W DUVWW D11 f 'I I BI WVU I WI B U J U 5 J 5 Q OO 5 D D 5 f OO D I1 DGJ D B1 Il'illIJl1lIJl SEP-OCT 1985 86-36 _ _----I UNDERSTANDING THE FREEDOM OF INFORMATION ACT U L o oooooo 1 QUOTE WITHOUT COMMENT U ooooo oooooooooooooooooooooooooooo ooo o 4 LETTER TO THE EDITOR ul 1'1 bert T'1J 'p ooo 5 THE WORLD-WIDE SOFTWARE SUPPORT SYSTEM U o oo 6 BOOK REVIEW THE NEW KGB U o 9 BULLETIN BOARD U oooooooooooo oo oo oooooooooooooooooooooooooooooooooooooo 10 ON THE LIGHTER SIDE U Vera R Filby 11 FROM THE PAST U _ 12 Declassified and Approved for Release by NSA on 10-16-2012 pursuant to E o 13526 MDR Case # 54779 'fIllS BOeUMJ3N'f eON'fA INS eOBJ3WORB MA'fJ3RIAb e ASSIFIBB BY NSA eSffif 123 2 eN erigia8tiag Ageaey'e getePmia8tieft Re ire8 BEG ASSIF 4009965 Published by PI Techniques and Standards VOL XII Nos 9-10 September-October 1985 1 PUBLISHER _ BOARD OF EDITORS Editor ' EDITORIAL lW P L 86-36 j l h far the good old days NSA writers often H963-1 03 L I Collection 1 963-3683 968 814H Computer Security 1 Computer Systems _ 1 9637 n03 Cryptanalysis _ _ _ 1 963A-74 0 Cryptolinguistics _ 1 63 lS 61 Index _ 1 963 '5330 Information Science _ _I 963 c-t14 S Intelligence Research 96 'S175 Language 963 7515l Linguistics _ 1 963-3896 Mathematics _ 1 1 963-5566 Puzzles _ _ David H Williams 963-H03 Science and Technology _ I 1 96374191 Special Research Vera R Filby 968 8014 Traffic Analysis Robert J Hanyok 963-3888 Illustrator Distribution To submit articles or letters by mail send to Editor CRYPTOLOG P1 If you used a word processor please include the mag card floppy or diskette along with your hard copy with a notation as to what equipment operating system and software you used via PLATFORM mail send to cryptolg at barl cOS bar-one-c-zero-fi ve note no '0' in 'log' $i9 when faced with the final chore oftheirtask mal'klng each paragraph with the appropriate cl assification It is a tedious job and somehow th re's always a paragraph or so that takes an unbelievably long time to classify properly Well we've got to do it One reason can be found in the article on the Freedom of Information Act beginning on the next page Everything we write is subject to review Yes everything So it does make things easier for the overworked reviewers to scan paragraph classifications than to read carefully an extensive paper that might have but a single classified reference And it's no fair trying to play dodgem by overclassifying -- it's also no go someone will catch it there are eagle-eyed people everywhere and make more work for you Besides it's hard as it is to get people on the outside to respect our classification system this will come only when we respect it ourselves When classification is assigned property in accordance with the rules it can successfully withstand challenge Occasionally you'll see a notation to the effect that the entire report or article has been classified thusand-so That is usually because the classification is the same throughout If in doubt do consult your classification officer Meanwhile a true confession even with all the review CRYPTOLOG undergoes there's slippage every once in a while as you will see below Always include your full name organization and secure phone number For Subscriptions or Change of A dress send name and organization to Editor CRYPTOLOG PI CORRECTION Please make the following classification changes in the May 1985 issue Change the classification of page 4 to SCCO and change the classification of the fourth paragraph of the article The Summer Language Program on page 4 to S CCO Contents of CRYPTOLOG should not be reproduced or further disseminated outside the National Security Agency without the permission of the Publisher Inquiries regarding reproduction and dissemination should be directed to the Editor rOil 01'1 1 '1 1 Ujl OP'H Y 4009965 UNDERSTANDING THE FREEDOM OF INFORMATION ACT U _________________----I u The Freedom ofInformation Act FOIA affects everyone at NSA All of us whether we know it or not do work which is subject to review - and possible release - under the FOJA Some of us sooner or later may be called upon to review information in response to an FOIA request Most of us however are unaware of the FOIA have questions about the Act or would like to understand it better P L 86-36 statutory exemptions The exemptions are designed to protect information of particular sensitivity Thus there is an attempt to strike a balance between the public's need for information concerning the governmental process and the government's need to preserve the secrecy of certain information compiled in performing its governmental functions Exemption 1 to the FOIA protects information currently arid properly classified pursuant to The FOrA was enacted by Congress for the executive order in the interest of national defense prineipal purpose of broadening access to information about the governmental process or foreign policy Used by NSA to protect classified information from public disclosure it protects all Strengthened by a series of amendments in 1974 and 1976 the FOIA is the primary disclosure information properly classified under Executive statute opening the records of the U S Order 12356 or originally classified under previous executive orders where the information Government to public scrutiny NSA records are remains properly classified under Executive Order subject to requests made under the FOIA and since virtually all written work product reflecting 12356 the official business of the Agency is considered an Exemption 2 applies to matters relating solely to agency record this has the practical effect of subjecting nearly all the written documentation the internal rules and practices of an agency Under this exemption NSA withholds matters prepared by Agency employees to review and meeting one of two criteria possible disclosure under the FOrA BASIC STATUTORY CONTENT The basic concept of the FOIA requires that an agency upon receipt of any request reasonably describing the records sought provide those records to the requester unless the information contained within the records is protected against disclosure by the coverage of nine narrowly drawn I routine trivial administrative matters in which there is no genuine significant public interest or I matters which are predominantly internal where despite the existence of genuine public interest in the subject matter disclosure would risk circumvention of the Sep-Oct 1985 CRYPTOLOG page rOil OFFI6IAL USE OP 'LY DOCID 4009965 statutes or regulations governing Agency activities Exemption 3 authorizes the withholding of information which is protected against disclosure by statute Federal agencies currently utilize over 130 different statutes to withhold information under the auspices of the third exemption but NSA principally relies on four different statutory mandates I Public Law 86-36 50 U S C 402 note - This is the National Security Agency Act of 1959 section 6 of which protects against the disclosure of any information regarding the organization functions and activities ofNSA or of the names titles salaries or numbers of employees at the Agency In asserting the third exemption NSA cites Public Law 86-36 more frequently than any other statute in protecting both classified and unclassified information concerning the Agency's functions and activities I Section 102 d 3 of the National Security Act of 1947 50 U S C 403 d 3 - This statutory provision authorizes the Director of Central Intelligence DCl to protect intelligence sources and methods As a member of the Intelligence Community NSA uses this statute in protecting its own sources and methods pursuant to authority conferred by the DCI I 18 U S C 798 - A criminal statute section 798 makes it unlawful to disclose classified information concerning a cryptographic systems equipments devices or designs or b the communications intelligence activities of the United States or any foreign government to any unauthorized person In requiring that information be classified as a prerequisite to its application this statq te is always used in conjunction with the first exemption Exemption 5 permits the Agency to withhold information contained within intra-agency or inter-agency memoranda where the information is otherwise protected against disclosure by legal privilege The privileges most commonly applied are the attorney-client attorney work-product and the executive privilege with the latter being used extensively to protect information reflecting predecisional opinions or advice rendered by employees in the Agency decision-making process Exemption 6 allows the Agency to withhold information where disclosure would constitute a clearly unwarranted invasion of personal privacy Exemptions 7 8 and 9 are inapplicable to NSA's mission so they are seldom if ever invoked They cover information in investigatory records compiled for law enforcement purposes information regarding the regulation or supervision of financial institutions and geological or geophysical information MECHANICS OF ADMINISTERING THE ForA While the FOIA establishes basic principles of disclosure administering the act is accomplished through procedures developed and implemented by the individual agencies NSA procedures provide that a requester may seek access to Agency records by a written request reasonably describing the records sought The Directorate of Policy is charged wi th administering Agency ForA activities and the Director of Policy serves as the Agency's Initial Denial Authority i e the Agency official responsible for all initial determinations regarding the releasability of Agency records I 10 U S C 140C - Recently enacted this statute authorizes the withholding of technical data with military or space application in the possession of or under the control of the Department of Defense if such data may not be lawfully exported outside of the United States without an approval authorization or license under the Export Administration Act of 1979 or the Arms Export Control Act Upon receipt of an FOIA request the Information Policy Division coordinates both the search for and the review ofNSA records responsive to the request In reviewing records Agency components mustbe mindful of the FOIA's requirement to release all reasonably segregable information contained within otherwise exempt material The concept of reasonable segregability means that even classified documents must be reviewed to determine whether information responsive to a request can be separated from otherwise classified material and released to the requester It is for this reason that marking classified documents by paragraph is now the rule It greatly faciliates the review process Exemption 4 protects trade secrets and confidential commercial information Used primarily in handling requests for information relating to NSA contracts it allows the Agency to withhold commercial or financial information provided by contractors and other outside entities where disclosure would either impair the Agency's ability to obtain similar information in the future or would cause substantial competitive harm to the company providing the information The FOIA provides 10 working days to process a request i e search for recover and review responsive documents and reach a determination regarding the releasability of responsive records An additional 10 working days is permitted under unusual circumstances e g the need to obtain records from outlying field facilities the processing of voluminous records or the need to consult with other agencies having an interest in the disposition of the records sep-Oct 1985 CRYPTOLOG page 2 rOil Ol'l'lClAL USK ONLY ID 4009965 STATISTICS ON FOIA AND PA REQUESTS TO NSA 2QFY85 U The following reflects the actions processed under the provisions of the FOIA and PA for 2QFY85 and also compares actions processed for 2QFY83 through 2QFY85 In addition to the actions highlighted below 108 requests were processed in which the requester received records from which certain sensitive information had been removed A total of 277 FOrA and PA requests have been received by the Agency through 2QFY85 versus 330 for the same period last year To date 71 of the requests were referred to NSA CSS by other agencies The figures do not reflect PA requests by Agency employees which were handled internally by the record holders FOIA PA REQUESTS 2QFY85 NO REQUESTS ACTIYE AS OF 20FYI5 FO' - NO OF REQUESTS 200 P r----------- D2QFV85 c J 2QFVI4 2QFVI3 150 10 10 100 49 39 OTHER FOIA PA ACTIONS 2QFY85 - 40 50 0 _ 20 o PA FOtA _ -- J - L_ n - - _TIll _WIl ' _ T M L Y ACCaU 1 1 0 _ _1IftEO Ad_D IIY PlI011E 011 SOUIlCE Q AS OF 3111AA 5 NO_ e_1Il Upon reaching a determination regarding the disposition of responsive records NSA releases those non-exempt records or portions thereof informs the requester in writing of the speCific exemptions supporting the withholding of those records not released and advises the requester of the right to appeal any withholdings Replies to FOrA requests must explain any denials of information citing the exemptions and statutes invoked Under NSA FOrA regulations a requester has 45 days in which to appeal the withholding of any information Upon receipt of an appeal the information at issue in the appeal is reviewed de novo by the Office of General Counsel which submits its recommendation regarding the appeal to the NSA FOIA Appeals Authority the Deputy Director for a final decision which must be made within 20 days of receipt ofthe appeal The FOIA provides that any requester denied information on appeal may sue for release of the information in U S District Court THE FOIA AND NSA NSA receives hundreds of FOrA requests annually from requesters seeking information about the Agency about themselves and about virtually every topic of interest or concern to any segment of the public The most common FOrA requests received by the Agency pertain to commercial information and to current or historical events Requests concerning particular events have included such subjects as the Cuba n Missile Crisis the attack on the U S S Liberty and the assassination of JFK Also common are requests for information about the Agency and for personal records Many people request information about the Agency as a whole including the history of NSA and or pictures of the Agency or about prominent Agency figures such as the Director or Deputy Director or about particular Agency projects or developments such as the new building or the Computer Security Center Copies of the NSA Newsletter are also frequently requested 5ep-Oct 1985 CRYPTOLOG pon page 3 OfTIC AL USB ONLY aCID 4009965 Some individuals want copies of information the Agency may have on file on them These personal requests usually are also processed under a sister law regarding personal information the Privacy Act Numerous FOIA requests however fall in still other categories Interesting requests received in the past have included I QUOTE queries about UFO's I queries from crypt buffs about purchasing classified crypto-equipment While requests may often seem arcane selfserving and even frivolous the ForA remains the principal means by which individuals cim obtain information about the government and its activities directly from the government itself WITHOUT COMMENT Remarks by Dr Solomon Kul back guest speaker at the Phoenix Society Annual Meeting and Dinner Dance 27 May 1983 at the Fort Meade Officers Club Reprinted with permission from the PHOENICIAN Summer 1983 COSTS AND CONCERNS Sometime in January 1981 I received a telephone Federal agencies spend millions of dollars call in Florida from an individual who identified himself as BAMFORD of Houghton Mifflin administering the FOIA each year NSAspent over a third of a million dollars on FOIA last year writing a book about NSA My mistake was even to talk to him Although I cannot now remember While not designed to recoup all the expenses of FOIA administration theFOIA does provide for the details of the telephone conversation it was the assessment offees in conjunction with limited to some anecdotes about the period of the processing FOIA requests Fees may be assessed thirties for search and duplication costs but not for the effort expended by professionals in reviewing I did not disclose to Mr Bamford classified or documents to evaluate the disposition of responsive otherwise sensitive information concerning the information The FOIA provides further that fees activities organization and personnel of the NSA should be waived or appropriately reduced where a Since I have not been privy to any NSA activities fee waiver is sought by the requester and when since May 1962 I could not make any disclosure even inadvertently furnishing the information responsive to the request can be considered as primarily benefiting the general public The Department of Justice has Bamford's reference to me in the Preface is comprovided considerable guidance to assist agencies pletely unwarranted by the facts and of course was in evaluating requests for fee waivers and without my permission or knowledge In his unensuring compliance with the statutory policy on scrupulous fashion he obviously used me to lend an aura of authenticity to his book I am particularly fees distressed by the fact that an AMERICAN CITIZEN and an AMERICAN PUBLISHING Agencies are concerned about the cumulative amount of information released under the FOIA HOUSE apparently motivated by the possible and the egree of effort and number of employees monetary returns and displaying an obvious bias involved Companies are worried that their against NSA would and could publish a book like The Puzzle Palace competitive ability may be impaired over time by commercial FOIA releases Meanwhile NSA like all government agencies must carry out its obligations under the FOIA as long as the Act is in effect With regard to Dear Dr Kullback commercial information we must provide releasable information to requesters while also I recently received a summary of a talk you gave considering the legi timate concerns of the contractors and vendors In the case of government to members of the Phoenix Society I thoroughly enjoyed the stories of your early days in the records we must respect the public right to be cryptologic field you can be very proud of the informed while simultaneously protecting the legacy left by you and your compatriots national security I appreciate your expressions of support for the Two things are certain the FOIA will not go away National Security Agency andyour obvious and like it or not the FOIA is th law 0 continuing security consciousness I can imagine your distress over the misrepresentations made by Sep-Oct 1985 CRYPTOLOG page 4 l'Oll OfT16I L Vefic Ol lbY ero 4009965 part of the open record Nevertheless on the basis Mr Bamford in his preface which you referred to of Mr Bamford's words and the general tenor of in your speech and in your November letter to me As you noted he used your reputation to attempt to his conversation with me I am concerned that brip g credibility to his book He did this with other somehow he did acquire knowledge of the sealed previous -- and some present -- employees to whom classified record which was a part of my case An he spoke alarming development if so Or perhaps he was trying to make me believe that and so entice me into revealing classified information Again thank you for your support These events were duly reported to the proper authorities But I am assuming that Mr Bamford is going to describe the case as he said he would and that no effort will be made to prevent him from doing so a senior Agency official once remarked that such action would be counterproductive Sincerely Lincoln D Faurer Lieutenant General USAF Director NSAIChief CSS 10 June 1983 What must have interested Mr Bamford is that I won a precedent-setting suit against the Agency under the Privacy Act I suppose he assumed that I'd be willing to talk to him about it simply for that reason The case put on notice those people who through deliberate intent or just plain ignorance violate the law We don't want to see any abuse whatsoever of the constitutional rights of individuals Nor do we want to see any weakening of our ability to maintain the security practices that are so vital to our National Security We want to be able to carry out the responsibilities entrusted to us by the American public while at the same time avoiding any actions that have a built-in potential of leading us in the direction of a police state The task of maintaining the critically important balance between the two is everpresent and difficult But we can do it without the harmful revelations of Mr Bamford and others of his ilk Albert I Murphy 403 LETTER TO THE EDITOR 0 This is to let people know about a contact' had with James Bamford author of The Puzzle Palace He called me at home one Sunday afternoon to interview me about my lawsuit against NSA for his new book on security practices in government agencies including those in the intelligence community I declined said that I was still working at NSA and told him that I had also declined to be interviewed by Mike Wallace on 60 Minutes He replied that it did not matter that he had the entire court record and that it would be in his book including my work record which he found very impressive LONESOME Attractive illustrations on Africa 3 seek interesting articles on same May be scholarly or homespun or straight-from-the-shoulder Shorties preferred Address inquiries to Editor CRYPTOLOG P1 How could he know that I wondered then and still do A summary of my work experience at NSA exists only in a sealed portion of the record classified TOP SECRET Codeword It was not to be Sep-Oct 1985 CRYPTOLOG page 5 filOR OfTICIAL USIi3 ONLY THE WORLD-WIDESQFTWARE SUPPORT SYSTEM U FlOUO This is an account of the evolution of software support for NSA computer systems deployed to the field In the 1970's fielded ADP encompassed over 300 computer systems consisting of over 30 unique computer mainframes and 60 unique software systems Contractors were used to deploy these systems to the field while T31I provided software life-cycle support Documentation standards were being developed and applied to these systems but it was not unusual to relax documentation requirements to avoid cost overrun I I File security A source code control system U The TSSFs were to be headed by an NSA person and staffed with NSA SCE and contractor data system analysts P L 8 6- 3 6 SOFTWARE SUPPORT FACILITIES Ir - - - - - - - - - - - - - - - ------11 DEVELOPMENT iii iii U With these implement tions Phase lofW2S3 was completed REMOTING TERMINALS TO FIELD SITES -------- -------------1 FOTTG The PDP lInO was chosen because I There were many DEC systems in the field and even more were to be installed I It was compatible with the PLATFORM network and the UNIXIPWB operating system WOUO The UNIXIPWB operating system was to provide I Network file transfer capability I Electronic mail capability I Word processing and editing features Direct communication with major fields sites for software supportJrom the TSSFs was the next step Terminals at these sites were to be interfaced with the theater facility PDP-UI70 software support system via a 600-9600 baud communicatioh circuit These remote terminals consisted of a Delta Data 7000 terminal and an Anderson Jacobson lettet quality printer FlOUO The Delta Data 7000 was chosen because it was I the Tstandard terminal for UNIX systems I TEMPESTed P L 86-36 EO 1 4 c Sep-Oct 1985 o CRVPTOLOG page 6 IIA jBI I illll n l I d ' ' It '1' H' L H'Lt P L 86-36 4009965 Sf03CftE't' EO 1 4 c F L 86-36 THE WORLD-WIDE SOFTWARE SUPPORT SYSTEM U 5ep-Oct 1985 CRYPTOLOG page 7 lIA'iULI 'dA C'IlMl'iT CII 't'i'i U OXLY S CItET DOCID o 4009965 SI 36RJSq' I a smart terminal with a TMS 9900 niictopro cessor and 24K ofmernory U Software packages were being developeato take advantage ofthe Data Delta's capabilities including I a text editor capable ofediting a block of20 000 characters within the terminal I a forms package I virtual terminal software which allows the screen to be partitioned into four parts each capable of performing a different function simultaneously I TBASIC for developing softwarepackages to run on the terminal SITE SUPPORT FACILITIES I THE FUTURE U Because of the increasing use of floppy disks for input storage and software documentation they have been purchased for the CSSF ESSF and PSSF INCLUSION OF THE SCEs 'lOUO Microprocessors and their firmware are being proliferated around the world To meet the demands for programmable read-only memory PROM firmware support a portable universal P OM programmer capable of working with over 200 different PROMs is being purchased for each TSSF and SSF A hexadecimal keyboard isused to make changes and patches to the PROMs This suitcase device uses 40 to 60 Hz alc power It is capable of interfacing with an RS232 pori such as that on a host CPU a microprocessor development laboratory or any remote Delta Data 7000 terminal FlOYD The need for and use of a microprocessor development laboratory cross assemblers compilers on the network and the configuration management ofmicro rocessorsvia the PLATFORM network are now being investigated Much more remains to be done in the continuing development of this new concept in the support of SIGINT systems in the field But ithas already proven to be a cost-effective asset 0 P L 86-36 Sep-Oct 1985 11i' BI E I CRYPTOLOG page 8 rO INT CIIANP 8bS OPJbY bl C1U T EO 1 4 c P L 86-36 aCID 4009965 'fOP 8BCRI3'F Ul 'IBRl book review THE NEW KGB by W R Corson R T Crowley Morrow NY 1985 U Andropov also improved the technical _competence of the KGB staffs so tharthey were able to quickly exploit the Falcon and Snowman source that provided satellite technical data and crypto keys p 376 In the past the GRU had ' provided the technical skills but KGB technical staffing have improved so that the authors estimate that there are now between 4000 and 8000 KGB and GRU agents in the US concerned with just scientific and technical espionage concentrated around technical targets such as Silicon Valley and Ft Meade p 376 U The exploitation of the Pueblo capture by the in 96 also seems to reflect Andropov's mterest m CIphers and US communications intelligence p 345 The movements of the Pueblo were observed with the help of bar girls and tailors in Yokosuka and KGB personnel from the Eighth Directorate were moved to the Far East in an icipationof trap set for the US ship When the ship was towed m the KGB team was waiting in the harbor to remove all the equipment and documents for shipment to Moscow The infor ation taken from the Pueblo gave the RUSSIans a five-year jump forward in their race against the US in cryptography and communications intelligence p 346 GB P L 86 36 s Editor note In order to make it easier for readers to distinguish between the unclassified published material and the classified reviewer's remarks the latter are shown in boldface FOUO The book traces the history of the KGB from its Cheka origins through the OGPU and NKVD periods with a great deal offascinating detail much of it based on FOIA documents One of the authors was a senior CIA official Although cryptology is only a minor theme in the book it is worth careful reading for it gives a fairly comprehensive picture of the multi-faceted KGB activities The brutal and clumsy thugs of the past have been replaced by an elite of competent and loyal Russians who are well prepared to control Russia and to penetrate foreign targets U Yuri Andropov was a skilled morse code operator and knew a great deal about the technical aspects of comunications intelligence including communications security cryptography techniques and related technology In essence his own familiarity with all aspects of communications intelligence protected him from being overwhelmed by experts in the field p 434 l 8 As soon as Andropov became chief of the KGB in 1968 he put his knowledge of communications intelligence to work in a sustained exploitation of KL-7 traffic from US military forces in Vietnam using the rotors keylists and other information obtained in 1963 and later from the US cipher operator Helmich p 342 It is well known that in the black markets of Vietnam current crypto keys were being sold for about $100 This illustrated the great benefits that can result when the political leadership and the people at the top of the intelligence system can foresee the rich bounty that can come from well-planned black activities to augment SIGINT U Soviet interest in the cryptography and communications intelligence ofother nations has been oflong interest In 1928 the OGPU seized an opportunity to blackmail a disgruntled British Foreign Office cipher clerk who had offered to sell cipher information to their embassy in Paris They swindled him but then decided that he could be of further use In order to locate the clerk in London an agent deceived the British police into calling the Foreign Office and getting the man's name p 149 Once he was contacted they used him to supply cipher information and also to recruit a coworker in the Foreign Office cipher room The British Foreign Office was told by an OGPU defector tha there was a leak in their cipher room but the Foreign Office pooh-poohed the notion When the clerk became uncooperative in 1933 he died an apparent suicide The co-worker continued to serve the OGPU KGB until 1940 when he was dent ified by ap OGPU defector and subsequently impnsoned The defector was killed in Washington a year later Through this leak the KGB had advance knowledge of British action and intentions in India Afghanistan Persia and Turkey Sep-Oct 1985 CRYPTOlOG page 9 'fOP SEClUs'l' UMBltA 4009965 EO 4 c EO 1 4 o d P L 86-36 ' fOP SSCRI3'f' UMBRA KGB reaction to the penetration oftheir the human element in running agents combining pressure and rewards Several appendices give copious details of incidents from the 1920-1950 Fo i period that show this combination of ruthlessness ingenuity and tenacity And to its own members the KGB is merciless But in spite of its long sinister history it is still considered a highly prestigious part of Soviet society as its sword and L - _ _ _ lI IA l f t-er-th -e-B ri tI s h-p-o 'l ic-e- f -or-c-e d shield their way into the building ofthe All Russian Cooperative Society in Londonin 1927 to get proof ES GOo The authors' closing thesis is that the power in the DSSR has shifted away from the of Soviet espionage Prime Minister Stanley Baldwin a Socialist stated in Parliament that the Party and the Army and the KGB will now British Government had been reading Soviet operate Russia lll 0re efficiently t an did the ageing diplomatic cipher traffic for years and even read aloud a decrypted message noting thata group was undecipherable All this information was published in the parliamentary record the Hansard The Soviets immediately changed their diplomatic ciphers' worldwide In a talk at theUS State Department in 1975 R V Jones said that from that time until 1946 when he left MI6 Sovie di lomatic ci hers were unreadable p EO 1 4 c 440 ciphers was mUch more vi erorous than that of the om r--- P L BULLETIN BOARD U In spite of improvements in Soviet ciphers an NKVD cipher was read in the postwar era one that exposed the Rosenberg spy ring p 221 D The KGB was energetic at compromising and exploiting cipher room personnel ofother countries and took stern measures to keep their own clerks and cryptographers from being exposed to corresponding efforts by foreign intelligence services Despite this Igor Gouzenko was able to defect in Canada taking messages and other materials Subsequently the controls were tightened even further p 225 D The KGB recruited low-level military people such as the American NCO Johnson and the British RAF NCO Prime and maneuvered them into situations where they could supply cryptographic and COMINT information pp 343 and 357 Sgt Dunlap at Ft Meade photographed documents he was supposed to deliver as a messenger and passed them on to the Soviets p 460 Prime was infiltrated into GCHQ whence he was able to pass on a variety of information 86-36 DEMONSTRATIONS OFI EC CCO The Bookbreakers' Forum on Machine Aids is sponsoring demonstrations of NUTHATCH a set of bookbreaking programs on the ASTW designed for plain or decrypted codes The demonstrations are scheduled for the week of 13 January 1986 every day at 0930 in room 2C030 As only six persons can be accommodated at each session reservations are rey g025 1l I PC NEWSLETIER FQtJQ A PC Newletter for G Group personnel is now being published by G331 It lists software for analysis and processing developed in Ganci elsewhere and contains helpful hints for both novice and experienced users For a subscription calq 63-4524 FOREIGN-LANGUAGE VIDEOTAPES - EOUQ Videotapes of selected foreign TV programs can be obtainedllpon request To inqllire about the availability of tapas in your language calli Pl6 963-1103 U One of the outstanding attributes of the KGB is its persi$tence It is tireless in going after its targets The case officers are also good at handling EO 1 4 c P L 86-36 Sep-Oct 1985 CRYPTOLOG page 10 'FOP 8S6RS'f' UMBRA P L 86-36 aCID 4009965 S8eR 'f ON THE LIGHTER SIDE Vera R Filby 42 There was a new hire named Larking Who on his first course was embarking But he missed his car pool U So he drove to the School And was last seen in Overflow Parking An NSA linguist named Rease Could never quite manage with ease Verb forms in Slovenian U Or Czech or Ruthenian And therefore he switched to Chinese A clever young cryppie named Sue Had a message thatl She recovered the keys GGe With the greatest of ease ID6YO But she didn't knowl EO 1 4 c P L 86-36 There was a reporter named Grotius Whose grammar and style were atrocious But he learned how to spell U And to punctuate as well And now he's considered precocious When I foolishly tried cryptanalysis I was suddenly seized with paralysis Faced with grids grills and matrices U Vigeneres generatrices I fear I need psychoanalysis Sep-Oct 1985 CRYPTOLOG page 11 HAPHn E ilIA C8M1l'lT CIIMIJ t bS Q lb SI JCnWf' aCID 4009965 from the past THE NEW SECURITY LAW Evert Conder On 13 May 1950 President Truman signed a new bill designed to safeguard the security of cryptographic and communication intelligence information Previously there was only the Espionage Act of 1917 An Act to punish acts of interference with the foreign relations the neutrality and the foreign commerce of the United States to punish espionage and better enforce the criminal laws of the United States and for other purposes The new measure Public Law No 513 is entitled To enhance further the security of the United States by preventing disclosures of information concerning the cryptographic systems and the communication intelligence activities of the United States The safeguarding of this information has always presented a difficult problem Even though years may pass publication oftechiques or past successes may be dangerous There is no time limit when security limitations may be safely lifted Thus as long as intent could not be proved there was no way in which the Espionage Act could be invoked to punish civilians who disclosed military information to unauthorized persons This fact has been clearly demonstrated several times In 1931 Herbert O Yardley published a book entitled The Black Chamber which disclosed certain information about the cryptographic activities of several foreign governments Although great harm was done Yardley apparently could not be held to account legally because of the inability of the government to prove intent to injure In defense of his actions Yardley maintained he had acted for the good of the country since he was attempting to show how insecure and inadequate our cryptosystems were at that time A few years later when Yardley attempted to publish a similar book it was necessary for Congress to pass A Bill for the protection of Government records directed specifically towards gagging Yardley and preventing the publication of his manuscript Since the end of World War II there has been only one other case where the courts were techniques The ideal of course is to develop your own as far as possible while trying to keep successful in obtaining a conviction under the the other person as uninformed as possible What he doen't know will not hurt you while what he learns from Y0 i may do great harm The more secure his lines of communication become the more difficult your own work becomes It has always been difficult even in time of war for a court to secure a conviction against a civilian accused of disclosing vital military information Adequate protection of course is available for the prosecution of military personnel and other persons subject to military control and the Articles of War Civilians however until now could only be tried under the rather broad Espionage Act mentioned above The weakness of the Act lies in the fact that 1 pre-meditated knowledge that a foreign government will receive the information and 2 intent or reason to believe that it would be used to the injury of the United States or to the advantage of a foreign nation must be proved Sep-Oct 1985 Espionage Law This was the recent case of Judith Coplon Even here the judge had to charge the jury to consider only two counts 1 unlawful possession of government records and 2 conspiracy to commit espionage The other cases have been tried for perjury One reason apparently for this is the government's reluctance to chance further disclosures of information which might occur in the court proceeding Reprinted from the ASAReview Vol 1 No 4 July-August 1950 CRYPTOLOG page 12 FOIt OI'FICIAL USFl ONLY 4009965 ETYMOlOGIST1S DELIGHT II Match the borrowed word with the source language Un draille 7 The etymology of the word draille should perhaps be recorded before it has time to fall into obscurity Before becoming un draille it was un dry And before that it was un dry Martini Edward D Rockstein P16 p 76edr@bar7c05 From Madame Aubrey and the Police by Hugh Travers SOURCE LANGUAGES WORDS 1 Algonquin A milo a sorghum 2 Arabic B shampoo bund a quay 3 Bantu Sotho C massage saffron soda mortise lemon 4 Basque D go down 5 Breton E yoke Juggernaut jute sugar 6 Celt F catty a unit of weight 7 Czech G terrapin skunk moose squash raccoon 8 Dutch H tycoon 9 Finnish I khan 10 French J yak zebu 11 German K drub casaba 12 Greek L menhir 13 Gypsy Romany M jai-a-Iai 14 Hindi 15 Japanese N sable pogrom O pistol howitzer 16 Malay P quahog a clam 17 Maori Q machete ranch 18 Narragansett 19 Norwegian 20 Persian S cactus licorice skink R vole skull tangle seaweed T doodle 21 Polish U barnacle 22 Russian 23 Sanskrit V pal W a dle mink 24 Spanish X faucet 25 Swedish Y azure scimitar caravan 26 Tamil Telugu Z snorkel dowel 27 Tibetan AA snook selvage 28 Turkic BB kiwi 29 Turkish Cc sauna Sep-Oct 1985 PI-Jan 86-n-93609 CRYPTOLOG page 13 POR OPFICIAL USE ONLY jacxn 4009955 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu