Mil HDBK 514
Mil HDBK 514
Mil HDBK 514
SENSITIVE
MIL-HDBK-514 (USAF)
28 March 2003
DEPARTMENT OF DEFENSE
HANDBOOK
FOREWORD
1. This handbook is approved for use by the Department of the Air Force and is
available for use by all departments and agencies of the Department of Defense.
2. This document is applicable to all USAF systems and end-items, and designated
system and end-items procured, operated, and/or maintained by the Air Force for
other governments managed through the Aeronautical Enterprise. Although other
methods can satisfy the requirements set forth in Air Force Policy Directive (AFPD)
63-12, Air Force instruction (AFI) 63-1201 and Air Force Materiel Command
Instruction (AFMCI) 63-1201, Assurance of Operational Safety, Suitability &
Effectiveness, this handbook provides a framework that satisfies those requirements.
This military handbook provides guidance for implementing and preserving a solid
operational safety, suitability, and effectiveness (OSS&E) program for the
Aeronautical Enterprise.
3. Section 1.3 identifies applicability of OSS&E to the variety of Air Force owned and
operated systems and end-items. Section 4.2 describes the implementation of
OSS&E for legacy systems and end-items. Section 4.3 identifies the requirements
for the internal management plan for OSS&E. Section 5 contains the OSS&E
mandatory process elements that must be addressed in the internal management
plan. The remaining sections expand and clarify activities associated with OSS&E
assurance.
2
MIL-HDBK-514
CONTENTS
Paragraph Page
1. SCOPE.......................................................................................................... 6
1.1 Scope ...................................................................................................... 6
1.2 OSS&E overview ..................................................................................... 6
1.3 OSS&E applicability ................................................................................. 6
1.3.1 Air Force, Air National Guard, and Air Force Reserve .............................. 6
1.3.2 Joint service programs ............................................................................. 7
1.3.3 Support and ground-based systems......................................................... 7
1.3.4 Unmanned air vehicle (UAV).................................................................... 8
1.3.5 Non-Air Force-managed systems and end-items ..................................... 8
1.3.6 Carry-on equipment ................................................................................. 9
1.3.7 Commercial off-the-shelf (COTS)/nondevelopmental items (NDI) ............ 9
1.3.8 User procured equipment......................................................................... 9
1.3.9 System of systems................................................................................... 9
1.4 OSS&E implementation ......................................................................... 10
1.5 OSS&E training...................................................................................... 12
2. APPLICABLE DOCUMENTS ....................................................................... 12
3. DEFINITION OF TERMS AND ACRONYMS ............................................... 12
4. OSS&E ASSURANCE ................................................................................. 13
4.1 OSS&E execution .................................................................................. 13
4.2 Part I: OSS&E Implementation Plan....................................................... 13
4.3 Part II: OSS&E Internal Management Plan............................................. 15
5. OSS&E MANDATORY PROCESS ELEMENTS .......................................... 16
5.1 Disciplined engineering process............................................................. 16
5.1.1 Operational risk management (ORM)..................................................... 17
5.1.2 System safety ........................................................................................ 19
5.1.3 Configuration management.................................................................... 20
5.1.4 Test and evaluation................................................................................ 25
5.1.5 Technical orders (TOs) and technical data............................................. 26
5.2 Total ownership costs (TOC).................................................................. 28
5.3 Inspections and maintenance (I&M) ....................................................... 29
5.4 Sources of maintenance and repair........................................................ 30
5.5 Sources of supply .................................................................................. 30
5.6 Training.................................................................................................. 32
5.7 Certifications .......................................................................................... 32
5.7.1 Legacy system certifications .................................................................. 35
5.7.2 Air system certifications ......................................................................... 35
5.7.3 Other certifications ................................................................................. 40
5.7.4 Best practices ........................................................................................ 41
5.8 Operations and maintenance ................................................................. 42
5.9 Technology demonstrations ................................................................... 42
MIL-HDBK-514
CONTENTS (Continued)
Paragraph Page
4
MIL-HDBK-514
CONTENTS (Continued)
Paragraph Page
APPENDIX
A.1 SCOPE........................................................................................................ 87
A.2 APPLICABLE DOCUMENTS ....................................................................... 87
A.3 DEFINITIONS AND ACRONYMS ................................................................ 92
A.4 ORM CHECKLIST ..................................................................................... 107
A.5 CONFIGURATION MANAGEMENT CHECKLIST...................................... 108
A.6 TECHNICAL ORDER PROGRAM CHECKLIST (NOT ALL INCLUSIVE) ... 109
5
MIL-HDBK-514
1. SCOPE
1.1 Scope
Operational safety, suitability, & effectiveness (OSS&E) emphasizes those aspects of
systems management and related disciplines necessary to ensure that USAF aircraft
systems and end-items (including support equipment, weapons, training systems,
simulators, ground-based systems, etc.) continue to provide safe, sustainable, and
acceptable performance during operational use. Specific policy delineating the
responsibilities for implementing OSS&E assurance elements is provided in AFPD
63-12, AFI 63-1201 and AFMCI 63-1201.
1.3.1 Air Force, Air National Guard, and Air Force Reserve
OSS&E is applicable to all operational Air Force systems and end-items, including those
operated by the Air National Guard and Air Force Reserve as well as designated
systems and end-items procured, operated, or maintained by the Air Force for other
Government agencies. A complete list of tracked products is available on the HQ AFMC
OSS&E website and includes air systems, unmanned air vehicles, and ground-based
systems such as training and mission planning, as well as support equipment. HQ
AFMC established OSS&E implementation levels for the reportable systems and end-
items as defined in table I. The SM is responsible for maintaining the accuracy of the
reportable system/end-item list. However, OSS&E assurance applies to all systems and
end-items defined above.
6
MIL-HDBK-514
Support equipment is becoming more computer based and versatile. This complicates
maintaining the OSS&E baseline. Just as the manager of systems and end-items must
deal with obsolescence issues, upgrades, and diminishing resources, equipment
specialists must also address these concerns for support equipment. Regardless of who
or how a change is identified for support equipment, the single manager is responsible to
verify that use of the support equipment results in safe, suitable, and effective operation
of the system or end-item.
The training system (both aircrew and maintenance) must be verified to ensure it meets
the intended function. The Air Force training system and device simulator certification
7
MIL-HDBK-514
OSS&E is assured at the integrated system level by the system SM, including all support
systems and ground-based systems. Individual systems/end-items that form part of the
entire system may have their own (separate) OSS&E assurance processes. The system
SM is encouraged to make use of these separate OSS&E assurance processes.
However, OSS&E assurance is the SM's responsibility for the entire system. This
increases the need for succinct SLAs, MOAs, or other agreements, procedures, and
processes with external organizations such as program managers, supply chain
managers, and equipment specialists. This is imperative when their component is
installed/used on many systems and changes to accommodate one system may impact
another system.
8
MIL-HDBK-514
9
MIL-HDBK-514
operation of the system of systems. The OSS&E baseline should address the critical
aspects of the system/end-item required by other platforms.
10
MIL-HDBK-514
11
MIL-HDBK-514
d. Ensuring that maintenance and repair sources are delivering quality products
for the system/end-item.
These are detailed in section 4 through section 7. As an aid, the C-5 OSS&E Pilot
Program Chief Engineer Team Report can provide insight and format to assist in
documenting OSS&E compliance.
2. APPLICABLE DOCUMENTS
See Appendix A.2.
12
MIL-HDBK-514
4. OSS&E ASSURANCE
OSS&E assurance is only possible if the SM/CE, interfacing organizations, and using
command understand their roles and responsibilities. The SM's actions to establish and
enable continued assurance of OSS&E do not involve a formal OSS&E certification.
The SM should, however, ensure the organization maintains adequate documentation
that provides a history of the events and supporting evidence that all OSS&E
implementation criteria were fulfilled. The data repository is necessary to support
program office sustainment activities and ensure future changes continue compliance
with the OSS&E baseline. The SM can then assert that the required OSS&E baseline
has been established and that the processes necessary to maintain the baseline are
documented and in place. Similarly, as the system changes due to modifications, the
CE should add any new technical documentation that supports OSS&E assurance to the
data repository. The chief engineer is responsible to the SM for ensuring that the
technical processes are documented, complete, and being followed. External
organizations that can impact other systems/end-items need to understand and support
continuous OSS&E assurance by coordinating upgrades, modifications, or changes with
the SM. The user must identify any changes to the aircraft configuration, designated
operational capability (DOC), usage environment, or other changes that could impact the
OSS&E baseline. In addition, the user is responsible for the assurance of OSS&E for
systems and end-items procured directly.
13
MIL-HDBK-514
on or before the date OSS&E policy went into effect, 1 March 2000. A listing of these
systems and end-items is available on the HQ AFMC website. Each SM must ensure
accuracy of the information on this site and provide corrections via HQ AFMC/DR. Full
OSS&E compliance (level 6) is required by the end of FY 05 (HQ AFMC goal); however,
HQ AFMC/CC has directed that efforts be made to achieve level 6 prior to this date. The
ASC plan contains one additional requirement above the HQ AFMC execution plan: a
brief system/end-item description. This description is necessary in order to lay the
groundwork for identifying management responsibility, metric development, flight
safety/mission critical components and other activities necessary to assure OSS&E
throughout the life of the system/end-item.
As with new systems, the basis for establishing OSS&E assurance on legacy systems
lies in documented evidence of compliance with safety, suitability, and effectiveness
requirements. For new developments, updates, or modifications, a program can be
structured to produce such documentation (section 9). For legacy systems, OSS&E
implementation should rely to a large degree on existing documentation. The available
documentation can vary widely depending on the maturity and age of the system and
may be supplemented with surveys and audits as necessary to fulfill OSS&E
requirements.
The six levels in table I reflect the update to the OSS&E execution plan per HQ AFMC
memo 22 Feb 2002. Part I of the OSS&E plan, as defined in the ASC/EN letter, contains
the details for establishing OSS&E assurance for legacy systems/end-items. It is
organized into seven areas:
14
MIL-HDBK-514
software, and weapons, as well as the supply chain managers, equipment specialists,
depots, training locations, and Defense Contract Management Agencies (DCMAs).
Since program needs vary, the list of organizations requiring agreements (formal or
informal) depends on the program’s support structure.
g. Schedule. The center OSS&E focal point tracks full OSS&E compliance (level 6).
Therefore, the SM needs to establish a schedule for achieving level 6. Completion of
the six levels of implementation provides the foundation for the continuing assessment
and preservation of OSS&E.
15
MIL-HDBK-514
4) Per AFI 63-1201, the user and SM are required to continuously evaluate system and
end-item OSS&E baseline performance. The goal is to identify potential
degradations of operational safety, suitability, or effectiveness prior to impacting the
warfighters' capability. To ensure consistency, this section should identify the data
collection and reporting systems and other sources of data required in assessing the
OSS&E baseline. It is likely that multiple metrics may be required to allow a single
characteristic to be evaluated. OSS&E metrics are more fully discussed in section
6.2.
16
MIL-HDBK-514
The mandatory elements of the engineering process, described below, are applicable to
new development/upgrade/modification and sustainment of systems and end-items.
However, even for existing or limited developmental items, such as commercial
derivative aircraft, each of the elements needs to be consciously considered and a
determination made as to how the objectives of the element can be fulfilled. The non-
mandatory elements are included in section 8.
Early planning and aggressive application are critical to a successful ORM program. A
comprehensive operational risk management process identifies and quantifies risk,
provides potential solutions, tracks risk reduction activities, provides metrics to assess
residual risk, and quantifies program impacts to the SM. When the system/end-item is in
sustainment, the risks previously identified have been resolved with an acceptable
residual risk. During sustainment, the ORM focus is on changes in the environment or
application, aging, and wear-out of the system/end-item. There are many ways to fulfill
the ORM mandatory requirements; however, the attributes of a good ORM program
remain constant. ORM is a continuous, systematic decision-making tool consisting of
the following six steps that define the process:
17
MIL-HDBK-514
a. Identify the Hazard: A hazard is a real or potential condition that could result in
injury, illness, or death to personnel, or damage to/loss of equipment or property.
The program risk identification process should be capable of flagging changes to the
system hazards as threats evolve, as additional capabilities are required, and as
actual versus planned usage varies. Consider the five M's: man, machine, media,
management, and mission. Sources of information are inputs from the using
command, National Air Intelligence Center, modeling and simulation, and internal
program metrics. The ORM plan should identify all customers, stakeholders, and
external sources that could identify new hazards.
b. Assess the Risk: The chart below is similar to the chart used in assessing system
safety. Safety has derived numeric values for hazard probability and definitions for
severity. However, the numeric values for safety may not apply for ORM. In general
terms, catastrophic is mission impossible, critical is mission impaired, moderate is
mission possible with work-arounds, and negligible is minor disruption to the mission.
For an aircraft system, the catastrophic value may be in millions of dollars, while for
an end-item, the value may only be in thousands of dollars. Thus, the numeric
values for probability and severity are unique to each product. However, the process
for determining numeric values must be consistently applied during the assessment
to provide a relative ranking of risk within an operation. The goal is to highlight areas
of risk within a product.
Strive to eliminate the hazard first. If unable to "design out" the hazard, incorporate
safety devices. If safety devices prove impractical, provide warning devices.
Training and procedures are also practical control measures. The least preferred
control measure is transferring the risk to an external entity. The receiving entity
must accept the risk and the resulting risk must be less than keeping the risk
associated with the original entity. If this is not analyzed and understood,
transference only targets accountability and not risk reduction.
18
MIL-HDBK-514
d. Make Control Decisions: These decisions are based on many factors, including
available resources, funding, schedule, and user expectations. Balancing the cost of
the control measure and effective risk reduction is a good place to start. There are
several potential pitfalls when the “best value” is selected over the optimum. These
include inappropriate control for the problem, refusal by users/leaders to use the
measure, or impedance of the mission.
f. Supervise and Review: Evaluate the control measures to ensure they produce
the desired effect. Confirm that cost savings and/or implementation costs are within
expected values. Obtain feedback from the user regarding the impact on
performance.
Chapter 9 of AFI 91-202, the Air Force Mishap Prevention Program, outlines system
safety program requirements and responsibilities for single managers (SMs) and using
commands. Additionally, safety criteria such as FAR 25.1309 and SAE ARP 4761
(commercially available) can provide insight into FAA and commercial practices.
19
MIL-HDBK-514
The SM is to establish and maintain a tailored system safety program using MIL-STD-
882 as a guide. Where variation or innovation in tasking or methodology is allowed,
proof is required to demonstrate that the approach accomplishes the required objectives
and tasking contained in the Air Force policies. Some basic tenets of a system safety
program include the establishment of hazard risk-resolution criteria, properly scoped
hazard analyses, hazard tracking, resolution, documentation, and forums for hazard
deliberations and resolution.
AFI 91-202 requires that system safety groups (SSGs) be established for all Acquisition
category I (ACAT I) programs and for all aircraft programs unless waived by the major
command (MAJCOM). The purpose of the SSG is to oversee the system safety
program throughout the life cycle of the system and to document the mishap risk review
process with the specifics identified in the SSG charter. The SM or deputy chairs the
SSG, and membership includes user command maintenance and operations
representatives. If residual risk remains after being addressed by the SSG, AFI 91-202
and MIL-STD-882 define the appropriate levels of authority (SM, PEO, or AFAE) for
acceptance of residual mishap risk. In the sustainment phase, SSGs are primarily
concerned with engineering change proposals, mishap trends and recommendations,
and deficiency report (DR) tracking.
For recently fielded programs, the configuration management process established during
acquisition should seamlessly support sustainment activities. The configuration
management process must include a configuration status accounting (CSA) system that
identifies the “as built” configuration of the items that constitute the system/end-item (see
20
MIL-HDBK-514
table 4-4 and section 7 of MIL-HDBK-61A) and supports changes to the configuration
during sustainment. This process must also include support equipment (SE) and SE
software because the SE may need an update due to obsolescence or enhanced
capability independent of the associated system/end-item cycle. Regardless of how
configuration is tracked when the system is fielded (e.g., G081, CAMS, or contractor
system), the configuration must be managed to assure continued compliance with the
OSS&E baseline. Configuration data should include configuration items (CIs),
configuration equipment items (CEIs), computer software configuration items (CSCIs),
drawing numbers, and computer program identification numbers (CPINs) along with the
associated change history. Also, the data should include information such as part
numbers, serial numbers, line replaceable units (LRUs), etc. Contractors developed
illustrated parts breakdowns, primarily from engineering drawings and other official
source data, are another source of configuration data.
After the system/end-item is fielded, the user formally communicates problems to the
managing activity through deficiency reporting databases in accordance with TO 00-
35D-54 or Modification Proposal, AF FORM 1067. Category I deficiency reports (DRs)
are those deficiencies that, if uncorrected, could cause death, severe injury, severe
occupational illness, or major loss or damage to equipment or a system, or that directly
restrict combat or operational readiness. CAT I DRs must be reported within 24 hours of
discovery. CAT II DRs are deficiency reports that do not meet the criteria of CAT I DRs;
are attributable to errors in workmanship or nonconformance to specifications, drawing
standards, or other technical requirements; are required for tracking by agreement of the
single manager and the using command point of contact; identify a problem for potential
improvement; or identify a potential enhancement.
21
MIL-HDBK-514
the system program offices (SPOs) should have a CSA system. If a system/end-item is
organically maintained, the CSA system captures the “as-delivered” configuration plus all
maintenance performed to-date after formal acceptance of the system/end-item. If a
system/end-item is maintained by contractor logistics support (CLS), the contractor may
be tasked to accomplish configuration status accounting to the level of detail specified in
the contract. The user, ALC, or contractor may use the REMIS to load validation tables
for serially tracked, time change, and life limited parts as a complement to their own
maintenance data collection system (e.g., CAMS or G081). Maintaining the
configuration is not difficult or time consuming but does require asserted effort.
Coordination with the system/end-item configuration manager to ensure all required
configuration data is procured and/or documented reduces configuration control
complexity, particularly when provisioning for new spare assets. The are several
questions that must be satisfied:
c. Was the new configuration part coordinated and approved by the system/end-
item manager?
These are critical, since the single manager has overall responsibility for the integrated
system/end-item. In many cases, the parts are added to the commodity tech order but
engineering has not released the system/end-item tech orders. Thus, the aircraft
engineering drawings are not updated to reflect the latest parts configuration.
Additionally, some parts are fielded before cataloging has occurred and the appropriate
U.S. Air Force or DOD databases (D043A and REMIS) have not been updated. Only
when all these tasks are accomplished should the part be installed on the system/end-
item. The part must be validated and approved as a valid part prior to being used on a
given weapon system. The lack of coordination, whether due to poorly written
MOAs/SLAs or other agreements, can result in improper maintenance, incorrect parts
issued, wrong supply items ordered, or inaccurate inspections performed.
For legacy systems and end-items with no formal process for maintaining current
configuration baselines, the configuration baselines must be re-established.
Configuration audits, tailored to the uniqueness of and their cost effectiveness for each
system/end-item, may be necessary to determine the configuration data needed for
OSS&E assurance. Before conducting the actual audits, the existing configuration
control processes need to be evaluated. In addition, the process for user feedback on
operational usage and maintenance used to aid in preserving and updating both the
configuration and the OSS&E baselines should be evaluated. If the processes are
sound and rigorously implemented, then the audits can be more limited in scope.
Since some legacy systems and end-items are over 40 years old and are scheduled to
be fully retired in the next decade, the cost and extent of an audit are seen as limitations.
Therefore, the focus of configuration audits should not be on confirming the entire
physical configuration of the system/end-item in a full-blown audit. Rather, the focus
should be to assess the configuration of the components that comprise the functions as
defined in the OSS&E baseline. The audit should include the following to generate the
necessary configuration information to support the OSS&E baseline:
22
MIL-HDBK-514
b. Physical configuration audit (PCA) -- Validate the product baseline; i.e., the
system/end-item is configured as intended. This configuration audit is conducted to
a level and sample size as necessary to compare the actual configuration of the
system/end-item with the OSS&E baseline and approved configuration. A complete
system/end-item configuration audit is rarely cost-effective, while a limited audit of
specific areas provides useful feedback on the health of the configuration
management process. Therefore, these audits should focus on problem areas such
as unauthorized repairs or modifications. They should verify that authorized,
nonstandard repairs, TCTOs, or modifications are performed and documented
correctly and that installed equipment part numbers match the drawings and other
technical data for equipment that directly impacts assurance of the OSS&E baseline.
These audits should be conducted while the aircraft or end-item is down for
scheduled maintenance, either at a depot or at an operational base, to minimize
impact on the user. Equipment specialists are valuable support to engineering in this
effort.
In using sampling to conduct a PCA, less than a 100% review of all hardware
and documentation is performed. The Navy’s configuration management guide
suggests a 10-20% sampling rate of the system/end-item and documentation.
If the audit uncovers few discrepancies, there is little risk to assume the
remaining system/end-items in the fleet are also acceptable. However, if the
audit uncovers many discrepancies, or major problems, a larger sample size
may be required. Another means of determining system/end-item inspection
sample size is by using the requirements of Air Force Materiel Command
Instruction 21-102, Analytical Condition Inspection (ACI). This instruction
requires SPOs to periodically inspect a certain portion of their system/end-item
fleet in order to ensure against unknown defects causing future safety or
economics issues. If defects are found as a result of the sampling inspection, a
secondary sampling inspection should be conducted to rule out single-find
defects. If no defects are found in this secondary sampling, then there is a 90
percent confidence that defects do not exist in more then 20 percent of the
force. Conversely, if an additional defect is found, then additional action
(periodic inspection requirement, physical baseline change, etc.) is required
because the defect is considered to be pervasive throughout the fleet.
23
MIL-HDBK-514
the system or end-item. These support audits consist of two parts: 1) The first part is
to be conducted at the SPO, not in conjunction with an audit at any operational unit.
This part of the audit focuses on top-level supply and supportability issues applicable
to the system/end-item health as a whole. This part of the assessment includes
deficiency reports, failure and mishap trends, exhibit analyses, first article
inspections and test evaluations, and assessments of reliability, maintainability, and
supportability analyses. 2) The second part of the off system/end-item audit takes
place at the operational unit and focuses on verification that local practices have
been documented and are consistent with SPO practices, the technical workforce is
properly trained and complies with TOs, and that TOs are properly maintained and
updated. Program management should lead this effort and rely on engineering and
technical experts to perform the evaluations and analyses. The program manager is
responsible for coordinating with all inspection units to ensure the system/end-item is
properly prepared; support personnel, facilities, tools, and equipment are available
and accessible; records, drawings, technical orders, and documents are on hand;
and other requirements for the audit are available. Lastly, the program manager
ensures the results of the inspection are documented and coordinated, and that
corrective action is taken where necessary.
When using a rating system, however, success and failure of the inspection requires
definition. For OSS&E, ‘in compliance’ implies the unit maintains the system/end-item
OSS&E baseline as defined in design and maintenance documentation with no findings
worth noting. The only difference between this rating and ‘in compliance with comments’
is that some minor deviations from the baseline were noted. Although these deviations
do not adversely affect system/end-item configuration or the governing processes to
maintain that configuration for OSS&E, they may affect other program activities and
should be corrected. Not in compliance implies the system/end-item is not maintained in
accordance with these governing processes and impacts the OSS&E baseline (design
documentation, technical orders, OSS&E directives, etc.). Unauthorized modifications,
use of outdated technical data, and use of unapproved parts are examples that would
constitute a ‘not in compliance’ rating. This must be corrected for OSS&E assurance.
Appendix A.4 provides a list that may be used to help in ascertaining whether the
configuration management system is working.
24
MIL-HDBK-514
Various kinds of developmental test and evaluation (DT&E) are conducted throughout a
system’s life cycle to ensure the Air Force acquires and maintains systems which meet
users’ needs. Decision makers use DT&E results to verify the extent to which design
risks have been minimized, verify contract performance, determine system safety,
assess military utility and system reliability, and determine system readiness for
dedicated operational test and evaluation. Guidance on planning, conducting, and
reporting DT&E is found in AFI 99-101.
Various kinds of OT&E can be conducted during a system’s life cycle to ensure the Air
Force acquires and maintains operationally safe, effective, and suitable systems that
meet user requirements. OT&E is conducted in as realistic an operational environment
as practical to identify and help resolve deficiencies as early as possible. The test
conditions for OT&E must be representative of both wartime stress and peacetime
operational conditions. Dedicated OT&E will be considered complete when OT&E
results indicate the system is operationally safe, effective, suitable, and meets users’
operational requirements, and performs mission essential tasks. Additionally, the results
will verify deficiencies have been corrected and fixes incorporated as agreed. At this
point, the system will be shown to be operationally safe, suitable, and effective.
Nevertheless, follow-on operational test and evaluation (FOT&E) continues to resolve
critical operational issues (COIs), test issues, or areas not complete as the system
enters the sustainment phase. Information on OT&E is contained in AFI 99-102.
Qualification operational test and evaluation (QOT&E) is the name used for OT&E when
no significant research and development is required. It is used when evaluating military-
unique portions and military applications of commercial off-the-shelf, nondevelopmental
items, and Government furnished equipment. QOT&E is planned and conducted to the
same standards and policies as IOT&E, including being conducted by AFOTEC.
Candidate systems for QOT&E require little or no Government funded R&D,
engineering, design, or integration efforts. QOT&E is funded by O&M (3400) or
procurement (3010, 3020 or 3080) funds.
As the system is put into operational use, the need for modifications may arise. The
system’s capabilities may change, the threats against it may change, and there would
thus be a need for additional evaluation, certification, and documentation in support of
OSS&E assurance. Other related T&E information is available through the AT&L
Knowledge Sharing System (previously the DoD deskbook).
25
MIL-HDBK-514
The source of information for TOs is the technical data (TD). TD includes engineering
data, source data, schematic diagrams, flow diagrams, manufacturer’s handbooks,
manuscripts of O&M instructions, commercial technical manuals (TMs), and other
system and equipment O&M procedures. Technical manuals are the commercial
equivalent of TOs, except that TMs are not military orders issued by Air Force Chief of
Staff. TOs, TMs and technical data identify procedures, operating limitations, and
requirements necessary to preserve operational safety, suitability, and effectiveness
baselines If TOs, TMs or approved procedures are not followed for maintenance or
operations, then they do not help assure OSS&E.
5.1.5.1 TO policy
TOs are military orders issued in the name of the Air Force Chief of Staff and by order of
the Secretary of the Air Force. Compliance with Air Force TOs is mandatory per AFPD
21-3. AFPD 21-3 applies to all personnel who acquire, manage, or use TOs. Air Force
approved commercial publications are assigned TO numbers and managed in the TO
system. Programs planning to manage commercial publication(s) outside the TO
system must request a waiver from USAF/ILM.
5.1.5.3 TO updates
A TO must reflect the current operating characteristics, maintenance, inspections, and
production configuration of its related system/end-item and/or components. The system
CE/LE is ultimately responsible for TO technical content accuracy. In practice, the
technical content manager (TCM) has overall authority for managing the content of the
TO and the responsibility to maintain the currency and accuracy of the TO throughout
the program’s life cycle. (Note: The TCM is the individual, usually an equipment
specialist or engineer, responsible for maintaining the accuracy, adequacy, modification,
classification, review, and currency of the technical content of TOs supporting assigned
systems, commodities, or processes.)
26
MIL-HDBK-514
To ensure adequate financial resources are available for regular TO updates, single
managers must complete a Comprehensive Air Force Tech Order Plan (CAFTOP)
Annex and a Technical Order Financial Requirements Brochure covering their assigned
TOs (per TO 00-5-1, paragraph 1-4.3.9.3). The CAFTOP is a compendium of plans for
managing the digitization, sustainment, and distribution of O&M technical orders.
CAFTOP Annexes are updated as changes occur and are submitted annually to the
responsible lead command in sufficient time to support the TO budgeting and funding
process. Portions of the CAFTOP are also used to supply information for quarterly TO
metrics. HQ AFMC/ENB collects the metrics information for submission to HQ
USAF/ILMM.
Please refer to the Integrated Data Environment home page for more information
regarding TO acquisition and sustainment.
The responsibility for accuracy of the flight manuals' technical content resides with the
CE/LE. In practice, the FMM manages the content, format, and accuracy of the flight
manuals.
The FMM and the TO manager work together closely throughout TO development and
sustainment activities, and follow similar processes for the most part. A few distinct
differences follow:
a The FMM coordinates with the TO manager for FMP contracting, funding,
numbering, printing, distribution, and indexing.
b The FMM coordinates all aerial refueling manual changes with the KC-135 and
KC-10 FMM to ensure standardization of aerial refueling procedures.
c The FMM conducts an annual Flight Manual Review Conference (FMRC), unless
postponed by the using commands, to review all outstanding routine AFTO 847s
(vice AFTO 22) and other documents affecting FMP content. The FMM is the FMRC
chairperson.
27
MIL-HDBK-514
d The FMM ensures the minimum print quality for all FMP publications is Level III
(good quality).
28
MIL-HDBK-514
critical in the sustainment phase, when the operations and support (O&S) cycle often
provides the SM a rich environment in which to identify risks. These risks are associated
with funding the migration from procurement to O&S, deferred modernization, aging
systems/end-items, increased maintenance, and increased O&S costs.
I. Customer/user ORD requirements: The correlation matrix within the ORD should
provide sufficient detailed information to establish maintenance planning
objectives.
29
MIL-HDBK-514
IV. Tailoring for modifications: The CE ensures that the I&M instructions are
provided in the TOs to preserve system or end-item OSS&E assurance and
continued airworthiness for the operational life of the system.
30
MIL-HDBK-514
are not parts of major group B equipment and not highly visible in periodic inspections of
primary Group A hardware. The process assessment applies to parts acquired from
contractors/vendors and parts acquired from Government sources. The latter case
should also address processes for organically maintained software.
The need to obtain new sources of supply occurs throughout a system’s life. This can
occur because of an existing/previous supplier going out of business, discontinuation of
a product line by a specific supplier, removal of the source from the qualified vendors list
due to poor performance, etc. Regardless of the reason, it is incumbent upon the SM
and CE/LE to ensure adequate requirements are established and actions are taken to
obtain new supply sources while preserving the existing system OSS&E baseline.
There are several methods for restricting sources for parts procured using a specified
design. The acquisition method code (AMC) and acquisition method suffix code (AMSC)
will state whether or not the item is restricted to specified sources. It will also specify
how the sources are restricted (such as a source controlled drawing or if an item
requires engineering source approval by the design controlling activity). Reference
Supplement 6 of the DOD Federal Acquisition Regulation Supplement for more
information on the AMC/AMSC code. The requirements to meet, as a source, will
depend on the criticality of the item, what method was used to restrict sources, where
the part is used, etc. These may be identified in Source Qualification Statements, a
Qualified Products List (QPL), a Preferred Products Selection List (PPSL), or other
program documentation for critical parts that require a qualified source. For other parts,
first article and deficiency reporting may be used monitor supply. The following are
examples of how sources are restricted and methods of approving new sources. These
are examples only.
b. Some items are restricted to the OEM due to problems with the data used to
manufacture the item (such as incorrect/incomplete data or proprietary data).
Sufficient data to manufacture the item should be obtained or the rights to such data
obtained before additional sources can be considered.
c. Some items are restricted to the sources called out on the AFMC Form 761
(AMSC "C" coded items). The method for approving additional sources is item
dependent and is based on the criticality of the item and the reason for which the
sources were restricted for the part. Below are examples of why an AMSC "C" code
may be added:
(2) If it is a problem item (such as an item made of materials that require special
expertise to machine without warpage), new sources could be qualified based on
similarity or by having the contractor manufacture a part and send it in for testing.
31
MIL-HDBK-514
5.6 Training
Accurate and effective training for operations and maintenance personnel is critically
important to ensuring the OSS&E of air systems. The SM should ensure that a
comprehensive training system is established to provide continuous, effective training for
operations, maintenance, and program office and supply personnel. The training system
is considered to be an integral part of the overall air system. The training system
includes all system and subsystem specific training resources, operator and
maintenance training devices/equipment, software support resources, computer-based
instructional systems, unique support equipment, courseware for the computer-based
instructional system, curriculum materials for aircrew and maintenance training, and
instructional services required to support operator and maintenance training. The SM
should ensure that processes are established to assure that the training system is
updated concurrently with changes to the aircraft throughout its life cycle. The
processes established should include comprehensive training task requirements
analysis to ensure that critical training tasks are properly prioritized and allocated to the
appropriate training media. The SM should ensure that the formal and informal training
programs provide training to safely and effectively operate, employ, and support the
aircraft. OSS&E training is available via ASC/ENSI, AFIT Virtual Schoolhouse, and HQ
AFMC/ENPD.
5.7 Certifications
The purpose of obtaining certifications is to have documentation that assures operators
and maintainers of a system's/end-item’s integrity. One of the specific SM
responsibilities is to obtain all required certifications for the system/end-item.
Certifications required for OSS&E assurance must be initially established before
operational use and then preserved throughout the system's operational life.
Table II provides a list of required certifications, the source documents that require them,
and the office of primary responsibility for certification.
32
MIL-HDBK-514
CERTIFICATION
CERTIFICATION POLICY/GUIDANCE
OPR
33
MIL-HDBK-514
CERTIFICATION
CERTIFICATION POLICY/GUIDANCE
OPR
DoD International Air Traffic Control Radar DoD AIMS 97-900 AIMS PO
Beacon System/Identification Friend or
Foe/Mark XII System (AIMS) program office DoD AIMS 97-1000
certification (IFF)
OTHER CERTIFICATIONS
(JITC)
(TBD)
34
MIL-HDBK-514
5.7.2.2 Global air traffic management (GATM) and navigation safety certifications
New and evolving civil communication, navigation, surveillance/air traffic management
(CNS/ATM) performance standards have been established to guarantee capability for
access to worldwide controlled airspace. The program office develops the GATM and
Navigation (Nav) Safety Certification Plan that characterizes required functionality,
processes, and procedures necessary for civil CNS/ATM compliance and obtains
certification from the GATO/MC2 program office. GATO/MC2 will perform GATM and
Navigational safety architecture verification, and performance certification as required by
AFPD 63-13 per the certification plan. The MAJCOM will approve the aircraft to operate
with the requisite CNS/ATM airspace procedures and requirements as outlined in the
certification plan. Documentation of this performance will be forwarded to the
GATO/MC2 SPO, who will issue the appropriate letter of certification for that system.
Recertification criteria, intervals, and sustainment requirements are required features of
this plan.
35
MIL-HDBK-514
The Joint Interoperability Test Command (JITC) has been identified as the DoD
certification agency for joint and combined interoperability and follows the processes
outlined in CJCSI 6212.01A. The SM/CE for each applicable air system and end-item is
responsible to ensure interoperability requirements are included in contractual
documents. Using commands must also ensure their inclusion in the operational
requirements. Documentation of this connectivity is forwarded to JITC for review and
certification.
5.7.2.6 Air Force training system and device simulator certification program
Simulation certification (SIMCERT) is an operationally conducted program designed to
ensure training systems and devices provide accurate, credible training in specific tasks.
It also provides the operating command with an audit trail for training device
effectiveness; provides a key quality assurance capability for contractor supported
training or equipment; and compares the training system with the aircraft system to
establish and document concurrency baselines. For ANG and AFRES, SIMCERT
programs should align with the Lead MAJCOM SIMCERT program. SIMCERT should
be done for all aircrew training devices (ATD) and other training devices as determined
by the MAJCOM. AFPAM 36-2211 addresses the certification process. In concert with
36
MIL-HDBK-514
this process, the Air Force may also use FAA standards regarding the evaluation and
qualification of aircraft training simulators/devices, as appropriate.
When the certification official gives final, written confirmation of system readiness for
OT&E, the operational test agency (OTA) commander will acknowledge by “accepting”
(or “not accepting,” if appropriate) before beginning DOT&E. This acceptance officially
confirms the OTA’s agreement (or disagreement) with the certifying official’s
assessments and conclusions. This process will be the primary certification method for
programs in which the Air Force is the lead service.
DOT&E readiness certification is applicable to ACAT I-III, NDI, COTS, and off-the-shelf
programs. The SM states that the system/end-item has been through all acquisition-
related qualification, performance, and acceptance tests or analyses and meets the
requirements on the specification. This is when the user verifies that the system or end-
item procured meets the user’s requirements.
AFI 99-101 identifies the SM’s responsibilities for the conduct of DT&E. These include
ensuring DT&E is conducted according to approved test plans and certifying that
systems are ready for dedicated OT&E. AFI 99-102 outlines the SM’s responsibilities for
the system progression from DT&E into dedicated OT&E, through the certification
process.
37
MIL-HDBK-514
The DoD AIMS program office receives guidance from SAF/AQID (DoD AIMS
program action officer) and the DoD AIMS steering committee formed by charter
from the Office of the Secretary of Defense (OSD). The DoD AIMS program
performance standards are listed in the Joint Technical Architecture (JTA).
38
MIL-HDBK-514
Box Level Certification: All Mark X/XII IFF transponders and interrogators installed on
U.S. military platforms are required to be AIMS certified. This certification ensures an
adequate level of performance and interoperability in varying environments within
military combat identification and air traffic control (ATC) and civil ATC architecture.
Platform Certification: Each military platform is required to obtain DoD AIMS Program
Office Certification of the installed IFF systems. Integration of a transponder or
interrogator into each platform type should be validated to ensure required controls and
indicators are implemented correctly. Each platform type must then be tested for
installed AIMS performance. This verification consists of ground testing and a minimum
number of flight tests to determine performance. See https://pma213.navair.navy.mil/
mode5pr 00 for details and contact the AIMS (WR-ACL/LYGO – AIMS) program for
access.
The concept of C&A applies to all automated information systems (AIS): existing and
proposed systems/end-items, stand-alone systems, personal computers (PCs),
microcomputers, minicomputers, mainframes, large central processing facilities,
networks, distributed systems, telecommunication systems, etc. However, most of the
guidance cited in support of C&A is specifically not applicable to weapon systems or is
silent on the issue. The issue is further confused by the use of general terms, such as
automated information systems (AIS) and information systems, which are not specifically
defined. The terms are used such that they appear to be all-inclusive, but the definitions
never explicitly include aircraft systems or national security systems. Most aircraft
39
MIL-HDBK-514
systems and support equipment operate in a dedicated, or system high, security mode.
The security implementation is designed and verified as an inherent part of the systems
engineering/system development process.
Due to the expense and time associated with the formal certification and accreditation
process, the appropriate representatives from the using command, PEO, Air Force
Materiel Command, system program office, Defense Intelligence Agency (DIA), and
SAF/AQ as appropriate should make the decision to apply the formal C&A requirement
to weapon systems and end-items. If the aircraft system has a C&A requirement, the
ASC/EN website, https://www.en.wpafb.af.mil/software/software c&a.asp describes the
C&A process.
40
MIL-HDBK-514
the review authority, the NNMSB mission includes various approvals and safety
certification assessments conducted at specified points in various munitions acquisition
phases. As a system safety group, the NNMSB mission includes providing design and
qualification safety guidance to program management authorities during the system's life
cycle. The NNMSB reviews and establishes design safety and qualification test criteria,
standards, and requirements for nonnuclear munitions and related items. The NNMSB
also provides guidance to program management authorities throughout the life cycle of
munitions programs to ensure that the criteria which forms the basis for the safety
certification review are receiving adequate consideration. In addition, the board
maintains safety cognizance over all new or modified nonnuclear munitions, including
those developed by the Air Force, obtained from other US military services, or obtained
from foreign sources intended for Air Force operational use. If a munitions or equipment
item is safety certified under the Air Force Nuclear Safety Certification Program (AFI 91-
103), then the item is certified for nonnuclear use, provided the nonnuclear portion of the
system was evaluated. Such nuclear certified munitions and equipment items are not
reviewed by the NNMSB unless specifically requested.
41
MIL-HDBK-514
There are however, many programs that use engines outside the Propulsion SPO's
management chain (e.g., F-117 and UCAV). The engine depot may be Navy, Army, or
contractor owned, etc. The processes employed by those organizations should be
understood and compared with guidance in this Mil-Handbook and the program-specific
tailored airworthiness certification criteria (TACC). The SM may use the appropriate
portions of those processes in establishing OSS&E compliance and certifying
airworthiness.
42
MIL-HDBK-514
operations fall under the OSS&E umbrella, and assurance of OSS&E is the responsibility
of the managing organization.
43
MIL-HDBK-514
A sample OSS&E baseline is depicted in table III. The, HQ AFMC website has some
additional suggested OSS&E characteristics. Other sources for characteristics can be
found in current reports listed in table IV. Due to the uniqueness of each program
managed within the Aeronautical Enterprise, appropriate characteristics should be
chosen to reflect each specific system, mission design series (MDS), and/or end-item.
This document does not require formal reporting against the OSS&E baseline and
encourages the use of existing reports, metrics, and other sources of information to
maintain OSS&E assurance.
44
MIL-HDBK-514
NAME OPR
c. Show how well goals and objectives are being met through processes
and tasks.
e. Reveal a trend.
h. Timely.
45
MIL-HDBK-514
The following steps explain the systematic process for establishing metrics and the
OSS&E baseline characteristics:
a. Identify the purpose. Is the purpose aligned with the OSS&E baseline?
What needs to be measured? Why? What is the end purpose?
f. Collect and analyze metric data over time. First, establish the existing
program state, and then start acquiring metric data from the existing
metrics or from the new ones generated. As the data accumulates over
time, look for trends. Investigate special or common-cause effects on the
data. Compare the data to interim performance levels. Have the proper
tools been selected to collect and analyze the data collected?
46
MIL-HDBK-514
organization must understand its role and the importance of documenting, coordinating,
and reporting all activities that affect the OSS&E baseline. To that end, establishing
good integration and communication is essential. Informal (formal if necessary) MOAs,
SLAs, or other documented agreements are preferred (see section 7). The baseline
characteristics and/or metrics may require updating based usefulness of the information
(i.e., are user concerns still captured) or due to changing the system/end-item
configuration. The following are the critical aspects for preserving the OSS&E baseline:
b. Preserving the OSS&E baseline requires that all changes impacting the system
or end-item, including operation or maintenance outside of TO limits, are made
known to the responsible managing organization. If the user, PGM, or other
supporting activity does not follow the approved technical manuals, allows
modifications outside the purview of the program office, or does not provide feedback
to the program office on the status of approved modifications, the resulting
configuration becomes an unknown. OSS&E cannot be assured in these cases
because new modifications are assessed against an inaccurate documented
baseline, not the “as flying” baseline. OSS&E also cannot be assured when
operational changes are not coordinated with the SM or when the SM has not
approved operation or maintenance outside of TO limits.
d. The last aspect is to develop a process to compare the expected results of the
modification to the actual impact on fielded OSS&E baseline capabilities. Careful
47
MIL-HDBK-514
analysis is necessary to ensure that one characteristic does not exceed expected
values at the expense of another. The up-front trade studies should prevent this
phenomenon; however, trades studies are not all encompassing. Typically, only the
high value and critical aspects of the system or end-item are assessed in trade
studies. The activities discussed in configuration management, provide the
necessary linkage to OSS&E baseline characteristics and associated hardware &
software. FOT&E can provide the operational experience necessary to verify that
the OSS&E baseline has not been degraded.
FEEDBACK LOOP
48
MIL-HDBK-514
7. MANAGEMENT RELATIONSHIPS
The SM and CE are ultimately responsible for the continued OSS&E assurance of their
program regardless of to whom they have delegated authority for portions of the
sustainment effort. Informal and/or formal agreements (e.g., MOAs, SLAs, etc.) are
necessary between the program office and supplier organizations to convey the
information requirements from each other’s organizations to assure OSS&E for the
program. When a supplier provides support to multiple programs, a standard MOA/SLA
should be developed. All programs and the supplier should agree to a single process for
notification and coordination of modifications/upgrades. SLAs, MOAs, etc., are not
required between the program office and user. These relationships are usually
documented in an operating instruction, although it could be documented in the OSS&E
plan Click to see a sample ALC MOA. Click for HQ AFMC/DR SLA information. Click to
see ASC/SY MOAs/SLAs.
a. Define the OSS&E baseline and metrics applicable to the supplier organization.
b. Clarify how metrics roll up into the system-level metrics and OSS&E baseline and
how that organization affects those metrics.
c. Establish the evaluation criteria, methodology, and data source for the metrics.
d. Define program office responsibilities to the supplier and how they will be
accomplished:
(2) Ensure the supplier is a fully informed and participating member of the
modification planning and execution process.
49
MIL-HDBK-514
(3) Define the coordination process with the supplier for identifying and
implementing modifications, upgrades, or other changes that could impact the
OSS&E baseline.
(7) Work with the supplier in addressing equipment common across several
platforms.
(5) Timeliness.
Example:
Issue: A serious design flaw was discovered. Improper steps were taken in reporting
the issue that resulted in the MAJCOM becoming aware of the situation before the SPO.
Solution: The MOA between the SPO and supporting organization should identify the
chain of command to report flaws discovered during any repair/refurbishment activities.
All personnel should be trained in preserving OSS&E and familiar with all the MOAs
associated with the equipment under their responsibility. Since the flaw could result in
loss of aircraft and/or life, the fleet may need to be grounded until aircraft with defective
parts are identified. The SM is responsible for continued airworthiness via OSS&E and
grounding the fleet is his/her final determination. However, the SM should inform the
user immediately of the grounding potential and work with user to establish work-
50
MIL-HDBK-514
arounds, inspections, or other means (e.g., spares availability) to minimize the impact to
the warfighter
ASIP AF
AFPD OSS&E AFPD
AFPD 63-12
The Weapon System Integrity Guide (WSIG) is intended to provide guidance on how to
integrate the existing integrity programs within systems engineering, resulting in a more
efficient and cohesive approach to engineering. The above diagram depicts the integrity
approach and provides links to the integrity programs. In order to accomplish this, the
Systems Integrity Guidance document contains three basic thrusts. First, to integrate
the efforts called out in the various integrity programs; namely, the aircraft structural
integrity program (ASIP), engine structural integrity program (ENSIP), mechanical
equipment and subsystems integrity program (MECSIP), and avionics/electronics
integrity program (AVIP). Second, to synergistically integrate or coordinate specific
integrity program efforts/tasks with related efforts in other various systems engineering
disciplines and efforts. And third, to place increased emphasis on the sustainment
portion of the life cycle.
51
MIL-HDBK-514
System integrity applies to more than just new developments. It applies to system/end-
item modifications; commercial off-the-shelf (COTS) equipment; use of form, fit, function,
and interface (F3I) interchangeable equipment; equipment changes in use; service life
extension; and all of the corresponding changes in sustainment needed to maintain the
integrity of performance.
Integrity programs provide the guidance through which design margins are initially
established and subsequently sustained via the use or modification of inspection,
repair/overhaul, and/or replacement intervals (based on the life used and/or margin
remaining). This may also be achieved through the implementation of redundant or
reconfigurable systems/architectures that mitigate the loss of a function performed by an
individual item. Maintenance actions taken to repair or replace defects/items restore
performance and life consistent with, or exceeding, the original manufacturers’
specifications (unless those specifications or required life have changed). This
necessitates a process that can ensure the correctness and completeness of TOs or
technical manuals, engineering dispositions, and training at all levels.
The WSIG establishes the guidelines and processes necessary to synergistically apply
the integrity concept across all appropriate elements of the system/end-item. The
specific integrity programs that must be implemented vary with the specific application.
For example, the applicable programs for an avionics upgrade to an existing platform
certainly differ from a new start program. System integrity helps ensure that the proper
integrity programs are always applied, whether it is a development, modification, or
sustainment program.
The efforts delineated in the WSIG shown on figure 3 are basic in nature and are in no
way all-inclusive. Within the WSIG, these basic efforts have been coalesced into nine
basic groups, spread across the phases of development and sustainment. The thought
process involved with reviewing each effort falls into one of three categories: 1) the effort
has been satisfied via currently available information; 2) the effort has been undertaken
to gather the appropriate information; and 3) this effort is not relevant for the design
under consideration. In other words, efforts are met through knowledge: either that
knowledge is already established, knowledge is gained through some activity, or the
activity being evaluated is irrelevant. This course of action ensures that all efforts are
evaluated for applicability.
52
MIL-HDBK-514
M NS
O RD
P L A N NI N G &
CO NT R OL
CHA RA CT E R I ZE DE FI NE O PS
M A T E R IA LS E N V IR ON M E NT
CHA RA CT E R I ZE DE FI N E I N T E R NA L
M AN UF AC T UR I NG E NV I RON M EN T
D E SI GN
AN AL Y SI S
D E S IG N
A L L OW A B L E S
P ROD U C I B L E
C HA RA C T E RI S T IC S
M E ET D E SI GN NO
L OA D S
YE S
L I FE
AN AL Y SI S
MO
DI
FY
DE
SI G
N
L I M I T ED
R E D E F IN E O RD / D E SI GN LI F E LI F E
M NS RE QU I RE M E N T S L I MI TE D
NOT L I FE D RI V I NG M OD E S
LI M I T E D A NA L Y SI S NO
R &M A CC E PT A BL E
AN AL Y SI S PR OB A B I L IT Y O F
FA I L U RE YES
OP E R AT I ON AL
NO R E QU I RE M E N T S F ME CA
ME T P E R FO R M E D
YE S
A L LO W
FA I LU R E F A UL T I SOL T I ON
CON T R O L S T E C HN I Q UE S
I M P LE M E NTE D
D E T E CT B E F OR E
B R E AK
C RI T I C A L I T Y D I A GN OST I CS
AN AL Y SI S P ROG NO ST I CS
R E D U N D AN CY
S C H EDU L ED
M A I NT E N A NC E
S CHE D U L E D
R E P L AC E M E NT
D E SI GN AL GO RI T HM O R
S OL UT I ON T I M E B ASE D
INS PE C T IO N
F AU LT T E S T IN G DE M O S
T OL E R A NC E & A NA L Y SI S
H I GH D ES I GN
M A R GI N
P R OD U CE D
I TE M ME E TS LI F E
F L I GH T YES L OA DS E T C NO
R E ST RI C T IO NS T E ST I NG
P R OB L E M
S U ST A IN M E N T T R AC K I N G A ND
A SS E SSM E N T L I VE W I T H RE SO L UT I ON C HA NG E D E SI GN
P R OB L E M P R OD , QA , SOF T WA R E ,
T .O.s E T C
T Os T RA I NI N G
UP D AT E D
LI F E USA GE
M O N I T OR I N G
T R AC K FI E L D
P E RF ORM AN CE
IM P R OV E M E N T
M A N AGE M E NT
M ODI F IC A T IO NS
DE SI R E D F I EL D
P E RF ORM A N CE DR s ,
T R END ING AC C EP T A B L E
E TC
L I F E L IM I T
R EA C HE D UN AC C E P T AB L E
PE R F O RM AN C E
RE TI RE
S Y ST E M
53
MIL-HDBK-514
IRM differs from ORM in that IRM includes schedule, cost, and developmental risks.
The focus of ORM is in the operational employment of the system/end-item. IRM is
more applicable to updates and new acquisitions during sustainment. The key to
successful risk management (IRM and ORM) is early planning and aggressive
execution. The ASC Integrated Risk Management (IRM) process is based on DoD
risk management studies and embodies the DoD concept, principles, and keys to good
risk management. IRM is consistent with the Defense Acquisition Deskbook, the DSMC
Risk Management Guide and structure and AFMCP 63-101, Acquisition Risk
Management. Integrated risk management consists of four separate, but closely related,
subprocesses. The four IRM subprocesses are detailed below and depicted on
figure 4.
Risk
Management
TA SA CE
1. Requirements 1. Baseline Schedule 1. Establish Baseline Estimate
2. Risk Methodology 2. TA Risk Areas 2. Identify Relevant Risk Areas
3. Risk Identification 3. Schedule Durations 3. Quantify Risk
4. Risk Analysis 4. Run Simulation 4. Incorporate Risk into
5. Administration 5. Analyze Results Baseline Estimate
6. Document & Present 5. Document & Present
54
MIL-HDBK-514
Integrated risk management (IRM) is applicable to all phases and aspects of any
acquisition or modernization program, in any phase of the life cycle. Integrated risk
management is a key element in the disciplined engineering process and an essential
component in the DoD’s strategy for acquiring and sustaining systems in an environment
of diminishing resources. A disciplined, comprehensive risk management structure
involves the early and continuous identification of critical program risks, and the
establishment and monitoring of risk handling plans. When properly implemented, an
effective risk management program facilitates identification of areas that require special
attention and sets realistic, executable technical, schedule, and cost objectives. IRM
provides an approach to manage risk, not just avoid risk.
b. Risk Assessment is the process of identifying and analyzing risks. These risks
could impact the likelihood of assuring OSS&E. Risk identification is the process of
examining the program, processes, requirements, and critical technologies to identify
and document risk areas. Risk analysis is the process of examining each identified
risk, isolating the cause, and determining the impact. Risk impact is defined in terms
of its probability of occurrence, its consequences, and its relationship to other risk
areas or processes. The integrated approach includes a technical assessment,
schedule assessment, and a cost estimate to identify potential risks and impacts.
c. Risk Handling is the process that identifies, evaluates, selects, and implements
options in order to set risk at acceptable levels given program constraints and
objectives. This includes the specifics on what should be done, when it should be
accomplished, who is responsible, and the cost impact. The most appropriate
strategy is selected from these handling options and documented in a risk-handling
plan.
There are several risk-handling options at the discretion of the program manager.
The first choice for a risk-handling option is generally risk avoidance. This involves
changing the requirements to a level that lowers the risk to an acceptable level but
still meets the program objectives. However, risk control (or risk mitigation) is the
most used form of risk handling. This option involves taking active steps to minimize
the risk’s impact on program objectives. Another option is risk prevention or transfer,
also called risk abatement. This approach re-allocates design requirements to those
system elements that can achieve the system requirements at a lower risk. The last
option is risk assumption. With this approach, the program will accept the risk
without engaging in any special effort to control the risk. This last option is only
acceptable if the execution chain understands the full potential of the risk.
d. Risk Monitoring is the process that systematically tracks and evaluates the
performance of risk handling actions against established metrics or indicators
throughout the acquisition/modernization process and develops and executes further
55
MIL-HDBK-514
As mentioned earlier, the three parts of the IRA are the technical assessment, the
schedule assessment, and the cost estimate. These parts are undertaken
simultaneously. The technical team begins its portion by holding a session to assess the
potential risks in the program. Concurrently, the other teams are developing a baseline
schedule and a baseline cost estimate to be used during/for the assessment. These
three teams work very closely to ensure each team understands what the other teams
need. For example, the schedule team members attend the technical assessment
meetings to ensure the technical team understands the potential risks that might impact
the schedule. In turn, the schedule team provides the technical team with an
understanding of what they need to accomplish an assessment of the schedule. The
cost team also works closely with the technical and schedule teams to ensure each team
fully understands the risks identified and how these risks impact cost. It is important to
remember that the primary purpose of the IRA is to identify and analyze program risks in
order to address the challenges of meeting performance, schedule, and cost objectives.
Figure 4 shows the relationship between IRM and the IRA.
56
MIL-HDBK-514
deficiencies with existing systems or manuals may be identified through AFTO Form 22,
AF Form 847, and DRs. The AFMC Software Requirements Review Process (SRRP) is
one mechanism for the user to identify the need to modify, upgrade or enhance system
software during sustainment (reference AFMCPD 63-4 & AFMCI 63-401). One key
method of identifying the need to change an existing system is assessing the OSS&E
baseline via their associated metrics. This will identify degradation to the existing
system capabilities. However, it does not identify when new capabilities are needed.
Updates to the OSS&E baseline and associated metrics are required as existing
capabilities are enhanced or new capabilities are added that affect the OSS&E baseline
(or if an existing metric is determined to be insufficient). Whichever method is used to
establish the new, needed capability, the operational and contractual requirements
should be reflected in the OSS&E baseline with sufficient visibility to ensure the desired
results are maintained. Key to requirements definition is ensuring traceability of
requirements and design throughout the system life cycle. Requirements definition and
the corresponding verification requirements are documented in the system performance
specifications or other appropriate documents. Traceability of design is accomplished
through configuration management practices. OSS&E assurance emphasizes the need
for specification content to include performance requirements that yield a safe, suitable,
and effective system.
Requirements
Requirements Analysis)
Analysis)
5 In this step,
step, NEPA documentation is
is completed as applicable. For
For further
further information
information
regarding
regarding NEPA, see the
the ENV
ENV web site (http://www.ascem.wpafb.af.mil/).
(http://www.ascem.wpafb.af.mil/). (Requirements
(Requirements
Analysis)
Analysis)
8.4.2 Tasks
The steps to integrate ESOH during 6 An
An EWG
EWG and SSG, consisting
consisting of
of Air Force
Force and
and contractor, isis established. This approach
approach
follows
follows the
the risk reduction concepts which
which are essential in all phases
phases ofof weapon system life
life
the system/end-item life cycle are cycle.
cycle. (Requirements
(Requirements Analysis)
57
MIL-HDBK-514
b. Working with the environmental working group (EWG) and ensuring that TOs and
technical data identify procedures when using products via a waiver. The approved
hazardous materials are controlled prior to implementation through tracking and
updating the associated TOs.
d. Working closely with system safety to address safety hazards that are associated
with ESOH vulnerabilities to ensure the risks are identified, eliminated, or reduced to
an acceptable level of risk. This is documented through the NEPA process.
Addressing all aspects of ESOH and ensuring personnel are appropriately trained to
comply with ESOH and NEPA requirements.
58
MIL-HDBK-514
c. Matching the original key product characteristics with process capabilities of new
suppliers/vendors ensures the manufacturing processes can consistently produce
hardware that meets design tolerances. During early development, the manufacturer
collects process data, calculates process capabilities, and provides feedback to the
designers on their ability to meet proposed tolerances. These assessments can also be
used in evaluating the supplier/vendors ability to provide replacement/second source
items or produce modifications to items to enhance product capability.
f. Depot capability & capacity assessments are similar to the reviews above, and
focus on the ability of depots to repeatedly deliver quality products.
During the sustainment phase, the activities listed above are just as appropriate,
although they are typically applied to depot operations and new equipment designs, as
59
MIL-HDBK-514
8.6 Anti-tampering
Anti-tampering (AT) is defined as the systems engineering activities intended to prevent
and/or delay exploitation of critical technologies in U.S. systems. Since this is a broad
definition of the security effort, it is expanded for clarification: AT applies to the
deployable military system, not research or support technology. It is not limited to
classified systems. The Military Critical Technologies List (MCTL) is a starting point for
developing a cost-effective AT approach. The anti-tamper goal is to design the system
to prevent tampering and exploitation in contrast to protecting information. AT is
specifically concerned with the consequences when the U.S. forfeits control of the
system; for example, if the system is
c. Dropped behind enemy lines (e.g., smart bomb that does not explode).
The intent of anti-tamper is to preserve the U.S. technological advantage, with a goal of
delaying exploitation by 10 years. Common criteria for implementing AT would result in
clearly defining AT requirements, promoting reuse of technologies and methods, and
allowing for quicker insertion of AT capability. The reuse of technology can also reveal
classified details and vulnerabilities.
Most modern avionics systems are difficult to exploit unless one has the hardware, the
technical data/manuals, and the test equipment. Key technology is often in software,
manufacturing rules, tools, or processes; thus, acquiring the hardware may not
automatically allow an adversary to exploit a capability.
60
MIL-HDBK-514
Since many key capabilities are contained in software, there is need for vigilance
concerning all nonvolatile storage devices (read only memory, data transfer module,
etc.). Deletion of all operational software at shutdown is a viable option for some aircraft
systems.
For electronics hardware, the move to the use of commercial parts makes physical
protection of most processor and memory component technology meaningless. For
example, if the same "Power PC" chip is available at a commercial computer store, then
there is no point in trying to protect that chip in a military system.
Some key hardware devices may require physical hardware protection, for example:
a. Antenna arrays,
9. PRE-AWARD/ACQUISITION PLANNING
During sustainment, acquisition of new or modification to, components, equipment,
support equipment, etc. will be necessary. Maintaining the OSS&E baseline requires
attention to contract requirements, open dialog with the user, and understanding the
OSS&E baseline. OSS&E assurance begins with traditional generation of requirements.
61
MIL-HDBK-514
b. An integrated master plan (IMP) with those program activities and success
criteria to be accomplished by milestone event to fulfill program requirements.
Examples: Incremental verification of requirements by reviewing modeling, simulation,
and analysis test reports; and component, subsystem, and system checkouts. The SM
should identify certification requirements. A list of certifications can be found in
section 5.7
OSS&E policy does not necessarily levy new requirements on systems and end-items
but rather ensures key processes are documented, kept current, and adhered to
throughout the entire life of the system/end-item. In general, the acquisition strategy
defines how OSS&E assurance will be implemented and continued throughout the
operational life, and delineates sharing of data to subcontractors, vendors, and external
organizations. Acquisition processes which are critical to achieving OSS&E, such as
risk management, system safety, configuration management, etc., should already be
addressed as part of the acquisition management plan through existing Air Force policy
and guidance and/or commercial best practices. Legacy programs may not possess the
above information; however, varying levels of OSS&E assurance will have been
accomplished at the system/end-item level. The procurement contract, in this case,
should emphasize the following for OSS&E assurance:
d. Critical functions,
62
MIL-HDBK-514
g. Warranties,
These should all be considered to ensure OSS&E compliance throughout the entire life
of the system/end-item. More information on the pre-award process and the OSS&E-
related ASP charts are available at the ACE web site.
Each system/end-item SM must know the current OSS&E implementation level and
have documented evidence that indicates achievement of said level. Typically, the IG
will look for proof that OSS&E is actively being applied by all organizations associated
with the system or end-item. The IG usually confirms that processes are in-place and
followed (via SLAs, MOAs, or other agreements).
The UCI section entitled “Evidence of Compliance” contains the criteria to be used to
evaluate compliance to the associated OSS&E policy. All documentation used to
demonstrate compliance must be both readily available for use and current in its content.
Where documentation describes processes, those processes must be in practice.
The complete OSS&E UCI checklist can be accessed at the following web-site:
https://www.afmc-mil.wpafb.af.mil/HQ-AFMC/EN/deskbook/checklst/osseuciv1.doc.
63
MIL-HDBK-514
11.1 Overview
A key aircraft certification required under the OSS&E umbrella is airworthiness. There
are a number of acceptable approaches whereby the initial airworthiness certification
and subsequent recertifications may be accomplished, depending upon the aircraft
design/acquisition philosophy as well as the current system life cycle phase and current
airworthiness certification status. It is up to the CE to apply good engineering judgement
in tailoring the certification process to fit the individual circumstances. The chosen
approach should be carefully considered, documented, and coordinated to avoid
confusion and conflicts during the initial certification and subsequent recertification
efforts required after reportable system modifications. In all cases, once initial
airworthiness certification is established, it must be preserved throughout all phases of
the program (see figure 5).
64
MIL-HDBK-514
Figure 7 illustrates how first flight, SoF, and airworthiness certification relate to OSS&E
during development of an aircraft system or development of a major modification. It is
centric, time-based in that it starts at the center with utilization of a subset of the
65
MIL-HDBK-514
airworthiness certification criteria employed for first flight determinations. It then moves
out to include verification of an expanded design envelope that constitutes full SoF for all
primary functions on the air vehicle. Next, all remaining applicable airworthiness
certification criteria as well as the remaining specification requirements are verified
during developmental test and evaluation (DT&E). After the SM has certified
airworthiness and readiness for dedicated operational test & evaluation (DOT&E), the
system can enter DOT&E. As the system’s ability to perform its operational mission
safely and effectively and efforts to establish supply sources, maintenance, training, etc.
are further verified as being ready for sustainment, it moves to full OSS&E compliance at
or before IOC.
IOC
OSS&E Compliance
Airworthiness
SoF 1st FLT Certification
DOT&E
The aircraft design (including new aircraft and all modifications that are incorporated for
product improvement or to correct deficiencies) must meet the criteria in MIL-HDBK-516,
Airworthiness Certification Criteria as tailored by the CE and approved by the SM.
Alternatively, the design may be proven to meet the FAA Federal Aviation Regulations
(FARs) for aircraft procured under AFPD 62-4 and AFPD 62-5. In all cases, the
certification basis is captured in a TACC document approved by the SM.
The term ‘proven’ in the context of this tenet means that compliance to the applicable
airworthiness criteria of the design has been verified by a means acceptable to the
certifying organization. The acceptable methods may include flight or ground test,
analysis, demonstration, modeling, simulation and analysis (MS&A), inspection,
previously verified, or by similarity to proven capability. The CE is responsible for
ensuring the adequacy of the methods of compliance.
66
MIL-HDBK-514
In meeting this tenet, the airworthiness approving organization should ensure that a
review of the aircraft drawings at the appropriate level is conducted to verify that the
design presented for airworthiness certification complies with the approved
configuration. In addition, it should ensure that critical process capabilities and quality
standards exist, and that production allowances and tolerances are within acceptable
limits. The review includes all documentation (i.e., drawings, shipping data, as-built
records, historical records for GFE, or any other appropriate document) that verifies the
tenet.
The air system must be operated within its approved operational envelope as described
in the flight manuals, and the aircraft records for each aircraft should be properly
maintained.
Any and all failures (in-flight or on-ground) to any flight-critical element should be
recorded, the nature of the failure determined and the failure reported to the SM and the
CE. This information should be reported and recorded in the deficiency reporting system
in accordance with TO 00-35D-54 and accident investigation, reporting and record
keeping in accordance with DODI 6055.7. Program and user system safety
representatives should also be sought out and integrated into the resolution effort,
depending upon criticality of the failure. Additionally, the failure of any flight-critical FAA
certified component on a USAF system that is common to the commercial fleet should
be reported via the FAA’s Service Difficulty Reporting System.
The SM should verify that any special procedures required to preserve airworthiness of
the air system are approved. Minimum essential subsystem lists (MESLs) define those
systems that must be operational for accomplishment of specific missions. However,
AFI 21-103 states that the “MESL does not determine airworthiness or SoF; technical
data, maintenance crews and aircrew judgement alone determine airworthiness. Do not
use the MESL to gauge ’go/no go’ decisions.”
The SM is the approval authority for all configuration changes to the air system.
Unapproved modifications to the air system are not to be tolerated, because they
invalidate the airworthiness certification. If an unapproved configuration is discovered in
the fleet, the SM/CE must take immediate action to address the airworthiness risk and to
67
MIL-HDBK-514
The maintainers are responsible for maintaining airworthiness of the aircraft within the
limits established in the maintenance manuals. Certain maintainers are given the
special authority to clear red X conditions, thereby indicating that the aircraft is again
safe to fly. Changes to maintenance procedures and repairs beyond the scope of the
maintenance manuals require prior approval from the SM.
This tenet addresses the airworthiness “state” of the aircraft as determined by the
traditional flight crew walk around. It addresses the state of the air system in terms of
aircraft records (e.g., the AFTO Form 781s), failure states of redundant subsystems, and
the completion of any preflight preparation activities that may be required. It also
addresses the condition of the aircraft relative to wear and deterioration (e.g., skin
corrosion, window delaminating/crazing, fluid leaks and tire wear as determined by the
ground crew’s pre/post/thru or basic post-flight inspection).
The SM must assure that sufficient training is made available to the flight crew for
detecting unsafe aircraft conditions and in making judicious decisions to continue the
mission or require maintenance action. The aircrew must have sufficient training to
detect airworthiness problems prior to accepting the aircraft for the mission and during
the mission.
The aircraft commander is responsible for ensuring airworthiness of the aircraft, within
the limits established by the flight manual and the operating procedures established by
the lead command, before flight. The waiver authority for operational instructions is
defined by the operating MAJCOM. Deviations from flight manual limits require SM
approval, except in emergency conditions.
68
MIL-HDBK-514
11.3.1 Air Force Policy Directive 62-4, Standards of Airworthiness for Passenger
Carrying Commercial Derivative Transport Aircraft
This policy directive is focused upon ensuring that USAF commercial derivative
passenger aircraft maintain high levels of safety and ensuring that the Air Force does not
duplicate processes/activities already performed by the FAA. The SM must seek to
obtain and maintain the Type Certificate (TC) for the military configuration unless a
waiver has been granted by AF/XO. These design certifications are used to support the
airworthiness certification process established by the Air Force. AFI 21-107 addresses
sustaining these aircraft. Maintaining total FAA type certification is the preferred method
of assuring airworthiness.
11.3.2 Air Force Policy Directive 62-5, Standards of Airworthiness for Commercial
Derivative Hybrid Aircraft
AFPD 62-5 is focused on establishing high levels of safety in design. It also accounts for
those situations in which the Air Force can take advantage of an established level of
performance and lower costs. It achieves this by procuring a commercial product that is
then modified to perform a mission different from the civilian counterpart/baseline
aircraft. AFPD 62-5 gives preference to civil airworthiness standards for these
commercial derivative, hybrid aircraft. It allows the SM to determine to what extent the
modifications should be FAA type certified (i.e., design is approved by the FAA).
However, the aircraft must be in an FAA certified configuration when it is used for
passenger carrying missions unless a waiver is obtained from HQ AF/XO.
11.3.3 Air Force Policy Directive 62-6, USAF Aircraft Airworthiness Certification
Aircraft owned and operated by the Air Force are considered public use aircraft (per the
Federal Aviation Regulation definition) and, therefore, the Air Force is the responsible
agent for these aircraft. AFPD 62-6 establishes the requirement for airworthiness
certification by the responsible single managers of all USAF aircraft, including those
operated by the Air National Guard and U.S. Air Force Reserve.
Additionally, AFPD 62-6 directs the creation of the Airworthiness Certification Control
Board (AC3B), with representatives from many organizations across the Air Force, and
chaired by ASC/CC. This board is chartered with establishing and maintaining the
airworthiness certification criteria used by the aircraft single managers to certify aircraft
69
MIL-HDBK-514
The CE/LE has the technical authority for the system or end-item and is responsible and
accountable to the SM to
a. Define the applicable airworthiness criteria (the certification basis) for the aircraft
system to be certified.
d. Provide technical content for operating and maintenance manuals that ensure
continued airworthiness of the system.
e. Ensure that all modifications to the system meet the airworthiness criteria that
currently apply to the system.
f. Review all airworthiness advisories and alerts for applicability to the system and
provide disposition recommendations to the SM. If the system is a commercial
derivative, review all FAA issued airworthiness directives and service bulletins
pertaining to the system, and incorporate changes as necessary.
70
MIL-HDBK-514
11.5.3 Creating the certification basis for a new, commercial derivative system
A TACC document is required for the acquisition of aircraft with full FAA type
certification. The SM then lists the FAA type certification as the certification basis for
airworthiness certification (AFPD 62-6, para 2.8.1). MIL-HDBK-516 airworthiness criteria
should also be defined in the certification basis of the TACC document for any unique
design features required to meet Air Force mission requirements that the FAA will not
certify. The SM should approve the TACC before the start of system-level qualification
testing.
Passenger carrying, commercial derivative aircraft must comply with Federal Aviation
Administration (FAA) airworthiness criteria and must maintain their type certification
throughout the service life of the aircraft (AFPD 62-4 and AFI 21-107). Noncompliant
design features are documented on FAA form 8130-2 after HQ AF/XO grants waiver
approval. The TACC document must also address these noncompliant features in
addition to listing the FAA type certification basis.
71
MIL-HDBK-514
Commercial derivative, hybrid aircraft must comply with FAA airworthiness criteria to the
extent practical throughout the service life of the aircraft (AFPD 62-5). Unless a TACC is
provided in the RFP, a task to develop a TACC document should be included in the
RFP/SOO. The document should also be included in the contractual specification, either
directly or by reference, to identify the airworthiness criteria for the portion of the design
that will not be FAA certified. The final TACC document, capturing any additional design
features that the FAA will not certify, should be approved by the SM before the start of
system-level qualification testing to support airworthiness certification prior to DOT&E.
72
MIL-HDBK-514
with FAA certified portions, the FAA certification basis is included in the aircraft
certification basis identified in the TACC document.
d. Supplemental Data: This section includes or provides the location of material that
supplements the airworthiness certification basis. It includes specifications,
instructions, and maintenance procedures for maintaining the airworthiness
certification of the design, and provides specific measurable parameters (i.e., “hard
numbers”) to ensure safe flight of the system.
The focus of these ASC/EN reviews is ensuring proper and complete application of MIL-
HDBK-516 to the system under consideration, as well as ensuring consistency across
the Aeronautical Enterprise. Coordination reviews have resulted in many clarifications
with respect to intent of specific criteria, applicability, and corrections to specific tailored
criteria. Misidentification of nonapplicable criteria as applicable, or applicable criteria as
nonapplicable, has been a common error during certification basis definition.
When the draft TACC document has been developed and coordinated internally by the
program office, a copy of the document should be forwarded to ASC/ENSI. ASC/ENSI
will forward the document to the appropriate subject matter experts (SMEs) for review.
Specific criteria issues are generally resolved between the SMEs and the TACC
submitter to minimize review time. After the SMEs complete their review, ASC/ENSI
generates a summary of issues identified (resolved and unresolved), and forwards it to
ASC/EN with a recommendation for coordination. ASC/ENSI then forwards a copy of
the coordination to the submitting office. The SPO should seek coordination by the user,
per established SPO procedures, before single manager approval of the TACC
document.
Alternatively, if specifically requested when submitting the draft TACC document for
coordination, ASC/ENSI will reply to the submitter with a listing of all SME comments
that require resolution. Upon receipt of the comment responses from the submitting
office, the appropriate ASC/EN technical director conducts a review of the responses
prior to ASC/EN coordination. ASC/ENSI then forwards a copy of the coordination to the
submitting office The SPO should seek coordination by the user before single manager
approval of the TACC document.
73
MIL-HDBK-514
Initial AW FAA
No Legacy No 1. Put TACC document development
Certification Airworthiness
System? requirement on contract
Cert?
2. Update TACC document in each phase
Yes Yes 3. Approve TACC document prior to qual
testing
4. Verify compliance with cert basis
Reference Type Cert Basis
in TACC document
Design,
No Performance, Yes
1. Develop TACC document
Configuration Data 2. Verify utilizing existing data
Available?
74
MIL-HDBK-514
For legacy systems, the program office should gather all currently available and
applicable existing documentation: technical manuals, specifications, test data,
maintenance data, demonstrations, analyses, inspections, configuration data, usage
data, mishap rate, FAA type certificates, etc. The amount of data readily available will
become an important decision-making tool for legacy system SMs and CEs when it
comes time to verify compliance with the certification basis.
At this point it is also necessary to review and validate the program’s change process.
Does the program have an effective change process, and has it been followed
throughout the program? The existence of a disciplined change process can be used to
mitigate the need to revalidate individual past changes; however, if it is determined that
the change process compliance has been inadequate, some criteria may require
reverification. Based upon the data gathered/available, the SM/CE can now determine
the appropriate method/procedure for verifying and documenting compliance.
Because of tight budgets and the various ages of fielded systems, an alternative
approach to airworthiness certification of legacy air systems that complies with the intent
of AFPD 62-6 is warranted. Some legacy systems may not have an adequate paper trail
from the original qualification to the current fleet configuration. For other systems,
excessive effort would be required to search existing data for evidence of compliance
with the airworthiness certification basis. In such cases, the approach suggested below
is a reasonable and technically viable alternative for chief engineers and single
managers to follow for first-time certification of airworthiness.
Single managers with operational aircraft in the field as of the date of first issuance of
AFPD 62-6 (1 Oct 00) may, for the first time only, certify aircraft airworthiness if the
following conditions are met:
75
MIL-HDBK-514
a. The TACC document has been coordinated with ASC/EN and the user, when
appropriate, and approved by the SM.
b. Based on the certification basis, the chief engineer has determined that it is
technically sound to certify aircraft airworthiness after the following conditions have
been verified:
(2) There are no open (without funded closure plans) deficiency reports or
safety recommendations that suggest the aircraft is not performing within the
acceptable level of risk to which the aircraft will be managed in accordance with
the technical data.
The aircraft system must be in compliance with all applicable criteria before the SM can
certify airworthiness without temporary restrictions. AFPD 62-6 requires written
notification to ASC/EN after the SM has certified airworthiness. A copy of the SM
76
MIL-HDBK-514
approved TACC document and the airworthiness certificate (provide a sample if each
aircraft is issued a unique certificate) must be provided with the notification.
AW
Certificate
TACC
(STEP 5)
Document
Compliance
(STEPS 1 & Supporting
Assessment
2) Data
(STEP 4)
Include with notification
to ASC/EN (STEP 3)
A copy of the certificate should be included in the aircraft records (AFTO Form 781s) or
physically displayed in the aircraft to reinforce the directive that unauthorized
modifications will invalidate the airworthiness certification. It also provides reassurance
to the aircrew that the aircraft design, as produced, is airworthy.
For example, an aircraft design calls for a drag chute to be installed for full airworthiness
certification of a particular configuration, but the safety of the drag chute systems has not
yet been totally verified. These aircraft could potentially be operated with a restriction on
field length, etc., and the drag chute actuation system disabled. Before the restrictions
could be lifted, and an unrestricted airworthiness certificate issued, the drag chute
system would have to be verified in compliance with the certification basis.
77
MIL-HDBK-514
There are three FAA certifications relevant to safety of flight of air vehicles: 1) type
certification, which addresses conformance of the design to prescribed airworthiness
standards; 2) production certification, which addresses the production of aircraft under
an approved FAA production system; and 3) airworthiness certification, which addresses
both conformance to type design and the maintenance of a state of airworthiness of a
particular aircraft throughout its operational life.
FAA type certification approves the aircraft design for a specific aircraft model, and it
applies to all like-configured aircraft of that model. Type certification also includes
approval of flight and technical manuals used for operation and maintenance. The FAA
approves major modifications via an amended type certificate or a supplemental type
certificate.
In contrast, FAA airworthiness certification applies to each aircraft tail number. It attests
to the aircraft conforming to the configuration that was type certified and produced by an
FAA-approved production facility and maintained in accordance with its type design
definition by an FAA approved maintenance program. The Air Force less frequently
acquires, and rarely maintains, the FAA airworthiness certification (by tail number)
throughout the life of its systems. The Air Force generally approves its own
maintenance programs, which are outside the realm of FAA airworthiness certification.
It should be noted that the FAA certifications do not address military suitability and
effectiveness. The SM/CE must address suitability and effectiveness with respect to the
planned acquisition/support methodology and the certification aspects. To evaluate
military suitability and effectiveness, the SM should follow the same procedures for non-
FAA certified vehicles outlined elsewhere in this document.
FAA type certification, which is more frequently obtained by the Air Force, is sufficient
basis for AF airworthiness certification for similar usage and environment. The SM/CE
needs assurance that if the aircraft is to be operated in a more severe environment or
manner than its civil counterparts, it is designed (modified) and maintained accordingly.
For example, a civilian certified business jet could be procured and utilized as a trainer,
complete with associated low-level training spectra and all of the abuse a trainer sees in
78
MIL-HDBK-514
its typical service life. The trainer aircraft will see many more pressure and
takeoff/landing cycles in a given timeframe than its civil counterpart. It is up to the
SM/CE to ensure that the impacts of this expected usage are accounted for in both the
design and the life maintenance aspects of OSS&E.
11.7.1.1 FAA full certification (type, production, and airworthiness) obtained and
maintained throughout the life of the system.
In this instance, the SM accepts the certifications as airworthiness approval but
concentrates on the aircraft’s suitability and effectiveness in the intended mission. By
maintaining FAA full certification (type and airworthiness) throughout the life of the
system, the SM relies on the FAA to assure safety of flight throughout the system's life.
The AF must comply with all FAA reporting and maintenance requirements. The aircraft
must have civil registration (i.e., N number), all modifications must be FAA certified, and
AF usage must be comparable to civil usage for this option to be used.
11.7.1.3 FAA type certification does not include all planned Air Force use.
FAA type certification includes approval of the flight envelope and use as defined by the
manufacturer for commercial operation. In many cases, the Air Force may want to
operate the aircraft outside of the FAA-approved envelope. Examples are aerial
refueling as receiver and/or tanker, extended spins for trainers, and operation at
altitudes above the certified maximum altitude. To ensure verification of safety within
these specific, non-FAA-certified regions of flight, the SM should create and verify the
applicable certification basis in a TACC document. Sustainment should follow the
AFPDs, and airworthiness should be maintained following commercial practices and
procedures as closely as possible.
79
MIL-HDBK-514
11.7.1.4 The FAA type certificate does not extend to the actual delivered flight
vehicle.
In this case, modifications to an FAA type certified design are not FAA type certified.
The SM must therefore employ the previously defined USAF airworthiness certification
process.
The following should be verified and documented by the SM/CE to support the waiver
request (step 4 on figure 11):
c. The proposed design can’t be certified through an FAA equivalent level of safety
finding or special condition, and
d. A risk assessment shows that the design won’t compromise Air Force
airworthiness requirements.
80
MIL-HDBK-514
Foreign civil airworthiness authorities (CAA) may or may not have established
reciprocal/bilateral agreements with the FAA defining the degree of acceptance of the
CAA’s type certification. If in doubt as to the status of the foreign government’s
certification authority and competency/acceptability level, it may be best to contact the
FAA to obtain a current status/ruling.
Bilateral agreements provide an alternative means for the FAA to make its findings by
making maximum practicable use of the certification system of another CAA. Through
bilateral agreements, the FAA recognizes the competency of the exporting CAA to
81
MIL-HDBK-514
Aircraft that are airworthiness certified: Compliance with the latest update to MIL-HDBK-
516 is required when making reportable modifications. New criteria for the unmodified
portion of the aircraft should be verified in the same manner as the initial airworthiness
certification for a legacy aircraft.
Aircraft with no approved TACC document: Compliance with the last update to MIL-
HDBK-516 is mandatory.
82
MIL-HDBK-514
f. Changes that affect the operating limits and/or emergency procedures prescribed
by the operator’s flight manual.
(1) Equipment that energizes emission of electromagnetic energy that can affect
any aircraft, subsystem, or allied equipment controls, indicators, or displays, or
that can affect the effectiveness of the navigational system.
83
MIL-HDBK-514
(2) Equipment that emits light or sound energy that can raise aircrew station
noise levels, or that can distract and degrade aircrew performance.
(3) Equipment that cannot be secured with existing restraints during takeoff and
landing phases, thereby increasing the danger to the operator, crew, or
passengers in the event of an accident.
(4) Equipment energized to emit any form of radiation, gases, liquids, or debris
that may be hazardous, such as explosive ordnance, explosive or flammable
fluids, laser energy, and so forth.
(5) Any equipment having an intended use that is in lieu of a standard aircraft
system, subsystem, or component function.
(6) Equipment that is utilized in a crew station where emergency egress may be
degraded through obscuration or some effect on ejection injury potential.
j. Changes that affect the prescribed limits for continued airworthiness. These
changes include additions, deletions, or reconfiguration of hardware and material
substitutions, software revisions, and any repair or replacement not currently authorized
in the technical orders.
Obtain ASC/EN and user coordination early in the modification process on both the draft
MACC document and the updated draft TACC document if it requires an update due to
modification (e.g., updated MIL-HDBK-516, change in criteria applicability). When a
DSO manages the modification, the SM and CE for the modification program provide
evidence that airworthiness criteria applicable to the modification have been properly
84
MIL-HDBK-514
verified and the SM for the platform issues the certification. In all cases, the SM uses
the latest TACC to certify airworthiness.
85
MIL-HDBK-514
12. NOTES
86
MIL-HDBK-514
APPENDIX
A.1 SCOPE
A.1.1 Purpose
This appendix contains the references, definitions, OSS&E plan format memo and plan
outlines, and the configuration management, operational risk management, and
technical order plan checklists. This appendix is for guidance only.
A.2.1 General
The documents listed below are not necessarily all of the documents referenced herein
but are the ones that are needed in order to fully understand the information provided by
this handbook.
SPECIFICATIONS
DEPARTMENT OF DEFENSE
STANDARDS
DEPARTMENT OF DEFENSE
HANDBOOKS
DEPARTMENT OF DEFENSE
DEPARTMENT OF DEFENSE
DoD REGULATIONS
88
MIL-HDBK-514
APPENDIX
DoD INSTRUCTIONS
DLAD 4155.24/
AR 702-7/
SECANAVINST
4855.5B/
AFI 21-115 Product Quality Deficiency Report Program
89
MIL-HDBK-514
APPENDIX
AFPD 63-13 GATM and Navigational Safety Certification for USAF Aircraft
90
MIL-HDBK-514
APPENDIX
AFMCMAN 21-1 Air Force Materiel Command Technical Order System Procedures
The TO Index is only used to check various information (pub date, TO manager, etc)
about tech orders. See https://www.toindex-s.wpafb.af.mil/. For 00 series tech orders,
see http://www.ide.wpafb.af.mil/toprac/Category_00_TOs.htm. For all other TO
requests, order from either JCALS or ATOMS.
OTHER
91
MIL-HDBK-514
APPENDIX
NON-GOVERNMENT PUBLICATIONS
The following non-Government documents form a part of this document to the extent
specified herein. Unless otherwise specified, the issues of the documents which are
DoD adopted are those listed in the latest issue of the DoDISS, and supplement thereto.
(Copies of ASME publications may be obtained from ASME, 22 Law Drive, Box 2300,
Fairfield, NJ 07007-2300; or by calling 1-800-843-2763, ext. 228. Order on-line at:
http://www.asme.org/catalog.
92
MIL-HDBK-514
APPENDIX
A.3.1.2 Airworthiness
The property of a particular air system configuration to safely attain, sustain, and
terminate flight in accordance with the approved usage and limits.
A.3.1.5 Assurance
A planned and systematic pattern of actions necessary to provide confidence that
expected performance is achieved.
93
MIL-HDBK-514
APPENDIX
baseline throughout the operational life of the system or end-item. Multiple metrics may
be required to assess the baseline characteristics.
A.3.1.8 Clearance
A contractor or Government source signed, written statement that indicates the fitness of
a particular component item or principal item for use in a particular application as
established by the achievement of specified criteria.
A.3.1.12 End-item
Equipment that can be used by itself to perform a military function or provides an
enhanced military capability to a system and has a distinct management activity to
control its technical and performance baseline. Examples include the LANTIRN, 60K-
loaders, AN/ALE-45 Countermeasures Dispenser, and Aircraft Tow Bars.
A.3.1.14 Hazard
(a) A condition that is a prerequisite to a mishap. [Ref: MIL-STD-882C]; (b) Any real or
potential condition that can cause injury, illness, or death to personnel; damage to or
94
MIL-HDBK-514
APPENDIX
A.3.1.15 Interface
The performance, functional, and physical attributes required to exist at a common
boundary. [Ref: EIA-649]
A.3.1.17 Integrity
Refers to the essential characteristics of a system, subsystem, or equipment that allows
specific performance, reliability, safety, and supportability to be achieved under specified
operational and environmental conditions over a specific service life. [Ref: MIL-HDBK-
87244]
A.3.1.21 Mishap
An unplanned event or series of events resulting in death, injury, occupational illness,
damage to or loss of equipment or property, or damage to the environment. [Ref: MIL-
STD-882D]
95
MIL-HDBK-514
APPENDIX
96
MIL-HDBK-514
APPENDIX
A.3.1.29 Performance
A measure characterizing a physical or functional attribute relating to the execution of an
operation or function. Performance attributes include quantity (how many or how much),
quality (how well), coverage (how much area, how far), timeliness (how responsive, how
frequent), and readiness (availability, mission/operational readiness). Performance is an
attribute to be measured for all systems, people, products, and processes including
those for development, production, verification, deployment, operations, support,
training, and disposal. Thus, supportability parameters, manufacturing process
variability, reliability, and so forth are all performance measures. [Ref: EIA -649]
When used for reprocurement of a CI, the product baseline documentation also includes
the allocated configuration documentation to ensure that performance requirements are
not compromised.
97
MIL-HDBK-514
APPENDIX
A.3.1.33 Safety
Freedom from those conditions that can cause death, injury, occupational illness, or
damage to or loss of equipment or property, or damage to the environment. [Ref: MIL-
STD-882D]
A.3.1.37 System
A specific grouping of components or elements designed and integrated to perform a
military function. System examples include the A-10 weapon system (including the air
vehicle, support equipment, training equipment, engines, diagnostics, ground station,
and technical data), F101 engine, and C-17 Automatic Test System.
98
MIL-HDBK-514
APPENDIX
A.3.2 Acronyms
ACAT I Acquisition category I
AE Aeronautical Enterprise
99
MIL-HDBK-514
APPENDIX
AT anti-tampering
100
MIL-HDBK-514
APPENDIX
CANN cannibalization
CE chief engineer
CI configuration item
CM configuration management
101
MIL-HDBK-514
APPENDIX
DR deficiency report
HQ headquarters
102
MIL-HDBK-514
APPENDIX
LC lead command
LE lead engineer
MS milestone
103
MIL-HDBK-514
APPENDIX
PC personal computer
QA quality assurance
RF radio frequency
104
MIL-HDBK-514
APPENDIX
SM single manager
TBD to be determined
TC type certification
TM technical manual
TO technical order
105
MIL-HDBK-514
APPENDIX
106
MIL-HDBK-514
APPENDIX
107
MIL-HDBK-514
APPENDIX
108
MIL-HDBK-514
APPENDIX
2. Develop a draft TO management plan (TOMP) and tech order related request for
proposal (RFP) inputs (see DoD 5010.12-M and TO 00-5-3 for RFP guidance).
3. Plan for TO sustainment/updates via the annual comprehensive Air Force tech
order plan (CAFTOP).
CONCLUDING MATERIAL
Custodian: Preparing Activity:
Air Force - 11 Air Force - 11
109
STANDARDIZATION DOCUMENT IMPROVEMENT PROPOSAL
INSTRUCTIONS
1. The preparing activity must complete blocks 1, 2, 3, and 8. In block 1, both the document number and revision letter should be
given.
2. The submitter of this form must complete blocks 4, 5, 6, and 7, and send to preparing activity.
3. The preparing activity must provide a reply within 30 days from receipt of the form.
NOTE: This form may not be used to request copies of documents, nor to request waivers, or clarification of requirements on current
contracts. Comments submitted on this form do not constitute or imply authorization to waive any portion of the referenced document(s)
or to amend contractual requirements.
6. SUBMITTER
a. NAME (Last, First, Middle Initial) b. ORGANIZATION
c. ADDRESS (Include Zip Code) d. TELEPHONE (Include Area Code) 7.DATE SUBMITTED
(1) Commercial (YYYYMMDD)
(2) AUTOVON
(if applicable)
8. PREPARING ACTIVITY
a. NAME ASC/ENOI (AF-11) b. TELEPHONE Include Area Code)
(1) Commercial (937)255-6296/-6282 (2) AUTOVON 785-6296/-6282
c. ADDRESS (Include Zip Code) IF YOU DO NOT RECEIVE A REPLY WITHIN 45 DAYS, CONTACT:
2530 LOOP ROAD WEST Defense Standardization Program Office (DLSC-LM)
WRIGHT-PATTERSON AFB, OH 45433-7101 8725 John J. Kingman road, Suite 2533, Ft. Belvoir, VA 22060-2533
Telephone (703) 767-6888 AUTOVON 427-6888
DD Form 1426, FEB 1999 (EG) PREVIOUS EDITION IS OBSOLETE WHS/DIOR, Feb 99