has told you
directly about this authorization, there is no reason to suspect that Ann will compromise
the information.
Page 6
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
Review Activity 1
Which of the following do SAPs aim to achieve? Select all that apply; then check
your answers in the Answer Key at the end of this Student Guide.
Review Activity 2
You are preparing to start work on a SAP. How much do you know about these
programs? Select True or False for each statement; then check your answer in the
Answer Key at the end of this Student Guide.
True False
Page 7
Special Access Program (SAP) Overview Student Guide
Introduction to Special Access Programs
Answer Key
Review Activity 1
Which of the following do SAPs aim to achieve?
Review Activity 2
True False
The SAP for your project was likely formed to hide
the money that will be spent.
Because you will be working on a SAP, you can
expect the oversight to be much greater than the collateral programs
you’ve worked on in the past.
You should expect to work using enhanced security measures.
Access to your program will be kept to an absolute minimum.
Page 8
Student Guide
Course: Special Access Program (SAP) Overview
Lesson 3: SAP Lifecycle and Structure
Introduction
Objectives
Special Access Programs (SAPs) can vary widely in the types of missions and
operations they fulfill. However, all DoD SAPs must be categorized by type and they
all follow the same lifecycle. This lesson will familiarize you with types of SAPs and the
SAP lifecycle.
As you learned earlier in this course, the Yellow Fruit investigation led to many changes
in how the U.S. deals with its most sensitive operations and programs. Following the
Yellow Fruit episode, new measures and safeguards were put in place, including
expanded oversight measures. As a result, the oversight provided to DoD SAPs is much
more significant than that given to collateral programs. SAP oversight is outlined in
Section 119, Title 10 United States Code, and includes the requirement to report
annually to Congress.
Section 119 of Title 10 specifies the types of reports that are submitted to Congress as
well as the frequency with which they are submitted.
Existing SAPs must submit a report to Congress no later than March 1 of each year.
• The estimated total budget requested for the current and next fiscal years
• A brief discussion of the major milestones for the SAP, such as current issues or
significant changes
• The actual cost of the program for each previous fiscal year
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
New or proposed SAPs must submit a SAP Listing to Congress no later than February
1 of each year. The report includes:
• Notice of the designation of the program as a SAP and the justification for such
designation
Types of SAPs
1. Protection Levels
SAPs are categorized both by how they are protected and acknowledged, referred to as
a SAP protection level, and by the type of program they encompass, referred to as a
SAP category. Every SAP within the DoD will fall under both a protection level and a
category.
A SAP that is acknowledged is one whose existence may be openly recognized. Its
purpose may be identified. However, the details of the program (including its
technologies, materials, and techniques) are classified as dictated by their vulnerability
to exploitation and the risk of compromise. The funding for acknowledged SAPs is
generally unclassified.
An unacknowledged SAP is one whose existence and purpose are protected. As with
acknowledged SAPs, the details, technologies, materials, and techniques of
unacknowledged SAPs are classified as dictated by their vulnerability to exploitation and
the risk of compromise. The program funding for unacknowledged SAPs is often
classified, unacknowledged, or not directly linked to the program.
2. SAP Categories
While all SAPs fall under a protection level, all SAPs also fall under one of three possible
categories. As with protection levels, the category to which a SAP is assigned impacts
its oversight and operation. You’ll learn more about that later in this course.
Page 2
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
For now, you should know approximately 75 to 80 percent of all DoD SAPs are
acquisition SAPs. Acquisition SAPS are established to protect sensitive research,
development, testing and evaluation, modification, and procurement activities. They
involve buying or building something, such as a weapons system or aircraft. The
vast majority of SAPs are acquisition SAPs. Other SAPs are intelligence SAPs.
Intelligence SAPs are established primarily to protect the planning and execution of
especially sensitive intelligence or CI operations or collection activities. They are
generally associated with the intelligence community. Finally, operations and
support SAPs are established primarily to protect the planning for execution of and
support to especially sensitive military operations. They often involve the use of
soldiers, sailors, airmen, and marines and they may protect organizations, property,
operations, concepts, plans or activities.
SAPs are referred to using both their protection level and category; you may see
acknowledged acquisition SAPs, unacknowledged intelligence SAPs, unacknowledged
waived operations, and support SAPs, or any other combination.
SAP Lifecycle
1. Overview
All SAPs within the DoD follow the same lifecycle regardless of their category or
protection level. SAPs begin in the establishment phase. In this phase, it is determined
whether or not extra protection is warranted to establish a Prospective SAP (PSAP).
The establishing SAPCO must notify the Director, DoD SAPCO, in writing of the
decision to create a PSAP. Here, documents are created to ensure the SAP’s
protection, and the program’s eligibility to become a SAP is evaluated through the
approval process.
Once approved, the SAP operates within the Management and Administration phase. It
is here that the work of the SAP is accomplished as long as there is a continued need for
the SAP. The SAP continues to follow the appropriate processes and procedures
throughout its operation.
Annually, one of three things will happen to every SAP within the DoD: revalidation,
apportionment and deapportionment, or disestablishment. Once a SAP is no longer
needed, it moves to the disestablishment phase.
a. Establishment
When a program is initially considered for SAP eligibility, the first consideration is to
determine if it meets the basic SAP requirements.
If it is determined that the threat to the program is exceptional and enhanced security
measures are necessary, the program can move to the next phase of the lifecycle.
Page 3
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
Once the program is granted approval as a SAP, it moves to the Management and
Administration phase. Here, the SAP’s work is accomplished. This is the day-to-day
operation of the SAP. The program undergoes inspections, audits, and internal
control. Each year one of three things will happen to every DoD SAP: the SAP will
be revalidated and continue its work, apportioned, or transitioned to the
Disestablishment phase.
c. Apportionment
Apportionment means that a SAP or section of a SAP has been formally included in
the Integrated Joint Special Technical Operations (IJSTO) process for Combatant
Commands use during deliberate planning, crisis action response, and operational
employment.
During the SAP Apportionment phase, the DoD Component and PSA SAPCOs
nominate SAP capabilities to be apportioned into IJSTO when they are deemed
operational capability or no later than 18 months prior to plan IOC.
The Apportionment phase has the following: a program Quad Chart, a program fact
sheet, indoctrination briefing, an SCG, a written legal review, and a PID and
nickname.
d. Disestablishment
Once the SAP is no longer needed, it is disestablished. This may be due to the
program transitioning to a collateral program or by being absorbed into another
existing SAP. Disestablishment includes ensuring the SAP’s information and
related SAPs are protected, a disestablishment plan is developed, a debrief of
personnel, and a closeout inspection are conducted.
Page 4
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
Review Activity 1
Program XYZ involves the gathering of information regarding active terrorist groups.
There have been public hearings regarding the purpose of this SAP. This is most likely
an example of what type of SAP?
Select the best answer; then check your answers in the Answer Key at the end of this
Student Guide.
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Review Activity 2
Program ABC is in the process of developing a super-secret new technology that could
completely revolutionize the way that wars are fought. The name of the program
remains classified and its funding is associated with a different program. This is most
likely an example of what type of SAP?
Select the best answer; then check your answers in the Answer Key at the end of this
Student Guide.
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Review Activity 3
Program Alpha exists to provide logistical assistance to a covert military operation in a
turbulent foreign country. Its funding is classified and the program is subject to stricter
reporting requirements and access controls. This is most likely an example of what
type of SAP?
Select the best answer; then check your answers in the Answer Key at the end of this
Student Guide.
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Page 5
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
Review Activity 4
Match each phase of the SAP lifecycle on the left to its matching description on the
right; then check your answers in the Answer Key at the end of this Student Guide.
A. Management &
…Extra protection warranted?
Administration
B. Establishment
…continued need? Processes followed?
C. Apportionment
…proper measures in place? Approval received?
D. Disestablishment
…program no longer needed?
Page 6
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
Answer Key
Review Activity 1
Program XYZ involves the gathering of information regarding active terrorist groups.
There have been public hearings regarding the purpose of this SAP. This is most likely
an example of what type of SAP?
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Review Activity 2
Program ABC is in the process of developing a super-secret new technology that could
completely revolutionize the way that wars are fought. The name of the program
remains classified and its funding is associated with a different program. This is most
likely an example of what type of SAP?
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Review Activity 3
Acknowledged Acquisition
Unacknowledged Acquisition
Acknowledged Intelligence
Unacknowledged Intelligence
Acknowledged Operations and Support
Unacknowledged Operations and Support
Page 7
Special Access Program (SAP) Overview Student Guide
SAP Lifecycle and Structure
Review Activity 4
Match each phase of the SAP lifecycle on the left to its matching description on the
right; then check your answers in the Answer Key at the end of this Student Guide.
Page 8
Student Guide
Course: Special Access Program (SAP) Overview
Lesson 4: SAP Approval
Introduction
Objectives
Before becoming a Special Access Program (SAP), a program must follow a standard
process to ensure it meets SAP requirements. In this lesson, you will learn about
SAP approval and about the roles and responsibilities involved.
Identify the roles and responsibilities involved in the SAP approval process
Due to their importance and the sensitivity of their operations, SAPs are approved only
at the highest levels. Unless otherwise directed by the President of the United States,
only the Secretaries of State, Defense, Energy, Homeland Security, and the Director of
National Intelligence, and the Attorney General (or their principal deputies) are
authorized to approve SAPs.
Although all of these agencies have SAPs, they do not all establish and operate them in
the same way as the Department of Defense, but they do work together. In cases of
joint programs, the host activity ensures regulatory requirements are met by the other
involved agencies.
This lesson focuses on the implementation of SAPs within the Department of Defense,
which has designated primary and direct responsibility for SAPs to the Deputy Secretary
of Defense (DEPSECDEF).
2. Approval Process
When the need for a SAP is identified, there is a specific process the program must
follow before becoming a SAP. The initial need for a SAP can be identified and initiated
anywhere: within the government, which includes civilians and warfighters alike, or
within industry. Whether identified by government or industry, each need is first
assessed.
While in the Establishment phase, all documents required for a program to be approved
as a SAP are developed. Together, these documents make up the SAP Approval
package. Once all the documents are developed, the Approval Package is sent to the
SAP Oversight Committee (SAPOC) for concurrence or non-concurrence.
Then the SAP approval package goes to Congress for formal approval. Let’s take a
closer look at the entities involved in this process.
Even though the Deputy Secretary of Defense approves every SAP within the
Department of Defense, the process relies upon several entities. The SAP governance
structure is comprised of the SAPOC, the SRG, and the SSWG. The governance
process relies upon personnel making the determination that the need for a SAP exists.
You learned about this in an earlier discussion of the SAP lifecycle. Next, the process
relies upon the examination into and justification for the need for a SAP. If the need is
justified, then it moves into the Establishment phase, also called a PSAP.
During the Establishment phase, all the required documents to identify how that widget
or piece of technology is going to be protected are developed. Once all the documents
are developed, they are packaged together and sent to the SAPOC for concurrence.
Finally, once a SAP is approved by the SECDEF/DEPSECDEF, Congress needs to be
notified.
We’ll look at each of these entities and the roles they play in a moment. A job aid that
describes these roles at a high level is available at the end of the lesson.
When the need for a SAP is initially identified, it is the component-level Special Access
Program Central Office, also referred to as SAPCO, which assesses the need.
Each component-level SAPCO is responsible for all SAPs under their purview.
DoD SAPs are categorized and managed by the Under Secretaries of Defense.
Each OSD-level SAP Central Office is established to assist the Deputy Secretary of
Defense in overseeing DoD SAPs. Each Under Secretary serves as the oversight
authority for a specific category of SAPs: acquisition, intelligence, or operations and
support.
All acquisition SAPs are assigned to the Office of the Under Secretary of Defense for
Acquisition, Technology, and Logistics. All intelligence SAPs are assigned to the
Office of the Under Secretary of Defense for Intelligence. Finally, all operations and
Page 2
Special Access Program (SAP) Overview Student Guide
SAP Approval
support SAPs are assigned to the Office of the Under Secretary of Defense for Policy.
4. Senior Review Group (SRG)
The Senior Review Group is a senior executive service-level working group that is
responsible for ensuring SAPs aren’t duplicated across the various SAP categories.
The Senior SAP Working Group (SSWG) is a new group added to serve as the senior
program protection forum to coordinate, deconflict, and integrate special programs;
address SAP policy, oversight, and management, and provide recommendations to the
SRG. The members are listed below. Also note the SSWG Chair may approve additional
attendance of appropriately cleared personnel.
Chaired by the Deputy Secretary of Defense, the SAPOC is where the formal SAP
approval decision is made. SAPOC members are considered super users and have
access to all DoD-approved SAPs. With exception of the Vice Chairman of the Joint
Chiefs of Staff, all committee members are appointed officials of the DoD.
Once an agreement has been reached, it is the DoD SAPCO that communicates this
concurrence to Congress for approval. The DoD SAPCO serves many functions. The
SAPCO develops, coordinates, and publishes policy and is the main point of contact for
DoD SAP resources.
The director of the DoD SAPCO is the head of the Acquisition SAPCO, the Under
Secretary of Defense for Acquisition, Technology, and Logistics. In addition to the
executive secretary serving on the SAPOC, the SAPCO director is also the primary point
of contact with agencies of the executive branch, Congress, and the DoD components on
all issues relating to DoD SAPs. This ensures that the DoD speaks to Congress about
SAPs using one voice.
When concurrence has been reached by the SAPOC, it is the DoD SAPCO that notifies
Congress.
8. Congressional Committees
While Congress is notified of all approved SAPs, not all members of Congress have
access to SAP information. Only members of the Authorization and Appropriations
Committees and their Defense Subcommittees are authorized access to SAPs. The
appropriate intelligence committees receive notification of approved intelligence SAPs.
Authorization Committees:
House Armed Services Committee (HASC)
Senate Armed Services Committee (SASC)
Appropriations Committees:
House Appropriations Committee (HAC)
Senate Appropriations Committee (SAC)
Defense Subcommittees of HAC and SAC
Intelligence Committees:
House Permanent Select Committee on Intelligence (HPSCI)
Senate Select Committee on Intelligence (SSCI)
Page 4
Special Access Program (SAP) Overview Student Guide
SAP Approval
Page 5
Special Access Program (SAP) Overview Student Guide
SAP Approval
Review Activity 1
Match each role of SAP approval on the left to its matching description on the right, then
check your answers in the Answer Key at the end of this Student Guide.
B. Special Access Program __ Ensure there are no duplicative efforts across SAPs
Oversight Committee
(SAPOC)
C. Senior Review Group __ The final SAP approving body chaired by the Deputy
(SRG) Secretary of Defense
D. DoD Special Access __ Exercise oversight authority for the specific SAP
Central Office category under their purview
(SAPCO)
F. OSD-level SAP __ Exist for each military component, the Joint Chiefs of
Central Offices Staff, Defense Advanced Research Projects Agency
(DARPA), and Missile Defense Agency (MDA)
Answer Key
Review Activity 1
D. DoD Special Access F Exercise oversight authority for the specific SAP
Central Office category under their purview
(SAPCO)
Page 6
Special Access Program (SAP) Overview Student Guide
SAP Approval
F. OSD-level SAP A Exist for each military component, the Joint Chiefs
Central Offices of Staff, Defense Advanced Research Projects
Agency (DARPA), and Missile Defense Agency
(MDA)
Page 7
Student Guide
Course: Special Access Program (SAP) Overview
Lesson 5: SAP Operations
Introduction
Objectives
The requirements that all Special Access Programs (SAPs) must follow are outlined in
several policy documents. There are SAP personnel that work to ensure these policies
are carried out. In this lesson, you will learn about these policies and about the roles and
responsibilities of the personnel who enforce them.
SAP Oversight
1. Audits and Inspections
As you learned earlier, Section 119, Title 10 United States Code: SAPs Congressional
Oversight, requires SAPs to report to Congress annually. It also subjects SAPs to
oversight in the form of inspections and audits.
SAPs are subject to the Federal Acquisition Regulation (FAR) and the Defense Federal
Acquisition Regulation Supplement (DFARS). SAPs are also subject to the Defense
Contract Management Agency policies. SAPs may be audited against these regulations
or may be subjected to other audits and inspections as appropriate. These audits may
be conducted by many entities, including the Government Accountability Office, the
DoD Inspector General, or the Defense Contract Audit Agency.
There are several agencies that provide oversight and support to ensure that SAPs are
operating properly and to help them prepare for inspections and audits, as well as
reporting to Congress.
These agencies include the Defense Contract Audit Agency, the Defense Security
Service, the Defense Logistics Agency, and the DoD Inspector General, among others,
including:
• National Reconnaissance Office
• Missile Defense Agency
• National Security Agency
• Defense Intelligence Agency
Special Access Program (SAP) Overview Student Guide
SAP Operations
Many of these agencies have staff specifically dedicated to providing support to SAPs.
Different SAPs may receive oversight and support from other agencies, depending on
their function and the agencies with which they interact. It is important to note that the
agencies represented here are not the only agencies that provide oversight and support
to SAPs.
As you will recall, each DoD component has a Special Access Program Central Office
(SAPCO) that is responsible for coordinating and performing oversight of SAPs within
their respective components. A SAPCO for the Joint Chiefs of Staff coordinates unified
commands.
Each component-level SAPCO is responsible for the overall management of SAPs under
its authority. This includes administering SAPs and maintaining records, including
maintaining a list of all SAP facilities the SAPCO manages.
2. Key Roles
The day-to-day operations of SAPs rely on both government and contractor personnel.
They also depend on personnel with technical knowledge of SAP operations and
personnel responsible for maintaining SAP security. Program managers and security
officials play key roles in ensuring a program’s security.
Page 2
Special Access Program (SAP) Overview Student Guide
SAP Operations
Page 3
Special Access Program (SAP) Overview Student Guide
SAP Operations
Governing Policy
1. Overview
There are many policies that govern the operations of SAPs. Some policies form the
foundation of SAP policy, but don’t directly address specific SAP procedures. They
focus on the relationship of SAPs to DoD and the government in general. Other
policies are targeted directly at the SAP community.
A job aid is located at the end of this lesson that describes these policies at a high level.
2. Foundational Policy
There are several policies, regulations, and baseline documents that establish the
security protection standards for classified information released and disclosed to
agencies, organizations, and contractors participating in the administration of classified
programs. Together, these have been used as the foundation for SAP policy.
The DoD has implemented national policy guidance on classified information in several
documents:
• DoDM 5200.01, Volumes 1-4, DoD Information Security Program, prescribes the
defined procedures for the DoD Information Security Program.
While all of these documents provide foundational guidance for SAPs, let’s take a closer
look at the policies that more directly address these programs.
Page 4
Special Access Program (SAP) Overview Student Guide
SAP Operations
3. SAP-Focused Policy
As you learned earlier in this course, Section 119, Title 10 United States Code: SAP
Congressional Oversight, outlines SAP oversight and reporting requirements.
In addition, the DoD published DoD Manual 5205.07, Volumes 1-4 which
provides additional guidance and applies to all DoD SAPs
The DoD Manuals were published by the DoD and applies to all DoD SAPs. It
standardizes the foundational SAP security guidance throughout the DoD, outlining the
minimum security procedures for DoD SAPs. This policy applies to all Industry as well as
to all non-DoD organizations that require access to DoD SAPs.
SAP Applicability
Having standard SAP practices that are applied uniformly across all service branches
enable individuals to move between SAPs. This is known as reciprocity.
Reciprocity applies to DoD SAPs of the same sensitivity level, as long as the individual
has a valid need-to-know and meets all requirements. In addition, reciprocity applies
to contractor facilities that have been approved for SAP access. That is, if a contractor
facility has been approved to work on a Navy SAP, that facility does not need to be
approved separately in order to work on an Army SAP.
The use of reciprocity allows DoD SAPs to simplify the process and save time and
money.
Page 5
Special Access Program (SAP) Overview Student Guide
SAP Operations
Page 6
Special Access Program (SAP) Overview Student Guide
SAP Operations
Policy Description
Executive Order 13526 - Classified National • Prescribes a uniform system for classifying, safeguarding, and
Security Information declassifying national security information
• Directs the Information Security Oversight Office (ISOO) to
develop implementing guidance
Information Security Oversight Office (ISOO) • Defines specific guidance to agencies on the implementation
32 CFR Parts 2001 and 2003 Classified of the Executive Order 13526
National Security Information; Final Rule
DoD 5220.22-M: National Industrial Security • Establishes the standard procedures and requirements for all
Program Operating Manual (NISPOM) government contractors with regard to protection of classified
information in the interest of national security
DoDM 5200.01-M, Volume 1-4, Information • Prescribes the defined procedures for the DoD Information
Security Manual Security Program
DoD 5200.08-R: Physical Security Program • Implements the policies and minimum standards for the
physical security of DoD installations and resources
DoDD 5205.02E: DoD OPSEC Program • Implements policy, assigns responsibilities, and provides
procedures for managing DoD operations security (OPSEC)
program
Page 7
Special Access Program (SAP) Overview Student Guide
SAP Operations
Policy Description
Section 119, Title 10 United States Code: • Outlines SAP oversight and reporting requirements
Special Access Programs Congressional
Oversight
DoDD 5205.07, Special Access Program • Outlines policy and responsibilities on the oversight and
Policy management of all DoD Special Access Programs (SAPs)
DoD Directive 5205.07, Volumes 1-4 • Implements policy established in DoDD 5205.07, assign
responsibilities, and provide security procedures for DoD SAP
information
Review Activity 1
How well do you understand SAP roles and responsibilities? Select all that apply; then
check your answers in the Answer Key at the end of this Student Guide.
1. You need to get in touch with your program’s Government Program Manager (GPM).
Who should you contact?
2. You need to get in touch with your program’s Contractor Program Security Officer
(CPSO). Who should you contact?
Page 8
Special Access Program (SAP) Overview Student Guide
SAP Operations
3. You need to get in touch with your program’s Program Security Officer (PSO). Who
should you contact?
4. You need to get in touch with your program’s Contractor Program Manager (CPM).
Who should you contact?
Answer Key
Review Activity
1. You need to get in touch with your program’s Government Program Manager (GPM).
Who should you contact?
2. You need to get in touch with your program’s Contractor Program Security Officer
(CPSO). Who should you contact?
3. You need to get in touch with your program’s Program Security Officer (PSO). Who
should you contact?
4. You need to get in touch with your program’s Contractor Program Manager (CPM).
Who should you contact?
Page 10
Student Guide
Course: Special Access Program (SAP) Overview
Lesson 6: Course Conclusion
Course Summary
As you’ve learned in this course, SAPs aim to protect national security by employing
enhanced security measures to strictly enforce need-to-know and have safeguarding
and access requirements which exceed those normally required for information at the
same classification level.
In this course, you learned why we have SAPs, how they are authorized, and the basics
of how they operate. You learned about the policy documents that govern SAPs and the
many agencies and individuals involved in SAP oversight and support.
Lesson Review
Here is a list of the lessons in the course:
• Course Introduction
• Introduction to Special Access Programs
• SAP Lifecycle and Structure
• SAP Approval
• SAP Operations
• Course Conclusion
Course Objectives
You should now be able to:
Identify the definition, purpose, and history of SAPs
Identify key SAP policy documents
Identify the categories and types of SAPs
Identify the steps in the SAP approval process
Identify the roles and responsibilities involved in the SAP approval process
Identify the steps in the SAP lifecycle (establishment, management and
administration, apportionment, and disestablishment)
Identify operations, oversight, and support roles and responsibilities
Conclusion
Congratulations. You have completed the Special Access Program Overview course.
To receive course credit, you MUST take the Special Access Program Overview
examination. Please use the STEPP system from the Center for Development of
Security Excellence to register for the online exam.