Skip to content
AI705

Scope & Roadmap

What v0.1 covers, what v0.2 will measure.

AI705 is a multi-version effort. v0.1 is a literature review and expert consultation across the whole source corpus. v0.2 adds operator review, third-party engagement, and the measurement campaign needed to close the evidence gaps v0.1 surfaces.

v0.1 — Scope of this draft

v0.1 covers every source requirement in ICD 705, ICS 705-01, ICS 705-02, and the IC Tech Spec v1.5.1. The work is a literature review and expert consultation: each requirement is read against the existing public body of practice, judged against weight theft / secret theft / sabotage, and recorded with the assumptions and counterevidence the reviewers surface.

A subset of the rows is walked in deeper detail and published with individual verdicts — the requirements most likely to change when applied to AI datacenters (security-in-depth, the Construction Security Plan, TEMPEST and RF shielding, perimeter penetrations, intrusion detection and continuity, access control systems, acoustic protection, PED / wireless / RCET, environmental infrastructure, protected distribution systems, and re-accreditation after de-accreditation). These published rows show what the full pipeline looks like end to end; they are not the scope.

v0.1 deliberately does not include new measurements, new test campaigns, or third-party engineering work. Where the literature does not settle a question, v0.1 publishes the gap with an explicit measurement question rather than a synthesized answer.

v0.2 — Planned scope

v0.2 closes the evidence gaps v0.1 surfaces. The plan has three tracks:

  1. Operator review.Facilities teams, colocation operators, and accrediting officials review the rows whose v0.1 verdict is “Applies with modification” or “Needs evidence” and record which assumptions hold in production.
  2. Measurement campaign. A targeted set of physical measurements answers the questions v0.1 cannot settle from existing literature: accelerator-rack emanations, acoustic side channels at modern hardware, environmental-infrastructure boundaries on shared datacenter floors, and protected distribution paths for high-rate optical links.
  3. Third-party engagement. CTTA-credentialed reviewers, TEMPEST contractors, and IDS / BMS vendors are engaged where v0.1 identifies an evidence boundary the project itself cannot cross.