
SORT: 5205.8
DOCI: DODD 5205.8
DATE: 19910220
TITL: DODD 5205.8 Access to Classified Cryptographic Information, February
20, 1991, ASD(C3I)
References: (a) National Telecornmunications and Information Systems
Security Policy (NTISSP) No. 3, "National Policy
for Granting Access to U.S. Classified
Cryptographic Information," Decernber 19, 1988
(b) Executive Order 12333, "United States Intelligence
Activities, " Decernber 4, 1981
(c) National Telecoinmunications and Information Systems
Security Instruction (NTISSI) No. 4001, "Controlled
Cryptographic Items," March 25, 1985
(d) DoD 5200.l-R, "Information Security Program
Regulation," June 1986, authorized by DoD Directive
5200.1, June 7, 1982
(e) through (i), see enclosure 1
A. PURPOSE
This Directive establishes under reference (a) a program to govern the
granting of access to classified cryptographic information that is owned,
produced by or for, or is under the control of the Department of Defense
and is in accordance with reference (b) to protect national security
information.
B. APPLICABILITY AND SCOPE
This Directive:
1. Applies to the Office of the Secretary of Defense (OSD), the
Military Departments, the Chairman of the Joint Chiefs of Staff and the
Joint Staff, the Unified and Specified Commands, the Defense Agencies, and
the DoD Field Activities (hereafter referred to collectively as "the DoD
Components")
2. Applies to all meinbers of the U.S. Armed Forces, civilian
employees of the Department of Defense and employees of agents of the DoD
Components who have access to classified cryptographic information. she
term "agents," as used herein, refers to contractors, consultants, and
other persons affiliated with the Department of Defense.
3. Pertains to persons whose duties require continuing access to
classified cryptographic information. (See section C., below.)
Accordingly, this Directive concerns those persons assigned:
a. As cryptographic material custodians, alternates, or their
equivalents.
b. As producers or developers of cryptographic key or logic.
c. As cryptographic maintenance, engineering, or installation
technicians.
d. To supply points where cryptographic keying materials are
generated or stored, and to those having access to such materials.
e. To secure telecommunications facilities located on the ground, on
board ship, or on communications support aircraft and whose duties require
keying of cryptographic equipment.
f. To prepare, authenticate, or decode nuclear control orders (valid
or exercise).
g. Any responsibility requiring or enabling access to classified
cryptographic media.
4. Is not applicable to individuals whose duties are to operate (not
to key or maintain) systems using cryptographic equipment.
5. Excludes Controlled Cryptographic Items as defined in NTISSI No.
4001 (reference (c)).
C. DEFINITION
Classified Crvptoqraphic Information, with respect to this access
program, is specified as:
1. Cryptographic key and authenticators that are classified pursuant
to DoD 5200.l-R (reference (d)) and are designated as SECRET CRYPTO, or
TOP-SECRET CRYPTO.
2. Classified cryptographic media that embody, describe, or implement
a classified cryptographic logic, to include, but not be limited to, full
maintenance manuals, cryptographic descriptions, drawings of cryptographic
logic, specifications describing a cryptographic logic, and cryptographic
computer software.
D. POLICY
It is DoD policy that a person may be granted access to classified
cryptographic information, as specified in sections B. and C., above, only
if that person:
1. Is a U.S. citizen;
2. Is a civilian employee of the Department of Defense, a member of a
Military Service, a DoD-cleared contractor or employee of such contractor,
or is employed as a DoD representative (including consultants of the
Department of Defense);
3. Requires access to perform official duties for, or on behalf of,
the Department of Defense;
4. Possesses a security clearance and personnel security
investigation appropriate to the level of the classified cryptographic
information to be accessed, in accordance with DoD 5200.2-R (reference
(e));
5. Receives a security briefing appropriate to the cryptographic
information to be accessed;
6. Acknowledges the granting of access by signing a cryptographic
access certificate;
7. Agrees to report foreign travel and any form of contact with
foreign citizens, in accordance with DoD 5200.2-R (reference (e)); and
8. Acknowledges the possibility of being subject to a non-lifestyle,
counterintelligence scope polygraph examination administered in accordance
with DoD Direcbe used to advantage by a foreign nation.
Classified cryptographic information is especially sensitive because
it is used to protect other classified information. Any particular piece
of cryptographic keying material and any specific cryptographic technique
may be used to protect a large.quantity of classified information during
transmission. If the integrity of the cryptographic system is breached at
any point, all information protected by the system may be compromised.
The safeguards placed on classified cryptographic information are a
necessary component of Government programs to ensure that our nation's
vital secrets are not compromised.
Because access to classified cryptographic information is granted on a
strict need-to-know basis, you will be given access to only that
cryptographic information necessary in the performance of your duties.
You are required to become familiar with (insert, as appropriate,
Department or Agency implementing Directives covering the protection of
cryptographic information). Cited Directives are attached in a briefing
book for your review at this time.
Especially important to the protection of classified cryptographic
information is the timely reporting of any known or suspected compromise
of this information. If a cryptographic system is compromised, but the
compromise is not reported, the continued use of the system can result in
the loss of all information protected by it. If the compromise is
reported, steps can be taken to lessen an adversary's advantage gained
through the compromise of the information.
As a condition of access to classified cryptographic information, you
must acknowledge that you may be subject to a non-life-style,
counterintelligence scope polygraph examination. This examination will be
administered in accordance with DoD Directive 5210.48 and applicable law.
The relevant questions in this polygraph examination will only encompass
questions concerning espionage, sabotage, or questions relating to
unauthorized disclosure of classified information or unreported foreign
contacts. If you do not, at this time, wish to sign such an
acknowledgment as a part of executing a cryptographic access
certification, this briefing will be terminated at this point and the
briefing administrator will so annotate the cryptographic access
certificate. Such refusal will not be cause for adverse action but will
result in your being denied access to classified cryptographic
information.
You should know that intelligence services of some foreign governments
prize the acquisition of classified cryptographic information. They will
go to extreme lengths to compromise U.S. citizens and force them to
divulge cryptographic techniques and materials that protect the nation's
secrets around the world. You must understand that any personal or
financial relationship with a foreign government's representative could
make you vulnerable to attempts at coercion to divulge classified
cryptographic information. You should be alert to recognize those
attempts so that you may successfully counter them. The best personal
policy' is to avoid discussions that reveal your knowledge of, or access
to, classified cryptographic information and thus avoid highlighting
yourself to those who would seek the information you possess. Any
attempt, either through friendship or coercion, to solicit your knowledge
regarding classified cryptographic information must be reported
immediately to (insert appropriate security office).
In view of the risks noted above, unofficial travel to certain
communist or other designated countries may require the prior approval of
(insert appropriate security office). It is essential that you contact
(insert appropriate security office) if such unofficial travel becomes
necessary.
Finally, you must know that, should you willfully or negligently
disclose to any unauthorized persons any of the classified cryptographic
information to which you will have access, you may be subject to
administrative and civil sanctions, including adverse personnel actions,
as well as criminal sanctions under the Uniform Code of Military Justice
(UCMJ) and/or the criminal laws of the United States, as appropriate.
(DATA OMITTED)
---------------------------------