ooqro q 4033/689/ TOP SECRl!T

W£DVVII1W£Dl1 0C3CB~CBVV~ £Dffil3lIJCB~ ~11~ UI] (ij v lil fJ (!) (ij lil fJ lil II 00 fJ (iJ lDfJ f 00 (ij(ij lll lD CBrn"~UIJJl11JJffi lll3lBWUIOOJ ~W

::: · ·· ...... I I /. .·•· f I; . ,i; ~ / . .. 1 COLLECTION-SUPPORT ;.A ~ IS NOT FOR EVE RYON~ UNSEEN GO-BETWEEN: CONFERENCE INTERPRETER. . . J. Gurin...... 1. . ·•.../·· · .•. 97 ...... r/· ./.11 FIRST LADY OF NAVAL CRYPTOLOGY...... j ..•. 14 .14 C.A.A. NEWS...... - ...... • MILITARY CRYPTOLOGIC SUPERVISORS COURSE. . . • J I. .15 MORE BEANS...... Vera Ruth Filby ...... 17 BY-LINES DON'T COST - - THEY PAY! ...... John J. Mallick...... 19 YOU'VE GOT IT UPSIDE-DOWN!". . .A.J. S...... 20 "NO, WINNIE, . -· .,!.

'FillS BOUBMBN'F UON'Fi\:INS €0Bl3'll0RB r.tA'fERIAL fJfaasi&tid bj BfRNSA/e11ess (NSi\j'eSSM l!S %) A1:c11tpt f1om SBS, f!8 118t'i2, eatego1y 2 TOP SECRET lslcelwil1 Upaa ~Jstificatioc h; the 81 igiuatoa d a pct A pprqy ed tqr R © ! @G§ft b v f>l ? A on 1 Q - ·1 ? - 2 Q1 2 Q LJCS I J E' Qt tg E Cl 1 3 ~ ? 6 M Q R c= a se # 5-9 77 8 DOCID: 4033689 'fOP SECRE'f

Published Monthly by Pl, Techniques and Standards, for the Personnel of Operations

VOL. V, NO. 2 FEBRUARY 1978

PUBLISHER WILLIAM LUTWINIAK

BOARD OF EDITORS

Editor in Chief ...... Arthur J. Salenune (5236s) ~ "'''P.L. 86-36 Co 11 ect ion ...... I (8955s} n n Cryptanalysis ...... I ______.I (~962~) Language ...... I ICS236s) Machine Support ...... 1 lcs303s) Mathematics ...... Reed Dawson (3957s) Special Research ...... Vera Filby (7119s) Traffic Analysis ...... I I (44 77s) Production Manager ...... Harry Goff (4998s)

For individual subscriptions send name and organizational designator to: CRYPTOLOG, Pl

TOP SECRET DOCID: 4033689 . 4-. (c) P.L. 86-36

quare _eg, Round Hole?

February 78 * CRYPTOLOG * Page 1 EO 1. 4. ( c) P.L. 86-36 TOV ~i(;RiT lJMBR,.\ EO 1. 4. ( c) DOCID: 4033689 P .. L. 86-36 'fOP SECRE'f UMBRA .

February 78 * CRYPTOLOG * Page 2

TOP 8ECKET UMBKJ.t ~-~--~ · -·--....I.... - --·-· ...... - ·· EO 1. 4. (c) DOCID: 4033689 P'.L. 86-36 'f OP SBCRB'f UMBRA

Februar·y 78 * CRYPTOLOG * Page 3

TOP ~ECRET UMBRA EO 1. 4. ( c) DOCID: 4033689 P .. L. 86-36 'f OP SECRE'f UMBRA

February 78 * CRYPTOLOG * .Page 4

Cf'OP SECRECf' lfMBRA q~~ DOCID: 4033689 P.L. 86-36 'f OP SECRE'f UMBKA

·..

February 78 * CRYPTOLOG * Page 5

CfOP SECRE'f UMBRA EO 1. 4. ( c) DOCID: 4033689 P..L. 86-36 'FOP SE€RE'F UMBRA

February 78 * CRYPTOLOG * Page 6

TOP 8E€RE'F UMBR!. DOCID: 4033689

COLLECTION-SUPPORT TA 15 NOT FOR EVERYONE

L. 86-36

t is often said that the traffic analyst working in a collection­ operations area isn't doing traffi~ . analysis. This is because very littleI in-depth analysis is being performed. Better termed, the work could be called "collection-support analysis." It is a special ·type of traffic analysis for which not all traffic analysts are well-suited. In fact, it is so different that some might suggest it be considered as a unique career specialty. Recruitment of individuals with an aptitude for collection-support analysis, in my opinion, should be better defined. Too often, th&re seems to have been a willingness to accept any traffic analyst willing to work rotating shifts or perhaps willing to take a field-station tour of duty. Unfortunately, the skills needed to be a good traffic ·analyst do not necessarily transfer into making a good collection""support .· · analyst (CSA). A certain mental persuasion is ..... needed in order to be a competent CSA/TA in a/ collection-support analysis environment. This person plays a vital role in the collectioµ' cycle. He should be the oil and grease i.ri the input, output, and feedback process of the collection cycle. This article will identify the role of the collection-support analyst and attempt to identify what his mental persua- sion should be toward his job. ·

/ February 78 * CRYPTOLOG * Page 7

EO 1. 4. (c) CONFIBtlN'flAL IWIBcE: VIA 69!111.. 61WiNEbS 9th< P.L. 86- 36 EOT.4.(c) DOCID: 4033689 P.L. 86-36 CONFIBBN'flAf.

February 78 * CRYPTOLOG * Page 8

CONFIBBN'flAL lb~IQbE VIA €iQMHl:f 61WRIEb6 QtlJ.Y -~ · .__ l -- -======~------.i UNCLASSIFIED

THE UNSEEN GO·BETWEEN: THE CONFERENCE INTERPRETER J. Gurin, RS onference interpreting, without which and it wasn't until World War II that simultane­ there could be little communication among o~s i~terpretation was introduced. For a io.ng conferees from different countries, time it was not trusted because the speaker's speaking different languages, is a young delegation could not check the translation and Cart. Before World War I, it was recognized because the performance left much to be desired. and accepted that international conferences As a result, consecutive interpretation contin­ would be conducted in French, and no diplomat ued for. a number of years in meetings of th~ could expect to follow the course of action at United Nations. With the increase in the number such a meeting or be invited to participate of languages used, however, simultaneous inter­ actively if he did not possess a respectable pretation finally won over, and with the availa­ command of that language. But during World War ~il~ty of competent, professional interpreters, I, things changed drastically, and meetings be­ it is now fully accepted. tween high-ranking French and British (and, It is almost inevitable that, in a discussion later, American) officers required the services of highly demanding interpreting tasks, the of interpreters. · subject of bilingualism, or the degree of fl~­ ency in more than one language, should come up. At a recent NATO symposium on interpreting, While they still may argue among themselves it was my good fortune to meet and hear Dr. about the precise meanings of the term, the Jean Herbert, now of Geneva, who is the grand professional interpreters rate themselves for old man of conference interpreting. He has their languages as follows: A - mother-tongue been performing that function for more than 60 proficiency; B - fluent, active proficiency; years, beginning as a young officer in the C - excellent passive knowledge. It seems tp be French Army who happened to speak fluent Eng­ generally accepted that bilingualism means two lish. He told of the Armistice Commissions, at mother tongues, a rare event even among the which interpreters did the best they co.uld at interpreters. Dr. Christopher Thiery, who consecutive interpretation in French and English teaches interpreting at the University .of Pa;ris, around the conference table. By the time of the and who demonstrated for us in the course of· the Peace Conference, held exclusively in French and conference the skill of a consecutive inter- '. English, there were about a dozen interpreters preter of the first rank, maintained that tri­ who could take down and translate speeches ver­ lingualism, i.e., three mother tongues,° ·was batim. Consecutive i nterpretation was the rule virtually an impossibili ty. He himself could throughout the life of the League of Nations, pass for an Englishman in England and a

February 78 * CRYPTOLOG * Page 9

UNCLASSIFIED UNCLASSIFIED DOCID: 4033689

Frenchman in France and never make a single repeated phenomenon of a child acting as inter­ slip. He admitted that several professional preter for another child whose speech is diffi­ interp~eters listed three Level-A languages cult for an adult to understand. against their names, but said that, in his For many of those who are seeking to compre­ opinion, only one might qualify as a true tri­ hend the nature of the linguistic process, the lingual. This man, a former Spanish aristocrat, professional interpreter, engaged in either had learned his English and French from gov­ simultaneous or consecutive interpretation, has ernesses in his childhood. provided an ideal subject for research and speculation. Synchronous recordings of debates In recent years, the role of the conference at international meetings and of their simul­ interpreter, his specific professional task, taneous interpretation have stimulated investi­ the skills needed for its execution, and the gations leading to the detection of units of material conditions permitting optimal per­ meaning, or chunks of language, contained in mance have been analyzed and even codified the listener's short-term memory. This unit of with respect to working conditions. It is now meaning can be defined as the smallest group of recognized that good interpreter training aims symbols required for making sense, the minimum not only at teaching the techniques of simul­ for translating a message or a portion thereof. taneous and consecutive interpretation, but Some regard the translation act as consisting also preparing the mind of the interpreter for of two distinct processes: the translation of cross-cultural communication. One need only the input discourse into an internal cognitive think of the way Khrushchev used to flavor his representation, and the transformation of this speeches with Russian proverbs to appreciate representation into output discourse. Here the need for the interpreter to be sensitive again, the unit of meaning would play an import­ to the subtleties of meaning in both cultures. ant role. The program for training conference interpreters at the Polytechnic of Central London, for exam­ Much of the research evidence suggests that ple, is geared to developing a triple awareness: the bilingual's two languages are learned as of the cultural and social mores that motivate separate systems and function as such there­ the speaker; of how his speech can best be after. This raises questions regarding the expressed by the interpreter without altering "switching" mechanism and how it functions . the message; and of the socially and culturally Relevant research also suggests that the bi­ heterogeneous audience to whom the message must lingual' s two linguistic systems feed into and be clearly conveyed. On this last point, draw from some common supralinguistic background English is particularly sensitive, for it is which seems to be independent of any language. the language to which many listen whose mother Far from resenting this intrusion into their tongues are extremely diverse. For example, mental processes, the interpreters seemed as the interpreter may be called upon to render interested as the psychologists in discovering into English a speech whose subtleties are to be how they do what they do so well. understood clearly by Japanese, Danish, and Conference interpreting, which had started Pakistani listeners, as well as Americans and so informally, has now been institutionalized. British. What else should be expected of the Many of the old-time pros are refugees of one interpreter? An analytical mind, phenomenal sort or another from World War II, who capital­ short-term memory, tireless powers of concentra­ ized on their usually accidental knowledge of tion, and good health. To this list one might several languages. New entries into the field add the requirement for the right kind of are a different breed, and are normally the psychological and physical makeup to permit product of one of a number of training institu­ sharing a tiny booth with another interpreter, ~ions that prepare students for this specific sometimes for many hours on end, and the re­ application of linguistic skills. The market quirement to be able to lose one's own identity for conference interpreters is greatest in in order to play the role of the speaker being Europe, especially for Common Market activities interpreted. in Brussels, and there are several excellent schools on the continent. There is one Of course there has been recognition of in­ graduate-level institution in the United States terpreting as an innate skill, and of the wide­ that has a program designed to produce pro­ spread phenomenon of natural translation, fessional conference interpreters; the Monterey defined as "the bilingual translation done in Institute of Foreign Studies. Courses are everyday circumstances by people who have no given there in Chinese, English, French, German, special training for it." This condition is Russian, and Spanish. especially prevalent in bilingual countries like Canada and Belgium, where people from many It takes a special kind of person to be suc­ walks of life, and of all ages, are frequently cessful in the field of conference interpreting, called upon to act informally as translators or and when one watches a highly skilled, experi­ interpreters. Studies have been made of very enced interpreter in action, it is an impres­ young children, under 3 years of age in some sive display of how the human intelligence can cases, who fall naturally into an interpreter be called upon for near-miracles of performance. role. In a different context, there is the

February 78 * CRYPTOLOG * Page 10

UNCLASSIFIED .___ _.___ , .,. ____ i DOOI:tD4:. (c403368-S- 'FOP SECRE'f UMBRA

,\: J

'

Reprint of A?ll Inform:zZ Teahniaal Note 001-??

February 78 * CRYPTOLOG * Page 11 // EO 1. 4. ( c) P.L. 86-36 'FOP SECRE'f t:H~IBRA EO 1. 4. ( c) DOCID: 4033689 P.L. 86-36 TOP SECRET UMBRA

··..

February 78 * CRYPTOLOG * Page 12

'FOP SECRET UMBRA EO 1. 4. ( c) P.L. 86-36 'fOP SECRE'f UMBRA

T

February 78 * CRYPTOLOG * Page 13

TOP SECRET UMBRA DOCID: 4033689 UNCLASSIFIED

$iito.I !l!ar.fy o/ JV~al ·~Wtlolof/11

RAYMOND P. SCHMIDT, NSG Historian

Reprinted, with permission, from the NAVSECGRU BuUetin. rs. Agnes May (Meyer) Driscoll must have been a welcome person at Main Navy Build­ ing on Constitution Avenue in Washington, matics department of an Amarillo, Texas high D.C. during the late 1920s and 1930s. She school until enlisting in the Naval Reserve helped train Navy officers and civilians in the during the war. It is interesting to note that art of cryptanalysis (including the late Cap­ she qualified in four languages -- German, tain Laurance F. Safford, who first assumed di­ French, Latin, and Japanese. rection of the "Research D~sk" of the Code and Signal Section in OPNAV). After World War II, Agnes Driscoll deserves recognition as a Mrs. Driscoll achieved recognition as a "princi­ "plank owner" in the naval cryptologic organi­ pal cryptanalyst" for the Navy. She served in zation. Her abilities and skills as a cryptolo­ that capacity until December 1949, when she ac­ gist were widely respected by several generations cepted a transfer to the Armed Forces Security of naval and NSA colleagues. Although her Agency. She retired from active federal service technical contributions to the United States on 31 July 1959. have not been reclaimed from historical records, they obviously deserve far more space than Miss Agnes May Meyer entered the Naval Re­ permitted in this article. It is characteristic serve in June 1918. In July 1919 she accepted a of her cheerful modesty that she described her job as a stenographer for the Director of Naval job simply as one involving "scientific duties." Communications in the Code and Signal Section at $1400 annual salary. Working up to the position It would be sad, indeed, if Mrs. Agnes May of clerk by 1920, she subsequently resigned in Meyer Driscoll were to be forgotten by the 1923 to evaluate a new electric cipher machine present generation of cryptologists. We may for Mr. Edward Hebern. She "solved" a message very well owe her a professional debt that can in his "unbreakable cipher" and was on her way only be repaid by continuing her rather awesome to becoming a code and cipher expert. legacy of devotion and technical competence. On 1 August 1924 Miss Meyer returned to the Department of the Navy; she never again left C.A.A. NEWS government employment until her retirement. A The Communications Analysis Association's Government Accounting Office memorandum of 6 May Winter Social was a great success, and why not? 1925 shows her as a cryptanalyst earning $1860 After all -- let's face it -- free parties are annually. In the mid-1930s she testified before not that common around here. Of course, if you the Senate Naval Affairs Committee that she had weren't a member, it did cost you something to assisted the late William F. Gresham in develop­ get in. But I got in free and so did every ing a secure cipher machine for the Navy. The other CAA member. Hope you got a chance to Senate appears to have believed her and awarded chat with the Director. (W.E.S.) $15,000 to her and Gresham's widow. Not only was she qualified as a cryptanalyst, but also News from the CAA Special Interest Group on she obviously had skill as a cryptographer. Cryptologic History: The ~roup_had its_f~rst meeting in November, and its first a~tivity_ Agnes Meyer had earned an undergraduate de­ a tour of the Pl Cryptologic Collection -- in gree from Ohio State University in 1911. As a January. In December, members of the group. first-generation American citizen, she took ob­ received a copy of Dr. Harold Deutsch 1 s article vious pride in her naval service during the "The Historical Impact of Revealing the "Great War." One of her personal data sheets Secret," Nonmembers of the group did not. Anyone lists special qualifications in physics, engin­ -- CAA member or not -- who would like a copy can eering mathematics, statistics, auditing, book­ call Bill Nolte, 4087s, who can also explain the_ . keeping, typing, and clerical work. She also group's elaborate initiation rites. Future activi­ possessed musical talent, having served as Di­ ties: In February or March (date to be announced): rector of Music in a small Texas school from a session on oral history. (W.M.N.) 1912 to 1915. Then she became head of the mathe-

February 78 * CRYPTOLOG * Page 14

UNCLASSIFIED -~-~~--~------· -· · DOCID: 4033689 .L. 86-36 SEC RE'

-=· i I wice a year, the National Cryptologic different subject area, as shown below in the School (NCS) conducts the Senior schedule for Class 12 (summer of 1977): Military Cryptologic Supervisors Course, Module Some of the topics covered CourseT CY-200. This course is for the senior NCOs/petty officers and warrant officers who Management Contemporary management con­ are "going places" -- that is, those middle­ Seminar cepts, practices, and practi­ level managers who will eventually be moving cal applications; problem­ into jobs requiring a wider range of crypto­ solving and decision-making; logic knowledge. The objectives of the the planning and communicating course are to: process •increase the student's understanding U. S. Intelli­ Intelligence community organi­ of the relationships and functions of gence Commu­ zation and NSA's interface the cryptologic community within the nity with it; role of the Director national intelligence community and of Central Intelligence; the U.S. government structure; Defense Intelligence Agency; Central Intelligence Agency; • demonstrate the impact of increased NSA support to national policy requirements, decreased resources, makers; national cryptologic and increasingly sophisticated security policy targets on the cryptologic community; SIGINT Resource National planning, program­ • illustrate the responsiveness of Management ming, and budgeting; Consoli­ the cryptologic community to the System dated Cryptologic Program; National Command Authority in times information management ; eco­ of peace, crisis, and war; nomic analysis; resource • bring the student up to date on the management in the intelligence latest developments in cryptologic community ; cryptologic planning technology, operations, policies, SIGINT Opera­ and plans; and tional • further develop and prepare the Process student for positions of added responsibility by exposing him to a variety of subjects outside his own area of specialization.

CY-200 is open to personnel from all four military services, grades E-7 to. W-:-A inclusive. Additionally, the NCS may grant waivers for highly qualified E-6s. Students must have at least 8 years of cryptologic experience, prefer­ ably in operations (as opposed to maintenance, communications, personnel, and other support specialties). To insure maximum utilization after graduation, NSA policy is to give priority in selection to personnel in their thirteenth or fourteenth year of service. The course lasts 7 weeks and is conducted at Friendship Annex (FANX). It is designed in modular fashion, with each module covering a

February 78 * CRYPTOLOG * Page 15 ·E O l ..4 ( c ) P.L. 86-36 8ECRE'f l~Cf'LI! v IA eOMIICT et!ttHHet~ Ol~Lt' DOOI1-B4:· (c:.4033 68 9 n T OC 'JC .C·,• .LJ • UV JV SHCRH'f

gives an introduction to the U.S. worldwide photographic-reconnaissance program. At NSA's Headquarters complex, students have the oppor­ tunity to tour various spaces, including NSOC,·DEFSMAC, AROF, BROF, and GROF, various research and development projects and COMSEC facilities. ' . Throughout the course, student participation is encouraged through the use of seminars panel discussions, and student presentati~ns. Students are able to talk to and interact with experts from many fields. Senior officials of NSA/CSS and other agencies in the intelligence community regularly brief each class. SCA commanders and senior enlisted advisors are also frequent visitors to Support Ac­ the CY-200 classroom. At the end of the course, tivities

February 78 * CRYPTOLOG * Page 16

SECRE'f IWIBhE VIA 68111li'f 61WfflEt::5 81Uli" DOCID: 4033689 UNCLASSIFIED

·- • .m:..a. .. ,. ~ -- -- MORE BEANS

'• e may as well get used to it -- used to Knowles, former Head, Atlantic / hearing terms like "signal intelli­ Combat Intelligence, COMINCH; gence," "HFDF," and "traffic ai:ialysis" ,..__ and I n \ }..:.:£! c .... Win public places, used to feeling ex- ean unexpected bonus -- Vice-Admiral posed and unprotected at moments when our accus­ ~Sir Norman Denning, Naval Intelligence tomed and familiar anonymity seems to be snatched 1 \ ,,....l 'Division. . '-.-J~ (J away. Like most of us, no doubt, I had hoped that our "time of indecent exposure," as I have In his urbane and interesting introduction heard it expressed, might be nearly over, but a Dr. Deutsch remarked that many in the audience rainy October evening and foggy morning in had been occupying themselves with the signifi­ Annapolis have persuaded me that we have seen cance of ULTRA and said that although "tremend­ only the beginning. Now that a few of our ous euphoria" had following the publication of bean-counters' beans have been spilled, packs The ULTRA Secret in 1974, savage reviews had of hungry animals of various breeds, having sent the tendency in the other direction. (In­ caught the scent, are out there gnawing at cidentally, despite critics' attacks , there are the foundations of the storehouses, sniffing some who, while deploring the publication of and rooting for more beans. the book at all, consider the charges of tech­ nical incompetence too harsh. Winterbotham was The occasion in Annapolis was the Third not a technician and never said he was; he was Naval History Symposium at the U. S. Naval the vastly experienced intelligence officer Academy, 27-28 October 1977, specifically the who served as liaison between the producers of Friday morning program on "Naval Intelligence Special Intelligence and the highest echelon in the Second World War." There, filling a of users . ) tall, tiered lecture room in Rickover Hall, more than 200 people sat rapt for nearly 3 On introducing Commander Beesly, Dr. Deutsch hours , without even a break, listening to pre­ showed advance copies of Beesly's book on sentations on "ULTRA and the Battle of the At­ Very Special InteZZigeriae, being published in lantic." There it was easy to sense the appe­ England and scheduled for publication in this tite of the gathered historians for facts and country in March 1978. Commander Beesly opened more facts, their desire for truth and all the his masterful presentation by defining terms. truth; and surely we can understand and appre­ He pointed out that that the term the Admiralty ciate that. The hunger -- even lust -- for in­ always used was Special Intelligence, that formation was evident even at the vast cocktail there is almost no mention of ULTRA in British party the evening before, in the eagerness, for naval records, that ULTRA was a classification, example, of a young historian snapping up a not a cipher title, although the term has remark that there might be unreleased ULTRA taken on that meaning as a result of the Win­ information to be pursued . ("You mean," he terbotham book. Commander Beesly said that asked, almost licking his chops, "there's lots it is impossible to overstate the value of SI, more to come?") But influences other than but he stressed that it was only one of many scholarly questing for knowledge are present sources. The information from the triumphs at too, as I suddenly realized at the same party Bletchley Park went to the Operational Intelli­ when an equally eager young historian, respond­ gence Centre (OIC), which was a "full and true" in­ ing to a comment about inaccuracies in F. W. telligence center. Even when most complete, Winterbotham' s The ULTRA Secret, retorted, "Yes, SI needs the genius of a few experienced ana­ but it made him a million pounds." lysts to piece it all together. Even at its best, SI is useless if the users do not under­ Chairman of the Friday morning meeting was stand and accept it, and Commander Beesley told Harold c. Deutsch of the U.S. Army War College, horror stories of events when commanders and the speakers included: refused to accept SI conclusions. Both he and the following speaker provided extensive exam­ • Patrick Beesly, former Deputy Chief, ples of the use of ULTRA results in protecting Submarine Plotting Room, the Admiralty; convoys against German submarines, and he noted that German operations against the east coast \.Jurgen Rohwer, Library of Contemporary of the United States were detected in advance History, Stuttgart; by OIC. He summarized the state of success

I February 78 * CRYPTOLOG * Page 17

UNCLASSIFIED DOCID: 4033689 UNCLASSIFIED

at various phases of cipher recovery and the tenigence had much greater influence on deci­ need during "blackouts" to· fall back on HFDF sions on the Allied side than on the German. (both he and the German speaker pronounced it The turning point would not have come, as it "huffduff'') and to try to read Admiral did, in May 1943 without radio intelligence, Doenitz' mind. Despite efforts at co11D11Unica­ and Normandy would have come much later. In a tions security, signaling remained necessary. final, startling statement, he said the end U-boats had to report and to receive instruc­ might have come with the dropping of an atomic tions, but later in the war the U-boat conunand­ bomb on Berlin. ers were given more control and signaling Dr. Rohwer's speech was a tour-de-force, became less frequent. At the time the Allies and it too received a long ovation. It was finally changed their codes 'in June 1943, both an interesting experience to see these two sides were reading each other's traffic with­ representatives of the great opposing forces out either being aware of the other's success. complementing each other's presentations and Concerning his sources for research on his helping each other by pointing out the move~ ­ book, Conunander Beesly said that the British ments depicted on the slides. records were not complete but that many fasci­ nating files were available from OIC and even An American followed -- Kenneth A. Knowles, from Bletchley. The most revealing were the wartime Head of Atlantic Intelligence, Chief weekly reports to the First Sea Lord, written of the Intelligence Staff of the 10th Fleet. by Beesly's chief, Captain Rodger Winn. The Captain Knowles had come from his retirement reports made by the tracking room were based home in Florida and had written his talk on mostly on SI. In estimating the value of SI, his boat in Chesapeake Bay, depending entirely Conunander Beesly said that its contribution was on his memory of events 35 years ago, without enormous in planning evasive routing and in con­ any recourse to official records. He opened centrating naval forces, that without it victory by commenting that World War II had brought would have come much later and at much greater technical achievements of the highest order and human and material cost. SI, with the use OIC that transcending all was the breaking of ULTRA. and the U.S. Navy's OP-22-G made of it, was a The Americans, he said, were more selective war-winner -- but not the only one. The real for need-to-know than the British, and only heroes were those who risked their lives and three persons actually dealt with ULTRA at often had to pay a fatal price for other Headquarters "in a former girls' school in people's mistakes. Washington." At the communications center there, traffic included ULTRA results, HFDF After an enthusiastic ovation for CoJD111ander telefax, and radio-fingerprinting reports. Beesly, Jurgen Rohwer continued the story from ULTRA results were, with one exception, never the German side. He began by noting that TV used without such backup as aircraft sightings, and the other public media have given the pub- DF, or other cover sources. The one exception, 1 ic the idea that the Allies knew every German the one risk taken, was against the U-boat move in advance. If that had been the case the "milk cows" in the South Atlantic, and the would have been over much ULTRA-based action against them brought results, sooner. He explained that ENIGMA was the code­ 'in Captain Winn's words, "too true to be good." name for several cipher machines made by a pri­ The Allies recovered U-boat ciphers, grid loca­ vate firm, and he described ENIGMA with slides tion charts, and a new acoustic device. His­ showing rotors and other details. The German torians, he said, have considered the turning assumption was that the time needed to break an point in the Battle of the Atlantic to be the ENIGMA cipher would be so long that the results summer of 1943, after the sinking of 90 would be useless, and indeed the British did U-boats. But the Germans were making technical need the Polish and French reconstructions as a improvements -- flash transmissions, an acous­ basis for their success. With a series of tic torpedo, 10-cm radar, new designs for plotting charts on slides he showed the sequence U-boats -- so it was necessary to crush the of events at the time when both the Bletchley Germans before these improvement began to have and B-Dienst cryptanalysts were reading each effect. In evaluating ULTRA, Captain Knowles other's naval traffic and both sides were using pointed out that it was used for defensive as radio intelligence, as he called it, in deploy­ well as offensive operations. He judged that ing and redeploying their submarines and con­ in its use the British were more clever and the voys, in moves and countermoves based on current Americans more daring, and said that the team­ decrypts. In evaluating the German use ot work between them was superb. He commented on ENIGMA, he said that there were mistakes, there the value to cryptanalysts of the sheer volume was carelessness, that full use was not made of of traffic stel1Dlling from Doenitz' insistence the machines' capabilities. By the end of the on direct control. No such volume would have war, however, the German Navy was using up to been available without it, but then, he pointed 40 different ciphers, so that Bletchley had to out, Doenitz' methods almost worked. set priorities for attacking and exploiting The final speaker, not on the original them. In sununarizing the role of naval intelli­ program, was Sir Norman Denning, of British gence, he listed in priority order radio inte­ Naval Intelligence. In his opening remarks he ligence, DF, and traffic analysis. Radio in- made it clear that, although he did not condemn

February 78 * CRYPTOLOG * Page 18

UNCLASSIFIED DOCID: 4033689 UNCLASSIFIED

The ULTRA Searet, Winterbotham was the first After more Churchill stories, the applause of person to break the oath of silence taken in the listeners demonstrated how fully thev had 1940 when a select few signed their names to a entered into the mood of nostalgia he had evoked. docwnent which forbade them ever to divulge ULTRA. He commented that surely ULTRA was the During the too-brief question time which best kept secret in world history. He described followed, the questions showed the intense in­ early efforts to recover material to help in at­ terest of the audience, an interest which is tacking the ciphers, the partial successes from, certain, it seems to me, not to slacken. Earlier among other methods, capture of a weather ship, in the program, Dr. Deutsch had announced that then recoveries f_rom submarine U-110, after which a TV program was being produced at the Army Bletchley could read continental W/T traffic. War College at Carlisle Barracks on the Battle But cryptanalysis is not the end of the job, he · of the Atlantic, to be made available to govern­ emphasized. Detailed analysis must follow; and ment agencies and perhaps the public, and he he quoted from memory a conunent referring to the urged his Army and Air Force colleagues to do World War I successes of Room 40, that "the in­ what they could to sponsor similar programs on formation received has to be refined in the ULTRA as it affected ground and air operations. crucible of intellect and experience before it . The range of sponsors for the Navy conference can be considered intelligence. " In evaluating -- including the Army War College, the Smith­ the results of SI, he said that only SCHARNHORST sonian, the National Archives, the Eisenhower was a direct victim of its use. Sir Norman was Foundation, and the Naval Academy -- would sug­ in a reminiscent mood, and he spoke of Churchill gest that more such conferences are altogether in the anteroom of the war room just after the likely. This listener noted particularly the victory. "I see you're still celebrating," said rather coy references to a certain "agency of the Prime Minister. "Can I join you?" And he the Department of Defense" which had been con­ turned to (then Commander) Denning and said, as sulted about the symposium and the expressed Denning remembered it, "When I was a naval per­ hope that more information for scholars would be son we sometimes rang on the middle watch forthcoming. It is unmistakably evident that together in the dungeons of the Admiralty . even military historians, who should understand You were the young officer who told me that the purposes of military .security, will be total war required total intelligence, and exerting continuing pressure. without full couunitment we might lose the war . " (U)

organizations. As an analyst, I can think of BY-LINES DON'T COST - no source of psychic income more rewarding than to see my name on a piece of intelligence I have THEY PAY! Jiii J. MILLICI, 141 done my best to produce. No analyst or trans­ lator worthy of the title can help but take in­ here has been a lot of talk recently about creased pride in, and care with his work if his revamping procedures within the intelli­ name is there for the intellige~ce world to see. gence community to get bigger bangs from increasingly fewer bucks. That being the Within modern society as a whole, and cer­ Tcase, it appears the time has come to seriously tainly in modern government, there seems to be consider instituting a relatively minor change in an increasingly dangerous tendency to shy away Agency reporting which I believe could greatly from fixing responsibility. Perhaps the most enhance the quality of our product, profoundly apparent truism of this age is the recognition improve morale, and tremendously stimulate profes­ that lack of responsibility breeds mediocrity. sional pride among the Agency's analysts and trans­ In addition to boosting morale, by-lines fix lators. And it wouldn't cost the National Security responsibility for the quality of our product . Agency one (pardon the expression) red cent! When names are attached to their work, profes­ sionals are bound to do their best all the time, My simple proposal is that NSA should begin and neophytes are compelled to improve rapidly putting the names of analysts and translators by the most exacting of taskmasters their own on the items they publish. This is no radical developing reputations. concept that has never been tried before. A number of sister agencies have long attached It is high time each analyst and translator the names of their analysts to their products. is able to say to his peers, "This is my prod­ As a matter of fact, by-lines on collateral items uct. My name on it proves that I stand behind have several times served as my introduction to it. If it is accurate, don't hesitate to con­ fellow analysts and have been responsible for tact me, and perhaps we can help one another my initiating mutually beneficial communications even more. If it contains error, tell me, and with those individuals. I'll try to improve. In any case, I proudly accept full responsibility for my work." The Now that promotions seem to be farther and way to begin fixing responsibility, and giving farther apart, new methods of increasing psychicj credit where it is due, is by giving by-lines income should be especially welcomed by those to live up to. The time to begin is now. managers who are concerned with morale in their

February 78 * CRYPTOLOG * Page 19

UNCLASSIFIED DOCID: 4033689 UNCLASSIFIED

-'~NO, VVINNIE, YOU'VE GOT IT UP$1DE-DO~N TOOi"

wrote in A.in both places in the puzzle. When I phoned him and congratulated him on his tour-de-force, he said that my guess had been right: f (frequency) is indeed the reciprocal of >.. ( [wave] length) . . An~ so .NSA-Crostic No. 11 was typed up for pr1nt1ng in the January issue. But, as is another practice of mine, I handed out some advance copies to a crew of people who like to do NSA-crostics critically, so that they can correct any typographical errors (178 instead of 187) or tighten up any definitions, etc. I was flabbergasted to learn that not one of them knew what to do with the letter in box 92. Here are the results : Previewer "Words" In text ·E.W., Russian "reciprocal of L" BEPTOLET linguist Dialog: A.S.: "All the other letters are Cyrillic -- where'd henever I make up an NSA-Crostic, I give you get the Latin L Wan advance copy to the person whose from?" published work I'm quoting from. I don't E.W.: "I thought of it as a give any hint about who wrote it, and the person Russian L, but wrote a usually tells me what a surprise it was to Latin one." have his own words jumping off the page at him. E.S., mathe­ "reciprocal of F" BEPTOFET Therefore, when guest NSA-crostician David H, matician, Williams asked me to preview NSA-Crostic No. 11, knows "some Dialog: I was surprised to see the following text Russian" E.S.: "The definition's wrong emerge: -- it should be 1;1'." [A. J.] Salemme, [Guide to Russian] A.S.: "I don't know about that TecJmical Trans Zation, NSA, November. but I know that there 1974, 189 pp. (U): isn't any Russian word with a Latin F in it." "The translator must . . . determine the precise type of [rotary-wing] G. E., Mongoli­ "reciprocal of ?" BEPTO ET an linguist aircraft . . . being referred to in Dialog: Russian as . . . BEPTOAET so that his (Mongolian rendition will conform to precise has lots of A.S.: "What does the ? stand English usage. He must not ... borrowings for?" avoid the issue by translating it in from Russian G.E.: "How do I know? It's a formal context as 'eggbeater' or and an al­ Russian word!" ' chopper. ' " phabet based A.S.: "Why didn't you look it on Russian) up? All the time I was solving the puzzle, I G.E.: "I don't look up was chortling at the way that -Dave had used t Russian words to do Latin letters in the WORDS to represent puz:zles." Russian letters in the word BEPTOAET: the B T.L., mathe­ "reciprocal of ?" BEPTOJET in "This beets them all" suddenly turned into matician a Russian B (which is really pronounced V); Dialog: the P in "Christopher Robin" turned into a Russian P (which is an R); etc. But what, I T.L.: "It's a Russian letter, asked myself, was Dave going to do with the but I don't know A? The very last letter I put in the puzzle Russian. " was in his "What f equals in a basic physics A.S.: "Then where'd the J come formula (3 wds)" -- "RECIPROCAL OF " I from?" don't know from physics, so I said,11That son­ T. L.: "I figured it was a of-a-gun must be using a Greek lambda!" so I kind of airplane."

February 78 * CRYPTOLOG * Page 20

UNCLASSIFIED DOCID: 4033689 UNCLASSIFIED

With this preliminary showing (four wrong A.S.d answers from four smart people), I figured out NO I SIA BEPTOJ\ET that somewhat was awry with the puzzle. I asked Dave if I could edit it in such a way Dialog: that any ordinary CRYPTOLOG reader (with no knowledge of Russian, or physics, or nothing!) A.S.: "Yippee! You got it could make his or her hand make the correct right! Why'd you put it letter and then stick it in box 92. The thing in upside-down?" I came up with was to shuffle some of the A.s.d: "I figured it must be a letters around and come up with a definition: Russian letter that looks like an upside-down NOi 51.6_ V. But I don't know ( .. ------11 .. ) 119 44 182 164 63 92 how to pronounce it."* sil!aA oz ioJ p11aq s1q Having finally got one person with no uo 8u1pul!lS ialJll ~~s knowledge of Russian (and no prompting from me) Ul!W AT04 npu1H aql lllt{M to write an upside-down V and place it in box 92 in that same attitude (is it coincidental Back to a new group of previewers! that that person is my daughter Anne?), I figured that the puzzle was ready for the average CRYPTOLOG reader. With Dave's blessing Previewer ''Words" In text and with E.S.'s fear that the definition might offend any Hindu holy men who might get BEPTO ET C.G. NOISIA to see the puzzle, we went to press. Ma.y I respectfully ask any CRYPTOLOG readers Dia,Zog: who did the puzzle, "What did you put in box A.S.: "Why is box 92 blank?" 92? L? F? J? V? A? Or something else?" C.G.: "Charlie [C.G. 's husband] Or did you agree with Charlie, "It's too damned says it's Russian, but the cute for me." puzzle's 'too :damned cute' for him." *Well, this is how you pronounce it. (First E is pronounced "ye" as in "yet"; second E is G.T. NO I SIA BEPTOVET pronounced "yo" as in "yonder.") B E P T 0 ' A E T v ye r t o 1 y6 t A.S.: "You had the V upside-down Now say it -- "vyertoLYOTI" (Oops, I in. the words -- why did forgot to tell you to roll that R.) Try.it you turn it right-side-up again -- "vyer-r-r-rtoLYOT!" But you st'l-U in box 92?" don't know whether to translate it as G.T.: "I didn't know I could "helicopter " "autogyro," "rotary-wing put it in upside-down." aircraft " :'VTOL " or whatever. For guidance, see Guid; to Rus;ian Teahniaal TI'anslation.

Gettin·g· back to PUZZLE If you wanted to pass an object through two that psychological holes and have a completely contiguous fit each test on page 1, time, you could do that too. For example, if where the cylindrical you had a board like the one shown below, you peg does fit into a could pass a hemisphere through, holding it square hole, here's a differently each time: little puzzle you CRYPTOLOG readers can work on. Assuming that one is allowed to use only solid Now, then, the puzzle: Imagine a board like figures (rather than squeezable ones) which have to the one shown below. What single objeat can be fit completely contiguously inside the cut-out passed through each of the three holes in turn, hole, one could pass several different objects with a completely contiguous fit each time? through a two-inch hole in a board. For example, a two-inch sphere, a cylinder with a two-inch 1 - 2" diameter diameter, a cone with a two-inch base: 2 - 2" square . 3 - 2" base, 2" height A beautifully hand-crafted model of the object will be awarded to the first ten readers to send in the correct answer. (Answer will appear in next month's issue.)

February 78 * CRYPTOLOG * Page 21

UNCLASSIFIED Pl-JA 1e-sn-26l66 0 oc-r-1y: -- 4 o 3 3 6 a 9 TOP SECR&T

'flIIS BO€UMRN'f.ON'l'lalNS e SOBBWORD M" I&•TE 1&1·L TOP SECRET ..