o DOCID 4012045 TOP SECRET The Journal of Technical Health Vol xx No 2 SUMMER 1995 Inside This Issue Interview with NSA's Chief Information Officer Page 1 Writing As A Continuation of Analysis Page 7 NSA and the National Information Infrastructure Page 19 eLASSIFIEB BY 14SA essrt' 1 3- BEeLASSIFt er 6 igiiidlilig 'Ie y's QeteFMiAatiefl Ref lHireeJ Declassified and Approved for Release by NSA on '10-'17- 20'1 2 pursuant to E O '135 26 vl DR Case # 54778 HIS f OetJMEtff eor'f'f1 n'fS eOl'I WOftO M1 T'l ftIAL TOP Sl CRET DOCID 4012045 f Olt Olff ICIAL USE ONLY R L 86-36 CRYPTOLOG Summer 1995 Vol XX No 2 PUl lj hed by P05 Operations Directorate Intelligence Staff Publisher u ooooooooooooooooooooo William Nolte 963-3123 1 Editor 963-3123 Board of Advisors Chairman Computer Systems Cryptanalysis Intelligence Analysis Language Mathematics Signals Collection Signals Collection Telecommunications Member at Large Member at Large Member at Large Classification Officer u I 963-7712 oo o o o o o o o o I I r I I 963-6669 963-4382 963-6283 963-5704 963-1363 963-5717 968-7160 996-7847 968-4010 968-4010 961-8214 963-5463 Contents of CRYPTOLOG may not be reproduced or disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor All opinions expressed in CRYPTOLOG are those of the authors They do not represent the official views of the National Security Agency Central Security Service To submit articles and letters please see last page FOR OFFICIAL USE ONLY DOCID 4012045 FOR OFFICIAL USE ONLY Table of Contents Interview with NSA s ChiefInformation Officer b -- _ _--- I Writing as a Continuation ofAnalysis b l ooo Journalistic style yes creeping Clancyism no byl 7 9 ' P L 86-36 EO 4 c P L 86-36 Managing Linguists in Low-Density Languages byl The National Information Infrastructure NIl What'sThi New Intercept I'm The Unfocused 1 byl Seeing b Iby Eye 1 NSA s Lessons Learned Database V 19 1 25 1- 1o The Phoenix HF An Editorial by N G Gerson byl The 1995 Joint Mathematics Meetings ed 28 32 38 o AO ooo JI '' '' 'o ooo byl 10 1 Intelligence Analysis Off-site and Open Forum b IA vs TA IR An Editorial b 1 4 P L 042 SIGINT Bloopers 49 Book Reviews o 50 SIGINT Glossary The Chun Wheel b -- 55 FOR OFFICIAL USE ONLY 11 ----l 86-36 DOCID 4012045 FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 Perspective An Interview with Terry Santavicca NSA's Chief Information Officer P L person tD DDO was to try to forge better ties between DDOand DDT in particular-those being the two main organizations involved in systems development ADP and processing etc So I consider it part of my mandate to do that but in order to accomplish that I've tried to expand current or initiate new forums to allow that to happen For example the ADPX ADP Executive Committee which had existed for some time did include representation from T Since I've come on board and now chair the ADPX I've expanded the ADPX to include representation from all key components More and more of the ADP issues and architecture and networking and so on really are corporate issues and need to be worked in a corporate way Terry Santavicca formerly chief of DDT's staff has become DDO'sfirst Chief Information Officer CIO He has served as chief of the DDT staff Deputy Chief of DDT's Telecommunications GroUD and Chief of the Office of ADP SUDDortl Why was the CIO position created FOUO It arose from the study commissioned about a year ago by Dr Mueller then DDO to look at the state ofiriformation systems and ADP automated data processing within DDO He felt that there were a lot of ADP-related activities going on in DDO that weren't well coordinated and that thecul c ture was stovepiped P L 86- 3 6 0 FOUe So the DDO commissioned what's sometimes called thr StudY 1 chief of J and was in DDP at the time spent several months talking to a lot of different people inside and outside DDO Of the many observations and recommendations of the report they published the key one was that DDO needed a CIO who reported directly to the DDO Dr Mueller who agreed ran this by his group chiefs who concurred and shortly thereafter I was named as the DDO CIO Shortly thereafter Dr Mueller left but Ms McNamara the new DDO has been every bit as supportive FOUO I arrived here to take up the CIO job in late February The idea was that somebody at a senior level in DDO would pull together the disparate activities in the ADP information systems world and to coordinate and interface with other key components as appropriate to work these issues How have the other directorates reacted to the establishment of the CIO FeDe I think very well In my view part of the strategy of assigning me as a former and long-time T 86-36 Foue 1 Iand I have agreed to co-chair anew board called the NSA Information Systems Group I NISG a high-level IS direction and policy board which will have CIO equivalents from each of the key components who would deal with corporate cross-organizational ADP-oriented issues something like the ADPX but at a level higher The ADPX would work issues problems standards and so on from its level and then the NISG would determine final policy and implement or promulgate agency-wide FeUO Also as the CIO I represent DDO on the Technical Architecture Board TAB which is primarily a DT forum that relates to DDO's Requirements Executive Board REB which I am also a member I know more acronyms but the point is there are renewed efforts for DO and DT to work more closely in coordinating requirements architectures and system developments Do you see any potential conflict with DDI U Well the kind of issues we're working are not I think those that are the mainline business of DDI It's more architectural strategies and how they get networked in with the rest of us When we come up with agency standards we want to make sure we coordinate with them as well standard workstation issues and so on FOR OFFICIAL USE ONE'i 1 DOClD -7 dQi Summer 1995 Since you mention standard work tations is NSA going to continue to cycle' older terminals or will every analyst eventually have the same functiona' capability U Because of the HPW-2 contract this is a bit of a contentious issue The HPW-2 has been in effect for some time now but it has not really taken off very well even though the prices on the contract are very very competitive But because people have been so locked into Sun have gotten so familiar with the workstations and because OUT system administration is oriented toward Sun we've had a very hard time taking advantage of the HPW-2 contract available in the non-UNIX world than in tbe UNIX world So in the long term we need to be careful to build an e vironment and a strategy that will be able to take advantage of all the kinds of things that arc oul there That may mean we have to figure out how to inlegrate Windows NT into our environment-see J said I'd get controversial I know this'll make people's hair stand up but I honestly believe that we cannot close off any of our options I mean five years from now UNIX might not be around it might not be a viable system When vendors develop a capability they usually develop it first on the systems that have the broadest market and that typically is not UNIX So we need to keep our minds open to non-UNIX as well as UNIX ' U We're making renewed efforts to belter integrate the HPW-2 into our environment but as a longer-term vision to get back to your original question I wouldn't like to see an HPW-3 contract bid competitively You think that more weight ought to be given to integrating a future HPW with what is bere rather than the basic cost of the next HPWs I I U Yes Well I think we have to worry about cost but what we don't want to do is to be locked into anyone vendor And of course the vendor's strategy is to try to Jock you in But if NSA wants to be in a position to lake advantage of the very fast-paced technology the best that's out there we have to build an environment that will be heterogeneous U Now I think the right way to do that is to figure out how we can integrate a variety of vendors' products in this environment And I think the right way to do that is 10 define our environment in terms of standards the standards that it would take to fit into our environment and ope rate in a transparent way Now that's a little bit idealistic but standards are moving in that direction We can't yet define such an environment but there are standards for example a single UNIX standard the UNIX world is converging on a single UNIX and a lot of the vendors are working toward it SOLARlS Sunls operating system is on thaI path as well as IBM's AIX operating system L _ _ - - - I T here is certainly a Jot It 9r cotilmercial off-the-shelf COTSl s oftwarc out there' P L 86-36 2 People like to use what they're comrorlable with on the outside U That's right and the majority of NSAers probhave persOnal computers at home and they're not likely to be UNIX so we don't really leverage what people learn and use and know how to use from home when they come to work That's another disadvantageI mean UNIX does have a lot of good things going for it It's always been very good in a networked environment and it's a very rich operating system on a workstation whereas a lot of these older systems like DOS are very batch-oriented you couldn't do multiprocessing but now the rest of the world is catching up and there's not as much of a difference bly U I'm not anti-UNIX by the way I just want us to keep our options open UNIX has served us well and will continue to do so But he direction nowadays not only at NSA but the entire community is COTS products and there are a lot of COTS products out there to pick from and the majority of them arc not on Ihe UNIX side What skill mix do you see the various computer- lriented specialties at the agency needing For instance how enthusiastic are hanl-core pro grammers going to be about-well the tenn peeling shrinkwrap has been heard ' F ''J h'' Yes I can understand why there might be some concern in that area NSA has a long history of inhouse development of major capabilities major systems Ilhink the pendulum is swinging away from that I think there will always be some subset of our capabilities that because of the uniqueness will have to have in-house development of at least parts of it J think we'll have to learn how to do a better job of integrating various software packages together to build a system The DOCID 4012045 P L 86-36 FOR OFFICIAL USE ONLJPY CRYPTOLOG Summer 1995 emphasis is to encourage peopletolook for software that's already available rather than to think in terms of writing new code reuse libraries as well as COTS products I know there are some efforts going on in some of our organizations to do this kind of software re-engi neering We've been holding discussions of perhaps setting up special servers on our networks that have shared libraries on them and encourage people to take advantage of them Even now through some systems you can go in and pull off software System administrators will probably have to become more versatile too if they're going to be working with a greater variety of products U Yes The SA problem is another area that concerns a lot of people considering the variety of systems that the SAs have to support Now I want to be careful how I say this but the quality of our SAs is very uneven We've sometimes picked people to be SAs from diminishing skill fields and moved them into system administration because they weren't needed elsewhere and some of them haven't had all the training that they probably could use U We need through picking the right people the right kind of training and the right kind of tools to make our SAs more effective than they are today Because the environment is going to get more complex and the technology is going to get more complex Although there are some products on the outside and some tools becoming available that should make the SA function easier Right now every vendor sort of has his own way of doing system administration and sets of tools that apply only to the systems that they provide But there are products coming out now that will sit on top of and work for a variety of different systems I know 13 is looking at some things now whether we can take advantage of some of them remains to be seen Now it's not clear that NSA at the moment is funded at a level that can support that to the degree we think is really necessary But we've put together a PBS and the new information-exploitation funding category is looking at that very hard and has defined a couple of whafwe call over-guidance packages to try to get more money tobuild up the infrastructure support '- - ' FOUO A littlebitof a digression another one of the recommendations of th IStudy was that once the CIO position was established one of the things it needed to be given was enough financial control to put some teeth into the CIO functions In line with that the ategories involved with the ADP areasthe analyst-production the language-exploitation and the dissemination categories-have all three been put under the CIO The analyst-production and the language-exploitation have been combined into a single category called Information Exploitation and it's that one that's sponsoring the multimedia initiative The CA community still has their own funding category and they fund their own ADP so that's not included p L 86-36 Doesn't multimedia require amounts of bandwidth and storage tremendous Do you envision the average 'analyst having multimedia access at their desk FOUO Well I don't know about the average analyst but yes we do envisage analysts having multimedia capability In fact we're in the process of coordinating a multimedia Project Baseline Summary PBS J P L Video-teleconferencing is another capability that some see as absolutely essential and others see as merely a frill U I think teleconferencing can help a lot but it's not the complete solution I think there are times that sitting together face to face to work out things is the right way to do it So I wouldn't be one of those that say that the future of communications is that everybody will stay at their desk and just teleconference And again teleconferencing requires a lot of bandwidth 86-36 FOR OFFICIAL U ONLY 3 ' DOCID 4012045 FOR OFFICIAL US ONLY CRYPTOLOG Summer 1995 So we're TDYmoney not just talking about saving l OUO No in fact I know Q looked at that and concluded that the amount of money it would take to set up a reasonable teleconferencing capability would fund a lot of TDYs So it's not like you can take a couple of TDYs' worth of money and set this up Even if you could easily switch the money from one pot to the other You mentioned information exploitation what other areas related to that have you gotten involved with ' D I'm amazed every day at the'things that the CIO gets involved with I think since the position's been established it's been a target of opportunity D One of the primary objectives I have is to encourage teaming both within DDO and across organizations especially DO DT but wherever appropriate With the kinds of things that NSA now gets involved with everything doesn't always fit nicely in an organizational structure and we can't afford to reorganize every time something changes so the current philosophy is to try to form teams to work issues and solve problems and work projects wherever possible and that's something that I'm encouraging people to do I'm mentoring several different efforts that are using that approach and people have come to me and said We are working with some people in this other organization outside ours here's what we're working on but we don't know where else to go to and the CIO seems like an appropriate place to start so can you help facilitate our project So I've taken on a couple of those to help facilitate cross-organizational cooperation D One of the things that I think in general NSA doesn't do a very good job of find after discussions with the NDDT is that we don't plan well for success By success I mean once we come up with a good capability either developed in-house or perhaps brought it in from the outside we're not very good at figuring out how to make it available in a broad way in the agency We'll take it into one organization put it on some analyst desks and say here maybe this'll help you out but what if we were to deploy say 5 000 of a successful capability We just don't do that very well We'll bring things along to a particular point and then not do a good job of making it available in a timely manner and conducting all the associated training Do you mean in the sense of acquisition or in the sense of disseminating the information that a capability is available D I think all of the above How many times have you found out about some neat thing from somebody who said the guys downstairs brought this up and put it on my desk and boy is it nice And you say well why doesn't everybody have this capability We just aren't geared for deploying things in a significant way when they're successful This is a cultural problem too isn't it For instance computer-support people might say we don't know how long it would take us to learn this so we don't know whether we can sign on to support it D Yes that's part of it too We don't always fund for it we don't always consider what's going to have to be in place if a project succeeds so we don't plan for the training that might be needed for people to take advantage of it Sometimes we depend on the developers to show their product around So we need to do a better job of marketing D We do We need to plan early in the Ptdcess for how we deploy if we're successful I think there have been some very valuable things developed here at NSA that are not as effectively used as theyco lld haVe been not as broadly used because we have not done a good job of deploying them Are you involved with any ofthei processreengineering efforts currently underway I'm mentoring the effort If you're not familiar with back up a little and give you some background DDO sOme time ago 'defined its three core processes as acquiring data collection adding value tOdata analYSis and rer orting dissemination to the customer was an effort that looked at the reporting side a core-process review of the systemsi and processes involved on the reporting side and hOW to imptove and to consolidate systems They defined a single reporting vehicle that all reporters would use so that you wouldn't have pprep in one organization and something else in another goup the consolidated reporting vehicle I I 'S I t FODO is the core-process review of the analysis function within DDO While the boundaries are a little bit fuzzier it incorporates everything from the collected data until you get ready to start I team has reprethe reporting process The I sentation from throughout DDO and DDT They've FOR OFFICIAL USE ONLY 4 iP L 86-36 DOCID 4012045 FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 been operating now for several months and are hoping to finish their process review this fall but again they're looking at all the processes involved in the analysis function and the systems involved looking for opportunities to re-engineer and consolidate they're looking at and trying to define the legacy systems and the migration systems for two reasons one for internal NSA purposesthat is which legacy systems do we want to stop putting resources into and which are the systems we want to migrate to that is emphasize and build to for the future This is being done both for NSA purposes and because at the DoD community level Intelligence Systems Board ISB there's an effort to do this across the intelligence community agencies Each agency is being asked to define its legacy and migration systems These will be looked at across the community and certain agencies will be given the lead to define the best-of-breed migration system in a particular area They will get funding to proceed and provide that capability for the community The implication of this is that those systems determined to be legacy systems will have money taken away from them and provided to the agencies which have been tasked to lead the charge with their migration systems Are you involved with INTELINK FOUO Yes INTELINK in a sense is the intelligence community's migration system for dissemination since it's been determined that all agencies will use INTELINK for dissemination What is the value of NEWSMAGAZINE Is this something you think every analyst needs a connection to or is that the sort of thing that can be limited to staffs I know some people think of it as bells and whistles D I think at the moment it certainly isn't necessary for everybody to have but I think there's potential there as we make more and more presentations briefings etc available on NEWSMAGAZINE Especially when we're split up among buildings it's very hard to get people to get up from their day-to-day work and go to various presentations As our infrastructure can support more of this I think we could use it more for desktop training Even if it's not available on every analyst's desk if it were at least available in a number of places scattered throughout people could just go down the hall to a conference room-that would be helpful There are many occasions when I'll see a briefing or something advertised that I'd be interested in but then I hear it's over in the R E building and adding the travel time makes it hard to squeeze into my schedule What about things like Internet access Which you find preferable as far as efficiency or anonymity bringing Internet newsgroups into the agency or encouraging people to go out on their own D There are a lot of thorny issues here Ideally one would like people to be able to go out onto the Internet on their o n there's certainly a wealth of information available-I've attended a couple of briefings where people have talked about very significant things that have come off the Internet-but I think we have to be very careful in how we approach it for security and anonymity reasons The kind of things that we're capable of doing in networks and so on you assume other people could do if they really wanted to Net exploitation good old TA term FOUOj Right But I think there are people at the agency right now looking at the whole picture of what our policy should be with the Internet and I think we will arrive at something that's a compromise between everyone going his or her own way and the opposite extreme which would be one office such as E3 the open-source authority being the only one permitted access to the Internet and everyone else would have to submit requirements to them I think the open source people will have the capability to go out and do research' for us but I think we will also have the ability in a welldefined structured way for analysts to go out and find information on the net There's no replacing the ability for the target analyst who has the ability to follow threads through the net and find out information But I think we'll have to have some well-defined procedures on how that will happen so that we don't make ourselves vulnerable What do you hope to have accomplished by the end of your first year in office Have you any very definite goals yet D I guess my goals would be to have made a significant improvement in changing the culture to more of a teaming culture having organizations think more corporately rather than an organization coming up with say the Alpha-123 organization's standard or policy on such-and-such to think in terms of OK we think there's a need for such a standard or such a policy we'll FOR OFFICIAL USE ONL l 5 DOCID 4012045 FOR OFFICIAL USE ONVI CRYPTOLOG Summer 1995 take the initiative to get it started but let's try to work it as a corporate issue at least develop it in such a way that it can be built to be a corporate-level vehicle Get rid of the culture of that's not how we do it in Alpha-789 U Yes and I'd like to do the same thing for when an organization sees the need to develop a capability They should try to think Is this something that has broader applications so that we can develop it not just for our own little component but where else does such a need exist Maybe we can form a team with people in other organizations I think some of the forums that I've tried to put in place for sharing information like the ADPX will help facilitate this U Another thing I was hoping to accomplish is to make some headway in defining some of the standards which can in tum define our environment That as I mentioned earlier will help us take advantage of technology but it will also make us more efficient it allows the developers something to use to provide uniformity across the agency For example the OUI standard The graphical user interface OUI standard is something that now is being coordinated agency-wide although we haven't officially promulgated it yet It's been fully coordinated the only thing left is to decide whether it should be a standard or a guideline or a manual i e how are we going to promulgate it But it is now accepted as an NSA standard and that's something that every project should pick up and use They should be able to give it out to contractors and tell them to comply with this NSA standard So it makes us more efficient and it makes the developer's job easier And it certainly makes the users of the systems more efficient and comfortable when they go from one system to another or one software capability to another it makes the learning curve a lot easier when say the exit button does exactly the same thing on all of them Maybe the HPW-3 contract won't be with the company that has five different keyboards Yes the number of keyboards has always been a problem at the agency And speaking of information Tech Trend Notes publishes a Calendar of Events sponsored by NSA academia and professional associations Here's a sample of what's happening this year Event Date DoD Database Colloquium '95 29-31 Aug Information Superhighway Summit 11-14 Sep 17-21 Sep European Conference and Exhibition on Optical Communications Electronic Data Interchange for Government 18-21 Sep 17th Annual Satellite Communications 20-23 Sep Users Conference 27-28 Sep C31Systems Technology Exhibit 8th International Symposium 16-20 Oct on Artificial Intelligence 7-9 Nov OSS '95 -4th Int' Symposium on Global Security and Global Competitiveness ACM Conference 13-16 Nov on Mobile Computing and Networking Location San Diego CA Santa Clara CA Brussels Belgium 703 631-6125 800 225-4698 44 132 2660070 Washington DC San Jose CA 301 445-4400 800 828-0420 Ft Huachuca AZ Monterey Mexico 520 452-7493 52-8 328-4197 Washington DC 703 242-1700 Berkeley CA 617 332-1101 FOR OFFICIAL USE ONLY 6 Where to call DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer P L 1995 86-36 Writing 9l5 9l Continuation of Jl nafysis byl ---ll U SIGINT people would agree that good analysis is essential to producing a good report Yet when presented with a profoundly inadequate report most are inclined to criticise the reporting i e the writing style the organization the lead if there is one or the title Rarely do they merely cite incomplete analysis as the problem Almost never in such cases does one hear the computer axiom Garbage in garbage out Maybe this reflects a habit of thinking that report writing is simply documentation of a completed analysis If so I suggest that it is a wrongheaded habit that finishing the report-and that alone-should be viewed as completion of the analysis U People tend to think of analysis and reporting as a linear operation-first the analysis then the report Even experienced analyst reporters who do not actually do it that way sometimes describe the process in linear terms At best those who take the linear pattern too seriously can produce some pretty eye-glazing reports In the worst case they put out the thigh-whackers NCS workshops and classes use to show how good reporting is not done These are poorly organized examples without leads or with buried leads or with titles that do not reflect the lead D Such reports did not happen just because the analyst was a poor writer They got that way because the analyst stopped thinking analytically before beginning to write which is the worst way to write anything Having assembled and researched the data the analyst neglected to apply the most powerful tool in the analytic kit the self-critical kind of writing that forces reporters to question the evidence recheck the premises do more research and often come to a different conclusion This is what I call writing as a continuation of analysis It describes a philosophy that I believe ought to become an overriding theme in training intelligence analysts to be reporters U In the past we have trained analysts to report almost as if it were a separate function If on the other hand we defined writing as a continuation of the analytic process we would not just teach analysts how to write reports We would teach them that writing the report is part of the analysis-the most important part This approach cannot be applied to near-real-time fact reporting where the only questions are Did it happen and Does it meet the criteria It is perfectly suited however to a situation in which two or more facts are subjected to analysis research synthesis and judgment to report a meaningful event or discovery fJfte pen is the tongue of the mint - Prover6 found on a '11iai veer vottfe Inspiration is where you find it U Disciplined writing is analytic by definition The currently accepted techniques of SIGINT Journalism conform to and layout a pattern for completing an analysis while writing a report The idea of thinking critically about what you are writing or have written is not new Good writers including good SIGINT reporters have always done it The point is that this is actually an analytic process which can be described taught and learned Using it improves both the analysis and the writing During the process the analyst may discover that the data simply does not warrant a report More often the process will open a somewhat different perspective than the one with which the analyst began U Place yourself in the position of an analyst who has been working on a particular problem You have done some research and pulled out some seemingly related data Now you want to do something with it As an analyst you have to organize it just what the SIGINT journalist has to do You may have some of your report details but you will need to analyze them to figure out how many of the critical Ws Who What Where When Why How you have and what they are UNCLASSIFIED 7 - DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 This will help you select at least initially which organizational format Inverted Pyramid Lead Plus Equal Facts Chronology or eclectic you will use It should also suggest a working lead summary U A lead we used to call it the SIGINT fact is the most concise statement possible of what the report is about Having read it every reader should be able to make an informed decision to read on or not Picking out a lead at this point may seem premature but it will give direction to the analysis Just remember that you will probably change the lead maybe several times before you are done As a natural outcome of projecting your analysis into the writing phase you will know more at the end than you did when you started Now go ahead with a rough draft you will not know what is missing until you layout what you have They say that William Faulkner once covered the Kentucky Derby for Sports Illustrated It was a beautiful work of descriptive prose that made no mention of the winning horse 0 Now you can start working on thoroughness remember this is analysis Do the details support the lead If yes what questions are left unanswered by the details If no what lead do they support Does the lead reflect what is most important in the details If not what is Bang the lead against the details and the details against the lead keep doing it with each change or addition Focus and refocus Expand your research Write and rewrite The goal is to get the lead and the details in perfect balance That is a quick way of saying that the details should add up to what the lead says and the lead should be a summation of the details It is like reconciling your checkbook If the two are not consonant you must find out what is wrong and fix it This may mean looking for new data reinterpreting the data you have or eliminating doubtful data and reconsidering your conclusion U'fiere tfiere is a surfeit afwaf is tfiere is afamine afideas il nonymous copieafrom an il ir Force lUi '13rief@1980 U Once the report has taken shape start tightening it up Tight writing is the perfect tool for detecting the less obvious gaps in your report and exposing inconsistencies in your analysis Fat writing works like static on a radio it clouds the factual and covers the spurious Tightening the narrative eliminates the static It allows you to see what is really there You can tell what works and what does not Get rid of the latter and build on the former Exclude every word phrase or sentence that does not contribute What works for you when you are thinking analytically will work for the reader With some customers the title is your only chance to score U Now review the whole report Have you answered all the questions you can and balanced the details with the lead Is it the right lead does it work If so write your title The lead had to be the most concise summation of the report but the title should go even more briefly to the core of the lead invoke the most significant element s in the report and compel the reader to check the lead With some readers the title is your only chance to score Finally be sure that the title lines up with the lead and the details as inalterably as they align with each other U There is no need to follow you through the necessary final edit for readability punctuation spelling etc The report is written your analysis is done U The advantage of writing as a continuation of analysis is that it quantifies the analytic process It provides a template that displays the analytic transformation of intellectual concepts into a measurable testable thesis That template is made up of procedures already imbedded in SIGINT Journalism Thus it comprises a system that is already taught as the correct way to write reports U Maybe our philosophy of how to train intelligence analysts to analyze ought to embrace and overlay our method for teaching them to write reports Writing as a continuation of analysis offers that kind of approach The outcome to be hoped for would be better analytic results more clearly and cogently presented in more widely read and influential reports UNCLASSIFIED 8 DOCID 4012045 L SBCRET CRYPTOLOG 86-36 Summer 1995 Journalistic style yes creeping Clancyism no st CltE'f EO 1 4 c ttANfiLt VIA COMIN'f CItANN r ' jNet 9 DOCID 4012045 SECRE'f' CRYPTOLOG Summer 1995 P L 86-36 Managing Linguist inLow-Density Languages bylL - ----I I I i 10 ItANf L VIA COMIN'f' CIIANNELS ONVI P L 86-36 EO 1 4 c P L DOCID 86-36 40120451 4 c SECRET CRYPTOLOG Summer 1995 SECRET HANDLE VIA COfftIN't'CHANNEL8 ONVl 11 DOCID 4012045 8ECRE'F P L 86-36 EO 1 4 c CRYPTOLOG Summer 1995 SECRET 12 HANDLE VIA CO nN't' CHANNELS ONVl p L DOCID 40120llfsl 86-36 4 c SECRET CRYPTOLOG Summer 1995 SECRE HANDLE VIA COr HNT CHANNELS ONIX 13 DOCID 4012045 P T 86 EQ 1 4 c SECRET CRYPTOLOG Summer 1995 SECRET 14 IY N B B VIA COPtIIN'f' CHANNELS ONL l P L DOCID 86-36 oo 12 0 'd 51 4 4O c SECRET CRYPTOLOG Summer S ECR R'f' HANDLE VIA CO nNT CIIANN ELS ONVl 1995 P L DOCID 4012045 86-36 SEC Tl 4 c CRYPTOLOG Summer 1995 SECRET 16 HANDLE VIA COffIlNr p CHANNELS ONVl P L DOCID 86 36 401 Q445 c CRYPTOLOG Summer 1995 SECM 'f HANDLE VIA COr UN'f' CIlA-NNEL8 ONIX 17 ---- DOCID 4012045 Sf3CR E'f' CRYPTOLOG Summer 1995 P L 86-36 EO 1 4 c 18 HANDLE VIA COftIIN'f' CIIANNf3LS ONLY DOCID 4012045 FOIt OFFICIAL USE ONL ' CRYPTOLOG Summer 1995 The National Information Infrastructure NIl byl _ P L 8 6-36 U The NIl is a Presidential Initiative whose purpose is to expedite the rapid deployment of advanced computer and communications infrastructure needed for a strong economy in the next century and making our nation more competitive in the international environment According to the NIl vision document Agenda for Action which was published in September 1993 the NIl is the seamless integration of communications networks computers information and people which will provide all Americans with the private and secure information they need when they need it where they need it at an affordable price This paper describes the background and relationships of the NIl with respect to the forming of an Information Infrastructure Task Force I1TF summarizes NSA's NIl participation during the past year and highlights some of the key NIl outstanding issues from a national and NSA perspective Background U As the focal point for NIl activities the White House Office of Science and Technology OSTP and the National Economic Council NEC formed the Information Infrastructure Task Force I1TF in July 1993 to articulate and implement the Administration's vision for the NIl Commerce Secretary Ron Brown chairs the I1TF see Figure 1 which consists of Government senior-level representatives three major committees a security issues forum and a private sector advisory council Telecommunications Policy Committee - formulates a consistent Administration position on key telecommunications issues such as radio frequency spectrum management universal access to services network reliability and vulnerability international perspectives related to the emerging Global Information Infrastructure GIl legislative actions and adequate competition among service providers Information Policy Committee - addresses critical information policy issues such as intellectual property rights protection of individual privacy rights and the dissemination of government information to the public sector Committee on Applications and Technology - coordinates applications and technology policy efforts to develop and apply state-of-the-art technologies in areas such as health care government services education manufacturing electronic commerce and other applications NIl Security Issues Forum - coordinates security cross-cutting efforts across the Committees and Working Groups of the I1TF with respect to confidentiality integrity and availability of the information and systems carrying the information NIl Advisory Council - as established by a Presidential Executive Order advises the Commerce Secretary on matters related to the development of the NIl There are 37 distinguished members from industry labor state and local governments and public interest groups on the Council This body is concentrating on three main Mega-Projects NIl visions and goals driven by specific applications NIl access and universal service and privacy security and intellectual property rights U In conjunction with the I1TF there is a host of other Government organizations who have a vested interest in the NIL As illustrated in Figure 1 these include National Science Technology Council NSTC reviews and prioritizes R D efforts across the Federal Government The NSTC is a Presidential Council similar to the National Security Council or National Ecoc nomic Council and it consists of nine committees one of which is the Committee on Information and Communications R D The relevance of this committee is that it oversees the High Performance Computing and Communications HPCC Presidential Initiative The HPCC has five R D component areas mainly High FOR OFFICIAL USE ONLY 19 DOCID 4012045 FOR OFFICI A L USB ONLJPY CRYPTOLOG Summer 1995 u comm John Toole ARPA uca IOU High Perf Comms UTA Sci Eugr Compo n onna Ion 0 ICy Sally Katzen OMB Government Infonnation Intell Property Rights Privacy Tom Burke A GSA Rich Riley Treasury ecun y Workiug Group Steve Squires ARPA Dennis Steinauer NIST John Okay USDA orce Larry Irving NTIA Dennis Bodson NCS ee orce Carl Ripa Bellcore Performance Computing Systems National Research and Education Network evolved into the Internet Advanced Software and Technology Basic Research and Human Resources and Information Infrastructure Technology and Applications which is directly related to the NIl High Performance Computing and Communications Information Technology Subcommittee HPCCIT - plans for and implements the HPCC Initiative under the auspices of the HPCC National Coordination Office There are ten Agencies on the HPCCIT and the NSA Chief Scientist Mr George Cotter represents NSA on this panel as well as the NSTC Federal Networking Council FNC - administers the Internet in principle and is chaired by the National Lowell Thomas GTE Science Foundation The FNC has five working groups and one of these groups the Network Security Working Group is addressing and formulating a security plan for the Internet Federal Wireless Policy Committee FWPC addresses Federal Government concerns and issues on wireless communications There are four subcommittees and a users forum and NSA participates in all of these arenas Wireless communications will go hand-inhand with cable satellite terrestrial and fiber optics media as conduits for NIl applications and services DoD NIl Working Group - serves as a focal point in DoD for NIl activities and interests DISA ASD C3I JCS DDR E NSA ARPA and OASD ES participate on this group FOR OFFICIAL USB ONLJPY 20 i'1 - - ---------------- DOCID 4012045 FOR OFFICIAL U ONLY CRYPTOLOG Summer 1995 National Security Telecommunications and Information Systems Security Committee NSTISSC - sets national policy for the security of national security systems with respect to telecommunications and automated information systems The NSTISSC consists of more than 21 participating Agencies and observers various working groups and an NIl Task Force only government systems but must accommodate other important national objectives as well the availability reliability and integrity of systems which support our economic infrastructure the protection of public safety and the provision for law enforcement the provision for foreign intelligence ensuring and enhancing the privacy of all Americans and facilitating a secure NIL National Communications Systems NCS - oversees and addresses the operations security and workings of the U S communications systems such as the public switched network The NCS has many working groups and an NIl Focus Area Team POVO During the past year NSA representatives have contributed to many of the deliberations of the Administration's IlTF and various NIl working groups see Figure 2 In particular the following summary describes some of the more recent contributions to the IlTF and miscellaneous NIl activities National Security Telecommunications Advisory Committee NSTAC - advises the President on matters with respect to telecommunications networks national security and emergency preparedness and other areas Members of the NSTAC are from the private sector and there are numerous working groups and panels one of which is the NIl Task Force P L a Congressional Office of Technology OTA Assessment - Over the past year the NSA NIl PMO and Legislative Affairs Office worked closely with OTA to provide information participated in various workshops coordinated participation by other NSAers and reviewed draft portions of a report on Information Security and Privacy in Network Environments A key objective of that dialog was to ensure that the scope of the INFOSEC problem was fully understood by OTA and that the issue of encryption policy a principal focus of their report was addressed in a balanced and meaningful way 86-36 NSA NIl Participation FODO Realizing the importance of the NIl and the potential for NSA contributions the Director endorsed an initial NSA Plan for NIl participation in September 1993 A result of the NSA plan was the formation of an Agency NIl Steering Group which is led by the ADDI to provide guidance and direction to NSA's NIl related activities as well as serving as a forum to coordinate and resolvc NIl cross-key component issues of importance to NSA Similarly the Director approved the establishment of the NIl Process Management Office NIl PMO to identify plan for and provide the required day-to-day focus support and coordination of NSA NIl -activities consistent with Agency mission strategies The J HI PMO originated in b Security Issues Forum - NSA attends meetings as the representative of the National Security Telecommunications and Information Systems Security Committee NSTISSC NSA prepared a report on useful security tools and techniques raised the level of concern and initiated a government-wide effort to increase security training and awareness of computer systems administrators and provided substantial comments on a draft NIl Security Report J c Privacy Working Group - NSA contributed significantly to working group discussions related to privacy and privacy principles In addition NSA provided advice on information security technologies and practices CLIPPER and defensive INFOWAR As a result f our participation and contributions we have earned the trust of the Government's privacy community and are asked to provide our perspectives on working group and other privacy activities VB evolved int 'w 'dk now ides in VI Customer is the hief of the NIl Support Services ho is now Chief VI PMO replacing In addition an or mg roup of key component members was formed in February 1995 to assist the NIl Steering Group and NIl PMO address NIl issues develop strategies and recommend courses of action POUO NSA is also working with the National Institute of Standards and Technology NIST to support the Administration's NIl initiatives and to implement the recommendations of the Vice-President's National Performance Review It is believed that our national information protection strategy must not be limited to C' d Reliability and Vulnerability Working Group RVWG - NSA provided substantial comments on the writing of an RVWG action plan addressing network reliability and vulnerability concerns In addition NSA is a partner with NIST in the RVWG's Protection FOR OFFICIAL USE ONLJPY 21 DOCID 4012045 FOR OFFICViL USE ONLJPY CRYPTOLOG Summer 1995 ' ---- ---------- IITF OMMIp'E S I I oooo o o oo NSA DOD C3f Emmett Paige CMS Vacant SECURITY ISSUES FORUM DOD C3f f NSTISSC NSA I I I o I ODS A o D DP ID5o VI o oo ooo o ID5 NSA I T IT -----I GeorgeCQue Ch Sc GfTS - DoD Diane Fountairle o Tech Policy - NSA George cott r D5 mC NETWORK SECURITY WORKING G o U P NS q VI INCSC '3 o Telecommnnications Policy - NSA Denny Eshoo Q ReI Vulner - NSA i Universal Service NSA o Q 1 t ' ' ----I VI N S A Information Policl l y Privacy NSA VI I NSA George Cotter D5 ADDI Chairman L -_ _ _- I HPCCIT SUBCOMMITTEE 1 - -- II Applications Tech Policy oo o ooooo NSA NSA's NIl Steering Group I WO NG f-' ----c- ------ GROUP I oo FWPC or NSA Primary Rep IVI NSA Alternate Rep tan Johnson X2 Standards Req Subcomm NSA Rich Dean R2 NSTISSC Nil TASK FORCE NSANII PMO VI 1 I NSA _ _---'IVI IVI Task Leader 1 o NSTAC Nil TASK FORCE I NSA 5 NATIONAL COMMUNICATIONS SYSTEM fNCS I V Committee of Principals - NSA Committee of Representatives NSA L _ _---Jl VI 4 7 95 Rev 5 of the Network sub-working group and we are helping offered our insights into security needs for these emergto identify community-wide network infrastructure pro- jng efforts We al Q participated in a survey of NSA prog ms and projeds which may e nhance the acceleration tection issues and recommending solutions of the NIl and submitted more than 20 candidate efforts e Risk Assessment - Under the RVWG action LastQf all we participated with NIST to evaluate and plan NSA was nominated to be the office of primary offer irtput on the Worldwide Web NIl home page responsibility for one of the actions on NIl risk assessment In particular this action calls for the identification g Miscellaneou 1 ctivitiesof risks to the reliability and availability of NIl networks and services and it is concerned with new uses of exist 1 I1TF -At the re luestof the Administration the ing technologies and uses of emerging technologies NIl PMO recently work qwith Commerce personnel to f Committee on Applications and Technology have DDI Mr EdHart ecome a formal member of NSA reviewed and critiqued all of the committee's the panel applications services and technology documents and FOR OFFICIAL USE ONL l 22 P L 86-36 DOCID 4012045 FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 2 NIl Security Infrastructure - NSA assisted NIST and GSA to establish a Government-wide security infrastructure office and integrated NSA personnel into GSA's new Security Infrastructure Program Management Office 4 Federal Networking Council- NSA is contributing in this community wide effort to develop an Internet Security Plan carried on these systems Much of these media will be interconnected in Cyberspace however some will not The private sector will be building and implementing the NIl while Government's role and responsibility will be to provide leadership in certain areas serve as a facilitator and catalyst in removing legal and regulatory barriers e g the Telecommunications Act of 1934 promote competition provide better access to Government information improve Government procurement and distribution of benefits and promote policies that will support a viable secure information infrastructure for public and private institutions 5 Information Policy Committee - NSA contributed to the document on intellectual property rights principles 0 Some of the more pressing national NIl issues which are on-going and have yet to be resolved include 6 Telecommunications Policy Committee NSA was invited to review and offer comments on the vision documents for the NIl and Global Information Infrastructure GIl and provided input for the Committee's FY9S Work Plan a How much of a leadership role should the Government have in the definition architecture development and implementation of the NIl 3 Federal Wireless Policy Committee - NSA chairs the Standards and Requirements Subcommittee and took the lead in writing the Wireless Standards Plan 7 National Performance Review NPR - NSA is supporting OMB and NIST on at least four actions with respect to security information technology and tasked to take the lead on another effort 8 Briefings and Workshops - NSA has briefed key NIl leaders and officials e g OSTP NEC OMB DoD Commerce GSA OTA GAO etc on protecting unclassified but sensitive information and the vulnerabilities of our national systems Similarly we have helped energize NSTAC members to begin to address new security emergency preparedness issues and arranged for the State Department in providing an NIl international organization briefing to the NSA G41 Telecommunications Technology Forum National NIl Issues U Throughout much of the discussions on the NIl questions arise such as what is the NIl who will build it is it here now what do I do with all this information and what should be the role of the Federal Government in the NIl U To answer several of these concerns - the NIl is already here in an elementary form One definition that I like is that the NIl is a combination of the phone system cable systems private networks the Internet video dial tone wireless direct broadcast satellites and the information services and applications that will be b How should current Federal and State laws regulations and policies be changed to be more attuned to the NIl e g computer crime First Amendment Rights etc and the Information Age c How should the Universal Service concept be extended to ensure that information resources are available and accessible to all Americans d How will intellectual property rights be protected e How will privacy be ensured and who will provide it f How will information security and network reliability be ensured and who will provide it g Who should develop standards for the NIl and will it be interoperable h the GIl How will the NIl interconnect and work with i Is there a DoD and Intelligence Community role in the NIl NSA NIl Issues - Y8UOjNSA interests in the NIl appear to be multiple and multi-dimensional and encompass both the SIGINT and INFOSEC missions Within NSA there is also an on-going debate with respect to the following issues and concerns FOR OFFICIAL USE ONLY 23 DOCID 4012045 FOIt OFFICIAL USE ONLY CRYPTOLOG Summer 1995 a How does NSA NIl participation fit into the overall Agency mission strategy e g Equities INFOSEC INFOWAR Export SIGINT Computer Security Act etc g Should NSA only participate in the DoD Defense Information Infrastru cture DII portio 1 of the NIl What are the specific NSA objectives for participating in the DII and can these be applied to the NIl b What are the NSA specific goals or objectives for participating in the NIl Why should NSA concern itself with the NIl h Other Government Agencies seem to be getting more involved in INFOSEC research and development efforts Should NSA be taking more of an lNFOSEC leadership role for the Government with respect to unclassified but sensitive information c Should NSA interests in the NIl be from an INFOSEC only perspective or should it be an Agencywide perspective d Should the NSA Board of Directors be more involved in addressing NIl cross-component issues e In many public meetings in which we participate NSA takes a lot of criticism and flames because of who we are and what we do If we do not have a position on these criticisms or issues that is a position in itself-failure to make a decision is a decision f Does the Computer Security Act of 1987 limit our participation in the NIl If it does how should it be changed What role should NSA have in protecting unclassified but sensitive information in the Government and private sector domains i What impact will the Administration's Security Policy Board Security Policy Forum have on NSA as well as our involvement in the NIl j The NIl is evolving into the GIl What are the NSA interests in the GIl k What is the NSA strategy for using the Internet Do we have any strategic intent into securing our Internet hosts How do we plan to easily import information from the Internet into our internal systems The author would also like to th Tlkl who recently left the Vl NIl PMO Jor his contributions to this paper N B The view texpressed in this paper are those solely of fhceauthor and do not necessarily represent any SAorganization or entity P L 86-36 For more information on the Nil I contributing reports on various NIIrelated meetings and decisions and providing press articles on the NlI He also maintains the NIl Calendar of Events updated monthly August - October 1995 Updated 15 Aug 15 August 7 September 20 September 21-22 September 22 September TBA September TBD 11 October TBA October 24 I DOCID 4012045 CRYPTOLOG Summer 1995 What's This New Intercept I'm Seeing b I SECRET Ht NBLE VIA C01 IINT CHAu'tNELS ONLJPY P L 86-36 o EO 1 4 c P L 86-36 25 - o I I DOCID 4012045 EO 1 4 c P L 86-36 CRYPTOLOG Summer 26 1995 JlA l tD SBCR ET Vb' CO 4INT CIJ NNBLS ONLJPY DOCID 4012045 SECRE'f' EO 1 4 c F L 86-36 CRYPTOLOG Summer 1995 8ECRE'f' ItANf tl VIA COMINT CItANNEL ONLY 27 DOCID 4012045 TOP SECRET UM BRz CRYPTOLOG Summer 1995 The Unfocused Eye P L 1 _ 86 3 bYI'---------1 -- FOtJ8' -It was the fifth of January 1993 at the Alabino All-Forces Testing Ground west of Moscow A smiling overcoated Russian bureaucrat in a black fur hat harnessed with a backpack radio and surrounded by uniformed figures was dancing up and down in the snow That evening a few seconds of hisnot-ready-forthe-Bolshoj performance were shown on national Russian television news and next morning several Russian newspapers carried an account of his comments I V EO 28 xOp i GR ii T UUBIV 1 4 1 P L 86-36 -- ' F DOCID 4012045 'f'Of SECRET U IBRA EO 1 4 c P L 86-36 CRYPTOLOG Summer 1995 I i I TOP SECRET UMBRA 29 i DOCID 4012045 rOP SECRt3 mfBRA CRYPTOLOG SUll mer 1995 Finding Things in the Dark U As a young recruit in the Navy Reserve I was taught how to scan a sectorofthese laLnighL D6 not' I Vassternlytold IObk directly at a point let your eyes relax as you' scan across the sector and wait for P L 86-36 something to attract your attention This had some' EO 1 4 c thing to do I suppose with the distribution of rods and cones in the human eye but also with the fact that the eye can focus on only one thing at a time Once we 'I I focus everything else becomes peripheral and other things are not so likely to be noticed until we relax our gaze or refocus it TOP SECRET UMBRA 30 DOCID 4012045 'fOP S CR Ji3T Ui IBIM CRYPTOLOG Summer 1995 P L 86-36 EO 1 4 c From the J istory Fue U Dr Sydney Fairbanks for 5 years the editor of one of CRYPTOLOG 's predecessor publications the NSA Technical Journal was besides a cryptologist an academician who taught languages and sciences at St John's and Harvard a translator an accomplished musician and he held a number ofjobs in the diplomatic and judicial realms His editoirials published in the NSA Technical Journal from 1956 to 1959 are entertaining as well as informative and surprisingly applicable today For example from April 1956 U The history of technical magazines at NSA is not unlike that of the city of Troy which was we understand destroyed by fire and rebuilt on at least five different occasions This is a matter from which both pessimist and optimist can draw legitimate inferences but speaking for the latter we say that the idea evidently has extraordinary vitality and we hope that its latest incarnation will be welcomed U Part of this vitality may be due to a certain fortunate fuzziness that shelters any ideal until the time comes to embody it There is always the danger that what the supporter has in mind is a journal full of articles on his own specialty-which of course any rightthinking person will understand and enjoy-plus a few outlandish disquisitions on other subjects which he needn't read Even with a Technical Journal devoted to one specialty we are told with perfect truth no one reads ALL the articles Unfortunately any attempt to edit the Journal on this basis but without bias would result in perhaps five little quarterlies each containing about one-and-a-half articles and united by nothing but the cover It does not seem difficult to prophesy that such a publication would fall apart Unless at least half our articles are interesting to at least half our readers we shall be hardly more than a rather clumsy unofficial adjunct to the existing system of reports 'fOP U To concede or admit this however is apt to fill the air with such choice missiles as popularizers intermediate training pamphlets writing down Do you mean a Technical Journal or a Scientific American all of them carrying a certain barb of truth but shaped we believe from a misunderstanding At least two-thirds of the unreadability of the average technical report is due not to unavoidable sophistication but to casualness An expert writing for other experts in the field can organize his material poorly express himself badly avoid deciding what his basic assumptions are and still be read with interest because they can almost unconsciously supply what is missing To reach a wider audience he need not write down he need only write better If enough of our contributors have the time and the energy to do this-and let no one underestimate the time and the energy that it takes-we believe that we can achieve the necessary level of general interest U As for the remaining obscurity due to what we have called unavoidable sophistication obviously it is no bar to publication The Journal has been urged to avail itself of the best minds in the Agency as specialists and referees and readers can be confident that they will not be deprived of any article merely because the Editor is not bright enough to understand it S CR E'f Ui fBRA 31 'TTIWl 3 'DOCID 4012045 FOR OFFICIAL USE ONLJPY CRYPTOLOG Summer 1995 Intelligence Analysis Off site and Open Forum P L ' I FODO The Intelligence Analysis Career Panel IACP held an off-site on 22 and 23 May 1995 In these open sessions the lACP asked for input on several issues from the DO Group Chiefs GBP1 and GBP3 Management Tech Track players interns aspirants and professionalized Intelligence Analysts The panel reached several decisions about where the IA Career Field needs to be going the need for corporate participation in and understanding of lA and the necessity of involving the IA technical population in reaching decisions about the health and future of the career field The most significant decision of the off-site was to rebuild the Intelligence Analysis Career Field around the pillars of Intelligence Research and Reporting IR Traffic Analysis TA and Information Services IS Professionalization criteria will be adjusted to reflect this orientation After acquiring a strong base in the aspects of the career field that are common to all three pillars individuals will focus on one of the three areas With the help of the appropriate senior managers we will be guiding individuals toward those skill areas which are in particular demand After the Ithe panel felt it was necessary to hold an proceedings of the off-site were published Open Forum to give people the opportunfty to listen to the results and recommendations of the off-site and to make any comments or suggestions voice concerns or ask questions The Open Forum was held in the Friedman Auditorium on 11 July a summary of the question-and-answer session is included here I ' State of the IA Career Field U In opening remarks'il reviewed the incentives that prompted the off-site Over the past 6 months a major subcommittee of the IACP had been meeting to perform the periodic review of the IA criteria During the review several issues repeatedly surfaced that could not be resolved in the regularly heldilACP meetings In addition the IA Tech Track Review Panels TTRPs had been having some difficulties evaluating applications that fell outside the traditional realm of the IA predecessor fields of Intelligence Research IR and Traffic Analysis TA These problems needed immediate concentrated attention hence the decision to hold an open off-site that would bring all the major players together I U For the sake of those that have either forgotten or never knew the reasons for the merger of the IR and TA career fields here is a review of the start and subsequent progress of the lA Career Field FOUO In the late 1980s several groups Project Reload the Blue Ribbon Panel Studies the Future SIGINT' Capabilities Stud and the M4 Future Skill Mix Stud concluded _--- --- ----' Furtherm'ore there was a need to develop future analysts i eporters with br6ad based ftindamental SIGINT knowledge 90upled with a higher level of analytic skills T em ajor initiative that resulted from these studies was the creation of a new career field for P L 86-36 analysis and reporting This decision was concurred in by the DDO Group Chiefs the Chairs of the IR and TA panels as well as DDO DDT DDA and the Director A Transition Panel was established in February 1988 with members from the IR and TA Panels representatives from Policy and Career Development organizations in M and the NCS This panel worked closely with all parties affected by the change It purposely moved slowly and deliberately to make sure everything was right The IA Career Panel was established in February 1990 while the Career Field itself officially came into being in January 1991 The first Intelligence Analysts were certified in the beginning of 1993 FOUO By 1993 the lA career field had been around long enough that the IACP was make some judgements about its strengths and weaknesses or perhaps its advantages and disadvantages One of the significant conclusions at the criteria review conducted during 1993 was that it was unrealistic to expect aspirants to get through the dozens of NCS courses required for certification This prompted the IACP to strengthen the core courses with the aim of creating a journeyman at professionalization and of eliminating the requirement that an aspirant specialize in one of the IA skills The lACP howeyer continued to emphasize the need to pursue additional training which would serve to refine or develop one's expertise in one of the core IA disciplines i e specialization and accordingly developed a post-professionalization program-the Agency's first such FOR OFFICIAL USE ONVl 86-36 DOCID 4012045 FOR OFFICIAL USE3 ONLY CRYPTOLOG L S ummer 1995 86-36 program-which provided a structure whereby analysts and their supervisors would meet with an IACP executive to develop a coherent continuing education plan after certification additional details are available in the Panel office Also at this time the names and definitions of some of the IA skill areas were clarified I Other new programs that have been developed over the past two years have been the IA portion of the Agency Tech Track Program the IA and Agency Cross-Training Programs and the newest one the Skills Enhancement Program II What is Intelligence Analysis Is it serving the needs of the Agency What needs to be done next FOUO During the off-site the IACP often found itself discussing the question What is IA The fundamental conclusion was that IA is a diverse broad field made up of analysts with a variety of skills and assets This breadth-althou h often difficult to describe-is its reatest stren th A summary of other actions and rec ommendations follows FOR OFFICIAL USE ONLY P L 86-36 33 DOCID 4012045 CRYPTOLOG Summer 1995 based on the technical leadership perceived lack of Initiate ways to encourage and organize mentoring of lAs pursuing membership in the Tech Track by senior members and masters action TTRPs IA Masters Senior Management IACP Until the issues of feedback mentoring are resolved or changed the TTRPs still need to provide feedback to the IACP Exec for Tech Track aspirants Discuss the pros and cons of Tech Track positions action IACP with input to and from DDO DDS THAB and Senior Management III Assessment of the IATech Track POUO The TTRPs have found several significant challenges as they have conducted the peer reviews of Tech Track aspirants First their job is made more difficult by the breadth of the IA career field They are concerned for those on the periphery of the IA world the staffers those working primarily in ADP as it relates to lA those who might be more connected to the signals aspect of the IA skill area of Signaling Technology etc Secondly each TTRP as well as the IACP itself is determined to maintain the integrity of the IA Tech Track program There was extensive discussion on the need to cultivate a better understanding of the IA Tech Track program with all parties concerned The discussions led to several actions many described in the previous section such as identifying the IA Career Field and its parts developing a relationship with the TTRPs and the IA Masters developing a better understanding with senior managers on their technical needs Other actions Better define the height of the step one needs to take to get into Tech Track action TTRPs and IA executives then recommendation to full IACP H lp lAs see the benefit of applying to the Tech Track action TTRPs and IACP Incorporate more specific examples into the IA Tech Track criteria to give more guidance to the TTRPs action IACP Resolve the issue of Technical Leadership at the Member level This issue has now been resolved The IACP with its newest TTRP members present decided not to make Technical Leadership a mandatory category for the Member level This will affect approximately 16 individuals who were denied titles in the past I i I I I I Followmup The IA Open Forum P L 86-36 I with a We believe that having flexible training requirements will better meet the needs of all aspirants This isn't a sudden shift in midstream it is a move that will enable an aspirant to take courses that are more directly pertinent to one's current job in the lA field We're not asking for more or different courses we're asking you to take a major role in developing your career within the boundaries of lA This direction is also more in line with the NCS training philosophy It will eliminate the problem of taking classes merely to become professionalized and will allow aspirants to take training that will enhance the skills they need for their current and future IAjobs The idea of an integrated lA Career Field for the cryptologic system of the future is not dead The IA Career Panel has continued--even renewed--confidence in the interdisciplinary and multidisciplinary vision encompassed by the Agency's decision to create the field several years ago From time to time we make additional course corrections but these should not be seen as the reason for individuals to fear that their careers and programs will be harmed by constant tinkering with the system We'll do our best to ensure that professionals and aspirants who enter the process under a given set of rules will be allowed to professionalize under those rules Now one more thing from some of the e-mail we received there was some confusion as to where someone might fit in the whole scheme of things Briefly there are basic professionalization and post-professionalization programs FOR OFFICy L US ONIX 34 pen d the fo um review of the proceedings of the off-site addmg o _ LJ DOCID 4012045 hi d FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 Professionalization aims at creating a journeyman in the IA career field With the breadth of the program there is a definite advantage to certifying in IA it gives you a broad base with some specialization from which to attack numerous varied IA challenges Those who are already professionalized in one of the IA predecessor fields have other choices An individual may choose to get a second professionalization in IA and further develop the broad understanding of all aspects of the IA career field On the other hand he or she may decide to deepen an already' acquired skill One can do that by aiming toward a post-professionalization certificate This program emphasizes the need to pursue additional advanced level training after professionalization which will serve to refine or develop one's expertise in one of the IA skill areas Individuals interested in this path must be certified in IA in one of its predecessor fields or in a related field and must be working in the IA field Again we stress the absolute involvement of the individual and his her supervisor in the development of a training plan that will orient them in a specific direction and cater to his her personal and professional needs Our IA Tech Track Program recognizes the post-professionalization program under the category of Advanced Education and Training By the same token Tech Track also recognizes all the work that goes into acquiring a second professionalizatiori You can get additional details on these programs from any of the panel execs L - Wjt Jwho all t h at said I would l i ke t o introdllceD along with the rest of the panel will be happy to answer any of Y9wquestions and address p L 8 6 - 3 6 your concerns Summary of Question-and-Answer Period months after you've signed up for it We can't do that right now but we are working very closely with the NCS to workout problems to develop courses to meet the IA needs and to prioritize our requirements There is a woeful lack of course available at the NCS for those who might be interested in pursuing the Information Services pillar of lA What is the IACP going to do about that We have been looking into outside classes that will provide the training needed by someone working in the IA area of Information Services We acknowledge that we are obligated to provide the training from other sources if it is not available at the NCS How is the IACP going to resolve the tug-of-war between operational necessity and need for training This is an age-old conflict The NCS is looking at new ways of bringing training to the individual when and where they need it so that training will be an more integrated part of one's daily business The flexible professionalization program we are proposing hopefully will go a long way toward resolving some of these problems How do courses dealing with Signals Research fit into the Post-Professionalization program courses such as those sponsored or offered by the old ES The IACP has always felt that the courses on understanding networks packet switching etc are exactly in keeping with our needs to attack the challenges of the Global Intelligent Network They have always been accepted in the Post-Professionalization Program and will continue to be accepted Concerns about availability of NCS classes Tech Track Questions What is a reasonable period of time in which one might expect to get the courses required for professionalization I have been waiting quite some time to get certain courses Why do the standards and procedures for the IA Tech Track program in A and B Groups seem to be so different The delays that many people experience in getting courses may be due to a lack of space and or instructors The NCS 'like the rest of the Agency is being asked to do more with less They have to depend on lAs from DDO and DDS to jump in the void and become adjunct faculty members for the IA courses required for professionalization In fact the IACP regularly encourages and solicits individuals to become adjunct faculty We firmly believe that one must give back to the career field by mentoring and teaching It would be wonderful if we could guarantee that you would get a course within When the IACP first wrote the standards and criteria for the IATech Track we spent a lot of time conferriJ lg with the different players to get their opinions The resulting document purposely gave the TTRPs the latitude to deal with the variety and breadth of the IA Career field Since the first document the TTRPs have had the time to work with the document and have found that it needed some adjustments or fine-tuning That has been done and the TTRPs are definitely working from the same document However there are some issues that are larger than the IACP and the TTRPs-issues FOR OFFICIAL USE ONLY 35 DOClD 4012045 FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 such as whether or not to do interviews the role of managers in tech track etc These issues are currently being addressed by the Key Component Tech Health Advisory Boards THABs Does staff work A05 B05 P05 apply toward Tech Track A number of people are under the impression that staff work doesn't count i The IACP feels strongly that staff work definitely is a part of the IA career field Editing developing the USSIDs that govern lA work preparing video reports or the SIGINT Digest and developing the standards for the career field are all vital aspects of the IA field These are broadening assignments that enable one to understand all aspects of the IA process Mr Goldsmith also noted that individuals probably should not spend their careers in staff positions since one needs to refresh hone one's skills in a target office and contribute one's expertise at that level on a regular basis Why is there such a time lag in evaluating IT applications Most tech track applications are evaluC ted fairly quickly B Group has had the largest number of applications and has been working diligently to clear up the backlog The problem is that the ITRP will review two applications and four more will come into the Panel office The approximate period of time needed to evaluate the applications from members of B Group is 3 months One of the changes we've recently made was to start including specific feedback with the notification letter This will at the least decrease the time differential involved in getting feedback to the individual What type of incentives is the DDO THAB planning for TT members in comparison to the DDT initiatives It is worth noting that the DDO THAB authorized expenditures for technical seminars and conferences over the past 18 months that exceeded the DDT's proposal This was done without the benefit of a specific incentive plan and details have been posted to the Technical Track topic on Enlighten At the same time they have been working on a comprehensive incentive plan that would include technical enhancement initiatives such as book purchases etc Approval of such a program is complicated by the fact that in order to provide the DDO IT members with a package similar to the DDT package it would entail an investment of roughly $2 5M contrasted to the DDT $250K A budget line of this magnitude at a time when we are counting pennies has a difficult path to approval and must be roundly supported and carefully accounted This is an issue that requires patience and understanding It is not one that is being or has been ignored input fm Dale Roberts P04 Tech Track Plan Director When will management incorporate technical leaders as a part of a decision-making team This is a two-part process First managers must recognize the value of using the leadership skills oftechnical experts on projects those experts should be tapped on the shoulder and asked to be part of a team That is happening in some parts of the Agency but not all By the same token the technical expert must stc p up and volunteer He she should volunteer to take on the leadership role in a project and sell his her worth to managers Eventually technical leaders will become an integral part of management teams If I move from DDS to DDO is the Tech Track title I received in DDS still valid Yes this is an Agency program The title you receive in one Directorate is absolutely recognized in the others Professional Development in IA What level of competency does the IACP expect at the journeyman lel'el As one is professionalized we expect that you should be able to come right out of the starting gate and tackle a challenging IA problem You might not be able to succeed at every aspect but you will know where and to whom to go The broad range of skills possessed by an IA will enable you to exploit a target without having someone hold your hand How does Post-Professionalization fit in with the recommended changes to the criteria How many pillars will there be This is still under discussion in the lACP Where does layout and design video reporting and SIGINT Digest-type work fit into the IA career field Is it considered part of IA These fields are absolutely an essential part of IA When will the changes be implemented We hope to have any changes in place by the fall FOR OFFICY lL US ONLJPY 36 DOClD 4012045 FOR OFFICIAL USE ONLY CRYPTOLOG Summer 1995 The IACP hopes to hold an Open Forum at least semianf ually as a public vehicle to voice concerns In the meantime feel free to contact the IA Panel office 963-1818s or hllO@nsa or any of the members of the IACP toDDSTHAB Bill Nolte P054 o has a title in the IA Tech Track P L 86-36 I ' FOR OFFICY L US ONLJPY 37 DOCID 4012045 SECRET P L 86-36 CRYPTOLOG Summer 1995 IA VSeTA IR - An Editorial b _ _ ----ll EO 1 4 c P L 86-36 Semantics S-CCO Take the term analysis as an example Which of the following can be considered analysis as performed by an IA a Developing UNIX PINSETTER shells and computer tools used by lA's to analyze traffic fEt When I decided to attend Monday and Tuesday's Off-Site of the Intelligence Analysis Career Panel IACP I was unprepared for the evident polarization of views with regard to the Intelligence Analysis IA Career Field Since becoming an IA intern in June of '94 I've become convinced that the decision to merge the Traffic Analysis TA Intelligence Research IR and Information Services IS Career Fields was a good one and was a bold and refreshingly innovative step towards equipping analysts with the breadth of skills necessary to meet present and future SIGINT challenges Not all share this view On Monday some vocal members of the IA Technical Track Review Panels TTRP voiced concern over the need to place a clear definition of what an IA is There was also some confusion over what constituted analysis on the job Keep in mind that most TTRP members are not lA's They are professionally certified IR's TA's or both and occupy IA COSC's The problems arise when these people are required to review the experience and education of a technical track applicant and grant them Member Senior Member or Master IA status based on a very general set of guidelines The guidelines were purposely written that way to allow flexibility in determining what experiences and education applied or developed the skills associated with Intelligence Analysis Unfortunately not all agree on what those skills are and several applicants have complained that they did not receive the status they felt they deserved e Working with data-flow personnel to try to determine if a recent drop-off in activity might have to do with the change in field reporting format f Conducting research in the resource center in response to a Request For Information from an Office of Primary Interest OPI analyst U If you're a trained lA you're likely to say that each of these examples falls within the domain of intelligence analysis IR's and T so endon tagree p L 86-36 lone of the first graduates from the IA Intern program and previous council chairman defin an Tntomgenco An ly 1 I1A BLE VIA 1I likethis defini- I L - tion and when I compare the above examples I find that each one applies The semantics problem is not only one of definition It is equally one 1 call bias of association What I mean is that whenwe hear the terms Reporting and S CRET 38 P L 86-36 EO 1 4 c COMIN'f' CHANNELS ONL r r DOCID 4012045 EQ 1 4 c P L o 86-36 CRYPTOLOG Summer 1995 Traffic Analysis we tend to envision analysts doing very specific kinds of things The two jobs don't even appear to be related in any way when we conjure up these traditional images Some TTRP members seem to believe that the skills associated with each are So different that one cannot successfully do justice to both disciplines I would agree if we had unlimited resources and well-defined static targets but in our current reality I disagree Generalists Or Specialists U We have to rethink the way 'we do business you'll hear this as much as more with less and career field architectures of the past read IR and TA are for good reason casualties of necessity The IA Career Field Again U As with any completely new endeavor the field has endured growing pains There is resistance from the subsumed career fields the ambiguity of its definition and a lack of understanding of its content and objectives on the part of the rest of the Agency Further complicating matters is that we don't have enough facts rather than opinions upon which we can properly judge whether the new career field is meeting the organization's and our national needs EO 1 4 c P L 86-36 SeERf IIANBLB lilA COr UNT EIIANNeLS ONE'i 39 a DOCID 4012045 CRYPTOLOG Summer 1995 Whither Now For at least the third time since its inception in 1990 the criteria of the IA Career Field are under review and will likely undergo change A decision has already been taken to drop Technical Leadership as a requirement for Member-level status in the IA technical track and we are moving forward on defining IA based upon the structure of its Three Pillars These Pillars are identified as IR TA and IS D I'm apprehensive about using these terms so aggressively when discussing our architecture for two reasons 1 The Bias of Association which occurs at the mention of IR and TA and 2 The IA program required courses and experience encompasses so much more and is greater than the sum of its parts What about Signals Research Target Development and Collection L 86--' 36 1 4 c D While perhaps having so many general skill categories as we currently do is somewhat cumbersome and confusing I feel we do more damage than good by using the terms IR and TA to describe the Pillars of our career field unless we've erred and wish to go back to the past that is D Of course this is all my opinion and as I've attempted to show everyone has one I think however that there are some valid opinions still left unheardthose of the IA Interns and especially graduates of the program and their supervisors It is our responsibility to make sure that our mentors know whether or not we feel as if we're getting the kinds of experience necessary to carry this Agency through hard times and into the 21st Century I urge you all to let them know immediately The Phoenix HF An Editorial by N C Gerson R52 D A recent note in NATO's Scientific Technical Planner STP acknowledges that HF is not dead but is a reli ble contender for long-haul communications NATO found that on a cost basis per message or per year HF is cheaper and about as effective as more costly and sophisticated satellite circuits In short NATO discovered what 40 SECRET HANDLE VIA COl'fHNT CIIANNELS ONLY EO 1 4 c P L 86-36 DOCID 4012045 CRYPTOLOG Summer 1995 NSA's Lessons Learned Database 'P L 86-36 by Ben Cwalina N25 I U Would you like to know what lessons NSA has learned lately If Y llhave v ilable on your cornputerJhenit's easy Look at the Directorate for Plans Policy and Programs DP h jmepage and click on the Cryptologic Lessons Learned btlt ton under DP PRojects and Publications or under NSA Projects Programs 1 lAtter entering the database you will see the menu that provides the categories of lessons learned Crisis Management Security SIGINT Interoperability and Communications A very important part of the database is the keyword search You can place any word in the search area and within seconds if a lesson was ever written using that word the lesson number will aDDear on your screen 1 I 1' I i' ----'1 Here is a sample EO 1 4 c P T I Rh- I' I 1 U TITLE Near-Real Time Intelligence NRTI P L 86-36 2 U KEYWORDS 1537 1536 1519 1539 1543 1549 1559 3 U OBSERVATION On December 19 1994 the Washington Post reported that the USS Kitty Hawk a U S battlegroup carrier had located and trailed a Chinese nuclear submarine operating in the Yellow Sea from 27 to 29 October 1994 5 U LESSON LEARNED New technology displays the value of SIGINT P L 86-36 EO 1 4 c 8 ECRE WLl fDL i VIA CO UNT CllhNNEL8 ONLY P L 86-36 41 i DOCID 4012045 SECRECf CRYPTOLOG Summer 1995 The 1995 Joint Mathematics Meetings ed b I P L U The Joint Mathematics Meetings of the American Mathematical Society AMS and the Mathematical Association of America MAA are the annual event for mathematicians in the United States The 1995 meetings took place in San Francisco California from January 4 through January 7 and offered a panoply of happenings which cater to the variety of interests of the 4000 registrants and 400 exhibitors The short courses invited talks and contributed-paper sessions allowed us to learn about current areas of research and interest in both academia and industry But the Joint Meetings proffered much more than these trappings of a traditional technical conference Many other sessions organized by individuals as well as professional organizations delved into related issues The variety of other issues addressed included teachi 1g and learning titles include Calculus from graphical numerical and symbolic points of view Learning styles approach to mathematics instruction Teaching with original sources career considerations Mathematical preparation of the technical work force Learning about today's job market for mathematics Ph D s How to help your students prepare for and find jobs Life after retirement Internet usage Internet tools what are they and how do you get them e-MATH on the World Wide Web competition and rewards Mathematical competitions bringing out the best Recognition and rewards in 'the mathematical sciences and special issues facing women and minorities including 'events sponsored by the Association for Women' in Mathematics and the National Association of Mathematicians An exhibit hall full of prospective employers including NSA software firms publishers and professional organizations offered additional information to members of the U S mathematics community U The 1995 Joint Mathematics meetings provided an excellent opportunity for Agency mathematicians to develop and maintain contacts with mathematics and mathematicians on the outside Attendance at this conference allowed NSA mathematicians to keep abreast of the hard-core mathematical research being done on the outside Other sessions such as those On teaching and mathematical career opportunities gave Agency attendees a good feeling for the issues of importance to our national mathematics community Sessions on women and minority issues allowed us to gauge the concerns of these specific populations Many NSA mathematicians used this as an opportunity to maintain and expand their network of acquaintances in the U S mathematics community Many Agency conference attendees staffed the NSA information booth in the exhibit hall discussing employment opportunities with prospective applicants and distributing general information to those who were just curious about what we do Several Agency employees conducted interviews with Agency applicants The reunion held by the Steering Committee of the NSA Women in Mathematics Symposium WiMS funded by R51 provided an informal opportunity for all interested conference attendees to learn about Agency employment more on this event follows U There was an incredibly large number of talks at the conference with as many as 20 events running simultaneously ranging from very technical to more general There were talks oriented toward mathematical research theories and history as well as talks discussing the Internet There was an emphasis on the relationship between academia and industry with an emphasis on curriculum reform The Agency representatives attended a variety of talks and activities including U Mathematics and the general public What do they know What should they know Panel Discussion by the Joint Policy Board for Mathematics JPBM The panel included mathematicians and several members of the popular press discussing how math ideas and discoveries are treated in general publications The panelists stressed the need for mathematicians to tell others e g via newspapers about our exciting news Suggestions for getting math arti les published included being willing to generalize results even at the risk of distortion focusing more on the human-interest aspect e g how does this math result change people's understanding or life-style and learning to state the problem to be solved in language the general reader can comprehend One panelist thought that the philosophical aspects of math would be of particular interest to the general public He even won- SECRET 42 HANDLE VIA CO nNr p CIlANNRL8 ONVl 86-36 DOCID 4012045 CRYPTOLOG Summer dered whether God was a mathematician since as he put it math is able to describe our world so well U Internet tools What they are and how you get them Wendy Bucci AMS This presentation introduced people to some of the tools for finding information on the Internet gopher veronica archie ftp telnet WAIS and WWW Gopher is a menu-driven index of various on-line services such as card catalogues for some libraries Veronica Very Easy RodentOriented Index to Computerized Archives is an indexed database for gopher sites it returns a gopher menu Telnet allows one to connect to a remote system and execute commands as if one were at the remote site The ftp file transfer protocol allows uploading and downloading of files from and to your own local file system Archie is an indexed database of ftp sites it returns site and file names The search is performed only on file names and descriptions for a search on actual text one must use WAIS Wide Area Information Service which returns a ranked list of documents based on the number of occurrences of search strings WWW World Wide Web allows one to search gopher ftp telnet WAIS and Web sites Some on-line help is available for commands such as archie and veronica through the e-math telnet site which is operated by the AMS U MAA Session on Teaching with Original The really interesting thing about this session was the uniform conclusion that there are real benefits to teaching from original sources Chris Stevens of St Louis Ull'iversity felt that the use of primary sources in the classroom emphasized to the student how good bad notation helps hinders progress on mathematical problems Professor Stevens tries to emphasize the relationship between mathematics and the culture of a period to show how the knowledge of mathematics distributed in society She feels that this illustrates what the practical uses of mathematics were and are in everyday life and serves as a good example of how mathematics can be used in the non-academic world In one particularly interesting assignment she asked her students to pick a year in the past and find out what the mathematics curriculum consisted of at their college She reported that students were astounded to find that in the year 1875 students took 2-year-long courses in arithmetic followed sequentially by year-long courses in algebra geometry trigonometry and surveying and finally calculus Professor Stevens noted that the math universe seems to be expanding Today's college Sources 1995 mathematics curricula have shifted the focus from the student and instead rush through basic mathematics in order to cover as much advanced material as possible U Math in Industry Avner Friedman RPI Paul Davis Worcester Polytechnic Institute This session detailed the results of a recent industry study To summarize industry desires the following traits in the mathematicians they hire o o o o o Broad background with depth in ones bject The ability to work in teams Communication skills speaking writing listening reading Promise of continued professional growth Computer skills U Bottom line industry is looking for flexible problem solvers whatever we call ourselves who can communicate with non-math consumers Industry is not nearly so impressed with our math degrees as our ability to work with others to get answers that are good enough The speaker noted that many in industry fear that mathematicians have an interest only in proving theorems not relevant problems He added that encounters between academia and industry are limited by geographic proximity to chance meetings Mathematicians need to be able to understand the practical problem and communicate their solutions clearly without generalizing them to the extent that they are incomprehensible to others in industry He added that mathematics students undergoing a one-year internship in industry like that program established by Professor Friedman have found their lives changed Such an experience provides them with the self-confidence and self-esteem to succeed as mathematicians in industry U MAA Minicourse Teaching Environmental Numeracy To Liberal Arts Students Martin E Walter University of Colorado Boulder Walter is a mathematician and an environmentalist which passion is stronger would be difficult to tell His goal is to make mathematics come alive for his students his agenda is the environment The enthusiasm with which he embraces these subjects is a pleasure to witness and the degree to which he combines them quite remarkable as are his conscious efforts to allay the fear of mathematics that some students have He uses the environment to teach mathematics and he uses mathematics to teach understanding of the environment and SECRET IIANBLE3 VIA CO IINT CHANNELS ONLJPY 43 o DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 the need for an ambient functioning ecosystem to carry our civilization made by people like Rush Limbaugh U In reflecting on Walter's style of teaching mathematics one attendee found a lot that she could take away Our agenda of course is not the environment but perhaps we could wrap up our teaching of mathematics with our agenda just as effectively and with similar levels of enthusiasm U The primary objective for the course is the completion of a project on an environmental topic of the students' choice By allowing the students to choose the topic he finds they are much more likely to be motivated to conduct research and learn mathCan math explain this ematics The students make a claim and attempt to prove it U MAA CUPM Subcommittee on Service Walter makes extensive use of open-ended environmenCourses Special Presentation Reform in Engital problems to stimulate interest in both the environneering Curricula While coming at the problem ment and the learning of mathematics For example a from a different perspective this panel came to many of discussion of population growth provides an entree into the same conclusions that the participants of the AMS logarithms He also challenges students to try to come Committee on the Profession Presentation discussion up with a model to control the population or at least on math in industry Delores Etter Electrical Engineerkeep it from exploding This leads to the need for scaling and Computer Science University of Colorado at ing or how to lie with graphs Other environmental Boulder noted that the CEO of Martin Marietta had issues that provide content are deriving energy from come up with the following list of reforms for the engijunk mail acid rain and oil slicks Health issues such as neering curriculum of the 21st century AIDS and nutrition e g milk and muscle how high can you climb on a liter of milk are also fair game U To allay student fears the class begins by confronting mathese The question is asked How would a mathematician say that The course is open to students at all levels of mathematical experience They begin the course by taking a mock exam that Walter uses as a diagnostic tool to assess the students' level of ability To accommodate the wide range of experience the level that students attain at the end of the course is not the focal point rather the critical factor is that a student makes progress U Walter uses a variety of exercises to relate to his students his notes contain descriptions of personal experiences and anecdotes He also uses examples of poets and architects His material is current he even has an exercise that gets students out on the information highway Students become mini-experts on their topic of choice Along the way they learn to think critically His goal is to create people who can and will critique or explain articles in the New York Times or assertions 1 Emphasize the basics including applications with hands on experience and experience in manufacturing and design 2 Develop team skills 3 Teach students about the political process and how to present a case 4 Develop communication skills 5 Teach system engineering to emphasize the combination of diverse disciplines 6 Understand international communications since we are moving towards more of a world market 7 Emphasize greater diversity 8 Increase education to continuing 9 Education should be affordable and of quality 10 Engineering should be a master's degree UNCLASSIFIED 44 commitment DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer The Director of Engineering at the National Science Foundation came up with the following comparison between today's and tomorrow's engineering approaches Today Tomorrow vertical thinking lateral thinking abstract learning experiential learning reductionism integration develop order correlate chaos 1995 right One of the reasons that math seems so impractical to the average high school student is that collegeprep-type schools emphasize theoretical knowledge rather than the applied skills taught in technical schools D The Information Superhighway and You panel discussion sponsored by the MAA Committee on Computers in Mathematics Education and Committee on Electronic Services The first speaker was from Silicon Graphics His points were understand certainty handle ambiguity analysis synthesis research design process manufacture solve problems formulate problems develop ideas formulate ideas independence teamwork technological scientific base societal context engineering science functional core engineering D Matheinatical preparation of the technical work force MAA sponsored panel discussion led by Susan L Forman of the Mathematical Sciences Education Board Panelists presented their views and experiences relating to the need that business and manufacturing areas have today for employees with higher levels of mathematical sophistication Employees are needed who can read charts and graphs solve problems estimate use computers use and interpret probabilities and statistics collaborate and communi cate mathematically in writing Discussions focused on the tradition of tracking students into non-theoretical math courses at a relatively early age This limited their ability to make changes later to continue to study math at the community college level or beyond for example The view of one speaker was that if the curriculum is fundamentally theoretical enough people will be able to move in and out of the education arena It was stressed that it is critical to teach the theory through the vehicle of the applications Another speaker stressed that lifelong learning is a reality of the workforce Examples were also cited where changes such as these have already been made D One panel member stated that quite often important results are obtained by the sophisticated use of elementary mathematics An NSA attendee feels this also is the case at NSA many times critical problems are solved with rather elementary math but with the mathematical maturity to know that the answer is - Networks were slower in the past but we were only transferring small ASCII files Systems are faster now but we don't see an increased efficiency because of the huge files video etc involved - The Internet has a lot of good stuff in it but the majority of the information is junk Like TV the Internet could be used for tremendous educational advantage but the money is in entertainment so as with TV the Internet is dedicated more to amusement than to education - World Wide Web WWW services are typically organized very poorly He also noted that it is easy and fun to set up a home page but very difficult and laborious to properly maintain it U The second speaker was from Bell Labs His main points were The information superhighway is more than just the Internet it also comprises telephone lines and other communication media cable satellite etc He mentioned Vice President Gore's ambition for a virtual equivalent of the national highway system his father was instrumental in building but said that there was no need for the construction of such a system since it is already out there and in use It grows as users increase In his opinion the big problem with the Internet is that there is no one in charge it is running itself Furthermore since it is global in scope there is no governing body capable of enforcing regulations D The last speaker's points were There are major potential commercial uses for the Internet if security concerns can be resolved The ability to post anonymously is one of the problems In fact right before the conference someone posted an item that stated that Microsoft had bought out the Catholic Church While it should have been obvious that this was a spoof many people on the Internet were fooled by it or so Microsoft claimed when it issued an official denial During his UNCLASSIFIED 45 i I DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 talk the speaker asked how many people in the audience had never heard of or knew about public-key cryptography Unbelievably in an audience of 150 mathematicians approximately 30% raised their hands U Ingenious Mathematical Amateurs M C Escher artist and Marjorie Rice homemaker Doris Schattschneider Moravian College A very interesting presentation on contributions of nonmathematicians Escher's work is of course well known through his incorporation of various types of symmetry in his art work Schattschneider presented several samples from his notebooks and discussed a classification system Escher developed Rice a housewife from Florida became interested in tilings after reading an article by Martin Gardner She developed her own classification system for pentagons which tile the plane and was responsible for discovering several new tiling pentagons which had not been identified previously U Synchronous Fireflies Steven Strogatz Cornell University This talk was part of a contributed paper session on Chaotic Dynamics and Fractal Geometry The speaker described many systems that spontaneously synchronize and showed how we can model this mathematically The talk included a fascinating video about South Asian fireflies that flash in synchronicity North American fireflies don't do this This example of a self-organizing system was used to illustrate a discussion on how synchronicity occurs out of apparent chaos U 4 WM Workshop The point of the workshop was to give women graduate students and postdoctoral mathematicians an opportunity to present and discuss research with other women mathematicians Postdoctoral women gave 20-minute talks and graduate students displayed posters The lunch buffet was especially nice as it provided time to meet and visit with various mathematicians U AWM Panel AWM The Association for Women in Mathematics why do we need it now This was a lively meeting attended by approxi ately 100 people primarily women and one baby The format was a panel discussion followed by a question and answer period The first speaker Sylvia Bozeman Spelman College commented that there have been a lot of changes since the founding of the AWM in 1971 She noted that according to a survey taken in 1986 less than 2% of the students in the mathematical sciences are African-American and added that there is a lot of attrition at each educational level She pointed out that 1 7% of the mathematics Ph D 's go to AfricanAmericans 15% go to women and 20% go to women who are U S citizens She believes that there is a serious need for mentors for these women and that the AWM can provide a forum for discussion of such concerns Professor Bozeman pointed out the importance of summer math programs like the one held jointly by Spelman and Bryn Mawr Such programs provide an opportunity for women to enter into mathematics as well as an excellent networking opportunity She believes that the AWM provides a badly needed opportunity for minority women to belong to a proactive organization U Ruth Williams University of California at San Diego was the next panel speaker She discussed a Women in Probability Conference which was held in October 1994 and which she organized served as a panel speaker at this conference She pointed out that a lot of young women both graduate students and junior faculty filled out the list of apprmdmately 60 attendees This provided an excellent opportunity for networking allowing people to get advice on subjects such as obtaining tenure Women in general need to be more active at conferences serving as speakers and organizing special sessions Professor Williams added that research institutes e g Institute for Advanced Study are good places to visit early in one's career but such things as the absence of child care stand in the way of making this a viable alternative f o r w o m e n p L 86-36 II U During the question-and-answer period several talked interesting points were made briefly about the Women in Mathematics Symposium WiMS which was held at NSA in November 1993 She noted that the conference was held for the altruistic reason that the Agency was concerned about how few women are pursuing mathematics as a career and for the more selfish reason that the Agency is concerned about a future absence of women mathematicians in their applicant pool She noted that one of the suggestions from the conference to make the recruiting literature more informative for an audience of women mathemati- UNCLASSIFIED 46 II DOCID 4012045 P L UNCLASSIFIED CRYPTOLOG 86 36 Summer dans had been implemented in a one-page addendum which was available at NSA's recruiting booth Dr oted how important it was for the WiMS attendees to keep using the network that this conference created To that end she announced a WiMS reunion which would be held Wednesday night and emphasized that all were welcome to attend immediately following her remarks another woman got up and insisted that the purpose of the AWM is for women to band together and not work for places like NSA U Ruth Williams mentioned the NSA Women in Mathematics Symposium which she had attended She specifically mentioned the Proceedings that came out of that conference She feels that it is very important to document conferences in this fashion to assure the best networking and dissemination of material U e-MATH on the World Wide Web AMS presentation Currently the January 1995 AMS Notices are available electronically and soon previous volumes back to 1992 will be on-line By 1996 it will be possible to have an e-mail subscription of the Notices of the AMS and the Bulletin The organization will be the same as for the hardcopy and the cover of the Notices will even be scanned in full color the cover has changed as of January 1995 and is no longer an ugly shade of beige A preprint service is available via the AMS home page and even if an author has used another ftp service it is possible to register on the AMS service so that a link will be provided to the other service The list of availability isn't very large yet but eventually abstracts will be available and it will be possible to search for on-line articles by author subject issue etc U Teaching Linear Algebra with Technology Its Impact David Hill and David Zitarelli Temple University Hill and Zitarelli gave a talk and demonstration of the Linear Algebra course they have been teaching at Temple since the mid-80's The course consists of 3 hours of classroom instruction plus about 2 hours of lab per week where they use MATLAB 4 2 The lab experiments are under the control of the student who supplies the input and the logic with MAfLAB doing the arithmetic and graphing the geometric significance of the results The student is encouraged to work by hand on the problem at first for example doing row operations in the solution of simultaneous linear equa- 1995 tions and then run the program which does the same and a second program which graphs the past step of the algorithm The student is also required to explain in writing the scenario for each system of equations i e whether the system is consistent has a unique solution infinitely many solutions etc For further understanding the student can run rrefmovie which runs a movie of the changes which take place as the algorithm progresses U Such technology obviously has the potential to make Linear Algebra more understandable The speakers emphasized however that technology does not make bad teaching good but that it does make teaching more challenging because the instructor must adapt to changing technology and also adapt the technology to his own situation U NSA WiMS reunion The reunion of participants of the November 1993 Women in Mathematics Symposium was well attended with approximately 50 external people It was an excellent opportunity to mingle with other mathematicians men and women in a relaxed less overwhelming atmosphere This provided a nice opportunity for us to advertise ourselves We found that the WiMS Proceedings and the one-page addendum developed by WiMS for our recruiting literature were popular items at this get-together The success of this function can be largely attributed to the unselfish enthusiasm of many Agency conference attendees A showing by of a lot of NSA mathematicians including a lot of young women went a long way towards showing that NSA is an affirmative action employer with a large community of women mathematicians which it is eager to retain Leslie Gruis strongly recommends that a similar function be held at the Joint Math Meetings again next year Such social occasions give a relaxed way for academic women mathematicians to maintain their contacts with the Agency and serve to maintain the network which was established by WiMS U NSA Information Booth and employment registry Working the NSA information booth was one of the most interesting activities We met lots of academic mathematicians professors and graduate students who wanted information on'job opportunities and talked to quite a number of women about opportunities at the Agency It was fairly busy with most questions pertaining to employment and to summer UNCLASSIFIED 47 DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer I 1995 programs One Agency representative felt that there was not adequate information to distribute about the summer programs available here at the Agency-the Director's Summer Program the Z2 Summer Program or the Z5 Summer Program Many instructors came by the booth looking for information on summer employment at the Agency and we had none to give them Conclusions I U The 1995 Joint Mathematics Meetings provided an excellent opportunity for Agency mathematicians to develop and maintain contacts with mathematics and mathematicians on the outside These contacts came in a variety of settings through technical talks panel discussions and informal networking events such as the WiMS Reunion The large number of NSA people sent to the Meetings and in particular the high proportion of NSA women attending spoke well for the Agency It shows that NSA is committed to taking an active role in the mathematics community It is important to make ourselves seen and to let people know that a wide variety of good mathematics and opportunities exist at the Agency U Considering the diversity of events at the Joint Meetings it is hoped that NSA will be able to fund a comparable number of attendees for the 1996 Joint Meetings So many things went on simultaneously that it was very difficult for the attendees to coyer everything The WiMS Reunion was a good first step towards getting more Agency attendees actively involved in this conference It is hoped that NSA attendees will be able to maintain a higher profile at this conference next year perhaps through giving technical talks organizing special sessions or serving on panel discussions Only through active involvement and participation will the U S mathematics community come to recognize NSA as a prestigious place with which to be associated This article was condensed from a trip report by I P L UNCLASSIFIED 48 86-36 DOCID 4012045 FOlt OFFICIAL USE ONL l CRYPTOLOG Summer 1995 SIGINT Bloopers Despite the best efforts of the IS-180 and IS-290 instructors some of our product reports contain real howlers The most common category of course is the homonym or What Spell-checkers Don't Catch We have seen Zagreb described as the Creatine capital creatine FYI is a hydrocarbon and a reference to the cryptozoite community probably a very small community given the size of your average cryptozoite The Secretary arrived in a Leer Jet Who manufactures this aircraft And does the official in the following example use one Malapropisms are another category This would allow the bank to recuperate its losses Foreign Minister Leary of International Disapproval -we didn't know there was an Irish Cabinetlevel post devoted to international disapproval The ambassador to the Holy Sea -Iet's see would this sea be the Dead Sea or the Great Salt Lake Zendia waivers on secret ballot -wavering on whether to waive secrecy perhaps The journalist a known confident of the department head --confidant of his access no doubt And we have lost count of the number of attempts to diffuse explosive situations very effective spreading those explosive situations around or to illicit a response Likewise those entities that find themselves in dire straights We applaud the field site that actually issued a change correcting a report containing this one It's not just product reports remember the poster for Law Day proclaiming that a distinguished visitor's talk would sight famous court cases This one was followed by a memo siting examples Or the staff memo that referred throughout to the country of Cypress Was that where the tree-people in Lord of the Rings came from Vacancy announcements are not immune This opportunity is taylor made for intelligence analysts Who is this person Taylor and does she make other opportunities Too great dependence on spellcheckers leads to another source of puzzlement hitting the correct key without looking at the suggested correction Then there's the Almost But Not Quite Right Word The number of wounded was unaccountable we can see those UN observers scratching their heads there's just no accounting for some things Technicians awarded for good work -a novel approach what would you do with a technician you were awarded UN observation post overtaken by rebels -the post was heading southwest when the rebels caught up with it This category reminds us of Mark Twain's dictum that the difference between the right word and the almost right word is the difference between lightning and lightning bug Slipshod cutting and pasting and other careless editing results in such gems as the government frustrated by a lack of failure to prosecute the case or please cancellation this report Grammar-checkers are not yet sophisticated enough to catch these Nor will they catch such startling titles as Boutros-Ghali To Be Advised Not To Request Troops To Take Safe Haven From The UN Security Council It must have come as a shock to the refugees to realize they were being held prisoner by the UN Security Council Thanks to all the eagle-eyed readers who passed on these examples of What To Watch Out For Contributions to a follow-up column will be gratefully accepted Patriotic Liz does her part FOR OFFICV L USB ONLJPY 49 DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 Book Reviews For the President's Eyes Only By Christopher Andrew NY HarperCoIlins 1995 Reviewed by Bill Nolte P054 U At the risk of stating the obvious an understanding of American intelligence or foreign policy requires an understanding of American ideals and values While the same could be said of German or Transylvanian intelligence a particular emphasis in the U S on public adherence to high standards of morality or moralism openness and legality provide a context for intelligence operations unlike that faced by any other great power This carries over even into the scrutiny of intelligence where the question asked is more likely to be Was it legal than Did it work One consequence of this is that American observers or students of intelligence academic or journalistic who accept the necessity of intelligence must often spend a great deal of effort professing that they do so while concurrently believing in democracy human rights and other American ideals U Christopher Andrew's For the President's Eyes Only establishes an equally balanced view In this account American intelligence is a mirror both of the fluctuations in America's role in world affairs in the 20th century and in the evolution of American public ideals this century has induced Even more particularly and extending back to the beginnings of the Republic the history of American intelligence Andrew makes clear is inextricably linked with the history of its presidency U For most of this country's history intelligence enjoyed an even lower rung on the ladder of national interest than did either the military or diplomatic components of what we would in recent times come to describe as the national security establishment George Washington understood the value of intelligence but few of his successors did or needed to The good fortune of this nation was that few of them needed to know much more about military or diplomatic affairs between 1815 and 1914 U Perhaps because they need not be concerned about running afoul of such ideals British historians appear to have an advantage in the U By the 20th century of course developing literature of intelligence the world had changed with predictable An inclination to accept as a necessity results across all three components of of state and an ability to at least the national security apparatus Theunderstand the context in which intelodore Roosevelt broke the mold in his interest in intelligence but that was a ligence must take place in this countypical TR reaction to virtually anyBully for intelligence try seem to come together in the thing In intelligence as in much else works of such historians as John Roosevelt was a harbinger of change Ranelagh and Christopher Andrew Some years ago Ranelagh's The Agencv The Rise and Decline of the U Presidential interest in intelligence from 1917 CIA provided a critical but sympathetic look at CIA and through 1940 reflects the wide swings in presidential American intelligence in general In concluding that in and public attitudes toward international affairs in genmoments of achievement as well as condemnation eral The First World War brought an explosion of intelCIA mirrored the efforts of the most decent of the great ligence capability and in cryptology brought to powers the one that even in its darkest passages prominence both Yardley and Friedman the 1920s practiced most consistently the virtue of hope brought the illusion that normalcy as defined by VicRanelagh struck a balance that many American critics torian and Edwardian standards could be restored would find difficult to achieve After 1940 of course U S presence as a world power UNCLASSIFIED 50 o DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 c a permanent part of our national life a develop Andrew traces with great skill alized in its support to the president with a relative lack of institutionalization CU This should not suggest that after 1940 all was linear and progressive and here perhaps the requirements of the survey form i e so much data so few pages lead the author to understate slightly the centrality of the period 1945-1950 as a conscious and difficult redirection of that policy U Before the reader scoffs note the key word relative Below the surface seen by the presidents institutionalization took place both within those intelligence components subordinated to cabinet departments and within the CIA And in fact one of the correctives of the Watergate era and beyond was a continued effort to bring intelligence into greater institutional and reguof latory conformity with the rest American government U Andrew describes President Truman's use of intelligence in fairly positive terms-this after all being the President who created the Central Intelligence Agency the National Security Council the Nation l Security Agency and the more or less unified Department of Defense much of the key instrumentation of postwar American intelligence Andrew might have focused a bit more on the extraordinary transformation of this president whose early motto of economy and efficiency was not far removed from an earlier time's concept of normalcy U Though Truman's view of the world had been influenced by the First and Second World Wars it took a remarkable and still controversial series of actions and reactions for this small-town-bred Midwestern president and his largely Eastern patrician advisors to convince the American people that they had entered into a period of virtual war no less dangerous than the actual war they had just won In the end Wilsonian optimism embodying the view that American involvement in the military and political crises of Europe and Asia could be episodic and conclusive had failed The cold dark reality of the late 1940s was that a permanent struggle was under way with no assurance it would end in a world in which democracy could survive let alone be made safe U The remainder of Andrews' work is a restatement of the drama that followed What makes this an especially valuable restatement is the author's success in noting the degree to which intelligence reflected the interests and views of the presidents who followed Truman From the structured mind and extensive experience of Eisenhower through the romanticism of Kennedy and the provincial insecurity of Johnson as through the presidents who followed the relationship between presidents and the intelligence establishment especially the CIA remained remarkably sensitive to personality It may be an exaggeration but one suspects that throughout the Cold War era especially in the preNixon period intelligence remained remarkably person- U This brings Andrew's study to a close and the rest of us to the present question as we cope with the still-being-defined post-Cold-War world what intelligence structure and capabilities does the United States need In a world in which closed totalitarian societies have with a few very dangerous exceptions disappeared and CNN and Internet have provided open sources with access and coverage unimaginable only a few years ago do we need an apparatus that in its very secrecy moves toward the edge of what the American polity can tolerate U The good news is that neither the polity nor its values are frozen in time As we enter a period of transformation it may be reassuring to keep in mind that three times in this century-in 1917 with an assist from the German Navy in 1941 with an assist from the Japanese Navy and in 1947-1948 with an assist from the Red Army -presidents have asked the American peoe pIe to take on the responsibilities of a challenging world And each time an American nation maturing with experience has responded Whatever the difficulties facing the United States as it moves to the next millennium the 1970-something comment of a European-born academician that the United States would be the first country to go from adolescence to middle age without passing adulthood seems thoroughly wrongheaded U Taking a leap of extrapolation Andrew has written a useful text for the era of retooling of the American intelligence apparatus one that suggests this country will ultimately get the kind of intelligence system it as expressed through its presidents wants With its focus on the relationships between presidents and their intelligence tools Andrew's study barely touches on the relationship between intelligence and the Congress This may be the book's greatest flaw for at some point American intelligence becomes less than fully the prop- UNCLASSIFIED 51 I j I' p DOCID 4012045 UNCLASSIFIED CRYPTOLOG Summer 1995 erty of the President and more of a resource shared by and controlled by the legislative and executive branches And the focus of this study could not encompass this shift Andrew has examined whether intelligence can function legally and ethically in a constitutional democracy for the most part he believes it has done so How it functions in a democracy where the president's eyes are not the only ones that count is an important issue future historians will need to address U That said this is a remarkable and provocative study one that raises a host of interesting question its author should attempt to answer in subsequent works Any author who concludes for example that The key to the main U S intelligence failures and successes is to be found as frequently in the Oval Office as in the performance of the intelligence agencies would be well advised to consider that a theme for exploration Blurred Visions would make a wonderful title with chapters on For Myopic Eyes Only the Bay of Pigs In the Eyes of the Beholder the Soviet brigade in 'Cuba and Tunnel Vision Vietnam of course though End of the Tunnel Vision would be more precise U Larger issues aside the book contains wonderful tidbits That Yardley found Wilson a cryptologic naif fits into the larger context of this president's career Andrew's discussion of the Pearl Harbor conspiracy theorists should be yet another decisive step in putting paid to that silly business though virtually by definition conspiracy theories cannot be laid to rest He treats Roberta WO hlstetter's groundbreaking analytic device of signals versus noise in evaluating intelligence failure with appropriate deference while noting that it hardly fits the event she was reviewing Pearl Harbor but would do nicely for an explanation of the failure to warn of the Tet offensive U Revisionist historians of the 1970s and thereafter will find Andrew's dispassionate reasoned analysis of the Red Scare of the 1940s and 1950s disquieting Yes Joseph McCarthy and others exploited the issue and Andrew raises the frightening prospects of the damag McCarthy could have done with all the facts at his disposal There was however an active-aggressively so-Soviet espionage effort in the 1940s and the familiar cast of characters who themselves or through their defenders have protested their innocence may have to face the reality revealed in the records of Soviet and American archives In the end Alger Hiss dressed better and had better teeth and now has at least one endowed chair named in his honor at an American college but Whittaker Chambers told the truth U One discussion that should be read thoroughly by those entrusted with designing the SIGINT system of the future is that of the period between 1945 and the creation of NSA If two cryptologic agencies were sufficient to muddle the situation in December 1941 we required four to accomplish an equivalent mess in 1950 with the invasion of Korea Without being didactic about it Andrew is clear in suggesting that intelligence is not an activity that can especially in an age of instant communication tolerate lack of coordination and purpose U The merits of this study make some of its errors of fact and judgment all the more annoying By common consent SIGINT is used in back-formation to cover activities that took place when COMINT is actually the more appropriate term but to extend the term to Civil War codebreaking is a bit much It may be understandable that a British subject would think Congressional Country Club is in Virginia but why should a credible author British yet use Bletchley Park not only as a place of World War II cryptologic operations but as the name of the British cryptologic agency of the time His stating as a fact that the National Intelligence Council has moved from CIA Headquarters reflects his access to a document that addressed the intent to make that change but not later documents that would inform him it never happened U Early in the book Andrew notes George Washington's injunction that intelligence is necessary and must remain secret Juxtaposed to that is Andrew's obvious and professional desire to lift the veil of secrecy When NSA files for the Cold-War period finally become available some time during the twentyfirst century he concludes they are certain to generate thousands of doctoral dissertations and some interesting reassessments of American foreign policy U Clearly there are those who will be uncomfortable with what Andrew has revealed in this volume Some very interesting codewords along with discussions of sources and successes fill the book's discussion of SIGINT support to recent American presidents Is it possible there may be a cost to such disclosures U Possible But cost analysis alone proves noth ing The overall impression of SIGINT readers are likely to derive from this book is clear and simple for UNCLASSIFIED 52 DOCID 4012045 'fOP St3CltE'f' UMftItA CRYPTOLOG Summer every president since Franklin Roosevelt SIGINT has been an instrumental source of information It is a core capability of the intelligence component of the national security apparatus On a costlbenefit basis especially at a time of fundamental national review of intelligence and security issues an intelligent balanced study by a fair-minded scholar like Professor Andrew emerges as a positive and timely contribution to public discussion of an important issue Chinese Intelli2ence Operations by Nicholas Eftimiades Naval Institute Press 1994 Reviewed b L - P L 86-36 _ U This book is an unusually valuable contribution to the literature on Chinese politics and Chinese intelligence operations It stands apart from most of the scarce literature on the same topic Drawing on his expertise as a counterintelligence analyst and longtime study of Chinese affairs Eftimiades clearly reveals the structure objectives and methodology of Chinese intelligence operations and how they fit into the conduct of Chinese internal affairs and foreign policy The goal of this book as the author states in his introduction is to identify China's national intelligence structure objectives and collection operations focusing primarily on human-source intelligence HUMINT operations This book also provides some basic information about China's analytic community by identifying the roles and organization of major departments and agencies U In order to achieve his goal Eftimiades divides his book into four major parts It begins with an introduction focusing on China's use of intelligence the framework for analysis and China's information objectives Part Two basically addresses the structure and domestic and foreign operations of the Ministry of State Security MSS Part Three discusses China's intelligence community mainly providing information about the Military Intelligence Department MID of the People's Liberation Army's PLA General Staff Department GSD and China's secondary intelligence organizations such as the General Political Department GPD and the New China News Agency Part Four is the conclusion summing up the author's observation about the current capability and overall efficiency of China's intelligence services and providing his views on the prospects of its future threat against the West 1995 U In theory and practice all intelligence activities whether open or clandestine are directed at either satisfying information requirements or covertly advancing national objectives In this regard Eftimiades is correct in believing the information objectives of the Chinese leadership differ significantly from those of global powers because of its unique strategic political and military concerns In military terms the People's Republic of China PRC is strictly a regional power For military intelligence purposes the PRC directs its resources toward identifying potential regional threats the Commonwealth of Independent States India Vietnam Muslim states north of Xinjiang the United States Japan South Korea and Taiwan Eftimiades also believes that the PRC has less of an interest in the global political-military environment than nations with worldwide military commitments Accordingly the PRC continues to focus its intelligence collection activities on issues that more directly affect its internal stability regional security and technological and economic development However since the fall of 1989 and as a result of global condemnation of China's Tiananmen massacre Chinese intelligence apparatus have begun to focus on the specific strengths and weaknesses of the United States targeting what the Chinese leadership perceive as the United States' campaign of peaceful evolution Consequently the new information objectives target the positions on US-China relations advocated by American institutions such as executive branch agencies and members of Congress And overall Chinese intelligence activities support its policy interests by acquiring dual-use foreign high technology identifying and influencing foreign policy trends such as bilateral policy and trade issues and monitoring dissident Chinese intelligence activities support its policy interests by acquiring dual-use foreign high technology identifying and influencing foreign policy trends such as bilateral policy and trade issues and monitoring dissident groups especially those advocating democracy and Taiwan independence TOP 8BCRET U fBRA 53 DOCID 4012045 ' pop SECRE' p UPtIBRA CRYPTOLOG Summer 1995 groups especially those that advocate democracy and Taiwan independence D It is logical that this book devotes much of its attention on the MSS and the MID and to a lesser extent on the so-called secondary intelligence organizations since Eftimiades' study restricts itself only to Chinese HDMINT efforts The MSS is China's preeminent civilian HDMINT collection agency and the MID which is also know as the Second Department of the GSD is China's second largest organization involved in HDMINT collection It is in its careful and relatively detailed coverage and discussion of these organizations' structure foreign and domestic operations in Parts Two and Three that this book makes major contribution to the understanding of China's HDMINT operations The information on China's agent recruitment methods training and deployment is fresh and' unique and should be particularly useful to the counterintelligence speCialists and interesting to all intelligence analysts in the China field Much of this valuable information was derived from well-planned interviews with Source no 1 and Source no 2 and its worth betrays the significance of interviews if conducted carefully as a useful tool for extracting unique and hard-to-get information In spite of their inefficiency China's intelligence services will become more sophisticated in the future and will be unaffected by Western intelligence and security practices and its leadership and that they would change in accordance with new requirements D Eftimiades has succeeded in achieving his goal for this book By putting his information in the context of Chinese history and practice of espionage and current information requirements in support of state policy Eftimiades has provided a comprehensive picture of both the constancy and changes in China's intelligence services and operations Hisbook enhances his professional readers' understanding of the topic and sensitizes their appreciation of the present and future challenge posed by the Chinese intelligence services Apart from his knowledge gained from many years of careful studying and observing China Eftimiades' expertise as a counterintelligence analyst has enabled him to gain valuable information from various old and new sources including interviews with Chinese diplomats military and civilian intelligence officers and secret agents While he faithfully sticks to the framework and the goal pe sets for this book he does not let himself bogged down by excessive and often cut-and dry discussions of the structure of Chinese intelligence organizations And throughout his book Eftimiades is mindful of the fact that the structure operations and methodologies of Chinese intelligence services reflect current intelligence requirements levied by the Chinese Communist Party EO 1 4 c P L 86-36 ' pop SECRET UI fBIM 54 - SECRF3T CRYPTOLOG Summer P L 1995 86-36 SIGINT Glossary More Communications Analysis Trivia The Chun Wheel P L 86-36 b I - EOI 4 c --- 1 Thanks to the Center for Cryptologic History for permission to reprint this selection from the Cryptologic Alman 3c 1 D Many analysts at NSA have fond memories of the Chun Wheel and Chun Board and the Center for Cryptologic History would like to hear your Chun story Send your recollections about the Wheel's origins or use to dahatch@e3 e nsa P L 86-36 SECRET HANDLE VIA COi flNT Cllzt NNELS ONU 55 DOCID 4012045 --- FOR OFFICIAL USE ONLJPY CRYPTOLOG Summer 1995 Editorial Policy U Technical articles are preferred over non-technical classified over unclassified shorter over longer Emphasis should be on improving NSA's technical performance articles should be aimed at explaining one's discipline to those outside it Readers are also invited to contribute conference reports and reviews of books articles software and hardware that pertain to our missions or to any of our disciplines Humor is welcome too Submissions may be published anonymously but the identity of the author must be known to the editor Submitting Items N B If the following instructions are a mystery to you and your local ADP support is no help please feel free to call the CRYPTOLOG editor on 9633123s FOUO Send a hard copy accompanied by a labelled diskette to the editor at P054 in 2E062 Ops 1 or send a soft copy via e-mail tol lor cryplog@p nsa Guidance For maximum efficiency as far as possible within the limits of your word processor o Do not type your article in capital letters o Classify all paragraphs o Label all diskettes identifying hardware operating system DOS UNIX density and type of word processor used also your name organization building and phone number o FrameMaker format is preferred ASCII is also fine 1334 has a conversion service that converts Interleaf Word Perfect OfficeWriter and MS Word into FrameMaker Just attach the document to an E-Mail Compose Window addressed to convert@po FOR OFFIClt' L US ONLY 56 P L 86-36 i DOCID 4012045 WSW LOG Summer 1995 57 DOCID 4012045 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu