Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

Similar documents
Subj: COMMUNICATIONS SECURITY EQUIPMENT MAINTENANCE AND TRAINING

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

Subj: ACCEPTANCE AND USE OF VOLUNTARY SERVICES IN THE NAVY

Commanding Officer, Marine Corps Air Station, Cherry Point Distribution List

Department of Defense INSTRUCTION

Subj: UNIFORM MATERIEL MOVEMENT AND ISSUE PRIORITY SYSTEM

3. Scope and Applicability. This instruction is applicable to BUPERS commands and subordinate activities.

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

Subj: DEFENSE CIVILIAN INTELLIGENCE PERSONNEL SYSTEM (DCIPS)

OPNAVINST A N13 6 Dec Subj: LATERAL TRANSFER AND REDESIGNATION OF OFFICERS IN THE NAVY

Subj: NAVY HEADQUARTERS CRISIS MANAGEMENT PROCEDURES AND ORGANIZATION. a. The clarification of Navy service watch cell and conditions I and II watch.

Subj: NAVY ACCELERATED ACQUISITION FOR THE RAPID DEVELOPMENT, DEMONSTRATION, AND FIELDING OF CAPABILITIES

OPNAVINST B N98 4 Jun 2018

Subj: COMMUNICATIONS SECURITY (COMSEC) MONITORING OF NAVY TELECOMMUNICATIONS AND AUTOMATED INFORMATION SYSTEMS (AIS)

Subj: CIVILIAN TIME AND ATTENDANCE FOR THE BUREAU OF NAVAL PERSONNEL

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Department of Defense DIRECTIVE

OPNAVINST C N2/N6 31 Mar Subj: UNITED STATES NAVAL COOPERATION AND GUIDANCE FOR SHIPPING

February 11, 2015 Incorporating Change 4, August 23, 2018

OPNAVINST N2/N6 19 Aug 2014

SECNAVINST E OUSN 17 May 12 SECNAV INSTRUCTION E. From: Secretary of the Navy

Subj: PUBLIC AFFAIRS-VISUAL INFORMATION TRAINING WITH INDUSTRY PROGRAM

DEPAR"rMENT OF "rhe NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC

Subj: PROCEDURES FOR REQUESTING PUBLIC AFFAIRS SUPPORT

COMSEC. Communications Security

Subj: MISSION, FUNCTIONS, AND TASKS OF THE BUREAU OF NAVAL PERSONNEL

Subj: CERTIFICATION OF THE AVIATION CAPABILITY OF SHIPS OPERATING AIRCRAFT

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

OPNAVINST F N09D 2 JUL 2010

NAVY CONTINUITY OF OPERATIONS PROGRAM AND POLICY

Subj: IDENTIFICATION OF MAJOR PROGRAM MANAGER EQUIVALENT BILLETS

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Subj: NAVY NUCLEAR COMMAND, CONTROL, AND COMMUNICATIONS EXECUTIVE STEERING COMMITTEE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

CHANGES TO THE NAVY DIRECTIVES PROGRAM FOR ECHELON 2 DIRECTIVES CONTROL POINTS AND MANAGERS

Subj: MANAGEMENT AND CONTROL OF LEATHER FLIGHT JACKETS

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Subj: APPROVAL PROCESS FOR PUBLIC RELEASE OF INFORMATION

OPNAVINST C N4 31 May 2012

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Subj: THREAT SUPPORT TO THE DEFENSE ACQUISITION SYSTEM

Subj: APPOINTMENT OF OFFICERS IN THE CHAPLAIN CORPS OF THE NAVY

Subj: SCOPE, LIMITATIONS, CERTIFICATION, UTILIZATION, AND PHYSICIAN OVERSIGHT OF CERTIFIED ATHLETIC TRAINERS

Subj: ROLE AND RESPONSIBILITIES RELATED TO MEDICAL DEPARTMENT SPECIALTY LEADERS

Subj: IMPLEMENTATION OF THE DEFENSE STANDARDIZATION PROGRAM IN THE DEPARTMENT OF THE NAVY

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

Subj: DISCLOSURE OF MILITARY INFORMATION TO FOREIGN GOVERNMENTS AND INTERESTS

(c) DoD Instruction of 11 March 2014 (d) SECNAVINST D (e) CNO WASHINGTON DC Z Apr 11 (NAVADMIN 124/11)

a. To promulgate policy on cost analysis throughout the Department of the Navy (DON).

Subj: NAVY ENLISTED OCCUPATIONAL CLASSIFICATION SYSTEM

UNCLASSIFIED. Information Technology Security Guidance for Purchasing CSEC-Approved Cryptographic Equipment from the United States Government ITSG-26

Subj: ARMED FORCES HEALTH PROFESSIONS SCHOLARSHIP PROGRAM

il~l IL 20 I I11 AD-A February 20, DIRECTIVE Department of Defense

REQUIRED OPERATIONAL CAPABILITY LEVELS FOR NAVY INSTALLATIONS AND ACTIVITIES

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON. D.C

NAVAL AVIATION SURVIVAL TRAINING PROGRAM DEVICES QUALITY ASSURANCE AND REVALIDATION POLICY

OPNAVINST A N Oct 2014

Subj: POLICY REGARDING COMMAND ACTION IN RESPONSE TO OFFENSES INVOLVING THE OPERATION OF THE NAVY EXCHANGE SERVICE COMMAND

cc FORRESTAL DRIVE

OPNAVINST A N Jan 2015

OPNAVINST E N97 7 Nov 2017

OPNAVINST H N12 3 Sep 2015

OPNAVINST B N Jun Ref: (a) DoD Directive of 29 January 2004 (b) SECNAVINST A

Subj: RESERVE OFFICER CLASSIFICATION, SUBSPECIALTY, AND QUALIFICATION DESIGNATOR CODES

OPNAVINST D N4 24 May (a) OPNAV M , Naval Ordnance Management Policy Manual

PROCEDURES FOR NAVY PARTICIPATION IN THE DEPARTMENT OF DEFENSE SPACE TEST PROGRAM

Subj: ADMINISTRATION OF THE UNITED SERVICES MILITARY APPRENTICESHIP PROGRAM

OPNAVINST A N2/N6 19 Dec Subj: NAVAL OCEANOGRAPHY POLICY, RELATIONSHIPS, AND RESPONSIBILITIES

Subj: OVERSIGHT OF THE DEPARTMENT OF THE NAVY MILITARY INTELLIGENCE PROGRAM

Subj: MISSION, FUNCTIONS, AND TASKS OF THE UNITED STATES NAVAL ACADEMY, ANNAPOLIS, MARYLAND

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Subj: CREDIT FOR PRIOR NON-FEDERAL WORK EXPERIENCE AND CERTAIN MILITARY SERVICE FOR DETERMINING LEAVE ACCRUAL RATE

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

OPNAVINST D N96 23 Jan Subj: SHIP ANTISUBMARINE WARFARE READINESS AND EFFECTIVENESS MEASURING PROGRAM

Subj: MISSION, FUNCTIONS, AND TASKS OF NAVAL SPECIAL WARFARE COMMAND

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS WASHINGTON, DC MCO A INT 29 Aug 89

OPNAVINST N95 8 May Subj: HUMAN ELECTRO-MUSCULAR INCAPACITATION DEVICES

OPNAVINST B N1/PERS-9 24 Oct 2013

Subj: DEPARTMENT OF THE NAVY (DON) PERSONNEL SECURITY PROGRAM (PSP) INSTRUCTION

SECNAVINST E CH-1 DUSN (M) 15 Sep 17

Department of Defense INSTRUCTION. Office of the Inspector General of the Department of Defense Access to Records and Information

Subj: INFORMATION DOMINANCE CORPS COMMAND QUALIFICATION PROGRAM. Encl: (1) Sample Command Qualification Board Recommendation Letter

Subj: MORALE, WELFARE, AND RECREATION AND NAVY EXCHANGE BOARD OF DIRECTORS

Subj: SELECTION OF THE COMMANDING OFFICER, U.S. NAVY BAND, WASHINGTON, DC

OPNAVINST N Dec Subj: NAVY SPECIAL WARFARE OFFICER CONTINUATION PAY (SPECWAROCP) PROGRAM

SECNAVINST A DON CIO 20 December Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

OPNAVINST DNS-3/NAVAIR 24 Apr Subj: MISSIONS, FUNCTIONS, AND TASKS OF THE COMMANDER, NAVAL AIR SYSTEMS COMMAND

Subj: INFORMATION MANAGEMENT/INFORMATION TECHNOLOGY POLICY FOR FIELDING OF COMMERCIAL OFF THE SHELF SOFTWARE

Department of Defense DIRECTIVE

OPNAVINST C N1 22 Apr Subj: NAVY JUNIOR RESERVE OFFICERS TRAINING CORPS AND NAVY NATIONAL DEFENSE CADET CORPS

DEPARTMENT OF THE NAVY BUREAU OF MEDICINE AND SURGERY 7700 ARLINGTON BOULEVARD FALLS CHURCH VA 22042

Subj: MISSION, FUNCTIONS, AND TASKS OF THE NAVAL EDUCATION AND TRAINING COMMAND

CNATRAINST B N6 9 Aug 17

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Subj: NAVY RESPONSIBILITIES REGARDING UNDOCUMENTED HUMAN REMAINS

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Subj: MANPOWER MANAGEMENT FOR THE BUREAU OF NAVAL PERSONNEL

Transcription:

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 2221.5D N2N6 OPNAV INSTRUCTION 2221.5D From: Chief of Naval Operations Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY Ref: (a) DON CIO Guidance on Information Management/Information Technology Inherently Governmental, 1 Nov 2001 (NOTAL) (b) DoD 5220.22-M, National Industrial Security Program Operating Manual, February 2006 (c) CNSSI 4000, Maintenance of Communications Security Equipment, 12 Oct 2012 (NOTAL) (d) DoD 8570.01-M, Information Assurance Workforce Improvement Program, December 2005 (e) Electronic Key Management System 1 (EKMS 1B) of 5 April 2010 (NOTAL) 1. Purpose. To publish procedures for authorizing the release of communications security (COMSEC) material to U.S. industrial firms under contract to the Department of the Navy (DON). This revision updates references and incorporates current requirements for the handling of COMSEC information, materials, and equipment as well as responsibilities of the information assurance workforce. This instruction is a complete revision and should be reviewed in its entirety. 2. Cancellation. OPNAVINST 2221.5C. 3. Definitions a. COMSEC Material. Item designed to secure or authenticate telecommunications. COMSEC material includes, but is not limited to: key, equipment, devices, documents, firmware, or software that embodies or describes cryptographic logic, or other items that perform COMSEC functions. b. COMSEC Equipment. Equipment designed to provide security to telecommunications by encrypting data for

transmission and decrypting data for authorized recipients; also, equipment designed specifically to aid in, or as an essential element of, the conversion process. 4. Policy. Per reference (a), management of cryptographic material, equipment, and COMSEC operations are considered an inherently governmental function. However, when there is a valid need and such is clearly in the best interest of the DON and the U.S. Government, cryptographic equipment, keying material, related COMSEC information, and access to classified U.S. Government information may be provided to U.S. contractors to: a. Install, maintain, or operate transmission security nomenclature COMSEC equipment or controlled cryptographic items (CCI) for the U.S. Government. b. Participate in the design, planning, production, training, installation, maintenance, operation, logistical support, integration, modification, testing, or study of COMSEC material or techniques. c. Electronically communicate classified national security information in a cryptographically secure manner, or unclassified national security-related information by COMSEC protected means. 5. Requirements. Contractor personnel granted access to COMSEC material must be U.S. citizens and possess a valid security clearance. Such access must be controlled on a strict need-toknow basis and granted only in conformance with procedures established for the particular type of COMSEC material and equipment involved. Detailed guidance for contracting offices concerning security clearances, access authorization, and briefings is set forth in reference (b). All contracts involving COMSEC material with industrial firms must contain the information in subparagraphs 5a through 5e. a. U.S. cryptographic equipment inventory information and the systems and applications used are for official use only. Publication, disclosure, or other release of COMSEC related information by any means by a contracting entity without prior written approval of the contracting office is prohibited. 2

b. Contractor personnel granted access to classified COMSEC material must hold a final personnel security clearance appropriate for the COMSEC material accessed. Clearances for facility security officers, COMSEC custodians, and alternate COMSEC custodians having access to top secret keying material marked as containing cryptographic information must have a final security clearance based upon a single scope background investigation current within 5 years. c. All contractor personnel with access to COMSEC material must be briefed annually regarding the unique nature of COMSEC material and their responsibilities for safeguarding and controlling the material. d. Contractor personnel who perform maintenance on U.S. Government cryptographic equipment or CCI must satisfy and comply with the provisions of reference (c). e. Per reference (d), chapters 2 and 3, contractor personnel, whose duties require privileged access to a government computer system, including those used for COMSEC management purposes must be trained and certified. 6. Action a. Prior to release of any COMSEC material or COMSEC related information to a U.S. industrial firm under contract to the DON for one of the purposes described in paragraph 4, the contracting office must submit a request to Naval Communications Security Material System (NCMS) for review, validation, and recommendation for approval on behalf of Commander, Navy Information Forces (COMNAVIFOR). The request must include sufficient justification upon which to base a decision and indicate that the release is in the best interest of the DON and U.S. Government. Additionally, the request must include a statement that all applicable requirements of this instruction and the references contained herein have been met. b. Upon approval, NCMS will notify the requestor and provide the assigned contract authorization number, which will expire at the end of the contract. All subsequent correspondence related to COMSEC material or COMSEC related information must include the contract authorization number assigned. Upon approval, if granted, the vendor may request 3

COMSEC material or COMSEC related information, as applicable per reference (e) citing the contract authorization number as the supporting authorization. The request must include, at a minimum those listed in subparagraphs 6b(1) through 6b(5). (1) Contract number; name of contractor; licensee or individual; facility clearance; and location where the functions will be performed. (2) Nature and scope of the contractual functions, the COMSEC material or cryptographic equipment to which the contractor personnel will have access, and the number of contractor personnel involved. (3) In the case of a contractor s operation in a secure telecommunications facility: the classification and type of material involved, and whether access to U.S. Government message traffic or related information will be supervised by government civilian or military personnel. (4) The initial date on which contractor personnel will have access to COMSEC material or equipment, and the length of the contract or period of time such access will be required. (5) Any other information deemed appropriate in evaluating the request. 7. Accounts. Per reference (b), COMSEC accounts, established at contractor facilities as a result of Navy contracts, are National Security Agency (NSA) accounts administered by the Director, NSA. NCMS may assist in establishing COMSEC accounts, as necessary. 8. Policy Exception Approval. In the event the provisions of this instruction cannot be satisfied and sufficient justification for release of COMSEC material or COMSEC related information to contractor personnel is provided, NCMS, in collaboration with COMNAVIFOR and the NSA will initiate necessary action(s) to request an exception from DON Chief Information Officer. The checklist in subparagraphs 8a through 8h should be used as a guideline in requesting exceptions to this policy: 4

a. Identify the individual and or organization, their citizenship, their level of security clearance, and the location(s) at which COMSEC functions will be performed. b. Identify the COMSEC functions the non-government sources(s) will perform, the COMSEC material to which the individual(s) will have access, the number of personnel involved, their training certification, or any training required. c. List the classification of the COMSEC material in which the source personnel will have access. d. Indicate whether personnel will be using keying material marked "CRYPTO" held or used by government departments and agencies. If so, state whether consideration has been given to providing unique operational keying materials. e. Indicate additional administrative and security measures which will be implemented. f. Identify the inclusive dates personnel will have access to COMSEC material under the provision of the contract. g. Identify the government department or agency which will be responsible for the security of non-government cryptographic operations and functions. h. Identify the specific provisions of this instruction for which an exception is required. 9. Continuing Action. COMNAVIFOR and NCMS must be kept informed throughout the life of the contract on any events that affect the length of the contract or the type and amount of COMSEC material involved. COMNAVIFOR and NCMS must also be notified of the date of the actual termination of the contract. 10. Review and Effective Date. Per OPNAVINST 5215.17A, Deputy Chief of Naval Operations, Information Warfare (CNO N2N6) will review this instruction annually on the anniversary of its issuance date to ensure applicability, currency, and consistency with Federal, Department of Defense, Secretary of the Navy (SECNAV), and Navy policy and statutory authority using OPNAV 5215/40 Review of Instruction. This instruction will 5

automatically expire 5 years after its issuance date unless reissued or canceled prior to the 5-year anniversary date, or an extension has been granted. 11. Records Management. Records created as a result of this instruction, regardless of media and format, must be managed per SECNAV Manual 5210.1 of January 2012. JAN E. TIGHE By direction Distribution: Electronic only, via Department of the Navy Issuances Web site http://doni.documentservices.dla.mil/ 6