Index

APPENDIX D

SPECIAL PROCEDURES FOR USE IN SYSTEMATIC AND MANDATORY REVIEW OF CRYPTOLOGIC INFORMATION

1. General guideline: Cryptologic information uncovered in systematic or mandatory review for declassification of 25-year old government records is not to be declassified by other than the National Security Agency. The information may concern or reveal the processes, techniques, operations, and scope of signals intelligence (SIGINT), which consists of communications intelligence (COMINT), electronic intelligence (ELINT), and foreign instrumentation signals intelligence (FISINT), or it may concern the components of Information Security (INFOSEC) which consists of communications security (COMSEC) and computer security (COMPUSEC), including the communications portion of cover and deception plans. Much cryptologic information is also considered "Foreign Government Information" as defined in Para. 1.1(d) of the Executive Order 12958.

2. Recognition of cryptologic information may not always be an easy task. There are several broad classes of cryptologic information, as follows:

3. Some commonly used words that help to identify cryptologic documents and materials are "cipher," "code," "codeword," communications intelligence," or "COMINT," "special intelligence," "communications security," or "COMSEC," "computer security or COMPUSEC," cryptanalysis," crypto," cryptography," "cryptosystem," "cipher," 'decipher," "decode," "decrypt," "direction finding," "electronic intelligence" or "ELINT," "electronic security," "encipher," "encode," "encrypt," "foreign instrumentation signals intelligence" or "FISINT" pr "FIS"," "telemetry," "information system s security" or "INFOSEC," "intercept," :key book," "one-time-pad," "bookbreaking," "signals intelligence" or "SIGINT," "signals security," "TEMPEST," and "traffic analysis" or "TA."

4. Special procedures apply to the review and declassification of classified cryptologic information. The following shall be observed in the review of such information.