In addition to those policies that apply to all subdisciplines of ISS, there are certain policies that deal exclusively with communications security. These policies establish requirements to deny unauthorized persons access to classified or unclassified-sensitive information while it is being electrically transmitted from the sender to the receiver. They also establish requirements to prevent the derivation of valuable information from other aspects of communications (such as traffic flow and message analysis), and to enhance the authenticity of communications.
b. Telecommunications system security objectives will be an integral part of program planning for all telecommunications systems, including those integral to weapons systems and weapons support systems, and will be addressed throughout the system's life cycle. Systems planning shall include, at a minimum, threat analysis and vulnerability assessments to support operational requirements, to establish resource allocation priorities, and to establish and satisfy requirements for countermeasures. If the system includes telecommunications and AIS, the planning process will be integrated to include both the telecommunications and the AIS security aspects.
c. Only approved cryptosystems will be used within the Army. Approved cryptosystems include-
(2) Government-developed cryptographic equipment produced commercially under the NSA authorized vendor program.
(3) Commercially developed and produced cryptoequipment using an algorithm approved by NSA under the Commercial COMSEC Endorsement Program.
(4) Commercially developed and produced cryptoequipment using the Data Encryption Standard (DES).
d. Commercially developed equipment using the DES or other commercially developed algorithm will not be used to protect classified information.
e. Systems will be designed and deployed using embedded cryptography to the maximum extent possible. When embedded cryptography is not employed, off-line machine, automanual, or manual systems will be used to provide the required security, if the transmission is not otherwise protected.
f. COMSEC requirements for Army systems will emphasize small, reliable, lightweight, low-powered equipment that is unclassified when unkeyed. COMSEC will be achieved with no increase in the frequency band width required by the equipment it supports. Requirements must also address interoperability, both for routine and contingency operations.
g. Only keying material produced by NSA, or generated by NSA-approved key generators, will be used for keying cryptosystems which protect classified or unclassified-sensitive information.
h. Maximum use will be made of remote electronic keying and rekeying of cryptographic systems that have that capability.
i. Classified and unclassified-sensitive communications between Army activities and contractors will be protected according to this regulation. Procedures for contractors to procure the necessary equipment will be published by HQDA (SAIS-ADS).
j. Authentication will be used to defend against imitative communications deception and establish authenticity of stations, transmissions, and communicators. Authentication may be inherent to the communications equipment.
k. Safeguarding and control of COMSEC material, including controlled cryptographic items (CCI), is governed by AR 380-40 and TB 380-40-22.
l. The Army Communications-Electronics Operation Instructions Program will be implemented per AR 105-64.
b. Only NSA-endorsed COMSEC products will be used to encrypt classified information.
b. US1 information described in paragraph 1-5c(1) will be protected in transmission by an NSA-approved technique (see e below) unless a waiver is granted under procedures established by HQDA (SAIS-ADS).
c. US2 information described in paragraph 1-5c(2)(a) also requires protection in transmission unless waived by an official authorized to accredit AIS processing unclassified-sensitive data as specified in 3-8a(7) or 3-8b(5). If the transmission of this data is included in the accreditation of an AIS, the waiver will be documented and approved as part of the AIS accreditation. If protection is not waived, techniques approved by NSA (see e below) or the National Institute of Standards and Technology (NIST) will be used to protect the data.
d. US2 information described in paragraph 1-5c(2)(b) does not require protection to ensure confidentiality, nor is a waiver to protection requirements required. However, protection measures may be used to ensure data integrity or availability. Techniques approved by NSA (see e below), NIST, or other techniques (such as redundancy checks or message acknowledgments) may be appropriate.
e. NSA-approved techniques that may be used separately, or in various combinations, to protect the transmission of unclassified-sensitive information are-
(b) Type II products. Type II products may be used only to protect unclassified information, and are handled as an Endorsed for Unclassified Cryptographic Item (EUCI).
(c) DES equipment. Unclassified cryptographic equipment employing the DES algorithm that NSA has endorsed as meeting the requirements of Federal Standard 1027 may be used only to protect the transmission of unclassified information.
(b) Adequate measures are implemented so that circuits are maintained on cable and not converted to unencrypted radio transmission.
b. In the absence of embedded or machine cryptosystems for existing radio systems, automanual or manual cryptosystems will be used to provide the needed security. However, all future procurements must comply with 4-4a of this regulation.
c. Excluded from the requirements of 4-4a and 4-4b are-
(2) Commercial systems purchased or obtained to fulfill an administrative function.
(3) Radios used for public safety communications with civil agencies or to communicate on civil aviation channels. This exclusion does not apply to communications dealing with aviation combat operations.
b. A PDS will be used only if it is cost-effective and is sufficiently controlled to prevent covert penetration and interception.
c. AIS that include a PDS to transmit data will not be accredited to operate until the PDS has been approved. The PDS approval will be cited in the COMSEC portion of the accreditation packet, and a copy of the approval will be attached.
d. A PDS must be constructed according to criteria published by HQDA (SAIS-ADS).
(2) MACOM commanders, or their designees at MACOM level, for their organic activities.
c. Commanders of battalion and higher echelons may approve circuits for clear text electrical transmission of secret and confidential information in tactical environments. Under combat conditions, commanders may delegate this authority to the company level. Tactical PDS will not be approved for clear text transmission of top secret information.
d. Once a PDS is approved, no changes in installation, additions, or use may be made until approval for such changes has been granted by the approval authority.
e. Requests to approve a PDS will be submitted through channels to the appropriate approval authority. Requests will be classified "confidential" as a minimum and will contain the following information:
(2) A statement of the classification of information to be transmitted on the PDS.
(3) A copy of the building floor plan (or a diagram of the field area as appropriate) designating the following:
(a) Proposed cable route and location of subscriber sets, distribution frames, junction boxes, and any other components associated with the circuit.
(b) Other wiring along the PDS route.
(4) Description of the cable installation (for example, 24 pairs of shielded cable in rigid steel conduit, 6 pairs of shielded cable in floor, or fiber optic cable), and the cable length.
(5) Description and nomenclature of terminal and subscriber equipment to be used.
(6) Clearance of individuals having access to the circuit.
(7) Type of guards (for example, U.S. Military, U.S. civilian, foreign civilian), and their security clearance or access authorization status.
(8) Description of access control and surveillance of uncleared personnel who may be allowed entry into the area housing any part of the PDS.
(9) Identification of the power source to be used for the PDS, and a statement of the distance to the nearest point where undetected tampering would be possible.
(10) A statement that teletypewriter circuits will or will not use low-level keying and signaling. This statement is not applicable to fiber optic circuits.
(11) A justification for using the proposed PDS.
(12) A statement concerning any deviations from the established PDS criteria, and an evaluation of their security implications.
(13) For PDS used with top secret information, a copy of the INSCOM evaluation.