18P118• R' WuJUOCDWaJ 1 980 ils mwvu -V l W Ul lWV il WW l l le Wlitilfill3 OOalW lk 1llifil ------ 'ill lbl ··· 00£u I Non - Responsive 1 I I •• •' ' ' ' '' ' ' ' ' · ' · '' ' ' ' I TA 11110 I HANDMAIDEN OF CA • • Frederic •••• • soec111• 1• eo1t•••no ooa• ••• 111w•1111 o Mason ••••••••• 3 a e b7 DIRNSA N I Declassified and Approved for Release by NSA on 03-10-2021 pursuant to E O 13526 MOR Case #109386 I No n - Responsive 'fOP 'SBefttl'f I I Non - Responsive me tillilORlilll w111u c 10P 8181t1Jf 8'41BIIA •or 8i6RliJf IJIIDD ft Responsive I·· · ··- - EO 3 3b 3 PL 86-36 50 USC 3605 'IIOP 81811M l JiP IRIM TA HANDMAIDEN OF C -J FREDERIC o · sON JR Pll Traffic analysis was created as an analytic function in order to organize collection and to maintain continuity for support of cryptanalysis In a broad sense it still does that ---- Before TA was fragmented into many career ields_ for reasons which escape me it was everything in COMINT which wasn't CA or--more properly--it was a subset of CA employing many CA techniques but against a different body of data TA ' The essential differences between CA and are twofold CA works against data which is wholly logical since the recipient of an encrypted message must know and use the sae rules as the originator in order for collll'IIUJlication to succeed whereas TA works against data which is often even usually logical but with disc missible - ' ' ' '' • 0 I I 0 • • Generally the two skills are inversely important if CA is very successful TA is apt to be little valued though very complete if CA is stymied then any TA achievement is valued highly I o I I I In practice the lin e b tween the not sharp since TA normall ·does man er tanal TA and CA are then both similar and interdeoendent • May 7S • CRYPTOLOG • Page 3 -··--··· ---- ------ 'iOP 0li1OIHiT Ulf PP t - - - EO 3 3b 3 PL 86-36 50 USC 3605 - - - ___________ ' '''' ' '' '' '' I 1nerefore 't'lexing our crypto-TA 111U-• c-- e s 1 s 1n addition to eing fun for people who like puzzle-solving l S ful practice ag inst future urgent need for h s skills Boiled down to essentidls and strippe of ' ' 1steps which consume 11Uc n 1rz-l e n o r'f'tJ - t n e an a 1 Lr 1iY'UC processes of TA are reasonably straightfo1waTd However as the following example will' i1'1ustrate a considerable amount of careful work is required evmt for small problems adnreciate the real rtrobla you should knowl • To 11ut try your nane1 at a small problem which can be solved in an bout or two because the ' t May 75 • CRYPTOLOG • Page 4 798 SECRET 611111 t 'iQP OIJSBIJI' tH IIIIITJ EO 3 3b 3 PL 86-36 50 USC 3605 lf thi s sort of exercise entertains you we can do some more Let us know May 7S CRYPTOLOG ' Page S zoe sscn• e111•t l Non - Responsive Responsive I I Of • szenag @ 'Clllllt TOP SFGDl J tJ91BI I Non - TOP lllCllill' UI lltlll lf9P 81@-I UMBU Responsive I - I No n - Responsive 'iOP ii'P'illllil Ill 11111 ' TAR 8891111 tJIIBM I -z - --- l EO 3 3b 3 PL 86- 36 50 USC 3605 - Responsive OP WEQAlilf IJl 18111 I ' ' ANSWERS TO CLASSIFICATION PROBLEMS ' 1 roi SECRET HANDLE VIA CO fINT CHANNELS ONLY See usSID 3 or the Classification Manual Informat ioii revealing the extent or of COMINT colla oration with specific foreign govenments including written agreements establishing such 'Collaboration will be classified fs-cco The subject of Soviet naval co1ru11mications is toD broad to require a Codeword 2 SECRm' CODEWORD See USSID 3 Annex A Appenaix 2 I 3 SECRET HANDLE VIA COMINT CHANNELS ONLY Authority judgment This abstract shows 1 · 'rest in collecting certain signals from 2 our intention to establish gToundemote intercept sites to accomplish this and 3 the association of three covernames with this subject While point 1 by itself would require only CONFIDENTIAL COMINT CHANNELS the combination of 1 2 and 3 requires a SECRET classification with COMINT ChaMels protection 4 SECRET HANDLE VIA COMINT CHANNELS ONLY 9 CONFIDENTIAL COMINT CHANNELS NSA NSA Classification Manual page 40 Any indica- Classification Manual 41 The aention of tion of COMINT liaison or collaboration between a target such as' ly requires NSA and Second Puties is S-CCO So is any I CONFIDENTIAL bu the Ev a€ 11AAN LE VIA COMINT CHANNELS ONLY is itself classifd ed CONFIDENTIAL HANDLE VIA COMINT OfANNELS O Y ' • • S SECRET CODEWORD Judgment This item acquisition of an reveals the time and place of enciphered signal Although the frequency is not given it does Teveal a new success More definitive information would require TOP SECRET CODEWORD 6 CONFIDENTIAL COMINT CHANNELS NSA Classification Manual page 40 11Statements disclosing the COMINT indoctrinated or debriefed status of individuals and lists of COMINT indoctrinated and debriefed personnel •re C-CCO 7 TOP SECRET CODEWORD USSID 3 Annex A Appendix 1 All diplomatic 15ystelllS regardless of degree of cryptographic sophistication ••• • 8 SECRET CODEWORD The most revealing thing here is the callwords Although we do not have a time reference the item implies the cunent time Such being the case it would • require little effort on the part of the enemy to research the use of these callwords The fact that the identity cannot be detemined as one of several possibilities points out our success in this field e 10 SECRET CODEWORD USSID 3 Annex A Appendix 3 paragTaph l S The re ort serial X 00 341S-7S tells you that the original report was Subcategory II X or SECRET MORAY However the ••ssage you are being•asked to rule on is a technical messa1e and not product and USSID 3 explains ''Technical llll terial relating to Category II X pl'Oduct is published as Category II 11 I hope this exercise clearly demonstrates the problems and difficulties involted in determining classifications and specifically what information needs Codeword or 11COMI$T Channels protection There are eight Classification Advisory Officers at NSA They are willing to offer assistance in your classifica ion probi • • but the responsibility for pra per classificati9n belongs to each of us My advice then is to use the Classification Manual ind USSID 3 consult you Classification Advisor Officer when necessary · and most important take the time to determine ·the appropl'iate cla sification and thus to insure that he proper Pl tection is being afforded • j QC §fCB t nu May 75 'CRYPTOLOG Page 10 IOP 119_ IJP IB lltt EO 3 3b 3 EO 3 3b 6 PL 86-36 50 USC 3605 EO 3 3b 3 PL 86-36 50 USC 3605 ·JNon - Responsive ii19RIJf SECREI HtxRf s 1' Jt sw111s m r rn u a 21 - - I Non - Responsive - - -· - - ----•-• - T -_ - ______ CONRPFNTI OJ IIW i 5 ifT l II • I JIIHI IIIL - I Non - Responsive 88HNllitPll6i SA llllRiNW L • ll J II l L SSit Ji Sd hLW U El ·- · - ··- - -- - - - - - - - -- - - I Non - THIS 0061111511T QCIITSlt S 00011111011 n •nn111• SOPIIIRlf t· - ca ' Responsive I - --
OCR of the Document
View the Document >>