COMMUNICATIONS USE OF <SANITIZED> CRYPTONYMS IN CABLES AND TELEPOUCHES (C)

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
02556190
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
3
Document Creation Date: 
March 9, 2023
Document Release Date: 
August 20, 2021
Sequence Number: 
Case Number: 
F-2019-00184
Publication Date: 
October 5, 1979
File: 
Body: 
.* Approved for Release: 2021/04/22 CO2556190 C-0- -I-D-E-N-T-I-A-L COMMUNICATIONS Field Counterpart: This Notice Expires 1 November 1980 USE OF PSEUDONYMS AND CRYPTONYMS IN CABLES AND TELEPOUCHES (C) dated 5 October 1979 5 October 1979 1. This notice presents guidelines for the use of pseudonyms, cryptonyms, and other identity substitutes in electronic communications and emphasizes the need for responsible application of these standards. Provisions concerning cables also apply to telepouches. 2. Electrical transmission of encrypted messages is secure. However, security considerations require use of pseudonyms, cryptonyms, or other identity substitutes in certain circumstances because there are risks of compromise through exposure of copies of cables before or after transmission. The following guidelines are intended to promote a balance between the need for rapid comprehension of cabled .nformation and requirements for protection of sensitive information. (b)(3) (b)(3) (b)(1) 3. True names should be used in cables and telepouches whenever (b)(3) consistent with the security of the person, activity, or thing referred to. Such usage would normally include the following: /1 b. For U.S. Government officials and entities of the U.S. Government in correspondence concerning their performance of overt functions. c. In Agency cables that transmit information identical to that sent to field installations in "unsanitized" form by other U.S. Government agencies. d. In cables that concern readily discernible overt matters and quotations from the media. e. For references to countries or other entities when an identity substitute is not necessary to protect sources or methods. cel 4. Identity substitutes will normally be used in the following circum- stances: a. Pseudonyms and cryptonyms should be used in operational and other sensitive traffic when it is necessary to protect sources and methods information. C-O-N-F-I-D- N-T-I-A-L Approved for Release: 2021/04/22 CO2556190 Approved for Release: 2021/04/22 CO2556190 COMMUNICATIONS 5 October 1979 5. Routing indicators used to facilitate headquarters distribution or correspondence should not be used as cryptonyms. cel 6. (b)(3) (b)( (b)( Improper use ot identity substitutes or unwarranted confidence in their utility can be detrimental to sound security practices and an impediment to rapid and Approved for Release: 2021/04/22 CO2556190 Approved for Release: 2021/04/22 CO2556190 C-O-N-F-I-D -N-T-I-A-L COMMUNICATIONS 5 October 1979 lucid communication. Originators of correspondence should consider if the use of an identity substitute in a specific instance will contribute to the security of that correspondence and act accordingly. DISTRIBUTION: AB DON I. WORTMAN Deputy Director for Administration C-O-N-F-I -E-N-T-I-A-L pproved for Release: 2021/04/22 CO2556190