P L 86-36 I DUUlDl D 1 13 m BUU D 13I rlDWU ffil lDWffil UJl DlDl f UJ DW I1WWlD R23 EO l 4 c L 86-36 k UNNA 1 ' I o ooo oo o 1 THE SIGINT USERS' HANDBOOK o o oo Donald B Ohver 3 HOW CLEAN DOES A DATA BASE NEED TO BE o 5 ' THE YAWN OF THE COMPUTER AGE ooo o I 6 THE CASE FOR COMINT READERS J 7 CROSSED CODEWORDS o o I 9 CLA I S TEN YEARS OLD 10 OTHER NEWS FROM THE LEARNED ORGANIZATIONS o oo o o 12 INDEX OF CONTRIBUTORS FOR 1974 o o o oo oo o o 13 j e_ bJ IIIRI48A t 1It f S l48A Cst9Nl 123 2 ibem t Aua aoo 16 I I i2 Uteiid 2 IheIa Mf tJpoa P f1Rtltatiw b die 8 IIIB 'fIllS DOCUMENT CONTAINS COtlEWOlttl I IATEItIAL Declassifi ed and Approved for Release by NSA on 10-11-2012 pursuant to E O 13526 MDR Case # 5477a DOCID 4033618 Published Monthly by PI Techniques and Standards for the Personnel of Operations VOL NO 1 II JANUARY 1975 WILLIAM LUTWINIAK PUBLISHER BOARD OF EDITORS Editor in Chief Doris Miller 5642s Collection o 1 Cryptanalysis 1 Language 1 I S02S 5236s --- Mach in e Suppo r t Special Research - - -_--- - - ' -- - - - - - 1 332l s Vera R Filby 71195 Traffic Analysis Art Editor P L 1 35715 William J Jackson Jr 5369s __ Editor for December I ___ 86-36 DOCID 4033618 EO 1 4 c P L 86-36 SECRET SPOKE UNNA'i 7 - - In hisin the article I September _ - ' P L 86-36 I f4 ssue ot LK YPTOLOG Derek Craig succinctly stated a pressing problem According to the gloomy prognostications of certain writers the British banking system is already balanced precariously on deposits of Arab wealth which can be redeemed at any moment The daily newspapers report that Arab efforts to acquire Lockheed Aircraft Corporation have been forestalled Rumors of an impending purchase of IBM by Arab interests are denied Arab wealth has already begun to insinuate itself into the fabric of Western economies at some very sensitive spots The situation bears watching The economies of Britain and the United States foundering under the forces of shortages recession inflation and domestic despair are vulnerable to disruption and the Arabs seem not averse to creating mischief It is critical says Mr Craig'r'_'f o r Uni ted States policY makers to know how' All the AP tory requ res s a properly ordered direc- In addition to the search function the AP can under computer control do the following UNNA I Add an entry to core in proper ord r Delete an entry from core and adjuID 1 4 c remaining entries P L 86-36 Read an entry from a designated core address Write a word into a designated core address Clear core put alII's into all of core UNNA was designed and developed in R33 with C65 contributing to software develooment The device underwent engineering testsl Ed note This is not an acronym as you might suppose but an R task covername The pronunciation most often heard here is Oona EO 1 4 c P L 86-36 Jan 75 CRYPTOLOG Page 1 SEcmSPOKl o EO 1 4 c EO 1 4 d P L 86-36 P L OCID 86-36 4 MiltS l a EO 1 4 tal 'EO 1 4 c P L 86-36 5CCRCF SPOIf UNNA as now mametic tape I confi lred collects data on The we leD 2 pans 1 for each voice channel One signal consti tutes parts of 25 different datl luit streams the telegraphy channels and the other consists of an energy TAP Lpa s I 110m Signal UNNA Functional Description UNNA is divisible into four narts Time Comnression Demodulator r I I IAssoc1at1ve Processor already described and Honeywell DDP-516 Computer with peripherals Time Comoression Demodulator TCD I Computer DDP-5l6 The computer used in the UNNA system is the Honeywell DDP-516 with 32K memory In the stand-alone mode it has the following peripherals mag tap controller and two mag tape units device speed 36 ips 556 or 800 bpi card reader and reader control unit device speed 200 cpm data terminal typewriter device speed 10 cps 75 characters per line Jan 75 CRYPTOLOG Page 2 - SECRET SPOIf DOCID 4033618 1 4 c P 86-36 iiCIlIi'f iPQKB the SIGINT USERS' HANDBOOK or what's an Ishtar donald b oliver v2 nrrew NSA employees are aware that since April 1974 a growing body of SIGINT-re1ated information has been a pearing under the title SIGINT Users' Handbook Inasmuch as it is distributed narrowly in-house even within the DOC organization and is essentially uncoordinated few analysts know that it exists ntis should not be surprising however as the Handbook's title advises that it is intended for the delectation of SIGINT U8ers also known as consumers or customers rather than SIGINT producers There have been two relatively similar predecessors to the Handbook--a long-lived series titled the INFOCON Information for Consumers and another series called Notice to Users the latter being an interim step between the INFOCON and the present Handbook Like the MUSSO system and certain other current vehicles of NSA direction the INFOCON program suffered from lack of staff attention iack of interest on the part of NSA managers and a degree of executive resistance to the whole idea For whatever reasons INFOCONs became tired outof-date and of little value to those they were intended to serve Only the users of SIGINT and those most intimately involved with them NSA field elements tried--unsuccessfully--to breathe life into the moribund body With the development of a system of United States Signals Intelligence Directives USSID which changed and reflected changes in the ways we supported the outside world it was obvious to the SIGINT Directives element now V13 that the INFOCONs should be reissued or wiped out School should pick it up The School was unimpressed with that argument P2 finally got the job but couldn't come to grips with the major policy issue as to whether an entire package must be presented to the users or whether the job could be done piecemeal Because of this little was done To be fair however as I can be occasionally there was some executive resistance to perpetuating a body of SIGINT information in a formal structured sense for the education of readers of product or the beneficiaries of SIGINT support This view was based on the entirely reasonable position that the more users knew of SIGINT Production Information see USSID 300 the more likely they would be to act to take over the responsibility of DIRNSA to manage the SIGINT activities of the United States It was the view of some executives that little information about SIaINT need be in the hands of the users and that what was needed could be handled by ad hoc memoranda letters and messages As is normal of course and as soon as it was convenient and safe this policy guidance was ignored and the SIGINT Users' Handbook was developed by V2 now VI2 To a large extent the rationale for the Handbook is the same as for Cryptologic Support Groups Each has a task of interpreting SIGINT advising the user how and in what form product and other SIGINT support can be made available to him and in a generally nontechnical context explaining to him the methodologies procedures conventions and systems by which SIGINT is produced and dist ibuted Particularly within A home for them was hard to find The old the military community it has long been true P2 organization which included a customer re- that intelligence assignments are short and the lations function felt that PI ought to do opportunity and inclination to study and undersomething PI allowed as how the effort was stand the arcane ways of the US SIGINT System are limited educational and the National Cryptologic Jan 75 CRYPTOLOG Page 3 SECRET SPOKE -_ __ _ - ---_ _-- --- DOCID 4033618 CGNFIDINTIAL courageous and feisty since it competes successfully with DoD Manual 5200 17 M2 and CIA's Communications Intelli ence Security Regulation in this regard lof V12 the Handbook scribe is eaf ess ahd overcomes all obstacles r The Handbook has become a best seller in the user community DIA conducted a survey of DoD SIGINT users last summer and observed The SIGINT Users' Handbook is a very valuable guide for all SIGINT users particularly intelligence analytical personnel Experienced analystsfiJldthe Handbo9ka very useful reference documentjitisinyalua ble to the new or inexperienced analyst as an informatioJl ide and tool relevant to SIGINT operations In this vein it can be used for indoctrinating new personnel relative to the various SIGINT report ing vehicles retrieval systems general composition of SIGINT product and concepts ofSIGINT support and operations The Handbook can be viewed as the SIGINT 'primer ' aJldfor the new or unindoctrinated supplements knowledge of SIGINT acquired through th eNSA orientation familiarization courses A word of caution Although geared to the USSIDs the HaJ1dbook is not a suitable replacement for tho e documents in respect to SIGINT produa ps Nor should it be used as a reference w0l'kto pass tests If y04 would like to review the Handbook or i f you have subjects which you believe are candidate$ for inclusion therein I suggest that you call or visitl I ext 52835 P L 86-36 E gNr QlltR IAb 1 weee PROGRAMMERS AND BOOKBREAKERS PLEASE NOTE The Checklist for Programmers of Machine Support Tools for Bookbreaking by Katharine Swift and Ifa p a gesl is now ayai jlab Ie Copies I can be obtained from IP16 3W070 ext 3045s I LEARNING CENTER OPEN IN LOCATION The Learning Center in OPS 1 has been relocated to Room 2W165 and its capacity more than doubled o Hours are 0700 to 2100 Monday through Friday Self-paced courses are available ineffective reading writing speaking and listenirig basic HELP WANTED Among a number of things in which the National Security Aqency is interested is ELINT Yet CRYPToLOG has never had a word about it except perhaps in passing I will accept par of the blame for that as I just do not I I knoWenouqh about the subject ' here is avast d1gital computer theory electron1c data pronumber of people however even in CRYPTOliQG' s cessing computer systems perf0nna J 1 ce slide rj ladership who do know enough about the sUbject rule'oPeration refresher cOUrses in algebra to educate the rest of us Please let me have and transistors coursesiri English as a second somethil q on this subject Collection Editor language and womel in management eeliF I BEIi'flAb I Ir g Jan 75 CRYPTOLOG Page 4 EO 1 4 c CONFID INlIAL IWJQlsi I COMI V CHANNE'S ONly P L 86-36 EO 1 4 c P L 86-36 DOCID 4033618 CONFIDENTIAL HOW CLEAN DO S A ne DATA SE NEED T0 BE 1 of the first things one learns about computers is that they require a much higher order of accuracy in the material they manipulate than do comparable human processes One learns to pay an extra measure of tribute in the' form of added proofreading or other forms of quality control so that the input is clean enough for the computer to handle After a while as the novelty wears off it sometimes occurs to one that not all of the data needs to be so awfully clean If we expect to sort or retrieve on a particular field or data element then that field or data element should be clean and garble-free but if a neighboring item is never well--almost never used as a control for sorting and retrieving then it only needs to be as garble-free as people need Quite clearly if only half of your data elements really need quality control then some of that manpower nowspent scrubbing each little data element might be diverted to other tasks It is possible to imagine categorizing data elements as first order if they need to be computer clean and as second order if they only need to be people clean In this day of great monolithic data bases however the use of varying quality levels can cause troubles however laudable their manpower savings may be Astory from life will illustrate Some years ago during the Vietnam War we found ourselves receiving two streams of electrical material from the sites in the field and both streams were used to feed computer processes The second was a cryptanalvtic stream A P L 86-36 The specific details of these processes belong to another story or series of stories The point here is that there came a time when there was an onerational need to identifv which messal1 esI I I I It should have been easy Neither system was new and both had been work ing for quite a while with reasonable success Success is a relative term there were always problems sometimes earth-shaking problems but by and large the systems did work It took a while to find out why but after a time the answer became clear Evidently the people at the sites knowingly or unknowingly practiced different levels of auali tv control on dat a l m n1 f hp All of which suggests several thoughts Garble rates can often be determined at least approximately by machine Certainly differential garble rates can be Field 1 has more or fewer garbles per thousand than Field 2 If data bases which now exist were measured to show which data elements were cleanest and which were dirtiest perhaps grayed in altO' 1 4 c sort of qtlality hierarchy P L 86- 3 6 the unwary might be warned off using the data base for sorting or controlling on the wrong dirtiest data lements hit thresholds might have to be lowered when dealing with ' 'dirty elements even at the expense of wading through more garbage Ot itput o managers might better understand the manpower costs of various control strategies but also we might decide that great monolithic data bases are not always the answer when one must work with a variety of data sources having widely different notions of which items are important SSNFIBEN'f'IAh 'IPiSSS Jan 75 CRYPTOLOG Page 5 ceNFIDlhTIAl w uIQT e H t SQIIHfF elIAfRiEhS SNhY '9- v hen yout let CDMPUTER RGE minal Is TerminaL - bylL -_ ' no secret that NSA has become almost totally dependent on - computer systems to aid our analysts The fact is we have had to turn to these systems in order to handle the increasing volume of work that grows more sophisticated while our peoplepower is shrinking But this dependence on computer systems has not been without its drawbacks and frustrations I'd like to call your attention to one of these It I S bad enough that the expletive deleted computers are down several times a day but that's something we have been conditioned to expect The real crime being perpetrated on systems users in NSA is far more difficult to adapt to It is the dreadful excuse given in accompaniment of each system failure or blowup Power problem on the platform some anonymous voice monotones to you over the phone Or worse still Don't know The --- Representative's looking at it now I ask you where' s the satis faction in explanations like these We users are looking for a salve and instead we receive the same infuriating excuses time after time Well I have a suggestion worked out while awaiting the reactivation of a lifeless terminal Let's have a contest Users will send in their nominations for reasons to explain the systems failures The best of these will be selected for play on taped telephone messages Naturally these will have to be changed several times a day coinciding with the actual systems failures We could even institute a method whereby after the message ended the caller would have 20 seconds of the tape to vent his frustrations as a system user This suggestion could pay for itself because NSA would then accumulate all these 20-second rages into l -minute segments and sellthem to GSA who would play them on tape decks hidden in statues to keep pigeons at a respectful distance Or better yet--what NSA walker hasn't wished for a way to prevent birds from roosting you've got another name for it along the covered portions of our sidewalks Cleaning bills alone could offset the expense of this suggested application Now just to show you what I have in mind as the type of excuse that users are looking for here are several examples 1 In accordance with provisions of the Fair Labor Standards the computer is at lunch IN22-- P L - I 2 When we fed all NSA's Regs and Procedures into core the computer blew up 3 Unfortunately the GSA standby crew just stood by - 4 An enraged bull gored the CPU and all the electrons leaked out S The lllain frame's been recalled by the manufacturer There's some problem with the MAYBE gates 9 6 An amorous ele m phant tried to mate with the CPU We expect a doubling of processing capability in about two years O ' - W 7 The orthodontist is here now trying to correct the computer's overbyte Sure I realize that this suggestion isn't going to keep our systems up any more of the time than they are up now But at least users can be provided with a slight diversion from this irksome and perplexing problem Maybe too the competition to get an excuse accepted will increase systems utilization reduce sick leave and improve morale That last e was changed from 5 by the censor We would require hundreds of excuses per week so conceivably everyone in the Agency could eventually win Anyway what could it cost NSA to offer a token prize for an accepted excuse I think our people would be satisfieu with a hammer a chisel and a slab of rock Then they could create their own data files Jan 7S CRYPTOLOG Page 6 -----_ -_ 86-36 DOCI D 4 033 618 'OOP S Rm UMBRA TCASEFORCOMINTRfADER P L 86-36 The 6oUow in g aJr t ide lUUh 6ome 6oo tno-tu whi c h have been omUted heAe oJr1 ghutU y a ppeaJr ed in Q RL in May 1977 Fa o-theA v tew6 on -th-i 6 6u bjec t 6ee -the June 197neywoJtd and -the Augu 6-t 1971 Q RL ift the time of this writing I have partiAs lovely as it sounds it is totally imcipated in the preparation and grading of four practical because it would actually slow down Spanish-language Professionalization Qualifica- production while old-timers--assuming that they tion Examinations and have seen more than half hadn't been transferred to another section to of the examinees flunk one or more parts A few learn something else--took time from their work people have expressed the opinion that the high to explain things to the new boy supervisors failure rate stems from the fact that the test would be justifiably reluctant to transfer qualiwas too hard Depending on how you choose to fied linguists out to pick up new skills while define the expression too hard they may be getting a bunch of unskilled people to teach right even the linguists involved would object to spenThe committee charged with making the exam ding time to learn something and just when they're and grading it started from the assumption that gaining proficiency in it they'll have to leave being a qualified Spanish linguist at NSA is a it and go learn something else in addition the hard job A true professional should be able constant shifting and acquisition of new bosses might hinder their chances for promotion to handle any kind of Spanish material that comes at him--from any country on any reasonAll of these disadvantages seem to outweigh able topic I n good the advantage of having a corps of well-versed condition or corrupt wr1tten or spoken etc linguists I think it oes without saying that etc Perhaps any test that tried to prove a such a nucleus of all-around linguists is cerperson's capabilities in all those respects tainly a good thing to have but it just isn't a might be called too hard but the ability to good thing to go to all the trouble of getting handle those topics and types of traffic differ- one entiates an NSA linguist from other linguists Another possible method of familiarizing and there are people who can deal with those various problems this fact can be attested by linguists with all the sorts of problems they're the large number of people who have managed to likely to encounter in a given language is to have a division or group training office which pass the PQE despite its difficulty prepares a broad courset o teach the requisite With Spanish th problem is complicated i nD lIUl-tel'i III from a number of sources by the number of countries using the language' most of which have some partiCUlarly irksome _' '- - -- - 1 Naturally this material national usage--telegraphic abrid2ement voca- ouldbe arranged in order of difficul y startbularv Abbreviations etc ing out witheasyaJ1 Lun co upt text and advancing into more telegraphic stylesjfi rst without and then with garbles ' 'EO 1 4 c Problems involved in having such atourse L 86- 3 6 include whether or not it actually includes all the types of material required whether the amount of time allotted to the various topics is adequate whether all the people who should take it do so or are allowed toby supervisors who hate to take people away from production even for a course which might improve output whether taking such a course should be a prerequisite for taking a PQE whether the grading is too strict or too lenient whether the course content is changed and updated from time to time and the obvious question How many people who take the course subsequently go on to pass all parts of aProfessionalization Qualification Examination This may seem like an obvious question but it's hardly a fair one since that isn't really what such a course should be designed for however one might be tempted to consider the PQE as a way of verifying the effectiveness of the L --II course I L o rr 1 Jan 75 CRYPTOLOG Page 7 TOP SECRET UMBRA DOCID 4033618 'FOP SECRE'F UMBRA Perhaps a brief outline of what a GOMINT Reader might include would be helpful After introducing texts on a number of subiects duly notated to show teleuranhic usauel -- -- ------ ---- Igarblescan be introduced wrong letters missing letters transposed letters These mutations should be explained preferably in a special Answers section either at the back of the book or in a separate volume and sample translations given This latter feature would introduce the user to standard Agency preferences I Here a word of caution should be given There ought to be a reminder of acceptable de'garbling procedures and garbled groups should De restricted to one wrong letter or digit or one pair of transposed characters per group Obviously the code groups must be shown to enable the user of the GOMINT Reader to degarble mutilated groups The groups that are garbled should if possible appear elsewhere in the text to help thedegarbling process A variation of this practice might be introduced in the one-part code section where the message text obviously calls for a word with a given meaning and the alphabetical range of the code pins down which of several synonyms is annronriate _--------------------' was 0 nelp InOlVloualSpass Y r s laHfl llgn 1 sincerely hope that no one feel sthatthisis the only value of GOMINT Readers itsll llld be remembered that such garbles have no place in professionalization exams EO 1 4 c P L 86-36 Jan 75 GRYPTOLOG Page 8 1'6' S CIt 1' UMBltA EO 1 4 c P L 86-36 DOClD 4033678 TOP BESRE' ' UMBRA wiiinntheynreaHynwork'i'nnThere may be other quesThe final printoutf I snouia be accompanledby a tions but these four should hiild u snfoTna whil e wealth explanatory notes as well as an acP L 86-36 ceptable translation Apropos of an- acceptA COMINT Reader should not be a one-man EO 1 4 e able translation it doesn't take long until it show or solo operation especially for those becomes the acceptable translation and perhaps languages where the input will come from a nwn there should be a few paragraphs exnlaininv whv ber of Agency components To be sure one per certain choices are unacceptable rson could bethe committeecha irman ol'editor in-chief but there should be several check 9 1 4 e training officers and other qualified lingui ti 86-36 responsible for the selection arrangement translating and explicating The COMINT Reader has one advantage over a The obvious way to make sure that the maregular course namely that the student can terial is comprehensive and correct is to have progress at his own rate of speed rather than the greatest possible nwnber of Agency elements try to keep up with a class which may mean go- using the language represented in that prepara ing on to a new topic before he really undertory committee and to staff it only with qualistands the old one In addition the user can fied linguists of recognized ability Naturally keep the book in his desk stud ing it on ly when they will have access to a broad range of mahis workload permits although If superVIsors terials classified up to and including TOP SEC will let their people spend one or two hours per RET CODEWORD which will most likely be the day working with the COMINT Reader that would classification of the COMINT Reader Havin a be commendable sufficiently high security classification will also allow for a fairly complete inclusion of The availability of a COMINT Reader does not necessarily obviate having a formal course all sorts of appropriate material the two can complement each other In fact the' As for the last Question about whether use of a CR as a text for such a course is quite COMINT Readers will really work I honestly a possibility and a knowledgeable teacher could can't say But I firmly believe that since the clarify the explanations and comments that the rotation system is impractical and the setting original compiler may have treated too briefly up and holdin of classes is a more complicated A teacher can also acquire additional material procedure and has its drawbacks COMINT Read to reinforce the lessons in the Reader or to ers certainly ought to be given a chance We give specific individuals greater practice in won't know until we've tried--and asswning that handling the types of traffic with which they the CR idea will work we ought to try it soon are actually working A current piece of traffic may provide a better example of some phenom ' 'Sf SeeRf 'I' UlIBIlYt enon than the message shown in the COMINT Reader In other words just because such a book has been published this doesn't mean that the canon CROSSEV COVEWORVS has been closed once and for all In fact 19 UKUSA COMINT CATEGORY VESIGNATORS this is one advantage that a class can have over USEV OVER THE PAST 24 YEARS a CR P L 86-36 byl Naturally I don't propose COMINT Readers for every language In some cases the traffic ACT I 0 S U Z SUM 0 RAY T 0 V I P of users that theM MXSHSTA TI E C T L Z OU I does not offer t h 01 r nmrnnn lanuuages I If p-r-o-vl-'d-e- -Th er-e-ar-e-4 Ls-o-m-e 'l 'a-n gu ag e s wr- - hler e - t l 'hle- v ' o lwnei s so small that one or two linguists get a chance to handle all the different types there are other languages where the nwnber of potential Agency employees who could profitably use a CR is so small that the time and effort spent in producing one could not be justified But I do feel that such books would be valuable to NSA in helping people pass PQE's and--more important-to give Agency linguists a better understanding of some aspects of their language so that they can do a better job There are still a nwnber of questions about COMINT Readers left unanswered For example who will prepare them How can we be sure that all available type of material are included How can we be sure that the material is correct I i f rr rEO 1 4 e Y K MER REM A A E ETA P L A IE P L U V A X Y E V RAM L LAM N R S R N L S A EON E 0 E Q U N T RUN T R E E S Z Z R 0 UTE L FIR U A L S 0 EVE N 0 E EST L 0 V A U N T V T B HAM E S 0 V N E X E R X A L A X E MB S E V A E M 0 N E Y Y LAY N V I I E MER R Z Y Y S A V I N L ELL L K G V I R B M T E M A INC A N 0 E 0 A A N 0 LOS U 0 F RIG X IOU MEN U N T MOO ROE N A L C MUS LEI E T I A T 0 K L S A R MEN U P P S R V V A U Y B E S 0 K S 0 S V ROE 0 Z E E I E 0 T Y ZOO N S C IQKSAOENRXNETZBOFXIA 0 VENARKETEVLAARBMUUSL NIL L I K ROY WEN R A I N R 0 F I 3EEURli Ef ee8 Jan 75 CRYPTOLOG Page 9 'fOP SEClmT UMBRA 86- 3 6 DOCID 4033618 o CONFIBENTIAL anuarY 1975 marks the tenth anniversary of the founding of the Crypto-Linguistic Association CLA brings together linguists and other professionals of varying backgrounds and interests--the young technician eager to expand his horizons the veteran seeking to promulgate a theory or present a new technique the manageranxious to spot new talent or acquaint himself with the latest developments in the field As a professional and learned society the Association has a duty both to the individual cryptolinguist and to the field as a whole and in fulfillment of that duty it has steadily expanded its scope and its efforts To give cryptolinguists an opportunity to know each other to acquaint them and other professionals with what is most significant in the field to provide a forum in which members can present their ideas to recognize achievements in the field of language at NSA--these are the goals of the Cryptolinguistic Association Note All the speeches presented during the past two years have been recorded on tape and has been another exceptionally success- it is expected that these will be also The ful year for the lecture series as attendance Association is now discussing with the Learning has testified Members and friends have heard Center the use of its facilities for making the Clifford Groce of the Voice of America Howard tapes available on cassettes for use within the Agency Rosenblum NSA DDR Brigadier Tiltman of PI and as a surprise bonus Victoria Fromkin of Special Interest Groups UCLA's Department of Linguistics The schedule for the next few months is as follows The Association has two special interest groups now aC tive and two more in the process Tenth Anniversary Lecture by Mr Tuesday of formation All interested members are inWilliam Hyland Director of the 14 January vited to join one of these groups or with the Bureau of Intelligence and Research approval of the Board of Governors to establish a of the U S Department of State new group in a field of special interest to them The Use of a FAST-Trained Linguist Tuesday 11 February in Military I ltelligence Col SIGLEX the Special Interest Group on LexiRichard A Szymczyk Chief of the cography was formed in 1972 and has been Western Area Division of the Direcvery active ever since Some of the subjects torate for Intelligence Defense in which the group has interested itself are Intelligence Agency modern methods and standards of lexicography evaluation of commercially produced diction Computers and Linguistic ApplicaTuesday aries review of Agency-produced dictionaries tions Dr A Hood Roberts Vice 11 March and glossaries and uses of the plain-language President of the Center for Applied index Several members attended the InterLinguistics Arlington Va national Conference on LexirograPh Y in New Gala Tenth Anniversary Concert Tuesday York in 1972 President is I Songs from Around the World 25 March 8407s The U S Army Chorus under the SIGVOICE as its name implies is keyed to direction of Capt Allen Crowell language in its spoken form particularly Translation Science or Art Tuesday to the work of transcribers and to research Dr Esther Matteson Linguistic 8 April which may assist in better processing of Consul tant with Wycliffe Bible voice intercept So far this season it has Translators taken up the subj ects of voice transcription iS Lecture Series Jan 75 CRYPTOLOG Page 10 CONFIDENTIAL iWIQb6 '1A EURiQUHR' EURIWHIEDS 81lbY P L 86-36 DOCID 4033618 GONFIDEN rIAL EO 1 4 c P L 86-36 I at field stations 1 The Jaffe Award land tactical voice in Vietnam On 9 January 1975 Dr Richard Altes of Electromagnetic Systems Laboratories Sunnyvale California will us np na h a d I IbothofR54 will vOl ceprl nts and au di tory illusions respectively Jack Gurin 5236s is President of SIGLEX A new group now forming is SIGTRAN which proposes to study the general principles and practices of translation both inside and outside NSA Translation shall be interpreted in the broadest possible sense a nrfl shall closely relate to other fields of cryptologic-' nbwledge such as cryptography cOlDPuter science and certain other branches of applied linguistics The first meeting is scheduled for Wednesday 22 January at which time Whitney Reed will speak on free-lance translation Interim chairman of the SIGTRAN group is Florence Kuipers 4998s The Jaffe Award is a memorial to the first president of the CLA Dr Sydney Jaffe It is CLA's highest recognition of exceptional achievement and takes the form of a citation and the inscrip tioJlofthewinner'sn epl1aplaquei on permanent display in the main lobby P L Candidates are nominated for outstanding achievement in one or more of the folloWing Integration of language work with other disciplines Linguistic research pertinent to the Agency's work Contributions to the effectiveness and morale of linguists Management of language operations Versatility in working with several languages Contributions to language training Saving of time and money in language operations Contributions involving rare languages Development of new equipment procedures or systems expediting language work Scholarly eminence which has made the candidate of unique value as a consultant Public achievement which enhances the prestige of the language field Individuals may be nominated by any three members of the cryptologic community by the chairman of the language career panel or by any supervisor at office level or its equivalent Nominations should be submitted by 30 March' for details all the CLA President 4332s 11----------' The Essay Contest The Spring Banquet The essay contest is held annually its pur pose is to encourage writing on the application of linguistic knowledge to the solution of Agency problems Any paper on language cryptology or a significantly related subject may be submitte and any NSA employee regardless of membership in the CLA is eligible to enter the contest Papers which have appeared in any Agency publi cation during the preceding 12 months will auto matically be considered entries Prizes of a hundred fifty and twenty five dollars go to the winners Entries for this year should be submitted in three copies by Friday 14 March to L --J1GLA Secretary Room 2A197-l P L 86-36 EO 1 4 c EO 1 4 d The CLA season culminates each year in a banquet in late spring for members and their families and friends Dinner is preceded by a cocktail hour and followed by a program which typically includes a distinguished speaker on a subject of general interest the introduction of new officers and the announcement of the winners of the essay contest and the Jaffe Award P L 86-36 Jan 75 CRYPTOLOG Page 11 eONFIDENflAL Ihfc NBbE VIA ESltlIIff eIl ltl4Et S SHbY 86-36 DOCID 4033618 oo INTERNATIONAL AFFAIRS IISTITUTE TheJte w ill be ItO lectuJLe in J aYU UVLtj o VIt EdJAxvui TeUeJt Juu ac c ept ed the invd a UOIt to -6pea k Olt 5 Febltu aJr rj NEW OFFICERS PRESIDENT PRESIDENT-ELECT 03 SECRETARY rrREASURER MEMBER-AT-LARGE EMBER-Ar-Li R GE ' MEMBER-AT-LARGE L- NEWLY ELECTED 1975 CIS I CONFERENCE THE SECOND CISI SPRING CONFERENCE WILL BE HELD 20-22 MAY 1975 IN THE NSA AUDITORIUM PAPERS HAVE BEEN SUBMITTED ON FOUR TOPICS SECURITY IN DATA SYSTEMS DATA BASE MANAGEMENT SYSTEMS FIELD SYSTEMS APPLICATIONS MANAGEMENT IN DATA SYSTEMS THEY WILL BE PUBLISHED AND DISTRIBUTED TO MEMBERS BEFORE THE CONFERENCE AUTHORS WILL DISCUSS THEIR PAPERS AT THE MEETINGS LECTURES THE JANUARY MEETING TO BE HELD AT 0930 ON 23 JANUARY IN THE NSA AUDITORIUM WILL BE CO-SPONSORED BY SIG HUMAN FACTORS THE SPEAKER WILL BE MAJ GEN RIENZI DIRECTOR OF TELECOMMUNICATIONS AND COMMAND AND CONTROL OF THE DEPARTMENT OF THE ARMY DISCUSSING SOME LESSONS LEARNED DURING THE RECENT MIDEA T CONFLICT New Officers CMI's biennial election of officers was held on 5 December 1974 The Council 'CommitteeChairmen and Executive Director are listed below An asterisk indicates that the peisoQis newly elected I president s l REED DAWSON P12' pre s i d e n t 1 -P1L Secretary e c t N32 Treasurer t fl r 5l Council Member L BILL MIXER G42 Publicity WALT PENNEY PIS Executive Director Lectures The speaker for February has not yet been decided upon Dr Joseph Blum of R will speaK ill March on the general subject of CHARI OW and optical processing Essay Contest Entries for the 1975 essay contest in the form of papers on cryptology or any significant related sub' ect rna be submi tted t 0 r Re e d Daws -o n -- 'D o o m --rnrrTTTTT 1 r T ---'f 3957s by 28 March Any ON 26 FEBRUARY I I CHIEF OF is eligible to enter Security classifications are permissible but ideas or THE PROGRAMMING AND RETRIEVAL LANGUAGE techniques originating in compartmented DIVISION WILL SPEAK ON THE TOPIC OF DATA BASE MANAGEMENT THE TIME IS 0930 areas should be reduced to a noncompartmented level for entering Technical PLACE IS THE NSA AUDITORIUM Journal articles published durIng the current year will be entered automatically Jan 75 CRYPTOLOG Page 12 I 86-36 GONFIDENTIAL IIIDBX rl E 1J0 lBl lU DI1 0 sen-Paced Instruction Th Future Is NONlu ' u The Oldd ction rts3 4 Maps n Mind A otoessay u A lg 15 llic 5 Listed by Cootrihutor c Buck Stuart H ccmnentsin Cryptanalysis CJ x jeRecovery Sare Thougbts on Lexicography Sep 5 Sep 11 o c 13 iii p L 86-36 Nov 10 Leahy Francis A Propos lfor CalendarJleforrn o llic 19 1 RUlgEusyb l$Ieen Deadi Mountjoy Marjorie Cryptanalysis Code Recovery 'I 00 Sep 19 o o o o o o P14 The New Traffic Analysis Glossary y nfa r t ls Proces ing llic 10 lkt l xiley Barrera P Nice BusllBIl'S Hohd yfor Qle NSA Enployee Aug 19 What SllOuld You Expect or The Analysis of Cryptanalysts Secrets of the Altars The Itbustier Cryptograms An October Overlap Answer to October Overlap 00 00 oo Aug 5 Sep 1 ' lkt 20 No 21 Sep 6 Oct 11 'bv 15 c 13 I 00 'bv 5 Filby Vera R e v i 'A' 'S in SpeCH search l nalysis TIre ApostroFhe Sane Thought's irofa 10 Caterino G Gary's Colors ooooooo 00 7 Aug oooo lkt 16 Nov 14 Sep oooooo o o 8 00 00 ooo 00 oo 00 00 lkt 7 Nov 1 Aug llic 7 Nov 7 oooooooo 00 o 00 o o j o ooSep 5 i Aug 8 Oct 7 00 Aug 11 Sep 14 llie 12 00 I lIT Everyday Talk ' Aug 11 I Aug 20 Tetrault EJnery 1' Even a 5-Year-Old hi ld ' lkt 4 Giudesmanship or How to Write Technica 1 Mmuals Without Actually Giving Anything Away No 18 lhsigned The New Traffic Analysis Glossary A Short Dictionary of Cat eer Panels The lanagement Survey of the fhilhanronic Prizes Honors fran the Learned Organizations Telephooe Recall An lhofficial Glossary of Weasel Wor b News from t h School Caning Events Assorted Edi toria 1 Notes Secret 1essag es Citizens of the World Let ter to the Editor Aug Aug Aug Aug Oct Oct lkt Oct 'bv llic 1 1 00 oooo 00 00 1 Character-BUlldlng ln EURh People's Republic of Olina o Ram 5fi Santiago-Ortizl The Lmgt age of Beisbol in Everyday Talk Lmguag e in the News The English umguage i the News Santiago-Ortiz Ramdn J The Language of Beisbol Exinteme Anne pseudonym A Long Hard Look at the Intern Program Part Qle Fbilosophy Recruitment Part Tho Selectico Orientation Part Three ltivation Morale Part Four IIhat Happens to the Graduates 00 o wi th I IYlhat Where Why Ckracter-B llirling ln the People1s Republic of Orina 00 The MisslOn of the Requi rements PaneL No 12 Pl ntyofthe HUBslan Lm age Slavophiles vs Westeml ters o ' d 1 Craig llirek K COMINT Analysis of LI _ HeflectlOns on a 'Iranslators Conter$i2 I I John George AFiagA avirrgProgramrer 00 00 00 o o o o 00 00 8 17 20 21 6 10 14 15 4 4 Dee 6 llic 9 1 I Jackson Wi11ial 1 J TDB The TEX1A Lata Base An Approach to Cal1sign AnaJysis I 4 I NeW Irenas ln the leaching of 'ryptaIlalysis A Walk Through the' 75 CuIl'icullJll 00 00 86-36 EO 1 4 c P L 86-36 Pi-Jan 75-53-23375 Jan 75 CRYPTOLOG Page 13 GONR9ENtiAL IWlebE VIA SS lHli SIIAfIllHS SNfN DUCID 4033678 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu