Defense Acquisitions
Departmentwide Direction Is Needed for Implementation of the Anti-tamper Policy
Gao ID: GAO-08-91 January 11, 2008
The Department of Defense (DOD) invests billions of dollars on sophisticated weapon systems and technologies. These may be at risk of exploitation when exported, stolen, or lost during combat or routine missions. In an effort to minimize this risk, DOD developed an anti-tamper policy in 1999, calling for DOD components to implement anti-tamper techniques for critical technologies. In March 2004, GAO reported that program managers had difficulties implementing this policy, including identifying critical technologies. This follow-up report (1) describes recent actions DOD has taken to implement its anti-tamper policy and (2) identifies challenges facing program managers. GAO reviewed documentation on actions DOD has taken since 2004 to implement its anti-tamper policy, and interviewed officials from the Anti-Tamper Executive Agent's Office, the military services, other DOD components, and a cross-section of program offices.
Since 2004, DOD has taken several actions to raise awareness about anti-tamper protection and develop resources that provide program managers with general information on its anti-tamper policy. These actions include developing a Web site with anti-tamper information and events, establishing an online learning module on anti-tamper protection, and sponsoring research on generic anti-tamper techniques. However, DOD lacks departmentwide direction for implementation of its anti-tamper policy. Without such direction, individual DOD components are left on their own to develop initiatives. For example, the Navy is developing a database that is intended to provide a horizontal view of what DOD components have identified as critical program information. While many officials we spoke with pointed to this database as a potential tool for identifying critical technologies that may need anti-tamper protection, the database is currently incomplete. Specifically, the Missile Defense Agency is not providing information because its information is classified at a level above what the database can support. Also, the Air Force is not currently providing information because not all commands have provided consent to participate. At the same time, program managers face challenges implementing DOD's anti-tamper policy--due largely to a lack of information or tools needed to make informed assessments at key decision points. First, program managers have limited information for defining what is critical or insight into what technologies other programs have deemed critical to ensure similar protection across programs. Determining whether technologies are critical is largely left to the discretion of the individual program manager, resulting in an uncoordinated and stove piped process. Therefore, the same technology can be identified as critical in one program office but not another. Second, program managers have not always had sufficient or consistent information from the intelligence community to identify threats and vulnerabilities to technologies that have been identified as critical. The potential impact of inconsistent threat assessments is twofold: If the threat is deemed to be low but is actually high, the technology is susceptible to tampering; conversely, if the threat is deemed to be high and is actually low, an anti-tamper solution is more robust than needed. Finally, program managers have had difficulty selecting sufficient anti-tamper solutions--in part because they lack information and tools, such as risk and cost-estimating models, to determine how much anti-tamper protection is needed. As a result, program managers may select a suboptimal solution. Given these combined challenges, there is an increased risk that some technologies that need protection may not be identified or may not have sufficient protection.
Recommendations
Our recommendations from this work are listed below with a Contact for more information. Status will change from "In process" to "Open," "Closed - implemented," or "Closed - not implemented" based on our follow up work.
Director:
Team:
Phone:
GAO-08-91, Defense Acquisitions: Departmentwide Direction Is Needed for Implementation of the Anti-tamper Policy
This is the accessible text file for GAO report number GAO-08-91
entitled 'Defense Acquisitions: Departmentwide Direction Is Needed for
Implementation of the Anti-tamper Policy' which was released on January
11, 2008.
This text file was formatted by the U.S. Government Accountability
Office (GAO) to be accessible to users with visual impairments, as part
of a longer term project to improve GAO products' accessibility. Every
attempt has been made to maintain the structural and data integrity of
the original printed product. Accessibility features, such as text
descriptions of tables, consecutively numbered footnotes placed at the
end of the file, and the text of agency comment letters, are provided
but may not exactly duplicate the presentation or format of the printed
version. The portable document format (PDF) file is an exact electronic
replica of the printed version. We welcome your feedback. Please E-mail
your comments regarding the contents or accessibility features of this
document to Webmaster@gao.gov.
This is a work of the U.S. government and is not subject to copyright
protection in the United States. It may be reproduced and distributed
in its entirety without further permission from GAO. Because this work
may contain copyrighted images or other material, permission from the
copyright holder may be necessary if you wish to reproduce this
material separately.
Report to the Committee on Armed Services, U.S. Senate:
United States Government Accountability Office:
GAO:
January 2008:
Defense Acquisitions:
Departmentwide Direction Is Needed for Implementation of the Anti-
tamper Policy:
Defense Acquisitions:
GAO-08-91:
GAO Highlights:
Highlights of GAO-08-91, a report to the Committee on Armed Services,
U.S. Senate.
Why GAO Did This Study:
The Department of Defense (DOD) invests billions of dollars on
sophisticated weapon systems and technologies. These may be at risk of
exploitation when exported, stolen, or lost during combat or routine
missions. In an effort to minimize this risk, DOD developed an anti-
tamper policy in 1999, calling for DOD components to implement anti-
tamper techniques for critical technologies.
In March 2004, GAO reported that program managers had difficulties
implementing this policy, including identifying critical technologies.
This follow-up report (1) describes recent actions DOD has taken to
implement its anti-tamper policy and (2) identifies challenges facing
program managers.
GAO reviewed documentation on actions DOD has taken since 2004 to
implement its anti-tamper policy, and interviewed officials from the
Anti-Tamper Executive Agent‘s Office, the military services, other DOD
components, and a cross-section of program offices.
What GAO Found:
Since 2004, DOD has taken several actions to raise awareness about anti-
tamper protection and develop resources that provide program managers
with general information on its anti-tamper policy. These actions
include developing a Web site with anti-tamper information and events,
establishing an online learning module on anti-tamper protection, and
sponsoring research on generic anti-tamper techniques. However, DOD
lacks departmentwide direction for implementation of its anti-tamper
policy. Without such direction, individual DOD components are left on
their own to develop initiatives. For example, the Navy is developing a
database that is intended to provide a horizontal view of what DOD
components have identified as critical program information. While many
officials we spoke with pointed to this database as a potential tool
for identifying critical technologies that may need anti-tamper
protection, the database is currently incomplete. Specifically, the
Missile Defense Agency is not providing information because its
information is classified at a level above what the database can
support. Also, the Air Force is not currently providing information
because not all commands have provided consent to participate.
At the same time, program managers face challenges implementing DOD‘s
anti-tamper policy”due largely to a lack of information or tools needed
to make informed assessments at key decision points. First, program
managers have limited information for defining what is critical or
insight into what technologies other programs have deemed critical to
ensure similar protection across programs. Determining whether
technologies are critical is largely left to the discretion of the
individual program manager, resulting in an uncoordinated and stove
piped process. Therefore, the same technology can be identified as
critical in one program office but not another. Second, program
managers have not always had sufficient or consistent information from
the intelligence community to identify threats and vulnerabilities to
technologies that have been identified as critical. The potential
impact of inconsistent threat assessments is twofold: If the threat is
deemed to be low but is actually high, the technology is susceptible to
tampering; conversely, if the threat is deemed to be high and is
actually low, an anti-tamper solution is more robust than needed.
Finally, program managers have had difficulty selecting sufficient anti-
tamper solutions”in part because they lack information and tools, such
as risk and cost-estimating models, to determine how much anti-tamper
protection is needed. As a result, program managers may select a
suboptimal solution. Given these combined challenges, there is an
increased risk that some technologies that need protection may not be
identified or may not have sufficient protection.
What GAO Recommends:
To better ensure implementation of DOD‘s anti-tamper policy, GAO is
recommending that DOD issue departmentwide direction for its policy and
provide additional tools for program managers. DOD agreed to provide
additional tools to assist program managers. However, DOD believes that
a directive it is currently updating addresses GAO‘s other concern. GAO
continues to call for immediate departmentwide direction.
To view the full product, including the scope and methodology, click on
[hyperlink, http://www.GAO-08-91]. For more information, contact Ann
Calveresi-Barr at (202) 512-4841 or calvaresibarra@gao.gov.
[End of section]
Contents:
Letter:
Results in Brief:
Background:
DOD Lacks Departmentwide Direction for Implementing its Anti-tamper
Policy:
Program Managers Face Several Challenges in Identifying Critical
Technologies, Threats, and Sufficient Anti-tamper Solutions#:
Conclusions:
Recommendations for Executive Action:
Agency Comments and Our Evaluation:
Appendix I: Scope and Methodology:
Appendix II: Comments from the Department of Defense:
Appendix III: GAO Contact and Staff Acknowledgments:
Related GAO Products:
Abbreviations:
AT&L: Under Secretary of Defense for Acquisition, Technology,
and Logistics:
DOD: Department of Defense:
United States Government Accountability Office:
Washington, DC 20548:
January 11, 2008:
The Honorable Carl Levin:
Chairman:
The Honorable John McCain:
Ranking Member: Committee on Armed Services:
United States Senate:
Each year, the Department of Defense (DOD) invests billions of dollars
to develop and produce sophisticated weapon systems and technologies to
maintain military superiority. As such, these weapons and technologies
are highly sought after and at risk of exploitation when exported,
stolen, or lost or damaged during combat or routine missions. Such
exploitation can weaken U.S. military advantage on the battlefield and
erode the U.S. industrial base's technological competitiveness in the
international marketplace.
In an effort to protect U.S. weapons and technologies from
exploitation, DOD established a policy in 1999 requesting each military
service to implement anti-tamper techniques, which include software and
hardware protective devices, when technologies are determined to be
critical and vulnerable to exploitation. In March 2004, we reported on
several difficulties program managers faced in implementing this
policy,[Footnote1 1] including determining which technologies were
critical--the basis for considering the need for anti-tamper
protection. Difficulties with implementing DOD's anti-tamper policy, as
well as vulnerabilities in related government programs, prompted GAO to
designate the effective protection of technologies critical to U.S.
national security as a new high-risk area in 2007.[Footnote
The Senate report accompanying the National Defense Authorization Act
for Fiscal Year 2006 requires us to conduct a follow-up review to our
March 2004 report. In response, we identified (1) recent actions DOD
has taken to implement its anti-tamper policy and (2) challenges facing
program managers.
To conduct our work, we obtained information and documentation on
actions DOD has taken to implement its anti-tamper policy since 2004
and interviewed officials from the Anti-Tamper Executive Agent's
Office, military services, other DOD components, and the intelligence
community about these actions. We also determined the status of our
2004 report recommendations. We conducted structured interviews with
officials from a cross-section of programs that the Anti-Tamper
Executive Agent's Office and DOD components identified as considering
and/or implementing anti-tamper protection. We discussed with these
program officials their procedures for implementing anti-tamper
protection and any challenges they faced. We also interviewed officials
from program offices not identified by the Anti-Tamper Executive Agent
and DOD components to obtain their perspective about the anti-tamper
policy. We did not evaluate whether programs had implemented sufficient
anti-tamper protection. We conducted this performance audit (from
January 2007 to January 2008) in accordance with generally accepted
government auditing standards. Those standards require that we plan and
perform the audit to obtain sufficient, appropriate evidence to provide
a reasonable basis for our findings and conclusions based on our audit
objectives. We believe that the evidence obtained provides a reasonable
basis for our findings and conclusions based on our audit objectives.
For more on scope and methodology, see appendix I.
Results in Brief:
Since we reported on DOD's anti-tamper efforts in 2004, DOD has
developed several anti-tamper resources to help program managers
implement its anti-tamper policy--such as an online anti-tamper
training course. DOD has also updated an acquisition policy document
and a guidebook that provides general information on anti-tamper
protection. However, DOD has not issued a formal directive or
instruction incorporating its anti-tamper policy into its acquisition
guidance to ensure proper implementation of the policy departmentwide.
Absent clear departmentwide direction, DOD components are left to
develop their own initiatives to assist in anti-tamper implementation.
The extent to which DOD components will benefit from these initiatives
is dependent on acceptance and adoption by all, which has yet to occur.
A lack of information or tools at three key decision points--
identifying critical technologies, threats and vulnerabilities, and
solutions--has significantly challenged program managers in effectively
implementing DOD's anti-tamper policy. First, program managers have
limited information for defining what is critical or insight into what
technologies other programs have identified as critical to ensure
similar protection across programs. Second, program managers have not
always had sufficient or consistent information from the intelligence
community to identify threats and vulnerabilities to critical
technologies. Third, program managers have had difficulty selecting
solutions, in part because they lack the information and tools, such as
risk and cost-estimating models, to determine how much anti-tamper
protection is needed to protect critical technologies. Given these
challenges, some technologies that need protection may not be
identified or may not be sufficiently protected.
We are recommending that DOD take actions to establish departmentwide
direction that prescribes how to carry out its anti-tamper policy and
identify and provide additional tools to assist program managers during
key decision points.
In written comments on a draft of this report, DOD concurred with our
recommendation to provide additional tools to assist program managers
in their anti-tamper decision process but nonconcurred with our
recommendation that the Under Secretary of Defense for Acquisition,
Technology, and Logistics provide specific direction on applying its
anti-tamper policy. DOD stated that the Under Secretary of Defense
(Intelligence) is currently updating the security and
counterintelligence support directive to acquisition programs.
Following the update, DOD plans to update a manual with a new section
explicitly for anti-tamper protection. We continue to believe that
direction on applying anti-tamper policy has long been needed and
should not be delayed and that the Under Secretary of Defense for
Acquisition, Technology, and Logistics, who is responsible for anti-
tamper policy, should be involved in developing and providing
direction.
Background:
To protect its critical assets, DOD has established several protection
measures for weapon systems. These measures include information
assurance to protect information and information systems, software
protection to prevent the unauthorized distribution and exploitation of
critical software, and anti-tamper techniques to help delay
exploitation of technologies through means such as reverse
engineering[Footnote 3] when U.S. weapons are exported or lost on the
battlefield. Examples of anti-tamper techniques include software
encryption, which scrambles software instructions to make them
unintelligible without first being reprocessed through a deciphering
technique, and hardware protective coatings designed to make it
difficult to extract or dissect components without damaging
them.[Footnote 4]
In 1999, the Under Secretary of Defense for Acquisition, Technology,
and Logistics (AT&L) issued a policy memorandum for implementing anti-
tamper protection in acquisition programs. In the following year, AT&L
issued a policy memorandum stating that technologies should be
routinely assessed during the acquisition process to determine if they
are critical and if anti-tamper techniques are needed to protect these
technologies. In 2001, an AT&L policy memorandum designated the Air
Force as the Anti-Tamper Executive Agent. The executive agent's office,
which currently has four staff, is responsible for implementing DOD's
anti-tamper policy and managing anti-tamper technology development
through the Air Force Research Laboratory. The executive agent also
holds periodic information sessions to educate the acquisition
community about anti-tamper policy, initiatives, and technology
developments. To coordinate activities, military services and defense
agencies, such as the Missile Defense Agency, have an anti-tamper point
of contact. Program managers are responsible for ensuring anti-tamper
protection is incorporated on any weapon system with critical
technologies that need protection.[Footnote 5] Since it is not feasible
to protect every technology, program managers are to conduct an
assessment to determine if anti-tamper protection is needed.
When assessing if anti-tamper protection is needed, program managers
make several key decisions regarding the identification of critical
technologies, assessment of threats and vulnerabilities, and
determination of anti-tamper techniques or solutions. The process
begins with determining whether or not their system's critical program
information[Footnote 6] includes any critical technologies. If it is
determined that the system has no critical technologies, program
managers are to document the decision and request concurrence from
either the office within their component that is designated with anti-
tamper responsibilities or the Anti-Tamper Executive Agent. For systems
that are determined to have critical technologies, the next key steps
are to identify potential threats and vulnerabilities and select anti-
tamper techniques to protect those technologies. Techniques are
ultimately verified and validated by a team[Footnote 7] composed of
representatives from the DOD components. The program manager documents
decisions in an annex of the program protection plan.[Footnote 8]
In 2004, we reported that program managers had difficulty in carrying
out DOD's anti-tamper policy on individual weapons, such as identifying
critical technologies and experiencing cost increases or schedule
delays when applying anti-tamper techniques--particularly when the
techniques are not fully developed or when the systems are already in
design or production. We made several recommendations, including
increasing oversight over the identification of critical technologies
across programs, improving tools and resources for program managers in
identifying critical technologies, ensuring early identification of
anti-tamper costs and solutions, monitoring the development of generic
anti-tamper solutions and evaluating their effectiveness, and
developing a business case to determine whether the current
organizational structure and resources are adequate. DOD concurred or
partially concurred with these recommendations. DOD has taken some
steps to implement our recommendations including identifying available
anti-tamper technical resources and developing a searchable spreadsheet
of critical technologies, incorporating information in the Defense
Acquisition Guidebook on the need for early identification of anti-
tamper solutions in a weapon system, and sponsoring a study on anti-
tamper techniques and their general effectiveness. While DOD has taken
these steps to address parts of the recommendations, all remain open.
DOD Lacks Departmentwide Direction for Implementing its Anti-tamper
Policy:
DOD has recently taken several actions aimed at raising awareness about
its anti-tamper policy and assisting program managers in implementing
anti-tamper protection on a weapon system. Despite these actions, DOD
still lacks departmentwide direction to implement its anti-tamper
policy. Without such direction, DOD components are left to develop
their own initiatives to assist program managers in implementing anti-
tamper protection. While individual efforts are important, such as a
database to track critical program information DOD-wide, their
effectiveness may be limited because they have yet to be accepted and
adopted across all DOD components.
DOD Has Developed Some Resources for Program Managers to Use in
Implementing Anti-tamper Protection:
Since our 2004 report, DOD, through the Anti-Tamper Executive Agent,
has developed some resources aimed at assisting program managers as
they go through the anti-tamper decision process. DOD's resources range
from providing general information about the anti-tamper policy to
research on anti-tamper solutions. Specifically, DOD has:
* developed a guidebook that includes a checklist to assist program
managers in identifying security, management, and technical
responsibilities when incorporating anti-tamper protection on a weapons
system;
* developed a searchable spreadsheet to assist program managers in
identifying critical technologies;
* developed a Web site for program managers to provide general anti-
tamper information, policy resources, conference briefings,
implementation resources, and current events;
* coordinated with Defense Acquisition University to design and launch
an online learning module on anti-tamper protection;
* funded Sandia National Laboratories to study anti-tamper techniques
and their general effectiveness; and:
* sponsored research to develop generic anti-tamper techniques through
Small Business Innovation Research, a research program that funds early-
stage research and development projects at small technology companies.
DOD has also updated two acquisition documents with general anti-tamper
information. The first document--DOD Instruction 5000.2, Operation of a
Defense Acquisition System--currently states that one of the purposes
of the System Development and Demonstration phase of a weapon system is
to ensure affordability and protection of critical program information
by implementing appropriate solutions such as anti-tamper protection.
The second document--the Defense Acquisition Guidebook--has been
updated to include some basic information on the importance of
implementing anti-tamper protection early in the development of a
weapon system and describes program managers' overall responsibilities
for implementing the anti-tamper policy.
DOD Has Not Provided Direction to Implement Its Anti-tamper Policy:
While DOD has issued broad policy memorandums that reflect the
department's desire for routinely assessing weapon systems to determine
if anti-tamper protection is needed, the department has not fully
incorporated the anti-tamper policy into its formal acquisition
guidance. Specifically, DOD Instruction 5000.2 mentions anti-tamper
protection, but the department has not provided direction for
implementation of anti-tamper in a formal directive or instruction.
Currently, the department is coordinating comments on a draft
instruction (DOD Instruction 5200.39) on protection of critical program
information that includes anti-tamper implementation.[Footnote 9]
However, in commenting on the draft instruction, several DOD components
have raised concerns about when and how to define critical program
information that warrants protection, which have contributed to long
delays in finalizing the instruction. In addition, the department has
not provided specific guidance for program managers on how to implement
anti-tamper protection in a DOD manual because DOD officials said this
process cannot begin until the instruction is finalized. The date for
finalizing the instruction has not yet been determined.
Officials from the executive agent's office stated that departmentwide
direction would give credence to the anti-tamper policy in practice.
Anti-tamper points of contact told us that the policy memorandums are
not sufficient to ensure that program managers are implementing anti-
tamper protection on weapon systems when necessary. One service anti-
tamper point of contact stated that program managers might disregard
the policy memorandums because they are high-level and broad. Another
service anti-tamper point of contact said that implementation is
ultimately left up to the individual program manager. While a program
manager's decision should be approved by the milestone decision
authority[Footnote 10] and documented in the program protection plan,
some service and program officials said that programs are not always
asked about anti-tamper protection during the review.
Absent Departmentwide Direction, Components Have Been Left to Develop
Their Own Anti-tamper Initiatives:
Lacking departmentwide direction for the anti-tamper policy, DOD
components have been left to develop their own initiatives to assist
program managers in anti-tamper implementation. However, the usefulness
of these initiatives depends on the extent to which other components
participate in these efforts.
For example, the Missile Defense Agency developed a risk assessment
model to help program managers identify how much anti-tamper is needed
to protect critical technologies. Specifically, the model helps program
managers assess the criticality of the technology relative to the risk
of exploitation. However, when the Missile Defense Agency sought
comments on the initiative, the executive agent and services indicated
that it was too lengthy and complex to use. The executive agent, in
coordination with anti-tamper points of contact from the Missile
Defense Agency and services, has taken over this effort, and it is
still in development.
The Navy is also implementing an initiative: a database intended to
capture the information that programs across DOD components have
identified as critical. Many officials we spoke with pointed to this
database as a potential tool to improve identification of critical
program information across DOD components. To date, the Navy and the
Army are submitting information for the database, but the Missile
Defense Agency and Air Force are not. The Missile Defense Agency anti-
tamper point of contact stated that its information is classified at a
level above what the database can support and its program managers will
not submit information for the database unless DOD requires submissions
by all DOD components. However, the Missile Defense Agency does have
access to the database and uses it as a cross-check to determine if it
is identifying similar critical program information. The Air Force has
been briefed on the initiative but does not yet have consent from all
of the commands to participate. Without full participation across all
DOD components, the usefulness of this database as a tool to identify
critical technologies that may need anti-tamper protection will be
limited.
Program Managers Face Several Challenges in Identifying Critical
Technologies, Threats, and Sufficient Anti-tamper Solutions:
To determine whether anti-tamper protection is needed, program managers
must identify which technologies are deemed critical, determine the
potential threats and vulnerabilities to these technologies, and
identify sufficient anti-tamper solutions to protect the technologies.
Such decisions involve a certain level of subjectivity. However,
program managers lack the information or tools needed to make informed
assessments at these key decision points. As a result, some
technologies that need protection may not be identified or may not have
sufficient protection.
Limited Information and Coordination on What Is Critical Increase the
Risk That Some Technologies May Not Be Identified:
Determining technologies that are critical is largely left to the
discretion of the program managers. While DOD has some resources
available to program managers to help identify critical technologies,
they may be of limited use. For example, the executive agent's
searchable spreadsheet of critical technologies may not be
comprehensive because it relies on DOD's Militarily Critical
Technologies List, which we reported in 2006 was largely out of
date.[Footnote 11] Also, some program offices have used a series of
questions established in a 1994 DOD manual on acquisition systems
protection to help guide their discussions on what is critical.
However, these questions are broad and subject to interpretation, and
can result in different conclusions, depending on who is involved in
the decision-making process.
In addition, identifying what is critical varies by DOD component and
sometimes by program office. For example, one Air Force program office
tried various approaches, including teams of subject matter experts,
over 2 years to identify its list of critical program information. In
contrast, the Army took the initiative to establish a research center
to assist program managers in identifying critical program information,
but Army officials stated that the approach used by the center has led
to an underestimating of critical program information and critical
technologies in programs.
At the same time, there has been limited coordination across programs
on technologies that have been identified as critical--creating a stove
piped process--which could result in one technology being protected
under one program and not protected under another. While informal
coordination can occur, programs did not have a formal mechanism for
coordinating with other programs, including those within their service.
For example, officials from one program office stated they had little
interaction from programs within their service or other services to
ensure protection of similar technologies. A program under one joint
program executive office had not coordinated with other programs to
identify similar technologies as critical. In addition, according to an
Army official, contractors who have worked on programs across services
have questioned why one service is applying anti-tamper solutions to a
technology that another service has not identified as critical.
Finally, one program office we spoke with identified critical program
information on its system but indicated that a similar system in
another service had not identified any critical program information
and, therefore, had no plans to implement anti-tamper protection.
Despite the risk that some technologies that need protection may not be
identified or may not be protected across programs, no formal mechanism
exists within DOD to provide a horizontal view of what is
critical.[Footnote 12] However, any effort to do so could be undermined
by the programs' and services' different definitions and
interpretations of "critical program information" and "critical
technologies." The Anti-Tamper Executive Agent defines critical program
information as capturing all critical technologies. In contrast, the
Army's interpretation is that critical program information only
includes critical technologies that are state-of-the-art. For the Navy,
critical program information includes software, while hardware is part
of what the Navy defines as critical technologies. One program that is
part of a joint program office identified critical program information
as including company proprietary information. As a result, tracking
critical program information may not provide a horizontal view of all
technologies services and programs have identified as needing anti-
tamper protection.
Contradictory and Insufficient Intelligence Information Has Hindered
Some Programs in Identifying Potential Threats:
Once a program office identifies critical technologies, the next step
in the anti-tamper decision process is to identify threats to those
technologies. DOD's Program Manager's Guidebook and Checklist for Anti-
tamper states that multiple threat assessments should be requested from
either the service intelligence organization or counterintelligence
organization. One program office we visited stated that it has
requested and received multiple threat assessments from the
intelligence community, which have sometimes contradicted one another,
leaving the program office to decipher the information and determine
the threat. According to an anti-tamper point of contact, other
programs have received contradictory information--typically relating to
foreign countries' capabilities to reverse engineer. The potential
impact of contradictory intelligence reports is twofold: If the threat
is deemed to be low but is actually high, the technology is susceptible
to reverse engineering; conversely, if the threat is deemed to be high
and is actually low, the anti-tamper solution is more robust than
needed.
To assist with the process of identifying threats, program offices may
request threat assessments from a group within the Defense Intelligence
Agency. However, this group was not able to complete assessments for
approximately 6 months during 2006. While the group has resumed
completing assessments, an agency official stated that it is not able
to produce as many assessments as before due to limited resources. The
Defense Intelligence Agency does not turn down program offices that may
request assessments, but does have to put them in a queue and provide
them with previous assessments, if they exist, until it can complete a
full assessment for the program office. One program office indicated
that it took 6 to 9 months for the agency to complete its assessment.
Program Managers Need Tools to Assist in Designing Effective Anti-
tamper Solutions and Estimating Related Costs:
Program managers also lack the tools needed to identify the optimal
anti-tamper solutions for those critical technologies that are
vulnerable to threats. Most notably, program managers lack a risk model
to assess the relative strengths of different anti-tamper solutions and
a tool to help estimate their costs.
According to National Security Agency officials, who are available to
provide support to program managers considering or implementing anti-
tamper protection, program managers and contractors sometimes have
difficulty determining appropriate solutions. Four of five programs we
spoke with that had experience in this area of the anti-tamper decision
process had difficulty identifying how much anti-tamper protection was
enough to protect a critical technology. For example, one program
official told us that an anti-tamper solution developed for one of the
program's critical technologies may not be sufficient to prevent
reverse engineering. Another program office stated that it is difficult
to choose between competing contractors without knowing how to
determine the appropriate level of anti-tamper protection needed. An
anti-tamper point of contact said that program managers need a tool to
help them assess the criticality of a technology versus the types of
threats to that technology.
Implementing a suboptimal anti-tamper solution can have cost and
performance implications for the program. Specifically, if the solution
provides less anti-tamper protection than is needed, the program may
have to retrofit additional anti-tamper protection to allow for a more
robust solution. Not only can such retrofitting add to a program's
costs, it can compromise performance.
Given limited resources and tools for determining anti-tamper
solutions, some program office officials told us that to satisfy anti-
tamper solutions they relied on other protection measures. For example,
officials in one program office stated that anti-tamper protection and
information assurance[Footnote 13] were interchangeable and indicated
that following the National Security Agency's information assurance
requirements-- which number in the hundreds--should be sufficient as an
anti-tamper solution for this system. This same program was not aware
of anti- tamper resources and did not coordinate with an anti-tamper
validation and verification team on its solutions. Also, an official
from another program office indicated that anti-tamper protection and
information assurance are similarly defined. While DOD and service
officials agreed that some information assurance and anti-tamper
measures may overlap, fulfilling information assurance requirements
does not guarantee a sufficient anti-tamper solution.
Conclusions:
In establishing various policies to protect its critical assets, DOD
saw anti-tamper as a key way to preserve U.S. investment in critical
technologies while operating in an environment of coalition warfare and
a globalized industry. Program managers are ultimately responsible for
implementing DOD's anti-tamper policy. However, a lack of direction,
information, and tools from DOD to implement its policy has created
significant challenges for program managers. Further, this policy can
compete with the demands of meeting program cost and schedule
objectives, particularly when the optimal anti-tamper solution is
identified late in the schedule. Until DOD establishes a formal
directive or instruction for implementing its policy departmentwide and
equips program managers with adequate implementation tools, program
managers will continue to face difficulties in identifying critical
technologies and implementing anti-tamper protection.
Recommendations for Executive Action:
As DOD examines its policies for protecting critical assets, we are
recommending that the Secretary of Defense direct the Under Secretary
of Acquisition, Technology, and Logistics, in coordination with the
Anti-Tamper Executive Agent and the Under Secretary of Defense for
Intelligence, to issue or be involved in developing and providing
departmentwide direction for application of its anti-tamper policy that
prescribes how to carry out the policy and establishes definitions for
critical program information and critical technologies.
To help ensure the effectiveness of anti-tamper implementation, we also
recommend that the Secretary of Defense direct the Anti-Tamper
Executive Agent to identify and provide additional tools to assist
program managers in the anti-tamper decision process.
Agency Comments and Our Evaluation:
In written comments on a draft of this report, DOD concurred with our
recommendation that the Secretary of Defense direct the Anti-Tamper
Executive Agent to identify additional tools to assist program managers
in the anti-tamper decision process. DOD stated that the Anti-Tamper
Executive Agent is drafting Anti-Tamper Standard Guidelines to
facilitate proper implementation of anti-tamper protection across the
department.
DOD did not concur with our recommendation that the Secretary of
Defense direct the Under Secretary of Defense (AT&L) in coordination
with the Anti-Tamper Executive Agent and the Under Secretary of Defense
(Intelligence) to issue departmentwide direction for application of its
anti-tamper policy that prescribes how to carry out the policy and
establishes definitions for critical program information and critical
technologies. DOD stated that the Under Secretary of Defense
(Intelligence) has primary responsibility for DOD Directive 5200.39, a
security and counterintelligence support directive to acquisition
programs, and its successor, DOD Instruction 5200.39 regarding
protection of critical program information. The Under Secretary of
Defense (Intelligence) is currently coordinating an update to this
directive. Once it is issued, the department plans to update DOD 5200.1-
M, which provides the execution standards and guidelines to meet the
DOD Instruction 5200.39 policy.
While DOD has issued broad policy memorandums beginning in 1999 that
reflect the department's desire for routinely assessing weapon systems
to determine if anti-tamper protection is needed, the department has
not fully incorporated anti-tamper policy into its formal acquisition
guidance. As we have reported, service officials indicated collectively
that these policy memorandums are high-level, broad, and leave
implementation ultimately up to the individual program manager. DOD did
not indicate when the update of DOD Directive 5200.39 might be complete
and guidance on anti-tamper implementation issued. We continue to
believe that such direction is currently needed and that the Under
Secretary of Defense for Acquisition, Technology, and Logistics, who
issued the policy memorandums and is responsible for anti-tamper
policy, should be involved in developing and providing the appropriate
direction whether it be the update to DOD Directive 5200.39 or another
vehicle. That direction should include how to implement the anti-tamper
policy and how critical program information and critical technologies
are defined. We continue to believe that the direction, which has been
lacking since the policy was initiated in 1999, should not be further
delayed. If DOD continues to experience delays in updating DOD
Directive 5200.39, it should consider interim measures to meet the
immediate need for anti-tamper direction.
DOD's letter is reprinted in appendix II.
We are sending copies of this report to interested congressional
committees, as well as the Secretary of Defense; the Director, Office
of Management and Budget; and the Assistant to the President for
National Security Affairs. In addition, this report will be made
available at no charge on the GAO Web site at [hyperlink,
http://www.gao.gov].
Please contact me at (202) 512-4841 or calvaresibarra@gao.gov if you or
your staff have any questions concerning this report. Contact points
for our Offices of Congressional Relations and Public Affairs may be
found on the last page of this report. Others making key contributions
to this report are listed in appendix III.
Sincerely yours,
Signed by:
Ann Calvaresi-Barr:
Director Acquisition and Sourcing Management:
[End of section]
Appendix I: Scope and Methodology:
To identify actions the Department of Defense (DOD) has taken to
implement its anti-tamper policy since 2004, we reviewed DOD policies
and guidance governing anti-tamper protection on weapon systems and
obtained documents on various initiatives. We interviewed officials
from the Anti-Tamper Executive Agent, military services, and other DOD
components such as the Missile Defense Agency; Acquisition, Technology
and Logistics; Defense Intelligence Agency; National Security Agency;
and the Air Force Research Laboratory about initiatives or actions
taken regarding anti-tamper. Through these interviews and documents, we
also determined the status of our 2004 anti-tamper report
recommendations. We interviewed DOD officials from Networks and
Information Integration, Science and Technology, and
Counterintelligence to discuss anti-tamper protection and how it
relates to other program protection measures.
To determine how program managers implemented DOD‘s anti-tamper policy,
we interviewed officials from 14 program offices. We are not
identifying the names of the programs due to classification concerns.
We conducted structured interviews with 7 of the 14 program offices to
discuss and obtain documents about their experiences with implementing
the anti-tamper decision process and identify any challenges they
faced. We selected 6 of these programs from a list of weapon systems
identified in Anti-Tamper Executive Agent, services, and component
documents as considering and/or implementing anti-tamper protection and
a seventh program considering anti-tamper that we identified during the
course of our fieldwork. Systems we selected represented a cross
section of acquisition programs and various types of systems in
different phases of development. For the remaining programs, we
interviewed 7 not identified by the Anti-Tamper Executive Agent or the
services as considering and/or implementing anti-tamper to obtain their
viewpoints on DOD‘s anti-tamper policy and implementation. We selected
these programs by identifying lists of DOD acquisition programs and
comparing them to the Anti-Tamper Executive Agent‘s, services‘, and
components‘ lists of program considering and/or implementing anti-
tamper. We did not evaluate whether programs had implemented sufficient
anti-tamper protection.
[End of section]
Appendix II: Comments from the Department of Defense:
Deputy Under Secretary Of Defense:
Acquisition And Technology:
3015 Defense Pentagon:
Washington, DC 20301-3015:
Dec 20, 2007:
Ms. Calvaresi-Barr:
Director, Acquisition and Sourcing Management:
U.S. Government Accountability Office:
441 G Street, N.W.:
Washington, DC 20548:
Dear Ms. Calvaresi-Barr:
This is the Department of Defense (DoD) response to the GAO Draft
Report, GAO-08-9I SU, "Defense Acquisitions: Department-wide Direction
Is Needed for Implementation of the Anti-tamper Policy," dated October
I7, 2007 (GAO Code 120611).
Sincerely,
Mark D. Schaeffer:
Director:
Systems and Software Engineering:
Enclosure:
As stated
r
Systems and Software Engineering Gao Draft Report Dated October I7,
2007 GAO-08-91SU (GAO CODE 120611):
"Defense Acquisitions: Departmentwide Direction Is Needed For
Implementation Of The Anti-Tamper Policy":
Department Of Defense Comments To The GAO Recommendation:
Recommendation I: The GAO recommended that the Secretary of Defense
direct the Under Secretary of Defense (Acquisition, Technology, and
Logistics), in coordination with the Anti-Tamper Executive Agent and
the Under Secretary of Defense (Intelligence), to issue department-wide
direction for application of its anti-tamper policy that prescribes how
to carry out the policy and establishes definitions for critical
program information and critical technologies. (p. 13/GAO Draft
Report):
DOD Response: Non-concur. The Under Secretary of Defense (Intelligence)
(USD(I)) is the office of primary responsibility for DoDD 5200.39,
"Security Intelligence, and Counterintelligence Support to Acquisition
Program Protection," and its successor, DoDI 5200.39, "Critical Program
Information (CPI) Protection within the Department of Defense." USD(I)
is currently coordinating an update to the directive.
The Anti-Tamper Executive Agent (ATEA) has proposed the incorporation
of anti- tamper policy in this revision. The considered policy for anti-
tamper mandates:
"For critical technology type CPI, employ appropriate anti-tamper
during the RDA process unless waived in writing by MDA or equivalent."
Following the issuance of the updated DoDI 5200.39, the Department will
revised the DoD 5200.1-M, "Acquisition Systems Protection," the
implementing manual for the directive which provides the execution
standards and guidelines to meet the DoDI 5200.39 policy. The ATEA's
plan is to include a new section in the manual that is explicitly for
anti-tamper. This will describe how to implement anti-tamper to protect
technology CPI for U.S.-only cases, foreign military sales/direct
commercial sales, and science and technology programs.
Recommendation 2: The GAO recommended that the Secretary of Defense
direct the Anti-Tamper Executive Agent to identify and provide
additional tools to assist program managers in the anti-tamper decision
process. (p. I3/GAO Draft Report):
DOD Response: Concur. The ATEA is drafting a classified document called
the Anti- Tamper Standard Guidelines. This document will assist program
personnel in understanding how their system might be exposed to
adversaries and the consequence of technology CPI compromise. These
guidelines will facilitate proper implementation of AT protection of
identified technology CPI. The document will define AT protection
expectations and will help program personnel understand the rough
magnitude of AT protection required to field the system and also to
estimate the cost of AT prior to Milestone B. This information can also
provide the basis for identification of AT protection requirements to
potential contractors during a Request for Proposal. The document, by
providing standard anti-tamper guidelines for all programs to follow,
will help implement horizontal protection of technology CP1 across the
department.
[End of section]
Appendix III: GAO Contact and Staff Acknowledgments:
Ms. Ann Calvaresi-Barr (202) 512-4841 or calvaresibarra@gao.gov:
Acknowledgments:
In addition to the contact named above, Anne-Marie Lasowski (Assistant
Director), Gregory Harmon, Molly Whipple, Karen Sloan, John C. Martin,
and Alyssa Weir made major contributions to this report.
[End of section]
Related Products:
High-Risk Series: An Update. GAO-07-310. Washington, D.C.: January 2007.
Export Controls: Challenges Exist in Enforcement of an Inherently Complex System. GAO-07-265. Washington, D.C.: December 20, 2006.
Defense Technologies: DOD‘s Critical Technologies Lists Rarely Inform Export Control and Other Policy Decisions. GAO-06-793. Washington, D.C.: July 28, 2006.
President‘s Justification of the High Performance Computer Control Threshold Does Not Fully Address National Defense Authorization Act of 1998 Requirements. GAO-06-754R. Washington, D.C.: June 30, 2006.
Export Controls: Improvements to Commerce‘s Dual-Use System Needed to Ensure Protection of U.S. Interests in the Post-9/11 Environment. GAO-06-638. Washington, D.C.: June 26, 2006.
Defense Trade: Enhancements to the Implementation of Exon-Florio Could Strengthen the Law‘s Effectiveness. GAO-05-686. Washington, D.C.: September 28, 2005.
Industrial Security: DOD Cannot Ensure Its Oversight of Contractors under Foreign Influence Is Sufficient. GAO-05-681. Washington, D.C.: July 15, 2005.
Defense Trade: Arms Export Control Vulnerabilities and Inefficiencies in the Post-9/11 Security Environment. GAO-05-468R. Washington, D.C.: April 7, 2005.
Defense Trade: Arms Export Control System in the Post-9/11 Environment. GAO-05-234. Washington, D.C.: February 16, 2005.
Defense Acquisitions: DOD Needs to Better Support Program Managers‘ Implementation of Anti-Tamper Protection. GAO-04-302. Washington, D.C.: March 31, 2004.
Defense Trade: Better Information Needed to Support Decisions Affecting Proposed Weapons Transfers. GAO-03-694. Washington, D.C.: July 11, 2003.
Footnotes:
1. GAO, Defense Acquisitions: DOD Needs to Better Support Program
Managers‘ Implementation of Anti-Tamper Protection, GAO-04-302
(Washington, D.C.: Mar. 31, 2004).
2. GAO, High-Risk Series: An Update, GAO-07-310 (Washington, D.C.:
January 2007).
3. Reverse engineering is the process of taking apart an item such as
hardware or software to see how it works. For example, a software
program may be reverse engineered to determine how the program performs
certain operations.
4. Information regarding the specific anti-tamper solutions used on an
individual system is typically classified because disclosure could aid
exploitation. In some cases, anti-tamper information is restricted at
the special access level.
5. According to guidelines accompanying the 2000 AT&L policy
memorandum, anti-tamper should be considered for all new start
programs; programs that did not reach systems development prior to May
1, 2000; and all preplanned product improvement, modifications, or
other technology insertion efforts. In addition, anti-tamper should be
considered for all foreign military sales or direct commercial sales
and for all upgrades to all programs, regardless of when systems
development occurred.
6. Critical program information is information, technologies, or
systems that, if compromised, would degrade combat effectiveness,
shorten the expected combat effective life of the system, or
significantly alter program direction.
7. A validation and verification team validates that a program office‘s
anti-tamper implementation will fulfill its intended function and
verifies that anti-tamper measures stipulated in the anti-tamper plan
operate according to specifications.
8. A program protection plan is a program manager‘s single source
document used to coordinate and integrate all protection efforts
designed to deny access to critical program information to anyone not
authorized or not having a need to know and prevent inadvertent
disclosure of leading edge technology to foreign interests.
9. According to DOD, the department began this process in 1999.
10. The milestone decision authority is a designated DOD individual
with the authority to approve entry of an acquisition program into the
next phase of the acquisition process and is accountable for cost,
schedule, and performance reporting to a higher authority, including
congressional reporting.
11. The spreadsheet is based primarily on the Militarily Critical
Technologies List”a compendium of goods and technologies that would
permit significant advances in military capabilities in the near
term”and the Developing Science and Technologies List”a compendium of
scientific and technological capabilities being developed worldwide
that could affect U.S. military capabilities in the long term. In 2006,
we reported that both lists are largely out of date and are of
questionable value. GAO, Defense Technologies: DOD‘s Critical
Technologies Lists Rarely Inform Export Control and Other Policy
Decisions, GAO-06-793 (Washington, D.C.: July 28, 2006).
12. In our March 2004 report (GAO-04-302) we recommended that DOD
improve its oversight of the identification of critical technologies by
all programs subject to the anti-tamper policy.
13. Information assurance refers to measures that defend and protect
information and information systems by ensuring their confidentiality,
integrity, authenticity, availability, and utility.
GAO's Mission:
The Government Accountability Office, the audit, evaluation and
investigative arm of Congress, exists to support Congress in meeting
its constitutional responsibilities and to help improve the performance
and accountability of the federal government for the American people.
GAO examines the use of public funds; evaluates federal programs and
policies; and provides analyses, recommendations, and other assistance
to help Congress make informed oversight, policy, and funding
decisions. GAO's commitment to good government is reflected in its core
values of accountability, integrity, and reliability.
Obtaining Copies of GAO Reports and Testimony:
The fastest and easiest way to obtain copies of GAO documents at no
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each
weekday, GAO posts newly released reports, testimony, and
correspondence on its Web site. To have GAO e-mail you a list of newly
posted products every afternoon, go to [hyperlink, http://www.gao.gov]
and select "Subscribe to Updates."
Order by Mail or Phone:
The first copy of each printed report is free. Additional copies are $2
each. A check or money order should be made out to the Superintendent
of Documents. GAO also accepts VISA and Mastercard. Orders for 100 or
more copies mailed to a single address are discounted 25 percent.
Orders should be sent to:
U.S. Government Accountability Office:
441 G Street NW, Room LM:
Washington, D.C. 20548:
To order by Phone:
Voice: (202) 512-6000:
TDD: (202) 512-2537:
Fax: (202) 512-6061:
To Report Fraud, Waste, and Abuse in Federal Programs:
Contact:
Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]:
E-mail: fraudnet@gao.gov:
Automated answering system: (800) 424-5454 or (202) 512-7470:
Congressional Relations:
Gloria Jarmon, Managing Director, JarmonG@gao.gov:
(202) 512-4400:
U.S. Government Accountability Office:
441 G Street NW, Room 7125:
Washington, D.C. 20548:
Public Affairs:
Chuck Young, Managing Director, youngc1@gao.gov:
(202) 512-4800:
U.S. Government Accountability Office:
441 G Street NW, Room 7149:
Washington, D.C. 20548: