P L 86-36 P16 IJtDUVLDUJtDl1 --- ---r----- U0liJU 15f lDWVU GBPDlB $W 15 DliJ 15 OO15 15 v OO U1 l1 DGJlD IBrn IYU JI1 Jrn DfJruDf1 tJ0 J 1 4 c P L 86-36 UIS USER INTERFACE SYSTEM U PART ONE CONCEPT U ooooooooooooooooooooo o oo J l ooooooooo 1 PART TWO ARCHITECTURE U ooooooooooooooo oio o o p 11 CUMULATIVE INDEX PART TWO TITLES U ooooooooooooooooooooooooooooooooooooo 19 GOVERNMENT OF THE PEOPLE BY THE PARTY FOR THE LEADERSHIP U ooooooooooooooooooooooo SPECIFYING COLORS FOR COMPUTER GRAPHICS U oooo 1-------- 1 k I------ --------- '-- ---------' NSA IN THE SPACE AGE U ----------r ------- MY STAFF--IT COMFORTS ME U oooooooooooooooooooo Zebulon Zilch' WORD PEOPLE AT NSA U oooooooooooooooooooooooooo 'Dickson Airy' NSA-CROSTIC NO 46 U oooooooooooooooooooooooooo David H Williams ooo o oooo 55 o oooo 59 fillS BOCl lMErif CONfAfNS COBEY ORB MAfBRIAI -top SECRET eclassified and A OtkSSIFIEB BY nSA essu 123 2 BEGI dtSSIFY ON OrigtnaHng roved for Release b NSA on 10-12-2012 ursuant to E o 13526 MDR Case # 5477 aCID 4019695 Published by PI Techniques and Standards VOL X No 4 APRIL 1983 PUBLISHER BOARD OF EDITORS Editor ooooooooo Asst Editor r-Production 1 968-8322s -I1 963-1103 S 963-33698 cOllection ooooooo Cryptolinguistics 1 963-39 61S 963-11035 Information s c e pce r L 963-5711s Machine support -'-'-'-'-'4F Ll 963- 4953S Mathematics ooooo o1 968 85188 Puzzles oooooooooo David H William 963 1103s Special Research Vera R Filb 968-7119s I For subscriptions J send name and organizalion r to CRYPTOLOG PI or calli 196 f-3369s P L 86-36 To submit articles or letters via PLATFORM mail send to cryptolg at barlc05 bar-one-c-zero-five note no '0' in 'log' Contents of Cryptolog should not be reproduced or further disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduc tion and dissemination should be directed to the Editor Editorial The other day we saw a phrase that we haven't seen for a while paperless office It was a popular term a while back and was sometimes called the paperless society It was used to refer to that future day when all paper would be replaced by some other media such as cathode ray tubes TV or other display devices Just to see if something was happening that we hadn't heard about we took a stroll through the local supply room The shelves were still filled with paper supplies and wi th things that make marks on paper Looseleaf notebooks seem to disappear from the shelves as fast as the supply folks can stock them One can still hear serious debate about which brand of white out does the best job Erasers paper clips rulers IN and OUT baskets sheets of press-on letters scissors ooo the list goes on and on Paper does not seem to be on the way out just yet Not around here anyway There is a growing sentiment that we will never reach that paperless state It is not after all a question of technology In a recent survey of computer editing systems the authors finished with the somewhat guilty admission that in the preparation of their report they had consumed just under a mile of paper We have no statistics to support it but we have the distinct impression that we are using more paper per capita not less New technology does not have to replace the old it sometimes finds its niche alongside the old Office automation seems to be aimed at getting machines to write down on paper what used to be written down by some other method on paper Some people think office automation will use more paper not less The next time you wander through your favorite supply room take a close look at the tiers of forms arrayed there Do you think they will ever go away I 4019695 SECK P L 86-36 by ' r _ 1 T4 4 andl'T44SA USER INTERFACE SYSTEM 1ART ONE CONCEPT by II f P L he National Security Agency Scientific Advisory Board just published j a Report on Networking Architecture which should be of special interest - iQUO to you if you are a user of terminals and computers It recommends that we develop an architecture which makes it possible to put effective access to data and computing within reach of every analyst who can use it I would broaden that to include programmers managers technical staffs and the hundreds--perhaps thousands--of people who deal with finance training travel supply and other essential support services both here and 1n the field U1S Users' Interface System is that architecture and the subject of this talk P6lffi - It seems to me that there are at least three questions worth asking about UIS Firat what is U1S In many respects this is the easiest question to answer and we will do that in the next hour Second Why should you care about something called U1S anyway The answer is you shouldn't if you work in total isolation and don't have anything to do with what most of the Agency does If however you--like most of us--have some part in the total information flow from collector to customer and believe--as 1 do--that there is still room for improvement in how you as a user access handle and process the information you deal with then you have a vital interest in U15 Apr 83 A joint paper presented at 1982 Meeting of CISI J the 86-36 October Third what's a UIS good for A couple of years ago we went allover the Agency and asked people what they thought they needed to do their job better or make their job easier This is what UIS is all about and we will be talking much more about that both in the next hour and in the weeks and months ahead P9YQ Let me digress for just a moment so that much of what I say later will make more sense I happen to believe that the way we usually state our requirements for what we need is largely inadequate We as users and we're all users in one way or another often have some specific end result in mind such as the way we want to see things on a screen the way traffic should look when we get it the processing steps needed to handle it who gets it next and so on From talking with analysts in A B and G I am convinced they understand and exploit the use of computers for their work very very well In other words we have some pretty clear ideas about just what it is we do today what we need to do it and in many cases what the hardware and software ought to provide uS to let us do more or do it better When we try to project our future needs however it is often with the mistaken idea that we should be able to specify and build a turnkey solution with the CRYPTOLOG Page S13eft13'f 1 IWI8E B '16 fIll F SllMIHBbS SUM' 4019695 '8EElRE'f r L 86-36 same degree of certainty--the big bang theory of building systems Instead we end up with a detailed specification of a changeable uncertain future need We run into trouble because the system development process and the analytic process are very similar They are both learning experiences prototyping testing hypotheses and feedback are vital We build upon the results of our experiences both successful and unsuccessful It really is more of a process than an event Idescribed it well in his talk to C I S I l a-s t Ma y when he talked about the importance of proto typing and feedback--and the shortcomings of the requirements process-developing TSS software for analysts 1 P660 Somehow we have gotten into the practice of specifying requirements in global abstract artificial functional and sometimes meaningless terms when we attempt to fully define a solution up front to a problem we don't fully understand yet The end result I think is that the system designer is often unclear about what he is trying to build and the user the analyst the customer is unclear about what he is getting The user thinks the screen is going to be formatted one way and the designer does it some other way because the requirement simply says there will be so many protected or unprotected fields of information certain functional capabilities for manipulating the information and perhaps a performance specification of some sort--all of which has little meaning in the only terms that count--namely satisfying the end user F8ee Both the customer and the designer have done their best given the requirements and yet the result is not satisfactory 1 Ot1ti7 The best recent example of dealing with the right kinds of requirements in the right way is the A2l graphics project F6a8 To overcome the language barrier between analysts and systems designers more than 1 500 mock-ups were constructed so there could be no doubt about what the analyst expected to see and what the designer expected to produce There was a solid basis for building the system based on a common understanding of the specific desired end result F8B8 What does this have to do with UIS We need to do more prototyping We need to involve the user thoughout We need to be building systems which readily adapt to changing needs--not ignore or refute them--or even worse require the end user to continually adapt to a rigid system conceived years earlier UIS is designed to change and adapt to change where it matters most with the end user--with people I am interested in the end result of UIS which we are going to describe and not in some abstract philosophical concept I am going to be asking you to consider UIS in terms of your job as an analyst a programmer a manager or whatever I am going to invite you to offer any suggestions you might have now or later and I hope you will want to work with us as we begin to develop UIS and make it real I would ask you to think in terms of end results--in the most practical terms that you can of what you really need and how you would like to see it work FIWQ By the end of this century we will have a complex network of people computers and communications to do the SIGINT job and virtually everyone will be a part of i t in Apr 83 CRYPTOLOG Page 2 IIAUfH f J 0 fA e6ffIlH' eUAMM M OUt Y 4019695 SBeRB'i' some way UIS i8 the next vital step in the evolution that began with timesharing many years ago continued with the development of the PLATFORM network and the GTSS UNIX Terminal Subsystems and the now-ubiquitous almost user terminal The end of the century isn't that far off Peseta Having set the stage I will talk about UIS especially from the user's point of view to the extent that I can an i 1 will talk about the UIS archite e t 'ur-e- i-t-s-e l f how it's glued together and ol i' plans for an actual prototype beginning thi 'year P L 86-36 Technology Issues POHO UIS in continuing the trend of the past decade to move data and processing power closer to the end user will take advantage of state-of-the-art technology as it becomes commercially viable FOMO The key to UIS--the personal computer--will soon have greatly increased computing power internal memory and disk storage capacity Other devices included in UIS are graphics computers word processors and office automation equipment Throughout this talk I will intentionally use the term personal computer to include these variations Goals Definitions and Architecture UIS is the means of bringing closer to the user convenient affordable interactive and personal access to the Agency's COmputing communications and data base resources The stated formal goal to enhance user productivity by timely delivery of information and access to required data computing resources POHO of UIS is prOViding immediate and human F91lQ Who is the UIS user anyway and what is his job This model of the SIGINT data flow system contains many functions except for the support functions I mentioned earlier all of which are performed by what I consider to be potential UIS users To place the UIS concept in perspective in relation to the flow of data through the Agency this generalized model of the real-time SIGINT system used by Mr George Cotter in a recent CISI briefing shows in the horizontal direction the flow of data from collectors to processors to product data bases to consumers and in the vertical direction the interaction of users with the data flow and the processors NFAS NSA Forwarding and Access System the subject of a later briefing is our networking architectture which is concerned with the horizontal axis of this model UIS applies to the vertical direction -tJPYOY9 A blow-up of the right-hand portion of Mr Cotter's model is a fair representation of the UIS architecture FSaO Simplifying this diagram and putting other labels on the boxes produces an architectural model of UIS o will treat this in more detaJ l in his portion of the talk P L 86-36 Apr 83 FSH6 Coupling this end-user power with networking and SWitching technology will place under the direct control of the end user the capability for him to control nearly all of his processing and data access requirements Poas Networking and packet switching technology will allow the user to access data bases and processing on other Agency mainframe computers to communicate with other users and in general to expand his horizons beyond his desktop to the entire SIGINT system POtfO UIS host computers will provide a complete set of user services such as access to PLATFORM and PLATFORM resources Additionally the UIS host will provide data storage and management facilities data conversIon and reformatting services mail file archiving security and other support for various communities of users and a variety of general utilities FSHS The resulting layered or distributed processing environment made up of personal computers UIS host computers and mainframe computers will form the basis for a dramatic change in the way most of us will work The Key to UIS F6M6 The personal computers--or as they are known in UIS parlance Terminal Workstations TWSs --are the primary elements which will bring about the change from existing methods of working to the UIS environment Only recently has the cost of personal computers decreased sufficiently to make them an affordable resource for most Agency personnel Experts predict that the price per terminal will fall to a point within the next five years that a productivity improvement of only 8 to 10 percent will justify the investment of one-third of a person's average annual salary CRYPTOLOG 8BeRBf Page 3 lhItIlBtF VIA eeUHl'f 81h'rlUil'lbS Sllb' EUR '1 00 W I n I ' ' d H 0 t ' 0 C'l ' d III 0Cl II po i EO 1 4 c P L 86-36 t EO 1 4 c P L 86-36 '1 00 W Ii C' l el l t-3 0 t' ' 0 C'l l II JQ 1 V1 H p A'il1le SI CAEi la t Q'HtiT b r 1s elil EO 1 4 c P L 86-36 ' 1'1 XI w n l l 1 ' t-3 0 1 ' 0 c ' ' ' 11 JQ 0 '0' I 'y' aCID 4019695 L SEeRE'f Today that's about $9 000 However it is the opinion of these same experts that a significant 15-50% productivity gain can be realized from a large portion of the Agency's workforce as they convert to a UIS environment PSB8 Just what is meant by a Terminal Workstation in UIS terms Briefly a TWS is a personal computer with sufficient local memory disk space display capacity and communications support to provide the user with local computing power and when needed to connect him to a more powerful machine--a UIS host or the PLATFORM network and the Main Computer Complex o The 'IWS will be running under UNIX or at least a UNIX-compatible multitasking executive The UNIX user interface the file structures the interprocess communication and the shell environment are all essential elements Additionally the 'IWS will support at a minimum the C compiler and the BASIC interpreter PASCAL may also be desirable as well The current recompetition for a replacement of the Agency standard terminal the Delta Data 7000T is designed to acquire a personal computer of the type just described PQijQ Personal computers although not with the capacity or the compute power described above have been in use at the Agency and have been experimented with for at least three years as part of a program initiated by Mr Kermith Speierman to explore this new dimension in computing During this period much has been accomplished spearheaded by the PI organization primarily in the areas of cryptanalysis and traffic analysis Most of this work has been designed to determine just how useful a personal computer can be in running programs previously available only on large 'mainframe computers or to do work done by hand at the analyst's desk All of this early experimentatio was done primarily in a stand-alone mode Stage I if you will although several of the personal computers have been hooked up to Terminal Subsystem TSS hosts PDP-ii 70s and thus were able to access data bases on other systems Analysts have used this facility to transfer data to the personal computer This was 'Stage II in the evolution of the application of personal computers peee UIS will lay the basis for development of Stages III and IV People do not work in isolation Sharing of files and programs and communicating with each other is necessary The prototype of the Stage III working environment is being developed in the TSS of today UIS will build on this work marry it to the power of the personal computer and provide a new host with enhanced capabilities Stage IV will be accomplished when analysts worldwide Apr 83 - 1 through UIS terminal workstations can directly affect and be directly affected by the flow of data from the collectors to the product data bases and on to the consumer PQQQ Moving increased computing power nearer to the end user will cause a steady but inevitable and vast evolution to occur in the way data is stored processed and accessed The nature of the Terminal Workstation is so different from the directlyconnec ted terminals now in use that we will be forced to rethink our most basic and traditional ways of moving storing and manipulating information I cannot emphasize this point enough The TWS reduces the dependence of large numbers of users on central processors and central data bases Data processing and data storage and access can now be scattered in a large number of locations accessible to large numbers of people and processes The tough challenge that DDT faces in implementing UIS is matched by the equally tough challenge faced by DDO in particular of applying the technology to best advantage once implemented There is already a good deal of work going on in PI A3 A6 B2 B5 B6 G3 and elsewhere whic is leading in this direction The User's View A UIS Scenario petie Several times in this talk assertions have been made that UIS will cause a change in the way the user works will cause a change in the way we move store and manipulate data and will challenge all of us to derive the maximum benefit from the implemented technology To dramatize the differences between the system today and the system as it should be under UIS a scenario describing the way a user might operate under UIS follows The person described is a composite if you will of all the analysts reporters transcribers flow managers programmers secretaries office staffs and managers who will be users of UIS Terminal Workstations of various kinds But within the scenario describing our general analyst's day will be some of the things you might do petie Our UIS TWS user arrives at his desk and powers up his personal computer The system will ask for qis personal 10 and password Once the system is satisfied that the user is who he claims to be the user will not have to identify himself to any other computer he may wish to connect to during the day his TWS will pass his verified identity to any other computer requiring it at the time of connection The other computer needs only to determine that the person requesting access has been granted access permission Specific file access on another system might require other CRYPTOLOG ligGaJiT Page 7 II NBtE VIA eeHHi'F eIWmEibS 9NbY ' ' q 'Sl iSIUiT 4019695 TEXT EDITING MENU security measures that would occur after the connection was granted MAIN MENU 1 2 3 4 5 6 7 8 9 HELP TEXT EDITING TA FUNCTIONS CA FUNCTIONS TRANSCRIBER FUNCTIONS REPORTER FUNCTIONS PROGRAMMING FUNCTIONS RESEARCH FUNCTIONS OFFICE SYSTEM' 1 2 3 HELP MEMORANDUM FORMAT NOTE FORMAT 4 RECORD MESSAGE FORMAT UMPS 5 6 7 8 9 10 SPECIALIZED FORMATS CREATE A FILE EDIT AN EXISTING FILE VIEW A FILE VIEW A DIRECTORY OF FILES PRINT A FILE 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS ENTER # OF SERVICE PRESS RETURN KEY 20 21 SYSTEM FUNCTIONS ENTER D OF SERVICE PRESS RETURN KEY 2 iJ9 J9 Now that the UIS user has gained access to his personal computer and through it to that portion of the rest of the SIGINT system that he needs access to he will be presented with a menu tailored to those functions that he routinely performs At the top of the menu will be a HELP command and at the bottom of the menu will be a selection that will allow him access to the general system commands--the equivalent of a percent sign % for those of you familiar with UNIX Our user will select from this menu some function he wants to start his day Typically this would be a review of his personal calendar or a scan of all the messages sent to him by other users or by other computers since he last looked Throughout the day he will interact with the rest of the system to send and receive mail and messages transfer files to and from the MCC the Main Computer Complex or local UIS host systems etc However the majority of his day will be spent using the data storage capacity and compute power of his personal computer largely independent of the MCC Fel ffl Up to this point most of the functions our user will need are probably common to the vast majority of UIS users One important function in this category is text processing Since we all deal with text in some way or other through most of the day a textprocessing capability wi thin the terminal is of prime importance Wouldn't it be great if the many documents we produce each day including end product messages reports transcripts plans programs etc etc would have to be typed only one time And if others could review and or edit them easily and conveniently wi thout always reducing them to hard copy Text processing needs to be as readily available as the No 2 pencil and as flexible as the pocket calcuiator Fe6e From here on the functions our UIS user selects from his menu become more specific reflecting the duties of his job The power of the personal computer allows us to tailor common standard modular functions into individual menus for each TWS user ANALYSIS MENU 1 2 3 4 HELP SCAN EDIT TRAFFIC PROCESS EDIT TA LOGS TEXT EDITING 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS ENTER fI OF SERVICE PRESS RETURN KEY 20 Apr 83 CRYPTOLOG Page Sl iSRET 8 lIMlBeE VIA 86HHllf 81lilflUEbS 6NbJPY 4019695 FsttS He might select from his menu the function that would allow him to scan the traffic that has accumulated for the past 24 hours and edit some of it discard some of it or copy some of it for later use as part of a report the report to the person authorized to release it Upon release the report would be distributed electronically to all designated recipients people who would read the report and take action or computers that would use the report as an update to some data base MAIL MENU PROGRAMMERS MENU 1 2 3 4 HELP 1 SEND MAIL VIEW MAIL RECEIVED TELECONFERENCE 2 3 4 5 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS ENTER # OF SERVICE PRESS RETURN KEY 20 ENTER # OF SERVICE PRESS RETURN KEY 20 FS1 lH He might select from his menu the function that would allow him to send an informal message to another analyst halfway around the world or to read messages sent by that analyst to him Given that time differences are not too great he might even enter into an interactive conversation with the other analyst SPECIALIZED REPORT FORMAT MENU 1 2 3 4 5 6 7 8 9 HELP C BASIC CCMPILE TEXT EDITING HELP RECORD MESSAGE UMPS FORMAT USSID illlIl FORMAT KLIEGLIGHT FORMAT TECHSUM FORMAT PROCUREMENT REQUEST FORMAT PERSONNEL SUMMARY FORMAT LEAVE REQUEST FORMAT TRAINING REQUEST FORMAT 'Fette If our user is a programmer he might select from his menu the function that would allow him to generate a program or to revise a program which he had entered earlier He would have the necessary support functions to enable him to design and plan the program proper ly format the input and document the results Given that the language he used to program was one recognized by the TWS BASIC C PASCAL etc he could ensure that the program was syntactically correct before connecting to the host or main frame for compiling or execution REMOTE ACCESS MENU 1 2 3 4 HELP CONNECT TO SOLIS CONNECT TO ULTRAMARINE CONNECT TO CARILLON 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS ENTER I OF SERVICE PRESS RETURN KEY 20 ENTER f OF SERVICE PRESS RETURN KEY 20 FSGS He might select from his menu the function that would provide templates of any one of the hundreds of formatted reports we produce daily After filling in the necessary information and correcting any errors he would transfer it electronically to one or several people for coordination comment Getting the commented versions back electronically he would make necessary changes and transfer Apr 83 petts Our typical user might select from his menu the function that would allow him to conveniently and interactively access several computers where information was stored Required information could also be brought back to the TWS and used to answer a query become part of some report or simply be a working aid of some sort CRYPTOLOG Page 9 aCID 4019695 SESIUiT OFFICE SYSTEMS MENU 1 2 3 4 5 6 7 8 9 HELP CALENDAR MESSAGES MAIL MEMOS PHONE BOOK TEXT EDITING SPELLING CHECK NOTES ACTION SUSPENSE FILE UIS will provide convenient access to the rest of the SIGINT system when required UIS will not only allow the user to affect the system but allow the system to directly affect the user thus establishing a continuous feedback loop between the user and the system Planned Evolution 20 RETURN TO MAIN MENU 21 SYSTEM FUNCTIONS ENTER # OF SERVICE PRESS RETURN KEY 20 peES A manager might select from his menu the function that would allow him to examine his calendar for the day and a suspense action file of items that should be completed A request for any mail to include administrative messages personal notes reports for comment concurrence etc would bring a list of items to his attention appropriately prioritized by his secretary or staff His decision-making process is helped throughout the day by selecting from the menu functions that allow him convenient access to data containing technical budget planning personnel and management information peES At any time during the day i f the TWS is powered on any computer in the SIGINT system could send information directly to the TWS When received the user would be notified and he could take appropriate action This facility could be used to update the user's work queues to alert the user to the arrival of high interest traffic or mail or an incoming OPSCOMM or failure of a critical program in the flow It is a means to get real-time human interaction into the flow of the SIGINT process These brief and highly simplified scenarios highlight several advantages that the UIS concept has over today's operation UIS is capable of being tailored very specifically to each user while at the same time taking advantage of general utilities common to all users UIS does not depend on the 100% availabilty of the MCC or UIS Host systems for the user to do useful work peae It is not enough to provide an architecture and an operational concept This briefing and the many papers that have been written and will be written are designed to present the UIS concept to a wide audience so that systems designers can begin to incorporate UIS concepts in their designs But it is not enough to hope that the UIS concept will be implemented through the efforts of many project managers There is technology that must be developed or acquired and demonstrated The UIS technology and techniques must be demonstrated in an operational prototype and the real challenge of the problems posed by a distributed data processing environment must be solved T44 with DDT's approval and with considerable help from other organiza tions throughout the Agency hopes to introduce a UIS prototype within the coming year where the system designer and the user can collaborate to produce a functioning UIS environment We have already begun to work with PI analysts and others to see which real analytic problems we should be addressing first If any of you would care to make any suggestions or want to know more about what we are doing I invite you to get in touch with me I IWill be describing some of our early plans for the prototype in the second half of this briefing P L 86-36 1 I ITSS Revolution Cryptolog Sep 1982 pp 8-12 ' UIS Terminal Workstations will provide powerful computer capabilites and data storage facilities conveniently and directly available to the user Apr 83 CRYPTOLOG SEl8ftEl'f Page 10 lIMtflhEl VIA 8eUIU'f 8HMfttIlhS eNhl' aCID 4019695 P L PQQQ At the intermediate level we have the Community Components which is where the individual user comes into contact with his fellow workers It is here that data needed by more than one user is stored e g a calendar which an executive shares with his secretary or a frequently-used operational data base In addition to the sharing function it is at this level that support to users above and beyond that which the User Component can provide is available e g file archiving high-quality printers extended computing power 86-36 PART TWO ARCHITECTURE byl I Fetie Now that Tom has told you what UIS is for and how it has gotten to where it is I will tell you how it is made up I intend to cover the Architecture how it all fits together the technology which makes it possible at this point in time the components some of which already exist which make up UIS our approach to making UIS real in all its aspects and especially the UIS Prototype which is our initial move in getting UIS where we want it to be P8 8 At the innermost level are the Global Components the maj or computer complexes in the basement These must be accessible by the user through the other elements of UIS and we do not envisage that they will change significantly because of UIS FQijQ This is the basic UIS Architecture It consists of three main levels of components with interconnection between these levels P688 There are two levels of connectivity the Community Network the element which connects the user to his Community Component and to other users and the Backbone Network which connects all major components While there is only one logical Backbone Network there are many Community Networks The function of these components will become clearer later in the briefing At the outer level closest to the user we have the User Component which is where all private data and applications reside This is the user's private workspace to be treated rather like a desk chair phones file and scratchpad would be used today it will provide as much data storage and computer power as we can afford user component user component user component I I _1--I I I_ _-c - I_ _ Community network I I I ------ ----- ----- ---Community component Community component 1 I I I __1 ---- -- - ----- ---- -- Backbone network I I I ---- ---- ----- --global component I 1 global component ------- ------UIS ARCHITECTURE CONCEPT Apr 83 CRYPTOLOG 88 iPtBEi f'fttih Page 11 eSNFfBEIft' 'EAb 4019695 I DD I I DO I I DO I I DD I I 7000T ' 7000T I 1 70001 I 70DDT I I I I I I I I I I I I I I I I I - I I I I PDPll GTSS I I I I __I I - J - I PDPll GTSS I I I -- PLATFORM - _ -- - I CARILLON I I I I I HOLDER I I I UIS ARCHITECTURE NOW F8He If all this sounds too ethereal let us look at what we have today and see how closely it corresponds to this architecture As you can see the Global Components are in place as is the Backbone Network in the form of the PLATFORM network The Community Components are represented by the existing PDP II-based GTSSs which are the starting point for the full Community Components but also contain the Community Network and User Component facilities because these are only point-to-point lines and dumb terminals respectively The next few slides show how we expect to develop from where we are now to where we hope to be at the end of UIS POWERFUL PERSONAL COMPUTERS I I I I 1 I I I I I II I I I SWITCH I I I PDPll GTSS II 1_ --_ _ ' I __1 I I I 1 PDPII GTSS I FSMS As a starting point the Terminal Work Station will run the UNIX operating system and so will have available to it many of the applications currently used on the PDP 11 GTSSs--one notable exception being the RAND Editor which will be replaced by a Word Processing package native to the TWS itself FQijQ As a first step towards introducing the concept of a Community we shall reduce the reliance on a single host by means of a simple switching function implemented either as a digital switch or using some early offerings in Local Networking I I - SPECIALIZED HOST I I I ---C- -AR- I-L -N-I I-HO -DE-R-I I I I_ _ ---- ---_ POWERFUL PERSONAL COMPUTERS -1 --- 1 I I I I I I I_LOCAL AREA network I I I --1- ____ I ----UN-I-X -HO-S-T---- I I --_---PLATFORM _ _ _II Fetle The first item to be tackled is to replace the dumb terminals with Powerful Personal Computers PPCs and thus greatly expand the local processing and storage available to each user literally on his desk This process has already begun with the use of a variety of PCs in many different organizations within NSA I'll talk more about the technical characteristics of these devices later but as far as the user is concerned the Powerful Personal Computer implemented as what we call the Terminal Work Station is the basis for the User Component It will provide the user with local affordable available and private computing resources--it is his own machine with sufficient storage for his private data processing power and of course software to satisfy say 90% of his computing requirements and when the Terminal Workstation needs it access to larger computers to other data and to the worldwide network of users I _--- - - ------- _ _1 PLATFORM I _ _J _ I CARILLON I I I UIS ARCHITECTURE THE POWERFUL PERSONAL COMPUTER I I _1_ _1 OCEANFRONT I UIS ARCHITECTURE COMMUNITY NETWORK AND SUPPORT Apr 83 CRYPTOLOG Page eSUFII'Elff Hct 12 ero 4019695 FSHe This extended local power has to be linked to the Community-level components in a much faster and more flexible way than we have at present This will be achieved by means of the emerging Local Area Networking technology of which more later We are looking here for more than mere connectivity we are looking for some measure of intelligence in making decisions as to which hardware component at the Community level a User Component needs to connect to If a user wants to archive a file it is no good connecting him to the print server FeHe The development of the Community Component will be somewhat slower relying initially on the existing TSSs and their lookalike replacements By supporting UNIX in both the PPCs and the Host the transition from Host software to Terminal software will be accomplished over a period of time This will be hastened by the inclusion at the Community level of certain specialized processors of which the most obvious are the Database Machines as typified by the Britten-Lee IDM-500 with which T3 is currently experimenting Extending the idea of reducing our dependence on a single host we shall introduce at this stage the idea of a file server which holds Community files when a user requires processing and data he is allocated to any available machine and the file server stages the required data to that machine One may even wish to consider whether interactive connection between the User and Community levels should be replaced by a transactional protocol In the long term one can conceive of the Community Component as evolving from a set of General-Purpose Processors to become a collection of specialized processors FQW I I I _1 I POWERFUL PERSONAL COMPUTERS I- ---- j I I FSeS A major limitation of the previous phase of the development is the necessity of passing through a general-purpose processor to get to the Global Components This would be made easier by including a special-purpose machine at the Community level with the job of handling the gateway function from the User to the Global levels This in itself is a major undertaking I I _I I --__1_UNIX HOST 1 I I PLATFORM I ---- -- 1 1 I 1 I - UIS ARCHITECTURE THE USER'S DREAM FSeS If we continue with this trend the Community and Backbone Networks merge It may be however that this is more a Utopian dream than an achievable goal though it must always be our aim to make the network appear to the user to be one cohesive whole rather than a set of mazes to be negotiated only with skilled navigating J I GATEWAY _ UIS ARCHITECTURE ACCESS TO GLOBAL RESOURCES I I _1 _ _I OCEANFRONT --- --' Apr 83 I I _ _ 1__I CARILLON 1 _- - 1 ----- --- DATABASE MACHINE I I ----------------- --I I __I --CARILLON I OCEANFRONT - I ----- ------ PLATFORM I I 1 I --'--- I LOCAL AREA NETWORK LOCAL AREA network I ___ I _ - --- --- ----- __ '---UN-I-X I-HO-S-T--l I I I I 1_--- -__ 1 I I POWERFUL PERSONAL COMPUTERS I I 1 CRYPTOLOG SeNFIB6NTIA Page 13 S8NFIBBNTIlzfJ 4019695 USER COMPONENT USER COMPONENT I _ _ _ _ _1 I I I _ COMMUNITY NETWORK _ _ _-- --_ _ 1 I 1 I I I I COMMUNITY COMPONENT _ I USER COMPONENT 1 __ I I COMMUNITY NETWORK I 1 ____1____ - ---_ 1 I I _1_I GATEWAY I ' I COMMUNITY COMPONENT --- -- I I I I I I- I -- BACKBONE NETWORK --- ---- I GLOBAL COMPONENT _ _ _ 1 - GLOBAL COMPONENT I ----- ----MANAGEMENT COMPONENT Clearly these phases will overlap considerably so what we actually end up with is a configuration more like this one the elements of the previous slides can still be seen as individual entities however A new element one which is vital to UIS but which I won't say much about today mainly because we haven't defined it very well yet is the Management component This is where the system is monitored controlled and kept heal thy AI though shown here as a single box it is likely to be a fully distributed function when we can figure out how to build it F8lf8 A typical UIS Community will look rather like this below As well as the elements described so far there will be specialized User Components supporting Graphics interfaces to dedicated Office Automation networks and local print facilities This is just a redrawing of the earlier conceptual slides with some real names on the components O 'MUI'J t T I aOto' po ' t lI lT 'T'1' 1 GBP' 'J'Srrrv C oM l li' r' HL ArA 'Aot t s Apr 83 b b c T h l y'r' H' lI Ar'A eN' Pt El PP E R S CRYPTOLOG Page 14 aCID 4019695 TECHNOLOGY COMPONENTS TECHNOLOGY CClfPONENTS Powerful Personal Computer Having looked at the architecture we turn to the question of why now is the right time to be making a big push for the UIS idea After all there is nothing particularly revolutionary in the ideas they develop out of existing systems and the natural course of technological advances The important thing at this time is that the technology is now becoming available to allow us to move usable processing nearer to the user in a cost-effective manner This is a continuation of a long transition from central batch processing through remote access GTSS systems and networking to the emerging use of personal computers The key technologies needed to realize the UIS concept are Powerful Personal Computers and Local Area Networks Community Support Processors while not in themselves new technology they are developing in a steady progression from the existing GTSSs are essential components of UIS and their form and function will be modified by the increased use of the PPCs and LANs Global Networking we already have and will need to exploit and expand to support the UIS method of working Keyboard Screen 4t Powerful Microprocessor At least 256Kb Memory o 10 Mb Winchester Disc Communications Interface Software Tempest o UNIX o Word Processor Software Data Base Support Let's now look at some of technologies in a little more detail these 10116 The PPC which we can now purchase for around $10 000 satisfies the definition given here It is no accident that the specifications of the UIS Terminal Workstation and the Agency standard terminal to replace the DD7000 known and loved by so many Agency personnel are so similar psas You will notice that the memory requirements both main memory and back-up storage are large--some people say too large this is a natural and relatively cheap response to the information explosion We have never had enough storage on any computer and probably never will have but at least the responsibility for the organization of this storage is totally with the user i OJlO TEMPEST is a restrictive but necessary requirement -'i'OW8' - As we have mentioned earlier we are looking to a PPC which supports the UNIX operating system or something which looks very much like it This will give the dual advantages of portability of the current TSS software and of user familiarity T h e communications interface properly supported by vendor software is another key element allowing the user to access the remainder of his world petie We are looking for an extensive amount of vendor-supplied software in addition to the ability to transport UNIX-based software from the GTSSs FSHS A device such as that described here could not have been purchased a year ago Apr 83 CRYPTOLOG Page 8eNFiBSUTihb 15 4019695 TECHNOLOGY COMPONENTS TECHNOLOGY COMPONENTS Local Area Network Community Support Processors o Hardware is available and cost effective o PDP 11 70 now tt Software is developing o Replacement Host o Tempest o Support for 100 terminals o How many PPCs F8H8 Local Area Networking technology needed for the Community Network is somewhat less mature than PPC technology It is growing apace and many vendors are pushing their hardware Clearly this is the technology we need and will get equally clear however is that we can't buy the software mainly the implementation of protocols needed to give us the necessary functionality To UIS the Community Network has more than just a switching function it is the means by which the User projects his image to the world For instance most current PPCs come with an asynchronous communications interface running at around 9 6 Kb this makes the PPC look to hosts like a dumb terminal What we need however is to make the PPC look like what it is a computer with high-speed file transfer and other sophisticated capabilities The ability to drive data into the TWS without the user having to control the transfer is a key UIS function needed to support overnight offloading of data from the more centralized processors for instance Clearly this goes well beyond what is currently available in the Local Area Network marketplace and requires changes in the connection strategy of the PPCs and the Hosts as well as the LAN technology--but it is still part of what a user considers as the network F8H8 The existing GTSS has served US well and will continue to do so as will its immediate successor which is now being competed for Existing applications will continue to be run but will steadily be replaced by applications in the PPC--these may be copies of the same software in the TSS--and by specialized processors F8Me Current PDP II 70s support up to 32 directly-connected users the replacement Host will support perhaps 100 By implementing UIS we hope to extend the support to several hundred of whom only a small proportion are actually using Community resources at anyone time thereby enabling Communities to be exactly what they need to be--all users who work together--no longer being restricted to the 32 terminal users of each system Incidentally you may notice that we haven't explicitly defined what we mean by a Community This is about the closest we have come This is not an oversight We believe that UIS should allow the Users to decide what they want to constitute a Community which may be as small as an individual office or as big as all analysts 11 - ---- - _ _ EO 1 4 c TECHNOLOGY COMP0J E NfK Global Networks o PLATFORM o Theater Networks o Global Interconnection Global Components o Apr 83 CRYPTOLOG eemF I BB 1l'F L f Little or no change Page 16 8 6- 3 6 4019695 eeUPfBB f' I'fAb FQYQ Global Networking is already with us in f ac t has been for many years and we see an evolutionary progression towards greater survivability increased throughput and timeliness and greater functionality This is required for reasons other than UIS and will be accomplished through the use of theater networks and a global interconnection of networks Feee We do not see any major changes to the Global processors in the immediate future though they will undoubtedly be affected in the long term as we eliminate directly connected user terminals THE PROTOTYPE AND BEYOND FQYQ So where do we start on these grandiose plans peee The obvious place is the Terminal Workstation which is what the will perceive as the interface to the whole processing system I have talked about the things we need on the Powerful Personal Computer and Tom talked about the facilities provided to users on the user component It is the implementation of the User Component on a PPC as the Terminal Workstation which is the first real challenge of UIS The PPC even with extensive vendor software is not enough We have to add specific NSA software we have to make it attractive and secure to store data on this local device and to manipulate it locally to make it easier to access other machines wi thout knowing a litany of FTP commands for instance and to generally be friendly to the person manipulating the keyboard P1 personnel who also have considerable experience in the use of personal computers The intent is to bring in up to 12 Powerful Personal Computers and turn them into Terminal Workstations as described earlier peee We have chosen terminals made byWICAT for use in the prototype as they fall within an acceptable price range and are the earliest models to have all or nearly all of the features we need Under the UIS umbrella we shall also be getting experience with Local Area Networking We are for instance working with T1S to improve the operation of the numerous TSSs in the basement by pooling of peripherals We shall also use this type of technology to connect the WICAT terminals to a number of NASs and T55s such as CARONA and STEPSTONE-T03 FQYQ As we get these components in place and start to use them we shall undoubtedly run into snags so we must remain flexible in our approach and try to solve the problems as they arise We have already changed our minds at least twice on how to connect the TWS to the Community level and on how many WICATs to buy Feee This prototype which we expect to have operational by August 1983 will be used to demonstrate the functions shown here APPROACH TERMINAL WORK STATION I I V LOCAL AREA NETWORK AS A COMMUNITY NETWORK I I FeeS It is not until we have done all of these things that we can begin to claim that we have implemented the User Component of UIS V EFFECT ON TSS ITS REPLACEMENT--COMMUNITY COMPONENT FQHQ To gain experience in the technology and more importantly to be able to demonstrate that the ideas we have presented today make sense are achievable and are attractive to the end users we are building a prototype system in T44 FQUQ We have already gained some experience by using Xerox 820s originally purchased as programmable word processors but subsequently adapted by us to support other office functions and communications to PLATFORM This experience has proven invaluable in enabling us to specify a much more powerful and flexible device for the true prototyping effort This prototype is a joint venture I I V GLOBAL CONSIDERATIONS peee Within the WICAT we shall demonstrate Office Automation functions such as Word Processing memo generation and calendar and phone directory maintenance some CA applications taken from existing PCs and parts of some TA applications taken from the PINSETTER suite Our means of making the terminal user-friendly is to use a menu-driven approach with the user prompted for the with Apr 83 CRYPTOLOG Page eeNPIBBtl'flkb 17 eeUPIBEi ll'FIMJ aCID 4019695 minimum amount of information On our existing Xerox 820s 'for instance we perform transfers to and from CARONA through a NAS and only ask the user for the file names on each sys tern and his CARONA password--rather different from the FTP sequence needed if the user is sitting at a dumb terminal pees Networking applications will include electronic mail messages generated on the local TWS but distributed using the existing software in the TSS and dissemination of the TA files to the individual analysts Additionally the prototype will be used to investigate some of the areas which are less well defined such as a signifJcant step forward to be made Finally we shall see if there are any effects on the Global Network and the Global Components pees In parallel with this mainstream development we shall be studying the problems of access security accounting control and other management implications of an increasingly distributed environment SUMMARY 4rQYQ In closing I should like to return to Tom's origin l questions What is UIS1 o distributed data o extension of TWS power Well I hope we have explained the Concepts the Architecture and the Components sufficiently to answer this question new applications use of new technologies Why should you care management of users and protocol issues FSeS You should ca're because this is the way the Agency will be doing its business by the end of the century and if you don't want to get left behind you should make sure you have your UIS personal computer with its considerable local computing power and practi' ' cally limitless communications ability F8ij8 Some of the specific things we have in mind for this further stage are How to use the Britten-Lee IDM 500 DataBase Machine as a specialized Community Component Alternative User Components Xerox 860s and Stars under Automation program and the Graphics in support of A21 as of Jerkin such as the the Office AYDEN CORE a prototype FSes Most of the other items on this slide are in the nature of a wishlist at present they will become better defined as we get the things from the previous slide implemented and have more resources to devote to the investigational rather than demonstrational aspects of the prototype What is UIS good for il8ij8 Our answer is that it is good for everything which involves a person and one or more of data computing or communications If you didn't recognize anything familiar in the scenarios Tom went through you are probably in the wrong meeting If you recognized more than a little of what you need to do your job then please watch as we try to answer the question more accurately and in more detail by gaining experience with real users and with their reactions to the prototype If you can see immediate useful and powerful applications to your work area please give us a call ilQYQ Having concentrated firstly on the outermost layer the TWS we intend to move steadily inward to implement secondly the Community Network using a full-function Local Area Network as described earlier This will greatly improve performance and flexibility over the existing point-to-point connection The effect on the TSS caused by these developments will be the third area to receive attention--by the time this happens specialized processors will be maturing applications will be moving out to the lWS and greater functionality will be available thereby allowing Apr 83 CRYPTOLOG r ' Page 18 4019695 SBeRB'F The following cumulative index of CRYPTOLOG Vols I through IX 1974-1982 is in three parts and is being published in three successive issues by author by title and by keyword Items in multiple issues February rch 1975 for example are indicated by the first month i e by Feb 75 Ai i O-SOYUZ Test P L 86-36 1 4 c L 86-36 Project Dflc 6 1 _ The Apostrop e Some Thought's Nov 74 An Appr oaeh to Callsign Analysis Dec 74 Jackson W J Are We Wasting Linguistic Time May 75 Irwin M R As I Was Saying Two Years Ago ' Jun 78 Pattie M T ATA Letter to President Carter Apr 78 Tinsley R L Attention Authors and Publicity Chairmen Mar 82 Attention MilitaryTraffic Analysts Mar 79 An August Baudy Aug 79 1 1 I'I' 'T Ilsep 77 Pratt I b L Abdul and His 40 Tanks Aug 75 Mason F O J About the NSA SIGINT Summary Mav 76 1 Accentuate the Negative Apr 78 1 _1 Agency Summer Language Study Dec 78 Buckley D AG-22 IATS A View From the lIridg Jtin 77 I Automation of a TA Process Oct P L I Aili gltors Aren't 82 Amateur On Nov 77 L- _ An a l-y-st-s-o 'f NSA Arisel Jan 8Q 1 1 And-a You Betta Have Moti-vaysh1 Oct 78 I I Another Cipher by ' Sep 76 1 Another Controversial Book on A r t i f i-ci a l --' Intelligence May 77 1 Another Last Word On IATS Sep P A Another Source Oct 79 1 I Another Word on AG-22 IATS Oct 76 M A Answer to Can You Make Out t he Name r Apr 75 86-36 86 --36 Back to Square One Oct 78 1 1 into Language Acquisition Nov 77 acking I I Sport Shirts Jan Jun 82 Murphy T P L AIT Apr 80 1 1 80 1 4 c a k a Sam Dec 78 Meyer W'P P l 86-36 Al Balloni Editor Sep 77 A J Al Balloni Editor Jan 79 A J S All I Ever Wanted To Know About DES Aug 82 u The 7 The Baltic Encoders Jun Basic Patterns ofl Feb 75 1 I BetweenTheLinesofYourl'erfortilam e Appraisal Jan 80 I I P L 86-36 The B lble and the Washington Monument Sep 76 Snow D Mar 7 7 0 _ _- _ _ Jul 77 P L 86-36 Bookbreakers Forum Jun 78 Baokbreakers Forum Apr 9 Bookbreakers ForulllOnMachine Aids Apr 82 I I 1 1 77 0 r--- I _ I But Life It' $upposed To Be Hard 'Mar 2 IL _ _ 1 J Boak Did YOIl erTry To Get Rid of M in a Hurr ' Apr 79 D H W _ But WhyDgWeDo It Jall 18 1i- - - l' _ By Lines Don't Cost--They Pay Feb 78 Mollick J J But Jo r Answer to Three Ho 'Els Mar 78 Answer to 'Vexing oo Problem' Nov 76 son F O _ Answer An Old Problem Oct 82 I_ __ P L Apr 83 86-36 CRYPTOLOG Page 19 EO 1 4 c P L 86-36 aCID 4019695 fHieRS'f 86-36 EO 1 4 c P L 86-36 Cla ll lif i catlon 'aUf fcati l f 1- - ClassHication Co rne r CM News What Ever HClPperied to 77 1 '- the CAA t Jul ' CM News What Are They Up to Anyway l ug 77 I I CM News Whom Sre r z IL-__ - J CM News Oct 77 t - CM News Nov 77 - -1'_ _ _ CM Message and News Dec 77' CM News Jan 78 W E S CM News Feb 78 W E S CAA News Mar 78 W E S CAA News Apr 78 W E S CM News May 78 W E S CM News Jun 78 W E S o CM News Jul 78 W E S CAA News Sep 78 W E S CAA News Oct 78 W E 's o CM News Nov 78 W E S CM News Jun 79 CM News May 79 CM News Aug 79 I_ _--- --_-- ---JI eM News Conference on Communications Analysisj Oct 79j J 'Mar77 C J D A Calling All SRAB - SRA ymposiulll i Aug 4L I I P L' 86 3 6 Callsigns and WARC-7 9 M a y 7 8 I_ _ _ _ 1 GAMINO News Feb 75 I The Case for COMINT Readers Jan 75 1 H G ' '-----Cast a Double Shadow The Tr01an Horse of SIGINT Nov 78 I 1 Celtic Languages Today Jun 78 I -- _ _- - -- Iu Central Research and The Paper Blob Nov 82 I I- The Changing Face o NSA Jan 78 'Anon Chapenko Shapenko What Difference Does It Make May 79 I I Character Building in the People's Republic of China Oct 74 1 I Check Your Morse Front-End Alignment ov 76 'Anon ' I IDee 82 1 '_ _-_-_-_-_-_-_-_- ----J Choose Ye May 77 CIRC An Intelligence DataBa e Jan 80 I I 7T J I A Biggel Picture Oct ClAssification Corner Who Said Oct 77 ' tCM INews 1 Jan 79 r- -- eMI News Aug 79 1 1 --_ -- I Codeword or COMINT Channels Mar 75 1L _ H c lecttQP-SuppQrt TA is Not for Everyon Feb Coming Home Jan 80 l E O 1 4 c OMINT Analyis o ISep 7i' 'L 86-36 The COMINTChairL'GaIlg Feb79 COMINT COMSEC and Hilbert's Tenth Jan 78 1 - - 1 ' ' I COMINT in the Russian Navy WWII May 76 I jcomm c an e 1 at Ramasun Station Apr 75 Comments on AG 22 IATS Jun 76 Comments on AG-2i IATS Jun 76 Comments on AG-22 IATS Jun 7 Comments on AG-22 IATS Juri 76 Comment ' on AG-22 IATS Jun 76 Comments on AG-22 IATS Jun 76 Comments on AG-2 2 IATS Jun 76 Comments on AG-22 IATS '76 ACompi risonofNSA and ATA C rtL i' 'f 'i 'c-a-t 'i 'o-n-- ' Standards Mar 76 t I Cgmputer-Ai ded Trapscri ptt cjp I I Apr 76 I W L ' - c Computer Network Resources InGS Aug E75 86- 3 6 c rer Q er tnt S tem Vulnerabilities Mar Computers'lnflieLINT itidl'lllleriletry Business Jun 76d 1 P L 8 6- 3 6 Computers Comms and Low-Grade Ciphers The u jilo i 4 I t CIS I News Mar 79 CISI News Spring Conference May 79 CLA News Mar 78 CLA News Sep 78 CLA News Oct 79 o CLA News Sydney Jaffe 'AWard Jan 80 CLA News Russian Institute Feb 79 Clarity Thy Name is alifier Nov 76 Mollick J J Classic Cables Apr 79 Classic Gables Mar 79 Classic Cables May 79 Classic Cables Apr 81 I I Contributi ltls Solicited Sep 74 Conversation With'a Micrographics Pioneer Dec 7 r Con ktsation wUda Bookbreaker May 76 Anon -' The Costs of Mu4dling R E T tough ov 82 Gould Coverterms Apr 75 Filby V R ' Apr 83 EO 1 4 c P L 86-36 c _ _ IOct 75 1 I P L 86-36 A Computer Scratch Pad at Home or at Work JU n 78 1 I Some Reflections On The Reality of Cofuputer Security Jun 82 Hanyok Rr- J _ _ - COMSEC Challenges NoV 82 L I 1 COMSEC Familiarization Do You Need It Jun 75 COMSEC SIGINT Relations Apr 79 Boak D G 1 Gonoces Bien la Geografia Apr78 Human Factors Corner Consumer VS oIllPuter R eyiew Mar 82 1 I contemplating Computing Apr 77 1 1-------- Continuing Professionalization oct 78 CRYPTOLOG Page 20 P L 86-36 Ih ifBhB ViA e9UHll' 8lIMRISbS 91ft ' aCID 4019695 y satldCO ecovery Intelligence Problems and Prospects Oct 81 Emitter Identification Techniques May 79 Eco omic Sep74 c y Pt 1 c 1I C rossword Nov 81 1 CtypticCrossword Mar 82 AFc M 2a nd ICC-82 New Cr-y-p ' t-o- De-v-i' 'c-e-s -' Aug 82 1 CRYProLoG Index for 1974 Dec 74 CRYPTOLQG tndex for 1974 Jan 75 CaYPTOLO Jndex for 1974-1975 Dec 75 Ci YPTOLOG Index for 1977 Dec 77 GR YPTOLOC 1ndex for 1978 Dec 78 CRYPTOLOGA'Letter of Introduction Aug 74 Wo 1ff H E o ' CRYPTOLOG Numh I'ing May 82 I qUiPment lintenance on ABNER Jun 78to 1 4 c I r l i p L 8 6 - 3 6 I IDec 77 1 Establishment of CSI Newsletter Dec 75 An Evaluation of a Scientific Chinese Machine Translation Jun 76 1 Even a S-year-old Child ooo Oct 74 Tetrault E W Executive Order 11652 Jan 77 'Leiner Exercise supporl D e c 8 l LI -_ _ _ _-_ _ _ _ _ 1 EXPERT Jul 79 l i Expletives Deleted Glossing Over a Glossary Feb 76 1 1 Expletives Deleted Aug'l7 Salemme A J I the Danang Processing Center Oct 75 1 w ' _ _ J Da t a and DefinitiOns C lIin Things by Their Rightful Names Nov 74 1 ' _ 1 Data Field Naming Coding ConYentions at NSA Jan 82 1 1 Data Flow--Challenge of t he 198Qs Apr 80 llh l llips C J Da a Security and Human Error Oct 78 c J J M Data Standards Center Nov 78 Pattie M T Data Standards Without Tears Feb 79 1L _ _ P Q Data Standards Without Tears A Gomtnent Mar 79 L I 0 ---- - 1 Data Standards Without Teeth Jun 9 iL -_---' P Q Dadng Game Jul 77 Williams Do H Development and Correlation of IndiCators Dec 82 1 1 DESKPAD A Programmers's Tool Nov 75 c J H The Devil's Dictionary Feb 75 DIA Videocasette Program Apr 81 DIALOG Available at NSA Aug 77 A Dialogue Between Ms User and Ur Analysis Nov 78 1 1 Diego Garcia What Where Why Nov 74 c J G A Director's Memorandum 'MAROON SHIELD Guidance' Nov 77 Inman B R The Doctor Is In capableof Diagnosing Sep 77 Chauvenet L R foes AnYbolu ereuReme beruPURPLE Dec 82 A Donkey in Your WHAT Mar 78 1 The Do Xa Pads Oct 75 Wiley E --------- p L 86-36 Fairbanks on English Mar 79 F airbanks S The Faithful Echo--The Role of the State Department Interpreter Feb 75 1 1 Fear of Testing and What To Do 4bout rt Apr 79 1 1 Feeding the Germans Misinformation Book Review Oct 78 Filby P W A Few Thoughts on the NSA Linguist Mat 77 'Anon ' First Lady of Navy Cryptolog Feb 78 1 R P L - ---' A Fix for the Language Problem Aug 75 1 1 Flag-Waving Programmer Dec 74 John G Flash 115th SRI Located Apr 77 Salemme A J Football and Cryptology Jan 76 1 1 Foreign Publicati ft ut ent Program Sep 76 Link L Formatting PL l Source Code Nov 78 K J o '--------' The French fried Connection Gino the Genie Dec 76 1 I The Bystem Feb 76 f 1 Full or Broad srectr IIl igbtlng May d2 I The Future of C yptanalysis May 78 Lutwiniak W futuriStic Reporting N'0' 81 1 _ P L 86-36 EO 1 4 P L Early Days in NSAComputing Aug 77 1 L R 1 -_ _---' An Early NSA Proposal for Satellite Remoting c 86-36 Gary's Colors Sep74 Glirofalo C A Gayler - AAAS 1982 Feb 82 1 Gears of the Mouth Jul 79 L a s l e y-D -- Geographic Trivia Apr 80 Glossaries versus Dictionaries Which Should It Be Feb 75 Gurin J Jan 78 Horn J E Nolte W M Apr 83 CRYPTOLOG seeu'i' Page 21 I1MHfbK YIA SQMIN F EiIlANlll3158 8IlbY 4019695 SBSRBT GQ den O fiie The Management Survey of the Philha rmon c Aug 74 Golden Oldie King Eusyb and QueenD e9di Sep 74 1 1 Golden Oldie An Unofficial Glossary of Weasel Words O ct 74 Golden Oldie Establishment of Molecule Superserie$ Feb 75 Golden Oldie SIMP Tables Junn Golden Oldie Blue Russian Nov 75 1 J F ------ Golden Oldie Hidden Losses in COMINT Production Apr 76 Gould R E Golden Oldie The Things They Say Nov 76 Miller D o E Golden Oldie Analyzation of Data Oct 77 I I 1 JL- 1 Grading The Russ ian PQE Apr 81 Graphic Analysis of Linear Recursive Sequences Dec 75 1 Graphic Names Dec '7' '6' i Ir - - 1 The Great Soviet Shipbuilding Mystery Dec 75 Williams D H A Guide to Central Infcrmation C5 Apr 75 Guidesmanship--or HOw to Write Technical Manuals Witho'll t Actual1r G iving Anything Away Nov 74 L The Gulf of TC#lklll Inc i dent Feb 75 W D L -_---' I 1 1 H flean Dpes a rata Base Need to Be Jan Human Factors Resp nsible Documentation Jun 82 1 Human Factors and Sy temsDesign An Estranged Relationship Jun17 1 1 Human Factors and the tJse of Microfiche Readers at NSA Oct SnOw D Human Factors Newsletter Jan 79 Human Factors Corner 'In Qrmation System Jan 82 Human Factors Corner Som Advtce to Users of Unfriendly System Feb 82i1 _ -_ _ 1 Human Factors Corner But What Do I Do With My Papers Feb 82 1 I Human Factors Corner Data Gatber1ng Bow Do We Spend Our Day May 82 1 1 Human Factors Corner Video Display Terminals and Vision of Workers Aug 82 L _ IHuman Factors cr er Text Edit or Oct a2 1 1 Human Factors Corne r How Do People brgctIlbe Cooperative Work Nov 82 1 Hypnosis and Self-Hypnosis inJ angua e Learning May 76 Buckley D I II EO 1 4 c P L 86-36 Help WlJnted Apr 8o 1r------- 1 and other Phantoms of the Opeqi tiOns Jan 79 1 HF -The Rebirth Jan 8 2 - '1 ----1 The Hierarchi al Clustering of Cryptanalytic I Da ta Aug16 1 o A Wls toriart L okscat SIGINT Mar 82 Filby I enry ement o V R o A Histol y 1 esscn May 82 1 1 o Hborayf or PMDs 1 liaY75dL - --- - -- - 1 loW A r'eYour tam Lna Jun 79 Fairbanks S o iliowl o Adults Learn Language Apr 76 4 I I Dec n las It Ever glen Translated Before Jul 78 1 An Idea for an Article Mar 78 MillerD E In Praise of SOLITS Nov 75 GrantL G P L In Defense of The' Indefensible Notes on the Russian PQE Feb 79 Tetrault E W In Purs it of Faster Horses Younger WOmen Older Whiskey and More Money Dec 8 1 D L '-- - - IL - ----ll -- - -- Nov 75 W L oo The NSA Inf ormation D sk 'NO C OlDllle nt 'Ii May 82 L' ' EU 4 c Initiatives in SlGINT Reporting gr '6 86-36 I I I Integrated Andysts f otAsia Aug 7 6 0 W D ' P L 86-36 Apr 83 86-36 18 ' EO 1 4 c I Remember SPELLMAN Ju 78 Salemme A J P L 8 6 - 3 6 jICe Age' and i ternatiolU lsec rity Apr The Hand Is Not Quicker Than the Eye Mar 78 1 P L I 1 H 86-36 in Golden Oldie Tr acks in the Sands of Time Apr 82 Mason F O Golden Oldie The Reality of Communications Changes Oct 82 1 1 The 1 ICollection System Jun 76 1L -_---' T nee 77 Rosenbluh ff G L Hl'l'o w ' ' lTh i n - g - s i'HaF' ' v e-- l 'a' 'n' 'g' 'e d1 Jun 76 I I How to Create A User-Unfriendly Systemi NoV 81 How to Improve Your Promotion Potential Jan 81 1 1 How to Make a Railroad Disappear Nov 76 l Golden Oldie Unidentifl ed Unit at Unknown Location Jun 78 Golden oldie On First Opening Kenney's 'Statistics' Jan 79 Mountjoy M Golden Oldie Reporting Message Volumes Jun 82 I I Golden Oldie Simplicity in Color Feb 82 1 How Do We Know It's Irue Feb 7 6 i F i lb y --V R ' How Do You Spell Peking Dec 78 ' '1_ _ -- -_ _ How do You Tell These Two Clowns Apart Jan 79 How Man African Countries Ca youspotJ l8v 1 4 c CRYPTOLOG SBSIUl'f Page 22 P L -' 86-36 lhIdiBbB VIA eeUn 'l' elt dftf M Om r 86-36 EO 1 4 c OCI D p4I-Q1BH95 Sl3eRB ' P L 86-36 IIRONHORSE A Tactical JT 1ar78 1 1 L SIGINT Sigt I I JiIP L Is A Translator a Protessionalr J i 78 1 1 Is rhere a 1 Do tor ill the H01jse $ep 77 Learned Organizations--IAI News gIS CLA is Ten Years Old eMI News J4 Learned Organizations--CLA News Ikt NeW$1 y 75 ooooooo Learned Organizations--CLA News Mt News Jul 75 if o o Learned Organizations--GLA E say WQntest GM News Dec 75 tif o ooo oo Learned Organizations--1976 CLAs 'ssayCohb st 1976 eMI Essay Contest S p 7 f Lenin and State Prizes Now You0See Them ow You Don't Jan 76 1 Leo in October Jan 76 MurphY A I Let Me Repeat--And Mak i Mysel t Perfe tly Clear Aug 77 Jenks I' Let's GiVe the Linguiats-a ltger PieceoGBP he Pie Dec 76 1 Let's Not Forget Out Crypt l gic Mission b 79 Gurin J Let's'Not Lose Our TA Skills Mar 79 1 ----' 1 C Is There Life After CertifIcation Sep 76 r 1 It's Party Time Jan 79 1_ _ _ The Joys and Frustrations of Plural-l topping Jan 78 A J S i o r - - - - --- The Joys of UNIX May 78 1 eRS Language Refterence M ldr s sr e p 11 11r '''''' d K r KITTIWAKE Jarvi SI I Io Know Your Geography Oct 78 1 Know Your Geography Feb 79 I Knowledge Resource nagement a 't ' 'IlI'N'l 'SAT' 'S ep 77 T---1 I est Learned Organizatlons--1974CLAEasay 1974 eMI Essay Contest CI lP'rizes Honors Spring 74 Aug 4 Learned Organization CISI Forms Sp IInterest GrOu mliuman Factors De Oct 75 G I I Letter From Canada Nov 76cO L ter From the Publ1sher1 Jan 79 Lut inia KRYPTOS News Dec 821' 1- - - - - - 1 KRYPTOS A New Soc ety Feb 82 LI 1 Kl SCA Fieid Management and Evaluation Oct 77 1 f V Letter c JArticle O W 74 1 Letter Article Prc74 'Anon ' ooo Letter Citizens of W r d puzzle Feb- 7S CJJ J c J G p Letter Exinterne Artfqles Feb 75 Teetaul ' E W Letter Exinterne Arttcle Apr 75 1 Lette r ProfessionalHatfon of BClokbreakers Apr75r _ Letter Artlce May 75 Letter L e ' tter May 75 Letter Letter May 75 -- ' __ Letter Letter jun 75 'Anon ' Letter Bookbreakers Professionalizatiion of Country Speciali$ts Jun 75 1 1 Letter 1 fArticle Jun 75 I - -_ _ _ Letter Typewriter Keyboard OCt 75 Letter Proud and Bitter Memories Article Mar I P16 Language and Cryptologic Library Apr 80 1 1 The Language of Beisbol in Everyday Talk Aug 74 1 I Santiago-Ortiz R A Lang u-a-ge-C-a-r-e-e-r P-an el Clarification of Nov 78 Item Feb 79 Language in the News Soap 74 I Language in the News Dec 74 - - - - - Language in the News Apr 75 Tetrault E W Language in the News Aug 75 Language in the News Language Rule Apr 76 Language in the News Aug 76 Language in the New$ Sep 76 Language Lessons Learned A Personal Memoir Oct 75 1 1 1976 Language Meetings 'and Conferences Mar 76 Language Processing ForulII No' 7 1 1 I I Language Proficiency Cert tficates for Military Persontle l Aug 79 1 - - r--_ I Language Skill fHe Oct 76 1 I 1 I The Las t Wo rd onIA'TS Ap r 77 Phillips C J Leadership A ersonal Philosophy Oct 82 1 P L 86-36 1 86-36 i 76 1 t I I Letter Proud and Bitter Memories Article Mar 76 O'Neill t Letter What Are W About Article Apr 76 ILetter Comments on Letter on What Are We About Apr 76 1 Letter Article Jun 76 Murphy A I Letter IRONHORSE Article Oct 7 66 I Letter rticle Oct 76 1 -- - -- - Lettar Cumulative Index Nov 76 Bostick C W Letter 'Firebrand' Letter onl jAt tic'le Jan 77 1 1 Letter 1 IArticle Jan 77 Kenny M M Letter Mason Article Jan7 I ____ EO 1 4 c P L 86-36 Apr'S3 CRYPTOLOG Page 23 SBElIUiT P L bB 86-36 Vi El8UHB 8lrMRfl' tS 8NtJY 'SHeRS'F 4019695 Letter Use of Term 'Compartmented' ' Jan 77 e Aug 79l Oct 79 Taylor Letter 1 1_ _ 1 Interview Mar 77 I d ation Aug 79 1 1 I 1 H L L-_----I Letter I Article Mar 77 Buckley D Letter C -LINERS Article Mar 77 'Appalled' Letter IKeyworf o SPotting Mar 77 GurinJ Letter Article Apr 77d Letter Article Apr Letter Buckley Letter Apr 771 t e t-r-a-u 1 t- E- W Letter Mason Article Apr 77 iBgucher M J Letter Mason A liticle Apr 77 -I I Letter Mason Article Apr 77 McGrlllies J R Letter Buckley Letter Jun 17 Letter c JArticle Jun 77 Letter Mason ticle Jun 77 Letter rticle Jul 77 Letter ticle Jul 77 ' - T ----- Letter tic1e Jut 77 IL - --- -- I Letter Article Ari 77 'Weeson' Letter etter Sep 77 Buckley D Letter AG-22 p ge Print Oct 77 'Reader' Letter 1 IArticle NoV 77 Snyder S S Letter salemme A o r o ticle NOV 77 o1 I Letter Sale1 lme A rticle NoV 7 774 o 1 CJa 7 n 7 i o '8 ' I Article M Ut'78 1 Letter K E D o '------- o Letter t t icle Aprj 7$ i'Fennwatcher' Letter o ' icle J ri 7 Gilbertson E A Letter o 1 o o le Jul 7 Curin J Letter L-jAr cleo Jul 78 1 I Letter i isepi- 7 a ' i 1 I Letter Gilbetts Letter PattieAr cle s p1a Buckley D Letter Salemme ic1e 'J '78 Williams D H Letter NSA-Grp t Oct 7 j I Letter NSA-Grost Oct 7 j'Filby V R ticle iUc 78 Pattie M T Letter 1 Letter Appraisa ystem N v 78 'Anon ' Letter Appraisa I1 Letter 1 I r 79 Sue' Letter Ask Art Letter Library Letter Library o J J o 1 Letter 'Sixth L age' lJun 7 P A 79 Bjorklund K Letter 1 Letter Bjorklund 79 Jul 79 I 7 N VV7 1 I I I I I I 79 Jul 79 Letter Bjorklun Buckley D _- Letter l IAr 79 Jul 79 Letter Buckley Jul 79 Aug 79 I li' ' Letter Data Stap 79 Pattie Letter Grant Ar i M T 79 Apr 79 Letter Gurin I 86-36 Letter I Bostick c W i Letter Linguatrivf Dec 78 Feb 79 Apr 83 P L 86-36 er Aug 79 Aug 79 Letter LoRo clE i Jan 82 Chauvenet --- ' Letter Stairweil I t 'o ciet Article Jan 82 L ter crYPtanrlYSf Artfc1 e Jan 82 1 _ Letter UNIX Arittd Feb 82 1L -_ 1 Letter Strange st aU at 0GBP the Month Mar 82 ILetter Murphy Letter Letter ytter I ' ' The Li erartBend$Article Mar 82 A I i A Toy Problem Mar 82 iren D J Plaint xt y 8 I I I Ucle MaY 82r-- - Letter Shell Game Article May 821 Letter Edito ial COlllll ent Jun 82 __ P A ' ' ' ' ' Letter Persortal Comp ter Article Jun 82 I I D Letter Shell Game ArBicle Jun P A 8 2 Letter Shell Game Article jun 82 J W Letter Kudos Sep 82 1 _ - _ - Letter Shell Game Article Nov 82 I J LIME-A OHIO LEEM-A eru APr 80 Salemme A J oo oo o A Linguist Looks at the Tube Mar 78 Johnson R S Linguists From The MeltGBP gPot Dec 75 Gould R E L 7Iists -- You llave an EXjert to Call Oct Linguists - We Need An rExperts Yellow Pages' Aug 75 I Linguis t Mac hine Aug 82 4 I Linguistics and the Code econstr4ctor Nov 78 Buck S H LIP Jan 80 1 I The Literary Bends Jan 82 Murphy A I Literature Search On-LineiFeb 79 rl----------- A Little P P Talk Apr 78 A Little TA Problem Nov 7 7 TI---- -- A Long Hard Look at the Intern Program-Program Philosophy Recruitment Part One Sep 74 'Exinterne' A Long Hard Look at the Intern Program-Selection and Orientation Part Two Oct 74 'Exinterne' A Long Hard Look at the Intern Program-Motivation and Morale Part Three Nov 74 'Exinterne' A Long Hard Look at the Intern Program--lVhat Happens to the Graduate Part Four Dec 74 'Exinterrte' Looking at Mr D Apr 78 I I CRYPTOLOG I- - - - I o EO 1 4 c P L 86-36 Page 24 HtI UilM5 VIA SeUINT elh1dIUHr B eUt 't aCID 4019695 EO 1 4 c P L 86-36 M chine Eo W Course for Linguists Apr 75 Tetrault NCS Offers Course-Equivalency Tests Nov 75 NCS Offers Course-Equivalency Tests Clarification Apr 76 NCS Summer Language Program Oct 79 p L 86-36 Never Again Jun 78 Gurin J ever on M Watch' Nov 7S d IJan 78 I MaC llinl' ' lntelligence--Promise or Delusion I J01 7 5 Machine-ptoduced Aid for the Linguist Part t SeV 6 Sahmme A J o Machine' ProducedAids for the Linguist Part 11 Oc t 16 Salemme A J p i lalMach1perranSlat1r Final Report Apr Maps 1 0 Mind A Phot H ssay Dec 74d _ _ _ The Marquis ana the Mediumj Jun 76 Dawson R Match Them Up Jul 77 1 1 A Matt er' of StYl e Sep 78 tL- Memorable Mell os g 79 Meteorburst Communill litions Mar 82 IL A Method for Measudi Negative Intelligence Oct 78 1 L The Micro Revolution Al thur Young Study Comment May 82 1 I Middle-Age Sp ead Apr Hi I NSA CSS Military Linguist Program Jan 80 Minnie's Mini Jun 78 KennyM M the Mission of the Signals Processing Requirements Pallel Oct 74 1 1 More about More about the NSA SI INT Summary Jun 77 Boucher M J MQre about the NSA SIGINT Summary Mar 77 New Direction for the U S Intelligence Community Aug 77 Gaddy D W The New Traffic A11alysis Glossary Aug 74 New Trends 1n the teaching of Cryptanalysis Nov 74 1 1 The New Collection Crit ria Dec 74 1 1 T e f New Wprld fomin - Are You Ready News from NCS--Agency Resumes NCS Offers Course in 'SIG1NT Oct 74 Nice Busman's Holiday for One Aug 74 Dudley B 1972-1973 A Vietnam Odyssey 1 Hiring of LICs Appreciation' NSA E ployee ' Oct 75 P L 86-36 1 No Winnie You'V tft l YrMde Down Too Feb 78 A J S 1 1 More B S Before Spellman Oct 78 1 C H -_ More Beans Feb 78 Filby V R More Comments on the AG-22 IATS Sep 76 IC J B More Fairbanks on English Apr 79 Fairbanks S More Fairbanks On EngliSh May 79 Fairbanks P L 86-36 S More Free Goodies Sep 82 1 1 Mora Than Words Can Say May 79 Gurin J More Thoughts on 'Questionable' SIGINT Oct 76 1 1 More on Squaring the Page A Crypto-TA Function Jun 75 Mason F O IOct 78 1 ----- I M u-m- rs S t l l l t h-e W-o-r d T 'T h-e ULTRAS ecret' Dec 75 1 1 Musings About the AG-22 IATSI Mar 76 Phillips C J I EO 1 4 c P L 86-36 N The Navajo Code Talkers Jun 7 Native Scripting of Languages Feb 82 laval Readiness A Basbfor Comparison Jul 79 1 1 NCS-CLA Symposium Jan 81 P L 86-36 Apr 83 CRYPTOLOG SESiHl'f Page 25 Hi iUlbE VIA eS lHI'f eHMlflFlfJS SUfJY EO 1 4 c aCIID J M9695 NSA-Grosti No 33 Apr 81 D H W No 35 Oct 81 D H W NSA-Crostic No 36 Dec 81 D H W NSA-CrQstic No 37 Jan 82 D H W NSA-Crostic No 38 Feb 82 D H W NSA-Crostic No 39 Apr 82 D H W NSA-Crostic No 40 May 82 D H W NSA-Crostic No 41 Jun 82 D H W NSA-Crostic No o 42 Aug 82 D o H W NSA-Crostic No 43 Oct 82 D H oW NSA-Crostic No o 44 Nov 82 D H W NSA-crostic No 45 Dec 82 Dawson R NSA Promotion BOards How They Work Aug 79 The Perils of Being a State Departmentlnterpreter Oct 77 o A Personal Comment on Winterbotham's 'The ULTRA Secret' Dec 75 Tlltman J H rerSQDBJ CQlDQJlter ApPlication Apr 82 NSA Crostic 1 aio 7P r 2tlcurrent CrVP t snalo Y iS 3 S o A Personal Footno te Jur n 8 2 - l JIL Plain English May 77 I _ - - - - - - - PLATFORM How D l d You Say That Works Dec 81 I I ySA'P SUPtA for Grading Translations Aug 6 EO 1 4 c EO 1 4 1 P L 86-36 An ObjectiveAP oa h to SCQ r lng Translations Mar 76 1 o J Objective Satis action Score Collect 1on Performance Nov 77 L- ''''''''''_---' An October Overlap Oct 74 L- - ' ' 1L--- Answer to An October Overla J E EO 1 4 c Odds and Ends 82 P L 86-36 OH K Apr 80 _ Is There An Old Crow Iri Your FutureZ May 82 tun J The OldL ISection Dec 74 1 Old Phone Books Never Die Mar 82 Nolte W M An Old Problem Aug 82 1 Old Russian Manuscript Ciphers Jun 77 I I An Old Timer Is One Who Nov 82 IL _ _ On Being Truthful Apr 76 Gaddy D W On Coming of Age a t NSA Conf eas ions of an Ex-Linguis t Aug 79 1 1 Going On-Line With Information Aids Dec 82 Gurin J One Day in Danans Apr 76 1 One Chance in Three --But lt Worked Oct 75 Gerhard W OPELINT Is Al f ve and W ell In B Group Nov 81 I L -_ _ Apr 75 Callimahos L D To Pull a 'Ponyal' Mar 76 --t ---' Punctuation More Than Meets The Eyg Aug 79 I dty of 75 I 1 Overheard inthe 8urnbag Line Oct 78 Overheard While Standing in the Burnbag Line Apr 82 An o v e rv i e w o _ pr o j L e c t I_ -_ _ 1 Mar 77 86-36 Apr 83 P L 86- 3 6 I Pa rtn ersin the Exciting Future of SIGINT Oct 77 Rosenblum H E i t5s ords Dec 2 The Internal I'erformance Evaluation Friend or o Foel Feb82 J I P L thlU m e--Slavo vs WesterniZfrs Noy 74 Pursuit of thel Mar E L P L 86-36 Puzzle Stinky Pinky Aug 74 EO 1 4 c Puzzle Telephone Directory ug74 Puzzle 1 IOct 74 Puzzle Secret Messages Military P L 86-36 Cryptanalytics' Dec 74 Puzzle Citizens of the Wofld Dec 74 Puzzle Crossed Cgdewords Jan 75 1 L----- e' crrouMake Out the Name Feb 75 p r-------I 1 C -- Jr------------- 79d Qral Reporttng A New Challenge for NSA Apr I Progress-I Sep 78 Project CARRIAGE Worldwj de HFDF Modernization Plan Sep 74 Webster J 8 Project HELIPAD An Epitaph May 7 1 M L -- P L 86-36 Project SYMBIOSIS Jun 75 'Anon ' Project UTENSIL The DDO Data Dictionary Directory May 78 1 1 A Proposal for Calendar Reform De c 74 Leally F T A Proposed Cure for the 'Performance Syndrome' Mar 78 L _- A Proposed Cure for the T lme-in Grade Sy ndrome NO r v 7 7 J i 1 _ _ 1 P S Feb Pa chin the Code Clerk 112 Z 1 Puzzle How Many Words in 'CRYPTOLOG' May 75 Pu zzte d Jun 75 _ Puzzle CRY-PTO-LOGrolling Aug 75 EO 1 4 c P L 86-36 CRYPTOLOG Page SflelUJ'f I 26 ero 4019695 P L cc Puzzle Match Them Up Jul 77 1LPuzzle Three Holes Feb 78 Puzzle Who 'and Whom Oct 78 11 - ---' QQestions In Search of a PQE Dec 82 I R EDL4 c P L 86-36 L - - ii r D c8 LWo E S ----l - n a li7B E tL _e_ ' ' 8-iJ ' - IJun79il_-- --_ M R RAPIDTRANC I Jul 75 Readers' Survey Mar 19 D H W Reduction Ratios in Micrographics Oct 78 Snow D Reflections and Recommendations Jan 79 Filby V R R IcttanB on a rranslator's Conference Nov J J Special Research Analysis Oct 74 F i I b xv Shootout at the SIGINT Corral Jul 79 ' L P S I A J I Review The American Magic Apr 82 Review wtia Do You Think Nov 81 1 - _ M E Revised Technical SIGINT ManuaL in Preparation Mar 77 Filby V R Right-to Left 'I ext Scr ts Are Not Impossible Aug 74 1 1 The Roads Around 1 Js Oct 79 Chauvenet L R e EW f e 7n n are o o ' W AdvisorL Rules For The Camel Corps Mar 82 IL C Run this iThrough Your Transcription Machine Ma 79 i -1 I Russian Handbook of Spoken Usage Vol 3 Jul 7'1 n P1r e r v Ofcareerparietri 6 I D r 1eW' Tn e rame of Efficiency Dec 81 Shprt SIGINT Exploitation 1990 Apr 78 r SIGINT In' The 80s TwoVi ws Jan 'I ' --- ''''''' Rich R E Lutwiniak W Russian SIGIN anduuElectronj c WaXfarei Oct 76 1 J P o L o 8 6 - -5 6 The SIGINT Users' Handbook or What'sari ISHTAR Jan 75 Oliver D B Reme iaI Software Engineering Apr 78 J F I Remember Aug 82 I I Repl acement of the GUPPY Library Feb 75 I P xercise A C aseStl ld ' in Thel I - _ ll Re-psychling the Code Clerk Jul 75 1L _ _- I Research in S eech Perception Dr Ruth Day Aug 76 Tetrault E W The Return to HF Jan 79 1 Review of 'Guide to Russ ia n-- T -e-c ' 'h 'n i c-a- l Translation' by Salemme Feb 15 IF ' '-- 86-36 _-------' iii' SecondSighftng Jan 79 'D0 foDu Y lo lIIi' _--I --- Not Secret Anymore Oct 82 LI__ _ - - - Secrets of the Altars -Th Moustfer Cryptograms Sep 741' 1 Self-Paced Instruction The Future is Now Aug 74 1 1 Semantic Voids Don't Shoot the TI snsl ator Sep 76 1 I Seminar on Translation Problems Jul 79 Senior Military Cr tolo ic Supervisor's Course Feb 78 Shell Game Apr 8 2 - -r--- ----j Shell Game Aug 82 L--I Q I --- 7 t d SIGINT Welcomes INKSTAND Jun SIGINT 1990 Part One Sep 82 SIGIN'I 1990 Part Two Oct 82 SIGINT 1990 Part Three Nov 82 Sign Language Jun 79 A Simple Cipher Story MaY 76 M y r W P loct 7g 1 4 c - S - I-e-e-p-- W e' I' I- Y o-u-r- 'S D O ' I -s-- On- '' D-u Jty Dec Pa iJ1 8 6 - 3 6 Sawyer E L 63 Days--The Soviets in Space Jan 76 1 _ I J I A Small Problem Nov 78 1 Snowballs On The Roof Oct 79 Filby V R Software - AAAS 1982 Feb 824 I SOLIS A Vehicle in Search of an Engine Jan 79d I o Some Background on the CiT Merger Mat 78 Smith F o Some Ideas about Mechanized Language orking Aids Oct 76 1 I Some Principles of Cover and DeceptiOn May 76 1 I' Some Things Never Change Jan 81 Some Thoughts on Lexicography Sep 74 Buck S H Some Thoughts on the Russian PQGBP 77 Clark G L Some Tips on Getting Promoted Dec 1'---_ _ l V C APr 78 SI WhatYou Mean Nov 81 Gaddy D W scraps from the Editor's Desk May 76 Salemme A J P L A Somewhat Larger Problem Apr 79 1 - W E Source Protection Our Agency's lrt surance Policy Jul 79 1 I P L 86-36 Apr 83 CRYPTOLOG 86-36 Page 27 Ih Y B ViA 8SUHI'F 8HMmHJ iS SUbY 86-3 OClJA lo o9 9695 P L SE8RE'P 86-36 ISQViet COMlfTand the CivHWar Sep I 78 c J rApr 80 1 J ' The Soviet General Staff Jul 78 IL- 1 1 Tr f fic i 86-36 Specialty Without Portfolio ApJ l 1 1 A Traffic Analyst Looks at Computers Apr 80 1 1 Traffic Analysis of the Future Jun 79 1 1 IFeb 78 '-T-I- - - - - - - - - - - - - ' A Soviet View of NSA May 76 1 '1- ' '1 Speaking of Logging ' Sep 77 1 1 A Spot by Any Other Name Aug 74 Filby The Stairwell Societ Oct 81 1 Feb Th e J to 'r y o T''-m' l ''l 01 '' ''''''1r ''Il IL----- A Story With a MorCi 1 May 7 L tern Aegn i iti 11 OCUmen t ' 'll lr ' r---------- --- rs 86-36 I Transcriber Analyst Relat 1Ql111' 1' Cl ' tler D E iE' L 86-36 The Transcrlp onSkiU Conce 'l'e a hing Methodologies Jul 77 L --- -- ' 'I I I Translator In Your Pocket Jan 81 1 - ' Transliteration or Cyrillic JUII 76 L-_ _ G Tribute to the Guru SepT 'Class i 32' True Base Two Tales May 32 1 1 TSS Revolution Sep82 Twenty Years of TransposItion Aug 75c J J E Typewriter Random A New Look Aug 75 V 1 t 1 The 200 -Y ar-Old Transcriber Oct 79 Tewar4s etter System Development Mar 82 Feb 79 IT EsFablishesHuman ' ' ' o 1 Resource Development Panel Sep78 'F-Vist$n The Refer ence Analyst's Medium of the rut ure Jan79 TA Hand i lidE n ofGA May 75 Mason F O TA Imp1f al ions of FGCProposal May 78 I u EO 1 4 c F L 86-36 IJun 78 1 _____ L S Uncle-a Sam Wantsa You May 78 1 The 1981 URSI XX General Ass embly- - n 'e-c-8 ' '1 - lcdcai LanJuageEXPlOftation A Lesson Learned Ocl 75 1 1 'reacher Learns a Lesson Nov 76 1 1 teaching Compute r Science To L l nguis ts Jun 79 1 1 'rechnical Supporl catalogs Oct 81 iL K J _ 1 tl--- ----- A Brief Treatiseotl Five Laws of Telephonic communications MaF 82 Nolte W M Telephone Problem Here Apr 78 1 Tell Me I'm Just a Sinoblbliophobe Jul 78 1 1 7d Sep 78 TIDE A Brief History A Time for Change reb 82 1 TIPS is Still Alive and W e1 1 o i s -e-p 'l'76 - -' 7Sjt - - - - - - Apr 83 P L v EO 1 4 c P L 86-36 A Vexing Agency-Wide Problem Octr76 Mas on F O Vich Iss R-r-right Jun 77 A J S Video Encryption A Report From EASCON 81 Jan 82 1 1 A View of the Central Computer Complex in the Late 1970s and Early 19aOs Mar 77 Phillips C J A VIP Tour through the Attic of NSOC Dec 7 1 Tool Languages Jul n Murphy J D Toujours La Pqlit esse Japanese Nov 76 Buck S H To Whom It May ConceFn Dec 78 Grant L G EO 1 4 c P L 86-36 86-36 L I Telling It Like I t Is Aug 77 Santiago-Ortiz R A TEXTA What Is It Where Is It Going Dec 81 I 1 TEXTA 'Word Seek' Nov 76 1 __ 1 TDB Ih e TEXTA Data Base Aug 74 Jackson W J TheL- JSeminar Program Sep 1 W L Thanks for Third Part oo Many Garbles Jul 1 The Uses of Elegant Engl l sh Nov 76 1_ J R 'P L The Uses of ELINT j r 75 1 _ Mar 82 ----- - Universes Galaxies Stars Bars and Other Concepts May 77 Phillips C J __--- __- UNNAJ pan 75 ---I The U -n-s-e-e-n G i o--- B -e t-w-e-e-n- - F -'eb 78 Gurin J 1 1 Oct 77 1 _ _- I 1 VORD is a Better Idea Mar 79 -1 1 The Voynich Manuscript-Third Theory Aug 75 Miller D E The Voynich Manuscript Revisited Apr 76 1 1 1 -------- ---- 1 Oct F CRYPTOLOG Page 75 1 _____ EO 1 4 c P L 86-36 28 86-36 SI l8R E'P I J 8 JIA SQUINT SIh f1l18J S euJ Y 4019695 P L 86-36 Will the Real ELINT Please Stand Up Apr 76 I A Wail A Complaint and a Melange Feb 82 Snyder S S Want to Play witrh __ The Warsaw Pact Waveguide Analysis May 76 Weapon That Helped Defeat Na z i s ---- Winterbotham's 'The ULTRA Secret' Dec 75 Filby P W Wedding Bells and That Old Gang of Mine Nov 78 Sawyer E L Well Maybe a Sniffle or two ' Feb 79 Pattie M T What Are We About Fragments Figments or What Dec 75 1 I What Ever Does 'However' ean Nov 77 I I What Ever Happ ned to COPES Jan 78 1 _ I Wll t Thou Angelina oo Jul 79 Fairbanks S The Winnah Kid Apostrophe Oct 76 Word process ing IJ 1 A4 Apr 82 J Word Seek r 78 i' - -- --__ J Work Quotas for Soviet Translators Oct 76 I ummmmJuuuuuuuuuuuuuu Translation at Arlington Station Jan 79 W hTT Japanese p L 86- 3 6 lEO 1 4 c The Yawn of the Computer Age or When Your Terminal is Terminal Jan 75 L 1 Ye Gads Another Country Trigraph System Jul I 78j Yes Don There is au ELINT Aug 76 c J W L You Can't Tell the Wheat from the Chaff Without a Program Oct 78 Curin J 1oo E What If the Linguists Disappeared Jan 77 1' ' ' '---'1 'P L I What Is a Collector Aug 74 1 What Is an Information Researcl -h An-a 'l -y-s-t Aug 77 1 1 1 What Is Cipher rext Feb 76 1 J What Is Pattern Recogrtition Dec 77 J D A What Language Problem May 76 pattie M T What Made Them Db It Language Self Study Dec 77 I I What Promotion noards Want Aug 82d __ __ What Should YO U E x pec t 01' The Analysis of Cryptanalyst$ Aug 74 1 1 What To Do About 'FANX L 'A7p'r 8 O 'I --------' What's the BestI ocatlbn fbI' the Computer Applications Fllnction Apr 76 1 I What's The Good hs s WQrd Oc L8 2 - ----- 1 What's Wrong withAG-22 1ATS May 76 1 I D R What's In a Name Pee 76 What's In a Non-Name Sep 78 1 When CensorshipBackflre Npv 7Sa I Where Do Good transcribers Come Prom May 79 ZBB What In the World Is That Ju 77 c J W E We - or6oT to haVe 0L l P i'rDl o s bSCol'ip-tlo TIove 4 'Wil l'IC cellI L I I to Where Does'Does' COMe Fro1It JUti 75 Tetrault E W Where Were We Jan7t l Iotl F O Which Number ing S s eJ lSh ul d We Use Oct 77 'Asken' o Which Tape Hasl h tnt L tig hce Project CRISELOR Jul 77 Gl 1tl j Whither the SRA Sep1 7 1r------------- 1 Who Wants A Pro 9I tqn j yway Jun 82 1 86-36 I Why Are TheseIie Harrison M A Why Can't They Bjorklund K Why Do They Lea Will It Really ling May 77 Good SR Test Dec 76 7i jlL -_ _ Apr 83 P L 86-36 CRYPTOLOG Page 29 lAS aCID 4019695 FeR eFFie IAe ISE elleY P L i he American student who spends a summer or a semester in the Soviet Union is usually quite impressed when he or she is given the cus tomary tour of the Kremlin and is told about the Soviet government It seems very similar to what one finds in the Western democracies There is a bicameral assembly called the Supreme Soviet which meets in the ultramodern DOM SOVETOV the House of Congresses The Supreme Soviet like the US Cong ress or British Parliament is bicameral in that it consists of two bodies the Soviet of Union to which representatives are apportioned by population one for every 330 000 citizens and the Soviet of Nationalities in which every political entity has a constitutionally determined number of deputies 32 for each republic 11 for each autonomous republic etc These representatives and deputies are elected by the citizens of the Soviet Union and they in joint session elect the Presidium of the Supreme Soviet which handles the Supreme Soviet's business when the body is not in session The chairman of the Presidium is very similar to the European idea of a president he has very little power but he is the official representative of the Supreme Soviet and the Chief of State PREZIDENT NOTE This article was written before Brezhnev's death but the situation is still so fluid that any statements made about Andropov might be obsolete before this article gets published ill Apr 83 Leonid Brezhnev was Chairman of the Supreme Soviet from 1977 until his death in November 1982 and his successor Yuri Andropov was quickly elected to the post See NOTE The Supreme Soviet also officially appoints the members of the Council of Ministers This is the highest executive and administrative organ in the USSR and its chairman functions in a manner similar to a European Prime Minister He is the person charged with the efficient functioning of the immense government bureaucracy and the proper coordination of the ministries sanctioned by the Soviet constitution Alexei Kosygin was the Chairman of the Council of Ministers for almost 20 years since his death the post has been filled by Nikolay Tikhonov CRYPTOLOG pO jpueTAL 86-36 tf E Page 3D eULl ero 4019695 For a simplified illustration of how the elective and appointive processes work see Figure 1 COllcil 01 Mlnisl rs Chlrmln IPnmierl Cbllroon of Mlnlstrln lid Sllle COl8llinl Secondly when the representatives and deputies do meet in solemn session it is to ratify and formally approve actions positions and appointments that have already been made by th Communist Party leadership There is no discussion or debate still less is there any introduction of new alternative items on the agenda at the behest of the representatives' constituents o Finally since the actual functions of the Supreme Soviet are so restricted its sessions are very short usually lasting only a few days Thus the actual government functions very nicely with its official legislative branch out of session about 350 days of the year Suill of MllIonllilles Sullt 01 Ualon The Soviet government in practice is shown in Figure 2 Fig Electorate Syrnbols Fig 1 - Ac ual o era ion Comraoelsl Parly I elects of the Soviet The Governnent of the USSR Theory goverr ent I 'no li es fOl S PIlI8 Sorlell 11 But there are some very fundamental differences between the actual operation of the Soviet government and the way that Western democracies function One of these differences should eventually become apparent to even the most apolitical visitor The Soviets have equipped the DOM SOVETOV with a huge stage and orchestra pit and the use the House of Congresses for ballets when the Supreme Soviet is not in session After three or four months of spectacular performances our s tudent iiiIght begin to wonder i f the Soviet congress is ever in session If he or she is in Moscow on a one-year program that curiosity would really grow for the entertainment never seems to stop for very long I I I I I r I Apr 83 CauRell 01 Mlaisllrs I I I I I I I I I I I 'I aolllnll s ' r c Unell of Milisfersl The explanation of this puzzle lies in the nature of the Supreme Soviet's deputies and their duties They are elected by the citizenry but the selection of the candidates is made by the Communist Party and those candidates are elected without opposition - Electorate -------- - - - -7' CRYPTOLOG I ---- _ J Actual control by selection of nominees Theoretical control by election or appointment Page 31 FM eFFIe I t eSE euty S P1l1l8 Sniet 4019695 It would not be fair to say that the Soviet government is a facade designed to impress foreigners for parts of it are the results of national experience that far antedated the Revolution For over a thousand years the Russians have had authoritarian governments changes when they came were decreed by the tsar not demanded by outraged citizens Representatives of the people when they appeared came to present a problem not to make a decision or demand the enforcement of some regulation Lenin's contribution to this tradition was an absolute requirement for discipline wi thin his party At the time of the Revolution this was a matter of survival Without the discipline that Lenin had inspired the Bolsheviks would have soon disintegrated into impotent bands of squabbling revolutionaries The trappings of democracy are important albeit cosmetic They provide an aura of participation in the formalities of government to the Soviet citizen without giving him any actual power or responsibility These are the jealously guarded prerogatives of the Communist Party Secretarial Polilbaro Fig 3 In theory the Communist Party structure is basically democratic with the members at all levels being elected by those under them The official apex of the Party structure is the Central Committee which had 319 full members in 1981 The administrative control of the Party's own agencies and operations is in the hands of the Secretariat and the day-to-day execution of the Central Committee's mandates is entrusted to a standing committee called the Political Bureau or the Politburo See Figure 3 In practice however the flow of power and control wi thin the Party is unidirec tional--from the top The Politburo is the apex of party control and the prime formulator of party policy It is a collegiate body containing within itself those key government officials and ministers who will actually implement its decisions It is the Politburo that introduces the legislation or changes in the Constitution that will be ratified by the Supreme Soviet And it is the Politburo which determines its own membership and that of the Secretariat The Secretariat is the most powerful administrative and executive organ in the Party Besides directing all of the Party's internal and external affairs the Secretariat also decides which Party members will stand for unopposed election to the Central Committee see Figure 4 There is little chance for serious conflict between these two bodies because many of the secretaries of the Communist Party are also members of the Politburo and traditionally the First Secretary of the Communist Party is also pri'mus inter pares on the Politburo Oddly enough it is within the Politburo that free debate and discussion can intrude The members of the Politburo can and do elect their own leader Brezhnev's forte over the years was his ability to find consensus within this group Party Congress Symbols THE COMMUNIST PARTY Brezhnev served as First Secretary of the Communist Party starting in 1970 Therein lay the source of his power for wi thin the Party he was the prime policy maker the chief executive and the ultimate nominator to party and government positions elects Theoretical structure of the Communist Party While there were policy discussions within the Politburo all of the participants follow Apr 83 CRYPTOLOG Page 32 FeR eFFIE Ilrl5 lfSIi el1l5Y aCID 4019695 the same ground rules and by the end of Brezhnev's regime most of them owed their exalted position to his influence Opposition if voiced would tend to be circumspect Furthermore once decisions were made both party instinct and self-preservation required an absolutely solid front to the rest of the world and to the party governmental structure below them As the General Secretary of the Communist Party Brezhnev did not need to negotiate Everyone nominated for a Party or governmental position whether he or she was to be appointed or go through the formality of an election fell under his purview With that much power concentrated in his hands one may wonder why Brezhnev even bothered to become PREZIDENT Indeed for may years the post was considered a dead end for careers and was used as an upper-echelon dumping ground where an old apparatchik could be deposited with many honors but no influence Brezhnev may have had some personal reasons he had the power so why shouldn't he have had the honors too However being president had other advantages especially in the area of protocol When he was only the General Secretary of the Communist Party Brezhnev had run into some awkward situations especially when visiting Western nations his only civil position was merely that of a humble delegate to the Supreme Soviet from a district of his own choosing and thus he had to go through the motions of deferring to the Premier or the 'President when one of those chiefs of government was a member of the official party As Chief of State he was able to receive 21-gun salutes and to review honor guards without encumbering himself with any onerous additional responsibilities -1 -1 Part Conaress Syr 'lbols - - - Control by selection of nominees Control by selection of policy Fig# 4 Actual operation of the Communist Party The Communist Party armed with the teachings of Marxism-Leninism determines the general perspectives of the development of society and the course of the home and foreign policy of the USSR directs the great constructive work of the Soviet people and imparts a planned systematic and theoretically sound character to their struggle for the victory of Communism PARTY CONTROL OF THE GOVERNMENT While the domination exercised by the Communist Party over a supposedly democratic society may be abhorrent to the Western mind there is no doubt about its status under Soviet law Article 6 of the Soviet Constitution states The leading and guiding force of Soviet society and the nucleus of its political system of all state and public and social organizations is the Communist Party of the Soviet Union The CPSU exists for the people and serves the people Apr 83 All Party organizations shall function within the framework of the Constitution of the USSR This is a key article in the Soviet Constitution and merits careful reading because 1 While the CPSU is defined as existing for the people and ser ing the people nowhere does it say that it is elected by or answerable to them 2 It imparts blanket authorization to the CPSU to direct all state public and social organizations with the society and to determine internal and external policy without authorizing any group or agency CRYPTOLOG Page 33 F'9ll SFF E6 Ml5 RB B SUl5Y 4019695 external to the Party to decide what should be included under these terms If the party decides that stamp collectors constitute a social organization needing party direction willy-nilly they will get that direction 3 While many admirable rights are provided for individuals and groups under this constitution the exercise and ultimate specification of these rights will be under the guidance of the Communist Party Furthermore the enforcement of these rights will be by agencies which will be under Party control There can be no doubt about the official status accorded to the Communist Party und er the constitution It has been given a license to kill The only question that remains is how it exercises this power Figure 5 shows the various echelons of Soviet government and Party organizations At first glance it would seem that we are dealing with two corresponding but separate entities but this is not so At each echelon the party exerts its power laterally to the corresponding governmental level and down to the subordinate Party organizations The Party exercises its control laterally through a combination of appointments and dual responsibilities To begin with all government officials at the upper levels are Party members and are subject to Party discipline Furthermore their appointment or nomination to elective office was authorized and approved by the Party bureau or secretariat This is the situation that obtains throughout the ministries and directorates and committees under the Council of Ministers However there are some key positions that the Party officials have appropriated for themselves resulting in one individual wearing two hats one as a Party functionary and another as a government official Leonid Brezhnev was a good example of one man riding two teams of horses he was the General Secretary of the Communist Party and the dominant member of the Politburo he was also the representative of the Bauman District in Moscow to the Soviet of Union and last but not least Chairman of the Presidium of the Supreme Soviet PREZIDENT Within the Party Andrei Gromyko is a full member of the Politburo as well as the Minister of Foreign Affairs and a member of the Council of Ministers Another such minister who is also very prominent in the Politburo is Minister of Defense Dmitri Ustinov Yet the Politburo is unique in its composition Its membership is completely open both in number and official status If the Politburo decides that someone's input is necessary or useful he will be elevated to membership at least as a candidate Its present membership includes national oblast and city officials For example Vladimir V Shcherbitskij is the Ukrainian Party Secretary Grigorij V Romanov is the First Secretary of the Leningrad Oblast party organization and Viktor V Grishin is the Moscow City First Secretary Also since the Politburo is first and foremost a standing committee of the Party a member does not have to hold a high governmental post in order to exert considerable influence We have already seen that Brezhnev's governmental post was quite humble long after he had effectively taken control of the country Similarly the late Mikhail Suslov who was in the Politburo for a quarter of a century and exerted enormous influence served for years as the chairman of an obscure commission in the Council of Union PARTY CONTROL OF THE MILITARY The Soviet military establishment appears to be similar to those of Western nations in that it is a ministry of the civilian bureaucracy I t is headed by a minister who is subordinate to the Premier and Chairman of the Council of Ministers Like all the other state public and social organizations in the Soviet Union it is under the guidance and leadership of the Communist Party a cording to the provisions of Article 6 of the Soviet Constitution However there are other historical and social factors that make the military different The party whether headed by Lenin or Stalin or Khrushchev has long realized that the military is one organized disciplined and armed organization with loyalties of its own that could be a real threat to Party control for this reason they have kept it under particularly close scrutiny and have been reluctant to put the military in policy-making positions While professional military men have been appointed Minister of Defense the only one to be allowed into the Politburo since Stalin was the late Marshal Grechko except for Marshal Zhukov who was a member for a few months after Khrushchev seized power but was quickly eased out This is also one situation where personalities can make discerning the tail from the dog Apr 83 FQR CRYPTOLOG QFFISI y Page 34 Q 4019695 difficult Dmitri Ustinov as Minister of Defense is officially answerable to the Premier Nikolaj Tikhonov But within the Politburo Ustinov outranks the Chairman of the Council of Ministers both in seniority and patronage The Soviet military differs from its western counterparts in that the Party does not have its functionaries actually running military positions or directorates They realize that such an intrusion would seriously affect operational efficiency But in other ways surveillance if not control follows the familiar pattern To begin with virtually all officers of field rank major or equivalent and above are members of the Communist Party with a significant number holding elective positions in the government and the Party This puts them under Party discipline and gives them Party obligations that ould dilute their interests and obligations As in the civilian sector there is a separate Party organization following the military structure down to company leveL See Figure 6 This constitutes a separate chain of command The man at the top Gen-Army Yepishev is accountable directly to the Politburo although he is administratively subordinate to the Minister of Defense and reports to him on the status of troop morale discipline and political work departments within the Ministry of Defense are perhaps even more confusing But most of this is simply an extension 'or refinement of what has been presented here The Soviets are remarkably consistent in this regard As this article was being written it was announced in open sources that Andrej P Kirilenko had retired from the Politburo Shortly thereafter the death of Leonid Brezhnev occurred followed by the accession to power of Yurij Andropov But the nature of the Communist Party and the way it controls Soviet society will remain constant the offices of PREZIDENT and General Secretary will not change Indeed a basic understanding of this system will be even more necessary as the survivors and their factions within the Politburo scramble for power in post-Brezhnev Russia Without this understanding you not only do not have a scorecard you don't even know the rules of the game THE THe ART'i GOVf i'fMENT Bureau Centre Committee There is always the possibility of course that the Party watchdogs might develop a cozy overly sympathetic relationship with' the objects of their scrutiny To avoid this the Party has built almost baffling layers of redundancy into its surveillance the Komsomols the local Party organizations and the military councils back up the military Party chain The Procuracy and the Party Control Committees have their own direct lines to the Politburo oooo and keeping book on how well all of them are performing are the ubiqui tous agents of the KGB Committee' for State Security If anyone anywhere in the military is doing or thinking something heretical someone will be informing the Party leadership Burelliu I ' spcH om H Vitlaqa Soviet 1 Fig 6 ParI' and Governmenl Echelons AFTERWORD CONCLUSION Much more detail would have to be added to begin describing the civil military and Party structure of the Soviet Union completely the lists of ministries and bureaus and committees and commissions in the Soviet Union and its member republics are almost endless The various commands directorates and Apr 83 The author would like to express his gratitude for the advice and assistance he received from Marc Brenner of the National Cryptologic School who read the original drafts and provided invaluable source materials and who supplied the material for Figures 1 through 4 He also read over the original manuscript prepared as a report while the author was serving as a Foreign Area Officer for the Army ITAC at FANX CRYPTOLOG Page FeR eFFie li'tC T S13 8fH J'I 35 ern 4019695 FeJR eFFrertiL ftSf eULY Organilatioil of the Iain Political Directorate of the Soviet Army md Navy MPD Chief of lhe Pa Main Potitical C mm 55ion Diteclota' tne Soviet Army and Navy 0' Bura I I Directorate for Directorate fer Directorate or Or inil'a ion l- Agitation and at1 'Wo ' Propaganda Mass ClJllural Work Direc orat Directorate for Personnel for Military Press at service military district Political Directorate Polilical Departmenl fleel and groups 01 fotces neadquartets al atmy lIolilla and military ac ad my headquarters Fig 7 O plJly Commander for Political AHairs Deputy Commander for Political A Ifiirs Apr 83 CRYPTOLOG FBR BFFlS 'z e SEi Page 36 BUM at regimental h adqu rters al baHaJ on and fower level headquarters 4019695 SPECIFYING COLOR SFOR C E RA Hies Pl b P L he user of a color graphics system is frequently faced with the need to describe or name various colors he wishes to use for CRT displays It is important for the user to be able to specify the exact hue saturation and lightness he wishes the colors to have It is ' also necessary to specify the colors in such a way that typical color graphics systems can realize and display them An article in the August issue of Communications of the ACM describes two color notation systems in general use for this purpose and contrasts them from a human factors point of view against a third system devised by the authors T Berk GBP al A Human Factors Study of Color Notation Systems for Computer Graphics Comm ACM Vol 25 No 8 August 1982 p 547 A typical color graphics system can realize up to 4 096 different colors There must be some system of description or notation however to permit the user to select and specify the color that comes closest to what he has in mind The notation system must also let him vary the parameters of a displayed color until he gets what he wants Two commonly-used color notation systems for graphics are the RGB and HLS methods The RGB system requires a user to specify a color in terms of its red green and blue primary components corresponding to intensities of the electron beams that excite red green and blue phosphors on the color CRT This means essentially that the user must describe his colors in a way closest to the internal workings of the system and farthest away from his natural cultural and linguistic ways of seeing and naming colors To make matters worse the RGB expression Apr 83 10 for a color consists of a numbers between 0 and I for 0 63 0 05 This is a very unnatural way to describe a people 86-36 triple of real instance 0 73 cumbersome and color for most The HLS system allows the user a more natural way of specifying colors in terms of hue lightness and saturation Unfortunately the mode of representation still depends on a triple of real numbers For example the same color used in the example of RGB above a shade of yellow would be shown as 0 142 0 73 0 93 in HLS What is needed is a notation that provides the user with a natural and convenient way not only of describing the color he has in mind but also of entering it into the system in some higher-level language so that it may be converted behind the scenes to the RGB-type internal representation required by the graphics system Well how do people think and talk about colors when they are NOT using color graphics In fact color names and in some cases even the number of different colors distinguished are a matter of language and custom varying among different cultures Some cultures for example do not distinguish green from blue as we do but call the whole range of hues between our green and blue by one name As English speakers we take for granted certain specific ways of describing and relating colors in a kind of color space with several dimensions along which we perceive colors to vary When we are talking to other people CRYPTOLOG 10 Page 37 peR 9PPfefkC eBB 6HtY ero 4019695 about colors we can make seof a large vocabulary of spectalized ccilor wprds like beige mauv ' or magenta orc phrases such as Kelly green or burnt umbe r As the paint salesman can testify it is hard to communicate'color changes or relationships accurately and operationally using' this set of words Make it more beige I want a kind of tanger'inish' ccilorbut more toward the gold kind of like a winter sunset But we also have another morelog ical linguistic system for color'descriptions using a small number of color names 1o7hich may be preceded by one or more adjectives e g vivid blue reddish yellow very dark purple In this system we might say Make it more reddish or Make it ligh'ter ri to describe' a change that would move a percaived color closer to a target area in our color space Berk n al have devised a third formal notation for colors the CNS system It is intentionally designed to be as close as possible to the natural English method of using color names and adjectives The CNS system is based on a color lexicon of the Inter-Society Color Council and the National Bureau of Standards ISCC-NBS The syntax of CNS is shown below with some sample color descriptions A human factors experiment a ' carried out to compare the accuracy with which people could des9ribe colors using 'the three systems RGB HLS and CNS The 37 subjects were computer cience students at the Florida International University An approximately equal number of students were taught each of the three systems and then asked to give specifications for 20 different test colors on glossy pigment samples from the Macbeth Color Checker Color Rendition Chart For each response a distance was computed measured in NBS Color Difference Units between the color on the chart and the color the student's description would generate The larger this distance turned out to be the less accurate was the description A 3x20 two-way analysis of variance found the effect of the notation system to be statistically significant p O OOl The RGB users were least accurate HLS were next and CNS were most accurate The authors note that CNS provides users with' a relatively limited choice of discrete small regions along the three dimensions of the color space while RGB and HLS provide a much larger and apparently more flexible set of choices It might be expected therefore that users would have more trouble describing color name achromatic name I chromatic name ' achromatic name lightness GRAY I BLACK I WHITE chromatic name lightness saturation hue I saturation lightness hue lightness VERY DARK I DARK I MEDIUM I LIGHT I VERY LIGHT saturation GRAYISH r MODERATE I STRONG I VIVIQ hue generic hue I halfway hue I quarterway hue generic hue RED I ORANGE I BROWN I YELLOW I GREEN I BLUE I PURPLE ' halfway hue generic hue - generic hue quarterway hue ish form generic hue ish form REDDISH I ORANGISH I BROWNISH I YELLOWISH GREENISH I BLUISH I PURPLISH Either or both lightness and saturation may be omitted and in their absence MEDIUM and VIVID are assumed Only hues which are next to each other in the list may be combined to form halfway and quarterway hues A total of 627 color desc iptions can be generated Examples achromatic DARK GRAY BLACK VERY LIGHT GRAY WHITE chromatic YELLOW YELLOW ISH-GR EEN YELLOW-GREEN MODERATE BLUE LIGHT GRAYISH RED-ORANGE Apr 83 colors accurately using CNS In fact the opposite was true Clearly the naturalness of the CNS method more than offset any lacks it might have had in power or flexibility Berk et al close their brief technical note with a summary that has wide-ranging implications for software design far beyond the limi ted area of color graphics In sum the results of this experiment confirm the importance of human factors considerations in software development In this instance it has been shown that giving a user choice from a small set of values that are carefully chosen and based on human factors principles cari produce better 'accuracy than p'roviding a much larger and apparently more flexible set of values that are not based on such principles CRYPTOLOG Page 38 aCID 4019695 i8P SSSaS mfBaA P L 86 36 --- 1 P 13 ---- A Globecom 82 meeting described a number of related projects to provide rural African villages as small as a few hundred people with modern U satellite communications The ITU International Telecommunications Union has sponsored and' coordinated a number of these projects and there have been meetings in Addis Ababa Bangkok Geneva and Pa ris in the past few years on this topic Significantly the West German Ministry of Economic Development has set aside $500 million to finance the development of African telecommunications and incidentally to create a market for German high-technology products Traffic forecasts estimate as much as 15 000 erlangs of traffic to be carried over 20 000 two-way satcom circuits An initial satellite with 12 transponders which could each carry 600 two-way voice circuits 500 erlangs of traffic per transponder could be in service in 1986 if the earth station problems could be solved An erlang is an international dimensionless unit of the average traffic intensity of a facility during a period of time normally an hour The number of erlangs is the ratio of the time during which a facility is occupied continuously or cumulatively to the time this facility is available for occupancy U If this African domsat project is carried ou it could create a major 'change in global telecommunicadons during the neict d cade ' U Because rural Africa has virtually no surplus weai th it would ordino l i1y be impossible to finance telephone links to the towns by either land line or satellite On the other hand the demand for telephone service is C Apr 83 intense in market towns the Africans will wai t in queues all day to make a call from a public phone Current telephone plant in rural Africa where 85 percent of the population lives is about 160 000 phones to serve a population of 250 million people In essence the sub-Saharan African countries can scarcely prOVide telephone service in their major cities and communications into the rural area except for sound broadcasting are generally limited and uncertain U The existence of the West German fund had plit African telecommunications in a new light because it is now possible to capitalize a large-scale project Apparently the aim of the German Government is to apply the money as part of its foreign aid program and at the same time create a market for the products and services of their very capable telecommunications manufacturers Some of the money has already been used to fund ITU studies of rural African telecommunications and if the German scheme is enacted the whole pattern of domestic intracountry African communications will undergo rapid and drastic change U Because demand-assigned single-channel voice circuits over satellite relay are favored as the best solution to rural telephony the proposed transformation would eventually connect several hundred thousand villages and towns allover sub-Saharan Africa through a satellite relay Three or four narrow spot beams 'would cover the continent from the southern edge of the Sahara to the border of South Africa Thin-route terrestrial links e g VHF s'ingle-channel radio links would connect the smallest viliages to the hamlets where the earth stations were located CRYPTOLOG Page 39 4019695 -' ' 1' 'fePS S8RE'f'UHBlb'i U The earth stations are the crucial element of the system because of the need for low cost ruggedness and extreme reliability The lack of electric power in the small towns and villages for the forseeable future is a critical factor in feasibility More than half the African population lives in tiny villages with neither transportation nor lighting Table Distribution of Rural African Population Size of Village Number of Villages o - 400 400 - 1000 1000 - 4000 4000 -10000 Total Between 10 and SO percent of the rural traffic would connect into the major cities so that the traffic content would reflect the complete infrastructure and internal activities of the countries and the wide range of languages and dialects that flourish throughout the continent Rural Communications U The problem of rural African communications has been under study by the lTU and by private interests for some time 1-10 One 0 proposed satellite would use three 7 spotbeams at 4-to-6 GHz to cover most of Africa 0 Variations on this would use one 12 beam or four 4 SO beams The narrower the beams the less power needed both in space and on the ground but satellite complexity increases The satellite which would cost $200 million would have to have high power and high sensitivity to allow the use of small cheap earth stations Some of the design ideas are very similar to concepts presented by Lusignan and his team at the Stanford University Communication Satellite Planning Center Libya and Mexico have adopted the CSPC software for their network planning The three downlink beams would operate at 4 0 GHz with 20 watts of power eirp backed off 5 dB Because of the high elevation angles the downlink rain loss would be negligible at 4 0GHz ue'f RSYh' StzIlJoS 'fe 6eU'fRA q eRS ------- Total Pop 200 700 2 500 7 000 64 million 74 88 24 ----------250 million 469 000 U Terrestrial nets already serve 160 000 phones A combination of terrestrial nets e g VHF single-channel radio links and satellite links in larger villages would be used to serve a total population of 250 000 phones The smallest Villages would have no telephones The traffic demand is estimated at 05 erlangs for the 700-person village about one 3-minute call per hour during the busy part of the day This aggregates over the thousands of villages to about 3 500 erlangs of traffic in the rural area supplemented by 10 to 50 percent additional traffic to the urban centers Traffic from the larger towns would increase this volume to about 18 000 erlangs Table Distribution of Rural Traffic Size of Village Traffic Demand Number of Total Demand Phones 50% Urban o - 400 400 - 1000 05 erlangs 106 000 1000 4000 15 106 000 38 000 4000 - 10000 50 ------- CRYPTOLOG Page q gp S6ElRSq UlfBRA 5 300 5 300 1 760 7 950 7 950 2 625 250 000 12 360 18 525 U The uplinks to the satellite would operate at 6 2 GHz with 3-meter antennas For the 3-beam system uplink power would be 0 5 watts and the antenna gain of 43 6 dB would give an earth-station eirp of 39 6 dBW Apr 83 324 000 106 000 35 380 3 503 Mean Pop 40 aCID 4019695 ' 'QP SEeRs' ' t RIBRA U B ecause the conomies and tribal relations frequently eJl tend ac'ross the arbitrary borders of Afri can nations the'rural traffic will often' be transborder traffic unless the national prTs 'pr hibit this Equipment will lhnit traffic growth ev n i f ' funding is ayailable for a typical transponder can carry only 600 two-way circuits and to' keep 'blocking below 1 percent only 500 can be used for peak traffic Another 10 circuits would be used for channel assignments and requests DAMA Demand-Assigned Multiple Access will provide geographical flexibility but a typical satelli te with 12 1 ransponders can carry only 6 000 erlangs of traffic If' such a satellite was launched in 1985-6 it would probably reach saturation in the early 1990s and a second satellite with 12 more transponders or a new satellite with 24 transponders to replace the 1986 relay would be needed The DAMA system would be centralized with centralized billing This would give the national PTTs virtually complete control of all the earth stations tariffs and interconnections There would presumably be a regional satellite operating agency serving the member nations as an Africa COMSAT ' T bl Service from 12 Transponders Size of Village 400 o400 - 1000 1000 - 4000 4000 - 10000 Number of Telephones 31 000 31 000 10 000 Number of Villages to be Connected 31 000 10 000 i 000' U This amounts to providing service to about one third of t he villages of each size above 400 people but over 300 000 smallest villages are left out of the satellite system in this initial system ' Earth Sta tions U Once a satellite is put into operation the spread and usefulness of he network depends on low-cost reliable ea rth st ations A critical parameter for the SCPC design is frequency stability in both satellite and earth stations Frequency accuracy' of one part in 10 million is required in both the space and g'round segments Because the earth station will have to operate over a wide temperature range as ' much as 500 Celsius a reference standard' 'is needed in each earth station ' The earth station must have frequency agility to tune over 800 MHz in 30-KHz steps with errors no gre ter than 400 Hz and Apr 83 liST IHlhEAS 'rBhB ' 'Q bQ Ab QR 600 Hz on the down anlt-up links Power is critical for diesel generato'rs 'are not considered a feasible p6wersou ce in remote villages the lacks of fuel' mainten'ance and skilled operators are maj or problems The earth station reliability criterion is 'that maintenance calls must be more than a year apart This is a stringent requirement but' it is primarily a technical problem The alternative would be a complex training program The difficulty 6f training operation and maintenance for any kind of telecommunication equipment and power ' supply' in rural Africa can be charac terized 'inpai't'bi- noting that with 1 700 local languages' instruc tion and advice and reference manuals of' 'cassettes would have to be translated into hundreds of di ferent 'languageso U Small two-way earth stations with 3-meter dishes currently cost more than $100 000 not including power Because terrestrial circ ii s must be conIJ ected into the earth station to serve feeder links to smaller villag s n must have' a PABX Private AUtomatic Branch Exchange o Each earth sta' tion can handle up to 10 telephone circuits i f power is available A 'difficult interface problem occurs where the earth station must connect into an existing telephone system e g in a medium-sized town because oldfashioned manually operated switchboards with R2 signaling must be interconnected to the high-technology low-power terminal ele ctronies U The advocates of 'GLODOM Global Doines tic rural satellite systems are trying to reduce earth station electronics costs to $15 000 'but even i f they succeed the total cost for 3-meter' earth stations will probably not 'go below $30 000 If the German govern- ment' does provide '$500 illion for rural Africa's telecommunications a'nd' the space seg ' ment costs $200 million ' some 10 000 earth stations could be funded in the initial phase with the remaining $300 million This would equip only 7 percent of the villages and towns of more than 400 persons but terrestrial nets could extend the coverage to many 'adjacent villages CRYPTOLOG Page 41 4019695 EO 1 4 c P L 86-36 areas by HF radio circuits with verbal descriptions of symptoms sent one way and medical advice and designations of specific treatments sent to the outstation In the African context telephony can be used to provide specific information and questions on agriculture health public health weather emergencies etc to improve health and the rural economy This type of specific information is worth the cost of the call to the farmer herdsman or sick person U Once an early bird Africasat network began to deliver services to the rural area the extension of services would probably become a significant domestic political matter in Africa and the governments would apply persuasion to other nations to get additional funding in the form of loans grants etc to extend the network At a 1980 meeting in the US one African Minister of Communications declared that telecommunications should be defined as a basic human right and the countries expect transfers of wealth and technology to provide these rights U Experience in South America has shown that once the primitive HF voice circuits are replaced by good-quality satellite voice circuits the demand for long-distance traffic expanded sixfold overnight African rural life centers around the market towns where barter trading and other vital business transactions occur Once telephone service to the larger towns and cities is available a hiding demand for telephony is likely to be unleashed which presently cannot be seen in any conventional traffic studies In a sense the lack of transport and energy in the rural areas creates a greater demand for communications--a phenomenon manifested in the wide dispersion of sound broadcasting to over 19 million radio receivers U In addition to business traffiC growth in government traffic personal traffic and public service traffic also represent hiding demands capable of explosive growth In Australia medical services are provided to remote Apr 83 lS'I' REJoEASABI E 'Fe eeN'FRAS'F8RS U An important point that has not yet been resolved in planning rural African telecommunications is even if a foreign grant capitalizes the initial plant where will the operation and maintenance monies come from In the case of potentially rich countries which have oil or mineral resources business customers and general revenues can be used to cross-subsidize the rural O M costs In the LDCs Least Developed Countries the only source of revenue is borrowing and the Western banks are becoming wary of the loans On the other hand World Bank studies have shown that telephone stations even in poor countries soon yield net revenues to the PTTs because of the value of the calls relative to other expenditures D Major telecommunications companies have been very skeptical about the business prospects for rural African satellite systems The World Bank has also been skeptical of satellites 11 The high cost of even small earth stations for conventional satellite systems has made sate oms appear a hopeless investment prospect for some of the poorest nations in Africa However the use of sensitive receivers on the satellite with narrow spot beams comes closer to making small earth stations a feasible investment More important there have now been several years of studies and conferences under ITU auspices CRYPTOLOG Page 'Pep SEeRS' mBRA 42 4019695 'fep SEl8REl'f UHBRA and the political leaders of both rich and poor nations are now thinking of telecommunications as a need which must be fulfilled by transfers from rich nations to Africa without regard to return on investment U Africa itself is becoming increasingly significant to the economies politics and strategic interests of the rich nations The section of Africa running East-West from Namibia to Swaziland known as High Africa is considered to be the Saudi Arabia of the mineral world By 1990 the US and many other advanced nations will be unable to produce steel economically unless they get manganese from Africa or the USSR Many other vital minerals e g cobalt chromium uranium will also have to be obtained from Africa The USSR and several satellite nations have spread economic and political fieldworkers into many African rural areas There are also military and trade rivalries spreading between the African nations and being imposed on Africa from other parts of the world JPYQUQ Many of these economic and political influences will be manifested in the small towns and rural areas as well as in the cities Thus there are East Germans Czechs Russians Cubans and other Soviet-bloc fieldworkers in various African countries In parts of Africa the British and French have considerable presence dating from their colonial period Revolution and guerrilla warfare also express themselves in the rural areas The continuous tension between white South Africa and the politically volatile Black African nations just northward lies not by accident along the mineral-rich area of High Africa Politics enormous potential wealth dynamic change and high strategy are woven across the continent much of which is almost unchanged by the last thousand years of history P L 86-36 EO 1 4 c e eee One of the striking features of communications in rural Africa is that almost all of Africa outside the main ci ties is inaccessible to the West As R Richter notes in her book Whose News p 241 the African governments are very reluctant to let any reporters even their own get out of the cities to see what is happening in the rural areas where most of the population lives One by-product of the Africasat is that the urban Africans would be able to find out more of what was happening outside the cities and this is apt to make the traffic content more valuable because of the dearth of other sources of information Apr 83 CRYPTOLOG l'8P S KEURA l T UlnH A 4019695 Apr 83 CRYPTOLOG Page EO 1 4 c P L 86-36 NS'F R13Mllr911rBhE 'FS 8SNTRl 8'FSR9 TSP SESRE r UUllll' 44 4019695 D The principal international languages in Africa are Arabic French English and Portuguese These would be spoken at a high level or across long distances as governmental and business languages Within Africa there are a number of lingua francas such as Hausa or Swahili which are spoken as second or third languages by millions of Africans who o rig inally learned localized vernaculars In SQuthern Africa the lingua francas are Fariagalo Tswana Lozi Dmbundu Lwena town Bemba and Nyanj a Vernaculars in the same area include the Khoisan click languages such as Kung Hiechware Kam Nama Hottentot Korana Hottentot and Bantu languages such as Zulu Xhosa Tswana Kololo and ChokweLunda 13J In Eastern Africa Swahili Canda and Amharic serve as lingua francas while Somali is the vernacular over a large area at the Horn of Africa But a dialect of Somali is used as the lingua franca between the different Somali dialects Other well-known lingua francas are Luba Cor Chiluba Kituba and Lingala in the Congo basin while the Niger-Congo family contains several dozen vernacular languages used in the s uoe area In western Central Africa Bulu Yaunde Duala Bali Ad uoawa-FuI and Sango serve as lingua francas On the West African coast Yoruba Ewe Twi Ga Mende Temne Susu and Wolof are used as lingua francas' InthewIEO 1 4 c Sudan Hausa Songhai Mosi Mandingo Ma p L 86-36 Dyula Bambara and Kangbe serve the same function Bambara for ex uople is widely used as a soldiers' language and was used by the French for military recruiting Many of the languages are known by various different names and there are different spellings and even different alphabets fo r some languages The Click Languages use various punctuation symbols such as If and to express different click sounds To summarize the language situation is very diverse and complicated and the impact of modern telecommunications will change the linguistic situation fairly rapidly Apr 83 feT REhBASABhE TQ EURiQNT 0 EURiT is CRYPTOLOC Page 45 aCID 4019695 yep Apr 83 S eR y mIB CRYPTOLOG Page 46 yep S138R13i lRlBRlt o EO 1 4 c P L 86-36 aCID 4019695 'Pep SESHE'P HlfBRA References Apr 83 tEl RflhflltSABhE 'P8 S8U rRlrS rSIU 1 Nickelson R L Appropriate Satellite Systems for Rural Telecommunications C5 1 GLOBECOM 82 Conference Record 2 Laufenberg W A Satellite Telecommunication System for Remote Areas in Africa C5 2 GLOBECOM 82 Conference Record 3 Fraser J M Interfaces in Rural Satellite Telephone Systems C5 3 GLOBECOM 82 Conference Record 4 Johannsen K G Rural SatelliteC6Illiiip L 86-36 ication System Network ConsiderationEO 1 4 Ie C5 4 GLOBECOM 82 Conference Record 5 Tustison G F An Earth Station Design for Rural Telecommunication C5 5 GLOBECOM 82 Conference Record 6 lTV Report Appropriate modern telecommunication technology for integrated rural development in Africa Geneva November 1981 7 Pierce W and N Jaquier Telecommunications artd Development general synthesis report of the lTU-DECD Project on the contribution of telecommunications to economic and social development Geneva and Paris April 1982 8 Meyer J A Digital Meteorburst Communication INTELCDN 80 Conference Record 9 CCIR Draft Report Requirements of a Rural Domestic Satellite System Question 23 4 26 June 1981 10 Space Technology and Africa OTRAG why Special Study Africa we are in Africa Dec 1977 No 76 pp 49-57 Africa Journal Ltd London ll Saunders R World Bank statement the author at INTELCON 80 Nov 1980 12 Heine B Status and Use of African Lingua Francas WeI tforum Verlag Munich 1970 13 Greenberg J H Studies in African Linguistic Classification Compass New Haven 1955 14 Leistner D Rural communications - a topical problem in communication engineering for the next decade Fernmeldtechnik Germany Vol 22 No 2 pp 51-55 l982 In German 15 eerTT Handbook Rural tions lTV Geneva 1979 CRYPTOLOG Page 47 l'6f SeeREl' lRfllRA to Telecommunica- aCID 4019695 8S1IFIBFitlTlM F L 86-36 May 83 1 CRYPTOLOG 1 Page 48 P L 86- 3 6 EO 1 4 c aCID 4019695 8StlPIBBtl'fIkt May 83 CRYPTOLOG 8SfIFIBriN'FiAfJ Page 49 RMfBt B VIA eeUHll' eHIMIUri S eu y 4019695 FeR 8FFfSIAb eS13 6NbY SOLUTION TO CRYPTIC CROSSWORD #3 ACROSS iAtencion FBIS LATIN AMERICAN REFERENCE AID U A revised guide to more than 5 000 abbreviations and acronyms that appear in the Latin American press often without axpansion has been compiled by FBIS Production Group linguists The 1983 Abbreviations and Acronyms in the Latin American Press which supercedes a smaller 1979 volume includes as new entries Nicaraguan organizations created since the Sandinista revolution and abbreviations from the English-language press of the Eastern Caribbean Alphabetical listings include the names of poli tical organizations government entities professional and labor associations and companies in 41 Latin American countries and territories The 414-page book was compiled for translators and others who read Spanish Portugueses or French but are not familiar with many of the local and regional abbreviations found in newspapers and periodicals 1 6 9 10 11 12 13 15 19 20 23 24 26 27 28 29 olfactory 01 factory pawns pa WNS formula anag nankeen Nan keen plead sample elicacy idealists idea lists icebound anag coma frantic Onani guns rev spell prurient u printer anag Dubliners dub liners nicer ni cer evident anag maidens rna I dens digit dig it renegades anag 1 offspring off spring forge double def cauldron pun called Ron ovations innovations - inn yonder Roy Ned anag panels pleasant - AT anag whetstone anag sinks double def ennobling eNNOBling asterisks freshmen reFRESHMENts bringing bRINGing wisest wISest setter Somerset terminal dread D read creed C reed 2 3 4 5 6 7 8 14 16 17 18 21 22 23 I 25 I I I I I U The reference aid was printed by the Joint Publications Research Service as publication No 83345 It is available to US Government consumers through regular acquisition channels U He came close last year but close only counts with skunks horseshoes and hand grenades I I I I I I I I I I I I I I I I Miss Oklahoma commenting on a computer expert's failure to correctly predict the Miss America of 1981 Apr 83 I I I I CRYPTOLOG Page 50 FeR eFFI6IA bl l5l3 6Nb'l aCID 4019695 NSA ftll ' 1 THE IN IJPY' 093 byl il I te P L 86-3 problem eooGBPronr-I 1 ifive percent 5% in sp ace requirements And ing NSA seems to have been the need 1 jhow about other occasions when employees need to keep pace with space develop- lto be away from their desks Walks to water ments Despite repeated efforts l Jfountains reproduction machines the powder however it is apparent that only a room and the boss's office all contribute to concerted highest priority Agencywide ini-' lowering the need for standby desks There tiative might succeed to counter our failing are also meetings planning sessions and space applications programs In anticipation coordination conferences Then there are the of such an initiative I would like to make visits to the bank the credit union the barseveral suggestions which should be studied in bershop and the drugstore These absences addressing this physical space problem Yes have been conservatively estimated to consume physical space a full nine percent 9% of the average work day On the one hand losing your desk during these absences would permit further space savPerhaps the most important hurdle that we ings On the other it might tend to foster must overcome is the traditional thinking that efficiences as employees could compete for each Agency employee is entitled to his or her d esk space by coming to work earlier and by own personal desk reserved three hundred and staying at their desks longer at a stretch sixty-five 365 days a year Let us look at the facts The average employee has twentyUp to this point the suggestions have been two 22 days of use or lose leave annually relatively straightforward So consider now This represents nine percent 9% of the work please a few of the more innovative year In addition all employees receive approaches under study throughout the Agency thirteen 13 days of sick leave annually One particularly forward-looking example equivalent to five percent 5% of the work involves the R Staff For a year now the year Thus a cumulative fourteen percent emphasis has been on recruiting people of- 14% space saving is possible by the simple shall we say --diminished stature It is approach of assigning desks on a first come quite evident that these people are' able to first served basis each day remain comfortable in less than customary space allocations Phase II of this experiOnce the logic of that solution is accepted ment in R is now about to begin We have and the procedure is implemented additional become quite conditioned in this Agency to the potential savings become almost limitless proliferation of partitions vertically dividTraining which averages around three 3 ing our space But now the R Staff is weeks per year per employee makes possible an embarking upon a new era involving the horadditional six percent 6% space savings izontal division of space That's right a while TDY travel' absences contribute another single floor will have platforms installed so four percent 4% on average that in effect it can serve as two 2 floors of space This will permit desks to be But why stop there Making desks available effectively stacked two 2 high -bunk desks on a first come first served basis at all you might say Theoretically this could times during each day permits even more space yield a fifty percent 50% space saving savings while encouraging efficiencies Take although present implementation goals call for lunch and coffee breaks for example a more modest thirty percent 30% saving in Staggering these events which total almost the first fiscal year Interestingly ' there one 1 hour per day can save an additional he ng1e SPACE AG EM Apr 83 CRYPTOLOG Page FeR eFFISlxlb ijSE QSbJPY 51 aCID 4019695 F8R 8FFl811m g6E 8NCY would be no problem with GSA space-peremployee standards which are expressed in terms of square feet rather than the more telling cubic feet measure Thus far the only negative effect of this experiment has been the dismal record of the R Staff basketball team The T Organization is also embarking on its own innovative experiment to solve the space problem Soon the so-familiar gray and black phones that adorn almost every desk will disappear Replacing them will be a limited number of phonebooths strategically but sparingly placed in work areas The estimated benefits are several First security will be improved because of the privacy inherent in a closed booth Complementary to and concomitant with this benefit the noise level in the office environment will be reduced Second since there will be no seats in the booths and since there will be queues of fellow employees waiting to use the phones telephone conversations will be limited to essentials Third-and this relates to the earlier initiative of first come first served desks--it will free up more office space as employees using phones would have to abandon their desk space Latest operations research studies indicate that the average Agency employee now spends fully twelve percent 12% of effective worktime on the telephone The Operations and the Installations and Logistics organizations are not standing still in the face of this space challenge either Everyone realizes that there is quite a bit of wasted open space between the Headquarters Building and the Operations Building Well in a cooperative endeavor L will drape an inflatable roof over the area after walling up the two openings on either side of Gatehouse 1 One The Operations organization will do its part by channeling unused electrons from collection efforts into the area In much the same way that hot air currents are used to sustain the roof of the Hubert H Humphrey stadium dome aptly named after a politician our roof will be sustained by the continuous flood of these returning electrical currents After proper subdivision and incorporation of some of the stacking and bunk desk technology developed by R this initiative will yield a twenty percent 20% space bonus To their cre'dit however the L Organization will not stop there Careful surveys on restroom usage indicate a significantly wasteful amount of space has been allocated needlessly Applying standards pioneered at the Capitol Center during rock concert sellouts L has mapped out a plan to convert eventy-five percent 75% of these underused areas into office space although in a less than optimal manner Patterned on the children's game musical chairs it involves periodic reorganization and relocation of functions and personnel By a coordinated continuation of these activities fully ten percent 10% of the work force can be kept literally without an assigned office space as desks and support equipments sit in moving trucks on loading docks or in hallways A side benefit of this action incidentally is improved security through drastic records reduction Personnel required to move would have an incentive to clean out desks and purge old records files and tapes In addition movers would be instructed to lose at least two 2 bo es per move instead of their current quota of only one 1 box per move Of course this then frees up even more space It goes almost without mention that all records are being reduced to either microfiche or electrical impulses on storage media We still won't ever be able to put our hands on the information we need but at least our records will take up thirty percent 30% less space in the process of remaining functionally useless And naturally the advances of space-age electronics will help solve our physical space problems too In twenty-five 25 years a computing capability that once filled a whole room is now housed in a one-by-threeinch 1-by-3 box As these size reductions continue our only problem will be in finding operators small enough to use the devices There are many other ideas under study such as using a lazy Susan office configuration to eliminate all need for walkways substituting writing stands for desks and placing benches along main corridors Also being considered is resorting to a multi-shift operation where all staffs wi Ll work mids Staffs seem to operate in the dark anyway and they'll have little more than each other to bother at that hour This and the other of the more experimental considerations may very well find their way into use in the near future ' But for now if you have kept careful track you noticed that the Agency has proven techniques to effect a ninety-seven percent 97% space reduction already The remaining three percent 3% of the space that we will continue to need is roughly equivalent to the first floor of Operations Building One 1 We sha11 '- therefore r etain direct use of that space The rest will be sublet to those unfortunate Federal agencies and departments that still have not entered the Space Age So get ready to stretch out in plush surroundings and be thankful that once again your every need will soon be satisfied The next space-saving innovation is already being prac ticed throughout the whole Agency Apr 83 CRYPTOLOG Page 52 DOCID 4019695 by Marian D Librarian BOOK REVIEW FRONTIER DENTIST by Phil N Drill The story of Doctor Perry O'Dontics 18261851 a young graduate of the Painless Parker School of Dentistry who went west with the 49-ers and performed the first extraction in the territory of California The book describes the problems that he encountered especially that of ministering to unwilling prospectors who were afraid that he'd steal their gold while they were under anesthesia How he won their confidence and trust could serve as an example to SIGINT managers dealing with other agencies that have a certain distrust of NSA and its product The description of how the doctor improvised when he ran out of dental floss making his own out of buffalo entrails could also serve as an example to field station managers in remote sites I am reminded of the commander of USM 9999 in a small town in the Italian Alps who kept requesting telephone wire from headquarters so that he could do his job better finally using Apr 83 14 tons of spaghetti made by the women of the nearest village This worked fine for about two weeks but as luck would have it shortly thereafter the migrating season of the pasta birds began and as they flew over his station they ate the spaghetti forcing him to improvise using bird entrails instead of wire It was interesting to see how the doctor even persuaded some of the miners and prospectors to give up some of their gold dust to be used as fillings for their cavities In fact it was Dr Perry O'Dontics who coined the phrase There's gold in them thar fills The last chapter of the book describing the problems that arose when another dentist Dr Yank Molarz moved into the camps and took away some of Dr O'Dontics' patients reminded me of some incidents during World War II when SIGINT organization from Army and Navy uni'ts that happened to be in the same general area fought over the same intercept and the intelligence derived from that intercept The fact that the competition ended in the early death of Perry O'Dontics should serve as a lesson to units that indulge in internecine conflict especially since there were enough teeth in the California for both dentists CRYPTOLOG PeR epPfef L S Page 53 ONEi 4019695 BOOK REVI EW MAN DOES NOT LIVE BY MATZOS ALONE The Story of the Manischewitz Kosher Foods Family and Their Company by I Nasch The Manischewitz empire is so vast today that it's hard to believe that it once consisted of only Moishe Manischewitz a humble baker in 18th-century Oyvey Germany and his two sons Matthew and Mark But it's true and this book traces the history of the company through the generations showing how the same basic techniques that old Moishe used with his family have been aintained through the centuries Some of these techniques could serve as models for SIGINT managers--especially if the Agency expands in the future There are other similarities that can be pointed out I t is worth noting that old Moishe ManischeWitz and all his successors have had to comply wi th two sets of laws those of the country in which they work and the rules governfng kosher foods often more stringent than national The way that Moishe indoctrinated his sons and later some of the other young men of the village could serve as a model for the NSA intern program Apr 83 Although for generations the company specialized only in matzos the flat unleavened bread traditionally eaten by Jews at Passover it is interesting to note that Moishe's grandson Luke introduced diversification into the line with non-Passover foods overcoming the objections of many members of the family including his own grandmother Goldie Moishe's widow This reminds me of the situation just before World War II when NSA's predecessor decided to try intercepting types of traffic other than Morse code much to the despair of old-timers who insisted that the time and effort needed to intercept printer and voice would be prohibitive and would detract from the effort being devoted to Morse Oddly enough a generation later when some of the other products that Luke introduced proved to be money-makers Luke's son Manny suggested that the company specialize in them and drop matzos from their line Many of the members of the family protested this just as there have always been SIGINT people who propose that we stop worrying about Morse code and devote our efforts to other means of communication but time has shown that there is a need for both the old products and the new just as NSA has been extracting intelligence from Morse and the newer varieties of transmission o CRYPTOLOG Page 54 F9ll 8FFISJdrJ IJ86 811hY aCID 4019695 FeR eFFle bitt eSE eu tt MYSTAFEIt Comfort oy t EBULON ILCH' Act I Scene 1 Place The inner sanctum of the Secretary of Defense in the Pentagon Time A few decades hence on the morning of 17 April Excuse me Sir Here's that staff study you ordered said the young lady as she dropped a pile of paper on the desk of Warren Piece the Secretary of Defense Holy Mackerel shouted the Secretary except that he used a mUCh stronger term as he scanned the document Do you realize what your statistics show For each soldier sailor airman and Marine in the armed forces we have 28 civilian staffers in Defense Department agencies That's preposterous We don't need more than 10 or 12 staffers per combatant I'll issue an order at once cutting down on the number of staff personnel Miss Spelle take a directive Act I Scene 2 Place The inner sanctum of the Director of NSA Time Same year a week or two later I wouldn't have called this meeting unless I thought it was urgent said Admiral T V SeCt Director NSA Chief CSS to a gathering of Chiefs of key components and this memo from SecDef is just that He s highly annoyed except DIRNSA used a more picturesque expression about the number of staffs in DoD What's even worse is he singles out NSA CSS as one of the worst offenders For every person we have actively engaged in collec ting decrypting and translating messages we have 37 people engaged in staffwork That's way above the Department average of 28 So we've got to cut down on the number of staffs and staffniks in the Agency oooo and we've got to do it ASAPl There was a simultaneous nodding of every single head belonging to a key component chief KGG but none of them said anything Each one mentally recounted the number of individual staffs in his particular bailiwick mentally tabulated the number of individuals on each of them recounted the types of studies they prepared recalled the number of times that a well-staffed background study had saved his or her the KCC's neck and came to the realization that removing even one staffnik would be tantamount to excising his or her the KCC's own appendix without an anesthetic Finally 'Hugh S Essar the Chief of A Group spoke up Sir I can well understand the SecDef's feeling and I can agree with him that there are a number of DoD agencies where the number of staffniks is out of proportion to the amount of work they perform But I venture to say that at NSA CSS such is not the case The reason that'NSA carries out its mission so well is that no precipitate actions are taken without proper in-dept background studies of the causes and effects of all sorts of actions and activities Speaking in behalf of myself and the organization I head I can confidently state Sir that 1 cannot ' absolutely notl--dispense with even one of the hard-working loyal members of any of the staffs in A Group 1 feel the same way about my sta ffn i ks said DeFarr East Chief of B Group Because Apr 83 CRYPTOLOG Pag e 55 4019695 FeR 8FfieI r of the multiplicity of tasks assigned to our organization and the impossibility of any supervisor except the Group Chief knowing the details of all of them it is essential-absolutely essential --for B Group to maintain all of the staffs it has at present I can wholeheartedly agree with the remarks of my colleagues said AI Lowe Chief of G Group Everything they have said is equally true of my organization only more so Why my Group has a greater variety of targets crypt systems report series and product issued than their groups combined according to a recent study by a G Group staff Without trying to disparage the other KCCs' organizations I would say that proper staffing is the major cause of G Group's outstanding reputation Let's not forget the need of adequate staffwork in the maintenance of a proper educational system chimed in Reed N Wrighton Commandant of the NCS I recently receiveci a staff study that shows that for every person in E who is actually involved in teaching classes we have only 16 individuals engaged in the necessary background staffwork Since this figure is considerably below the DoD average--and even farther below the Agency average--I lo'ould be loath and reluctant to dispense with any of my staffs And so it went around the table as each KCC fn order from the Chief of A Group down to the Chief of Y Group defended the need for his or her staffniks and expressed a deepseated unwillingness to give up any devoted staffniks I was afraid that this would happen said DIRNSA but we have no choice SecDef has said that we must cut down on the number of staffs and staffers so cut we must Accordingly since none of you will bite the blankety-blank bullet yourselves I must take the following action I am this day establishing a new organization to eliminate unnecessary staffs--and I'm sure that there must be one or two unnecessary ones in a large organization like this--in NSA Since we have used up all of the letters of the alphabet through Y this new body will be called the Z Staff and i t will report directly to me oooo and I hasten to add that in order to avoid incurring SecDef's wrath I'll be quite ready to concur with most of its recommendations for eliminations To head this new entity I am appointing Frank N Stein my Chief of Staff as the Chief of Z He will head an organization made up of one staff person from each key com ponent whom he will personally select to help him in his work Meeting dismissed Apr 83 ass 8UU Act II Scene 1 Time Two or three weeks later give or take a fortnight or two Place The inner sanctum of Z Group on the Ninth Floor of the NSA Building Frank N Stein called the first meeting of his Z Staff to outline their duties and work out their modus operandi Before we can eliminate any staffs we have to know where they are Because of your backgrounds you men and women--but mostly men --are in a position to know just what staffs exist in each agency key component Now I know there will be a lot of loyalty in each of you to protect some of your buddies back in A or G or K or Q but let me remind you all that you are now members of Z Henceforth your only loyalty is to the Z Staff not to be confused with The A Team Don't forget by eliminating your old job you are making your own future more secure But I've been a staffnik for years remarked Conn Currence If I eliminate my job back in C Group what else can I do after we finish this project The nice part about the Z Staff's missian replied Stein who like a good staffnik always spoke in memorandum format is that l we' 11 be inves tiga ting all facets 0 f the Agency so a good Z operative can eliminate the positions of certain key individuals without necessarily doing away with the staff functions performed by those persons so that when and or if Z Group's mission is ever completed there will most likely be a need for a trained staffer to perform that job 2 SecDef's anti-staffing memo does not-repeat not--set any deadline for the reduction of staffs so we don't have any short fuses to worry about 3 DIRNSA's directive establishing Z Group is likewise without any time constraints so if we budget our man-hours properly we can conceivably make a lifetime project out of this study maintaining of course that an in-depth analysis of this sort can' lot be rushed That's a relief said Currence but won't somebody get angry if we don't get rid of some staffs Several other Z-niks nodded and said Yeah won't they I didn't say that we don't do anything replied Stein I just said that we mustn't rush things I think our motto should be CRYPTOLOG Page 56 aCID 4019695 'with all due and deliberate ' speed' which sounds like it means something but is vague enough so that no one r'eally sure just what' it does mean I also propose that we 'organize our' work alphabetically devoting our first efforts to A Group which ought to take us quite a long time Then we can work on B Group ahd so on until recently' ' Because of their vast' experience in A' Group they should be of great'i assistance in helping us find positions to elimitiate and well-trained individuals to 'help us in out deliberations Maybe we ought to do a' staff study on this arid consider all the alternatives Chief suggested Sam Urai a former' B Gro'up staffer The roar of voices seconding this recommendation was deafening so Stein gave them four weeks to concretize their feelings and put their recommendations in iting during which a new President is elected' and consequently a new Secretary of Defense moves into the Pentagon Since his Chief had been elected on a program to eliminate waste in government he' heartily' endor'ses his predecessor's anti-staffnik directive The new Director of NSA CSS General AI Arm inspired by the Secretary's statement orders across-the-board promotions for all'members' of his staff-cutting staff Act II Scene 2 INTERMISSION Place Same Time ' At least two months later ' I've called this meeting today declaimed Frank N Stein to report on my findings with respect to your recommendations about 'the method for Z Group's operation to proceed I have read over the staff studies submitted by each of you and I must 'say that I am thoroughly convinced that I have selected a fine 'bunch of men and women to' constitut'e the ZStaff Your comments about my suggestion to proceed through NSA alphabetically by organiza tional designator ranged from total agreement to absolute disagreement each duly supported by impeccably logical reasoning often drawing completely opposite 'conclusions from the same data 'and there were a few of'them that I've read and reread several times and still can't figure out whose side they're on Excellent work Z Staffers Accordingly we will'now go ahead with our work proceeding alphabetically by organization designator Our first target will be A Group and 'our mission is to eliminate as many staff positions as possible Act II Scene 3 Place Same Time 'Over a year later Well Z' Staff said -Frank 'No' -Stein we seem to be making progress in our analysis of A Group 'To date we have discovered three staff jobs that can be eliminated but we seem to be encountering resistance from many agency employees which is making our job harder Accordingly I have today requested that the Director authorize the 'expansion of the Z ' Staff by at least a doz'Em billets and I am' happy to say that he concurred without even recommending a study I'd like to introduce the first three new members of this staff all of whom 'formerly worked on A Group staffs Act III Scene 1 Place The Friedman Auditorium NSA' Time Over a year later ' I've had to' 'call this meeting of the Z Staff here because there are just too many of us to sit around the office and 'report on our progress said Frarik N Stein happily ''We' have been having 'great 'success with eliminating the staffs in A Group Fortunately the chiefs of other key components have seen that we mean business so they have voluntarily reduced the number of staffs within 'their organizations which makes our task somewhat easier Some of them have appointed an alarming number of Special Personal ASsistants' for specialized functions and some of these SPAs have Special Assistants of their own to help them A special six-month Z Group staff study has definitely determined that these Special Assistants do not technically constitute staffs and therefore we don't have to' eliminate them We've also been' fortunate in having a number of qual1 fied staffers who fearing' that their jobs might 'be done away with ' have' volunteered to serve on the Z Staff Our' numbers have increased greatly and this has enabled us t'o complete our functions' in A Group So today we can start the task of eliminiiting the staffs in B Group I wish you as much success in your labors there as we have had in A Group n As many of you know I have been eligible for retirement for several months now but I couldn't leave Z Group uritil we had achieved our first important milestone and the elimination of A Group's staffs is that milestone ' Accordingly in' addition to the news about A Group there are three' other reasons for' this meeting Apr 83 CRYPTOLOG Page 57 aCID 4019695 1 FSR SFFi8IAJ J aSE SNJ ll To formally announce my retirement from government service the National Security Agency and regrettably from Z Group where I have made so many friends and accomplished so much 2 To introduce my successor the new Chief of Z Gilbert O'Teen and hope that you'll give Gil the same support and backing that you gave me during my tenure as Chief and 3 To announce that although I am officially retiring I have been persuaded to continue working with Z Staff as a Retired Annuitant so I'll still be available for consultation advice concurrence and consultation I will be as the saying goes 'Forgotten but not gone ' Young Gil O'Teen the new Chief spoke briefly urging the members of Z Staff to continue their dogged pursuit of unnecessary staff positions throughout the other components of the Agency and announced that since there were so many members of the organization he was appointing several Special Personal Assistants to help him with the day-today management and paperwork of Z Several of the people he named were individuals who were not previously Z-niks ANOTHER INTERMISSION during which young Gil O'Teen matured and Z Staff continued to grow and to eliminate staffs from other Agency components ACT IV Scene 1 Place The Baltimore Civic Center Time Several years later groups E through T got the message and readily eliminated staffs and staffers with the help of Z Group We discovered that IT Group had no staffs for us to eliminate but V W and X Groups did However with all the experience we had gained in our earlier efforts we had little trouble eliminating their excess staffniks Today we have gathered all 900 members of Z Group to celebrate the removal of the last vestige of staffs from Y Group I have here in my hand the document for the DIRNSA's signature and subsequent submission to SecDef announcing the removal of all the staffs from NSA CSS except for the Z Staff which is charged with seeing that the scourge of staffs does not again arise in the Agency Now we can all breathe happier in the knowledge that our collectors processors analysts reporters and linguists are doing their jobs as they are supposed without the heavy financial burden of paying so many staffniks oooooo and Z Group will continue to see that the Agency does not slip back into its previous staff-ridden days Keep up the good work members of Z Staff ACT IV Scene 2 Place The Office of the Secretary of Defense Time One Month After the Previous Scene The Secretary of Defense commends General Anne S Thesia because NSA CSS is the first DoD agency to cut its number of staffniks so sincerely He promotes General Thesia making her the Army's first 6-star general and appoints a staff to examine how NSA CSS did such a thorough job so that recommendations can be made to other agencies THE END Gil O'Teen a bit gray at the temples has called a meeting of the Z Staff to congratulate them on their great accomplishments in eliminating staffs from assorted Agency elements He is telling them It seems like only yesterday when we started to root out the grOWing 'staff infection' that was affecting our beloved Department of Defense I can still recall vividly the opposition that we received when we started working on A Group's excess staffers opposition that continued on through Band C groups We had to tread delicately with D because there was some fear that the Director might retaliate but fortunately the General was a firm believer in Special Personal Assistants to the Director and Z Group was able to convince him to appoint a few more--I don't think that 427 SPADs is too many for an important individual like DIRNSA When General Arm was replaced by our first female Director General Anne S Thesia she managed to cut the number down to 399 SPADs but has no staffs to speak of The other Apr 83 CRYPTOLOG Page 58 F6ll 6FFie 1M aSIiJ 61H 'l 4019695 FeR eFF'IElVm BSB BltJ Y bY'Dickson Airy' Itl CHESLEY Term chesley verb Meaning to get out of a difficult situation by convincing others that you are a victim of circumstance whether you really are or not Background G V R Ches ley was un til recently a venerable analyst for a major production group of the National Security Agency his 30-year award testified to his inestimable value However it is not for that value that he is remembered as inestimable as it was This account as useful as it is leaves questions unanswered What was the role of the Stairway Society see CRYPTOLOG October 1981 in this affair Could they have been a hidden factor in these events Curiously there is no surviving record of what G V R stood for all his co-workers remember are the initials No one can recall every hearing what they stood for or why Chesley never used his full name Perhaps some kind reader could shed some light on these details for the sake of historical accuracy Chesley was in the process of being disciplined by his supervisor Hardin Tuff for being absent from his desk for four hours Chesley claimed at the time that he was on the sixth floor taking care of some personnel business as he came back down in the elevator he found that the crush of oncoming passengers prevented his getting off at the first floor He rode the elevator up and down up and down up and down up and down for several hours each time being prevented from getting out at the first floor by incoming passengers At last he grew faint and his paleness attracted the attention of several other passengers who successfully extricated him from the elevator car with a variation of the flying wedge Apr 83 Some people have such an impact upon those around them that their name passes into the language as a word of common usage Bloomer Boycott Mae West McAdam etc have all been memorialized in this way There ar e many NSA people who have done things worthy of being memorialized and their names have already become part of our day-to-day vocabulary We believe that some note should be taken of these people and their contributions and therefore we encourage our readers to share their stories about word-worthy coworkers We offer here the story of one of our fellow laborers although he is no longer wi th us his name lives on in our midst Tuff expressed disbelief and suggested that he could have gotten off at another floor and walked down Chesley produced a letter from a physician indicating that he was allergic to the paint used in the stairwells When Tuff challenged the authenticity of the letter protracted and emotional discussions ensued Feeling the need for onsite demonstrations both men went to the stairwell where Chesley began to sneeze violently This startled his supervisor who fell down the stairs breaking his left leg and arm whereupon Tuff applied for and was granted retirement on the grounds of disability Chesley's new supervisor AI B Careful who turned out to be deathly afraid of germs and therefore of being sneezed upon reviewed the case and decided to drop the charges CRYPTOLOG Page S9 PeR 8PPJ ev c BSE Bt J V aCID 4019695 FeR SFFleIAf HSE SUM NSA C ROSTIC No 46 by dhw 86-36 ThM M a b ed Aplt-U Fool ' Da y paz z-te So-tveJr J may be iU-6U Le d howe veA thcU theAe u rw tlU -c k elty wha t6 0 ev eA -l-n anfj 0 tl the de MlUtio Yl 6 ' Apr 83 CRYPTOLOG Page 60 FeR eFFISIfttJ HSE sm aCID 4019695 - P L Apr 83 Pi-Aug 83-83-33453 86-36 CRYPTOLOG Page FeR eFFISIz'l - t JSE SUhY 61 OCI9nD4k t 2-ii e--- 7 ---------------- - CJ- - - - II IIIS BOeUMFJNCf eO Cf o lNS eOBFJWORB MlifERIAb This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu