Donate for the Cryptome archive of 65.000 files from June 1996 to the present

21 March 2001. Thanks to BH.


[16 pages; all marked "UNCLASSIFIED/ /FOR OFFICIAL USE ONLY."]

NSTISSI No. 3003
August 2000



Operational Security Doctrine
for
KG-66/KG-66A/SO-66/
KGR-66/KGV-68/KGR-68/KGV-68B




THIS DOCUMENT PROVIDES MINIMUM STANDARDS. FURTHER
INFORMATION MAY BE REQUIRED BY YOUR DEPARTMENT OR AGENCY.


FOREWORD

1. (U//FOUO) This instruction supersedes NTISSI No. 3003, "Operational Security Doctrine for the KG-66/KG-66A/KGR-66/KV-68" dated 27 April 1990. It updates its predecessor and also includes requirements applicable to the KGR-68 and the KGV-68B.

2. (U//FOUO) The COMSEC system specified in this instruction provides security for digital telemetry transmissions between an airborne weapons system and its receiving stations.

3. (U//FOUO) This instruction provides the minimum national standards for this system. Please check with your agency for applicable implementing documents.

4. (U//FOUO) Representatives of the National Security Telecommunications and Information Systems Security Committee may obtain additional copies of this NSTISSI from:

NATIONAL SECURITY AGENCY
NSTISSC SECRETARIAT
ATTN: 142 STE 6716
FORT GEORGE G. MEADE, MD 20755-6716

5. (U//FOUO) U.S. Government contractors and vendors shall contact their appropriate government agency or Contracting Officer Representative regarding distribution of this document.

MICHAEL V. HAYDEN
Lieutenant General, USAF

NSTISSC Secretariat (142). National Security Agency.9800 Savage Road STE 67 16. Ft Meade MD 20755-6716
(410) 854-6805.UFAX: (410) 854-6814
nstissc@radium.ncsc.mil


OPERATIONAL SECURITY DOCTRINE FOR THE KG-66/KG-66A/SO-66/KGR-66/KGV-68/KGR-68/KGV-68B

SECTION

PURPOSE I
SCOPE II
REFERENCES III
DEFINITIONS IV
SYSTEM DESCRIPTION V
KEYING INFORMATION VI
CLASSIFICATION GUIDANCE VII
CONTROL REQUIREMENTS VIII
EMERGENCY PROCEDURES IX
REPORTABLE INCIDENTS X
EXCEPTIONS XI


SECTION I - PURPOSE

1. (U//FOUO) This document provides minimum security doctrine for the operational use of the KG-66/KG-66A/SO-66/KGR-66 (KUTA), KGV-68 (NOBLEMAN), KGV-68B, KGR-68 and associated COMSEC material.

SECTION II - SCOPE

2. (U//FOUO) This document will be made available to all U.S. Government organizations that use or have access to the KG-66/KG-66A/SO-66/KGR-66/KGV-68/KGV- 68B/KGR-68 and associated COMSEC material. Promulgation may be made through issuance of this document or through its incorporation into applicable department or agency publications.

3. (U//FOUO) When the requirements or terms of this instruction appear to substantially conflict with the requirements or terms of any other national-level issuance, this conflict will be identified and guidance requested, through organizational channels, from the Director, National Security Agency, ATTN: INFOSEC Policy, Procedures, and Insecurities Division.

SECTION III - REFERENCES

4. (U//FOUO) References cited in this doctrine are listed in ANNEX A.

SECTION IV - DEFINITIONS

5. (U//FOUO) Definitions in NSTISSI No. 4009 (Reference a.) apply to this doctrine.

SECTION V - SYSTEM DESCRIPTION

6. (U//FOUO) This COMSEC system is comprised of an electronic key generator (half-duplex) (KG-66 or KG-66A) telemetry data unit, the receive only unit (KGR-66), and the receiver/maintenance test unit (SO-66). The KGR-66 consists of the KGV-66 plug-in module and HNF-66 frame and power supply. The KUTA (KC-66 and KG-66A operating in modes A and B) and NOBLEMAN (KGV-68 operating in mode B only) are half-duplex encryptors, and can be used as decryptors in approved applications. The KGV-68/KGV-68B is compatible with all KUTA equipment operating in mode B. The KGR-68 consists of an embedded KGV-68 module and associated circuitry, and is designed to be a replacement for the KGR-66. The KYK- 13, KOl- 18, and AN CYZ-10/10A Data Transfer Device (DTD) fill devices are used with these systems (see paragraph 9).

7. (U//FOUO) This COMSEC system provides security for digital telemetry transmissions between an airborne weapons system and its receiving stations. The KG-66/KG-66A/KGV-68/KGV-68B perform on-line encryption/decryption of serial binary data from the weapons system's digital telemetry unit. The KGR-66 and KGR-68 are decryption equipment only. The KG-66/KG-66As are capable of operating at data rates between 10 Kbps and 11 Mbps. The KGR-66 and KGR-68 are capable of operating at data rates between 10 Kbps and 10 Mbps. The KGV-68 is capable of operating at data rates between 50 bps and 11 Mbps. The KGV-68B is capable of operating at data rates up to 50 Mbps.

8. (U//FOUO) When used with the appropriate keys, the KG-66/KG-66A/KGV-68/KGV-68Bs are approved for the encryption of telemetry data up to SECRET. The KGV-68/KGV-68B has an upgrade mode where the encryptor is monitored by another KGV-68/KGV-68B and some external circuitry. This permits use for higher classifications when approved on a case-by-case basis. The KGV-68B incorporates the required upgrade external circuitry within the module.

SECTION VI - KEYING INFORMATION

9. (U//FOUO) The KG-66/KG-66A/KGR-66/KGV-68/KGR-68/KGV-68B keys (ANNEX E) are produced in eight-level, standard-hole tape. The KG-66 is filled directly (or via an SO-66) from a key tape using the KOI-18 fill device. The KC-66 can also be filled with the KYK-13 when used in accordance with the instructions in KAO-182/TSEC. The KGR-66/KG-66A/KGV-68/KGR-68/KGV-68B may be filled with either the KOI-18, KYK-13, or DTD. NSTISSI No. 3021 (Reference b.) contains the systems doctrine for the DTD.

a. (U//FOUO) Operational key tapes (USKAT-series) are classified on the basis of the classification of the traffic they are intended to protect and are TOP SECRET, SECRET, or CONFIDENTIAL. These key tapes are regularly and irregularly superseded depending on system application, are packaged in plastic canisters, are marked CRYPTO NOFORN, and are serial number accountable, Accounting Legend Code 1 (ALC-1).

b. (U//FOUO) Operational key tapes (AKAT-series) are classified on the basis of the classification of the traffic they are intended to protect and are TOP SECRET, SECRET, or CONFIDENTIAL. These key tapes are regularly and irregularly superseded depending on system application, are packaged in plastic canisters, are marked CRYPTO, and are serial number accountable, ALC-1.

c. (U//FOUO) Exercise key tapes (USKXT-series) are classified CONFIDENTIAL. These key tapes are periodically superseded, are packaged in plastic canisters, are marked CRYPTO NOFORN, and are serial number accountable, ALC-1.

d. (U//FOUO) Exercise key tapes (AKXT-series) are classified CONFIDENTIAL. These key tapes are periodically superseded, are packaged in plastic canisters, are marked CRYPTO, and are serial number accountable, ALC-1.

e. (U//FOUO) Maintenance key tape (KMT-series) are classified CONFIDENTIAL but not marked CRYPTO. Maintenance key tapes are designed for back-to-back bench testing only and shall not be used for over-the-air transmissions. The maintenance key tapes are packaged in clear plastic canisters and segments may be reused until they become unserviceable. KMT- 152 Edition H and onward are compatible with the KG-66/KG-66A/ KGR- 66/SO-66/KGV-68/KGR-68/KGV-68B. KMT-152 editions prior to Edition H are not compatible with the KGR-66, KGV-68, KGR-68 or KGV-68B. These tapes are serial number accountable, ALC-1.

10. (U//FOUO) Each KG-66/KG-66A/KGV-68/KGV-68B encryptor and its associated decryptors will normally be loaded with a unique TEK. If operational considerations require multi-encryptor loading of a single TEK, it will be approved on a case-by-case basis by DIRNSA (V31).

11. (U//FOUO) The cryptoperiod for the KG-66/KG-66A/KGV-68/KGV-68B is 24 hours transmission time per mission. Any application that requires a cryptoperiod greater than 24 hours per mission and/or requires more than one encryptor per mission for the same key must have prior approval by DIRNSA (V31). This request will be submitted by the end user.

SECTION VII - CLASSIFICATION GUIDANCE

12. (U//FOUO) NTISSI No. 4002 (Reference c.) contains general COMSEC classification guidance.

13. (U//FOUO) Classification and markings assigned to the KG-66/KG-66A/SO-66/KGR-66/KGR-68/KGV-68B and associated COMSEC material are included in ANNEX B of this instruction. Classification and description of supporting documentation are included in ANNEX C. The checklist for secure telemetry missile firings when filled in is a minimum classification of CONFIDENTIAL and is included as ANNEX D. Classification and description of supporting COMSEC keying material are included in ANNEX E.

SECTION VIII - CONTROL REQUIREMENTS

14. (U//FOUO) Except as specified below, control requirements for the COMSEC components and material associated with this system shall be in accordance with the safeguards and criteria of NSTISSI No. 4005 (Reference d.) and NSTISSI No. 4001 (Reference e.) as applicable.

a. (U//FOUO) Access
(1) (U//FOUO) No clearance is required for access to the SO-66 or HNF-66 when the respective unkeyed KG-66/KG-66A/KGV-66 is installed.

(2) (U//FOUO) Even though all the system equipment and the fill devices are unclassified when unkeyed, they are controlled cryptographic items (CCI) that perform sensitive cryptographic functions. Information regarding access to unkeyed CCI equipment is provided in Reference e.

b. (U//FOUO) Transportation

(1) (U//FOUO) When an unkeyed KG-66/KG-66A/KGV-68/KGV-68B is installed as an integral part of a weapons system, the weapon and the CCI may be shipped in a manner approved for the highest classification level applicable to either the CCI or the weapon. If the accountability is retained by the shipping organization, the KG-66/KG-66A/KGV-68/KGV-68B must be couriered by the shipping organization and hand receipted to the courier. A KG-66/KG-66A/KGV-68/KGV-68B shipped as a part of a weapons system must be zeroized by removal of its key hold-up battery.

(2) (U//FOUO) When an unkeyed KG-66/KG-66A/KGV-68/KGV-68B is not installed as an integral part of the weapons system, it must be transported or shipped in any manner approved for the shipment of CCI hardware. If keyed, they will be shipped in accordance with requirements set forth in Reference d.

c. (U) Test Flight History/Equipment Recovery

(1) (U//FOUO) Users must initiate procedures to ensure that a complete history of secure telemetry missile firings exists. The "Checklist for Secure Telemetry Missile Firings" (ANNEX D) provides a list of items/areas that should be included. The checklist may be expanded to include additional information to meet specific user requirements. An information copy of the checklist must be forwarded to DIRNSA (V31) by the COMSEC Custodian within 30 days after the completion of each missile launch using secure telemetry.

(2) (U//FOUO) Reasonable effort will be made to recover any KG-66/KG-66A/KGV-68/KGV-68B used in weapons system tests. However, because of the nature of the service flight test and other weapons system telemetry encryption missions associated with this equipment, it is understood that some KG-66/KG-66A/KGV-68/KGV-68B equipment may not be recoverable. (e.g., post flight recovery teams may not be able to locate impact areas, equipment may be destroyed beyond recognition, the missile may be lost in waters too deep to effect reasonable chance of recovery, etc.) This is expected, and under such conditions, the loss will not be considered a security violation but must be reported in accordance with paragraph 14.c.(1), above.

d. (U) Accountability

(1) (U//FOUO) KG-66/KG-66A/SO-66/KGR-66/KGV-68/KGR-68/KGV-68B are accountable items and must be issued on a hand receipt to users by COMSEC custodians or property book officers. Keying material is handled by COMSEC custodians for issuance to hand receipt holders. The hand receipt holders are responsible for the security, destruction, and handling of the COMSEC material.

(2) (U//FOUO) When an operationally keyed KG-66/KG-66A/KGV-68/ KGV-68B is installed as part of a missile (i.e., the missile is completely assembled and certified for flight), accountability and physical safeguards associated with the KG-66/KG-66A/KGV-68/KGV-68B will continue until the missile is launched. All labels should be removed from the KG-66/KG-66A/KGV-68/KGV-68B prior to being installed in a missile. The removed labels will accompany the accounting report during all transactions thereafter (i.e., destruction, transfer, etc.). The missile serial number and launch date will be used to complete the record of destruction. If, for any reason, the missile is not fired and requires disassembly, the local accountable official must be notified to assure that accounting and security procedures for the KG-66/KG-66A/KGV-68/KGV-68B are followed. In this case, the keys should be superseded.

(3) (U//FOUO) If a missile containing a KG-66/KG-66A/KGV-68/KGV-68B previously recorded/reported as destroyed is recovered (i.e., missile is not destroyed by impact, is recovered from shallow water, etc.), the KG-66/KG-66A/KGV-68/KGV-68B should be placed under the maximum physical controls available for the classification level of the keyed equipment and the recovery reported to V31. The situation and available resources must be taken into consideration on such occasions. No special security containers are required for the storage of the KC-66/KG-66A/KGV-68/KGV-68B during recovery operations. Personnel participating in recovery operations will be briefed on the importance of protecting the KG-66/KG-66A/KGV-68/KGV-68B until it can be turned over to proper authority. The local accounting official will add the recovered KG-66/KG-66A/KGV-68/KGV-68B to his/her account holdings and return it and/or those identifiable portions, for disposition to DIRNSA (COMSEC Account 880666, V09, Pass To: V31).

e. (U//FOUO) Follow-on Mission Processing - There may be cases when it is necessary to retain encrypted telemetry magnetic tapes for later decryption and processing. When such a requirement exists, the following procedures apply:

(1) (U//FOUO) After the completion of the test (pod, flight, operations, etc.), the key associated with the encrypted magnetic tape will be returned to and retained by the COMSEC custodian to ensure continued accountability and secure storage. The encrypted magnetic tape may be handled as an unclassified item. However, cross-references to the storage media (encrypted magnetic tape) and the key used for encryption (short title, edition, and segment) are classified a minimum of CONFIDENTIAL and must be appropriately stored.

(2) (U//FOUO) When additional processing (decryption) is required at a later time, the key will be retrieved from secure storage (hand receipted, if necessary) and after use, returned to secure storage.

(3) U//FOUO) When no further processing of the encrypted magnetic tape is necessary, the COMSEC custodian will destroy the associated key in accordance with requirements set forth in NTISSI No. 4004 (Reference f.).

(4) (U//FOUO) Any reuse of a key from a previous cryptoperiod for encryption of data is prohibited. This applies to both operational and exercise key.

(U//FOUO) NOTE: Encrypted magnetic tapes are unclassified and may be stored in an unclassified area. (In the COMSEC. community, this is considered BLACK data.) Decrypted magnetic tapes (plain text), which are classified, must be stored in areas which are afforded physical security for classified information. (In the COMSEC community, this is considered RED data.)

SECTION IX - EMERGENCY PROCEDURES

15. (U//FOUO) Reference f. prescribes standards for routine destruction of COMSEC material and provides criteria and guidance for protecting COMSEC material under emergency conditions. It also provides guidance and assigns responsibilities for recovery of abandoned COMSEC material.

SECTION X - REPORTABLE INCIDENTS

16. (U//FOUO) COMSEC incidents are reportable in accordance with NSTISSI No. 4003 (Reference g.) and applicable department or agency implementing instructions. Reference g. lists general incidents. The following are incidents specific to the KG-66/KG-66A/SO-66/KGR-66/ KGR-68/KGV-68/KGV-68B:

a. (U//FOUO) Physical Incidents - Shipment of a missile with a key other than a shipping key installed.

b. (U//FOUO) Cryptographic Incidents

(1) (U//FOUO) Unauthorized extension of a cryptoperiod or an unauthorized increase in the number of KG-66/KG-66A/KGV-68/KGV-68B encryptors using the same key.

(2) (U//FOUO) Failure to change the key after a transmitting KG-66/ KG-66A/KGV-68/KGV-68B malfunction. Malfunction is defined as an alarm function that will not clear in the encryptor or failure of the decryptor to achieve cryptosynchronization.)

(3) (U//FOUO) The transmission of classified data using an SO-66, with an installed KG-66/KG-66A, that has failed the checkword verification procedures.

(4) (U//FOUO) Failure to follow procedures in KAO-182 A/TSEC when loading key into the KG-66 with a KYK-13. (This does not apply to the KG-66A.)

(5) (U//FOUO) Use of a KGV-66 without the HNF-66.

SECTION XI - EXCEPTIONS

17. (U//FOUO) Requests for exceptions to any of the provisions of this doctrine must be approved, on a case-by-case basis, prior to implementation. Each request shall include a complete operational justification and shall be submitted through appropriate department or agency channels to DIRNSA, INFOSEC Policy, Procedures, and Insecurities Division for review.

5 Encls:
ANNEX A - References
ANNEX B - Equipment Classification
ANNEX C - Documentation Description and Classification
ANNEX D - Checklist for Secure Telemetry Missile Firings
ANNEX E - COMSEC Keying Material Description and Classification


ANNEX A

References

(U//FOUO) The following national-level documents are referenced in this instruction:

NSTISSI No. 4009 (Revision 1), National Information Systems Security (INFOSEC) Glossary, dated January 1999.

NSTISSI No. 302 1, Operational Security Doctrine for the AN/CYZ-10/10A Data Transfer Device (DTD), dated September 1997.

NTISSI No. 4002, Classification Guide for COMSEC Information, dated 5 June 1986.

NSTISSI No. 4005, Safeguarding Communications Security (COMSEC) Facilities and Materials, dated August 1997.

NSTISSI No. 4001, Controlled Cryptographic Items, dated July 1996.

NTISSI No. 4004, Routine Destruction and Emergency Protection of COMSEC Material, dated 11 March 1987.

NSTISSI No. 4003, Reporting and Evaluating COMSEC Incidents, dated 2 December 1991.


ANNEX B

Equipment Classification

EQUIPMENT KEYED UNKEYED
KG-66/KG-66(E1) Same classification as the key CCI ALC-1
KG-66A Same classification as the key CCI ALC-1
KGV-66 Same classification as the key CCI ALC-1
KGV-68 Same classification as the key CCI ALC-1
KGV-68/KGV-68B Same classification as the key CCI ALC-2
SO-66
(with KG-66 or KG-66A
Same classification as the key CCI ALC-1
SO-66
(without KG-66 or KG-66A
N/A CCI ALC-1
AN CYZ-10/10A Same classification as the key
(with CIK inserted)
CCI ALC-1
KOI-18
(General Purpose Tape Reader)
N/A CCI ALC-2
KYK-13
(Electronic Fill Device)
Same classification as the key CCI ALC-2
KGR-66
(HNF-66 with KGV-66)
Same classification as the key CONFIDENTIAL ALC-1
HNF-66
(without KGV-66)
N/A UNCLASSIFIED ALC-4
E-ECC, E-ECD
Printed Wiring Boards (PWBs)
N/A CONFIDENTIAL ALC-2
E-ENF, E-FAH, E-FEX
and E-FEY
Pritned Wiring Assemblies (PWAs)
N/A CCI ALC-2
U-ALP, U-KLC, U-TPN
U-KMC, U-LPC, and
U-AIZ (Microcircuits)
N/A CCI ALC-2

NOTE: KG-66/KG-66A/SO-66/KGR-66/KGV-68/KGR-68/KGV-68B are not releasable to foreign nationals without specific approval of the National Manager.


ANNEX C

Documentation Description and Classirication

DOCUMENTATION DESCRIPTION CLASSIFICATION
NAM-22A/TSEC SO-66 Maintenance Manual CONFIDENTIAL NOFORN
CSESD-35B Communications Security
Equipment System Document
for KGR-66
CONFIDENTIAL NOFORN
CSESD-45B Communications Security
Equipment System Document
for KGR-66/KG-66A
CONFIDENTIAL NOFORN
CSESD-11I Communications Security
Equipment System Document
for Fill Devices
CONFIDENTIAL
KAO- 182A/TSEC Operator's Instruction for
KG-66/SO-66
FOR OFFICIAL USE ONLY
KAM-437A/TSEC KGR-66 Maintenance
Manual
CONFIDENTIAL NOFORN
KAO- 198A/TSEC Operator's Instruction
for KGR-66
FOR OFFICIAL USE ONLY
KAM-471A/TSEC KG-66 Maintenance
Manual
CONFIDENTIAL NOFORN
KAM-553A KGR-68 Maintenance
Manual
FOR OFFICIAL USE ONLY
0N382425 Interface Specification
for KGV-68
FOR OFFICIAL USE ONLY
0N636672 Interface Specification for KGV-68B FOR OFFICIAL USE ONLY


ANNEX D

Checklist for Secure Telemetry Missile Firings

1 . Laboratory Checkout/Calibration

Date completed:
Location of Data:

2. Test Item:

3. Location of Test:

4. Type of Keying Material Used:

5. Short Title /Edition/Segment:

6. Holding Battery Installed (Date):

7. Keying Material Loaded (Date):

8. Test (Date):

9. KG-66/KG-66A/KGV-68/KGV-68B Serial Number (Circle One):

10. Test Item/KG-66/KG-66A/KGV-68/KGV-68B

Extended (Approx. Time):

11. Approximate Location of Impact:

12. Recovery Attempt Made (YES, NO). (If NO, provide explanation):

13. Transaction number used to relieve the COMSEC account of the accountability for the fired missile:

14. Reported to COMSEC Custodian (Date/Approx. Time):

15. Problems Encountered (If None, so state):

16. Report Submitted to DIRNSA (Date):

17. Letter and serial number or date-time-group of message used to provide requested information to DIRNSA (V31):



SIGNED:                                                         WITNESS:

NOTE: When filled in and depending on mission, a minimum classification of CONFIDENTIAL is required.


ANNEX E

COMSEC Keying Material
Description and Classification

KEY CLASSIFICATION REMARKS ALC
KMT-152 CONFIDENTIAL
NOFORN
MAINTENANCE KEY
NOT FOR-OVER-THE-AIR
ALC-1
USKAT-D50XX SECRET CRYPTO
NOFORN
OPERATIONAL KEY ALC-1
AKAT-D50XX SECRET CRYPTO OPERATIONAL KEY ALC-1
USKAT-36XX CONFIDENTIAL
CRYPTO NOFORN
OPERATIONAL KEY ALC-1
AKAT-36XX CONFIDENTIAL CRYPTO OPERATIONAL KEY ALC-1
USKAT-F38XX TOP SECRET
CRYPTO NOFORN
OPERATIONAL KEY ALC-1
AKAT-F38XX TOP SECRET CRYPTO OPERATIONAL KEY ALC-1
USKXT-37XX CONFIDENTIAL
CRYPTO NOFORN
EXERCISE KEY ALC-1
AKXT-37XX CONFIDENTIAL CRYPTO EXERCISE KEY ALC-1


NOTE: The above keys are compatible with the KG-66/KG-66A/SO-66/ KGR-66/KGV-68/ KGR-68/KGV-68B. KMT-152 Edition H and beyond are KGR-66/KGV-68/KGR-68/KGV-68B compatible.