W iJVVU1W iJ11 151Bl 1U1VV iJlBI5WIB L1WUlU Ull5WUlUl15 Ul OO15U1 15 OOU1U1 I1U1lIJ f I rn IlUl JI1l Jf dJl Jrn dll Jl1 1J0 D2J I 1 WHY PASCAL WHY NOT U o - -- REDBARON ROADRUNNER BRONZSTAR WHAT'S IN A NAME U o o o ooo LETTER TO THE EDITOR o ooooooooooooooooooooooooo DO YOU KNOW THE DIFFERENCES U ooooooooooooooo SOME TIPS ON GETTING PROMOTED U oo o I o 4 l ooooooo 6 Iooooooooooooo 7 I I I 10 ooo 19 I PUNCHING THE BIOLOGICAL TIMECLOCK U ooooooooo I_ oooooooo 22 I I r 24 I ooooooooooo 2'6 LETTER TO THE EDITOR oooooooooooooo ooooooooooo NSA-CROSTIC NO 48 U o o oi Vera R Filby oooooooooooooo 28 'fIllS tl6CtlMEN'f C6N'f tNS C6tlRlrtV6RB ftl 'fRRUL P L 86-36 SI d'tSSIPUiB BY BBGT u SSIFY ell usft sssu 123 2 epi i rul dft roved for Release b NSA on 10-12-2012 ursuant to E O 13526 MDR Case # 5477 4009863 Published by PI Techniques and Standards VOL X No 6-7 JUNE-JULY 1983 PUBLISHER Editoria' 1 968-8322 8 963-11163$ 963-3369s There is a story going around which is probably not true At least there is no official confirmation of it and discrete inquiries have produced only denials Nevertheless after some investigation we have decided to pass the item along and let you decide for yourself o Collection oo oooo ooooo 1 II 963-3961s Computer Security c ------------------ 1 968-7313s cryPtolingu s 1 1 963-1 103S Data Systems I 963-4953s Information Science oo oFI ----- r 963-5711S Mathematics o oo J 968 85l8s Puzzles oo o oo o David H WilliamsH963'-lHl3s Special Research ooooo Vera R Filbl 968-7119S The story concerns the new building and a new design concept the containerized office The building is carefully arranged so that when an organiza tion needs to be moved the offices are individually lifted out of position and then slid into their new location without disturbing the contents of the office itself All electrical connections including phones and computer terminals simply plug in as the module is fitted into place BOARD OF EDITORS lr------- Editor o oo Asst Editor Production For subscriptions i send name and Organizatirn to PI Cryptolog or callI 1963- 369s P L 86-36 We had a look at the new building and we must admit that the possibility is intriguing Those two big cranes could do the job quite nicely one removing the 'out' office and the other handling the 'in' office When a crisis developed and reorganization was critical one could even imagine moving 'on the fly' without disturbing the occupants Each office could have prominently displayed FASTEN YOUR SEAT BELTS signs and the group chief could'make a brief announcement over the intercom about the move and the ETA at the new location To submit articles or letters by mail to PI Cryptolog via PLATFORM mail send to cryptolg at barlc 5 bar-one-c-zero-five note no '0' in 'log' Contents of Cryptolog should not be reproduced or further disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor From a certain angle the new building looks a bit like a giant data base Perhaps the entire mover system can be run from a remote terminal somewhere If so we trust it will be one of the faster ones 4009863 FeR eFF1Slh t is practically impossible to teach good programming to those who have had a prior exposure to BASIC as 'potential programmers they are mentally mutilated beyond hope of recognition I Now now before you come dashing up to my office to mutilate me please note that there are quotes around that statement I did not say it Actually it was made by professor Edsger W Dijkstra a Dutch physicist and computer scientist One could infer from this that he didn't care too much for BASIC Well what is wrong with BASIC Most of the personal computers have it Most all new d ata systems people know it You can get a personal computer to do almost anything you want by programming in it Those of us who use them really aren't mentally mutilated are we Well ARE WE P13 has been experimenting with powerful personal computers for a couple of years now in an effort to make the job of the analyst a little easier and maybe even a bit more enjoyable Our programming has been done in BASIC because BASIC came with the machines and there was no obvious reason to use anything else Jun 83 SK e As personal computers have become faster and acquired more memory and as other languages have become available it seemed that the time had come to investigate some of them For the past few months I have been looking into the use of Pascal on the IBM-PC and would like to share some of my thoughts with you First of all it is necessary that you understand a very important difference between BASIC and Pascal Bas ic as it is purchased for most machines is an interpreted language and Pascal is a compiled language With an interpreted language a programmer need only type the program into the computer and give the command for the program to run An interpreter then looks at the first statement checks to be sure it makes sense translates it into code that is recognizable to the machine and then executes it This procedure continues until the program is completed If the statement doesn't make sense a sage will appear on the screen telling user that he has an incorrect statement the program hal ts The user can make correction and restart the program CRYPTOLOG Page I FeR 8PFI8Ikb eSB aNtil mesthe and the 4009863 So far so good but how does this differ from Pascal Well when you are through writing your Pascal program you type in a command calling the compiler This compiler takes your entire program and attempts to translate it into a machine recognizable form When the translation is complete you may then run the program On the IBM-PC compilation of even a relatively small program can take as long as a few minutes If there are errors the program may of course not compile The important thing to remember here is that as soon as you write your BASIC program you can make an 'attempt at running it Pascal requires that you compile your program When writing a new Pascal program you may very well attempt numerous compilations before you are in a position to try to run it This can get very frustrating and may very well cause you to begin to feel the urge to fold spindle or otherwise mut Hate your disk--or maybe even the computer itself In general a correctly written compiled program will run noticeably faster than an interpreted program but when you are actually doing the writing it is more productive to be using an interpreted language So why Pascal Well if you are wrltlng a program that you very well know might be used once or twice at most then you clearly don't want to use Pascal You may spend too much time trying to compile it If on the other hand you were asked to write a program that will probab ly be used for years and will of course need to be maintained then Pascal would be a good choice A few examples will illustrate my point Suppose you were asked to write a program that would store in a personnel file the names and addresses of the people in your office Suppose you want to allow 20 characters for the name 14 for the address which could contain 4 digits for the street number and 10 for the street name 10 characters for the city 2 for the state 5 for the ZIP code and 7 for the phone number for a total of 58 characters In BASIC variable names can only be two charac ters long so you would probably use a string PES for personnel which would be 58 bytes long Into this string you could place a NA$ for name AD$ for addre ss SN$ for street name CI$ for city ST$ for state ZI$ for ZIP and PHS for phone BASIC requires a '$' in the names of character strings When you concatenate these strings you get your record In this BASIC program you naturally would write some error-checking code to be sure that the user did not put in more than two characters for the state name seven for the phone number 10 for the city etc Now a year or two goes by and someone decides that the address should have room for at least 5 digits the phone 10 digits you want to show the area code and the name 15 charac ters You must go through your BASIC program and try to remember which variables you used for name phone etc It may be obvious now that PHS must stand for phone but a year from now when you are asked to change the telephone number length are you going to remember that TELEphone TE$ this year was phone PH$ last year Maybe not What about PE$ What is the new field length Pascal will make it more difficult for you to confuse yourself Pascal requires that all data types such as the string of characters containing the name phone etc be identified at the beginning of the program and that all of your constants data types and variables be declared very specifically The beginning of your Pascal program would look like this TYPE PERSONNEL RECORD name PACKED ARRAY 1 20 of char number PACKED ARRAY 1 4 of integer street PACKED ARRAY I IO of char city PACKED ARRAY l o lO of char state PACKED ARRAY 1 2 of char zip PACKED ARRAY 1 5 of integer phone PACKED ARRAY 1 7 of integer END Jun 83 CRYPTOLOG Page 2 DOCID 4009863 emu Fell eFFleiAh tHI'fl A BASIC string is a Pascal PACKED ARRAY A year from now if you wanted to allow 10 digits in the phone number o no problem you simply go to the TYPE declaration look up phone and change the PACKED ARRAY from 7 to 10 OK so Pascal does seem to allow easier maintenance of data what else Pascal allows a program to be broken up into separate procedures These individual procedures could each be programmed to do one simple task A driver program would then sequentially call the procedures For example in the above program the driver might look like this PROGRAM info TYPE PERSONNEL RECORD name PACKED ARRAY 1 20 of char number PACKED ARRAY 1 4 of integer street PACKED ARRAY l 10 of char city PACKED ARRAY I IO of char state PACKED ARRAY 1 2 of char zip PACKED ARRAY l 5 of integer phone PACKED ARRAY 1 7 of integer END That's it If next year someone decides that information as to marital status is needed you could add a new procedure status which would prompt the user with a yes no question as to whether or not the individual is married Into your RECORD area you could insert status boolean No problem In BASIC you would have to figure out a location in your program to insert the status information What variables do you use ST$ sounds good--or did you use that for state You had better be careful If you were writing in BASIC you didn't declare your variables anywhere you simply started using them In contrast the variable names in Pascal can be meaningful and the ones used in the procedure get phone for example do not affect the ones in get_address You can use the same names if you want Pascal is not very forgiving You MUST introduce all of your variables constants etc at the beginning of the program BASIC does not require this and unless a user is very careful with his error-checking he can more easily insert incorrect data into a BASIC program than he could into a Pascal one or a programmer might use the same variable name for two different variables BASIC will easily allow this BEGIN get name get-address get phone END The procedure get name would prompt the user to type in the person I s name and would then store it in the PACKED ARRAY 'name' The other procedures would do similar small tasks Pascal tends to be self-document ing The individual procedures are generally quite short with the procedure and variable names very meaningful Some versions of BASIC do allow variables of more that 2 characters but only the first 2 are recognized by the interpreter therefore STate and STatus would be identical variableS-to the machine So the get address procedure might put MD for Maryland in the variable that you are calling State and then the Status procedure might modify that exact same variable to 'yes I or 'no' o This could put the programmer into a bewildered status or a state of confusion It is for the above reasons that those of you who are using personal computers should consider using Pascal Remember you do not want to become mentally mutilated Jun 83 CRYPTOLOG Page 3 FaR SFFiEl UtI fSE QUI aCID 4009863 P L SEGI Irl' 86-36 P L Jun 83 CRYPrOLOG s eelH 'l' Page 4 86-36 EO 1 4 c Ipir1009853 P L 86 36 EO 1 4 G Jun 83 fa gel54- 4009863 Co espondenee Dear Sir P L I 86-36 I wasparticU larly interested in the larticle on Video Teleconferencing in the March 1983 issue I believe we would be totally reriiiss in limiting the justification for such a system on teleconferencing alone Requirements for tl'airling at field locations around the world are growi9g at a rapid pace and the NeS budget for J aYel 8 fis- 3 growing accordingly I t is therefiEO l pl1a r n to me that a dual-purpose system is needed Our experience with the Instruc tional Television System lTV has proven that the technique is extremely effective Agency student participants when surveyed on their reaction to the system have been extremely posi tive in their responses We did experience minor procedural problems during the early stages of our involvement but these seem to have been corrected I would therefore propose that the justification for a worldwide video teleconferencing system be beefed up with the addition of lTV It seems to me that it would provide us with a much bigger bang for the buck 1'--------l 1 Dean E4 P L Jun 83 CRYPTOLOG Page SS8RI l'f 6 86-36 aCID 4009863 TQP 6BSRB'P DO YOU KNOW THE DIFFERENCES SCI U SI SIGINT P L 86-36 IC223 by ----ensitivity markings including Compartment Category and Classification Caveat labels often seem to be confused with one another as well D as with the slew of acronyms and buzz words that proliferate in the everyday jargon here at the National Security Agency Some of this confusion such as the confusion between SI Special Intelligence and SCI Special Compartmented Information for example does not necessarily pose an enormous problem for most NSA employees since many jobs here do not require a knowledge of the distinction between these particular abbreviations For the employees of the newlyestablished DoD Computer Security Center DoDCSC however such distinctions are not trivial S D Specifically the C2 organization Office of Applications Systems Evaluations within the DoDCSC is directly involved with the formal evaluations of both operational and developmental computer systems inside and outside theNSA environment The C21 division is responsible for providing ADP security guidance during the development of systems while C22 evaluates systems that are about to become operational or are already fully operational tet Generally speaking computer processing systems are evaluated in different ways depending on the users and the types of inforJun 83 mation that pass through the system during its operational existence Typically any intelligence processingsys tem may be described as operating in one of several modes as defined by the Director of Central Intelligence Directive DCID Security Policy on Intelligence Information in Automated Systems and Networks formerly DCID 1 16 which establishes policy for computer security in the Intelligence Community The most stringent category of ADP security is that of Compartmented Mode SCI may be processed and or stored in an ADP system operating in the Compartmented Mode that is the system is processing two or more types of SCI or any one type of SCI with other than SCI and system access is secured to at least the TOP SECRET level but -all system users need not necessarily be formally authorized access to all types of SCI being processed and or stored in the system p 5 paragraph II 2 C 1 D A recent C22 evaluation dealt with a computer system that is considering placing GAMMA-controlled information in an existing system data base Thus GAMMA had to be defined using the terms that were thought to be appropriate so that the system in question could be properly mapped into one of the CRYPTOLOG Page 7 HkUf M '''1 e6lfHH' elIAHHrlLS 6M'L r 4009863 Special Access Programs l Cryptologic Information I SIGINT2 SIGnals INTelligence SCI Sensitive Compartmented Information I I TK B I COMSEC 'r-- - --III-----'II---- L -----Iw I COMINT SI I Special Intelligence ELINT FIS EO 1 4 c F L 86-36 I Category IlI4 TOP SECRET I Cli tegory II 5 TOP ECRET c-'-- t '- - --- '- i I Subcategory II X 6 SECRET f-------- SECRET UHBRA MORAY SPOKE I Snecial Series COMINT8 GAMMAI --_I product I I I Category 1 7 TOP SECRET SECRET CONFIDENTIAL compartmentation not required I Very Restricted Knowledge System9 VRKs excludes product 1- Reference EO 12356 Section 4 2 2 Reference SISR Volume I Section 3 Reference SISR Volume 1 4 Reference SISR Volume I Section 5 Reference SISR Volume I Section 6 Reference SISR Volume I Section 7 Reference SISR Volume I Section 8 Refererice SISR Volume I Section 9 Reference ussro 16 I II Part II Part II Part II Part II Part I I I I I 2 a 2 b 2 c 2 d USSID 3 Annex ussro 3 Annex USSIO 3 Annex USSID 3 Annex 0 USSID 3 Annex E A Appendix 1 A Appendix 2 A Appendix 3 A Appendix 4 Jun 83 CRYPTOLOG Page 8 'ESP SEeR 'P IMifilel3 VIA eSUHI'F elIllfi'UEJ iS SUeY 4009863 SESil E'f several modes of operation defined in the DCID Unfortunately it was surprisingly difficul t to determine whether GAMMA was an SCI Compartment a VRK a special handling caveat or something else As it turns out I was asked to find out what formal relationship GAMMA has to the information hierarchy within the Intelligence Community -fet-The attached diagram represents a picture of the various levels of information wi thin the Intelligence Community Elements that lie directly beneath a higher-order element and that are connected by a horizontal line may be considered subsets of the higherorder element i e TK B and COMINT SI are all information subsets of SCI No attempt has been made to show any of the subelements under SCI or SIGINT except for the COMINT SI subelement which has been expanded out of necessity e eeo The specific C22 evaluation that triggered this clarification project in the first place determined that GAMMA is an information subset within the Special Series COMINT element located hierarchically beneath COMINT Category III COMINT is the Compartment and GAMMA is presumably a Special Series Compartment or 6ubcompartment if you will This distinction raises several interesting questions Should computer systems already processing Compartmented information COMINT material for example be required to meet higher computer security specifications if substantially more sensitive information from within the same Compartment e g GAMMA-controlled information is placed on the system while all users are not authorized access to the Subcompartmented information J Are the controls that SCI Compartments are currently required to meet necessarily sufficient for all sub compartmented information contained within these Compartments In other words are the regulatory computer security controls restricting everyday CCMINI access by definition refined enough to correctly handle the substantially more sensitive GAMMA information retrieval process Should not subcompartmented information elements require stricter computer security controls than their parent Compartments U Probably the most confused abbreviations that are used regularly at N5A include SI SCI and SIGINT Consequently these are the only ones expanded on the chart U The t-erm SCI explicitly includes all Sensitive Compartmented Information on an Intelligence Communitywide basis SIGINT SIGnals INTelligence since it is not a subset or a type of SCI is not a Compartment On the other hand SI is an SCI Compartment and yet it is also a formal subset element of SIGINT This is why there are two horizontal lines attached to the C MINT SI information element U C MINI and SI are the same that is SI is synonymous with COMINT Apparently the term SI has been used in the past as an unclassified way of designating COMINT activity Now since the word COMINT has been declassified the term SI is somewhat obsolete Most of the confusion surrounding 51 probably stems from its past use in two entirely different contexts In the first context SI has been commonly used although incorrectly as a broad way of designating all Compartmented Information i e SCI In the second context SI has been used correctly as a cover term to designate specifically the SCI Compartment COMINT At any rate SI stands for Special Intelligence--not Sensitive Information or Signals Intelligence Since SI is technically a Compartment i t resides within SCI note however that SI is also an information subset within SIGINT that is not in and of itself a formal Compartment or type of SCI Hopefully so Unfortunately the pertinent DCID's most stringent set of computer security controls is not only in a broad and general policy format but also stops at the SCI Compartment level Perhaps several layers of detailed regulatory controls should be incorporated to cover all types of highly restricted material including all levels of Subcompartmented information U it would be great if NSAers talked the same language by using the appropriate acronyms abbreviations and other sensitivity terms precisely Being a recent college hire I know how overwhelming the multitude of acronyms Compartments Classification Caveat markings and other assorted sensitivity handling labels can be--especially to new employees Hopefully this article will lead to the necessary actions to make clearer language possible at NSA Any corrections comments or other useful information pertaining to this subject will be greatly appreciated I can be reached via PLATFORM mail rankin @ cayley or rankin @ gandalf or on secure extension 968-8584 Jun 83 CRYPTOLOG SEeREi' Page 9 4009863 PaR 8PPfe BSE 9 Some Tips on Getting promoted $' L 86-36 I ver the nine-year history of Cryptolog one art icle stands out as the most popular Some Tips On Getting Promoted by I I published in December 1978 Many hundreds of copies of the article have been given out and requests continue to come in Because of the article's continued popularity and because our supplies of reprints were exhausted we went back to the author and suggested that we rerun the article along with any necessary changes and she has graciously consented The article was written as a result of the author's experience as a member of the 1978 NSA Grade 14 Promotion Board In 1980 she was Chairman with vote of the NSA Grade 15 Promotion Board For the last two years she has been a member of the Advisory Panel on Executive Development which has selected members for the Senior Cryptologic Executive Development Program SCEDP Both groups use the employee's promotion file as an important document to study during the selection process And one of the major items in that file is the Personnel Summary Jun 83 it The author documents how important the Personnel Summary was and still is to the promotion process at NSA Because so few NSA employees seem to understand this judging by the state of their Personnel Summaries this article is as valid today as it was then It is not exaggerating to say that your Personnel Summary is critical to your professional life at NSA The original article is being reprinted here intact Footnotes have been used to make the few changes necessary to ensure currency and accuracy This article reminds you that i t is your responsibility to write your Personnel Summary and keep it up to date It also gives some guidance to help you do it I hope you will read and heed its message CRYPTOLOG Editor it Page HI CIO 4009863 P L 86-36 I 514 DATE SOME TIPS ON GETTING PROMOTED CRYPTOUlG Dec 1978 Article based on talk given in April 1978 to WIN Women in NSA serving on the I gency Grade 14 Promotion Board romotion The word inevitably stirs my experience there has simply confirmed ongresponse of some kind in every redheld impressions and reinforced my belief about blooded NSA employee hope pleasure the critical importance of the t o topics challenge despair frustration discovered in this article appointment even inertia resentment resignation Despite disparate views on promotion Personnel Swrvnaries most people share -- openly or secretly -- a Many consider Personnel Summaries to be the common desire to be promoted And many also bane of heir existence Some don't taKe them share 1 think a common laCK of understanding seriously Others fill them out casually about the promotion process here at NSA and a And most of us write them because e're forced lack of Kno ledge about the part they play in it to Whatever you feel about Personnel Summaries you should recognike hy a Personnel This article mainlY addresses promotions to grades 13 through lS and discusses t o subSummary is important who is responsible for jects hich are fundamental to those promotions filling it out when it should be filed and __ Personnel Summaries and Promotion Files how to get it filed Both are critically important to you the emWhy Important ployee because they are critically important y is your Personnel Summary important7 to the promotion process here at NSA Witness Because it is an essential document in 'our these two points Promotion File the one that describes your o your Promotion'Pile represents you to complete NSA life your jobs your accomplisha promotio board and ments your training your a ards It is no o you personally rite onry one document secret hat things are deemed desirable for in that file -- your Personnel Sumncrry promotion The information you provide in your Personnel Summary constitutes a list of Promotion Files described in this article the very things judged important when selectare the ones regularly kept only for people of grades 12 through 14 for USe by the three NSA- ing people for promotion to any grade Your Promotion File represents you to the Boar it ide Boards that handle promotions for grades is one of the most important sources of in13 through 15 These Promotion Files are deformation about you available to them Board scribed in the final section of this article Promotions belo grade 13 are handled by local members cannot be expected to have personal kno ledge of you in a large Agency like NSA organikations whose practices vary on maintenTrue if you are fortunate enough to be nomance of personnel files and their use in the inated for promotion then a Titten reco en- promotion process dation about your accomplis ents and qualifiPersonnel Summaries on the other hand are cations is included in your Promotion File important to everyone regardless of grade Otherwise yoW' Personnel Swm a ry is it For grades 12 through 14 the formal promotion Since every Promotion File contains one and process requires that every Promotion File you rite it it is your chance to describe hence every Personnel Summary be reviewed what you have done No one knows it better during every promotion cycle For grades up And if you do not say it it may not get through 12 some local promotion boards use said at all them as well I recently haired a local proWho Is ResponsiD e motion board in my parent organikation 51 l 'ho is reponsible for your Personnel Summary and we routinely reviewed Personnel Summaries of grades 2 through 11 each time e met Per- 70u arel You are responsible for filling it sonnel Summaries have still other uses for out initially ithin 90 days after promotion overseas assignments for transferring to a new to grade 12 through 14 and then for updating job for some types of training Whenever in it Do not expect your office to remind you fact official information on you and your car- It is your responsibility Though Personnel eer is needed the Personnel S ary may be Summaries are not required for them I also used The first and major part of this article urge people in grades bElow 12 to fill out presents tips on how you should Tite your Personnel Summaries dnd to update them periall-important Personnel S ary dically Get into the habit no for it is The ideas in this article are my own am easier to do it routinely and graduallY than suddenly in one big lump when you do become a not an e pert on personnel matters and do not 12 Also I think it shows supervisors that mean to appear to be Though I am currently P December 78 o CRYPTOLOG o Page 13 Jun 83 CRYPTOLOG Page 11 CD ern 4009863 FeR eFFEerAfJ Sf eUM' you are a person of initiative with serious career intentions write B Personnel Summary These aTe my personal ideas and so e people -- even you __ may When to Fi Ze not agree with them So be it But I hope to stimulate you to think seriously about Personnel As I mentioned in the previous paragraph Summaries and to try to help you to write a you are required to update your Personnel Sumbetter one My aim is to give you a start and mary within 90days after promotion to grades 12 through 14 I recommend you also do it whenever hope that you will take it from there a major event occurs such as when you transfer My best general advice is to be succinct to a new organization or job become a superSay what you have to say briefly concisely visor or assume major new duties receive a ma- and clearly Do not write the Great American jor award professional certification or educaNovel and ramble on for 20 pages On the other tional degree Otherwise plan to do it annually hand avoid being too brief and selling yourself in synchrony with the promotion board cycles short 1 am surprised at the number of people Currently the grade 13 Board meets four times who write one-linersl Do not try to upstage a year the rade 14 and IS Boards meet twice Agatha Christie and write a mystery story but If your updated Personnel Summary is in your avoid too much excruciating detail Write your file by 1 January or 1 July you will satisfy Pers nnel Summary so that a busy person who is all Boards Slnce romotion Boares are apread1ng hundreds of Promotion Files can underpointed for a calendar year I recommend Janu- sta d and appreciate it quickly and you hope ary I simplify updating my own Summary by be 1mpressed enough to single out your file for special consideration follOWing a practice I use to keep track of income tax deductions whenever anything of Personnel Summaries are written on Form importance occurs I jot it down on a slip of P3267 REV Feb 76 which is available in yOUT paper with the date and stick the paper into a of ice or from the NSA Supply Room The first file When the time comes to update I have page contains seven items Fig 1 shows the all the information at hand and the job is first four nearly done Tips on e ' to Write a Personnel Stmmqry The following paragraphs describe ways to G L1 5 OF iU'-J NA IU It Op G w t Dec 1978 on offlciol on upll l cord Smith if ddt J Jane Anne 2 E LOVltE oo TOTAl OEAAL tOItNT''''CATIOk SSNJ SIEAV c C l 'o Uu' 123-45-6789 3 15 yrs 11 mos 9 Fig 1 The As of date should never be over a year old Some files contain Personnel Summaries so ancient that the paper has turned yellowl An out-of-date summary raises some rather unflattering -- to you - questions in the mind of the reader Are you lazy Are you so disorganized you cannot remember to update it Don' you care One sees many Personnel Summaries with only the dates changed -- the correction tape over the date is obvious in the reproduced copy This is often done and rightly so to save retyping when there are no major changes to report But what if there are important changes in your job and you don't record them Look below at Item 6 Experience Fig 2 taken from a supposedly current Personnel Summary 6 NSA CSS OR SCA CIVILIAN EXPERIENCE TITL E A DAT GRADE OF ACTION AGENCY ORGANIZATION u s rEi n F t j b ' 1kt t o lJoor SF 50 Traffic Analyst 12 Jan 1976 BIll 12 Apr 1970 B9 5 Jun 1958 LLO o TITLE 0 L 5T OMOT'O Traffic Analyst C INITIAL AS$IGN ENT Analyst December 78 o CRYPTOLOG o Page 14 Jun 83 CRYPTOLOG Page 12 FeR eFFIe Al5 BeB 8tftJ 4009863 PeR 6PPieikh HSE 6MLr To the eye Item 6 in Fig 2 looks fine However this person is no longer a Traffic Analyst in BIll Heohas transferred to a new job -- a supervisory one -- and he is now Chief Processing and Analysis Division X3S But ho is the Board to kn The problem is magnified if this person is nominated for promotion The documentation that accompanies the nomination describes the person's currentjob with the result that the two documents the nomination and the Personnel Summary -- do not match How does that look to a Board S EDUCATION tJ of ' f h I O u 'Again what does it say about you and your sense of responsibility I Il'hen I isting your current job tftle in I Item 6 be sure to use the functionaZ job title if you have one For example D Chief Data Storage Oivision Project Manager for XXXX Russian Language Instructor Otherwise use job titles as shown on the form Now let's go back to Item 5 your educational record Fig 3 Llo t mo elf r on IJ rlo 're ' MAJOR F ELO OEG'U E WO IIYI 1'd U t University of Maryland IA 20 ere its Armed Forces Staff College Diploma University of Maryland Cum Laude Phi Beta Kanna Honors in Iii -to TV' Anne Arundel C01llJllunitv College Row' Wl gh hnn llA Assoc n nlnm International Relations o o lIJ htH 1976-78 Nights 1975 History and Political Science History I n P n 1971-1973 1960-71 101 0 Fig 3 Lrst these in reverse chronological order with the most recent first Include all education for which you earned a degree and use Diploma to indicate completion of a joint or service school Also include substantial work toward another degree If any of these took extended time indicate why as Nights And I suggest you state any graduation honors here to highlight them Item 7 Collllllendations and Awards should also be in reverse chronological order Fig 4 shows some examples of the kinds of things to include 1 COMNlENOAT'ONS ANQ WAROS ' ' A orlol u Civf i4 S c AWClrcf o OI tI I di p rfor c AJlP l I of Co ndatfol'l frOtn clli 01 trMlO' o a u ' oI 0' IIII 'ul tL t tYee ' II ' Lor Letter of Appreciation Chief A Level 7 Performance Rating Outstanding Performance Ratings QSI SSWP Meritorious Civilian Service Award NCS Teacher of the Year First Prize eLA Essay Contest NSA Scholarship DATE 1978 1971 1975 73 69 1974 196B 1965 1960 1959 1958 Fig 4 R Include Letters of Appreciation only if they are from an Office Chief or higher for grades below 12 I think this rule may be relaxed and be ure that copies of such letters are in your Promotion File List level 7 performance ratingst but not leveI-6 Also list any special Agency awards or scholarships you may have received Professionalization certifications belong in Item 16 and extra- curricular activities should be entered in Item 14 - do not include them here Page 2 of Form P3267 contains two items At the top Item B provides space for surnmariiing your Cuuent Assignment Fig S Begin this paragraph by giving your functional job title the name of your immediate organization date of appointment and nalOes of ascending key organizations 8 SUMMARY OF CURRENT ASSIGNMENT DIChief S pport Staff 213 Office of Facilities 21 Computer Services Organization 2 Since April 1973 Mrs Jones has been Tesponsible for managing Fig 5 December 78 o CRYPTOLOG o Page 15 Jun 83 CRYPTOLOG Page 13 QI 9FFlGiA BSH 6lftlf ID- 4009863 FeR Then list your major responsibilities following these recommendations o Use narrative style not outline fo o Use complete sentences o Use third-person forms not I waS responsible for oooo but Mrs Jones was responsible for ooo Sote that your supervisor's signature is required in Item 8 as verification Item 9 at the bottom of page 2 is the Summary of All Previous Civilian and Military Service of a Cryptologic NaLUre This is probably t e most difficult part of the form to fill out The longer your career the more you have to tell about If there is not enough space provided in Item 9 to hold all the information requested you should use as many additional plain sheets as necessary labeling each with your name SSN and page oumber This is likely to be the longest section so it is important to try to make it clear and readable You do not have to be an accomplished writer or even to have any special writing skill Just be direct factual and as concise as possible FollOW instructions given above for Item 8 use narrative style complete sentences third-person forms In addition follow these suggestions o ass ePPfSEAb 8Nb o Use chroru ZogicaZ order Begin with oldest assignment and end with ost recent Note that this is not reverse chronological order as in some of the other items o Use one paragraph per job o Start paragraph with vital information dates functional job title immediate organization and up o Identify organizations projects systemS etc Notice that 1 said to identify organizations projects systems etc Otherwise 'ou end up writing a mystery story like this one From August 1960 o January 1964 Mr Smith was Chief of A13 where he was responsible for managing all aspects of Proje t SUCHN UCH He also provided technIcal aSSIstance to several important systems under study by another division XYZQ and ABCJ The only really clear thing in thIS paragraph 1S the date o remembers what A13 was in the early 1960s What in heaven I S name was SUCHNSUCH ' hat were systems XYZQ and ABCJ And so anI How much clearer and how much more professional if this had been written instead Fig 6a SUMMAA 0'- At ACVIOUS CIVll 'AH NO ILIT V SERViCE 0 A CIIl ' TOLOGIC NATU II Ud i '11'011010 1011 oP'd rINfill witlt old lIn ' Olld d wifll mo t 1 IlIdic lt loe hOIl 'ncNDIIGl ob IIfa orJd 4a'uJ From August 1960 to January 1964 Mr Smith was Chief of the Nonesuch Reporting Division A13 in the Office of Overall Repor ing AI in the General Analysis and Reporting Group A He was responsible for managing all aspects of Project SUCHNSUCH full-text automation of Nonesuch reports and provided technical assistance to several importan systems under study by another division XYZQ system for automating o and ABCJ system for o Fi g 6a If you wish you may use a space-saving format with an offset header for dates jobs I and organiJations fOllowed by a colon and and a list as in Fig 6b sv y or AL L rillllfEVIOU C'''''LI 0 1 LITAIlI'Y VIC 0 C y o O -OCOoIC TU II Lwt PI cll o olol'Ol#I Ol d#' with eJ1 du o o Uil'IIFnoI'lIt olld 114 h '0 1 'C'OJ'lIf 'It finl' lo_Ho II Cflo U olJ d41 ' boor fta Augus 1960 o January 1964 Chief Nonesuch Reporting Division Al3 Office of Overall ReportIng AI General Analysis and Reporting Group A Mr Smith was responsible for managing SUCHNSUCH full-text automation of Nonesuch reports oall reporting on oooo and prOViding technical assistance to anot er division on several important systems such as XYZQ system for automa ing and ABCJ system for Fig 6b These may seem like small things to you but they have a big impact on improving the readability of your Personnel Summary You do l a nt people to read it den't you o -S the final test I recommend that you ask a friend to read your Personnel Summary critically to December 78 o CRYPTOLOG Page 16 Jun 83 CRYPTOLOG Page 14 peR ePFleIAL tfS OULY peR epPIBI b ij9El aubY 4009863 see if it is indeed clear and to the point Preferably that friend should pretend that you are not a friend but a complete stranger who ants to know everything about you Does your Personn l Summary pr sent you as a clear-writing and presumably clear-thinking forceful direct person Dr as an imprecise vague person carrying out various unexplained duties Re Tite your Summary and especially Item 9 until anyone who reads it -- not just your friends who have known you for years -- can get a clear picture of what you have done and why you are promotable Page 3 of the form contains four items the top three of which are often ignored -- or so it seems when they are so frequently left blank Field Assignments Related Experi- ence and Publications If you have per- tinent information on any of these put it In For Item 10 Field Assignments Fig 7 be sure to give both the organi ational and functional titles and the inclusive dates These items are in reverse chronologcal order Incidentally regular updating of Personnel Summaries seems to be a special problem for people assigned to the field Their Personnel Summaries are rarely updated while they are ay from Fort leade FAI X and consequently the promotion boards often have no knowledge hatever about what the person is doing during an important 2- or 3-year period I urge people to file yearly updated Personnel Summaries while they are on field assignments LOCATION OAGAN'ZAT ON FUNCTIONAL JOB TITLE Station Chief Engineer Analyst Timbuck Eden Nowhere F06 F99 Fl7 Fig For Item 11 Ot her Civilian Milit ary Experience Fig 8 inClude those things that show you possess skills that J lay apply to your I OATES 1975-78 1969-72 1965 Jan-Mar 7 I NSA job such as teaching managing and organizing These are also in reverse chronological order For example OTHER CIVILIAN MILITARY EXPERIENCE WHICH MAY BE REUITEO TO AN NSAICSS OR SCA POSITION ORGANIZATION Army Reserve C W Univ Summer Camp LOCATION FUNCTIONA JJ08 TITU Ft Meade Md Washington D C Arlington Va Platoon Leader Lecturer in Computer Science Director DATES 1971 to present 1968-1970 1965 Fig 8 Item 12 is Publications Fig 9 I am disappointed that so few files li t any pU li- cations Since publications are ncluded Ln the Personnel Summary NSA must consider writing to be an important skill Managers for example spend a lot of time itin And good Titing comes from pract ce Fortunately for us NSA offers many opportunities to publish 'If you have been looking for places to express your views here they are NSA Technical JournaL Cryptologic Spectrwn CRYP TOlOG Field Inforrration Letter Essay Contests Learned Organizations -CMI CLA eM CISI Spring Conference Cryptologic History Series NCS courses Informal Agency newsletters such as SOLIS Neusletter and the previously published Bits and Bytes Dragon Seeds Keyword fJu ter2y RevierJ foZ' Linguists The editors of all these publications welcome your contributions Try to have some published works and major reports though not regular ones produced as part of your job to list on your Personnel Summary It just 4Y help to attract attention to your File DATE Project SUOL-ISUCH -- A Personal View -- article based on talk given CRYPTOLOG in April 1978 to Computer and Informaticn Sciences Institute CISI Dec 1978 Fig 9 December 78 CRYPTOLOG o Page 17 Jun 83 CRYPTOLOG Page 15 FQR QFFlElrMs JSI QtH Y 4009863 peR 8PPH h The next three ections all part of Jtem 13 on the form are meant to show Highlights iri the Area of Self Development in your professibnal life -- past present and future The format is the same for all three sections Fig 10 gives some exanpl es for A Past List here the things that 'are completed such as past membership in professional societies 9SB aul ' and education not already listed in Item 5 Courses taken at NSA belong here Follow the example apd identify the courses by title and course number In the rightmost column you can indicate things like Top student or special honors You can leave this column blank if nothing applies 13 HIGHLIGHTS IN tHE ARUllnErF'OE17E D J'''-MENT Chru n olo lcl J1' Ud 4111 urPTl G1 NSA CSSISCA coli If' oel or oo chlllcol cow o m UIIJ or C'II11ionJ a 0 a Mcomb hlp In d' NSA lCSSISCA or ufuno' prof ioNJI Oc tW J Ezclud thoN' for #'tlcl' a derru ' ull 1t MenU Wdrn d Zeta Eta Eta French Honorary MS-ll1 Briefing Skills IG-444 DATES 'LACE $UBJECT sOCIETY o frOm to University NSA 1965-68 1968 NSA NSA 1971 1971-ptesen lanagement Analysis CMI lDURATION OR LENGTH SPECIALTY DEGREE OFFICE HELD -- --S President 196 7 49 hrs 120 hrs A Top student Member -- -- -- 10 vides space for showing your self-development in your nonprofessional life Many people leave this blank If you do I think you are missing a big opportunity to provide a rounded picture of yourself to the Promotion Board If you are active in areas like those listed below I encourage you to list them Show by your non-job-related activities that you have Item 14 Other Achievements Fig 11 pro- other interests -- and other talents FIg The first two items on page 4 the last page of the form are B Present and C Future highlights in your self-development sections not reproduced here 'These sections are to be filled out in the same manner as A Past Future plans might include such things as your plans to attain another specified certification change career fields join a professional society 1 P 'H ne ' JrlJ dfnG I 'JJ h S b s A l k c ' u' t C ' f o rbr j lu 'ljrt ACTIVITY NSA Civilian Welfare Council Credit Union GEBA NSA Jazz Band Travel Club United Givers Fund Campaign Community Church Scouts recreational activi ties civic associations PTA of 'our ouilnrd dl4tfoo INClV$IVE OATES CAPACITY IN WHICH SEAVING SEAVED 1967-1969 1970-1973 1976-present 1970-present 1972-present 1977 B Group Member Member Member Member Keyman representative Board of Governors Board of Directors PreSident 1976-78 B Group Provide appropriate information 1 Fig 11 often they are eary of it Item IS not reproduced here provides space for you to list your job-related or Professionalization certifications are to self-improvement Reading Achievements -be listed in Item 16 Fig 12 If you have in-house publications professional journals more than one be sure to list them all with foreign-language material Please do not list the dates a arded If you are about to receive your pleasure reading especially not still another note this in parentheses as Playboy Board members have seen that one so shown 16 PAOFESSIONALIZATION CERTIFICATION TITLE Cryptanalyst Education and Training Officer Traffic Analyst Lack only Part 3 of PQE for certification -scheduled to take test in Nov 77 L f profoo on41 c rtlfkGtion n i CERTIFYING PANEL st OATE 12 Jun 1970 1 Sep 1973 Cryptanalysis Career Panel Education Career Panel Fig 12 December 78 o CRYPTOLOG o Page 18 Jun 83 CRYPTOLOG Page 16 ' FeR 8PPISIA'b BSE 61fL 4009863 R R @ Finally sign the form date it and affix the proper security classification Take this last responsibility seriously and do it carefully seeking help from experts if you need it Undcrclassifying or overclassifying looks bad to a Board because Boards expect that by grade 12 you should know how to classify correctly or know where to find help Instructions for filling out Personnel Summaries are contained in the NSA Per80nne Management ManuaZ Chapter 3028 Jul 76 which every major office has - -Your own office will handle the filing of your Personnel Summary for you It will reproduce multiple copies of it some for retention in local organizational files one for you and for grades 12 through 14 some for sending through channels to your Promotion File in M3 FPomotion FiZes Promotion Files are not to be confused with Personnel Filesl' often called 201 Files The Office of Personnel specifically M3 maintains both There is an official Personnel File for every NSA employee oo It documents all formal activity in connection with your NSA life hiring performance appraisals training job or organizationai changes etc There are official Promotion Files only for employees in grades 12 through 14 Local organizations often maintain abbreviated versions of the 201 File on all their employees and SOme may also keep a Promotion File Official Promotion Files are the files that are being discussed here -- the files used by the three Agency Promotion Boards when considering eople for promotion to grades 13 through 15 I am going to tell you what should be in your Pro- 14 o Personnel Summary current within one year o Certification documentation in the form of a computer printout or a letter from the certifying Panel o Recommendation for promotion from Key Component if you are recommended Since Promotion Files are sho to you intact with nothing removed you can see the recommendation on you if there is one or know you are not currently being recommended if there is not In addition your Promotion File should contain for your current wade onty information from previous grades is purged o Performance appraisals o Inventory of Attributes If you are a 12 or above this is part of your official Performance Appraisal However you may never have seen it or even know it exists because 'until recently it was a private document and was generally not shown to employees Nowadays the sheet is green but it used to be yellow and many files still contain copies of yellow sheetsH Fig 13 shows the form for the Inventory of Attributes Rating is on a scale of 00 through 99 and space is provided on the right for narrative comments Like he information in a Personnel Summary the items in the Inventory of Attributes A l nonU e Consider how weD the individual protrides ptoh m solutions shows in cnwt ' and etc -civilY OlInd piOMCT' in 5t'e inl new ayt to 'ompktc worle t stcr and f25 motion File how you can make arrangements to see yours and how you can pdate it Your Promotion File should contain mor ccuntely B ffectlql e In wo kint with peDDie Considtr how wen the indMdlUll rnl CU and duh ith othus his her dfutirtnus in establishint and mainuininl work q t1ati ' p s_wl h cc rs subordinates and supet irUoia C D i ooo d 1 IU U Consider the e uent to which the individual demonsuates attri'butes such as orRfullness aU7e5JIi 'Cncu and enthua 27 'noMI cn ct rt Un Consider an personal charanui uic us d l aff a tM indjvidUIIJ' job per ornunce Q E Subj -lNItt oo knowl d Con ider the inc Jil idu af depth and bruth ofknawledlu nd iIb required a his her 3D prt nt and nut hiihcl grade F Ad J u nt pol_nl -t Cons dcr bow the individual compares with orheu f01 adl'2l1l enw nt to ll position of grc cer ftspon ibility and his her o r lln c zp ability for ptopes sion within the arcc ficld Fig 13 December 78 o CRYPTOLOG o Page 19 Jun 83 F6 CRYPTOLOG Page 6FFfef L OHLt 17 @ 11 aCID 4009863 'PSP SI38RE'F I HfBR1 P L 86-36 How I Almost Helped Win the FALKLAND ISLANDS war by Pfc Ret 1 Jun 83 CRYPTOLOG Page TQP SBSRii'I' TJUBR A U PI6 iii 19 EO 1 4 c EO 1 4 d P L 86-36 EO 1 4 c aCID 4009863 EO 1 4 d 'f6P SHeREi' HIIBftA Jun 83 CRYPTOLOG Page 'F8P SBSRI i'F tJUBRi P L 86-36 216 4 aCID 4009863 Sf SBee UUBR ' EO 1 4 c EO 1 4 d P L 86-36 I I I I I I I I I I I I EO 1 4 c P L 86-36 I I I I I I TWO NEW LANGUAGE AIDS U 1---'--------------- I I J I I I I I Chinese-English Glossary of Linguistic Terms U work is UNCLASSIFIED and available in hard copy and on microfiche U Agency employees who need either can secure a co of the Chinese aid They're both in P16 and their phOne number is 963-1103s P L 86-36 P L 86-36 SOLUTION TO NSA-CROSTIC 47 Memorandum to M36 J by I ---_ I have put considerable thought into the Senior Technical Expert Program STEP since we spoke last week The following ideas differ hardly at all from those I espoused then but the clarity with which I can state them may have improved Mr Smith I have been reading Cryptolog for a number of years but have had to get it by finding an abandoned copy or out of a burn bag Now that I've switched organizations I rarely see a copy in either of the above-mentioned categories Thus could you please add my name to your distribution list Thank you 1n advance Jun 83 CRYPTOLOG Page P L 21 86-36 ero 4009863 Human Factors Ul P L ccording to an article by Wray Herbert in Science News Vol 122 No 5 July 31 1982 i t was 4 AM when 'the accident at the Three Mile Island power plant occurred and the employees on duty had just that day rotated shifts switching from the day shift to the night shift Poor human performance has since been implicated as a major cause of the accident Abnormally high accident rates in other industries--trucking and Navy for example--have also been linked to human error And increasingly researchers have been looking to unnatural shift rotation as a possible cause of occupational mishaps A 1 U Scientists have now applied some basic principles of circadian rhythm the natural sleep-wake cycle to the design of an actual industrial work schedule and have reported that a more natural rotation pattern improves worker satisfaction and health and also causes an improvement in job performance According to Charles A Czeisler of Harvard University and the Boston-based' Center for Design of Industrial Schedules one in four American workers works something other than a standard day shift and many of those who rotate shifts do so in a way that violates the natural timing of sleep and wakefulness The workers at Great Salt Lake Minerals and Chemicals Corporation in Utah the site of the experiment had for leil years rotated every week to the preceding shift--from days to nights to evenings to days etc With the cooperation of the company Czeisler and his colleagues--Martin C Moore-Ede of Harvard Medical School and Richard M Coleman of Stanford Medical School--changed the schedules of 85 workers 33 began rotating to a later shift every week and 52 rotated to a later shift every three weeks The researchers compared the subjects to 68 non-rotating shift workers on measures of job satisfaction health personnel turnover and productivity Jun 83 86-36 The results revealed that 7 % of the workers preferred forward rotation those who rotated weekly showed a 49% improvement in satisfaction while those who rotated every three weeks showed an 87% improvement The latter group also showed an improvement in health though they still fell short of the controls In addition personnel turnover decreased and productivity increased 22 percent a gain that was maintained nine months following the study The company has since adopted the new rotation schedule for the entire plant The circadian principles underlying the schedule design are fairly simple Czeisler said Because the natural sleep-wake cycle controlled by oscillations in deep body temperature tends to run about 25 hours the natural tendency is to go to sleep later and later But most people have the capacity to adapt to a change of one or two hours a day delay or advance without becoming desynchronized In fact people are constantly advancing their sleep by an hour a day to conform to the earth's 24-hour schedule But when people rotate shifts Czeisler said the change in sleep cycle is too dramatic the system becomes desynchronized and begins to free-run to drift forward on its natural 25-hour cycle until it is back on phase As long as the system is out of phase the trough of the alertness cycle occurs during waking hours explaining shift workers' complaints about exhaustion the same desynchronization is the cause of jet lag Because the internal 25-hour clock tends naturally to delay sleep it is much easier to adapt to a shift rotation that requires sleep delay a forward rotation Backward rotation like eastward jet travel requires that sleep be advanced which in turn forces the internal sleep-wake cycle to drift all the way around the clock to get back in phase a process that at an hour a day may take a week or CRYPTOLOG Page 22 ocro ' 4009863 FBR BFF'f8'fkb BE Blftfl more Some workers Czeisler said complain of never adjusting to a new shift even with forward rotation it requires a few days to become r esynchronized explaining why the 21day schedule was more satisfactory and productive than the 7-day schedule According to Czeisler there is no single ideal schedule for all of industry but it is essential that these basic physiological principles be considered in the design of any schedule that could interfere with sleep The newly-formed Center for Design of Industrial Schedules he said will be examining regulations that involve work scheduling where safety is an issue- Federal Aviation Administration and Nuclear Regulatory Commission regulations for example According to Charles Ehret a biologist at Argonne National Laboratory in Illinois FAA and NRC regulations currently pay no attention to circadian principles Based on his own survey of the American power industry he said that at least half the power plants were rotating their workers the wrong way causing sleep deprivation and dangerous desynchronization We cannot pinpoint the circadian contribution to the accident at TMI or to any single maritime or aircraft accident he said but there's no doubt that cognitive function visual acuity and psychometric performance are 'way 'way down under these circumstances The reason I have devoted so much space to the text of this article is that it certainly has applications for NSA where there are so many around-the-clock operations which necessitate shift rotation by their personnel But to the best of my knowledge none of those 24-hour shops uses a forward-rotating shift schedule Some time ago an NSA element did experiment wi th forward-rotating shifts The new shift arrangement was not well received overall Several organizations terminated the test after a three-month trial period The main reasons for the dissatisifaction were l the employees did not feel any better despite prediction that they would and the new shift arrangement created one very short break in contrast to a very long break under the old scheme Under the old shift rotation plan there were two 72-hours breaks and one 48-hour break The 48-hour break means coming in off a mid sleeping during that day and returning to work on days 48 bours later The effect is just one day off That short break was at best inconvenient and some workers complained that it did not provide adequate rest between Jun 83 FQI Based on an Letter 111-83 in Human Factors shift changes It should also be noted that the shift rotation cycle in this experiment was every six days not the three weeks recommended by the Science News article Maybe we should give the longer cycles a try EFFECTS OF HAVING TO GET YOUR SLEEP IN THE DAYTIME 86-36 A recent article in the Journal of the Human Factors Society describes a study of some effects of shift work The Sleep and Performance of Shift Workers A J Tilley et al Human Factors Vol 24 No 6 December 1982 pp 629-641 This study differs from most previous studies in that it monitored and recorded the sleep of workers in their own homes rather than in a lab or only indirectly via questionnaires The abstract provides the following summary of results The sleep and performance of 12 male shift workers operating a discontinuous weeklyal ternating three- shift system were monitored over the course of one complete shift cycle Compared with nocturnal sleep day sleep was shorter in duration and was degraded in quality and its sleep stages were temporally disrupted Simple unprepared reaction time and four-choice reaction time were impaired at night arid simple reaction time deteriorated as a function of the number of days into the shift and the time on task Sleep and performance changes can be primarily attributed to circadian factors however the deterioration in performance from night to night and with time on task is probably due to an accumulative sleep deficit As far as sleep and performance are concerned the best shift system is probably one having a short rotation cycle with afternoon shifts or rest days preceding and following the night shift CRYPTOLOG QFFiSIA article Page 23 leE 81ftH OCI D 4009863 _ - -- - _ by EO 1 4 c P L 86-36 1'--- ---JIA25 1 IT5321 Jun 83 CRYPTOLOG Page 24 P L 86-36 EO 1 4 c P L 86-36 30 1 4 0cm 4009853 m 86 36 Jun 83 Page 25 aCID 4009863 FQR QFFIS t r teE erH Dear Editor Security of classified information is the business of all Americans who have access to it A problem exists in this area however in that not all who have access to such information are educated on the need to protect it The exposure given to US intelligence agencies in the popular media has made education in classified material security and COMSEC imperative A new NSA Security Agreement requires the signature of all current and presumably future employees of NSA According to the instructions for completing the form the Agreement follows the determination by the Director of Central Intelligence that all agencies and departments granting access to Sensitive Compartmented Information SCI ooo must implement a program to better protect o o vital intelligence assets from unauthorized disclosure The explanation goes on to say that NSA's program includes a security agreement that requires persons with SCI access to submit for prior review any information or material for public disclosure It appears that the requirement for this agreement was precipitated by recent publicity about NSA It is difficult for any employee to argue with the need to protect sensitive information in ways such as those specified in the Agreement But the question inevitably arises in the minds of those of us with less extensive Weltanschauungen Why must we so carefully protect material from sensitive sources when those for whom we gather and analyze it especially elected officials on Capitol Hill and members of their staffs discuss it openly Jun 83 Implicit in this question is a perhaps justifiable resentment that many of us harbor against those outside the intelligence community who leak the information we try so hard to protect As a former staffer in the House of Representatives I can vouch for the lack of concern which borders on total disregard for the need to physically protect classified information from unauthorized disclosure My concern here is not for those people who work regularly with the intelligence community such as the Senate and House Select Committees on Intelligence but rather with the many hundreds of others who can and do have access to sensitive intelligence but who have little understanding of the protection it needs It is not unusual for classified materials to be left lying on desks in the completely nonsecure House and Senate office buildings for minutes hours or even over weekends Often the highest degree of protection offered to this information is to place it in an unlocked desk drawer Our resentment is unproductive however unless it produces workable methods to stop such disclosures and the resolve to implement those changes But even if we have both the methods and the determination to correct the problem of leaks of sensitive information we must still f ace a most difficul t dilemma We must balance the necessity for some elected officials to have access to classified information against the need to ensure that they are willing and able to maintain its secrecy Simply by virtue of being elected to Congress or having made large contributions to the party that controls the White House Senators Representatives and Administration appointees have access to almost any information they desire That they were elected to positions of public trust and confidence implies that they are trustworthy But the speciousness of this logic is quickly seen if we remember the many Members of Congress who have been censured or indicted for serious crimes over the years or if we remember Teapot Dome and Watergate There are enough recent examples of bribery and obstruction of justice as well as other crimes to indicate to me that election or appointment to office does not automatically make someone trustworthy Another problem just as thorny is the access to classified information that many members of congressional staffs and lowerlevel political appointees obtain almost automatically There are of course valid reasons for some staffers to have access to sensitive information But most of the people who come to Washington to work on Capitol Hill have had no previous experience in federal government much less experience with classified material To many of these people a security clearance and the attendant access CRYPTOLOG Page 26 FSR ElFFlS h'tb Bse SIfJ Y 4009863 pO OPPfefAt to classified material is more of a status symbol than anything else The higher the clearance level the greater a person's status among others who likewise previously had no access to classified information In order to achieve at least one measure of status many staffers with little or no real need for access persuade their elected bosses with little difficulty to request clearances for them Virtually all these staffers seem to receive clearances in short order This indicates to me that Defense Department investigators find nothing in these applicants' backgrounds to preclude them from receiving clearances or that only cursory investigations on them are conducted I find it difficult to believe that all Capitol Hill applicants for clearances are models of trustworthiness The swiftness with which their background investigations are completed implies that trustworthiness in not the sole reason they are granted clearances There are more than l6 00 members of personal and committee staffs in the Senate and House of Representatives--and who knows how many political appointees in the executive branch The Defense Investigative Service DIS the agency responsible for conducting background investigations for the Capitol and parts of the executive branch is deluged with requests for clearances Since the DIS has such a large investigative responsibUi ty it necessarily must put its responsibilities in some order of priority The highest priority seems to go to pre-employment for the intelligence community Here investigators must make a tough decision If they grant clearances following a pro forma investigation they are open to charges of negligence if people to whom clearances are granted later prove to be untrustworthy If the investigators press the nominating Member of Congress to further justify the need for one of his or her staff to have a clearance they could be accused of damaging Executive Branch relations with Congress If investigators press Administration officials to further justify the need for a staff clearance they can be accused of not being team players wi thin the Executive Branch Conduc ting pre-employment investigations for the intelligence community may be the best use of scarce DIS resources Most leaks of national security information usually seem to come not from the intelligence community but from other executive branch agencies and from the legislative branch Given this it appears that either clearances have been improperly granted or that those outside the intelligence community need to be made aware of the need to protect this information OUtf I think that the DIS generally is doing a good job in conduc ting background investigations on legislative staffers although it could perhaps adhere more closely to established standards for granting clearances It could require satisfactory completion of a full background investigation before granting a SECRET clearance But even though investigations may be part of this problem the major issue is not so much the ease or difficulty with which people might receive clearances but the lack of training given on the need to protect the information to which they are given access Whereas new NSA employees are given a rigorous orien ta tion on the need for security I know from my own experience that none is given to legislative staffers when they are granted their clearances In all probability the same situation exists in the Executive Branch for political appointees This in itself is scandalous But when this lack of security awareness leads to the inadvertent disclosure of sensitive information it carries with it many dangerous implications for the nation What can we do to remedy this problem We can politely but firmly insist that other Executive Branch agencies and Congress uphold their end of the national security bargain by immediately implementing comprehensive security education programs among those who are or have been granted access to classified information It may be naive to think that education alone will change the minds of potential leakers but existing policies and attempts to stop leaks have for the most part failed And the recent Executive Order threatening Administration employees with polygraph testing and possible job action will probably have little noticeable effect on leaks those intent on damaging the national security will do so albeit more circumspectly regardless of potential consequences We must then concentrate on the unknowing but nonetheless damaging disclosures made by those who are merely unaware of the implications of the trust their security clearances carry Security education might help in these cases We owe it to ourselves to try all possible courses in search of new ways to put a halt to unauthorized disclosures Given the transient nature appointed staff people in most government security education seem like trying to sweep back with our national security at afford to do less _ _ _ _ _ IG732 P L Jun 83 FeR CRYPTOLOG Page 8FFISlA of politically of the federal programs might the sea But stake can we 9SB 8tH 27 86-36 4009863 NSA-Crostic 48 byVera R Filby A Palindromic plotter B Unhidden treasure 47 -4- 42 120 101 C In Oslo or in backward yawn D It's sharp to ice crab 62 9 E Hilarious response to the French grunt 139 F VASCAR couldn't do without it 2 wds -3- 132 64 ---sf 105 TIS 103 59 10 65 T TI41992869930 G Mr Strauss and actress Sharon combine to float upward H Let the Roman behold I Sotto voce J He keeps saying the writer ate sausage 124 ill 18 4f 73 Sf 2S ill -g- 142 ---sa 17 K Ultimate degree L It's between a Wand a Y M He sang about all those trombones 2 wds N A something but what O Outer way P Verb uninflected in form to be brief Q Often followed by overrun R Pop raved 'but then said OK Jun 83 CRYPTOLOG Page 28 peR epPlelkC eSE 6Mtr 109 32 130 78 aCID 4009863 tf9 FeR eFPletAt OlftY S This dancer won the 1953 Preakness and Belmont T Tales of long ago lZ9 100 26 u -z-15 Second fruity computer 2 wds V Andy Min Chester and Uncle Bim W HAL 111 according to 2001 A Spaae Odyssey X Girl's nickname inscribed in clinic at Hyattsville o 1 X2 T 3 D 14 M 15 T 16 H 27 K 28 s 39 Q o 41 64 E 65 F 66 W 67 V 68 M 76 N77 M 78 J 79 G 80 C 81 90 M 91 R 92 F 93 52 L II 40 53 F J 18 29 I 1Z9 T 130 J 6 X 7 F 20 W 30 F 31 B 54 19 K U 44 G U 55 S 56 A 57 69 94 o 95 o o D 10 Zl G22 V J 33 M 34 Q 35 L 45 V 46 o 47 B 48 F 58 J 59 D 60 N 70 R71 G72 o 73 N 84 S 85 R 86 F 97 G 98 R 99 P 96 L 11 V 12 X13 N C 24 R 25 I 26 T 36 W 37 N 38 F S 49 U 50 A 51 I 61 U 62 D 63 A I 74 U 75 C U 88 L E J 9 G E 82 H 83 12 -1- ill -6- 8 L o K 32 43 o o o 103 D 104 S 105 E 117F B5 o H 17 I 42 C 4 109 23 o 87 o 89 A F 100 T 101 B 102 I 106 V 107 P 108 J 109 X 1l0Q III H 11Z R 113S 114 M 115 D 116G 118 F 119C 120 B 121 Q 122 X 123 G 124 I 125 A 126 R 127 F 128 P 131M 132D 133 I 134 F 135 0 136 U 137C 138 R 139 Jun 83 CRYPTOLOG PeR ePPlefftt Page tf9 ONLY E 140 N 141 M 142 J 29 Pl-Oet 83-83-37033 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu