Cryptolog 64
Cryptolog 64
1
xxx
1
(U) The CSG is a group provided by NSA/CSS
to facilitate SIGINT Support to a unified or
specified command, joint task force commander
or other commanders.
(C-CCO) The Consolidated SIGINT Support
1_--1
The SIGINT Support Staff (SSS) gen-
Grated the SIGINT support for the exercise.
(U) As to the success of SSS in support of
the. exercise , one can only conclude that exer-
cise support objectives were partially met.
/i
Dec 81 CRYPTOLOG Page 3
SSSREl'i'
IIAP/BY VIA 88f11IN1' 8HAPIPIIIlS 8NM
. -_.-._-- ..._------
...
...
...
...
...
IL....--- I
(U) Transcribers are left with a more
complete view of current operations and a more
complete understanding of the assorted and
sanitized reports that in the intelli-
gence community.
There was gener.l agreement among
the participating transcribers on two points:
.. Exercise scenarios should De provided
with sufficient time for perusal;
.. Personnel ishould" be carefully selected to
insure that the individual has the proper
background.
Transcriber Reactions
to Program Participation (U)
(U) Although the opinions varied among the
transcribers participating in the various
exercises, there were many areas of general
agreement. Most of the transcribers thought
the experience worthwhile in that they saw how
the Agency fits into the SIGINT community,
i.e., into "the big picture." Most thought
they had gained from the experience, either
professionally by a greater understanding of
the SIGINT system and an increase in target
knowledge, or financially by the overtime.
(U) At the time of A6's entry into the pro-
gram, transcribers suffered from poorly organ-
ized pre-exercise briefings, little working
aid familiarization, instructions that were
wrong or incomplete or too rapidly given, and
disorganized source materials. One tran-
scriber noted that the standard was to be
uninformed. The various staffs, however, are
correcting these shortcomings on a continuing
basis.
Otherwise, the individual maybe
with/a mass/of incomprehensible data
no time to decipher it. Some
knowledge lis requisite.
-4" ... r
inundated
and given
military
Dec 81 CRYPTOLOG Page 4
'll'" SQUHR:
eellf'IBBli'l'IAh
recently attended the 1981 URSI
his report offers some unset-
tling projections about the problems that
SIGINT will face over the next one or two
decades. This is an extract from the In-
troduction and Conclusions of that report .
The 1981 DRSI
:xx General Assembly lJ;
I
I
1
j
I
I
. L. 86-36
h, 1981 URSI (Int,rnationaI Radio
Science Union) meeting was held in
Washington, D.C. 10-19 August, 1981.
The international meeting is held
(U) every three years, and this was the
first time in several decades that it occurred
in the U.S.
(U) Because the meeting is prestigious, the
authors and national radio science organiza-
tions make an effort to publish significant
work. About 500 technical papers were given,
covering almost every aspect of radio theory,
including optical fiber, computer design,
instrumentation, remote sensing, and biologi-
cal effects of radio on humans, as well as the
more conventional areas of propagation, noise,
radio astronomy, microwave power, satellites,
and telecommunications.
(U) The authorship, as well as the atten-
dance, was very international. The meeting
organizers reported that 1056 people
registered, from 38 different countries.
About half of the audience was from the USA.
Japan, France, Germany, and the UK also had
large contingents of 50 to 70 attendees. Six
people came from the USSR, including some
authors. 269 of the papers had foreign
authors, although in some technical areas,
nearly all the authors were from the USA.
are some interesting paral-
lels between SlGINT and radio science, viz:
1. Both activities deal with radio in a
very broad way.
2. Both are concerned with quasi-
repetitious phenomena, which they can-
not control, as well as with unique or
very random phenomena which give one-
time capture opportunities.
3. Both have to develop unique apparatus
and unique processes to obtain data
and to extract information from these
data, so they are both concerned with
device engineering and measurement
techniques.
4. The volumes and bandwidths of data are
often very large, and the "explana-
tions" tentative.
I (C-eeS) In general radio sCienti:ts J
understanding the physica phenomena of rao1o,
communications, and instrumentation. Their
discoveries and measurements have, over many
years, opened up new areas of the for
radio applications, and improved instruments.
They have also shown basic physical limita-
tions to uses of radio, e.g., tile effects of
vec 81 CRYPTOLOG Page 5
EO 1.4. (c)
P.L. 86-36
SStlf'IQStITI A b
IhltllBMl IfIA 8SIIIU'l' 81h1tlllll!LhS SUb
DOCID: 40119lf5
SEleREl'f
(8 ese) The telecommunications planners and
designers in many countries pay attention to
the findings of radio science in the operation
and particularly the develo ent of their s s-
tems and e ui ent.
water vapor on short radio
bulence on laser beams,
noise on receiving systems.
waves, air tur-
and the effects of
Analysis (U)
(U) Some of the major developments in com-
munications have stemmed from advances in
materials and the invention of devices. The
electric telegraph of 150 years ago resulted
from the purification of copper so that cir-
cuit losses were reduced to low enough levels
to make generators, relay windings, and tele-
graph lines feasible. The semiconductor
explosion came from improvements in the
materials of semi-metals, and the current work
in improving glass and optical devices seems
to be setting the stage for a major revolution
in switched communications.
(8 eee) One thread of technical information
from the URSI meeting will illustrate this
point. Developments in optics have shown that
great improvements in cost, performance, and
lifespan of semiconductor lasers are
with lifetimes of 100,000 hours confidently
predicted, and 'million hour lifetime thought
possible. The fibers themselves are getting
better with bandwidths of several and for
certain new fibers, hundreds of GHz capacity
are expected. From this progress, the CCITT
(International Consultative on Tele-
phone and Telegraph) is now develqping stan-
dards for worldwide compatibility between the
parameters of all public carrier optical
fibers, so the optical fiber can inter-
face. According to a French consultant, the
Europeans look upon satellites/as a temporary
measure for regional communications (TELECOM
1) and will shift all main line transmission
to optical fiber links across Europe as fast
as they can lay in the trunks, with the satel-
lites reserved for mobile and other light ser-
vices. At the same time, studies of the phy-
sical characteristics of optical components
indicate to other Europeans researchers that
the l2Qal networks cannot use optical fiber to
carry 50 CATV signals in a bus, so they expect
to go to a switched optical fiber network to
replace the eXisting copper wire local plant
with an individual fiber from a switch to each
subscriber. This network would be expected to
serve for 50 ears after installation.
(U) A recent survey of telecommunications
in the Economist, 22 August 19b1, notes the
progress in optical fiber systems which
surprised even AT&T and the BPO (British Post
Office). Over the next decade, the world will
spend 640 billion dollars on telecommunica-
tions equipment (according to an A. D. Little
study), and radio will be a significant part
of that. As optical'fiber trunks take over
the main line transmission loads, and even
spread into the local networks, the radio fre-
quencies will be applied to mobile radio,
satellite service (expected to exceed 700,000
Intelsat circuits by 2000, plus even greater
domestic satellite capacity), and many ser-
vices where wires or l'ight guides are impossi-
ble or impractical.
(U) One of the notable features of the URSI
is the close interaction between .devices,
materials, and radio.technology. Remote sens-
ing depends on microcircuitry, super comput-
ers, models and devices to compensate for
atmospheric distortion, propagation theory,
antennas, and so on. Spread spectrum or radar
signals to combat radio interference, noise or
propagation effects depend on 5uperspeed
equalizing digital processors, electro-
acoustic analog convolvers (waveform compar-
ers), and high bit rate key generators, etc.
Even efficient and accurate television
transmission depends on sophicsticated signal
processing technology, e.g . , SAW PAL filters
that are used in hundreds of thousands of TV
receivers to overcome adjacent channel
interference.
Conclusions (U)
(U) Developments in radio science bring
about a large number of gradual improvements
in the big telecommunications systems, as. well
as initiating some radical changes. Both
kinds of change accumulate to bring complete
I
!
EO 1.4. (c)
P.L. 86-36
Dec 81 CRYPTOLOG Page 6
S8SR8'l'
IWIBhS VHf 8eUHR SIIMaIST.S em.v
-DOCI D: ............ f
1. 4. (c)
.L. 86-36
transformations in the way telecommunications
operate and affect things.
(U) The main impact of radio and optic
developments will be in transmission, where a
generation of technology lasts about 15 years.
The effect on switching, where technology life
cycles are about 30 years, will be delayed
until the 1990's, after the current commit-
ments to digital electronic switching are ful-
filled.
Dec 81 CRYPTOLOG Page 1
j
lWIBbB nit S811111; SnMI!IIH.s 9N1.
DOCID: 4011945
UNCLASSIFIED
by E. Leigh Sawyer, 14
SLEEP WELL!
YOUR IDG
IS ON DUTY!
#
seem to detect a growing trend for
people to rummage around in their
cryptologic attics to describe cer-
tain events or occasions taking
(U) place in the olden days. Doing a
little rummaging on my own, I recalled a
long-abandoned function once carried out by
company grade officers identified, as they
popped up periodically on the master roster,
as "SECURITY DUTY OFFICERS" (SDO). This sys-
tem was in its heyday in the early 1950's. At
that time, AFSA (soon to be NSA) was split
between the Naval Security Station at Nebraska
Avenue and Arlington Hall Station. As a
digression, this split had its interesting
features too -- like the time I drove my car
from NSS to AHS during the day and took the
shuttle bus back. At quitting time, I natur-
ally couldn't find my car in the NSS parking
lot and was at the point of reporting a stolen
car case to SEC when I realized what I had
done. I managed to catch the last shuttle
back to AHS by the skin of my teeth. Ah,
those were the daysl Well anyhOW, back to
this SOO system. It was used at NSS (whether
it was used at AHS escapes me). In any case,
it was a so-called "sleep watch." For this
purpose, a cot was located in SEC spaces so
that the SOO could catch some sleep between
his late evening and early morning ,rounds of
all the AFSA spaces.
(U) A word or two about the cot might be in
order. The mattress was obviously not config-
ured for sleeping purposes. What it was
stuffed with must remain somewhat problemati-
cal,' but I suspect it was a mixture of corn
cobs and pine cones. I wonder if somewhere in
the archives there still exist the logs main-
tained by the SOO's. References to that mat-
tress were rife in these logs, e.g. , "after
the worst night of my life", "started my morn-
ing round with every bone in my body screaming
agonized protests", "millions for a new build-
ing at Meade; why can't SEC provide a decent
mattress?" and "even my teeth hurt."
(U) It should not require too much imagina-
tion to determine that periodic one night
stands of this sort were mighty boring. So
Dec 81 * CRYPTOLOG * Page 8
UNCLASSIFIED
DOCID:
I
eoltPf!'!ltUAL
what do you do to lessen the boredom? Drink
coffee, of course. Unfortunately, there was
not a hint of either coffee or coffee-making
paraphernalia discernible in the SEC spaces.
This led to a preliminary round of visits to
adjacent spaces to locate a coffee mess, relo-
cate the pot and can of coffee to SEC spaces,
and return them carefully in the early morning
hours. After all, "nothing's too good for the
boys in the Service." This system was not
without its pitfalls. Like the Navy lieu-
tenant, whose name is no longer retrievable
from my data base, who had a memory lapse and
couldn't remember the office from which he
made the "borrow." He handled the situation
neatly, however, with the following entry in
the log: "Coffee pot and can of coffee found
adrift in Building" 18."
(U) It "was somewhat rankling that SEC,
which conceived this Security Duty Officer
concept in the first place, couldn't provide a
little lousy coffee for us. I recall roaming
around the SEC spaces one evening surveying
all the possible places where they might hide
their coffee and equipment. The survey nar-
rowed down to one small cabinet locked with a
brand new shiny Sargent and Greenleaf combina-
tion padlock. The cabinet had undeniable cof-
fee stains on top and was so deorepit that
forced entry would have probably taken about
15 seconds. I reasoned that a rickety cabinet
of this sort oertainly wouldn't be used for
anything classified. So why the formidable
padlock? "You don't suppose", I mused to
myself. I then proceeded to dial 10-20-30,
the factory-set combination. EUREKA I It
opened. When I opened the door, I beheld
a complete coffee mess. It was not exactly
as though I was discovering the tomb of Tutan-
khamen, but the sensation was somewhat the
same. I shared this revelation with a few of
my friends who were also obliged to stand SDO
duty. But, alas, the SEC coffee mess vice
president must have discerned that the coffee
level was dropping far faster than it should.
Accordingly, it was not too long after my ini-
tial discovery that 10-20-30 no longer worked.
(U) The real psychic bennies for the secu-
rity watch types were in the form of finding
classified materials "adrift." As a result,
there was no doubt in my mind that we were
looked upon as pests by the various organiza-
tions making up our beat. For that reason,
access doors to the various operational spaces
were generally kept locked to keep us (and
incidentally others) out. This meant that the
Security Duty Officer most often was limited
to walking along murky corridors in the vari-
ous buildings used by AFSA in the NSS com-
pound. However, on one occasion, circa 1952,
I found one of the doors open to an RID area.
Oh man, the fox was really in the hen house I
After I had spent a good deal of time going
through every nook and cranny where something
classified might be lurking, I finally was
rewarded -- a classified manual (CONFIDEN-
TIAL). I recall that I thumbed through it
and, in retrospect, imagine if it had been
tossed over the fence into the Russian Embassy
compound, they would probably have thrown it
back out. However, it was marked CONFIDENTIAL
and that made it fair game. As best as I
could determine, the owner of the bookcase was
identifiable by the name plate on the nearby
desk. So I wrote it up dutifully noting the
name of the responsible person:
DR. LOUIS W. TORDELLA
tet As luck would have it, Dr. Lou was soon
after reassigned to the Plans and Policy Divi-
sion, where I worked, to spearhead a highly
innovative experiment called "Third Party". I
confessed to him that I was the culprit who
gigged him and expressed the hope that I had
not set him back in his career in some
fashion.
I
(U) So much for the SDO system. It
the same way as smudged carbon copies of
SUMs, A and B buildings, AFSA-062 "and
063, and red phones.
Ou sont les neiges d'antan?
went
TECH-
AFSA-
Dec 81 * CRYPTOLOG * Page 9
8SNFiBElN'flAb
DOCID: 4011945
EO 1.4. (c)
P.L. 86-36
SBSRS'!'
P.L. 86-36
by11.....-- 1
TIDE:
A Brief History
Author's Note:
Too often in our business, a project's history
i8 written in a coLd, hard, bureaucratic styLe. I
In this paper, I attempt to describe in some-
what hUman terms the story of one of this
agency.'s more successfuL, aLbeit ve:r:atious,
computer systems.
Dec 81 CRYPTOLOG Page 10
T343
SBSRBi
!
i
,I"
I
OCI D: 4 -..I.1_-.!-I
F.L.86-36
S8eRS'f
Dec 81 Page 11
iiSRBT 1I:.N9J:.8 'fH SettlN'f SII/.NN8J:.S 8NJ:.!
DOCID: 4011945
////
EO 1.4. (c)
P.L. 86-36
:3eeflEi'f
Dec 81 CRYPTOLOG Page 12
:3eefle, IIItMBbB nA SertiNi SHhNHSb8 QNbY
--=- -=-=- -----
-nOCID. I
1
/
reconditioned, and, if lucky, enter a retire-
ment of loving care by high school or college
students.
(U) To sum up our experience - this
Agency's use of TIDE has not been an easy one.
Many of those associated with TIDE, however,
believe that the processing crises and sleep-
less nights were worth the achievements this
system has somehow performed. It is believed
that TIDE produced far beyond its expecta-
tions, and many believe the feats it per-
formed, and the people who have made it possi-
ble to simply "maintain" for such a period of
time, should be commended.
(U) However, no matter what its history,
TIDE was simply a little imaginative software,
two machines, and an assortment of peripheral
equipment; When it failed to respond to a
crisis or an analyst was unable to retrieve
important intelligence, it simply became a
use:).ess tangle of wires.
CRYPTIC CROSSWORD SOLUTION, November 1981
EO 1.4. (c)
(par + s.+ dips) 86-36
Relief at Last (u)
(U) Thereafter in rapid succession over the
summer of 1981, more TIDE processing systems
were accepted by PREFACE tbereby providing
additional TIDE relief and yes, some well
deserved rest.
(U) Although some disruptions and minimiza-
tions still occur on TIDE, they are infrequent
(in comparison to previous events) and are
primarily caused by hardware and/or software
failures - not solely loading demands. TIDE
is looking forward to retirement.
The Future (U)
1.
5.
9.
10.
12.
13.
14.
17.
20.
23.
24.
25.
28.
29.
30.
3Y.
PARSNIPS
ARMPIT
COUPLETS (double definition)
SONORA (son +.or + a)
EATS (anag.)
STOAT i&
PUNT (to:Q. .:lm.t.ied)
DEMONSTRAToR (demon's tractor - c)
MELODRAMATIC (anag.)
RARE (double definition)
SEALS (less + a; anag.)
FUZZ (double definition)
LEGEND (leg + end)
CLERICAL (cleric + la reversed)
ANTHEM (ant + hem)
ANACONDA (Dana anag. + a + con)
(U) Once TIDE is finally relieved of its
remaining terminal responsibilities (e.g. high
speed printers,. CRTs, etc.) a full decade
since its creation, it can be unplugged.
Because the soul of any computer system is its
software, what was once called TIDE will
remain only two antiquated 1965-vintage UNIVAC
494s. These machines will be returned to
their Mid-West Minneapolis birthplace, be
1. PICKET (double definition)
2. ROUSTS (r + ousts)
3. NILE (anag.)
4. PETITION ANEW (anag.)
6. MOOR (reverse spelling)
7. PRODUCTS (pro + ducts)
8. TRAITORS (anag.)
11. MARSHALL PLAN (marshal + I + scheme)
15. READS (pun for reeds)
16. DRAIN (D + rain)
18. UMBRELLA (anag.)
19. ALL RIGHT (everyone + not left)
21. VULCANIZE (Vulcan + ize)
22. AZALEA (as + a + lea)
26. ONCE
27. ERIC
Dec 81 CRYPTOLOG Page 13
11M/BY "IN 89"11/'/'1' 811...'IHllhS 9HIiY
SI!SM'f
DOCID: 4011945 UNCLASSIFIED
NSA-Crostic No. 36
Two ILec.e.nt -tltag.ic. a.c.cA..den-tt. __ ._
add up :to an evr.iec.o-incidenc.e
li
L
.
86-36
Dec 81 * CRYPTOLOS * Page 14
UNCLASSIFIED
UNCLASSIFIED
P.L.
I I
DOCID: 4011945
Dec 81 * * Page 15
UNCLASSIFIED
DOCID: 4011945
Fe!! 8FFleIlt:l:i ass 8t1l:i
P.L. 86-36
(U) I'm a Traffic Analyst. Several years
ago I began to work for the person I respect
most in that field and share in the develop-
ment of what has come to be called a Traffic
Analysis Workbench System. What ever comes of
that eff9rt, I'll always be grateful for being
included.
(U) Having resisted the urge to vent my
excitement on paper for this long, I thought I
had it under control. Actually, I have been
writing this piece all along. Part of my con-
trol mechanism was simply typing my thoughts
on the screen and then hitting the delete but-
ton. That may happen to this version and you
will be spared once again. I'll tell you what
"set me off" this time a bit later. First, let
me tell you what I've been so enamored with.
(FSYS) The idea is a relatively simple one:
In terms of technology, the TA field is, and
has always been, behind the power curve.
Regardless of what high powered machines
exist, and in spite of the fact that some
extremely sophisticated machine applications
have been designed for analytic purposes, the
analyst is still behind. There are several
reasons this situation exists. However, it. is
primarily because analysts are directly
by1 _
In pursuit 01:
~ ~
~ or the past two years I have been
fjJ
involved with a project that has
given me more, in terms of psychic
income and pure excitement, than
(U) perhaps any work-related activity
that I remember. When you feel this good
about something it seems natural to want to
tell everyone else and share the excitement.
Sort of a "look what I found" feeling. Of
course, when you feel excited about something,
it is difficult to know whether or not you
have something worth saying and can remain
objective about it. Nothing makes you feel
quite as foolish as discovering the wheel only
to find out that you were the only one who
didn't have one all along.
(U) I've followed -- from a distance -- the
articles, letters, and symposiums decrying the
diminishing number of analysts, the dilution
of the career field, and the increasing work
load. I really have nothing to add to the body
of literature that has grown around those
themes. I would like to note that some reason-
ably intelligent people have advanced them.
Conversely, some reasonably intelligent people
made the decisions that led to the described
conditions.
Dec 81 CRYPTOLOG Page 16
F8!! 8FPleltb ee! 8Nb
DOCID:
, ( I
4011945
I
S8NFIBSH'fUb
dependent upon their machine support person-
nel. A few have managed (mostly out of frus-
tration) to learn one computer system or
another and support themselves. The problem
with this ia, if they were any good at it,
they were usually lost from the field.
+eT It's time the analyst was given some
help. Not to catch up to technology, just to
keep from getting further behind. Given the
costing cycle, the procurement cycle, and the
installation cycle, I'm convinced that 'catch-
ing up is not possible. 121 possibleI The con-
cept of a TA workbench involves installing a
terminal on the analyst's desk. Read that
againl Not down the
hall in a "machine room", not in a corner of
the basement, and not around the corner where
it "won't bother anyone" \.' ...
ll.U.
.....__-' This put,s the analyst in a posi ti.on to
access the major data bases, where the/daily
traffic as well as the technical working aids,
reside (hide is a better word). With the
minals.2n they will have constant
access to their material and perhaps approach
the paperless environment.
(Feee) Under the umbrella called PINSETTER,
we have been proceeding along a development
path that will hopefully lead to/the /kind of
help the analyst needs. Because the most
precious computer resource is the programmer,
the analyst must be released from depending on
him for every minor need. This is true for
several reasons. First, the analyst needs to
be able to access his data, pr0gess that data,
and change those processes Without having to
wri te memos, generate specifications,
write justifications, wait for software and
then participate in debugging. Second, the
programmer, as a resource is too valuable to
be tied up with changing sort specifications
every time an analyst needs a different out-
put. Lastly, the plain facts are that we have
a terrible time retaining good programmers. No
sooner do we develop a good working relation-
ship with a programmer, and he'
begins to understand something about an
analyst's job, than along comes a better offer
and he's gone.
(U) From lil machine standpoint, meeting
these goals requires a system that is easy to
learn, fleXible, and provides a reasonable
response time. By "reasonable", I don't mean
instantaneous. Most analysts can live with an
execution time that is not measured in nano-
seconds. Most of our work has taken place on a
PDP-11/70 host using UNIX as the operating
system. UNIX is a high level language that was
developed by Bell Laboratories. It meets the
above criteria plus it is very forgiVing to a
klutz at the wheel.
We have found that most of the
processes that a Traffic Analyst needs to be
able to do can be accommodated with the UNIX
package. Where it was found lacking or ineffi-
cient, the solution has' been provided by a
unique working relationship with a small group
of hiJl:hlv talented DrOllrammers in The
(U) To digress for a moment, the reali-
zation that certain processes are simply
too big for TSS applications is impor-
tant to maintaining a proper perspec-
tive. This determination must' be made,
and large "number crunching" must be
performed where they are most effi-
ciently handled. However, the process
can often be executed where most effi-
cient, and the results passed to where
they can be best used, on the T55. I
might add, in two years of handling TA
. processing, it has been necessary to
"send out" only one job for actual exe-
cution on a "big" machine. Of course,
many of our extracts from major data
bases are "preprocessed", prior to
transfer, to make them more TSS
friendly. But I discount this, since it
is largely "invisible" to the requestor.
If the solution were apt to prOVide
a useful "UNIX-extension" , we woul,d request
T333 help. The results have been the most
rewarding part of this experience: generalized
UNIX-like utilities that solve analytic pro-
cessing problems. The big plus? who
EO 1.4. (c)
P.L. 86-36
Dec 81 CRYPTOLOG Page 17
i
l:i
iii
.
,.1[1.: .: J'I
.II:
DOCID: 4011945
P.L. 86-36
EO 1.4. (c)
knows a little UNIX can use them. On the
other hand, if the solution appeared to be
problem specific, we would attack the problem
with our own resources. The results of these
efforts have proven equally rewarding. Based
on our own experience and some operational
testing in analytic elements of A3, B2, B5,
G6, and G9i I'm not sure if a more effective
analytic tool than UNIX could have been
designed if that had been Bell's intent. This
leads to a philosophical difference in user
support design.
There 1s a mask-and-menu school of
thought that holds to the belief that the user
should be led through the processing cyale by
the software. A.menu is presented with a few
options to select from and a mask provided
through which to make alterations. These H&H's
believe it is best to protect the user from
the complexities of the system and protect the
system from the klutz at the wheel. It has a
place. I would look to this area for the type
of handling necessary for, perhaps, TEXTA
updates.
(U) Another approach is to provide the user
with the modules necessary to manipulate the
data, a high level language to package the
modules, and the ability to communicate with
other users and peripherals such as high qual-
ity printers. Basically, a sort of Procedural
Applications Language that is not unique. to
Traffic Analysis. Perhaps a Universal Pro-
cedural Applications Language approach. The
user is free to design personal processes and,
more importantly, those processes at
will. Users are not dependent upon the pro-
grammer for every minor modification, routines
do not have to be recompiled after each
change, and the results of the changes are
immediate. I believe UNIX meets this chal-
lenge.
(U) The H&H approach "keeps the analyst (or
user) dependent upon the programmer for modif-
ications. Thus, preserving the problem of too
much demand being placed on a resource that is
already over taxed. The solution to the demand
for software packages has all too often been
the letting of contracts, at considerable
expense, to develop processes that a few
analysts, skilled in a handler like UNIX,
might be able to get along without.
(U) If our own resources were concentrated
in a manner conducive to the development of
generalized handlers (a Universal Procedural
Applications Language), and perhaps a bit of
that contract money concentrated into reward-
ing the good programmers we have left, we
might be able to come up with better analysts
and better programmers. As a by-product, we
might be able to handle the workload with the
number of analysts we have and do a job
of it.
(U) So, what was it that set me off this
time? A few days ago, while a
few system capabilities to a potential I
was walking through the steps of a UNIX shell .
file (merely a collection of UNIX commands
that eKecute sequentially and perform some
proceaa) and he asked me if I "wrote this pro-
gram". The words startled me. Wrote a "pro-
gram"? Me? I'm a Traffic Analyst, I can't
"program". My rather bumbling answer was some-
thing to the effect that this is really not a
program just a collection of instruction$to
perform a certain process on this computer.
After he left I put the shell on the screen
and read it a few times. By gosh, a few years
ago I would have called that mess a program
myself. It "looks" like a program. It "act-$"
like a program. And, my extemporaneous answer
wasn't too bad a definition of a program.
(6 I had to pause and reflect a bit. I
put that shell tOllether in about five minutes.
what does it do?1 ....
Based on past experience in trying get a
process to do a select of this nature, and
going through the "channels" to get it; this
"quickie" shell seems fairly. powerful.
(U) I think I've found a faster horse, I
probably couldn't keep up with younger women
anyway, and I'd rather have a cold beer than
older whiskey, so if anyone knows someone
looking for a "programmer", I'll settle for
two of four.
Dec 81 CRYPTOLOG Page 18
II/dfBbB 'lIA eSUill'f SIIANIIBbB SlIbl
OCIO: 4011945
I
86-36
Whatisit?
Where is it going?
byl Ipl
TEXTA
means Technical Extracts fran
Traffic Analysis, and represents
an agreement between four national
centers concerning -
- (!I)-
the exchange of basic traffic analytic
informat ion1
the sharing of a cooroon, uniform record-
ing and labeling system of traffic
analysis information about CCJoIINT targets
worldwide1
a catlllOn book of rules, the 'lEXTA manual,
which the four centers accept as the
authoritative description of how the
TExrA system operates1
the highest, mst accurate level of
knowledge on a target carrnunication.'
EO 1.4. (c)
P.L. 86-36
Dec 81 * CRYPTOLOG * Page 19
II*NBIdl ,'tiL B8A1RW' BIIAI'II'IIWl 8NU
DOCID: 4011945
How Current Should TEX'l'A Be? (U)
Using TEXTA for Collection Steerage (U)
.L. 86-36
1. 4. (c)
Dec 81 * CRYPTOLOG * Page 20
ttttKI't! '11\ eetlHl'f eth'dftfEI:iS elfl:i'l
1. .L __
DOCID:4011945
Dec 81 * CRYPTOLOG * Page 21
EO 1.4. (c)
P.L. 86-36
HMiBhB \':l:A eaU:l:tl'f e ~ ! i B h S a!ih
DOCI D:
Where is TEXTA Going? (U)
0 _
(U) such "low validity data, eyen/ though
current, should not cause the 9lder, but more
authoritative, analytic resl,llts to be erased
fran TEXTA - they should/coexist side by side
in the record. '!heeaae with which data can be
lost through erasing and/or spillage./ is a
major problem in coop1ter based data systems
and il:$/One that will need special attention
for'I.'EXTA in the future. '!he future system
should be set 1,1p to insure that/no data is
erased unless a back1,1p record (suGh as micro-
fiche) is first generated. Data no longer
wanted in the current file, because it is
either out of date or superseded, should be
shifted either ,to "near storage" or "far
storage" , depeooing upon ./the likelihood of
having to retrieve it at/ sane later
Near storage is defined as sane machine-
retrievable form, such as tape, where the data
can be retrieved relatively easily, whereas
far storage is defined as sane form that is
essentially not machine-retrievable, such as
microfiche, where .the data can be retrieved
only with great cost and difficulty. (The
cost of "repoking" or otherwise retrieving
data fran microfiche may make such efforts
rare, but it.would be unwise to rule them out
sanetimes the thing MUST be done,
even if it has to be done entirely by hand.)
Data might typically move fran current on-line
storage/to near storage, and then after a
specified period of time, to far storage.
(U) Future 'I'EXTA will need an integrated
of "audit trails to accOlllIlOdate the
variety of levels of data that will be in the
system. At the minimum, the system will
need -
the date of the action which changes,
adds, or deletes the infocnation.
the source of the action (at a minimum,
the organization submitting the action,
although at some locations the initials
of the analyst might be needed).
the validity of the information involved
in the action.
P.L. 86-36
EO 1. 4 . (c)
Dec 81 * CRYPTOLOG * Page 22
- L __
DOCID: 4011945
I
Dec 81 * CRYPTOLOG * Page 23
EO 1.4. (c)
P.L. 86-36
\\
l W I B E ~ E 'lIA eStHtI'f elhldltlEbB Stlb'[
DOCID: 4011945
the recipient).
I
P.L
EO
Should the Future TEXTA System
Look Like? (U)
')${fA?
chen sie . <
S'pr
e
C? .... c
0
c'"
?@
,,"-
<;-.0
Ha
b1a
TEXTA7
:fo''O
@J'Q
<;0
!JiI,.
'il
Dec 81 * CRYFrOLOG * Page 24
. 86-36
1. 4. (c)
UMIBbB HA eetfftl'l' ell:AtlUBbS BilbY
DOCID: 4011945
Wlth a canputer canplex. No user need be kept
out of the system, or reduced to a second-
'P.L. 86-36
class citizenshipiIlt:.QesystembeCause he EO 1 4 (c)
... \ . .
users to sit at their favorite ter-
minals, and travel allover the
(U) world to accomplish their assigned
task. All that is required of them is a few
simple standard commands. Oh, wouldn't that
be great I
(F6ij6) Wait, aren't you talking about the
PLATFORM network? Isn't that the way it
works? Almost. We are close, but we aren't
there yet. Simple things, little things, that
appear trivial when looked at individually,
work together to cause most of the current
PLATFORM user frustrations. The general idea
of PLATFORM is a good one, but it seems that,
for those who actually have to use PLATFORM,
something has been lost somewhere: