W DUUWW D11 U0WU l lBl JWUU DlBl WlB 30W 3 OO 3 3 f OO W l1UlW fBm IJU Jl1 Jrn APRIL 1985 1 FINDING A ROME FOR AFSA 1949-1952 U l 1 1 SUPPORT TO LANGUAGE ON THE ASTW U oooooooo oo ooo 3 BULLETIN BOARD U 4 A UNIQUE HUMINT ORGANIZATION U oooooooooooooo '1 9 I 5 IMPROVING LIFE WITR AN ASTW U 7 o oo AN THERE WE WERE U 9 GOLDEN OLDIE ' U ooooooooooooooooooooooooooooooooooooo oooooooooooooooo oooooo 10 Nf3A-CROSTIC NO 61 U oooooooooooooooooooooooooo D R W oooooooooooooooooooooo 12 lIAUDLe ViA eOMUl' P eIIA lHBL8 OP'lLY ebASSIFlEiB BY NSA eSSH 123 2 eclassified and Approved for Release by NSA and DIA on 10-16-2012 pursuant to E G 13526 ase #54778 MDR e-Efti' a- aCID 4019702 Published by P1 Techniques and Standards VOL XII No 4 April 1985 IL - PUBLISHER _ BOARD OF EDITORS Editor J 963-ttQ 1 Ip L Collection I 963 58 1 Computer Security 1 968-814-11 Computer Systems I 961-t103 Cryptanalysis 1 963-4 740 Cryptolinguistics 963-4704 Index 1 96 iS330 Information Science 9 6 $-1145 Intelligence Research 1 963 3095 Language 1 963-5'151 Linguistics 963-3896 Mathematics 1 96 -5655 Puzzles David H William J96 3 1103 1 963-4423 Science and Technology Special Research Vera R Filby 968-8014 Traffic Analysis Robert J Hanyok 963-3888 1 Illustrator Distribution ' ' L - 963-3057 C 963-3369 To submit articles or letters by mail send to Editor CRYPTOLOG Pl If you used a word processor please include the mag card floppy or diskette along with your hard copy with a notation as to what equipment and what software you used via PlATFORM mail send to cryptolg at barlc05 bar-one-c-zero-five note no '0' in 'log' Always include your full name organization and secure phone number 86-36 P L 86-36 Many years ago P16 was issued an experimental model of a manual typewriter to try out But before it could go into production it was overtaken by another technical advance - the electric typewriter with changeable golf ball fonts anda correcting ribbon We still have that manual typewriter It has come in handy during our many moves for we usually arrive at our new place before the electricians can do their thing And it's more than a simple back-up to an impressive array of word processors Among the many use ul features is the provision for adjusting spacing whIch makes it ideal for filling out formS It's better for that chore than any other machine around Best of all it's just the thing for writing first drafts It's as good as a sharp #1 pencil on a yellow pad and faster Moreover there's something about the configuration of the machine and its neat design that compels clarity of thought and precision in the use of words A similar kind of technical advance has affected CRYPTOLOG The Xerox Star has come along with some desirable features that make it especially appropriate for a periodical The principal ones are the large variety of font styles and sizes automatic paper feed and graphICS No longer will we have to cut and paste because only one font of the two available can be printed at a time And no longer will we have to feed in single sheets by hand ever so carefully one at a time The we in this case has beenl Ito whom warmest thanks are due for continuing support to CRYPTOLOG in many important ways not apparent to readers As you might guess in leaving BARDOLPH and the UNIX editor we will be doing without a nice feature or two Alas we ' I be without automatic hyphenation and a spef check And so back to ragged rights just like the earlier issues of CRYPTOLOG which were typed For Subscriptions or Change of Address send name and organization to P14 I P L I 86-36 Contents of CRYPTOLOG should not be reproduced or further disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor FOR OFFIGIAf us O ff Y aCID 4019702 CONFIBEN'fIAL FINDING A HOME FOR AFSA 1949-1952 or Why We Don't Have Bluegrass in Front ofthe Building and Mint Juleps in the Dining Parlour '--- 1Q42 P L 86-36 Although the who and when questions about the decision to locate NSA's predecessor the Armed Forces Security Agency AFSA at Fort Meade are generally known the why and how are somewhat vague This account of the decision is based entirely on minutes ofthe meetings ofthe AFSA Council CAFSAC from 1949 through 1952 The question oflocation was a priority agenda item for AFSAC as early as the Council's initial meeting in July 1949 At that time AFSA was operating in run-down buildings at Arlington Hall Station CAHS There were really two questions -- where to locate AFSA's permanent headquarters and what to do about AHS in the meantime In the fall of 1949 the Army was prepared to release $12 million for a new building at AHS but some AFSAC members dissatisfied with the existing location feared that taking money for new construction or rehabilitation there would jeopardize funding for future new construction elsewhere At the January 1950 meeting Army Assistant Chief of Staff for Intelligence Major General Irwin reported that rehabilitating AHS to reasonable standards offire and structural safety would cost $2 5 million including air conditioning considered necessary in order not to disrupt vitally important work during the summer months The estimate for a new building there was $9 5 million and General Irwin expressed the hope that the $7 million difference could be allocated for building a new headquarters away from Washington The January session produced the following consensus No new April 1985 construction should be requested for COMINT activities in the Washington area at this time This should not operate to prevent the rehabilitation and maintenance of existing structures recognized to be necessary An operational cryptologic nucleus should be established at a site outside the Washington area as soon as possible In discussing whether or not to leave any functions in the Washington area Army Security Agency Director Brigadier General Clarke stated his belief that there would be no need for any activity in the Washington area except for liaison and dissemination The meeting ended with the Council agreeing to leave the determination of the character of the cryptologic unit remaining in Washington to the future while concentrating on establishing the new headquarters away from Washington At the April 1950 AFSAC meeting each service was asked to nominate one representative to an ad hoc Site Selection Board which was to recommend a location for the new headquarters The main motive for moving away from Washington was of course the fear that Washington would be a primary target in a nuclear war Although little was known at the time about Soviet delivery capability the shock from the first Soviet nuclear test in September 1949 was still reverberating through the corridors of the Pentagon The Site Board's task was to find a location far enough away from Washington for safety but not so far away as to make coordination difficult The Board's rather voluminous report AFSAC 59 6 was delivered to the members at the November 1950 meeting As recommended locations close to Washington the Board had listed Fort Belvoir Fort Holabird Fort CRYPTOLOG page CONFI9ENTIAL ero 4019702 CQ NFIBEN'fI2tL Meade and Andrews Air Force Base AFB Thirty-two other sites primarily military bases and arsenals were listed in Colorado Georgia Indiana Kentucky Missouri North Carolina Ohio Oklahoma and Texas The top three in priority order were the Kansas City Records Center Air Force Plant Number 3 in Tulsa and the St Louis Administration Center The report conceded that the distance of all of these from the seat of government is such that it would probably more or less adversely affect the efficiency ofAFSA operations The only two sites on the list within a 350-mile distance from Washington as well as a safe distance inland were Fort Belvoir and Fort Meade It was the opinion of the Board that the Fort Meade site was the more suitable of these two being at a greater distance 25 miles from the Washington metropolitan area and 15 miles from Baltimore The report pointed out that the AFSA headquarters would probably constitute a priority target by itseif wherever it was located and asked rhetorically Who can say that Baltimore is more likely to be bombed than Kansas City Admiral Stone as AFSAC Chairman and AFSA Director then threw the issue out for discussion Major General Bolling who by that time had replaced General Irwin as Army Assistant Chiefof Stafffor Intelligence wondered whether Bainbridge Maryland had been considered Air Force Director of Intelligence Major General Cabell viewed it unwise to locate so close to prime targets such as Baltimore or Kansas City He suggested locating near a cultural or non-industrial city -- perhaps on the prairie General Bolling suggested Fort Francis Warren in Cheyenne Wyoming now ironically a Minuteman missile base Admiral Stone pointed out that locating at a remote site without facilities like Cheyenne would greatly increase construction costs General Cabell characterized the threat to such a site as three-fold air attack sabotage and submarine-launched missiles very prescient for 1950 He described Fort Meade as vulnerable to all three while Kansas City would be especially susceptible to sabotage The discussion rambled on in an inconclusive fashion as one member after another mentioned Birmingham Alabama Chambersburg Pennsylvania Hagerstown and Frederick in Maryland and Fort McClellan Arkansas When pressed to characterize the ideal site Admiral Stone described it as within a 350-mile radius from Washington roughly a day's travel Not only did the meeting end without a decision about the site but the Council decided to go back and re-examine the criteria and methodology used by the Board At the February 1951 meeting Air Force Security Service Director Brigadier General Lynn presented a paper with two lists The first listed sites where adequate facilities already existed the Kansas City Records Center the Air Force Plant in Tulsa and a Quartermaster depot in Charlotte North Carolina The no facilities list included Fort Knox Lockbourne AFB in Ohio Fort Benjamin Harrison in Indianapolis Brooks now Goodfellow AFB in Texas and the Rocky Mountain Arsenal in Denver The first three on the second list were quickly eliminated Kansas City as too fat a target and Tulsa and Charlotte because those facilities had been committed to military production for the Korean War General Lynn described Fort Knox as the best of the no facilities installations General Bolling wondered why Cheyenne had been omitted and was told that the population base was too small to supply a civilian workforce General Lynn suggested a vote and according to the minutes of that meeting AFSAC approved Fort Knox as a suitable site for locating the major cryptologic establishment AFSA outside the Washington area and authorized the Director of AFSA to draw up a paper for the Joint Chiefs of Staff JCS containing recommendations in accordance with the Council's decision The target date for the move was established as 1955 The decision seemed to have been made but the members were called back for a meeting on 26 February to receive some unpleasant news that decision was not acceptable the JCS had rejected their choice of Fort Knox and instructed them to come up with a new list of three sites in priority order Admiral Stone suggested Brooks AFB Lockbourne AFB and again Fort Knox and also asked for addition 1 suggestions This time the discussion centered on the availability of a suitable civilian workforce The AFSAC's own paper recommending Fort Knox had listed its distance from Louisville 20 miles as its biggest disadvantage Given the distances that most NSAers commute to and from work it is interesting to note AFSAC's fear that employees wouldn't be willing to travel 20 miles from the closest major city Navy Captain Dyer the Site Board Chairman reported having been informed by personnel officers in Hagerstown that Fairchild Industries was able to draw its workforce from a 50-mile radius Admiral Redman said that if AFSA moved to Brooks AFB the headquarters ofthe Air Force Security Service it would be like the mountain going to Mohammed After more discussion it was decided that AFSAC would recommend that the JCS choose from among Brooks AFB Lockbourne AFB and Fort Knox The papers also contained a subtle element of an ultimatum should none of these three be acceptable to the JCS there would be no alternative but to purchase nongovernment land in a suitable location at considerable expense and delay This was forwarded to the JCS in the form of AFSAC 59 23 At the March meeting Admiral Stone informed the body that since the Air Force had decided upon other plans for Lockbourne AFB it would be necessary to come up with a new third choice for the JCS to choose from He suggested the following new priority list Fort Knox Brooks AFB and Fort Meade He mentioned that someone had suggested that locating in Florida would solve the problem of attracting a civilian workforce but didn't believe that Florida would meet the other criteria General Cabell criticized Fort Meade as too vulnerable and General Lynn induced Admiral Stone to state that the primary reason for leaving the Washington area was to April 1985 CRYPTOLOG page 2 CQ FIQ TIAb aCID 4019702 C9NFIBENTIAI reduce vulnerability The Army went on record as opposing Fort Meade and favoring Fort Benjamin Harrison as the new third choice but the Army representatives were outvoted Even though the JCS had asked for three locations in priority order the paper recommended Fort Knox as first choice and listed four second choices in no particular order of preference Brooks AFB Fort Benjamin Harrison Fort Meade and Rocky Mountain Arsenal This time it stuck and on 10 April 1951 Secretary of Defense Robert Lovett approved Fort Knox as the permanent site for AFSA How that decision came to be cancelled eight months later cannot be completely explained from the AFSAC meeting minutes On 7 December 1951 General Canine the new AFSA director and AFSAC chairman was asked for his views on the move by Deputy Secretary of Defense Foster General Canine told Secretary Foster that he was concerned about AFSA's ability to operate so far removed from its recipient agencies He also expressed fears about serious personnel losses He conveyed the same views toJCS Chairman General Omar Bradley who suggested that General Canine accompany him to a special JCS meeting General Canine asked for time to convene AFSAC first General Canine called for a meeting on 11 December at which he announced his preference for rescinding the AFSAC JCS decision to relocate to Fort Knox He argued that AFSA should stay within commuting distance ofWashington from the standpoint of service to the recipient agencies and the Services He also stressed the personnel factor He stated There can be no substit te for experience and one good man is worth 100 mediocre people and one exceptional person is equivalent to fi ve good people There still remained the issue of vulnerability however Admiral Johnson the navy representative to AFSAC recalled that the original JCS tasking suggested the establishment ofa backup facility away from the Washington area rather than moving the entire headquarters Several suggestions were put forth for a backup location Brooks AFB the United Kingdom and even a ship in the Atlantic Ocean Eventually AFSAC agreed to recommend to the JCS that the Fort Knox decision be rescinded and that AFSA be relocated within the dispersal area ofWashington D C defined as that area within a 20-mile radius ofWashington No recommendation was made regarding a backup location I General Canine gave basically the same story to a special JCS session on 12 December and the Secretary of Defense directed him to select a new site This time the Site Board selected Fort Meade and AFSAC concurred with this recommendation at its 36th meeting on 23 January 1952 General Canine told the Council that based on his informal discussions with various civilians he didn't anticipate any serious personnel losses in moving from AHS to Fort Meade What turned the JCS around between April and December 1951 A recent unclassified book attributed the switch to a near-mutiny among the agency's civilian work force but that would seem to be an oversimplification opposition by Washington-area COMINT customers was probably the most important factor Deputy Secretary of Defense Foster told General Canine in their 7 December conversation that some alumni of AFSA after reading the recently announced plans to move AFSA to Fort Knox had prompted some rather important and influential people in Washington Le the newspaper editors to express their concern to the Secretary of Defense over the advisability of such a move The lCS may also have seen a logical flaw in the planned move that should have been apparent to AFSAC As we have seen the only real reason for moving away from the Washington area was to reduce AFSA's vulnerability to attack While further inland than Washington Fort Knox is not much further south and was therefore would be only a little further away from a Soviet bomber attack over the Pole In short Fort Knox is almost as likely to be nuked as Washington Certainly the fact that General Canine replaced Admiral Stone as director of AFSA and as chairman of AFSAC was a factor in the reversal Not only was General Canine more concerned than Admiral Stone about the question of personnel loss but he came to AFSAC comparatively late in the process and did not have the personal involvement in the site search and in the decision process that Admiral Stone did o Another interesting aspect ofthe selection process is the apparent lack ofpolitical pressure Competition among congressmen for military bases in their states and districts was common at that time but it does not seem to have played any role in this case There are two possible reasons for this the almost total anonymity of AFSA at the time and the relatively small number of people involved In November 1952 AFSA became NSA and the contract for the building at Fort Meade was signed in July of 1954 And the rest as they say is history This will hardly be the definitive article on the subject There are many people still working here who were at AHS while all this was going on and anyone who can shed more light on the subject is more than welcome to comment it would be particularly interesting to hear what employees were thinking and saying during the eight months when the move to Fort Knox appeared to be a sure thing D April 1985 CRYPTOLOG page 3 COl lFIDSH'fIAL aCID 4019702 SQl IFIBKPiTlAI BULLETIN BOARD SUPPORT P L 86-36 TO LANGUAGE BOOKBREAKING ON THE IBM XT I ON THE ASTW fi'6U6l lisa new bookbreaking package for the IBM XT suitable fOl-sntal1 codes A copy of the progrant and a user's guide can be obtained from the PCIC _ _ _ _IA432 Iin the Main r i 58 ufur erinf rinatio llD This article is classifie n its entirely PROGRAM FOR LANGUAGE ANALYSI The PC-DOS operating system installed on the ASTW has the inherent capability of supporting foreign languages The original foreign language that is installed is the Cyrillic alphabet However the installed sorting sequence is incorrecd f A432 have provided to the PCIC a modification to the operating system that corrects the sorting sequence and provides a better character display than that provided by IBM e-ee6 A package of programs thatilr ride lang 1age counts statistics and patterns simila othosecontained in MILCRYPT I has been written for the CDC JEEP The package titled Ih sfour optior n s - L-_ _ J for text without punctuatIOn or spacers for text with spacers butn6 punctuation' for text with both spacers and punctuation A fourth option L Jh rovides all of the above As part of this package there are routines to excise spacers and punctuation from the original text The programs can accept user-determined alphabets of up to 60 characters For information calli 1042 963-4845 We have also created a character set that can be downloaded to an EPSON-FX series printer that allows the ASTWs to print Cyrillic This printer character set will not however work with the printer that is supplied by IBM as part of the ASTW contract 86-36 'P L I PROBE FOR DIAGNOSISp L 86- 3 6 C 80 A new diagnosticsprogJ antisI1ow on JEEP It As a results ofour attempts to use the Cyrillic character is similar t C but treats text in group-length rather set on the IBM family of personal computers we have than in charac t e r-length Possible group ize is 1 thrOllgh identified several software packages that work quite well or 6 fixed-length only For information cal with foreign language data If you need a data base 10952 963-585 manager both CONDOR 3 and dBASE II work quite well 1 dBASE III probably does also The PERSONAL EDITOR WORD PERFECT 4 0 and BONNIE BLUE word processing programs also work quite well All ofthese packages allow the full definition ofcharacters above 127 in the ASCII table to be used as data only Field names commands and other characters that must interact with the software package must be accomplished using the standard 127 ASCII characters Many software packages such as WORDSTAR the most popular word processing program do not workwith the foreign language capabilities at all All of the above software includingthe modifications that A432 have created are available from the PCIC in the Main Library Answers to questions concerning the modifications to the IBM-supplied software can be obtained by calling usat963-4788 ote that none ofthe modifications created by A432 affect the perform nce ofthe ASTW under the PCIIX operating system A5a UNIX system the ASTW is a bilingual disaster 0 EO 1 4 c P L 86-36 REVISED PINSETTER MANUAL FOUDl A revised edition of the PINSETTER manual for traffic analysis is now ready for distribution If you are not already on the PINSETTER distri ution list you can ob14 963 3369 p L tain a copy froni r MANUAL ON SECURITY MARKINGS 1 J ElUEll The DIA manual titled Standard Security Markings lDIAM 65-19 is available in the National Data Standards Center P13D 968-8161 It is applicable to all members of the DoD Intelligence Information Systems Community including NSA April 1985 CRYPTOLOG page 4 IL lBbB lilA GOAfI T CIL LSI3S Or bY CONF'IBEN'FJAL 86-36 F L aCID 4019702 jfl 86-36 It f i J ' T L J A UN QUE HUM NT ' ORGAN ZA TION u it S i lJ citl l li ' iI 1 N f MJ - t ' 3l ' '1 1i 4hY ' - s Ul The Asian Studies Detachment ASD of the 500th Military Intelligence Group currently located at Camp Zama Japan is a unique human intelligence HUMINT organization It is composed of approximately nine Department of the Army civilians nine military members and 75 Japanese employees The Japanese work under the provisions of the Master Labor Contract between the Government of Japan and the U i S- 0 1 4 Government t C The reporting production arm of ASDis len -36 States Army Document Center DOC which exploits open source foreign documents such as newspapers magazines and technical journals The UDC ha s eight analytic teams each team named for its primary intelligence focus U rC 1 - ' _ -- __ car A _ -- -- - P ' - t' Forces Pacific Once permission was granted to employ these officers a large pool of expertise became available particularly in endeavors requiring knowledge of Chinese characterS or the documents that UDC exploits the term open source may be somewhat misleading In restrictive societies such as the Soviet Union North Korea and the Peoples Republic of China documents which are circulated domestically are sometimes restricted for use by certain groups for example the military and may not be taken out of the country overtly Consequently some of the open source documents are obtained covertly In 1984 CDC analysts processed over 43 000 documents in their intelligence production effort I - orth K uQ L Ire I _ _ CSS MiddleL o -E-as 't- ------ CU All of the analyst teams are manned by Japanese nationals the majority of whom are retired from the Imperial Japanese Army or more recently from the Japan Self-Defense Forces who had extensive exoerience in intellii1 ence as Foreign Area Officers I U This unusual composition began to evolve shortly after the endofWW II Predecessor organizations engaged in the translation of captured documents and archives were among the building blocks ofUDC One ofthe most important was the employment oflmperial Army flag officers who had been unemployable up until then because of regulations enforced by Supreme Commander Allied U Some members of the intelligence community have called the type of intelligence work performed at UDC LITINT literature intelligence but thoseat UDC prefer to call it DOCINT or document exploitation The DOCINT process practiced at CDC has e volved over the years in much the same way as the organization and its structure has U T he CDC is considered a collector but it also issues produc mainl v in theform ofl n telligence Information Report Iwhich are standard reporting vehicle UDC reports are unique however in that they always carry a comment cailed the CDC Comment These reports in many cases resemble finished intelligence while technically they are not They are sent lm the basis of specific subject matter and general distribution April 1985 CRYPTOLOG page 5 II rPIBoB VIA eOl II 'l eIIA i lShS e TL l CK l T I 4019702 8EEURRE'f OGA I istribution of these guidelines reports when they deem it appropriate bGA or other enclosures T distdhutioncopy is reviewed by the UDC and ASD Chief$ and rele ased for distribution HITS has an evaluation program whereby reports are evaluated by the organizations which originated the requireme II 2 -25 fth r rts are evaluated Valuation ofreporting is very useful for the collector for it enables him to rme tune his reporting and to focus on the most productive avenues ofinvestigation Nowforabri f operandi Th documents ri tionoftheUDC'smodus alyst daily reviews eo the rea y use u an Impor 11 ea ures 0 C reporting in my estimation is the fact that ltis entirely independent of other US intelligence holdings Consequently UDC reporting provides either independent verification of or challenges to other intelligence holdings while avoiding the in-bred nature of some reporting which echoes others' reports and later echoes its own echoes Furthermore each s ection reports lL w 'e e r T y T Tt e- o o 1tt ' e r s 'in ag eneral meeting of aU analysts on L - - - - t In his UDC comment the Malyst point$ out items in the report he considers to be of significanceJ lin expll iting the material etc $ Next the analyst submits this draft report written in I Ito his supervisor for review who might return It for more polishing before it goes to the translation section At this time also any special graphic cartographic or photographic materials to be submitted with the report are ordered from the appropriate support facilities within the 0 ozation the hot topics ofthe week They also keep each ot her a rised ofnew requirements received p Most UDC reporting is issued at the CONFIDENTIAL level unless the documents involved were obtain d throu h more sensitive sources represent a very valuable currencVl 1 I The report next is reviewedby L 'r1tl e 7 'r1 ' e 1 ' 'ol'Tl ' e e po s J -view Branch the Chiefofthe UDC and the Chiefofthe Asian Studies Detachment The report the goes back to the Iall lyst who reviews the translation and returns it thl'ough his supervisor to the editor for final decision U The report then goes to typing and from there back to the editor fO proo n It is then typed in rmal form for distribution issued either in electrically forwarded copy or arocopy if the report is less time sensitive and contains maps graphs charts photographs To sum it all up the UDC is a singular HUMINT organizatil ln which prl lvides an invaluable service to the US intelligence community in an extremely cost-effective manner Mydetail to the UDC fOl'two years from May 1982 tbroughJune 1984 provided me with a marvelous opportunity to learn every facet ofdocument exploitation as practiced at UDC Owing to unusual circumstances I became Acting Chiefof the Reports Review Branch in UDC in October 19 2 then i111983 I became Acting Chief oftheUoC and remained in that position until I returned to NSA in JUIl e 1984 0 EO 1 4 c P L 86-36 April 1985 CRYPTOLOG page 6 HA Qb13 VIA 60MIN'f 6I11t HiBb6 8NI 5ECRE I' 4019702 P L 86-36 Improving Life with an ASTW _ _ _IG613 i ' - ' ' ' '''' These hints may benefit users of the IBM PC-XT running PC IX the version of UNIX developed by Interactive Systems Corp and licensed for sale by IBM or the PC-XT and ASTW as well as new operators of the ASTW As currently received from the vendor the PCflX operating system contains several potential threats to computer security and system integrity some of which are listed below in the form of problems encountered The changes indicated will improve overall computer security system integrity and general ease of operability of the new workstation These changes will also help users maintain their systems with fewer system errors and save considerable time for the systems managers All of these changes must be made by a Hsuper user Clobbering Your Own File System Problem If the power is turned off before the system has completed all the necessary disk writes the file system may be left in such a state that it will be difficult or impossible to recover some files That is because some basic file operations require multiple disk writes Solution A special program priVishutdown should be run before the power is turned off to assure that all necessary disk writes have been completed Method Create a user login account called shutdown that will automatically run the program priv shutdown and nothing else This is accomplished as follows what you type is printed in boldface $ adduser R add user shutdown R shutdown Login Fullname 204 Uid 100 staff Group usr shutdown Directory Program Filesize Siteinfo Password Maxage Minage Agenow OK y no R program R Field Program priv shutdown R Field R OK y R Creating new directory Standard new user initialization y R ADDED q R Before the terminal is turned off the user merely types in the login shutdown hits the return key for the password and waits for a new login prompt before turning off the power This normally takes only about five to ten seconds Since the only program allowed to run under this account is priv shutdown no password protection is needed and all users may use it Is Your File System Healthy Problem A system crash accidental power outage or inadvertant power down can leave the file system with errors if shutdown is not run If undetected minor errors can continue to grow until they become disastrous Solution The System Manager's Guide recommends that the file system check program sch be run every time the system is initialized This program will locate and often be able to correct any minor discrepancies in the file system before they become unmanageable A minor change to the system initialization procedure will force the automatic execution of fsch during system initialization Method Replace the letter d in line six of the file etc rc with the letter m originally d change to caseS1 in m lt Classified Displays Left on Your Screen Problem When a user logs off the login prompt is displayed on the line immediately following the last bit of text leaving a possibly classified data still displayed on the screen Solution The licensing logo that is displayed with the login prompt can be readily modified to clear the screen before it is displayed Method First make sure that the right hand margin in the INed editor is turned off before making the CRYPTOLOG page 7 FOR OFFI6IAL USE ONLY April 1985 case $1 in 4019702 modification or else the text will wrap and cause a problem during system initialization To turn off the margins consult page 22 Beginner's Tutorial to PC IX in the Text Processing Guide In the fete ports file insert a backslash f f clears the screen before the licensing logo form feed which originally herald r nPC IX - 64281 63 cl Copyright IBM ' change to herald f r nPc IX - 64281 63 c Copyright IBM put fhere i Disks Overflowing with Garbage Problem Default values are set up so that the skulker program that cleans out outdated backup files and filename INed temporary files runs at 3 AM In areas where the computer is turned off at night the skulker will never run and the disk will eventually get overloaded with garbage files Solution Force the automatic running of the skulker programs during system initialization This increases initialization time by about five minutes Printing Wide Text Problem When you print a file that is wider than 80 characters on a standard printer only the first 80 characters of each line will be printed Solution Set the line printer default line width to 132 instead of 80 Proper commands must still be inserted in the file to control the IBM Graphics printer when printout of 132 characters is desired Method Change the file letclrc to read as follows # Set defaults on dev lp if the system has a parallel line printer splp indent 0 width 132 Editor Losing Your Files Problem On very large files 2 000 to 3 000 Iinesl the INed editor has been known to exit and automatically re-invoke itself without any file saves This happens when using the insert key F4 or the put down key F6l Solution Keep your files small Method In the file fete rc add the lines echo Running SKULKER Ipriv skulker immediately before echo Normal startup completed Method Split large files into smaller parts for editing and then concatenate them back together for processing Time Getting In Your Way Somebody Else Messing With Your Files Problem A user who fails to logout makes the terminal available to other persons who may not be authorized to gain access to the terminal and to all the files Solution Set up the terminal so that it will automatically log out any user who fails to strike a key on the terminal keyboard for a specified number of minutes Method Include a timeout command in the fete environment file such as TIMEOUT 10 This is the number of minutes the keyboard may be inactive before automatic logoff will occur Any number may be specified Funny Faces In Your File Problem Files transferred between DOS and PC IX end up with a smiley face character at the end of each line This happens because of the different ways of specifying carriage return and line feed DOS uses two characters at the end of each line of an ascii file to represent a carriage return and a line feed 015 and 012 respectively whereas PC IX uses only one Oi2 When a DOS file is transferre to PCIIX the superfluous function key on each line is displayed as a smiley face character Solution Execute the following shell to remove them Method Put the following shell in your lusrlbin directory with a mode of 555 #' fixdos by Ron Hecox G613 6005s November 1984 II RepairS DOS files so that they are Pc IX compatible rpl tr 015 012 $1 $l t sed e 11 $ d $1 t $l nu rm $1 t echo The DOS file $1 is repaired and is called $1 nu Problem The current time is automatically displayed every hour Many users find it annoying to have the time suddenly displayed in the middle of their work Solution Turn off the automatic display of the current time Dse the date command if you need to display the time Method In the file fusr lib crontab insert a # and a space before the date display command so it will be treated as a comment as follows '#0' ooo exec echo The hour IS 'date' 'dev console Cyrillic Display Problems Problem You have a USI graphics monitor on your ASTW and try to display Cyrillic text but the characters display only halfway In addition when you try hitting the language key to turn it off nothing happens This is because the character maps for the monochrome display and the color displays are different The PCIIX system comes configured for a monochrome monitor while the USI monitor is in reality a color monitor with sixteen shades of green Solution Your system files must be reset to identify it as a color monitor and require downloading of the correct character map for your display Method In the file letclrc comment out the 'mono map' statement and uncomment the 'color map' statement so it reads as follows # Uncomment only ONE ofthe follOWing Ipriv charam -a letdcolor map priv charam letdmono map 0 eXIt page 8 FOR OFFICIA b U8K Q bY April 1985 o CRYPTOLOG Ct N fIBEtHlfd aCID 4019702 EQ 1 4 c P L 86-36 P L 86-36 AND THERE WE WERE u _ _ _ _IG111 ElQl 4 c P L 86-36 fetlt's1963 I have about four weeks to go on an'18As usual when our bunch finishes month tou a siX-da Yint on duty in the boondocks we hop on the bus for a break of two or three days As we approach n the main road we notice tanks on both sides of the highway I I Where the thought came from I don't know to this day Ifnecessity is the mother ofinvention desperation is its father tell Monte to take out a stick of gum fold the solver-colored wrapper into a small rectangle and place it in his fatigUec r RiSinjr his full six feet seven inches he confronts th econd Lieutenant with all the bluster he can summon up U Well that even happens at home on Armed Forces day maybe it's just a parade avingall U Wait a minute -- the turrets are turning keeping pace with the bus Holy Smokel Or words to that effect There's a roadblock ahead with armed troops It must be the then annual attempted takeover of the national government by a disgruntled officer corps -ter All of us are in civilian clothes except for Monte I who had arrived only three days ago and whosf cjyyjes hadn't We're at the roadblock now and I see aL Second Lieutenant step out from behind the bar r 'ic a ld e-a-nd motion for the bus door to be opened His six troops train their weapons on the driver his life been accustomed to social classes and ranks the fficerbacks down from the American firs t Iie'iiten'ant's SilV bar and allows said lieutenant to pass the roadbloc I -fet-Before out break is over the disaffected troups have been arrested the tanks have been removed and we notice as we ride back oud tor another sixday stint tha t you can't even tell that there was a roadblock right over there just the other day 0 EO 1 4 c P L 86-36 April 1985 CRYPTOLOG page 9 C ONFIDElN IAL 4019702 P L 86-36 SRCR 1'f 1 4 c artic e is a assified in its entirety trttr4 It started in September of seventy four Certain of these men put their careers on the line Perhaps a few days sooner or a few days more And a possible approach they did finally define The minds of these men were in an awful state Then the champions emerged to cry it out Over the absence of certain vital real estate To overcome resistance opposition apathy and doubt A Jerry named Kozlowski I a Light Colonel called Reed 'A n-d c-e-rt-a in i-nf' ' o-r-m-a-t io-n--- for their leaders could fetch Gave answers to questions and nourished the seed And ideas flowed as if poured from a flask They called for support from their Can Do team Theil' critics were numerous and soon did emege The responses were varied or so it did seem And chanted a chorus of doom to the tune of a dirge But the players did gather from the ends of the earth But our players pressed onward not knowing when to quit And the mother of invention to a baby gave birth Theil' minds were tormented as if by a fit They would steal all the assets from the Compass called Bright If our saga were written from the Wayside Inn And gather in funds from any program in sight To historic events these words would seem akin There was talk of assassination below the third floor One if by land and two if by sea Of the Pentagon palace the Joint was now sore Three if by ail' is the alternative key But strength nourished by faith over what had already been done Our players did travel from coast to coast Helped overcome doubt and the first battle was won Seeking solutions to problems that bothered them most Then a schedule was established by the heads of state April 1985 o CRYPTOLOG o page 10 Ih DLB VIlt OO cllti'f CIIAN 1iELS O b' SKCKKT r P L 86-36 EO 1 4 c 4019702 SEEURRE And a tempo was set that most players would hate They worked on without failing their minds in a haze A meeting was called Then on to flight test at Andrews and Meade In Virginia's Falls Church For a forty-five day miracle our players did search The work pressed on forward this crew would succeed Colonel Reed started the proceedings and spelled out the plan Sweet Old Bill rose to the occasion with the answer We can Followed by Lloyd who said what he'd do After some disappointments and a time to stand down The crew assembled again this time they'd never give ground Finally a successful conclusion all objectives were met To make the dream of this project if at all possible come true The vict'ry celebrations were more than a sure bet The Skunk Works was called on to reconfigure a deuce Then stand down again until time to deploy And Bob Farley would give the program the juice The legal maneuvering bro ght few people joy Then we returned to our locations and started to go They painted the airplane and painted again Though the dollars were short for funding was slow To please all the Generals was a task Herculean Finally in November we got our full start Then the word went on forward we're ready to go From the ninth day and onward we'd from sanity depart There were few who weren't anxious to start the big show There was hardware to build and parts to procure The effort seemed worth it the Team made a score Inventions to make and GFE to appear There's work still to be done there's no denying that On a cold night in December for the Coast we did head But we're all very anxious for'our next turn at bat The airborne equipment was finally put to bed It's great to be part of the Can Do team Then the search for the tower did not seem to bear fruit There's nothing we can't handle or so it would seem P L 86-36 EO 1 4 c We built them another with a job-crane to boot The airlift was kept busy on the way to both coasts The men worked with their heads down without any boasts o A conventional account 01 fappeared in i the Spring 1976 issue anne Cryptoioglc SPECTRUM The days stretched into nights and then into days April 1985 o CRYPTOLOG o page 11 I1AnBr B VIA GQHli -q GIl o Y riJ i Qi Tr SJ3 JRE CID 4019702 86-36 i April 1985 page 12 OCID 4019702 15L 86-36 April 1985 page 13 PlrSep EOE-W This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu