ep ••••• I ll1£DUOl Jllllvl1 13CBC JCEOU l 615llllB wwv wwffi wgoo8 89oo m1a w COVERTERMS • •• • • ••• •• Vera Ruth Filbv • •• 7 • I I Answer to CAN YOU MAKE OUT THE NAME ••• Glenn Emery •• •• 18 I I Non - Responsive n -Vi UTU 'l'U'C f OnJ J'Cnl • n ra11 mn nc 1IIHI II OHHIPfT 99flT IIJIO 1Ulfl77i9BI U 111'1• 11 L IOP IIGDII Approved for Re 1 ease by NSA on 04 - 6- 2021 MDR Case# 109364 10 I I Non - Responsive I • • I Non - ili1CAiM' QPOHM Responsive I • Apr 7S • CRYPTOLOG Page 1 8FCPliJI' QPOHH ilililll JI' iJPQlili Apr 7S CRYPTOLOG Page 2 iili9Blll' iPilitl I Non - Responsive I I Non - Responsive SUitEI M'Olffl Apr 75 CRYPTOLOG Page 3 8llfJRIRI iPOKB ··-- ·- r- · I Non - Responsive t • Apr 7S • CRYPTOLOG • Page 4 '-QP 11-IDfiP J I Jh UW ilk camtt a oo zw o z I Non Responsive 1# • Apr 75 • CRYPTOLOG • Page S _ _ r' 'P il ILJII C OJll l 1 D- i •11 K11 • L 1111 19P•P -· - - I -- - -- - - -- - P71 arms SiiiZ 55 a a Ii I Non - Responsive @OPft'lt PfTIAls uJr 7 S • CRYPTOLOG • Pa e 6 69JtJFIIHiPJ lhh 11111111 1 111111• • 1111 n a m w I 81iOBIR' @®Wl3ffiTERMS V-- RNIJ d U Ct 2 I hove crosud oul or1 Ille allached paper mor1y unauiwbl na1r1es Operations ln wMch forge nrunbers of men may loae their li11es ou1 kt not lo be de cribed by code-worila which imply a boastful and ouercanfident aentimenl sud os Trirunphanl or con11ersely which ate colc11loted to invut the plon with an oir of dupondency sucli 11s foebeiide Masaocre '' Jumble Trouble Fidget Flimsy Podietic and laimdice Tlsey 0111 At not to be nanus of rivolou J cAarocler • • • Th world is wide aJlli in1elli1u1 tkou 1 ht will readily supply a rmlimited number of well- soundint namu which do not sug1 es I tAe character of Ille operolion or disparage it in 1 way and do not enable some witlow or mollier io say tltal I er ' was killed iri an operation called Bu ny aug or ''B11lly aoo ••Core ahould be ta cen ira oil this proceu An ef icient and o successful administration mani e ts itself equally in small as in great 1111Jllers Let us suppose that the basic ideas for a project have been formulated and discussions of plans for field tests are about to begin The time seems right to assign a n1J11e for convenience--and for prestige The project is designed to determine the amount and usefulness of a certain type of data recovered as a by-product of traffic intercepted for a different purpose What should the name be How about BYPRODUCT since that is what the experiment is all about That doesn't exactly stir the blood though does it Well how about something catchier like SCAVENGER Or SCRAPS Or maybe just a pretty pleasant name that everyone would like Or maybe it would be nice to let Diana choose a name she has done a really good job as secretary typing up all those figures That's itl Project DIANA There is only one thing wrong with that scenario NSA REG NO 10-5 • 4 January 1974 which says No to it The Agency controls the use of coverterms and gives authority for allocating them under provisions of the regulation to the NSA CSS Cover Tem Officer who is assigned to STINFO Scientific and Technical Inforaation Services CSil of the NSA CSS Library The regulation is eAtitled ASSIGNMENT AND HANDLING OF COVER TERMS U It defines x vel' term as a -generic phrase describing the six categories of designative terms that may be assigned to NSA CSS projects equipments exercises or operations These categories each defined in a separate annex to the regulation are covernames nicknames mythological designators COMINT codewords and code words and exercise terms Covernames and their uses are hedged about w ith many limitations and restrictions and none of those thought up by our hypothetical project officer would do for a variety of reasons BYPRODUCT SCAVENGER and SCRAPS could all be considered descriptive and since security is part of the function of a coverna111e a descriptive name defeats the purpose DIANA would be unacceptable as a covername because it has five letters because it is a word from pagan mythology and because it has been used Five-letter words with certain exceptions like mythological names are reserved for COMINT codewords Mythological n11111es are reserved for U S and allied cryptographic systems and DIANA has been used in the past for a literal one-time pad Besides that the use of mythological names for missile and space projects APOLLO JUPITER SATIJRN and all the others has endowed them with astronautical connotations throughout the world Other A cording to the regulation a covername names to be shunned in addition to those prois a single word under the exclusive control scribed for any of the reasons noted are words of NSA CSS used t o desi ate classified crypto- listed in the Joint Chiefs of Staff JCS publilogic projects equipments oroperations direct- cations JANAP 299 UNITBD STATES JOINT SERVICES ly involving the cryptologic community CODE-WORD INDEX and ACP 119 ALLIED TACTICAL Apr 7S CRYPTOLOG • Page 7 I 8H@RIJf tt n r rd r ss s sr ma a I EO 3 3b 6 l OR81HJf • VOICE CALL SJGN SYSTEM INSTRUCTIONS AND ASSIGN- • ME ffS There is no question of course that there are a great Jllany unofficial semiofficial informal local and oddball covertet'llS around To go back to our forbidden PROJECT DIANA again the name DIAHA has long been used for one of the • GUPPY progrBllts on RYE and guppy on rye is not a Swedish saitdwich Here DIANA is not a cover• • name but an 1 cronym formed from the words DI• graphic ANAlysls and acronyms are not controlled • in the sense• that coverterms are GUPPY is al so • an acron 'lll 'fro• General Utility Program but RYE is a proper covername for an Agency remotely -controlled computer system • To facUitate the assignment of official •coverterms 6TINFOand other responsible organi·zations cOIIJf lle and maintain lists of available coverterms Despite the enormous stock of Eng lish words coverterm lists are remarkably dif•ficult to compile because of restrictions and a 'number of other considerations None of the following or example would be eligible • • • • WAVEGUIDE if descriptive because it reveals the nature of the activity ZEALOT because it is a root word callsign listed in ACP 119 A A further limitation in the selection of coverna11es even those on the STINFO reserved list and available is that they may not form a fully For example if a project is named FORSYnilA related projects may not be named DElITZIA HYDRANGEA RJ« DODENORON or other names of shrubs the obvious reason being that if one name is cOIIJ romised then all are compromised Randomness in all covemame features is normally preferred but sometimes special requirements prevail For ex8111J le when the quadripartite SIGINT Alert system was developed in 1972 it ded that Alert covernames Getting a reserve 11st toget er •p-ro_v _P ' 't-o l 'e-s 'l ething of a problem since most of the words on he first list proposed by one center were already in use at another Eventually however a•list was developed and at present five or sjx are waiting in alphabetical • ALOUETIB because it is a foreign word r ot order for whatevef crises may be lurking in the • used in EJiglish and because it is the name future • • of a Fren h helicopter • BUGGER because althouRh it is innocuous in Covernames available in STINPO's general reserve list includ ALLO'Il ENT BIAS CANTALOUPE • American Ysage it is wlgar in British and DAFFODIL as well as WATERMELON WEEKEND CANOE be ause it is a five-letter word and WELTERWEIGHT WHALEJl AT and WHIPPOORWILL This because it was once used as a COMINT codeword range ought to include something for any taste • • but occasionally a r quester will look over the • CHELTENHAM because placenames are reserved list and complain t I don't see anything J • for machine progra as and syste11S and because like Elements with frequent require111ents will it is alr ady in use s0111etimes reserve several in advance one for •COWPER because two-syllable surnames are re- example recently cho5' MARJCDOWN NUTCAICB PIE'served fo research and engineering projects r CRUST SPEARMINT and 'FFEE A housewife's I shopping list · Programs written for NSA CSS machines are HADRIAN because names of Roman emperors are named from a special reserve list of geographi1 I cal names compiled from maps and gazetteers HONn' because it is a five-letter word and Both placenames and geog aphical features are but with the restr - tions because it is offensive and derogatory 1-l- c a JAGGER because it has been used as a coverAs examples N wou qua 1 y ut • term within the last five years oes not happen to be on the current reserve • list JCOKOMO has been used MATAPAN is listed • KLEENEX because it is a registered trademark and available YUCATAN would be possible but is• MARLIN SPIKE because it is listed as a root not on the current list E ample of program • word voice callsign in ACP 119 A covemames in use include ERST BRIARTOWN CEMETERY• and JCOOICIEJAR yes KOOkIEJAR really • NECTAR because it is in use as an exchangeis a placename ability covername One of the snags with piacenames is that PEDRO because it is a five-letter word and they are often surnames and two-syllable sur- • because it is a fixed callsign listed in ACP names are allotted to the R E organization of • 119 A for search and rescue helicopters the Agency Among Rcovernames i-eeently assigned are AUGUST NYLAND and WASHBUaN The current • PERSEPHONE because mythological designators reserve list was picked from t Washington are reserved for cryptosystems of the United telephone directory but the ch ices were not • States and its allies random Limitations included avpidance of sur- PHOOEY because it is trite pejorative and names which are also placenames and of names potentially displeasing to senior officials easily misunderstood misheard or misspelled SOBRIQUET because it is listed in JANAP 299 A because of homonyms common varia' tts or other • Apr 75 CRYPTOLOG • Page 8 l I 98 JIIIR ' 111 ii I 2 Hit SRI 171 R IHIFLI 1111 ••r -P_L_ 8_6 -- 3_6_ _5_0_ U_S C _ 3_6_0_5- I PL 86-36 50 USC 3605 EO 3 3b 3 PL 86-36 50 USC 3605 reasons EY KEARNEY KEARNY D'ARC¥ DARCY DARCEY HAviooD HllYWOOO WALLACE WALLIS Names with spaces apostrophes or hyphens lb GROFF O'KESFE RAIT-KERR would not necessarily be ineligible • but their marks of punctuation would be eliminatj d •• AND EXERCISE TERMS defines a nickname as a combination of two separate unclassified words which is assigned an ID classified meaning and is employed only for unclassified administratime morale or public infol'llllltion purposes A nicknae may not be a two-word call sign listed Despi e the systems established for ssign- in ACP 119 The first word may not appear in ing covernames it is not always possibl t o __1 JANAP 299 Nickna11es may not be belligerent derogatory offensive or off-color Neither 11 the s116tus of a ro·ect b its name •• word may be a term like PROJECT OPERATION EX ERCISE or TEST The two words of a nickname may not be valid as a single word LIGHT HOUSE PUSSY POOT ROAD RUNNER Por NSA CSS nicknames neither word may be a five-letter word a mythological designator or an NSA CSS coverterm in use And the first word must begin with the letters assigned in JCS Memorandum Serial MJCS-207-73 14 July 1973 POLICIES AND PROCEDURES CONCERNING TIIE USE 0 CODE WORDS ADVENTIJRER EX NICKNAMES AND EXERCISE TERMS or ex are 11 dif This memorandum provides for the needs of 21 elements of the Department of Defense ine ort 1s e owever to prevent pro 1 era- eluding NSA CSS which is alloted the firsttion of covernames along with proliferation of word letters DA-DF HM-HZ and MA-MF which in subtasks practice means DA DE HO HU HY MA and ME Agency nicknames in use include DARK TEA DARTSometimes covernames themselves as well as ING SEAM HONEST INDIAN and MAI TAI As extheir definitions are classified even though • les of their 8 lication DARTING SEAM refers this tends to nullify the benefits of assigning • and MAI TAI a covername Those probably 1110st familiar to most Agency analysts are names for signals It was It is not at all unc01111110n formerly the procedure to assian classified e defined by reference to covernames to new signals but this practice is another coverterm an example is the Agency's now out of favor and many of the covernames formerly classified--ALBEMARLE MARXHAM MARULA DARTING BEE which is defined as a FROSTING and SWAMP are among them--are now unclassified group project which will modify an existing computer executive program for a large scale Project names that are classified must be so digital computer A colorful reserve of nickindicated COVERNAME but very few of names is available for Agency users If these remain The latest revision of the NSA DELIGKTFUL TRIP does not appeal then other coverterm regulation states that a covername possibilities include tl NEST CREDIT and HOPPING itself is unclassified unless its classification JUMP And if HOWLING BANSHEE seems not quite is approved by D DIR DOC D00 or DOR the thing then HOWLING SUCCESS could express not only the project but the desired outcome If these still lack that special something then there is MASKED MAGICIAN MATCHED MATE MELTING METEOR or MELTING SNOW MELTING ICE has been used In fact howev er the Agency employs very few nicknames of its own and many of the wild and wonderful swarm buzzing around in the heads LEFOXGREY l fOXGRElN l FOX Although classification may sometimes be a hindrance in using covemames it never affects nic u amis I Nevertheless they too ha e their restrictions governed by DoD and JCS instructions which in tum govern NSA CSS REG NO 10-5 ' 9'ee9 The basic regulation is the DoD INFORMATION SECURITY PROGRAM REGULATION DoD 5200 1-R November 1973 Appendix D INSTRUCTIONS GOVERNING USE OF CODE WORDS NICKNAMES Apr 75 • CRYPTOLOG Page 9 9H8RIJl1 • £516 I Iii CSiiiiil S ali HI lll•lf EJ E1 - I but -i mn umna-i 1un 1s apparenuy no't S'tr1c'tly observed outside NSA will probably remind Agency analysts of still other MOON words MOONPENNY perhaps But that is a covernamA A - 1 _ name 1 A p r 75 CRYPTOLOG f q 1 J •••• 8801Hft' · ·········· • NI1111111111illlllllllllllili ljlllllll•l•lill11Nli IS ll•t•J•H 11-IIIIIIIIIIIIIIIM'L' ·-----------EO 3 3b 3 EO 3 3b 6 OGA PL 86-36 SO use 3605 EO 3 3b 3 EO 3 3b 6 OGA PL 86-36 50 USC 3605 - ASCC GMAIC N'ic kname Desi ator ' ' J SCARP SS-9 STYX SS-N-2 SCUD A SS-lb GRAIL SA-7 GALOSH A8M-l KIPPER AS-2 ASH M-Sb Oescri2tion Third-generation intercontinental ballistic missile Naval aerodynamic antiship missile Short-range tactical ballistic missile Man-portable shoulderlaunched heat-seeking SAM Ballistic missile defense system Supersonic aerodynamic cruise missile carried by BADGER C TU-16 Infrared homing variant missile carried by FIDDLER TIJ-128 Another missile name probably familiar to many readers is PROG which is not a nickname but an acronym for Free Rocket Over Ground Abbreviations like acronyms are not controlled and considering all the complexities and ramifications of coverterms of all kinds freedom from control may be an attractive feature for some potential namers of projects l J Consider the following description of a published product This is a SOLIS retrieval of a i roduct based on AUTOLINE BLUEMAX I I _ _-11Now that statement would o e unintelligible to anyone not in the know and probably not entir ly intelligible to a good many who think they are It represents a conglomeration of abbrevtations acronyms and coverterms not only that but one of the covertet'lll5 does not belong to of the system so far described for guRea 1111ssue e1es1gna ors as ror aTrWith the eitCeption of SOLIS which is an acronym craft names the firs letter expresses the formed fronrthe initial letters of SIGINT Ontype S for surface-to-surface missiles SSM Line Info tion System a system providing re for surface-to-air SAM K for air-to-surface mote termin'1 access to SIGINT end product the ASM and A for air-to-air MM The 1972 terms in the- statement belong to the National reserve list of names perhaps reflects expectaSIGINT Operations Center which is itself usutions for the future 29 names ACRID to AUBURN ally called tfy its acronym NSOC AUTOLINE is are held 1n l'eserve for A 19 for IC nine for an abbreviation serving as a project name for an Apr 75 CRYPTOLOG Page 11 • py OH8Rlff ltttllll l • 11111111 l • EZ ZW dilb PL 86-36 50 use 36os J NSA system uf on-line processing inter 1o 1 1 __ • • • • i c ions centers wi C A Ill a • Ill • e D PL 86-36 50 USC 3605 1 3 3b 3 86-36 50 USC 3605 But BLUEMAX is something else BLUEMAX is a coverterm a member of one of the man families of AUTOLINE s stems Un er BL a•re- s•e•v•e•r•a- •s u- ·p•ro - gr - a m s• •s•u•c- a s BLUEPlJLL which is the basic retrieval program BLUESALVO which provides for recognition and forwarding of tJJD•sensitive warning info-rmation and BLUEWJAE which can automatic i - -i_ns_tance i_nt_ell_i ence re ort O t-h e r s ioiiii ar e_ s lllll arly named 1ncolor CORALREEF for exam• I s • 1 • _ ·· • • •• • - • • • • • • • ••• • • •• • Theo use of mytho_lc gical designators is de cli'l i11g tJteugh stil 1 Lavored for manual systems A -an eicample appl_i ation has recently been ' nade t o hold the name NEBO currently on the re erved list of 111ythological designators for ' l' l 'l ll 'P P l P 'ft J iffi' f f ' •_•_ •• new cryptosy em based on memory phrases • For the mbre sophisticated machine systems many retain• ihe names assigned during the research an development stages One of these These NSOC coverterms are a 1hend of cover- as an example is VINSON covername for a halfname and nickname and they are outside the duplex wideband tactical speech security system standard coverterm syste •followed by the rest At a ertain stage in the - evelopment of a of the Agency They hJl•e been developed inter- cryptosystem when it is to become part of the nally in NS _ becau$t of the special extensive inTentory a designator in the TSEC Telecomand highly time- t'ltical nature of NSOC needs 111Urtications Security system is supplied and They have thei r own logic though it is not al- •in general this nomenclature is preferred for ways rigor o•sly followed Por exam le 1 while • equipment identification An example is the col9P part of the name tell TSEC KG-30 part of a family of compatible key the second part describes t e nature o generators The development covername may also the program so that PULL has the same meaning be retained since the meanings are not identiin CORALPULL or in RUSTYPULL or REDPULL that it cal PARKHILL for example refers to narrowhas in BLUEPULL NSOC coverterms also have their band tactical speech security equipment and enlimitations in addition to those imposed by the compasses both the TSEC KY-65 and the related meaningful naming pattern Most of them consist TSEC KY-75 of two words not necessarily spelled in the orthodox way BLUEFLITE and PURPLTREE but the two are not separated by spaces and they are limited to 10 letters BLUEWINDOW CORALPRINT PURPLCHECJC_ There are of course obvious datahandling advantages in having_ these names single wot'ds not exeeding a fixed length I • • I NSOC has thus created its own names for its own new world of automated instantaneous M B R A u processing and reporting but in yet another part of NSA the old worlds of pagan religion are still a source of names This part is the other side of the Agency's split personality One peculiar communications security reits COMSEC persona ADONIS a coverterm for quirement is reflected in a special group of one of the U S er to ra hies stems is an coverterms used to identify and protect COMINT example of a holo 1cal es1 tor in use and distinguish between its cate ories These DRYAD the name or a numeral cipher authentiare the familiar C c ewo s They belong cator system is another A third is NESTOR to the cryptologic community an ultimate authorthe designator for a family of equipments which ity for them fies with the United States Intelare designed for different environments but can ligence Board the London Signal Intelligence talk to one another the KY-8 which can be Board LSIB representing the U K Australia mounted in a jeep the ICY-28 for aircraft and and New Zealand and the Canadian Intelligence the JCY-38 a manpack version of the system Advisory Connittee IAC Apr 75 • CRYPTOLOG • Page 12 iiJQIHJf auzz rn ss rn 2222 as a a ' 868H'f USIB I SIB and IAC jointly select the COMINT codewords and decide when they are to be changed The cunent three used for Category III Category II and Subcategory II X COMJNT came into effect in 1969 about nine months afte the compromise of the previous codewords resulting from the PUEBLO seizure Change has been infrequent in recent years because change means JDassive and costly administrative problems and is necessarily slow Just the practicalities of disposing of and arranging for preprinted paper stock and rubber stamps take time and work to say nothing of all tlte computer progr IIIS that have to be updated to incorporate changes activities they represent may affect the Agency in various ways For example an operation by one or more of the Services could be reflected in the foreign signals that the Agency is required to intercept and process SIGINT resources may be used to participate in field training exercises or support comand exercises JANAP 299 A dated September 1971 con• tains an index of all codewords authorized for use by the Armed Forces of the United States Code WOrds are assigned to designate classified plans projects operations movements locations etc and they are assigned in blocks of 10 to components of the Department of Defense One final source of prohibited words is COMJNT codewords must be five-letter proanother JCS document ACP 119 A This document nounceable infrequently used words that are not offensive or derogatoey a do not reveal their provides lists of voice callsign root words for COMINT meaning The codewords are unclassified AlliEd tactical use convoy internal voice callsigns and search and rescue callsigns by the selves When used on rubber stamps or preprinted paper stock they are CONFIDENTIAL Voice callsigns for tactical aircraft are HANDLE VIA CCMINT CHANNELS ONLY When used in based on a root word assigned to the parent comtheir codeword sense they take the classificamand or activity with a suffix for the aircraft tion of the category to which they apply That APACHE ZERO SEVEN for exalllple means aircraft means that when for example the word SPOKE is 07 of the 541st Tactical Fighter Interceptor defined as the codeword for Category II COMINT Squadron APACHE or when it is used in any way in specific refer A convoy is assigned a two-letter or figureence to COMINT then it is itself classified letter group called a convoy radio distingui shing SECRET HANDLE VIA COMINT CHANNELS ONLY Other restrictions are the SUie prohibitions that apply group before sailing Fixed suffixes denoting to other coverteT111s they must not be the naoe function are used with these distinguishing groups for internal convoy connunications Among of an En lish poet or a Roman emperor not a these fixed function suffixes are CHIEF for the mytholog1cal designator and not listed in JANAP commodore LUCK for the vice co111111odore and TEAM 299 or its successors as a convoy collective so that the internal callsign for the cOJ1111odore of a convoy as igned radio distinguishing group XY would be XRAY YANKEE CHIEF In the search and rescue callsign system also a basic call sip is assigned to a function p A II These function callsigns are supplemented with a geographical reference for certain operations and a number suffix for others BULLMOOSE is the callsign for any and all search and rescue airplanes so that BULLMOOSE ARGENTIA would be the callsign for any search and rescue aircraft operating in the area of Argentia Newfoundland The reference to JANAP 299 leads to the last of the groups of cover terms SAPPHIRE is the callsign for a search and rescue boat so SAPPHIRE FOUR would be search and treated in NSA REG No 10-5 S-CCO rescue boat number 4 In addition to these l code words land Jexerc1se tennsr A four-letter scene-of-action callsigns are used codeword is defined in JCS Memorandum MJCS-207-73 as a single word selec- in both military and non-military cormnunicated from those listed in Joint Army Navy tions The callsign HAWK for example is used Air Force Publication JANAP 299 and subsequent for any air force airplane at the scene of action ABLE for any helicopter CREW for any navy volumes and assigned a classified meaning by airplane and TIFF for the senior officer preappropriate authority to insure propeT security sent concerning intentions and to safeguard information pertaining to actual real world military Finally certain voice callsigns are known plans or operations classified as CONFIDENTIAL and used internationally or higher The memorandwn defines exercise MAYDAY Distress signal SOS terms as a combination of two words normally unclassifi_e d used exclusively to designate a SECURITY Safety signal test dril 1 or exercise Code words and exerUrgent signal cise terms are rarely used by NSA CSS but the PAN Apr 7S CRY TOLOG • Page 13 8H8RIJf za oa a aua r c 2 sss u s I • SHORIJf PL 86-36 50 USC 3605 As always when you have a problem Jhe best thing to do is ask someone who know the If you are a potential useT of a coverterm answer The people listed below have been•oost you aay feel now that you appreciate all the helpful in supplying information for thisO complexities that life would probably be simarticle and will assist you too Mrs 111 i ller pler if you just skipped the whole thing and will give you guidance on the general pT91 dure used an acron 'ID or abbreviation But as Mrs for a coverterm request and the others wi tl Marjorie E Miller the NSA CSS Cover Term Offi- help in their special fields at need • •• cer writes Mrs Marjorie E MiIJ it • Besides the fact that you would possibly GENERAL CS13 Room 2N090 te •i 0ls be in violation of security abbreviations and acronyms are sometimes misleading or confusing ASCC NICKNAMES due to multiple use of the same letters for CS34 Room 86114 tel 8657s various words or phrases The acronym BOSS for instance has the meanings BMEWS Operational CANUlUS NICKNAMES Mr Paul w Decamp • • Si111Ulation System Broad Ocean Scoring System W2 Room B413S tel •8891 s Bioastronautics Orbital Space Satellite BurU fl I roughs Operational Simulator PAR means--in Wo9 Room 3Wll6 tel l40 s addition to its co1111110n use for 'paragraph' and 'parallel'--Precision Approach Radar Perimeter COMINT CODEWORDS Mr G P r-t rgan D41 Room 9Al87-3 tel -S82Ss Acquisition Radar Palleti ed Airborne Relay and probably many other things Others with COMPUTl R PROGRAM multiple meanings that we have run into in this co9 R66M 1s01s t I 32 NAMES office are AIDS ADAS ATR DOC MAD MTR •• After looking this over you may decide that what COMSEC DESIGNATORS Mr John J Sullivan appears to be 'an attractive feature' freedom Sl33 Room C2A24 tel 234 s from control is not a bargain after all NSOC Atn'OLINE Anyhow the problem isn't really all that Y36 Room OE229 tel 3412s bad The whole system can be sUDllllllrized in the Mr Russell G Fisher RESEARCH AND chart below R043 Room 2W038 tel S603s ENGINEERING f 1 1 f ASSIGNMENT AND HANDLING OF COVER TEIIIS 11 typeof cover leaa definition autiority lenglh seairity al abetic a lol 8tian WDrd alone l 0l11tt AS1n8fe word 111der a a-ieral exdusive control of b tr use 1¥ R NSA used 1D desi iate c tr use 1¥ C dassified ciyptito1ic piojects - ipm1111 or operations HSA one word no I live letters no rntr usually unclass wolll 111ea1in11 1111st be dassified tirsl won must begin A mmbinalion of 1'MI separate 111dassilied - n15 employed for OoD JCS 111dassilied adlllinittiati ve conveniau e two words 3 tlololical Desi iators Names flOIII ancia I PIii 11yllolo ies applied to eenenrl cryp1Dsyste111S one wonl 4 lnl NT Desi9lllD1$ assilJNld USIB LSIB bl identify soun e IAC as COIINT tnlditlon- 5 litters w o class plus CCO Desi11a1Drs for dassilied military OoD JCS plais operations or aeo1raiillic locations one word 11111st c cme tmm must be must be JANAP 299 classified dassilied 2 Nidalaates O dewonls 5 O de lonls NSA one word exdusions dassilication wilh DA DE HO undass HU HY MA or ME 111dass Words listed in JANAP 299 or A l' 119 111Ytholo ical dlaracteis En i ll poets Roal• ••rars fi SI words of JCS nicknaes 11 1sletld l ade names allbreviatians ICIOflYIIS etc two-syllable sumaiaes poAhical I0Cltians Words listed in JANAP 299 fi ISi wonl or two-word combinatians Ii sted in ArP 119 my111olo i cat dl111c1l1S rt stered trade names NSA 111vern1111es trile words no restr undass 111class Not Applicable C·CCO class or nomtr 1111181 used cat111ry Wards lisl d in JANAP 299 mytholo ical dllllders Enelisll poets Roman empeni s first words of JCS nid n1111es re isteied ltade names abbreviations acronyms etc Not Applicable As of Mardi 1975 Apr 75 • CRYPTOLOG • Page 14 -i19Rlff 12 sMr •_ 2•2 11•1111111r• ••1•1•••-••11•1•2-• _____________________________ -···--·-- · I Non 8tJOBIJf 8P81i1 Apr 75 CRYPTOLOG Page 15 l 8MBIR iPQlili Resp o n sive I I Non - Responsive wJUIJf 8P81Hi 860Dllf j Pl Ki I - -·- -- 1 'i - ·--· - - ·- - -- - I No n - Resp o n si v e Apr 75 CRYPTOLOG • Page 17 oa· 1 1011a11'1 eL 11111111 211 u ·• a rzmr s wrx I I Non - Responsive Answer to last month's puzzle The cryptolinguistic solution to this real-life puzzle was achieved as follows The analyst first assigned arbitrary values to the letters indicated by the digits giving him a pattern ABCD ADCEF and plotted them on a chart in order to be readily reminded which letters fell in the same column or row e t e 1 F z T l s £ Then by about ten minutes' worth of trial and-error substitution on the code book page he came up with the answer BEAR BRAND ABCDEF2 GHIJKLMNOP5 QRSTUViWXYZ'1 E 54 1'1 There is however another way of solving such a problem and that is how this problem actually was solved when it occurred in operations that is by information research The cryptolinguistic solution was demonstrated several days later The junior linguist assigned to the problem was unsuccessful in his attack and after some hours the supervisor pressed to get on with the code recovery and with product ion work decided on another approach He went to the Library where the reference librarian in CS22 quickly located for him a volume called The Trademark Register of the United States which contains a listing of some 300 000 names alphabetically arranged Fortunately it is also broken down by product types He therefore began scanning the list of Foods and Ingredients of Foods looking for a name that would fit the above pattern This list contained some 30 000 entries but it too was listed alphabetically and about 20 minutes' work brought our searcher to BEAR BRAND Glenn Emery Moll lLl fllhen you It Un 1 nto tJtouble on the conve nCOJl4 ideJt the po4tt-ib-Uity o 11 4 h o lLt c ut vi a Ce n tluLt In6oMll ttion ticnat Mad hJ JtUuU 6 •er Apr 75 CRYPTOLOG Page 18 'WP i sllHRA llll IRH ••• EO 3 3b 3 0H0DUf 8P 81ffl E CODE CLERK PL 86-36 50 USC 3605 SOME REMARKS ON I EO 3 3b 3 No n - PL 86-36 S0 use 3605 Responsi ve I Apr 7S CRYPTOLOG Page 20 Niillill' li'POKF I Non - Responsive Apr 75 CRYP'J'OLOG • P ge 21 G N FID IJPilfhlds P l -Ap ril H•Sl·HSSS l •• 911111 I Non - Responsive Sllll 101Ufl• fl9 lUUt11tHHJ 61811ft 81111 fllHHJRIJ B •• 111• 1 I
OCR of the Document
View the Document >>