Scope & Roadmap
What v0.1 covers, what v0.2 will measure.
AI705 is a multi-version effort. v0.1 is a literature review and expert consultation across the whole source corpus. v0.2 adds operator review, third-party engagement, and the measurement campaign needed to close the evidence gaps v0.1 surfaces.
v0.1 — Scope of this draft
v0.1 covers every source requirement in ICD 705, ICS 705-01, ICS 705-02, and the IC Tech Spec v1.5.1. The work is a literature review and expert consultation: each requirement is read against the existing public body of practice, judged against weight theft / secret theft / sabotage, and recorded with the assumptions and counterevidence the reviewers surface.
A subset of the rows is walked in deeper detail and published with individual verdicts — the requirements most likely to change when applied to AI datacenters (security-in-depth, the Construction Security Plan, TEMPEST and RF shielding, perimeter penetrations, intrusion detection and continuity, access control systems, acoustic protection, PED / wireless / RCET, environmental infrastructure, protected distribution systems, and re-accreditation after de-accreditation). These published rows show what the full pipeline looks like end to end; they are not the scope.
v0.1 deliberately does not include new measurements, new test campaigns, or third-party engineering work. Where the literature does not settle a question, v0.1 publishes the gap with an explicit measurement question rather than a synthesized answer.
v0.2 — Planned scope
v0.2 closes the evidence gaps v0.1 surfaces. The plan has three tracks:
- Operator review.Facilities teams, colocation operators, and accrediting officials review the rows whose v0.1 verdict is “Applies with modification” or “Needs evidence” and record which assumptions hold in production.
- Measurement campaign. A targeted set of physical measurements answers the questions v0.1 cannot settle from existing literature: accelerator-rack emanations, acoustic side channels at modern hardware, environmental-infrastructure boundaries on shared datacenter floors, and protected distribution paths for high-rate optical links.
- Third-party engagement. CTTA-credentialed reviewers, TEMPEST contractors, and IDS / BMS vendors are engaged where v0.1 identifies an evidence boundary the project itself cannot cross.