COMMUNITY ON-LINE INTELLIGENCE SYSTEM (COINS), IMPLEMENTATION PLAN

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80B01139A000100140007-1
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
41
Document Creation Date: 
December 20, 2016
Document Release Date: 
October 19, 2007
Sequence Number: 
7
Case Number: 
Publication Date: 
May 25, 1966
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP80B01139A000100140007-1.pdf2.18 MB
Body: 
Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 UNITED STATES INTELLIGENCE BOARD NSA review completed CONNITTEE ON DOCUMENTATION 25 May 1966 MEMORANDUM FOR: Chairman, Coittee on Documentation SUBJECT: Community On-Line INtelligence System (COINS), Implementation.:Plan 1. Transmitted herewith is the Implementation Plan for COINS. Drafts of this plan have been extensively reviewed by your Committee as well as by each of the participating Agencies. It is assumed that this plan will be approved since no objections were voiced during the review process and recommended changes have been incorporated in the final version. 2. Therefore, while awaiting final approval of this paper, the COINS Committee will continue the necessary detail planning actions in the following areas: (a) communication engineering specifications; (b) message format and exchange procedures; (c) file specifications and standards; (d) simulation and evaluation procedures. Additional reports will be submitted as planning is completed in each of these areas. This approach is being taken to insure meeting the implementation date of 1 December 1966. However, actual implementation steps such as file preparation, programming, procurement and installation of equipment must await final approval of this plan and will require a five to six month lead time. 3. Implementation of COINS I is not contingent upon the immediate or simultaneous participation of all Agencies. Therefore, the fact that at this time CIA has not selected its files nor defined its user language should not delay approval of this plan for immediate implementation. As soon as this information is provided it will be integrated into the overall. system. DIA review(s) completed. SECRET Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 K.J L/ %.A U. L " I. N TABLE OF COXNTS CHAPTER PARAGRAPH . I TOPIC PAGE ' GENERAL 1 Purpose 1 2 Authority and Direction 1 3 COINS C _.romittee 2 4 What is TIPS at NSA? 3 5 Concept 5 6 Ultimate Objectives 5 7 Approach 6 8 Security 7 9 Restrictions 7 10 Recommendations FILES 7 1 General 9 2 Files for COINS I 9 3 Categories of Files 10 4 Data Element Standardization 10 5 File Organization and Formatting 11'. 6 File Maintenance U 7 Problem of Duplicate Information in COINS INTERROGATION PROCEDURE 11 1 Objective 14 2 Response Time Required. 11E 3 Expected Volume 124 1. Interrogation Priorities . 14 5 Scope of Interrogations 16 6 Interrogation Strategy 17 7 Assumptions 17 8 Type of Interrogations 18 9 Specific (?canned") Interrogations 18 .10 Users Language COMMUNICATIONS 20 1 Commmanications Switch 23 2 Points of Agreement on Co]mnunlcation 23 a. Transmission Rate 23 b. Security 214. Co Standard. Comunications Code (ASCII) 24 do Length-of-Messages 24 as Message. Transmission 24 f. Time of Operations 24+ g. Error Detection and Correction (EDC) 24 i SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 CHAPTER `' PARAGRAPH V"O TABLE OF CONTENTS (Cont'd) TOPIC PA GE COMMUNICATIONS (Cont'd) h. Transmission of Files 24 is Communications & Cryptographic Equipment 25 Type-of-Subscribers 25 3 Messages 25 a. Type-of-Messages 25 b. Message Formats 26 Method of Operations for COINS I 26 IMPLEMUTATION SCHEDULE, COSTS AND RESPONSIBILITIES 1 Implementation 29 a. Target Date 29 b. Constraints 29 c. Costs 29 2 Responsibilities 29 as General 29 b. Communications and Cryptographic Equipment 31 C* Software 31 d. Computers 32 3 Responsibilities of COINS Committee 33 4 Evaluation 34 SECRET, Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 TABLE NO. I Interrogation Priority Conversion Table: STATE/DIA to NSA/NPIC 15 II Interrogation Priority Conversion Table: NSA/NPIC to DIA 15, III Advantages and Disadvantages of Different Interrogation Techniques 19 IV Estimate of Implementation Costs for COINS I APPENDICES 30 I COINS I II COINS II 35 37 III Displays of the Interrogation Cycle 39 iii SV CP TI~.~T" Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 REFERENCES 1. DC ID Communications telligence Regulation, Effective 29 December 1959 2. Staff for the Community Information Processing Study (SLIPS) Stage I Report I Volume I dated October 1963 NSA/C2 "NSA TIPS Reference Manual" dated May 1965 4. Letter from the White House, dated 15 June 1965, Memorandum for the President, Subject: "U.S. Intelligence Conmiunity Capabilities for the Handling of Intelligence Information" 5. Letter from the White House, dated 15 July 1965, Memorandum for the Director of?Central Intelligence, Subject: "U.S. Intelligence Community Capabilities for, the Handling of Intelligence Information USIB D-39 7/11 dated 24+ September 1965, Subject "U.S. Intelligence Community Capabilities for the Handling of Intelligence Information" USIB M-5 dated 7 October 1965, USIB Approval of CODIB Report Contained in Reference 6 8. DIA/IDHS FFS Retrieval and Output Techniques Volume I dated 15 October 1965 9. DIA/IDHS FSS Retrieval and Output Techniques, Volume II dated 15 October 1965 l0. "RYE.l+90 Ref r c " t 1.965, Published by NSA Office of Training 11. USIB D..39 7/13, dated 5 January 1966, Subject "C amnittee on Documentation Report of Task Team IV (Installations). 12. CODIB Task Team V - Biographies, Subject FINAL REPORT, dated 1 February 1966 13. JCS 222/935. Paper dated 14+ March 1966, subject: "Expansion of Washington Area High Speed Facsimile. System" 14. DIA Draft Working Paper on ISIC Query Language No date SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 I_J.U u `L' I. V IMPLEMENTATION PLAN FOR COINS I 1. PURPOSE The purpose of this paper is to provide the management of each of the participating Agencies with the detailed information necessary to make a judgement with respect to the implementation of COINS I. A detailed examination of this paper will indicate that the: (a) linking together of sel t d t ec e compu er systems is technically feasible by 1 December 1966, and Chiefs of the participating Agencies will constitute a commitment on the part of those Agencies to provide the resources necessary to implement COINS I by the aforementioned date subject to the constraints listed in Section V. para lb. 2. AUTHORITY AND DIRECTION This plan. was prepared in response to the White House Memorandum, dated 15 July 1965 (See Reference 5). Specifically, this letter directed that Recommendation No. 2 in Reference 4 be implemented. Following is extract of this recommendation: "Recommendation No. 2: That the Technical Information Processing System (TIPS) project, now underway within the National Security Agency, be expanded to include participation by other member, Agencies of the Intelligence Community in an experimental, operating system constituting a first step toward inter-agency (and inter-building) information handling. Since results should be sought from the experiment as promptly as feasible, the participation of other Agencies should be achieved by September of 1965; thecapability for extensive handling problem should be available 'in the community-wide system by the summer of 1966; and by the summer of 1967 if should be possible to exchange outputs from various mechanized sources in the fashion pioneered by the TIPS project. (Only through such experimental operational trials can the Intelligence Community come to grips with the wide variety of program problems involved, including those of security compartmentation, the encryption of communications between the computer/information base and the user locations, and SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 other blems.) In order to make suchtrial effective, it may be necessary to expand the scope of the information maintained in the TIPS system and, if so, this should be done with caution as to the total amount of material thus added. The intention should be to establish a system that will, in fact, be used by workers in at least a few Agencies as a better way to meet day-to-day tasks; however, the system should be regarded as experimental and there should be no attempt to insure that in its experimental form its operation can be economically justified." 3. COINS O NMITTlEE a. The Community On-Line INtelligence ystem (COINS). Committee was established in September 1965,7under the auspices of the-Committee on Documentation, United States Intelligence Board (COD1 ). The Committee was charged with the responsibility of developing the plan to implement Recommendation No. 2 .in Reference 4. The membership of this Committee is as follows: Chairman Secretary b. Acknowledgement Following by organization is a list of the many people to whom the members of the COINS Committee are indebted for considerable technical assistance and advice they have provided during the preparation of this paper. The members of the COINS Committee however.accept sole responsi- bility for the contents of this paper. SECRET Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 4. WHAT IS TIPS AT NSA? a. NSA management became increasingly aware of the mounting volumes of technical information (i.e., information with respect to SIGINT targets and resources) within the SIGINT Community as well as the inadequacies of existing methods for storage, correlation and retrieval of this information. In 1963, it was decided that there was an urgent, need for a radical approach in this area, taking maximum advantage of existing automatic. data processing technology. As a result, NSA has been engaged, for the past three years in planning, developing and implementing of the Technical Information Processing System (TIPS) in a concerted effort to improve the assembling.-processing and retrieving of formatted technical information. This project is being accomplished in three phases, namely, TIPS "PILOT", TIPS I and TIPS II. The first two phases are being accomplished in-house; the latter phase, however, is under study by various components of the NSA/R&D organizations with some contractual assistance. (1) TIPS "PILOT" - This is an experimental retrieval system now entering its final stages of. implementation using the available UNIVAC 490 remote access system (RYE). The existence and availability of the RYE system is one of the key contributing factors which has permitted the successful implementation of TIPS "PILOT". This system calls for the centralization of a selected set of thirteen formatted files, con- taining approximately 38 million characters which are representative of the types of files to be accomodated in future generations of TIPS. Information contained in these files is of interest only to members of the cryptologic community. The pilot system is designed to meet a limited number of operational requirements, and therefore it is available 24-hours per day, seven days aweek. The main objective is to enable NSA technicians to learn and gain operational experience in designing, developing, organizing, programming and utilizing an on-line near real time information retrieval system. Some of the more provocative questions which need to be answered are: Is such a system required and is it worth the cost? Will the NSA organizations u updated more. fre uent UNCODED detailed description of an can be made available by NSA to any authorized organization providing they have the proper security clearances (i.e., SECRET SI). (2) TIPS I (July 66 - Dec 67) (a) Plans and studies are now underway for the initial expansion and. refinement of TIPS "PILOT" to be known as TIPS I. It is evident that the existing RYE complex cannot handle the anticipated work load resulting from TIPS I. Therefore, implementation of TIPS I SFCRr,T Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 kJLJXLIiVL 1. will not begin until after the upgrading of the current RYE system has been conroleted, which is tentatively scheduled for the second quarter of F^.t67 (i.e., Oct - Nov 66). This interim' period will be used to accomplish the necessary detailed system planning for implementation of TIPS on the RYE system. it is estimated that the implementation of TIPS I will require approximately 150 man years of effort spread out over 12 - 18 months. (b) A generalized file maintenance program and a users language with a report format generator will be included in the system's software for TIPS I. Inclusion of this software will make the system more flexible and responsive to the constantly shifting information display requirements of the users. This action will reduce but not eliminate the need for open-shop programmers in TIPS I. (c) The following tentative estimates are provided for (1) Files currently contained in TIPS "PILOT" combined with those selected for TIPS I will contain approximately 160.- 200 million characters and be divided into roughly 60 - 70 different files. (2) There will be approximately 15,000 to 20,000 inputs per day with the majority of them occurring during the .,normal duty hours, Monday thru Friday. (a) The system will be designed to (a) provide an average response time of 15 minutes for short term interrogations and (b) handle all procedural requests within the system on a 24-hour turn around basis. () There may be approximately 150 - 175 remote stations involved, some of which may be located at the Service,Headquarters (i.e., AASA, AFSS and. NSG), as well as other Z.I. locations. Soave of these remote stations may be equipped with visual display devices. (3) TIPS ~T~TO (r - i A This is a third generation of TIPS and is currently under study by various components of the NSA R/D organizations with contractual assistance. The data base for this system will. contain approximately 500 million characters with required. response time of less than five minutes for short term inter- rogations.,- This system will require the development,of basically new approaches in file organization and search strategies coupled with technclogical advances in computer hardware. In addition, it is envisioned that major overseas sites will be capable of directly interrogating and receiving answers from the system independent of human intervention. b. The long range objectives of TIPS are to:. (1) Establish a complete. mechanized data base with respect to SIGINT targets and resources which is routinely updated in a tidy fashion and which provides NSA technicians and managers at all organi-_ zational levels with current and accurate information. SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 ~/ it t/- ~. iJ Z (2) Provi%,the basis for the eventual imp entation of the SIGINT Carmnand and Control Complex (SCCC) in FY70 - F771. The implementation of this concept is dependent upon the successful establishment and maintenance of the mechanized data base described above . The SCCC must have, in addition, two characteristics which TIPS will not provide. Using the TIPS data base, it must: (a) Automatically assess incoming information and alert the appropriate organization of an abnormal situation or, in routine situations, automatically make decisions leading to appropriate actions; (b) Provide answers to interrogations which indicate possible alternatives for action, and give them some weighting according to general criteria so that optimum actions are easy to select. 5. CONCEPT a. In accordance with the White House letters, subject "U.S. Intelligence Community Capability for the Handling of Intelligence Information" dated 15 June and 15 July respectively, a secure network of remote information re- trieval computer systems is being planned within the USIB Community, i.e., NSA, DIA, STATE and CIA (i.e., Information Processing Division of the Interpretation Center - EPIC) and the CIA Computer Center. The title being used for,this project is Community On-line INtelligence Crstem (COINS). b. Using COINS, each participating Agency will be able to remotely interrogate its own file(s) as well as selected files of the other partici- pating Agencies. This concept calls for each Agency to maintain its files in its own remote information retrieval computer system and for the computer system of each Agency to communicate with one another via secure data links. This approach eliminates the necessity for one Agency to serve as the central repository for the, entire Intelligence Community. Instead., each Agency will concentrate on establishing and maintaining those files for which it is responsible or best suited. c. This system is not designed to solve all of the inter-agency problems in the Intelligence Community with respect to information retrieval or infor- mation exchange. Specifically, COINS is aimed at formatted files, as opposed to scanning and. selecting desired portions of narrative text files. Formatted indices to narrative text files, biographic dossiers, finished intelligence files, micro-film or video-film images or documents may be retrieved through COINS. For example, if an interrogation of COINS reveals that the desired biographic dossier or peice of finished intelligence exists in the files of another Agency, the secure high speed facsimile system (network) planned for the Washington D. C. area could be utilized for the inter-agency transmission of the desired report or dossier. (See Reference 13). Although some files may contain narrative text the desired information will be extracted based on a formatted . or key field. 6. ULTIMATE OBJECTIVES a. Reduce the duplication of effort by eliminating the necessity for maintaining and supporting a multiplicity of EDP programs and formatted files of similar content by direct inter-agency computer communication. SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved I-or Kelease 2001/10/1y : (IA-KUF- ObO11:3 AUUU1UU14UUU/-1 ".LJ t.111.JJ J. b. Improve the com City's capability to exploit t1 ever-increasing volume of intelligence by improving timeliness in the processing, maintenance and, distribution of finished, semi-finished.,,and key intelligence information. c. Provide a high degree of flexibility in managing, selecting, collating and distributing intelligence information. d. Improve the opportunity for the effective utilization of finished, semi-finished, and key intelligence information by making it readily accessible to technicians at various consumer and intelligence producing Agencies in a useful -time frame. e. Establish a basis for designing and constructing a more sophisti- cated, dyndmic intelligence network in the future. f. Provide for more effective and efficient utilization of equipment, manpower and timeo g. Develop the security requirements and controls necessary for dynamic intelligence information exchange. 7. APPROACH This concept will be implemented in two phases, namely: a. COINS I (Dec 66 - Jun 67) (l.) In general, this plan calls for the use of existing computer systems or an upgraded version of existing systems at NSA, CIA, NPIC and DIA. The State Department will participate as a consumer in this phase by having a remote station tied into the DIA computer system. The primary objective of the pilot phase will be to gain some experience with respect to the technical problems associated with establishing, using and maintaining a secure network of remote access computer systems within the intelligence community. A parallel objective is to improve the,inter- change of information within the'Intelligence Community. (2) Although unsophisticated and. primarily designed. to determine feasibility, COINS I is an important and necessary first step toward the development of a larger and more complex community-wide system in the future. Implementation of COINS I is a challenge to the U.S. Intelligence Community for it will necessitate very close cooperation among all parti- cipating Agencies. If these Agencies cannot work together to implement a simple, straightforward system such'' as COINS I, then it certainly will not be possible to implement more sophisticated community-wide systems in the future. b. COINS II (n..68) Plans with respect to this phase will be influenced by each Agency's internal experience (a) in implementing COINS I, and (b) developing their own on-line analyst support systems. As a basic minimwn COINS? _will require a self-s. mkt access computer system SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Z Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 _ 0.G%AIIEIv at each Agen.ry l through a CIA installed and staffed cmmunic jQns sore and forwardinked switch. The network xil 'eve op common interrogation an c o tSe 8. SECURITY a. Prime Factor Security is a prime factor of consideration in establishing (1) Initially, in COINS I all computer complexes, remote stations and communications will be protected to TOP SECRET SI. This approach will avoid the multi-level classification problem. Any installation may operate a computer complex with multi-level classification or multi-level outstations providing such use has been approved in accordance with Reference 1. (2) However, COINS II must be capable of handling the multi-level classification problem. In this phase, a computer and its remote outstations will have to be located in a secure ar,a consistent with the highest classi- fication of information it is authorized. to receive from the system. b. Responsibilities in COINS I Each Agency is responsible for its own internal security. Specifically, it must insure that software and hardware built into its computer system afford the degree of security required. For example, each Agency is responsible for insuring that: (1) Files are not accessed by unauthorized external organizations, either for the purpose of interrogation or file maintenance. (2) Responses are delivered to the appropriate remote station consistent with security requirements. (3) The classification of all information introduced into the inter-Agency computer net is no higher than TOP SECRET SI. 9. RESTRICTION Participation in COINS I will be restricted to the Agencies indicated insure adherence to the implementation schedule. The participation of additional organizations during this period would only present more problems and. perhaps delay implementation. 1C. RECOMMENDATIONS a. A series of specialized working groups should be established under CODIB to develop data standards for the United States Intelligence Community. These works groups should cover such areas as (1) rsonalities - biographies (2order-of-battle (3) installations (4rgeographic, etc. Wherever possible the charters of existing CODIB Working Groups should be expanded to include this function.. (Reference Chapter III para 3 and Chapter V para 3). 7 QV CD i 'r Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 b. Immediate ste"PLf should be taken to officiallytify appropriate organizations (i.e., DOD, STATE, CIA, NSA, etc.) that CODIB will be the organization for: (1) Developing data standards for intelligence activities for Agencies which are members of USIB. (2) Coordinating data standardization efforts within the United States Intelligence Community with the Bureau of the Budget. c. Agencies participating in COINS I develop the specification for a common, computer independent users language for use throughout the Intelligence Community in COINS II for remote interrogation and file maintenance. These specifications to be based' on the operational experience gained in COINS I. SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 OJP-d A IXJP-4 %M%# II FILES 1. GENERAL According to Recommendation No. 2 of Reference 1+, initial efforts of the Intelliaence Co unity were to be directed towards the problem. Therefore. 7dicated in paragraph 2 e ow, a number of machinable, files have been included in COINS I. However, two impor an factors have limited this approach: a. As indicated in Reference 6, the majority of the biographic files are not in a machineable format. This fact is further substantiated in CODIB TASK TEAM V Final Report on Biographies. (See Reference 12). b. The kinds of files in any such system must be diversified since not all organizations are interested in the same kinds of information. .For example, the interest of State and NPIC differ widely. 2. FILES FOR COINS I The number and types of files to be included initially in COINS I is not particularly important, since the principal objective at the outset is to implement the system and. work out the technical problems. Once the system is in operation, the number and variety of files can be expected to increase rapidly. The files which each Agency has decided to make available to the Intelligence Community through COINS I are listed below. Detailed, descriptions of these files have not been included in order to hold down the classification level of this report. (1) NPIC - Target Brief File (This is a restricted sub-set of total file) (2) CIA Computer Center - Files to be nominated at a later date. 25X1 25X1 9 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 C T1 4-N T T r-. i Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Air Order-of-Battle Missile Order-of-Battle Radar Order-of-Battle Air Defense Order-of-Battle Military Personalities Viet Nam Activity File (Only the most recent 30 days) 3. CATEGORIES OF FILES a. There are two general categories of files which may be found in each Agency's system: (1) Those files which are available for use by other members of the Intelligence Community. (2) Those files which are not available for use by other members of the Intelligence Community. Each Agency is responsible for building the necessary safeguards into their own computer system to prevent unauthorized access to these files by other Agencies. For example, in TIPS at NSA there are a large number of files which are reserved only for internal use of the cryptologic community. These files will not be made available to COINS. b. DIA has indicated that all of the files in the ISIC/IBM 1410 on-line system will be available for interrogation by other COINS members. 4. DATA ELEMENT STANDARDIZATION a. As soon as this plan is approved appropriate steps will be taken by the Committee to establish standards for the files in COINS insofar as it is practicable. However, it must be recognized that it may not always be feasible to achieve ccmplete standardization for all data elements for all Agencies in the Intelligence Community. For example, an Agency may have already adopted certain standards for its internal operations and to alter them would require extensive changes in: (1) file.formats and contents, (2) computer programs, (3) input/output formats, (4) directives and procedures, and (5) training courses. b. The following rules have been established with respect to data element standardization in COINS. (1) Whenever standardization cannot be achieved, translation tables will be constructed to translate between standard and non-standard data .lements. In this event the rreequestin Agency is responsible for (a) translating outgoing data elements of interrogations into the terms of the receiving Agency and (b) for translating incoming data elements in the response into their terms. SECRET Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B0l 139A000100140007-1 (2) Standards adopted for the files it COINS will not be binding on the other machine files of each Agency which are not part of COINS. However, these data standards will be forwarded to CODIB for final coordination throughout the Intelligence Community. (3) Each Agency will be responsible for correcting and maintaining the information in their files in accordance with mutually agreed upon standards. (4) Standard data elements approved by USIB and adopted by the Intelligence Community will be used wherever such exists. (See Reference il). c. There is an urgent need for the standardization of data elements within the U. S. Intelligence Community and such standardization efforts should be accomplished. by a working group under USIB (or under CODIB) with representation from each member Agency. This working group in turn should be responsible for coordinating the Intelligence Community requirement with the Bureau of the Budget which is charged with developing these standards for the entire U. S. Government. d. Geographic information in some form or another appears to be a common thread running through all files. As a result, some geographic standards are also needed in the U. S. Intelligence Community, e. g., coordinate representation, urban area code, geographic sub-division, etc. 5. FILE ORGANIZATION AND FORMATTING Each Agency is responsible for: a. Organizing and formatting its own files. b. Keeping other Agencies informed of any significant changes in file format, accuracy or content. In this instance, content does not refer to all .routine file maintenance changes, but rather cats :ori s UNCODED c. Converting the data elements in its file to the accepted standards. 6. FILE MAINTENANCE The system will not permit an Agency to update the information in the files of another Agency (i.e., NSA cannot update or modify information contained in the DIA files, and vice versa) unless duly authorized on each file affected. 7. PROBLEM OF DUPLICATE INFORMATION IN COINS a. Goal One of the major goals of this system is to reduce the necessity ~-r11 -- .~V.CR 1i , 1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 !~1 T. !V T 7~ r-rti Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 of maintaining duple banks of information. It isoubtful that complete elimination of duplicate information banks can be achieved at this time. Duplication may be required for economic reasons.. The trade-off between maintenance of duplicate files and th v e ser icing of requests by the individual Agency against its copy of a file as opposed to the establishment of a single copy of a file and the servicing by one Agency of all requests against that file is not obvious at this time. The relative efficiency of centralization depends on the relationship between maintenance, input volumes, query rates and communication costs. These will vary from file to file, and a goal of the COINS I is to identify when and for which files duplication may be desirable. An additional complexity arises from the essentially unpredictable require- ments for query of files. It is possible that the servicing of one Agency's requests on another Agency's system may swamp that system. The integrated planning of systems which must meet requirements from all Agencies will require experience and greatly increased cooperation. b. Types .of Duplication (1) File - All or part of a file may be dul)licated_ _Fn-" Avory 'l- (c) In some instances a machine file of one Agency may con- tain records derived, from many different sources. For example, Agency A may enter order-of-battle information derived from the reports of Agency B. When Agency B interrogates Agency A's order-of-battle file, how does it know that information received is not that which it originated? There is a danger that Agency B may treat the answer derived, from Agency A's file as confirmation when, in reality, it is receiving its own information. On the other hand., an Agency's file may contain conclusions based on information which has been derived from sensitive compartmented activities not available to the analysts in another Agency, or from information not exploited by another Agency. However, if the file represents the Agency's finished intelligence there may be honest differences of opinion. A goal of COINS will be to identify those areas where division of respon- sibility in the-establishment and maintenance of files is practical and economical. (2) Elements of Information Within a File - Various elements of information within a record of a particular file may come from different sources. For instance, Agency A has a military personality file. Though the name and. location of a particular-individual carried in one of the records was derived by Agency A, his rank and organization were derived by Agency B. How does an analyst know which elements of the record were derived by Agency A and which were from Agency B? Again there `is a SECRET Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 danger that an analyst might consider the rank and. organization in Agency B's file as confirmation of the information in Agency A's file. It is therefore desirable that a file include the source (i.e., Agency or report title) date entered and validity of information contained in the file. 13 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 INTERROGATION PROCEDURE The principal objective of COINS is to improve the interchange of information between intelligence Agencies by permitting remote consoles in any participating Agency to interrogate the selected files of other Agencies via a secure computer-to-computer link. 2. RESPONSE TIME REQUIRED A design goal of COINS I is to provide a fifteen minute response to all interrogations. This system is not designed to provide users with either an instant response or with the capability to browse through a file on-line. A fifteen minute delay for answers to interrogations is a reasonable delay which is acceptable to all participating Agencies for COINS I. 3. EXPECTED VOLUMES It is impossible even to estimate the number of inter-agency interrogations per day that COINS I must accommodate. In fact, one of the early objectives of COINS I will be to dc;bermine the amount of inter- agency activity desired. It is safe to assume however, that the majority of interrogations will occur during the day shift of normal work days. As soon as COINS I 'becomes operational the volume of inter-agency interrogations can be expected to rise markedly as; (a) thenumber and variety of files are increased, (b) the number of remote consoles in each Agency are increased and (c) the users in each Agency become familiar with. the system particularly with its capabilities and limitations. 4. INTERROGATION PRIORITIES Each Agency has its own system of interrogation priorities and, as indicated. below, there is not always a one-for-one correspondence. a. Whenever DIA or State is interrogating an NSA or NPIC file they will use the common priority system employed by these Agencies. Table I illustrates the relative ranking of these two priority systems. b. Whenever users in NSA or NPIC are interrogating the files of DIA they will use their own interrogation priority system. The NSA RYE/TIPS or NPIC system will examine the priority applied by the NSA or NPIC user and automatically translate it to the appropriate DIA priority and insert the appropriate priority lock according to conversion Table II. x+14 . SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 TABLE I INTERROGATION PRIORITY CONVERSION TABLE STATEIDIA TO NSA/NPIC DIA NSA/NPIC PRIORITIES PRIORITIES R (ROUTINE) P (PRIORITY) U (URGENT) ------------------------------------------------------------------------ TABLE II INTERROGATION PRIORITY CONVERSION TABLE NPIC/NSA TO DIA NSA/NPIC DIA PRIORITIES PRIORITIES - PRIORITY LOCKS* BLANK, 0, 1, 2 R (ROUTINE) 7? 3-4 P (PRIORITY) ?? 5 U (URGENT) ?? *Fixed Priority locks will be determined upon approval of this plan. 15 y-' ,~-~ SF'l .P VT Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 P.. .& --A A-d 1 5. SCOPE OF INTERROGATIONS a. The most elementary information retrieval system conceived would permit remote consoles in one Agency to interrogate (or look up information) in another Agency's file. However, in such an elementary stage there may be no provision for melding together into a composite answer information obtained from several different files. Adoption of this simple approach negates, to a large extent, the need for standardization of data elements since the information is not to be merged for machine processing. (1) This approach simply automates the situation which exists today where each Agency periodically receives the reports published by other Agencies. Then analysts search through and cross-reference these reports manually in an effort to find the desired information. This is a laborious and time-consuming process. Generally, these reports go through a publication and distribution process and as a result the information contained in them is quite old. (2) Even so, there are some advantages to be gained in adopting this procedure, particularly in the early development stages of COINS when all organizations are learning. (a) Information obtained from interrogating files in such a system would be more current than that contained in a hard copy machine listing or report, since such reports have generally gone through a publication and distribution process. Such a system would not eliminate the need for publishing or distributing hard-copy reports immediately, but it should eventually reduce the number of copies desired.and perhaps the frequency-of publication. (b) Only the actual information specified in the interroga- tions would be received. (c) This approach eliminates the necessity of searching large, bulky, and out-of-date machine listings manually, though'the answers derived from interrogating several files independently would still have to be melded together manually in the same fashion as they are today. (d) This approach eliminates the necessity for standardizing data elements and items, a subject which is quite parochial in some Agencies. b. A more advanced information retrieval system, the goal for COINS II, would permit one Agency to interrogate all of the appropriate files in COINS with one interrogation. The individual answers received from such a multi- file interrogation would be melded together, processed and formatted before bei. printed out at the appropriate remote console. This approach has all of the advantages of the elementary system, but eliminates the need for manually cross-referencing the answers received from several unique interrogations. However, this approach necessitates: (1) Standardization of data elements (2) Adoption of acceptable 'translations tables when data elements cannot be standardized. 16 SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 -3.~u~li 1_,~ INTERROGATION STRATEGY I a. The method of processing incoming interrogations including the search method employed by each Agency may be different as it is dependent to a large extent on the configuration of hardware and software available at each Agency. b. There are basically two distinct types of interrogation strategies, file-oriented. interrogations and subject-oriented interrogations. Each appears to have its own set of advantages and disadvantages and both should eventually be provided for in COINS. (1) File-Oriented Interrogations This is the interrogation strategy that will be employed in COINS I. The user or analyst making the interrogation must have knowledge of the file or files being interrogated. This requires the exchange of much data between Agencies as well as-considerable study on the part of the users. The user must know the: (a) Name of the file(s) being interrogated (b) Name of the field.(s) in the file(s) being interrogated (c) Data elements (i.e., how the information is recorded) in the file being interrogated. (2) Subject-Oriented. Interrogations This type of interrogation is one of the goals for COINS II. In this situation the user does not have to know anything about the file(s) which must be interrogated.(or searched) to derive the desired answer. Simply stated, he merely indicates the subject on which information is desired and, leaves it up to the system to find the necessary information. It is fully recognized that the system itself must contain and respond to all the rules and. discipline of file orientation. When using this type interrogation, the user must provide as much amplifying information as possible with respect to the elements of search (i.e., data items) to narrow down the number of files to be searched. For example, if an analyst were to submit an interrogation for information on the "3rd Infantry Regiment", it would be necessary to specify the nationality. Otherwise, the'system would. search all files in the system having information on military organizations. 7. ASSUMPTIONS It is assumed that: a. Each member Agency will have detailed knowledge of the COINS files of the other Agencies, particularly with respect to file names, field names, content data elements, etc. 17 C~C'D 1P T Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 to i t r 3 Z b. Some stanrd.s will be established with repect to file names, field names and data elements. This is essential if information is to be extracted from the files of more thar_ one Agency and merged in subsequent processing. c. Each member Agency will keep other using Agencies informed of any significant changes in file format, content or accuracy. 8. TYPE OF INTERROGATION There are two distinct types of interrogations which must be accom- modated in the system, specific (canned) interrogations and interrogations making use of an inquiry language. Each type of interrogation has its own set of advantages and disadvantages (See Table III). 9. SPECIFIC (CANNED) INTERROGATIONS a. The named interrogation program contains and specifies the: (1) File(s) to be searched. (2) Field.(s) within these file(s) to be searched. (3) Processing (i.e., mergining or summarization)-to be performed on the desired records extracted and (1i) Output format. b. The answers (or results) to specific interrogations will be automatically forwarded to the computer system of the requesting Agency for: (1) Output through its own remote system (2) Input to another program for subsequent processing (i.e., merging with information received from another program, reformatting, etc.) c. Each Agency will make available to the community, information relative to its existing "specific (canned) interrogation programs" for those files which are to be included in COINS. If an existing specific interrogation program does not satisfy the needs of another. Agency, the following options will be made available to the requesting Agency: (1) Write a specific interrogation program for inclusion in the program library of the retrieval. system of the Agency having the desired file(s). The program must be written in accordance with the procedures and conventions established for that system. For example,, SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 TABLE III ADVANTAGES AND DISADVANTAGES OF DIFFERENT INTERROGATION TECHNIQUES INTERROGATION ADVANTAGES 1. Specific or "Canned" a. Users do not need to be trained Interrogation in the use of a retrieval language Programs for a complex input-interrogation format. b. The use of short interrogation statement reduces the number of: (1) Key strokes required by the users. (2) Error-likely situation that might occur when the users are required to type in a long, rigidly formatted interrogation statement. 2. Interrogation a. Permits a user to formulate & Language enter immediately interrogations which have not been pre-programmed. This is particularly useful if time is critical. b. Eliminates the necessity of writing a separate program each time a new combination of info is required by the users. 19 DISADVANTAGES a. Means a separate program must be written for each interrogation but the amount of original programming required will be re- duced through the use of common sub-routines. b. Restricts the users to a canned set of question & answers. Therefore, to obtain the desired. info the user may have to: (1) Ask more than one canned question (2) Write a new program. The writing of a new program will require time; how long will partly depend on how much prior coding from other interrogation sub-routines can be in- corporated in the new interrogation program. U) L developed which is common to all files in the system, and. all interrogation & file mainte- nance inputs. b. A compiler must be developed & written to translate each interrogation into a program. This requires a large number of systems pro- grammers who are not currently available. c. Users are required to be trained in the use of a retrieval language and a complex input-interrogation format. Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 `.'NSA might have to write a specific interrogation program for inclusion in the DIA/IBM 14.10 system, and conversely, DIA might-have to write a specific interrogation program for inclusions in NSA-TIPS. This means that DIA would require a limited number of RYE/TIPS programmers and NSA would require some IBM 1110 ISIC -proarammers. In October 1965, arrangements were made for to join the UNIVAC-11.90 (2) Write a specific program for their own system to merge and/or reformat the results (answers) received from other computer systems. When the desired results (answers) are not produced from the data as received from other computer systems, they might be obtained by reformat- ting the data or by combining all or parts of data from two or more specific interrogation programs. For example: (a) An analyst at DIA can enter a specific interrogation called "ABLE" from his remote console. (b) The. DIA computer will recognize that in order to answer this interrogation, it must in turn automatically initiate two specific interrogations available in the NSA computer called "BAKER" and "CHARLIE." (c) When the results of these two interrogations.are received, the DIA computer will merge and/or reformat the results and output them to the requesting remote console. When this technique is used, the DIA analyst does not have to know the names of the specific programs in the NSA system, but the DIA computer must have this informa- tion. (3) It should be noted that the DIA analyst could have requested the results of NSAts specific interrogation programs by merely inserting BAKER and CHARLIE. However, it would have required two separate inter- rogations and. the results would not have been combined. 30. USER'S LANGUAGE a. General (1) Currently the "users language" in each system is different, and., in each case, is dependent upon the sophistication of the software, as well as the size of the individual computer complex. (2) The long-range objective is to develop a computer-independent userts language for the Intelligence Community. The two languages used in COINS I will provide the experience necessary for establishing the specifications for this language. (3) Analysts using this language will be able to extract'the desired records from the appropriate file or files in the systems, of. other Agencies, after which these records can be either: SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 iWe aZk AX%1 ' ` Agency. (a) Forwarded in their complete form to the requesting (b) Summarized in some prescribed. fashion, in which case the summarized results will be forwarded to the requesting Agency. (1i) Upon receipt of these results (i.e., either the set of complete records or a summarized version), the computer of the requesting Agency can: (a) Transmit the-results to the appropriate remote station(s) in its complex. (b) Use the results as input to another program for further processing (e.g., merging with information received from the files in the systems of other Agencies, further summarization or formatting.) For the purpose of this paper only, two levels of sophistication have been identified within the users language, and each level is defined below: b. Levels of Sophistication (1) Level I - Users can specify the (a) file(s) to be searched (b) field(s) to be searched in the specified. files and (c) elements of information to be searched for in the fields specified. Entire records meeting this criteria will be extracted. from the file(s) indicated and forwarded to the requesting Agency for further processing (e.g., merging, sorting, summarizing and formatting). Selection of records is based.on ."IF, OR and AND" relationships. (2) Level II - Users can specify: (a) The file(s) to be searched by name. (b) The field(s) to be searched by name. (c) The elements of information to be searched for in the specified field.. In addition, the user can qualify his interrogation using the full range of Boolean expressions (e.g., and, or, if and only if). Further, the user can specify the processing to be performed on the extracted. record's (e.g.) merging, sorting, summarizing and formatting) before they are transmitted to the requesting Agency. c. COINS I Approach For the purpose of COINS I, only the specific (or canned) interrogation and Level I of the users language will be used. QV_rl? P74 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 d.0 COINS ii In this phase provisions will be made to add interrogation levels and a standard query exchange language. SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 -JJV uJl1Jll2j 1 V%O IV ti COMMUNICATIONS 1. COMMUNICATIONS SWITCH Implementation of COINS requires the establishment of a dedicated, secure communications network to permit direct, on-line, linkage of the various remote access computer systems and remote stations in the Intelligence Community. a. DIA will act as the communications switch in COINS I. (See net diagram in Appendix I). In addition, DIA has agreed to: (1) Procure and install the communications and crypto-equipment necessary to operate the communications switch. (2) Rent the data links required. for computer-to-computer communi- cations between: (a) DIA and NSA (b) DIA and NPIC and (c) DIA and CIA. Actually, DIA will pay for the communications lines up to the NSA, CIA and NPIC buildings. b. NSA/Tl will provide the communications engineering guidance and assistance to DIA for the communications switch in COINS I. c. CIA will be the communications store and forward switch in COINS II. (See net diagram in Appendix II). This phase will start in FY-68 with the installation and. checkout of time sharing equipment for both the communi- cations switch and a further update of the remote access computer system at CIA. The store and forward switch in addition to its normal communicative mission will be responsible for: (1) Secondary security checking. (2) Service and. equipment advisories and messa a on line and equipment status for all directly interfaced equipment (i.e., non-availability of service due to maintenance). (3) Provide message receiving and error checking and recovery software procedures. (4) System accounting and. message servicing as determined to be necessary for smooth and efficient operation of the system. (5) Limited. conversion routines that may be necessary to provide linkage of non-homogenious computer and. equipment. 2. POINTS OF AGREEMENT, COMMUNICATIONS a. Transmission Rate - Initially the transmission rate will be 2+00 bits per second BPS with a gradual increase to 9600 BPS in COINS II. However, it should be noted. that the HN9 is currently designed to handle a maximum of 4800 BPS and therefore a modification of the HN9 will be necessary to meet the 9600 BPS requirement. 23 SVC':R W"Ir Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80B01139A000100140007-1 Ii tid i b. Security (1) COINS I (a) All transmission will be protected to TOP SECRET SI. (b) All computer complexes including all remot t t i ons will be located in an area protected to TOP SECRET SI, e s (c) If any computer is to have multi-level fil pp es or remote stations specific a approval for such use will be obtained in accordance with DCID 613. (See Reference 1). (2) COINS II A multi-level all source communications and. terminal system will be developed for this phase. c. Standard Communications Code (ASCII) - The American Standard Code for Information Interchange (ASCII) will be used for transmitting data between the various remote access computer systems. d. Length-of-Message - Messages exchanged between computers will always be transmitted in blocks of 150 characters. A message to consist of the necessary contiguous multiple blocks. If a message is shorter than 150 characters or if the last block is less than 150 characters it will be padded out to 150 characters using a space (i.e., octal 0505 as the padding character. e. Message Transmission - Messages will be transmitted every 15 seconds until a receipt is received, from the receiving Agency's computer.or for a reasonable length of time. f. Time of Operation - The computers will be linked together and available for remote interrogation 24-hours per day, seven-days a week. Error Detection and Correction (1) The odd parity check-bit will be used in the ei ht le l ASCII g ve code and it should. provide sufficient error detection for the initial phase of COINS Th f EDC 1. ere ore, equipment will not be required initially for the data links, but may be procured at a later time if operating experience 7.T9'Y.r Y1t c (2) This is a problem which will be the subject of continuing discussions until it is resolved. For DIA to meet the implementation date of 1 December 1966, a decision in this area is required by 1 June 1966. h. Transmission of Files - Total files will not be transmitted between systems as this would defeat the purpose and objective of this effort. in the case of NSA, a maximum of 1024, 320-character records will be forwarded per single interrogation. Similar restrictions will probably be imposed by DIA and CIA. 24 SECRET Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RRDD.P80BB01139A000100140007-1 i. Communications and Cryptographic Equipment .s Each of the participating Agencies will be expected to pay for its own communication and crypto-equipment, including the necessary spares. NSA and NPIC will provide a communication line terminal (CLT) in their multiplexer to receive the DIA data link. J. Type of Subscribers - There will be two types of subscribers in COINS: (1) Users who do not have machine files or computer systems, but who require remote access to the information in COINS. This type of user only requires a remote station and merely interrogates and receives answers from the system. The National Indication Center (NIC) is an ex- cellent example of this type of user. The State Department link is an example of this type of operation in COINS I. For this type of subscriber, the communication switch will serve as the requesting computer. (2) Organizations who desire to enter the COINS network and have files in a computerized information retrieval system. 3. MESSAGES a. Type of Messages (1) Following are the types of messages that will be exchanged in COINS: (a) Requests (interrogation or query) (b) Receipts (c) Responses I Answers to interrogations including negative answers 2 Messages indicating the files are not available for interrogation or that a specific interrogation is not authorized. (d) Service Messages (2) Examples of various types of messages are contained in the four displays included in Appendix III: (a) STATE/DIA interrogation cycle of NSA files using: (1) Specific (or"canned") interrogations (Appendix ILIA) (2) Users Language - Level I (Appendix IIIB) (b) NPIC/NSA interrogation cycle of DIA files using: (1) Specific or. ("canned") interrogations (Appendix IIIC) (2) Users Language - Level I (Appendix IIID) 25 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 b. Message Formats ti (1) All messages exchanged in the system will be in a format acceptable to the computer system of the receiving Agency, As a result. the receiving Agency can treat incoming interrogation messages from another Agency's system in the same manner as if the interrogation had originated at one of its own remote stations. This means that the. originating Agency must either: (a) Require its users to submit interrogations in the exact format of the receiving Agency, thus eliminating the need for computer reformatting. (This is the approach being used. by DIA). (b) Write a computer program to translate and format the outgoing interrogation into a form acceptable to the receiving Agency. (This is the approach being used by NSA and. NPIC). (2) The four displays included in Appendix IIIA thru IIID depect at a glance the: (a) Sequential flow of messages between NSA and DIA (b) Format and content of these messages at each stage in the sequential flow (3) These displays are intended to provide sufficient details to permit managers in each Agency to: (a) Determine what computer programs must be written (b) Determine what internal operating procedures' must be (c) Estimate the cost in terms of dollars and man-months required to write the necessary computer programs. 4. METHOD OF OPERATIONS FOR COINS I a. Requests (or interrogations) which require information from files in another Agency's system will be transmitted to the appropriate Agency via secure data link. The computer of the requesting Agency will continue to transmit a request (interrogation) at 15 second intervals until a receipt number is received. for the request from the computer system of the other' Agency. Thp next request (interrogation) will not he transmitted until the receipt has been received by the requesting Agency for.the,preceding interrogation. This does not mean that thy.-receiving Agency does not queue this request after it has been receipted for. b. The computer system receiving the request will: (1) First, receipt for the request (2) Second, validate the request by determining that: (a) The specific or "canned" interrogation programs indicated SIR1 F,T Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 r.-' -.pL' ~~~ . are available and that the requesting organization is authorized to use the program(s). the system. (b) The file(s) to be searched are currently available in (c) Requesting organization is authorized to search the files specified. (3) Third, respond with service message as required (e.g., "Interrogation not properly formatted," etc.) (4+) Fourth, prepare and forward a proper response message to the requesting Agency's computer system containing: (a) the desired data or (h) an indication that no data is available, or (c) an indication that the re- q,Liestix4g!,AZeiry isn't aaithorled. to use either the specific program or search the file requested.. c. The computer system of the requesting Agency will be responsible (1) Handling its own bookkeeping. This includes such elements of information as: (a) The receipt or job number assigned to each request (interrogation) submitted from a remote station. '(b) The date and time request was submitted from the remote (c) The number of the remote station submitting the request or which is to receive the answer. (d) The name, organization and telephone number of individual submitting the interrogation. (2) Maintaining records with respect to requests, receipt and responses transmitted between the various computers. This will include such information as: (a) The receipt or job number assigned by the external Agency's computer. It will also relate this job number (receipt) to the job number (receipt) previously assigned to the request from the remote station. (b) The date and time messages (i.e., request, receipt and response) were transmitted to and.. received from the external computer. (3) Processing or manipulating the information received in response to an interrogation., This will involve such processing as: 27 SRCRR T Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 Approved For Release 2007/10/19: CIA-RDP80BO1139A000100140007-1 AJ L/ tJi