防御组织面临的约束是商业企业从未遇到的:ITAR/EAR出口管控、安全保密等级、隔离访问,以及来自DCSA、DCMA和合同官员的监管,他们审计一切。UPLO Defense提供对项目文档、物流记录、技术数据包和人员资质的结构化、访问控制搜索,同时尊重使防御知识管理变得异常困难的保密边界。
会话开始
身份验证在防御领域是不可协商的。您的保密等级、项目访问列表和需要知道的原则控制着您能看到的内容。立即加载您的身份:
get_identity_context
防御领域的指令包括OPORD片段、项目里程碑、采办决策点和ITAR合规要求。在继续之前请查看:
get_directives
重要提示:如果您的身份上下文未反映您预期的保密等级或项目访问权限,请停止并联系您的安全官员。不要尝试变通方案。
使用场景
- 项目经理需要定位六个月前的CDR(关键设计审查)行动项目,以在即将到来的TRR之前验证关闭状态
- 搜索与正在提议对外军售的子系统相关的ITAR管控技术数据包
- 验证特定分包商是否具有在分享受控技术数据之前所需的文件化设施保密等级
- 通过提取交付里程碑、质量指标和成本绩效指数数据来编制承包商绩效评估报告(CPAR)叙述
- 物流官员需要跨多个国家库存号查找替换零件的供应技术文档
- 检查项目的当前CONOPS(作战概念)版本,并确定自上次里程碑审查以来发生了什么变化
- 审查网络安全行动计划与里程碑(POA&M)发现是否在下次DCMA审计之前已整改
示例工作流
对外军售案例的技术数据包审查
对外军售案例需要发布雷达子系统的技术数据。出口管控官员需要确定存在哪些数据及其ITAR分类。
search_with_context query="radar subsystem AN/APG technical data package ITAR classification export control"
验证相关文件的分发声明:
search_knowledge query="distribution statement D controlled technical data radar subsystem drawings"
检查该子系统是否存在现有的技术评估/控制计划(TA/CP):
search_knowledge query="technology assessment control plan radar subsystem foreign disclosure"
log_conversation summary="Reviewed radar subsystem TDP for FMS release eligibility; identified Distribution D documents requiring TAA before disclosure" topics='["ITAR","FMS","export-control","radar"]' tools_used='["search_with_context","search_knowledge"]'
里程碑决策准备
一个项目即将进入里程碑B(工程与制造开发)。项目经理需要整理所需文档。
search_with_context query="program milestone B EMD required documentation acquisition decision memorandum"
提取成本和进度绩效数据:
search_knowledge query="earned value management BCWP CPI SPI program cost performance report"
查看当前风险登记册:
search_knowledge query="program risk register critical risks mitigation status likelihood consequence"
获取显示项目办公室结构的组织上下文:
export_org_context
防御核心工具
search_with_context — 防御项目生成深度互联的文档。一个需求从CONOPS追踪到系统规范、测试程序和后勤支持计划。图遍历遵循这些线索。示例:search_with_context query="KPP threshold objective values system specification traceability"
search_knowledge — 当您知道文档类型或标识符时的直接检索:特定的CDRL编号、DI编号、NSN或MIL-STD引用。示例:search_knowledge query="CDRL A003 software development plan current version"
get_directives — 在防御领域,指令具有命令的重量。项目指导备忘录、采办决策备忘录和ITAR合规要求不是建议。务必检查。
export_org_context — 生成项目办公室结构、IPT(集成产品团队)负责人、主要分包商和记录系统。里程碑审查和审计响应需要此功能。
log_conversation — 防御审计要求可追溯性。每个涉及受控数据的查询会话都应被记录。这不是可选的——这是合规要求。
flag_outdated — 技术手册、物流文档和规范引用通过工程变更提案(ECP)变得过时。标记过期文档可防止危险的生产或维护设备against被取代的配置的场景。
提示
- 在搜索中使用标准防御标识符:CDRL编号、DI编号(如DI-MGMT-81466)、国家库存号(NSN)、CAGE代码和MIL-STD引用。提取引擎将这些视为结构化字段。
- 分类层级映射:
public = 批准公开发布,internal = FOUO/CUI,confidential = 机密,restricted = 秘密及以上。如果预期结果未出现,问题几乎肯定是保密等级不匹配,而非数据缺失。
- ITAR管控技术数据查询应始终被记录。日志创建审计跟踪,证明对受控项目的合规处理。
- 在整理里程碑审查包时,首先使用
export_org_context建立项目基线,然后对每个所需文档使用针对性的search_knowledge调用,而非可能超出您需要知道范围的广泛搜索。
Defense organizations operate under constraints that commercial enterprises never face: ITAR/EAR export controls, security classification levels, compartmented access, and regulatory oversight from DCSA, DCMA, and contracting officers who audit everything. UPLO Defense provides structured, access-controlled search across program documentation, logistics records, technical data packages, and personnel qualifications while respecting the classification boundaries that make defense knowledge management uniquely difficult.
Session Start
Identity verification is non-negotiable in defense. Your clearance level, program access list, and need-to-know determinations control what you see. Load your identity immediately:
get_identity_context
Directives in defense include OPORD fragments, program milestones, acquisition decision points, and ITAR compliance mandates. Review them before proceeding:
get_directives
Important: If your identity context does not reflect your expected clearance level or program access, stop and contact your security officer. Do not attempt workarounds.
When to Use
- A program manager needs to locate the CDR (Critical Design Review) action items from six months ago to verify closure status before the upcoming TRR
- Searching for ITAR-controlled technical data packages related to a subsystem that is being proposed for foreign military sale
- Verifying whether a specific subcontractor has the required facility clearance level documented before sharing controlled technical data
- Assembling the Contractor Performance Assessment Report (CPAR) narrative by pulling delivery milestones, quality metrics, and cost performance index data
- A logistics officer needs to find the provisioning technical documentation for a replacement part across multiple national stock numbers
- Checking the current CONOPS (Concept of Operations) version for a program and determining what has changed since the last milestone review
- Reviewing whether a cybersecurity Plan of Action and Milestones (POA&M) finding has been remediated before the next DCMA audit
Example Workflows
Technical Data Package Review for FMS Case
A foreign military sales case requires release of technical data for a radar subsystem. The export control officer needs to determine what data exists and its ITAR classification.
search_with_context query="radar subsystem AN/APG technical data package ITAR classification export control"
Verify the distribution statement on the relevant documents:
search_knowledge query="distribution statement D controlled technical data radar subsystem drawings"
Check if there are existing Technology Assessment/Control Plans (TA/CP) for this subsystem:
search_knowledge query="technology assessment control plan radar subsystem foreign disclosure"
log_conversation summary="Reviewed radar subsystem TDP for FMS release eligibility; identified Distribution D documents requiring TAA before disclosure" topics='["ITAR","FMS","export-control","radar"]' tools_used='["search_with_context","search_knowledge"]'
Milestone Decision Preparation
A program is approaching Milestone B (Engineering & Manufacturing Development). The PM needs to assemble the required documentation.
search_with_context query="program milestone B EMD required documentation acquisition decision memorandum"
Pull cost and schedule performance data:
search_knowledge query="earned value management BCWP CPI SPI program cost performance report"
Review the current risk register:
search_knowledge query="program risk register critical risks mitigation status likelihood consequence"
Get the organizational context showing program office structure:
export_org_context
Key Tools for Defense
search_with_context — Defense programs generate deeply interconnected documentation. A single requirement traces from CONOPS through system specifications, test procedures, and logistics support plans. Graph traversal follows these threads. Example: search_with_context query="KPP threshold objective values system specification traceability"
search_knowledge — Direct retrieval when you know the document type or identifier: a specific CDRL number, a DI-number, an NSN, or a MIL-STD reference. Example: search_knowledge query="CDRL A003 software development plan current version"
get_directives — In defense, directives carry the weight of orders. Program direction memoranda, acquisition decision memoranda, and ITAR compliance mandates are not suggestions. Always check.
export_org_context — Produces the program office structure, IPT (Integrated Product Team) leads, key subcontractors, and systems of record. Required for milestone reviews and audit responses.
log_conversation — Defense audit requirements demand traceability. Every query session involving controlled data should be logged. This is not optional — it is a compliance requirement.
flag_outdated — Technical manuals, logistics documentation, and specification references become obsolete through Engineering Change Proposals (ECPs). Flagging outdated documents prevents the dangerous scenario of manufacturing or maintaining equipment against a superseded configuration.
Tips
- Use standard defense identifiers in searches: CDRL numbers, DI-numbers (e.g., DI-MGMT-81466), national stock numbers (NSNs), CAGE codes, and MIL-STD references. The extraction engine treats these as structured fields.
- Classification tier mapping:
public = approved for public release, internal = FOUO/CUI, confidential = Confidential, restricted = Secret and above. If expected results do not appear, the issue is almost certainly a clearance mismatch, not missing data.
- ITAR-controlled technical data queries should always be logged. The log creates an audit trail that demonstrates compliant handling of controlled items.
- When assembling milestone review packages, start with
export_org_context to establish the program baseline, then use targeted search_knowledge calls for each required document rather than broad searches that may surface documents outside your need-to-know.