REVIEW OF AGENCY USE OF CRYPTONYMS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
02250671
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
21
Document Creation Date: 
March 9, 2023
Document Release Date: 
August 20, 2021
Sequence Number: 
Case Number: 
F-2019-00184
Publication Date: 
January 1, 1963
File: 
Body: 
Approved for Release: 2021/08/18 CO2250671 6/24/98 Approved for Release: 2021/08/18 CO2250671 � ��� � � t �4111,e Approved for Release: 2021/08/18 CO2250671 _)0/-5- .3 7?' � MEMORANDUM FOR: Executive Director VIA: SUI3.11. CT: puty Director for Plans /121j-' Ioaview of Agency Use of Cryptonyma EF ., rxecutive Director Memorandum 19 November 1963 1. Reference memorandum recommends a critical look be taken at the Agency use of cryptonyms in cable traffic. The recommendation proceeds from a premise that Agency conk . immications and physical security have tightened considerably since the last review of this subject. Z. This memorandum is a statement of the Cl Staff views regarding the various points raised in reference memorandum. 3. The Director of Communications has stated in substance as follows: a. There is no technical security. requirement for the use of cryptonyms in Agency cable communications. b. Garbled cables can be degarbled more easily if the meaning is not made unclear by the use of cryptonyrns, and cryptonyms do not neces- sarily result in a reduction of the length of the cable; thus, the clearer the n-,eaning of the cable, generally the 6-ho rte r is the processing time. No exception can be taken to the foregoing statements. It is observed from experience, Aowever, that a communications dial:Fr� I Excluded from autorati. dew :grading and deciaseilicallun Approved for Release: 2021/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 L. 40 system which is secure today may not be so twenty years from today, and that the use of cryptonyms is a form of insurance against future contingencies. 4. Reference queries '' where we must use cryptonyms for security reasons and where we can eliminate cryptonyrns with no sacrifice of security'. A reply is succinctly provided in Such use, however, is not a guarantee of security and does not obviate the need for additional security measures. Cable security does not term- inate with the transmission of the message. The information contained in the document requires constant protection and the presence of codes in the document is one way of providing a measure of security. 5. Recent study and observation in the Cl Staff indicates that there is not an 'overuse of cryptonyms where there is no longer a valid security reason for doing so . We have noted, however, an occasional misuse of cryptonyms in that a cryptonym will be used and that cryptonyrn will be compromised irx the text of the same cable, e.g.; a. Use of cryptonyms in the summarization of an identified newspaper article. b. Use of cryptonyms for Ambassadors, Prime Ministers, domestic or foreign organizations in reporting their activities, when the activity has been publicized or serves in and of itself to identify the performer. Correction of such errors is a matter of training and discipline for individuals, rather than the abandonment of the security ob- tained through the use of cryptonyms. 6. As to the slow-down in the administrative process occasioned by the use of cryptonyrns in cables, it has been determined that Area Division Officers, and CS Staff Officers, Grri I pproved for Release: 2021/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 SE LH L � who take and coordinate action on operational cables0 are knowledgeable of the meaning of each cryptozaym. The Cable Secretariat 'breaka out' the cryptonyrns for the DC!, FDCI, IG, LLD/P, and ADD/P. Beyond that point it is believed that the security of the message, even within the Headquarters building, takes precedence over the necessity for priority collateral administrative processing. In exceptional situations the 'break out" by Cable Secretariat can be extended. 7. Operations officers in the field stations are fully knowledgeable of the meaning of the cryptorzyms with which they deal. Though physical security may 'have tightened considerably since the last review, it was established in a security seminar, which took place in Headquarters in Novem- ber 1963. that physical security in the field is considerably less than clearable for a variety of reasons. The complexities of security in the field require constant review. Classified docun-,ents maintained in field stations must have the protection obtained through the use of cryptonyms. The matter of building facilities local hires, char people, and penetrable safe equip- ment. Is a continuing problem. 8. Possibly the most significant factor to be considered In the examination of this issue is that the Clandestine services � Records Committee in 1963 took action to incorporate cable traffic into the WALNUT system in the field, in order to reduce the volume of records maintained in the field and to provide for easy destruction in the event of emergency. Cables are micro- filmed and placed on aperture cards at Headquarters and pouched to the field. Pouch security procedures require the sterilization of the material contained on the aperture cards. Thus, any consideration of a reduction in the use of crypton.yms becomes moot in term* of controlling decisions already reached. 9. if we assume for the moment, for the sake of discussion, that there is in fact an excessive use of cryptonyms, pseudo- nyms, and identity cables, we are immediately confronted with the point of how to correct the situation. Accepting the premise that we will not discontinue the use of code designations, the question of what constitutes 'excessive use becomes a matter pproved for Release: 2621/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 rz. of interpretation in each individual cable. Correction can come about only through the creation of an awareness of the problem on the part of those employees preparing and releasing cables. Such action was taken in 1957 through the issuance of We would concur in the re-issuance of a similar notice at the present time. 11. As to the compromise of cryptonyms, it has been determined that compromised cryptonyrns relating to agents and operations are promptly replaced by operational components. The possible exception exists in the case of cryptonyras relating to the Agency and certain of its components, and to other U. S. and foreign government agencies. For example, by strict interpretation it can be accepted that KUBARK, ODACIi), and several others readily in mind, have been compromised in many ways over a period of years. They are in such constant use, however, that if they were changed, the new cryptonyrn would become similarly polluted in a very short time. M by then continue the use of such cryptonyrns? Only because their 12. In conclusion the CI Staff recommends that this general issue is not one calling for specific correction in the 4 (b)(1) (b)(3) - Approved for Release: 2021/08/18 CO2250671 4. abse of the p o Approved for Release: 2021/08/18 CO2250671 � to specific inst.nce 1 xcecsive a cod security. cc: Dtrectoz of cations ) frctor of SOMA ty P1 Angleton r Inkeiligence Staff tin pproved for Release: 2021/08/18 CO2250671 EDRWLOLEKCA!AINTPADBTO - 1CASFE FDNILSCE CNRLITLIEC GNYOFCA OTN LPT AEADADESDT NTAS1i1/d4 201,.... b( --- , ,)�--, TO C EI4 RPR EL APOA IPTHRCMEDTO CMETFL EUN OCREC NOMTO INTR i pr:,,()3 RM P "411 EDRINMD�-S, HN O AE IPOo0 NLSIIDiNIETA ERT O Approved 3) J9 rr- RM NO. 23'7 Use previous editions (40) for Release: 2021/08/18 CO2250671 pproved for Release: 2621/08/18 CO2250671 E 19" 0-587282 2-61 0, UNCLASSIFIED 1-1 INTERApproved for Release: 2021/08/18 CO22506711m SE ONLY WWII, I 1/01=11 � 0 SECRET "IP W ROUTING AND RECORD SHP SUBJECT: (optional) � FROM: Chief, CI Staff EXTENSION NO. - 1 . " i _ DATE , TO: (Officer designation, room number, and building) DATE OFFICER'S INITIALS COMMENTS (Number each comment to show from whom to whom. Draw a line across column after each comment.) RECEIVED FORWARDED 1 . DD/S fit iii.,!_ i 1 - j A.,td-1 v 0 v(.6y , I-, , 1 d 2. 3. Director of Security 4. 5. 6. CPA- .,... I 77 , 7. 8. 9. 10. 1 0 JIA) 1964 (b)(3) 11. 12. 13. 14. 15. FORM 3-62 610 USE PREVIOUS EDITIONS 0 SECRET 0 CONFIDENTIAL LI USE ONLY fl UNCLASSIFIED pproved for Release: 2021/08/18 CO2250671_ pproved for Release: 2021/08/18 CO2250671 STANPAR0 FeAl NO. 64 Office LvIernoranau � 713NITED STATES GOVER MENT � DATE: TO BROM : " SUBJECT: // zp. pproved for Release: 2021/08/18 CO2250671 (b)(3) Approved for Release: 2021/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 �-a ' r Chief COunt,er Intelligence Staff Director of Comunicati ns Review of Agency Use of CryptOnyms IMF Action Memorandum iIO. 315 V 1. Having reviewed the reference, I wish to vske two comn-nts from the standpoint of the Office of Communications: a. Since CIA cable communications are enciphered in category A cryptographic systems, there exists no technical communication security requirement for the use of cry,ptonyms in CIA cable col:mum-I cations . b. It is a fact that the clearer the meaning of a -cable, generally the shorter is the processing time. to reason for thia is twofold. First, cables which are mutilated in transmission are more easily and quickly � degarbled when the clear meaning of the text is Apparent. Second, the apparent reduction it cable length which the use of cryptotyms affords is often negated by the requirement to repeat seldom used or unusual words. � 2. Recognizing that there are msny other factors which bear on the decision to employ cryptonyms in CIA cable communications, I am forwarding the foregoing for consideration in your review of the subject. H. M. MCCIELLAHD 5,1 ?uttyalatic, 11.1.11.11MIMMIMIMIIMMIMIMM.Approved for Release: 2021/08/18 CO2250671 Approved for Release: 2021/08/18 CO2250671 earror SENDER WILL CHECK CLASSIF ION TOP AND BOTTOM ---1 UNCLASSIFIED CONFIDENTIAL 1 SECRET CENTRAL INTELLIGENCE AGENCY OFFICIAL ROUTING SLIP TO NAME AND ADDRESS DATE INITIALS 1 DID/S //--,2/-4 2 D/Security - GE 31 Hq L.2.31141.4 3 D a,..._ 1,110 o 5 6 ACTION DIRECT REPLY PREPARE REPLY APPROVAL DISPATCH RECOMMENDATION COMMENT FILE RETURN CONCURRENCE I FORMAT! TJV � informally Remarks: 1 to 2 1 , Staff has action with you. orally and o i (b)(: will being i Bob: CI coordinate briefed /fzjJ,