1 l l DV UJ I W r U fill 1 l fill fil 00 l U l 00 U 11 iJ lj fil WUJVD0WUJl1 Brn IlUI Jl1I J OOCD BlB D 1J0ED2J 86-36 i D ET N N A PL i o I I ZZ i CUMULATIVE INDEX PART ONE AUTHORS U ooooooooooooooooooooooooooooooo ooooo 16 STUDENTS 1 U oooooooooooooooooooooooooooooooooooooooooooooooooooooo ' ' ' II o 30 i o 30 CROSSWORD #3 U ooo oooo 31 SHELL US ING I F ooo ' ' oooo 32 E T AT NSAoooooooooooooooooooooooooooooooooooooooooo ooooooooooooo oo ' ooo ioo 32 SIGINT CHALLENGE A SCENARIO U ooooooooooooooo 33 KRYPTOS SPRING MEETING U ooooooooooooooooooooooooooooooooooooooooooooooooo 34 MORE ON PASSWORDS U oooooooooooooooooooooooooo 35 TOY TRAVAIL U ooooooooooooooooooooooooooooooooo Vera R Filby oooooooooooooo 40 WEATHER A KEY INTELLIGENCE INDIGATOR U oooooo 43 I CRYPTIC I ' - I fillS BOEURl JMENT JONTAINS JOBEWORB MA'f6RIAb o 1oooooooo eLASSIFIEB BY BEetASSIPY 8N AQ9AQy'8 Declassified and Approved for Release sAles f 123 2 8risifta iag 9t8 iAatiQA R9qyi 8d by NSA on 10-12-2012 pursuant to E O 13526 MDR Case # 54 net 4019691 Published by PI Techniques and Standards VOL X No 3 MARCH 1983 PUBLISHER BOARD OF EDITORS Editor oooooooooor o L1 Asst Editor Production oooooooo 1 968-8322$ l 963-1103 8 J 963-3369s 1 1 Collection ooooooooor ooul 963-3961s CryptolinguistiCS 963-1l03s Information SCienGBPc e ooooo 963-$711s Machine Support oooooo 963-4953s Mathematics oooooo 1 968 8518s Puzzles oooooooooo David H Williams 963-1103s Special Research ooooo Vera R FilbYI 968-7119s J Style is an elusive thing I remember a coworker who had an elegant way of speaking but when I tried to analyze how he did it I could never pin down anything central or basic It just seemed that he had a good grasp of a lot of peripheral details The only way I can describe him is to say that he never spoke in rough draft And I envied him for that ability What brings my coworker to mind is a question of style that has been bouncing around here at CRYPTOLOG What kind of a magazine do you the readers want We get feedback of course On the very same day we received one note that wondered why we don't put in the weird and nutty titles any more and another that thanked us for switching to titles that were clean and easy to read Call that a draw For subscriptions send name and Organizatirn or call Editorial to CRYPTOLOG PI 963-3369s I P L 86-36 To submit articles or letters via PLATFORM mail send to cryptolg at barlc05 bar-one-c-zero-five note no '0' in 'log' Contents of Cryptolog should not be reproduced or further disseminated outside the National Security Agency without the permission of the Publisher Inqui des regarding reproduc tion and dissemination should be directed to the Editor Here is a specific question for you about CRYPTOLOG At one end of the scale there are the clean crisp page layouts with lots of white space and a generally glossy look which is to journalism students what structured programming is to computer students At the other end of the scale is what someone has called early Whole Earth Catalog Where should CRYPTOLOG be on that scale What do you think Let us know Note The January 1983 issue may be late in arriving because of its size It should be changed from January to January-February and from No 1 to No 1-2 PeR 6PPIeUItJ tiS 61fLY aCID 4019691 CONFIDENtIAL P L Inl INTRODDCTION s early as the 1880s the concept of electrically transmitting and U receiving transient visual images through the air as electromagnetic waves had been explored Paul Nipkow a German se ientist pioneered a scanning device in 1884 that sent pictures short distances By 1928 scientists had perfected Nipkow's invention On September 11 1928 an experimental television station W2XAD provided visual stimuli which were meshed with the audio track of radio station WGY to present the first production on television In 1936 the National Broadcasting Company NBC was the first to combine the audio and visual signals into a single transmission medium _ U Today the concept of transmitting and receiving visual images is not unlike that of yesteryear However its magnitude and applications are far more sophisticated and extensive The emphasis today is placed on television to operate in a two-way fullduplex configuration which will allow groups of people in geographically separate locations to interact in both the audio and visual modes simul taneously This technique referred to as Video Teleconferencing is currently being used by a number of corporations government organizations and educational institutions as a substitute for or supplement to travel Mar 83 86-36 U With the costs of travel escalating and government funding declining it is time for the National Security Agency to research and analyze the feasibility of adopting Video Teleconferencing for use in selected Agency applications BACKGROUND concept of Video Teleconferencing U Video Teleconferencing is a means of conducting a visual and audible conference between two or more groups of people who are geographically separated while maintaining all the realism of a face-to-face meeting In addition to allowing the other participants to be seen and heard video conferencing can permit in its system configuration the simultaneous exchange of hardcopy and graphic information Video Teleconferencing is a relatively new term in the field of communications however the original process of transmitting and receiving audio-visual signals was developed in the late 19th century U Face-to-face conversations between people is considered by many to be the most productive communication tool Because of geographical separation time constraints and travel costs face-to-face meetings are not always practical Implementation of a video CRYPTOLOG eeHFIBl3tf'nA-h Page 1 4019691 SEltlFIBS IM U The saving in travel funds is a major consideration for these companies In view of NSA's huge travel expenditures for 1981 the adoption of video teleconferencing should be considered However the monetary saving is not the only benefit to be realized in adopting video conferencing Meetings can be scheduled more frequently and on shorter notice since travel time associated with such meetings could be reduced Attendance is more flexible Many more participants who otherwise might be unable to attend a face-to-face meeting would be allowed to take part The catch-up syndrome time required by travel participants to catch up on daily tasks that have built up during the TDY period could be eliminated These latter benefits are difficuI t to quantify monetarily but they remain justifiable considerations in the decision to implement video teleconferencing conferencing system could provide a reduction in undesirable travel greater flexibility in scheduling meetings and better structured higher quality conferences U Studies in the use of video teleconferencing suggest that Video conferencing is effective for task-oriented meetings that are short structured have a specific purpose and involve a limited number of participants who know each other l Video Teleconferencing as a Replacement for Travel In recent years the cost of travel has increased at an annual rate of 3S percent 21 NSA is not immune to those escalating costs in travel In 1981 NSA's expenditures for temporary duty TDY trips both Operational and Maintenance O M and Research and Development R D totaled $13 8 million 3 Putting this astronomical figure into perspective it equates to $865 00 for every civilian employed at the NSA headquarters 15 953 4 U Many major corporations are adopting video teleconferencing as a substitute for travel in an attempt to offset soaring costs Atlantic Richfield for example estimates that its annual travel expenses have risen from $20 million to $50 million in recent years These awesome figures have persuaded Atlantic Richfield to adopt video teleconferencing with the hope of cutting corporate travel costs by 20 percent Westinghouse activated a video teleconferencing link between Baltimore and Edwards Air Force Base in California in late 1982 Sperry Univac another major corporation has been using freeze-frame video since 1978 between its headquarters in Pennsylvania Minnesota and Utah Mar 83 Psychological Aspects of Video Teleconferencing U Although video teleconferencing could provide a more elaborate means of conducting geographically separated meetings while at the same time proving to be an invaluable asset in corporate savings its implementation may create obstacles that participants must overcome to to achieve total effectiveness With the introduction of video teleconferencing as a replacement for the actual in-person assemblage one must be able to present oneself and one's environment Some may find it difficult to project ideas in a natural manner while in an artificial setting Recent studies suggest possible video conferencing difficulties if the participants are strangers or of differing ranks and grade levels ooowhen only a voice channel is available communicators create an image of the person speaking which while it may not accurately represent that person is complete in itself A low definition video representation may be sufficient to interfere with the information of such an image while being too ambiguous to create a satisfactory image in its own right Maintaining friendly relations is reported as being less difficult suggesting that the video image is sufficient to act as a reminder stimulus if the person is already known although people using teleconference for regular meetings still experience the need to meet face-to-face about once every three or four meetings S U During video conferences first impressions are made via auditory' and visual channels exclusively The initial handshake and CRYPTOLOG SQUF IB13U'f fld'l Page 2 aCID 4019691 working lunches would be eliminated through video conferencing usage Some may find these factors a boon or a hindrance depending on past conference experiences and conference goals Subtle mood changes and all other sensory modalities would likely be lost through the video conferencing approach It has been said that People don't like to change the way they do things They like to press the flesh watch the fellow's reaction to what they say swap stories and all the rest 6 U The video teleconferencing method of communcating would allow for immediate feedback of material presented as well as allow for group dynamics to take a part in the decision-making Aetna Life Casualty is reported as having realized more efficient video teleconferencing sessions than face-toface meetings in some instances The conferees appear more determined and eager to capitalize on the video conferencing facilities once they are scheduled Thus less time is spent on small talk Results of recent psychological surveys evaluating the acceptance of video teleconferencing versus phone meetings revealed video conferenc ing to be more suitable for cooperative tasks and not applicable when the opinions are the participants are at variance ooo teleconferencing was both effective and acceptable for meetings involving information exchange routine decisionmaking and cooperative problem-solving but not as good for getting to know peopIe bargaining and negotiation tasks involving serious conflict U In addition these survey results indicated the majority of video users can accomplish meeting objectives efficiently through the use of a video teleconferencing system U The psychological aspects of video teleconf erencing may take some getting used to even after the technical elements and financial milestones are eliminated However with increased use of video teleconferencing it is believed that any personal psychological barriers that may exist will be diminished TECHNICAL CONSIDERATIONS IN ADOPTING VIDEO TELECONFERENCING Design Elements U Providing a Video-conferencing system design that will satisfy the user's requirements of meeting efficiency and effectiveness is a big order 8j The general design of a video conference room is more or less straightforward Its basic layout is not unsimilar to that of a local television studio comprising an eye-appealing environment cameras microphones monitors and a control console To enhance a video teleconferencing operation the inclusion of additional equipment would be required This additional equipment could include facsimile equipments for the simultaneous exchange of hardcopy documentation telephones for private voice exchange and coordination video recorders for future reference of the proceedings and an electronic blackboard for graphic depiction of information A teletypewriter terminal should also be given consideration in the design effort This could eliminate the need for facsimile The principal objective of the facsimile and teletypewriter device s is to provide a means of transmitting quick copies of documents held at one end of the system so that all conferees can pursue and discuss in detail the same document at the same time Still another device that should be considered at least at the NSA headquarters is a computer terminal This terminal would be most desirable as information or date pertinent to a particular subject under discussion during a meeting may only be available from computer data bases U Although the design effort can incorporate a multitude of additional equipments to enhance the success of the conference the primary goal is to provide a clear picture and good fidelity between the participants It is imperative to perfect these areas so that they closely resemble a traditional face-to-face conference Transmission Techniques U Various means of holding electronic meetings are available to corporate managers today One type of electronic meeting which Mar 83 CRYPTOLOG EURI QllFIBFHl'fIfth Page 3 aCID 4019691 is receiving the most attention is the video teleconference Implementing a video conference system relies heavily on the availability and cost of suitable bandwidth to meet the particular needs of the company The two conventional modes used for video conferencing today are wideband video conferencing and narrowband video conferencing U Wideband video conferencing is teleconferencing combined with the use of a one-way or two-way wide bandwid th 1 544 megab its or above communication link to transmit and receive simultaneous motion or real-time television pictures Narrowband video conferencing is the use of one or more narrow bandwidth less than 1 544 megabits communications links to transmit and receive still or freeze-frame television pictures U A variety of firms both foreign and domestic are frequently mentioned in current literature as being heavily involved in providing wideband video conferencing Some of these companies include Nippon Telephone and Telegraph NTT of Tokyo Northern Telecom NT of Toronto International Telephone and Telegraph ITT Radio Corporation of America RCA and Satellite Business Systems SBS There are three wideband full-motion video teleconferencing configurations available They are full-motion one-way video full-motion one-way video two-way audio and full-motion two-way video two-way audio U Full-motion one-way video is sui table for educational meetings where basic information is being presented to conference participants in remote locations and complete interaction is not necessary Full-motion one-way video two-way audio allows transmitted presentations to a group of conferees at a remote location or several locations with the ability for complete audiointeraction This form of video conferencing is used for education sales training or any other meeting that presents information to a widely dispersed group of people U Full-motion two-way video two-way audio is the most complete form of video teleconferencing Total interaction both visual and audio by participants in this configuration is the closest thing to a face-to-face meeting Wideband video most closely resembles the traditional face-to-face gatherings and provides immediate feedback on presented information The facial expressions and all other movements of the speaker and conferees are there for all to see This mode of operation is not unlike that of television today There is a feeling of psychological presence 9 with wideband video U Narrowband video conferences use bandwidth that cannot pass video information fast enough to support motion pictures Since narrowband video links normally travel over ordinary voice-grade telephone lines their use represents a less costly investment with regard to bandwidth required These lines can transmit video signals at an average rate of one frame every 70 seconds This type of system is commonly referred to as slow-scan or freeze-frame television The use of the narrowband method in establishing a participant's presence provides sufficient psychological feedback for continuing information on the overall situation at other locations Pictures transferred under these conditions are somewhat poorer than the full video wideband we have all experienced in live television In a conference situation slow-scan narrowband picture transmission is very often adequate and useful depending on the live interaction required lO U Studies of both narrowband and wideband video sys tems revealed that some subscribers of narrowband video are still satisfied that the freeze-frame image is adequate Others feel that full-motion video realized through the wideband technique is required to establish a user presence and provide a more productive and effective meeting Mar 83 CRYPTOLOG eeUFlBEll'FIkL Page 4 aCID 4019691 EO 1 4 c P L 86-36 Single and Multi Point 6Sflf'IBl 1l'PfA J Conferences U Another consideration when implementing a video teleconferencing system would revolve around the selection of either single- or multiple-point configurations The magnitude of the organization and the diffuseness of its field headquarters and stations wol lld be primary considerations in this decision A single point-to-point schema would allow for video communications between two locations only such as NSA Fort Meade wi th Hq NSAPAC Pearl Harbor This arrangement is depicted graphically in Figure 1 Such a system limits participants as well as conference station locations However a strategically located studio in the Pacific or European theaters linked with NSA Headquarters would allow for easier access by field station managers and other participants from nearby field stations than would travel to Fort Meade U A multiple-point conference configuration entails the selection of three or more field stations These stations can be but are not necessarily confined to the same geographic area This mode of operation would provide the means of conducting business with more participants on an extended spectrum simul taneously For example consider a multiple-point conference arrangement connecting NSA Fort Meade and H NSAPAC Pearl Harbor with field stations The NSA Fort Meade junction would serve as the nodal point or controlling facility for all of the conferences Possible multiple-point system schematics are shown in Figures 2 and 3 EO 1 4 c P L 86-36 NSA APPLICATIONS OF VIDEO TELECONFERENCING Considerations in Implementation U Prior to any decision by NSA management to implement video teleconferencing systems careful and thorough analysis must be conducted to ascertain the following Could travel expenditures be reduced to offset the procurement and maintenance costs of the system Could mission elements realize a marked increase in productivity through the use of video teleconferencing Could NSA employees adapt to the use of video teleconferencing as a replacement for face-to-face meetings Table 1 If NSA elects to adopt video teleconferencing as an alternative to travel it is possible that the Agency could realize a savings similar to that projected by Atlantic Richfield of 20 percent annually Using this hypothesis NSA might have realized a savings of $3 8 million by the end of 1982 if a video conferencing system had been fully operational Savings by the end of 1983 could reach the $5 million mark However in any' given year that the system is tasked for implementation the majority of the majority of the initial travel savings would be consumed in procurement installation and training costs But given a two-year operational period from the time of the initial operating capability IOC NSA would begin to realize a substantial return on its investment A minimal portion of the yearly return estimated at 15 percent per annum could then be applied toward the operational and maintenance O M costs of such a system Savings in travel at a rate of 20 percent annually Atlantic Richfield and the estimated operational and maintenance costs of 15 percent per annum to be realized by NSA with the adoption of video conferencing are shown in Table 2 EO 1 4 c P L 86-36 Mar 83 CRYPTOLOG S8flP IBEll'f Ii'm Page 5 aCID 4019691 eeNFIB EN'%' It Mar 83 CRYPTOLOG Page eeUFIBEIl'flkri 6 EO 1 4 c P L 86-36 aCID 4019691 88UFiBBIf'i'Ii' laDLe were not as successful 10 percent were more successful and 5 percent were much less successful 12 A total of 64 percent of' video users proved to be as satisfied or more so with the use of video conferencing than with face-to-face meetings U I t is impossible to predict the NSA user acceptance or rejection of a video system It can be expected that some individuals at NSA will be reluctant to accept video teleconferencing as a new communications tool and a replacement for face-to-face meetings They may question video's structured impersonal nature Some at NSA may not function as efficiently under the time constraints imposed by video Still others may miss the change of pace and morale enhancement provided by travel U If NSA communications were entirely dependent on written messages instead of video teleconferencing or travel each project worker would have to be concrete and specific in his or her project presentation and explanation The real-time feature of video teleconferencing would be lost through travel and written messages Video conferencing would eliminate some of the formal written communique Chances of having all needed personnel at a video project meeting would be greater Users would have at their disposal a means of presenting the target area graphically Productivity then should definitely be an outcome of struc tured well organized timely video teleconferencing U However if NSA video participants' opinions parallel those of users in previous studies it could be expected that a majority of video users would be satisfied with conference results using this new method of communications User acceptance may be enhanced through practice sessions frequent use positive reinforcement and a relaxed atmosphere EO 1 4 c u A study conducted by Satellite Business Systems SBS indicates that 54 percent of video users were as successful wi th business meetings through video conferencing as they were through face-to-face meetings 31 percent EO 1 4 c P L 86-36 Mar 83 CRYPTOLOG 88tlFIQiJl rUI P L The meeting isn't over yet Page 7 86-36 P L aCID 4019691 86-36 8eUFIBBU'i'fA - Resources Bandwidth Equipment EO 1 4 c P L 86-36 Advantages Disadvantages in Adopting Video Teleconferencing -tet-up to this point few negative aspects other than the possible psychological barriers to NSA Participants have been cited It is necessary that additional shortcomings for NSA be mentioned o Scheduling conference times to sui t wide time-zone differences between NSA Headquarters and European or Pacific field stations is a major stumbling block Participant flexibility is crucial iit such situations iscouraging ut still an overall savings in travel would be realized Finally conference participants who are not fully prepared for scheduled video conference time would create an immediate loss of money time and productivity It then becomes essential for NSA management to alert all conferees that such waste will not be tolerated U Although many of the advantages to be 'realized through the adoption of videoteleconferencing have already been expounded on through studies of corporations' successfully use of the video link they must be restated in terms of NSA usage Cost efficiency timeliness in decisions improved work coordination and productivity enhancement may all be possible for NSA In addition more employees would be able to attend and more flexible meetings would result Mar 83 CRYPTOLOG eSllF IBEll'fMe Page 8 aCID 4019691 SQIIFIQI i'lTUb U To establish a video teleconferencing system at NSA Headquarters and other sites it would be necessary to reserve exclusively one existing conference room at each The permanent features of the room would include but are not limited to fixed-position cameras a facsimile device telephones a blackboard preferably electronic a computer terminal for use at Headquarters interfacing with one of the maj or NSA complexes television monitors and microphones It would also be necessary to modify the room to ensure proper acoustics At the present time the actual video equipment is available at the Agency but its use is reserved exclusively for the NSA television production studio Other needed equipment presently exists at NSA but it also is currently on use to satisfy inhouse production and mission requirements Therefore procurement action for all video teleconferencing and associated equipments would be necessary Once purchased this equipment would be dedicated for the sole use of NSA video teleconferencing Identical equipment would be required at all selected video conferencing field stations In addition to video conferencing equipments communications interfacing equipment would be required to transfer signals This equipment includes cryptographic devices to secure transmissions modulators demodulators multiplexers expanders translators transceivers and line drivers Financial and Manpower Analysis U Types of video teleconferencing system arrangements are numerous and varied A number of components determine the actual system cost The variants include television production length of broadcast audio system number of receiving locations projection equipment and the actual conferencing room A basic slow-scan configuration consisting of a transceiver a camera with appropriate lenses black-and-white monitors and assocIated accessories for one location costs approximately $25 000 15 This particular system would provide freeze-frame video with a high resolution of 78 seconds switchable to a medium resolution of 35 seconds In contrast a full-motion real-time video color system's cost would begin at approximately $50 000 per location 16 Initial video system costs do not include transmission medium expenditures operator training or the interfacing communications equipment Prices remain fairly consistent between specific equipment suppliers such as Videonet Incorporated Colorado Video and American Satellite For NSA to determine the amount of funding required to install a dedicated video conferencing system an in depth study of desired equipment would be necessary Only after specific equipment is selected could a total system expenditure be finalized U It is estimated that one trained television production technician would be needed at each location 17 NSA currently employs 6 to 10 skilled television production technicians at Fort Meade Their expertise in the video area could possibly provide in-house training for future video system controllers However field station personnel would be required to travel to NSA or trained technicians could be sent to various video-established locations to provide the needed production training Fellowship programs could be established which could also allow NSA staff members to become educated in the area of video conferencing production There are too many variables beyond system and bandwidth costs at this time for a bottom-line dollar figure to be rendered Immediate Long-Range Applications An immediate application of video teleconferencing at NSA could connect NSA Headquarters with the Friendship Annex and various government agencies in the Washington DC area Bandwidth is presently available for such communication links To introduce video at NSA it is recommended that both slow-scan and full-motion capabilities be utilized independently on a trial basis The Agency would then be able to evaluate system functioning and determine future video teleconferencing needs U If video is evaluated as a reliable and productive NSA communication tool future applications should include connections with NSA field headquarters in Europe and the Pacific In time it is not unrealistic to expect that with favorable acceptance of the video link video teleconferencing connections could multiply to include numerous selected NSA field stations worldwide CONCLUSION U It becomes apparent through researching the field of video teleconferencing that it is in fact a tremendous communications tool which can be used for the enhancement of conference productivity and travel reduction It is hoped that NSA will approach video teleconferencing with total openness As this research has shown many managers from a wide spectrum of corporate disciplines are using video teleconferencing today and are realizing increased productivity as well as reduced travel budgets Monetary savings with video teleconferencing is considered to be the most popular for its use Across-the-board dollar Mar 83 CRYPTOLOG Page 9 eeUP BBlf'l'Ikb 4019691 eeUPflll ll'1'U figures can be produced to support a video system Savings of time have also been found to be a major asset gained through the use of a successful video teleconferencing system Management's efficient use of time is at the heart of productivity Through video telecon ferencing quicker and more efficient response times and decisions are realized Therefore savings in time can always be regarded as a credible justification along with monetary savings for the implementation of video teleconferencing It cannot be overemphasized that for management video teleconferencing can provide shorter more productive meetings with less turn-around time on projects U With the adoption of a video teleconferencing at NSA and selected field stations there must be a total commitment on the part of the Agency to the concept of video conferencing Favorable attitudes toward teleconferencing must also exist A clearly defined conference format must be developed and adhered to to ensure system success Highly reliable communication links and easyto-use and accessible video conferencing equipment must be provided A quality video teleconferencing system could possibly convert doubters into avid users and possible advocates Increased productivity will likely be an incentive for increased video system use Although it is not realistic to expect all travel to cease closer scrutiny of travel requests should be conduc ted This would be necessary if NSA is to realize a positive return on its investment in a video teleconferencing system U When all the facts concerning video teleconferencing are weighed I think that the scales will tip in favor of NSA's adoption of a video teleconferencing system 5 Albertson Lesley A Telecommunications as a Travel Substitute Some Psychological Organizational and Social Aspects Journal of Communications Spring 1977 p 33 6 Perham John Business' New Communications Tool Dun's Review February 1981 p 81 7 Telecommunications and Energy Policy Telecommunications Policy Vol I No 1 cited by Jeff Charles Approaches to Teleconferencing Justification Towards a General Model Telecommunications Policy December 1981 p 297 8 Munsey Wallace Wide-band versus Narrow-band Video-conferencing The User Must Decide Telecommunications February 1981 p 50 10 Johantgen op cit p 12 I interview 11 24 May 1982 12 Rush C T Evaluation Report on Project PRELUDE Experiment No 26 in the Communications Technology Satellite Program PRELUDE-Communications of the 80's May 1978 13 Interview with James Keller Plans and Requirements National Security Agency Fort George G Meade MD 6 June 1982 14 Interview withl I Facilities Control Office ' oN a t i o n a l 'S e c u rity Agency Fort George G Meade MD 25 October 1982 15 Interview with James Dole Colorado Video Incorporated AFCEA Conference Washington DC 16 June 1982 Footnotes 16 17 1 File Karen N Teleconferencing A Case Study Office November 1981 p 88 2 Johantgen Beverly Video Teleconferencing--A Brave New World Computer World 17 March 1982 p 12 Ibid Interview 16 June 1982 Interview with Tim Gately Television Production National Security Agency Fort George G Meade MD 25 October 1982 P L 86-36 r 3 Interview with l Finance Of f i ce Na t iona 'l- ls'O e c u r irt y ---rAg e ncy Ft o George G Meade Md 24 May 1982 4 Interview with I IOffice of Personnel Administration National Security Agency Ft George G Meade Md 6 October 1982 Mar 83 CRYPTOLOG Page eaUFIBflU'Flkb 10 aCID Tep SESRET mfBRA Is THE GLASS HALF EMPTY o 1 qR HALF FULL 1 EO 1 4 c P L 86-36 eing prone to kicking dead horses I decided that the title for this article should be based on the well-worn philosophical anecdote of U the pessimist who perceives a glass of water half-empty while the optimist is certain that the same glass is half-full Of course the fact r am basically lazy and that this title met my self-inflicted requirement that nothing should be overtaxing to my thought processes played some role in helping to select the title My one problem with it is that I have a difficult time convincing myself that a glass with any amount of water deserves contemplation at all As with all of us I am most happy wi th a glass that is all full or all empty Unfortunately reality is rarely represented in clear-cut choices and that blasted undefinable glass is always there to make life difficult Mar 83 CRYPTOLOG Page 'fey SEeRE'f tJlfBRA 11 e u I P L 86-36 OCID 4019591 Mar 33 Pag 12 E0 P L 86 36 dyapsaaumaama piL 86 36 GCID 40196291 Mar 83' Page 13 OCID 4019691 'Eo P L 86 36 Mar 83 Page 14 aCID 'fey SEen'f I JHMA 4019691 Mar 83 CRYPTOLOG Page 15 TQP 86SIHl'F UlfBRtr EO 1 4 c P L 86-36 aCID 4019691 CUMULATIVE INDEX 1 1 Part One AUTHORS Aug 74 A Short Directory of Career Panels Aug 74 Golden Oldie The Management Survey of the Philharmonic Aug 74 Learned Organizations--1974 CLA Essay Contest 1974 CMI Essay Contest CIS I Prizes and Honors Spring 74 Aug 74 Puzzle Stinky Pinky Aug 74 Puzzle Telephone Directory Aug 74 The New Traffic Analysis Glossary Sep 74 Contributions Solicited Oct 74 Golden Oldie An Unofficial Glossary of Weasel Words Oct 74 News from NCS--Agency Resumes Hiring of LICs NCS Offers Course in 'SIGINT Appreciation' Oct 74 Puzzle Telephone Recall Nov 74 Golden Oldie A Medal for Horatius ooo Nov 74 The Apostrophe Some Thought's Dec 74 Cryptolog Index for 1974 Dec 74 Puzzle Citizens of the World Dec 74 Puzzle Secret Messages 'Military Cryptanalytics' Jan 75 Cryptolog Index for 1974 Jan 75 Learned Organizations--IAI News CISI News CLA is Ten Years Old eMI News Feb 75 Golden Oldie Establishment of Molecule Superseries Feb 75 The Devil's Dictionary Apr 75 A Guide to Central Information C5 May 75 Learned Organizations--CLA News IAI News May 75 Puzzle How Many Words in 'CRYPTOLOG' Jun 75 COMSEC Familiarization Do You Need It Jun 75 Golden Oldie SIMP Tables Jun 75 The Navajo Code Talkers Jul 75 Learned Organizations--CLA News CMI News Aug 75 Computer Network Resources In C5 Aug 75 Language in the News Mar 83 The following cumulative index of CRYPTOLOG Vols I through IX 1974-1982 was produced using UNIX PINS ETTER tools on MYCROFT and BARDOLPH1 The index is in three parts and is being published in three successive issues Part one is an index by author part two is an index by keyword and part three is an index by title Items in multiple issues FebruaryMarch 1975 for example are indicated by the first month i e by Feb 75 Aug Oct Nov Dec Dec Dec 7S 75 75 75 75 75 Mar 76 CRYPTOLOG Apr 76 Apr 76 Aug Aug Aug Sep Sep 76 76 76 76 76 Oct Jan Aug Aug Oct 76 77 77 77 77 Dec 77 Feb 78 Puzzle CRY-PTO-LOGrolling Letter Typewriter Keyboard NCS Offers Course-Equivalency Tests Cryptolog Index for 1974-1975 Establishment of CSI Newsletter Learned Organizations--CLA Essay Contest CAA News 1976 Language Meetings and Conferences Language in the News Language Rule NCS Offers Course-Equivalency Tests Clarification Language in the News NSA Cryptologic Collection Note on FRANCOPHONEGLOS Language in the News Learned Organizations--1976 CLA Essay Contest 1976 eMI Essay Contest The Winnah Kid Apostrophe Golden Oldie A Medal for Horatius ooo DIALOG Available at NSA Want to Play with a Pickfair Square The Perils of Being a State Department Interpreter Cryptolog Index for 1977 Puzzle Three Holes Page 16 Hl B15E VIA 88HHl'F 8UAiftlBM 6NM' aCID 4019691 Mar Mar Apr Jun 78 78 78 78 Sep 78 Sep 78 Oct Dec Jan Jan 78 78 79 79 Jan 79 Jan 79 Feb 79 Feb 79 Mar Mar Mar Apr Apr May May May Jun Jun Jul 79 79 79 79 79 79 79 79 79 79 79 Jul Aug Aug Oct 79 79 79 79 Oct 79 Oct 79 EO 1 4 c P L 86-36 Answer to Three Holes CLA News Prizewinners in Three Holes Golden Oldie Unid ntified Unit at Unknown Location CLA News T Establishes Human Resource Development Panel Overheard in the Burnbag Line Cryptolog Index for 1978 CMI News How do You Tell These Two Clowns Apart Human Factors Newsletter W W II Japanese Translation at Arlington Hall Station CLA News Russian Institute Language Career Panel Clarification of Nov 78 Item Attention Military Traffic Analysts CISI News Classic Cables Bookbreakers Forum Classic Cables CAA News CISI News Spring Conference Classic Cables CAA News Sign Language Russian Handbook of Spoken Usage Vol 3 Seminar on Translation Problems ooo But On The Other Hand Memorable Memos CAA News Conference on Communications Analysis CLA News NCS Summer Language Program OCt 791 Jan Jan Apr Jan Jan Apr Apr Apr Jan Mar Apr May Jun 80 L C 'L A N ' e-w-s- S y d-n-ey-J 'a-f f e-Pr w-a-r d 80 NSA CSS Military Linguist Program 80 Geographic Trivia 81 NCS-CLA Symposium 81 Some Things Never Change 81 Classic Cables 81 DIA Videocasette Program 81 The Poet s Corner 82 All The Alligators Aren't On Sport Shirts 82 Attention Authors and Publicity Chairmen 82 Overheard While Standing in the Burnbag Line 82 Cryptolog Numbering 82 Odds and Ends Anon ' Dec 74 Letter Q ticie Jun Jun May Nov Mar Jan Nov 7S 7S 76 76 77 78 78 Letter Letter Project SIS Conversation With a Bookbreaker Check Your Morse Front-End Alignment A Few Thoughts on the NSA Linguist The Changing Face of NSA Letter Appraisal System Mar 83 Appalled' Mar 77 Letter C-LINERS Article Asken Oct 77 Which Numbering System Should We Use 'Donym' Jan 79 Second Sighting 'Exinterne' Sep 74 A Long Hard Look at the Intern Program--Program Philosophy Recruitment Part One Oct 74 A Long Hard Look at the Intern Program--Selection and Orientation Part Two Nov 74 A Long Hard Look at the Intern Program- otivation and Morale Part Three Dec 74 A Long Hard Look at the Intern Program- at Happens to the Graduate Part Four 'Fennwatcher Apr 78 Letter 1 IIArticle Leiner' Jan 77 Executive Order 11652 'Mouse Aug 77 Letter Subscription 'Reader' Oct 77 Letter AG-22 Page Print Sardonyx' May 78 NSA-Crostic No 14 'Schmedlapp' Dec 82 Questions In Search of a PQE Sue' Apr 79 Letter Ask Art 'Weeson' Aug 77 Letter 1 1Artic1e P L 'Class 32' Sep 77 Tribute to the Guru A J S Oct 75 Jan 76 Apr 76 Jun 76 Oct 76 Jan 77 Jun 77 Jul 77 Sep 77 Sep 77 Nov 77 Jan 78 NSA-Crostic No 1 NSA-Crostic No 2 NSA-Crostic No 3 NSA-Crostic No 4 NSA-Crostic No S NSA-Crostic No 6 Vich Iss R-r-right NSA-Crostic No 8 'Simonoff Says ' Al Balloni Editor NSA-Crostic No 10 The Joys and Frustrations of PluralDropping Feb 78 No Winnie You've Got It Upside Down Too CRYPTOLOG SflElREl'F Page 17 IftrlHlbEl 'rIA 88 fHf'F EllfMffH bB 8ffCY SEeRE Mar Jun Sep Dec Jan 78 78 78 78 79 NSA-Crostic No 12 NSA-Crostic No 15 NSA-Crostic No 17 'No No Nanette ' Means Yes Al Balloni Editor Apr 77 'It's Got to Get Out Today ' I -Ap r 7 5 The Uses of ELINT Boak D G Apr 79 COMSEC SIGINT Relations ' -- - -- -I Feb 75 The Gulf of Tonkin Incident Oct 75 Tactical Language Exploitation A Lesson Learned Aug 76 Integrated Analysts for Asia Jul 77 Letter 1 Article Oct 81 The Stairwell Society Jun 79 Letter Library Changes __I Jun 75 The Role of the Electronic Warfare Advisory Element EWAE of NSA Mar 76 Letter Proud and Bitter Memories Article Jun 76 Computers In The ELINT and TELEMETRY Business F eb 7 8 0 0 tary Cryptologic SuperviIr-I-Ma---1'-7-81'- J I EO 1 4 c P L 86-36 Dec 74 The Old 1__- - eet l OIl Dec 75 Graphic Analysis of Linear Recursive Sequences Bostick C W Nov 76 Letter Cumulative Index Feb 79 Letter I I Article Dec 78 Aug 74 Self-Paced Instruction The Future is Now Boucher M J May 75 Letter r JArticle Apr 77 Lette Mason Article Jun 77 More about More about the NSA SIGINT Summary j-I- - - - - - - Jul 78 Is A Translator a Professional I i I A-p-r 8 - Ar p r l'8noOMO 'llH- K EO 1 4 c P L 86-36 YPTOS News 11 -D-e-c--7-4-M- PS in Mind--A Photoessay Barrer D Y Sep 78 Letter Gilbertson Letter Ii J u 1 7 5 Re psychling I II the Code Clerk Dec 82 E '-J-U- 1-7-9 ' 'Le-t ter Bjorklund Letter Apr 75 Letter Professionalization of Bookbreakers Jul 77 The Transcription Skill Concepts and Teaching Methodologies Jun 79 1 -Ap r 7 7 c 0 n t mPlating Computing I Oct 78 And-a You Betta Have Moti-vaysh Apr 79 Fear of Testing and What To Do About It Jun 78 Equipment Maintenance on ABNER I 'Ju-I 7 8 T 'h-e S -o v- i-e t-- G e-n-e-r a 'I S t aff Jul 78 The Bucky Balance May 82 Letter Plaintext May 76 Hypnosis and Self-Hypnosis in Language Learning Mar 77 Letter Article Sep 77 Letter L- JLetter Sep 78 Letter Pattie Article Dec 78 Agency Summer Language Study Jul 79 Letter Bjorklund Letter Jun 79 Bjorklund K Dec 76 Why Can't They Design a Good SR Test Jun 79 Letter Article I Word Processing In A4 I P L Mar 83 CRYPTOLOG SEeRE 86-36 Page 18 W QI K VIA SQUH1'F SIh 'dH1B 8 SUU aCID 4019691 EO 1 4 c p e Though on Xi O P -36 P L 'I Mar - r 7 6 TAri -'l tiveApproachto Scoring Nov 76 Tou ours La Politesse Jul 77 Nov 78 'T' -- ' Aug Dec Apr Aug 74 74 76 79 86-36 Translations Apr 76 The VoynichManuscript Revisited Aug 76 NSA's System for Grading Translations Mar 79 VORD iaa Better Idea What Is a Collector The New Collection Criteria Will the Real ELINT Please Stand Up An August Baudy Oc t - - 771 EO 1 4 c Apr Some thol lghtta B1l- tgI6 sian PQE Aug 79 Punctuation More Than Meets The Eye 77 I D e c 7 6 But It Looks Like the Real Thing Oc t 75 IRONHORSE ATaetical SIGI tn Sys tem I --- - I Nov 76 How to N 0-v 7 6 L-e t t-er From Canada I P L 86-36 Make a Railroad Disappear -- Mr a r I 6 A C 0 m parison of NSA and ATA Certification Standards Work Quotas for Soviet Translators Let's Give the Linguists a Bigger Piece of the Pie What Ever Does 'However' Mean More B S Before Spellman Oct 76 Dec 76 Nov 77 Oct 78 Jan 77 Letter Use of Term 'Compartmented' Nov 75 DESK P AD A P rogrammers's Tool Feb 76 The ISystellEo 1 4 c P L 86-36 I I May 82 Is There An Old Crow In Your Future ---J a n 7n6 63 Days--The Soviets in Space Sep 781L - Apr 82 Partial Machine Translation Final Report _ Callimahos L D Apr 75 Psyching the Code Clerk Jan 80 LIP 1 - --- I Oct 75 The Feb 82 The Internal Performance Evaluation Friend or Foe Danang Processing Center Apr 76 One Day in Danang L - 'Ma -y 7 '6 Wh -a-t- l ls Wr ong Jun 76 Comments on the AG-22 IATS I -Ap r 7 8 Remedial w l t l1A ' 2fi TP L 8 6- 3 6 I Sep 77 Knowledge Resource Man lgement at NSA Software Engineering I Ap r 776 H 0 w D 0 Adults Learn Language I __ I Nov 76 The Uses of Elegant English o 1_ _ I Feb Nov 81 OPELINT Is Alive and Well In B Group 781 ---'ll'T T l' _ E 'i0 1 4 C I- IL 86-36 Feb 76 Expletives Deleted Glossing Over a Glossary r-- Chauvenet L R Apr 77 NSA-Crostic No 7 Aug 77 Early Days in NSA Computing Sep 77 The Doctor Is In capable of Diagnosing Oct 79 The Roads Around Us Jan 82 Letter Persephone Terp ichore Article P L 86-36 Mar 83 - -- I Aug 76 The Mar Dec Apr Nov CRYPTOLOG 77 77 78 78 ' Hierarchical Clustering of Cryptanalytic Data CADRE Reveals What Data Conceals What Is Pattern Recognition A Little PEP Talk A Dialogue Between Ms User and Dr Analysis Page 19 aCID 4019691 n nc T 'JC CyU cEm r IdenW e 'n Teehn qn Aug 82 Human Factors Corner Video Display Terminals and Vision of Workers Oct 82 Human Factors Corner Text Editors Nov 82 Human Factors Corner How Do People Organize Cooperative Work Dec 82 Passwords I Nov 81 Cryptic Crossword Mar 82 Cryptic Crossword Mar 82 Rules For The Camel Corps I_ _ _-- I Oct 75 Linguist D H W Feb 79 NSA-Crostic No 22 Mar 79 Readers' Survey Apr 79 But Mr Boak Did You Ever Try To Get Rid of One in a Hurry Apr 79 NSA-Crostic No 24 May 79 NSA-Crostic No 25 Jun 79 NSA-Crostic No 26 Jul 79 NSA-Crostic No 27 Aug 79 NSA-Crostic No 28 Oct 79 NSA-Crostic No 29 Jan 80 NSA-Crostic No 30 Apr 80 NSA-Crostic No 31 Jan 81 NSA-Crostic No 32 Apr 81 NSA-Crostic No 33 Oct 81 NSA-Crostic No 35 Dec 81 NSA-Crostic No 36 Jan 82 NSA-Crostic No 37 Feb 82 NSA-Crostic No 38 Apr 82 NSA-Crostic No 39 May 82 NSA-Crostic No 40 Jun 82 NSA-Crostic No 41 Aug 82 NSA-Crostic No 42 Oct 82 NSA-Crostic No 43 Nov 82 NSA-Crostic No 44 You Have an Expert to Call I I Dec 77 What Made Them Do It Language Self-Study Mar 77 An Overview of projectl _ Craig D K Sep 74 COMINT Analysis ofl Oct 81 Economic Intelligen c-e- p r-o b l e m-s a n d Prospects EO 1 4 c P L 86-36 I L - D-e-c 7 4 L-e-a rnedOrganizations--CISI Forms Special Interest Group on Human Factors Jun 77 Human Factors and Systems Design An Estranged Relationship Oct 78 Letter NSA-Crostic Crowell B Jun 78 A Computer Scratch Pad at Home or at Work Feb 79 Data Standards Without Tears Jun 79 Data Standards Without Teeth ----- - -1 Sep 76 More Oct 77 Golden Oldie Analyzation of Data 1 - -1 Feb 75 CAMINO News Jul 75 Machine Intelligence--Promise or Delusion Oct 76 Some Ideas about Mechanized Language Working Aids May 77 Another Controversial Book on Artificial Intelligence May 78 The Joys of UNIX Nov 81 How to Create A User-Unfriendly System Nov 81 Review What Do You Think Dec 81 Review In The Name of Efficiency Jan 82 Human Factors Corner Information System Feb 82 Human Factors Corner But What Do I Do With My Papers Feb 82 Human Factors Corner Some Advice to Users of Unfriendly System Mar 82 Human Factors Corner Consumer vs Computer A Review May 82 Human Factors Corner Data Gathering How Do We Spend Our Day Jun 82 Human Factors Responsible Documentation Mar 83 Comments on the AG-22 IATS Dawson R Feb 76 The Prebendary and the Prophet Jun 76 The Marquis and the Medium Dec 82 NSA-Crostic No 45 Apr 81 GradIng The Russian PQE L-I--- _ I Jun 82 Who Wants A Promotion Anyway I---- ' I Feb 76 What Is Cipher Text Jan 82 Letter Cryptanalysis Article Mar 82 etter Strangest Bust of the Month I May 77 The Polyhedral War Jul 77 P L CRYPTOLOG SEleREl'f Lett r IL - 86-36 Page 20 I jArticle OCI D t 14 01-96 91 SlOSRI3'F 'J L L - _I 86-36 iL -_ LI---Nov 7411 What May 75 Hooray for PMDs Oct 751 Where Why I L -Ap r 7 6 Wh a-t 's the Best Location for the Com- puter Appl at4 ds Fartction P L 86-36 -- I Oct 74 The Mission of the Signals Processing Requirements Panel Jan 81 Hlw to Improve Your Promotion Poten- tial Dudley B Aug 74 Nice Busman's Holiday for One NSA Employee EO 1 4 c P L 86-36 0 c- t-- 7 6-An- --other Word on AG-22 IATS Nov 81 Futuristic Reporting I 1 1 Aug 74 What Should You Expect or The Analysis of Cryptanalysts Sep 74 Secrets of the Altars--The Moustier Cryptograms Oct 74 An October Overlap Nov 74 Answer to An October Overlap Aug 75 Twenty Years of Transposition Oct 77 K1 SCA Field Management and Evaluation Dec 81 Exercise Support Aug 77 What Is an Information Research Analyst I - No-v- 7 '8 L-e-t-t-er I 1Artic Ie Filby P W Dec 75 Weapon That Helped Defeat Nazis Winterbotham's 'The ULTRA Secret' Jan 78 'The Man Who Broke Purple' Book Review Oct 78 Feeding the Germans Misinformation Book Review Filby V R Aug 74 A Svot by AnY Other Name Oct 74 TheLIExercise A Case Study in Special Research Analysis Apr 75 Coverterms Feb 76 How Do We Kpow It's True Mar 77 Revised TeqB icp 4 I T Manual in Preparationp L 86-36 Feb 78 More Beans Oct 78 Letter NSA-Crostic Jan 79 Reflections and Recommendations Oct 79 Snowballs On The Roof Mar 82 A Historian Looks at SIGINT --- ----- _ 11 Apr 82 Personal omputer Application May 82 The Micro Revolution Arthur Young Study COnui ent May 76 Waveguide Analysis I L - F e b 7 5 puzzle Can You Make Out the Name Aug 75 Typewriter Random -- A New Look Nov 76 Teacher Learns a Lesson Apr 75 Answer to Can You Make Out the Name Engle T L Jun 75 Puzzle l Jan 80 Coming Home I Apr 80 Help Wanted Jan 76 Football and Cryptology Nov 77 Letter Salemme Article Jun 79 Letter Library Changes - --- - -IE 1 4 c May 82 Letter Shell Gf Et r f1- 6 I -J u-n 7 7 SIGINT Welcomes INKSTAND May 82 Full or Broad Spectrum Lighting Mar 77 More about the NSA SIGINT Summary Aug 82 What Promotion Boards Want Fairbanks S Mar 79 Fairbanks on English Apr 79 More Fairbanks on English May 79 More Fairbanks On English Jun 79 How Are Your Stamina Jul 79 Wilt Thou Angelina ooo Gaddy D W Apr 76 On Being Truthftll Aug 77 New Directionsfbr the U S Intelligence Community Nov 81 Say What You Mean P L 86-36 Mar 83 CRYPTOLOG Page 21 P L 86-36 SEeR T IhIrlfBt fJ 'JIA 8e1HUT 8ItMfffEtS SUnY aCID 4019691 r L 86-36 Sl eltE'P I -L Jan 78 Thanks for the Attaboy May 78 Uncle-a Sam Wantsa You Jan 79 Henry Cement and other Phantoms of the Opera tions Feb 79 The COMINT Chain 'Gang' Jun 79 The Story of MOSES Aug 82 Linguist Machine Gurin J Feb 75 Glossaries versus Dictionaries Which Should I t Be Mar 77 Letter Keyword Spotting Jul 77 Whtch Tape Has the Intelligence Projectl Feb 78 The Unseen Go-Between Jun 78 Never Again Jul 78 Letter c JArticle Oct 78 You Can't Tell the Wheat from the Chaff Without a Program Feb J9 Let's Not Forget Our Cryptologic Mission May 79 More Than Words Can Say Dec 82 Going On-Line With Information Aids I Garof alo C A Sep 74 Gary's Colors Feb 82 Golden Oldie Simplicity in Color GerhardW Oct 75 One Chance in Three--But It Worked H I Oct 76 More Thoughts on 'Questionable' SIGINt Jan 77 Letter 'Firebrand' Letter I -N 0-v 8 2 C e-n tral Research and The Paper Blob I I Jun 75 Letter Bookbreakers Professionalization of Country Specialists --_ _ I Gilbertson E A Jun 78 Letter 1L -_ _ IArticle I Jul 78 Ye Gads 86-36 Oct 74 Character Building in the People's Republic of China Another Country Trigraph May Oct Jun Sep System Oct 75 NSA in Vietnam Proud and Bitter Memories Dec 77 CAA Message and News Jun 82 Golden Oldie Reporting Message Volumes 76 76 77 78 COMINT in the Russian Navy WWII Russian SIGINT and Electronic Warfare Old Russian Manuscript Ciphers Soviet GOMINT and the Civil War 1 L - J u-n 7 - 5 L etter 1 Dec 781 Article --_ _I EO 1 4 c Dec 78 How Do You Spell Peking p L 86-36 Nov 78 Letter Appraisal System Dec 77 Letter pratt Article Dec 821L JIEO 1 4 c P L 86-36 Gould R E Dec 75 Linguists From The Melting Pot Apr 76 Golden Oldie Hidden Losses in COMINT Production Nov 82 The Costs of Muddling Through Hanyok R J Jun 82 Some Reflections On The Reality of Computer Security Jan 75 Puzzle Crossed Godewords Harrison M A May 77 Why Are These People Smiling Jun 781L - May 77A Story With a Moral May 77 Letter 'Horatius' Sep 77 Is There a Doctor in the House 1 1 -_ _ Dec 81 PLATFORM How Did You Say That Works EO 1 4 c L -_ ---II EO 1 4 d Sep 82 TSS Revolution Grant L G Nov 75 In Praise of SOLITS Dec 78 To Whom It May Concern I -- F ' e' 'b-- '8 2 L ' e t t-e-r UNIX Ar t ic I e Nov 82 Letter Shell Game Article Apr 76 Letter What Are We About Article Nov 77 Letter Salemme Article 1 P L 86-36 Mar 83 CRYPTOLOG sp eIH Y Page 22 klt E 0 IA e61flIf'f 8IIhUUBf58 8 feY r aCID 4019691 8O 3 r-_ _-__O_-'1 P L 86-36 Jenks P Aug 77 Let Me Repeat AndMake Myself Perfectly Clear Apr 81 Third Party Relationships IL - I Dec 76 Apollo-Soyuz I Test Project L Ma y-8 2 T he NSA Inf'ormation Desk 'No Comment' Jun 82 Letter Shell Game Article Jun 82 Loooong Shell Mar 78 A Linguist Looks at the Tube Horn J E Nolte W M Jan 78 An Early NSA Proposal for Satellite Remoting - Jan _I 80 System I L - Dec 74 Flag-Waving Programmer Dec 7 Jan 7 9L -SO L -I S -- -A -- V -e 'h- i-c 'l-e i-n-- 'Se-a-r-c- h-o- f - -a-n ' - Engine Acquisition Document Review 1 1 - Nov 74 Data and Definitions Calling Things by Their Rightful Names I ---_ JI Apr 78 SIGINT '--xp r-S 'i-t r-lffic Exploitation 1990 ---_ _I Oct 78 A Method for Measuring Negative Intelligence the Word 'The ULTRA Secret' ---- JI Nov 74 Purity EO 1 4 c Jun 76 Comments on th8 G-2St AJ6 Jan 78 But Why Do We 'Do -'-tt Mar 78 A Donkey in Your WHAT dE the Russia Language-Slavophiles vs Westernizers L -r I l JI Jul 79 Source Protection Our Age cy's Insurance Policy 1 --J u i-79l' ' ' L - Ietter 1L -_ _ I rtiC le Apr 79 Inman B R Nov 77 Direc tor's Memorandum Guidance' P L _ Kenny M M Jan 77 Letter LI Jun 78 Minnie's Mini I 1 4 c L 86-36 Jul Sep Sep Oct Jan Jackson W J Aug 74 TDB The TEXTA Data Base Dec 74 An Approach to Callsign Analysis 77 77 77 77 79 Classification COrner Classification Corner XGDS-2 XGDS-2 Classification Corner Classification Corner Who Said It's Party Time '--- ---1 Oct 76 Language Skill File IRONHORSE Article L --Se-p-7-8CL-------- Jan 81 Why Do They Leave Nov 74 New Trends in the Teaching of Gryp tanalysis Dec 78 Some Tips on Getting Promoted Aug 79 NSA PromgtiorfBoards How They Work 86-36 l Article L - M 'a-y 7 5 C odeword or COMINT Channels L --A 'p-r 7 8 L-O-o -ki 'n-g-a-t IMr 1 ---f O P L 86-36 Sep 77 Speaking of Logging ooo 1L - Irwin M R May 75 Are We Wasting Linguistic Time I ----- I Oct 76 Letter 86-36 Jan 77 Letter son Article Hunt W May 76 About the NSA SIGINT Summary II-- --I Dec 75 Mum's Still Anl fJ' 4 S tflialty Wi thout Portfolio P L Mar 83 I L N o -v-' S W hen CensorshiB Backfires Jan 76 Lenin and State Prizes Now You See Them Now You Don't May 79 Chapenk0tcA'h9peflko What Difference Does I t M-lte - 4 c P L 86-36 CRYPTOLOG Page 23 aCID 4019691 t A g6 L L 86-36 6 'n il in SlGINT R p ting ---- - 1 May 82 LetterH Ir-_ _ _ _ _ _ _ ml _n_t a ' inn nf Indi __ Nov 71 __ 1 Article -- I -O 'c-t-7 ' 9 --An 0 the r Source EO 1 4 c P L 86-36 Jan 80 Between The Lines of Your Performance Appraisal Dec 81 TIDE A Brief History Nov 74 Reflections on a Translator's ence Sep 8 A atter of Confer Deodi Style L - -- - -I Feb 82 A Time for Change Land i r o E Apr 77 Letter Mason Article LutwiniakW May 78 The Future of Cryptanalysis Jan 79 Letter From the Publisher ---- I L I Oct 78 Back to Square One Jan 81 Translator In Your Pocket L I I '-- 'S e p '74'T ' G o ld en Oldie King Eusyb and Queen I Lutwiniak w Jan 81 SIGINT In The 80s Two Views _ _----1 ---- ----- _1 Sep 82 Letter Kudos Nov 77 Language Processing Forum Feb 82 Native Scripting of Languages --- -Ap-r 8 0- -A T Sep 76 Semantic Voids Don't Shoot the Translator l i-i II Lasley D Jul 79 Gears of the Mouth li Nov 77 otjeCtiiVe Satisfaction Score Collection Performance l-I I Jul 77 Lettet I ticle 11 - - 1 Mason F O May 75 TA Handmaiden of CA Jun 75 More on Squaring the Page A CryptoTA Function Aug 75 Abdul and His 40 Tanks Oct 76 A Vexing Agency-Wide Problem Nov 76 Answer to 'Vexing ooo Problem' Jan 77 Where Were We Apr 82 Golden Oldie Tracks in the Sands of Time Dec 74 A Proposal for Calendar Reform Jun 77 Letter I I Jun 75 Professionalizing in Computer Systems ---II Letter I -- F -e' 'b-- '7 S 'Basic Patterns9 Mar 82 lut Life Is Supposed To Be Hard Sep 82 More Free Goodies Ciphers o Odes and EO I 4 c P L 86-36 Apr 77 Le tter o I_ _ ttrticle L - ----- - I Mar 79 Computer Operating System Vulnerabilities Mar 77 An Overview of Proj ect 1 --- J ' a-n 7 'S- T ' h-e Y ' 'a-w ln of the Computer Age or When Your Terminal is Terminal I I - Jf a n 'l7 5'8 B 'o d r y g uard of Lies' Book Review -- se p 7d6 Foreign Publications Procurement Program Mar 83 __ I - 'O-c-t- 79 T h-e 200P-Y ar bld Transcriber Apr 80 What To Dd About 'FANX' CRYPTOLOG SE6RE'f P L 86-36 Page 24 Ih II3 'H TJIt SQUINT SIh lNll '8 aUbY aCID 4019691 '-li' L Jun 76 Comments on the 86- 3 6 ---- -- _---- Oct 76 Language Skill AG 22 IATS McGri1lies J R Apr 77 Letter Mason Artide File 1 I --J u 1 7 9 Shootout at the SIGINT Corral II - AP r 7 9 Le t t er I Gurin Article Jul 77 Match Them Up Jul 77 Puzzle Match Them Up Nov 77 How Many African Countries Can You Spot Apr 78 Conoces BienIa Geografia Oct 78 Know your Geography Feb 79 Know Your Geography I Feb 79 1 Dec 76 The French fried Connection Gino the Genie _ I Jun 78 Celtic Languages Today Aug 75 Linguists -- We Need An 'Experts Yellow Pages' I - - - It May Jan Dec Jan Jan 78 79 81 82 82 Feb Feb Mar Apr May Jun Aug 82 82 82 82 82 82 82 Sep Sep Oct Nov 82 82 82 82 Callsigns and WARC-79 The Return to HF The 1981 DRSI XX General Assembly HF - The Rebirth Video Encryption A Report From EASCON 81 Gayler-AAAS 1982 Software - AAAS 1982 Meteorburst Communications Review The American Magic A History Lesson Amateur Spread Spectrum AFCEA 82 and ICC-82 New Crypto Devices Normandy 1944 SIGINT 1990 Part One SIGINT 1990 Part TWo SIGINT 1990 Part Three Mountjoy M Sep 74 Cryptanalysis and Code Recovery Jan 79 Golden Oldie On First Opening Kenney's 'Statistics' I I - N o v-76 - T EXTA 'Word Seek' Mar 78 Word Seek 1 l - ' ' s ' e-p-76 T I - P - S -iS Still Alive and Well Mar 79 Data Standards Without Tears A Comment Jan 82 Data Field Naming Coding Conventions at NSA Murphy A I Jan 76 Leo in October Jun 76 Lette ' 1 IArtiCle Jan 82 The Literary Bends MarSZLetter The Literary Bends Article EO 1 4 c 1 Meyer May Sep Dec Aug Nov --- J ' ul '7 7 - T ' o 0 1 Langua 6L W P 76 A Simple Cipher Story 76 Another Cipher by oo - 78 a k a Sam P L 86-36 82 I Remember 82 An Old Timer Is One Who Murphy T Oct 75 Automation of a TA Process Jun 76 The I Icollection System I I -- ' M-ay-7 5 L tier 1 letter Jan 77 What If t 'fi 'e L 'ln g 'u tsts Disappeared Jun 781 Feb 82 KRYPTOS A New Society Miller D E Aug 75 The Voynich Manuscript-Third Theory Nov 76 Golden Oldie The Things They Say Mar 78 An Idea for an Article May 79 Transcriber-Analyst Relations Miller K Isaac L Apr 78 Looking at Mr II -_ _ Literatu e I I Oct 75 Linguists -- You Have ---- I EO 1 4 c l1Y H tq%-36 ---- - I Nov 77 A Prapos ed Search On-Line I --s-e-p 7 '6-I s--- Ther e Life AfterCe I' t ifi cat iori Nov 76 Clarity Thy Name is Qualifier Feb 78 BY-Lines Don't Cost--They Pay Apr 78 Mar 79 Jan 80 Apr 81 KO 1 4 c P L an Expert to Call Nov 78 Never on I Feb 79 8 6- 3 6 86-36 Mar 83 CRYPTOLOG Cure for the Time-in-Grade Syndrome Accentuate the Negative Let's Not Lose Oui TA Skills There's a New World Coming - Are You Ready Middle-Age Spread P L Page 25 ILY U 86-36 VIA QBUHIT QII- t'rtRI13l S BUl Y r 4019691 L SEeRE 86-36 P L 86-36 1 1r---- 1 May 79 Project HELIPAD An Epitaph Apr 77 Letter L 1_ _ 1Article Nolte W M Mar 82 A Brief Treatise on Five Laws of Telephonic Communications Mar 82 Old Phone Books Never Die Nolte W MJ Jan 78 baLLy Remoting Oct 82 What's The Good Pass Word Phillips C J Mar 76 Musings About theAG-22IIATS Main A View of the Central Computer Complex in the Late 1970s and Early 1980s Apr 77 The Last Word on IATS May 77 Universes Galaxies Stars Bars and Other Concepts Apr 80 Data Flow--Challenge of the 1980s 1 fiSA Proposal for Satellite crun 76 Comments on the AG-22 IATS --- - - - 11 Oct 75 1972-1973 A Vietnam Odyssey I 1 O'N' eHI K Mar 76 Letter Proud and Bitter Memories Article Nov 82 COMSEC Challenges EO 1 4 c F L 86-36 1 F eb 75 Th e Faithful Echo--The Role of the State Department Interpreter O'Sul' ivan P A Juu 79 Letter 'Sixth Language' I--- I Mar 78 A Proposed 1 ----- -1 Mar 82 A Personal Computer A Current Cryptanalysis Support Tool Cure for the 'Performance 2 ------------ Syndrome' Sep 77 May 82 Burst Answer Oliver B Jan 75 The SIGINT Users' Handbook or What's an ISHTAR Apr 82 Partial Machine Translation F1Il l P L Report 1--- ----- 1 Aug 79 On Coming of Age at NSA Confessions of an Ex-Linguist 1 L --J u- 1 '75' R- AP IDTRAN I o 1 __ 1 Oct 75 Language Lessons Learned A Personal Memoir Mar 77 Letter Bunker Interview Sep 78 What's In a Non-Name Oct 82 Golden Oldie The Reality of Communic tions Changes I I Jun 76 Co ments Feb 78 on the AG-22 IATS TA is Not for ---- ' ' I May 79 Run This Co lection-Support EVeryone Oct 78 Continuing Professionalization Dec 82 Does Anybody Here Remember PURPLE The Seminar Through Your Transcription Machine I Bl d ding L - --- - -- Sep 77 86- 3 6 Oct 74 Character Republic ofCnina EO 1 4 c P L 8 6- 3 6 in the People's Program Aug 76 Yes Don There fs an ELINT Pattie M T May 76 What Language Problem Jun 78 As I Was Sayi TWo Years Ago ooo Oct 78 Letter 1 rticle Nov 78 Data Standards Center Feb 79 Letter I l rticle Dec 78 Feb 79 Well Maybe a Sniffle or Two ooo Jun 79 ooo Mr Pattie Replies Jun 76 Comments on the AG-22 IATS 1 --Ail r S A C 'ommChange at Ramasun Station Reiskis A Jun 79 The Baltic Encoders 1 L - S e-p 7 7 An 0 t her Last Word onIA TS Jan 81 KITTIWAKE Jun 82 Letter Editorial Comment Jun 82 Letter Shell Game Article P L Mar 83 CRYPTOLOG SBSRl3'f Page 26 Ih'dl i5E VII SQUINT SH6IUJE158 SUI511 86-36 aCID 4019691 ScienT Wp L 86- 3 6 I L -- 1 L - N 0-v 7 '5 'G -o 'lden Oldie l Hue Russian Dec 82 Shell Game PWB WHEN 1r l ltwiniakW I - 'Ja-n S I-S IGINT In The SOs Two Views JIm 80 LIP M-a-r 7-S-L-e-t-Jer' -- ----IArticle Santiago-Ortiz R A Aug 77 Telling It Like It Is Santiago-Ortiz R A tL J Aug 74 The Language of Beisbol in Everyday Talk EO 1 4 c P L 86-36 Apr 80 P16 Language and Cryptologic Library L ---- I Jun 76 Comments onithe AG-22 IATS Aug 74 Calling All SRAs - SRA Symposium L ----- - - ' Dec 81 In Pursuit of Faster Horses Younger Women Older Whiskey and More Money Dec 82 Shell Game AJSQUE Sep Sep Sep Sep Dec Jan Jul Dec Oc t Jul Mar Oct 1 - P i 74 74 74 74 74 7S 75 77 78 79 Sawyer E L Nov 78 WEDDING BELLS and That Old Gang of Mine Mar 79 Pursuit of thel 1 Dec 81 Sleep Well Your SDO Is On Duty AFRIKAANS--Language in the News AMERIND--Language in the News HEBREW--Language in the News Language in the News Language in the News The Case for COMINT Readers Too Many Garbles Feb 78 L I _ Jul 78 The Soviet General Staff P L 86-36 1 P u-z-z l-e- Wh o-a-n-a Wh-o-m 1 Letter CRYPTOLOG Art 821 82 Not Secret Anymore Feb 78 First Lady of Navy Cryptology I 1 - J u-n 7 6-An E v aluation of a Scientific Chinese Machine Translation Oct 77 Classification Corner A Bigger Picture Nov 78 Formatting PL I Source Code Jun 79 Teaching Computer Science To Linguists ----11 Santiago-Orti CR 4 c Aug 74 The Language of BeisJ jo in Bm etjday Talk Rosenblum H E 86 36 0ct 77 rs in the Exciting Future of L - ---- - I May 77 The Polyhedral War Dec 76 Graphic Names I L -- 1 4 c P L 86- 36 1 - Ju 'I 7 8 H 'as It Ever Been Translated Before Mar 76 To Pull a 'Ponyal' Nov Feb 7SII - _ 1 - - 1 EO 1 4 c P L 8 6- 3 6 _ Jan 79 T-Vision The Reference Analyst's Medium of the Future Salemme A J May 76 Scraps from the Editor's Desk Sep 76 Machine-Produced Aids for the Linguist Part I Oct 76 Machine-Produced Aids for the Linguist Part II Apr 77 Flash IISth SRI Located Aug 77 Expletives Deleted Jul 78 I Remember SPELLMAN Mar 79 NSA-Crostic No 23 Apr 80 LIME-A OHIO LEEM-A Peru -_I L - -- May 77 Plain English IL - - I Jul 77 Letter Subscription II - _o-c-t -7-6-L Jl tte Ir-----jArticle P L Mar 83 75C_ 86-36 CRYPTOLOG SHeRB1' EO 1 4 c P L 86-36 Page 27 Ih liBbB ViA SSIHllT S lMHlBbS SI Y oq EL 8e4Q19691 1 -- -- -- - - --1 Jul 79 Letter E61 4 c JUfiU791 Lingualtriv ia86 36 _ I O-c t 75 1 9 7 2 - 1 9 73 -A V i etnam Odyssey Apr L -- I Aug 82 Art Old Problem Smith F Mat 78 Some Background on the CiT Merger --- - I May 78 TA Implications Jun 76 'Right On Vera ' Snow D Sep 76 The Bible and the Washington Monument Oct 77 Human Factors and the Use of Microfiche Readers at NSA Oct 78 Reduction Ratios in Micrographics ---- ----- Jan 75 How CleanDoesaPata Jun 76 Jul 77 Jan 80 CIRe An Intelligence Data Base 1 -J u-n 8 2 L e-t ter Personal Computer Article Snyder S S Nov 77 Letter J I Article Feb 82 A Wail A Complaint and a Melange Jun 76 How Things Have Changed 1 -- Ap--r 7 5 Letter Exinterne Articles Aug 79 letter Buckley Dec 77 Jun Dec Aug Sep Nov Jan Jul 76 76 77 77 77 78 78 andD j 1 79 Notes on Translation from the Chinese What's In a Name Postscript to 'Dating Game' JPRS Language Reference Aids Backing intb Language Acquisition COMINT COMSEC and Hilbere s Tenth Tell Me I'm ust a Sinobibliophobe Dec 7S A Ivu of FCC Proposal Aug Sep Oct Nov Nov Jan Jan Mar Apr Sep 77 77 77 77 77 78 78 78 78 781 Nov Mar Apt Jun Aug Aug Apr Dec Apr May Jun Aug Oct 78 79 79 79 79 79 80 81 82 82 82 82 82 Base Need to Be Comments on theAG 22 IATS CAA News What Ever Happened to the CAA CAA News What Are They Uptb Ariyway CAA News Whom CAA News A Little TA Problem CAA News Letter I---- I Aiticle What Ever Happened to COPES The Hand Is No Quicker Than the Eye Telephone Problem Here A- S m a I I P r-o b l-e-m------- - ---' Letter Data Standards 1 4 A Somewhat Larger probl m 86- 6 Traffic Analysis of the FU ure CAA News Letter Screening Radiation A Traffic Analyst Looks at Computers TEXTA What Is It Where Is It Going Shell Game True Base Two Tales APersQnal Footnote EO 1 4 c Shell Game P L 86-36 Answer An Old Problem EO 1 Jun 17 Letter c JArticle May 79 Where Do Good Transcribers Come From I Aug 75 t'rocessingl Communications I EO 1 4 c Feb 75 Replacement of the GUPPY EiJkar l6- 3 6 Tour through the Attic of NSO C I -- 'N -o-v 8 1- Th -e PPC Is Coming Mar 82 Towards 6etter System Development I L --_ _ Aug 79 Letter 1 _ - II Let ter Aug 79 Oct 79 I -- J-u-n-- 7 l 7-- -L ett e r Ma so n Ar tid e P L 86-36 Mar 83 Tetrault Oct 74 Feb 75 Apr 75 Apr 75 CRYPTOLOG Lett r DArtic1e Aug 79 E W Even a 5-year-old Child ooo Letter Exinterne Articles Language in the News Machine Course for Linguists Page 28 mJ K TJL SQUiNT SUt NlIKJ S QUJ ' 86-36 aCID 4019691 SIS6R13'P 'p L 8 6 - 3 6 Jun 75 Where Does 'Does' Come Fro ll Aug 76 Research in Speech Pj Tception Dr Ruth Day Apr 77 Letter '' '1'--- ''''tetter Feb 79 In Defense of The Indefensible Notes on the R ussian PQ E Nov 74 EO 1 4 c P t 86-36 How to Write Technical Manuals Without Actually Giving Anything Away May 77 Choose Ye Jul 77 ZBB What In the World Is That Oct 78 Will It Really Do the Job Guidesmanship -or Oct 75 Computers Comms Ciphers 1 andLow-G ade lL -_ ----l - ----I Oct 78 Data Apr 75 Oral Reporting A New Challenge for NSA W E S Jan 78 CAA News Feb 78 CAA News Mar 78 C' N 't 86-36 Apr JaCAA News M y 78 CAA News Jun 78 CAANews Jul 78 CAANews EO 1 4 c Sep 78 CAANews P L 86-36 Oct 78 CAANews Nov 78 CM News Dec 82 Shell Game Counter Jan 75 UNNA 11 - Aug 75 A Fix for the Language Problem F L -- Ju-I '7 '5 'T -'he Warsaw Pactl 1 Tiltman J H EO 1 4 c Dec 75 A Personal Comment on Winterbotham's 86- 3 6 'The ULTRA Secret' Apr 80 I _- Oct 78L 1 Security and Human Error --- --- - - --- - ' Oct 82 Leadership A Personal Philosophy P L Webster J B Sep 74 Project CARRIAGE Worldwide HFDF Modernization Plan EO 1 4 c P L 86-36 Tinsley R L Apr 78 ATA Letter to President Carter L I_ _ _ Jun 77 AG-22 IATS A View From the Bridge Tiren D J Mar 82 Letter A Toy Problem I I - Ju-n- -76 -- Tran sl iteration or Oct 74 Letter c JArticle Dec 75 What Are We About Fragments Figments or What I Letter Apr 76 Letter COlIlmel1l SonlL May 76 SgmePr-tnciples of Cover and Deception Apr 77 The 'Ice Age' and International Security Sep 77 Whither the SRA Nov 78 Cast a Double Shadow The Trojan Horse of SIGINT Jul 79 Naval Readiness A Basis for Comparison Cyrillic Feb 75 Review of Gui iet Russian TechnJ cal Translation' by Sale ll e May 76 A Soviet View of NSA P L 86- 3 6 Aug 79 Language Proficiency Certificates for Military Personnel 1 - M a-y-- 75 - 'Letter 1 ILetter I Mar 771 Jul Jan Jun Apr Apr 77 Bookbreakers Forum 781 78 B 'o-o 'k 'b-r-e-a' 'k-e-r-s-- 'Fo-r-u-m-- ao ooo And In A More Modern Vein 82 Bookbreakers Forum On Machine Aids Aug 79 CMI News P L Mar 83 Jut 79 EXPlRT Wiley E Oct 75 The Do Xa Pads Jan 82 Letter Stairwell Society Article 86-36 EO 1 4 c P L 86-36 Wigglesworth D Dec 77 Conversation With a Micrographics Pioneer CRYPTOLOG S136R13'P Page 29 Ih'dIBh13 ' IA 6eU1N'P 6II MIU ts 6NtI 8 6- 4019691 SEEiRE ' 86-36 Williams Dec 75 Jul 77 Sep 77 Jan 78 Apr 78 Jul 78 Sep 78 Oct 78 Nov 78 Dec 78 Jan 79 Feb 79 D H The Great Soviet Shipbuilding Mystery Dating Game NSA-Crostic No 9 NSA-Crostic No 11 NSA-Crostic No 13 NSA-Crostic No 16 Letter Salemme Article NSA-Crostic No 18 NSA-Crostic No 19 NSA-Crostic No 20 stic No 21 L- jandaLittle Bit of Luck EO 1 4 c P L 86-36 _ _I Oct 81 Technical Support Catalogs I May 78 Project UTENSIL The DDO Data Dictionary Directory Wolff H E Aug 74 Cryptolog A Letter of Introduction 1 L -- Au --g '8 2 Al 1 I Ever Wanted To Know About DES Tex L t 6Not L --AU g 4 'R lght-to-Left Impossible Feb 75 Letter Citizens of Feb 79 P s orld Puzzle --- ----- -_---- - 11 Nov 77 Language Processing Forum Feb 82 Native Scripting of Languages Jan 80 Analysts of NSA Arise STUDENTS ' II U On 29 November 1982 NCEUR announced its Independent Study Program as a way to facilitate the enrollment in and completion of National Cryptologic School NCS independent courses for cryptologic personnel in Germany This is to cut the lag in mailing time between the NCS and sites in Germany The NCEUR Training Office will also issue NCS Course Completion Certificates to individuals who satisfactorily complete an Independent study course obtained from NCEUR U PAC-II is a project planning and control system developed by International Systems Inc PAC-II was designated the Agency standard automated project management system by memorandum DDPR 006 81 and is intended to help Agency project leaders with planning scheduling resource allocation budget tracking task assignment over under projections etc PAC-II allows inter-task dependencies and includes extensive facilities for playing What if The sys tem includes as-year scheduling capability and provides for tailoring the defaults to specific work schedules holiday patterns skill mixes etc More than 40 standard reports Gantt charts budget summaries projected completions etc are available There is no Agency software development involved in PAC-II U Also available from NCEUR will be Russian and Czech videotapes to support language refresher and development training as well as videotapes on equipment maintenance operations collecions management security etc Mar 83 CRYPTOLOG Page 30 li wgl i HI' 'QMHlr 'II UlBl5S 811M' aCID 4019691 aFF 8 2 FaR 1 9 6SE 6Mbr o o o o o o o o o 2 4 3 7 6 8 10 o o o o o o o o ooo o o o o oo o o o o o oo o o o o oo oo o o o o ooo o o o o oo o o o o o o o o o o CRYPTI C CROSSWORD #3 11 byl_ _ 1 13 12 14 15 17 19 P L S 20 21 86-36 16 18 22 23 24 26 2S 27 o 28 29 DOWN ACROSS 1 Smelly end of Tylenol production plant 9 1 Children averse to March April and May 9 2 Counterfeit following valley 5 6 Dad gets directions for the chess pieces 5 9 Foul ram demolishes baby food 7 3 Telephoned Reagan we hear to make pot 8 10 Little Miss Fabray eager for Chinese material 7 4 Topless new developments bring forth 11 To sample a delicacy has inner 5 Roy is scuffling with Ned over there 6 appeal 5 12 Dreamers' series of mental impres- sions 9 13 I bounced wildly then became frozen in place 8 applause and more applause 8 6 It's pleasant without 80 mixed-up discussion groups 6 7 We sent hot mixture to the grinder 9 8 Goes under the basins 5 IS Frantic Omani prince shows lack of consciousness 4 19 Cozy retreat for shooters 4 20 We heard you teamed up with insane printer to be lewd 8 23 Do some Irishmen nickname ships 9 24 In back half dancer is comparatively more fastidious 5 Motley captures backward German city 9 16 Stars take chances on seat collapsing 9 17 Snacks center for the new students 8 18 Conveying the band into Crosby 8 21 The most sage is found in states beyond the Rockies 6 26 The obvious ten dive over 7 27 Loose ends trail behind I am returning for young ladies 7 28 Finger that one 5 29 Traitors see danger all around 9 Mar 83 14 Becoming more dignified Neil G 22 The dog is in the Somerset terminal 6 23 Five hundred perused A Great Anxiety 5 24 Doctrine of Celsius' grass 5 CRYPTOLOG Page 31 Fell 8FFIS At l JflE eULr aCID 4019691 F6R 6FFI8I YSE QNbJPY You may have thought that some of your coworkers behaved like beings from another planet and there may very well be some extra-terrestrials among us As a matter of fact the new edition of the Agency telephone directory lists 25 ETs on the NSA payroll Of these 25 ETs 22 are civilian 14 men B women and 3 are in the military 2 in the Army l i n the Navy It should be pointed out that 23 of the 25 aren't really 100% ETs since they have middle initials and three of them have Jr tacked on to the end of their names but there are two persons listed with pure E T initials P L 86- I However liS on afield assignment s6 I lof Q4 is the only real E T in the NSA Headquarters complex That's quite an honor and we congratulate him We just hope that now that this item is appearing in Cryptolog he doesn't get a spate of notes on his desk s aylng E T phone home Cheers '--_ _ IP14 working in BIll x574ls P L 86-36 Mar 83 EO 1 4 c P L 86-36 CRYPTOLOG Page FeK OPFlelAt 53 6Nt 32 aCID 4019691 SrJeRrJ'l ' SIGINT 1 4 c P L 86-36 by P L w 86-36 Mar 83 CRYPTOLOG Sl iQIUiT Page 33 EO 1 4 c P L 86-36 IMMQIsE VIA SQUInT 8IWRIJ3 bS SUbY aCID 4019691 8Eie 'f L E c P 86-36 Mar 83 CRYPTOLOG Page SESIU T 34 EO 1 4 c EO 1 4 d P L 86-36 llMiB15E VI SQUINT Slh'tfRfE15S 8lftl'l 4019691 IZQR QIZIZH r Yo He'S QUr y MORE ON PASSWORDS UJ by 1 n have received a number of interesting responses to my comments on this topic in the December 1982 issue of CRYPTOLOG I t is apparent from the thoughtful and detailed comments of Computer Security professionals that they take this issue serious ly and see an urgent need to respond to user needs But where are the spokesmen for the uselO side The folks 1 n Computer Security seem very ready for construe t ive user input but they can I t operate in a vacuum Without ideas and yes maybe a bit of pressure from users they will naturally continue to put efficiency and ease of implementation first and who can blame them Too many users tend to regard passwords and access restrictions as an act of God kind of like a bad cold that just happens to us and that we can I t have anything to say about Yes we will always have to have some restrictions but the WAY THEY ARE IMPLEMENTED AND IMPOSED can be influenced by informed and constructive user input We have a great variety of systems and they make use of a number of different methods to protect files and programs from unauthorized access As you can see in the contributions below from various readers each applies only to certain limited cases It seems as if we need to take a closer look at computer systems throughout the Agency and study the kinds of passwords identity checks physical access restrictions etc that they employ to preserve security and look particularly at the impact each restriction or class of related restrictions has on the user Maybe this has been done already it would make a very good professionalization paper If any reader knows of a study of this sort a survey Mar 83 ----lr13uuuuuuuuuuuuuuuuuuuuuuuuu P o L of all or some subset of file protection techniques and their impact on users please let me know How many different sets of rules have we just for compos ing passwords for example I bet there are nearly as many different sets of rules as there are software systems at least operating systems How can we find out which of these burden users the least while still providing the requisite security Some of the comments below suggest specific changes in the form of passwords e g the use of long phrases instead of single words Unfortunately we have no real way to dec ide whether these changes will in fact improve matters for users Like so much else about human factors this is an area where we need a lot more hard data Intuitive guesses on the part of programmers are surprisingly often far o ff the mark when it comes to imagining what is easy or hard for end-users to do or remember because programmers have had to and have chosen to develop a special cast of mind that sets them apart from non-programmers Let's hear from some more users out there What do YOU think of these ideas the Computer Security people aloe proposing Do you have some ideas or experience that can throw some more light on the subject HORROR STORY I loved your comments on passwords I will pass along my horror story that resulted from uggestions Being a good securl ty consc1 ou s person I promptly I CRYPTOLOG Page FeR eFFIElL'd HeE ElffbJPY I 35 P L 86-36 aCID 4019691 feR effI8Vm ass eu'C'I The four bits of a unit give Delete Execute Write or Read privileges when zero they deny the same when one The four units relate to the system the user who created the file the group a limited number of users and the world all legitimate users who are not members of the user's group In this way control is maintained over who may do what with the data in any specific file changed my password to one more complicated It was a good one that would baffle any vicious attempt at penetration All went well until the next time I tried to do some work at the terminal It was late in the day and I had to wake up the Delta Data Every time I tried to login it refused to recognize me said my password was not correct and threatened Gestapo action even called me 'naughty' - that made me mad To abbreviate this long story my PWB Programmers Workbench system will not accept passwords with numeric or special characters in 'load' mode So I went back to my comfortable vulnerable old alpha style password The system and I are friends again In the case B to which your article mainly seems to address itself it is pointed out that an jncrease of security in the signon and passwords procedure seems to require an equal increase in legitimate users' inconvenience One simple change that would increase security but not inconvenience would be to eliminate the use of initials in sign-on procedures An illegitimate user or 'spook' who wanted access to your files would probably sign on as MDI with a good chance of success at least on one system and only then would have to consider some procedure for generating possible passwords via the computer itself If the sign-on is ITSELF a password the recovery of someone else's sign-on could not easily be done as each sign-on trial would need to be typed in until the spook could find one accepted by the computer Thus pas sword firs t then init ials would be more secure than the present initials plus password process and password I then password 2 would be still better Indeed anyone could make this change right now if the system being used has no restrictions on the length of the sign-on or the password But establishment of a specific policy excluding use of initials would be desirable L SOME THOUGHTS Use of computers may involve two distinct types of security problem A Protection from legit imate users of the system whose access to certain data is to be restricted B Protection from illegitimate users of the system who endeavor to gain access to certain data by the use of an identity sign-on and password that is not theirs In the case of A a procedure with which I am familiar calls for a system protection word to be associated with each created file This word contains four units of four bits each Mar 83 CRYPTOLOG Page 36 FaR 8PPI8IAb HSS SUbY 86- aCID 4019691 FeR eFFISIA 9S6 en ' IT'S MORE FUN WITH PASSCODES OR SQUASHING ENCOURAGING CREATIVITY I enjoyed your article about passwords and agree that creative passwords can SOMETIMES be so hard to remember that you have to write them down Then you have less security than you WOULD have had with a more memorable password However with a bit of creat1v1ty and a lot of inspiration from your al ticle I was able to conjure up a password that was at the same time memorable AND a scrambled mess of lowercase uppercase numbers and symbols It was actually FUN to make a clever password A sufficiently clever systems programmer could of course dig out any information residing in the system including protection bits and passwords but measures against such a type of snooping will have to be taken up for discussion at another time I am limiting mysel f for the present to the topic raised in your article P L 86 '36 This comment highlights two of the different points in the user dialog with a system where access restrictions come into play i e 1 login or sign-on 2 file access Additional possibilities are 3 access to data base management or other applications packages 4 access to operating system or file system mechan isms e g superuser passwords on UNIX systems 5 access to related groups of files e g M204 file gt OUP passwords From a human factors point of view the context within an on-going user dialog with the system is also important how many steps has the user already had to go through before he must give this password How complex have previous steps been How many more steps must he go through and how complex are they before he can begin work How often must he go through all the steps in a working day How fast or slow is the system response between each step of his login and access to resources It would be a mistake to look at a single frame of the dialog in isolation and consider only the system's prompt for a password and the user's response without looking at the surrounding context -MED Mar 83 Now I find that the c ftp program used to transfer data from one machine to another will not function if a password contains either CAPITAL letters or punctuation marks Not fun Rather than remain frustrated I picked a less clever password again Isn't it bad psychology to squash a user's efforts like that We need to think about some programming standards here cftp can probably be modified to accept fancier passwords For that matter passwd the UNIX program for setting a new password can probably be modified to reject passwords that are all lower case or all upper case or to reject passwords that contain NO letters or symbols Finally a weird idea that just MIGHT encourage creation of undecipherable passwords Try this the next time someone knocks at your front door Don't open it Yell out What's the password Chances are your V1s1tor will try common words apple banana cranberry When your NEXT visitor arrives cry out What's the code Perk up your ears 'cause he's going to try things like murffle-87Z 78rpm and DAH-d i-DAH-d it This should tell us something Ask a person for a PASSWORD and you get a WORD Ask him for a CODE for a PASSCODE for an ACCESS CODE and he stops to think of something unusual and enjoys doing it On UNIX the word password would have to be replaced at login and in the passwd program and 1n a few other utilities CRYPTOLOG P L Page 37 FQR QFFHJH 9S6 eUrrY 86-36 aCID 4019691 FeR eFFleh'm ll'SEi eUbY I UPDATE FROM HUMAN FACTORS OF PASSWORDS I captured The security officer will reVl ew captured passwords to see if a user needs counseling on password choices P L A SAD Dilemma The recent remarks on Good Pass Words vs User Friendliness deserve some comment The firs t full sentence on page 8 says that 'our lives are a lot easier if our password is 1 short 2 easy to type and 3 easy to remember This order should be reversed The password must be easy to remember If you cannot remember it you cannot type it easily or otherwise The comments about the difficulty of remembering VKJRD and like values are COl-rect Passwords made up of large alphabets are called for in situations where the password is limited in length Short passwords are common in computer systems that store unencrypted passwords If a password is to have any strength it must be of sufficient length or be made up of choices from a big alphabet Currently work on a new login for UNIX is underway The specifications are The password will be 8 or more characters up to a maximum of 40 characters Of all the characters six or more will be unique The central distribution of passwords that are difficult or impossible to pl-onounce or remember is unacceptab Ie I agree that the pass phrase should be as usable as possible consistent with the need for protection There is a human factors element to a well designed and properly functioning password system which deserves some comment The password authenticates the user to the system It prevents anyone else from masquerading as the user It protects the work of the user from damage It prevents anonymous use of the computer This encourages all users to be responsible citizens in the community of computer use There are al ternat i ves to passwords but they are worse Each individual has a unique pattern of blood vessels on the retina visible through the lens of the eye The pat tern could be used as an identifier But how could the identifier be forwarded over the telephone to a trusted fellow employee Emergencies do arise If a password is remembered it is easy to type I doubt that a non-typist will use a terminal very long As for passwords should be short sorry about that they must be long enough to be secure _______1 29 These spec ificat ions phrases such as will permi t December 1-982 pass Low flying bees eat wax beans P L A RESPONSE FROM THE COMPUTER SECURITY CENTER I own cherry trees and crab grass GOOD PASS WORDS VS HUMAN FRIENDLINESS If the user can accept using phrases then sufficient strength can be obtained by using sufficient length for the pass phrases This scheme does not increase the demand for computer storage if the pass phrase is encrypted and collapsed into 11 bytes regardless of length The user I s selection of the pass phrase will be inspected only at time of creating when passwords are changed to see that the password is 8 or more characters long with six unique Because a user could choose abcdefg as a password or could switch back to a previously used password the old password will be Mar 83 I Reference your al-ticle 2 As a regular user of computing systems I share your concern that password systems be user friendly Wearing my other hat as Chief of Standards and Commercial Products Evaluation at the 000 Computer Security Evaluation Center I am quite concerned that passwords be chosen and used in as secure a fashion as possible 3 An approach to the dilemma between user friendly passwords and secure passwords is to CRYPTOLOG Page 38 Feft eFFISIAb QS6 euJoY 86-36 4019691 Felt eFFIe I8 f l JSE elft f P L s top focus ing on the word WORD in PassWORD There is no real reason why the authentication sequence for a computer log-on could not be a PHRASE - one typed in lower case letters with embedded blanks if one chooses This suggestion opens new realms for passphrases which are easy to remember easy to type plus long enough to be not practically attackable by simple analysis means Any source of written material at hand provides candidate passphrases which are far more secure than one's initials name spelled backwards license plate number radio amateur callsign wife's name project name etc which appear frequently in the set of user chosen passwords in use today Phrases like 'ordered bifocal glasses' 'simple analysis effort' or 'do we need to depend' all suggest themselves as passphrases from your recent Technical Notes Real security in pass phrases or passwords comes from being chosen at random from a large set of possibilities The phrases such as 'including the electrons' 'larger than a gimlet' 'around which cable' or 'outspoken plain and blunt' were all drawn from the dictionary on my desk 4 We who work in computer security realize that the user of the sys tem is the real key to system security The user's needs must be taken into account when security measures are devised and put into place There is real room for creative thinking in the area of meet ing users' needs and maintaining and improving computer system security Let's break out of the past shallow thinking use passphrases ins tead 0 f passwords and apply our talents to making things better for everyone '--- 86-36 fac tors lssues while pursuing this goal I t Excerpted from COMPSECNEWS January 1983 CENTRALLY-ASSIGNED PASSWORDS Some years ago I identified what I consider a near-perfect trade-off between security and convenience with respect to the assignment of passwords At that time the CESSO was assigning new passwords to the users of their facility The principal mechanism was a program which could effortlessly generate 8-character alphanumeric passwords in an approved fashion The CESSO's plan was to run off a sheet of several hundred passwords and then arbitrarily assign one to each customer Noting that the password assigned to me was onerous I asked for a sheet of 1000 passwords from which I could choose a better one While the CESSO acceded to my wishes for myself and my team members there was unwilI ingness to make this a standard practice There were a number of objections most of wh ich I could not appreciate one be ing that it would be wasteful to run off 1000 passwords and 'waste' 999 Nevertheless each of us found within our own list of 1000 potential passwords some string that was 'personally memorable' and did not need jotting down--despite being random and for all intents and purposes meaningless 1 4 January 1983 MORE ABOUT PASSWORDS AND HUMAN FACTORS We have a rebuttal I Ihas published a rebuttal to an artlcIe about the password compromise that appeared in the October issue of CRYPTOLOG It seems that Mary thinks that passwords that are long use upper and lower case are selected from a large alphabet special characters punctuation etc are a pain in the human factors neck Mary's point of view is that passwords are just one more obstacle between the user and the computer Mary states that life is a lot eas ier if our passwords are 1 short 2 easy to type and 3 easy to remember Hmmmm seems to be a confl ict of interes t here There is no ques tion that we must use passwords that are reasonably secure Admittedly however we cannot ignore the human Mar 83 Passwords are a fact of life but their burden can be lightened significantly without compromising security My experience--and I suspect yours as well--has taught me that the cost and complexity of user convenience is often less than it first appears the payoff whether large or $ mall is often longlasting CRYPTOLOG 1 9 February 1983 P L Page 39 86-36 aCID 4019691 FeR eFFler tm HS13 euw f you have not traveled on TDY Temporary DutY late ly or if you -are now conte lating your first TDY assignment there are many facts that you should know and actions that you should take Knowing what to do and doing it in time can prevent unpleasant surprises hassles snafus and disappointments The key factors are time and your personal attention Do not assume that Admin or Management --or somebody--will handle everything in good time while you just wait to be told what to do You may have to do it yourself Here are things you should know 9 Rules and Regulations to the commands and installations you will be vis it ing M62 needs at least 30 days and preferably 45 to do its part the field activity you are visiting may need as long as 30 days for the paperwork in preparing for your visit M62 will select the best bookings within the range of allowable options including when available Category Z which is a class of services quoted by certain airlines for government use If you have complications such as traveling with your spouse or taking annual leave in conjunction with TDY discuss this with your M62 representative so that she can make the most favorable arrangements and suggest how best to take advantage of whatever airline bargain gimmicks may be in force at the time Advance Preparations for Arrival You probably have better things to do with your TDY preparation time than to study TDY rules and regulations but you should know that you can find them in the Personnel Management Manual NSA CSSPMM Part VII--Series 700 Travel Regulations For general assistance your key component has a central travel activity and the Travel Management and Support Branch M62 will answer all your travel questions Ask them If you are sending equipment briefing notes or anything else you will need when you get there make sure you allow enough time Check the Armed Forces Courier System ARFCOS schedules Make sure you get back the Receipt for Transmittal Form A1295 which is attached to packages for shipment Travel Arrangements Nothing can happen before M62 receives a copy of your planning message This is a message prepared accord ing to a prearranged format by your home element announcing your itinerary schedule mission and clearances Mar 83 Keep handy the names and telephone numbers home and office of your points of contact If you are to be met be sure that your time and place of arrival are known Messages don't always get through so make some contact yourself OPSCOMM phone call letter-whatever you can You may find yourself alone in a foreign country where you don 't CRYPTOLOG Page 40 FeR eFFISIAJ HSB eNhY 4019691 speak the language with a pile of luggage to look after You must be ready to cope with a situation like this If you are not to be met then be sure you know how to get from the airport to your destination which may be many miles away What modes of transport are available Taxi Limousine Bus Train Some combination of these If you are arriving at night or on a Sunday are they running then Passport Probably you already have a passport This is not good enough You need an official passport because you will be traveling on government orders Go to M624 and apply for it as soon as possible Your passport number should be included in your TDY planning message or a later message This will assist you in on-base processing at locations where responsibility for security is shared by the United States and the host country When you return your official passport will be taken away from you and filed for possible future use Even though it is not in your possession don't let your passport lapse We ior6ot to hoVe o v ep tprol oGCJlu bs l ifiloh tnove4 Shots For some destinations shots come in series so find out how much lead time you wi 11 need to have them--and to recover from having them if shots bother you You don 't want to go chasing around airports with a sore arm Depending on where you are going you might assume that you don I t need shots--and you might be wrong You will be traveling on an official passport and additional rules apply The Medical Center M7 will know the answers and give you the proper shots Travelers' Checks Buy your travelers checks in good time to avoid being rushed at the last minute There may be restrictions depending on where you are going Ask your travel representative Money When you finally pick up your orders--and this can happen at a panic-stricken last minute --you will be presented with a large sum a f cash This is your trave I advance This could happen on a holiday Saturday or Sunday or in the evening when you would have no way of safely stashing it in the bank Be prepared to deal with this possibility 1n whatever way suits you best You may have it held for you if you wish Wil tlC 1l lA S P L When you change money from one currency to another note the exchange rate and copy it down Rates change from day to day Be sure to have small change in the foreign currency with you when you arrive You may need it for tips snacks telephone calls or toilets l 86-36 Accommodations Will you be staying at a hotel In the BOQ In base housing Will transportation be available or will you have to get to your destination from a distant hotel every day in a hired car Ask You need to know If you know you will 'be driving a rental car in a foreign country determine in advance what the res tr ic t ions are You may need a local or international driver's license $10 00 at AAA offices And be sure you know which car rental company holds your booking Mar 83 CRYPTOLOG Page 41 FBR BFFISIAb gSE BHbY aCID 4019691 Records The Assignment When you leave you will receive your tickets travel orders Form DD1610 in multiple copies and travel voucher F01 DD1351-2 with carbon copies An examination of the travel voucher form will convince you that you will need to keep records of all your expenses Do this as you go along You will have enough to do when traveling just to keep track of today never mind trying to remember which meals you paid for or what taxi rides you took yesterday Now with all the preliminaries disposed of you're off You will almost certainly find your TDY interesting and rewarding well worth all the initial and subsequent bother which with a lot of attention and a little luck can be held to a tolerable m n mum If you cannot get quarters on a military base make sure that you get a statement of nonavailability from the base billeting office Without it you may have to pay for off-base quarters yourself Be careful not to lose any tickets bills or receipts If you get a chance have them copied and send the copies home When you get back you will have to turn in your completed fonns with all your documentation Have a good trip I Author's note My thanks to I I lof M62 for her advice as well as to friends n PI and my E41 colleagues Ifor their suggesI tions Brian has a las t word Take a good book and maintain your sense of humor P L Security Briefing For overseas travel you will need a briefing on security Find out when these briefings are scheduled well enough in advance so that you can attend on a day convenient for you You will be busy in the days just before you leave so do what you can ahead of time Travelers' Guides The State Department the US Customs Service and other organizations publish brochures and pamphlets with tips for travelers When you pick these up take a look at the publicat ion dates Rules change Make sure that the advice you are getting is current Trip Report When expected advance will be about it you get back you will probably be to write a trip report Find out in the type and amount of detai 1 that wanted so that you can be thinking and making notes Mar 83 CRYPTOLOG Page 42 86-36 DOCID 4019691 L 86-36 w e have all heard the old saying Everyone talks about the weather but no one does anything about it Yet hardly a day goes by that each of us does not watch or listen to a weather report on telev ision or radio Regardless of whether or not we believe the forecast we all tend to make plans accordingly Just as weather forecasts tend to influence our personal activities so the same types of weather information influence military commanders in planning their operations This dependence on weather support by the armed services can yield unexpected intelligence information and indeed is used daily I I bv Ag n'v we b analv' I The progress of scientific knowledge and modern technology continues to call attention to the critical need for all-source environmental information from potential enemy nations This data is required to more accurately assess a nation's success in developing deploying and operating new weapons systems and to study the influence of a nation's weather on the capabilities disposition and mobility of friendly or unfriendly military forces Mar 83 CRYPTOLOG Page 43 SE8RB'P EO 1 4 c P L 86-36 I1AUB156 VIA SellIN 6IWrllIlE15S SNM aCID 4019691 8 eRE'GBP EO 1 4 c P L 86-36 Mar 83 CRYPTOLOG SESFH3'GBP Page 44 I1MIBU YIA SeUHIT SIMllflEbS 811M' DOCID S6SR6'1' 4019691 Mar 83 CRYPTOLOG Page 4S EO 1 4 c P L 86-36 PI-Jul 83-83-30845 SEiSR6'f II YU '1M SQUHI'I' SIh'iHll l15S Qfl15Y This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu