national security agency/ central security service- nsa/css policy i-55

15
D0CID: 382L433 UNCLASSIFIED/ NATIONAL SECI.JRITY AGENCY CENTRAI, SECURITY SERVICE NSA/CSS POLICY I-55 Issue Datc: I9 September 2007 Revised: l0 June 2010 (u) THE CRYPTOLOGIC HISTORY PROGRAM (u) PURPOSE AND SCOPE (U) This document acknowledges that United States Covcrnment cryptology is a national resource, exercised in trust by NSA/CSS, which has an obligation to thc nation to document its performance and stewardship of resources (Reference a). This policy provides procedures and responsibilities for the production of cryptologic history by the NSA/CSS Center for Cryptologic History (CCH). (U) This policy applies to all NSA/CSS personnel. KETTH B. ALEXANDER Lieutenant General, U.S. Army Director, NSA/Chief, CSS Endorsed by Associate Director for Policy Encls: (U) Annex A - The NSA/CSS Oral History Prograrn (U) Annex B - Cryptologic Quarterly (U) Annex C - Memonalization Process (U) Annex D - Hall of Honor DISTRIBUTION: EC (5 Stock Copies) DJP I DJP6 (vR) DJP6 (Archives) UNCLASSIFIED/

Upload: rob

Post on 28-Nov-2014

578 views

Category:

Documents


2 download

DESCRIPTION

National Security Agency/ Central Security Service- NSA/CSS POLICY I-55 was issued on 9/I9/ 2007 and the last revised on 6/10/201. This fifteen page document governs all aspects of the Center for Cryptologic History's activities including its oral history program, its publication of books and the Cryptologic Quarterly, and the NSA's Memoralization programs.

TRANSCRIPT

Page 1: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

D0CID: 382L433

UNCLASSIFIED/

NATIONAL SECI.JRITY AGENCY

CENTRAI, SECURITY SERVICE

NSA/CSS POLICY I-55

Issue Datc: I9 September 2007Revised: l0 June 2010

(u) THE CRYPTOLOGIC HISTORY PROGRAM

(u) PURPOSE AND SCOPE

(U) This document acknowledges that United States Covcrnment cryptology is anational resource, exercised in trust by NSA/CSS, which has an obligation to thc nation todocument its performance and stewardship of resources (Reference a). This policy providesprocedures and responsibilities for the production of cryptologic history by the NSA/CSS Centerfor Cryptologic History (CCH).

(U) This policy applies to all NSA/CSS personnel.

KETTH B. ALEXANDERLieutenant General, U.S. Army

Director, NSA/Chief, CSS

Endorsed byAssociate Director for Policy

Encls:(U) Annex A - The NSA/CSS Oral History Prograrn(U) Annex B - Cryptologic Quarterly(U) Annex C - Memonalization Process(U) Annex D - Hall of Honor

DISTRIBUTION:EC (5 Stock Copies)DJP IDJP6 (vR)DJP6 (Archives)

UNCLASSIFIED/

Page 2: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocID: 382L433

UNCLASSIFIED/

Policy l -55 Dated: 19 September 2007

(U) This Policy l-55 supersedes NSA/CSS Policy l-55, dated I September 2004. The AssociateDirector for Policy endorsed an administrative update effective I 0 June 20 l0 to add Annex Dand make other minor adjustments.(U) OPI: Center for Cryptologic History, EC,972-2893s.(U) fhe compilation of the information contained in this document is UNCLASSIFIED//ffiNosectionofthisdocumentshallbereleasedwithoutapprovalfrom the Office of Policy and Records (DJP).

(u) POLICY

l. (U) In recognition of the fact that U.S. Government cryptology is a national resourceexercised in trust by NSA/CSS, which has a national obligation to document its performance andits stewardship of resources by conducting a history program, the NSA/CSS shall:

a. (U) Maintain a Cryptoiogic History Program in order to document and advancean understanding of the history of U.S. Government crlptology and the history of theNSA/CSS; and

b.(U) Coordinate and manage cryptologic history activities at NSA/CSS throughthe NSA/CSS Center for Cryptologic History (CCH) (Reference b), with advice andguidance from the NSA Advisory Board (NSAAB) Cryptologic History, Literature andMuseum Panel (Reference c). The CCH shall provide objective, meaningful, historicalsupport to the NSA/CSS leadership and workforce to enhance decision-making,cryptologic knowledge, and esprit de corps; and advance an understanding of cryptologichistory for the U.S. Intelligence Community, the Department of Defense, othergovernment agencies, academia, and the general public.

(u) RESPONSIBTLTTIES

2. (U) The NSAAB Cryptologic History, Literature and Museum Panel, an advisorybody esablishcd by the Director, NSA/Chieq CSS (DIRNSA/CHCSS, hereinafter "DIRNSA"),shall:

a. (U) Provide advice and guidance on the history program (Reference c);

b. (U) Meet, at the direction of the Panel Chairman (selected in accordance withNSAAB procedures), to review the activities of CCH, the National CryptologicMuseum, and the NSA/CSS professional journal (Cryptologic Quarterly);

c. (U) Make recommendations to DIRNSA on memorialization issues;

d. (U) Provide an annual report to DIRNSA on the status of the history programand make recommendations for improving impact and effectiveness;

2

UNCLASSIFIED//

Page 3: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DOCfD: 3F-?L433

UNCLASSIFIED/

Policy l-55 Dated: 19 September2}oT

e. (U) Review the CCH Publication Plan, at least annually; and

f. (U) Periodically examine the editorial review process for CCH classified andunclassified manuscript drafts.

3. (U) The Chiefl Center for Cryptologic History, reports directly to the AssociateDirector for Education and Training (ADET) and shall:

a. (U) Operate the Center for Cryptologic History;

b, (U) Serve as Executive Secretary for the NSAAB Cryptologic History,Literature and Museum Panel;

c. (U) Oversee the writing and publishing by CCH historians of U.S. Governmentcryptologic activities (Reference d), to include:

I ) (U) Establishing a publication plan each year that responds torequirement$ for historical studies;

2) (U) Implementing a formal editorial review process for CCH classifiedand unclassified manuscript drafts - this process will include participation byprofessional historians and subject-matter experts within and outside of CCH toensure thc Center's publications meet professional standards for research,historical interpretation, and writing;

3) (U) Ensuring that CCH publications contain an appropriate disclaimerstating that they present a historical perspective for informational and educationalpurposes, are the result ofindependent research, and do not necessarily reflect aposition of NSA/CSS or any other U.S. Government entity;

4) (U) Maximizing access to CCH publications by making them available,as much as practical, in both hard-copy and on-line versions; and

5) (U) Coordinating with the Oflice of Policy and Records (DJ) and theOffice of Public and Media Affairs (DC03) in accordance with the NSA/CSS pre-publication review process (Reference e) for all unclassified CCH publications.

d. (U) Oversee the NSA/CSS oral history program (see Annex A);

e.(U) Manage the publication and distribution of the NSA/CSS professionaljoumal, Cryptologic Quarterly (see Annex B);

f. (U) Manage the nomination process for inductions into the Hall of Honor (seeAnnex D);

3

UNCLASSIFIED/

Page 4: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocrD: 38ZL433

UNCLASSIFIED/

Policy l-55 Dated: 19 September2007

g. (U) Undertake activities that increase the historical awareness andunderstanding of the NSA/CSS leadership and workforce;

h. (U) Ensure requirements for historical information received from NSA/CSSpersonnel and other cleared government officials are met as effectively as possible, andthat appropriate responses are provided to requests for publicly released historicalinformation. (Freedom of Information Act IFOIA] requests will be directed to theNSA/CSS FOLA office; see Reference 0;

i. (U) Serve as a liaison between NSA/CSS and the history offices of other DoDcomponents and federal government agencies; and

j. (U) Supervise and direct the work of volunteers and consultants in CCH(Reference g).

4. (U) The Associate Director for Strategic Communications (DN) shall:

a. (U) Manage and operate the National Cryptologic Museum; and

b. (U) Manage the strategic corporate rollout of NSA/CSS historical informationand publications.

5. (U) The Deputy Associate Director for Policy and Records (DJP) shall providearchival support to the NSfuCSS history program.

6. (U) The Directors, Associate Directors, NSA/CSS Chief of Staff, and ExtendedEnterprise Chiefs/Commanders shall:

a.(U) Preserve and retire documents in accordance with records managementguidance established by the Offrce of Policy and Records (Reference h) to ensure thedocumentation required for writing cryptologic history is available; and

b. (U) Provide representatives to the NSAAB Cryptologic History, Literature andMuseum Panel as provided for in the Panel's Terms of Reference (Rcfcrcnce c).

7. (U) Installations and Logistics (L) will be responsible for the funding associated withany contracts necessary to accomplish the installation of appropriate memorialization signage as

specified in Annex C, Paragraph 4a, Tier l.

8. (U) Organizations sponsoring memorialization activities specified in Annex C,Paragraph 4a, Tiers II and III, will be responsible for the funding associated with thesc activities.

9. (U) NSA/CSS personnel are encouraged to document their activities in informal orformal historical accounts, as appropriate and to the extent possible, especially after importantcvcnts or projects have been completed. The Center for Cryptologic History can provide

4

UNCLASSIFIED/

Page 5: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DOCID: 382L433

UNCLASSIFIED/

Policy l-55 Dated: l9September2007

assistance to NSA/CSS organizations preparing historical accounts of their activities and, as

appropriate, to Service Cryptologic Element history offices

(U) REFERENCES

10. (U) References:

a. (U) Intelligence Community Directive 180, "Intelligence Community HistoryPrograms," dated 29 August 2007.

b. (U) Di rcctor's M cmorantlurn. I-istatrl isluncnt o l' thc Ccntcr ltrr C'r'vptolosi c

_l_[iqtoly" da tc.d 9 Nlrygrnhg1-l9.t?.

c.(U) 'fcrrns ol'ltc,lblcrncc. NSA Advisory lJoard Cryptolo$ic History. Litcrraturc'ancl Muscurrr l'}ancl. clatcd tl July 1003

d. (U) Mcrnorarrclurn liorn thc I'lislorinn. Otlicc ol thc Scc,rctarv ot'Dc'l-crrsc'.clatcd 2l Jnnuarv 1963.

e. (U) NSA/C'SS Policy l-30, "Review of NSA/CSS linformation for PublicDissemination," dated l0 August 2006.

f. (U) NSAICISS l,olicy l-5, "NSA/CSS Freedom of Information Act Program,"dated24 May 2004.

g.(U) lt4enrorarrdunr lilr thc Dircctor. Natiortal Sccurity Aucnc-v. ltorn tltc 0lllcc'o l' t h c S c c r c la ry o l' _DglcL\gJ4lgtll_lAygSll9 91.

h.(U) NSAi(lSS Prrlic-y l-6, "Records Management Program," dated 6 March2009.

i. (U) Privacy Act of 1974, Unitcd Statcs Codc Scction 552a.

j. (U) Arrnv l{cqulation l-i.l, "The Army Memorial Program," dated 30 May2006.

5

UNCI,ASSIFIED//

Page 6: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocrD: 382I433

UNCLASSIFIED/

(u) ANNEX A

(u) THE NSA/CSS ORAL HISTORY PROGRAM

(u) PURPOSE

l. (U) The NSA/CSS Oral History Program, an integral and essential element of theNSA/CSS Cryptologic History Program, enables NSA/CSS to supplement written history withinformation obtained from individuals with an intimate knowledge of cryrptologic activities.

2. (U) The purpose of the Oral History Program is to collect an individual's personalperspectives and remembrances of NSA/CSS personnel, organizations, and missions. Its goal isto create high-quality audio recordings and accurate transcripts that will ultirnately be available

. to Intelligence Community historians, researchers, and management for organizational historiesand educational courses.

3. (U) The Oral History Program differs considerably from similar projects conductedby private organizations and academic institutions because most interview subjects are current orformer U.S. Govemment personnel, and because the classified nature of the information requiresthat the documents thus created receive special handling.

(u) PROCEDURES

4. (U) The Oral History Program is an officialgovernment activity. Participation in theprogram by government personnel (military or civilian; current or former) does not violate eithertheir non-disclosure agreement or their separation oath. However, participants remain bound bytheir non-disclosure agreement and separation oath for all purposes other than the temporaryrelease authorized above for such participation

5. (U) Information imparted by the interviewees, insofar as it is related to personalmatters, is protected from disclosure by the Privacy Act of 1974. Information may also besubject to the Freedom of lnformation Act, and therefore releasable to the public after theapplication of appropriate privacy and classification/declassification guidelines. Interviewees areinformed of these facts prior to the recording of an interview (References f and i).

6. (U) Interviewees acknowledge and agree to relinquish voluntarily allrights to the oralhistory interview materials and irrevocably assign all copyright, title to and interest in thematerial to the Center for Cryptotogic History for bona fide research and properly accreditedinclusion in historical documents or publications.

7. (U) During an interview with a former employee who no longer has a clearance, theinterviewers may ask questions that would elaborate on information being discussed by theinterviewee, but will not discuss any new information (material not originally imparted by theinterviewee).

Annex A to Policy l-55Dated: 19 September 2407

A-lUNCLASSIFIED/ffi USE eNr Y

Page 7: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DoCrD: 3821433

UNCLASSIFIED/

8. (U) Oral history interviews, whether on tape or other media, will be treated as anyother similarly classified documents and are subject to the same storage and declassificationrequirements.

Annex A to Policy l-55Dated: 19 September 2007

A-2

UNCLASSIFIED/

Page 8: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocID: 382L433

UNCLASSIFIED//

(u) ANNEX B

(U) CRYPTOLOGIC QUARTERLY

(u) PURPOSE

l. (U) The professional journal of the NSAICSS, Cryptologic Quarterly, advancesknowledge of all aspects of cryptology by serving as a forum for discussion of issues related tocryptologic theory, doctrine, operations, management, and history.

(u) PROCEDURES

2. (U) Publication and Distribution:

a. (U) Cryptologic Quarterly is published by the Center for Cryptologic History(ccH).

b. (U) A cumulative index of Cryptotogic Quarterlyarticles - sorted by title,author, and keyword - shall be published regularly. In addition, a file.of back issuesof Cryptologic Quarterly will be maintained by the CCH.

c. (U) Special editions of Cryptologic Quarterly dealing with particular topicsmay be published from time to time.

d.(U) Any cleared and indoctrinated NSA/CSS employee may have access toCryptologic Quarterly. Determining the distribution procedures for CryptologicQuarterly is the responsibility of the Chief; CCH.

3. (U) The Cryptologic Quarterly Editorial Advisory Board, in coordination with the

Quarterly's Executive Editor, solicits and reviews articles for publication in the journal. TheBoard shall consist of subject-matter experts appointed by ADET - with the advice of the ChielCCH, and the Quarterly 's Executive Editor - and should include representatives from a varietyof cryptologic disciplines as well as the major NSA/CSS directorates and organizations.

4. (U) Submission of Articles:

a.(U) The preparation of an article for Cryptologic Quarterly is consideredofficial use of Agency time and a documentable contribution to professional cryptologicliteranrre. Therefore, supervisors are encouraged to support their subordinates' efforts towrite articles.

Annex B to Policy l-55Dated: 19 September 2007

B-lUNCLASSIFIED/

Page 9: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocID: 382L433

UNCLASSIFIED/

b. (U) Articles to be considered for publication shall be submitted to theExecutive Editor, Cryptologic Quarterly. Submissicn of an article does not guaranteeits publication. The final determination on whether an article will be published restswith the management of Cryptologic Quarterly. in accordance with guidance receivedfrom the Chiel CCH; the Associate Director for Education and Training (ADET); andthe Cryptologic Quarterly Editorial Advisory Board.

c.(U) Classification:

l) (U) Classification of articles for Cryptologic Quarterly may range fromUNCLASSIFIED through TOP SECRET//COMINT//TK. Material involvingother special access caveats or compartmentation may be published in specialissues.

2) (U) Determination of the classification of an article is initially theresponsibility of the author, who shall seek guidance from the appropriateauthority in his or her originating element. In the event of editorial disagreementabout classification, the article will be reviewed by the Office of Policy andRecords for final determination.

d.(U) Articles submined b Cryptologic Quarterly may be accompanied bypertinent illustrations (photographs, charts, maps, graphs, etc.) with appropriate captions.The author should also provide a brief autobiographical sketch. If the author prepared thearticle on a desktop computer/word processor, he or she will supply an electronic copyproperly identified with type of equipment, operating system and word processingsoftware (and, if on removable media - such as a floppy disk or CD - it must beappropriately handled, processed, labeled, and certifi ed "virus-free").

e. (U) Articles shall be written according to generally accepted grammar andstyle rules for formal writing. When appropriate, the author will use footnotes and abibliography to cite sources. Cenerally, articles should conform to guidance given in thelatest edition of The Chicago Manual of Style and Webster's Third New InternationalDictionary. The Cryptologic Quarterly editorial staffmay use additional references as

appropriate.

f. (U) The contents of any issue of Cryptologic Quarterly may not be reproducedor further disseminated outside the NSA/CSS without the permission of the NSA/CSSOflice of Policy and Records (DJ) and the NSA/CSS Oflice of Public and Media Affairs(DC03). Articles are not releasable to contractors without appropriate permissions.Inquiries about reproduction and dissemination should be addressed to the ExecutiveEditor of Cryptologic Quarterly.

Annex B to Policy l-55Dated: 19 September 2007

B-2UNCLASSIFIED/

Page 10: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

D0CID: 382L433

UNCLASSIF'IED/

(u) RESPONSTBTLTTTES

5. (U) The Publisher: The Associate Director of Education and Training, with theadvice of the Chiet CCH, shall control the preparation and the publicationof CryptologicQuarterly.

6. (U) The Executive Editor shall:

a.(U) Directly supervise preparation and publication of Cryptologic Quarterly;

b. (U) Ensure that pertinent policy and style guidelines are followed in itspreparation and publication;

c.(U) Determine, in coordination with the Cryptologic Quarterly AdvisoryBoard, which articles in each issue will be reviewed by knowledgeable persons beforepublication to ensure their accuracy and the validity of security classification orsubstantive content; and

d. (U) In coordination with the publisher and the Chief, CCH, designate personsas editorial advisors to assist in the selection, preparation, and review of articles, as

necessary.

7. (U) The Managing Editor shall:

a. (U) Serve as the primary point of contact for technical and procedural matterspertaining to Cryptologic Quarterly;

b.(U) Guide Cryptologic Quarterly through the publication process, to includeoversight of proper formatting of articles, timeliness, and liaison with the NSA PrintingOffice; and

c. (U) Maintain distribution lists and other relevant records.

Annex B to Policy l-55Dated: 19 September 2007

B-3

UNCLASSIFIED/

Page 11: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocrD: 382L433

UNCLASSIFIED/

(u) ANNEX C

(u) MEMORTALTZATTON PROCESS

(u) PURPOSE

I. (U) As a mature institution with a rich heritage of service to the hation and theAmerican people, the National Security Agency/Central Security Service (NSA/CSS)appropriately honors individuals who have distinguished themselves in the field of cryptography.Memorialization is one of the various ways in which NSA/CSS pays honor to the men andwomen who have pioneered American cryptology, and who have made the ir.novations inconcepts and organization that have kept NSA/CSS in the vanguard of support to the country.

(ui PROCEDURES

2. (U) The Center for Cryptologic History:

a.(U) Will select and present to the NSAAB History Literature, and MuseumPanel eligible names for memorialization correlated to buildings, facilities and streets, atleast once ayea\

b.(U) Will report to the Panel any nominations made for memorialization byNSA/CSS organizations;

c. (U) Shall select eligible names without regard to whether the person is or willbe a member of the Cryptologic Hall of Honor display at the National CryptologicMuseum; and

d. (U) Prepare and coordinate the staffpackage for the naming process, on behalfof the Panel.

3. (U) The NSAAB Cryptologic History Literature, and Museum Panel:

a. (U) Will select and present nominations (a minimum of one name annually) toDIRNSA for approval. In selecting nominations, the Panel shall:

l) (U) Ensure the nominee has made a significant conhibution to thesecurity of the American people through cryptology; and

2) (U) Wherever possible, match the nominee with the type of activityfound in or near the building, facility or street to be named;

Annex C to Policy l-55Dated: 19 September 2007

c-lUNCLASSTFIED/

Page 12: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DOCf D : 3E*21433

UNCLASSIFIED/

b. (U) May recommend names for memorialization conelated to NSA/CSSbuildings and facilities that are not permanent (e.g., leased buildings). Should a namebuilding or facility be moved or closed down, an attempt should be made to transfer thename of the honoree to the replacement building or facility; and

c. (U) Will encourage use of the names given to buildings and facilities in allofficial and unofficial correspondence and conversation.

4. (U) Funding Responsibility:

a. (U) Funding responsibility for approved memorialization decisions willnormally be determined based on a three-tier system:

Tier l: Expenses related to signage associated with the naming of a majorbuilding, road, park, or other prominent feature or structure will be fundedby the responsible installation and logistics activity (to facilitate thedecision-making process, the estimated cost of the memorializationdecision should be included in the proposal for memorialization).

Tier 2: Expenses associated with the memorialization of a smallerstructure or facility (e.g., a conference room, operations center,auditorium, fountain, etc.) will be funded by the recommendingorganization.

Tier 3: Memorialization activities not related to physical structures orfeatures (e.g., memorial lectures, awards, etc.) will be funded by therecommending organization.

b. (U) Funding may be provided by appropriated or non-appropriated funds, inaccordance with policies in effcct at thc memorialization location.

5. (U) The DIRNSA will makc thc final decision on all NSA/CSS actions to namebuildings, facilities and streets.

6. (U) Memorialization of individuals by naming NSA/CSS buildings, facilities andstrccts located on Fort Meade shall conform to Army regulations on memorials (Reference j);two important provisions are:

a.(U) No building or street on an Army post may be named after a person who isalive: and

b. (U) The Fort Meade Ganison Commander must approve the name given toany building or street on the post.

Annex C to Policy l-55Dated: l9 September 2007

c-2UNCLASSIFIED/

Page 13: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocID: 382L433

UNCLASSIFIED//

7. (U) Commanders or Chiefs at Cryrptologic Centers and other Extended Enterprisesites shall follow the memorialization procedures outlined above and ensure that memorializationproposals at their locations are in accordance with all local regulations and requirements.

, Annex C to Policy l-55Dated: 19 September 2007

c-3

UNCLASSIFIED//

Page 14: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DocrD: 382L433

UNCLASSIFIED/

(u) ANNEX D

(u) HALL OF HONOR

(u) PURPOSE

l. (U) The Hall of Honor is an important part of the NSA/CSS heritage program andpays tribute to those who made extraordinarily important contributions to America's nationalsecurity through cryptology, or who had a lifetime ofhigh achievement in the cryptologic field.

(u) PROCEDURES

2. (U) Any federal government employee being nominated for the NSA/CSS Hall ofHonor must have departed government cryptologic service (at NSA/CSS or other governmentagencies/organizations) at least l5 years prior to their nomination. Non-government employees(e.g., contractors, those in academe, etc.) may also be considered for induction into the Hall ofHonor for achievements that occurred at least | 5 years prior to their nomination.

(u) RESPONSTBTLITIES

3. (U) The DIRNSA/CHCSS shall make the final decision on any induction into theNSA/CSS Hall of Honor.

4. (U) The Center for Cryptologic History (CCH) shall:

a. (U) Issue a call for nominations for the Hall of Honor each year. At a

minimum, letters requesting nominations will be sent to the Service CryrptologicComponents, the National Cryptologic Museum Foundation, and the Phoenix Society. Inaddition, CCH will distribute calls for nominations to the NSA/CSS workforce throughvenues such as NSANet and Agency-Alle-mail messages.

b. (U) Report all nominations that meet the requirements outlined above to theNSA Advisory Board (NSAAB) Cryptologic History, Literature and Museum Panel'sHall of Honor Sub-Panel.

5. (U) The Hall of Honor Sub-Panel to the NSAAB Cryptologic History, Literature andMuseum Panel shall:

a.(U) Be duly constituted in accordance with diversity standards applicable toNSA/CSS promotion and awards boards.

Annex D to Policy l-55Dated: l9 September 2007

D-lUNCLASSIFIED/

Page 15: National Security Agency/ Central Security Service- NSA/CSS POLICY I-55

DoCrD: 382L433

UNCLASSIFIED/

b. (U) Make annual recommendations for induction into the NSA/CSS Hall ofHonor to DIRNSA/CHCSS through the NSAAB Cryptologic History, Literature andMuseum Panel and the NSAAB

c. (U) Continue to consider nominees for induction into the Hall of Honor for atleast ten years following their initial nomination. If a nominee is dropped fromconsideration after ten years, renomination will be possible.

Annex D to Policy l-55Dated: 19 September 2007

D-2UNCLASSIFIED