REVIEW OF AGENCY USE OF CRYPTONYMS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
02250671
Release Decision:
RIPPUB
Original Classification:
U
Document Page Count:
21
Document Creation Date:
March 9, 2023
Document Release Date:
August 20, 2021
Sequence Number:
Case Number:
F-2019-00184
Publication Date:
January 1, 1963
File:
Attachment | Size |
---|---|
REVIEW OF AGENCY USE OF C[15960989].pdf | 1.9 MB |
Body:
Approved for Release: 2021/08/18 CO2250671
6/24/98
Approved for Release: 2021/08/18 CO2250671
� ��� � � t
�4111,e
Approved for Release: 2021/08/18 CO2250671
_)0/-5- .3 7?'
�
MEMORANDUM FOR: Executive Director
VIA:
SUI3.11. CT:
puty Director for Plans /121j-'
Ioaview of Agency Use of Cryptonyma
EF ., rxecutive Director Memorandum
19 November 1963
1. Reference memorandum recommends a critical look
be taken at the Agency use of cryptonyms in cable traffic. The
recommendation proceeds from a premise that Agency conk .
immications and physical security have tightened considerably
since the last review of this subject.
Z. This memorandum is a statement of the Cl Staff views
regarding the various points raised in reference memorandum.
3. The Director of Communications has stated in substance
as follows:
a. There is no technical security. requirement for
the use of cryptonyms in Agency cable communications.
b. Garbled cables can be degarbled more easily
if the meaning is not made unclear by the use
of cryptonyrns, and cryptonyms do not neces-
sarily result in a reduction of the length of
the cable; thus, the clearer the n-,eaning of the
cable, generally the 6-ho rte r is the processing
time.
No exception can be taken to the foregoing statements. It is
observed from experience, Aowever, that a communications
dial:Fr� I
Excluded from autorati.
dew :grading and
deciaseilicallun
Approved for Release: 2021/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
L. 40
system which is secure today may not be so twenty years from
today, and that the use of cryptonyms is a form of insurance
against future contingencies.
4. Reference queries '' where we must use cryptonyms for
security reasons and where we can eliminate cryptonyrns with
no sacrifice of security'. A reply is succinctly provided in
Such use, however, is not
a guarantee of security and does not obviate the need for
additional security measures. Cable security does not term-
inate with the transmission of the message. The information
contained in the document requires constant protection and the
presence of codes in the document is one way of providing a
measure of security.
5. Recent study and observation in the Cl Staff indicates
that there is not an 'overuse of cryptonyms where there is no
longer a valid security reason for doing so . We have noted,
however, an occasional misuse of cryptonyms in that a
cryptonym will be used and that cryptonyrn will be compromised
irx the text of the same cable, e.g.;
a. Use of cryptonyms in the summarization
of an identified newspaper article.
b. Use of cryptonyms for Ambassadors, Prime
Ministers, domestic or foreign organizations
in reporting their activities, when the activity
has been publicized or serves in and of itself
to identify the performer.
Correction of such errors is a matter of training and discipline
for individuals, rather than the abandonment of the security ob-
tained through the use of cryptonyms.
6. As to the slow-down in the administrative process
occasioned by the use of cryptonyrns in cables, it has been
determined that Area Division Officers, and CS Staff Officers,
Grri
I
pproved for Release: 2021/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
SE LH
L
�
who take and coordinate action on operational cables0 are
knowledgeable of the meaning of each cryptozaym. The Cable
Secretariat 'breaka out' the cryptonyrns for the DC!,
FDCI, IG, LLD/P, and ADD/P. Beyond that point it is believed
that the security of the message, even within the Headquarters
building, takes precedence over the necessity for priority
collateral administrative processing. In exceptional situations
the 'break out" by Cable Secretariat can be extended.
7. Operations officers in the field stations are fully
knowledgeable of the meaning of the cryptorzyms with which
they deal. Though physical security may 'have tightened
considerably since the last review, it was established in a
security seminar, which took place in Headquarters in Novem-
ber 1963. that physical security in the field is considerably less
than clearable for a variety of reasons. The complexities of
security in the field require constant review. Classified
docun-,ents maintained in field stations must have the protection
obtained through the use of cryptonyms. The matter of building
facilities local hires, char people, and penetrable safe equip-
ment. Is a continuing problem.
8. Possibly the most significant factor to be considered
In the examination of this issue is that the Clandestine services
� Records Committee in 1963 took action to incorporate cable
traffic into the WALNUT system in the field, in order to reduce
the volume of records maintained in the field and to provide for
easy destruction in the event of emergency. Cables are micro-
filmed and placed on aperture cards at Headquarters and pouched to
the field. Pouch security procedures require the sterilization
of the material contained on the aperture cards. Thus, any
consideration of a reduction in the use of crypton.yms becomes
moot in term* of controlling decisions already reached.
9. if we assume for the moment, for the sake of discussion,
that there is in fact an excessive use of cryptonyms, pseudo-
nyms, and identity cables, we are immediately confronted with
the point of how to correct the situation. Accepting the premise
that we will not discontinue the use of code designations, the
question of what constitutes 'excessive use becomes a matter
pproved for Release: 2621/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
rz.
of interpretation in each individual cable. Correction can come
about only through the creation of an awareness of the problem
on the part of those employees preparing and releasing cables.
Such action was taken in 1957 through the issuance of
We would concur in the re-issuance of a similar notice at the
present time.
11. As to the compromise of cryptonyms, it has been
determined that compromised cryptonyrns relating to agents
and operations are promptly replaced by operational components.
The possible exception exists in the case of cryptonyras relating
to the Agency and certain of its components, and to other U. S.
and foreign government agencies. For example, by strict
interpretation it can be accepted that KUBARK, ODACIi), and
several others readily in mind, have been compromised in
many ways over a period of years. They are in such constant
use, however, that if they were changed, the new cryptonyrn
would become similarly polluted in a very short time. M by
then continue the use of such cryptonyrns? Only because their
12. In conclusion the CI Staff recommends that this
general issue is not one calling for specific correction in the
4
(b)(1)
(b)(3)
- Approved for Release: 2021/08/18 CO2250671
4.
abse
of the p
o
Approved for Release: 2021/08/18 CO2250671
�
to specific inst.nce 1 xcecsive a
cod security.
cc: Dtrectoz of cations )
frctor of SOMA ty
P1
Angleton
r Inkeiligence Staff
tin
pproved for Release: 2021/08/18 CO2250671
EDRWLOLEKCA!AINTPADBTO - 1CASFE FDNILSCE CNRLITLIEC GNYOFCA OTN LPT AEADADESDT NTAS1i1/d4 201,....
b(
---
,
,)�--, TO C EI4 RPR EL APOA IPTHRCMEDTO CMETFL EUN
OCREC NOMTO INTR i
pr:,,()3
RM
P
"411
EDRINMD�-S, HN O AE
IPOo0
NLSIIDiNIETA ERT
O
Approved
3)
J9 rr-
RM NO.
23'7 Use previous editions (40)
for Release: 2021/08/18 CO2250671
pproved for Release: 2621/08/18 CO2250671 E 19" 0-587282
2-61
0, UNCLASSIFIED
1-1 INTERApproved for Release: 2021/08/18 CO22506711m
SE ONLY WWII, I 1/01=11 �
0 SECRET
"IP W ROUTING AND RECORD SHP
SUBJECT: (optional)
�
FROM:
Chief, CI Staff
EXTENSION
NO. -
1 . " i _
DATE ,
TO: (Officer designation, room number, and
building)
DATE
OFFICER'S
INITIALS
COMMENTS (Number each comment to show from whom
to whom. Draw a line across column after each comment.)
RECEIVED
FORWARDED
1 .
DD/S
fit iii.,!_
i 1 -
j A.,td-1
v 0
v(.6y
,
I-,
,
1
d
2.
3.
Director of
Security
4.
5.
6.
CPA-
.,...
I 77
,
7.
8.
9.
10.
1 0 JIA) 1964
(b)(3)
11.
12.
13.
14.
15.
FORM
3-62
610
USE PREVIOUS
EDITIONS
0 SECRET 0 CONFIDENTIAL LI USE ONLY fl UNCLASSIFIED
pproved for Release: 2021/08/18 CO2250671_
pproved for Release: 2021/08/18 CO2250671
STANPAR0 FeAl NO. 64
Office LvIernoranau � 713NITED STATES GOVER MENT
� DATE:
TO
BROM :
"
SUBJECT:
//
zp.
pproved for Release: 2021/08/18 CO2250671
(b)(3)
Approved for Release: 2021/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
�-a '
r
Chief COunt,er Intelligence Staff
Director of Comunicati ns
Review of Agency Use of CryptOnyms
IMF Action Memorandum iIO. 315
V
1. Having reviewed the reference, I wish to vske two comn-nts
from the standpoint of the Office of Communications:
a. Since CIA cable communications are enciphered in
category A cryptographic systems, there exists no technical
communication security requirement for the use of cry,ptonyms
in CIA cable col:mum-I cations .
b. It is a fact that the clearer the meaning of a
-cable, generally the shorter is the processing time. to
reason for thia is twofold. First, cables which are
mutilated in transmission are more easily and quickly
� degarbled when the clear meaning of the text is Apparent.
Second, the apparent reduction it cable length which the
use of cryptotyms affords is often negated by the requirement
to repeat seldom used or unusual words.
� 2. Recognizing that there are msny other factors which bear
on the decision to employ cryptonyms in CIA cable communications,
I am forwarding the foregoing for consideration in your review
of the subject.
H. M. MCCIELLAHD
5,1 ?uttyalatic,
11.1.11.11MIMMIMIMIIMMIMIMM.Approved for Release: 2021/08/18 CO2250671
Approved for Release: 2021/08/18 CO2250671
earror
SENDER WILL CHECK CLASSIF ION TOP AND BOTTOM
---1
UNCLASSIFIED CONFIDENTIAL 1 SECRET
CENTRAL INTELLIGENCE AGENCY
OFFICIAL ROUTING SLIP
TO
NAME AND ADDRESS
DATE
INITIALS
1
DID/S
//--,2/-4
2
D/Security - GE 31 Hq
L.2.31141.4
3
D
a,..._
1,110
o
5
6
ACTION
DIRECT REPLY
PREPARE REPLY
APPROVAL
DISPATCH
RECOMMENDATION
COMMENT
FILE
RETURN
CONCURRENCE
I FORMAT! TJV
�
informally
Remarks:
1 to 2
1
,
Staff has action
with you.
orally and
o
i
(b)(:
will
being
i
Bob:
CI
coordinate
briefed
/fzjJ,