NSA on 10-17-2012 ursuantto E O 13526 MDR Case # 5477 WGBPDUDlDWGBPD 1 15 Bl JWDU GBPDl 15I B LflDU1V lil151IJU1lil15 lil 0015GBPillD15 f 00GBPilU1 11 UlWlD 3rd Issue 1991 EDITORIAL KEYNOTE ADDRESS FAREWELL TO THE TROOPS ACHIEVEMENT THROUGH PEOPLE THE LANGUAGE ANALYST AND AUTOMATION SIGINT IN AN OPEN SOCIETY THE WAY IT WAS A VIEW OF L KEYNOTE ADDRESS FROM THE PAST ODE TO SIGINT A MODERN FAIRY STORY GOLDEN OLDIE TO CONTRIBUTE fillS BOCtJl IEN'f eON'fAI 'S eOBEWORB MA'fERIAb ii 1 5 8 13 17 22 Dale Seaberg Gerald R Young 31 33 40 Al Friendly I I 41 42 4 7 44 CLASSIFIED BY NSA CsSM 123 2 DECLASSIFY ON Ori iRatiR AgeRey's DeteFffiiRatieR ReEtuireei NOT RELEASABLE TO CONTRACTORS 4019718 Editorial Three Cheers For NSA's o co co MAro-IING CHOWDE AND PPOFESSIONAL SOCfEllES In some academic circles it is customary to commemorate a significant anniversary with the publicationofa volume of essays especially written for the occasion And so to mark the 50th anniversary of Pearl Harbor in this issue CRYPrOLOG presents speeches ofnote that had not hitherto been published It seemed somewhat more appropriate to do this than to invite after-the-fact reminiscences that might be colored by hindsight J s the talks were contemporaneous they express the actual concerns of the moment They are snapshots of our past what we thought was important at the time what we were worrying about It is interesting to compare the salutatory and valedictory articles each by a deputy director to the same audience five years apart But what five yearsl Another custom in academic circles is to dedicate the publication toa worthy party Though little known outside the confines of our stronghold NSA's professional societies playa critical role in disseminating information To a great extent the talks symposia collferences arid seminars they sponsor serve to educate the technical cadres in a manner that formal courses of instruction cannot approximate Classification permitting any analyst may attend any talk whatever the discipline No requirements No tests Just information And so this issue ofCRYPTOLOG is dedicated to NSA's professional societies Long may they flourish 3rd Issue 1991 CRYPrOLOG page ii FOB OFFIOf4GBP UOE OPHN DOCID 4019718 Keynote Address l obert Rich ret This article is classiJied lOP GiC RilUMiR t in its entirety ooooooooooooooooooooooooooooooooooooo management and other fields as well as o o oo cryptanalysis and cryptomathematics Indeed it o This is an abridged version ofthe Keynote is common for individuals in our analytic populaooo Address delivered to the 1985 session of CAtion to be highly knowledgeable or expert in oo 305 Contemporary Issues in Cryptanalysis several of these areas In most ofmy remarks o At the time the author was Deputy Director o ofNSA about the health and future ofCA I will refer to o this broadly defined cryptanalytic arena since I think tl 1e topic can be better addressed in this The business of the Agency is decrypting secret way communications so cryptanalysis is the crucial NSA activity and the cornerstone of cryptOlogy I I als think that the health of ryptanalysis has hope it will be of interest to you to start the week improved markedly especially in the last three or four years This assessment is based on the rewith an assessment from my perspective of the sults being achieved opportunities being prestate of health of our cryptanalytic activity and sented by our targets quality of the workforce the what the future may bring present work environment available tools benAs Deputy Director I am rather removed from efits provided by collaboration and some organizamatters of substance but I believe that the tional factors I will touch on each of these bepresent state of health is quite good In considercause I think they are important in determining ing the health and the future of cryptanalysis and the current state of our cryptanalytic health cryptomathematics it is meaningful tc use a RESULTS broader definition of the scope of our cryptanalytic activity I Ipeople that we consider to be included in our cryptanalytic effort at NSA have diverse skills in such fields as ianguage engineering signals analysis collection I L o-------- - ------ 3rd Issue 1991 CRYPTOLOG pagel 'fOP SHCRH'f Ul'fffiflit 1 4 c P L 86-36 - EO 1 4 c IDOCID d 19'-f13 ' 'OP SEeM' ' UMBRA Cryptomathematics Exchange the Kryptos meetings and CA-305 are very well attended and the reports I hear are good I Thel program in my opinion bodes well both for improving the quality of analysis and for contributing to the coq tinued professional growth of our analysts It will enhance the variety and richness of work experiences that analysts already enjoy and which thinkis a major factor in the low attrition rate I would emphasize here that we intend to operate this program intelligently giving due consideration to theneed for continuity on the various problems I hope that you have noticed that thel Im Ilagers have operational backgrounds P L 86-36 TOOLS Turning to the tools and systems available for our cryptanalysts' use it would be difficult to find a more impressive work environment or One better _---------- -----_ served by computers and special-purpose elecThe other kind ofCA results those produced by tronic equipment our COMSEC cryptanalysts continue to have EO 1 4 c rofoundinflu nce on the design of our own P L 8 6 - 3 eryptologics r TilE WORKFORCE Looking at the cryptanalytic workforce we find that it has been growing steadily for the past four years at a rate well above the Agency average and that attrition especially that due to resigriatiori is very low-less than half of that for the entire Agency-which by the way is also remarkably low about 2 7% for resignations T he CA intern program andthe PI cryptomath program are operating th 1 about 70% increase over the number ofthree or four years ago I Our relationships with our major cryptanalytic cOllaborator rre strong and profitable and add greatly to the cryptanalytic health I ORGANIZATIONAL FACTORS Considering the work environment andtheopportunities it offers it is fair to say thatit is good I see the creation ofthe te chnical track and the increasedopportunityfor reward through promotions and awards tobe very positive for your profession Furthermore I think that we are doing a reasonaolygood job in provic4ng'for seminars confer rices and other means of bringing our anaIY13ts together for sharing views and problems Such gatherings as the annual EO 1 4 c P L 86-36 Finally there are organizational factors which relate' to cryptanalytic health As you know we are organized principally by target because we think this maximizes synergism When people talk about fUnctional organization cryptanalysis is one function often singled out as potentially benefitting We have repeatedly opted not to change our mainly target orientation but instead to rely on such cohesion-producers as seminars 3rd Issue 1991 CRYPTOLOG page 2 OP SEeRE IH'IIBR A DOCID 4019718 P L 86-36 conferences Kryptos CMI CA-305 the math and in their heads In this connection I want to again intern programs and the panels to promote menti05 twe mean to be sure that within-professional contacts I ' s r u n in a way so as to enhance the knowledge base In addition at the recommendation of NSAAB the Director appointed CA Council three years ago But our knowledge and momentum while exceedingly iniportant will not alone ensure success in which I chair and which serves the functions of the future I must hasten to add that there are high-level advocacy and oversight For the past three years we have made an extensive annual enormous technical challenges to be dealt with review of our cryptanalytic effort for the Director We must devise very clever ways to obtain and top Agency leaders The purpose is to better solutions using all our black art as inform of the progress and state of Agency cryptanalysis once was considered But with cryptanalysis I think these organizational arappropriate effort we can deal successfully with sufficient numbers of these challenges to keep our rangements are close to the best that we can production strong and our own sys ems secure design at this time a 80 as not to portray the view that I think everything is roses I must tell you that some our cryptanalytic managers believe that our exploitation-research split is out of kilter that is we are too exploitation-oriented and are not devoting enough resources to the difficult research problems much of our success stems from past research successes and our current exploitation may to an extent mortgage the future I do not totally accept this view but I do agree that we need to be devoting more effort to difficult unresolved problems and those that we know are coming up in the future I further think we are making reasonable strides in doing this now Our research efforts have been strengthened markedly in the past two or three years particularly in A5 86 and R5 LOOKING AHEAD The rest of this talk concerns the future of our cryptanalytic activity There is at least one thing we can say with confidence the long term future ultimately depends on continued success In my view the outlook for continued success is good based on our present posture knowledge and momentum These factors are often forgotten or greatly minimized when prognosticators discuss the future I want to emphasize them We have an impressive knowledge base concerning our targets' structures practices habits and systems It derives from years of study by dedicated analysts and probably one of the most important parts of it is the information our analysts carry around THE CHALLENGES The major technical factors and trends that must be faced by our Operation analysts are well known to most of you Basically they include advances in transmission technology advances in cryptography and difficulties resulting from a greater world-wide awareness of cryptography and cryptanalysis r Added to that are the important cryptographic advances stemming from the rapid spread ot microprocessor technology and greater use of software-based or more easily changed systems We are seeing many more new commercial machines and a significant growth in the number of indigenous machines being developed a nd employed by our targets Solving these problems will require a dramatic speedup of some of our current methods as well as development of totally new and imaginative techniques Our COMSEC cryptanalysts have to cope with the growing complexity and rapid development of US civil and military communications systems and the complex crypto requirements related to securing these systems Moreover public awareness of cryptanalytic techniques the declassification ofWW II data and publications about that era along with the in- 3rd Issue 1991 CRYPTOLOG page 3 ' Pep S BCIffi't' UMftItA EO 1 4 c P L 86-36 aCID 4019718 crease in non-governmental requirements for cryptography and the attendant public research have stimulated inte est in cryptography and cryptanalysis worldwide and will affect future target cryptography Another factor affecting the future is therecent strong academic interest resulting in numerous international conferences and publication of papers on the subject O era- tionally we already see more attention to COMSEC by some of our targets which probably can be traced at least in part the new awareness Balanced against these kinds of developments that cause problems for cryptanalysts are many opportunitie Also of major impo tance is the fact that our successes have given rise to a general recognition by SIGINT users and gove ent officials of the value of our product and a demand for SIGINT that is difficult to overestimate The result is powerful support for obtaining the resources we need to do the job To summarize I conclude that the health of our cryp nalytic effort is exceedingly good I am optimistic about the future hut I think we should brace for the challenges to be faced To help insure future success we intend to continue to pur sue objectives that we are already committed to namely a broadened research capability superior development and training opportunities for the workforce the ability to recruit and hold the best talent available maintenance of superior tools and processing systems devotion of sufficient resources and talent to collection signal processing and other supporting problem areas and provision of rewards for technical accomplishment L Golden Oldie E 1 4 P L 86-36 c 1955 c 86-36 She's cracked TWO systems ALREADY ' 3rd Issue 1991 CRYPTOLOG page 4 'fOP Sl JCRE'ftJMBitA DOCID 4019718 P L 86-36 I ooooooooooooooooooooooooooooooooooo This address was delivered by the autlwr on - the occasion of his retirement in May 1979 At the time he was 'head of audiovisual services at he National Cryptologic School and the Learn- - zng Centers ooooooooooooooooooooooooooooooooooo U I don't like saying good-byes They're difficult for me to say Almost-but not quite as difficult as saying to my various bosses during these past 38 years You're sure right boss You're absolutely correct What I have said to them has varied depending on the situation-but it hasn't been that CU I must ask your indulgence in my using a script It i my nature to become emotionally involved with the people and issues of work and I didn't want that inclination to becloud the message-which concerns the School Sorry about that S folks In any'event think of these next few moments as acupuncture-a friendly needle CU Start with O'Brien's Law O'Brian is a first cousin of Murphy At some point in the life cycle of every organization its ability to succeed in spite of itself runs out The NCS may be approaching that point I think so because of two different problems which have been distantly related but now re converging rapidly -the organization and internal processes of the School -the consolidation of all cryptologic training under NSA under a single training director U Let me take them in order This School teaches a much greater variety of more complex courses to a more and varied and operationally dezvanding student group than do the Service ' schools Despite thls obvious fact two years we reorganized along the Servic e pattern who in tum had gotten it from some contractors who had developed it for industry-and profit But the new structure is only part of the problem The other and even more serious part is the growth of minimum-value work engendered by the theory behind the structure I refer to requirements analysis and course development by formula CU Requirements analysis done only after someone else has identified a need and describes it in writing is as ritualistic as swearing in a witness and about as useful a tool for getting evidence This analysis is followed by course developmentby-formula which starts with micro-documentation of trivia These activities occupy the time and energies of many people I don't object to the fact that the analysis follows when it should precede requirements Instead of reacting to training needs discovered by people in the operating jobs we should have qualified school people living full time in the operating elements people who are given easy access to the DDs and ADs-access as least equal to that of contractors as well as to the sectionchiefs These should be people who become sensitized to the smell of trouble and who can sniff hard enough to figure out the cause and whether training could help CU And I do object to fixed-formula documentation which can easily result in professional people spending almost as much time in planning and 3rd Issue 1991 CRYPrOLOG page 5 FOR OFFICb f USH ONL T DOCID 4019718 scheduling and reporting and concept writing d getting permission to do what their various certificates and job descriptions say they are capable of and paid to do as they spend in creating the actual lessons and tests U In my view the result of all of this is that first inadequate attention is being given to NSA's rgent training needs early in the power curve of their emergence rapidly escalating costs oftraining We still haven't Instead ' a succ ssion of Commandants' have gone in the opposite direction from economical training andhave steadily worked at creating a pseudo-college an institute complete with deans curriculum chiefs learned journals accreditation an enormous catalog in short all of the trappings and burdens and costs and irrelevance of academia U Meanwhile needs here and in the field go U Second wrapping the development action in unmet or poorly met and contractors grow fat layers of paper loses more time and insulates the doing system operating and maintenance-even 4eveloper from ti egrime the essence the reality the management-that the Agency is incapable of of the training need In fact the whole analysiskeeping up with using its own people For the fact development formula reminds me of previous is thathUilding a iiberal arts college when we ' flashes 'in 'the manageri l plan Remember PERT shouldhaye been building a trade school-a u1ti and MBO Know any place where 'they are still lingual trade school to be sure- has not done being used' by the people who are doing the work 'much for the real need namely training in the These 'techiiiquesai-e alidhut probably only in acquisiti n operation upkeep and management of the specifi 'conditions whiCh spawned them ' the gallopiI g technology ofSIGINT and COMBEC Their wholesale adoption by a management for different conditions is whete the'mistakes have U No wonder Congress gotfrustrated and presbeen made sured DoD into consolidation But that's a mistake too for the belief in consolidation stems from U As I said the current NCS organization is the myth that one big something is more economibased on a training development formula develcal and efficient than several small somethings opedbyotlier people for otHer conditions I've no General Motors learned that it isn't necessarily doubt it's valid for those conditiong but for the true years ago ConsolidatIon is a huge red herNCS they are a mistake a di aster Well you're ring large enough 'to stock all the delicatessens in not obliged to accept this mistake nytllore 'than ' the Baltimore-Washington area for a year my successor is obliged to perpetuate my mis-' takes One of the benefits as well as'a prime U It isa political issue from start to finish reason for changing managers periodically is to There is no indication that consolidation will provide a graceful opportunity to abandon the materially iInprove the numbers or quality of previous manager's mistakes I urge that this cryptologic technical and management people In opportunity not be allowed to slip away fact the ITRO rep rt did not seriously address quality And I can accept that for the ITRO team U The second of the converging problems is the was in effect given a decision to justify And consolidation of all cryptologictraining-which that's okay too in a political area The trouble seems to have been launched though it hasn'tleft the realtrouble here is that the training arena the ways I 'know that we didn't initiate th ecurand the' political'arena are' all under one roof the rent action-remove the blocks to continue the NCTS Thus it is here that the two problems I metaphor-and I know like a genuine launching identified at the start are in fact converging And it's impossible to stop once started But then we I think that uD1 ss that convergence is deflected didn't protest very hard against it either Worse O'Brien's law will inexorably takeover our ability yet for years we didn't attempt to deal realistito succeed in s i of ourselves will run out cally or imaginatively with the problem that got Congress upset in the first place namely the POUO My criticism of the current NCS structure and proc dure centers on my belief that the 'C 3rd'Issue 1991 CRYPrOLOG page 6 FOR OFFIOIkL UBI' ONLJPY 4019718 need is not for formula development of courses or centralized rtIanagement of training The urgent need today is to find ways to derive the training directly from and fit it to the technology and pressures of the operations If that is correct then it follows that training action comes first and political action second And I say that neither critically or cynically To the extent that there is a tangible separate schoolhouse-to use today's buzz term-is the extent to which we have failed to meet the urgent needs of the cryptologic commun ity Instead of talking about and planning consolidation of schoolhouses we should be talking about and planning training outposts outposts stafffed by a Training Corps whose members go out andlive in the native village D Remove the political activity from the schools and do it somewhere else Cut the TDNS CNCS double hat in half Remove and Imean physicallY fro the NCS arid the Service schools the small group needed to deveJop and orchestrate the consolidation plans and actions Take them all of them out of the operational and managerial channels of the schools Take the political activity and all the attention it demands off the backs of the teachers and developers and requirement analyzers Give the School ach school-a full-time commandant with the authority and the opportunity to get the training done as his or her first priority And then reorganize the school part in such a way that it molds itself to the operating needs and not vice versa Start up the Training Corps and post them out there A separation of L---' not sitting back here endlessly training action and political action could result in and wistfully planning larger and more elaborate both being done better It puts neither politics nor central facilities training in second place CD Oh but you say be practical be realistic Congress has pressured us and the Secretary of Defense has directed us Okay 111 be practical and realistic and do so with one recommendation CD And take it from one who knows full well the price that goes with putting politics in second place o Golden Oldie 1955 I JUST IWmY I'M GONNA BREAK INTO SOMETHING TODAY 3rd Issue 1991 CRYPTOLOG page 7 POR OPPIOW USE ONLJPY P L 86-36 P L 86-36 DOCID 4019718 86-36 MANAGEMENT PHILOSOPHY This article is a condensed version ofatalk given ' to the Human Resources Management Association Obviously there are many ways to manage on 27 February 1986 At the time the author was people One's management style is very Director Civilian Personnel Chief M3 individual a blend of one's 'personality energies interests enthusiasms and skills It is also a product of what you yourself have experienced Achievement Through People -- this is the goal of every organization and every manager under different managers In my own case I everywhere No one can achieve'im have always had a lot of ideas From the day I came to work here I have always wanted to organization's mission without peQple People are the most important'resource the key as contribute those ideas to help solv e problems and to improve the way we do things our M3 logo shows Sometimes I could' but sometimes r couldn't It depended a lot on the management style of the person I worked for So my own experience influenced my management style ' ' ' o o o o o o o o o o o o o o o o o o o o o o o ' o o ri o o o o o o o o o o o o o o o o o o o o The climate culture and traditions of an organization are also important What 'do employees expect on the basis of their experiences This last item is particularly important and particularly tough When you want to change an organization you really want This logo was designed by a person in M3 as to change its culture and that's difficult to do Some employees cannot accept change they are part of our 5-Year Plan which I'll describe later One of the Task Groups under that plan comfortable with the status quo perhaps And held a logo design contest and the winning one there is risk involved for them and for you some may not be' willing to take those risks has become our official M3 logo We use it Others may not support your goals you simply everywhere on posters awards all printed publications may not win them over no matter how hard you try You may want to encourage innovation The word Management means achievement candor speaking out but the existing culture through people The task that every manager may be one where innovation has not been faces is to find the best way to use this precious particularly encouraged where speaking out was resource to accomplish the mission In this frowned on Thus new ideas may not be paper I am going to talk bit about' readily accepted management and what my philosophy is show specific examples of some creative things' we are So it is important to lay the proper groundwork and then work to effect change through doing in M3 and conclude by telling you how we are doing--where we've succeeded and where education persuasion and leadership You inust we still have a way to go also demonstrate that you are sincere in wanting candor ideas and help You must '3rd Issue 1991 CRyPTOLOG page 8 FOR OFFICIAL USE ONLY DOCID 4019718 rew ard not punish for these things You must we need to be close to the people we serve be willing to tell the bad with the good you While it all works very well for that purpose it must also be willing to hear the bad along with does make managing M3 much more difficult the good It is crucial to get people to trust The fact that the IPAs have 2 masters--the Key you Component and Group Chiefs they serve and M3--and that we are geographically dispersed One of my first initiatives as the new Chief of sometimes creates a we and they M3 fell flat because I jumped into it too fast atmosphere One final note -- when I joined M3 Town Meetings I believe communicatiing with in January 1982 I was the third Director of all employees So I began to hold quarterly' Personnel in' just four years This means that Town Meetings in 3 locations Headquarters the change of direction and leadership happens FANX and Airport Square But they did not frequently in M3 And the Director has always turn out as I'd hoped Some said I didn't tell been someone from outside the organization them anything they didn't already know ' Others didn't believe what I said especially in COMMUNICATION the Question and Answer period I was being I place a very high priority on telling people honest but some did not think so what they need to know to do their jobs Let Whatever the reason my timing was off I had me give a few examples not laid the proper groundwork So I stopped We have an electronic mail system on our having Town Meetings It is interesting that computer called COMET We use it constantly now a couple of years later I am getting througho t our geographically scattered requests to do them again People say they organization for all sorts of quick miss them I see this as evidence that the communica tions We announce M3 assignments culture is changing reassignments promotions and training This is a problem that all creative managers opportunities We advertise internal vacancies and use it to distribute minutes of DDA staff face they risk not being understood or ' appreciated by their peers their subordinates or meetings This by the way is one of my their bosses It takes real courage and some innovations that people do like And sacrifice to persist ' distributing staff meeting minutes on COMET insures that everyone gets a chance to see C REATIVEMANAGEMENT IN M3 them My philosophy of management is to try to take Once a month we hold a monthly program advantage of people's skills and abilities by review ' Anyone in the organiza'tion who wants involving employees and having them to attend is invited it is not meant just for participate as much as possible in helping certain higher grades or just for the managers execute our mission I want to challenge them The idea IS to give all the people in M3 the to help them be more creative able to chance to broaden their knowledge about things contribute more and be more productive I going on throughout the organization and the believe that communication is vital to' this Agency We review budget policy resources process as is providing the tools needed to the status of major programs and reports on our do the job and to grow such as training and 5-Year Plan modern technology I think it is important to Our biggest problem is finding a room at FANX say thank you by giving awards for doing a large enough to hold our MPR Recently I good job And it's important to remember to started to hold a mini-Town Meeting as the stop now and then to have some fun together first 15 minutes of the MPR giving news of I'm going to discuss these five topics leaving interest and then answering questions the first until last because I have the most tq say about it We pUQlish an annual report on M3 It is no ordinary report as you can tell from the index The most striking feature orM3 is its Welcome Aboard tells about our hiring geographical dispersion program On The Front Line de cribes Some' of us are centralized at Airport Square I activities in our IFA's It Pays to Advertise is about our Competitive Selection Program and but the rest are all over the place This decentralization is intentional The IPA concept More Cold Cash reports on our Awards ' Program We all look back with pride on the the decentralized units are called Integrated Personnel Activities is built on the idea that year's accomplishments And we circulate the 3rd Issue 1991 CRYPTOLOG page 9 FOR OFFIGIAL USEONLJPY aCID 4019718 report to a wide readership 'including the them are iii college now including many of our clericals I am especially pleased at that Director and Deputy Director of NSA as well as Those not able to pursue college are using DDA opportunities for'trainingat NCS and OPM Every so often we have an informal give andWe have also arranged to hold special OPM take around our conference table with DDA and courses and some college courses here at NSA AJDDA We call it a rap session and allmy for our M3 people' so larger numbers of them Division and Staff Chiefs as well as a can attend representative from the IPA Chiefs attend 'This allows us to talk together about anything th t's ' We have set up a special program called a on our minds We can discuss hard issues or staffing plan to train and develop all the new things we juSt need to understand better The people we have recently brought into M3 It's ' chance for all of us to do this face-to face and like an internal intern program The idea is to m ake sure people start out right and learn all ' directly with senior management rather than the things they need to know to serve this my bringing it back to my managers Agency's personnel needs into the next century secondhand has been extreIllely helpful especially when discussing policy and-' PROFESSIONALIZATION philosophy After we finish the RAP session we all go out to lunch together One area that is still somewhat disappointing is professionalization I believe that giving the tools needed to do the job and for personal development go Our many new' hires have not yet been here hand in hand ' The more people 'learn the' long enough to become professionalized But a better they can do their jobs I have f'eally lot of our middle-grade people grade 12 emphasized this in M3 in all aspects 'education especially have still not gotten professionalized and training professionalizationand cross- ' We have encouraged these people but the development results are disappointing We encourage people in M3 to become active in developing themselves and have designed an The NC has reated everal courses esp cially annual 'assignment questionnaire for th m to for M3 mcludmg a taIlored one -day verSIOn of ime an geme t and a bra d new course on use for this purpose Anyone who 'wa ts t can complete and return it We use the information CreatIvI Y Agam everyone'In M3 had an to help plan the moves of M3 people for oPPO u lty to attend these cours s they were diversity for professionalization a move from ' not'lImlted to managers to certam grade levels or COSCs ' technical to management or ice versa and a opportunity forcioss 'development IIi the first I have had some criticism for my emphasis on year a-lmost all those who retUrned it got' one education n part atleast it is because it is of their choices for 'a different assignment different from the past But I have persisted 7 and my managers have supported me The results clearly' show S1 1-ccess M3 is hiring very My emphasis meducation has tinally paid off high quality people' for' all the rest of the Agency we feel tha t' we must do the same for In just 4 years we have greatly increased the number of people in M3 with higher education M3 This is yet another example of a ch nge in In fact M3 has nowsur passed the NSA average culture in numbers of people with college degrees This AWARDS was not' easy to do and it took a corporate' decision and commitment of all my managers to One of mymost pleasant duties is to be able to pull it off We do not get new billets in M3 ' say thank you for jobs well done--to give our but we agreed that whenever we did get an awards I have established two new awards empty one we woulti 'hire or bring someone'into just for M3 so I can express my personal M3 who had training in our preferred fields of gratitude to the M3 people One is the Director interest We now have a large number orwell' of Personnel Award It is a plaque accompanied qualified new people in M3 and the results are by a check I have given out only two of these wha you have seen ' so far to Chief M3G and to l433 J trecently we had I have higliregard for my on-board employees - T - 'T p-r inteda Directi r of Personnel as well they have also responded magnificently to the challenge to develop themselves 54 of 3rd Issue 1991 CRYPTOLOG page 10 P L 86-36 VOK o FFlCIl L USE ONLY EDUCATION DOCID 4019718 Certificate which I will be awarding in the future Our monthly award ceremony is a special event in M3 I always conduct this ceremony myself I want to give wide visibility to the things M3 people have done and let them have some wel- deserved glory The photographer says he likes to come to our ceremonies because they are so interesting and so much fun FUN Speaking of fun we feel we just have to stop now and then and enjoy ourselves and each other Our Christmas open house has become a traditional annual event Everyone pitches in to cook and bake tasty and beautiful foods for our all day buffet We set up the spread in our conference room and invite everyone from all the' far flung areas of M3 to stop by to visit talk and have some goodies I enjoy this once a year chance to see almost everyone in M3 and to chat personally with them First I wanted to build teams I did not want independent fiefdoms of Divisions Staffs and LPA's Secondly I wanted to provide chances for wide employee participation I believe that everyone has good ideas whatever one's grade level or position in the organization The problem is--how do you tap all that talent creativity ability Well here are some of the things we have done in M3 We use our M3 staff meetings primarily to solve real problems We do of course exchlmge information as is traditional in such meetings We set out deliberately to build some teams The first one we established was our career management board informally called our People Meeting All our Senior managers Division and Staff Chiefs sit on that Board and they put on their M3 hats to handle all internal staffing for M3 reassignments rotations reassimilation and developmental assignments They also meet as our M3 promotion board The results of their One of our most successful pleasure activities deliberations are then made as recummendations was a combination of work and play The to me It was hard at first to break old Image Task Group under our 5-Year Plan came patterns the instinct to look out for number one up with the idea for an image seminar They first is very strong But I have been very felt that M3 is a service organization that we pleased at the ability of the M3 managers to have a public face and can improve it We look at the overall good of M3 and the Agency ' invited every single person in M3 to attend all grades all skills military and civilian I was We have had a number of formal team builds told Virginia You can't shut down M3 for a on specific topics The M3 managers and the day I said Just watch me It was so IPA Chiefs recently met to discuss the important to me that everyone come because inevitable problems created by being so everyone is important to the M3 mission and I geographically dispersed Personal contact is wanted them to know that We heard an not very frequent and it generates lots of outside speaker tell us how to deal with the misunderstandings We felt that the We a nd public and each other She gave the seminar They problem needed to be discussed After it twice that day once in the morning to half of was over we agreed that this was one of the us and again in the afternoon to the rest But best experiences we've ever had--our critique the highlight was the luncheon-owe had scores were exceptionally gh Note however everyone together for that It was the first that we had been working together for several time eveR that all of M3 had been in the same years before we did this We had built the room together People met other people who climate imd culture for it It probably would had been only phone voices to them have gone the way of Town Meetings had we tried it earlier We had a lot of fun over Christmas with a new idea--a pet show Actually it was a PET' The Team Build idea has percolated through the picture show The pictures were judged and whole M3 organization We have had successful prizes were awarded in a ceremony There were team builds for the M3 Training Coordinators carrots for the rabbits and horses catnip for the the M3 Classifiers the M Secretaries and the cats and bones for the dogs Country Desk Officers in Field Support Every single team build has resulted in lists of INVOL VING EMPLOYEES solutions to problems and new ideas to try Two of my most important objectives fall into this category I consider them the bases on which everything else builds and depends Our most successful initiative has been our M3 5-year plan We have done this for three years 31'4 Issue 1991 CRYPTOLOG page 11 FOR OFfiCIAL USE ONf DocrD 4019718 now and always done it wholly in a participative environment ith broad representation from throughout M3 HRMA the newest professional organization Human Resources Management Association at NSA started out as an idea in our 5-Year- Plan I put it up during th brainstorming and the whole group bought the idea The GOODIE Task Force is starting Quality Circle in M3 3 Describe how your immediate supervisor encourages airing of problems concerns or differences of opinions 4 How are suggestions to change plans procedures or goals reacted to and handled by your supervisor Give examples 5 What suggestions can you make for M3 management that would encourage creativity in the rank and file The RAP Task Group started program 6 What suggest ons do you have for M3 evaluation for us We ha e not had' any billets management that might improve their own for years for this important function But the effectiveness and creativity 5- Year Plan colected some volunteers from all over M3 willing to help us get it started They Other comments have now all attended a formal training course I can't tell you how wonderful it is to have this and are busy' evaluating -the Competitive kind of information directly from the people Selection Program It's another example of I've learned some really helpful things I've doing more with the' same--of increased been pleased to find out that on the whole productivity things are going very well indeed Everyone in M3 seems to know about and to like the 5 Year The AUTOMAN Task Force is automating the PMM Personnel Management Manual with' the Plan And they also know about and like the emphasis on creativity innovativeness and the goal of making it available through remote chance to participate in the Task Groups and access throughout the Agency eventually the Quality Circles TWOTEN and 'PROSPECT got a small My interest in sharing information may not personnel research effort started ' Again we have penetrated as far down through the have had no billets for a long time for this organization as I'd like Also my goals may not important function And again we have done always be interpreted and reported as it anYway using volunteers and by increasing productivity Their first publication in our new' accurately as I'd like The communications problem again For example everyon says we series Issues of the Eighties is entitled need more resources I know that of course but Comparable Worth II The SOS Task Force or apparently my people don't know that I know Secretaries on' the Spot are studying how e might set up a Kelly Girl type program at I also learned tl -at I must talk directly to my NSA The group is composed lDostly of M3 people more often 'So I am starting RAP secretaries session every month with small groups of employees a different group each month HOW ARE WE DOING So I find thai things ate going well I am blessed with a wonderful Deputy a super group of senior managers Division Staff and IPA chiefs and a very capable dedicated and loyal group of employees throughout the organization I'll end with a few words of encouragement from my people One said that in all the many years she has been working mostly outside How are we doing interview questions NSA she' has never before feIt such freedom to 1 What steps could you take to become a more use her talents and do things to contribute to effectiveemployee How could your co-workers h r organization They show me that there are help you to do yotir job better What could many people in the work force who are eager to management do to enable you to be more try something new and different They like effective in 'your job ' what I am trying to do and are encouraging me to keep at it And I will 2 If I were your supervisor what suggestio'us would you have for me that would enable yoUr work group _to become innovative The last thing I want to discuss 'is how are' we doing I might not have had a very good feel for this if it weren't for still another 5-Year Plan Task Group called ENTERPRISE This group interviewed and surveyed a sampling of the M3' work force to' find out ard Issue 1991 CRYPTOLOG page 12 F6lt 6FFIEURIAL USE 6NLY' Eo 1 4 c DOCID 401StorlES THE LANGUAGE ANALYST AND AUTOMATION P L I'---ket ' o - We all know what language analysts look like ' This is an abridged version ofa talk to the Crypto-Linguistic Association in 1979 At o the time the author chaired the Langilage o o Automation Committee of the CLA ' o oooooooooooooooooooooooooooooooooo -- poum Before speaking abouUhe Language Analyst and Automat ion I'd like to explain what I intend to convey by the t rm lanliuage'analyst and just who I perceive 'that person to be J suppose our last speaker at yesterday's session would consider the phrase acontradiction in terms-I hop IwiUnot be offended if I proceed to use the expression anyway Then I plan to give a brief overview of o some ways support has been given historicallyto language analy'sts at NSA -how that compares to supporttotranslatots around the world and what the decade ahead promises for all they are recognizable br the tools they usepencils papers and a shelf-full of dictionaries a grammar or two some working aids such as word lists rhyming dictionaries lists of first or last names al breviations phonetic renderings biographic data geographic data and a style manual We hand language analysts some pencils and some tr c and co e backa little later for the product How have our language analysts spent the time In the world of written text they are likely to have spent some portion of time readirlg I _ possibly reviewing new requirements scanning a stack of traffic to detennine what needs to be reported and in what priorityorderas well as to use as background information for more scanning for those messages to be reported they spent some time researching WHO IS A LANGUAGE ANALYST -te7-1 am using the term languageanalyst to refer to someone who has the capability ofreadiIlg a text or hearing a text in one language selecting those portions whose content meets a set of crite ria and rendering it in some formin another language We see that a language analyst must do more than would a translator a language analyst must assess the military politica l arid economic significance of the text and must be able to render it in a variety offormats including a gist or a report 3rd Issue'1991 L 86-36 CRYPTOLOG page 13 6BB 11AoP'J QI B lHi 6QMHIff' eUMHfBLS 8N1h Y P L 86-36 86-36 EO 1 4 c P L 86-36 IDoeI D P 14 031-Si 18 SBORti'f' a consumer representative that the translation is not y t eady even though they have had the message for ten minutes already-l ated to help the language nalysts st ggiing with a garble o In Vietnamese dictionaries were sorted on the second and third syllable for the ' same purposeo ooooo _ _---Ilwlien our language analysts had fimshed then ariother 'language an lyst called a' checker reviewed all these jobs assuririgthattheprodu ct represented a faithful endeiing ofthe original that all addressees had been induded and that the language analysts who did the product gets adequate feedback o Indexes of English-to-Russian dictionar-ies were created as'a me ns of getting' b ck'to the Engli h from the Russian ' P L ' 86-36 o Large' dictionaries were cWt dl - ning with the Spanish-to English CAMINO system and expanding to many other langUages ' C-CCO The voice world differs in a number Of ways but is no'less exacting the langu ge analyst w o is a transcribeimounts tapes listens to them for content engages in the same kind of research to de termine the who what when where and why of the traffid EO 1 4 c P L 86-36 -COMPUTER SUPPORT 8-CCO fthat is what language a alysU do 'what support does the computer' provide Here' are just a few examples ' o For support to bookbreakers we have P L 86-36 11 --- ____ o For messageseparatio and distribution programs there nave been o Word lookup was provided to the Chinese language analysts via For Information Retriev I Iwere developedL-to- --fa-c-il-it-a-te---o' searche s through raw trafficand end EO I l o c product P L 8 6- 3 6 o In Russian and a number of other languages reverse dictionaries were cre- o Remember the Farrington Optical Chllracter Reader The Kurzweil Data Entry 3i-d Issue 1991 CRYPl'OLOG page 14 EO 1 4 c P L 86-36 SBOREtF lI IfflLE f' tA eOft'lHff OIh'rl'HH3LS 9 PflN P L 86-36 DOCID EO 1 4 c P L 86-36 Sl eltl 'f Ef -L f C 4 ' -9 8 6 - Machine is the recent version of such a scanner P L 86-36 o A lot of these programB-Qr their successors-are still going strong I Iprobably merits some kind oflongevity award OUO o There are now dictionary files in the CAMINO format and other format in several languages P o High quality printing of the scripts is available through use of the SEACO 1700 which produced a hard copy of the Turcofile For the English variablewit d h ch aracters may be se1ected and both right and left margins may be justified 1 4 c 86-36 Transcribers have not been forgotten in this process we have a terminal for data entry complete with some text editing or word process ing capabilities Eventually the transcriber should be able to access a variety of files from this terminal as well The analog tape will be replaced by a digitization procedure making it possible to skip most of the silent por tions and have great power in selecting the next cut to process o The same is true of the Russian-to-English Glossary 000 That's all well and good you say but what can a computer do with garbles WHAT'S BEEN HAPPENING IN mE REST OF mE WORIJ 'F'OUO If I were to name the single biggest contribution of technology to the NSA language analyst during the 1970's it would probably be the widespread development oflanguage files on computer tape Much the same sort of thing was happening in many other parts of the world Gov3rd Issue 1991 CRYPrOLOG page 15 StiORB'f' EO 1 4 c P L 86-36 P L 86-36 EO 1 4 c P 1 86-36 lDOCID 4019718 terminals will become commonplace The language files developed during the 60's and 70's will be made available to NSAlanguage analysts via the terminal as will those information files so prevalent today But another development will be various kinds of machine-aided translation emments and industrial firms alike became immersed in developing adequate lexical support to translators in this age of rapidly advancing technology and hence rapidly changing terminology In Canada Holland the Federal Republic of Germany and the European Economic Community a variety of terminology banks were designed and developed An organization called INFOTERM assumed the task of coordinating these various term banks U Another notable occurrence during the 70's was the widespread adoption of dictation equipment to speed the work of the translator The translator reads the translation into a dictating machine and the tape is then transcribed by a specially trained clerical person known as a transcriptionist At the UN and many other places transcription is the preferred method of rend ring a translation WHAT'S AHEAD IN THE 1980s FOUD Their philosophies may differ slightly but the message is much the-same-the ubiquitous computer terminal has much to offer the translator the transcriber the lexicographer the terminologist and yes NSA's language analyst Just to prove it I'll point out that thi presenta- F'oum Some analysts at NSA already use termi- tion was prepared with the aid of prepared with the aid of nals for data entry for receipt of materials andlor prepared with the aid of for information retrieval In the years ahead a terminal attached to an NSA system called I IAnditcameQutjl lstfiIl ' lfertTC' I believe that the big news in the decade ahead for the language analysts at NSA as well as for the translator atlarge will be the widespread use of interactive terminals to provide various kinds of programming support P L otice to Contributors Please note the new mailing address OPS-l P054 CRYPTOLOG Look carefully on the box or disk -before you format your disk If you are using a 5 1 4 disk see whether it is HD or DD Ifit is HD do not format it as DD Itwinnohead It must be formatted as RD If you are using a 31 2 Mac diskthat is 1 44 mg it must be formatted as RD Remember to label your floppy with the following information Your last name organization building secure telephone number 3rd Issue 1991 CRYPTOLOG page 16 SIWRFJ ItANBLH Ti A eOMftff CI LS ONLY 86-36 DOCID 4019718 Secrecy in an Ope Society James Martin This is a condensed version ofa talk given at the Business Luncheon Series on 21 January 1987 At the time the author was a staff member ofthe Senate Select Committee on Intelligence Let me give you a little background on exactly what I do for the Senate Intelligence Committee I'm the number two budget officer and as such unlike some of the other professional members of the staff I'm not tied to any on particular senator on the committee We have fifteen senators on the committee and each one has one member of the staff who in effect works for that senator Then there are a few members of the staff which are core professionals who work for the committee as a whole I'm one of those core professionals What that means is that I scrupulously avoid being at all partisan in my work I serve the Democrats and Republicans equally That's really not to difficult since our committee is not nearly as partisan as most committees on Capitol Hill The members of our committee take their oversight responsibilities very seriously and recognize that the sensitive nature of the information we handle makes it imperative that the committee operate in a bipartisan or non-partisan manner That being said you have to recognize that the United States Senate is a political organization alld it would be naive of me to try to convince you that politics does not sometimes intrude on the business of the committee It does and that's just a fact of life But I can assure you that our committee senators and staff strives to deal with the issues from the perspective of hat is in the best interest of the National Security of the United States I had breakfast last week at the Pentagon with General Peroots the head of DIA and he told me that Senator Byrd and the new Majority Leader of the Senate asked him for his advice as to how he should handle the Iran Contra investigation General Peroots told him to be a patriot--be an American I know it sound corny but that is really how we try to approach our oversight responibilities We get sidetracked from time to time but on the whole I think we do a pretty good job of avoiding the political pitfalls Specifically what I do for the committee is to review the budget requests of different elements of the Intelligence Community including among others NSA I plow through the myriad of documents books briefings etc which in excruciating detail explains what General Odom proposes to do with the budget that the President is requesting for him That's the easy part Then I have to boil it all down to a brief 3rd Issue 1991 CRYPTOLOG page 17 FQR QFFlGlAb USB ONL T IDOCID 4019718 coherent and understandable for the senators who of course make the fmal decisions And remember senators are extremely pusypeople' and this material is very technical ahd confusing even for someone who de ls ' With it all the time family spy ring the arrest on espionage' charges of a former colleague of yours Ronald Pelton the defection redefection of Vitaly Yurchenko and the Jonathan PollardJIsraeli Caper THE YEAR of the LEAK Of course I don't spend all my time reading 1986 may well be known as the Year of the budget material and briefing senators IIi order Leak We were bombarded with headlines based on leaked information such as U s to really comprehend how all of the various secret plan by the Sandinistas CIA discloses components of US Intelligence operate Ido get Anti-Quadaffi plan backed And of course out from time to ''kick the tires so to speak there was the role of the media itself in Since joing the committee staff I have been leaks and ' in how it should cover spy reporting fortunate enough to visit 'Moscow twice England trials sure you remember the controversy and Germany twice Australia ' California involving Bill Casey General Odom and Colorado and several other nice 'and some notWashington Post editor 'Ben bradlee over what so-nice locations And then there are activities information the Post could use in its coverage of which develop on an ad hoc basis which demand the Pelton triaL Whether you agree with my time and attention The current situation Casey Odom or Bradlee and the Post I'm sure involving the Iran Contra affair is a prime your opions were strongly held ' example of this I'm When Minnie Kenny first mentioned the series of lunches and asked me to speak atone I was both flattered and surprised I wondered why 150 people would want to pay $8 50 to eat lunch and hear me talk After I finish you may be wondering the same thing But in any event I thought it would be fun and I said sure why not And finally in 1986 in case you have been travelling in a remote and inaccessible part of the world we have the current situation involving _the arms sales to Iran and possible diversion of funds to the contras We're going through another round'of leaks now which raise several questions I cringe these days whenever I pick up my Washington Post What should I talk about I doubted whether I Just two Sundays ago for example you good folks were prominently featured in the headline could hold anyone's attention describing such for the lead story I know it is troubling for aspects of the congressional budget process as the difference between an authorizing committee you and I can assure you the committee is frustrated and disturbed by the dev lopments of and an appropiating comririttee or the effect budget authority versus budget outlays have on the past few weeks calculating the amount to be sequestered under I guess I'm still naive enough to think that the Balanced Budget Act of 1986--otheiwise secrets given in a closed session in a secure known as Gramm-Rudman-Hollings facility would remain secret-oat least for a day So you can imagine how I felt a few weeks ago I decided to talk about secrecy in an open when after a long day at the committee during society for many reasons not the least of which was that it might stir up some interest ' which Robert McFarlane testified before our committee driving home about 10 p m I heard and perhaps somskepticism on the part of people who might attend the lunch My goal is the lead story on WTOP former National Security Adviser Robert McFarlane in secret not to lecture- or to titilate for that matter testimony before the Senate Intelligence What I hope to do is to give you some food for Committee today detailed his role in the etc thought on the subject--to give you some etc etc I about went off the road It was opinions I have on the issue and more just the beginning of a long series of similar importantly to stilllUlate discussion occurrences My fifteen months with the committee have been anything but dull I am reminded' on the That being said I would like now to throw o t a few thoughts on the nature of secrecy in this proverbial Chinese curse ' May you live in interesting times ' Well we in the intelligence country and the climate in which w e all have to operate In a recent essay entitled When business certainly live in interesting times 1985 will long be remembered as the Year Of Secrecy Meets Democracy Time magazine posed the question Can Americans do anything in The Spy with this discovery of the Walker secret anymore The essay points out that one 3rd Issue 1991- CRYPTOLOG page 18 paR OPF'fEURlAL use ONi iY DOCID 4019718 consequence of the arms for Iran story would be an unravelling of an endless eries of disclosures--names dates places faces etc that will make it very unsafe to be an American agent remember this was written back in early December As we now know that is precisely what has happened In the early 80's Israel had then lost contacts in the middle levels of the franian military They died out according to an Israeli official He told the New York Times that the contacts were executed There was also a recent series of stories in the press about a number of KGB agents who were executed in Iran after their identities were made known to Khomeini The premise of the Time essay is that Americans are passionately democratic and thus accutely sensitive to the contradiction t etween democracy--which promises openness--and the secret world of diplomatic and paramilitary intrigue Americans do not take easily to the notion for reasons of state secrecy may sometimes be necessary We have only to look back to 1929 when Secretary of State Stimpson found out about American code-breaking and interception operations and stopped them with those famous words I'm sure you're all familiar with Gentlemen do not read each other's mail disclosure could harm the National Security We simply do not have the resources to protect everything--nor should we try Obviously I can't give you any examples in an open session of classified information which shouldn't continue to be classifIed--either because it just doesn't meet the standard or because it is already common knowledge The Stillwell Commission which was set up after the disclosures of the Walker case concluded the same thing and has recommended sharply limiting the amount of information the government classifies We need to protect the real secrets Another point I want to make regarding secrecy is that while it is potentially a breedimg ground for lawlessness it is also a breeding ground for genius Without secrecy we wouldn't have had Henry Kissinger's secret trips to China or the most recent interception of the hijackers of the Achille Lauro--an idea by the way that most people attribute to none other Ollie North People have to realize that the test of a policy or a program is not whether or not it is conducted in the open but whether or not that the policy or program makes sense What I hope is not lost in all the outcry from the public the press and yes amazingly enough the congress for no more secret operations like Since then we have had another warld war the the Iran Contra program is that like it or not cold war and now low-intensity conflicts the United States has to face the responsibilities According to Time the fIrst of these spawned to of a superpower And one of those OSS the second gave us the CIA and the third responsibilities it the occasional necessity for secrecy produces everything from the Delta Force to Ollie North and the cowboys at the NSC Time Magazine conc1udes--and I agree--that if we are going to play the great power game -and So what does all this tell us about the climate ask others to risk their lives to help us win it in which we fInd ourselves today Certainly we had better accept the need for secrecy I'm preaching to the choir and by the way I consider myself to be an active member of that AN OPEN vs A CLOSED SOCIETY choir to say that there is a legitimate need to conduct certain sensitive government operations in secrecy and that some information because of Now if you accept that premise how do you square it against that thing called democracy the harm its disclosure would do to National which as I've said tends to frown on anything Security must be protected as classified that is not conducted out in the open Of information course in an ideal world I think we would agree the affairs of state could be open for all PROTECTING THE REAL SECRETS to see But with the likes of Khomeini Ghadaffi and all those faceless terrorists By the way I strongly believe that one of the things we are going to have to do is to sharply running around the world to say nothing of our limit the amount of information that we protect good old adversaries in the Kremlin we cannot enjoy the luxury of a completely open society as classified There is an old saying which says He who seeks to protect everything Which does not it seems to me mean that we protects nothing I believe that Some of the have to settle for a closed society run by the information we try to protect today just does government where the people have no right to not stand up to the supposition that its know what their government is up to and 3rd Issue 1991 CRYPTOLOG pag 19 POR OPPIEURIAL I tSE ONLY DOCID 4019718 where the press iscorttrolled by the government and can only print what the government says it can print There are many examples of such societies around the globe and I doubt if anyone in this room would opt to live in any of them As anyone who has ever been there will attest the Soviet Union is the classic example of a closed society The people hear only what the party wants them to hear In Moscow if you don't know what you are looking for you won't find ito-there are no signs on the buildings nor is there a telephone directory And by the way just as an aside with regards to the press I'm sure' a lot of you have the same feelings as I do about some of the press-the Sam DonaldsonB and the Jack Andersons of this world And during the last couple of months weive had the press all over the place down at the committee and at times it can be quite a nuisance But I read something the other day and I think it applies to the press If you want a watchdog to warn of intruders you must put up with a certain amount of barking If you muzzle' him and leash him and teach him to be decorous you will find he doesn't do the job that you got him for in the first place You can't criticize the government--there's no C Span There's also no fast food chains--the Some extraneous barking is the price you must place is really the pits It is a third-rate pay for a service as a watchdog I think that economy with a first-rate military story also should by heeded by people in the evecutive branch when they think about We had a chance to talk to our ambassador to congressional oversight the Soviet Union Arthur Hartman when we were in Moscow and he told us how difficult it And since I am part of that congressional is for our diplomats to operate there The oversight process I thought I would focus on Soviet diplomatS-spies in the US enjoy a that as one way of dealing with the question I tremendous advantage on our folks in Moscow posed a minute ago that is How do we ensure They have a far greater access to government that the government has the wherewithal to officials our scientific and technical conduct certain operations in secret etc etc organizations--think of the advantage the etc Soviets enjoy with the information we provide in the open7-let alone the material that leaks THE ABUSE OF PO WER out As many of you remember the intelligence oversight committees were established in the Weare beginning to see signs of Gorbachev's attempts at openness candor and publicity--all post-Watergate period as a reaction to summed up in the Russian word glasnost Watergate and other excesses which made the Some early signs are promising--the release of public aware that ther 'must be a constitutional Sakharov more openness in the Soviet press-guard if you will against the abuse of there was an ullprecedentedstory last week in intelligence services by those in power If the Pravda about the firing of a senior KGB officer United States is to have an intelligence who engineered the illegal arrest of a local capability the public must be assured that it investigative reporter On the cultural front remains an American intelligence capability the new line has created a literary pre bound by the constitution and the law of the land renaissance But it is far too early to determine if these represent real reforms or Another concern which' surfaced as a number of only empty rhetoric intelligence fiascos have come to light has been THE PRESS that covert actiop programs carry with them a significant risk particularly if there is little So what do we do How do we ensure that the consensus on the foreign policy goals such government has the wherewithaJto conduct programs are designed to serve In order to certain operations in secret thatcongress--or make sure there is adequate accountability by more accurately--that certain representatives in responsible political authorities formal oversight congress--arellPprised of these secret operations was seen as necessary By the waY its sort of and that the public knows whatever it has a axiomatic that you accept that there is such a right to know about the operations of its thing as a responsible political authority government through whatever mechanism Without'that assumption we have no' common whether it be a free press or through its ground for agreement elected officials Or whatever Finally and this is becoming more and more true all the time the public has come to 3rd Issue 1991 CRYFTOLOG page 20 FQR QFFlGll f l JSE ONliJPY OCIO 4019718 recognize that we as a nation cannot afford to do everything We have to make trade-offs between guns and butter It's critical that a dollar's worth of investment produces a dollar's worth intelligence As the budget officer that's my job THE VALUE OF OVERSIGHT year or so there has been a great deal of consternation within the intelligence community and also I can tell you within the intelligence committees concerning disclosures of certain intelligence information by government officials -including thepresident--to justify either a response to terrorism or to obtain the conviction of an accused spy Some would question and legitimately I think whether or not it's worth those results to give away sources and methods In sum formal congressional oversight should help to keep our intelligence services healthy It does this by providing an essential filter between the intelligence community and the But there is an alternative that would allow us public which it serves One way that this filter to it both ways That is for the American operates is that it gives the intelligence people to be assured that the actions of the community an opportunity to short- ircuit executive branch--an attack on- Libya or a actions which for whatever reasons may not prosecution of a Pelton--are justified by the have been fully thought out Or they might be evidence--the intelligence--without having to just plain stupid reveal the sources and methods associated with that evidence And that is for the oversight THE CASE OF NICARAGUA committees to know enough at the appropriate time to be able to say in public Mr President A prime example of how this aspect of how we have seen the proof and it justifies your oversight didn't work is the infamous CIA response coveTt action operation in Nicaragua two or three years ago involving the mining of the harbors Had the oversight committees had the opportunity to comment on this plan they perhaps could have pointed out how shortsighted and politically explosive the plan was and thus could have saved CIA a tremendous amount of embarrassment and harm to its overall operation There are still repercussions of that episode being felt by CIA today in its relationship with the Hill You spend years building up credibility and you lose it overnight The same could be said possibly about the current situation involving the US policy towards Iran Nobody izi congress was consulted And I know what you're thinking IT congress had been told about these programs the plans would have been leaked and the programs would never have gotten off'the ground Maybe but I would argue that because you don't think system works is no justification to a-bandon the system We have laws and they must be followed There are just too many success stories--which obviously nobody ever hears about--involving cooperation between the oversight committees and the intelligence service to hold that view in my opinion Besides filtering out bad ideas oversight can also provide a very useful service to intelligent agencies There is no greater threat to intelligence than revealing how conclusions are revealed--the sources and methods That is th sine qua non of our busi ness Now in the last' THE MATTER OF TRUST The key ingredient in that scenario is of course trust Trust in the oversight process and trust in the actions and motives of the executive branch Because at some point let's face it we simply must trust our leaders But the must earn that trust And 'trust and confidence in the oversight process is also critical and must also be earned ' Over the past ten years this country has taken a major step toward building public trust by substantially strengthening the process of congressional oversight through the intelligence committees of the house and senate Meeting the challenges of the coming decades will require continued strengthening 'and support for that process I don't pretend that these issues are simple or that there are easy solutions Remember we are dealing with a situation which goes to the core of the relationship' between the legislative' and executive branches of government By definition we are talking about bureaucracies and political bodies which make cooperation difficult at best But our responsibilities to National Security--and to the values of an open and democratic society--demand nothing less ' ' 3rd Issue 1991 o CRYPTOLOG o page 21 POR OFFICIAL USB ONLY I I DOCID 4019718 I P L 86-36 EO 1 4 c THE WAY WE WERE - 3rd Issue 1991 CRYPTOLOG page 22 TQP SE6RB'F Up IBRA EO 1 4 c P L 86-36 DOCID EO 1 4 c P L 86-36 4019718 9P Sf JeRB UMBRA 3id IsSue 19 1 CRynOLOO o page 'f9P SEeRE UMBRA 23 DOCID EO 1 4 c F L 86-36 4019718 T9P SECRET YMBIU 3rd Issue 1991 CRYPTOLOG page 24 'FOP SEGHE'I' Yl 18HA o DOCID 4019718 1 4 c L 86-36 'FGP SEGRE'F UMBRA CRYPTOLOG page 'FOP SHeRJ3'F UMBRA 3rd Issue 1991 25 DOCID EO 1 4 c F L 86-36 4019718 'fOP SECRE'f tJMBRA 3rd Issue 1991 o CRYPTOLOG o page 26 'fOP SlWRE'f UMBRA DOCID EO 1 4 c F L 86-36 4019718 'FOP SEl6REl'F UMBRA 3rd Issue 19 H CRY PT0LOG o page 27 'FOP S136R 13'F lfMBRA P L 86-36 EO 1 4 c DOCID 4019718 'f'6P SECRE'f' UMBRA 3rd Issue 1991 CRYPTOLOG page 28 TQP SECRET G t BRA DOCID EO 1 4 c F L 86-36 4019718 'f6p S eCft e'f tJMBftA 3rd Issue 1991 CRYPTOLOG page 29 'J'ep SBGRB'J' lJMBRA ----------------- 4019718 P L 3rd Issue 1991 CRYPTOLOG page 30 'fOP 8KCRET UM R 86-36 DOClD 4019718 population 62% for men 37% fot women A ViewofL Dale A Seaberg - oThe author was ADIL when he gave this talk at the third annual Federal Women's Program on 6 November 1985 _ THIS ARTicLE IS CLASSIFIED e6NFtBRl 'f'IAL IN ITS ENTffiETY I am a business person and I run L like a business The type of business I run demands that I make the maximum use of all the people in the work force--both men and women In terms of the female population in L if I didn't make maximum use of their potential I would be wasting 38% of my work force In terms of population L realized only a 2 5% population growth in FY84 -The ratio' between the overall femalemale population 'has not changed more than 2% during the FY83-85 period Also during' th FY83 85 period it is interesting to note that even though the fe aJe population in grades 13-15 decreased slightly 1 % from FY84 ' the female population in grades 7 2 increased by 43% This high increase in population for women in grades 7-12 is significant because it suggests a 'tremendous amount of potential for women to attain the higher grades ' o 4 o ' ' ' ' Other speakers dU ing the Federal Women' ogram haye said the Agency must do better in promoting the women in our work force- especially to the more senior grades and I agree with this ' But beforeyqu can promote women to senior grades you have to make 'sure there is a sufficient number of ' women in the middle grades from which to draw - In this regard L has an outstanding rate of promotion for women To use a popular phrase What's the' bottom line The bottom line is this promotions in FY83 IThis roughly a 50% 'ratio '--- ---- represents This statistic compares 'to a 46%-53% male-female ratio in FY84 and' vens out Slightly in FY85 but with more w omen than men getting promoted ' 3rd Issue 1991 o CRYPTOLOG o page 31 'CO FI9EN'f IAJ IfM'JDLI I '1M COMHfl' eUA1'fnSLS O fLY EO 1 4 c P L 86-36 DOCID 4019718 e6Nnf ENTIAL Looking at the three years FY83 through FY85 there is one major point that should be made and rll ask a question before making it What are the percentages of male-female promotions against eligible male-female populations The answer is PROMOTIONS Men Women Delta FY83 22% 38% 15% for women FY84 23% 37% 14% for women FY85 30% 50% 20% for women Again this high rate of female promotions strongly suggests that there is a great deal more opportunity for advancement for women working in L More so I would guess than most other Agency organizations To quote Napolean Ability is of little account without opportunity What I try to do in L is to give all deserving employees an opportunity to advance Women supervisory positions are on the increase iIi L So' much in fact that since the figures for the briefing were put together the number of female supervisors in L has increased by three Indications are that with the rate of women promotions in L across the years we've looked at the number of women supervisors will increase also It doesn't make any difference to me if the person performing these functions is male or female I push the women in L hard maybe harder than the men I do this because the women are as tough fast thinking and dedicated as the men There is nothing that disappoints me more than a high potential woman who lacks confidence drive or commitment There are not many women at higher grades in L but iooking at the percentage of promotions over the entire population females have a higher ratio of promotions This is because many of the types of jobs in L have not been traditionally women's areas in the past However we are breaking with tradition in this respect and are capitalizing on talent instead--and we will continue to do so The future for women in L is very bright In recent years more women in L are filling positions of contracting officers engineers illustrlitors and programmers as well as other positionS that were male-dominated in the past This i the result of a vigorous intern program in L and a growing recognition that if we are going to be successful in the business we are in we have to make the best use of all the people in the L work force As far as rm concerned the L Organization offers a great deal of opportunity to anyone--female or male--with a commitment to do a good job In conclusion rn paraphrase the old Chinese ' proverb Behind an able man there are always In the area of training and from the standpoint other able men I would change that to of total female-male population '''Behind an able person there are always other a slightly higher percentage of L----I able people In the L organization I am women than men receive training inL In fortunate that there are many able pepple who FY85 73 7% of the male population received carry out our important business training against 77 5% of the female P9Pulation As a business person I want the best people to ' negotiate contracts build buildings manage supply systems and defend logistics resources EO 1 4 c P L 86-36 3rd Issue 1991 ' CRYPTOLOG ' page 32 eONF'lDEN'ffAL HtUlBLE VIA eOMF1' f CIIAN ELS m LY DOCID 4019718 TOP SEeaKI' f 4In Keynote Address Gerald R Young SUSLO I o o o o oo oo o I each other on significant successes trends and o This is a condensed version ofthe Keynote o Address to the 1990 session ofCA-305 Seminar on Contemporary Issues in o Cryptanalysis At the time the author was o Deputy Director NSA oooooooooooooooooooooooooooooooo ings like this are essential catalysts to improving I'm very pleased to have this opportunity to speak come away from this seminar with some new and with you today I think it's most appropriate that innovative approaches to apply to the problems my first address ofthe new decade is to an audi- you are working now or will be facing in the fu- ' ence of cryptomathematicians cryptanalysts and ture technological advances and what's more gather- productivity and for making significant advances in your craft I'm certain that ea h of you Will computer scientists because your work is at the As I reviewed the agenda for this seminar on very core of the work of our Agency Contemporary Issues in Cryptanalysis I couldn't Your past successes have aided immeasurably to further enhance the security of our nation and are help but be impressed with the degree ofsophisti cation in the technical work thaUs taking place in central to the fine reputation our Agencyhas the Agency today And it's importantthat we earned over the years What's more our future continue to make leading-edge high-tech break- rests with you and your ability to meet the difficult challenges on the horizon I challenge you to throug s to keep pace with the rapidly changing world around us continue to be creative bold and aggressive in finding solutions to the ever increasing number of Today I'd 'like to share th you s'ome of what I cryptosystems' being used in the world today and believe are the most sigcificant trends and chal- in addition providing the information security lenges we face and along the way 111 weave in capability needed by the nation some of the critical projects now underway that we must ensure are nurtured through the period of In a sense I believe conferences like this give us an fiscal uncertainty facing us opportunity to check up on ourselves and to see LOOKING AHEAD how we are doing and where we are going Gatherings such as this symposium provide a real opportunity in bringing together the analysts from Many so called futurists are still scratching their heads over the rapid unforeseen changes that the SIGINT and INFOSEC communities to update 3rd'Issue 1991 CRYPTOLOG page 33 ' QP iRCRR RR ' EO 1 4 c P L 86-36 DOCID 4019718 TOP SECRE'f tJI JIBftA have taken place in Eastern Europe The true impact of these changes is still not clearly understood and it is yet uncertain how the dramatic changes in Europe will influence the intelligence requirements levied on us by our customers With that in mind let me dust off my own crystal ball I'm reminded of the person who said the future is a bit like heaven-everyone exalts it but no one wants to go there just yet But the '90s are here so let me tell you what I sense are some of the major challenges facing the Agency EO 1 4 c P L 86-36 3rd Issue 1991 CRYPTOLOG page34 'fOP SECRE'f tJl JlBKA EO 1 4 c P' L 86-36 DOCID 4019718 'fOP SECRE'f'UMBRik Terrorism and Narcotics Terrorist groups are also increasing the numbers and kinds of systems they are using At anyone INFOSEC point in time we may work a large number of systems many of which are now also using PCs Advances in technology also are having a drama ic effect on our own INFOSEC world During t El' week you11 beheanng ab ut many of these technological breakthroughs and in addition you will also hear about vulnerabilities fOl 1nd in some of our operational systeqls However just a word of caution-just as we have seen the proliferation of ' cryptosystenis by our SIGINTtargets to include commercial and private sector targets the United States is facing increasing demands' to quickly de$ign and evaluate increasing numbers of INFOSECp roducts EO 1 4 c 3rd Issue 1991 CRYPTOLOG page 35 'fOP SECRET UMBRA P L 06 36 DOCID 4019718 TQP SECRET UMBRA More and more US communications both government and private sector require protection by cryptography As a result we are faced with many more proposed INFOSEC products each year and we must balance our urge to accredit these systems with the credibility problems we'd face if we act too quickly and problems are later found in our endorsed systems We can't afford to allow that to happen RESOURCES FOR THE FUTURE People As we make our choices we must keep foremost in our minds that we have will continue to need highly talented people because it's the people who get the brilliant ideas that drive our efforts It's fol s like you that give our Agency its uniqueness and although your contributions are well recognized by senior management I do not believe that the pool of people we need to get the cryptanalytic job done is going to Having stated some of our challenges let me now grow substantially in the near future We are spend the next few minutes addressing the cur- entering some austere times Therefore we rent resources we have to meet t ese challenges must seek imaginative strategies to gain fur- But before I do let me relate a story which I ther efficiencies and leverage to achieve our believe is appropriate to the environment we are mission We must place our people where they certain to face in the near future It's a short can make the greatest contributions The CA story of a farmer who hired a hand and set him Council is studying the manpower situation' and to chopping wood In the middle of the morning has made recommendations to Senior Manage- the farmer went down to see how the hand was ment which will be given very serious consider- coming along To his astonishment he found the ation as we formulate our plans and programs wood all chopped The next day the farmer told to deal with the multitude of challenges facing the man to stack the wood in the shed This the Agency in the futut e involved a lot of work and the farmer figured the ' job would keep the man busy all day Butby The Cryptanalysis Intern and PI Math Programs will bring new hires but probably not a noon he had it all done significant number ofadditional billets to be On the third day the farmer thought he'd give used against the growing number of CA targets the fellow a light job for a change and told him to For the near term we expect the hiring for sort out the potatoes in the bin He told him to these programs to continue with a modest put the good ones in one pile the doubtful in number of new hires authorized for theCA another an to throw out the rotten ones ' An hour Intern Program in FY 90 and a somewhat or so later he went back to see how the job was larger number for the PI Math Program The coming He found the fellow passed out cold with picture however is less clear for the individual virtually nothing done ' After throwing water on cryptanalytic organizations Most of the hiring the man's face and bringing him around the in the Agency at least in the foreseeable future farmer asked what had happened Hell the will be to replace attrition man said The other work was easy It's making Supercomputers all those decisions that's killing me The prospect of hard choices is certainly facing us today Moving now to our equipment resources As you know our main sources of computing 3rd Issue 1991 CRYPTOLOG page 36 TOP SBGRB'f' UMBRA EO 1 4 c DOC I D t L4 Q a-96118 'fOP SECRE'f UMBRl equipment are supercomputers as well as the special-purpose devices we build when we can define a precise probh m ' 3rd Issue 1991 CRYPTOLOG page 37 'fOP SECRET lJM 8Rl EO 1 4 c F L 86-36 DOCID 4019718 TOP SECRET UMBRA New Cryptanalytic Techniques Another upward trend is in the development of new cryptanalytic techniques From my work with the CA Council I believe we may be upon an age of new technique development In particular the conditional reestimation technique developed in conjunction with SRC holds great promise as a 3rd Issue 1991 CRYPI'OLOG page 38 'fOP SEeRf3'f Ui IBH A EO 1 4 c P L 86-36 DOCID 4019718 ' l'OP SECKEl' UMBRl' major new technique it already has resulted in several successes and appears to have de spread applications in both the machine and manual areas There are a number of other sessions this week on techniques including ones on cluster analysis _ branching methods discriminant analysis the work on neural networks the work on garbled linear equations and others I find the work on Management the SPLASH boards where we are achieving I am optimistic that we will con inue to have Cray 1 and SPD power on the SUNs on some specific applications especially impressive and the applicability of some of these advanced techniques to manual systems is also encouraging succe ses against our targe s and n our own INFOSEC-efforts The reorganization in 1987 88 ' of the G Manual effort will-continue to pay offwith additional intelligence being produced I In closing let me say again that we face many formidable challenges but I am confident that we are up to those challenges Given your continued dedication to the problems I'm optimistic that we will continue to achieve significant cryptanalytic successes against our SIGINT targets and in the area ofInformation Security Thank you again for allowing me to speak with you this morning and I wish you a useful productive week c 3rd Issue 1991 CRYn'OLOG page 39 EO 1 4 c P L 86-36 OP SEORB'I' lR fH tk V DOCID 4019718 From the Past Categories of NSA Specialties PERS Planning Group S SST Mr Friedman 8 Jan 54 1 In reference to your DF dated 22 December 1953 subject Categories of NSA Specialties it appears that the committee concerned made an effort to establish general categories of specialties along functional lines This is considered a good initial step 2 After studying the proposed list some of the specific observations made include the following a The functions of p P LOG PERS and TNG are completely omitted In order to execute the Agency's War and Disaster Plans skilled personnel will be needed to fulfill some the functions of each of these b Under the group title Cr tQgraphic Equipment and Material the listed functional specialties of Research Design and Production omit the functions of Procurement Maintenance Distribution and Accounting - Further this group seems to be overlapped if not duplicated by a group titled Cr tQ-Material c Under the grQup title TLA are listed several functions However the entire incoming sorting and distribution functions are omitted Furth e r i t w O U l d - s e e m reasonable to include Radio Telephone and a specific reference to thel I Ifunctions d The listings under CryptQ-tTriqu -sts seernt o Qmit the need fQr linguists who are no necessarily cryptanalysts 11------- 1 ' u ' l oT lJlh e grOuPtitlell - 8 it3eHa misnomer i d 'rp l 4 c Ifunctions listed it would seem appropriate to include the functions of L 86- 3 6 I p r-o-c-u--r-e-m-e-n t- -- o-p-e-r-a tion and Maintenance f Under the group title Mathematics it might be desirable to include specific references to those personnel currently familiar with applied key studies theoretical research 'and lQng-term machine programming g Under the weathe'r function it might be well to include specific re ferences to weather letc I h The functions listed under Management are not clear i The functions listed under CQmmunication omit operations 3 The following observations are made a The suggested list of NSA specialties cover some broad functions and a few specific functions b Some broad functions necessary to execute the Emergency War and Disaster Plans and to sustain the Agency under emergency cQnditions are omitted 4 In the light Qf the foregQing it is suggested that a The next group who meet to discuss this problem include personnel who are familiar with the overall NSA mission and the Agency's War and Disaster Plans b The suggested list be expanded into a more complete list of critical NSA functions and that it be made more specific so that ultimately the names of personnel can be inserted into the list down to the level required for the successful executiQn of the Agency's War and Disaster Plans WILLIAM F FRIEDMAN Special Assistant CRYPrOLOG page 40 FOR OFFIGIM YSI 3rd Issue 1991 DOClD 4019718 Ode to SIGINT Come live' with me in halls of marble Where we can loaf and love and G We'll spend our days in hugs and kissing As for nights 15 groups missing Forsaking spots where black gloom hovered __'J Forsaking life that's U Forsaking tumult noise and rackets Making love in double brackets As when Apollo Thetis marries 'Tb ey soon produce sOme double qUeries To cares and sadness were driven Line breaks off here ' text as given L - L 86-36 1 4 c lmCJ943umuuuu 3rdIssue 991 CRYPTOLOG page H FOR OFFI6L USE _ _$R DOCID 4019718 Once upon n time n fn ir damseL Cived in the 1Gin9dom of the Brown Ben r The K in9 of CentTtIJin offend her n position of power in his in9dom Then she did mn ny wondrous thin9s n nd becn me weCC nown in the scn ttered in9doms of the K in9dom for ex n mpCe the K in9 of the K in9dom of AU Other K in9doms n pprecin ted her efforts on behaCf of his subjects He wn s content that she shoufd remn in in her position in the 1Gin9dom of Centrn U n n nd he p n the subjects of the ren Cm A On the other hn nd the K in9 of the K in9dom of the GBPn st n Cso nown n s the Drn 9on of the GBPn st or Cess n ffectionn teCy n s the Ben st from the GBPn st _ decided to Cun her into his in9dom to do service onCy unto his subj ects lflo offero l her throo ' lucorno 's mGRo s G M 9Y cavo fo n n office in contrn st to the pn Cn tin 'Iun rters n t Centrafia 3rd Issue 1991 CRYPTOLOG page 42 FOR OFFlOlAI a USB ONIK to DOCID 4019718 The second wns nn opportunity to -spend two feedin9 times n week with the Ki-n9nnd Queen of the Ki-n9dom of the Brown Benr the JGin9 nnd Queen of the Ki-n9dom of ALL Other Kin9doms the JGin9 of the JGin9dom of CentrnLin nnd the lJiznrd of Thi-n9s 'na nucIL Thei-r mission wns to drnw up n unifyin9 pLnn for ntt the kin9doms nnd they became know n ns cohortus octo nnexpression of scorn th rou9hout the renLm as 21 months oj thi-s brou9ht them no cLoser to success even to this day ooooooooooo ' The third inducement wns the most unkindest cut of nLL She wouLd rul e nt the side of the Benst from the Last instead of in n position of 9rent power with the kindLy JGin9 of Centrnl in mho wouLd tnke such nn offer The Kin9 of CentraLin consul ted with the lJiznrd of Thin9s nnnun nntf they conctuded thnt the Drn90n of the Lnst hnd cnst n speLL on the hnpLess vi ctim tlntf now to the snd concLusi on of thi s modern fniry tnl e for there wns no wny to bre k the speLL except to tnke an enrLy out from the KLngdom Jitn oration on tlie occasion oftlie retirement oil I September 199L composea ana aeCiverea 6 I P L 86-36 3rd Issue 1991 CRYPTOLOG page 43 FOR OFFICI M Y j O JPY V DOCIO 4019718 CRYPTOLOG Editorial Policy CRYPTOLOG is a forum for the informal exchange of information by the analytic workforce Criteria for publication are that in the opirrion of the reviewers readers will find the article useful or interesting that the fa ts are accurate that the terminology is correct and appropriate to the discipline Articles may be classified up to and including TSC Technical articles are preferred over non-technical 'classlfied over unclassified shorter articles over longer Comments and letters are solicited We invite readers to contribute conference reports and reviews of books articles software and hardware that pertain to our mission or to any of our disciplines Humor is welcome too Please note that while submissions may be published anonymously the identity of the author must be made known to the Editor Unsigned letters and articles are discarded If you are a new author please request Guidelines for CRYPTOLOG Authors How to Submit your Article Back in the days when CRYPTOLOG was prepared on the then state-of-the-art a Selectric typewriter an article might be dashed off on the back of a used lunch bag But now we're into automation We appreciate it when authors are too N B If the following instructions are a mystery to you please call upon your local ADP support for enlightenment As each organization has its own policies and as there's a myriad of terminals out there CRYPrOLOG regrets that it cannot advise you Send two legible hard copies accompanied by a floppy disk or cartridge as described below or use electronic mail In your electronic medium floppy disk cartridge or electronic mail please heed these strictures to avoid extra data prep that will delay publication o do not type your article in capital letters o do not right-justify o do not double space between lines o but do double space between paragraphs o do not indent for a new paragraph o but do paragraph classify o do not format anHD floppy as DD or vice-versa-our equipment can't cope o label your floppy or cartridge identify hardware density of medium software o put your name organization building and phone number on the floppy or cartridge The electronic mail address is via PLATFORM cryptIg@barlc05 or via CLOVER cryptlg @ bloomfield CRYPTOLOG publishes using Macintosh and Xerox Star It can read output from the equipment shown below If you have something else check with the Editor as new conversions are being added SUN 60 or 150 MB cartridge XEROX VP 2 0 2 1 5 1 4 floppy only WANG 3 1 2 DD disk only Macintosh IBM Compatibles 3 1 2 DD or HD 5 1 2 DD or HD ascii only Stand-alone or Alliance Please fumish a copy in TEXT as well as in yoUr software as we may not have all the software upgrades Please furnish a copy in ascii as well as in your software as we may not have all the software upgrades 3rd Issue 1991 CRYPI'OLOG page 44 6ft 6f'f'ICI2 L tJS 6NLY DOCID 4019718 CRYPTOLOG Published by Pl Techniques and Standards VOL XVIII NO 3 ' ' 3rd Issue 1991 1 PUBLISHER _ BOARD OF EDITORS I EDITOR 1'--- o Computer Systems Cryptanalysis Cryptolinguistics Information Resources Information Science ' ' 1 Information Security Intelligence Reporting Language Linguistics 1 Mathematics 1 Puzzles ' Research and Engineering 1 Science arid Technology Special Research Traffic Analysis J j 63-1103 963-11Q3 963 5238 1 96 43 2 1 963 3f56 972-2351 963 5068 963 3258 1 Ill' P L 963 30 7 I 86-36 963 4BI4 963 5566 963-16 l 1 968-7315 963-4958 Vera K ' Iby 968 5043 1 K963 3 Hl9i Classification Officer r------- 963 5463 Bardolph Support 963-'3369 1 96'3' 1 103 Clover Support Macintosh Support 968-7315 963-3360 Illustrators 1 I 963-4382 To submit articles and letters please see previous page For New Subscription or Change of Address or Name MAIL name and old and new organizations and building to Distribution CRYPrOWG PI NORTH or via PLATFORM cryptlg @ bar1c05 via CLOVER cryptlg @ bloomfield Please DO NOT PHONE about your subscription or matters pertaining to distribution Contents of CRYPrOLOG may not be reproduced or disseminated outside the National Security Agency without the permission ofthe Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor All opinions expressed in CRYPTOLOG are those of the authors They do not represent the official views of the National Security Agency Central Security Service 3rd Issue 1991 CRYPrOLOG page 45 FOROFFIOl5 tk USB ONLJPY tAnYA tv Jd a c DOCID 4019718 'FIllS BOEURUMEN'F EURON'FAINS EUROBE'liORB MA'I'BRIhI NOT RELEASABLE TO CONTRACTORS This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu