Skip to content
AI705

Guidance

Rows published in v0.1 — the requirements walked deeply enough through expert review and the literature pass to record individual verdicts. Each row is a single source requirement judged against weight theft, secret theft, and sabotage. Expand a row to see per-category rationales, falsifiers, source excerpts, the multi-judge panel verdict, and the LLM-found literature for that requirement.

Showing rows 15 of 11

pilot-001-security-in-depth-shared-infrastructure

Security in depth and shared infrastructure

Sources: ics-705-01.r0013, ic-tech-spec-v151.r0039, ic-tech-spec-v151.r0085

Weight theft
Applies with modification
Secret theft
Applies with modification
Sabotage
Applies with modification

Was this row helpful?

pilot-002-construction-security-plan

Construction Security Plan and design-document control

Sources: ics-705-01.r0018, ic-tech-spec-v151.r0100, ic-tech-spec-v151.r0101

Weight theft
Applies with modification
Secret theft
Applies with modification
Sabotage
Applies with modification

Was this row helpful?

pilot-003-tempest-rf-shielding

TEMPEST review, RF shielding, and accelerator emanations

Sources: ics-705-01.r0029, ics-705-01.r0075, ic-tech-spec-v151.r0144

Weight theft
Gap
Secret theft
Needs evidence
Sabotage
Inapplicable

Was this row helpful?

pilot-004-perimeter-penetrations

Perimeter penetrations for power, cooling, ducts, pipes, and conduit

Sources: ic-tech-spec-v151.r0211, ic-tech-spec-v151.r0212, ic-tech-spec-v151.r0218

Weight theft
Applies with modification
Secret theft
Applies with modification
Sabotage
Applies with modification

Was this row helpful?

pilot-005-intrusion-detection-and-continuity

Intrusion detection, failure response, and 24/7 operations

Sources: ics-705-01.r0036, ic-tech-spec-v151.r0799, ic-tech-spec-v151.r0800, ic-tech-spec-v151.r0842, ic-tech-spec-v151.r0875

Weight theft
Applies with modification
Secret theft
Applies with modification
Sabotage
Applies with modification

Was this row helpful?