COMMUNICATIONS USE OF <SANITIZED> CRYPTONYMS IN CABLES AND TELEPOUCHES (C)
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
02556190
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
3
Document Creation Date:
March 9, 2023
Document Release Date:
August 20, 2021
Sequence Number:
Case Number:
F-2019-00184
Publication Date:
October 5, 1979
File:
Attachment | Size |
---|---|
![]() | 66.17 KB |
Body:
.* Approved for Release: 2021/04/22 CO2556190
C-0- -I-D-E-N-T-I-A-L
COMMUNICATIONS
Field Counterpart:
This Notice Expires 1 November 1980
USE OF PSEUDONYMS AND CRYPTONYMS
IN CABLES AND TELEPOUCHES (C)
dated 5 October 1979
5 October 1979
1. This notice presents guidelines for the use of pseudonyms,
cryptonyms, and other identity substitutes in electronic communications
and emphasizes the need for responsible application of these standards.
Provisions concerning cables also apply to telepouches.
2. Electrical transmission of encrypted messages is secure.
However, security considerations require use of pseudonyms, cryptonyms,
or other identity substitutes in certain circumstances because there
are risks of compromise through exposure of copies of cables before or
after transmission. The following guidelines are intended to promote
a balance between the need for rapid comprehension of cabled .nformation
and requirements for protection of sensitive information.
(b)(3)
(b)(3)
(b)(1)
3. True names should be used in cables and telepouches whenever (b)(3)
consistent with the security of the person, activity, or thing referred
to. Such usage would normally include the following: /1
b. For U.S. Government officials and entities of the U.S.
Government in correspondence concerning their performance of overt
functions.
c. In Agency cables that transmit information identical
to that sent to field installations in "unsanitized" form by other
U.S. Government agencies.
d. In cables that concern readily discernible overt matters
and quotations from the media.
e. For references to countries or other entities when an
identity substitute is not necessary to protect sources or methods.
cel
4. Identity substitutes will normally be used in the following circum-
stances:
a. Pseudonyms and cryptonyms should be used in operational and
other sensitive traffic when it is necessary to protect sources and
methods information.
C-O-N-F-I-D- N-T-I-A-L
Approved for Release: 2021/04/22 CO2556190
Approved for Release: 2021/04/22 CO2556190
COMMUNICATIONS
5 October 1979
5. Routing indicators used to facilitate headquarters distribution
or correspondence should not be used as cryptonyms. cel
6.
(b)(3)
(b)(
(b)(
Improper use ot
identity substitutes or unwarranted confidence in their utility can be
detrimental to sound security practices and an impediment to rapid and
Approved for Release: 2021/04/22 CO2556190
Approved for Release: 2021/04/22 CO2556190
C-O-N-F-I-D -N-T-I-A-L
COMMUNICATIONS
5 October 1979
lucid communication. Originators of correspondence should consider if
the use of an identity substitute in a specific instance will contribute
to the security of that correspondence and act accordingly.
DISTRIBUTION: AB
DON I. WORTMAN
Deputy Director
for
Administration
C-O-N-F-I -E-N-T-I-A-L
pproved for Release: 2021/04/22 CO2556190