DQClO : 40?L9671 / / THERE'S A NEW WORLD COMING — ARE YOU READY? (U) LIP (U) SYSTEM ACQUISTITION DOCUMENT REVIEW (U) ANALYSTS OF NSA, ARISE! (U) I COMING HOME (U) I CIRC: AN INTELLIGENCE DATA BASE CU! . . 1 ~ BETWEEN THE LINES OF YOUR PERFORMANCE APPRAISAL fU! . . 1 ~ NSA-CROSTIC No. 30 (U) D.H.W. NSA/ CSS MILITARY LINGUISTIC PROGRAM 20 Declassified and Approved f< ar Release by NSA or 10-12-2012 p ursuant to E.O. 13526, VI DR Case # 5477$ DOCID: 4019671 top MECieiyr Published Monthly by PI, Techniques and Standards, for the Personnel of Operations VOL. VII, No. 1 - 3 JANUARY — MARCH 1980 PUBLISHER WILLIAM LUTWINIAK BOARD OF EDITORS Editor-in-Chief David H. Williams (1103s) Special Research Vera R. Filby (7119s) Traffic Analysis Don Taurone (3573s) P.L. 86-36 For individual subscriptions send name and organizational designator to: CRYPTOLOG, PI .. nam- - -- , -- ; • • -• TOP SECRET DOCID: 4019671 CONFIDENTIAL There’s a New World Coming - Are You Ready? We decided to try the simplest approach first: which method of modeling, which is inexpensive in terms of storage and CPU time, will yield acceptable results? Monographic modeling is indeed cheap, but not very power- ful. The same can be said for standard Agen- cy techniques of long standing, such as Delta I.C. and logweights (see Chart 1). (U) The next possibility for modeling would be digraphs. Here is where the solutiog ^as 35.35 found. A digraphic model of a language's ' very easy to construct, requiring a relative 1 ' ^ c ' ly small amount of text as input and very little storage for the model. A digraphic model stores the information in a digraphic \ matrix (see Chart 2) in terms of the prob- ability of each possi ble digraph occuring \ for a given language, f 2 For details see the PI ft .paper of 25 July 1979 bj P.L. 86-36 Jan - Mar 80 * CRYPTOLOG * Page 4 P.L. 86-36 SECRET HANDLE VIA COMINT OIIANNELO ONLY DOCID: 4019671 UNCLASSIFIED fc.L. 86-36 Jan - Mar 80 * CRYPTOLOG * Page 7 UNCLASSIFIED DOCID: 4019671 Jan - Mar 80 * CRYPTOLOG * Page 8 P.L. 86-36 DOCID: 4019671 UNCLASSIFIED WHY ARE ALL THE STREETS IN AMERICA WHICH ARE NAMED AFTER A FRENCHMAN IN SUCH TERRIBLE CONDITION, AND WHO WAS THIS FELLOW DETOUR, ANYWAY? It is generally conceded that book-learning is not the best way to learn a foreign language. Instead, most people agree that the best way is to actually live in an environment where the language is present 24 hours a day. When a person sees and hears the words in a foreign language around him he soon learns what makes sense and what doesn't. How long, for instance, does it take for even the least language- oriented person to realize that there isn't any famous person named Einbahn, after whom so many streets are named throughout Germany and Austria, all of them coincidentally one-way streets? Well, I'll never forget the trip that two adults and four children, in one Rambler station wagon, took from Oberammergau , Germany, to Lake Garda, Italy. The reason why I'll never forget it is not just the horror I felt as I was being pushed down the Dolomites (it must have been at 150 miles an hour) by good-natured Italian truck drivers trying to meet a schedule. No, the reason is that, during calmer, flatter stretches of the trip, when I could relax my grip on the wheel and enjoy the scenery, it had seemed to me that Italian villages have such pretty names. But can they all have the same name! Hadn't we seen that name a few hours back when we were crossing that bridge? Then a half-hour ago when we went past the quarry? And here's anothev village with the same name — Lavori in Corso. Oh, dammit, I told myself, learning Italian quickly, it means "Men at Work"! Right after World War II, as the Cold War was starting up, the United States had to think of ways to get information to "the Russian People." The proposed methods included balloons that were supposed to blow from west to east but often didn't cooperate. One method that was used at an early stage was to set up an official U.S. radio station, transmitting in Morse code to all the hams in the Soviet Union. Since it was an official U.S. radio station, it had to have a callsign be- ginning with a K (if the transmitter is located west of the Mississippi) or a W (if located east of the Mississippi) . Since the transmitter was located on the East Coast, is was a W. And since callsigns often mean something — WGMS, for Washington's Good Music Station— it was decided to call this transmitter WRU, for U.S. radio transmitting to RUssia. But it didn't take long for Washington to learn that the Russian People didn't believe any of the broadcasts. Eventually someone pointed out that if you send the callsign in Latin letters, WRU, in Morse code (.-- .-. ..-), any Russian ham would convert those dits and dahs to the Russian letters BPy, which, unfortunately, represent the Russian word' for "I'm lying." Well, back to the balloons... Excerpted from "Twelve Language Anecdotes in Search of an Author," by Arthur J. Salemme, formerly PI, now retired. To Subscribe to CRYPTOLOG, Or to Change Your Address, Call 1103s Jan - Mar 80 * CRYPTOLOG * Page 9 UNCLASSIFIED SIGNATURE SAO DOCID: 4019671 ron ornom u s e o w iv SECURITY CLASSIFICATION SYSTEM ACQUISITION DOCUMENT REVIEW COVERNAME NSA FORM H8274 JUN 79 SYSTEM ACQUISITION DOCUMENT REVIEW PORTIONS TO WHICH THIS CRITIQUE PERTAINS (Section) I (Page) I (Paragraph) (Line) SAO USE ONLY CONTROL NO. ACTION (If marked, indicate retpontlble individual ) due date (Action completed) resolved (If marked) unresolved (If marked, no resolution found during review, mayfmay not regutre further attention) P.L. 86-36 reviewer indicating agreement to final disposition SAO official final disposition ‘ FORM H8274JUN 79 security classification Jan - Mar 80 * CRYPTO LOG * Page 10 t o n OF F I CIAL use 0H1 ¥ DOCID: 4019671 ro w off i c i al use oniv p.L. 86-36 ANALYSTS OF NSA, ARISE! YOU HAVE NOTHING TO LOSE BUT YOUR PAPER o This entire article is LL& TOR OF F ICIAL UOE ONLY N SA is in the midst of a revolution. Be- fore anyone rushes to call the Federal Protective Service, let me quickly add that the revolution, here at NSA, is an in- formation services revolution. Webster's New International Dictionary defines the word re- volution as a "total or radical change.” A total change is exactly what is happening, in a rapidly evolving way, to the methods of information storage, retrieval, and dissemi- nation now available or being planned at NSA. The radical change occurring at this Agency, of course, represents only a microcosm of the vast and rapid evolution of computers, data entry devices, and data storage devices which is taking place worldwide. New, swiftly growing industries offering information to the public, on virtually every subject known to man, have appeared in the last decade. This information is now instantly available by attaching a device about the size of a portable typewriter, to your tele- phone. The New Information Entrepreneurs. T12,: Information Services, now subscribes to the data bases of several of these new information entrepreneurs, including Lockheed's DIALOG, Bibliographic Retrieval Service's BRS/SDI Service, and the New York Times ' DATABANK. Hundreds of hours of manual research time is now condensed to seconds and minutes when searching the vast data storage banks avail- able via a telephone line to computers located in such places as Palo Alto, California and Scotia, New York. NSA information science analysts will query these data banks to aid in your work-related research on such diverse topics as chemistry, psychology, economics, education, physics, engineering, social sci- ences, medicine, drugs, industry and hundreds of other subjects. NSA is now considering the addition of LEXIS and NEXIS services offered by fyeade Data Central. LEXIS is a legal citation service covering federal and state law. NEXIS is an extremely powerful research tool which provides a full text search capa- bility of news sources such as the wire ser- vices, news magazines, newspapers and journals for a three year period. The addition of NEXIS to T12's inventory of commercial data bases would potentially eliminate a great amount of open source processing now being done. Government-Sponsored Data Bases. T12 has direct access to a number of gov- ernment-sponsored data bases which offer information of great value to NSA analysts. These include the files of the Defense Technical Information Center (DTIC), which provides access to technical reports on re- search and development projects of the De- fense Department. These reports are avail- able in special categories, on microfiche, in the NSA Library. Other DTIC data bases | offer descriptive summaries of DoD R § D ! activities. COINS (Community On-line Intel- ligence System) offers valuable community- wide intelligence information to NSA custom- ers with a need-to-know. NSA's In-House Developments. USA's mis- sion must, however, be also served by infor- mation data banks developed and operated in- house. The useful and valuable classified information available through the SOLIS system is, of course, accessible by T12*s information science analysts in researching your classi- : fied queries. In the last few years, T12 has developed and maintained a large number of its own specialized information data bases using the M204 language and the IBM 370/168 computer for storage and retrieval. These machine systems have greatly reduced the r enormous collections of file cabinets so familiar to visitors to the old CREF. New systems, now underway and being planned, will soon guarantee that the last manual file cabi- net, like the pterodactyl, will fade into ex- tinction. T12 is now hoping to solve one of the great- est barriers to the rapid conversion of the written word to digital form by using the Kurzweil data entry machine. This device, designed to "read" ordinary print and convert it to computer -compatible digits, was devel- oped by the same company which originated the Kurzweil reading machine for the blind, now available for use in the NSA Library. The successful employment of this device, or one like it will do away with the slow "poking- in” of data by a human, so essential to the com- puter storage and retrieval of information. Through mation retrieval 1 T12* s in-house infor- P • L system, analysts will be able to index the hundreds of thousands of reports Jan - Mar 80 * CRYPTOLOG * Page 11 FO B BfMCML USE 0N1 V DOCID: 4019671 TOP 3ECRET UMBRA which contain information needed by Agency analysts in their daily work. Storage of full texts using new ultra-high reduction techniques on microfiche is being studied under Pro j ect I I What This Revolution Will Accomplish, What does all this mean to the Agency analyst working against a deadline and seeking infor- mation vital to the completion of a report? It means that time- sensitive information will Manipulation of Electrically Received Information. Other systems, designed to handle information received electrically, are also under developemnt using hardware and already in use in another Agency the name given to this pro- software system ject no \l AwAitih^ software modification, will store large quantities of classified infor- mation presently received here via teletype and will enable the researcher to perform full-time searches by words, subjects, series numbers and other approaches. Thousands of documents now being processed manually for hard copy files, a process which is both labor intensive and time consuming, will be- come immediately available to researchers throughout the Agency using easy-fo-leam search strategies. Automatic distribution of these documents, in hard copy, is already taking place under P roject s tor hard copy. will eliminate r 1 .minate th and e need be available when it still has meaning and importance. It means that , in many cases, information will be available to the anal- yst, 24 hours a day, by querying T12 *s data bases directly, if required. It means get- ting an answer to your question in seconds or minutes instead of hours or days. The American Revolution freed us, as a nation, from foreign domination; the infor- mation services revolution will free, us, at last, from the overwhelming flood of paper that has dominated us for so long, stealing our time and efficiency. It may also, in- cidentally help save our forests for other uses. The next time you call for information services from T12, don’t be surprised when your question gets researched and answered with revolutionary zeal! * * * * ’ P . L . 86-36 WINS SYDNEY JAFFE AWARD (U) fTSCl At the 198 0 Crypto - Linguist i c Association Annual Banquet | of the Language Department of the National Cryptologic School was presented the Sydney Jaffe Award, the highest recognition a member of the Agency can achieve in the language field. His significant accomplishments as an Arabic linguist span an Agency career of some 24 years. T ■fC) In 1 977 . 1 1 performed pioneer work in developing National Cryptologic School courses in the Syrian, Iraqi, Libyan and Egyptian dialects of Arabic. Unique among these is the Libyan course, the only such course available to the intelligence community. For this seminal work in course development, he received the Agency ’ s Meritorious Civilian Service Award. fUl If there has ever been at NSA a linguistic factotum, it is | | He yields to no one as a model of the traditions and ideals set by Dr. Sydney Jaffe. P.L. 86-36 EO 1 . 4 . (c) P.L. 36-36 86-36 Jan - Mar 80 * CRYPTOLOG * Page 12 TOP SECRET UMBRA DOCID: 4019671 UNCLASSIFIED G p. L. 86 This article was originally published in the WIN [Women in NSA] Newsletter for May 1980. Since the problem it addresses is certainly not limited to Agency women, but rather applies to all employees returning from tours of duty elsewhere, it is reprinted here so that it may reach a wider reader- ship. dhw. L ast year, I was fortunate to have been selected for an external training program. I was thrilled, not only because of the opportunity It provided for me to learn more about the Inner workings of the entire Department of Defense, but because 1 felt also that I would then be assimilated back Into the Agency In a more responsible position. After all , If the Agency thought enough of me to have selected me for this "plum," then would they not want me to use ny know- ledge, later, to the best advantage?— or so I thought. Judging from my past job experience In several areas of the Agency, In addition to my recent schooling, I felt I was ready to assume a position of greater re- sponsibility upon my return; however, I was stymied In ny attempts to find such a position. My two-month at- tempt to find a job before 1 returned to the Washing- ton ^rea was greeted with such responses as: "We've just changed the PNM's, and your name will no longer be circulated to key components" (as I had been led to expect prior to my departure); and "We've Just changed the PW's and you must return to your original key component, since they sponsored you" (that's been changed again, 1 understand). (The difficulty was compounded by my trying to do business via a long- distance cornnerclal phone.) Rather than being given a choice of assignments, I was told that I would take a job In a certain organization* and I drove back to the Washington area specifically to Interview for this Job. After the interview, I decided, for several rea- sons, that this wes not the job for me; however, 1 was "on the books" as returning to that job, and that was that, as far as the Agency was concerned. When I re- turned to the Agency, I personally scouted around and arranged some Job Interviews, but I felt that I didn't have the time to pursue potential opportunities be- cause I was under pressure to be assigned SOMEWHERE. I finally returned, In a similar capacity, to the group from which I had left. The other three Agency employees who were In school with me also returned to the same or similar jobs. A sad commentary, I feel. 1 am grateful for the opportunity the Agency pro- vided for me to broaden my knowledge. However, I do have a few suggestions for both the Agency and for those employees contemplating applying for external training. First of all, I know the Agency's reasslmllatlon program has historically had its problems, and I am confident that the current administration is doing everything It can to help remedy the situation. 1 can't speak about overseas returnees, but It seems to me that those re- turning from specialized external training, such as the joint and senior service colleges that provide their sutdents with a broad background In military affairs, could be used by the Agency In a variety of areas. I know that there Is one slot, a one-year tour as execu- tive assistant to the Deputy Director— that goes to a returnee from the National War College— but other areas of the Agertcy &Wld ilso use the special kind of ex- pertise gleaned from this training. A one-year tour in any one of these ereas would benefit both the Agency and the employee. In lieu of that, the employee should not be "locked into" a job upon his or her return. A number of Interviews (perhaps three) should be arranged for the employee. There's no substitute for personal contact to aid one in deciding if one could effectively work with an Individual or In a particular area (one can't make this decision via long distance), and a specified period of time (a week or ten days) should be allotted the employee to make up his or her mind. Falling this, what can YOU do to assure yourself a good Job upon your return? (This advice holds true also for those who may be contemplating a change of jobs.) First, make certain your Personnel Summary Is up to date, and don't be shy, even before you go on TDY, about giving It to those who may be In a postil on to place you. Secondly, decide which areas REALLY In- terest you; find out what you can about these areas, who the managers are, and get appointments with them. Host managers are willing to talk to potential employees. Thirdly, don't discount the theory of "networking"— It can work for you. A few of the job Interviews I lined up were as a result of "contacts" I had made while working on a group-level staff. A few managers even remembered me from my stint as a Director's briefer (and that was In 1973!). In addition, senior WIN members were very generous In giving me advice and support. In short, the opportunities are there; YOU CAN MAKE IT HAPPEN! . Now, nine months after my return, I have secured a very good, career-enhancing position. It’s nice to have the better job now, but It would have been even nicer to have obtained It upon my return. Jan - Mar 80 * CRYPTOLOG * Page 13 UNCLASSIFIED DOCID: 4019671 CONFIDENTIAL AN INTELLIGENCE DATA BASEou P.L. 86-36 IRC, which stands for Central Infor- mation Reference and Control, is a system of scientific and Technical (S § T) intelligence support which is oper- ated under the auspices of the Defense In- telligence Agency (DIA) by the Foreign Tech- nology Division (FTD) of the Air Force Sys- tems Command (AFSC). The primary purpose of CIRC is to support the intelligence infor- mation needs of the five DoD S S T intelli- gence productions agencies: the Naval Intel- ligence Support Center, the Army's Foreign Science and TEchnology Center (FSTC) , Medical Intelligence Information Agency (MIIA) and Missile Intelligence Agency (MIA), and FTD. Access to the CIRC data base is available to other organizations, and NSA does have a CIRC terminal. CIRC means on-line access to almost 1.5 million documents, and another 3.6 million are available through batch searching. These 5 million records are available to NSA for retrospective research through the remote terminal, which is located in T1232 (Soviet Data Support Workcenter) , Room 3W032, x5989s. For on-line searching the terminal converses directly with the computer located at FTD, at Wright-Patterson AFB, Dayton, Ohio, and retrieves document references and abstracts in response to search queries. CIRC pro- vides document retrieval in a bibliographic sense, giving citations to documents re- lating to a given subject or author, rather than selected and sorted data ready for in- sertion into documents which the requester may be preparing. The intent is to furnish source material to be studied by the re- quester, who then has to decide the suit- ability and validity of the information. The user does not receive the document it- self from the computer; instead, represent- ations of the reference are retrieved, giving such. things as title, date .of report, report number or source, text extract, and ending with a list of specific surnames, facility names, and nomenclature designators occur- ring in the document. Should the requester need the entire document, T1232 can usually obtain it. ^ A major difference which tends to sep- arate CIRC from many other data bases is that CIRC does not use a controlled diction- ary of terms or keywords. Virtually all the words in the extracts entered into the CIRC system are usable in searching, with the exception of some common words such as "both," "who" or latter," which contribute little to retrieval. Because of the free text type of search, use of broad terms will certainly lead to a high chance of irrelevant retrievals while obtaining all the essential coverage. Therefore, the requester should be prepared to screen a great deal of information to avoid missing anything that seems pertinent. The other extreme — very narrow terms — will usu- ally render an output of mostly relevant doc- uments but eliminating some valid ones in which the searched items are expressed differ- ently in the referenced document from the search terms used — for example, searching for the SA-7 missile, but not for its nick- name GRAIL, or looking for the nickname FISHBED, but not for MIG-21. If SA-7 or FISHBED were not in the reference, but GRAIL or MIG-21 were, the reference would not be retrieved. The indexer can only use terms that are precisely in the reference and is not to assume a relationship unless it is spelled out. Thus, there are problems in using narrow or specific terms without using synonyms or related terms to achieve full subject coverage. DATA BASE CONTENT. Documents entering the CIRC data base contain information about jbr- Jan - Mar 80 * CRYPTOLOG * Page 14 eO NFIDENTIAL DOCID: 4019671 CONFIDENTIAL eign science and technology as it relates to U.S. Array, Navy and Air Force interests. All scientific disciplines, engineering spec- ialties and technologies are represented as available. Worldwide coverage is maintained with emphasis on Communist countries. U.S. information is not included except when it is incidental to foreign data. 00 Domestic and foreign open source pub- lications are included in CIRC as well as classified messages, Intelligence Information Reports and other material of all classifi- cation levels up to TOP SECRET CODEWORD and TK. Army, Navy and Air Force finished tech- nical intelligence publications containing analyzed information are entered into CIRC, as well as reports of some non-DoD agencies. The DoD S § T agencies also participate in obtaining information from other sources (such as NSA and CIA which do not submit reports directly to CIRC) for inclusion in the CIRC data base. ""W— About 83 percent of CIRC’s on-line data bases and 93 percent of the total CIRC data bases — on-line and batch — comes from foreign literature, 4.7 million out of a total of 5 million references. In 1979 over 1350 sub- scriptions to worldwide publications were scanned for content selection for CIRC. This provides a great number of open source un- classified references to a broad spectrum of subjects, nomenclatures, facilities, and authors or personalities, which are available for search, again, worldwide in coverage, but with emphasis on Communist countries. The other 7 percent of CIRC, nearly 300,000 docu- ment records, includes finished intelligence reports. IIR's. sensor reports, and other (u) Many of the open source references are not available for computer retrieval else- where, so this part of CIRC is largely unique. While the retrieved abstract is in English, most often the open source referemce will be in the original language. The reference in CIRC refers the requester to the original periodical, journal, newspaper or monograph for the complete article. OFF-LINE PRINT ORDERS. Because the on-line terminal printer is slow, bibliographies are usually ordered from FTD for off-line print- ing and mailing to T1232 for forwarding to the requester. There is only one NSA on-line terminal; when it is receiving output from the computer, no searches can be initiated. Bibliographies classified up to SECRET take seven to ten calendar days from order to receipt in T1232. TSC/TK orders take two to three weeks, since they roust be sent by courier, and there is only one courier flight per week from Wright-Patterson AFB to the Washington area. (If an order misses a flight, it must wait an entire week until the next one.) Thus, any request resulting in a number of retrieve references must allow ample time for the delievery of the data. FTD is hopeful that high speed printers will someday be installed at the principal CIRC user sites (including NSA) , which will result in much faster delivery, usually by the next working day, and will free the remote on-line terminal for queries. Instead of printing and shipping by mail or courier, FTD will use the high speed printers for transmission of the bibliographies to the system-associated workcenter. No firm date for this enhancement is available, but FTD is hoping it will take place during late FY1980 or early FY1981. Where possible, T1232 will attempt more ex- peditious responses for high priority requests as appropriate. p, L PROFILES. One additional CIRC feature— the E0 profile — is availble to requesters who want selected information on a current, recurring basis, A CIRC profile is a preselected canned query prepared for a requester arid stored on-line at FTD. When the CIRC data base is periodically updated, prior to their being put , on-line, the newly added documents are auto- matically compared with the profiles, and those documents which match the profile search statements are printed and sent on to the re- quester. A profile is a good way to maintain current awareness on a particular topic as material is added to CIRC. Queries may con- sist of terms, nomenclatures, personalities, facilities or organizations, countries, source (such as a specific publication), or classi- fication of the references. Queries may be as narrow or as broad as the requester de- sires. Profiles may be of any classification. . 8 6-f36 1.4. (c) USING CIRC. CIRC usage at NSA has been in- creasing substantially over the last several years to the point where NSA is among the top five users of the data base. This is despite the fact that the availability of the data base within the Agency has not been widely publicized, because, in part, of computer downtime problems, which have led to feelings of uncertainty about response times. Use of CIRC can be cumbersome bacause the data base is so large it is broken into two segments: the afternoon, or classified, ses- sion where a full abstract of the reference is available for all classified references (TSC/TK material is available during this session only) , and the morning, or unclassi- fied session where a full abstract is avail- able on-line only for unclassified references. Jan - Mar 80 * CRYPT0L0G * Page 15 CONFIDENTIAL DOCID: 4019671 UNCLASSIFIED If a CONFIDENTIAL or SECRET reference is re- trieved on-line is the morning session, only the microfiche number is given. This pro- cedure is followed because not all terminals for the unclassified session are in secure locations, because a number of users have dial-up terminals which use unsecure tele- phone lines. Off-line bibliographies do print the complete abastracts of classified morning references. The morning unclassified session is so large that FTD's IBM 360/65 cannot contain all of the references, so it has been broken into three segments: ■ CIRC, which consists of the CONFI- DENTIAL and SECRET material, as well as the last two years of un- classified input. This is avail- able on-line every morning except Wednesday. ■ CIIO, which contains unclassified material entered into the system within the past two to five years. This is available on Wednesday mornings. ■ ARCH, consisting of: 'the archival data base of unclassified references which were input over five years previously. This material is available only for batch searches. Thus a requester wanting complete coverage from all of CIRC might receive four separate LIP (Continued from page 8) outputs, all containing different references, from CIRC, CIIO, ARCH, and from SISA, the TSC/TK data base. Of course, searches can be limited by classification or by date span. The requester can limit his retrievals by indicating specific desires when making his request. (u) The primary costs to NSA for the use of CIRC are the expenses of the 24-hour dedi- cated circuit to FTD, paper for the printer, the cost of the Teletype Model -40 Keyboard Display Printer, and the salary of the one analyst who spends most of her time doing CIRC-related activities. There is no charge for search time, printing or mailing, ot for CIRC microfiche. (0) All in all, CIRC is an excellent data retrieval system, which is to a considerable extent unduplicated by any other system. * * * * * * * * Analysts who have not been aware of the existence of CIRC, and who might have questions concerning the system, or who might wish further information on how CIRC retrievals of profiles could help them, should call the NSA CIRC remote terminal location, T1232, on 5989s, or drop in at Room 3W032, where T1232 personnel will attempt to answer their questions. 00 An interactive computer program has been developed on the LODESTAR system for use by the analyst/linguist. The program uses the technique discussed above, and has complete instructions for its use contained in the program itself. The program can usually identify the correct language in under three seconds of CPU time. For further deails, contact one of the authors. Editor's note: Since the writing of this article, the data base has been expanded by the inclusion of the major languages of Europe. cu) The authors feel that this "distancing" tecnnique described here probably has other applications in addition to language identi- fication. Readers who wish to discuss such applications are requested to call either Dr. SOLUTION TO NSA-CROSTIC No. 29 "[A Propos ed Cure for the] Tim e-in-Grade Syndrome," I [CRYPTOLOG, November 197/ . "In general, promotion decisions [must] ultimately determine [just] who will make the key decisions within [an] organization. ...The initiative for promotion must belong to the managers and it is their responsi- bility to see that worthy personnel are promoted. It [must] be the employees' re- sponsibility to qualify for promotion." P.L. 86-36 Jan - Mar 80 * CRYPTOLOG * Page 16 UNCLASSIFIED