Cryptolog 01

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

(r(DI]U (B(3(DI](B(3 OO(3(D(I)(3 v

u u
Ul(!J(B(!JU
A LETTER OF INTRODUCTION............ Genera] Wo]ff
r
1
WHAT IS A COLLECTOR? I 2
TEXTA DATA BASE ....... William J. Jackson... 4
WHAT SHOULD YOU EXPECT FROM CRYPTANALYSTS? J I .... 5
A SPOT BY ANY OTHER NAME ........... Vera R. . 7
NEW TRAFFIC ANALYSIS GLOrSARY.................. 8
THE LANGUAGE OF "BEISBOL" . _ 1& R.Santiago-Ortiz ... 11
RIGHT-TO- LEFT TEXT SORTS ARE NOT . J I 14
SELF-PACED INSTRUCTION: THE FUTURE IS NOW.. ] 15
A SHORT DIRECTORY OF CAREER PANELS .. 17
BUSMAN'S HOLIDAy .........Barbara Dudl,ey 18
DEPARTMENT OF GOLDEN OLDIES ................... l Ii 20
CALLING ALL SRA' S: REPORTING SyMPOSIUM? . 20
PRI ZES AND HONORS FROM THE LEARNED ORGANI ZAT IONS ........... i. ./ 21
+ f ]38 lIjJ! I @IIa. 1.
P.L. 86-36
Declassified and Approved for Release by NSA on '10-'1 '1-.20'1.2 pursuant to E.O. '135.26.
vl DR Case # 54778
DOCID: -4-009704
\
,
\
\
I
\
,
\
\
I
\
\
\
\
\
\
\ \
\
\
Published Monthly by PI, Techniques and Standards,
for the Personnel of Operations
VOL.I, NO.1
PUBLISHER
BOARD OF EDITORS
AUGUST 1974
WILLIAM LUTWINIAK
Editor in Chief Doris Miller (56425)
Co11ect ion
Cryptanalysis 1 1{321Ss}
Language , :Jt5236S)
Machine support.......... (332ls)
Special Research Vera R. FIlby
Traffic Analysis William J. Jackson, Jr. (3369s)
Art Editor
P.L. 86-36
DOCID: 4009704
A LETTER OF INTRODUCTION
This is CRYPTOLOG -- a new vehicle for the interchange
of ideas on technical subjects in Operations.
Operations is a large organization: the skills and
talents on which we depend are many, our workings widely
scattered and often sequestered in compartments. These
conditions argue for special efforts to keep us in touch
with each other and with new problems as they arise and new
solutions as they are developed.
In the past this need has been partially met by a
number of small specialized magazines, some keyed to a given
sector of Operations (as Dragonseeds to B Group, Keyword to
G) and some to subject matter (as QRL to language and Command
to traffic analysis and special research). Not all areas and
disciplines were thus represented, however, and distribution
of the existing vehicles was limited.
It is to improve this situation that CRYPTOLOG, combining
the resources'of the above-mentioned vehicles, has been estab-
lished.I count on it to provide all the good effec,ts of its
predecessor pUblications, plus additional ones. As a monthly
it can be more responsive than the quarterlies and bi-monthlies
it replaces. Because it is Operations-wide it can embrace all
disciplines and address all our people. Its classification,
up to and including Top Secret Codeword, permits discussion of
very specific subjects in the cryptologic sphere, and its level
of informal exchange invites short articles and letters on any
subject.
To be successful, CRYPTOLOG must reflect current operational
topics in a way that interests you and others. I hope that you
will want to read it and will help to write it.

Deputy Director, Operations
NSA, CSS
Aug 74 11 CRYPI'OLOG 11 Page I
DOCID: 4009704
P.L. 86-36
The neophyte who has to ask ''What's UBB?" may
receive a polite if patronizing explanation.
More likely, however, the response will be,
''Not JI1Uch, what I s ubb with you?")
Enter the first collector, the collection
manager in the office of primary concern--in
this case, whichever office is responsible for
Zendia. He will say something like, "Gee whi z! 2
I already have 47 cases on each position I own
and the bottom 4S in the priorder don't get
heard now!" (The cases are listed in priority
order, and having too many cases on too few
positions is a chronic problem.) To assign
this new task in such a way that it may have a
chance of being heard, he may take his entire
mission apart, shuffle it around and rewrite
every assignment. He has a good idea of what
may be heard where,what kind of equipment he
needs to do which jobs at which sites, what
book of rules he has to consult to render a
simple requirement incomprehensible to anybody
who doesn't own a copy of the same book of
rules, and what he has available to do the job
with. Additionally, it serves him well to know
what other managers have and what they need, in
case a trade is necessary. Finally, he has to
know where he can get help if he has to have it
in order to satisfy the requirement.
After the details are worked out and the
task is converted to a Collection Control Mes-
sage (CONMSG) or a Signals Collection Objec-
tives List (SCOL) or whatever happens to be
currently fashionable, it goes to the site or
sites where the actual collection will take
place. Another collector receives the task and
tries to translate it back to English. His
title may vary from station to service
to service, but his function is to manage the
collection resources at his station. He is
intimately aware of the capabilities in his
station, he knows what talent is available,
what conditions his resources are in, where he
can cram the mission in--specific instructions
from the manager at NSA notwithstanding--and,
often, what rules he has to break or instruc-
tions he has to ignore in order to get the job
done. (Incidentally, we at Fort Meade have ab-
solutely no idea that he is breaking rules or
ignoring instructions in order to get the traf-
fic to us--as long as he gets it to us.)
WHeO{!jEC OR
byl I tt
Ifyou have looked I
at the masthead of this
magazine you will have
seen that the various
members of the editorial
board represent differ-
ent disciplines. When
seen in life, nobody has
trouble distinguishing
among these disciplines: everyone knows that
traffic analysts are clear-eyed, clean-limbed
people who draw meticulously neat--if arcane--
squares and circles on paper, and that cryppies
are two-headed people who tend to twitch. The
machine people are those pale ones who inhabit,
like troglodytes, the bowels of the basement.
Collectors are--uh--aren't they the can-clang-
ers who come around three times a week with a
truck?
Collectors are a breed. Outside
of the National Security Agency and a few other
agencies with which we deal it would be a hope-
less undertaking to try to explain them. It
will not be easy explaining them to people who
should know.
Personnel assigned to NSA in billets iden-
tified with a Career Occupational Specialty
Code in the 1600 series are collectors. That
is one way to identify them, but not a very ef-
fective way. Agency employees don't have
their COSC's stamped on their foreheads. Let's
look at this another way. What do collectors
do? Well, you know those pieces of-traffic
that traffic analysts analyze? They were col-
lected by collectors. In.fact, a number of
collectors working in concert got the analyst
his piece of traffic.
Somebody downtown decided that we could
not go another minute without finding out what
the Zendian Army's 279th underground Balloon
Battalion was up to. Then somebody important
in NSA, in VS as a matter of fact, agreed that
this was a valid requirement, translated this
demand into NSA-ese and tasked one of (presum-
ably the appropriate) elements in DOO. (WIle!!
translated, the task becomes, "Find out what
the 279th underground Balloon Battalion of the
Zendian Army is up to." Actually, by this time
it will be known as the 279th UBB, and as it is
a pronounceable acronym, it will be pronounced.
l
Aug 74 'I< CRYPTOLOG 'I< Page 2
DOCID: 4009704
IWffihE '{rA CElfiIHft' I fl!di!4t:LS BNi:Y
Now the mission is in the hands of the op-
erator. His is the real collection function.
He finds the signal that the Zendian UBB 279 is
using to convey whatever it is they are convey-
ing, he records in some way the signal itself
and information about it. That is, if it is a
Morse signal, he copies what the Zendians are
saying to each other. When the signal is weak
and atmospheric conditions are not conducive to
facile copying, the Morse operator sometimes
mutters "Tut!" or even "Darn!"
In addition to copying the signal, he re-
cords on his logs such information as the fre-
quency it is operating on, the time it is active
and other ancillary information from which pre-
dictions may be made about future activity.
If the signal is non-Morse the operator
must determine what the nature of it is and
manipulate machinery to copy it, but the princi-
ple is the same.
The collectors in all of the steps, from
the operator on the position to the exalted man-
ager in his luxurious Fort Meade office, must
also know something about the other disciplines
in order to do their jobs effectively. They
ought to know what kind of information is impor-
tant to the traffic analyst, in order to be
alert for that kind of information when it ap-
pears. They have to be aware that indicators
for the cryptanalysts may appear in traffic and
that it is important to collect them--and help-
ful, sometimes, to highlight them.
3
The col-
lectors at the management levels have to be
familiar with the needs and wants of the other
disciplines in order to meet them or to antici-
pate them when writing and assigning tasks.
They should also constantly remain aware that
every collection success creates a processing
problem. Hence the collector must be aware of
and should be sympathetic to the problems of the
other disciplines.
This is a vastly oversimplified account.
This writer is a collector, and at one time or
another each of those activities was his job.
This article has not gone into an of the de-
tails of a collecto I 0
I'-:'__ I t was
intentionally designed to be a brief introduc-
tion to a relatively little-known discipline,
but one without which the other disciplines
would have no reason to exist.
Another motive for this article was to
throw down a gage. Many readers are going to
say, "I could write rings around this guy."
Anyone who can, ought to. Even if you can 't
write rings around this guy, you probably have
something to contribute. Write an article on
some aspect of Collection, or tell us about an
experience you have had as a collector or with
collectors, and whip it on the editors.
* * * * * * ..
1. Acronyms don't have to be pronounceable to
be pronounced. Take, for example, "Discus"
satellites (DSCS), "Flare-9" antennas (AN/FLR-9)
and "Angry-9" radios (AN/GRC-9).
2. Collectors are often given to strong lan-
guage. Some expletives used in this article
have been modified to protect more sensitive
personnel.
3. Some Morse operators are instructed, for
example, that unless the preamble and first
five groups of text are copied, the rest of the
message is not even worth taking.
(bQNHBHNTIAb)
CLIP OUT AND MAILTODAY
............................................................................................................................................................
SUBSCR1PT10W courow
16 OWL e-iJtcui.a:Uon depaJLtment ..fA doing W and YOWL 6Jwnt 066.i.ce ..fA
doing W a copy 06 CRYPTOLOG, w.U:h a:t:tac.hed, -6hou.ld
JLeac.h you eVeJLy month thItough yoWL c.hannw. But.i.6 you
woutd Uke to have a copy mail.ed dilLec.:t :to you in yoWL own name, frill in
-t.hi6 c.oupon--olL any oU 06 papeJL--pu:t U .in a l.ho:tgun envelope. and
-6end U :to CRYPTOLOG, Pl.
IWameJ _
IOlLgan.i.za:t.Wn) (Sec.uJLe tei.e.phone' _
Aug 74 fir CRYPI'OLOG fir Page 3
DOCID: 4009704
TDB
THETEXTA
DATA'
BASE
by
William J.
Jackson,P14
TEXTA means Technical Extracts of
Traffic Analysis. A system of record-
ing and maintaining a data base of
technical information on communications
targets. it was instituted in lQ4n hv
aareement NSA I
In recognition of the problems
arising from the variety of TEXTA-
related systems. Major General Herbert
E. Wolff. Deputy Director. Operations.
NSA/CSS. has directed that a world-
wide common TEXTA data base. to be
known as the TDB. be eitablished. to
comprise one technical file which will
embrace both TEXTA and specialized
files. meet field needs. simplify
feedback operations. and be compatible
with the activities of collaborating
centers. He has designated PI as
overall management authority for the
development and initiation of the TDB;
Mr. William Lutwiniak. Chief PI, has
named Mr. C. G. Garofalo, Chief P14.
as the project manager. Assisting
Mr. Garofalo. are sub-project managers
named by Operations Groups A, B. C. G,
V, and W. This.commi ttee is meeting
periodically to develop and establish
the TDB. Members are ascertaining the
ideal data base requirements of each
using organization, identifying common
elements in these requirements. and
determining what additionale.1ements
be needed .. Considered in. the
planning is the rectifying of factors
which caused the variety of TEXTA-
related systems to come into existence.
be the stages
of the development of the TDB. 'Upon
agreement of all concerned, an ideal
TDB format will be developed, after
which C Group will be requested to
devise and establish flexible machine
processing systems to handle all pre-
sent and anticipated TDB requirements.
Following initial implementation, V3
will assume operational control of the
system.
(SECRET IICCS)
EO 1.4. (c)
EO 1.4. (d)
P.L. 86-36
==========================================
OUll. tha.n1l.6 :to the. unknown pVL60n who c.o.ine.d the. 1'UlII1e.
CRYPTOLOG--whic.h we 60und .in (1 Wt 06
le.6t oveJL 6JtOm the. namUtg 06 SPECTRUM. In a.dcU:ti..on
to bUng wUque (we m1L6t .in aU the woJrl.d,
U ,u, dppltOplLi.a.te. :to oUll. wIUc.h,u, to
an .in6oJu7lal !WJ'ULing Jr..ec.oJu:l 06 e.ve.n.U a.nd
.in ClL!/ptology a.nd LU 6.i.e.f.d./).
Aug 74 " CRYPI'OLOG " Page 4
DOCID: 4009704
P.L. 86-36
Now that we agree on the characteristics.
of a good crypt effort, you as the manager
still have to measure yours against the stan-
dard. Even wi-thout more than a superficial
knOWledge of the ins and outs of crypt, you can
gauge your group's status with some reliability.
Consider the characteristics. Is there a long-
term goal? Are there intermediate stages along
the way? Do the members of the group know what
they are? Does the group as a whole agree on
a single goal or a single set of goals? Can
the group leader describe these goals to you so
that you can understand them? Do the group and
its members know how they will try to get to
the goal? Again, can the leader explain the
routes or methods to you so that you can under-
stand? Have they alternative methods in re-
serve in case the first ones don't work? Is
there contingency planning? Does the group
consider the whole problem or only that portion
that comes readily to hand? All these points
have to do with order and method; they pre-
suppose knowledge and skills belonging to the
profession of cryptanalysis.
:A >
: , 81

are a manager among whose newly As with other scientific professions, the
quired responsibilities is the production of good crypt effort is well documented. The Tech-
intelligence information from encrypted messages nical SIGINT Report, the SIGINT Support Report,
of a SIGINT target. Your personal background The Technical Journal article, the Informal
is firmly in traffic analysis and reporting, and Technlcal Notes, tlle Technical Support Letters
you have always felt that cryptanalysis was an all put pertinent information on the record
esoteric art that an outsider could not really and invite evaluation and response from other
appreciate. Now you must sit in judgment of members of the profession. Producing onE.;'s own
people and operations in that "foreign" field. publications and profiting from those of others
What should you expect of a crypt effort? MJre are indispensable to complete, professional
pertinently, what should you expect of the cryptanalytic operations.
cryppies involved in it? If your deputy is an
experienced, professional cryptanalyst, you
have sOllIe breathing space, but the responsi-
bility is still yours. Here are some thoughts
from one professional cryptanalyst and erst-
while manager which may help.
The good crypt effort, whether manned by
one or one hundred people, is marked by a "pro-
fessional" outlook. Webster's defines IU:Q-
fessional among other things, "manifesting
fine artistry or workmanship based on sound
knOWledge and conscientiousness." The defin-
ition covers the product, the methods used to
produce it, and the fundamental principles from
which those methods proceed. Principles and
methods imply order, and the good crypt effort
is orderly. That is not to say the desks and
papers are neat; it is to say there is intel-
lectual order in the attack on the target
problem. For the members of the group char-
acteristically use the scientific method of
systematic pursuit of knowledge, yet--and we
might consider the "fine artistry" part of the
definition--they are flexible enough to allow
for and to profit from the intuitive leaps that
sometimes bring solutions. The lUCky guess,
the shot in the dark have their place, closely
tied to the "surprise" and "rational behaviour"
I. J. Good speaks of in the to his
Standard Reagents and Diagnostician's
Dlctionary.
The second characteristic, thoroughness,
applies to the order and method; it also applies
to the execution of the chosen methods of get-
ting to the end result which lies somewhere
along the path of diagnosis, solution, exploit-
ation. Does the group collect all the avail-
able traffic? All the pertinent traffic
Another professional attribute of both the analysis information? Collateral? Does it
crypt group and its members is thoroughness. study all the material and information gathered?
Whether its mission is initial diagnosis of a Does it know or find out or write or request
large or small body of encrypted messages or and use appropriate computer programs? Does it
the exploitation of traffic in solved systems consult experts in the field? Does it study
or both, the crypt effort covers all aspects reports on what has been done in the past
9f the problem according to a reasoned plan against the same target? Against the same type
established in the light of all the information,\' of cryptosystem?
all the material, and all the resources avail-
able for the job.
Aug 74 * CRYPTOLOG * Page 5
DOCID: 4009704
relate what he-learns to the problem he is deal-
ing with. He can tell you what he is doing and
why, and he wants to. He keeps on working and
never completely abandons hope of eventual suc-
cess, but he knows when the law of diminishing
returns becomes operative and is willing to call
a halt. He documents what he has done and what
he thinks ought to be done if the propitious
time ever arrives. He prepares for the future--
his own and the problem's.
To judge the cryptanalyst and his work,
the non-cryptanalyst manager should look for
knowledge and conunitment to goals, both organi-
zational and personal; for thoroughness; for
documentation of work and outcome; for order
in materials and methods. The questions to
ask are really the same as for judging the
whole effort. In addition, look for initiative,
imagination, innovation, and enthusiasm tem-
pered by practical good judgment about poten-
tial results. Beware the pitfall of judging
the capability and performance of the indivi-
dual primarily on the basis of the number of
systems solved or messages read--there are all
kinds of systems and all kinds of messages.
To judge crypt documentation, read the
reports. Do they cover the whole problem or,
if they cover only part of it, do they describe
how the part fits into the whole? Do they fit
in with what you know from other sources? Are
they written while the information is still
fresh in the author's mind? Are they convinc-
ing? Do you understand at least the general
outline of the problem, the work, and the
results? In other words, are rewrts written?
Are they well written? Will they be useful
for the next crypt attack on the same problem
or on similar problems of the same or another
target now or in the future?
The cryppieknows he has reached a
solution when the system "reads." You, the
manager, have no such definite measure in
evaluating a crypt effort. Perhaps these few
ideas can provide a starting point to help you
arrive at a reliable judgment about this part
of your responsibilities.
Having looked at the effort, let's con-
sider the individual. The same features that
mark the good crypt effort mark the activities
of the good cryptanalyst. Only the scale is .
smaller, and the personal attributes of the in-
dividuals vary from one to another. Aside from
the specific training and experience one would
need for your problem, there are some general-
ities about the "professional" cryptanalyst (not
necessarily so certified by the Career P a n e ~ ) .
The documentation of the crypt effort
of whatever size can give you insight into
both the group's and the individual's oper-
ations. Technical reports, published and un-
published, formal or informal, can help you
evaluate the effort, its directions, and its
prospects as well as its people. Good docu-
Mature, responsible, self-reliant, for- mentation shows that the cryptanalyst is look-
ward-looking, optimistic--all the trite laudatory ing beyond his own desk--to other SIGINT fields
adjectives- -mark the good analyst. Add conunon and to the future.
sense and sound pragmatic judgment and a will-
ingness to share knowledge with others, and you
come closer to the ideal. He may be a "loner"
by inclination and may be more valuable to the
effort working that way, but he always knows how
his problem dovetails with other problems or
with other facets of the same problem. He knows
and subscribes to the set goals of the group
and, indeed, of the Agency.
The good cryptanalyst keeps up with dev-
elopments. He reads technical publications,
participates in professional assemblies and
conferences; he seeks advanced training to sharp-
en crypt skills and to increase his knowledge of
related fields. He talks to other analysts and
learns from those he talks to. He finds out
what is going on in related fields. He does not
retire to his own snug corner and let the rest
of the SIGINT world pass by.
The good cryptanalyst is intellectually
He keeps learning and keeps trying to alive.
It comes last in the list of characteris-
tics and it all too often comes last to mind
if it surfaces at all--documentation. Yet it is
an integral part of the professional and sci-
entific effort in cryptanalysis as in any other
technical discipline. You, the manager, should
expect that the procedures and results will be
put on the record. Does at least the group lead-
er keep a techmcal diary? Does your group re-
port in writing? Does it publish technical
reports? Does it think that only successes are
reportable? Does it report, for the record,
procedures developed or adapted, with information
on the material the procedures were applied to,
and the outcome of the application, failure or
. success, in whole or in part? Are the reports
well written? Can you understand them or at
least grasp the essentials of what was done and
why? Do the reports published by your crypt
group provoke questions, suggestions, refuta-
tions, visits, or telephone calls from other
cryptanalysts or other crypt organizations?
Aug 74 #I CRYPTOLOG #I Page 6
DOCID: 4009704
IWlBJ,E VI:l't EEl1Hff 8WHiEhS 8NhY
EO 1.4. (c)
P.L. 86-36
Consider.the spot report. Some reporting
uni ts and some instructions have set time lim-
its of 30 minutes or even 15 minutes from time
of recognition of spot information to time of
release. But urgent and i.mportant information
may be quite complex. It may require extensive
processing and analysis. If it takes a day, or
two or npre, for processing, coordination, and
l1IUSt go to a spot distribution be-
cause of content, is it still a spot? Instruc-
tions define spot report information as "highly
significant, perishable SIGINT" and require
that spot reports be labeled as such. They
also iTequire a precedence of PRIORIlY or higher.
But current telecommunications system regula-
tion.s call for a maximum handling time for
PRIORIlY precedence of three hours; so what is
the point of a 3D-minute reporting requirement?
At present (Spring 1974), with the degree of
automation achieved over the past two years,
average system handling time for PRIORIlY is
about seven minutes, but actual delivery time
for both ROlJfINE and PRIORIlY is about two and
a half hours, for JM.fEDIATE about one hour, and
for FLASH about 10 to 15 minutes.
Sometimes a brief summary of complicated
facts can be issued as a spot with the details
in a and this may be a useful de-
vice for getting out urgent but complex infor-
mation. It is less useful for information less
urgent but still requiring spot distribution,
since it means that readers l1IUSt refer to two
doCt.Dnents instead of one to get the story.
Because of distribution requirements,
there has been a tendency lately to put a SPOT
REPORT label on i terns which do not meet the
definition of "spot" as urgent and perishable
but may even be wrap-ups or periodic surrrnaries
of a continuing situation. A pUZZled user who
was asked recently about a rather relaxed re-
action to information in a spot report respon-
ded plaintively, "But we don't know what a spot
report is!"
Is it any wonder?
And so a process of rethinking and re-
defining is now under way. Would you like to
help? Any ideas? Try defining:
An electrigram is .....
A spot report is....
by
VERA R. FI LBY, E12
ASPOT BY ANY
OTHER NAME
Wen things or situations or the contexts
in which they exist change but our words for
them do not, it may be some time before we per-
ceive the disparity between our understanding
of the words and the reality they represent.
Such a disparity appears to be affecting names
for certain SIGINT reporting vehicles.
Take the tem electrigram. The word was
invented in the mid-1960's to distinguish be-
tween reports of current events issued electri-
cally soon after the events happened or could
be recognized, and routine, recurring reports,
such as daily and other sumnaries, which were
issued electrically. Instructions celebrated
the newness of the tem by showing it in caps:
ELECfRIGRAM. It soon acquired the nickname
E-GRAM and eventually tended to lose its majus-
cule status. It was defined as "a vehicle for
publishing information does not
criteria for SPOT Report1Ug.... but whIch IS of
significance and/or urgency requiring electri-
cal dissemination."
Distribution instructions brought out a
further distinction in that electri rams un-
like sots were not
Thus the meaning of the tem was clearly
defined, and it made sense in the context of
SIGINT reporting--until a year or two ago. But
changes resulting from, aIOOng other things,
automation, security, and economy, have
the context situation. Now, for example, many
reports are issued electrically which fomerly
would have been issued in hard copy only.
These may be reports of information a week, a
month, or six months or more old, information
not exploitable when current, or not useful or
recognized as useful at the time, or of limi-
ted priority but still reportable. The ques-
tion now arises: When such a report is issued,
is it an electrigram?
The problem is not as trivial as it may
seem. People need to understand what words
mean, and there l1IUSt be corraron understanding of
terms and their significance between writer and
reader, because that means common understanding
between analyst/reporter and user.
Aug 74 * CRYPTOLOG * Page 7
IWffihE 'itA elr!l!ft' e!b'd4lffiLS 6HLY
After the Combined Glossary was
issued, a decision was made that no
further glossaries would be published
by PROD--that hereafter they would
the responsibility of the then Office
of Training. As one result, PROD per-
sonnel who had been concerned with the
Combined Glossary and who had intended
to keep it updated were discouraged
from so doing. Finally, in 1964 the
DOCID: 4009704
RAFFle ANALYSIS
.. is defined as a
lection of terms limited to a special inclusive glossary, called the Basic
area of knowledge; it derives from the Cryptologic Glossary. It included some
Latin glossa, which refers to an un- terms used in traffic analytics, but it
usual word requiring explanation. Since did not adequately or accurately ful-
the SIGINT business includes several fill PROD needs--many TA terms were
such areas, each of which makes use of omitted and some were changed from the
many such words, and since its success- 1958 Combined Glossary without proper
ful pursuit depends on the ability of coordination either with NSA elements
its organizational elements to inter- which were operationally concerned or
communicate with precise understanding with second parties. Also, the Com-
of meaning, SIGINT glossaries are a bined Glossary contained Codeword in-
definite and practical necessity. formation, while the Basic Cryptologic
Nevertheless, only during the past year Glossary was limited to Confidential
has there been a formally directed material. Thus, two glossaries con-
PROD effort, under USSID 412, to de- taining differing terminology and
velop and publish a complete, author- spelling were extant, leading the
itative, and official glossary for each British to comment that "only NSA could
of the special technical fields pecu- afford the luxury of two glossaries,"
liar to SIGINT, coordinated with and and, along with most of the knowledge-
agreed upon by all using operational able NSA traffic analysts, to continue
elements and, in some instances, second to use the Combined Glossary while
parties. Earlier, some glossaries, ignoring the 1964 publication, at least
both specialized and general, had been with regard to TA terms. Later editions
published, but, with one exception, of the Basic Cryptologic Glossary
without having undergone a rigorous evidenced no significant improvement as
developmental treatment throughout far as TA was concerned, as there was
Operations and without having acquired little input from and no formal coor-
second-party agreement. These included dination with NSA operational personnel
a general glossary prepared by the U.S. and second parties.
Army Security Agency in !947, a traffic
analysis glossary published by NSA in In recognition of the somewhat
1954 (NSA Interim Report #168-54), a confused situation and the
glossary contained in the aadio Traffic need for the development of definitive
Analysis Manuals of 1955 and 1964, and, and authoritative terminology, not only
in three editions, the Basic Crypto- for traffic analysis but for the other
logic Glossary, the latest dated June SIGINT disciplines, USSID 412, SIGINT
1971. The exception referred to above Terminology, was promulgated, on 1
is the Combined Glossary of Traffic February 1973. This USSID established
Analysis Terminology, published in the program for standardizing termi-
January 1958 by NSA, which was thor- nology used throughout the U.S. SIGINT
oughly coordinated throughout PROD and System to direct, manage, and support
with second parties (the latter in- SIGINT operations. As part of the
dicated by the term "Combined"). program, terminology panels are autho-
rized to be established to develop
standard definitions for terms required
in the specialized areas of SIGINT
operation. The USSID also designates
the NSA Data Standards Center (NDSC)
as having overall responsibility for
the issuance of the respective gloss-
aries, and makes it responsible for
maintaining a complete SIGINT Termi-
nology Data Base and for making the
base, in the form of machine printouts,
Aug 74 " CRYPTOLOG " Page 8
IWiBhE VfA SElIHff SlWlue.s 8JlL
DOCID:
P.L. 86-36
4009704
IlJ!I:lfflLJ: '(tA EeMIN'f 8 !NHIE:b
available to authorized users,
principally the terminology panels.
Under the authority of USSID 412,
and with operational terms of reference
agreed upon between P14 (Traffic
Analysis) and P13 (in which the NDSC
is located), the Traffic Analysis
Terminology Panel (TATP) has been es-
tablished to develop the Traffic
Analysis Glossary. Under the chair-
manship of Mrs. Gloria Chiles, of P14
the TATP consists of representatives '
of A, B, C, G, W, E, and P14, appointed
by the chiefs of those organizations.
Three senior cryptologists, Messrs.


Chief P14, Robert
JChief P13D, and Donald
1 ha , D/Chief V, act as advisors
to the TATP.
As the initial step in the de-
velopment of the TA Glossary, the NDSC
made available to the TATP the print-
out of a terminology data base con-
sisting of thirteen technical
aries containing a total of 4,641
unique items presumed to have a
possible relationship to traffic
analytics. (The TATP found that many
of these items had a variety of de-
finitions, some as many as thirteen--
a different one in each of the con-
tributing glossaries.) The first task
of the TATP was to sift through the
list of terms to identify those which
could be of concern to the field of
traffic analytics and which therefore
warrant further consideration.
(ThlS process, although at first glance
a simple one, was complicated by the
and relationship
trafflc analysls and other special
flelds, such as cryptanalysis, col-
lection, signal analysis, data systems
etc. The difficulty apparently arises'
from a lack of precise definition of
the field of traffic analytics - this
problem is being studied by the TATP.)
In addition to using this list, the
TATP selected potential terms for
study from a variety of operational
publications, such as TECHINS,
USSID's, working aids, Technical
SIGINT Reports, etc. The sifting and
selection process resulted in the
TATP designating about 1500 terms for
detailed study and possible inclusion
in the TA Glossary; this study is now
in progress. The terms have been
grouped into two general divisions-
one by subject matter and the other,
those terms that remain, alphabeti-
cally. In addition, each term has
been categorized as follows:
Category 1: terms of primary concern
in traffic analytics, which will be
defined and included in the Glossary.
Category 2: terms of secondary con-
cern in traffic analytics, will
be included in the Glossary but
defined by other panels.
Category 3: terms determined to be of
no concern in traffic analytics
which will not be included in the
Glossary.
Category 4: terms to be included in
the Glossary as cross references.
Subject-matter groupings consist
of terms relating to a particular area
of study in traffic analytics, such as
callsigns, addresses, procedure, etc.
Considering related terms together
results both in finding and deVising
new terms and in eliminating some that
are duplicative or unnecessary. For
example, in the address grouping, 182
terms were considered and eventually
reduced to less that 100. Also, in
this group, a new term was created--
"coverterm"--as a generic term which
includes "covername," "covernumber,"
and "coverword." Consolidation of
terms was also effected--e.g., "weather
station identifier" becomes the generic
term, and "indicative," "station iden-
tifier" and "station number" are cross-
referenced to the generic term by the
statement "same as weather station
identifier." Correspondingly, included
in the definition for the generic term
is the statement "synonymous with
indi
7
ative, station identifier, and
statlon number."
In its operation, the TATP estab-
lishes an agenda consisting of a list
of terms to be discussed at each
weekly meeting. In preparation for
the meeting the panel members research
assigned terms by examining technical
documents and dictionaries, determining
their use in operational elements re-
viewing previous definitions,
opinions from senior analysts, etc.
ThUs prepared, the panel members in
open at the weekly meetings
attempt to arrlve at a standard defini-
tion for each term. At the time of
this writing, the TATP has established
definitions for terms beginning with A
through H, as well as for subject-
matter groupings for addresses and for
communications structure and operations.
Aug 74 * CRYPTOLOG * Page 9
I !NIBbE VfA EEIIHN'1' EI b'tHlffiL5 eNLY
DOClD: 4009704
I Wftt; VtA etlIoffl"f E1IANlm::S 1
-sERET-
When the definitions for allterms have
been completed by the TATP they will
be arranged in prescribed draft format
as Annex D to USSID 412, which will be
forwarded by PI to USSID representatives
in the operational elements for con-
currence and distribution requirements.
Concurrently, the draft, which is
scheduled for completion in December
1974, will be coordinated by P14 with
second parties through the existing
TEXTA Working Party, of which Mr. C. G.
Garofalo, Chief P14, is chairman.
After completion of coordipation and
any required substantive revisions by
the TATP, a final draft will be pre-
pared by the NDSC for final coordi-
nation by P13 with the SCA's and second
parties and eventual reproduction and
distribution. Although the Glossary
will be part of USSID 412 for record
purposes, it is planned that it will
be issued as a separate document
physically, principally for ease of
reference and to faci\itiate distri-
bution and use by second parties.
Publication and use of this
Glossary, and eventually of those in
the other specialized fields, should
make for a clearer understanding in
SIGINT matters among all con-
cerned, and thus improve the
tiveness and efficiency of their
efforts.
(SECRET IIVeCS)
, I .
R!s if the SIGINT business weren I t puzzle
enough, some people like to make up their own
riddles and inflict them on their friends. A
simple form of puzzle (which also makes a great
game for children on long trips) is the stinky-
pinky, in which the answer must be given in a
pair of rhyming words of a stated number of
syllabies. In the list below, for example, all-
out offensive breaks out to large charge, care-
free captain to chipper skipper, and so on.
While you are waiting for that call to be re-
turned, try your hand at these.
I syllable:
2 syllables: Carefree captain
Corrugated film .;
Smaller soldier
Facsimile messages -----
Beatnik codebreaker
Error in an epitaph
30-year cryptanalyst
Poor intercept
syllables: Evil emissary
Searching examination
Sadat loses cool!
Cleverer calculator
Future goal
4 syllables: Deserted city
German swimmer
__________ Chic -J___
5 syllables: Polysyllabic ragamuffin
Central American underground
Aug 74 * CRYPTOLOG * Page 10
IWlQbE '1J:A EHtHlf aWaCEhS SNJ::Y
DOCID 4009704
UNCLASSIFIED
THE LANGUAGE OF

IN EVERYDAYTAL
l2Y1 IPi6
& Ram({n Santiago-Ortiz, G643
"' "1. we say that baseball is an "American" game, the refe-
V is usually to the United States, but the sport is played
and loved in Latin America as well. It has even affected their language
and terms that originated on the diamond are now a part of everyday
conversation in Spanish as they are in English--compare "he's 'way off base," or "What's the pitch?" or "I really
struck out on that deal!" An article in the Cuban magazine BOHEMIA collected about 35 such expressions. We have
arranged them alphabetically, run the original BOHEMIA entries (as in the original, without written accents, in full
capitals, etc), and supplied a rather free English translation.
The English words in parentheses on the Spanish side were in the original. The words in square brack-
Ns are more-or-Iess literal translations of the capitalized Spanish (the baseball term); the remainder of the English
entry consists of comment and explanation of the Spanish, rather than being just a translation of it.
P.L. 86-36
AL BAO (bound).- Que DOS llega fscHmente: sin problemas,
a las manos.
jAZUCAR!- (asi bautizo el estrai un Darradot deportivo).-
Sublimacion del piropo.
BOTO LA PELOTA.-(jonr6n).-Hizo algo en grande; optima
a pesimo.
CERO CARRERA, CERO HIT, CERO ERROR.-Nada de
Dada, no de esa materia prima ("pues de ella
fue la humaDidad neada") sino la equivalente a una
cifra cera sin orillas. EI elocuentisimo "nieo... "
COGIENDO ROLE (rolling).-Rascabucheando, viviendo
un cuadro.
COMO TlENE EL BRAZO.
COMO llRAE EL BRAZO.-(Que tira c la base certera y
fuertemente).-Que esra acer raDdo, que esra entrjndole
como el ce!Dicero a la res:
DE BATE EMERGENTE.-Suplenteando. Ayuda temporal.
DE PITCHER TAPON.-Idem.
COD the rebound, on the bounce Jno sweat!, very easy,
like taking candy from a baby.
[sugar; a term invented by a sportscaster to refer to a
strike] the highest fonn of compliment. (A v,hole article
could be written about thnt word PIROPO, which is
usually restricted to complimentary remarks made to .nd
about pretty girls. Note also that word ESTRAl, strike,
which we'll see again in ME TIENEN DOS ESTRAl Y
PELJ;:ADO CON EL AMPAYA later in this article.)
[be knocked the ball out of sight for a h.ome run J He went
all the way; whatever he did (good or bad), he did it in a
hig way; no halfway measures with him!
[no hits, no runs, no errors] a real nothing, a total
nonentity. (Sometimes the word HIT is spelled ]IT.)
[catching a rolling- ball, fieldi n g a grounder J Sponging
off others, freeloading.
[What an arm he has! {referring to a player who throws
the bases ae curately and with force} J He's an 'expert; he
really knows what he's doing; he really does a good job.
(The two Spanish expressilllls are equivalent.)
[pinch hitter] filling in, plugging the gap.
[emergency relief pitcher Jsame as the previous entry,
filling in, plugging the gap.
Aug 74 * CRYPTOLOG * Page 11
UNCLASSIFlED
DocrD 4009704
UNCLASSIFIED
ES CU"'RTO B"'Ti! EN CU"'LQUIER NOVEN.... -Bueno
a todo. Eficiente a cualquier nivei.
ES UN C...RG... B... TES.- UD cachanachan, un hala-Ievas, un
uaca", un petrillo faldero. En fin: una guasasa.
ESPER...TE, QUE ESTOY "'L B"'TE ...HOR.... -L1ego mi
. chance, mi turno, mi oponunidad.
FSf"AEN EL NOVENO INNING.-Se estai acabando, falta
poco pam finalizar.
ESTA EN 3 Y 2.-(altemativa clefinitoda: 0 Ie pasan un
esttai y 10 poDen fuem, 0 Ie pasan una bola y toma la bas,,).
-0 se salva, 0 se hunde. Lo toma 0 10 deja.
ESTA FUERA DE JUEGO.-Petdio la puntetia por falta cle
ejetcicio, no tiene su habitual aeietto.
ESTA FUER'" DEL JUEGO.-No 10 Hevan. Lo han desco-
desconocido.
EST'" FUERA DE SEN .
NO LO COGIO L'" SEN -No entendio, no capto 10 que
insiDuaton. Desubicado, fueta-de-oDda.
ESTA GU... I (wild).- La otta cata de la moneda con tespecto
a la e"presioD VIENE POR LA GOM....
EST'" JUGANDO At DURO.-Que 00 anoja, que sigue los
pdncipios.
EST'" JUGANDO "'L FLOJO.-Lo c ontrado de la e"presion
antedot. Cubaneo.
ESTE ES OUT POR REGL.... -SiD temedio su asunto 0 su
mal. fracaso iDevitable. InfeI.iz. 'Sin iniciativa.
ESTE ES QUlEN MANICHE.... -(de manager, ditector de
equipo).-EI que manda y tambien el que maneja la cosa
como la de gana.
JUEG... TOD"'S L"'S POSICIONES.-SuperiDdividualista.
EI universal inutil hnmbre-orquesta.
LO COGIERON FUERA DE B"'SEj-Lo sorpreDdietoo, Ie
pillaron, auapado en un mal paso.
LO DEJO CON EL BATE AL HOMBRO.-No Ie petmitio
actuar.
M",NICHE DE GLORIET.... -Que critica por fuera, desde una
posicion comoda, sin desgos;' pero cUllndo eslli en el agua
se olvida <Ie nadar.
[1e can bat fourth on any team. (As suming that the
first three men have gotteD OD base, the fourth man
at bat-usually called "th e cleanup hitter"- is expected
to get a hit and score one or more of them.) J you cnn
depend on him to do a good job; he's tops; "Old Faithful."
[he's a bat hoy Jhe's not importaDt, no big thiDg; just a
lackey; low maD on the totem pole. (Most of the Spanish
terms used in this deiinition are not in standard bilingual
dictionaries and an worthy of note. Unrortunately, there
was an imperfection on the page at the end of the word
that begim. with TRAC.... )
[Wait a minute! I'm c Qming up to bat nowJ Now it's my
turn; I rinally got my chance! (Not quite equivalent to the
English proverh "Every dog has his day:' but pretty
close tt> it.)
[We're in the ninth inning J Time is running out, not much
time left; it's now or never; it's the eleventh hour.
[the count is 3 and 2 (it's now or never: either they'll
throw hin a strike and put him out or they'll give him a
ball and put him on base). J The moment or truth has
arrived. It's time to fish or cut bait. You have to make
a decision now. (Compare ME TIENEN EN 2 ESTRAl,
etc, below.)
[!Ie's not in condition to play, out or shape Jhe missed the
shot because he's out of practice; he's over the hill.
[ h ~ ' s Dot iD the game J They don't even have down (on the
roster); they've forgotten about him. He's a has-been.
[he missed the sign; he didn't catch the sigD J He didn't
understaDd, didn't lloke lIbe hint. He's not with it, in a
world of his own, not tuned in to our frequtncy.
[)Ie (the pitcher) is. wild J He's not doing bis job properly,
he's messing things up:'
[he's playing it light JHe's not slackeninl! up, taking
shortcuts; he's following the rules, doing things according
to the he,ok.
[he's playing it loose JThe opposite of the previous entry:
He: doesn't always MDish what he starts..
[According to the rules, that's an out J There's no cure for
what he has. The poor guy! He ~ had a chance!
[he's the guy who manages the teamJ He's the one who
gives the orders; he's the boss.
[he plays all the positions (on the team)) Jack-of-all-
trade,., master of none; in a class by himself. (The
Spanisb uses a lovely expression: the universally
useless ODe-man band.)
[They caugbt bim off base.) Tbey caught him napping,
pulled the rug out rrom under him. They c aught him (in
a lie or in the act of wroDgdoing).
[He left him standing there y,ith his bat on his shoulder']
He wouldn't let the poor guy do anything; he stopped him
from acting, put up roadhlocks in front of him.
[grandstaDd manager, manager in the bleachers J Guy who
stays on the side and criticizes; a "sidewalk supervisor"
or "Monday morning quarterback."
Aug 74 It CRYPTOLOG It Page 12
UNCLASSIFIED
DOCID 4009704
UNCLASSIFIED
ME TIENEN EN 2 ESTRAl Y PELEADO CON EL AMPAYA
(umpire).-Sin salvacion. Agonizando.
NO LO VIO PASAR.- {Ia bola).-No se entero, esra como la
cherna en tarima: con los ojos abiertos pero sin ver.
NO ME PONGAS LA DE TRAPO.
NO ME PONGAS LA PODRIDA.-(En beisbol se usa pelota
de "poli," que es relativamente pesada y resistente).-No
me hagas la cosa imposible. No me vengas con enganifas.
NO SE VA CON BOLASMAI..AS.-No se Ie puede engaiiar.
Se 10 sabe rpdo.
NO TE LANCES, QUE TE PONEN OUT.-No te atreves,
que fracasas.
[they've got two strikes on me and I'm quarreling with the
umpire Ja desperate situation; between the devil and the
deep blue sea: Th" best I can get out of this situation is
the worst. .
[he didn't even see it (tbe ball) go by Jhe wasn't paying
attention; "Eyes bave they but they see no"" (The
has a picturesque description: Like a fish in Ih"
market, with its eyes open but not seeing anythillg.)
[Don't throw me the hall made of rags. Don't throw the
rotten (bal/) at me.] Just give me the real stuff, no
tricks! Don't try to cheat me!
[he won't swing at bad pitches J It's not "DSy to pull the
wool over his eyes; he wasn't born yesterday; he knows
what the SCOre is.
[Don't try to steal a base 'cause you might get put out]
Don't take too many chances because you're bound to
fail if you do; look before you leap; play it safe.
SE LA DEJA EN LA MANO A CVALQVIERA.
-Incumplidor, falro de palabra. Dejar
embarcado.
.fMP". ''CIIAIIeA'' J....
S1 ME LA PASA, BE LA BATEO.-Si me
alude, replico en tiempo y forma.
TAl (time).-Tiempo, espera, tregua.
TIENE MAS CURVAS QVE CHANGA
MEDEROS.- Referido a mujer bien
dotada en su diseiio anatomico se-
gUn el patron criollo.
VIENE POR LA GOMA (pitchea con con-
trol).-Acertado, que esea planteando
las cosas oportuna y certeramenre.
1--
..:.-
. -
.t- .
[Let somehody else catch the ball J he
loves to pass the buck; he's irrespon'dble.
[If the ball comes by me, I'll bat it J If the
remarks apply to me, I'll answer them duly and
properly. If he provokes me, I'll get l,im.
[Time!] Time out! Let's take a break!
[She has mort curves than Changa Mederos
(ll contemporary Cubnn baseball
pitc her)] Used in speaking of an especially
curvaceous, well endowed woman.
[pe throws right to the plate, he leall has
control when he pitches J he' figures things
out correctly; he always has the situ"tion
well in hrmd; he's very direct and accu-
rate in his judgments, a no-nonsense type
of person.
'The Spanish-language article concludes "Y... VAMOS A SUSPENDER EL JUEGO POR LUUVIA;' (Let's call the
game off on acc aunt of rairr-an expression used to cut off a gabby person's drawn-out narration) because there are
many, many more bllseball terms used in everyday Cuban conversation. Thnt also seems like a pretty appropriate way
"ffid ,hi, E"li,h ,""i".
what Agency publication would you find the following?
l. x f x a y d a 5 h x j x u d i t h x 0 x ' x c 0 n n ell
2. x x 0 h n 5 0 n x c x h e 5 t e r fie 1 d x e x
3. x 0 x c h 5 X C x a r 1 x j x
4. x 0 x x h x a r a x d x e n n i 5
5. x 5 X t 0 n e x 5 x i n c 1 a i r e x m x c x k x e e
Aug 74 * CRYPI'OLOG * Page 13
UNCLASSIFIED
DOCID: 4009704
UNCLASSIFIED
--jt9J-o:t-:lrfgiJl
Text Sorts Are Not
Impossible P16
~ v e you ever been faced with a pressing need for a list of data sorted ~ a particular
way and been unable to get it? Perhaps this list of data so urgently needed contained ele-
ments of variable length such as plaintext words, and the sort sequence desired was not the
"standard" left-to-right ordering of data. Does that sound familiar? I have heard of in-
stances wherein a right-to-left word sort of data was needed--plaintext or decrypted message
endings, etc.--but the computer support personnel assigned weren't sufficiently" experienced
in using sort routines to provide them in the fonn needed.
The problem at first glance seems to be that most computers only compare strings of data
in a left-to-right direction. But upon closer scrutiny we see that a left-to-right compari-
son of the words within the data strings is what we want. The real problem is that we have
to use sort routines designed for comparing fixed-length sort fields to sort variable-length
data elements (words) appearing at variable positions within the data stream. For the novice
progranuner this may be such a fonnidable task that he may convince himself, and you, that it
cannot be done, and leave you to waste many frustrating hours using an analytic tool that is
not what you really need.
One simple solution to this problem is to generate a special fixed-length "sort key"
for each data record that is to be sorted. This can be done by allocating a data field equal
to a fixed maximum-word-size times the ntunber of words wide the data is to be sorted. Suffi-
cient textual words are then isolated, padded with blanks, and loaded in left-to-right,
major-to-minor sort order into this key field. Each of these special sort keys is then
either appended to the record from which it was derived or "tagged" with the location of the
record from which it was derived, for use in a "tag sort" routine. Mter normal sorting
using this special sort key, the original record is printed unaltered for the user.
As an example of how this is done, assume we have the following message endings, and the
sort desired is on the last five words, with major sort on the last word and minor sort on
each succeeding one to the left for up to five words:
001 STOP COLONEL JOHN BROWN CCMfANDING
002 RETURN AT ONCE STOP BROWN
003 REPLY AT ONCE STOP BRO'IN
004 STOP LT. GEN. BROWN e<:Mo1ANDING
The sort key generated would be:
.L. 86-36
Ca+WIDING BROWN
B R ~ STOP
BRO'IN STOP
CCMfANDING BROWN
JOHN
ONCE
ONCE
GEN.
COLONEL
AT
AT
LT.
STOP
RETURN
REPLY
STOP
001
002
003
004
(UNCLASSIFIED)
The sequence listed after sorting would then be:
003 ....REPLY AT ONCE srop BROWN
002 RETURN AT ONCE STOP BROWN
004 STOP LT. GEN. BROWN CCfANDING
001 STOP COLONEL JOHN B R ~ CCfANDING
Once this basic strategy is adopted, the IJD..lltitude of methods for scanning the text. for
word separators and moving single words into fixed-length fields to generate ~ sort key IS
limited only by the characteristics of the particular progranuning language beIng used and the
ingenuity of the programmer involved. Generating this sort-key is not ~ trivial matt:r,.es-
pecially using certain programming languages, but don't let anyone conVInce you that It IS
"impossible."
Aug 74 '" CRYPI'OlOG '" Page 14
UNCLASSIFIED
DOCID: 4009104
UNCLASSIFIED
SELF-PACED
INSTRUCTION:"The/&:f' is
b 13
P.L. 86-36
If-paced instruction (SPI--
sometimes called programmed
instruction, self study, cor-
study, and so on)
has been used at the National
__II;__-.r Cryptologic School for some
time, and present planning calls for the amount
of such instruction to increase greatly during
the next few years. Unfortunately, few people
are familiar with SPI in its new and improved
form. This article presents the answers to
some basic questions on the subject.
What is SPI?
SPI, as used by the National Cryptologic
School, means a set of ordered instructional
lessons to be mastered by the student. These
lessons will combine written material with vari-
ous kinds of media: tapes, slides, filmstrips,
videotapes, and computer programs. Courses
will be conducted in learning centers both at
Fort Meade and at Friendship.
When you enroll in an SPI course you re-
ceive Lesson 'One which, like every other lesson.
in the course, starts with a list of terminal
objectives telling you exactly what you are ex-
pected to learn during the lesson, the conc;li-
tions under which you are to learn, and the
standards you are expected to meet. In other
words, you are shown the test before you start
the lesson. If you wonder why we do it this
way, the answer is simple: controlled studies
show that students learn better knowing the ob-
jectives, as opposed to the old-fashioned me-
thod of keeping them a secret until the end of
the lesson.
After reading the terminal objectives, you
start to study the material. The lesson is bro-
ken down into several sections. Each section
concludes with questions and exercises for you
to do so that you may immediately practice what
you have learned. You proceed through the les-
son at your own pace. DonI t worry if you get
stuck at some point, a qualified instructor
will be present at all times to answer any ques-
tions you may have. When you feel you have
mastered the material, that is, met the termi-
nal objectives you read at the start of the
lesson, you ask for the test on that lesson.
The test checks to see whether you have indeed
achieved those objectives.
If you pass tile test you go on to the next
lesson; if not, you go over your mistakes with
the instructor and do whatever remedial work he
suggests. Then when you feel you are ready,
you retake the test. If you pass this time,
your record shows only that you have success-
fully completed that lesson, and you now pro-
.ceed to the next. When you have completed all
the packages, you take a final test for the
course, and you're done.
What is SPI not?
T'nere are some cOJIDJlOn misconceptions about
SPI. The JIlOst cOJlllOOn is that you receive a
course, are sent to a dark corner and told to
remain there until you have completed it. Ac-
tually, the course will be conducted in a learn-
ing center, an area consisting of individual
study areas called "carrels," where you sit
while you study your text, listen to a tape,
view slides, etc. The learning center is
designed to be conducive to study and to make
you feel comfortable. You will not be alone;
other students will probably be using the learn-
ing center while you are there, and of course
the instructor will be there to help you as re-
quired. You don't even have to work alone. If
you are part of a small group which wishes to
proceed at a common pace, that's fine. Some
people learn more quickly by themselves, others
prefer to be part of a group. So work alone or
together--the choice is yours.
A second misconception is that you can
study whatever you want. While some SPI courses
offered at universities give students great
latitude in choice of subject matter, ours in
NCS will not. They will consist of a set of
lessons which I1UlSt be completed in a specified
order. Therefore if you enroll in a course you
must complete the specified program in order to
get credit for it.
And a third is that SPI is a free ride for
instructors. Certainly SPI frees me, as an in-
structor, from lecturing; but whereas in conven-
tional teaching I conduct all my students
Aug 74 11 CRYPTOLOG 11 Page 15
UNCLASSIFIED
DOCID: 4009704
UNCLASSIFIED
through a course at the same pace, and can pre-
dict from experience many of the questions that
will arise and get ready for them, in SPI each
student may be at a different point in the
course, and even in different courses. I'm
going to have to be on my toes to handle every
question that pops up.
What's in it for students?
I've already mentioned some points, but
they are worth repeating. The most important
is self-pacing. You're no longer locked into a
fixed pace; go faster or slower, work alone or
in a group, work when you want and for as long
as you want, work at Fort Meade or Friendship:
it's your choice. No longer will sick leave or
annual leave conflict with your study. We hope
eventually to have each lesson available in
several different media so you cali have your
choice in that, too. You want to read today,
but listen or watch tOJOOITow? SPI offers the
possibility of fulfilling all choices.
Another important advantage is that you
always know where you stand. In conventional
courses the test usually comes too late to help.
You just get a bad grade and forge ahead with-
out any remedial work on your weaknesses. This
doesn't help you, but you are kept "on sched-
ule." With SPI and its many checks and tests--
which are often self-administered--your weak
areas are spotted immediately and you do remed-
ial work to correct your deficiencies at once.
Only then do you proceed to new material.
Have you ever been in a course and f01md
some point which struck your fancy so that you
wanted to follow it up? This is often i.mpossi-
ble in conventional courses, but it is still
another advantage of SPI. Follow it as far and
as long as you want. Your instructor will help
and encourage you. That's his job.
Have you ever been withdrawn from a course
because of operational necessity? How about
not being able even to enroll because the of-
fice can't spare you full-time, or even half-
time? But you might have had two or three hours
available each day and with SP! you could still
have taken the course during thOse hours. Re-
member, you set the pace. Afraid the course
will now take forever? Forget it. For most
people those hour lectures become 15-20 minutes
in SPI. In SUllDllary, there is just greater flex-
ibility for you, me, and the boss.
What's in it for the instructor?
Conventional teaching forces me, the in-
structor, to spend many hours preparing and
delivering lectures. It does not give me 1me
opportunity to do the things studies have
proved I do best: for example, diagnose your
difficulties, interact with you when you need
help, inspire and JOOtivate, encourage creativi-
ty and self-direction. With SPI I have JOOre
time for these tasks. As a matter of fact,
these four actions describe my job in SPI.
Another advantage is interaction with the
course material. Lectures are one-way streets;
I am the only active participant. Except for
asking questions, you remain pretty passive.
SPI forces you to interact. This is good, be-
cause studies show you learn better when you do.
And if you are learning more efficiently, I'm
happier.
Finally, as an instructor, I will have the
time to develop the advanced and specialized
courses which are needed to meet the ever-chang-
ing technology of today.
What's in it for supervisors?
Yes, there are advantages for you super-
visors as well. You no longer have to give up
your personnel to a rigid class schedule. You
can let them take an SPI course for a few hours
a day- -at your convenience. Even better, you
can expect them to finish the courses faster.
Studies have shown that JOOst students work more
quickly with SPI than in classroom courses. A
further economy is in travel time; SPI courses
are to be offered at both Fort Meade and FANX.
And whereas the fixed time limit of classroom
teaching sometimes forces the instructor to de-
lete material ordinarily presented, SPI courses
are of standard quality and every student is
given the same material.
SPI allows the Cryptologic School to help
with the training of new personnel. For example
a new worker in your office is tmfamiliar with
your type of operational problem. Perhaps Les-
sons X, Y, and Z of Course 000 could give him
valuable backgrotmd. Send him to us, we'll let
him do Lessons X,Y, and Z. He won't get credit
for the course, but this brief training may make
him inmediately valuable on the job. And don't
forget that experienced workers also might bene-
fit from a quick refresher on some aspect of a
new problem.
Remember, we are not interested in training
for the sake of training; we want what you want:
to increase the efficiency of employees for
their jobs.
What's in it for the Agency?
So far I've pointed out advantages SPI has
for the student, the instructor, and the super-
visor. If these advantages are real, the Agency
will gain happier and more efficient employees;
but JOOre than that, it will have better trained
'personnel. A well-written SPI course is expec-
ted to be superior to its conventional cotmter-
part, if only because the burden of learning is
placed where it belongs: on the student. The
inherent flexibility of S1'1 will allow JOOre
timely training for new office personnel or for
that new problem which suddenly crops up.
Aug 74 '" CRYPTOLOG '" Page 16
UNCLASSIFIED
DOCID: 4009704
UNCLASSIFIED
Finally, in terms of work hours lost to train-
ing, SPI courses will be much cheaper, and that
is a big plus these days.
Conclusion
Does all this mean you have heard your
last lecture? No, not at all. Writing SPI
courses takes time and is therefore expensive.
Therefore only those courses which are taught
many times a year are candidates for conversion,
because they become cheaper over the long run
with self-pacing. I am talking, therefore, only
about introductory or survey and basic courses.
Advanced courses will continue to be offered
conventionally. It is simply a matter of eco-
nomics. However, SPI will release some instruc-
tors to develop and teach new advanced level
courses which are needed.
So if you sign up for a course in the near
future and find out that it's to be offered in
SPI, please don't panic. As the old saying
goes: Try it, you'll like it.
(UNCLASSI FlED)
A Short Directory of Career Panels
HI13 COMMUNICATIONS SECURITY
(Appointment expires)
Chairman: Mr. Ryon A, Page (S4. ,5.5, 8l5lb)
Executive: Mr.1 JCHl13, 2308s, 6804b)
HI12 COMPUTER SYSTEMS
Chairman: Mr. Robert 1. Hagedorn (C4, 38295, 7980b)
Executive: Mr. Richard 1. Wille (HI12, 342ls, 704lb)
Hill CRYPTANALYSIS
Chairman: Miss! 83lls, 6674b)
Executive: Mr .1r"-----....LU.l
I
(Hlll,3868s, 6629b)
HI25 EDUCATION AND.TRAINING
Chairman: Mr. Mark T. Pattie. Jr. (E3, 804ls, 64l7b)
Executive: Mr.1 I{El.89S7s, 6234b)
HI20 ENGINEERING AND PHYSICAL SCIENCE
Chairman: Mr. WjJ]jam H r..ossard CBl,3, 303ls, 7159b)
Executive: Mr. I 1(H120,4924s,7410b)
Hl27 INDUSTRIAL PRODUCTION
Jun 76
Dec 74
May 75
Oct 75
Jul 76
Jun 75
Jan 77
Jan 75
Jul 75
JUri 75
86-36
Chairman:
Executive:
, Feb 77
Sep 76
ffi14 LANGUAGE
Chairman: Dr. -----...,lC
P
l
l
l
6
4
", 4398656755', 73lQb)
Executive: Mr.[
Hl24 LOGISTICS
Chairman: (52; 3703s, 6757b)
Executive: Mr. (Lll, 328ls, 7097b)
Aug 74 CRYPTOLOG Page 17
'UNCLASSIFIED
Dec 76
Dec 74
Aug 75
Sep 75
DOCID: 4009704
UNCLASSIFIED
H12l MATHEMATICS
Chainnan: Mr.l'-------....,'Rl, 36615, 78l5b)
Executive: Mr. !(fi2l, 39575, 739lb)
Hi22 PERSONNEL
Chainnan: Mr. /-1-------,-----J (M3, 33935, 7487b)
Executive: Mr. r 1(}!09, 59015, 6583b)
Hl26 RESOURCES MANAGEMENT
Apr 77
Jul 75
Mar 76
Jan 76
Chainnan:
Executive:
Mr .1r-.-------I....f.... P,.. 5.. 8....3.. 5...5....,.. 6521b)
Mr. . DH12n, 37755, 7n4?b)
Jun 76
Sep 74
Hl23 SECURITY
Chainnan: Mr.IL...- 7531b)
Executive: Mr.[ 1(M5S;3?OZ5,670lb)
JuJ.>7p
Jtm76
HIl6
HIl7
SIGNALS ANALYSIS
Chainnan: Mr. /-1 OI(Wl, 5188s, 7438b)
Executive: Mr. r rtF'U6, 51B8s; 743Bb)
SIGNALS COLLECTION
Jun14
Jan?S 86-36
Chainnan: Mr. William Hunt eKl, 38715, 7193b)
Executive: Mr.! !CHil?, 45785, 791lb)
HIl8 SPECIAL RESEARCH
Chainnan: Mr. Lr-- ----\ICAB,34935, 7397b)
Executive: Cdr. 1 JCHU8, 52875, 649Bb)
H1l9 TELECOMMUNICATIONS
Chainnan: Mr.1 l(f2, 37885, 7044b)
Executive: Mr. Robert Poi5al CH1l9, 44635, 646&b)
HIlS TRAFFIC ANALYSIS
Chainnan: Mr. [r-- ---,JrR2.2... , 36515, 6429b....)...
Executive: Mr. I 1(HI15, 4325s, 7667b)
TECHNICAL WRITING
Senior Advisor: Mr .1 ICR4l09, 48605, 709lb)
EDITING/WRITING AND HISTORIAN
Senior Advisor: Mr.I'-- lcE51, 8297s, 6656b)
Feb 75
Feb .17
Aug/76
Feb 76
Jan 77
Jun 75
Aug 75
May 77
Apr 74
Indef .

(UNCLASSIFIED)
Answer to Puzzle 2: 'gO puv g9 "pp "98 B80vd
uo i7UOlid818J; pt6l: Fi.rrmuv[' UI
AUQ 74 * CRYPTOLOG * Page 18
UNCLASSIFIED
DOCID: 4009704
UNCLASSIFIED
(UNCLASSIFIED)
BARBARA P.
DUDLEY, G5
The TERMIUM paper was of especial interest to
me, I hope there will be an opportunity
to VISIt the Termmology Bank "in depth" during
the next Congress, which will be held in Mon-
treal in 1977.
Seventh World Con-
gress of Translators
was held in Nice from
4 to 9 May 1974, and
after spending a few
days in Paris (during
which, among other The most important action taken by the
things, I toured the Congress was the recomnendation of a format for
Foreign Ministry, I the exchange of bilingual terminological infor-
attended the Congress mation, with blocks for Semantic Unit, Source(s),
as an independent observer. I estimated-the and Definition(s) or Significant Context(s) in
total attendance as 250 to 300. The overall both the source and target language, plus blocks
fee--including all the sessions, an excursion for Field(s) of Application and Author of Infor-
to Monte Carlo, and the gala dinner- -was about mation Unit. /Editor' s note: NSA linguists
$32, which I consider to be quite reasonable. might like to compare this format with NSA
h
Form M2424--see QRL, August 1973, page 23--or
At t e Congress it was interesting to com- the CAMINO card.!
pare the reports handed out by various national
translators' organizations. While they all While the formal part of the Congress was
stressed the need for effective cooperation valuable and stimulating, the most interesting
among translators to improve their lot, the aspect, for was the variety of people,
American Translators' Association has been work- a feelmg whIch crystal11zed at the Gala, where
ing to improve the standards of translators and the impressions came so thick and fast that I
translation, as well as to establish university- couldn't possibly recall all of them. Most of
level accreditation programs and translator the men wo:e s?ffiber business suits but the women
training; the French organization has been con- we:e dazzlmg m every kind of fancy attire and
centrating its efforts on the broadening of I the head. of the European Com-
copyright laws to protect translators' rights; that this was
the Slovak association has been busy organizing the fIrst mternatlonal gatherIng that I had
translation activities and the criticism of ever attended, and that I would give anything
translation. All stressed the need to maintain to have it all recorded on sound-and-c.:olor film.
ties with other national and international as- He gallantly said, are an excellent
sociations of translators and interpreters. I ve:, suppose that everything I was
have the reports from the United States, France thinkmg about everyone could be read on my non-
Great Britain, Canada, Belgium, Sweden, Yugo- 'poker face.
slavia, and and My greatest thrill at the Congress came at
gladly make copIes for anyone mterested m the end of the dinner, when I slDlm:med up .
them. age enough approach the eminent lexicographer
I attended sessions covering the link Paul (Ie PetIt and Ie Grand) Robert for his au-
between literary and scientific translation tograph. He IS most gracious and looks as you'd
translation terminology and documentation expect ''Monsieur Robert" to look: jovial, geni-
international organizations, translation and aI, of ruddy complexion, and apparently good for
computer techniques, and the translator's sta- at least three more editions of "his famous dic-
tus. The that I found interesting were tionary.
A ContrastIve Analysis of Scientific and of I ' .
by Janko GI' f L' b- was so Impressed WIth the Seventh World
0 las 0 JU Congress of Translators that I am already making
IJana 0 stressed at the outset that he plans to tour Quebec province in 1977 and will
not member of the 60-man delegatIon), arrange to be in Montreal when the Eighth World
Termmology and TranslatIon by Robert Du- Congress is in sessio
buc of theTermmology Bank of the University n.
of Montreal (TERMIUM), and Data Processing at Will there be any other NSA people there?
the Translator's Service by Frederick Krollman
of the West German Federal Bureau of Languages.
NICE. BUSMAN'S HOLIDAY FOR ONE
NSA EMPLOYEE
Aug 74 * CRYPTOLOG * Page 19
UNCLASSIFIED
DOCID: 4009704
UNCLASSIFIED
(From Hospitals, March 1954, author unknown.)
P.L. 86-36
P.L. 86-36
Calling all
SRAsl1
Sy
Report.ine:
mposlUI1l?
: ALL SPECIAL RESEARCH ANALYSTS
:I I
TO
FROM
I propose the hoZding of a two-day
Symposium on Reporting as a means of
supporting and encouraging continued
emphasis on professionaZ and uniform
standards of reporting at the NationaZ
Security Agency,
The Symposium would include major
addresses by seZected report editors
from production elements. members of
the reporting training facuHy .and
editors of Agency periodicals such as
the Technical Journal and the
Zogic Spectrum. SpeciaZ Research ana-
Zysts wouZd be encouraged to submit
papers on trends. deveZopments. and
techniques of reporting. and the best
of their efforts wouZd be presented
at the sessions. A written report of
the proceedings would be pubZished and
distributed to all SpeciaZ Research
anaZysts.
If successful. the Symposium
might be repeated annually.
Is there any support for this pro-
posal? Any suggestions for the agenda?
Any offers of papers or assistance?
PZeaBe address your repZies to me.
L..- learemofmCryptotog.
SUBJECT: SYMPOSIUM ON REPORTING
(UNCLASSIFIED)
Answers to Puzzle I:
'UJn1 .Anofi a,1']- /'lOU <xa 'uvauv,z,za1
-qns <uo,]-lvwap,za1+V+ uV,]-lv.Pad']-nbaaa
'aalqvllfia g lV+uaJ-.IO lV1uawvu.z0 <uv']-.zvnbv uv']-
-,zvavg i) a']-10do,z1aw snolndodun :aalqvlZfis v
'aa']-1oaFqo aa']-1oadao,zd <,z81ndWoo ,z81n1av <uoJ+
-dJuuoo UV']-1dfi8a <lvoJafifid lvo']-2zJnb <,z81sJUJW
,z81sJuJa :aalqvllfis 'fidoo fiddozs <,z8JJl
,z8fidJo <81q.zvB 8lq.zvw 'oJJJv,z+
0J"idv.zB <,z8+"iOJJ ,z8+"i0J2 <8Jaow fiaoo,zo
,z8dd']-fio :S8lqvZlfis g 'avzs 8avns <18JdS lap,z
<a2JJ a2Ja <fids "i0J"i ao.zvz :81qv2Z fis I
,.
THE
r
MANAGEMENT SURVEY
II
,
OF THE

PHILHARMONIC
IIIIII!
These excerpts from a "management survey"
of the --------- Philharmonic Orchestra by the
distinguished firm of Mc------ and ------ may
strike a responsive chord in the souls of all
those who have been, are being, or are about to
be surveyed.
" ... For considerable periods the four oboe
players have nothing to do. Their number should
be reduced and the work spread more evenly over
the whole of the concert thus eliminating peaks
of activity.
"All the 12 first violins were playing
identical notes. This is unnecessary duplica-
tion. The staff of this section should be
drastically cut. If a large volume of sound is
required, it could be obtained by means of
electronic amplifier apparatus.
"Much effort was absorbed in the playing
of semi-quavers. This seems an excessive re-
finement. It is recommended that all notes be
rounded up to the nearest quaver. If this were
done, it would be possible to use trainees and
lower operatives more extensively. There
seems to be too much repetition of some musical
passages. Scores should be drastically pruned.
No useful purpose is served by repeating on the
horns a passage which has already been played
on the strings. It is estimated that if all re-
dundant passages were eliminated, the whole
concert time of the two hours could be reduced
to 20 minutes and there would be no need for an
intermission.
"The conductor agrees generally with these
recommendations, but expresses the opinion that
there might be some falling off in attendance.
In that unlikely event it should be possible to
close sections of the auditorium entirely, with
a consequent saving of overhead expense, light-
ing, salaries for ushers, etc."
BliPWa8l'
GOLgEaRl
OLDIBS
Aug- 74 ... CRYPfOLOG ... Page 20
UNCLASSIFIED

DOCID: 4009704
...... 11: the ..
g Qeolrfled 1974

The CJt!:fpto-Ma..thema.tiC6 IUl:U.tu,te a.waJtded pJUZe4 bolt the 60110w<.ng papeJL6:
E6 1.4. (c)
P.L. 86-36
I _
Second: I

TWul: EO 1.4. (c)


P.L. 86-36
The 6..i.Jr.4t and tfUltd papeJL6 appeaJLed -in 4 Spec..iai. ErU..:ti..on 06 the NSA Teckn-i.c.a.t JoUlLYuzl
ISpec..iai. FlUt FOwUeIt TJta.Ul601tm IMue II) -in AugtUlt 1973. The lUUpubllihed lU
Rlll/MATH/09/74, -in Maltch 1974.
P.L. 86"'36
The Cltypto.u.ngu,U,:ti.c ajvr.ded pJUzu 601t the 60110UlUtg papeJL6:
"Cal1 We Uch. the Voice P/tObtem?" I JoUlLI'ldt,
SUJnmelt, 1972. '----------'
P.L. 86-36
"The Role aA CtVlJli.eIt TeiephonYm0 Sovie;t. .lJ1JJII StJriLtes.i.cmCorrrnutLic.a.:t.i..gttll,"
I Iltobe:pubmhe:d -in the TechtUEiil ]OU/lna..t,SwmneJt,1974J.
I I I IQ.RL (Q.lUVl.teJLty Review 60lt
Ungui.hth), AugtUlt 1973.
SecOl1d:
ThiJtd:
EO 1.4. (c)
P.L. 86-36
The pltuented the annuai. Ja66e AwaAd 601t .u.ngui.h:ti.c accompllihme.wt
to NoJtma.n Wild "601f. U6e:ti.me 06 contbuung achievement a.nd peJtma.nent contJf..i.bu-
WUl in the Meld 06 ia.nguage."
The Computelt a.nd In60Jtma..tiol1 Suencu IUl:U.tu,te did 110t hold an contut !:feaJl,
but If.ep.e.a.c.ed .it w<.t.h a Splt-i..ng C0l16e1tence "to pltomote plf.06eMiol'ldt lU't.Uing and to pltov.i.de a
601U.U71" 601t topiC6 06 CUIVle:nt -i..nteltut. FoUlLteen papeM, 6/tOm thMe welte
pltuented a.t the Con6e1tence a.nd have noW been -in the 06 the CISI
C0l16e1tence, 21-24 May 1974. They a.Jf.e:
(e"'F19DfFIM HVeee)
"Thoughth About and PltogJtam Vu.tgn" ...
II AI1 1ntMduc:ti.on to StJt.u.c..twt.ed PltOgJt.amm.i.ng II
and Tech.n.i.quu -in Qp.tUn.i.za..U.on E660w" ..
"The IUla.:tia.bte Appetite 06 the ......
"La.Jf.ge Sca.l.e FUe ..........
"An InteJta.c:ti..ve 601f. the Ope.Jta.tOlt" _
"A GJta.ph.i.C6 PltOtocot 601t Ne:twoltk. AppUca.tioUl" ..
"The ARPANET the COINS NejWoAA and the Fu1:llJi.e" .) .
I .
"OMNIBUS Computelt Ne:twollk.
"M-i..n.i.computeM 60ll ContMl" ...................
"A M.ini.-Computelt Speech SynthuizeIt" ........
"A I M.ini.' Revolu:ti.on -in Field and Repo!t:ti.ng" ..
"A GeneJta.Uzed Cha.Jta.ctelt Input/Output . 1....- ----1
EO 1. 4 (c)
P.L. 86-36
.L. 86-36
Aug 74 1\ CRYf'I'OLOG 1\ Page 21

You might also like