bmad-plus 0.4.3 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (133) hide show
  1. package/CHANGELOG.md +48 -0
  2. package/README.md +4 -3
  3. package/package.json +5 -1
  4. package/readme-international/README.de.md +2 -2
  5. package/readme-international/README.es.md +2 -2
  6. package/readme-international/README.fr.md +2 -2
  7. package/src/bmad-plus/module.yaml +43 -12
  8. package/src/bmad-plus/packs/pack-shield/README.md +110 -0
  9. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
  10. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
  11. package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
  12. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
  13. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
  14. package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
  15. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
  16. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
  17. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
  18. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
  19. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
  20. package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
  21. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
  22. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
  23. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
  24. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
  25. package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
  26. package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
  27. package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
  28. package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
  29. package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
  30. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
  31. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
  32. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
  33. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
  34. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
  35. package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
  36. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
  37. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
  38. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
  39. package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
  40. package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
  41. package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
  42. package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
  43. package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
  44. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
  45. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
  46. package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
  47. package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
  48. package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
  49. package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
  50. package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
  51. package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
  52. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
  53. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
  54. package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
  55. package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
  56. package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
  57. package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
  58. package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
  59. package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
  60. package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
  61. package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
  62. package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
  63. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
  64. package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
  65. package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
  66. package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
  67. package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
  68. package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
  69. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
  70. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
  71. package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
  72. package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
  73. package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
  74. package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
  75. package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
  76. package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
  77. package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
  78. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
  79. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
  80. package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
  81. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
  82. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
  83. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
  84. package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
  85. package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
  86. package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
  87. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
  88. package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
  89. package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
  90. package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
  91. package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
  92. package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
  93. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
  94. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
  95. package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
  96. package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
  97. package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
  98. package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
  99. package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
  100. package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
  101. package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
  102. package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
  103. package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
  104. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
  105. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
  106. package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
  107. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
  108. package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
  109. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
  110. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
  111. package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
  112. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
  113. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
  114. package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
  115. package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
  116. package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
  117. package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
  118. package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
  119. package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
  120. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
  121. package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
  122. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
  123. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
  124. package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
  125. package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
  126. package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
  127. package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
  128. package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
  129. package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
  130. package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
  131. package/tools/cli/commands/install.js +22 -9
  132. package/tools/cli/commands/update.js +4 -2
  133. package/tools/cli/i18n.js +514 -394
@@ -0,0 +1,155 @@
1
+ # ISO/IEC 42001:2023 — Annex A Controls (All 38)
2
+
3
+ ISO/IEC 42001:2023 Annex A contains **38 controls** organised across **9 control domains** (A.2–A.10). Within each domain, the .1 sub-clause contains the domain objective statement — the numbered controls begin at .2 (or .1.2 / .2.2 for A.6's two sub-objectives). Annex B provides implementation guidance for each control.
4
+
5
+ > **How to use:** Controls are selected based on organisational role (provider, user, or both), AI system impact level, and risk assessment outcomes. Inapplicable controls must be justified in the Statement of Applicability (SoA).
6
+
7
+ ---
8
+
9
+ ## A.2 — Policies Related to AI (3 controls)
10
+
11
+ | Control ID | Control Name | Applies To | Description |
12
+ |-----------|-------------|-----------|-------------|
13
+ | A.2.2 | AI policy | Provider + User | A formal AI policy shall be established, documented, and communicated. The policy shall include the organisation's commitment to responsible AI development or use, alignment with organisational values and legal obligations, and a framework for setting AI objectives. Signed by top management. |
14
+ | A.2.3 | Alignment with other organisational policies | Provider + User | AI-specific requirements shall be incorporated into existing organisational policies (e.g. HR, procurement, IT, data governance, information security) where those policies affect or are affected by AI systems. |
15
+ | A.2.4 | Review of the AI policy | Provider + User | The AI policy shall be reviewed at planned intervals and when significant changes occur, to ensure its continuing suitability, adequacy, and effectiveness. |
16
+
17
+ **Common gaps:** AI policy exists but lacks specific responsible AI commitments; other organisational policies not updated to address AI; policy review cycle not defined.
18
+
19
+ ---
20
+
21
+ ## A.3 — Internal Organisation (2 controls)
22
+
23
+ | Control ID | Control Name | Applies To | Description |
24
+ |-----------|-------------|-----------|-------------|
25
+ | A.3.2 | AI roles and responsibilities | Provider + User | Roles and responsibilities for AI governance shall be defined, assigned, communicated, and documented. This includes accountability for individual AI systems, data governance, and AIMS oversight. A RACI matrix or equivalent is recommended. |
26
+ | A.3.3 | Reporting of concerns | Provider + User | Mechanisms shall be established for personnel to raise concerns about AI systems — including ethical concerns, bias observations, unexpected outputs, or policy non-compliance — without fear of reprisal. |
27
+
28
+ **Common gaps:** AI ownership is informal or split across teams without clear accountability; no channel for staff to report AI concerns.
29
+
30
+ ---
31
+
32
+ ## A.4 — Resources for AI Systems (5 controls)
33
+
34
+ | Control ID | Control Name | Applies To | Description |
35
+ |-----------|-------------|-----------|-------------|
36
+ | A.4.2 | Resource documentation | Provider + User | The resources required to develop, deploy, operate, and maintain AI systems shall be identified and documented, including compute, data, tooling, and human resources. |
37
+ | A.4.3 | Data resources | Provider | Policies and controls shall govern the acquisition, management, and quality assurance of data resources used in AI systems — covering training, validation, and test data. |
38
+ | A.4.4 | Tooling resources | Provider | Controls shall govern the selection, procurement, and management of AI tooling — including development frameworks, model libraries, and evaluation platforms. |
39
+ | A.4.5 | System and computing resources | Provider | Controls shall govern the compute infrastructure used for AI development and deployment: provisioning, access control, capacity management, and decommissioning. |
40
+ | A.4.6 | Human resources | Provider + User | AI-specific competency requirements shall be documented. Training programmes shall be established for AI developers, operators, and business users. An awareness programme shall be maintained for all staff who interact with or are affected by AI. |
41
+
42
+ **Common gaps:** No AI-specific competency framework; staff AI awareness training absent; third-party AI tools not inventoried; data resource governance undocumented.
43
+
44
+ ---
45
+
46
+ ## A.5 — Assessing Impacts of AI Systems (4 controls)
47
+
48
+ | Control ID | Control Name | Applies To | Description |
49
+ |-----------|-------------|-----------|-------------|
50
+ | A.5.2 | AI system impact assessment process | Provider + User | A documented process for assessing the impacts of AI systems shall be established and maintained. The process shall define scope, methodology, frequency of assessment, roles, and how assessment results inform control selection and treatment decisions. |
51
+ | A.5.3 | Documentation of AI system impact assessments | Provider + User | Results of AI system impact assessments shall be documented, retained, and updated when significant changes occur to the AI system or its operating context. |
52
+ | A.5.4 | Assessing AI system impact on individuals or groups of individuals | Provider + User | The impact assessment shall evaluate how AI system outputs may affect individual rights, wellbeing, and autonomy. This includes risks of discrimination, profiling, automated decision-making without meaningful human review, and disproportionate impacts on vulnerable individuals or groups. |
53
+ | A.5.5 | Assessing societal impacts of AI systems | Provider + User | The impact assessment shall evaluate broader societal impacts: potential for misinformation generation, labour market effects, environmental impact of AI compute, reinforcement of systemic bias at scale, and erosion of human autonomy. |
54
+
55
+ **Common gaps:** Impact assessment performed once at deployment but never revisited; societal impact dimension skipped; no documented process — assessments done ad hoc.
56
+
57
+ ---
58
+
59
+ ## A.6 — AI System Life Cycle (9 controls)
60
+
61
+ A.6 is divided into two sub-objectives: **A.6.1 Management guidance** and **A.6.2 AI system life cycle**. The .1 sub-clause in each group contains the objective statement; controls begin at .2.
62
+
63
+ ### A.6.1 — Management Guidance (2 controls)
64
+
65
+ | Control ID | Control Name | Applies To | Description |
66
+ |-----------|-------------|-----------|-------------|
67
+ | A.6.1.2 | Objectives for responsible development of AI system | Provider | Specific, measurable objectives for responsible AI development shall be established, documented, and monitored. These shall align with the AI policy and responsible AI principles (fairness, transparency, accountability, safety, reliability). |
68
+ | A.6.1.3 | Processes for responsible AI system design and development | Provider | Formal processes shall govern AI system design and development to embed responsible AI principles: fairness-aware design, documentation of design decisions, explainability requirements proportionate to AI impact level, and human oversight at key development gates. |
69
+
70
+ ### A.6.2 — AI System Life Cycle (7 controls)
71
+
72
+ | Control ID | Control Name | Applies To | Description |
73
+ |-----------|-------------|-----------|-------------|
74
+ | A.6.2.2 | AI system requirements and specification | Provider | Requirements for each AI system shall be documented, including intended purpose, performance criteria, operating conditions, input/output specifications, and applicable constraints (legal, ethical, technical). |
75
+ | A.6.2.3 | Documentation of AI system design and development | Provider | Design decisions, architecture choices, model versions, hyperparameters, and development rationale shall be documented to support reproducibility, auditability, and accountability. |
76
+ | A.6.2.4 | AI system verification and validation | Provider | Testing protocols shall be applied before deployment: performance benchmarking, fairness and bias testing across demographic groups, adversarial testing, edge case validation, and go/no-go authorisation criteria. |
77
+ | A.6.2.5 | AI system deployment | Provider | A controlled deployment process shall govern AI system releases: staged rollout, deployment authorisation, risk and impact assessment sign-off, and rollback procedures. |
78
+ | A.6.2.6 | AI system operation and monitoring | Provider + User | Continuous monitoring of AI systems in production shall detect performance drift, output quality degradation, and bias. Alert thresholds and remediation processes shall be defined. |
79
+ | A.6.2.7 | AI system technical documentation | Provider + User | Comprehensive technical documentation per AI system shall be maintained: specifications, intended use, known limitations, performance data, and failure modes. This supports transparency obligations and third-party assessment. |
80
+ | A.6.2.8 | AI system recording of event logs | Provider + User | AI systems shall record event logs sufficient to support incident investigation, audit, performance monitoring, and accountability. Log retention periods and access controls shall be defined. |
81
+
82
+ **Common gaps:** No model versioning or reproducibility controls; bias testing not documented; no production monitoring for model drift; deployment lacks formal authorisation process; event logs not retained or scoped to AI systems.
83
+
84
+ ---
85
+
86
+ ## A.7 — Data for AI Systems (5 controls)
87
+
88
+ | Control ID | Control Name | Applies To | Description |
89
+ |-----------|-------------|-----------|-------------|
90
+ | A.7.2 | Data for development and enhancement of AI system | Provider | A governance framework shall define how data is managed across the full AI data lifecycle: acquisition, quality assurance, labelling, versioning, bias testing, retention, and secure deletion. |
91
+ | A.7.3 | Acquisition of data | Provider | Controls shall govern how training, validation, and test data is sourced: legal basis for data use, consent requirements where applicable, provenance documentation, and prohibition on use of unlawfully obtained data. |
92
+ | A.7.4 | Quality of data for AI systems | Provider | Data quality criteria shall be defined for training, validation, and test data — covering completeness, accuracy, representativeness, and recency — and tested before data is used in AI development. |
93
+ | A.7.5 | Data provenance | Provider | The origin, chain of custody, and transformation history of data used in AI systems shall be documented and traceable. This supports accountability, bias identification, and regulatory compliance. |
94
+ | A.7.6 | Data preparation | Provider | Processes for data cleaning, transformation, labelling, and annotation shall include quality controls: human review of labelled data, inter-annotator agreement checks, and identification and remediation of bias introduced in preparation steps. |
95
+
96
+ **Common gaps:** Training data sourcing undocumented; no data quality criteria or tests; labelling process not auditable; provenance tracking absent; data preparation bias controls missing.
97
+
98
+ ---
99
+
100
+ ## A.8 — Information for Interested Parties of AI Systems (4 controls)
101
+
102
+ | Control ID | Control Name | Applies To | Description |
103
+ |-----------|-------------|-----------|-------------|
104
+ | A.8.2 | System documentation and information for users | Provider + User | Documentation and information about AI systems shall be provided to users and other interested parties at a level of detail proportionate to the AI system's impact. This includes intended purpose, known limitations, and how to interpret AI outputs. |
105
+ | A.8.3 | External reporting | Provider + User | The organisation shall define what information about AI systems is reported externally, to whom, how frequently, and through what mechanism — including regulatory disclosures, transparency reports, and public-facing AI disclosures. |
106
+ | A.8.4 | Communication of incidents | Provider + User | AI-specific incident communication processes shall be established: internal escalation, notification to affected individuals where required, regulatory reporting (e.g., under sector-specific AI or data protection laws), and post-incident review and disclosure. |
107
+ | A.8.5 | Information for interested parties | Provider + User | Stakeholders — including customers, employees, regulators, and the public — shall be informed of their rights and what to expect from AI systems. A communication plan shall address what to communicate, when, and through which channel. |
108
+
109
+ **Common gaps:** No disclosure to users that AI is involved in decision-making; incident reporting processes not extended to AI-specific scenarios; no external transparency reporting; stakeholder communication plan absent.
110
+
111
+ ---
112
+
113
+ ## A.9 — Use of AI Systems (3 controls)
114
+
115
+ | Control ID | Control Name | Applies To | Description |
116
+ |-----------|-------------|-----------|-------------|
117
+ | A.9.2 | Processes for responsible use of AI systems | User (primarily) | Formal processes shall govern how the organisation uses AI systems responsibly, including acceptable use criteria, human oversight of AI outputs, and procedures for escalating or overriding AI decisions. |
118
+ | A.9.3 | Objectives for responsible use of AI system | User (primarily) | Measurable objectives for responsible AI use shall be established and monitored, aligned to the AI policy and responsible AI principles. These objectives drive continual improvement in AI use practices. |
119
+ | A.9.4 | Intended use of the AI system | Provider + User | The intended use of each AI system shall be documented, communicated, and enforced. Use beyond the documented intended purpose shall be identified, assessed, and controlled. |
120
+
121
+ **Common gaps:** No acceptable use policy for AI; staff using AI tools beyond intended scope; no formal objectives for responsible AI use; human oversight procedures not documented.
122
+
123
+ ---
124
+
125
+ ## A.10 — Third-Party and Customer Relationships (3 controls)
126
+
127
+ | Control ID | Control Name | Applies To | Description |
128
+ |-----------|-------------|-----------|-------------|
129
+ | A.10.2 | Allocating responsibilities | Provider + User | Where AI systems involve multiple parties (providers, users, customers, partners), responsibilities for responsible AI governance shall be clearly allocated and documented — including who is responsible for impact assessment, monitoring, and incident response. |
130
+ | A.10.3 | Suppliers | Provider + User | AI supply chain risk management shall govern third-party AI providers: tiering by risk, due diligence questionnaires, contractual AI-specific clauses (including data handling, bias controls, and right to audit), and ongoing supplier performance monitoring. |
131
+ | A.10.4 | Customers | Provider | Where AI systems are deployed to customers, the organisation shall define what information customers receive about AI system capabilities and limitations, what obligations customers have in responsible use, and how customer feedback and incidents are managed. |
132
+
133
+ **Common gaps:** No AI-specific supplier due diligence questionnaire; no contractual AI clauses with key AI vendors; responsibilities between provider and user not formally allocated; no customer-facing AI use obligations.
134
+
135
+ ---
136
+
137
+ ## Summary: Controls by Organisational Role
138
+
139
+ | Domain | # Controls | AI Provider | AI User |
140
+ |--------|-----------|------------|---------|
141
+ | A.2 Policies | 3 | Both | Both |
142
+ | A.3 Internal Organisation | 2 | Both | Both |
143
+ | A.4 Resources | 5 | Primary (all 5) | A.4.2, A.4.6 |
144
+ | A.5 Impact Assessment | 4 | Both | Both |
145
+ | A.6 AI System Life Cycle | 9 | Primary (all 9) | A.6.2.6, A.6.2.7, A.6.2.8 |
146
+ | A.7 Data | 5 | Primary (all 5) | Limited |
147
+ | A.8 Information | 4 | Both | Both |
148
+ | A.9 Use of AI Systems | 3 | A.9.4 | Primary (all 3) |
149
+ | A.10 Third-Party / Customer | 3 | Both | A.10.2, A.10.3 |
150
+ | **Total** | **38** | | |
151
+
152
+ **Controls by ID (complete list):**
153
+ A.2.2, A.2.3, A.2.4, A.3.2, A.3.3, A.4.2, A.4.3, A.4.4, A.4.5, A.4.6, A.5.2, A.5.3, A.5.4, A.5.5, A.6.1.2, A.6.1.3, A.6.2.2, A.6.2.3, A.6.2.4, A.6.2.5, A.6.2.6, A.6.2.7, A.6.2.8, A.7.2, A.7.3, A.7.4, A.7.5, A.7.6, A.8.2, A.8.3, A.8.4, A.8.5, A.9.2, A.9.3, A.9.4, A.10.2, A.10.3, A.10.4
154
+
155
+ > **Note on control ID numbering:** Within each domain, sub-clause .1 contains the domain objective statement (not a control). Controls begin at .2. Domain A.6 has two sub-objectives (A.6.1 Management guidance and A.6.2 AI system life cycle), each with their objective at .1 and controls starting at .2. This is why control IDs in A.6 are formatted as A.6.1.2, A.6.1.3, A.6.2.2 … A.6.2.8.
@@ -0,0 +1,174 @@
1
+ # ITAR Compliance Programme — Penalties, VSD, and TCP
2
+
3
+ ## ITAR Compliance Programme Elements
4
+
5
+ An effective ITAR compliance programme (recognised by DDTC as a mitigating factor) includes:
6
+
7
+ ### 1. Governance and Leadership
8
+ - Designated **Empowered Official (EO)** (22 CFR § 120.67): A US person with authority to sign licence applications and ensure ITAR compliance; must be in a senior position with ability to override business decisions for compliance reasons
9
+ - Written **ITAR Compliance Policy** signed by senior management
10
+ - Clear escalation path for export control questions
11
+ - Annual management review of compliance programme effectiveness
12
+
13
+ ### 2. Training
14
+ - **Initial training** for all employees with ITAR access within 30 days of hire
15
+ - **Annual refresher training** covering recent regulatory changes, enforcement actions, and company-specific procedures
16
+ - **Role-specific training** for: Empowered Officials, shipping/logistics, engineering/R&D, legal, IT
17
+ - Training records retained 5 years
18
+
19
+ ### 3. Technology Control Plan (TCP)
20
+
21
+ A TCP controls access to ITAR-controlled technical data, especially by foreign nationals.
22
+
23
+ **TCP Sections:**
24
+ ```
25
+ 1. Purpose and Scope
26
+ 2. ITAR-controlled items and data inventory
27
+ 3. Physical access controls (secure areas, visitor escorts, badging)
28
+ 4. IT access controls (network segregation, access lists, encryption)
29
+ 5. Foreign national screening procedure
30
+ - Collect citizenship information at hire/engagement
31
+ - Screen against denied parties lists
32
+ - Determine if TAA/licence required before granting access
33
+ 6. Visitor and contractor procedures
34
+ 7. Annual ITAR training programme
35
+ 8. Incident identification, reporting, and response
36
+ 9. Records management (5-year retention)
37
+ 10. TCP review and update cycle (annual minimum)
38
+ ```
39
+
40
+ ### 4. Screening and Due Diligence
41
+ Screen all parties (customers, suppliers, employees, visitors) against:
42
+ - **DDTC Debarred Parties List** (22 CFR § 127.7)
43
+ - **OFAC Specially Designated Nationals (SDN) List**
44
+ - **BIS Denied Persons List, Entity List, Unverified List**
45
+ - **US State Department Watch Lists**
46
+
47
+ Screening must be documented and re-run at each transaction.
48
+
49
+ ### 5. Jurisdiction and Classification Review
50
+ - Formal **product classification process** for every new item, component, and software
51
+ - Document classification decisions (USML citation or EAR ECCN) with rationale
52
+ - Review classifications when product is modified, use-case changes, or regulations change
53
+ - Consider **Commodity Jurisdiction (CJ)** requests for ambiguous items
54
+
55
+ ### 6. Licence Management
56
+ - Centralised tracking of all active licences, TAAs, MLAs
57
+ - Pre-shipment licence review checklist
58
+ - Licence condition compliance (quantities, end-users, re-export restrictions)
59
+ - Timely licence renewals (track expiry dates with 90-day advance reminders)
60
+ - Post-shipment filing (Automated Export System / Electronic Export Information)
61
+
62
+ ### 7. Audits
63
+ - Annual internal ITAR compliance audit (or third-party audit every 2–3 years)
64
+ - Audit scope: registration currency, licence compliance, TCP effectiveness, training records, screening logs, record retention
65
+ - Findings documented with corrective action plans and owners
66
+
67
+ ---
68
+
69
+ ## Penalties — 22 CFR Part 127 and 22 USC § 2778
70
+
71
+ ### Civil Penalties
72
+ - Up to **$1,369,000 per violation** (amount adjusted annually under the Federal Civil Penalties Inflation Adjustment Act)
73
+ - Each unlicensed export, each unlicensed disclosure of technical data, each brokering violation = separate violation
74
+ - DDTC may impose civil penalties via Consent Agreement without criminal referral
75
+
76
+ ### Criminal Penalties
77
+ - Up to **$1,000,000 fine** per violation (22 USC § 2778(c))
78
+ - Up to **20 years imprisonment** per violation
79
+ - Criminal cases referred to Department of Justice; prosecuted by DOJ National Security Division
80
+
81
+ ### Debarment
82
+ - DDTC may debar any person from ITAR privileges (22 CFR § 127.7)
83
+ - Duration: typically 3 years; can be permanent for egregious violations
84
+ - Debarment prevents: registration, licensing, TAA/MLA participation, US government contracting
85
+ - Published on the DDTC Debarred Parties List
86
+
87
+ ### Other Consequences
88
+ - **Seizure and forfeiture** of articles involved in violations (22 USC § 2778(e))
89
+ - **Suspension of export privileges** pending investigation
90
+ - **Congressional notification** requirements for significant violations involving foreign governments
91
+ - **Reputational harm** — consent agreements are publicly disclosed
92
+
93
+ ---
94
+
95
+ ## Voluntary Self-Disclosure (VSD) — 22 CFR § 127.12
96
+
97
+ ### Why Disclose
98
+ VSD is the strongest available mitigating factor. DDTC's guidelines recognise that companies with effective compliance programmes that self-discover and promptly disclose violations deserve leniency.
99
+
100
+ ### VSD Process
101
+
102
+ **Step 1 — Initial Notification** (~30 days from discovery)
103
+ - Submit brief written notification to DDTC Director of Compliance
104
+ - Include: company name, registration number, general description of the potential violation, estimated number of occurrences
105
+ - Request a tolling agreement to preserve statute of limitations while investigation proceeds
106
+
107
+ **Step 2 — Internal Investigation** (30–90 days)
108
+ - Investigate all facts: who knew what, when, what was exported/disclosed, to whom
109
+ - Pull all records (licences, shipping docs, emails, TAA files)
110
+ - Identify root cause (process failure, training gap, deliberate act)
111
+ - Preserve all evidence; place litigation hold if appropriate
112
+
113
+ **Step 3 — Final VSD Report** (within ~60–90 days of initial notification)
114
+ Submit comprehensive written report including:
115
+ - Detailed factual narrative of all violations
116
+ - CFR sections violated for each occurrence
117
+ - Identification of all parties involved
118
+ - Timeline of events
119
+ - Root cause analysis
120
+ - Corrective actions already implemented
121
+ - Proposed additional remediation
122
+
123
+ **Step 4 — DDTC Review and Resolution**
124
+ - DDTC reviews report; may request additional information
125
+ - Outcomes: no action, warning letter, civil penalty (usually reduced), or referral for criminal review
126
+ - Most cooperative VSDs resolved within 6–18 months
127
+
128
+ ### Mitigating Factors
129
+ - Voluntary self-disclosure
130
+ - Cooperation with DDTC investigation
131
+ - Effective pre-existing compliance programme
132
+ - Prompt remediation
133
+ - No prior ITAR violations
134
+ - Low national security harm
135
+ - Relatively low transaction value
136
+
137
+ ### Aggravating Factors
138
+ - Wilful/deliberate violation
139
+ - Senior management involvement or awareness
140
+ - Harm to national security
141
+ - Pattern of violations
142
+ - Obstruction or lack of cooperation
143
+ - High-risk end-users (state sponsors of terrorism, arms embargoes)
144
+ - Prior violations
145
+
146
+ ---
147
+
148
+ ## DDTC Blue Lantern End-Use Monitoring
149
+
150
+ The **Blue Lantern** programme is DDTC's end-use monitoring initiative. US embassy personnel conduct post-shipment verifications to confirm items reached the stated end-user and are being used as authorised.
151
+
152
+ **Implications for exporters:**
153
+ - Cooperate fully with Blue Lantern checks (failure to cooperate can trigger licence suspension)
154
+ - Maintain accurate shipping records to facilitate verification
155
+ - Include cooperation obligations in contracts with foreign distributors
156
+ - Report if you discover items have been diverted or misused
157
+
158
+ ---
159
+
160
+ ## Checklist — ITAR Compliance Programme Readiness
161
+
162
+ | Area | ✅ | Key Questions |
163
+ |------|----|--------------|
164
+ | Registration | | Is registration current? Renewal filed on time? |
165
+ | Empowered Official | | Named EO with written authority? |
166
+ | Policy | | IS Policy signed by senior management? |
167
+ | TCP | | Written TCP? Reviewed in last 12 months? |
168
+ | Training | | All ITAR-access employees trained in last 12 months? Records retained? |
169
+ | Classification | | All products/components formally classified? CJ obtained where needed? |
170
+ | Screening | | SDN/debarment screening at every transaction? Documented? |
171
+ | Licence tracking | | All licences logged? Expiry alerts set? Conditions tracked? |
172
+ | Record retention | | 5-year retention in place? Accessible for audit? |
173
+ | Internal audit | | Annual ITAR audit completed? Findings tracked? |
174
+ | Incident response | | VSD procedure documented and communicated? |
@@ -0,0 +1,146 @@
1
+ # ITAR Licensing Guide — 22 CFR Parts 123–125
2
+
3
+ ## License Types at a Glance
4
+
5
+ | License / Agreement | CFR Reference | Purpose | Typical Use |
6
+ |--------------------|---------------|---------|-------------|
7
+ | DSP-5 | 22 CFR § 123.1 | Permanent export of defense articles | Hardware sale/transfer to foreign end-user |
8
+ | DSP-73 | 22 CFR § 123.5 | Temporary export | Trade shows, testing, repair abroad |
9
+ | DSP-94 | 22 CFR § 123.6 | Temporary import | Foreign defense article entering US temporarily |
10
+ | DSP-61 | 22 CFR § 123.9 | Import license | Permanent import from certain countries |
11
+ | Technical Assistance Agreement (TAA) | 22 CFR § 124.1 | Export of technical data / defense services | Engineering support, training, design assistance |
12
+ | Manufacturing License Agreement (MLA) | 22 CFR § 124.2 | Licensed foreign manufacture | Overseas production of US defense articles |
13
+ | Warehouse/Distribution Agreement | 22 CFR § 124.14 | Stocking items abroad for resale | Distributor model |
14
+
15
+ ---
16
+
17
+ ## DSP-5 (Permanent Export License)
18
+
19
+ ### When Required
20
+ Any export of USML hardware not covered by an exemption.
21
+
22
+ ### Application Requirements
23
+ Submit via DDTC's D-Trade portal:
24
+ - **Block 1**: Applicant (DDTC registration number)
25
+ - **Block 2**: Country of ultimate destination
26
+ - **Block 3**: Foreign end-user name and address
27
+ - **Block 4**: Description of articles (USML category, quantity, value)
28
+ - **Block 5**: End-use statement (intended use, no re-export without US government approval)
29
+ - **Supporting docs**: Purchase order, end-user certificate, import certificate if required by destination country
30
+
31
+ ### Processing Times
32
+ - Standard: 30–60 days
33
+ - Significant Military Equipment (SME): may require Congressional notification (22 USC § 2776) for sales ≥$14M
34
+
35
+ ### License Conditions (common)
36
+ - Items may not be re-exported without prior DDTC authorisation
37
+ - End-user restrictions apply
38
+ - US government access rights for audits
39
+ - 4-year validity; extendable
40
+
41
+ ---
42
+
43
+ ## DSP-73 (Temporary Export)
44
+
45
+ ### When Required
46
+ Hardware leaving the US temporarily (not for resale/transfer to foreign ownership).
47
+
48
+ ### Key Requirements
49
+ - Describe items precisely; document serial numbers
50
+ - State duration and purpose (e.g., "air show display," "field test," "repair and return")
51
+ - Items must return to the US by the license expiry date
52
+ - License conditions prohibit use in combat, operational deployment
53
+
54
+ ---
55
+
56
+ ## Technical Assistance Agreement (TAA)
57
+
58
+ ### Purpose
59
+ Authorises the export of **technical data** and/or **defense services** to specific foreign persons/entities. Required even for oral disclosure of ITAR-controlled technical data to a foreign national.
60
+
61
+ ### Required TAA Clauses (22 CFR § 124.9)
62
+ 1. **Scope of agreement**: Precise description of technical data / defense services
63
+ 2. **Parties**: US licensor + all foreign licensees, authorised sub-licensees
64
+ 3. **Retransfer prohibition**: No further disclosure/transfer without prior written DDTC approval
65
+ 4. **US government rights**: US government may review all records; terminate agreement
66
+ 5. **Record-keeping**: 5-year retention
67
+ 6. **Audit rights**: US licensor right to audit foreign licensee compliance
68
+ 7. **Term**: Normally 5 years; must renew before expiry
69
+ 8. **Security classification handling** (if applicable)
70
+
71
+ ### Amendment Requirements
72
+ Any change to scope, parties, or authorised countries requires a formal amendment approved by DDTC.
73
+
74
+ ### Common TAA Uses
75
+ - Sharing engineering drawings with foreign manufacturer
76
+ - Providing maintenance training to foreign military
77
+ - Technical support under FMS (Foreign Military Sales) cases
78
+ - Joint development programmes with foreign partners
79
+
80
+ ---
81
+
82
+ ## Manufacturing License Agreement (MLA)
83
+
84
+ ### Purpose
85
+ Allows a foreign person to manufacture a defense article under US licence — typically for local production under an FMS programme or commercial arrangement.
86
+
87
+ ### Key Differences from TAA
88
+ | Feature | TAA | MLA |
89
+ |---------|-----|-----|
90
+ | What is transferred | Technical data / services | Manufacturing rights + technical data |
91
+ | Foreign party produces? | No | Yes |
92
+ | Sub-licensing allowed? | Conditional | Usually yes, with restrictions |
93
+ | Offset programs | Not typical | Common |
94
+
95
+ ### Required MLA Clauses
96
+ - Licence to manufacture (specific quantities, articles, versions)
97
+ - Quality assurance provisions
98
+ - US government rights (inspection, audit, terminate)
99
+ - Retransfer and re-export controls
100
+ - Royalty / fee structure
101
+ - End-of-programme disposition of tooling and data
102
+
103
+ ---
104
+
105
+ ## ITAR Exemptions (Selected)
106
+
107
+ Certain transfers do not require a licence if all conditions are met. **Exemptions are NOT blanket authorisations — verify conditions every time.**
108
+
109
+ ### Key Exemptions (22 CFR Part 123–126)
110
+
111
+ | Exemption | CFR Reference | Conditions |
112
+ |-----------|--------------|-----------|
113
+ | US government | § 126.4 | Export by/for US Dept of Defense, State, etc. with government orders |
114
+ | Canada exemption | § 126.5 | Certain unclassified hardware to Canada only; does not apply to all categories |
115
+ | Australian/UK exemption | § 126.7 | Limited scope for certain Gov-to-Gov and industry-to-industry transfers; requires eligibility verification |
116
+ | Intra-company | § 125.4(b)(9) | Technical data to wholly owned US subsidiary abroad; limited scope |
117
+ | Beta test software | § 125.4(b)(10) | Unclassified software for beta testing by foreign person; narrow conditions |
118
+ | Beta hardware | § 123.16 | Temporary export of unclassified hardware for demonstration; strict limits |
119
+
120
+ **Australia, UK, Canada Defence Trade Cooperation Treaties**: Provide streamlined licensing for covered defence articles between treaty partners; not a blanket exemption.
121
+
122
+ ---
123
+
124
+ ## Foreign Military Sales (FMS) vs Direct Commercial Sales (DCS)
125
+
126
+ | Aspect | FMS | DCS |
127
+ |--------|-----|-----|
128
+ | Contract party | US Government (DSCA) | US company directly |
129
+ | ITAR licence | Not required (US Gov exemption) | DSP-5 / TAA required |
130
+ | End-use assurance | US Government provides | US company responsible |
131
+ | Price | Government + administrative fees | Market rate |
132
+ | Delivery risk | US Government manages | US company manages |
133
+
134
+ ---
135
+
136
+ ## Record-Keeping Requirements (22 CFR § 122.5)
137
+
138
+ All ITAR registrants must maintain for **5 years**:
139
+ - All export/import licences and shipping documents
140
+ - All TAA/MLA agreements and associated records
141
+ - End-user certificates and purchase orders
142
+ - Records of all disclosures of technical data
143
+ - Commodity Jurisdiction requests and determinations
144
+ - Voluntary disclosure records
145
+
146
+ Records must be available for inspection by DDTC, US Customs, DoD, or other US government agencies.
@@ -0,0 +1,93 @@
1
+ # USML Categories — United States Munitions List (22 CFR § 121.1)
2
+
3
+ The USML consists of 21 categories. Items **specifically enumerated** here are ITAR-controlled as defense articles.
4
+
5
+ ---
6
+
7
+ ## Category I — Firearms, Close Assault Weapons and Combat Shotguns
8
+ Firearms with calibre ≤ 20mm; rifles, carbines, pistols, revolvers, shotguns intended for military use; suppressors; bayonets.
9
+
10
+ ## Category II — Guns and Armament
11
+ Guns, howitzers, cannons >20mm; mortars; recoilless rifles; flamethrowers (military); launch tubes.
12
+
13
+ ## Category III — Ammunition/Ordnance
14
+ Ammunition for items in Cat I/II; military explosives and propellants; military pyrotechnics; guided projectiles.
15
+
16
+ ## Category IV — Launch Vehicles, Guided Missiles, Ballistic Missiles, Rockets, Torpedoes, Bombs and Mines
17
+ All military rockets, missiles, bombs, torpedoes, depth charges, land mines; space launch vehicles used for military purposes; re-entry vehicles.
18
+
19
+ ## Category V — Explosives and Energetic Materials, Propellants, Incendiary Agents and their Precursors
20
+ Military explosives and fuels (e.g., PETN, RDX, HMX, TATB); incendiary agents; smoke/obscurant materials specifically designed for military use.
21
+
22
+ ## Category VI — Vessels of War and Special Naval Equipment
23
+ Warships (surface and submarine); armed vessels; military SCUBA and underwater breathing devices; naval nuclear reactors.
24
+
25
+ ## Category VII — Tanks and Military Vehicles
26
+ Tanks; armoured combat vehicles; military tactical vehicles; mine-clearing vehicles; military bridges.
27
+
28
+ ## Category VIII — Aircraft and Associated Equipment
29
+ Military aircraft (manned and unmanned) — fighters, bombers, attack, patrol, transport; military aero-engines; related airframes; certain civil aircraft modified for military use; military life support systems.
30
+
31
+ ## Category IX — Military Training Equipment
32
+ Flight simulators; parachutes (military); military survival equipment; training aircraft simulators.
33
+
34
+ ## Category X — Protective Personnel Equipment and Shelters
35
+ Body armour (beyond NIJ Level III+); combat helmets; NBC protective suits; military nuclear/biological/chemical detection equipment.
36
+
37
+ ## Category XI — Military Electronics
38
+ Military electronic systems: radar (military); jamming equipment; IFF (Identification Friend or Foe); military navigation; electronic warfare (EW); targeting systems; military cryptographic equipment (see also Cat XIII).
39
+
40
+ ## Category XII — Fire Control, Range Finder, Optical and Guidance and Control Equipment
41
+ Military targeting optics; laser rangefinders (military); infrared imaging (military); night-vision devices (NVDs); military gyroscopes; fire control computers.
42
+
43
+ ## Category XIII — Auxiliary Military Equipment
44
+ Chemical/biological agents (listed); military nuclear materials; depleted uranium; military explosives detection; military training devices; TEMPEST/emissions security equipment; cryptographic items not in Cat XI.
45
+
46
+ ## Category XIV — Toxicological Agents, Including Chemical Agents, Biological Agents, and Associated Equipment
47
+ Schedule 1, 2, 3 chemical weapons agents and precursors (CWC Schedules applied to USML); biological agents suitable for weaponisation; medical countermeasures (military).
48
+
49
+ ## Category XV — Spacecraft Systems and Associated Equipment
50
+ Military satellites; spacecraft systems for intelligence, surveillance, reconnaissance (ISR); directed energy weapons in space; associated ground control equipment.
51
+
52
+ ## Category XVI — Nuclear Weapons, Design and Testing Related Items
53
+ Nuclear weapons; nuclear weapon design and testing software; all items primarily useful for nuclear weapons development.
54
+
55
+ ## Category XVII — Classified Articles, Technical Data and Defense Services Not Otherwise Enumerated
56
+ Catch-all for classified items. No exports without prior DDTC authorisation.
57
+
58
+ ## Category XVIII — Directed Energy Weapons
59
+ High-energy lasers (military); particle beam weapons; high-power radio frequency (HPM) weapons.
60
+
61
+ ## Category XIX — Gas Turbine Engines and Associated Equipment
62
+ Military gas turbine engines for aircraft/vessels/vehicles; hot section components; military engine test equipment.
63
+
64
+ ## Category XX — Submersible Vessels, Oceanographic and Associated Equipment
65
+ Military submarines; autonomous underwater vehicles (military); deep-submergence rescue vehicles; military sonar.
66
+
67
+ ## Category XXI — Articles, Technical Data and Defense Services Not Otherwise Enumerated
68
+ Catch-all for items not covered by Cat I–XX that are determined to provide critical military/intelligence advantage. Used sparingly via CJ determination.
69
+
70
+ ---
71
+
72
+ ## Key Definitions
73
+
74
+ **Defense article** (22 CFR § 120.31): Any item or technical data designated on the USML.
75
+
76
+ **Defense service** (22 CFR § 120.32): Furnishing assistance (training, technical data, engineering) to a foreign person for the design, manufacture, production, operation, maintenance, or modification of defense articles.
77
+
78
+ **Technical data** (22 CFR § 120.33): Information directly related to defense articles in any tangible form — blueprints, drawings, specifications, software source code, test reports.
79
+
80
+ **Specially designed** (22 CFR § 120.41): The primary test for whether a component or part falls under ITAR. An item is specially designed if it was developed, configured, or adapted to provide a critical performance parameter enabling the military capability of a USML end-item.
81
+
82
+ ---
83
+
84
+ ## USML vs CCL Jurisdiction Tips
85
+
86
+ | Scenario | Likely Jurisdiction |
87
+ |----------|-------------------|
88
+ | Item specifically listed in USML (Cat I–XXI) | ITAR |
89
+ | Item removed from USML via Export Control Reform | EAR (often ECCN 0Yxxx) |
90
+ | Commercial item with no military application | EAR / EAR99 |
91
+ | Ambiguous — file a Commodity Jurisdiction (CJ) request | DDTC determines |
92
+
93
+ A **Commodity Jurisdiction (CJ)** determination (22 CFR § 120.4) is the official process to obtain DDTC's ruling on whether an item is on the USML. Submit via DDTC's online portal with item description, specifications, and intended use.