T8P SECRE'f J J 71 National Security Agency Fort George G Meade Maryland FIN IL lllTION i •I r I i '' 'l·u ' I I I • '1 ' - j '· ' ' -· - Fl 11S 8001 JMEPU SON 'MIN SODE' 'K RD MAlERl l T8P SE€RBT Declassified and Approved for Release by NSA on 10-07-2020 pursuant to E O 13526 MOR 107694 JfOP SBORtff UMBRA This is V agon Seed4 There is fantasy irony and the bite of reality in the name It speaks of the East A'Jld like the East it suggests much says little V agon Seed4 is both Mothei China and her neighbors V agon Seed6 is monumental and inuscule It is the past and future It begs for elaboration but gives none In it are echoed softly slurred Mandarin brittle Vietnamese determined Korean In it is the spectre looming over the Thai Lao and Khmer It is frightening and friendly It is uncertain Above all V agon Seed4 is promise It is fertile with ideas unbounded to be cultivated with creativity and imagination It is challenge It is alive It will be more than it is V agon Seed6 is yours May it grow with you The Editors -'fOP StiCRFff UMBRA -- ------ ----- ---- ------------ - - - -- I PL 86-36 50 use 3605 'f8P SBORB'f UMBM DRAGON SEEDS JOSEPH R BURGESS CHIEF 4 Publisher Managing Editor Minnie M Kenny Speeial Interest Editor Ray F Lynch Feature Editor Robert F Kreinheder R rite Editor • Jane E Dunn Education Ecfi tor Marian I Reed Composition Louella - Ertter PI less Corps Bl Carolyn Brown B3 Edmund J Guest B2 Jack Spencer B3 William Eley B2 Jean Gilligan B4 George S Patterson B2 Louis Ambrosia B4 James B3 r 84 Peggy Barnhill B4 w Mary Ann Laslo '18P SBORB'f UMBRA Schmidt I t 'fOP S BORtl'f UMBRA • VOL 3 NR II EO 3 3b 3 PL 86- 36 50 USC 3605 Final Edition Profile of a Rathbone • TlllE°IF CIIJE·i11 Joe Reid 1 George Newhouse 7 You Say English F rstly • John Mellick 11 Laun c f s e b l • H g R i i g Paul Sa vageaux The Chinese '-----•-•------- • 13 The Open Door Geopolitical TIC TAC TOE • • • • • • Bee Kennard 16 Doing the Twist or Formulas for Finding the Expected Number of Canonically Transformed Hits • • Mary Ann Laslo 26 • • Dan Buckley 34 So What Would You Expect •• • • • • • • • • • Jane E Dunn 36 Coming Attractions Seedlings 40 46 The Fable of the Professional Linguist Chinese Plaintext Statistics Ask the Dragon Lady 50 Contributors 53 I I 11 ·I ·II ' 'f0P SBCRBff UMBRA On Saying Good-bye Fo you4 wa m 4ecepUon 06 ou humble o66e ing4 •••• Ten Thou4and than 4 Fo4 you 4teady 4uppo t to all ou4 e66o t4 •••• A Million happine44e4 l l 6 on •• •••• ••• Quintil Uon 4o440W4 'f6P SBOMff tiMRIM 'fOP 8 BOR Jff l JAIBR i EO 3 3b 3 PL 86-36 50 USC 3605 PROFILE OF A RATHBONE by Joe Reid B43 1 'f8P BBORB'f UMBlh I Ii OP OR81' UMBRA EO 3 3b 3 PL 86-36 50 USC 3605 2 '8P StlORlff UMBlb EO 3 3b 3 PL 86-36 50 USC 3605 0P SBCRR UMHRh ' EO 3 3b 3 PL 86-36 50 USC 3605 4 'fOP Bt3CRB'f UMBRA '10P SBOR B'f UMBlb 5 'f0P 8EOlff1f UMBRlf EO 3 3b 3 PL 86-36 50 USC 3605 EO 3 3b 3 PL 86-36 50 USC 3605 --f 11 • 1 1- J ' 11 ti f · f u l -'- -tfi t -ot - i t l· -•· 3t 1' · ij tj j J if ·t 1t i i•I M --6 'fOP SBORB'f UMBRi't f JI- if f -ii - - - - - - - - - - -- - - - - -· - EO 3 3b 3 PL 86-36 50 USC 360 5 0P BBORtB UMBR ··· ·· ··· THE CHINESE' INFORMATION ALMOST LOST by George Newhouse B21 ' I I I - I 7 i 1 i l EO 3 3b 3 PL 86-36 50 USC 3605 8 ilOP StiORW UMBRA - - - ---· -- - ---···---·-EO 3 3b 3 PL 86-36 50 USC 3605 410P StiC RR UMBRl are a n o - - 'l ' e n e n cy - o o r e e c something new no precedent This tendency frustrates analysts who discover new and unusual information regarding their target country Because people become so involved with past experiences new ideas new solutions and new methods are subject to much suspicion often resulting in the loss of valuable information to the intelligence community To avoid these potential losses every analyst and supervisor should make it a personal policy to evaluate new ideas solutions and methods with an open mind To paraphrase George Bernard Shaw we should dream of things that never were and ask why not 9 p StiCRM UMHR1•1 - - - - - - - - - - - - - - - - - - - - - -- ' '7-• 419P 8130 UMBRA THE PROFESSIONALIZATION OF A SUPER LINGUIST 10 YOUR SAY El'GLISH FmSTLY LIKE mAT OR DO MY TRANS ATrrns READ by John J Mollick B25 Have you ever wondered what kind of impression you make on someone whose native tongue is different from your own when you try to demonstrate your profound knowledge of his language Through the years I have gathered a file of erroneous Chinese-to-English translations by non- glish translators The following unexpurgated examples while humorous might serve as a reminder that middling knowledge of a foreign language does not a polished translator make l t I· I have been stolen on my way to the hospital and now in a very embarrass condition Younger brother committed suicide by drowning himself to death in the river That's the fact Try as you can to put the personnel on the way to here as earlier as you can do He wanted to quit his job for coming back to his native place Someone are trying to destroy me he explained I am sick but I have not been admitted as in-patient to any hospital so I have to liver and treat my disease in the hotel I want to spend three more days to pull out and fill up my teeth Inform if you approve Dear you say English very good too Your say English too very fine Your say English firstly 11 4'0P SISOMl'P UMBRi - ------------- I-•--- - -----• _ _ - _ _ __ __ •-• • 4 Tied up in my wife's unchastity I can't return to unit as scheduled The division has provided us with the yarnsspinning workers Being treated with torture by your sister-in-law your younger brother has come to my house and boarding with us a few days Not allowed to be discharged from the h spital where he received medical treatment because he was unable to pay the bill he asked his truck in another city to mail him money Sir as I feel urgent please allow me to visit your country I'm seized with illness very seriously If you are concerned remit money at once otherwise leave me alone My son who have been studied for several years at your institute has failed in the examination because of effortless A man from your unit was stolen on leave He is now at your station for he stole others Seminar participants include professors from two universities Their speak English ability weak -•- l2 TQP SISC Ui lBRitt EO 3 3b 3 PL 86-36 50 USC 3605 • - - -· - •• - •• •• •• •• •• BASKETBALL •• Pa vag ux B21 Much has been said and can be said for the nte Lligence •• I I _ LAUNDRY BAGS HOG RAlSiNG AND •• • y • I • I • I • we glean £rom traffic nalysis and cryJta alysi But in those instances where litary communiq ions lte united or where the effect-1ve application o cQhununioat icmS security exists other intelli ence•- roducin ite must be exploited • • •• • I • I • I 0 • pu an exp oit e em w 1c prov e prder- t t l e intelligence Practlcally all L J information is obtained •£rpm civil communications and collate al po Jrces • • i ' ' • ' ' ' ' ' their use as part Gf t e 1aaresses in messages sent in civi • communications designate a Wlit or organization Coll tera1·sou ces such as newspapers radio broadcasts and defector ePO ts many times rovi e the initia and some- • times tke onl-y re erence tot jsuch axeference with ac liialWlliliitalJil·ing infonnation is often ne key to unit identification ave b •reported as appearing on a ljundry l ag with th also printed on it on the shirts of basket an in a photograph of a silk bapner wijich contain d embroi red op it Eash of these re t first ip- o f thiii iile J Analysis of plaintext Standard Tele commtmications ssa es which contain STC civil 13 ---- ---- · · ·-- --- ---- --- · - --- -- - 'f0P SBOH'f OMBR EO 3 3b 3 PL 86-36 50 USC 3605 _-------- provide a va u inui yon uni locations e means or man aining con- 14 'f8P SBOMJf UMBRA · ___ --· - --- -----·- - - - - 'fOP SBOH UMBR EO 3 3b 3 PL 86-36 50 USC 3605 •••• The camel even when mangy bea44 the bu4den 06 many a66e6 • •••••• Bu4me6e p4ove4b 15 - - - - - - - - - - - - - - - - - - - - - - c-- -- - -o -- - -- ___ _ • sf I - 'fOP SSORR UMBllA TIE OPEN DOOi We 4eek to be companion4 along the way The lante4n which we ca44Y l4 not ou44 The 4pi«t which we 4ha4e l4 contagloU4 thought The knowledge which we gain an illuminating to4ch And all who 4eek may pe4ceive and lea4n -The Concept 06 V4agon Seed4 GEOPOLITICAL TICtTACfTOE IN THE INDIAN OCEAN by Bee Kennard C522 Tic-Tac-Toe and Geopolitics are W'liversal games everybody plays A world map neatly squared by latitudes and longitudes is the global board which the contestants continually fill with X's and O's There is the local contest between adjoining countries the middle game involving the big powers with the locals and the top level international game azoong the big powers played for strategic stakes By combining the two games the information analyst can see what's happening and where the action is Since superpower rivalry has just begun in the Indian Ocean that fluid situation affords an ideal target to demonstrate Geopolitical TicfTacfToe Play by Play Description First let's start with a calendar of events The X's represent the political and military offensive 100ves and the O's the defensive ones The plays are then broken down by the game level upon which they are played Since the undeveloped littoral and hinterland states have neither the desire nor capability of dominating the Indian Ocean our sample model is limited to India Australia and those islands and countries linked to the big powers Due to technical difficulties beyond our control the following ticftacftoe game cannot be brought to you in JD-living color The split screen and a few winning plays have been selected for this abridged version Gamenates on Low and Middle Levels Gamenote No 1 This mid-ocean shot shows that the first player has the advantage The US won on the middle level by taking the center block on the opening play The rule of thumb 16 q iop SBORE'f UMBRA - ____ -- -· - - is first player wins if he takes the center block and the second player doesn't take a corner If the second player takes a corner the game ends in a draw Gamenote No 2 The Soviet move into the northwest quadrant of the Indian Ocean execplifies the draw game From that area alone the USSR is within striking distance of Poseidon missiles launched from Polaris submarines If the USSR can secure a base in the northeast quadrant China comes under a Soviet ICBM threat Gamenote No 3 With acquistion of the Somalia base the Soviets are in position to score down the East African coast If South Africa can moor the US to the Cape of Good Hope then the US can control the southern entrance to the Indian Ocean In this situation the rule of thumb is if both players play the corners the first player wins who takes the center Here the 3fT game switches from the offensive to the defensive Gamenote No 4 Madagascar is an historic focal point in naval strategy and it is coming loose As the defensive center the third player can block a big power winning play but not sucesses on the outer fringe Strategically the center is the one that counts but half a game is better than none Gamenote No 5 If the third player occupies the center block and plays the inbetween spaces he can break up any scoring attempts by the big corner powers The Southeast Asia move to neutralize the Strait of Malacca is essentially a nowin strategy but a tie game is often the best solution regionally and intemationally 0 17 TQP 8ECBEi UMH •i - - --------------- _ _ _ _ -- - - - -- ' t - _ 'f6P SBCftffl' UMffltA -- c- 0 1 · · X ·• I E A nso MarquH 3 Lepnd lleutnJ · I e 1J8SR t - _ s _ • Cb 1 na -- - ----- I- Low Toe o Maldives becomes independent republic Britian retains Gan airfield 26 July 65 • Seychelles and dependencies form new colony named British Indian Ocean Territory 10 Nov 65 0 Mauritius becomes independent X us plans to build radio and aid facility on Diego Garcia 12 Mar 68 Dec ·70 Dec 71 0 Bangladesh achieves independence O Australia requests modification of US agreements re communications sites June 73 X India and Australia to promote regional cooperation in Indian Ocean June 73 0 Co100rro Islands to become independent 0 Madagascar withdraws from franc zone French troops to withdraw by l Sept 73 June 73 O Madagascar bars visit by four US destroyers 27 Dec June 73 73 o New Zealand Prine Minister visits India disapproves large foreign naval presence in 10 28 Dec 73 % Portugal offers US a port in East Africa 26 Jan % 74 France to strengthen naval presence in 10 8 Feb 74 O Australia New Zealand and Indonesia oppose AngloAmerican agreement to expand Diego Garcia 8 Feb 74 O Magagascar denounces Anglo-American agreement 8 Feb X 74 India sends protest notes to US and Britain 11 Feb 19 74 Middle Tac I Australia-US agreement to establish naval communications site at North west Cape May 62- May 63 X Goodwill visit to India by Commander of Soviet Pacific Fleet Mar 68 X Mauritius grants landing and docking rights to USSR 0 India opposed to establishment of naval bases in IO Nov 70 Soviet offer to build submarine base in Andaman Islands Mar 71 X India-USSR 20 year treaty of friendship peace and cooperation 9 Aug 71 r Soviet Defense Minister visits Somalia X Soviet salvage fleet begins work in port of Chittagong Apr 72 Diego Garcia becomes operational Mar 73 July 70 Z Feb 72 X Soviet airfield and longrange communications base set up in Somalia Apr 73 o Bahrain orders US Navy to leave dock facilities 29 Oct 73 X USSR formally requests standing port facilities in India 20 Nov -73 X Mauritius signs agreement with USSR on aircraft landing rights 23 Nov 73 X Brezhnev visits India r USSR seeks renewal of salvage contract with Bangladesh 19 Dec 73 Soviet arms aid pledged 26-30 Nov 73 China-Ethiopia establish air link China offers to provide arms Dec 73 o US-Australia agree to operate North West Cape jointly 10 Jan 74 20 'f0P BHORB'f UMBRA - - --- - - - - - - - - - - - - -- - a----'---· - -· ¥ China-Madagascar sign economic technical and trade agreement 18 Jan 74 r soviet Foreign Affairs bureau chief visits Tanarive l Feb 74 China-Pakistan agree to build SAMs - -· - - ----- 21 Jan 74 • Kagnew communications base to close 30 June 74 Feb 74 e Australia rejects Soviet request to build joint satellite tracking station 10 Apr 74 S south African Conanander in Chief visits US privately 7 May 74 21 - -- - - - - - - - - · --·-·- - - - - - -- - -- - •--•a - ·•• - i ·o •_ df8P StJORH'f UMBlh Top Tic e Soviet UNGA proposal Indian Ocean be declared nuclear free zone 7 Dec 64 I Soviet warships visit Indian Ocean ports Mar-Nov 68 r Soviet naval visits increase • Britain announces withdrawal East of Suez by end 71 Jan 69 0 -Lusaka resolution of nonaligned countries to keep IO Zone of Peace Sept 70 commonwealth Head of Government conference in Singapore to consider Soviet naval threat in IO Jan 71 • 1969-70 US contemplating denuclearization proposal re IO to Apr 71 USSR e Brezhnev calls for curtailment of cruises by navies in distant waters June 71 o Southeast Asia declares region Zone of Peace Freedom and Neutrality 27 Nov 71 1 US strike carrier Enterprise enters Bay of Bengal during Inda-Pakistani war US intends to send naval forces into IO from time to time 13 Dec 71 0 resolution declaring IO Zone of Peace Resolution sponsored by Ceylon calls for complete demilitarization China endorses resolution es and USSR abstain 16 Dec 71 • US-USSR discuss how to avoid naval arms race in IO Tacit agreement to limit bases 1971-72 X NATO announces Britain and Netherlands to conduct UNGA patrols in IO Dec 72 I US sends naval task force into Indian Ocean X US Navy to visit IO on a more frequent and regular basis 30 Nov 73 29 Oct 73 22 '9P StJOIHff UMBlb ------- ---·- ' ------··- ---------- J Anglo-American agreement to expand Diego Garcia communications base into a modest support facility 5 Feb 74 e USSR attacks projected us naval base as 11 dangerous to peace Urges IO countries to regard it as a direct threat to their security 27 Feb 74 • US carrier task force withdrawn £rom IO 23 Apr 74 23 'f8P SBORtft' UMBltA £ 'fOP BBORB'f ffMBRi't lh rorution 11 u let•• take Top Tic Kiddle Tac and Low Toe and 1upenapo1e tba on a •P ot the Indian Ocean ✓ I N •· Quenotes On the big 0 C E A tbe clic liln breuthrougb8 Tbe 1IISll baa be- • oftai ·' - aince 968 wt not until fri S hlp treaty could I co1111ted in the Soviet ctu J q Oeopoli Tic 1• not' • one gaa but cont 1 nuall 7 played unt tl error or up• et occUl'II a• '110P SHOH'f WBRl - - -- - - - •- --- -- N -- tlll'S • • follllllllV'I - ----· - Monday Morning Now the analyst can actually see how the geopolitical game shapes up in the Indian Ocean On Middle Tac the US has scored a diagonal ticftacrtoe with conununications sites from Ethiopia to Diego Garcia to Australia Likewise the USSR got in on the ground floor at the US and together with the neutralists was winning ·the international political game However the US decision to expand Diego Garcia into a support base has dramatically changed the strategic outlook in the Indian Ocean The deployment of a US naval task force to the Persian Gulf during the Middle East confrontation forcibly reminded the Soviets of the SLBM threat from the Indian Ocean and served notice of US intentions to protect the oil life-lines to Japan and NATO South Africa is attempting to cash in on its strategic gateway astride the oil lanes from the Indian Ocean A western military alliance would enhance its reputation whereas Southeast Asia is trying to get out from under and into the neutralist camp Neutralist efforts to preserve the neutral character of the Indian Ocean come too little and too late Big power rivalry to fill the vacuum left by British withdrawal East of Suez is well under way In a word the Indian Ocean is up for superpower grabs However rules and predictions seldom allow for human error so upsets are frequent in the balance of power contest If at first you don't succeed in geopolitics try patience and persistence -o X xooox 25 'f0P BtJOftlff UMBR1 r--r - - - ----- -- 'f9P 8BORB'f UMBRA EO 3 3b 3 PL 86-36 50 USC 3605 oonm THE TWIST OR FOMULAS 'OR FINDING THE EXPECTED NUMBER oP CANONlCALLY TRANSFORMED fflf s TRANSPOSED GROUPS J WITHIN A G 'VEN Sfild LE by Mary Ann Laslo B43 26 'f0P BBOIHff UMBlb - - - ··-- -·--··--______ i •a a••---------- EO 3 3b 3 PL 86-36 50 USC 3605 N I I L 0 I D M u Cl D 0 LO 28 OP Bl JCH'f UMBR A f 'l'- O 0 M M I • 0 f ' X ----- -- - ------------- - ·----EO 3 3b 3 PL 86- 36 50 USC 3605 J I ID EO 3 3b 3 PL 86-36 50 use 3605 w 0 1-- EO 3 3b 3 PL 86-36 50 USC 3605 Ii j w I-' ' fl ' 1 1 1I I •I 'I 1 i THE HILL OF THE ORIENT o up 1 ' ill ff 4 tr JI cl 0 f 1111 oi Of-t oJa oi l k C '- J i YI HAN-JIK ' t ff 1 1 2A it 0 THAT MV BONY SHOULDERS ARE SHARP AS IF IN PROTEST -t PERHAPS IS FROM THAT IMPATIENT S TEMPER Of MINE _ i- r f- i 't ·nl-1 l WHICH SEES AND MUST ACCUSE 17 I CARRY MEMORIES OF VOLCANIC c it i 1t VIOLENCE '-I i 1lt ct- c 1 i 01 c f_ J f FOR THEN I WAS FREE TO BE FURIOUS 3 MY PLANTS HAD ROOTS IN VAIN EVERY YEAR 14 1 i 'l a •I c t i i -t ¼ °I' ct tl 1j J 0 fl AND NEVER GREW TO BE A FOREST • IS IT BECAUSE I HAVE WALKED THROUGH TOO MANY CRUELTIES THAT I AM IN SUCH QUIETUDE '-'I tt - •If I l ·b c _ 4 ti 'It t- a 1i 1 • t -¼I a I HAVE NOW NOTHING TO INSIST UPON •I ii f i o i J · 1 32 'feP S SO UMBR1•l - -- - -- ---- --- - ------- -- - ----- - ti i - -t -kt i f 0 ' AT THE MOMENT THE HILL-SIDES SHAKE fROM THE i c BAZOOKAS HE COMMUNISTS RAISE SHOUTING i LL 7 t 'J- iij lt •• IN ALIEN TONGUES 1 _ I t1J iki A- tlt 11f ii i f l i 2 ct AND THOSE GOOD-WILLED PEOPLE 1 HAVE FALLEN SO EASILY THAT I CAN HARDLY BELIEVE IT 0 -1- 2 1 a t1 t 2 -I ti BUT NOTHING CAN DISTURB ME OR MY QUIET Now 1 i i i 'tt i WITH TIGHT CLOSED EYES THE ICE OF MY EXPRESSION FREEZES 7 f HARD• t J 1 j i 4 2 i 1 ti- 0 il • I WHO EVEN HAVE FORGOTTEN HOW '-J-•l •I a 1- TO SMILE AM THE HILL Of THE ORIENT 11 1 i d l TRANSLATED BY KtM JONG-GIL b i Vl-t b i lat 2 Cf l 0 •i l n t1i r of % i - 1 'l t lf • ui ·l c 33 TOP 88CRfi UMBRlt - ' _ - THE FABLE OF THE PROFESSIONAL LINGUIST By Dan Buckley B32 Once upon a time in the sleepy country of NSALAND near Washington D C a strange animal was born Now in many countries this event would have been newsworthy perhaps even reportable in a WAR or other weekly but this mother had given birth to such strange animals in the past that little attention was paid and the new arrival called professional linguist was more or less ignored and allowed to grow or not grow as he chose Being an aggressive animal professional linguist chose to grow and discovered much to his liking that he flourished on various colored pieces of paper called traffic Also much to his liking he found that supervisors truly appreciated the way he devoured the traffic feed routed it through his internal circuitry and regurgitated it in some form comprehensible to those animals different from him who almost always were larger than he But he did grow From seven to nine he went then to eleven and lo even to twelve He truly realized his nature by this time and in that realization he also came to know that the animals larger than he did not fully understand him Oddly he thought they often kept on growing while he had stopped As the years passed and he grew no more he wondered about this mysterious aff ication that had befallen him Examined by all sorts of other professionals there appeared to be nothing lacking in his external forces performance appraisals awards certification etc But nothing would make him grow He ate more traffic wrote more translations fissioned another certification and was adored by all Nothing Then one day one of the larger animals asked him Why do you not become a different kind of animal Everyone knows that linguists are bright and skilled especially professional linguists but they are always so small If you want to become a larger animal you must certainly start by becoming a different animal Professional linguist was crushed It had simply never occurred to him that the mysterious afflication haunting him was the nature of the beast itself He could not believe it and he went in search of professional linguists who had grown larger than 12 After many months of searching he found one who had grown to fifteen and was considered to be a veritable wizard The wizard listened to the dilemna of the smaller professional linguist and sympathized with him In the end 34 ---- - - - _ _ _ _ _ _ _ _ _ _ _____- -- - -- - -- - --- -- - - _ ___ __ - --------------- - - --- he admitted that very few professional linguists had grown greater than twelve while eating traffic More important the wizard explained the process of metamorphosis to professional linguist It was simple he had only to stop eating traffic to leave the eating of traffic to smaller linguists and he would grow His diet would consist largely of tirnecards performance appraisals activity reports and hinkel ham sandwiches Except for the ham sandwiches he found the fare not nearly so tasty as the multicolored paper traffic feed but it was indeed roore nourishing Very soon he grew to thirteen and his hopes for further growth were bright Much to his delight he found that he was not alone as a metanorphosized linguist as he thought he surely would be NSALAND was literally crawling with them and along with them he gourged himself with hinkle ham and said words like management and interface which he did not truly understand But no matter because he no longer understood the language with which he was born either and it seemed entirely appropriate The moral of this fable is Wet birds don't fly at night which makes about as much sense • •••• Cha i1t ma n 6a id MIL 6 Mao You 6 i gh and you puc ke Jt youJt bit ow You1t n i ngelt 6 a 1t e we av i ng Uke knot 6 You' U having -pu ha p 6 6 ec_ond thought 6 ••• Johns Hopkins Magazine June 1974 35 ---·-·--·- ··--- - _ - -· ----- -- - - - --- SO WHAT WOULD YOU EXPECT by Jane E Dunn B4 TDT You are a manager among whose newly acquired responsibilities is the production of intelligence information from encrypted messages of a SIGINT target Your personal background is firmly in T A and reporting and you have always felt that CA was an esoteric art that an outsider could not really appreciate Now you must sit in judgment of people and operations in that foreign field What should you expect of a crypt effort More pertinently what should you expect of the cryppies involved in it If your deputy is an experienced professional cryptanalyst you have some breathing space but the responsibility is still yours Here are some thoughts from one professional cryptanalyst and erstwhile manager which may help The good crypt effort whether manned by one or one hundred people is marked by a professional outlook Its operations are oderly comprehensive and documented Its members characteristically use the scientific method of systematic pursuit of knowledge yet are flexible enough to allow for and to profit from the intuitive leaps that sometimes bring solutions The effort progresses as far along the path of diagnosis solution exploitation as the resistance of the systems and the human and machine resources to attack them will permit Individually and collectively the crypt group keeps itself informed about advances in cryptanalysis against other targets through reading technical publications participating in professional assemblies and conferences and obtaining advanced training to increase and sharpen skills both in crypt and in related SIGINT disciplines The group and its members keep in close touch with the non-crypt aspects of its own its own target problem making sure that the exchange of information is two-way An indispensible part of the professional and scientific effort--in crypt as in any other technical discipline--is documentation The manager should expect that procedures and results will be put on the record Formal or informal reports published in the appropriate technical series are minimal requirements Publication in the NSA Technical Journal will give wider dissemination to good ideas and may bring the author and his problem the bonus of professional recognition outside his immediate area Encourage technical reporting With the professional outlook established as a necessary base what about the work the cryppies do How does a noncryptanalyst judge cryptanalysis Perhaps the manager cannot 36 0p 8 BORB'f UMBR1 ·-- - -· s ___ 'fOP BBORfi UMBIM expect to penetrate the interdisciplinary wall but some aspects of the actual work can be assessed by an outsider Good marks go to goal-oriented work--organizational goals that is--rather than to work which only satisfies the personal likes of the individuals doing it If the work can meet both objectives so much the better You should look for attributes such as initiative imagination innovation and enthusiasm tempered by practical good judgment about potential results There should be an evident willingness to learn about and to use modern methods and tools such as computers and to maintain and improve individual technical skills Technical reports and records published and unpublished formal or informal can let you see what is going on and can help you to evaluate the crypt effort its directions and pro$pects as well as its people Read them The cryppie knows he has reached a solution when the system reads The manager has no such definite measure in evaluating a crypt effort Perhaps these few ideas can provide a sort of check list or starting point to help him arrive at a reliable judgment about this part of his responsibilities -·- 37 'l'OP SECRR UMBRA HeJte aJte 4ome thought4 on the klnd6 06 documentation a e11 yptanaly6t 6hould keep TheJte will be 6ome omi66ion6 depending on whethe11 the analy6t i6 woJtking on an exploitation oJt a Jte6eaJtch pJtoblem on a bookb eaking o a diagno6i6 p11 oblem A c4yptanaly6t i6 a JtecoJtd keepeJt and cla66i6ie11 and he owe6 it to hi6 employe4 to keep tho6e Jteeo d6 out6ide hi6 own head and in 6uch 6oJtm content and volume a6 will be ac ee66ible and u6e6ul to contempoJtaJty and 6utuJte analy6t6 an4 manage11 6 t Sy6tem de6cJtiption6 eneJtypt veJt6ion61 6ample6 tJta66ic dec Jtypt6 p11 oduc t 2 06 Key Jtec oveue6 code Jtec oveJtie4--up to date 3 Odditie6 and c 11 yptochaJtacteJti6tic6 by 6y6tem ta4get coJtJte6ponden t 4 Pla lntext log6 and indexe6 S T11 a66ic count6 and log6 6 Oe6c4ip tion6 06 woJtk done--appJtoaeh pJtoceduJte6 including computeJt p11 ogJtam name6 de6cupt ion6 and output 4e6ult6 7 C1P oJt whateveJt it i6 now document6 li6t4 06 i6olog6 and po66ible depth6 8 Pe11 tinent TA and collateJtal in6oJtmation captu4ed cJtyptoma te4ial6' 6 t11 uctu11 e and u6e 9 6Y6tem6 10 Pe11 tinent in6oJtma tion about pJtedece460Jt and contempoJtall y 06 the 6ame oJt Jtelated taJtget6 TJtan6lated decJtypt6 06 pa11 ticula11 intelligence inteJte6t 11 PJtopeJt name6 encounteJted taJtget'6 name6 6011 in6Utu tion6 p11 actice6 011 ganization6 and mate11 ial4 12 CJtib li6 t6 13 No tu to the next c ome11 -- 11 t11 y thue 6iJt6t Not to 601t9et when WJtappin9 up a p1tobtem to p4epa1te d vital 1teeo1td6 pa age Ion mic4o6ilm p1tobablyl including a tec hnicdl 1tepo1t t 38 'fOP ORB'f UMBRA -· The o66lclal technlcal 4eco4d6 6uch a6 6y6tem de6c4lptlon6 t4a66lc count 6 TEXTA ln6o matlon 6hould be ln the o66lclal vehlcle6 604 6uch 4eco4d6--6o4 c ypt the C ypt Statu6 Repo4t-and ln 6uch publ-Uhed document6 a6 c4ypt ldenU6lcatlon gulde6 etc But they 6hould al6o be pa4t 06 the package the wo4klng c ypple keep6 60 hl6 own p oblem CI ln6o4maUon 6hould be pubU6hed ln the app4op4late p4oduct 6etie6 It l6 all pa t and pa4cel 06 the analy6t'6 not hugglng knowledge to hl6 b4ea6t a6 though lt mlght dlmlnl6h hl6 6tatu4e l6 6omeone el6e knew about hl6 p4oblem p4og e66 o technlque6 He need6 to get lt on lne eco4d 60 othe 6 can make u6e 06 lt SAYINGS QF Tift SAGES The real fault is to have faults and not try to amend them Pale ink is better than the most retentive memory To go beyond is as bad as to fall short Knowledge is boundless put the capacity of one man is limited An inch of time is worth more than a foot of jade settle one difficulty and you keep a hundred others away 39 'f6P SBORfff OMBIM I PL 86-36 50 USC 3605 1 EO 3 3b 3 PL 86-36 50 USC 3605 'f8 P StiOR B'f UMBRll ' COMING ATTRACTl'QN i Statistics on Ch nes Plain Text BACKGROUND over one millon chat ctera of Chinese plain text repre- · sented as CTC Chinese Telegra ic Code groups and r corded magnetic tape were given t o NSA j The• ere groups were translated•to STC Standard Telegraphic code and recoded from the Honeywell Tip Top to the Burroughs 6 700 · the 6700 providing quick tum-around on debug programs • • The study of this file s undertaken for two main reas bns on a or anguage - i - i w loliiiilliii _ _ _ _T r an alation b i A committee was formed by Ken Cohen then in B45 to design the programs for the statistical analysis of this huge data bank The committee members were B03 Linguist Norman Wild PlS Crypto-mathematician Catherine Krafft B43 Cryptanalyst mathematician Mary Ann Laslo x3755s for general information B42 Programmer Alton Gowen B42 Programmer Michael Cavanaugh B42 Programmer Richard Neal x4823s for program information • In addition Dave Claybrook B4TDLA provided the Chinese graphic • characters for the runs and Ed Stoops B44 and Elsie Flemming now retired B441 provided general English meanings for the STC groups and helped to proofread the output listings It was decided to publish the output statistics in four parts Part Part Part Part I II III IV i Only parts of Part I those of linguistic interest will be distributed outside NSA 40 TOP SECRET UMBRA __ __ ___ _ ___ - - _______ __ - - _ - - - - --'- ---- -· - -· -- --- I PL 86-36 50 USC 36 TOP SECRET UMBRA·· STATISTICAL STQOY °P rt I The I STC File Statistical Study Part I is almost completed an should be available sometime in June 1974 Part I Statistics on Digital Tetranomic STC will be published as a B441 Working Aid and will contain the following information MONOMES- each of the four positions-in-group and all four positions combined 1 a b c d e 2 DINOMES a b c d e f A A A B B c frequency distribution percentage repeat rate gamma I e total sample size dinomic frequency distribution percentages repeat rate chi square statistic gamma I c total sample sizes for the dinomes A Al B Al B C D c Al Across group studies within group studies C D D D Al A B c and Dare the four positions of an STC group and Al Bl Cl and Dl are the four positions of the group immediately following that group 3 TRINOMES a b c d inverse frequency listing of the 100 highest frequency trinomes repeat rates chi-squared statistics total sample sizes The above are given for each of the following trinomes A B C A B D A C D C D Al within group studies D Al Bl between group studies B C D 41 TOP SECRET UMBRA TOP SECRET UMBRA 4 TETRANOMES Across Group The following are given for the tetranome A B Al Bl a b c d S• inverse frequency listing of the highest 100 tetranomes repeat rate chi-squared statistics total sample sizes M NOGROUPS a b c listing of monogroups comprising 50% of the total sample sorted in inverse frequency order The same as above except sorted by telecode number Statistics A 100nogroup frequencies percentages total percentage displayed unique monogroups displayed unique monogroups processed total of frequencies displayed total sample size d e 6 A complete inverse frequency listing of all unique n nogroups in the entire sample together with the frequency distribution percentage the cumulative percentage the Chinese graphic characters number of unique monogroups repeat rate total frequency displayed total number of unique groups displayed The same as above only sorted by telecode number OIGROUP STUDIES a b c listing of chained digroups comprising 15% of the sample sorted in inverse frequency order The same as above but sorted by telecode number Statistics A frequency distribution percentage Chinese graphic characters general English meanings 42 TOP SECRET UMBRA • ·•• L- a •-- --•I ' • • • - - _ -a a • l - - - - - · - - 1 - w - - - - 6-' ffl'l'GI _ • r • - TOP SECRET UMBRA repeat rate chi square statistic number of unique digroups displayed sample size 7 d An inverse frequency listing of all digroups occur occurring three or more times using the entire sample as the data base Also given are the frequencies and percentages e The same as above but sorted by telecode number TRIGROUP STUDIES a b c 8 A' listing of chained trigroups comprising 5 of the sample sorted in inverse frequency order Same as above but sorted by telecode nwnber Statistics frequency distribution percentage repeat rate unique trigroups displayed total frequency displayed sample size d An inverse frequency sort of trigroups occurring two or more times in the entire sample with the frequency and percentage e A telecode number sort of the above SENTENCE BEGINNINGS AND ENDINGS a An inverse frequency listing of 751 of those nono- groups appearing at the beginning of sentences Also given b 9 the frequency distribution percentages Chinese graphic characters general English meaning total frequency displayed total unique groups displayed Same as above but with sentence endings PUNCTUATION a Total number of commas in entire file and percentage 43 TOP SECRET UMBRA JPL TOP SECRET UMBRA b Total number of periods in entire file and·percentage •• c 10 The new total sample size including punctuation not included in other runs because•punctuation is represented by symbols rather t Han 4-digit groups • • 5-5 WINDOW INDEX • On each of the eight catpgories individually • • The above statistics were develOped both on the eight individual subject categories and-on the entire file ALL SUBJECTS except where the appejl is The indicates the statistics were done on the enti e file only and not on the individual categories • George Sing B4 ha promised a large file of newspaper articles which will a sb be processed along these lines This will add another di ension to the data base making this project wider in scope • tsTc FILE DATA BASE Number of 4-Digit STC Groups Excluding Punctuation Categories 1 FICTION a Drama b Literary Essays c Novels d Novellas e Short Stories 537 122 2 ESSAYS a Biography b Literary Criticism c Educational Essays d Political Essays e Social Essays 135 911 3 HISTORY a Sociology b Ancient History c Intellectual History d Modern History 4 COMMUNIST IDEOLOGY s KM1' 60 579 104 996 IDEOLOGY 20 997 44 TOP SECRET UMBRA · - 86-36 50 USC 3605 1 - - --- - - TOP SECRET UMBRA 6 LANGUAGE a b c Literary Policy Language and Rhetoric Language Standardization 70 326 7 JOURNALISM a Editorial Journalism b Reporting Journalism 22 955 a PHILOSOPHY a Philosophy b Literary Criticism 44 027 9 LAW 5 000 10 ARCHEOLOGY 2 800 ALL SUBJECTS includes all of the above categories 1 003 194 The last two categories law and archeology were included in the ALL SUBJECTS runs but omitted in the processing of individual categories because of the small volwnes in the categories and unusual subject content Therefore the data base represents 10 general subject categories composed of 25 subcategories 45 TOP SECRET UMBRA TOP SECRET UMBRA 1 1 I If 1 SO LONG - IT'S BEEN GOOD TC KUOW YOU By decree of Gen Herbert E Wolff ODO publication of VRAGON SEEVS will cease with this issue We are grateful to all of you whose volunteer efforts made it a publication B could be proud of Please submit future articles for publication to CRYPTOLOG Pl ---The B4TDT is looking for a general term which would describe the functions of a meaning digit 1-select system and other devices which permit the user of a code or code chart to modify change truncate expand or limit the meaning or plaintext value of a cod group Send your suggestion to Betty Dunn B4TDT If we get a good one we will send it on to Mr Callimahos for possible inclusion in the Basic Cryptologic Glossary ---OMNIBUS OMNIBUS is a network of computers being developed as an enhancement of the existing WARSAW system The network will consist of a dual processor DEC System 10 and eleven or more PDP-11s The DEC-10 will control the network and interface with other Agency computers through a PDP-11 Other PDP-lls will control the CRTs and GRAPHICS communications The dual processor DEC-10 configuration is currently comprised of 96K of core memory with paging hardware one swapping drum two discs and sixteen CRT terminals Future expansion is expected to reach 256K of core four drums and twelve discs Version 5 06A of the standard DEC-10 monitor is the current operating system This is a time sharing monitor that provides service for up to 35 time sharing or batch users The PDP-11 systems in OMNIBUS are 16K minicomputers using the RSX-llA Operating System This is a real time executive that can handle a multi-programming environment yet utilizes only 2-5K of core memory Other major features of this syste include modular design fixed priority scheduling and time dependent task initiation For information concerning the OMNIBUS operating system contact Aaron Engel or Pete Wyatt C433 X4286 46 TOP SECRET UMBRA - -- -- - T P'- - -t • · - - - --- · -' EO 3 3b 3 PL 86-36 50 USC 3605 TOP SECRET UMBRA • ---Misplaced during departure from the TDLA a small volume of poems in Korean with English translations Please notify Minnie M Kenny x5078 if found on ---B CRYPT SEMINARS To help us working analysts break out of our target boxes we plan an open-ended series of informal and informative technical seminars so that we can all learn more about B Group cryptosystems and operations Each meeting will be an audienceparticipation show-and-tell session of one fairly limited B crypt or crypt-related subject It will be led by whoever knows most about the problem usually the analyst who is now working it We will tn to hold one seminar each month but will not bind ourselves to a rigid schedule The following subject have Suggestions- £ topics and group leaders ar •welcome at any time Bill Mau of B43 has agreed to lead a session on to start off the B crypt seminars Time and place for the meeting will be•announced later • 47 TOP SECRET UMBRA ·- - -· - f 1_ _ _ _ _ _ _ TOP SECRET UMBRA ---The muezzin mooed the tocsin tinkled and the faithful flocked to the Call Verily a select population The now 235 Dundee members for the last 19 years have formed the hard core of soft-hearted pliable versatile technicians nurtured in the arcane mysteries of a noble art in the finest traditions of the giants of yesteryear Wa-we-woo we were almost carried away there Eyes dimmed if not from the ravages of time at least from the emotional strain of our awesome responsibilities But juubun is enough in Japanese that is Wednesday 12 June was the Eighth Annual Reunion of the Dundee Society held as usual in the Ballroom of the Fort Meade Officers Club The festivities began at 1115 with convivial tinkling of glasses As was the Dundee custom m¥stery guests of suitable noble birth and station General Lew Allen Jr and Benson K Buffham were present to receive Honorary Membership ---CACP Basic Requirement for a Computer Program For a computer program to be accepted by the CACP either as meeting the basic requirement or for additional points 1 It must serve a cryptologic purpose related to the cryptanalysis or exploitation of operational encrypted traffic 2 It must work 3 It must give evidence that the aspirant has a good appreciation of the role computers should play in supporting cryptologic activity 4 It must demonstrate a professional attitude on the part of the aspirant by exhibiting a number of the functions generally incorporated in a computer program by showing originality of purpose or technique and by performing a complete task The Chine4e wo4d 604 •c i4i4 1 contain4 two cha4acte44 - one 06 them mean4 'oppo tunity' Note Originality technique and a display of basic programming knowledge count more than amount of output number of lines of coding and degree of operational usage For instance full credit would be given to an original one-line APL program that printed '' yes or no on a one-shot pass if it accepted C A data wrung it out tallied tested and computed an important statistic This is in contrast to a program which might serve a vital operational function by simply converting 26-letter 48 TOP SECRET UMBRA ' -- - z - · · ' '-1- - -- ·i - - - ' - - ·- -r 19 lb TOP SECRET UMBRA sequences to sequences of L's and R's denoting the halves of a typewriter keyboard but which certainly doesn't demonstrate professionalism Programs written as exercises in programming courses are not acceptable Compartmented programs will be accepted for evaluation approved and published It became effective 1 January 1974 and should have reached your element by the time you read this If you have not been certified as yet it will affect you If you submitted your PQR prior to 1 January 1974 you will be rated under the Old Criteria unless you make a request in writing to be rated under the New Those ---Teaching Opportunities rated under the Old Criteria A note from Eliot Sohmer will continue to maintain all Head of the Computer Science the points awarded under the Department E21 passes on the Old Criteria but will earn information that the National additional points and fall Ceyptologic School has some under the New Criteria unique opportunities for proeffective 1 January 1975 if fessionals who wish to sharpen they have not been professiontheir skills by teaching alized prior to that time What many NSA employees This grace period is covered don't realize is that you do not in a memo that was approved have to be permanently employed by the CSCP and ADPS at the School to teach This The general effect of the presents an opportunity for an New Criteria is to require employee to teach in any area a technical paper from all of his specialty aspirants not just Interns If you think that you might and to require the Interns to be interested in teaching a pass the same examination that class or running a seminar call all other aspirants must pass Jack Leonard El x8027 or It also places more emphasis Eliot Sohmer E21 X8555 on current training and computer related education because this field is so dynamic that computers studied ten ---PROFESSIONALIZATION NOTES years ago are not nearly as NEW CRITERIA FOR CSAs relevant as computers studied Have you heard that a New today Criteria for Computer systems Detailed information can Professionalization has been be obtained from the Data Systems Career Panel 49 TOP SECRET UMBRA -- - - TOP SECRET UMBRA ASK THE f R AGON LAOV Dear Dragon Lady While we're still discussing the linguist at NSA I feel a few words should be said about his training especially where the minor tongues are concerned In that regard I'd like to pass on some points made by Prof Carleton Hodge of Indiana University in a paper titled Pedagogic Responses to Linguistic Stimuli presented at the Georgetown Round Table March 1973 Thorough cultural study should accompany the linguistic study of little-known languages Experiments have been conducted in which some students beginning the study of foreign languages were given drill in speaking from the beginning while others went through a prespeech phase in which for eight ·weeks they developed only comprehension ability without attempting speech It was found that when the latter group was taught to speak pronunciation as well as comprehension was better than that of the former group Fully structured texts are needed so 'that points of grammar are understood before they are used rather than explained afterward Robert F Kreinheder What can be done 6oJt the t i ngu u t4f The l u l4 not g n bu t to 4 FoJt they onty talk t each othe And nobody tatk4 to the bo AnonymotUi al l MaJt i an G uggi 50 TOP SECRET UMBRA ------------------ -- ---- · - - -- - - - --- - - -- ------- TOP SECRET UMBRA Dear Dragon Lady In the issue dated March 1974 the article titled B Signals Lab Capabilities and Mission was erroneously listed as being written by Mr Robert Earles The article was originally written as a memorandum to be distributed down to the branch level throughout B Somehow in the transformation from memorandwn to Dragon Seeds article the name of the correct drafter became somewhat of a mystery So that the record might be set straight the undersigned recognized the need for such an item discussed the idea with the Deputy Chief of 843 and wrote the article as it appeared in your March 1974 issue Donald K Autry Th u w i ii e man ha 6 i nde e d a he al thy m i nd ff e 6 e u a n a b e Jr 11 a t lo n a 6 i t i 6 And 6oJt that Jte Mon neve 1t w-ltt be ill -- Lao Tzu Dear Dragon Lady Where can I get extra copies of the March 1974 issue of Dragon Seeds Several of my G analyst friends would like copies of their own to use as RYE reference manuals Sonia Randall Hll Dear Sonia Asking is receiving Dear Dragon Lady There should be some general dia nost c programs on the LODESTAR system Some interesting points Persons moat familiar with the 6600-7600 systems will state that the inactive mode is not the most efficient way to use 51 TOP SECRET UMBRA - -- ---- - - - - -- TOP SECRET UMBRA these computers A nd at least 1 2 of our cryptanalysis in B depend upon general diagnostic programs rather than specialized or interactive type programs Anyway there's nothing to stop individual users from putting the general diagnostic programs in their workspaces The RAPID programs are in bad shape and rewriting the most frequently used of these in BETA will correct the errors as well as make them available on Burroughs 6700 and the 7600 When and if these programs are rewritten it will be done in as interactive a way as possible to cut down on output and machine time Eg BIGSTET format rather than STET so why not on LODESTAR and now Mary Ann Laslo Dear Mary Ann Will forward your query to C for resolution • •••• A pecial wo d 06 thank6 to Brenda Collins Jackie Haislip Helen Ferrone and Jan Sanderson o thei witlin and able a6 i tance in getting thi6 ta t i ue to p e 52 TOP SECRET UMBRA EO 3 3b 3 EO 3 3b 3 EO 3 3b 6 TOP SECRET UMBRA PL 86-36 50 USC 3605 PL 86-36 50 USC 3605 •• • I CONTR1BUT-0RS 0 DAN BUCK EY hai 6pe nt a ye a 11 a t l · I and th11 e e month 6 dtl n • • a_n_g_u_a_g_e 11 e tate d a4 6lgn nt 6 nce h g tait appe 11 ance in VRAGON SEEDS The G11 ound le 11 0 App11 oach to Lan uage Anaty4i4 Volume 11 H11 1 Mall ch 19731 He Wa 6 ce tl6ie d by the Langu 4e Ca11 ee 11 Panel in Ma11 ch 1969 and Y • the SRA Pane t i eb11 ua11 y 1972 He i4 cu11 11 entty•ai 4 gne d to the No11 th fietname 4e Ai11 Ve6en4e p11 oblem in B 2 • - • JANE BETTY oqN 'S connection with SlGINT date A back to w11 ta11 getA 611 om Japane 4e MiUta11 y to CHICQM I_ I ith 4top 6 along the way 3011 wo11 k onr Eull ope an SatelUte and Vle tname4e -om-m-un- -2 tem 6 She hold 6 a 8 E 611 om Vuque4ne Univell 4ity and Wa 6 p11 epa11 ed to teach F11 e nch in PennAylvania high Achool-6 be 6011 e Ahe WM de tou11 ed to A11 Ungton Hatt Be tty iA a ce 11 ti6ied c11 yptanaly4t a tutoll 6011 the CA Znte 11 n p11 og11 am an E E O counAetto11 and mo6t 11 e centty the C11 yptanatyAiA Edito11 6011 the new magazine C11 yptotog 1n the late At B 11 e 011 ganization Be tty WM aA4igne a to t1te 84 Technical ViAcipUne Te am BEE KENNA RV CS22 911 aduated 611 om the Unive 11 Aity 06 Texa 6 with a B A in Hi4to11 y and EnqU4h Fo a 4even ye all A Ake Ae 11 ved aA an intetUge nce ' analy6t with G2 U S Fo11 ce4 in Au 6t11 ia Zn Octobe 11 1959 4he joined NSA and ha4 4ince wo11 ed in the vaJr A ou4 a11 e a b11 anche 4 06 CS2 FIi om 1961 to 1911 4he wo11 ke d with P2223 collocated in3011 mation 4uppo11 t g11 oup a6 the 4enio a analyAt on the Vietnam mltita11 y p11 oblem She 14 a p11 06eAAlonat 1n 3011 mation Science Analy4t and iA cu11 11 e ntly w11 iting a11 ucle6 on the ne w ldea 4 and technique A in in6011 mation Ae11 vice A MARV ANN LASLO 8432 WM g1taduated 611 om Ro a11 y Hill Col ege Bu6ialo New Yo11 k in 1965 Jr ecelving a B A deg1tee ln Ma tne ma tic6 She came to NSA in 1966 and e nte11 ed the C A 1nte Jr n P1tog11 am which pJr ovlded oppo11 tunitie 6 to woJr k in ASS 845 G41 and G42 She Jr e ce ived hell ce Jr il6ication aA a mathematician in 1970 and a a c1typtanaly6 t in 1913 and Ahe ha 4 completed Ae ve 11 al 1tequl1teme nt6 leading to c e1tti6ic a tion a 6 a c 11 ypto-mathema tlclan FJr om 1969 53 TOP SECRET UMBRA • TOP SECRET UMBRA • to 1913 Mu La6to WM M6lgne d to G91 'h·u e 6he cUd lnde pe nde nt c 1t yptanat t lc 11 ue a1t ch ·the Peoptu Re- · pubUc 06 China I _ _and 6unc Uone d M « coMu ltant ln mathe ma ic 4 and 4ta' tl6 t lc6 at 1 lv i 4 lon le vet M t 4 La 4 lo l6 now c hi e 6 o 6 the Chinu e H lgh • • G1t ade C11 yptanaly6i6 Te am ln 8432 y JOHN J MOLLTCK 825 6 tu d le d MandM ln Ch lnue at Yale • Unlve lt 4ity 1n6t ltu te 06 Falt EMte l n Languagu -in • 1955-56 and then 4e lt ve d M lnte 11 ce pt ope 1t ato1t voice t1t an6 M lbe 11 and t1t a 6-lc ana t y6t w-lth the USAFSS in Ko1t e a unt lt 1958 H 6 NSA and 8 c lviUan 6e 1t v1ce 6t1t e tche 6 61t om 7959 to the p1t e 6e nt punc tuate d bv t tn academic ye alt 1966-611 06 advanced Chine 4e a1t e a 4nd language 6tud le 6 at the U S Fo1t e i9n Se 11 v lce 1 6t i tute in Ta lc hung Ta lwan MIL MolUck l4 c e 1t t l6ie • lK the 6 le tdi 06 Language Ch lne 6e and Spec lat Re 6e ft1t ch He Wa 4 a 61t e que nt contlt1 bu to1t 06 Ch lne 6e language 41tt lcle 6 to the ua1t te 1t t Re v le w olt L ln u l6t6 H l4 lt e nt po6it lon 4 e o e ocume n ation and•On-L lne Plt oce 64-lng 81t anc 8253 • • GEORGE NEWHOUSE 827 1t eceive d hi6 B A in 8u4lnt46 Admin l6t1t auon 11 om the Unive 1t 6 lty 06 Ma1t yland kn 1970 and i6 now completing wo11 k 601t hi4 M B A at th Uti lve M lty 06 H JJ a l l Since he came on duty with the •Age ncy ln 1963 he ha6 wo1t ke d on valt -lou4 8 p1t oble m6 M « t a66-lc analy4t and e po telt A ce t l6ied Special Re 6 Mch Analy4t and T1t a66 lc Analy6t Ge 01t ge now 6e 1t vu M the te chn lcal 1t e1t e p1t e6entati ve at USM-3 in Okinawa • • JOE RE11 1te t lAe d 30 June 1974 ending a 31G1Ni ca ee that date 6 bac to WW11 when he Wa 4 a U N vy inte Ace pt ope a to Hi4 M61 gnme nt4 at NSA and pJt e dece 66011 a gene lei cove 11 ed Soviet low- medium- and high-g1t ade c1t yp toiy6tem4 and included 15 yealt 6 ex_peJU nce on Soviet and Ch lnue Commu n l4t data 6 16tem6 • • PAUL SAVAGEAUX hM Wo1t ke d in 821 41 nee 1915 a6te 1t having completed a tou a 4 1nte tUgen e An ly4t at Paci6ic Alt my He adqua11 te M in Ho _ pJte v lou 4 ye alt He 6pe nt eight ye aA6 on the ____ _p1t obtem and i6 CUA ently a46igne d to 821'6 Te lt m Re po1t tlng Tftam which l6 w uting a h-i 6to1t y 06 the PLAI I• Paul g1t aduate d 61t om the Uni ve uity 06 MM-achu6e ' t ci n 1961 He i4 a ce1t ti 6ied Special Re 6e a ch Analy4t 'lte 54 B1•5 pt 74 Sl-lll 17 TOP SECRET UMBRA EO 3 3b 3 PL 86-36 50 USC 3605
OCR of the Document
View the Document >>