-DQCIO 40 9671 P L 86-36 IJGBPllUD0 IJGBPll11 l lElDWDU GBPll l IJlE WU W W fW W W lB E llUrn brnffi JANUARY-MARCH 1980 86-36 THERE'S A NEW WORLD COMING -- ARE YOU READY U oooooooo o o oo 1 LIP U oooooooooooooooooooooooooooooo 4 SYSTEM ACQUISTITION DOCUMENT REVIEW U oooo o ooooo 10 ANALYSTS OF NSA ARISE U o 11 COMING HOME U oooooooooooooooooooooo - - - - - 1 0 ' o o o o o o o o o o o o o o o o 13 CIRC AN INTELLIGENCE DATA BASE U o oooo 0 o o o o o o o o o o o o o o 14 BETWEEN THE LINES OF YOUR PERFORMANCE APPRAISAL U 17 NSA-CROSTIC No 30 U oooooooooooooooo D H W oo o oooooooooo oooooo o o oo 18 NSA CSS MILITARY LINGUISTIC PROGRAM oooooooooo ooooooooooooo oooooooooooooo 20 I I 'fIllS DOCf fr IHN't' CON't'AINS CODEWORD MA't'HRIAI eLASSIFlEB BY NSA eSSM 123 2 REVIEW ON 1 HAR 2818 Declassified and Approved for Release by NSA on '10-'1 2- 20'1 2 pursuant to E O '135 26 vl DR Case # 54778 DOCID 4019611 TOP HfolCU'i '1' ' Published Monthly by PI Techniques and Standards for the Personnel of Operations VOL VII No 1 - 3 JANUARY - PUBLISHER MARCH 1980 WILLIAM LUTWINIAK BOARD OF EDITORS -- Editor-in-Chief o David H Williams 1 Collection Cryptanalysis oo o o J 1CIJS55 5 1 49025 Cryptolinguistics o 1 ICS 8is Information Science oo 1 Language o o o Machine support o L 11035 1 3034S Ira Mathematics oo o o o 1 Traffic Analysis o o Don Taurone 3573s to CRYPTOLOG PI 'f01' li il i K _ -_ __ - E zItET SO 4 IC8S18s Special Research o o o Vera R Filby 71195 For individual subscriptions send name and organitational designator 1 1- P L 86-36 ---------- DOCID 4019611 CONFIBEN'fIAL There's a New World Coming - Are You Ready U P L C 'I 11 I j 1 nalyst response to a changing environe ttment is an area that has piqued my interest for a number of years This u interest has become especially pronounced in the last four or five years largely as the result of the increase in the variety and number of automated processes that have become available my involvement in a number of long-term research projects and the prospects of newer and more sophisticated machinebased analytic techniques As a consequence I have given much thought to the effects that this increased automation will have on the analyst and to what we as an organization can do to respond to the challenges and opportunities that will arise u If we are to accurately assess how the analyst of the future will react to the increased automation of the analytic process it is necessary to know the analyst of today This is logical since the majority of tomorrow's analysts are already on board and active in the analytic field It also becomes essential to define the functions of the analyst since all personnel who carry the title analyst are not analysts by the strictest definition of the word For convenience and easy reference I have divided these analysts into three categories which I've labeled for lack of any better terms loggers case analysts and research analysts Jan - Mar 80 CRYPTOLOG Page 1 eONPIBEN'fIAL EO 1 4 c P L 86-36 1It' P1BhI3 VIA EURSl'tlUl't' EURIIA UlI3bS 6 't 86-36 Q QCID 4019611 CONFIBEN'fIAL U The case analyst will survive and thrive in the new automatioIl HerealTy never did care for the logging and data maintenance functions associated with his job therefore he'll adjust He'll reorder his priorities and use the additional time now available for the development and analysis that he never could quite get around to under the old semi-automated method of operation His productivity will increase and more technical data on his targets will resul t I U The changes expected as we become more and more automated will alter the methods and procedures currently used in the analytic areas This will have a profound effect on our operations but to an even greater extent it will modify the lifestyle and environment __ __ IThe ultimate gain will of each of the three types of analysts I've be the production of more intelligence indefined Each will be affected in a different formation in satisfaction of our requirements way depending on the analyst's perception of The case analyst will grow as a professional analysis his personality and his ability honing his skills as he practices his trade to adapt and in many instances will develop into a U Once the machine takes over the simple research analyst data manipulation and recording functions U The research analyst will see few the logger will become to a great extent changes in his method of operation as a obsolete His routine will be upset and his result of this new automation He'll have workaday world completely disrupted He to deal with new data bases new retrieval will no longer have his logging to fill programs and new equipment but his daily his day He won't know what to do and he'll routine will remain pretty much the same as be completely lost For those currently havit is now He will generally review the ing trouble isolating the loggers in their same types and amounts of material and work outfits they'll then be very easy to spot on the same types of projects He should Just look for those people sitting with a see some improvements in accuracy and comblank stare on their faces and for those pleteness as a result of the elimination of making nervous movements at their desks as the logger and the automation and resultant they anxiously try to find something to do upgrade of the data bases He will be able Eventually their names will appear on the list to spend less time on the verification and data of those who are abusing their sick leave gathering phases of his assigned tasks and The real logger will never recover from thereby be able to complete more assignments automation He's lost his place in life in a shorter time This will allow a more His day-to-day world will have been destroyed efficient use of the limited number of case and he simply won't know what to do For analysts and permit us to achieve maximum many it will be too late to start over Others benefit from their talents Automation will will lack the initiative while for still also improve the morale of the research analothers it's nothing more than a lack of yst since he will be able to function almost talent The world will have passed them by entirely in his primary capacity They of course will not be to blame It'll U The benefit of this increased automation be the machines' fault or management's fault is readily apparent The talent of our people or maybe just the breaks of the game can be used to the fUllest with dull repeti U In reality the logger has always been tive tasks reduced or eliminated The timelia clerk with a professional job title and a ness accuracy and quality of our product will professional paycheck He was created by the increase Personnel not working at their presystem and with the advent of new automated scribed levels can be eliminated with a resulttechniques will be destroyed by the system ant savings of money All of this is of _ Some will be salvaged Some loggers will course predicated on manageable machine sysregroup retrain and regain a place perhaps tems that will function as designed Since our at the case analyst level Those that can't track record for the development of such sysmake the transition will have to be purged tems is not impressive let's hope that we have since the cost of automated systems will call learned from experience and not attempt to reap for a decrease in personnel expenditures benefits before we have proven follow-on systems Jan - Mar 80 CRYPTOLOG Page 2 COPfflDEPlJT L IltUlQbl Vll C8MIN'T 61 h WmLS 8f4LY 1 4 c L 86-36 ----- - DOCID 4019611 UNCLASSIFIED IGiI INTERNATIONAL AFFAIRS INSTITUTE 3rd ANNUAL ESSAY CONTEST Prizes I sl Place 2nd Place 3rd Place $100 00 $ 50 00 S 25 00 Winning entries will also be consielereel for presentation in an appropriate Agency publication Topic Related to International Affairs Enter By I October 1980 To enter or for more infor ation Contact Eilher '--- P L 86-36 1-7 ROOIll5 lSO L 86-36 'B51 ROOIll3WI56 or '--- Winners Announced Odober 1980 Jan - Mar 80 CRYPTOLOG Page 3 UNCLASSIFIED DOCID 4019611 SBCRE'f IPlb I I U P L 86-36 P L 86-36 IAEi -a language could be stored This data base could contain models of each langage we may need to identify the models would contain all of the information needed t identify an unknown text by some comparlson technique Thus any automatlc language identification scheme would have to be structured as follOWS o o language models o comparison method For various reasons it is clear that automatic dictionaries are the least efficient and least reliable method of identifying languages 2 Further linguistic methods based upon the morphological or syntactic structure of the language require a huge amount of effert to construct suitable models The only reasonable approach to language modeling which appears easy to implement as well as reliable is by statistical methods It now becomes a matter of deciding which statistic to use U U We decided to try the simplest approach first which method of modeling which is inexpensive in terms of storage and CPU time will yield acceptable results Monographic modeling is indeed cheap but not very powerful The same can be said for standard Agency techniques of long standing such as Delta I C and logweights see Chart 1 U But why should a linguist have to spend time identifying languages at all Why couldn't an automatic computerized method of identifying languages be developed To implement such an automatic system we would need to construct a data base that is an information bank where all of the information needed to identify 1 - 1 _ U The next possibility for modeling would be digraphs Here is where the solutio s 86-36 found A digraphic model of a language s very easy to construct requiring a relftt'i b 4 c ly small amount of text as input and very little storage for the model A digraphic model stores the information in a digraphic matrix see Chart 2 in terms of the probability of each possible di ra h occuring for a given langua e 2 i r 'a ua h 'I y per of 2S July Jan - Mar 80 CRYPTOLOG Page 4 P L SECRET 86-36 HHIQbE HI' sePllul'J' SlIMlPlSI 8 8NI 't DOCID 4019611 UNCLASSIFIED P L Jan - Mar 80 CRYPTOLOG Page 5 UNCLASSIFIED ------------ _ _ 86-36 130cm 4019671 UNCLASSIFIED ny L 86 36 Jan - Mar 80 Page 6 UNCLASSIFIED DOCID 4019671 UNCLASSIFIED 86 36 Jan Mar 80 Page 7 UNCLASSHHED DOCID P L 4019611 CONPIBBNTll 1 Jan - Mar 80 CRYPTOLOG Page 8 86-36 CONPIBBN'f'IAL IhlcHBbB VIA eeMHC'f ell l HHBbS eUb i DOCID 4019611 UNCLASSIFIED WHY ARE ALL THE STREETS IN AMERICA WHICH ARE NAMED AFTER A FRENCHMAN IN SUCH TERRIBLE CONDITION AND WHO WAS THIS FELLOW DETOUR ANYWAY It is generally conceded that book-learning is not the best way to learn a foreign language Instead most people agree that the best way is to actually live in an environment where the language is present 24 hours a day When a person sees and hears the words in a foreign language around him he soon learns what makes sense and what doesn't How long for instance does it take for even the least languageoriented person to realize that there isn't any famous person named Einbahn after whom so many streets are named throughout Germany and Austria all of them coincidentally one-way streets Well I'll never forget the trip that two adults and four children in one Rambler station wagon took from Oberammergau Germany to Lake Garda Italy The reason why I'll never forget it is not just the horror I felt as I was being pushed down the Dolomites it must have been at 150 miles an hour by good-natured Italian truck drivers trying to meet a schedule No the reason is that during calmer flatter stretches of the trip when I could relax my grip on the wheel and enjoy the scenery it had seemed to me that Italian villages have such pretty names But can they aU have the same name Hadn't we seen that name a few hours back when we were crossing that bridge Then a half-hour ago when we went past the quarry And here's another village with the same name -Lavori in Corso Oh dammit I told myself learning Italian quickly it means Men at Work Right after World War II as the Cold War was starting up the United States had to think of ways to get information to the Russian People The proposed methods included balloons that were supposed to blow from west to east but often didn't cooperate One method that was used at an early stage was to set up an official U S radio station transmitting in Morse code to all the hams in the Soviet Union Since it was an official U S radio station it had to have a callsign beginning with a K if the transmitter is located west of the Mississippi or a W if located east of the Mississippi Since the transmitter was located on the East Coast is was a W And since callsigns often mean something--WGMS for Washington's Good Music Station--it was decided to call this transmitter WRU for U S radio transmitting to RUssia But it didn't take long for Washington to learn that the Russian People didn't Lelieve any of the broadcasts Eventually someone pointed out that if you send the callsign in Latin letters WRU in Morse code -- - - any Russian ham would convert those dits and dahs to the Russian letters SPY which unfortunately represent the Russian word for I'm lying Well back to the balloons Excerpted from Twelve Language Anecdotes in Search of an Author by Arthur J Salemme formerly PI now retired To Subscribe to CRYPTOLOG Or to Change Your Address Call 1103s Jan - Mar 80 CRYPTOLOG Page 9 UNCLASSIFIED FeR eFF161AL Y5E eMlY DOCID 4019611 SAO USE ONLY SECURITV CLASSIFICATION CONTROL SYSTEM ACQUISITION DOCUMENT REVIEW NO CQVIUtNAMI ACTION If mat-Ire-d IndlcGte re po lb indIvidual f- ------------------------------- -------- -- - -- ------- - __---DUE DATE AcHon completed TITLE NSA FORM H8274 JUN 79 SYSTEM ACQUISITION DOCUMENT REVIEW I- Z w I g I- P - O R T''''O ''N S T O- WHICH RESOLVED 1 marlred THIS CRITIQUI ' PERTAINS C 1 8 CIIO _ _ _ hN A - M e -- UNRESOLVED If mcrlr ed no nr roJutlon found _Pal_e _ _---J-_ _ _pa_ra- 6ccl'OccP -h _-- - - - - o L -In -e c ----i t w IftaY 1ftlI ' not Nqulre further ORG CRITIQUE DATE UONTO W II sur AESPONSL o W I-F-'N-A-L-D-'S-P-o-s REVIEWER INDICATING AGREEMENT TO FINAL DISPOSITION II l I- S - A - O -O - F F '-'C - ' A7L- F - 'N 'A - L-'D - - S PO S 'T '- O N- ---------------------1 1--------- to ij FOAM H827 JUN 79 SECURITY CLAooo P' CATION Jan - Mar 80 CRYPTOLOG Page 10 fOR OF'leIAL HSE 8HlY P L 86-36 DOCID 4019611 P L FOR 'fflelAL 5E ONlY 86-36 ANALYSTS OF NSA ARISE YOU HAVE NOTHING TO LOSE BUT YOUR PAPER IT12 1 J This entire article is FeR eFFIEIAh SE eUhJPY I N 1 J SA is in the midst of a revolution BeGovernment-Sponsored Data Bases Tl2 fore anyone rushes to call the Federal has direct access to a number of govProtective Service let me quickly add ernment-sponsored data bases which offer that the revolution here at NSA is an ininformation of great value to NSA analysts formation services revolution Webster's New These include the files of the Defense International Dictionary defines the word re- Technical Information Center DTIC which volution as a total or radical change A provides access to technical reports on retotal change is exactly what is happening in search and development projects of the Dea rapidly evolving way to the methods of fense Department These reports are availinformation storage retrieval and dissemiable in special categories on microfiche nation now available or being planned at NSA in the NSA Library Other DTIC data bases The radical change occurring at this Agency I offer descriptive summaries of DoD R D of course represents only a microcosm of the activities COINS Community On-line Intelvast and rapid evolution of computers data ligence System offers valuable communityentry devices and data storage devices which wide intelligence information to NSA customis taking place worldwide New swiftly ers with a need-to-know growing industries offering information to NSA's In-House Developments liSA's nisthe public on virtually every subject sion must however be also served by info - known to man have appeared in the last decade This information is now instan ly mation data banks develo ed and operated hlavailable by attaching a device about the house The useful and valuable classified information available t ro gh the SOLIS system size of a portable typewriter to your telephone is of course accessible by T12's information science analysts in researching your classiThe New InformatIon Entrepreneurs TI2 fied queries In the last few years T12 has Information Services now subscribes to the developed and maintained a large number of data bases of several of these new information its own specialized information data bases entrepreneurs including Lockheed's DIALOG using the M204 language and the IBM 370 168 Bibliographic Retrieval Service's BRS SDI computer for storage and retrieval These Service and the New York Time8' DATABANK machine systems have greatly reduced the Hundreds of hours of manual research time is 'enormous collections of file cabinets so now condensed to seconds and minutes when familiar to visitors to the old CREF New searching the vast data storage banks availsystems now underway and being planned will able via a telephone line to computers located soon guarantee that the last manual file cabiin such places as Palo Alto California and net like the pterodactyl will fade into exScotia New York NSA information science tinction analysts will query these data banks to aid in your work-related research on such diverse Tl2 is now hoping to solve one of the greattopics as chemistry psychology economics est barriers to the rapid conversion of the education physics engineering social sciwritten word to digital form by using the ences medicine drugs industry and hundreds Kurzweil data entry machine This device of other subjects NSA is now considering the designed to read ordinary print and convert addition of LEXIS and NEXIS services offered it to computer-compatible digits was develby eade Data Central LEXIS is a legal oped by the same company which originated citation service covering federal and state the Kurzweil reading machine for the blind law NEXIS is an extremely powerful research now available for use in the NSA Library The tool which provides a full text search capas cce sfu employment f this devic on bility of news sources such as the wire serlIke It WIll do away WIth the slow pokIng-In vices news magazines newspapers and journals of data by a human so essentia to the comfor a three year period The addition of NEXIS puter storage and retrIeval of InformatIon to T12' s inventory of commercial data bases Through T12 uguu iri house infor- P L 86- 3 6 would potentially eliminate a great amount of mation retrIeval system analysts will be able open source processing now being done to index the hundreds of thousands of reports 0 I Jan - Mar 80 CRYPTOLOG Page 11 Fel IfrlelAL as 'Nt OP SECRE DOCID 4019611 which contain information needed by Agency analysts in their daily work Storage of full texts using new ultra-high reduction techniques on microfiche is being studied under Projectl I Manipulation of Electrically Received Information Other systems designed to handle information received electrically are also under developemnt using hardwal eand sOftwar clinllSeJ nanother Agency system the name given to this project now w 1 software modification will store large quantities of classified information presently received here via teletype and will enable the researcher to perform full-time searches by words subjects series numbers and other approaches Thousands of documents now being processed manually for hard copy files a process which is both labor intensive and time consuming will be come immediately available to researchers throughout the Agency using easy-to learn search strategies Automatic distribution of these documents i n haI d CO is already takin lace under Projects and will elimmate t e need I What This Revolution Will Accomplish What does all this mean to the Agency analyst working against a deadline and seeking informationyitaltothecompletionofareport It means that time-sensitive information will be available when it still has meaning and importance Itmellnsthat in many cases information will be available to the ana l yst 24 hours a day by querying Tl2'sgata bases directly i GBP required Itmeans getting an answer to your quest onin seconds 'or minutes instead of hOUrS or days The American Revolution freed us as a nation from foreign d9mination the information services revolution will free us at last fr9mthe overwhelming flood of paper thathas dominated us for so long stealing o urtime and efficiency It may also incidenta lly help save our forests for other uses The next time you call for information services from T12 don't be surprised when your question gets researched and answered with revolutionary zeal I for n r copy UMBRA 1WINS SYDNEY JAFFE 1 'P L 86-36 P L AwARb l ij At the g OCrypto Lingtiistic ASsoc1 'ation Annual Banquet JOf the Language Department of the National C ryp to 10 g 1 'c S c h-o-o 1--was presented the Sydney Jaffe Award the highest recognition a member of the Agency can achieve in the language field His significant accomplishments as an Arabic lin ist soan an A ency career of some 24 years I -tet- In 1977 I IperforDled pioneer work in developing National Cryptologic School courses inthe yrian Iraqi Libyan and Egyptian dialects of Arabic Unique among theseis1 l1eLibyan course the only such course available to the intelligencec01llll111nity For this seminal work in course development he received the Agency's Meritorious Civilian Service Award _ If there haseverubeeIlatNSAualinguis't ic factotum it is IHe yields to no one as a model of the traditions a n d-1 e a i s s e t-b y Dr Sydney Jaffe Jan - Mar 80 CRYPTOLOG Page 12 OP 8HEURRH UMBRh EO 1 4 c P L 86-36 P L 86-36 86-36 DOCID 4019611 UNCLASSIFIED _e_-IIt' I II P L Ie This article was originally published in the W N Women in NSA Newsletter for May 1980 S1nce the problem it addresses is certainly not imited to Agency women but rather appl1es to all employees returning from tours of duty elsewhere it is reprinted he e so that 1t may reach a wider readersh1p dhw ast year I was fortunate to have been selected L for an external training program I was thrilled not only because of the opportunity it provided for Me to 1ea rn more about tile inner worki ngs of the enti re Department of Defense but because I felt also that I would then be assimilated back into the Agency tn a more responsible position AFter'all tf the Agency thought enough of IIIe to have selected IIle for thts plum then would they not want me to use IllY knowledge later to the best advantage --or 50 I thought Judging from IllY past job experience in severa' areas of the Agency in addition to my recent sehooling I felt I was ready to asslllll a position of greater responsibility upon return however I was stynrled in I ' att ts to find such a position My two-month attempt to ftnd I job before I returned to the Wlshingtori -area was greeted wi th such responses as we've just chenged the PMM's and your nlme will no longer be circulated to key c onents as I Ilad been led to expect priOr to my departure and We've just changed the s and you must return to your original key cOlllPOnent since they sponsored you tllat's been changed again I understand The difficulty was compounded by my trying to do business via a longdistance commercial phone Rather than being given a choice of assiglllllellts I was told thatillould take a job in a certiin oriliniziltfon lnd I drove bKkto the Washington lrea specirf llly to interview for tllis job After the interview I decided for several reasons that this was not iIlejob for 1IIl however I was on the books 15 return Wig to that job and that was that as far as the Agency was concerned When I returned to the Agency I personally scouted around and arranged some job interviews but I felt that I didn't have the time to pursue potential opportunities because I was under pressure to be assigned SOMEWHERE I finally returned in a si ilar capacity to the group from Which I had left The other three Agency employees who were in school with me also returned to the same or similar jobs A sad cOlRentary I feel I am grateful for the opportunity the Agency provided for me to broaden IllY knowledge However I do have a few suggestions for both the Agency and for those employees contemplating applying for external training First of all I know the Agency's reassimilation program has historically had its problems and I am confident that the current administration is doing everything it can to help remedy the situation I can't speak about overseas returnees but it seems to me that those returning from specialized external training such as the joint and senior service colleges that provide their sutdents with a broad background in military affairs could be used by the Agency in a variety of areas I know that there is one slot a one-year tour as execu tive assistant to the Deputy Director--that goes to a returnee f the Nattonal liar College-but other areas of tile Ageitc y iDiIJd IISo use the special kind of expertise gl allli l frw tilts training A one-year tour in allJPY one of Je s would benefit both the Agency and the eqll011f J lieu of that the l II1Ployee should not be locked fnto o job upon his or her return A nIIIIber of interviews perhaps three should be arranged for the ellPloyee There's no substitute for personal contact to aid one in deciding if one could effectively work with an individual or in a particular area one ClD't ke this decision via long distance and a specified period 'of time a week or ten days should be allotted the employee to ke up his or her mind Failing this what can YOU do to assure yourself a good job upon your return This advice holds true also for those who may be contemplating a change of jobs First make certain 'Our Personnel SlIIIIIIIry is up to date and don't be shy even before you go on TDY about giving it to those who may be in a postlion to place you Secondly decide wh1ch areas REALLY interest you find out what you can about these areas who the managers ar and get appointments with them Most managers are w111ing to talk to potential employees Thirdly don't discount the theory of networking -it can work for you A few of the job interviews I lined up were as a result of contacts I had made while working on a group-level staff A few managers even remembered me from I1 ' stiitt as a Directe ' s briefer and that was in 1973 o In Idd1tion senior IoIIN members were very generous in giVing me advi ce ana support In short the opportun1tiesare there YOU CAN MAKE IT HAPPEN Now nine months after my return I have secured a very good career-enhancing position It's nice to have the better job now but it would have been even nicer to have obtained it upon my return Jan - Mar 80 CRYPTOLOG Page 13 UNCLASSIFIED ------------- 86-36 DOClD 4019671 eiRe CON FIBEN 'fIAtJ AN INTELLIGENCE DATA BASE u '-------_ _ITI23 IRC which stands for Central Information Reference a d Control is a system of scientific and Technical S T intelligence support which is oper- ated under the auspices of the Defense Intelligence Agency DIA by the Foreign Technology Division FTD of the Air Force Systems Command AFSC The primary purpose of CIRC is to support the intenlligence information needs of the five 000 S T intelligence productions agencies the Naval Intelligence Support Center the Army's Foreign Science and TEchnology Center FSTC Medical Intelligence Information Agency MILA and Missile Intelligence Agency MIA and FTD Access to the CIRC data base is available to other organizations and NSA does have a CIRC terminal G CIRC means on-line access to al os 1 5 million documents and another 3 6 mlillon are available through batch searching These 5 million records are available to NSA for retrospective research through the remote terminal which is located in Tl232 Soviet Data Support Workcenter Room 3W032 x5989s For on-line searching the terminal converses directly with the computer located at FTD at Wright-Patterson AFB Dayton Ohio and retrieves document references and abstracts in response to search queries CIRC provides document retrieval in a bibliographic sense giving citations to documents relating to a given subject or author rather than selected and sorted data ready for insertion into documents which the requester may be preparing The intent is to furnish source material to be studied by the requester who then has to decide the suitability and validity of the information The user does not receive the document itself from the computer instead representations of the reference are retrieved giving P L 86-36 such things s title date of report report number or source text extract and ending with a list of specific surnames facility names and nomenclature designators occurring in the document Should the requester need the entire document Tl232 can usually obtain it A major difference which tends to separate CIRC from many other data bases is that CIRC does not use a controlled dictionary of terms or keywords Virtually all the words in the extracts entered into the CIRC system are usable in searching with the exception of some common words such as both who or latter which contribute little to retrieval Because of the free text type of search use of broad terms will certainly lead to a high chance of irrelevant retrievals while obtaining all the essential coverage Therefore the requester should be prepared to screen a great deal of information to avoid missing anything that seems pertinent The other extreme-very narrow terms-will usually render an output of mostly relevant documents but eliminating some valid ones in which the searched items are expressed differently in the referenced document from the search terms used -- for example searching for the SA-7 missile but not for its nickname GRAIL or looking for the nickname FISHBED but not for MIG-2l If SA-7 or FISHBED were not in the reference but GRAIL or MIG-2l were the reference would not be retrieved The indexer can only use terms that are precisely in the reference and is not to assume a relationship unless it is spelled out Thus there are problems in using narrow or specific terms without using Synon 'lns or related terms to achieve full subject coverage DATA BASE CONTENT Documents entering the CIRC data base contain information about fbr- Jan - Mar 80 CRYPTOLOG Page 14 CONFIBEN'fIAtJ DOCID 4019611 CONPIDENI'IAL receipt in T1232 TSC TK orders take two to eign science and technology as it relates to U S Army Navy and Air Force interests three weeks since they must be sent by All scientific disciplines engineering speccourier and there is only one courier flight per week from Wright-Patterson AFB to the ialties and technologies are represented as Washington area If an order misses a available Worldwide coverage is maintained with emphasis on Communist countries U S flight it must wait an entire week until information is not included except when it is the next one Thus any request resulting incidental to foreign data in a num er of retrieve references must allow ample time for the delievery of the data Uj Domestic and foreign open source pubFTD is hopeful that high speed printers will lications are included in CIRC as well as someday be installed at the principal CIRC classified messages Intelligence Information user sites including NSA which will result Reports and other material of all classifiin much faster delivery usually by the next cation levels up to TOP SECRET CODEWORD and working day and will free the remote on-line TK Army Navy and Air Force finished techterminal for queries Instead of printing nical intelligence publications containing and shipping by mail or courier FTD will analyzed information are entered into CIRC use the high speed printers for transmission as well as reports of some non-DoD agencies of the bibliographies to the system-associated The 000 S T agencies also participate in workcenter No firm date for this enhancement obtaining information from other sources is available but FTD is hoping it will take such as NSA and CIA which do not submit place during late FY1980 or early FY198l reports directly to CIRC for inclusion in Where possible T1232 will attempt more exthe CIRC data base peditious responses for high priority requests About 83 percent of CIRC's on-line data as appropriate P L 86- 6 bases and 93 percent of the total CIRC data EO 1 4 c PROFILES One additional CIRC feature--the bases--on-line and batch--comes from foreign profile--is availble to requesters who want literature 4 7 million out of a total of selected information on a current recurring 5 million references In 1979 over 1350 subbasis A CIRC profile is a preseleCted canned scriptions to worldwide publications were query prepared for a requester and stored scanned for content selection for CIRC This on-line at FTD When the CIRCdata base is provides a great number of open source unperiodically updated prior to their being put classified references to a broad spectrum on-line the newly added-documents are autoof subjects nomenclatures facilities and matically compared with the profiles and authors or personalities which are available those documents wnich match the profile sea ch for search again worldwide in coverage but statements are printed and sent on to the rewith emphasis on Communist countries The quester A profile is a good way to maintain other 7 percent of CIRC nearly 300 000 docucurrent awareness on a particular topic as ment records includes finished intelligence material is added to CIRC Queries may conre orts IIR's sensor re orts and other sistof terms nomenclatures personalities failities or organizations countries source such as a specific publication or classification of the references Queries may be as narrow or as broad as the requester desires Profiles may be of any classification t I U Many of the open source references are not available for computer retrieval elsewhere so this part of CIRC is largely unique While the retrieved-abstract is in English most often the open source referemce will be in the original language The reference in CIRC refers the requester to the original periodical journal newspaper or monograph for the complete article OFF-LINE PRINT ORDERS Because the on-line terminal printer is slow bibliographies are usually ordered from FTD for off-line printing and mailing to T1232 for forwarding to the requester There is only one NSA on-line terminal when it is receiving output from the computer no searches can be initiated Bibliographies classified up to SECRET take seven to ten calendar days from order to USING CIRC CIRC usage at NSA has been increasing substantially over the last several years to the point where NSA is among the top five users of the data base This is despite the fact that the availability of the data base within the Agency has not been widely publicized because in part of computer downtime problems which have led to feelings of uncertainty about response times U Use of CIRC can be cumbersome bacause the data base is so large it is broken into two segments- the afternoon or classified session where a full abstract of the reference is available for all classified references TSC TK material is available during this session only and the morning or unclassified session where a full abstract is available on-line only for unclassified references Jan - Mar 80 CRYPTOLOG Page 15 CONPIBIilNI'IAL UNCLASSIFIED DOCID 4019611 If a CONFIDENTIAL or SECRET reference is retrieved on-line is the morning session only the microfiche number is given This procedure is followed because not all terminals for the unclassified session are in secure locations because a number of users have dial-up terminals which use unsecure telephone lines Off-line bibliographies do print the complete abastracts of classified morning references The morning unclassified session is so large that frO's IBM 360 65 cannot contain all of the references so it has been broken into three segments _ CIRC which consists of the CONFIDENTIAL and SECRET material as well as the last two years of unclassified input This is available on-line every morning except Wednesday - ClIO which contains unclassified material entered into the system within the past two to five years This is available on Wednesday mornings -ARCH consisting of'the archival data base of unclassified references which were input over five years previousl This material is available only for batch searches Thus a requester wanting complete coverage from all of CIRC might receive four separate LIP U All in all CIRC is an excellent data retrieval system which is to a considerable extent unduplicated by any other system Analysts who have not been aware of the existence of CIRC and who might have questions concerning the system or who might wish further information on how CIRC retrievals of profiles could help them should call the NSA CIRC remote terminal location T1232 on 5989s or drop in at Room 3W032 where T1232 personnel will attempt to answer their questions Continued from page 8 V An interactive computer program has been developed on the LODESTAR system for use by the analyst linguist The program uses the technique discussed above and has complete instructions for its use contained in the program itself The program can usually identify the correct language in under three seconds of CPU time For further deails contact one of the authors Editor's note Since the writing of this article the data base has been expanded by the inclusion of the major languages of Europe U The authors feel that this distancing tecllnique described here probably has other applications in addition to language identification Readers who wish to discuss such appljcatjons are reqyested to call either Dr I outputs all containing different references from CIRC ClIO ARCH and from SISA the TSC TK data base Of course searches can be limited by classification or by date span The requester can limit his retrievals by indicating specific desires when making his request U The primary costs to NSA for the use of CIRC are the expenses of the 24-hour dedicated circuit to FTD paper for the printer the cost of the Teletype Model-40 Keyboard Display Printer and the salary of the one analyst who spends most of her time doing CIRC-related activities There is no charge for search time printing or mailing or for CIRC microfiche SOLUTION TO NSA-CROSTIC No 29 A Proposed Cure for the Time-in-Grade CR YPTOLOG Syndrome November 1 II J In general promotion decisions must ultimately determine just who will make the key decisions within an organization o The initiative for promotion must belong to the managers and it is their responsibility to see that worthy personnel are promoted It must be the employees' responsibility to qualify for promotion I P L Jan - Mar 80 CRYPTOLOG Page 16 UNEURb SSII'IBB 86-36 hm 3m n This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu