REVIEW OF AGENCY USE OF CRYPTONYMS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP83B00823R000100010001-5
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
21
Document Creation Date: 
December 9, 2016
Document Release Date: 
June 19, 2000
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1963
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP83B00823R000100010001-5.pdf2.1 MB
Body: 
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 BEST Availa THR? 6/24/98 Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 ???????-_,? Approved r Release 20 ? CIA-RDP83B01123R000?004k104-? ?557 .r 3 MEM01 DUM FOR: Executive Director VLA: SUBJECT: EFFFEENCE ottl' puty Director for Plans ii?- Ieview of Agency Uie of Cryptonyrna rxecutive Director Memorandum of 19 November 1963 1. Reference memorandum recommends a critical look be taken at the Agency use of cryptonyms in cable traffic. The recommendation proceeds from a premise that Agency corn . munications and physical security have tightened considerably since the last review of this subject. Z. This memorandum is a sta,terrient of the CI Staff views regarding the various points raised in reference memorandum. 3. The Director of Communications has stated in substance as follows: a. There is no technical security requirement for the use of cryptonyms in Agency cable coiramanications. b. Garbled cables can be degarbled more easily if the meaning is not made unclear by the use of eryptonyrns, and cryptonyms do not neces- sarily result in a reduction of the length of the cable; thus, the clearer the n-,eaning of the cable, generally the shorter is the processing time. No exception can be taken to the foregoing statements. It is observed from experience, nowever, that a communications Approved For Release 200 IA- GROUP I Excluded from autamath derlEradiag and 00100010001-5 ?-et.,-,f4 V 25X1A 25X1A Approved II Release 2003(05/92 CIA-RDP83B00463R000100010001-5 tr 71. 1 system which is secure today may not be so twenty years from today, and that the use of cryptonyms is a form of insurance against future contingencies. 4. Reference queries ' where we must use cryptonyms for security reasons and where we can eliminate cryptonyrns with no sacrifice of security . A reply is succinctly orovidpri in Such use, however, is not a guarantee of security and does not obviate the need for additional security measures. Cable security does not term- inate with the transmission of the message. The information contained in the document requires constant protection and the presence of codes in the document is one way of providing a measure of security. 5. Recent study and observation in the Cl Staff indicates that there is not an 'overuse of cryptonyrns where there is no longer a valid security reason for doing so . We have noted, however, an occasional misuse of cryptorlyrns in that a cryptonym will be used and that cryptonyrn will be compromised Lu the text of the same cable, e.g.; a. Use of cryptonyms in the summarization of an identified newspaper atticle. b. Use of cryptonyxns for Ambassadors, Prime Ministers, domestic or foreign organizations in reporting their activities, when the activity has been publicized or serves in and of itself to identify the performer. Correction of such errors is a matter of training and discipline for individuals, rather than the abandonment of the security ob- tained through the use of cryptonyrns. 6. As to the slow-down in the administrative process occasioned by the use of cryptonyms in cables, it has been determined that Area Division Officers, and CS Staff Officers, Approved For Release 202JOt42 CIA-RDP83600823R000100010001-5 Uli ? ? Approved eRelease 200 dEfIA-RDP8360.3R000100010001-5 who take and coordinate action ou operational cables, are knowledgeable of the meaning of each cryptosayrn. The Cable Secretariat 'breaks out' the cryptonyrns for the DCI, FDCI, 10, LLI)/P. and ADD/P. Beyond that point it is believed that the security of the message, even within the Headquarters building, takes precedence over the necessity for priority collateral administrative processing. In exceptional situations the break out by Cable Secretariat can be extended. 7. Operations officers in the field stations are fully knowledgeable of the meaning of the cryptorzyms with which they deal. Though physical security may 'have tightened considerably since the last review, it was established in a security seminar, which took place in Headquarters in Novem- ber 1963, that physical security in the field is considerably less than clearable for a variety of reasons. The complexities of security in the field require constant review. Classified documents maintained in field stations must have the protection obtained through the use of cryptonyms. The matter of building ? facilities, local hires, char people, and penetrable safe equip- ment, Is a continuing problem. 8. Possibly the most significant factor to be considered In the examination of this issue is that the Clandestine services ? Records Committee in 1963 took action to incorporate cable traffic into the WALNUT system in the field, in order to reduce the volume of records maintained in the field and to provide for easy destruction in the event of emergency. Cables are micro- filmed and placed on aperture cards at Headquarters and pouched to the field. Pouch security procedures require the sterilization of the material contained on the aperture cards. Thus, any consideration of a reduction in the use of cryptonyrns becon es moot in tern,* of controlling decisions already reached. 9. if we assume for the moment, for the sake of discussion, that there is in fact an excessive use of cryptonyms, pseudo- nyms, and identity cables, we are immediately confronted with the point of how to correct the situation. Accepting the premise that we will not discontinue the use of code designations, the question of what constitutes 'excessive use becomes a matter Approved For Release 20 2 : CIA-RDP83600823R000100010001-5 ? Approved FihRelease 2002/05/02 : CIA-RDP83B004R000100010001-5 25X1A 25X1A 25X1A 25X1A of interpretation in each individual cable. Correction can come about only through the creation of an awareness of the problem on the part of those employees preparing and releasing cables. Such action was taken in 1957 through the issuance oil We would concur in the re-issuance of a similar notice at the present time. oeueve mat a general review of this alleged problem could result in any material improvement. 11. As to the compromise of cryptonyms, it has been determined that compromised cryptonyrns relating to agents and operations are promptly replaced by operational components. The possible exception exists in the case of cryptonyms relating to the Agency and certain of its components, and to other U. S. and foreign government agencies. For example, by strict interpretation it can be accepted that KUBARK, ODACIO, and several others readily in mind, have been compromised in many ways over a period of years. They are in such constant use, however, that if they were changed, the new cryptonyrn would become similarly polluted in a very short time. M by then continue the use of such crvotonvros? Only lior=?410 12. In conclusion the Cl Staff recommends that this general issue is not one calling for specific correction in the 4 Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 25X1 25X1 . Approved- r Release 2002/05/02 : CIA-RDP839.3R000100010001-5 4 abse of the p c to specific inst.nce 1 xcecsive a pl t on ood security. AngletOn r lotailigence Staff cc: Dtrectoz of 'cations ) frctor of Security Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 ovecl P5NRigimitO011itil510#1111AAROMERTIMMEracruTut. --] t1NCLASSIFiED 1 I 11161s1FIDENTIAL SECRET CENTRAL INTELLIGENCE AGENCY 1Y:1A OFFICIAL ROUTING SLIP TO NAME AND ADDRESS DATE INITIALS 1 0 7) 7,,t,_ ,. ...._........? _ 4 ',V,: a ,r r 6 _ 0,4?,,,Li-4 TION ECT REP)4Y PREPARE REPLY APPROVAL DISPATCH RECOMMENDATION COMMENT FILE RETURN CONCURRENCE INFORMATION SIGNATURE I , :, "II- ,-e, 0..-- 40, Adi7;1A? AGIAOZ":1114-4iTair C 1A ? FOLD H - - RE 1,6 , SENDER FROM: NAM D PHONE NO. DATE ';fVF' 42' rOV z d RaltReiltatia Y 11 i'-' 7 Vr?:"41r, II : '01 y FORM NO. 2-61 4 q37 Use previous editions (40) U.S. GOVERNMENT PRINTING OFFICE 1961 0-587282 01 r\E1 UNCLASSIFIE.D INTERNAL ? _ CONMENT I AL El SECRET AnnrnJi CIA IP `-'4101 41. ROUTING AND RECORD SHN SUBJECT: (Optional) ? FROM: EXTENSION NO. - Chief, CI Staff 1 . " i _ , DATE TO: (Officer designation, room number, and DATE building) OFFICER'S COMMENTS (Number each comment to show from whom INITIALS to whom. Draw a line across column after each comment.) RECEIVED FORWARDED DD/S fitt, i i A.A../ vC......" 1. 1 - .6y v 0 2. , 3. Director of 41, ' i Security 4. 5. OYTA--C- r d ..7 OA 6. ii--iLe..a?12,02 ":"/F 7. I 77 8. ?,. r 9. 10. 1 0 JIAN 1.964 11. 12. 13. 14. 15. FORM 3-62 25 610 USE ITIEMUS ,Er7knSfARET3r Re ElseCaNRIORNZ MA-R084rVIAR0001 ClglOONCOSSI F I ED 4 STANDARD RSAI NO. IP I 11 (? t 11 Office Memoranda y? 25X1A TO BROM : 25X1A SUBJECT: /02 : CIA-RDP83600823R000100010001-5 713NITED STATES GOVERNMENT DATE: - p h:ve Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5 25X1A elease 2061/0/07CIA-IDP83B0982,3R000100010001-5 -/9 Chief) Counter Intelligence Staff Director of Communications Review of Agency Use of Cryptonyms IF Action Memorandm No. 315 !f.JV 1. Having reviewed the reference, I wish to mire two comments from the standpoint of the Office of Communications: a. Since CIA cable comnaunications are enciphered in category A cryptographic systems, there exists no technical communication security requirement for the use of cryptonyms in CIA cable communications. b. It is a fact that the clearer the meaning of a eable, generally the shorter is the processing time ale reason for thia is twofold. First, cables which are mutilated in transmission are more easily and quickly degarbled when the clear meaning of the text is Apparent. Second, ,the apparent reduction it cable length which the use of cryptonyms affords is often negated by the requirement to repeat seldom used or unusual words. 2. Recognising that there are ma other factors which bear on the decision to employ cryptonyms in CIA cable communications, / am forwarding the foregoing for consideration in your review of the subject. G friPutratici ^17 Approved For Release2. $-ObbeiSi02 :CI ''A::Rb-Fil.1B00823R000100010001-5 2 PP 823R000100010001-5 - ? - - -.. .. ..-..- ....-. r.?-.m. ?-.1....kwi- ION TOP AND BOTTOM UNCLASSIFIED CONFIDENTIAL 1 SECRET CENTRAL INTELLIGENCE AGENCY OFFICIAL ROUTING SLIP TO NAME AND ADDRESS DATE INITIALS DID/S //wW-4, kif."... D/ Security - GE 31 Hq D 0 0110411 i DA PP I ACTION DIRECT REPLY PREPARE REPLY APPROVAL DISPATCH COMMENT rii r ?RECOMMENDATION __ CONCUR N 5.X1A TURE Remarks: 1 to 2 b Bob: 0 P ---- * CI Staff has action here.. I assume they coordinate with you. I will be interested in briefed orally and informally on the outcome. Wa...e...),..?.. ? will being LKW , - FROM: NAME. ADDRESS AND PHONE NO DATE wp FRipmeemblE002/15/0 , : 1rt71 - -1 er.Lve v,s e ; =Ai iti-,:.,: :.: : 01 2-61 c (40) U.S. GOVERNMENT PRINTING OFFICE 1961 0-597285 -5 /7/_-