DODD 5205.08 11/08/07
Access to Classified Cryptographic Information
|Publication Date:||8 November 2007|
APPLICABILITY AND SCOPE
Applies to the Office of the Secretary of Defense, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field Activities, and all other organizational entities within the Department of Defense (hereafter referred to collectively as the "DoD Components").
Applies to all members of the U.S. Armed Forces, civilian employees of the Department of Defense and, consistent with DoD 5220.22-R (Reference (e)), contractors, consultants, and other persons employed by or affiliated with the Department of Defense who have access to classified U.S. cryptographic information and whose duties require continuing access thereto. (See section 3.) Accordingly, this Instruction applies to those persons assigned:
As cryptographic material custodians, alternates, or their equivalents.
As cryptographic key or logic producers or developers.
As cryptographic maintenance, engineering, or installation technicians.
To supply points where cryptographic keying materials are generated or stored, those having access to such materials.
To secure telecommunications facilities located on the ground, on board ship, or communications support aircraft and whose duties require keying of cryptographic equipment.
To prepare, authenticate, or decode nuclear control orders (valid or exercise).
To any other responsibility requiring or enabling access to classified cryptographic media.
Does not apply to individuals whose duties are to operate (but not to key or maintain) systems using cryptographic equipment.
Excludes controlled cryptographic items as defined in NTISSI No. 4001 (Reference (f)).
Shall not alter existing authorities of the Director of National Intelligence under Executive Order 12333 (Reference (g)).
REISSUANCE AND PURPOSE
Reissues Reference (a) as a DoD Instruction in accordance with the guidance in Reference (b) and the authority of Reference (c).
Updates the policies and responsibilities for the program established under Reference (d) to govern the granting of access to United States (U.S.) classified cryptographic information that is owned, controlled, and produced by or for the Department of Defense.