DOC liD J4 019 e 'S 9 UJ UV0UJ l1 l D EVU D l3UJ L11I1WV lSlIlW lS Q WlSUlfil15 f WUlW l1aJWfil lBf Urnl1rn dJ Drnm Drn 0 0 1 k o SOLIS -- A VEHICLE IN SEARCH OF AN ENGINE o o l HOW DO YOU TELL THESE TWO CLOWNS APAR T o o o oo ooo 6 THE RETURN TO H F 1 1 7 SECOND SIGHTING o Sue Donym o o 12 JAPANESE TRANSLATION AT A H o S o o o o o o o o o 13 T - VI S ION MEDIUM OF THE F UT URE o o 1 7 REF LECT ION SAN D RECOM MEN DAT ION S o Vera R F i l by o o o 1 9 HUMAN FACTO RS NEWS LETTER o 21 NSA-CROSTIC No 21 o o o o o o o o o o David H Wi11iams o o 24 GOLDEN OLDIE ON OPENING STATISTICS oo Marjorie Mountjoy 26 HENRY CEMENT PHANTOMS OF OPERA tions 27 CLASSIFICATION CORNER IT'S PARTY TIME o 28 PUB LIS HER ' S MESSAGE 2 9 1 1 P L I L L 'fIllS BOOHMRN'f eON'fAINS eOBRWORB r-IA'fHRIAI i 6LASSIFIEB BY NSA eSSM 123 2 RE'w'IEW eN 2 JAN 2 e e 9 Declassified and Approved for Release by NSA on 'I 0-'1 - O'I 135 6 MDR Case # 54778 pursuant to E O 86-36 OOClO 4019659 Tap SRGBIR' Published Monthly by PI Techniques and Standards for the Personnel of Operations JANUARY 1979 VOL VI NO 1 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor in Chief o o ooo o o o Arthur J Salemme 39575 Collection o o ooo o 1 '- Language o oo oo t Machine Support o IC89SSs Ic ' 1 8i 5 8o 5IIl 8 s 5 303s Mathematics o 10--------- Special Research oo ooooo ooo ooo Vera R Filby 7119s Traffic Analysis o o o Don Taurone 3573s Production Manager o o o o Harry Goff 5236s For individual subscriptions send name and organizational designator to CRYPTOLOG PI OP SBeRIR P L 86- 3 6 DOCID 4019659 L 86-36 SECRE SOLIS -A Vehicle in Search of an Engine I I T124 n Agency wit once remarked that SOLIS has a Volkswagen engine in the body of a Cadillac This statement evokes its share of nods and smiles But why What is it about this rather absurd little statement that made it humorous to SOLIS aficionados The answer is that this metaphor had in it the germ of truth and many hearers recognized this truth and could appreciate the way in which the wit expressed it The metaphor was first voiced in 1972 Today nearly seven years later it remains apropros r--------------- vti Let us then examine the system and the metaphor What features of SOLIS remind one o the sensuous charms of a Cadillac body by FIsher What is about the system that caused the wit to describe it as a grossly underpowered vehicle To answer these questions it will be necessary to understand SOLIS -- its purpose its organization its operational philosophy -- and to take some measure of its performance as compared to the system develo ers' own loosely defined goals and expectatIons SOLIS -- the SIGINT On-Line Information System -- was born out of the experiences and frustrations of the HARVEST End-Product File Operation For those of you who don't remember asking a question of the HARVEST End-Product File could sometimes qualify as one of life's unique experiences with the system's response ranging from everything you never wanted to know about all subjects except the one you were really interested in to nothing at all More often it was something between these extremes But since questions against the HARVE T File were batched and run only once or tWIce a week you never knew what the response would be until you got a call to Roll up your wheelbarrow or to Try again next week Under these circumstances it is no wonder that SOLIS was developed as a viable alternative It is only surprising that i t took so long It was the sincere hope and belief of the system's first designer planner that SOLIS could operate with a completely automatic indexing routine After all our experience with human indexers had not been a smashing success It is difficult to get editing billets it is difficult to fill them and human editors are consistently inconsistent in their approach to editing The SOLIS developer planned to avoid all these probl ems by developing a sure-fire self-priming automatic indexing routine He would prepare indexing algorithms for the product serial the date-time group the from and to lines the XXMM line the content control code and the other external data of potential usefulness to a retriever r Before describing SOLIS in detail it would be well to impart some understapding of what is meant by the term End-Product or SIGINT roduct Storing and r t tieving the product IS after all what the HARVEST End-Product File and its suc essor STRONGBOX and SOLIS were and are all about EO 1 4 c P L 86-36 January 79 CRYPTOLOG Page 8ECRB Ib l Iq5LE 'ilA eerotIN'P ellA RiELS alibI EO 1 4 c P L 86-36 EQ 1 4 c DOCl D 401P9I658S'-3- SECRE'f SOLIS Progpams and Procedures SOLIS today is a multitiered structure of programs and procedures that fit together into a harmonious whole January 79 CRYPTOLOG EO 1 4 c P L 86-36 SESRE'f Page 2 IhltN5LE 'VIA e6fo1Ilq'f elhltNNEL 6NL DOCID P L 86-36 EQ 1 4 c 4019659 SECREf January 79 CRYPTOLOG Page 3 SECRE'F 1l'flIBbE VIA ESlIIlI'f' EI 'fIINEbS SHb' DOCID 4019659 P L 86-36 EO 1 4 c January 79 CRYPTOLOG Page 4 SHCRET lIi1'JfBLf fA eeMIN'f eltJllrftffibS eUb'f DOCID 4019659 SECRET January 79 CRYPTOLOG Page 5 P L 86-36 EO 1 4 c SECRE'f IJ OL'IBbE 'I'M e8lfIlff ElflttN14fLS 6NL I DOCID 4019659 SEeRS'f P L 86-36 EO 1 4 ' e How do you tell these two c lIns apart iF L There are ten differences between these two clowns Can you find them Incidentally sOine CRYPTOLOG readers are unaware that there are two Dave Williamses ho$e names have appeared frequently in CRYPTOLOG i One often gets blamed or praised for hat t e other does so maybe we ought to call atte tion' to the differences in the names and the tmt ibu l tions made by each Dave Especially sjhce pne of them is going to become the Editor in Chief of CRYPTOLOG starting next month see page 29 David H Williams I ' if David H Williams has written an occasional item for CRYPTOLOG most of h i s thlng appear -- he in more prestigious Agency publi9at 6ns but _______________________ is famous among CRYPTOLOG'readers for Ibis -------------- ------__1 NSA-Crostics I l' cap' YO i imagine what it must be lIke to be the one hundred-and- eleventh person to bear the 'same name is our Machine Support Editor Hi uSed to write more when he was the editor of the now defunct C-LINERS For the past oup16 of ye rs he has been helping CRYPTOLOG by pefsuading other people to submit articles o machine problems to the magaz i n e ' SOLUTION TO NSA-CROSTIC CRYPTOLOG December 1978 By David H Williams see next column Frances Blank It's Got to Get Out Today CRYPTOLOG April 1977 One difficulty arose with electronic computers deSIgned to translate from one language to another The headline 'Mary suspended for youthful prank was fed into a computer translated into Russian and then back into English It came back as 'Mary hung for juvenile delinquency ' U Now then which Dave Williams is going to become CRYPTOLOG Editor n Chief starting with the Febru ry issu 1 It' the on with the The one WIth thel_ Jis going to continue as the e Support Editor Maybe we can persuade'L Jto write an article of ' his own as a t st just to see who gets the compliments And remember if you like or' diSlike a dl f lnition in an NSA-crostic don't tell ' It'll be the wrong Dave I U January 79 CRYPTOLOG Page 6 BJjCRJjT IW Bt E rnA eSlIIlR' EUR W N'EIJ6 eUb 86-36 DOCID 4019659 UNCLASSIFIED P L 86-36 THE RETURN TO H F U S tactical forces intend to return to the use of HF radio for vital longrange communications because of the o vulnerability of satellites and cables This conflicts with existing U S plans to give away the HF fixed service frequencies to the Third World at WARC 79 on the assumption that the United States will rely on satellites from now on A central issue is the military control of their own communication facilities which is threatened by Congressional demands that the military lea8e satellite services and no longer design and build military comsat systems The technical issue is that satellite-era technology applied to HF makes HF cheaper and more reliable than satellites for certain kinds of traffic I P'3 the Navy has recently had a FLTSAT canceled by Congress before it was launched because its costs were thought unfavorable compared to leased comsat services Dr Scheder of Rockwell in reviewing future technology development for tactical communications noted that HF could be greatly improved by using special IC digital processing to do frequency filtering of HF carriers to get rid of EMI on board ships and to reject jammer energy The Army expects to reduce the use of tactical voice traffic in the forward area -even to the point of considering no voice -because they cannot afford narrowband jamproof secure voice but can afford jamproof and reliable data radio links which are necessary for fire control Microprocessors and frequency-hopping radios with text displays and small HF at AFCEA keyboards will make this practicable as well as cheap -- and some of this equipment e g Major General W Hilsman USA in describRACAL MA 4230 4231 auto morse sender receiver ing the Electronic Battlefield of 1985 at display already exists AFCEA 1978 1978 conference of the Armed Forces The interest in HF and in data traffic inCommunications and Electronics Association included HF as a principal transoceanic medium stead of voice is not purely talk The AFCEA exhibit displaying the latest in military to supplement cable and satellite for Army tactical needs In reponse to a question about the communications equipment in over 400 booths was notable for displaying a variety of very future of HF in tactical communications MGEN Hilsman -- who directs the tactical communications modern HF equipment -- in over 20 booths -including several major companies which have program -- said that a study 2 years ago had been making military sat llites It appeared eliminated HF because satellite links were so that these manufacturers were alert and well much easier for the operator but that he had informed about the U S military's interest completely reopened the HF question The in HF field commanders like satellites but realize they are highly vulnerable or may have long Navy HF Exeraises outages or even be canceled so Hilsman is now training operators on SSB HF Neil Birch The U S Navy in the Mediterranean area shuts off its satellite from time to time to of C3I followed this by saying that 000 is force the Navy operators to use their HF links not down on HF and currently runs a cemetery net in NATO and 000 is now looking So far this has resulted in stress and traffic backlogs of a week or more but the Navy is at meteor-burst and adaptive-HF links Birch persisting in trying to resurrect HF operahad earlier spoken of HF as one of the triad tions Presumably foreign SIGINT finds the satellite cable HF for a much-needed net of worldwide secure voice using 2 4 KB digital HF episodes interesting The Navy MARS organization has built up a cadre of about 3500 to PARKHILL on analog voice encryption Dr N 4000 Navy amateurs who are given military freMcAllister O CNO in speaking of Navy C3 for quencies to operate on just to keep Borne the future noted that HF employing new HF capability These MARS nets operate with modular equipment afloat which will use digital SSB voice and NFSK printer to keep the operafiltering to extract signals from shipboard tors trained and to keep the HF frequencies in noise is part of the long term Navy plan use Because of cochannel interference in the He noted that there is keen competition beMediterranean area the operators much prefer tween U S and EEC equipment and said this the satellite links but the Navy -- having was a primary area to achieve U S -NATO had a recent FLTSAT program canceled -- cannot interoperations in equipment communications afford to become completely dependent on and operations Cost is a key factor and satellites The MARS operators practically never use morse but the NFSK printers -- also widely used on maritime circuits --' use filters World Administrative Radio Conference as narrow as morse These NFSK printers have Geveya 1979 -- see Call signs and WARC 79 replaced morse on most civil maritime mobile P L by l ICRYPTOLOG May 1971L circuits with much higher traffic capacity January 79 CRYPTOLOG Page 7 UNCLASSIFIED DOClD --401965-9UNCLASSIFIED LEASAT VB HF The LEASAT problem is also an important factor for Congress feels that Defense monies can be saved by eliminating dedicated military satellites and requiring that the military departments lease satellite services from the commercial carriers LTGEN Paschall USAF criticized this strongly pointing out that the host country PTT would not allow a U S commercial-satellite link into Diego Garcia while a military satellite would have been negotiated with the corresRonding Defense Ministry The tactical forces do not want to be dependent on foreign commercial satellites and U S commercial satellites cannot downlink into foreign areas Senior military officers declared forcefully at AFCEA that lease vs buy was about equal in cost but that the central issue was that the military had to control its own vital facilities and had to use leased services as a backup for low-priority traffic With telecommunications policy-making now shifted to NTIA in the Commerce Department any new dedicated communications facilities used by DoD will be subject to policy control by NTIA OMB and OSTP according to Executive Order 12046 and this gives further motivation for the U S military departments to reconstitute their HF capabilities for U S -NATO tactical communications are not now subject to NTIA control by Executive Orders 11556 and 12046 BF at ICC-78 However a few weeks before the declarations of interest in HF radio at AFCEA CAPT J E Weatherford USN Ret who was a Navy frequency manager for 31 years and a member of OTP until a few months ago engaged in WARC 79 preparations declared at the International Conference on Communications ICC-78 in Toronto that the United States expected to give up its fixed HF channels to the Third World at WARC 79 as part of its bargaining position HF he noted would suit the southern-hemisphere countries very well He also noted that the U S view was that northern-hemisphere countries could generally close down their HF fixed circuits because they had 'extensive satellite and cable circuits For the United States this would clearly be military HF frequencies for there is not much nonmilitary U S fixed HF The southern hemisphere Weatherford said was starved for HF He said spectrum sharing was crucial and noted that elimination of local navaids such as Shoran and Decca etc was planned However e ansion of amateur radio frequency bands was under consideration because the amateur world was growing internationally and the Third World countries had found amateur radio very useful for disasters and emergencies because among other things northern-hemisphere hams have given them enormous voluntary support in relaying and servicing messages clearing all frequencies and helping in every way The South American countries in particular found the use of HF ham nets saved them the cost of emergency nets and _the long DX lets them work at uncluttered higher HF bands Worldwide these are about a million hams who operate all kinds of HF links by pooling a small portion of the HF spectrum and knowledge of this high utility has impressed the governments in the LDCs less developed countries with the flexibility independence and low cost of HF communications Weatherford spoke authoritatively outlining the OTP now NTIA position on the issues He noted that the radio regulations were due for a major reworking at WARC 79 and that the nongovernment use of radio was going to dominate the U S position at WARC The United States needs the support of the nonaligned nations to achieve its WARC 79 goals and most of these countries are in the southern hemisphere The position of the Third World LDCs is that they want to eliminate IFRB registration dates and claim bands of spectrum for their own proposed future uses which claim has been strongly resisted by the United States and the other Western industrial nations At WARC 1974 the United States took exception to a provision of the treaty reducing U S shore station assignments At WARC 1977 on satellite broadcasting which culminated in the one country -- one frequency principle and in orbital slot limitations the treaty is so unsatisfactory that President Carter will not send it to the Senate for approval Now this political clash over the radio spectrum is 'to be resolved at WARC 79 by U S negotiations which will trade off HF frequency assignments which the U S tactical forces intend for major tactical backup The U S position for WARC 79 was completed on 31 May 1978 and there was an SPM preparatory meeting on 23 October 1978 to consider the technical bases for WARC 79 The next GWARC will not occur until 1999 so WARC 79 will set the framework for radio usage and allocation for the rest of the century TeahniaaZ DeveZopments There has been significant development in HF equipment practices and traffic growth over the last 15 years while the U S military has virtually let their HF systems stand still or dwindle out of existence Hence much U S military HF equipment and technique must be updated to modern low-cost digital electronics Siemens predicts considerable growth in stations and traffic -particularly data traffic -- for HF Improved techniques such as SELCALL and channel pooling have reduced unscheduled message delays from hours to minutes over HF mobile links Error rates as low as 10- 5 and 10- 6 on long links are regularly obtained byARQ January 79 CRYPTOLOG Page UNCLASSIFIED 8- DOCID 4019659 UNCLASSIFlED and error-central coding -- rivaling telephone lines In the United States HF can connect directly into the telephone nets Where Al telegraphy of 30 years ago took a KHz of bandwidth to send 12 wpm about 5 bps modern NFSK and PSK systems regularly send at rates close to 1 bit Hz i e 100 baud NFSK in a 170 Hz SSB subchannel or 3000 bps on a 20-tone 75-baud QPSK 3000 Hz SSB channel This represents a 100- to 200-fold improvement in use of a single iink and the actual gain is even greater because of much greater accuracy and full utilization of equipment In addition to transmission improvements better propagation forecasts antennas channel sounders filters etc allow many more conventional carriers to operate concurrently at incomparably low cost Siemens notes that a marked increase has been achieved within the last few years in telegraph and data traffic mostly over small radio stations which offer a maximum of economy It is certain that any modern HF tactical radios developed for the U S military will very shortly become a demand item in world trade and technology transfer and will spread worldwide as comsats have EASCON 78 Captain Boslaugh USN of NAVELEX outlined a plain for much increased U S Navy use of HF The ELOS Extended Line of Sight HF ship-to-ship system will be the primary communication channel for fleet tactical communications over ranges up to 300 miles nd will resist Soviet HFDF or jamming Long-haul HF will be used to back up shore ship satellite links The Navy having shut down HF stations to get money for satellite programs is now putting them back into operation because it cannot get money for dedicated satellites Captain Boslaugh outlined a broad program of new equipment development for data and digital voice over HF He also declared that no one could predict what would happen at WARC 79 but that frequency managers in the Pentagon feared the Navy might lose some of its resources which could damage ELOS and other vital programs He also predicted that WARC would have the greatest effect on the long-haul HF communications At an EASCON 78 seminar on C3 I given by N Birch of OSD HF links were consistently shown as part of the triad of cable satellite and HF to give redundant C3 links In addition to conventional HF traffic military spread spectrum systems have flourished to support strategic weapons systems and other crucial links HF spread spectrum transmitters can send chip-coded waveforms with bandwidths up to 20 percent of carrier and frequency hoppers can span megacycles between pulses with frequency stabilities of one Hz The signals are jamproof undetectable and a hot export item WARe 79 will consider the introduction of spread spectrum signals into the nonmilitary and civil sectors At another EASCON 78 meeting on Frequency Management directly concerned with WARC 79 Leo Buss of NTIA and L Petak of FCC both downplayed HF as a matter of secondary importance at WARC on the basis of responses to the NOIs However R Shrum of the State Department who had visited over 50 countries as part of the State Department's WARC preparations gave a completely opposite view at the same meeting He declared that the three toppriority matters at WARC 79 for the LDCs were HF HF and HF His paper in the Conference Record stressed the same point and emphasized the political importance of HF allocations to the LDCs Shrum predicted that HF would be the most contentious issue at WARC 79 The Policy Conflict The fundamental conflict within the U S policy-making apparatus over HF was reasserted at EASCON 78 in September 1978 at an IEEE WARC meeting in October 1978 and in a Washington Post editorial on 21 October 1978 At The NTIA and FCC spokesmen claimed that the use of HF for fixed point to point circuits was going down because of satellites and' tuG I lsed JDOblie aoept IDOt o B _ IIOlIO-62IIO Flzed __o -- -- ---- S2liO-M3O Flzed land 1DObOeoo _ 117U-7ooo Flsed o _ a_do _ JlV16-l23IO do - do _ 133110-14000 do - _ -- -- ------ ---143 -149lIO do_ o _ -- -- -- -------- -- --I IM I do o o - oo -- ---- -- - --173llG-17700 do o __oo _ - -- -- -- - -- ---- ---2OO1 2100 __ _ do_ o -- - ---- -- ---- - -- ---20016-21000 do o -- -- -- -- -- - ---- ---- -22726-23200 do -__ oo - -- -- --- - ---- -- ---- - ----- 1l5 a _ 1 14OOO MII-WO Maritime mobDe Do I2OO-UIO Do 62aO-6IOO 7000 Amat eur Nnatear teDlte IIOOCHIII6 IhrIUme mobAl 121 12310 Do I IMIO Redlo utronOlDJ 13950-14000 Amateur 143 -14400 Do UI31 164GO Maritime mobile 17311 -17410 Do 20016-20210 Do 20950-21000 Amatpur amattUf sattW e 22720-22855 Maritime mobile NOI-5 WARC 79 Portion of the spectrum proposed for reallocation to FiJc d Services Federal Register Vol 42 No 104 May 31 1977 p 27758 January 79 CRYPTOLOG Page 9 UNCLASSIFIED DOCID 4019659 kC I sec kc sec 7000 14000 UNCLASSIFIED Key '0 se cn IIMe eorOloglCOI ' olds ROdIO- no go'ion ROdIOloco on Mafollme 6ajmOblle B Slondard frequency r- -l Atronauhtoi Soace mOblie L Jeorfh-spoce 47 _Amaleu r II ROdiO astronomy 44 ------------- 4 1I0P 01 regIons ond regIon dellnolions --Region tf urope InC'ud nq all USSR 'errltory ou'slde f urope MongolIan Peoples' Republic ASIa M nol ond Allleo Region 2Western Hemisphere InCludinq Howall 4063 Region 3Austraha New Zeoland OceanlO and' ASlo elC1ud ng USSR 'er 'ol' ond ASIa M nor 4000 3950 3900 3800 By permission of Iladio Corporation of America 3500 Regions 2 3 3 2 3 Radio-Frequency Allocation and Assignment excerpted from Communication System Engineering Handbook Donald H Hamsher Editor-in-Chief McCraw-Hill Book Co January 79 CRYPTOLOG Page 10 UNCLASSIFIED - DOCID 4019659 UNCLASSIFIED cabl es and hence were convinced that the United States could trade off the HF frequencies for LDC support on other issues Other wellinformed parties present including a former NATO frequency manager claimed the opposite viz that HF use was increasing The disagreement on this basic fact seems to stem from the data base used and the NOI comments The IFRB listings show that the use of fixed HF links for public correspondence has indeed gone down because of satellites The U S users e g AT T predicted a decline in fixed HF usage for public correspondence for the same reason However the IFRB data do not reflect what is actually happening in HF for diplomatic and military and other nonpublic users are steadily encroaching on every unused HF channel and the ex-NATO frequency manager claimed that he combed the IFRB list for idle channels assigning them ad hoc to meet the intense demand Shrum said that many countries used HP for domestic links and never filed the usage with the ITU The continuous sale of NFSK printer and other efficient modulation equipmen suggests that the users are passing more and more traffic while IFRB only registers the proposed usage not the actual traffic intensity The result is that U S WARC policy is being formulated from an unclassified data base which does not show the nonpublic usage domestic usage in other countries unregistered usage the effects of new equipment or the projected usage by U S and NATO military communications The NTIA view of Hp'as a bargaining chip based on declining usage was repeated on 13 October 1978 by Buss at an IEEE meeting on WARC A Washington Post op-ed column on 21 October 1978 by G Kroloff formerly of the Senate Foreign Relations Committee also advocated giving up HF bands to the Third World while a speech by Senator H Schmidt R-N M chided U S WARC preparations for being left to technicians who were not protecting U S policy and economic interests Satellite Communications September 1978 frequencies to dispose of as a bargaining chip will be intensified if the newly issued Communication Act of 1978 n R 13015 is enacted before WARC 79 as expected This Bill drafted by former TV newsman Van Deeriin would transfer most of the FCC functions and all of the NTIA functions and people to an independent agency the National Telecommunications Agency NTA NTS will do policymaking for all U S telecommunications including 000 It will control all frequency allocations for government and nongovernment users and will resolve all interagency telecommunication differences NTA will prepare and manage u s participation in international telecommunications conferences and will develop plans policies and programs for government telecommunications NTA will serve as the principal advisor to the President on telecommunications issues and policies and may absorb the functions of any government agency which relate primarily to development or implementation of telecommunications policy including privacy In particular NTA will coordinate development and operations of emergency telecommunications systems and will participate in the development and operation of nat onal-security telecommunications systems Unlike the i934 Act this new Bill H R 13015 has no war-powers provisions corresponding to 47 USC 606 so that the military departments or the President cannot take over or control radio or civil telecommunications in a war emergency or a war This will have the effect of limiting the military services to the frequencies and facilities they have at the start of a war or which they are able to lease under NTA guidance and this could affect the renewed U S -NATO commitment to HF -- possibly by forcing much greater joint use and sharing of U S -NATO military frequencies under agreements that lie outside of NTA's scope Prospectus for fiF Despite the internal U S situation the prospects for growth of HF traffic for miliThe final U S position must be completed tary commercial diplomatic maritime airand sent to Geneva by the end of January 1979 craft weather news-agency security-forces and the most basic facts and decisions about HF emergency nets etc and even for scientific and its importance to the United States are data and economic aid seem irresistible The still unsettled The military users view HF improvements in radio and processor technology as integral to tie together many nets and to and low-cost displays will bring the cost of back up and reconstruct nets of all kinds in equ1pment down markedly and greatly improve case of outages or war damage to other cirtraffic handling for messages and data Many cuits while NTIA and FCC see nonmilitary different kinds of traffic will flourish inpolicy issues about broadcasting radio cluding voice narrow-voice data fax TTY astronomy satellite sensors and other non-HF morse slow-scan video and graphics telemetry matters as more important telecommand etc Improvements in weapon guidance can assure destruction of U S and The Communications Act of 1978 NATO fixed trunks and switches and most satellites cannot withstand EW Hence existing The difference in point of view between U S military communicators who want dedicated communication nets must be discounted for war fighting On the other hand the resistfacilities which they can control and the ance of HF nets to EW and to nuclear bursts NTIA-FCC WARC team'which apparently wants HF ' January 79 CRYPTOLOG UNCLASSIFIED Page 11 DOCID 4019659 P L 86-36 UNCLASSIFIED and blackouts is better understood than 15 technology could give data traffic over more years ago With microprocessors and memories than one million different links simultaneously to interface between the users and the tricky at total traffic rates above 500 billion words HF circuits easy and reliable communication per day -- about 10 4 greater than the WW II to any point can become a commonplace TrafArmy ACAN net fic demand will encourage brevity codes and data compressors and channel pooling In The demand technology mass marketo and 1963 HF traffic was estimated by lTV at sever- allocation-usage arrangements are all coincidal million wpm NAE National Academy of Ening and WARe 79 will be a major factor in gineering in 1972 estimated that a 19-fold determining how fast this modern HF trafJic develops growth in HF channel usage was possible by better technique Current state-of-the-art U SECOND SIGHTING ome time ago -- well actually a long time ago -- we traffic analyst had a word in our vocabulary that we enjoyed using It was a good word and we enjoyed using it because it expressed exactly what was meant Other people could use the word too -- it wasn't jargon at all Everything went well for the word for a number of years Writers used it and readers understood it It wasn't controversial either After a while though a group of newcomers began writing reports about traffic analysis and they used another word to express the same concept We commented that their word a perfectly good word itself was not exactly correct when used in a TA context They countered that our word was a no-good word because it wasn't in any dictionaries and their word was a good word because it was in dictionaries They were correct when they said our word wasn't in dictionaries but we insisted our word really was a good word because it was a compound word and we had followed rules for forming compound words Besides the two words our word and their word are pronounced differently -- that means they couldn't possibly be the same word Not only that but there are lots of NSA words that aren't in any dictionaries Neither side gave in We used our word and they used theirs Whenever we could as editors or prepublication report reviewers we changed their word to ours Their feelings were ruffled and we had many arguments often quite loud ones The other-word people began to spread like fungus throughout the building and some of them were in positions to change our word to theirs Now our feelings were ruffled and again we had many arguments often quite loud ones One argument was so loud that a decision had to be made about which word to use A disinterested third party at NSA caught unwillingly in the argument asked a disin- S terested fourth party on a high-level staff to make the decision He did He or some of his staff or a committee decided that a third word would be used Traffic analysts here on ships at sea in the air on foreign soil and everywhere gradually began to use the third word We weren't too happy with it because it looked like a misspelling of that other word but all went reasonably well At least we weren't having those arguments any more All continued to go reasonably well until that third party the very one who asked for the dispute to be settled took some papers to a very high-level staff to be signed by a very high-level person A member of the very high-level staff read the papers saw the third word marked it out and replaced it with gasp that other word Here we are again That other word is now used by writers at very high levels Traffic analysts use the third word However we are beginning to have some hope for our word We saw it in a dictionaryl three or four years ago -- first sighting Today we saw it in a book 2 intended to familiarize a wide audience with telegraph and data communication over shortwave links -- second sighting We are looking forward to the third sighting Who knows we might get our word 3 back again lWebster's New WorZd Dictionary of the American Language Second edition 1972 2TeZegraph and Data Transmission over Shortwave Radio Links Lothar Wiesner Siemens AG Berlin and Munich Heyden Son Ltd London 'a1tl Jolo J 0 paAo dw1 11 sl 1nq Mau P OM P lq1 lIa tl JoIIo J jSS l jooq P OM al a tl J0t-o J1i j lSE 8u ure8 P OM no - Q January 79 CRYPTOLOG Page 12 UNCLASSIFIED U OP SECRB UMBR 4 'AGES FIOM THE 'AST The following are excerpts Chapter IX Conclusion pp 100-104 and Appendix B pp v-viii of Histor'if of the Signal Security Agency Volwne Four The Language Branch Army Security Agency Washington D C 15 September 1946 TS A copy of the original document with file number -441 is available in T1213 Room 2N090 x5 59s Ed T ranslation is only one step in the long process of rendering intercepted enemy communications intelligible to those who plan Allied strategy but it is the ultimate step for only expert careful translation can reveal the import of enemy communications and transform them into vital information This statement was the prize-winning entry in a contest participated in by Language Branch personnel in the summer of 1944 and it expresses simply but eloquently the attitude of the translators toward their mission Deeply conscious of the responsibility which was theirs -- and indeed it was a great responsibility since upon their knowledge and ability depended the final exploitation of the product of thousands of other persons engaged in the interception and cryptanalysis of the most secret communications of the Japanese Empire -almost to a man they fell to with enthusiasm and devotion determined to get the most out of the material which was provided A review of production figures during the war that is from Pearl Harbor through August 1945 reveals that the Language Branch scanned considerably more than 1 100 000 decoded messages in all categories out of which approximately 415 000 were forwarded to the Hilitary Intelligence Service in the form of transla- tions This was a record far beyond what could have been anticipated or even imagined at the outset when the force of Japanese translators consisted of only nine persons It is believed to be an achievement of which all who participated can be proud In bringing this history to a conclusion the following further observations have been appended with the thought that they might be helpful in determining procedures should similar situations have to be dealt with in the future Regardless of the language used the linguistic aspects of any problem involving the exploitation of codes and ciphers are necessarily associated in a very intimate way with the cryptanalytic aspects As a matter of fact close coordination between translation and cryptanalysis is regarded to be of such importance that under normal circumstances the two functions are integrated within a single administrative organization But as has been described in considerable detail in preceding Chapters during the war Japanese translation at Arlington Hall became such an extensive and diversified operation presenting training and technical problems of such complex and unusual character that it soon because necessary to place its administration on an independent self-contained basis As it worked out not only was the handling of training and translation problems greatly facilitated thereby but the cryptanalysts who depended upon the translators for assistance also gained by this separation What actually happened was that translators were attached to cryptanalytic units on temporary loan when and as needed Meanwhile however through their administrative connection with the Language January 79 CRYPTOLOG Page 13 TOP SECRET HMBR 4 OOClO 4019659 'FOP SHeRE UMBRA Branch they were kept in direct touch with the developments in the knowledge of the Japanese language so that the quality of their aid to the cryptanalysts was constantly improved Also under this arrangement it was possible to exercise much more selectivity in the allocation of jobs than would have been possible otherwise and to place individuals on specific assignments whether straight translation code reconstruction scanning research or auditing overlaps in accordance with their ability to handle the specific assignment results have been described in Chapter V of this history What it is desired to emphasize here is that during th war this Section developed into what was prqbably the most scholarly_ __ the most efficient and the most valuable Japanese language research body in the United States The contribution of this Special Projects Section to the solution of every department of the Japanese problem as encountered by the Signal Security Agency during the war effort cannot be overestimated What was actually done was to provide ever finer and ever sharper tools to the end that the time and labor of those engaged in direct production could be more effectually utilized But -- and this is a point which should not be lightly overlooked -- the beneficial results of this Section's work may be even more far-reaching in the future if the work is permitted to go on and furthermore if free dissemination of the products is allowed to all who can profitably use them Large segments of the findings of the Special Projects Section although available in the files have not yet been published and much more can be accomplished' if the Section is allowed to continue its endeavors It is greatly to be hoped that the fine beginning which has been made in this extremely significant field of Japanese lexicography will not be allowed to lapse but that arrangements will be made by which there may continue to be made available new knOWledge on this complex subject If there was anyone special feature of Language Branch operations which contributed more than others to the success of the entire venture it was the principle of flexibility under which personnel who developed most along certain lines could be easily shifted from problem to problem where these skills might be best utilized Thus some individualS had a natural flair for straight translation others for scanning or for code reconstruction or for' cryptanalysis In addition translators had different backgrounds of experience and knowledge which made them individually valuable in specialiied subject categories such as Diplomatic Commercial Scientific Order of Battle and Shipping These individual aptitudes did not usually show up at once when the translators came into operations but manifested themselves gradually as the translators gained further experience so that it took time for each one to settle into the niche where he could do his APPENDIX best work If by virtue of a different type of organization the translators had to be parceled out Language Bl'anch to various crypto-translation units as they came into operations there to be assigned on a Chl'ono 'ogioa ' Table of Pl'incipa ' Developments permanent basis obviously this flexibility this opportunity for watching them and eventualItem Date ly fitting them into the right occupations would largely have been lost with consequent 1930 First Japanese translator emdetriment to the overall production effort As May 1 ployed Mr John B Hurt it was when urgent code reconstruction jobs Activities mainly cryptanacame along to pick one example personnel exlytic research perienced in that type of work were given the responsibility and the same allocation of workers to jobs in which they were apt took 1935 place all along the line First formal Japanese translaMarch 22 tion published It is desired to make one more reference to the work of the Special Projects Section of the 1937 Language Branch Al though in the beginning there February First Red translation 33 was no intention of going into the compilation and machine cipher system publication of dictionaries and other word studDecember One-thousandth translation 44 ies on any elaborate scale but merely to record and make available in useful and organized form such lexicographical information as emerged 1938 during the course of operations the need for Second translator employed March 55 expediting the production of translations by Mr Paul Cate anticipating the linguistic problems of the tranS- lators naturally caused the projects to expand 1939 far beyond what was originally contemplated How September First Purple'i translation the work was carried on what sources of informa- 66 machine cipher system tion were utilized and the nature of the published January 79 CRYPTOLOG Page 14 'FOP SECRET Ul'ffBRA TOP SECRET UMBRA 7 8 9 1940 January Third translator employed Mr Hugh S Erskine later Lt Col and Chief of Translation Section Central Bureau USAFFE Fourth translator assigned to October active duty Lt Verner C Aurell later Lt Col and Chief Language Branch December Translations appearing in eight Japanese Diplomatic systems Red Purple CA YO LA J-17 PA P-l 28 August 29 August 30 August 31 September 32 September 33 September 34 September 35 September 36 October 37 October 38 November 39 November 40 November 41 November 42 December 43 December 44 December 1941 10 11 First J-18 translation published June September First J-19 translation published 12 September First J-22 translation pUblished JAI December Pearl Harbor Japanese Translation Unit consisted of nine persons JAE 13 1942 14 15 16 17 18 19 20 First two translators to overseas duty Erskine Mahrt Reconstruction begun on Military June Attache Code JAS Translators organized as subsecAugust tion B-l-J under Capt Aure11 First JAS translation published August see item 15 September Japanese Language School established 30 enlisted students November Aurell made OIC B-1 Overton made OIC B-I-J see item 16 December First five graduates from J School entered operations bringing total translator staff to 28 including three instructors May ii 1943 21 February 22 April 23 April 24 June 25 June 26 June 27 August First translator assigned to Japanese Army systems under cryptanalytic study Japanese Army Translation Subsection B-I-JR organized Reconstruction begun on Water Transport Code Book No 1 JCN First JCN translation published see item 23 Code Instruction Translation Unit set up in B-l-JR Routing and Logging Unit set up in B-l-JR Reconstruction begun on Army Administrative Code Book No 3 JEM Auditing Unit set up to assist cryptanalysts JEM Reconstruction begun on Diplomatic code JBB old JCV First JBB translation published see item 29 B Branch reorganized B-1 functions limited to Japanese language activities B-1 organized into four sections as follows B-l-R Army Translation Capt Overton OIC B-l-D Diplomatic Translation Lt Bacon OIC B-I-M Military Attache Translation Mr Millard CIC B-I-JS Japanese School Mr Buchanan CIC First ASTP class started at Georgetown University Auditing Unit set up to assist cryptanalysts JEK Translator team plan adopted in B-l-R Captured Army Communications Code Book translated JBT later designated JER Reconstruction begun on Diplomatic Code JBA Reconstruction egun on Japanese Army ship name and place name auxiliary codes Reconstruction begun on Army Administrative Code Book No 4 see also item 27 First JBA translation published see item 37 Reconstruction begun on Diplomatic Code JBC First translation published in Army Administrative Code Book No 4 see item 39 Reconstruction begun on Army Air Code Book No 3 JES Total translator staff including nine instructors -- 121 1944 45 40 47 48 49 50 51 January 43 enlisted translators commissioned 2nd Lieutenants January Reconstruction begun on Military Attache Code No 3 JAS see item 15 January Captured auxiliary code books translated see item 38 January Captured Army Administrative Code Book No 4 translated see item 39 February First JBC translation published see item 41 February Vint Hill Nisei translation set up February Translations begun on Army Administrative systems based January 79 CRYPTOLOG Page 15 TOP SECRET UMBRA DOCID 4019659 TOP SECRET l JM8Rh 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 on captured book No 4 see item 48 February Scanning Unit established for Army Administrative decodes February Reconstruction begun on Army Communications Code Book No 2 see item 36 March B-l-R Liaison Unit set up for handling queries March B-l-R Research Unit set up for stereotypes and isologs March B-I-R translator teams specialize see item 35 April Reconstruction begun on DiplOmatic system JBD May 15 enlisted translators commissioned 2nd Lieutenants May B-l-SP Special Projects subsection organized under Dr Nelson June First JBD translation published see item 57 June B-1 celebrates achievements to date July Translations begun in Army Air system see item 43 July Translator unit attached to Traffic Analysis Section B-IV August First JBL translation published transposition August Reconstruction begun on Army BULBUL low-level code August B-1 becomes Language Branch under Intelligence Division August B-l-V becomes section under Language Branch see item 50 September Captured Communications Code Book No 2 translated see item 53 September Captured Army-Navy Liaison Code Book No 4 translated JEH September First JBN translation translated Commercial system September Chief B-1 leaves for TD SWPA 2 months October Captured JKY Army code translated by B-l-V October Reconstruction begun on Army Water Transport Code Book No 2 see also item 23 November Reconstruction begun on Diplomatic Code JAM November First JKY translations published see item 72 December First JAT translation published Military Attache system December Language Branch personnel at end of 1944 Translators Trainees Administrative and clerical Vint ill TotaL 254 170 92 63 579 78 79 80 81 82 83 84 85 86 87 88 89 90 1945 January First JAM translation published see item 74 January B-l-C Commercial Translation Section organized under Lt Bohannan February Reconstruction begun on Army Administrative Code Book No 5 see also item 39 March Reconstruction begun on Army Air Code Book No 4 see also item 43 March Translations begun from item 81 above April Translations begun from item 80 above April First JHC translation published UNEIKAI May Plain text scanning unit set up in'B-l-C June 100 000th Army Administrative systems translation published June Captured JEC Army Air Code Book translated Captured Army Administrative Code June Book No '5 translated see item 80 July Captured Army Communications Code Book No 3 translated see also item 68 July Captured Army Air Code Book No 4 translated see item 81 The copy of History of the Signal SeCUl'i ty Agency fl'orn which the pl'eceding e r cerpts lJel'e taken was pl'ovided by the NSA Cz yptologic History and PubUaations Staff D4 1979 C A SEMIN It may not be too late for you to sign up for the fourth annual seminar Cryptanalysis Contemporary Issues which the CA Division of the National Cryptologic School will present at Fort Meade from 30 January through I February Sixteen speakers will cover various topics of interest to cryppies Although professional cryptanalysts get first pick the seminar CA-305 is open to all cleared and indoctrinated people Sign up through your training coordinator For additionalinforl1lation caU IL -_---J A Division NeS E42 8025s U January 79 CRYPTOLOG page 16 TOP SECREI' Ul fBRA P L 86-36 FO O rlClAL O O L L 86-36 i January 79 CRYPTOLCC Page 17 'I il FeR eFFIEIAL JSE aNL'f II W DOCID 4U19 65 i POLO tFOP SECRET UMBRA 86-36 I vQYSy News of the eMI On 12 October 1978 the Crypto-Mathematics Institute presented the first eMI President's Award tol The The individual plague and acco llPanying letter were presented tol ICMI President President's Award 15 an honorary award estabIp inted out ttlat all ten of ttle sU lmitted nominalished ito recognize and honor recent signifi- I tions represent d significant contributions t cryptology cant contributions to cryptology through the and the Agency' sntission I h a s ctlos n from among this select group asth person whose work provided the use of mathematics most significant recent contributions ttlrough ttle knowledge Ireceived this award for his efunderstanding and application of advanced mathematics forts on the cipher machine PENNY WISE While I Among the many attendees Qf'th party to honorl and ttle other nominees werllseverald stinguistled guests in ' o tl tour at the Institute for Defense Analysis eluding VAIlM B R Inman Mr Robert E Dralr e MGENGeorge he created the mathematical description which I anI McFadden Mr WilliaJII Lutwinialr 1 foundation fori has been the I I s I I I I IPl X3SS7 ' P L January 79 CRYPTOLOG Page 18 P L 86-36 P L 86-36 EO 1 4 c P L 86-36 TOP SECKE'f u f8R1 4 c 86-36 DOCID 4019659 SECRET REFLECTION 5 Vera R Filby E41 n March 1978 the Intelligence and Traffic Analysis Division of the National Crypto1ogic School E41 and the Reporting Guidance and Quality Control Division of Operations V12 con sponsored a seminar on SIGINT reporting because of increasing awareness in both organizations that general strain on SIGINT reporting was causing local pain Efforts to alleviate the problems caused mainly by intensification in recent years of opposing demands on SIGINT producers to provide SIGINT more abundantly and at the same time protect it more stringently have been attempted throughout the cryptologic community but treatments applied often successfully to ailing parts of the system have caused maladjustments elsewhere The attendance of some 90 interested participants for two days of the conference showed that concern over this situation is shared by many Since an account of the conference Proceedings of the SIGIN1' Reporting Seminar 8-9 March 1978 has been published and is available E41 7119s this paper will not comment on the events of the seminar but instead offer reflections and unofficial recommendations Postseminar reflections lead to the pessimistic but predictable conclusion that since March nothing has changed Hence the recmendations are offered with the even more pessimistic conviction that nothing will change -- but offered nevertheless The recommendations would be hard to carry out because the problems are chronic and their treatment controversial They are also so interrelated that they could just as well be stated in other ways and they lead to subordinate recommendations The main ones are the following three I RECOMMENDATION RETHINK THE ENTIRE SYSTEM OF PHILOSOPHY OF SIGINT REPORTING Analyze explicitly and exhaustively all the perennial problems technical information need-to-know interpretation commentary sanitization compartmentation This should be done by a committee of members with a strong and abiding interest in the subject and with real clout -not a job to be delegated Only on the basis of doctrine firmly and realistically established can action be taken on the next RECOMMENDATION EO 1 4 c ISOLATE CONSID L AIS -36 RESOLVE ALL PECULIARILY SIGINT QUESTIONS OF STYLE These questions are not 0 secondary importance and they should be solved everyone of them They are all indispensable for effective guidance to SIGINT producers at all stages of product preparation The solution to these questions must precede work on the next RECOMMENDATION REWRITE BASIC GUIDANCE PROMULGATE IT AND ENFORCE IT All basic guidance need not be issued 'in the same form or at the same time Easier parts such as mechanical style rules can be -- maybe should be -- issued separately January 79 CRYPTOLOG Page 19 I CRET IblclfBtB VIA e6 i11N'1' elblclflfBtS 61ft Y DOCID 4al1 6 P L 86-36 SECRET EO 1 4 c EO 1 4 d P L 86-36 RECOMMENDATION DEVELOP AND TEST A Since obviously all this would require a GENERAL SYSTEM OF great deal of effort itlllaY be well at this G T point to justify these reco 1llllendations Who needs them Why The answer is that everyone in the reporting chain needs them because everyone needs clear consistent oomprehensive guidance and for situations that cannot be covered or anticipated with specific rules and guidance producers at all stages need to understand the principles that inform the system There a now too man cases of ross inconsis tenc RECOMMENDATION MAKE USE OF THE PROFESSIONALIZATION CRITERIA BEING PREPARED FOR THE EDITING AND WRITING CAREER FIELD Re-creation of the entire system of SIGINT reporting doctrine is not likely to happen soon if ever but meanwhile experimental ideas can be tried One idea discussed in detail at the seminar is summarized in the next January 79 CRYPTOLOG Page 20 SRCRB'f I NB E YIA EfJllHff EIIM1i'IEbS fJJI DOCID 4019659 UNCLASSIFIED NEWSLETTER I have extracted from two recent articles some information that I hope you will find interesting and enlightening Cf Y OG is p eased to reprint in its entirety the Septe bcl' 1978 issue of Human Faator's NelJs etter' The newsietter' is pubLished by the CISI Computer' and Infomatior Saiences Institute SpeciaL Interest Gl'oup on Human Fador's It is pr'oduaed semi1'andom y by the Chai1'l1r In of that Speaial Inter'est Gr'oup Douglas Cr'eswelL A835 J717s 7540b and is edited by Jeanne Mahoney 'w23 5150s 6255b Per'sons who uLd Like to be put on the distribution List for' the Ruman Faators News Letter' and to reaeive 0 ther inf01'fT O tion abou t the aativities of the Speaial Interest Group shouLd get in touah with MP Cr'esweH 01' Ms Mahoney Ed BIORHYTHMS -- EVERYBODY'S GOT ONE ORHVTHM CHART 'ROQRAMMS- MIJor comoa loo UN blo-d'llrtt to monitor and BASIC Documentation Inc I prog'lmm lOurel ' k 10 coil ' ' ICI So US to or for about $15 you can order a computerproduced personalized biorhythm chart you can buy a calculator that tells your biorhytmic state or you can drop a few coins in a biorhythm machine at the airport to find out how you should feel today or whether or not you should make or avoid major decisions I j I 1 the popular theory of biorhythms has been put forth in dozens of books newspaper and magazine articles and is followed by many thousands of people Popular 'biorhythms' are determined solely by one's birthdate Given this single piece of information one's biological rhythms are assigned to be exactly determined for one's entire lifetime This popular theory claims that everyone has a physical emotional and mental cycle of exactly 23 28 and 33 days respectively No variations are permitted because of differences in sex age Climate occupation or other variables oevery pUblished scientific' test of this popular theory has shown no correlation between these simplistic cycles and one's true biological rhvthms M Lattimer Wright Biorhythms Fact and Fancy P o- by employ for tnetr hlgnl lowl and critical d Y' uo I In COBOL oOIEIlOL There are two views of biorhythms the popular and the scientific The popular view is largely fancy and ignores virtually everything that has been scientifically established about biorhythms Shades of astrology and snake oil merchants What is this biorhythm thing anyhow Seriously -- the biorhythm theory is one of several theories concerning the fluctuations of human behavior Scientific research about 3000 papers have been published on the subject has established that biorhythms are valid and are practically universal in biological organisms Most people experience rhythmical variations in their physical emotional and intellectual states The chart reproduced above shows the plot of a typical biorhythm cycle for each of these states The numbers along the x axis represent days It is believed that an individual's biorhythm characteristics can be determined by carefully collecting and analyzing data over a long period of time This is a complex problem and the biorhythm theory is generally not well understood so be cautious about what some sidewalk hawker promises you for a small fee January 79 aeedings of the Human Faators Soaiety 21st Annual Meeting 1977 pp 193-196 Is the biorhythm useful for accident prevention In a continuing effort to predict accident behavior the biorhythm theory has been used by some researchers as a tool to attempt to bring a degree of logic and order to what remains an otherwise unpredictable situation For the sample examined in this study there was no relationship between accident occurreDce and biorhythmic criticality Until some of the inconsistences of the theory and its lack of precision are eliminated the use of biorhythm as an accident prevention aid appears to be of no value use of more definitive information if combined with more carefully designed research methodology would eliminate much of the ambiguity observed in present studies and produce more meaningful results M W Brownley and C E Sandler Biorhythm -- An Accident Prevention Aid Ibid pp 188-192 -- CRYPTOLOG Page 21 UNCLASSIFIED DOCID 4019659 UNCLASSIFIED Want to read more Copies of these articles can be obtained by calling me 1 3717s 7540b If my biorhythm cycle is on a high I will respond intelligently rapidly and very emotionally --I A LATE-BREAKING NEWS ITEM Mr Zaslow DDT pr sented a most interesting talk to CISI on 21 September During the question and answer period the subject of Human Engineering was raised Mr Zaslow's response was direct and to the point He stated that NSA specifically computer program- mers and system designers must do a better jOb ofprovidingsystemsthataref'friefidlyHarid responsive to user needs He correctly stated that there is no one at NSA with a job title of Human Factors Engineer and no Human factors organization to turn to for Human Engineering support In short Human Factors Engineering at NSA is a failure We must do all we can to improve man-machine interfaces Computer systems are user tools -- not ends in themselves Such comments are refreshing and very encouraging to those of us who have been waving the Human Factors flag for so long P L 86-36 P L 86-36 A TYPICAL USER CAT AT A TYPICAL UGH COMPUTER DISPLAY TERMINAL HELLO USER CAT THIS IS YOUR COMPUTER ARE YOU THERE HELLO HELLO ARE YOU MAD AT ME I DIDN'T MEAN TO LEAVE YOU ONE OF MY PROGRAMS BLEW THE PROGRAMMER DIDN'T TELL ME WHAT TO SAY TO YOU I'M SORRY Article Review 1 IW23 IF THE PROG ING CATS READ I IIEEl REVIEW IT MIGHT GIVE THEM SOME IDEAS lffi GOTTA DO BETTER @ %%%#### BURP PLEASE STAND BY HELLO USER CAT THIS IS YOUR COMPUTER HELLO Arec entarticle in the IEEE Transactions on Software Engineering dealt with user-perceived quality of interactive systems User-perceived quality is defined as a set of system properties which are relevant to man-computer interaction from the user's point of view User's views vary with the needs problems and preferences encountered when assessing software products User-perceived quality therefore is not a distinct quality but rather a multidimensional concept User data was gathered through questionnaires given to more than 300 experienced users of interactive systems with the Federal Republic of Germany Data was submitted to several factor analysis procedures to date mainly applied in psychology but in no way limited to any scientific discipline In factor analysis variables are organized into a smaller set of statIstically independent linear combinations of variables so-called factors or dimensions January 79 CRYPTOLOG Page 22 UNCLASSIFIED o DOCID 4 OT915-s-9 --- ---UNCLASSIFIED The emphasis in factor analysis is on understanding the nature and structure of complex measurements through examination of the relationships to a relatively few underlying features From factor analysis seven factors were extracted They are 11 self-descriptiveness 2 user control 3 ease of learning 4 problem adequate usability 5 correspondence with user expectations 6 flexibility in task handling 7 fault tolerance Each factor is composed of a set of requirements belonging together with factor loadings of at least 0 30 smaller loadings indicate random correlations The higher the loading the more important is a requirement with respect 6 the interpretation of a factor Also in'looking at the loadings one can see that most requirer 'ents have high correlation with only one factor It appears that most factors are cognitive in nature The factor correspondence with user expectations additionally addresses affective behavior Motorial behavior is if need be addressed in parts by the factor fault tolerance It may seem surprising that some qualitative aspects such as performance and responsiveness do not appear in the framework These might appear however if some of the factors were substructured However this process would require much more research and empirical verification The article also discusses the statistical analysis made to determine the validity and reliability of the factors The authors hope that this is a step toward more user-oriented interactive systems where users access the systems and designers are guided to translate user-oriented criteria into the specifics of particular system design 0 59 0 48 0 47 0 42 0 37 0 37 0 36 0 34 allow abortion of particular dialogue steps or processes have a command language syntactically homogeneous be permanently available t Dediately detect syntax errors permit clustering of commands with a new name by prompting provide user guidance for the dialogue allow user to make background processes visible supply information about the current system status if desired 0 33 have a command language easy to understand and easy to apply 0 32 supply comprehensive debugging aids 0 31 give decision aids if tasks cannot be executed as desired Factor 3 Ease of Learning 0 63 make user manuals superflUOUS 0 61 facilitate the learning of system use without consulting manuals 0 57 be usable wit ut special DP-knowledge 0 52 largely offer on-line forms for user input 0 49 be able to present user manuals in whole or in parts via display station 0 41 make user thoroughly acquainted with system use without human assistance 0 41 provide global information about the functional range of the system 0 41 make the least assumptions about user's prior knowledge of system structures and functions 0 40 support user input by lIlenu technique 0 33 give error Illessages with correction hints 0 34 explain each command subcommand upon user request 0 32 enable the learning of system use without referring to comprehensive texts stored Factor 4 Problem Adequate Usability O 69 ve a data management system that obvia tes as far as pos- SIble the need for the user to perform clerical or housekeeping activities 0 63 manage formatting addressing and - orr organi ation without bothering the user 0 56 determine system decisions without consulting the user 0 50 accept free formatted command input 0 44 bave a command IlPlguage easy to understand and easy to apply 0 42 be tolerant towards erroneous user input 0 41 have a syntactically hollOgeneous cOBl8nd language 0 38 have a command language easy to remember 0 32 aske repetitive or routine input unnecessary Factor 5 Correspondence with User Expectations 0 76 behav similarly in siailar situations 0 71 request analogous user actions to similar tasks to be performed 0 65 offer minimum astonishment behavior towards the user 0 37 let user recognize effects of his input 0 34 be tolerant towards erroneous user input 0 33 enable transparency of a dialogue organi ation and dialogue Factors of User-Perceived Quality course at any time 0 31 provide same response times to equal activities Factor 1 Self-descriptiveness 0 70 explain system requests to the user if and when ecessery Factor 6 Flexibility in Task Handling 0 56 allow user to extend the command language 0 68 supply explanations in different detail and different 0 55 allow faCilities for stacking tasks format upon user request 0 47 allow user an arbitrary access to the task stack 0 67 supply help features pertinent to any dialocue situation 0 60 enable transparency of dialogue organi ation and dialo e 0 44 provide system messages with different levels of detail dependent on user status sequence at any time 0 42 provide reduced input output according to user's training 0 52 explain each command and subcommand upon user request level 0 45 give clearly arranged presentation of syst functiOns 0 45 supply interactive programming aids Which provide cuidance 0 41 allow user to define his set of system functions 0 35 provide shorter ways for trained user to perform his tasks for structured programming 0 33 give decision aids if tasks cannot be executed as desired 0 35 permit user to define soae particular user status 0 34 allow user to make background processes visible 0 33 provide global information about the functional ranae of 0 32 permit clustering of commands with new name the system 0 32 make user thoroughly acquainted' with systea usage without Factor 7 Fault Tolerance human assistance 0 53 insist only on partial retyping if previous input was 0 31 by prompting provide user guidance for the dialogue erroneous 0 30 supply information about the current system status if 0 52 tolerate typical typing errors ed 0 49 give errOr messages with correction hints 0 40 enable user to submit concatenated commands as input Factor 2 t1User Control 0 35 accept reduced input when actions are to be repeated 0 34 give errOr messages in full text 0 60 admit interruptions of a task to start or re ume another' 0 32 give decision aids if tasks cannot be executed as desired task 0 31 support user to find his way 0 59 admit process canceling without detrimental side effects January 79 CRYPTOLOG Page 23 UNCLASSIFIED UNCLASSIFIED DOCID I 4019659 NSA-crostic No 21 By David H Williams P16 The quotation on the next page was taken from an article that appeared in an NSA publication The first letters of the WORDS spelZ out the author's name and the title of the articZe WORDS DEFINITIONS A NFL team 2 wds B Where the season ticket-holder can be found during any home game 3 wds C Saw D All the rams are chasing They're determined there'll be new sheep Rogers and Hammerstein Carousel 2 wds E Untanned cattle skin old TV series 138 191 219 158 194 155 202 -4- 128 149 209 154 8T f f 102 F Former NFL star played himself in film biography Crazy Legs 1953 2 wds 90 48 G High-altitude Asian capital city 2 wds H Did a grease job slang 250 101 207 176 133 119 8 n 172 193 137 32 % 198 13 120 200 217 164 I N Calif structure a major component of San Francisco's water supply system 3 wds J Competitor in any sport or physical activity K Trump L Conducted an incursion or foray M Letting I I dare not' wait upon ---- ---- the poor cat i' the adage Macbeth 3 wds -1- 196 204 111 134 223 228 6 2 0 215 N Baer or Schmeling 0 Income Tax Day 3 wds P NFL team whose home stadium is at Foxboro 2 wds Q Sharp repeated knocking or tapping sound comp R Period or state of decline 2 wds S Team for which Word F played 2 wds T NFL team 2 wds January 79 CRYPTOLOG Page 24 UNCLASSIFIED ----- __ _ - - o i o J _ iiJL DOCID 401965 UNCLASSIFIED U NFL team 3 wds 65 -5- 116 162 V In the same place Lat W Noontime sign on the boxer's door 3 wds X Major work by Anton Dvorak 3 wds 170 143 Y NFL team 2 wds and comp 4 0 1 M 5 U 7 X ' ' 8 6 M G 9Y ' ' 17 V 18 U 19 If i 33 B 34 0 20 M Zl J ZZ 35 Y 36 U ' 37 T T ooo 0 oooo 23 U 38 Y 39 B 40 X 41 I 4 Y Z A 6 P III T 3 If 42 A 44 P ' ' ''' 65 U 6fl P 73 If 67 E 68 C 69 R 70 K 71 U 74 T ' - 1J4 -H 85 X 86 I 87 Y 88 U 89 A 90 F ' 98 T 99 H 'oo ' ' 193 v y 11411 lbZ U Lb3 Q 11b4 30 I 45 Y 46 I 17 A 48 P 77 P 78 0 0 194 Q 19 31 A 32 P 79 B o H ' ' I ' 49 B Y 81 E r I L L IH4 T 'lZ r IIZ11 ' I 11U IIZll H' I Ii i IZ44 U lUll M U' K 30 N 231 x 232 -245 U l46 x W 247 S 248 A 1191 ZD5 H x 144 N 145 S 146 B ' ' 'llb5 A lbb Q Ib7 J IllS I11b9 V 1170 X 171 If ' 7Z F 173 K 174 A 175 Y 176 G 177 1 178 II 194 D 195 S 1196 M 197 B 198 P ooo 199 B 200 G 1201 H 202 0 203 Q 204 M w ' ' IUU 11 U K 1 1 J l Z 1 3 X oo 1154 I 1 U ' ' ' l b L 157 U 11 1l U ' ' ' 1159 J ' i60 P 161 A 225 A Zb 1 J ' 133 G 134 M 135 S oo 136 Q 137 P 138 0 o 139 0 140 Y 141 S 142 Q 143 U 14' Ii ' 118 L 119 G 1Z0 P - 1Z 122 Q LZ3 179 U 18U x ' ' 1181 0 118Z If 183 P - 184 R 1185 B '186 U 187 Q oo oooo 188 P 189 L 90 T m 29 X ' ' x ' ' E 28 If L 100 BIOI G 102 E ' 103 I 104 Q 105 0 106 A 107 T - 108 C 109 X 110 I 111 N 112 U 113 Y 114 A ' L47 I z ' 115 If 116 U 117 31 X 132 ' 91 0 75 I j 82 A 83 S f D 119Z J 193 F R 1206 J 207 G 208 P L 233 S 1234 R 235 T 236 I 237 B 238 Y 239 A 240 R 1241 U 242 I 49 0 51 250 G 12 T ' i i t t i i r t Solution next month January 79 CRYPTOLOG Page 25 UNCLASSIFIED DOCID 4019659 UNCLASSIFIED ON FIRST OPENING KENNEY'S STATISTIC SIt Marjorie Mountjoy I I IF 'I-E-4-2 - -t -o-u-n-a-t-h--Z - S- ----'- - unpublished item among material he inherited throughLI- -_- -_-- -_ _---Illuuuuuuuu from Marjorie Mountjoy when she retired a few years ago CRJPTOLOG reprints it herewith in its original form without even changing its title to Statistics Don't Be Mean to Us Cryppies tive -- starts with 8 -- get it This as the book tel1s 'ou is a sortofJllathemlltica verb also known asanOpera1 Q r' andthenota tionwrittenabove and below it are adverbs otherwise known as limits It cannot but follow for one with any imagination at all that the xi or the fixi where k N I objects of the verb ' N 1 N I i 1 2 x If 1 3 x If I xi k k I fixi where N 1 1 f i 1 k L 1 f i c ui x 0 As any fool can plainly see from the lefthand side It was the right-hand side that bothered me Now it is not the mathematics because to get the mean you simply take the total and divide by the number of items so it must be the language So the thing to do is to learn the language in case the next time you have to do something it may be something you do not know how to do already O K x I think it is pronounced ex-bar stands for the mean N is the total number of variates and a variate'i is defined as the magnitude of a variahle see p 7 So that brings us up to L pronounced sigma because sigma is 5 in Greek and what it means is Sum imperaJanuary 79 x0 part ' I and by this time I am so entranced with the grammatical structure of the equations that I want to diagram them and to find out whether being part-Greek they are inflectable It is difficult to get back to mere mathematics but this flight of syntax leads nowhere Therefore i is the index of summation Any letter may be used but it is conventional to use i or j Frequently the index of summation is understood from the context and the notation at It was stated three times in the conventional compact notation and it was all supposed to amount to the same thing x which the book calls the variates are actually nouns in the objective case direct he trouble with Statistics was that I don't think I survived the definition of the mean p 32 fL 1 f or the f c u i 1 1 I Ed f rIIlD I top and bottom of may be omitted if no ambiguity results I have found in actual practice that omitting all forms of the index of summation from the equation cleared p the ambiguity in 99 cases out of 100 This just about covers our examples No -- wait That u in equation 3 is in case you don't have time for the regular procedure for computing the average and want to take a short cut It is defined as u x - Xo c c f 0 c represents units and xo is the new origin see translation of axes p 35 f I believe I remember to mean is not k of course is explained in 2 as k N I I fi This makes it all very simple I suppose Really as I say I sort of faded out at this point CRYPTOLOG Page 26 UNCLASSIFIED U P L 86-36 - DOCID -- 4019659 - - -- ---- SECRECP SPOKE P L HENRY CEMENT AND OTHER PHANTOMS OF THE OPERA TIONS ____p51 January 79 EO 1 4 c P L 86-36 CRYPTOLOG Page 27 SECRET SPOKE 86-36 DOCID 4019659 SHEURRH FICATION CORNER IT'S PARTY TIMEI 2flIP '- I 1F1 ' ' L p L '- D 'DO -C I -a-s-s-i f i -c- a- t - i 'o 'n A- d- v i 's-o 'r 'Y- O f' 'f' 'l c-e-r----' ave you classified a party lately How about a Second Party or a Third S-CCO Party It's time we classified all parties the same The following information may help S In the past the terms Second Party Third Party instead of actual country names were used in an attempt to keep the References to Second Party references unclassified or at the lowest or Third Party which are U possible classification level The old rules made in a COMSEC context which were never documented but which were whether stated or implied used by me and other classification officers were Appropriate Considering the above guidelines it may Sample references classification be beneficial to mention the actual country or countries involved in your correspondence Vague references to Second rather than va e references to Second Party Party and Third Party or Third Party The sample statemen t organizations even though U starting Direct liaison could be mention of SIGINT and COMINT ithGCliQ al1 d may have been included representatfVes1 4 c References to Second Party i-s-- - --- ---c l lassification Pi sL 8 6- 3 6 and Third Party in such a S-CCO in both cases but the statement is way that they revealed much more informative when the specific we were referring to a C countries are mentioned country other than the The guidance contained herein is from the United States e g Third Director's Policy Staff and should be used Party country uniformly throughout the Agency It will be References to the specific reflected in forthcoming regulatory documents country when COMINT was S-CCO including the NSA CSS Classification Manual stated or implied and USSID 3 s eee New guidance specifies that the terms Second Party and Third Party in a SIGINT T HIS M ON T H ' 5 or COMINT context will be classified Secret -- Handle Via Comint Channels Only Examples of references and their appropriate classification under the new guidance are Appropriate Sample references classification B Letters flu Editor Direct liaison with Second and Third Party organizations is not authorized S-cco S-cco S-cco U January 79 CRYPTOtOG Page 28 SEEURREtp IIMIQbl 'fIA EURQUHi F EURIWINHS QNbY 8 6- 3 6 DOCIO UNCLASSIFIED Chi f P1 Office of Techniques and Standards 27 November 1978 Art Salemme the second editor of CRYPTOLOG retires in January He has brought along the lusty youngster conceived and raised by Doris Miller to healthy mature status CRYPTOLOG thanks to Art's indefatigable promotion no longer staggers from issue to issue There is now a modest but actual backlog of articles to help in planning ahead Under Art's editorship the newsiness and readability of CRYPTOLOG have improved His uninhibited way with headlines and illustrations has enhanced its liveliness and saucy appeal He has handled controversy with wit and tact Above all he has kept the content useful and relevant informal but informative He has served us well We wish him a happy productive retirement and hope to keep a string on him so we can reel him back in for his linguistic talents when do During my c areer at th occaS10n warran t s OUtne a 1 Ot of' Of the Interes' e Ag enc Years I' Handic tl llg th' Y I've th ve sp raft Cl IngS e POSit ent si Ub b In and that lon Of nCe my Ut the high Art Edi RYPTOLoc levation fr ' o o J I lin ee I' Or easil rt Edito Om loU I M t jl Le ' rtiCles 1 h l t qUalify to Publisher thei you and h' lIng POt of fun h my CRYPTOLOG Prov d articles lm fight ' ential aUthUSt - 1 Ing I n t o and ors nent 'I them Prlnt slapPin lUre o UStratiOlllth a sli ht ometimes g Or sh one int Or title Y impert I 'Ye a lght hay eading a naor er t nOt let my fun b therWise rtlcle he So I' someone'e Ut Why be Passed oYe r lse p 6 Pleased th take a greedy IVh Is r ' at D craCk y Y OUr sUpp arln'to aVe lVill' at it the ' Ort ' go C' lams edl tor lth art 1 Ve h' See make CRYPTOL cuggeStion les let all bett ' etc rs to er th and h an eVert e 11 x a s J ell as Gutenberg old his followers on his deathbed Typos ye shall have with ye always No I just made it up myself ell God bless you tool Jan 79 CRYPTOLOG Page 29 L 86-36 P2-0ec 78-53-27102 UNCLASSIFIED I f 4019659 7 This document is from the holdings of The National Security Archive Suite 701 Gelman Library The George Washington University 2130 H Street NW Washington D C 20037 Phone 202 994-7000 Fax 202 994-7005 nsarchiv@gwu edu