GJGBPilUDWGBPil 1 lS D DU GBPDOOGJ LrW V 13W 13 i OO13Ulfil13 f OOUl lk ilWfil ON COMING OF AGE AT NSA U oooooooooooo oo o 1 AN AUGUST BAUDY U o oooo oo 6 NSA-CROSTICNO 28 U ooooooooooooooo ooooooo O H W oo oooooooo 8 INSUFFICIENT NORMALCY OF METHOORY U oooooooo Sydney Fairbanks oJ 0 NSAPROMOTION BOARDS HOW THEY WORK U oo o 1 11 ooo BUT ON THE OTHER HAND U o oo ooooooooooooooooo ooooo ooo j o o 15 I 16 PUNCTUATION t-IlRE THAN MEETS THE EYE U o o 1 LEITERS TO TIlE EDITOR U oooo ooooo o oo ooooooo oo oo o oo o 17 MEMORABLE MEMOS 11 oooooo ooooo oooo ooo ooooooo oo oo ooo ooo 19 CLUB NEWS CM AND CMI U oooooooo o o o oo oo oo ooo oo o o 20 IIIS BeetlMtlf TOt' eeN'I'2tfNS eeBHWORB MA'fERIAL eLA5SIFIEB BY NSA eSSM 129 2 REVIEW eN 1 SEP 288q Declassified and Approved for Release by NSA on '10-'1 2- 20'1 2 pursuant to E O '135 26 vl DR Case # 54778 DOClO 4009830 SI3CRI3'f Published Monthly by PI Techniques and Standards for the Personnel of Operations AUGUST-SEPTEMBER 1979 VOL VI No 8-9 WILLIAM LUTWINIAK PUBLISHER BOARD OF EDITORS Editor-in-Chief o David H Williams 11038 Collection o o oo o 1'--- Cryptanalysis o I S55s 4 2 j 1 59 Cryptolinguistics o 1 Inn 3 - 1 Information Science 1181 sj Special Research o Vera R Filby 71l9s Traffic Analysis o Don Taurone 3573s Production Manager ooooo o o o Harry Goff 5236s For individual subscriptions send name and organizational designator to CRYPTOLOG PI SEeRE ' - - - -- -_ - - - - - -_ - - - - - - - - - 86-36 '''p L DOCID 4009830 JONFIBBN'I'IAJ On Coming of Age at NSA Confession of an Ex-Linguist U P L Byl 86-36 IV o you remember green traffic Maybe some of you out there are still reading green traffic but I doubt it You see green traffic was BC at NSA--BC that's Before Computers Back in BC an analyst stood on his own two feet There was no such excuse as the dumb computer goofed up or garbage in garbage out You either cut it or you didn't I dont recall the exact day we went AD AuDomashun it's really not important You computer historians have your version I have mine Anyway I recently spent some time testifying in court and I know you can say just about anything if you precede it with to the best of my recollection So I I g ven a new job Ac tu aU tj U Jt tt Ii ------- a UeA I Put out my August-September 79 CRYPTOLOG Page I CONfIBBN'I'IAJ lIMJBb ' It SQMnI'F sn unl b8 Q IJ Y DOCID 4009830 eONPIBENt'IAL and paper tapes to be rewound often they arrived from the field inside out I especially loved paper tapes because it was a team sport One guy would stand at the end of the hall waving off pedestrians the other would grasp the lead end of the tape and throw the roll down the corridor Getting paper tapes frontside out was very important because if they weren't done right your nextdav's conmuter traffic would read r C Group sent a very nice fellow over and we had a fascinating chat about how fast com puters could do things compared to people It __ was easy to talk to programmers in those days U One day my friend frorn C Group came by because they had no mystical vocabulary of and announced that our programs were to be their own the way they do now Agreement was moved to a new computer system Elfhili 4'1il c reached that the messages would be keypunched to be the first transistorized t 6a 6 after which we would make a number of differNSA and would be a great i rovement over ent sorts to see i f any patterns fell out We the old vacuum tulle ones which required decided to make a sort on this group and on several hours to come to a stable operating that group and finally to run a sort in temperature when turned on Monday morning r ev l e r s e l0 r d e r _ _ H e d i dn 't e v e n n e e dwa M e l im o __ Yup that's right-the computers didn't work weekends An instructor from the computer company was coming out to NSA to teach a two-week course in programming the machine I begged my chief to be allowed to enroll in the course Begged sounds like a strong word but back in those days college girls had a reputation for getting married and then you-know-what which meant all that had been invested in them went down the drain I promised him that even though I was married I would never get you-know-what and quit in exchange for which he sent me to school for two weeks U I had a bit of a problem in the course not because I didn't understand the work but because of a mild case of morning sicknesssorry about that Chief By the end of the two weeks I was really grooving on the language and could read a card loop through a process and print a line with the best of them U I returned from class ready to test out V Over the next couple of weeks I pored my new programming skill and found to my over the sorts There was a lot there but dismay that it had largely been for naught somehow I couldn't put it all together Some- At NSA we didn't read a card loop through thing was missing The rerun sort had unfora process and print a line We took the tunately not yielded anything but wait a cards to a shOp called Peripheral had minute there was something after all The the cards loaded to magnetic tape carried backwards sort-I had been too ashamed to the tapes to the computer read tape looped throw it away I pUlled it out and voila I through the process wrote back out to maghad it the identity of the groups the allo- netic tape and carried the tape back to cation scheme and instant fame Drunk with Peripheral for printing None of us had success I asked to join the staff and devote the faintest notion of how to write a program my life to the computer I was hooked using gnetic tape as input and output Moreover assembly language that we had Life as a junior ADP sponsor was terrilearned was not used but rather an assembly exciting There were cards to be punched bler compiler You might think that this was August-September 79 CRYPTOLOG Page 2 eONf'IBIN'fIi L WU QI I Wi ' QQlIm enltNNBb8 8NbY DOCID 4009830 UNCLASSIFIED some kind of communications gap but it wasn't It was long-term strategy because we got the outsiders to think we were doing one thing when we were really doing something else That's why the Commies fell so far behind in mag tape 'technology To this day they are still reading a card and printing a line U In those days writing and running programs was an absolute ball The central part of the basement was one gigantic open room with the sea of computers rocking and rolling as far as the eye could see The C Group programmers were not hidden away in little groups allover the building the way they are now but logically deployed in rooms adjacent to the big room If something ran amok the computer operator would simply open the door to the programmers' room and fall in the big room had a raised floor the programmers' rooms didn't This would catch the programmers' attention and together the operator and the programmer would stroll to the machine to resolve the problem Resolving the problem meant manually stepping the computer through the program instructions one by one until the error popped can you believe it and then keying in the patch via the computer toggle switches u If you were the dirty fingers type like I was you could even run the computer yourself mounting the magnetic tapes and hitting the start key The console lights would flash and the tape drives leap into motion It was almost as much fun watching a mag tape fly off the drive as throwing paper tapes down the corridor And was there ever any greater thrill than fogetting to put the carriage control tape on the high-speed line printer and watching a fountain of #12-4 hit the ceiling after the first page eject command u Automation was moving into high gear now but the analysts themselves didn't really get hands-on into the action until the advent of ROB ROY For those of you who have spend the past ten years wondering what the mnemonic RYE stands for it can now be revealed that it isn't and it doesn't RYE is what evolved after ROB ROY because the namer was not too swift in the bartending department ROB ROY had the first remote user terminals ever they were also probably the last terminals that plain old users could operate I think there were five terminals in all placed conveniently in the little keypunch rooms that had begun to spring up in the analytic areas since there was about ten times as much to be keypunched as Keypunch could handle Anyway the terminal looked like a metal desk in fact it was a metal desk I point this out particularly since I have recently been briefed on a mammothbucks R D contract not ours to study man-machine relationships one aspect of which is to design a user terminal that looks just like a desk In one side drawer of the ROB ROY terminal was the paper tape reader for input in the opposite side drawer was the paper tape punch for output On top of the desk was mounted a big clunky console full of switches and lights none of which had the least significance save for the GO light and the GO button Actually I didn't learn this by going to a class but by observation since my reason for being in the room was to keypunch By now I was probably the Agency's highest paid keypuncher U After staging your input tape into the reader you would sit alertly with your eye on the GO light and your finger on the GO button The terminals were serviced serially so when it came your turn the computer operator would switch on your GO light and you would instantly hit your GO button to initiate the paper tape reader If you didn't move swiftly the computer operator would assume nobody was there and go on to the next terminal Since each of the five terminals was free to run any length process doping off by lighting a cigarette or something could cost you an hour's delay waiting for your next turn U One day there was a cigar smoker in there who naturally blew a couple of turns and since I was sitting there keypunching not looking my grade he told me to keep an eye on the console and shoot off his input when the light came on I said sure so he left I was m re or les h ref ith key soEl rbl1 ed Riy punchingl chair over toevote myul atteittfun fr6-36 the GO light After a bit it flashed red I hit the GO button and the tape reader burst into action and then immediately burst into flames Now I knew C Group was resisting the open-shop concept but I felt this was going too far Reacting with calculated calm I called the computer operator and told her I would be skipping my turn for now U This incident greatly enhanced my reputation for handling data processing crises and it was inevitable that I would assume the position of senior data processing sponsor in my office--and so it came to pass Sitting at my new desk in the staff area I surveyed the room with pride--computer listings everywhere spilling over the analysts' desks spilling out of the formidable rows of cabinets which now doubled in number almost monthly spilling into boxes destined for Fort Holabird to be preserved for all time and not a sheet of green anywhere What an accomplishment August-September 79 CRYPTOLOG Page 3 UNeMSSIFlEf DOCID 4009830 CONPIBBN'f'I Ab u There was however one blot in this otherwise perfect vista the analysts' desk drawers Even though I had supplied them with lists and sorts and sorts and lists they stubbornly insisted on maintaining their own handwritten note files They were backed into the trenches but they were still fighting The 3 x 5 cards files on yellow telephone message pads notes on envelope backs-this just had to go We had recently gotten a new Chief and he was very impressed with our advanced stage of automation baving just come over from The Other Group About this same time I met a really sharp fellow who was putting the finishing touches on a super program that would search through records and extract from them almost anything one could imagine He called this process a retrieval language and he was looking around the Agency for some data in complex format to test against It occurred to me that all those little bits and pieces of information jotted down in the various analysts' desk files fit his needs to a T I set about writing a description of a set of records such that each piece of information had its place Companion to this would be an analyst log sheet each analyst would have his very own personal booklet of log sheets to be filled in as information bits were uncovered in traffic Old analysts would have the joy of completely filled up books New analysts would know exactly what to look for and could just fill in the sheets Since all the data was done in a common format once it was loaded into the computer analysts could easily compare data to mutual advantage It was perfect Well almost As I am sure you know linguists are a very independent bunch ana tbey said they certainly had enough to do without having to fill in reams of dopey log sheets In the interest of security mainly his own the Chief tabled my proposal About this time 1 made their annual royal visitation to our shop I knew the script pretty well having sat through previous iterations of the same meeting for years They We want you to translate all the messages you get and just send them over to us We'll do the analysis Chief We can't translate all the messages and besides we have lots of very expericnced people who are not only highly capable linguists but superb analysts as well They You know very well that you don't do analysis We do analysis You supply intelligence information big eJilphasis on the word information They We produce intelligence emphasis on intelligence therefore we decide what's worthless But then suddenly the unchanging annual dialogue took a new tack Chief Well just assume for the sake of discussion that we did translate all the messages and send them to you what ever would you do with them They Why we would put them in our database of course Long pause Chief Your database They Naturally it's the latest thing The Chief gave me a long flinty glance I had been dozing off the in back corner of the office because my only function at the meeting was to add strength in numbers to OUr Side Suddenly I felt fear Smiling foxily the Chief turned back to the conference table Chief Well you gentlemen will be pleased to know that we have had a database for some time and my senior ADP officer will be glad to give you a rundown on it Now I could taste the fear as he went on Perhaps she'd like a moment'-t e g63 6- 3 6 to her desk and get her brWiillg 4 c notes Obviously my command to exit U I Chief Most of the messages are worthless EO 1 4 c P L Well that was many years ago That project was born flourished and died a graceful death when the linguists at long last achieved the recognition in the community that they so well deserved The age of comprehensive reports came in and individual translations were deemphasized I myself followed my own star moving on to as we say in performance appraisals jobs of increasing complexity and responsibility in the data processing environment I now have a whole roomful of com puters all my own but once in a while on the August-September 79 CRYPTOLOG Page 4 86-36 CONPIBHNCfIAt IIAflBbtl ViA eSMlU''l' eUAI4IifI iM OIifL i DOCID 4009830 CONFIBEN'ftAL way to work I spot a license plate like 7193 -one of the few STC groups I ever managed to memorize which reminds me of what it was like in the old days and how it all got started U I'm actually so busy managing all my fantastic machinery you might wonder how I ever found the time to write this tale To be truthful just the other day one of my systems took a hard crash followed shortly thereafter by the other one then the disk drives went and all the terminals died Since this office is totaZZy AD I've had a little time on my hands But don't worry Maintenance assures me they only work days tha everything will be back up in the time it takes to say IAHGNAHS This notice is UNCLASSIFIED - CLA-NCS FOREIGN FILM SERIES THE FOLLOWING LISTED FOREIGN LANGUAGE FILMS WILL BE SHOWN IN THE FRIEDMAN AUDITORIUM UNDER THE JOINT SPONSORSHIP OF THE CRYPTO-LlNGUlSTIC ASSOCIATION AND THE NATIONAL CRYPTOLOGlC SCHOOL NaIf STARTING TlME IS DAli 29 NOVEMBER 20 DECEMBER 17 14 13 0930 HOURS ON EACH DATE LANGUAGE I1IJ E RUSSIAN THE FORTY F 1RST HEBREW MULTI I Ir-FOSSIBLE ON SATURDAY JANUARY JAPANESE FEBRUARY FRENCH THREE FABLES OF LOVE MARCH TURKISH THE FATHER SANJURO ALL FILMS HAVE FOREIGN LANGUAGE SOUND TRACKS AND ENGLISH SUBTITLES ALL ARE INVITED August-September 79 CRYPTOLOG Page 5 CQNFIBBN'ftkt -------- OOClO 4009830 UNCLASSIFIED 11 AU6UIW BAggy I E 54 In u n nn ave patience a little longer world You will soon be able to know what the collectors are saying when they use their arcane language A glossary is in the process of being written which will be the definitive word on what is meant by that term you have often heard but have never really understood A glossary is being compiled by a committee of people in signals collection or associated with various aspects of it At present all but four of the participants on the Signals Collection Terminology Panel are professionalized collectors The remainder are professionals in some other fields such as Signals Conversion or Data Processing--fields which are closely akin to Collection and which share much of the terminology The SCTP is not the first such effort It is the second in what will be a series of glossary-writing panels that are sponsored by PI and whose members are appointed by the Chiefs of the Agency's Key Components as part of an overall program for terminology standardization that is set out in USSID 412 The Traffic Analysis Terminology Panel has been in existence for several years and the glossary which they have preparod is in the final pre-publication phases The SCTP is of more recent origin We have been in existence for just over two years At pr sent we have dealt with to the satisfaction of a consensus of the panel some 1500 terms It is easy for us to understand the length of time it took the TA panel to produce their document because of our experiences We have occasional moments of quiet despair when we wonder if we will ever finish the task we have taken on In fact we the current members of the group well may not People get transferred overseas or to more demanding jobs and have to be released from panel responsibilities New mem bers have to be assigned to replace them The author is a second generation member Two years ago the panel had a list of 2686 terms t consider Of these some 1200 were thrown out for one reason or another H Quite often the reason for dropping a term from consideration is that it is quite adequately and precisely defined even in the terms of signals collection in a standard dictionary An example of this is the word aaquire Webster says it means something like to gain by one's exertions No matter how we looked at the word in the panel it came out meaning what Webster says it means so there is no need to include it in our glossary We have provided definitions for another three hundred te s more or less At present as a result of some new terms having been introduced for our consideration we have just under 2000 more words or phrases on which to deliberate There are two major factors which make the job both ifficult and time consuming The first is the unfortunate fact of life that a word which started as a representation of some specific thing or action evolves over the years to encompass more and more variants until it becomes an imprecise and often erroneously applied term Just as one example the word baud will be cited This inoffensive little word used by collectors and other technical types for years and years started out with just one meaning a unitper-second unit for expressing the speed of a telegraphic signal The unit in question is the least element in a signal or a space of a length equal to that element e g the Morse dit or an intra-character space Just as knots refers to nautical miles per hour so baud refers to the number of these elements per second The radio world the electronics world in order to honor Jean-Maurice-Emile Baudot as it had honored Michael Faraday Charles de Coulomb James JoUle and let's certainly not overlook Samuel F B Morse named this measuring unit for him It's quite simple really Instead of saying that the rate of transmission of a particular signal is equal to x number of the smallest element of the signal per second one would merely say that the rate is x bauds thus shortening a cumbersome phrase to one word August-September 79 CRYPTOLOG Page 6 UNCLASSIFIED P L 86-36 DOCID 4009830 UNCLASSIFIED r Ch we no for the ber i t'o h re members began to research all the currently used definitions in various documents available to the SIGINT community He stopped when he had reached some fifteen to twenty definitions Some approximated the original meaning of the word but some were extremely far afield In the interests of accurate reporting I must confess that I argued long and vigorously that the word baud merely mean the shortest element of a signal and that those other people were crazy and being difficult when they insisted on a definition which related to a time reference This one term accounted for the expenditure of hours of the panel's time It may sound frivolous but it is not The term is in use and will continue to be in use therefore it must be defined Each member of the panel knew what this old familiar term means Unfortunately each one knew that it meant something a little different We finally opted to put it in the glossary as an unpreferred term with cross-references to the preferred terms P L 86-36 the standard The glossaries will form parts of USSID 412 Our glossary and the TA glossary will ultimately be joined by glossaries for cryptanalytic and data processing terms Other glossaries on telecommunications and telemetry for example are also under development The intent we on the scrp espouse--and we understand that the TA group approached the problem the same way--is not to dictate the usage of cryptologic terminology Rather we are trying to establish a standard We are not trying to circumscribe the vocabulary but we wish to present a method by which NSA's written word may be clearly understood In dialogue one may be vague An individual word that conveys a subtly different shade of meaning to the hearer than it meant to the speaker can and usually will be cleared up in further conversation If you will listen closely you will probably observe that in most conversation every point made is usually made several times over In writing however the trend is to economy In official and technical correspondence this is especially true For this reason a reference is necessary so that we may be sure that the meaning perceived by the reader is the same as that intended by the writer The second factor is that we often find that a term we have previously been satisfied with 'has recently been redefined by an authority we cannot ignore An example of this is At present the SCTP consists of seventeen the very word aoZZeation By a definition people representing all elements of DDD as provided by Executive Order 12036 the Forwell as DDF ADPR and the NCS Russ Doig has eign Intelligence Surveillance Act of 1978 had to depart for other duties and his conand by USSID 18 collection is defined in tributions will be missed Remainin2 under terms on the order of intercept copy taken the chairmanshin ofl for the purpose of deriving intelligence Implicit in all the definitions is that what is intercepted is not collected unless and until some intelligence extraction process takes place It is a subtle point but for collectors it must be defined As ficially active but will soon have to leave a sidelight it is not as important for us Other former members of the panel are other disciplines such as Traffic Analysis For TA purposes intercept and collection could be used interchangeably without any IL ----- --- - ------ -- I Workloss of accuracy ing very closely with us are members of the Why are we going to all this trouble NSA Data Standards Center our sponsoring Why do we squander so many valuable manhours element within PI specifically ' I-- - - It or person-hours anyway on this slow and I- _ _-- -_ --- - --'Jwho keep us on tedious work Anywhere from to ten to forty the track and provide administrative help manhours per month may be used up in just without which we would not be able to survive the panel meetings alone The reason is that As stated above we have lost some of this glossary we are working on will become our people and will soon lose some more ' 1S very 1nterested in recruiting some o In the Soviet Union too the baud replacements particularly from B Rand T 6 is defined as a unit of teleIf you would be interested in being a part of graphic speed the number of this august group please advise your superbasic impulses transmitted per secvisor who should then get in touch with the ond Bol'shaya Sovetskaya EntsikData Standards Center on 8l6ls FANX which lopedia 1970 can then take care of the necessary pap rwork r August-September 79 CRYPTOLOG Page 7 UNCLASSIFIED --------------------------_ _--- ---_ _ - L 86-36 P L 86 36 Z folf 'f U U g a o UNCLASSIFIED DOCID 4009830 UNCLASSIFIED August-September 79 CRYPTOLOG Page 9 UNCLASSIFIED L 86-3E DOCID 4009830 UNCLASSIFIED sydney fairbanks Insufficient Normalcy of Methodry From the NSA Technical Journal of July 1959 here is Dr Fairbanks' final comment on Agency English The time has come alas to lay down the editorial pen As we pushed open the glass doors this morning Big Brother saluted us with some remarks on the end of a perfect day as we reached our desk he assured us that father would corne to his babe in its nest silver sails all out of the west and to date he is still making noises like a noontide bee This curious sample of the mores of a mechanized culture always used to affect us with sardonic glee We wish Big Brother would stop talking about twilights But as a matter of fact we have long since joined the little band of negative thinkers who wish Big Brother would stop period Naturally we have hesitated over the best subject for a final fling We had thought of describing the extraordinary things-reminiscent of a baby with a tube of library paste--that an amateur can do to a sentence with the word such But it seems more appropriate to end with a salute to a success of the enemy We shall talk about one of the major triumphs of Memorandumry Most things in this world are accomplished by having tools and knowing how to use them Tool has long since been replaced by implementation with a net gain of four syllables but way means and methods are all regrettably brief Some genius however has risen to the occasion and it now becomes possible to write the finalization of the operation may be accomplished by the employment of the appropriate implementation and methodology ending with a fine approximation to the CicerOnian e88e videatur and using thirty-eight syllables to say the reader will note absolutely nothing Obviously implementation a nd methodology go together like bacon and eggs and a guy should know when he' s licked Nevertheless we raise a protest Methodology is as inappropriate to mean nothing as methodism would be because both have been pre-empted to mean something We shall not enter into the horrors of religious controversy by defining methodism but methodology means roughly the science of scientific method and people give courses in it and write books about it In such a crisis we have no wish to be merely destructive yet it is hard to make a suggestion Methodry perhaps on the analogy of toiletry and circuitry Insufficient normalcy of methodry meaning this is too new a way of doin it has surely some of the authentic Memorandian charm--and sentiment for that matter But the real devotee will demand a pentasyllable Methodication o It is enough As usual the agony of composition has assuaged our thirst for publicity Never mind what we said above We look forward with ineffable rapture to watching from the bank while others toil upstream to hearing the contributors fill the sea and air like little birds with their sweet jargoning and not having to do a thing about it In this mellowing twilight it even seems now that we don't have to do it any more as if it might have been worthwhile but we are not seduced Your galley gentlemen You can keep my oar And thank you for listening so patiently August-September 79 CRYPTOLOG Page 10 UNcLASSIFIED DOCID 4009830 UNCLASSIFIED sydney fairbanks Insufficient Normalcy of Methodry From the NSA Technical Journal of July 1959 here is Dr Fairbanks' final comment on Agency English The time has come alas to lay down the editorial pen As we pushed open the glass doors this morning Big Brother saluted us with some remarks on the end of a perfect day as we reached our desk he assured us that father would come to his babe in its nest silver sails all out of the west and to date he is still making noises like a noontide bee This curious sample of the mores of a mechanized culture always used to affect us with sardonic glee We wish Big Brother would stop talking about twilights But as a matter of fact we have long since joined the little band of negative thinkers who wish Big Brother would stop period Naturally we have hesitated over the best subject for a final fling We had thought of describing the extraordinary things-reminiscent of a baby with a tube of library paste--that an amateur can do to a sentence with the word such But it seems more appropriate to end with a salute to a success of the enemy We shall talk about one of the major triumphs of Memorandumry Most things in this world are accomplished by having tools and knowing how to use them Tool has long since been replaced by implementation with a net gain of four syllables but way means and methods are all regrettably brief Some genius however has risen to the occasion and it now becomes possible to write the finalization of the operation may be accomplished by the employment of the appropriate implementation and IDethodology ending with a fine approximation to the Ciceronian esse videatur and using thirty-eight syllables to say the reader will note absolutely nothing Obviously implementation and methodology go together like bacon and eggs and a guy should know when he's licked Nevertheless we raise a protest Methodology is as inappropriate to mean nothing as methodism would be because both have been pre-empted to mean something We shall not enter into the horrors of religious controversy by defining methodism but methodology means roughly the science of scientific method and people give courses in it and write books about it In such a crisis we have no wish to be merely destructive yet it is hard to make a suggestion Methodry perhaps on the analogy of toiletry and circuitry Insufficient normalcy of methodry meaning this is too new a way of doinj it has surely some of the authentic Memorandian charm--and sentiment for that matter But the real devotee will demand a pentasyllable Methodication It is enough As usual the agony of composition has assuaged our thirst for publicity Never mind what we said above We look forward with ineffable rapture to watching from the bank while others toil upstream to hearing the contributors fill the sea and air like little birds with their sweet jargoning and not having to do a thing about it In this mellowing twilight it even seems now that we don't have to do it any more as if it might have been worthwhile but we are not seduced Your galley gentlemen You can keep my oar And thank you for listening so patiently August-September 79 CRYPTOLOG Page 10 UNCLASSIFIED DOCID 4009830 UNCLASSIFIED NSA Promotion Boards How They Work 14 Certainly one of the most popular items ever to appear in CRYPTOLOG to Judge by reader response was I I article Some Tips on Getting Promoted o It is based on an address which she gave before the WIN Women in NSA organiza tion which was later summarized in the WIN Newsletter The article was originally printed in CRYPTOLOG of December 1978 and SUbsequently in the Field Information letter of y 1979 In addition CRYPTOLOG has sent out over 300 reprints of the article to interested people Understandably promotions re a ub ject of great importance to -gstabout everybody So when Virginia called a couple of months aggto ask if I wanted a follo'l '-up article my response was an I immediate yes So here it iS4 I lobservations on her tour as a member of one of the Agency's promotion boards dhw he present procedure for promoting to T fIeri tical grades -13 14 and IS-has been in existence for some years now ven so it seems not to be very well k own 1n the Agency This article a1ms to 1mprove the general understanding of the process and tries to remove some of the mysterY -'llnd even distrust-with which it is sometimes viewed Lwritethisarticleonthebasisofmy e erience as a member of the Grade 14 Pr motion Board in 1978 It was my onlyexperience serving on s1Jch a board andit was a good one The job turned OUt to be interesting challenging anddifficulJ lhlexpectedly it demanded abone-wea ying amount of work But all told it pr9ved satisfying and rewarding I endedmr year's tour with a feelingthat the process we use here while n tperfect is a good one This article covers the following aspects of the AgencY Promotion Boards their composition and mission their function and tools the zero-base review process the nomination process 'management presentations the selection process Although my experience was limited to the Grade 14 Board the process described is generally applicable to all three Boards NSA Promotion Boards and their Mission Three Agency-wide Boards are consituted each January to hand e the selection of eople to receive promotions to grades 13 14 and 15 The nine members of each Board are chosen by the Deputy Director for Management DDM August-September 79 CRYPTOLOG Page 11 UNCLASSIFIED 'PoLo 86-36 DOCID 4009830 UNCLASSIFIED and recommended by him to the Director for approval In making his selection the DDM discusses recommendations with the Key Component Chiefs The selection includes at least one woman and one minority member Board members are usually at least one grade higher than the promotion level of their respective Boards The Board Chairmen are chosen on the basis of their position the Director of Civilian Personnel M3 chairs the 13 Board A DDM chairs the 14 Board while DDM heads the 15 Board Executive Secretaries for the Boards are appointed usually from within M by the chairmen The Boards are formally created with the publication in December of appropriate Personnel Assignment Orders or green sheet It was surprised to find that in fact the bulk of my time was to be spent reading in the promotion files These files are kept in special rooms belonging to DDM one for each Board We were given directions and keys to our new home Here each of us had half a file cabinet drawer for storing folders and notes along with access to banks of file cabinets containing drawer after drawer of promotion folders for all eliJible Grade 13's2 Work on promotions is carried out in these rooms rather than in the members' office spaces so as to ensure confidentiality of the sensitive personal data handled as well as to cut down on outside distractions We were provided with various useful tools such as the 'following In 1978 the promotion process got undero A computer listing of all eligible way when the Director convened all the newly Grade 13's which runs to many thick volUmes appointed Board members in his conference It contains a one-page summary on each person room and personally explained to us our highlighting vital information such as name mission gave us guidance and stressed the organization job title COSC age EOD date responsibility of the assignment he was endate of last promotion list of all jobs at trusting to us We learned that as Agency Board members we worked for him as his repre- current grade professional certifications and last three performance appraisal ratings both sentatives and not for our parent organizaoverall and attributes tions Our Board assignments were to take priority over our regular jobs and we were o A computer listing of performance expected to devote all the time and effort appraisal ratings overall and attributes necessary to executing a very serious and imgiven by all supervisors to all their emportant task He asked that we give fair and ployees in critical grades This listing equitable consideration to everyone including helps Board members to spot the easy and women and minorities who because of their hard raters and is used to normalize such ratings management He pointed out the educational value of field assignments and asked us to reo Statistics showing each Key Component's view field personnel with particular care betheoretical fair share percentage of promocause he is anxious to attract the best people tions based on the number of persons eligible 'to such assignments and to reward good performo Statistical profiles on recent past ance Finally he cautioned us not to overlook promotions by organization COSC average technical people who are essential to the time-in-grade and the like fulfillment of the Agency's mission l Board Functions and Tools The Director's meeting with the new Board members was followed closely by the initial meetings of the individual Boards Schedules and assignments for the first cycle are traditionally distributed at this meeting The Grade 13 Board has four cycles per year beginning in January April July and October while the Grade 14 and 15 Boards meet for only two cycles annually January and July This is because the numbers' of eligibles to be reviewed and promotions to be awarded by the Grade 13 Board is much greater than those handled by the other two Boards I had always assumed that Promotion Boards did all their work in meetings so I i-------------------------------------------The criteria for promotion are published in NSA Regulation 11-10 Annex B dated 7 January 1977 Zero-Base Review of All Eligibles After the initial get-together of our Board individual members began work immediately on an examination of the records of all the eli ibles This requires a complete reading of the folders of every single eligible Grade 13 in the Agency I This is done to locate people wno seem to be worthy of consideration for promotion but who may have been overlooked by the Chiefs of Key Components when drawing up their nominations Because the populations of eligible people are quite large it is impossible for every member of a Board to read every file So the population is divided into alphabetically sequential subsets and two Board members --------------------- ---------------------- 2 Eligibility for Grades 13 and 14 is 24 months in grade for Grade 12 it is one year in grade August-September 79 CRYPTOLOG Page 12 UNCLASSIFIED DOCID 4009830 UNCLASSIFIED read all the files in any subset Even so this still amounts to hundreds of files for each reader But this procedure ensures t t during anyone calendar year every s1ngle person's file is read by at least four pe ple for Grades 13 and 14 and by at least e1ght people for Grade 12' s As part of the review process all Board members are also asked to examine the files of all minorities and women The Equal Employment Opportunity Office DB provides special lists to identify these people since this information is not contained in any of the other data available to the Board Names of potential candidates which are found by this review process are provided to the Key Component Chiefs so that they can prepare to answer the Board's questions about them as well as about the people on their own lists of nominees These recommendations are placed in the individuals' promotion folders where Board members review them during their reading of the files In the computer printout of nominees--a small listing this time--nominees are listed in priority order by the Key Component ForODD extracts are prOVided for each Office Th1S presents a very brief summary of each person by name organization job title time at NSA time in grade professionalizations and last three performance appraisals Field personnel appear in two lists a prioritized list for all nominees submitted by the Deputy Director for Field Management and Evaluation DDF and one by individual sites Every Board member is responsible for reading the promotion folders for all persons nominated by the Key Components and for those persons turned up by the Board's own review processes Nomination Process The nomination proAll reading must be completed before the cess carried out in the Key Component organnext step in the promotion process occurs--the izations is probably more complex careful management presentations popularly called the and formal than many people may know In Promotion Board hearings most organizations it is a multi-tiered proManagement Presentations When managecess with names first being submitted at ment presentations begin so do the Board some lower level in the organization and meetings--many many of them And it is here then travelling upward for review by various that one's duties on the Board tend to become boards until reaching the board at the Key a full-time job for several weeks The pur- Component level Here a final decision is pose of these presentations is to give Key made about how many names the Key Component Component Chiefs an opportunity to present will nominate for promotion which names will their nominees to the Board in person to disappear on the list and what their order of cuss their nominees' qualifications and acpriority will be Key Component boards also complishments and to answer the Board's decide about replacing rearranging adding questions about them They also respond to or subtractin2 names from one cycle to the next Any name which survives this process of questions about those whose names were submitted to them by the Board for considerconstant review--a lengthy one in large organation In addition some chiefs take advanizations like DDO Deputy Director for Opertage of this opportunity to present partiations --has been considered by many people cular management problems and needs as they with a variety of backgrounds and experience relate to the promotion process This it s e to me greatlY increases the chances that the most capable and deserving A typical management presentation goes people will in fact be nominated for promotion like this The Board members sit around a large table with the presenter --a Key Two things result from the Key Component Component Chief or his representative-- at nomination process a written promotion reone end The Chairman and Executive Secrecommendation for each nominee and a computer tary sit off to the side For a half hour listing of all nominees in priority order to an hour the presenter talks about his The promotion recommendation which may run nominees Styles of presentation vary Some to some three or four pages is prepared by presenters go through the list in priority the nominee's supervisor and follows a fororder discussing each candidate briefly mat described in Annex C to NSA Regulation Others are much more informal and may spend 11-10 of 7 January 1977 the time answering questions asked by Board members Sometimes the Key Component Chief o Background data wants to highlight certain information and o Current Assignment repeats things already known to the Board o Proposed assignment data from its reading Some Key Component Chiefs o Evaluation of the nominee against the deliberately try to present information which criteria for promotion--experience training adds to that gained from the reading Others on-the-job performance potential personal elaborate talking about the person from attributes and ability angles which _help the Board in its deliber- August-September 79 CRYPTOLOG Page 13 UNCLASSIFIED DOCID 4009830 UNCLASSIFIED ations The give' and take between the members and the presenters ranges from refreshing and candid to sometimes heated exchange But it serves the purpose well because while the chiefs are striving to present their nominees favorably the members are working equally hard to get the unvarnished information they need to make a sound evaluation of the candidates These presentations typically last for a numbers of days In addition to all the Key Component Chiefs DDO Group Chiefs also address the Board Also chiefs of field sites usually have an opportunity at least once a year to appear before the Boards The Worldwide Station Chiefs Conference an annual event is deliberately scheduled to take place during a cycle of the Boards so that the chiefs can personally present their candidates These presentations are in addition to the regular presentations by DDF the voting the Chairman and Secretary do not vote In making selections members tend to consider such factors as distribution by organization and COSC But the fitness of the candidate is always the overriding criterion on which promotions are based The result of the voting process is a list of the Board's recammendations to the Director for promotions Before the list goes to the Director however the Board provides each Key Component Chief with the names of the people in his organization who have been selected Where the Board has made selections which alter the Chief's priority order or has chosen someone not on his list the Chief is given an opportunity to meet with the Board to discuss the effect of-these choices The Board then reviews its findings and makes its final recommendations If any differences remain they are summarized by the Chairman in a report to the Director which accompanies the list When the Director for l4's and l5's The Selection Process When all the read- or D DIR for l3's has approved the proing has been completed and the last present otion the Office of Civilian Personnel ation is over it is then time for the oard ' M3 then schedules to romotion ceremonies to get down to the business of selecting the I in the Friedman Auditorlum--one for the l3's pe p17 who ar to be ecommended for promotion and a combined one for the l4's and l5's 7 ThlS lS done ln a serles of meetlngs which For the members of my own Promotion usually take place over a week or so Board the promotion ceremony marked the sucTo help accomplish the selection Board cessful culmination of a difficult and timemembers are supplied with two things consuming task It was fascinating to be o a ballot containing the names of all able at last to put faces to the names which nominees those submitted by the Key Component had becOllle so familiar to us over the past Chiefs as well as those developed by the B several months And we -were exhilarated to through its own reviews have finished the job emrust ed to us _ The amount of work involved is t n4ous-hours o the number of promotions which the Board days even weeks of sitting diftading the is empowered to give out 3 fo Iders And then there Ts fhi n e spent Selection is made by balloting with suc- evaluating culling and 'making he difficessive ballots being taken over several days cult final selections until the entire allocated number of promoBoard members take their assignments tions is reached Between votes the Board most seriously and work long hours in the has time for discussion deliberation and knowledge that out of a mountain of material research Board members have equal voice in have to come decisions which they must labor to make fair to every employee and which are sound to the future of the Agency 3 The NSA promotion program including allocation of promotions is described in an article byL lin the NSA News4 The Director is empowered to add to or to letter of March 1979 delete from the Boards' recommendations P L 86-36 TO SUBSCRIBE TO CRYPTOLOG CALL 11035 August-September 79 CRYPTOLOG Page 14 UNCLASSIFIED ------ DOCID 4009830 ----------- UNCLASSIFIED Reprinted from KEYWORD February 1973 but on the other hand Write 300 words the best method of selecting an employee who will Division's sole promotion for the quarter read one of the questions in a recent NSA writing exam All of the answers were good this one excels in the simplicity of the solution The methods used by managers to select employees for promotion have been the object of study and controversy for centuries No method has been found to be universally satisfactory and the study and argument will continue as times and conditions change Serious examination of the goals sought through employee promotion shows that there should be considerable flexibility Not only are the goals diverse but the conditions under which the organization operates vary per year means that every eight years we can get one promotion for each employee in the upper 25% assuming we follow the conventional system In this system a small group of managers meet in secrecy to select candidates according to individual goals The result today is loss of the upper 15% through transGBPer to other jobs minority-group inequities and low employee morale because of their lack of participation A better method of achieving Division goals must be found In a Division of 100 people today there may be only one promotion per quarter twenty years ago a Division of similar size might have had as many as 25 to 30 promotions per quarter Other variants have been subject to similar degrees of change Managers today must therefore be prepared to cope with these dramatic changes _ The best method of selecting the employee who will get a Division's sole promotion for the quarter is a lottery Chances can be allocated to eligible candidates in ration to the qualification on all counts Mote or fewer chances can be allocated to a given grade of skill or for a given employee quality suoh as time in grade or education The lotteries can be held monthly with quarterly runoffs or just once every quarter in a winnertake-all event Such a solution will remove the secrecy and result in much wider employee participation and higher morale It is probably only a matter of time until this solution will be in use throughout the Civil Service In the present situation a serious backlog of promotion candidates has grown up Most of these people are well qualified in performance experience education personality potential and time in grade and in a given list most perhaps would be about even In our Division of 100 promoting four persons I 1 I CRYPTOLOG HAS MOVED 1 CRYPTOLOG has moved to the eighth floor The new address is BA1B7 and the new phone numbers are 1103 1104 1105 Only the mailing address is unchanged it still is CRYPTOLOG Pl 1 I August-September 79 CRYPTOLOG Page 15 UNCLASSIFIED UNCLASSIFIED DOCID 4009830 PUNCTUATION More Than Meets the Eye P L IA42 L -- would like to share with the readers of CRYPTOLOG a nugget of Soviet humor that was given to me several years ago when I was a student at the U S Army Russian Institute Detachment R in Garmisch Germany I ran across it recently while rum maging through some dusty memorabilia and decided it was too good to keep to myself The article is appropriate for at least two reasons it is a reminder of the importance of punctuation marks and it is perceptive commentary on man's declining ability to think for himself--especially in an Orwellian society such as that of the Soviet Union where bureaucratic thinking' and writing are so patently stereotyped A good friend Oleg Konstantinovich Kavetsky the language laboratory technician and general handyman at Det R gave me the article and philosophized on its significance Oleg saw it was a subtle condemnation of the typical Soviet bureaucrat who is steepied in writing political Newspeak filled with liberal quotations from Lenin and Brezhnev In my opinion it also applies to our own bureaucratese A man lost the comma and became afraid of complex sentences he sought simpler phrases With simple phrases came simple thoughts He then lost the exclamation point and began to speak softly in a monotone Nothing gave him joy or excited him he related to everything without emotion Then he lost the question mark and ceased asking questions nothing aroused his curiosity no matter where it occurred--in space on the earth or even in his own apartment Several years later he lost the colon and stopped explaining his actions to people By the end of his life he had only quotation marks He never expressed an idea of his own but was always quoting someone--and so he completely forgot how to think and came to the end Cherish the punctuation marks '9 311 IeCJIOlltRWMR 4'puellfll 1I lIIIIL MCAOlltlllole _CAR l1oroN OR DOTep 3MIt - x1tJW q l7llA1oRW' K Ra'la l'OIIOpll1'f 11111 0 C RRTOIIIl Heil Era v e aJI'ITO piA084AO K RIl a3NYIIl4AO a IlO Kelly OTHOCHAClI lIe3 3MOqlll OAJIO' Oleg is a remarkable person I encourage all NSA stud ens who attend Det R to spend as much time as possible with him He'll teach you some Russian you won't get in the classroom A game of ping-pong or billiards becomes a drill in numbers--he calls it an igra v vychislitel'nye literally a game of numbers He is filled with stories and anecdotes from his youth in the Soviet Union And he can talk endlessly about each and every step involved in the building of his home The article on punctuation marks that follows is typical of the kinds of things that Oleg often injects into his conversations I hope you enjoy it as much as I did August-September 79 UOJIeK DOT pM MIIft 'JO C llon1 cll eJlo -z 1Ip8AAO_ 8d ClteA 4IPuw Z1 3ITe1if OK nOTepllA 3MK BOIIpOC II- TeAWlwit R nepeCTaA 3lI I I1Mn KIl K_ mnpocw RKIt4JtJ1e CoC WTlllI e aW3WN K em AIOlloIIWTCTIIa rAil 0 11K npoKCllO l lL H - a XOCMOCe H K elK II coClcTM- oI 38M 1l KUpTHpe EJqe epe3 napy AeT Oil IIO'NJIlIA - -ro'Ilie H JIIOAmc CIIOH K nepeCTllA Jrn n0 1' '11 ' XOKqy lftH311R Y l JIC TQ Wl0 K U WllIlA 11K OAHol 1'0 011 _ _ OCTIlH- collcT -ot 1lAeJI OK lICe peN kOro- ey qIIftIpO- - TaK OD COlIC __ CAHTIo II Aome 0 7O'UII liepenrre 3D IIpIDIIReBJI ' r KIIIIl CRYPTOLOG Page 16 UNCLASSIFIED 86-36 eONPIBEN'fIAL DOCID 4009830 EO 1 4 c P L 86-36 To the Editor CRYPTOLOG U It was just after a recent demonstration of the' Radio Shack TRS-80 home computer that some of us got into a discussion about tho problem of new equipment and just how long we are going to have to wait to get to use it for any operational jobs The principal problem seems to be that all new electronic equ pment that is built for general public use rad ates and is therefore not useful for handlirig classified data It ordinarily seems to take years for the equipment to be engineered in a model that controls or inhjb'its radiation enough to meet our standards Meanwhile the march of progress goes on and newer and even more useful things appear in this rapidly developing field But each new item also radiates there being no commercial incentive to develop devices that don't U SO by the time each new piece of gear is ready for your use and mine something better or faster or whatever is available to any private user who can afford it but not to us Well then why don't we just try to find a way to screen the building rather than each separate piece of equipment I suppose the first quick answer is that there is no way to do that but this place is full of people who can find ways to do things that aren't supposed to be possible It may be expensive when compared with screening or otherwise fixing each new piece of gear but the cost would average out over the years pretty quickly as we found we were able to cut years off the lead time for the practical use of state-of-the-art computery -1 1 J I IPl4 864 I o o - - U Se ond quality is not an element included in the bean-counter approach it's the number of bodies bearing the title that are counted The fact that one quarter of the bodies may be doing three quarters of the work - - - does not enter in August-September 79 CRYPTOLOG Page 17 EO 1 4 c P L 86-36 ---------- - - I Havil1gha4long and often passionate discussioIl with both Mr Buckley and Mr Ion the subject of Traffic Analysis overages I was surprised to see that both gentlemen missed several important points see Letters to the Editor CRYPTOLOG July 1979 U First I think please note opinion there are a fair number of individuals who hold TA cascs who are not do ng TA work One example a branch chief is a'manager not an analyst yet the analytic casc is often held 1 Although it's sometimes difficult to prevent RF energy from being transmitted it's even harder to contain it after radiation occurs For example it's easier to reduce the current and voltage across a pair of contacts than to build a conner mesh room around them _ - - CON-FIBRN'fIAL _ l To the Editor CRyprOLQG replies L- Chief S64 P L I L r U We plan to apply some of these approaches to selected operational areas in the next few months Permanent installation of any RFI suppression techniques will depend on the results of our experiments U I would like to say Amen to one statement made in Jetter namely this place is full of peOple who can find ways to do things that aren't supposed to be possible This is partiCUlarly true of CRYPTOLOG readers If any readers have any ideas for blanket RFI suppression we in S6t WO 1 d Jj ke t h e ar them call or write J2443s One more thing dom't worry about a not invented here response that's a disease we try to combat 86-36 JONFIBBN'fI Ab Third we seem desperately intent on trying to professionalize read certify everincreasing numbers of people in overage fields The problem with this is twofold LANQlAGE PROFICIENCY CERTIFICATES What is the purpose of creating many more professionals than we have professional billets What is the purpose of allowing second certifications in overage fields FOR MILITARY PERSONNEL Capt Gary J Twogood M362 Why are we tutoring professional aspirants Individuals of professional quality will like cream rise to the top by dint of personal study and research They will do so simply because it is in their nature to excel not because they were pushed prodded or carried through the test Please note that top refers to one's ability to perform not to one's promotion record I agree wi thl wearelosing our TA skills see CRYPTOLOG March 1979 It is evident in the simple fact that many case analysts do not log intercept n such a manner as to see a simple rota It is reinforced by the fact that on our professionalization exam the net reconstruction section is pre-logged and fairly easy The difficult section is the crypto-TA part and few traffic analysts are charged with this type of responsibility in their daily jobs U Suggested solutions for eliminating the overage and up-grading the quality are fairly simple Ensure that only those doing traffic analysis carry that COSC let's start calling managers managers Next devise a weighting system so that a manager can state for the TD that he needs three topflight TAs or five average or ten below-average or some combination thereof to accomplish his mission And finally if we feel compelled to tutor someone let's begin by tutoring those most in need so that they may become proficient in their current jobs Years ago achieving professionalization was akin to winning a place among the elite Today is is simply a means of proving oneself average Elitism is not only dead but is scorned as well U Let's put the emphasis back on the quality of our human resources I IB32 UNCLASSIFIED in entirety On 4 April 1979 MG George L McFadden then Chief DDO presented certificates to 26 military linguists who passed NSA's Language Proficiency Test LPT The ceremony was one aspect of a continuing program to recognize the 30 of the military linguists who have passedtheLP'i' To date 56milttarylirt guists have been presented certificates in eleven l nguages This total includes 26 individuals stationed overseas To identify the linguists whose scores were particularly high the Agency established a policy of awarding the certificate With Honors to those who scored five or more points above passing in each portion of the LPT We have since discovered that this arbitrary cutoff point was too low To make the honors group more selective we have have raised the cutoff so that now a linguist must achieve 80 on the Completion protion and 90 on the Translation portion or a Staten rating of eight on both portions P L 86-36 P L 86-36 Concurrent with the realignment of the With Horiors' criteria we are beginning an official policy of awarding the LPT certifi atesretroactively NSA directives state that i PTscOre i are valid for three years from the st date and we will use this criteri as cutoff for retroactivty Linguists reqUest retroactive aw ardS through NSA M362 I To help verify test scores 1 M36 lri 1l need thename SSN service grade l guaie and if available test date d score$J mar We appreciate tbeinterest and support that has been shown t ughout the cryptologic cDmmUnit and look forward to even more military linguist participation in t e future To begin a subscription toCRYPTOLOG or to change the address on your present one call CRYPTOLOG ext 11035 August-September 79 CRYPTOLOG Page 18 JONF'IBR ffIAL WH'lQbJil ViA SQMIPCf' 8IIAltHEbS emb DOCID 4009830 86 36 EO 1 4 DOCID 4009830 UNCLASSIFIED News of the Communications Analysis Assoc iation I NEWS OF THE CRYPTO-MATHEMATICS INSTITUTE I Ip14 The present officers of the Communications Analysis Association are as follows President President-Elect Secretary Treasurer Board Programs Crypto-TA SIG Cryptologic History The Crypto-Mathematics Institut extends Associate Membership to all NSA Retired Employees who have been members of theCMI Upon payment of the $2 00 annual fee Associate Members will be put on the mailing list for current notices These notices include announcement of monthly speakers the problem department and information concerning the Annual Essay Contest the President I s Award _and the Annual Banquet Retired members are entitled to participate in the Essay Contest and to attend the banquet-atregular CMI member rates They may or course attend monthly lectures provided they have the appropriate security clearance and access to Agency spaces 3369s 3866s 5585s 4398s 5306s 5492s 5901s 4452s 4466s 2l71s Now Membership in the CAA automatically gets your name on the CRYPTOLOG subscription list For just one dollar a year you can get every issue of CRYPTOLOG delivered right to you door or wherever your IN-box happens to be along with all of the announcements about the various activities and happenings of the CAA Send your dollar along with Tour present mai_l _ ing address to our treasurer L B62 Room 2S045 Any retiree and forllterlDemberof the CMI who wishes to become an Associate Member should send his name address and $2 00 to Director National Security Agency ATTN 1 G 9 5 FortudeorgeuG Reade rYla l207 55 I Note For those of you who think you are members of CAA but who haven't been getting our announcements lately look at the address label of the last one you received If the number 78 appears on the label then Dana has no record'of receiving your 1979 dues Solution to NSA-Crostic No 27 CRYPTOLOG July 1979 IRS1 I L - For 'urthElrinformation calli JR5l ext 8718s P L I Further to the solution of A Somewhat Larger Problem published in the April issue The first part of the solution appeared last month The callsigns are taken' out of a large chal't the upper right corner of which is From a memo to General Ismay from Winston Churchill 8 August 1943 quoted in Coverterms by Vera R Filby CRYPTOLOG April 1975 Operations in which large numbers of men may lose their lives ought not to be described by codewords which are calculated to invest the plan with an air of despondency_ such as 'Woebetide ' 'Massacre I 'Jumble ' 'Trouble ' 'Fidget' 'Pathetic ' and 'Jaundice ' They ought not to be names of frivolous character August-September 79 CRYPTOLOG Page 20 UNCLASSIFIED PI-Oct 79-83-6501 86-36 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu