NSA on 10-17-2012 ursuantto E O 13526 MDR Case # 5477 15 l JWVV iJ I5W lrUlWV 5l JW 5 W 5 i1l J 5 f W iJW I1 iiWl J W iJVVWW iJ k 2nd Issue 1987 1 THRUST FOUR U o o o o o o o o o o o L - BULLETIN BOARD U o o o o o o o o o o o 5 INFORMATION MANAGEMENT FOR THE FUTURE U 6 FOOD FOR THOUGHT U o o o o 8 MODEM COMMUNICATIONS U o o o o o o o o o Frederick Rodean o o o 9 LETTERS U o o o o o o o o o o o o o o o ' 16 THE RECKONING U o o o o o o o o o o 17 SOME TIPS ON GETTING PROMOTED 3rd ed U 19 CONTRIBUTIONS SOLICITED o o o o o o o o o o o o o o o o 29 GETTING STARTED o o o o o o o o o o o o 30 GOLDEN OLDIE U o o o o o o o o o o o 1 o o 1 NSA-CROSTIC No 64 U o o o o o o o o o HOW RUSSIANS VIEW THEIR LEADERS U o o o o o o 33 1 ----_ _ 1 1 1 I I o o o o o ' e o o NeT RELEASABLE TO CONT e tORS --5EERHIIAN9LE VIA COMINT CHANNEbS ONlY CLASSIFlE9 BY NSAJCSSM 1 a 9ECLASSIFJPY ON Origirustil'lg l geREy'5 ge t eFMiRa t ieR Ae iFe DOCID 4011703 ' bl by Pl Too P I IV o 2 PUB I HER ' 00 St'OO d_S_ _ 1 -- o ' o I _----1963-1103 Collection oo 1 1 963-5877 Computer Systems 1 963-1103 963-5238 Cryptanalysis o o Cryptolinguistics 963-1596 1 963-5292 Index Information Science 963 3456 Information Security Georae F Jelen 859-1211 b Intelligence Research o 1 1 963-3845 963-3057 language 1 Mathematics 963-5566 1 963-6430 Puzzles 963-4958 Science and Technology 1 Special Research Vera R Filby 968-8014 Traffic Analysis l obert J Hanyok 963-4351 Illustrators P L u 1 aOAROOF EDITORS Editor AVE ATQUE VALE 2nd Issue 1987 1 1 963-3057 963-6211 1 To submit articles or letters by mail send to Editor CRYPTOlOG P1 HQ SA 187 If you used a word processor please include the mag card floppy or diskette along with your hard copy with a notation as to what equipment operating system and software you used via PLATFORM mail send to cryptlg@bar1c05 bar-one-c-zero-five note no '0' Always include your full name organization and secure phone also building and room numbers There's a change in the masthead who was publisher of CRYPrOLOG for six years has moved to Z They will benefit He is taking to the Chief Scientist's Office what he brought to Pi and to CRYPrOLOG a passion for the arcane arts practiced in this Agency a concern about documenting current efforts to benefit our successors an active interest in the storage and retrieval of information and an enviable skill in expository writing 86-36 I Happily he is not lost to CRYPrOLOG He has merely become its friend rather than its publisher almost the first thing he did in Z was to pass on some items for publication and he has since helped us in other ways Good luck Glenn on your new assignment We look forward to our new association with you I Weare most pleased to welcom as the new publisher He comes to us from G4 where they practice esoteric disciplines He is a natural for CRYPrOLOG as he is noted for the breadth of his technical knowledge his championship of passing on the torch and for his singular gift of explicating highly technical matters to nonspecialists That's what we're all about Welcome aboard Joe P L L For Change of Address mail name and old and new organizations to Editor CRYPTOlOG P1 HQS 8A187 Please do not phone Contents of CRYPTOLOG should not be reproduced or disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor All opinions expressed in CRYPTOLOG are those of the authors They do not represent the official views of the National Security Agency Central Security Service FOR OFI ICIAb USIS OHbJPY 86-36 DOCID 4011703 eeNFIBH IAL The Director's Thrust #4 U l L 86-36 Iz This article is classified CONFTJ i This was the Keynote Address at the 1987 session of the annual seminar series CA- g05 Contemporary Issues in CryJ'tcJ oolysis At the time the author was Chie Pl 86-36 I want to tell you today about the Directo ' efforts to preserve and enhance the practice of cryptanalysis in NSA He has given his personal attention to doing so and has involved top level managers also Shortly after he became our Director and got his feet on the ground General Odom enunciated a number of goals for the Agency He called them ''Thrusts'' to emphasize that they were to involve present action not just remote hopes Briefly stated the five SIGINT thrusts are GOO in its entirety The one of most interest to us as cryptanalysts is Thrust 14 and it is this The thrusts played a prominent part in a Future Sigint Capabilities Study and have been used as bases for planning and budgeting Last year General Odom held a series of status reviews of all of them including two review sessions for Thrust 14 One session focused on computers and one focused on personnel Specific questions posed beforehand by the Director set the stage for these reviews The first review session held on 8 Oct 86 concerned computer support for cryptanalysis It was attended by DIR DDIR Chief of Staff several Key Component Chiefs including DDO Chiefs of A B and G Groups and the Chiefs of A5 B6 G4 and PI The Director had asked P L 86-36 2nd Issue 1987 o CRYPrOLOG o page 1 eeNFIBEN'I'h L UANBI d 1 'ITA eOMfNq GHAN'PH lbB o PH Y I CONFIBfiJN IAL Update aa the Any Act1aas SUpe ter ResearclI Dir SIIould ceuter rae ADDR Marlin Wagner discussed NSA's unique needs and applications for massive parallel processing and described SRC progress to date exports in order to recoup a measure of good will and cooperation with others in the government community especially the Commerce and State Departments we be Doing about ' t SlIould SM1CODductor '- 1We intend to integrate up to ten NSA professionals in the SRC staff When it achieves full staffing and operational capabilities in 1988 the SRC will be the 11 --- __ After some discussion the Director stated his intention to visit the SRC facility and to encourage the Center to intensify both recruitment activities and the assimilation of NSA integrees He also wanted to see a research plan for the SRC SUpe ter and tile Industr1es The concern is that we might become dependent on Japan for example for electronic components to use in building computers and special-purpose devices Chief Scientist K Speierman had already discussed this question with the Director SO it was not pursued further The final question for this session was MlJat is tile Acqulsltlaa 1Iort do Parallel Status they fit 1t 1J Processing Bxpec t laas of our ter Progr_ of t 1Je Anticipated Approaclles aDd SRC What b the Significance of Recent and Anticipated Tech TranJI era for WI Lead in Cryptca1aly3ia7 Arter considerable discussion of our technical transfer strategy the Director said we needed to rethink our strategy on high-technology 2nd Issue 1987 o CRYPTOLOG o page 2 CONFIBBNTIAL HA P U' I E VIA GOM lP N' GIIA H ElLS 01' LY EO 1 4 c P L 86-36 our o EO 1 4 c 40111' Og -36 DOCID eONFIBEN'fIAL numbers at all degree levels However DDA believed he could meet the hiring goal for mathematicians this year A discussion followed in which several points were made o the reason we succeed in hiring PhD mathematicians who sometimes pass up higher starting salaries elsewhere is because of the large variety of interesting and difficult problems at NSA o cryptanalytic mathematicians are becoming more and more necessary in other disciplines such as signals analysis hardware design and speech research NSA once had an old-boy network of academic mathematicians who had worked in cryptanalysis during the WlU' who were extremely useful as consultants and who recommended NSA to their students This network has mostly disappeared The Director stated he wanted us to enhance our recruiting methods aiming particularly at PhD mathematicians it was agreed that such an effort would also help the recruitment of Masters and Bachelors Degree mathematicians What SItDuld We Do to Get More U from IDA CRDf ----1 1 - ADDR Marlin Wagner suggested the question should be What should we do to get use from IDA CRn Those present at the meeting agreed that the contributions from The second review session held on 9 Oct 86 concerned personnel It was attended by the same people The Director's first question was CRn were of high quality and very valuable The Director expressed satisfaction and there was no further discussion wm The Director's last question was W Hire Enough Hew Afathematicianaf DDA Lou Bonanni outlined NSA hiring requirements for mathematicians the present recruiting program and some potential problems One problem is that we are not offering PhD mathematicians a competitive starting salary another is that American mathematics graduates are declining in What fa the StCIbd of Or Lcut Look at bttemal Talent and blt component Relations on CryptcnIlysiaf The Chief of Pi that's me reported that a group of senior Agency cryptomathematicians from P R and S had been organized to 2nd Issue 1987 o CRYPTOLOG o page 3 CQNFI9BN'FM L HANBbB IR A eOMiN'f OIWiNBLS miLY DOCID 4011703 I GONFIB8N'FIAL consider the need to attract more outstanding mathematicians to NSA either as employees or as consultants This group had held one retreat at the Maritime Institute of Technology And Graduate Studies MITAGS and had scheduled a second one the same week as this review to plan a Mathematical Sciences Day at NSA for about 50 prominent American mathematicians In response the MITAGS group worked with M3 to identify Agency mathematicians who should be part of such a team Also the Math Sciences Day was held on 6 January 1987 46 prominent mathematicians attended some old friends and others new to us Their expenses were paid and they were housed and fed at the Maritime Institute General Odom gave a welcoming talk at NSA I also said I believed we had an excellent inter- in the morning he said he had two problems he wanted their help with one problem is how component technical exchange situation best to operate his proposed program of involving AS B6 G4 Xl R51 IDA CRD mathematical research grants I mentioned the '-----1 and the other is regular seminars GRABS the R51 monthly seminar monthly CM and KRYPrOS lectures how to attract high quality mathematicians to NSA His talk was followed by some genetal the Annual Cryptomathematical Exchange talks and then some technical ones ACE and annual SCAMP programs the ad hoc week-long sessions on specific problems the The afternoon program at the Maritime rotational tours of CA interns Cryptologic Institute included some unclassified descriptions Mathematician Program members P1 of math at NSA and how we use personnel and others mathematicians and more technical talks Cryptomathematicians at NSA know each other followed by a long session at which we asked the visitors for advice and suggestions about and are able to communicate with each other as needed Manual eryptanalysts however are the grants program and about recruiting mathematicians We believe this meeting was in a somewhat different situation and some very successful the visitors gave us many good changes need to be made this was not suggestions we got some exc llent publicity discussed at the review but is being pursued judging from the feed-back and we have begun with DDO I repeated the earlier view that to develop a new boy network that should help cryptomathematicians were needed much more us recruit mathematicians in future widely throughout the Agency than just in cryptanalysis There was some discussion and I believe we should hold meetings like this the Director expressed the desire that we every year determine future skill needs both qualitative and quantitative for cryptanalytic work The Director asked DDA with DDO DDI o I I Following this meeting too the Director assigned a number of tasks addressing issues raised during the review o He asked DDA with DDO DDI and DDR to organize a recruiting team of high skill and polish to seek high-quality mathematical talent for the near term EO 1 4 c P L 86-36 and DDR input to propose for his approval a paper defining cryptanalysis in the context of future tasks and of what skills will be needed to do them This has been completed The definition is quite broad and includes some aspects of signals analysis some engineering tasks such as the design of special purpose cryptanalytic computers Speech research 2nd Issue 1987 o CRYPTOLOG o page 4 CeNF'IBEN't'IAL HMfBI 8 VJ A eOMlN'I' eIIMflfElLS OnLY EO 1 4 c P L 86-36 I DOCID 4011703 C8NF'IBBN'FMrL cryptographic system design and evaluation some aspects of computer security and computer intelligence a field I believe will emerge in future and many aspects of computer science as well as actual cryptanalysis o He asked DDPR with 000 001 and DDR input to conduct an unconstrained assessment of the numbers of cryptanalytic personnel we will need and report to him The figures emerging from this all approximate for actual cryptanalytic work just in Operations are L 86-36 ideas you may have for improving the practice of cryptanalysis here for improving the lot of the cryptanalyst or for any other constructive suggestions and to send them to me in Pl Let's help the Director help us 0 o Editor's Note A second review took place in July 1987 just as we were going to press BULLETIN BOARD USERS' GROUP ON SUPERCOMPUTER-UNIX FOUO G4 and A5 have established a Working Group to coordinate efforts on supercomputers using UNIX All organization with users on supercomputers are invited to participate For more information get in touch with the chairman ofthe Working Groupl F45 lIQ P L 86-36 DEVELOPING SOFTWARE o He asked DDPR again with 000 001 and DDR input also to conduct an assessment of the above constrained by reality and report to him o Finally he asked DDA and DDPR to take action to ensure that our COSC structure and Table of Distribution accommodate what is developed by the above These last three items are still in progress It seems clear that General Odom believes in cryptanalysis is alert to present and future problems and wants to do something about them I encourage all of you to take time out occasionally from your daily tasks and give some thought to the future of our unique profession I invite you to write down any U The second edition of NSA Manual 81-3 Software Product Standards is now in distribution For software acquisition the companion document is 81-2 As DoD-STD-173 NS it is also the 000 standard for use with contractors in software product development and acquisition A copy can be obtained from T303 SOFTWARE MANAGEMENT FOR UNICOS U T335 is looking into software management systems for UNICOS It is willing to investigate and evaluate commercial systems and Ellso to consider developing an in-house system under UNICOS Potential users are invited to submit their desiderata features required or desired to Jim Bieda T335 2nd Issue 1987 o CRYPI'OLOG o page 5 C8NJi'IBHN't'IAL IIMfBLEl VIA eOMlN'f' OIfMUfBL8 ONLY o DOCID 4011703 eONFIBHN'f'IAL INFORMATION MANAGEMENT FOR TH E FUTU RE U 1 identifying and projecting hardware and software requirements 2 determining proportion of centralized to decentralized support 3 budgeting and control of expenses 4 tasking 5 identifying staffing and skill requirements 6 providing education and training and 7 assessing security requirements and limitations P L 86- 3 6 U John Naisbitt in his book Megatrends writes In the new infonnation society being without computer skills is like wandering around a collection the size of the Library of Congress with all the books arranged at random with no Dewey Decimal system no card catalogue--and of course no friendly librarian to serve your infonnation needs Realizing the import on users producers and managers of intelligence infonnation NSA is taking steps to modernize its traditional information support services to SIGINT operations and to RDT E efforts FOUO Further the advent of the personal computer has added a new dimension to T5's service philosophy the closer to the customer the better the service and has redefined oneon-one service Computer access will obviate the need for the preferred co-located support which calls for placing an infonnation professional in an operational element and instead enable that professional to provide tailored one-on-one support to several users almost simultaneously F6U6 Central to upgrading infonnation support is the Electronic Information Center EIC The EIC will facilitate the interaction of all information support functions across organizational boundaries with T5 as the U The infonnation explosion demands a central management authority Key entry revolutionary approach to keeping abreast of points for the EIC will be Central Reference the the needs of a knowledge industry The Agency Scientific and Technical Infonnation Center the seniors as articulated in an December 1983 Agency Standard Products Infonnation Center NSA Advisory Board Report mandated that a fonnerly the Personal Computing Information state-of-the-art infonnation support system be Center PCrC the Agency Records Center and developed The report recommended that the the Fort Meade Main Library The EIC will information support system of the future deliver make available major information support and information directly to users via delivery functions that can be accessed by a terminal personal computer systems single log in It will eventually electronically FOUO The support system will be an integral receive organize catalogue control process and deliver all-source infonnation Agency wide part of the work life of analysts managers as needed to support the NSNCSS missions engineers scientists technologists and office workers Supporting these users will be FOUO The EIC will be a series of personal information professionals who will lead in the computers and terminals linked by a number planning design implementation and of local area networks and the Agency Standard maintenance of the system The success of this Host The key to the success of the EIC is an endeavor depends on corporate planning goaleasy-to-use automated method of exchange of setting and focused leadership T5 has been information and data among the system designated as the leader of Agency-wide components The programs that compose the information resource management It plans to EIC are focus on several key fronts 2nd Issue 1987 o CRYPTOLOG o page 6 CONFIBHN'f'IAL I DOCID 4011703 fP L 60NFIBHN't'IAL 86-36 Prim8riiyciirected b06k llilabfiity andillrormationon toward the support and upgrade of th SAlCSS libraries and information centel'lJ this program includes the functionsPl'9vided byl 1 and a planned a quisition module enhancement I Icapabilities will include an on-line card catalog for all library branches electronic logging of materials overdue and availability notices the generation of management and use statistics material distribution the status of inter-library loans procurement documentation periodical renewals and mailing labels colle tions A feature laser bar e special of LSl2000 is the use of readers The ASplC has expanded its role in production Qf$Oftwate for PC and Office Automation OA users and will assume a role in the demonstration acquisition and distribution of ASH applications software as well The ASPIC has acquired a Braille printer which enables the Center to produce working aids and tip sheets for the Agency's blind employees U _f Central and Satellite Modules of the ElectrQl'lic Information Center L - T52 has started to implement Ithe automated system designed to commercial database exploitation an e ivery transmit store and retrieve customer requests for information references and documents and the Automated Information Support The contractor developing and testing System I begun transferring software protOtype applications from a PC-b U 1 lappliestothe receipt to the 3B20 ASH base T52 is currently using storage and distribution of the majority of incoming electrical and hardcopy messages and thePC ased version of INFOR EQ applications material The primary projects are SOLIS FQYQ Efforts contiriueinacQllili ng'and LEAFLET WEEDER DUSTBOX DOORPLATE and accessing commercial databases for lseo QUEENSWARE Each of these programs ASTWs via dedicated olltsidetelephol e Hn es 'P L 8 6 - 3 6 addresses distinct intelligence collection dissemination and management requirements FQYQ larii nu-4riven gateway I FQYQ I I U 1 ImOdemi life-cYcle records management with a storage and retrieval system to electronically and automatically archive information FaY0 The Geographic Information Center is now able to produce maps on PCs using the PINSETrER software package developed by P14 PINSETTER enables the analyst to plot and track entities geographically on a PC screen U LSl2000 the integrated library system is operational in the NSAlCSS Main Library It houses cataloging records which include book and periodical titles authors call numbers 2nd Issue 1987 o I Ian automatic press delivery system is now operational and available in the Media Center formerly the Press and Cableroom 2E099 I fallows automatic delivery of news wire services to the floor of the National SIGINT Operations Center NSOC The Intelligence Watch Officer lWO a member of the NSOC team uses I I input to write the IWO Press Review which is distributed to headquarters and field elements I OUO Upg ade of Library U An Electronic Desk has been installed in the Geographic Information Center and was connected to the COINS network to allow on-line research and map display of COINS data The center is also able to transfer maps to floppy disc for distribution to users EO 1 4 c P L 86-36 which provide ess to multiple data bases is being tested in Central fereIIce theSTINFO r ibrary and S2 Databases resident onl'-- _ _ _ _ _ _ Iinformation retrieval systems are already available STATUS OF MODERNIZATION EFFORTS '-- I I OUO Conversion of the Press and Cable room has been completed with the delivery of 13 television monitor recording consoles Network news and other programs presenting information of concern to Agency analysts are monitored on over 13 channels The ISO Intelligence Support Officer supports the IWO and NSOC desks by monitoring and recording CRYPTOLOG o page 7 6QNFIBBN'fIAL DOCID 4011703 P L G9NFIBHN't'IAL 86-36 broadcasts and publishing a video news summary The ISO also makes operationally required video tapes on request Management Group must meet the challenge to recognize and implement technological and personnel requirements 0 I IModernizing the Handling of Collateral Intelligence Information ierSeveral SOLiS-like systems have been designed to electronically store disseminate and retrieve collateral received by NSA Those systems available on-line are FOOD FOR THOUGHT Extract from The Office of the Future Information Management for the New Age by 1 _ P L 86-36 ublished in Technology Review December January 1980 I I Automation and Upgrade of the Office of ArchilJe s and History U The Office of Archives and History has acquired an IDM 500 database management machine for automated storage and retrieval of archival records U The Electronic Archiving Division is engaged in a joint effort with the National Archives and Records Administration to study the Optical Digital Image Storage System in order to evaluate the application of optical disk technology to archiving U In Megatrends Naisbitt concluded that the most formidable challenge of the tnove from an industrial to an information society will be to train people to work in the information society The transformation ofT5 and its customers into providers and users of an electronic information support network will require a blend of many skills in computer science intelligence research information handling and management personnel management marketing communications and behavorial science Though there is some variation from organization to organization and from job to job ' surveys show that knowledge workers spend the major portion of their time absorbing or giving information verbally Only a very small percentage of their time is typically given to thinking less than 8 per cent or to writing less than 10 percent The most frequent mode of activity is formal meetings 20 per cent and more in highly structured organizations twoperson conversation on the telephone 5 to 10 per cent and travel about 10 per cent are also important The proportion of intraorganizational or extraorganizational communication varies over a broad range knowledge workers in large organizations spend almost all their time talking amongst themselves Electronic devices currently available have little direct leverage on the heavy communication loads of knowledge workers Indeed the impact ofoffice automation on their personal working habits has been negligible This is because the communication of knowledge workers is largely unstructured and ill defined Where memoranda reports or procedures are needed the bulk of the labor is delegated to supporting clerical or specialist staffs here word processing text editing dictation and facsimile equipment have a definite role But the idea of automating the illusive non-standard and everchanging communication patterns of knowledge workers remains difficult U In order for NSA a complex knowledge industry to remain in the mainstream of the information society the Information P L 86-36 EO 1 4 c UN jLJ IFIED 2nd Issue 1987 o CRYPTOLOG o page 8 CONF'IBHN IAL P L 86-36 DOCID 4011703 SEOREl f 'J Er 1 t 1t 1U flT S s 'VI U frederick rodean g85 2nd Issue 1987 o CRYPI'OLOG o page 9 SECKEl' ' EO 1 4 c 86- 3 6 HMiBU l ViA eOMHff CIIM t ELS ONLJ L NO eON'mAGT DOCID 4011703 88CRRT 2nd Issue 1987 o CRYPTOLOO o page 10' HAWYbK yr A SBCRS'I Cg CWAW TEb8 Q'P'tbJPY 'P'iG eOP B er p EO 1 4 c P L 86-36 DOCID 4011703 I S'B6RH'i' 2nd Issue 1987 o CRYPI'OLOG o page 11 88GRH'i' H MiDLFl VIA 60MH'i'i' GIIAl'fl'iEb8 Ol'H JPY EO 1 4 NO emi'HL G'f P L c 86-36 DOCID 4011703 S8eRH'i' 2nd Issue 1987 o CRYPTOLOG o page 12 SHeRE'f' IIANBl E YJ z 60M Ut'f' 611APHH3LS aptLY pm 60pT'fR lCT P L 8 6- 3 6 EO 1 4 c DOCID 4011703 I SBORI3'i' i iii 2nd Issue 1987 o CRYPrOLOG o page 13 SI30RI3'i' llA fBb g 'll i GOMRf'i' OII-ANUIU S ONLY NO eON'fR Ae'f EO 1 4 c P L 86-36 DOCID 4011703 SHORE't' CRYPTOLOG page 14 SEORET W P'f 'bE VY CQMlWT cH p'rp l s'b8 QP'r'bY foiO OON'ffiAC't' 2nd Issue 1987 EO 1 4 c P L 86-36 DOCID 4011703 I SHCRH't' been within the past three years that the performance requirements for satellite networks have begun to take shape U The basic building block for voice video and data communication in ISDN is a 64-kilobit per second channel called a B channel This same building block is used in existing digital telephony networks to transport pulse-code modulated voice-band signals To achieve higher transmission rates several B channels can be concatenated to form a channel with a bandwidth in excess of 64Kbps The resulting channel is called an H channel U In existing telephony networks signaling The trend appears to be towards to the establishment of integrated services digital networks lSDNs These networks will carry voice data and video information within multiplexed data streams by means of digital microwave cable fiber optic and satellite transmissions The structure of many of today's packet-switched networks has been designed specifically to facilitate the incorporation of ISDN technology An ISDN is an end-to-end digital network that uses uniform transmission signaling and operating procedures Access to the network and its associated services will be through a standard physical interface using existing telephone systems U U The key to ISDN is standards A committee of telecommunications organizations in Western Europe began work in 1979 to develop standards for ISDNs Today ISDN standards are being further defined by the Consultative Committee on International Telephony and Telegraphy CCITTl an international standards organization with a mandate to establish recommendations for endto-end performance interconnection and maintenance of world networks of telephony telegraphy and data communications This group has already identified a number of fundamental standards of ISDN Interestingly though planning for ISDNs has been progressing for at least seven years it has onl data for a communications channel is encoded within the channel while in ISDN it is carried in a separate associated channel called a D channel A single D channel can carry the signaling information for many B channels This technique of separating the signaling channel from the data transmission channels is called common channel signaling and is fundamental to ISDN U A basic ISDN standard is the basic access interface This 144-Kbps interface consists of two 64 Kbps B channels for voice video and data transmission and one 16 Kbps D channel for signaling An alternate access interface for large organizations is the primary access interface For North America and Japan this is a 1 544-Mbps interface con isting of 23 64Kbps B channels for voice video and data transmission and one 64-Kbps D channel for signaling In Europe and most of the rest of the world the interface is a 2 048-Mbps interface consisting of 30 64-Kbps B channels for voice video and data and one 64-Kbps D channel for signaling U ISDN provides the flexibility of submultiplexing channels for applications that do not require the full 64-Kbps circuit capacity It also supports packet switching as well as the circuit switching found in existing networks These capabilities provide great opportunity to maximize circuit capacity CONCLUSION 2nd Issue 1987 o CRYPTOLOG o page 15 S8GRE'I' IIAP'WLEl VIA COMH q ' CHAP'mElLS OnLY P'fO GOP'f'fRAG'f EO 1 4 c P L 86-36 P L 86-36 EO 1 4 c I I co_-- _-' CB' E 0_-' c_o A piano roll recording of the frequency hopping sequence Mid-course correction to a torpedo course made by FH-SR-SS communication from an observing aircraft LETTERS Co-inventor George Antheil had composed a multi-player-piano work in the 1920's entitled Ballet Mechanique Editor U o To the Editor U On page 10 of the December 1986 issue you made reference to the United Emirates Republic A quick check of T5 Working Aid 03-86 Independent Nations Dependent Territories and Their Capitols dated October 1986 discloses that there is no such national entity There is however a United Arab Emirates or the Arab Republic of Egypt formerly the United Arab Republic To the Editor U Don't let anyone ever tell you that CRYPTOLOG isn't read rve had calls from people I don't even know also from people I hadn't heard from in years all because of the Hedy piece I '-- T542 o U We too have had calls about your intriguing piece mostly expressing astonishment and delight at discovering that the glamorous Hedy Lamar was co-inventor of a frequencyhopping device A couple of knowledgeable readers passed along additional information about the invention including these illustrations U I hope that not more than 10 000 sharpeyed editors spotted this error and brought it to your attention P t 86 36 '-- ----J 2405 U P S The date of this note when compared to the date of issue of' the December 1986 CRYPTOLOG speaks volumes about the speed of distribution of your estimable publication o We stand corrected Thank you Say how'd you like to join up as a proofreader U U Editor P S Don't blame Distribution -- we're behind because our @#$ %c terminal has been plagued with hard and soft crashes U 2nd Issue 1987 o CRYPTOLOG o page 16 SHeRB'f BAUBLE Vi A eOMHR' eUAPfPR3LS OnLY NO eOUfR e'f I DOCID 4011703 P L fTl e f1leo o in U w u an w ra aua n - J fSUe Will NSA follow the us automobile industry into becoming a shell organization for offshore producers sharing its intelligence market the same way Detroit shares its sales market with more aggressive and competent Asian and European suppliers U In The Reckoning David Halberstam gives a long and gloomy account of how the us automobile industry a self-confident de facto monopoly in the late 1940's stumbled and blundered into decline while the Japanese fought their way into the us market and are now well on the way to replacing Detroit as the world center of the automobile industry There are a number of fascinating parallels between the us automotive monopoly and the us SIGINT monopoly U Until the 1950's the Japanese were so awed by Detroit's huge scale of production and technological know-how that they were afraid to go near the US market They had seen in World War n that us manufacturing technology - in aircraft ships vehicles and equipment of every kind - was far superior to anything they could produce U Halberstam tells the story mainly in terms of the Nissan and Ford automobile companies which exemplify what happened The Japanese increased engineering education and put their ablest people into manufacturing in every industry they could restart Henry Ford n called back from the war to take over the ailing Ford Company hired MacNamara and his statistical control people to give him w cnz w mz 'Ib control over the sprawling Ford organization Over the next twenty-five years the Japanese systematically improved the engineering and manufacture of their cars while at Ford and GM the manufacturing and car people steadily lost power to the financial managers who concentrated on keeping up the value of Ford shares to maintain the wealth and social position of Henry Ford n and the Ford family U The cutbacks and down-grading of manufacturing and of production people in favor of smooth well dressed management people and the no-risk quick-profit manipulations led Ford into a complacent production of big heavy gadget-loaded cars that gave a high profit per vehicle U The resistance to new manufacturing investment is illustrated by the incident of the ''E-Coating'' process which uses an electrically charged paint bath to get rustproofing paint into every crevice of the body pan After the process was invented by Ford GM obtained a license to improve their cars The Japanese also did E-Coating under licensing The Ford financial managers however rejected the investment cost and their cars rusted away It was twenty five years before the Ford production line converted to E-Coating U In effect the financial managers became adversaries of the technical people who developed and produced the Ford products They were profoundly ignorant of car production For example to avoid the cost of larger painting bays MacNamara proposed building the cars in 2nd Issue 1987 o CRYPTOLOG o page 17 IIA fBJ E 86-36 SHeREl 6eMHf 6UMH'fElJ S e fJ y I DOCID 4011703 SFi6R8CP two halves painting them then welding them together Henry Ford II had to intervene to block this foUy The managers grew in power in spite of their ignorance of cars by skilled intriguing The financial managers directed by Ed Lundy who took over when MacNamara went to the Pentagon managed to keep the stock prices high at first by avoiding investments and improvements but Ford's market share eventually declined as customers bought elsewhere U Meanwhile the oil shock of the mid 1970's gave the Japanese expanding access to the us market at the very time that Detroit deemphasized compact cars In a telling irony when Chrysler tightened up its standards for suppliers to match the Japanese quality control and low spoilage the Midwestern suppliers had to go to Korea to trade off the cheap labor for the new technology investments This resulted in transferring even more us know-how and manufacturing power to Asian countries and now they are competing in the us market with the us automobile companies U Detroit created an adversarial management caste which by manipulating numbers and quick profit gave the industry owners and stockholders the impression that they had perfect control of the current operations when in fact they were losing control of their future to the Asians who paid more attention to technology and production NSN may well be imitating Detroit by creating an adversarial management caste with technology and production downgraded cutback transferred to contractors or shipped offshore in the name of maximizing quick-product and managerial control Inevitably there will be a reckoning 0 U EO 1 4 c P L 86-36 2nd Issue 1987 o CRYPTOLOG o page 18 geRBCP IIAUDLEl JIi A COMUof't' CUAUPH3LS mfLY DOC I D 4iilil 2 il 'EUR SI'I' tDKNTll'lCATION AM AT oN If lIIty DSe 12 PUBLICATIONS U t tit do not conf_ tlllo with rcporto prcJ 4Nd G rc ' pari of tM JoII P L SOME TIPS ON GETTING PROMOTED U 86-36 CRYPTOLOG 2nd Issue 1987 3rd Edition Editor's Note We are very pleased to present this update of an article which has been CRYPTOWG's all-time best seller The original published in the December 1978 issue was based on a talk given in April 1978 to WIN Women in NSA it has been reproduced thousands of times as has a revised version which appeared in the June-July 1983 issue section of this article Promotions to Grade 13 are handled by the Grade 13 Boards in each Key Component almost all of them also maintain promotion files with Personnel Summaries on their Grade 12 employees Promotions below grade 13 are handled at various local levels and their practices on the maintenance and use of promotion files vary In anticipation of many requests for the 3rd Edition as well we will have offprints available For copies send your name organization building room number and number of copies desired to Offprints CRYPTOWG PI HQS 8A187 Phone requests will not be honored Personnel Summaries are important to everyone regardless of grade For grades 13 and 14 the formal promotion process requires that every Promotion File hence every Personnel Summary be reviewed during every promotion cycle Personnel Summaries are also used by many of the Key Component Grade 13 Boards as well as by some of the local boards for grades up through grade 12 I once chaired a local promotion board in my parent organization SI and we routinely reviewed Personnel Summaries of grades 2 through 11 each time we met Promotion The word inevitably stirs response of some kind in every red-blooded NSA employee hope pleasure challenge despair frustration disappointment even inertia resentment resignation Despite disparate views on promotion most people share -- openly or secretly -- a common desire to be promoted And many also share 1 believe a common lack of understanding about the promotion process at NSA and a lack of knowledge about the part they play in it Personnel Summaries have still other uses for overseas assignments for transferring to new jobs for some types of training Whenever in fact official information on you and your career is needed the Personnel Summary may be This article mainly addresses promotions to used The first and major part of this article grades 13 through 15 and discusses two subjects presents tips on how you should write your allwhich are fundamental to those promotions -important Personnel Summary Personnel Summaries and Promotion Files The The ideas in this article are my own 1 was Personnel Summaries part also applies to not an expert on personnel mat rs when 1 persons in grade 15 for promotion to SCES or STE Both are critically important to you the wrote this article in 1978 and did not mean to employee because they are critically important appear to be I wrote it as a result of my to the promotion process at NSA Witness these experience as a member of the NSA Grade 14 two points Promotion Board that year In 1980 1 chaired the NSA Grade 15 Promotion Board and later o your Promotion File represents you to a 1981-82 served as a member of the Advisory promotion board and Panel on Executive Development APED which selected candidates for SCEDP The Executive o you personally write only one document in and Qualifications Panel EDQP Development that file -- your Personnel Summary has replaced APED with expanded responsibiliPromotion Files described in this article are the ties The EDQP a subordinate panel of the ones regularly kept for people in grades 13 and Senior Personnel Board SPB also evaluates qualifications of potential candidates for the 14 for use by the two NSA-wide Boards that Senior Cryptologic Executive Service SCES as deal with promotions to grades 14 and 15 These Promotion Files are described in the final well as for service schools and other selections 2nd Issue 1987 o CRYPTOLOG o page 19 FOR OFFIOIItL USl'3 ONLY I DOCID 4011703 These groups all still use employees' promotion files including the Personnel Summary during the review process Files on Grade 15 employees are centrally maintained in M4 and are available for use as needed All of these experiences have simply confirmed long-held impressions and reinforced my belief about the critical importance of the two topics covered in this article PERSONNEL SUMMARIES Many consider Personnel Summaries to be the bane of their existence Some don't take them seriously Others fill them out casually And most of us write them because we are forced to Whatever you feel about Personnel Summaries you should recognize why a Personnel Summary is important who is responsible for filling it out when it should be filed and how to get it filed Why Important Why is your Personnel Summary important Because it is an essential document in your Promotion File the one that describes your complete NSA life your jobs your accomplishments your training your awards It is no secret what things are deemed desirable for promotion The information you provide in your Personnel Summary constitutes a list of the very things judged important when selecting people for promotion to any grade Your Promotion File represents you to the Board it is one of the most important sources of information about you available to them Board members cannot be expected to have personal knowledge of you in a large Agency like NSA True if you are fortunate enough to be nominated for promotion then a written recommendation about your accomplishments and qualifications is included in your Promotion File But a new Promotion Nomination form instituted in August 1986 specifically directs that information available in the Personnel Summary not be duplicated on the Nomination Form So YOUR PERSONNEL SUMMARY IS IT Since every Promotion File contains one and you write it it is your chance to describe what you have done No one knows it better And if you do not say it it may not get said at all Who is responsible Who is responsible for your Personnel Summary YOU ARE You are responsible for filling it out initially within 90 days after promotion to grades 12 through 14 and then for updating it Do not expect your office to remind you It is your duty Though Personnel Summaries are not required for them I also urge people in grades below 12 to fill out Personnel Summaries and to update them periodically Get into the habit now for it is easier to do it routinely and gradually than suddenly in one big lump when you become a 12 Also I think it shows supervisors that you are a person of initiative with serious career intentions When to File As I mentioned in the previous paragraph you must update your Personnel Summary within 90 days after promotion to grades 12 through 14 I recommend you also do it whenever a major event occurs such as when you transfer to a new organization or job become a supervisor or assume major new duties receive a major award professional certification or educational degree Otherwise plan to do it annually in synchrony with the promotion board cycles Currently the Key Component Grade 13 Boards meet four times a year the Agency Grade 14 and 15 Boards meet twice If your updated Personnel Summary is in your file by 1 February or 1 September you will satisfy all Boards Since both the Promotion Board cycles and members' assignments are now on a fiscal year basis I recommend September I simplify updating my own Summary by following a practice I use to keep track of income tax deductions whenever anything of importance occurs I jot it down on a slip of paper with the date and stick the paper into a file When the time comes to update I have all the information at hand and the job is nearly done Tips on How to Write a Persumm The following paragraphs describe ways to write a Personnel Summary These are my personal ideas and some people -- even you -may not agree with them So be it But I hope to stimulate you to think seriously about Personnel Summaries and to try to help you to write a better one My aim is to give you a start and hope that you will take it from there My best general advice is to be succinct Say what you have to say briefly concisely and clearly Do not write the Great American 2nd Issue 1987 o CRYPTOLOG o page 20 FOIt OFFICIAL use ONLY DocrD 4011703 Nuvei lUlu ramble on for 20 pages On the other hand avoid being too brief and selling yourself short I am surprised at the number of people who write one-liners Do not try to upstage Agatha Christie and write a mystery story but avoid too much excruciating detail Write your Personnel Summary so that a busy person who is reading hundreds of Promotion Files can understand and appreciate it quickly and you hope be impressed enough to single AS OF dole ' N AM I OIl out your file for special consideration Personnel Summaries are written on form P3267 REV Sep 78 which is available in the NSA Supply Room the M35 Integrated Personnel Activities IPA's and your office And now thanks to office automation the form is also becoming available as software The first page contains seven items Figure 1 shows the first four it op Har on official cord GBP4 t all capitol tt ftNt JANE Feb 1987 Z EMPLOYEE IDENTIFICATION midd ' SSN oo TOTAL Il'EDERAL CR'YPTOLOGIC SERViCE Mlk 1 Hj AM AFSS 123-45-6789 CIVILIAN SERVICE man tho montho' 3 2 9 15yrs 1lIros Figure 1 One sees many Personnel Summaries with only the dates changed - the correction tape over the date is obvious in the reproduced copy This is often done and rightly so to save retyping when there are no major changes to report But what if there are important changes in your job and you don't record them Look below at item 6 ''Experience Fig 2 taken from a supposedly current Personnel Summary The ttAs or' date should never be over a year old Some files contain Personnel Summaries so ancient that the paper has turned yellow An out-of-date summary raises some rather unflattering -- to you -- questions in the mind of the reader Are you lazy Are you so disorganized you cannot remember to update it Don't you care 6 NSA CSS OR SCA CIVILIAN EXPERIENCE TITLE DATE OF ACTION GRADE A CU RI NT ASSIGNMI NT FlmctloNJIIJob Tit o o Chi f StOrtllJ Equipment Diuil'on if non u job titir SF5 Ttl Doto cted on 3150 or Traffic Analyst AGENCY ORGANIZATION 12 Jan 1986 Bll1 12 Apr 1984 B9 5 Jun 1958 AlU oo TITLE OF LAST ROMOTION Traffic Analyst C INITIAL ASSIGNMENT Analyst Figure 2 To the eye Item 6 in Fig 2 looks fine However t this person is no longer a Traffic Analyst in BU1 He has transferred to a new job - a supervisory one -- and he is now Chief Processing and Analysis Division X35 BUT HOW IS THE BOARD TO KNOW The problem is magnified if this person is nominated for promotion The documentation that accompanies the nomination describes the person's CURRENT job with the result that the two documents -- the nomination and the 2nd Issue 1987 Personnel Summary -- do not match How does that look to a Board Again what does it say about you and your sense of responsibility When listing your current job title in item 6 be sure to use the FUNCTIONAL job title if you have one For example D Chief Data Storage Division Project Manager for XXXX Russian Language Instructor Otherwise use job titles as shown on the form Now let's go back to item 5 your educational record Fig 3 CRYPTOLOG page FOR OFFIEURIAL US 21 ONLY I DOCID 4011703 6 EDUCATION L moat fin' ' Ji l r- nk ' ' 'T f OnO DEGREE MAJOR FIELD _ d MA 20 University of Maryland Dean's List credits Armed Forces Staff College University of Maryland Cum Laude Phi Beta Kappa Honors in History Anne Arundel Community College Bowie High School International Relations AA Diploma ' rf f of 1982 - resent Nights 1980 Diploma BA DATES ' ' N jfhr History Political Science History College Preparatory 1972 - 1974 1970 - 1972 1969 -- Figure 3 List these in reverse chronological order with the most recent first Include all education for which you earned a degree and use Diploma to indicate completion of a joint or service school Also include substantial work toward another degree If any of these took extended time indicate why Nights And I suggest you state any graduation honors here to highlight them Item 7 Commendations and Awards should also be in reverse chronological order Fig 4 shows some examples of the kinds of things to include 7 COMMENDATIONS AND AWARDS e Meritorio Civilian S rvice Award Out tand n P rto noo App i l L tt of Cornnwndation from Chi ' of major or onization or hi her Lid mod cent firlfJ DATE 1987 1987 1986 1985 1982 83 84 1981 1979 letter of Appreciation Chief A E Perfonnance Rating - oor expert on UNIX Special cash award or 081 or SSWP level 7 Performance Rating CUtstanding' performance Rating First Prize CIA Essay Contest Meritorioos Civilian service Award lCS Teacher of the Year NSA SCholarship 1970 1958 Figure 4 Include Letters of Appreciation only if they are from a Chief of a major organization or higher for grades below 12 I think this rule may be relaxed and be sure that copies of such letters are in your Promotion File List only whatever were top-level performance ratings of that period Le when they had them level-7 but not level-6 I suggest that you add any short complimentary quote from your Performance Appraisal to give it more substance as outstanding instructor most professional personnelist or ''THE expert Also list any special Agency awards cash or honorary and scholarships you may have received Professionalization certifications belong in Item 16 and extra-curricular activities should be entered in Item 14 -- do not include them here Page 2 of Form P3267 contains two items At the top Item 8 provides space for summarizing your Current Assignment Fig 5 Begin this paragraph by giving your functional job title the name of your immediate organization date of appointment and names of ascending key organizations 8 SUMMARY OF CURRENT ASSIGNMENT D Chief support Staff Z13 Office of Facilities Zl Cotputer services Organization Z Since April 1986 Mrs Jones has been responsible for managing 'St Figure 5 2nd Issue 1987 CRYPTOLOG page 22 fi'Oft Ofl 'IEURIAL USB ONLY DOCID 11 703 o Tnen4 1_ s your m Jor responSI'b l ' llties fi0IIoWlng In addition follow these suggestiol1s these recommendations Use chronological order ''Begin with the oldest assignment and end with the most recent Note that this is not 'reverse chronological ordltr as in some of the other items Use narrative style not outline form Use complete sentences Use third-person farms not '1 was responsible fur but 'tMrs Jones was responsible for o Use Me paragraph per job Note that your supervisor's signature is required in Item 8 as verification Start paragraph with Qital information dates funttional job title immediate organization and up Item 9 at the bottom of page 2 is the Summary of All Previous Civilian and Military Service of a Cryptologlc Nature This is prdbably the most difficult part of the form to till out The longer your career the more you have to tell aOOot It there is not eMugh space provided in Item 9 w hold all the information requested yw lfhould use as many additional plain sh ts as necessary labeling eath With your name SSN and page number This is likely to be the longest seetion so It is important to try to make it clear and readable You do not have to be an accomplished writer or even to have any special writing skill Just be direct factual and as concise as possible Follow instructions given above ror Item 8 use narrathre styl complete sentences third-person forms '0 Identify organizatiol't$ projects systems etc Notke that I said to identify organizations projects systems etc Otherwise you end up writing a mystery stoty like this one From August 1960 to January 1964 MI' Smith was Ch $ of A13 where he' was responsible tor managing ali aspetts of Project SUCHNSUCII 1te also provided technical assistance to several important systems under study by another division XYZQ and ABCJ The only really clear thing in this paragraph is the dater Who remembers what A13 was in the early 19EiO's What in heaven's name was SUCHNSUCH What were systems XYZQ and A aCJ And so on How much clearer and how mu ch more professiona l if this had been written instead Fig 6a UMMARY OF AL L P'REVtO'US CJVfLfAN AND ''-ILITARY SERViCE OF A dJilYP' OL O'GIC NATURE I i Lut in chronolozical orcHr tL 'Uh oldr t li iznme'i'it Gnd end with mod recent indicate locatio functtonalliob titk and do f oo From August 1960 to JanUCL-Y 1964 Mr Smith C s Chief of the Nonesuch Reporting Oivision Al3 ' in the Office of Overall Reporting Al in the G ' nera l Analysis and Reporting Group A He was responsible for managing all a spects Of project SOCHNSUCH ffull-text autol'l 3 tion of NOnesuch rep rts and provided technical assistatlce to several impor ' arlt systems under study by another division XYZQ systern for automating and ABeJ systern for o Figure 6a If you Wish' you may use a space S1lving rormat with 61'1 trset h ader for dates jobs - and orgal1izations followed by a colon and a list as in Fig 6b SUMM'AJllfY o - -LL P _ e viO-US ClVI1 'f t - A HD_ M'LJ A1tY SERViCE OF A CR -n-l 3LOGIC KA-rUR'E - Lut In chronolollcal ordtir MfirC with olde- t u-n nmenf and- end with l't'UHt'recent - fndieote location funetiortAtfiob' tUw ond datu' August J960 to January 1964 chi ef 1I1one uch JPYrt1l19D yi s i on 'Al3 O ffice of' Overall Reporting AI General ysi s aI d JPYIArtiIig Grt Uf A Mr Smith was responsible for managing SOCHNstx H full text automati6ri of Nonesuch reports all reporting on and providing technical assistance to another division on several inportant systems such as XYZQ system for automating o and M J J system for 2nd Issue 1987 peR CRYPTOLOG efPU3I L USI3 o page 23 ONI Y DOC I q hese4 alle1 - te small things to you but Page 3 of the form contains four items the top they have a big impact on improving the three of which are often ignored -- or so it readability of your Personnel Summary You do seems when they are so frequently left blank Field Assignments Related Experience and want people to read it don't you ''Publications '' If you have pertinent As the final test I recommend that you ask a information on any of these put it in friend to read your Personnel Summary For Item 10 Field Assignments Fig 7 be critically to see if it is indeed clear and to the point Preferably that friend should pretend sure to give the organization functional titles that you are not a friend but a complete and inclusive dates These items are in reverse stranger who wants to know everything about chronological order Incidentally regular you Does your Personnel Summary present updating of Personnel Summaries seems to be a you as a clear-writing and presumably clearspecial problem for people assigned to the field Their Personnel Summaries are often neglected thinking forceful direct person or as an imprecise vague person carrying out various while they are away from Fort MeadelFANX unexplained duties Rewrite your Summary and consequently promotion boards sometimes have no knowledge whatsoever about what the and especially Item 9 until anyone who reads it -- not just your friends who have known you person is doing during an important 2- or 3for years -- can get a clear picture of what you year period I urge people to file yearly have done and why you are promotable updated Personnel Summaries while they are on field assignments 10 CRYPTOLOGIC COMMUNITY FIELD ASSIGNMENTS CONUS d O- lU Liot marl recw t Ir t ORGANIZATION LOCATION FUNCTIONAL JOB TITLE OATES F06 TiInbuck Chief of Station 1983-86 F99 Eden Engineer 1970-72 F17 Nowhere Analyst 1965 Jan - Mar Figure 7 For Item 11 Other CivilianlMilitary Experience Fig 8 include those things that may apply to your NSA job such as teaching managing and organizing These are also in reverse chronological order For example 11 OTHER CIVILIAN MILITARY EXPERIENCE WHICH MAY BE RELATED TO AN NSA CSS OR SCA POSITION ORGANIZATION LOCATION FUNCTIONAL JOB TITLE OATES Anny Reserve Ft Meade MD Platoon leader 1976-Present G W University Washington D C Iecturer in Computer SCience 1968-70 Stmrer Camp Arlington VA Director 1965 Figure 8 CRYPTOLOG o page 24 FOR OFFI6I L liS8 ONLY 2nd Issue 1987 - ' c- 1 - r i - o Item 12 is Publications Fig 9 I am disappointed that so few files list any publications Since publications are included in the Personnel Summary NSA must consider writing to be an important skill Managers for example must spend a lot of time writing And good writing comes from practice Update Vox Topics The editors of all these publications welcome your contributions There are also essay contests sponsored by the Learned Organizations of NSA CMI CLA Kryptos HRMA AI CISI etc And there are opportunities to contribute to the Cryptologic History Series and to NCS courses Fortunately for us NSA offers many opportunities to publish If you have been looking for places to express your views here they are CRYPTOLOC The Cryptologic Quarterly The NSA Newsletter CLArion PQS Try to have some published works and major reports though not regular ones produced as part of your job to list on your Personnel Summary It just may help to attract attention to your file 12 PUBLICATIONS Lid tltlu do II0t COllf_ til 'ttll rrpon p epand GO rr u part of tile Jobl DATE Projectsu HNSlOi - A Personal View - article based on talk given in April 1986 to the CClnputer and Infonnation Sciences Institute CISI CRYP'IQI X Dec 1986 Figure 9 The next three sections all part of Item 13 of the form are meant to show ''Highlights in the Area of Self Development in your professional life -- past present and future The format is the same for all three sections Fig 10 gives some examples for A Past List here the things that are completed such as past 13 HIGHLIGHTS IN THE AREA OF SELF DEVELOPMeNT milftc17 or civilionJ At weD memben hip awerdedJ u auentl m dtMT SUBJECT sOCIETY membership in professional societies and education not already listed in Item 5 Courses taken at NSA belong here but not your college courses Follow the example and identify the course by title and course number In the rightmost column you can indicate things like ''Top Student or special honors You can leave this column blank if nothing applies Chronolo i Dlly IUt all fonnol NSAICSSISCA coil e wllelor cllni 1 cour NSAlCSS SCA or e ct t moJ profe 'onol _oddte_J Exclude th o tor which de wcs DATES tram tol PLACE PURATIONOR LENGTH -- DEGREE - University 1965-68 NSA 1968 49hrs S M3-444 Managenent Analysis NSA 1971 120hrs A on NSA 1980Present Zeta Eta Eta French SPECIALTY OFFICE HELD -- President 196 7 Honorary tic lL -MS-111 Briefing Skills - - Top Student Member Figure 10 The first two items on page 4 the last page of the form are B Present and C Future highlights in your self-development sections not reproduced here These sections are to be filled out in the same manner as A Past Future plans might include such things as attaining another specified certification changing your career field or joining a professional society Item 14 Other Achievements l ig 11 provides space for showing your selfdevelopment in your nonprofessional life Many people leave this blank If you do I think you are missing a big opportunity to provide a rounded picture of yourself to the Promotion Board If you are active in the areas like those listed below I encourage you to list them Show by your non-job-related activities that you have other interests -- and other talents 2nd Issue 1987 ' CRYPTOLOG ' page 25 FOR OFFICIAL US ONLY I INCLUSIVE OATES NSA Civilian Welfare Fund Credit Union GEBA NSA Jazz Band Travel Chili United Gi s Fund Canpaign Ccmwni ty Church Scouts recreational activities civic arouos PrA 1967 1970 1972 1979 1980 1986 - 1969 1973 Present Present Present CAPACITY IN WHICH SERVING SERVEO B Group representative Board of Governors Board of Directors Member Member Member Member Keyman President 1976-78 S Group Provide the appl ' 'priate infonnation Figure 11 Item 15 not reproduced here provides space for especially not ''Playboy '' Board members have you to list your job-related or self-improvement seen that one so often they are weary of it Reading Achievements -- in-house publications professional journals foreign language material ''Professionalization'' certifications are to be listed in Item 16 Fig 12 If you have more Please do not list your pleasure reading than one be sure to list them all with the dates awarded If you are about to receive still another note this in parentheses as shown 16 PROFESSIONALIZATJON LUt prof mo l utlfItDtlon l CERTIFICATION TITLE Cryptanalyst Education and Training Officer Traffic Analyst Lack only Part 3 of PQE for certification scheduled to take test in Nov 87 OATE 12 June 1976 1 Sept 1983 CERTIFYING PANEL S Cryptanalysis Career Panel Education Career Panel Figure 12 PROMOTION FILES Finally sign the form date it and affix the proper security classification Take this Promotion files are not to be confused with responsibility seriously and do it carefully official personnel files often called 201 Files seeking help from experts if you need it Underclassi-fying or overclassifying looks bad to The Office of Personnel specifically the M35 Integrated Personnel Activities maintain them the board because boards expect that by grade There is an Official Personnel File for every 12 you should know how to classify correctly or NSA employee It documents all formal activity know where to find help in connection with your NSA life hiring perInstructions for filling out personnel summaries formance appraisals training job or organizaare contained in the NSA Personnel Managetion changes etc There are official promotion ment Manual Chapter 302B Oct 79 which files only for employees in grades 13 and 14 every major office has Your own office will Local organizations often maintain abbreviated handle the filing of your personnel summary for versions of the 201 File on their employees and some may also keep a promotion file Official you It will reproduce multiple copies of it some for retention in local organizational files promotion files are the files that are being disone for you and for grades 13 through 15 cussed here - the files used by the two Agencysome for sending through channels to your wide promotion boards when considering people promotion file in M4 for promotion to grades 14 and 15 I am going to tell you what should be in your promotion file how you can make arrangements to see yours and how you can update it 2nd Issue 1987 o CRYPTOLOG o page 26 FOI OFFICIAL USE ONLY DOCID 4011703 Your Promotion File should contain o Personnel Summary current within one year o Certification documentation in the form of a computer printout or a letter from the certifying Panel o Recommendation for promotion from Key Component if you are recommended Since Promotion Files are shown to you intact with nothing removed you can see the recommendation on you if there is one major organizations or higher But if you have something 'noteworthy you would like to include send a copy to M43 Promotion Board Room and let M43 decide o Peer group ranking was used in 1976 only o Individual Career Appraisal and Development Plan used as part of the Performance Appraisal in 1975 only o Anything since your last promotion that might be beneficial such as letters from War Colleges Invention Awards Suggestion War Colleges Invention Awards Adjunct Faculty certificates from NCB etc In addition your Promotion File should contain FOR YOUR CURRENT GRADE ONLY infonnation from previous grades is purged To review ourfJrorn otiQnFileicallMrs Alice IIM43 on 963-1677s or 688-761lb and o Performance Appraisals an appointment to see her in Room 2B4132 You may talk to her about adding o Inventory of Attributes If you are 12 or items to your file if you notice that something above this is part of your official is missing And if you disagree with something Performance Appraisal However you may in your file or think that it is incorrect call never have seen it or even know it exists her attention to it Depending on what it is because until the late 70 it was a private she may suggest that you discuss the matter document and was generally not shown to with your supervisor and then advise you employees Nowadays the form is white but it about the possibility of your inserting used to be yellow and then green and some something in the file to explain your views as files may still contain copies of the older is usually allowed M4 encourages you to look forms at your Promotion File and welcomes your help Figure 13 shows the form for the Inventory of in keeping it up to date and complete To insure that it is especially if you have Attributes Rating is on a scale of 00 something important to add just at the time the through 99 and space is provided on the Boards are conducting their file reviews you right for narrative comments Like the inforshould send a special copy directly to M43mation in a Personnel Summary the items Promotion Board Room as well as through in the Inventory of Attributes constitute a list official channels of some of the most important things in this s case personal qualities judged desirable for determining a person s promotability You may be concerned about the inevitable unevenness among supervisors' ratings on Performance Appraisals and Inventories of Attributes Promotion Boards have access to detailed information large computer runs about all raters This information shows them who the ''hard'' and easy raters are and helps the Boards to normalize the ratings o Cash award and honorary award write-ups In conclusion two points already mentioned sum up the main ideas with which I would leave you Your Promotion File represents YOU YOU write YOUR Personnel Summary Improve your promotability Increase your chances of getting promoted by making sure that your Promotion File is complete and that your Personnel Summary is up to date and clearly written It's up to you 0 o Laudatory and commendatory correspondence Ordinarily these are to be from Chiefs of 2nd Issue 1987 o CRYPTOLOG o page 27 FOR OFFIGIAb USE OHbJPY I P L 86-36 DOCID I 4011703 SECURITY CLASSIFICATION IF ANY INVENTORY OF ATTRIBUTES Reference NSA CSS PMM 30-2 Chapter 340 GRADES 12 THRU 15 ONLY Prepare in triplicate DISCL OF SSN MANDATORY USE OF SSN AUTH BY EO 9397 SYS OF RCDS CREATED PRIOR TO 1 JAN 75 THEREFORE EXEMPTED FM REFUSAL PROVISION SSN WILL BE USED TO VERIFY IDENTITY OF INDIV ON THIS OTHER ACTIONS RELATED TO THIS SUBJECT 121 NAME IL st First Mil III SOCIAL SECURITY NO 13 GRADE loo g GG0121 W ORG Supervisor's D t INSTRUCTIONS Compare this employee with others in the same grade level regardless of the occupational specialty title Assign your numeric evaluation using any of the numbers 01 through 99 from the scale shown EVALUATION e9 90 - 99 75 - 89 50 - 74 ATTRIBUTE DESCRIPTION Superior Above Average Aver e 25 - 49 Below Average 01 - 24 Poor NARRATIVE COMMENTS IF ANY A 'NNOVATIVENESS Considar how w II tlla individu I provide problem solution shows ingenuity and cr ativity and pion ars in oooking new ways to complete work faster and more accurate v flO B EFFECTIVENESS IN WORKING WITH OTHER PEOPLE Consider how wall the individual m oots and dools with others and effectivene'l in establishing and maintaining working relationships with peer subordinates and superVisors 111 C DRIVE AND INITIATIVE Consider th extent to which the indivdual demon tr te attributeo ouch oo forcefulnoooo aggreooiveneoo and enthusiasm 12 D PERSONAL CHARACTERISTICS Considltf 11 rson 1 char cteristics s Ih y ffeci Ih individu s job p rformence 13 Present 14 High r 1151 E SUBJECT-MATTER KNOWLEDGE Consid r th Individu I's dePth and bre th of knowl dges nd ski lis raquired t th pre ent and next higher grade F ADVANCEMENT POTENTIAL ConSid r how th individu 1 compares with other for advancement to o position of ater responsibility s _II as over II c bllity for proooooiDn within the care r field SUPERVISOR'S SIGNATURE 1111 TITLE ORG DATE CHECK IF EMPLOYEE IS AMONG THE TOP 6% OF YOUR WORKFORCE AT THIS GRADE LEVEL IN TERMS OF JOB PERFORMANCE COUPLED WITH POTENTIAl FOR FUTURE ACHIEVEMENT Requires approval below in accordance with applicable PMM instructions APPROVING AUTHORITY Sign tur ' TITLE FORM P1B REV AUG IUSu rsedes P1B MAR 71 which is obsolet l ORG SECURITY CLASSIFICATION IF ANY Figure 13 2nd Issue 1987 o CRYPTOLOG o page 28 FOR OFFICIAL USB ONLY DATE DOCID Do you happen to have a news item a comment or a tip that is no more than a paragraph Or perhaps you have an article of several thousands words Long or short if it has something worthwhile to say we'll probably print it Of course a shorter item has a much better chance of getting read For your interest and guidance one page of typescript double-spaced makes about one column in CRYPTOLOG First-person articles or stories about your own experiences are welcome so long as they relate in some way to our work Want anonymity A thoughtful piece on a subject of interest to a large number of readers will be considered for anonymous pUblication if the writer requests it The writer must however identify himself or herself to the editor Needless to say personal or trivial complaints will n2k be considered Something missing If you feel that your work or your interests are not represented in CRYPTOLOG it's probably because you and your friends are not contributing The editors earnestly want to cover the whole territory but articles don't grow on trees y'know Somebody who knows the subject matter has to write them Your contribution does not have to be typed we'll give preference to content over form every time We've even accepted an item written on a used lunch bag Nowadays most people use a word processor and in that case we ask you to send a floppy along with the hard copy and write on your floppy what hardware operating system and word processing software you used And don't forget to include the file name and your name and phone number You can also send items via electronic mail to cryptlg@barlc05 In either case please do not right-justify in your soft copy the spacing isn't the same in our columnar format and the extra spaces may have to be removed by hand one by one -- in this day and age of automation Need assistance You may have an idea or some notes or even a half-finished paper that you feel has possibilities but you don't know what to do with A call to the appropriate subject editor will get you a story conference and possibly inspire you to finish it up and get it into print Sensitive materials No way We'll go all the way to Top Secret Codeword but we have to draw the line at compartmented or otherwise sensitive information Our deadline Theoretically we should have one but we don't After all CRYPTOLOG comes out six times a year so if we get your article just after one issue has gone to press you'll be in time for another one There's no such thing as a bad time to submit an item for pUblication in CRYPTOLOG 2nd Issue 1987 CRYPTOLOG o page 29 POR OPFIEURIAL USI ONLY DOCID 4011703 GETTING STARTED 1 My object is to o Make a report on something that has been accomplished o Call attention to something that is wrong o Suggest a better method or idea o Share a personal experience o Enlist support o Explain a process o Ask a question o o o o o Defend a principle Report news or announce a coming event Recognize an achievement Amuse and entertain React to something someone else has written o None of the above but something else namely 2 My working title is o o A better way to _ Hurray for o The fallacy of o It's time to o The scandal of Are we paying too much for DAfter _______________________________ What o ----------------------_ o A proposal for o What happened at o Why I agree disagree with A funny thing happened on the way to o None of the above but _ who wrote o 3 I will consider this in my own mind an open letter to and will address to primarily to her him them 4 o This would be a particularly good time for such an article to appear because o o This subject is timeless 5 oI am especially well qualified to write on this because or on the other hand -------- oI want to speak up on this even though I am no expert on it because 6 Some tentative suggestions for a final title are 7 I think it would be most appropriate oCRYPTOLOG o The Cryptologic Quarterly o CLAr ion for publication in 0 The NSA Newsletter 0 PQS Update 0 Vox Topics CRYPrOLOG page 30 FOR OPPICIAL USB O lLJPY 2nd Issue 1987 DOCID 4011703 Golden Oldie u E 4PLOYEE PERFORMAlfCE APPRA I SAl PART A wr F A IOOlE x OFFICIAL IJIIOFfICI AL I E INITIAL Nt - I NSTALLATIOM ORGA '7A110MAl SlUMEMT 6129 APPRAISAL PERIOD 29 Feb 55 FROM TO 29 reb 56 oo SUPERVISOR'S EVALUATION OF PERfORMANCE ON THE ABOVE J08 C ooope te f perf o utlined in r rforo nce Appr l oo l r l rene u l for uperriaor ' poteDt IlUCJAar tta 1oD ID 84ftDclDs the Apnq' 1I18 1oIl Bel' eoopu'atSGD ct1oll be GIllS ALOlIJ tf1'1'I O'IIBI D SIC'l'xa- Pan on1a ' pt o o1II'P1u r J'IIUIOO ADd DO t Il1a nt1e VheD it c c to DDO'fIOI 'lO DU'1'r Of BIUOU J1E8 be' lOt 'l'iCiii1CAL aDorn ftAlILm ADS QUlftl'I'f aD4 QUALm' AD 1Ba'UL -A'l'ILl'I'f e ca OOOIDDlB aD4 JUfIAB o aIIlll- 4 aD4 'cit ADd OD tM 1QS'l the JI 8'f III AttuUDa to PDflIDf SHe J1DMM't 1OtD M WII1l IoIIItJWSIU Au _ b ao aftUo aU 1 IIMe Ida JIlINtIIIl of ak1U OIl wtap 1'1' 1 t leU' _ IlDInftQD MAJOR STRENGTHS MAJOR AREAS IN WHICH IMPROVEMENT IS OlSIRED 2 PERFORMANCE RATING c J I'lUTSTAllDING Ju 'lf ' 'Mll ' EE' S SI GNArURE 'ech d XJ SArfSfACTlllIY DATE Of 0' SCUSS ION c J UUATlSfACTl RY 'lflc 'I-n ech d SUPERVISOR'S SIC ATURE AND ITLE - ---------------1 It _oo I- -- -- - --- - ----- -- -- ---- - _ __-_ '_----- - iOTE The Itdjeeti ve r I ssi 1l d mllY be e led Inf r_ intt on 1 procedure _Y be ob' i d frOlll your supervisor or i f you refer fr_ 'he Civi l_ 1' nONlel Office DA o r 1052 TUT 2nd Issue 1987 CRYPTOLOG page 31 'OR O a b lJ88 ONI JPY DOClD 4011703 NSA-CROSTIC # 64 I IR822 n oo nnnnnnnnnnnnnnnnnnnnnunnnnnn P L 86- 3 6 The 'luotation on the next page was taken from a published work ofan NSAer The first letters ofthe WORDS spell out the author's name and the title of the work DEFINITIONS WORDS A Operate unobstructedly B Freshness 6J C Blameless II n 3' lSI IQ 4 111 111 114 n 1 166 '51 In In 41 '91 11 'Ii 65 '01 111 15 11 61 4' 110 61 n 116 66 16 '60 110 '50 106 154 131 14 4' 101 3' 151 '01 39 II 161 4' II 101 II 156 1 5 116 '10 165 11 10 IIJ III 3 It 151 25 III '5 t 111 lot 21 115 ' lJ3 '44 11 130 112 lU 5J 11 126 90 ' 24 III '81 31 lJI 10 121 191 45 lJ' 111 60 91 U 45 '41 19 ' 0 7' 13 Dl 114 51 II 51 lU 161 liS U I 14 131 4D It In 21 52 D Reflected E Miss Marple does it F -------- love G Bow partners H Having a certain visual defect 10 '5 I Once famous for its trees J Boredom K Fanny Farmer measure L George Washington had one M Steadfast N Input again O Provided gratuitously o P ------ measure O Pronoun R Information source s Economic doctrine T ------ baron u Wished V Rear deck W Seat for an amphibian X Advancing Y Long-term rental z Commencement a Transmission b Barms 42 '00 III 16 110 115 33 '43 54 32 114 '41 194 II J5 'll 105 II Il 153 '64 III lJ 7' 61 41 100 n 103 55 II 4 111 4J lJ4 lJ 101 141 ------- 2nd Issue 1987 o CRYPTOI OG page 32 'OK OFFIGIAI USB ONLY II ' 113 IS' 56 o 30 17' lJ' DocrD 4011703 1 V5 H 15 018 L 32 X 33 Y 36 A 37 H 38 P 39 S 19 R 20 054 X 55 a 56 S 74 A 30 Y b 44 G 45 R 46 147 C 48 L R 61 X 62 E 63 B 64 M 65 D 66 F 67 Z Z 79 S 80 A 81 R 84 H H 96 a 97 P 98 R 99 HOW RUSSIANS VIEW THEIR LEADERS A story is making the rounds in the Soviet Union and in some Eastern Bloc countries describing how the Party Chairmen would have dealt with a problem A train is traveling from Moscow to Siberia when suddenly the rails end What to do Await orders from Moscow from the Kremlin Under Stalin the order is given Everyone otT the train Shoot everyone Under Krushchev Everyone otT the train Pick up the rails from behind the train and lay them ahead Move forward Pick up the rails from behind the train and lay them ahead And so on Under Brezhnev Everyone stay on the train Close the blinds and rock the train so that everyone will think it's still moving Under Gorbachev Everyone otT the train All loudly shout 'There are no rails There are no rails There are no rails ' Provided by 1 2nd Issue 1987 o CRYPrOLOG o page 33 FOR OFFI6IAL USB ONLY Answers to uNSA PUZZLE 1st Issue 1987 by Carolyn Cornelius T12 1 INSANE 2 A1u AHSAS 3 UNSALTED 4 COMPENSATE 5 BONSAI 6 INSATIABLE 7 TRANSATLANTIC 8 CARAVANSARY 9 INSALUBRIOUS 10 UNSAID 11 RANSACK 12 GAINSAY 13 UNSALARIED 14 CONSANGUINITY 15 UNSANITARY 16 TRANSACTION 17 UNSAVORY 18 MANSARD 19 MAINSAIL 20 UNSATURATED P L 86-36 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu