REVIEW OF AGENCY USE OF CRYPTONYMS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP83B00823R000100010001-5
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
21
Document Creation Date:
December 9, 2016
Document Release Date:
June 19, 2000
Sequence Number:
1
Case Number:
Publication Date:
January 1, 1963
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 2.1 MB |
Body:
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
BEST
Availa
THR?
6/24/98
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
???????-_,?
Approved r Release 20
? CIA-RDP83B01123R000?004k104-? ?557 .r
3
MEM01 DUM FOR: Executive Director
VLA:
SUBJECT:
EFFFEENCE
ottl'
puty Director for Plans ii?-
Ieview of Agency Uie of Cryptonyrna
rxecutive Director Memorandum of
19 November 1963
1. Reference memorandum recommends a critical look
be taken at the Agency use of cryptonyms in cable traffic. The
recommendation proceeds from a premise that Agency corn .
munications and physical security have tightened considerably
since the last review of this subject.
Z. This memorandum is a sta,terrient of the CI Staff views
regarding the various points raised in reference memorandum.
3. The Director of Communications has stated in substance
as follows:
a. There is no technical security requirement for
the use of cryptonyms in Agency cable coiramanications.
b. Garbled cables can be degarbled more easily
if the meaning is not made unclear by the use
of eryptonyrns, and cryptonyms do not neces-
sarily result in a reduction of the length of
the cable; thus, the clearer the n-,eaning of the
cable, generally the shorter is the processing
time.
No exception can be taken to the foregoing statements. It is
observed from experience, nowever, that a communications
Approved For Release 200
IA-
GROUP I
Excluded from autamath
derlEradiag and
00100010001-5
?-et.,-,f4 V
25X1A
25X1A
Approved II Release 2003(05/92 CIA-RDP83B00463R000100010001-5
tr
71. 1
system which is secure today may not be so twenty years from
today, and that the use of cryptonyms is a form of insurance
against future contingencies.
4. Reference queries ' where we must use cryptonyms for
security reasons and where we can eliminate cryptonyrns with
no sacrifice of security . A reply is succinctly orovidpri in
Such use, however, is not
a guarantee of security and does not obviate the need for
additional security measures. Cable security does not term-
inate with the transmission of the message. The information
contained in the document requires constant protection and the
presence of codes in the document is one way of providing a
measure of security.
5. Recent study and observation in the Cl Staff indicates
that there is not an 'overuse of cryptonyrns where there is no
longer a valid security reason for doing so . We have noted,
however, an occasional misuse of cryptorlyrns in that a
cryptonym will be used and that cryptonyrn will be compromised
Lu the text of the same cable, e.g.;
a. Use of cryptonyms in the summarization
of an identified newspaper atticle.
b. Use of cryptonyxns for Ambassadors, Prime
Ministers, domestic or foreign organizations
in reporting their activities, when the activity
has been publicized or serves in and of itself
to identify the performer.
Correction of such errors is a matter of training and discipline
for individuals, rather than the abandonment of the security ob-
tained through the use of cryptonyrns.
6. As to the slow-down in the administrative process
occasioned by the use of cryptonyms in cables, it has been
determined that Area Division Officers, and CS Staff Officers,
Approved For Release 202JOt42 CIA-RDP83600823R000100010001-5
Uli
?
? Approved eRelease 200 dEfIA-RDP8360.3R000100010001-5
who take and coordinate action ou operational cables, are
knowledgeable of the meaning of each cryptosayrn. The Cable
Secretariat 'breaks out' the cryptonyrns for the DCI,
FDCI, 10, LLI)/P. and ADD/P. Beyond that point it is believed
that the security of the message, even within the Headquarters
building, takes precedence over the necessity for priority
collateral administrative processing. In exceptional situations
the break out by Cable Secretariat can be extended.
7. Operations officers in the field stations are fully
knowledgeable of the meaning of the cryptorzyms with which
they deal. Though physical security may 'have tightened
considerably since the last review, it was established in a
security seminar, which took place in Headquarters in Novem-
ber 1963, that physical security in the field is considerably less
than clearable for a variety of reasons. The complexities of
security in the field require constant review. Classified
documents maintained in field stations must have the protection
obtained through the use of cryptonyms. The matter of building
? facilities, local hires, char people, and penetrable safe equip-
ment, Is a continuing problem.
8. Possibly the most significant factor to be considered
In the examination of this issue is that the Clandestine services
? Records Committee in 1963 took action to incorporate cable
traffic into the WALNUT system in the field, in order to reduce
the volume of records maintained in the field and to provide for
easy destruction in the event of emergency. Cables are micro-
filmed and placed on aperture cards at Headquarters and pouched to
the field. Pouch security procedures require the sterilization
of the material contained on the aperture cards. Thus, any
consideration of a reduction in the use of cryptonyrns becon es
moot in tern,* of controlling decisions already reached.
9. if we assume for the moment, for the sake of discussion,
that there is in fact an excessive use of cryptonyms, pseudo-
nyms, and identity cables, we are immediately confronted with
the point of how to correct the situation. Accepting the premise
that we will not discontinue the use of code designations, the
question of what constitutes 'excessive use becomes a matter
Approved For Release 20 2 : CIA-RDP83600823R000100010001-5
? Approved FihRelease 2002/05/02 : CIA-RDP83B004R000100010001-5
25X1A
25X1A
25X1A
25X1A
of interpretation in each individual cable. Correction can come
about only through the creation of an awareness of the problem
on the part of those employees preparing and releasing cables.
Such action was taken in 1957 through the issuance oil
We would concur in the re-issuance of a similar notice at the
present time.
oeueve mat a general review of this alleged problem could
result in any material improvement.
11. As to the compromise of cryptonyms, it has been
determined that compromised cryptonyrns relating to agents
and operations are promptly replaced by operational components.
The possible exception exists in the case of cryptonyms relating
to the Agency and certain of its components, and to other U. S.
and foreign government agencies. For example, by strict
interpretation it can be accepted that KUBARK, ODACIO, and
several others readily in mind, have been compromised in
many ways over a period of years. They are in such constant
use, however, that if they were changed, the new cryptonyrn
would become similarly polluted in a very short time. M by
then continue the use of such crvotonvros? Only lior=?410
12. In conclusion the Cl Staff recommends that this
general issue is not one calling for specific correction in the
4
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
25X1
25X1
. Approved- r Release 2002/05/02 : CIA-RDP839.3R000100010001-5
4
abse
of the p
c to specific inst.nce 1 xcecsive a pl t on
ood security.
AngletOn
r lotailigence Staff
cc: Dtrectoz of 'cations )
frctor of Security
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
ovecl P5NRigimitO011itil510#1111AAROMERTIMMEracruTut.
--] t1NCLASSIFiED 1 I 11161s1FIDENTIAL
SECRET
CENTRAL INTELLIGENCE AGENCY
1Y:1A OFFICIAL ROUTING SLIP
TO
NAME AND ADDRESS
DATE
INITIALS
1
0
7) 7,,t,_
,.
...._........?
_
4
',V,: a
,r
r
6
_ 0,4?,,,Li-4
TION
ECT REP)4Y
PREPARE REPLY
APPROVAL
DISPATCH
RECOMMENDATION
COMMENT
FILE
RETURN
CONCURRENCE
INFORMATION
SIGNATURE
I
, :,
"II- ,-e,
0..-- 40,
Adi7;1A? AGIAOZ":1114-4iTair C
1A
?
FOLD H - - RE 1,6 , SENDER
FROM: NAM D PHONE NO.
DATE
';fVF'
42'
rOV z d RaltReiltatia Y 11 i'-' 7 Vr?:"41r, II : '01
y
FORM NO.
2-61 4 q37 Use previous editions
(40)
U.S. GOVERNMENT PRINTING OFFICE 1961 0-587282
01
r\E1 UNCLASSIFIE.D INTERNAL
? _ CONMENT I AL El SECRET
AnnrnJi CIA IP `-'4101 41. ROUTING AND RECORD SHN
SUBJECT: (Optional)
?
FROM: EXTENSION NO.
-
Chief, CI Staff 1 . " i _
,
DATE
TO: (Officer designation, room number, and DATE
building) OFFICER'S COMMENTS (Number each comment to show from whom
INITIALS to whom. Draw a line across column after each comment.)
RECEIVED FORWARDED
DD/S fitt, i i A.A../
vC......"
1.
1 -
.6y v 0
2.
,
3.
Director of 41,
' i
Security
4.
5.
OYTA--C-
r
d
..7 OA
6.
ii--iLe..a?12,02 ":"/F
7.
I 77
8.
?,.
r
9.
10.
1 0 JIAN 1.964
11.
12.
13.
14.
15.
FORM
3-62
25
610 USE ITIEMUS ,Er7knSfARET3r Re ElseCaNRIORNZ MA-R084rVIAR0001 ClglOONCOSSI F I ED
4
STANDARD RSAI NO.
IP I 11 (?
t 11
Office Memoranda y?
25X1A
TO
BROM :
25X1A
SUBJECT:
/02 : CIA-RDP83600823R000100010001-5
713NITED STATES GOVERNMENT
DATE:
-
p h:ve
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
Approved For Release 2002/05/02 : CIA-RDP83600823R000100010001-5
25X1A
elease 2061/0/07CIA-IDP83B0982,3R000100010001-5
-/9
Chief) Counter Intelligence Staff
Director of Communications
Review of Agency Use of Cryptonyms
IF Action Memorandm No. 315
!f.JV
1. Having reviewed the reference, I wish to mire two comments
from the standpoint of the Office of Communications:
a. Since CIA cable comnaunications are enciphered in
category A cryptographic systems, there exists no technical
communication security requirement for the use of cryptonyms
in CIA cable communications.
b. It is a fact that the clearer the meaning of a
eable, generally the shorter is the processing time ale
reason for thia is twofold. First, cables which are
mutilated in transmission are more easily and quickly
degarbled when the clear meaning of the text is Apparent.
Second, ,the apparent reduction it cable length which the
use of cryptonyms affords is often negated by the requirement
to repeat seldom used or unusual words.
2. Recognising that there are ma other factors which bear
on the decision to employ cryptonyms in CIA cable communications,
/ am forwarding the foregoing for consideration in your review
of the subject.
G
friPutratici
^17
Approved For Release2.
$-ObbeiSi02 :CI ''A::Rb-Fil.1B00823R000100010001-5
2
PP
823R000100010001-5
- ? - - -.. .. ..-..- ....-. r.?-.m. ?-.1....kwi- ION TOP AND BOTTOM
UNCLASSIFIED CONFIDENTIAL 1 SECRET
CENTRAL INTELLIGENCE AGENCY
OFFICIAL ROUTING SLIP
TO
NAME AND ADDRESS
DATE
INITIALS
DID/S
//wW-4,
kif."...
D/ Security - GE 31 Hq
D 0
0110411
i
DA PP
I
ACTION
DIRECT REPLY
PREPARE
REPLY
APPROVAL
DISPATCH
COMMENT
rii r
?RECOMMENDATION
__
CONCUR
N
5.X1A
TURE
Remarks:
1 to 2
b
Bob:
0 P ----
*
CI Staff has action here.. I assume they
coordinate with you. I will be interested in
briefed orally and informally on the outcome.
Wa...e...),..?.. ?
will
being
LKW
, -
FROM: NAME. ADDRESS AND PHONE NO
DATE
wp FRipmeemblE002/15/0 , : 1rt71 - -1 er.Lve v,s e ; =Ai
iti-,:.,: :.: : 01
2-61 c
(40)
U.S. GOVERNMENT PRINTING OFFICE 1961 0-597285
-5
/7/_-