Index


SORT: 5205.8

DOCI: DODD 5205.8

DATE: 19910220

TITL: DODD 5205.8  Access to Classified Cryptographic Information, February

20, 1991, ASD(C3I)



References:   (a)  National Telecornmunications and Information Systems

              Security Policy (NTISSP) No. 3, "National Policy

              for Granting Access to U.S. Classified

              Cryptographic Information," Decernber 19, 1988

         (b)  Executive Order 12333, "United States Intelligence

              Activities, " Decernber 4, 1981

         (c)  National Telecoinmunications and Information Systems

              Security Instruction (NTISSI) No. 4001, "Controlled

              Cryptographic Items," March 25, 1985

         (d)  DoD 5200.l-R, "Information Security Program

              Regulation," June 1986, authorized by DoD Directive

              5200.1, June 7, 1982

         (e)  through (i), see enclosure 1



A.  PURPOSE



This Directive establishes under reference (a) a program to govern the

granting of access to classified cryptographic information that is owned,

produced by or for, or is under the control of the Department of Defense

and is in accordance with reference (b) to protect national security

information.



B.  APPLICABILITY AND SCOPE



This Directive:



1.  Applies to the Office of the Secretary of Defense (OSD), the

Military Departments, the Chairman of the Joint Chiefs of Staff and the

Joint Staff, the Unified and Specified Commands, the Defense Agencies, and

the DoD Field Activities (hereafter referred to collectively as "the DoD

Components")



2.  Applies to all meinbers of the U.S. Armed Forces, civilian

employees of the Department of Defense and employees of agents of the DoD

Components who have access to classified cryptographic information.  she

term "agents," as used herein, refers to contractors, consultants, and

other persons affiliated with the Department of Defense.



3.  Pertains to persons whose duties require continuing access to

classified cryptographic information.  (See section C., below.)

Accordingly, this Directive concerns those persons assigned:



a.  As cryptographic material custodians, alternates, or their

equivalents.



b.  As producers or developers of cryptographic key or logic.



c.  As cryptographic maintenance, engineering, or installation

technicians.



d.  To supply points where cryptographic keying materials are

generated or stored, and to those having access to such materials.



e.  To secure telecommunications facilities located on the ground, on

board ship, or on communications support aircraft and whose duties require

keying of cryptographic equipment.



f.  To prepare, authenticate, or decode nuclear control orders (valid

or exercise).



g.  Any responsibility requiring or enabling access to classified

cryptographic media.



4.  Is not applicable to individuals whose duties are to operate (not

to key or maintain) systems using cryptographic equipment.



5.  Excludes Controlled Cryptographic Items as defined in NTISSI No.

4001 (reference (c)).



C.  DEFINITION



Classified Crvptoqraphic Information, with respect to this access

program, is specified as:



1.  Cryptographic key and authenticators that are classified pursuant

to DoD 5200.l-R (reference (d)) and are designated as SECRET CRYPTO, or

TOP-SECRET CRYPTO.



2.  Classified cryptographic media that embody, describe, or implement

a classified cryptographic logic, to include, but not be limited to, full

maintenance manuals, cryptographic descriptions, drawings of cryptographic

logic, specifications describing a cryptographic logic, and cryptographic

computer software.



D.  POLICY



It is DoD policy that a person may be granted access to classified

cryptographic information, as specified in sections B. and C., above, only

if that person:



1.  Is a U.S. citizen;



2.  Is a civilian employee of the Department of Defense, a member of a

Military Service, a DoD-cleared contractor or employee of such contractor,

or is employed as a DoD representative (including consultants of the

Department of Defense);



3.  Requires access to perform official duties for, or on behalf of,

the Department of Defense;



4.  Possesses a security clearance and personnel security

investigation appropriate to the level of the classified cryptographic

information to be accessed, in accordance with DoD 5200.2-R (reference

(e));



5.  Receives a security briefing appropriate to the cryptographic

information to be accessed;



6.  Acknowledges the granting of access by signing a cryptographic

access certificate;



7.  Agrees to report foreign travel and any form of contact with

foreign citizens, in accordance with DoD 5200.2-R (reference (e)); and



8.  Acknowledges the possibility of being subject to a non-lifestyle,

counterintelligence scope polygraph examination administered in accordance

with DoD Direcbe used to advantage by a foreign nation.



Classified cryptographic information is especially sensitive because

it is used to protect other classified information.  Any particular piece

of cryptographic keying material and any specific cryptographic technique

may be used to protect a large.quantity of classified information during

transmission.  If the integrity of the cryptographic system is breached at

any point, all information protected by the system may be compromised.

The safeguards placed on classified cryptographic information are a

necessary component of Government programs to ensure that our nation's

vital secrets are not compromised.



Because access to classified cryptographic information is granted on a

strict need-to-know basis, you will be given access to only that

cryptographic information necessary in the performance of your duties.

You are required to become familiar with (insert, as appropriate,

Department or Agency implementing Directives covering the protection of

cryptographic information).  Cited Directives are attached in a briefing

book for your review at this time.



Especially important to the protection of classified cryptographic

information is the timely reporting of any known or suspected compromise

of this information.  If a cryptographic system is compromised, but the

compromise is not reported, the continued use of the system can result in

the loss of all information protected by it.  If the compromise is

reported, steps can be taken to lessen an adversary's advantage gained

through the compromise of the information.



As a condition of access to classified cryptographic information, you

must acknowledge that you may be subject to a non-life-style,

counterintelligence scope polygraph examination.  This examination will be

administered in accordance with DoD Directive 5210.48 and applicable law.

The relevant questions in this polygraph examination will only encompass

questions concerning espionage, sabotage, or questions relating to

unauthorized disclosure of classified information or unreported foreign

contacts.  If you do not, at this time, wish to sign such an

acknowledgment as a part of executing a cryptographic access

certification, this briefing will be terminated at this point and the

briefing administrator will so annotate the cryptographic access

certificate.  Such refusal will not be cause for adverse action but will

result in your being denied access to classified cryptographic

information.



You should know that intelligence services of some foreign governments

prize the acquisition of classified cryptographic information.  They will

go to extreme lengths to compromise U.S. citizens and force them to

divulge cryptographic techniques and materials that protect the nation's

secrets around the world.  You must understand that any personal or

financial relationship with a foreign government's representative could

make you vulnerable to attempts at coercion to divulge classified

cryptographic information.  You should be alert to recognize those

attempts so that you may successfully counter them.  The best personal

policy' is to avoid discussions that reveal your knowledge of, or access

to, classified cryptographic information and thus avoid highlighting

yourself to those who would seek the information you possess.  Any

attempt, either through friendship or coercion, to solicit your knowledge

regarding classified cryptographic information must be reported

immediately to (insert appropriate security office).



In view of the risks noted above, unofficial travel to certain

communist or other designated countries may require the prior approval of

(insert appropriate security office).  It is essential that you contact

(insert appropriate security office) if such unofficial travel becomes

necessary.



Finally, you must know that, should you willfully or negligently

disclose to any unauthorized persons any of the classified cryptographic

information to which you will have access, you may be subject to

administrative and civil sanctions, including adverse personnel actions,

as well as criminal sanctions under the Uniform Code of Military Justice

(UCMJ) and/or the criminal laws of the United States, as appropriate.



(DATA OMITTED)



---------------------------------