Active Incident? 24/7 Response →
Witness

For Enterprise

ITAR Compliance Services

ITAR-aligned cybersecurity programs for defense contractors. Technical data controls, file sharing, cloud storage, and DDTC registration support.

ITAR-aligned cybersecurity for defense contractors and dual-use exporters

We build the cybersecurity program that backs an ITAR-registered manufacturer or service provider. technical-data segregation, citizenship-controlled access, file-sharing and cloud-storage controls that meet 22 CFR §120-130, and the audit posture that survives a DDTC inquiry. We work alongside your export-control counsel, not in their place.

What ITAR actually requires of your IT

ITAR (International Traffic in Arms Regulations) does not prescribe a cybersecurity framework the way NIST 800-171 does. It prescribes outcomes: technical data defined as defense articles must be controlled so it is not transferred to foreign persons without authorization. including your own employees, contractors, cloud providers, and email recipients who are not US persons. The cybersecurity work is in proving you can enforce that.

The four hard problems most contractors get wrong

  1. Cloud storage and SaaS. The default Microsoft 365, Google Workspace, Dropbox, Slack, and Notion environments allow any tenant administrator to access any tenant data. ITAR requires that foreign-national personnel at the cloud provider not be able to access your technical data without authorization. Solution: use the GCC High, AWS GovCloud, or Azure Government variants. NOT the commercial tier. for any environment touching ITAR-controlled technical data.
  2. Citizenship-controlled access. "Need-to-know" plus "US persons only" (or licensed-foreign-person only) for every system holding technical data. Active Directory groups, conditional access, audit logging that proves who accessed what.
  3. Email and file transfer. Standard SMTP routes mail through servers in multiple countries. ITAR-grade email requires US-only routing, encrypted channels, and recipient verification. Most "encrypted email" products do not satisfy ITAR if the encryption keys are held outside the US.
  4. Endpoint and device controls. Mobile device management with jurisdictional control on cross-border travel, full-disk encryption, USB controls, and documented procedures for foreign travel involving devices that may hold technical data.

What we deliver

Pairs with

Engagement structures

What we will not do

Available as referral or white-label

We deliver ITAR cybersecurity directly to manufacturers and service providers, sub- contract for IT firms and MSPs whose defense-contractor clients need an ITAR specialist, and partner with export-control counsel on combined legal-plus-technical engagements. Compensation negotiable per relationship.

Related

How We Work

A confidential, structured engagement.

01

Confidential Consultation

A direct conversation with Quinn, the founder and CEO who oversees every engagement. NDA-protected. No sales process.

02

Scoped Engagement

A clear written proposal with defined deliverables, timeline, and pricing. No hidden costs.

03

Investigation and Findings

Forensic work conducted to court-admissible standards, with regular communication and a written summary you can act on.

Sister Brand

Same firm. Same legal entity. Same Quinn.Also available through varcoe.ai for B2B buyers.

Both brands are operated by Blueberry Security Global, Inc., a Delaware C-corporation. Quinnlan Varcoe (Founder and CEO) sets the methodology, oversees Alex Riffenburgh and the practitioner team that executes the work, and reviews every case before findings leave the practice under either brand. The split is by audience and brand voice, not by capability.

Witness (you are here)

The parent brand for the practice. Court-admissible methodology, senior practitioner on every engagement, NDA-protected consultations. Right front door for consumer, attorney, family- office, and most enterprise buyers who want to talk to Quinn directly.

Varcoe (B2B sister brand)

Compliance and GRC

The B2B front door for the same practice. Procurement workflows, vendor onboarding, MSA paper, RFP responses. Useful when your buying process expects a B2B website and a B2B sales motion for ITAR Compliance Services.

Visit varcoe.ai/itar-compliance

Meet Your Practitioner

Quinnlan Varcoe

Founder & CEO

With operational experience across Fortune 50 security programs and the defense industrial base, Quinnlan founded Witness in 2022 to provide clients with the caliber of expertise typically reserved for the largest enterprises. Her work in threat intelligence and digital forensics has earned the trust of 26,000+ cybersecurity professionals who follow her analysis.

“26,000 professionals follow my work because I say what others won't — and I can back it up technically.”

Fortune 50 BackgroundDefense IndustryThreat IntelligenceDigital PrivacyIncident Response
Quinnlan Varcoe, Founder & CEO

Certified Expertise

GIAC · AWS · Splunk · CompTIA

Frequently asked about ITAR

Quinnlan Varcoe, Founder & CEO

Schedule Your Session

Schedule a confidential consultation

A direct conversation with Quinn, the founder and CEO who oversees every engagement. NDA-protected. No sales process. Most engagements begin within 48 hours.

Trusted by partners across the practice

DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management
DAS Health
Exhibit A Cyber
Ally Security
KIRO Group
Black Mirage
Kalles Group
Gridware
CQR
Archstone Security
Cyvergence
Sentinel Cyber
Cloud Underground
Seron Security
Hexen
Koru Risk Management