December 1986

Total Page:16

File Type:pdf, Size:1020Kb

December 1986 eclassified and A [xoved for Release by NSA on 10-17-2012 pursuant to E.O. 13526, MDR Case # WUJ'i]V£!JWUJI1 f515(Bl!JWVU~ £iJlB15W~~ (rI:DWV lB15I:DWlB15 lB~ WlUiJlDl! f W~~~l1U11I1ID [Brn~I1UI]l1l]rn DECEMBER 1986 .L. 86-36 TECHNOLOGY SEEPAGE (U) .. • .1 WHO IS SHE? (U) ••••• .9 CRYSCOM (UJ •.••..• .9 QUOTE WITHOUT COMMENT (U) 10 THE LANGUAGE IDENTIFICATION PROBLEM (U) ~----4~1. 11 PRODUCT vs PROCESS (UJ .....• 18 CHANGING JOBS (U) ...•...• I. 21 ODE TO THE CA INTERN PROGRAM (U). 23 A COMPOSITE CONVERSATION (UJ. L.,.,--.".,.,..,....---......J1 . 24 BOOK REVIEW (UJ •.. • Vera Filby. • 26 CONFERENCE REPORT (UJ . L.I ---II. 29 LETTER (UJ . 31 OPPORTUNITY (U) . 32 BULLETIN BOARD (UJ .. 33 CISI CONFERENCE (U) . 33 THE STORY OF A PRIVATE GERMAN CIPHER (U). .1 f . 34 NSA-CROSTIC No. 63 PLUS (U) ..•...• .I I. 36 IIAtdDlE li'IA (SMitH (I IANtdELS ONLY CLASSIFIED BY r~SA/€SSM 123 2 DEClASSll=Y ON: OFi~inatin~ NOT RELEASABLE TO CONTRACTORS A~eAeY'5 DeterA"liAatieA ReEtl::lirea DOCID: 4033692 Published by PI, Techniques and Standards VOL. XIII, No. 12... '" ................. December 1986 JULIA CHILD, WHERE ARE YOU? (u) PUBLISHER, ..•.......••.. ,.. ",·:::·1,-- ....,.... What this agency needs is a Julia Child to l?@,~ •. 86:- 3 6 BOARD OF EDITORS demystify personal computers. EditOr :>, .... :::.<., ..... ::~I'-- ....l963-11 03) Consider what she did for French haute cuisine: (Oll~ctio"'~ > :: :1 (963-5877) she brought it within the ken ofany American who Cor;,P\JterSy~tems.::.. ..;1 (963-1103) Cryptanatysis. , .::1 (963-5238) could read. Cryptolingtltstics.>, .. ,.: 1 963-1596) Index <: . ':::" J 1963-5292) How? Very simply, she wrote a step-by-step Information$ciefl:(e 1 1(963-1145) InformationSe~t.Jrity:,:, Georae F. Jelen 1859-1211b) handbook with ample illustrations and explanatory Intelligence I'lesear.ch ., .:1 1963-3845) notes, all in an informal, joyous, and encouraging Language ... , .. ,.. , ..1 (963-3057) Mathematics ..\., .\.:, f (963-5566) tone. Now there's a whole generation who never (96~-6430) Puzzles. ..... .. : :., J knew that French haute cuisine was once the Science and Technology \,.1 968-8075) Special Research :, .. : Vera R. Filby (968-8014) exclusive preserve ofa select group ofthe anointed. Traffic Analysis :, :.Robert J. Hanyok (963-5734) What is odd about personal computers is that they . Illustrators ,, "f'".;.;...J.J k963-3490) ....................... L-- ~963-6211) were intended, as the name rather suggests, to be used by anybody. It's not working out that way because the user's manuals are poor. Scan the To submit articles or fetters by mail, send to: business pages of the local newspapers some Editor, CRYPTOLOG, Pl, HQ 8A187 time-you'll see that enterprising people have If you used a word processor, please'include the recognized this and are profiting from it by offering mag card, floppy or diskette along with your live-in seminars and other courses. And at a price! hard copy, with a notation as to what equip­ mghway robbers! ment, operating system, and software you used. via PLATFORM mail, send to: It would be advantageous to develop a handy-dandy NOTE CHANGE: (r y p t I 9 at barlc05 (bar-one-c-zero-five) . for personal computers and maybe software as well, (note: no 'o's in cry p t I g) to be issued by the PCIC along with the hardware Always include your·full name, organization, and and software. As it is, many terminals are unused secure phone number. (or underused, solely as word processors) for lack of understandable instructions. So, in the interest of productivity-think of those For Change of Address hours spent grumbling as well as trying to cope-it mail name and old and new organizations to: Editor, CRYPTOLOG, PI HQ 8A187 behooves Somebody Up There to commission a I Please do not phone. cookbook-type handbook to personal computers. And when it's published, please send us a copy. Contents of CRYPTOLOG should not be reproduced or disseminated outside the National Security Agency without the permission of the Publisher. Inquiries regarding repro­ ~~ duction and dissemination should be directed to the Editor. 1"01( OI"I"IGIAI Y~J\ O~L¥ DOCID: 4033692 P .. L. 86-36 _____Ipll P.L. 86-36 December 1986 * CRYPTOLOG * page 1/ SB6IW'P ./ ~.OT RELL'\S,\BLE TO EOPHRAETORS EO 1.4. (c) IIA?WU3 YlkOOMHtf' OII:MHfBLS ONL'l·L. 86-36 DOCID: 4033692 SHORE'f'· / December 1986 * CRYPTOLOG * page 2 P.L. 86-36 SB6R8'P r~OT EO 1.4. (c) RELEASABLE TO COfHRAeTORS HANDLE VIA eOMHff' eIIA~H,ELS ONLY DOCID: 4033692 \ FREQUENCY HOPPING, VARIABLE DWELL',TIr,tlES \-'--Af ......--------.... ~ -,-- -- C3 ;/jI~ tl P.L. 86-36 F EO 1. 4 . (c) R E Q (r u E N -------- ~- ,C Y / C3 \1 \ ~- ~ -~,r-· ~ 1111111111111111111111111111111I11111111111111111111111IIIllIIII TIME spreading code used by the' target radio is POLICY ON CONTROLLING RESEARCH known, substantially less power is needed to jam its signal. If the spreading code consists of a relatively short recursive sequence, recovery can be made by exhaustive hypothesis testing techniques. Research to develop exhaustive methods of recovering short spreading codes would be unlikely to uncover sensitive algorithms. Longer sequences, such as those above the R20 level, cannot be recovered quickly today by exhaustive testing. To succeed against them, algorithms that parallel those used in extremely sensitive cryptanalytic (D) There is no policy that requires the attacks would have to be developed, services or other government agencies to ~he services' requirements are genuine and coordinate with us before initiating spread critical to their mission. They do need a spectrum research. Our knowledge of some capability to intercept or to jam spread projects was acquired by chance. We have no spectrum signals in a tactical environment. way of gauging what portion of the total non­ There are some who question whether Agency spread spectrum research and predictive jammers or non-exhaustive spreading development of a cryptologic nature these code recovery systems are the best - or even projects represent. It would take a gigantic, viable - ways to provide these capabilities. The manpower-intensive effort to uncover and track services, however, assert that such equipments all such projects, and, in the current climate, it are vital to fulfilling their mission. And they would be awkward to do it. have the independence, the will, and the money (D) Fortunately, none of the research that has to pursue development. surfaced to date really qualifies as a "smoking gun." But as the number and sophistication of December 1986 * CRYPTOLOa * page 3 SEeRE~ PWT RELEASABLE TO EOPHRAETORS IIAP'WL6 VIA GOMHff' CHAUUELS 0r4'Pt P.·L. 8636 DOCID: 4033692 EO 1.4. (c) Direct sequence spread spectrum (U) Such a policy statement was drafted and :signals are those for which the carrier is presented to DoD. It was never adop~ed. The :modulated by a digital code sequence prevailing opinion is that our presentation to :whose bit rate is much higher than that of DoD was handled awkwardly. This failure to :the information signal. The application of • "grease the skids" reduced severely the chances :this spreading code spreads the signal across: of the policy being accepted. Some people, :a broad bandwidth. The intended receiver . however, believe that no matter how well it :of the signal knows the spreading code and had been presen.ted, prospects for adoption of :uses that knowledge to collapse the signal • the policy were slim. The military services are :back to its orginal form. To intercept or certain to view such a policy as an attempt to :jam the signal effectively, the spreading invade their domains, and they are zealous and :code must be recovered. The binary streams effective in protecting what they deem to be :used to spread the signal can be generated • their turf. :in a number of ways. The use of shift :registers is a common method of :generating these streams. Frequency hoppers, as the name :suggests, hop from frequency to frequency :within a prescribed set. Hopping rates vary . :from a few hops per minute to many :thousands per second. The hopper usually • :dwells on a frequency for a fixed time but :some hoppers with variable dwell times are . :being produced. A binary stream, generated: :by methods similar to those used for direct :sequence, is used to select the order of :frequency use. A specific hopper, for :example, might use a table of 256 (28) :frequencies. It would employ some device, :perhaps one or more shift registers, to :generate a binary stream. The stream :generated by this device would then be : broken into 8-bit segments and these :segments would be used as pointers into :the frequency table. A wide variety of :frequency hop radios is being produced, :mostly by companies in the U.S., Western : Europe, and Japan. such activities increase, so will the likelihood of serious compromise. December 1986 * CRYPTOLOG * page 4 / SECRI'3't' / r~Of I\Et~A:SA:BLE fO eO'HRAefORS P.L. 86-36 IIA~mLE VIA GOMH-IT GIIAP'IP'IELS OP'fL¥O 1. 4. (c) P.L. 86-36 DOCID: 4033692 EO 1.4. (c) SEeRE~ options. For example, pursuing Option 2 would not preclude some of the research from being done at NSA. If Option 3 were ch'osen, some of the research and development might be contracted by NSA to industry or the academic community. Option 1: Case-by-Case Problem Management (U) This is the option we have pursued so far. When incidents of outside research and development in this area are discovered, the particular circumstances of the case are evaluated and an appropriate course of action is selected. Advantages (D) So far, we have been able to resolve all the cases brought to our attention in a way that is reasonably satisfactory to all concerned.
Recommended publications
  • DESIGN-DRIVEN APPROACHES TOWARD MORE EXPRESSIVE STORYGAMES a Dissertation Submitted in Partial Satisfaction of the Requirements for the Degree Of
    UNIVERSITY OF CALIFORNIA SANTA CRUZ CHANGEFUL TALES: DESIGN-DRIVEN APPROACHES TOWARD MORE EXPRESSIVE STORYGAMES A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Aaron A. Reed June 2017 The Dissertation of Aaron A. Reed is approved: Noah Wardrip-Fruin, Chair Michael Mateas Michael Chemers Dean Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright c by Aaron A. Reed 2017 Table of Contents List of Figures viii List of Tables xii Abstract xiii Acknowledgments xv Introduction 1 1 Framework 15 1.1 Vocabulary . 15 1.1.1 Foundational terms . 15 1.1.2 Storygames . 18 1.1.2.1 Adventure as prototypical storygame . 19 1.1.2.2 What Isn't a Storygame? . 21 1.1.3 Expressive Input . 24 1.1.4 Why Fiction? . 27 1.2 A Framework for Storygame Discussion . 30 1.2.1 The Slipperiness of Genre . 30 1.2.2 Inputs, Events, and Actions . 31 1.2.3 Mechanics and Dynamics . 32 1.2.4 Operational Logics . 33 1.2.5 Narrative Mechanics . 34 1.2.6 Narrative Logics . 36 1.2.7 The Choice Graph: A Standard Narrative Logic . 38 2 The Adventure Game: An Existing Storygame Mode 44 2.1 Definition . 46 2.2 Eureka Stories . 56 2.3 The Adventure Triangle and its Flaws . 60 2.3.1 Instability . 65 iii 2.4 Blue Lacuna ................................. 66 2.5 Three Design Solutions . 69 2.5.1 The Witness ............................. 70 2.5.2 Firewatch ............................... 78 2.5.3 Her Story ............................... 86 2.6 A Technological Fix? .
    [Show full text]
  • Validez Científica Del Materialismo Histórico
    Validez científica del materialismo histórico Titulo Tovar Samanez , Carlos Miguel - Autor/a; Autor(es) Lima Lugar Universidad de Ciencias y Humanidades, Fondo Editorial Editorial/Editor 2021 Fecha Colección Materialismo histórico; Marxismo; Temas Libro Tipo de documento "http://biblioteca.clacso.org/Peru/idi-uch/20210719041551/Validez_cientifica_del_materialismo_historico_Tovar_CM_2021.pdf" URL Reconocimiento-No Comercial-Sin Derivadas CC BY-NC-ND Licencia http://creativecommons.org/licenses/by-nc-nd/2.0/deed.es Segui buscando en la Red de Bibliotecas Virtuales de CLACSO http://biblioteca.clacso.org Consejo Latinoamericano de Ciencias Sociales (CLACSO) Conselho Latino-americano de Ciências Sociais (CLACSO) Latin American Council of Social Sciences (CLACSO) www.clacso.org Carlos Tovar Samanez es filósofo, arquitecto, diseñador gráfico y caricaturista. Su tesis de maestría en filosofía, que publicamos aquí en forma de libro, obtuvo la calificación de excelente y la nota veinte en la Universidad Nacional Mayor de San Marcos, en 2019. Tiene amplia trayectoria en el diseño gráfico, campo en el que ha obtenido varios premios, y en la caricatura política, la misma que ejerce en el diario La República. Es autor de “Técnica del dibujo y de la caricatura”, publicado en 1989 y reeditado en 2015; “Habla el viejo, conversaciones con el fantasma de Carlos Marx”, publicado en 2002 y reeditado en 2012; “Manifiesto del siglo XXI” (2006), y “El socialismo en cuatro horas” (2014). Sus trabajos se orientan a la reivindicación del pensamiento de Marx, partiendo del cual ha llegado a la conclusión de que la jornada laboral de cuatro horas sería la solución a los más graves problemas que enfrenta el mundo, empezando por el desempleo, la pobreza, la desigualdad, las crisis financieras y, sobre todo, la esclavización de los seres humanos en jornadas de trabajo cada vez más extensas y agobiantes.
    [Show full text]
  • UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations
    UC Santa Cruz UC Santa Cruz Electronic Theses and Dissertations Title Changeful Tales: Design-Driven Approaches Toward More Expressive Storygames Permalink https://escholarship.org/uc/item/8838j82v Author Reed, Aaron Publication Date 2017 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA SANTA CRUZ CHANGEFUL TALES: DESIGN-DRIVEN APPROACHES TOWARD MORE EXPRESSIVE STORYGAMES A dissertation submitted in partial satisfaction of the requirements for the degree of DOCTOR OF PHILOSOPHY in COMPUTER SCIENCE by Aaron A. Reed June 2017 The Dissertation of Aaron A. Reed is approved: Noah Wardrip-Fruin, Chair Michael Mateas Michael Chemers Dean Tyrus Miller Vice Provost and Dean of Graduate Studies Copyright c by Aaron A. Reed 2017 Table of Contents List of Figures viii List of Tables xii Abstract xiii Acknowledgments xv Introduction 1 1 Framework 15 1.1 Vocabulary . 15 1.1.1 Foundational terms . 15 1.1.2 Storygames . 18 1.1.2.1 Adventure as prototypical storygame . 19 1.1.2.2 What Isn't a Storygame? . 21 1.1.3 Expressive Input . 24 1.1.4 Why Fiction? . 27 1.2 A Framework for Storygame Discussion . 30 1.2.1 The Slipperiness of Genre . 30 1.2.2 Inputs, Events, and Actions . 31 1.2.3 Mechanics and Dynamics . 32 1.2.4 Operational Logics . 33 1.2.5 Narrative Mechanics . 34 1.2.6 Narrative Logics . 36 1.2.7 The Choice Graph: A Standard Narrative Logic . 38 2 The Adventure Game: An Existing Storygame Mode 44 2.1 Definition . 46 2.2 Eureka Stories .
    [Show full text]
  • Implications of the Information Revolution for Soviet Society
    FINAL REPORT T O NATIONAL COUNCIL FOR SOVIET AND EAST EUROPEAN RESEARC H TITLE : IMPLICATIONS OF THE INFORMATIO N REVOLUTION FOR SOVIET SOCIETY : A PRELIMINARY INQUIR Y AUTHOR : Richard W . Judy and Virginia L . Clough CONTRACTOR : Hudson Institute, Inc . PRINCIPAL INVESTIGATOR : Hans Heymann, Jr . COUNCIL CONTRACT NUMBER : 801-0 5 DATE : May 198 9 The work leading to this report was supported by funds provided by the National Council for Soviet and East European Research . Th e analysis and interpretations contained in the report are those o f the author . IMPLICATIONS OF THE INFORMATION REVOLUTION FOR SOVIET SOCIETY : A PRELIMINARY INQUIRY by Richard W. Judy and Virginia L. Clough ' ExecutiveSummary : There will be a Soviet information revolution . The questions are what kind will i t be and what will be its implications for Soviet society. These are not easy questions. The nature and implications of the information revolution are still dimly perceived in our ow n society. It would be surprising indeed if we could see them with clarity in Soviet society . The Soviet Union, with its legacies of Russian history and Stalinism, is a society ver y different from our own. It is also a society in profound crisis, a crisis whose severity an d whose perception are both partly consequent to the information revolution . Who can doubt that the Gorbachev reformers are motivated in large part by thei r widespread perception that the USSR is losing the technological race? They know full wel l that one of their most spectacular and fateful losses is occurring in the development an d application of computer and telecommunications technologies whose relevance to militar y Richard W .
    [Show full text]
  • Soviet Computer Software and Applications in the 1980'S
    RESEARCH REPORT T O THE NATIONAL COUNCIL FOR SOVIET AND EAST EUROPEAN RESEARC H TITLE : SOVIET COMPUTER SOFTWAR E AND APPLICATIONS IN THE 1980 S AUTHOR : Richard W . Judy Robert W . Cloug h CONTRACTOR : Hudson Institute, Inc . PRINCIPAL INVESTIGATOR : Hans Heymann, Jr . COUNCIL CONTRACT NUMBER : 801-0 5 DATE : June 198 9 The work leading to this report was supported by funds provided b y the National Council for Soviet and East European Research . Th e A analysis and interpretations contained in the report are those o f the authors . NOTE This report is an incidental product of the Council - funded research contract identified on the face page . It is not the Final Report under that contract, whic h was distributed in May 1989 . 4 Soviet Computer Software an d Applications in the 1980s by Richard W. Judy an d Robert W. Clough HI-4090-P January 9, 198 9 Subsection of "The Implications of the Information Revolutio n for Soviet Society" This study was funded, in part, by the National Counci l For Soviet and East European Research Herman Kahn Center n P .O. Box 26919 n Indianapolis. IN 46226 ( Soviet Computer Software and Application s in the 1980s by Richard W. Judy and Robert W . Clough* Introduction and Summary 3 Soviet Software Developments in the 1980s 10 Key Elements of Soviet Software 1 0 Operating Systems 1 0 RIAD Operating Systems 1 1 SM Operating Systems 14 . Micro Operating Systems 1 6 Programming Languages 1 8 Application Programs 2 1 Data Base Management Systems (DBMS) for RIAD and S M Computers 2 1 Personal Computer Applications
    [Show full text]
  • December 1986
    SECRET GJUJUUUJGJUJl1 ~l5l.Bl!Jrn~u~ £il~l5Wl:B\!' U1CDWV ~llCDW~ll ~~ 00£3a!CDC3 ii WUJUi~l1UiWID DECEMBER 1986 86- 36 : : : : j ! Jf . : TECHNOLOGY SEEPAGE (U) . t-----........... ; ' . l WHO IS SHE? (U) .••.• !· .• ' •• 9 CRYSCOM (U) • • • • .•. •• •. " : .• • 9 QUOTE WITHOUT COM!-IENT (U) .. :;:;•. 10 ""'-_____:...,.; :1. ll THE LANGUAGE IDENTIFICATION PROBLEM (U) PRODUCT vs PROCESS (U) .•. .. I~ ii • 18 CHANGING JOBS (U) •••.•••• ----... --,. .u • 21 ODE TO THE CA INTERN PROGRAM (U). ____........ --.. ! I • 23 A COMPOSITE CONVERSATION (U). L...-___..;..;..._...J . 24 BOOK REVIEW (U) , . • Vera Filby. ; •. 26 CONFERENCE REPORT (U) .1 1. 29 LETTER (U) ..••. 31 OPPORTUNITY (U) • •. 32 BULLETIN BOARD (U) •• 33 CISI CONFERENCE (U) • L: ·'.! .· 33 THE STORY OF A PRIVATE GERMAN CIPHER (U). .,._! _____._i;.. 34 NSA-CROSTIC No. 63 PLUS (U) • • • . • .! I. 36 ! IAPdDLE VIA COMIPH El IAPUdELS ONLY CLASSIFIED BY P4SAICSSM 123 2 DECLASSlf=Y Or>~: Ori~inatin~ NOT RELEASABLE TO CONTRACTORS SECRET A~efley's DeterA'liAatieA ReE11:1iree DOCID: 4033692 Published by P1. Techniques and Standards VOL. XIII, No. 12. .. .. December 1986 JULIA CHILD, WHERE ARE YOU? (u) ..... P(JBLISHER _,_·.·.·········· -···· · · ' ······,···:·.·:·•·:·.·._I ______, What this agency needs is a Julia Child to 6 3 6 tJ~~ i j ~· · :: !3 ::- BOARD OF EDITORS •:~ ·~.:I demystify personal computers. ._1 , ''·.· ···, .. <Editor -. •...... : <. : I t963-1103) ~-() ii~aion _ ·•••, : ••:•• . • •.• • . • • - •• · ·· ··· ·· · ······· · · - · . Consider what she did for French haute cuisine: (963-5877) she brought it within the ken of any American who cprpputer S~tems . : . .>> (963- 1103) Cri/Pt anatysis , __:.., .. : . :: 963-5238! could read. Cryptollngtitstlcs >. 963-1596) Index ·, :\ . .<~ . :... .. 963-5292) How? Very simply, she wrote a step-by-step 1nformaiion"Sci~nce (963-1145) Information S~~uritY .
    [Show full text]