A STUDY OF TECHNICAL SERVEILLANCE COUNTERMEASURES REQUIREMENTS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP86B00269R000300090001-8
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
84
Document Creation Date: 
December 15, 2016
Document Release Date: 
July 31, 2003
Sequence Number: 
1
Case Number: 
Publication Date: 
January 1, 1959
Content Type: 
STUDY
File: 
AttachmentSize
PDF icon CIA-RDP86B00269R000300090001-8.pdf3.22 MB
Body: 
5311645- Approved For Release 200 . FAt-_k DP86B00269R000300090001-8 c7.81 " Approved For For Release 2004Z0.1730:iGlil-RDP86B00269R0003000900 n Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 A STUDY OF TECHNICAL SURVEILLANCE COUNTERMEASURES REQUIREMENTS January 1959 This material contains information affecting the national defense of the United States within the meaning of the espionage laws, Title 18, U.S. C., Secs. 793 and 794, the transmission or revelation of which in any manner to an unauthorized person is prohibited by law. COPY gLet.? flople$ Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET PREFACE Pursuant to the National Security Council Action #1774, approved by the President on 23 August 1957, The National Security Council Special Committee on Technical Surveillance Countermeasures was requested to intensify its efforts to develop a coordinated research program to insure development of practi- cable detection devices adequate to meet the growing threat of hostile technical devices. As a result of a unanimous decision on the part of represent- atives of the Army, The State Department, The National Security Agency (NSA), The Federal Bureau of Investigation (FBI), The Central Intelligence Agency (CIA), The Department of Defense, The Navy Department, The Marine Corps, and The Air Force, on 5 March 1958, the responsibility for conducting a preliminary study of the problem was vested in a single agency (CIA). On 11 June 1958 a contract was let by the CIA with to chairman a working group of consultants. The group, either as a result of their own knowledge or through contacts (governmental, industrial, etc.), were engaged to determine the extent, nature, and scope of the threat to the nation as a result of our present inadequacies in surveillance countermeasures equipment. SECRET 11 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET This study was initiated with the principal objectives of recognizing and recommending a research and development program aimed at providing practical and effective countermeasures where existing countermeasures equipment is inadequate. To accomplish this end, the following investigations were proposed by the study group: a. offensive devices and techniques known to have been use4 or presently being used by the opposition would be categorized, b. offensive devices and techniques used in our own interest in the past or at present would be categorized, c. offensive devices or techniques -which have not been used or pursued by the opposition or ourselves but which are scientifically realistic and, accordingly, represent a threat would be evaluated, d. the extent to which our knowledge or available counter- measures offset the threat of the opposit,ion would be determined. Although emphasis was to be primarily on devices and tech- niques associated with and countermeasures, due attention was to be given to other related security considerations such as landscapes, building structures, personnel, etc. Data in the report which follows was compiled over a period of approximately six months, and it represents the efforts of the group whose names and affiliations are set forth at the end of this preface. ii- SECRET Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Mill mit Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET At this time, they would like to express their sincere appreciation to the contributors from the many government, industrial, and educational operations who gave freely of their time and knowledge to make this study as complete and effective as you may be willing to concede as an interested and concerned reader. Date: January 1959 25X1 25X1 SECRET Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET ABSTRACT This study points out quite emphatically and appropriately that as individuals we talk too much and too often about classified subjects., particularly in improper places, and that we are care- less in our handling of classified documents and information in general. True security is acknowledged to be attainable only with complete isolation from people and information. Limited isolation, or none whatsoever, makes our position vulnerable in proportion to our laxity regarding good and tested security procedures, our personal. complacency and, to a lesser extent, our inadequacies in technical aids and supporting countermeasures equipment. Equipment presently available to a surveillance or counter- measures team, although it is already bulky, heavy, and inadequate, can only be expected to increase in bulk if unassisted technical protection is to be the immediate goal. This is particularly true unless first and primary attention is given to indoctrinating personnel in accepted security procedures, to selecting facilities with security in mind, and to limiting the storage of, the access- ibility to, and the transfer of information on a strict "need to know" basis. 71V SECRET Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP861300269R000300090001-8 SECRET If controls with "teeth" in them cannot be administered by responsible personnel, then the current threats due to inadequacies in technical aids probably cannot be significantly minimized in the foreseeable future. Technical aids should be looked upon as supporting and supplementary protection and not as a primary defense. With this approach to the philosophy of security, supporting countermeasures can be developed, hopefully with the weight and bulk specifications approaching the desires of security and sur- veillance teams. For the present, however, these features will have to be forfeited for protection against the' threat of our primary inadequacies. SECRET Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET SUMMARY OF PRINCIPAL CONCLUSIONS As it was pointed out in the Preface of this report, this study was initiated with the principal objectives of recognizing the need for and recommending a research and development program aimed at providing practical and effective counter- measures where existing countermeasures equipment is in- adequate. Due attention is given to the fact that certain physical and scientific situations may exist to restrict the effectiveness of specific positive surveillance techniques and that appropriate precautionary and preliminary security measures May be taken to reduce the magnitude of the threat. It may be rather generally stated that when a high degree of security or secrecy is associ- ated with a positive surveillance technique, the operational problems associated with it increase probably well out of pro- portion to the probability that the technique will be employed. Typical pf the problems that are encountered are those relating to the selection of appropriate sites for the installation. Specific instances of such installations will be discussed in detail in order to justify the low probability that has been placed on the develop- ment of countermeasures equipment to negate their effectiveness. The following summary of conclusions is accordingly presented. vi SECRET Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 Arl -01 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET An effective and coordinated development program should be initiated and carried forth, realizing that expenditures for the first few years, at least, will represent The program must be systematic, complete, and ILLEGIB an "all-out" effort intent on promptly, effectively, and practically providing the best answers to our shortcomings. The anticipated cost appears to be reasonable in view of the intelligence value and the protection that will be derived from it. It should simultan- eously be considered as beneficial to all interested parties and representativei of the total dollars being spent by all of the interested parties at the present time but in an uncoordinated fashion. Being fully aware of the improbability of providing 100% effective detection capability throughout the entire acoustical and electromagnetic spectrum for a reasonable length of time and in a finite period of time and that true security comes only with complete isolation, best effort and the necessary dollars should be directed: 1) to indoctrinate personnel so that they appreciate the seriousness of the problems associated with the need for good security, so that they are aware of the positive surveillance measures and the available countermeasures with their short- comings, so that they are aware of their personal responsibilities vii SECRET ?04 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 ILLEGIB Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET with regard to security and the penalties associated with neglect- ing to take adequate precautionary measures; 2) to establish adequate security controls to assist nd provide checks on personnel, and their activities; 3) to select controlled and secure areas with due concern for the problems that may be encountered both from a technical and a non-technical standpoint; 4) to permit technically qualified personnel to be hired and properly supported with an understanding administration as well as with adequate technical equipment and to be available to get the best out of the technical aids to be provided; 5) to provide, in lieu of or in addition to the "bag of tricks" presently being used, tools and equipments adequate to meet the threat of Soviet penetrations which may result from our overall security program. What then are the principal technical items that should re- ceive priority attention in a proposed development program? The following are arranged in their anticipated order of importance: viii Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 mod Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 SECRET 25X1 ILLEGIB It should not be implied that the recommendations, as pre- sented in this summary, cover all of the equipments which are appropriate to a complete countermeasures program. They are presented because they reflect the nature of our most significant shortcomings from an equipment standpoint. The report which follows hopefully substantiates these recommendations and places acquired facts, and conclusions drawn therefrom, in their proper perspective. ix SECRET Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 ILLEGIB 25X1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Next 1 Page(s) In Document Exempt Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 INTRODUCTION There are many ways in which a report or a program of this type may be approached. Alternate programs may yield adequate answers to the problems that exist. The approach adopted, how- ever, is designed with the intent of providing a thorough under- standing of all of the existing and potential countermeasures- The report is developed in three phases: ''A Pattern for Analysis", "Considerations of Positive Surveillance Measures and. Surveillance Countermeasures", and "A Proposed Development Program"_ Following the two initial phases to determine the adequacy of our countermeasure capabilities, detailed conclusions and recommenda- tions are presented pursuant to fulfilling the objectives of the study which were tabulated in the Preface. The last two sections of the text to follow may be read and comprehended without first reviewing or reading the first section, "Patterns for Analysis, "but it is believed that continuity and un.der-? _.. standing can best be acquired by appraising the scope of this study in the order in which it is presented. Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 ? ??sw rir ? ? ? *ow "raw% wAtit Approved For Release 2004/01/30 : CIA-RDP86B00269R000300090001-8 PATTERNS FOR ANALYSIS 1 1, 0 The Systems Concept The attempt herein is to provide a pattern of analysis by developing a systematic arrangement of the general concepts which will lead to an enlightened understanding of the problems involved. The systems concept is fundamental to the discussion. Although the material may be redundant in some aspects and superfluous to others, it is believed to be the necessary first step in establishing a system of agreed upon conventions which will allow generalized discussions in subsequent phases. 1. 1. 1 Systems and Society It is generally agreed that all technical or scientific activity may be assigned to any one or a combination of the three subjects denoted as: (1) energy, (2) materials, (3) information. Progress in technical activities has produced an involved pattern of organized systems of men, machines, and environment designed to handle and process energy, materials, and information. 2 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 int .o Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 These organized technical systems of energy, materials, and information operate within a framework of human values defined by ethical, moral, religious, and cultural considerations together with their legal and economic consequences. Modern civilized society results from the very complicated and dynamic array of forCes pro- duced when these technical systems are forced into the framework of human values. This dynamic array of forces is dislocated and brought to serious imbalance by the creation of new technological systems or through changes in the patterns of human values. There is probably no way to avoid completely this dislocation of forces and its resulting impact upon human values. The conflict between the Soviets and Soviet dominated countries and ourselves and our allies, between different economic and political systems, makes technological advance a necessity. This places a twin burden of responsibility upon the shoulders of engineers and scientists. They must creatively exploit their knowledge of energy, materials, and information to improve existing, and design new, organized systems of men, machines, and environ- ment while protecting and enhancing their human values. This brief introduction is an attempt to show that the general 3 ?0 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 problems associated with this study have basic interests in two fundamental areas: 1) technical systems 2) human values. While considerations of technical systems provide the central theme of the study, it is recognized that any system of human values always imposes design constraints upon the technical aspects of the problem. Hence, in the design of positive surveillance systems and particularly in our attempts to provide adequate countermeasures against Soviet measures, differences between our human values and those of the Soviets must be evaluated and realistically considered. 1. 1. 2 Surveillance Interests The surveillance interest in the systems concept is derived from both technical systems and the systems of human values which impose constraints upon the properties of the technical system. The technical entity being considered at any given moment may be a microphone installation; a telephone installation, or a wireless installation, to name only a few. Whatever examples are chosen, it is always true that they are a fragmentary part of some larger entity, or technical system. 4 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1. 1. 3 Basic, Functions Present in Systems While we recognize the existence of many systems of values, our concern, hereui is primarily with technological systems and their de.scription. A system in the sense which will bear significance in this study is defined as any complete instrumentality which performs a specified task. The degree of .complexity is not essential to the definition. Very simple systems, such as a contact microphone, an. amplifier, and a listener with headphones, or very complicated systems, such as miniature transmitters remotely actuated by a. listener at a receiving post using an actuating transmitter, selective receiver, and recording equipment, are both characterized by certain fundamental function.s. The existence of these interconnected functions distinguishes a system from a mere collection of devices and things. These functions are identified and defined in this paragraph. Technological systems handle or process energy, materials, or information, either singly or in all possible combinations. All systems possess a common series of necessary and intrinsic functions. There are six basic functions which may be identified as follows: (l) transfer functions (2) operational functions 5 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 conversion functions source functions 5; acceptor-- functions Interconnection functions. For ease of representation on paper, systems are conventionally represented. in block diagram form where each block represents a basic function of the system. Thus, the functions listed lead to the specification of the basic building blocks of all systems. These are defined and described in the few paragraphs that follow. Transfer Element A. transfer element represents the functional relationship between a single input quantity, X1 , at one point in space or time and a single output quantity, X2 , at a different point in space or time. The input is the independent variable and the ratio of output to input is defined as the transfer function Y12 . That is 12 X2 transfer function xi The transfer function defines the alteration of_ the input as it is trans- ferifed in space or time by the transfer medium denoted by (T). The input and output quantities must be of the same kind so that (Y12) is dimensionless. These transfer elements serve to transfer energy, 6 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 materials, or information from one point in space or time to , _ another point. Typical examples include transmission lines, con- veyor belts, and "memory" or storage elements in computers. x Figure (1.1) - The Transfer Element The symbols in the corner triangles of the block diagram shown may denote the following being transferred: information energy materials . (T) represents a transfer function relating the quantities X1 and X? Operational Element An operational element represents the functional relationship between. single or multiple input quantities, X1 X2 , X3 . . , and single or multiple output .quantities, Xa, Xh , Xc . . . The input quantities are the independent variables and the output: is a function of some combination of input quantities. That is 7 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Xa Xb fb (X1 X, X3 (X1 , X2 , X3 . Xna fm (Xi , X2 or if presented in block form xn xn) Figure (1.2) The Operational Element 8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Conversion Element .A conversion element represents the functional relationship between. an input in one energy or material category and an output in another energy or material category. There are four such functional relationships: (1) energy (form 1) converted to energy (form 2) (2) (3) material (form 1) converted to material (form 2) energy converted to material (4) material converted to energy. Because information is always carried by either energy or material, there are no converters of information. When such a condition apparently exists, it will always be the result of an energy or material conversion- Examples of conversion elements include Xz Figure (1. 3) - The Conversion Element Source Element This element denotes the source or point of origin of energy, material, or information in any system. 9 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 25X1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Acceptor Element This element is the recipient or acceptor, and occasionally the consumer, of information, energy, or material. Interconnecting Path Elements the block diagram of a system, referred to previously and discussed in more detail in the next section, direct, or primary, connections between the five basic building blocks are denoted by solid lines with arrows pointing in the direction of energy, material, or information flow. Indirect, or secondary, connections between the five basic building blocks are denoted by dotted lines with arrow heads showing the direction of flow. Several examples of simple systems are presented in the next section. Each system is described in terms of the functional elements defined in this section. These serve to illustrate the use of these functional elements and their composition into a system block diagram. Such block diagrams will be invaluable later when we approach specific surveillance systems and the countermeasures associated with them. 1. 1. 4 Functional Block Diagram Description of Systems The functional elements defined in section (1. 1. 3) can be used to describe any physical system of any degree of complexity 10 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 and to any degree of detail desired. This is illustrated for a few very simple systems in this section. One of the simplest of all systems consists of a source and receptor connected by a transfer element. This might represent a magnetic recording head, a magnetic tape, and a play-back head. The source, the recording head, deposits energy onto magnetic tape which, in turn, acts as the transfer element and ultimately the energy is removed from the tape at a different point in space and/or time by the pick-up head, This provides an adequate description of the transfer system. Figure (L4) w Source See the simple block diagram provided in Transfer Receptor Figure (1. 4) - Simplest System Block Diagram However, energy is required to drive the magnetic tape and acti- vate the heads, etc. and some kind of simple control, or information, system is required at the heads and tape to direct the recording and play-back sequences. Thus, a complete system description would 11 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 require a block diagram representation of energy and information functions. Because these .are secondary to the primary problem of recording energy, they are.connected into-the system by dotted lines, whereas the basic functions are interconnected by solid lines. When the system is re--drawn to include the secondary energy systems, but neglecting the control or information aspect, it appears as shown in Figure (1. 5). recording head energy source mechanical electric motor 1R playback head Figure (1. 5) - More detailed system block diagram A record player is another comparatively simple system, but one incorporating some slightly different system concepts. In its purest form, this is an information system. Information has been stored in the grooves of the record. Thus, the record is a transfer element because it transfers information from one point in time or 12 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 space to another. It is important to note that information is stored here in material form. It is a characteristic of all information systems that information has no independent existence; it is always present in conjunction with either energy or material. Thus, we very commonly speak of information as being carried by energy or material. While the record is a transfer element in the general sense of being a connection between the recording artist or speaker, being surveilled, and some listener, it serves as the information source in the very restricted system of the record player. The information on the record is extracted by placing it on a rotating, motor driven turntable in contact with a stylus. This converts the irregularities in the grooves into mechanical vibrations. This is converted to electrical energy by a crystal. After the multiplication of electrical energy through the operation element, or electronic amplifier, the information is converted into an acoustical form in the loudspeaker and this is transferred by the air to the listener. The system then appears as shown in Figure (1.6). Note that an electrical energy source has been added to supply the electronic amplifier with power. Also note that this system involves material, energy, and informa- tion. The three are nearly always present in every system that will concern us in this study. 13 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 informatio, source in material form (record) C energy converter (motor) mechanical rotation me chani c al. transducer (stylus) mechanical information receptor (ear-listener) electro- mechanical transducer (crystal) energy source (electrical) electrical. I electrical electronic amplifier electrical transfer in space (air) electrical. electro- acoustic transducer (loudspeaker) acoustical electrical Figure (1. 6) System Block Diagram of the Functions in a Record Player 14 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 rstA Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 The ordinary typewriter, which may be of considerable intelligence value, provides some excellent examples of the operational element in system block diagrams. A typewriter is a very complicated system and we will describe only a few of its essential features. The 44 keys on a standard keyboard, together with the space bar, back space, shift or cap keys, margin release, tab key, and line space lever are all information and energy inputs to the machine. The paper rolled on the platen is the receptor, while the typist is the source. A simple system description of a typewriter appears as shown in Figure (1. 7). The description in Figure (1. 7) omits many important details required in a complete description, however. There are many other sources of in- structions to operational elements together with the mechanical energy system required to operate the device. These illustrations have been chosen because of their commonplace character. Each, in its own right, possesses the properties of a small system. However, each can be, and generally is, a fragmentary part of some larger system. The point of the discussion in this section is simply that the same technique of description is used for all systems, without regard to system size, complexity, or desired detail of description. While it may seem that the case is overstated, the use of functional 15 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 C'-anges key s+ift mo-)tior to ey (c:ar t age shifts capa.i or 1 cpwe r case 4.4 key lpha 1711.1Trirs.'.'? r key- board bar backspace. 0 Get outpAt wher there is cap or lower as e Source of me chanical energy (spring print horizontal I energy Transfer in space & time (paper on the platen) C Converts I key motion to signal for control 7 linear hori . sigrial rotation r 0 1 output from a single input single space double space triple space siiace release signal only Converts horizontal to rotary motion I horizontal I motion zontal motion s Mechanical enerf(, (spring) 0 Get output there is 3 in gj.e input 0 Provides output with one input 0 Provides output with one input 1P"ig,u (1.7) - Partial System Description of a Typewriter 1.6 line space lever margin set .44 margin release Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 block diagrams is the first step toward a systematic under- standing of system operations and system designs such as we will be analyzing subsequently. 1. Z. 0 Information Systems From the very brief discussion in section (1. 1.4) it is clear that nearly any system, except a very rudimentary and primitive one, invariably involved energy, information, and materials, although only one of the three may be of primary con-- cern. This is particularly true of information systems because information has no independent existence. When information i.s transferred from one point to another in space, the transfer is most often. associated with electrical energy. On occasions, it may be transferred opticall-y, acousti- cally, materially, etc. Here we describe the fundamental concepts involved in the theory of information. The discussion commences with the definition of generalized in.formation systems, proceeds to an analysis of human information systems, and concludes with a description of machine systems. 1. 2. 1 Fundamentals of Information Systems This section is a comparatively detailed analysis of the 17 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 fundamental aspects associated with information systems. Art examination, of the subject matter associated with in- formation systems suggests that there are five "fundamental principles" which are distinct and identifiable. The study of information systems proceeds from five "levels" of principles as follows (see Figure 2. 1): (1) physical principles (2) circuit theory principles (3) modulation and coding principles (4) machine sub-system principles (5) system engineering principles. This makes the presentation of information systems multi-level, in. character as .shown in Figure (2.-2). New ideas and principles are introduced at all levels so that a presentation is not wholly sequential. Rather, the system has a core which is fed and drained by ancillary sub-systems. 1. 2. 2 Types of Information Systems In a very broad sense, there are only two fundamentally different types of information systems: (1) Information transfer, or communication systems, transfer information in space, or time, or both. Such 18 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 physical I machine sub- system modulation and coding system engineering circuit theory economic- rinci les queueing theory game theor decision theor . Figure (2. 1) MIN01=11=1MIMS information theor rtoise SYSTEMS ENGINEERING OPERATIONS ANALYSIS human values reliability information theory ELECTRONIC physiology SYSTEMS feedback theory MACHINE SUB-SYSTEMS 14 transmission theory 114 CODING MODULATION MACHINE LOGIC jigs circuit theory ELECTRONIC CIRCUITS feedback theory circuit theory ANC ELECTRONIC DEVICES PHYSICS CHEMISTRY feedback theory 411 Figure (2. 2) Information systems showing initial, dependence upon physical fundamentals followed by the introduction of engineering fundamentals at successive levels 19 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 systems are characterized by single or multiple in- formation channels which are independent of one another. (2) Information operation, or processing, systems perform operational functions upon information. Such systems are characterized by multiple information channel.s which are interdependent. All modern information systems, when considered in their entirety, usually involve both communication and processing. The communication system is concerned with the transfer of information in space or time. There are only two classes of such systems, and only two sub-types of each class, as follows: (1) Communication from man-to-man. (a) from one point in space to another (b) from one point in time to another (2) Communication from machine-to-machine (a) from one point in space to another (b) from one point in time to another Because information always exists in association with material or energy, it is a natural consequence of physical laws that information transfer from one point in space to another is always accompanied by a corresponding transfer in time. 20 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 INSINIMPROWSWIWINIPII Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Four other problem areas, apparently related to the fore- going, are often considered to be communication. These are identi- fied as communication from (1) man-to-machine in space or time (2) machine-to-man in space or time (3) one man-to-another man of different logic process (4) one machine-to-another machine of different logic process In these four cases, the basic logic processes must: be altered. Each is characteristically an operational or processing function, rather than communication or transfer. This is. one class of information. processing systems. in all information processing systems operations are per- formed upon information to (1) develop new information, or to (2) develop new interpretations of existing information. For exarnple, the numbers three and two represent information that can be communicated in space or time. Howev the operations required to express them in binary form or to get their sum, differ- ence, quotient, or product constitute various aspects of information proce s sing. To sum up, information processing systems are character-. ized by three different functions: 21 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 (1) mathematical operations (2) alterations in logic process (3) decision-making The purpose of these three operations is to produce new or addi- tional information or new interpretations of existing information. L 2. 3., Basic Properties of an Information System Figure (2. 3) is a schematic representation of the essential parts of an information system. The five basic parts are listed in the table that follows: Information' System Name General System Function 1 Information source Source element 2 Coder Operational element 3 Transmission or pro- Transfer or operational ceasing component element 4 Decoder Operational element 5 Information receiver Acceptor element It should also be understood that a conversion element is always associated with an information system because information has no existence independent of energy or material. 22 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Noise and Distortion S I I Information I I source I I I I I I I I i I superfluous I 1 I information I I I I 1 I red.undancv i I message ---- 0 Coder other coders Conventions Information receiver T ran smis sion or processing signal signal Area of previous agreement other decoders Conventions Figure (2. 3) Classical (slightly modified) symbolic model. of the essential ingredients of a one-way information system 23 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 When we consider information sources in detail, we find, in the limiting case, that there are only two fundamentally different types: (1) the brain of a man (2) changes in physical environment near some perceptor of information.' While we ordinarily take it for granted that certain types of informa- tion originate in the brain of man, the process by which this is accomplished is quite mysterious. The second class of information sources refers to information developed through instrumentation of physical processes. Some perceptor of environmental change (or information) such as a micro- phone, radio antenna, thermometer, etc. is placed in an environment to keep some one of its properties under surveillance. As in the case of information sources, we find that there are only two general classes of information receivers: (1) the brain of a man, or (2) a physical device which can respond to the information. The information generated by the source constitutes the message to be transmitted or processed. However, the message is seldom in a form suitable for direct transmission to the receiver 24 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 nor is it usually in a form that lends itself to processing. It is usuany necessary to code the message into a "signal" which has ? properties more suitable for transmission or processing. Coding is a general term used here to denote conversion of a message into a signal, or alteration of the form of the signal, according to some pre-determined plan. In ideal coding, the information contained in the message is preserved in the signal, only the form is altered. A consideration of this concept will be presented in more detail later. As an example of the?coding requirement, because direct telepathic communication between two brains is not reliably probable, the images in the brain of one man are not directly usable for trans- mission to the brain of another man. Instead, men commonly code their mental images into spoken words. The acoustical form of the sig al can. be transmitted through the air to the ear of the listener to be interpreted. Of course, the coded information, or signal, has no meaning to the receiver until, it is decoded according to some scheme pre- viously agreed upon by the source and receiver. The transmission and processing of information are always complicated by factors originating either within the system or from other factors external to it. For example, informational errors and ambiguities are introduced into the system through the presence of 25 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 noise and distortion. Similar difficulties are:caused by interference originating in the presence of similarly coded signals in the trans- mission system when it is used for more than one information channel. Redundancy is often used by the information source to promote better understanding of the message. In this process the same information is transmitted more than once with the same or different coding. at the receiver. Here again, this factor may be used in the counter- measures effort, hence "jamming" or "spoofing" the system. A system of accepted convention, although not a physical part of the system, is essential if the message is to be evaluated by the receiver. in other words, if the source speaks German and the re- ceiver understands only English, communication is not achieved. Some prior agreement must exist between the source and receiver. 26 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 25X1 mil Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1. 2. 4 Human Information Systems Human beings constitute the most highly developed and com- plicated information systems presently in existence. This section is included at this time, although at first it may seem to contain irrelevant subject matter. Many of the aspects present in a human system bear considerable direct significance in surveillance problems but, more appropriately than that, its description permits the intro- duction of concepts to be used with effectiveness in the principal areas of interest. Although many?of the processes involved in human informa- tion systems are matters of pure conjecture, every element involved in every information system may be illustrated through reference to some part of the human system. As a very elementary beginning, we will consider some of the very gross aspects involved in oral communication from man-to-man using the system model described in Figure (2. 3). A more sophisticated elaboration of certain human processes will be presented later, particularly with reference to closed loop systems. Through the various sensory organs of the body, ? vast quantities of data and abstract notions are continually being transmitted to the brain. By some process, either electrical or electrochemical, the information is stored in the memory banks of the brain. Parts of 27 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 this stored information, in random arrangements, constantly parade themselves before the conscious mind in a continuing jumble of assorted mental images. Under the power of directed thinking, a pattern of thoughts is established which penetrates and occasionally replaces the random jumble of images. This pattern of thoughts or images constitutes a message which represents some measurable amount of information. By a totally unknown process, this pattern of mental images is converted into word symbols according to conventions agreed upon with the second person in the conversation. This constitutes the first coding operation because the message, or abstract idea, has been converted into symbolic form different from the form of the original idea. This is illustrated in Figure (2. 4). The brain converts these word symbols into electrical nerve impulses, or signals, in a second codiag operation. This is an extremely complicated, multi-channel operational process. The nerve impulses, or signals, are transferred in space, and with some associated transfer in time, to the throat, facial, and abdominal muscles causing variations in the energy of the air blown across the vocal chords. This produces the acoustical signals of speech by a 28 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 ail 10 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 electro- mechanical acoustical trans- ducer vocal chords 0 Third coding Conversion to speech signals 1 Spatial transfer of nerv signals spatial transfer of acoustical signals in air single channel signal 1 t 0 Second coding Conversion to nerve signals tsignal 0 First coding Conversion to word symbols message Information source Idea in brain of man no. 2 Noise Distortion Interference vismorrOP. acoustico- electrical transducer -- ear V First decoding Conversion to nerve signals V V multi- channel signals redundancy and superfluous information System of agreed Conventions Spatial transfer of nerve signals to brain 0 Second decoding Conversion to word symbols signal 0 Third decoding Conversion to abstract idea me s sage Information receiver Brain of man no. 2 Figure (2. 4) Detailed Breakdown of a Human Communication System 29 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 third coding* process which is accompanied by energy conversions from electrical to acoustical form; speech is a coded form of the original message. These various processes are illustrated in Figure (2. 4). As shown in Flgure (2. 4), the speech sounds are transferred in space (and time) through the air to the ear of the second man. The vibrations of the ear mechanism produces electrical impulses in the first decoding process. This is a highly involved operational process. The input to the ear is a single channel of information which contains both frequency and amplitude information as a function of time. The output of the ear has a multiplicity of channels: each output channel appears to contain amplitude information only, over some restricted range of frequencies. This multi-channel collection of electrical nerve signals is transmitted through the auditory nervous system to the brain where it is interpreted, in the second decoding, as word symbols. If the words used by the first man are properly chosen in accordance with the agreed upon conventions, the word symbols evoke, with varying degrees of exactitude, mental images in the brain Although the term "coding" is used in this third case, it may be preferable to call it "modulation", wherein high speed variations of the air molecules are caused to vary in proportion to the speech signal. 30 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 of the second man corresponding to the images in the brain of the first man. This evocation of mental images constitutes the final decoding operation. The complete communication system is shown in very lied block diagram form in Figure (Z. 4). The information received by the second man is stored in the memory section of the brain-- stored in association with a qualitative scale of human values derived from his relation to his social and cultural. environment. The higher logic centers of brain, compare this new information with respect to the stored value evaluating the worth, relevancy, adequateness, and utility of the information. It is clear from this discussion that the block marked as the coder may involve several distinctly different coding operations. Thus, when we look at any system in detail, we find multiplicity of coding, decoding, and transmission. There are many other interesting aspects to this problem of communication from one man to another. Some of the more obvious factors are the following: (1) Communication may be complicated by imperfections in. the system of agreed conventions, differences in vocabulary or value system. 31 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 (2) Through poor word selection or superfluous expressions, the idea evoked in the brain of the second man may be quite different from the original thought. (3) Inaccuracies in message transmission may result from distortion produced by slurred speech or imperfect hearing. (4) The. presence of background noise or other conversations may inhibit the transfer of the message. A course presentation of the detail in Figure (2. 4) is shown in Figure (2. 5). The second type of information handling involves the processing function as its primary characteristic rather than communication as in the previous example. In this case, we take certain items of information and perform mathematical or decision making operations to produce new information, or new interpretations of old information. 1. 2. 5 Feedback in Human Information Systems In the preceding section, very elementary considerations of human information systems were used to underscore the importance of (1) coding and associated operational functions (2) energy conversions (3) information transfer processes and media. This importance is further emphasized in Figure (2. 6). This figure 32 Approved For Release 2004/01/30: CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Information source Brain of man 2 Iredundancy and auperfluous tinformation 0 Coder Converts idea in brain into speech Conventions Noise Distortion Interfe rence R Information receiver Brain of man 2 Transfer 0 Decoder Speech trans- mission through air Changes speech into abstract idea 110 low Areas of Prior Agreement Figure (2, 5) -4111.0. Conventions Coarse representation of a human communication system derived through simplification of the detailed description shown in Figure (2, 4). 33 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 e quili.b r iu.m signal. middle ear Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 transducer XYZ position to electricity temp. signal ;7117' transducer temperature to electricity 0 Coder Imenmalalw laranumpo inowimmo011r T Space Transfer 1?1111M1111011M1111011111011111101?111, 0 ?-enemorelow Coder Naurosilpo Space Transfer touch signal transducer nummilp skin touch to electricity Coder trimmelps Normodipm I 0 taste signal nose-tongi1re odor signal nose auditory signal ear 11. visual signal transducer taste to electricity transducer odor to electricity Coder Space Transfer wommoips. veumnipo kummellito transducer sound to electricity eye transducer light to electricity multi- channels prior experiences value scales T Space Transfer TI Space trans="--, fer olfactory nerves 0 Coder Space trans- fer auditory nerve s 0 ?&:=0,00 Coder Space trans- ... fer optic nerves NM/ to 0 Sensory Comparator Strength, time sense from signal identification center -4 signal from decision (logic) center To signal identification and logic centers of the brain Figure (2. 6) Information perception in the 34 human communication system Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 asi Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 R:hows th.e basic connection between the brain and all of the informa- tion perceptors available to the normal human. All of the seven sensory elements are composed. of an energy converter and a coder. Each is connected to the brain by the nervous system which serves to transfer the informationperceived. All of these signals enler the first principal element: of the brain, an element we will call the sensory comparator. Figure (2. 7) shows a very simplified system model of the brain, serving to illustrate the principal functions performed. The information perceptors deliver nerve signals concerning some physical situation to the sensory comparator, the first operational element of the brain. The sensory comparator has three functions: (1) it stores the perceived information temporarily in a short time memory bank, (2) it sends the information to the second identifying comparator, (3) it sentis instructions to the memory scanner to look through the main memory banks for similar information. The memory scanner examines the main memory banks for data previously stored concerning similar information, data relating to both value scales and actual situations. The output of the memory scanner is fed. to the higher order 35 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 isin al s C-0- T Information perception s ystem - shown in preceding figure 1 total sensory information in coded form new elements of experience sensed info ^ Sensory Comparator coded information of muscular action total sensed information t3ensed info values new elements o experience T 1 scan 0 I Identifying Comparator (sign.al identi- fication center) xtracted Main memor -lues bank eXtracted data Value scales i scan Main memory bank prior experience 0 Memory scanner scan erase St ored experience and. values 0 Higher logic centers decision-making or.: Short time extract memory scanning instructions decis- ion 0 toder for Muscular control signals signals for action Figure (2. 7) Closed loop, or feedback, characteristics of the human brain shown in highly simplified form. Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 16 iniimilmmtipmpompat Approved FOr Release 2004/01/30 : CIA-RDP86B00269R000300090001-8 center which, in turn, reacts back upon the scanner tending to direct its search of the memory banks in a controlled pattern rather than ln a random manner. The output of the memory scanner also goes to the identifying comparator. Here the information extracted from memory is compared against the new sense impression and identified, if possible. The new information, which is that part of the incoming information without a counterpart in that extracted from memory, is then delivered to the main memory bank for storage. In the meantime, the higher order logic centers have come to a decision based upon the memory scanning and the new elements of the situation, and have sent signals throughout the body directing various muscles to perform certain tasks. The same information is sent to the sensory comparator so that it will constantly compare the changes in the incoming information with the plans originated by the logic centers. There are many other related aspects, of course; this is a very crude picture. However, the principal point is clear: the system has a multi- plicity of closed loop signal paths. In short, it is a multi-loop feedback system. While, at this stage in our analysis, this has been established only in connection with human information systems, it is a fundaments property of all systems. Particularly will this be true of positive surveillance systems and their countermeasure systems. 37 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1. 2. 6 Feedback in Two-Way Information Systems Previously we discussed simple communication from one ma.n to another. This is a one-way, or unidirectional, information system. This type of system has been explored with greater success than the more complicated problems posed by two-way, or bi- directional, information systems. A schematic representation of a simplified bi-directional system is shown in Figure (2.8). This is the most common type of system. In the bi-directional system, there is an interchange of messages between two individuals. As a result it is possible to change the "conventions" during transmission. This two-way flow of informa- tion serves two purposes: (1) it acts to correct transmission errors and (2) to remove misunderstandings from the "conventions". From the very structure of the system, it is clear that this process has strong "feedback coupling" which affects all of its essential properties, rendering it quite different from the unidirectional system. The concept of counter-countermeasures probably falls most appropriately into this type of information system. Much more will be said about this subject later. 38 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 ?gr Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Information receiver man 2 rDecoder .M1m=mn?minumplio.. \ \ in space \ \ 'I'ransrnis sion T /i Conventions Coder Information source man 1 Noise Distortion Interference Information source man 2 Conventions 0 Coder Transmis sion in space' Decoder Figure (2.8) Intrinsic feedback in two-way communication 39 Information receive r man 1 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1. 2.7 Enter Electrical Machine Aids The human informaticn system is exceedingly complicated. The complexity is internal to the humans, arising in the many mysterious coding. logic, and memory functions. The information rec iirements of human society are beyond the capabilities of the humar. system. Inevitably machine aids are required to achieve mass communication, control of other machines, communication over large distances and long time intervals, for rapid calculations and under adverse and diverse conditions such as encountered in surveillance and its countermeasures. When machines are used for the purposes enumerated, they become sub-systems, or fragmentary parts of some larger system. Each sub-system possesses the five essential function elements as shown in Figure (2. 3)< Figures (2.9) and (2. 10) show several arrange- ments of sub-systems in a larger system. When a machine aid or sub-system is introduced into a larger system, it is very often electrical in character. Other types of sub- systems will be discussed specifically if they arise in the general surveillance discussions. There are several reasons for the import- ance of electrical sub systems: (1) compared to signals in other media, it is nearly always true that electrical signals have a higher degree of trans- 40 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Sub-System 1 Sub 1 Sub-System 2 straight tandem connection Sub-System 3 Sub-System / 2 \. Sub-System 3, Sub-System 4 parallel tandem connection Sub-System 5 Figure (2.9) System sub-division into separate sub-systems, each possessing the five essential elements shown in Figure (2.3). Sub-System man 1 Sub-System machine Sub-System 3 man 2 Figure (2.10) Machine aided human communication 41 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 portability in space. (2) electrical energy systems are more readily coupled to other media than are other energy systems (light and acoustical systems are possible exceptions). (3) electrical signals are more readily coded and modulated. (4) because of the comparative ease of coding, there are more coding possibilities available for practical use. Thus, except for very rudimentary systems, it is quite general practice to convert information into electrical signals to capitalize upon the desirable properties of electrical energy for the processing and transmission of information. 1. 2.8 Coding and Modulation Electronics and electronic circuits are important subjects precisely because they have the ability to perform operations, such as coding, which make machine aids possible and useful. This dis- cussion can be simplified through common agreement on the definitions of coding and modulation: (1) Coding -- the process of converting the form of information from one logic system or "language" into another. (2) Modulation -- the process whereby some property of a carrier wave of a higher frequency than any component in 42 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1.11111111P5P01111.011111111.111111! tri Ini Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 the information signal is varied in accordance with the time variation of the signal. Electrical signals may be modulated by either of one or two distinctly different processes: (1) carrier modulation -- a continuous process (2) pulse modulation ? a discontinuous process. In carrier modulation, some property of a high frequency wave is varied in accordance with the time variation of the modulating signal; the modulating signal is continuously operative upon the carrier. In pulse modulation, some property of a high frequency pulse train is varied in accordance with the time variation of the modulating sig- nals; the modulating signal. is operative only during discontinuous intervals. This implies the necessity for an additional coding step known as sampling. A carrier wave (see Figure (2. 11) represented by ic Ic sin ( wct 4?, ) has only two properties subject to variation by the modulating signal., the amplitude and angle. Therefore, two forms of carrier modulation can be identified as follows: (1) amplitude modulation -- the variation of the carrier wave amplitude (Ic) is made proportional to the time variation of the signal.. Herein the resulting signal contains "redun.dancy". The information can be transmitted as 43 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Io frequency = T fc L.Jc. 2?TT ----T :: period --------- Figure (2. 11) Essential elements of a carrier current 44 time Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 well by selecting part of the result which is then known as "single side--band modulation". (2) angle modulation -- the variation of the carrier angle is made proportional to the time variation of the modulating signal. At any instant of time, the angle of the carriers in dependent. upon the frequency. Thus we distinguish two types of angle modulation (1) phase modulation. -- the angle (4) ) is made to vary in direct correspondence with the time variation of the modulating signal.. (2) frequency modulation -- the frequency (fc ) of the carrier is made to vary in direct correspondence with the time variation of the modulating signal. The three types of carrier modulation are frequency, phase, and amplitude modulation or FM, PM, and AM. A high frequency pulse train is shown in Figure (2. 12). Such a wave train is described by the pulse frequency, position, width, and amplitude. Therefore, we recognize four pulse modulation possi- ___ (1) pulse amplitude modulation (2) pulse width modulation (3) pulse position modulation (4) pulse frequency modulation 45 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 PAM PWM PPM PFM Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 width -.p arnplitude .-. position period 1 Figure (2.12) 1 1 ?11.4 frequency Essential characteristics of a pulse train 46 liT Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 In each case, the particular property of the pulse train is made to vary in direct correspondence with the time variations of the modu- lating signal, in this class of modulation, the modulating signal is operative only during some specified period corresponding to the pulse duration. Hence, this is a discontinuous modulation process in contrast to the continuous characteristic of carrier modulation. This now gives us seven modulation possibilities to be con- cerned about, i.e. three types of carrier modulation and four types of pulse modulation. In many cases, depending upon the type of information system and transmission system, it is found that a single modulated signal does not make maximum use of the trans- mission channel capacity available: When this occurs, it is custom- ary to multiplex the signals. There are two distinct types of multi- plexing (1) frequency division multiplexing -- each signal is associated with a separate carrier frequency and all are transmitted. at the same time - multiplexing in frequency domain. (2) pulse time division multiplexing -- samples of each signal. are transmitted in time sequence at a high sampling frequency in the same frequency band. It is possible, obviou.sly, to use both frequency division and time 47 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 divi?,ion multiplexing in one channel, with Seven modulation possi- bilities thrown in for good measure. The problem does not end here. There are many applications where privacy con.sid.era,to s are important, or where special attention must be given to reduction of signal. deterioration by noise. When these conditions are present, the signals are coded before modulation and multiplexing. (1) continuous coding -- speech scramblers and similar techniques (?,) discontinuous coding -- pulse code modulation PCM for example, of the incoming signal has components up to a frequency (f0 ), it is first sampled at a rate greater than ( 2 fb ). This yields a lot of pulses continuously modulated in amplitude. The amplitudes of the pulses are quantized, and assigned to one of a finite set of such - levels. The quantized signal triggers a pulse generator - which generates a binary coded signal. The specific binary number generated depends upon where the sampled signal falls among the various quantized levels. Each of these processes is clearly coding, rather than modu- lation, because wholly new signal forms are generated; there is no process here wherein one property of a wave is varied analogously in 48 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 accordance with the time viariation of the signal. On thecontrary, the coded signal is an entirely new signal form. I. 2. 9 Machine Sub--Systems and Their Analysis To analyze a specific sub-system, one should. perform the following functions: (I) resolve the general equipment requirements into de- tailed specifications of equipment functions, (2) select the coding, modulation, and multiplexing arrange- ments to be used and specify their detailed technical properties, (3) select and define the transmission media and processes, (4) select and define the properties required. of information perceptors and receptors, (5) establish criteria for equipment reliability, (6) establish limits allowed for equipment error. These functions also require a knowledge of the principles derived from information theory, electronic component and circuit design. I. 2. 10 Electronics and Electronic Circuits From the tenor of previous sections, it is apparent that the word "electronics" has become virtually synonymous with "informa- tion systems". This is so because the machine aids to communication. 49 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 and processing are nearly always electronic in. character. In most cases., the requirements imposed by the modulation and coding processes are such that only electronic circuits possess the requisite properties. For the sake of the record, the essential topics in electronics an.d electronic circuits are summarized here. Electronic devices, as used here, include vacuum and gas tubes, varistors, thermistors, transistors, cryotrons, magnetic and dielectric amplifiers, etc. Such devices characteristically possess either one ox both of the following p roperties: (1) they are amplifiers or (2) they can be used as very high speed, synchronous, switches. An amplifier is a circuit whose output is an enlarged re- ,. production of the input, and the power developed in the output is drawn from a source other than the input. An analysis of electronic devices requires an analysis of these two properties from the two following aspects: (1) a study of .the physical devices which provide the two basic properties listed and (2) a study of the physical phenomena incorporated in these devices. This includes dynamics of charged particles, conduction in gas, solid state, atomic, and nuclear physics. When electronic devices are combined with other electrical 50 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 dal Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 elements in different circuit configurations, and operated as amplifiers or switches, the resulting electronic circuits are capa- ble of performing an incredible number of operations. Although the variety of such circuits is nearly endless, they fit into five basic categories, as follows: (1) amplifiers (2) oscillators (3) diode switching circuits (4) modulators (5) digital and logic circuits. These various categories of electronic circuits form the basic building of the machine aids to information processing. 1. 3. 0 Energy and Power Systems Although existing equipment systems use many, if not all, of the physically different energy forms, particular attention herein has been concentrated in electrical energy systems. This means that energy may originate in any form but we may assume in these pre- liminary discussions that it is converted into electrical energy for transmission and distribution. 1. 3. 1 Basic Properties of Power Systems The words "power systems" include all systems whose primary 51 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 functions involve the transfer of electrical energy in space or time. In fact, most technical systems, regardless of size or com- plexity, require an associated power system. At first thought an adequate description of a power system would seem to involve only a power source connected to a receptor through a transfer medium. However, when the problem is examined more carefully, the system description indicated in Figure (3. 1) resu7.ts. This shows that all power systems are composed of five major functional elements :- (1) energy reservoirs (2) energy converters (a) to co.nvert the form of the energy coming from the reservoir to electrical energy (b) to convert the electrical energy emerging from the transfer medium to the energy form desired. by the receptor. (3) energy transfer system to transfer energy in space or time (4) sources of environmental disturbances (5) an information, control, or protective system. The necessary inclusion of an associated information channel with every power system always produces a closed loop system. This closed loop characteristic results from an important 52 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 NW Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 sun 110.- System Environmental. Disturbances Reservoir Energy Converter control Transmission space - time 1-- 1 i signal I I I control, I 1 I g??????=111110. Energy Converter 'signal 'signal Information System Figure (3. 1) General power system 53 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 signal Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 property of power systems that is uniquely different from the basic characteristic of the general information system. The difference tisis In information systems the amount of information entering the transfer medium is controlled by the source; in the power system the amount of power entering the transfer Medium is controlled primarily by the receptor. Because the receptor controls the power flow from the source, the system is intrinsically closed loop in. character. 1. 3. ?, Energy Reservoirs - Primary and Secondary For all practical purposes, the sun may be considered as the primary reservoir of all energy available On the earth. Likewise, for general layman purposes, by a series of natural energy conversion processes, the energy from the sun has been altered and placed in secondary reservoirs of the following types:i (1)- fossil fuels, () nuclear fuels, (3) chemical reactions, (4) - wind and water power, and (5) lunar-ocean tides. Each of these stores energy in one form or another, either as: (1) light 54 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 1111111111111PWRIWIIIIIMINflf Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 (2) heat, (3) kinetic energy, (4) mechanical energy, and (5) electricity in a few rare cases. The inter-relationship between the various reservoirs are indicated by the schematic diagram in Figure (3.2). To provade a more complete and scientific approach to the energy problem, let us turn back to fundamentals and ask more specifically, "What are the sources of energy available in the uni- verse?" Without treading on controversial ground, we are safe to say that there are three natural sources of energy. These are con- tained (1) (2) in the nuclei of atoms, in the extra-nuclear structure of atoms and molecules, (3) in the incoherent motion of the molecules of matter in bulk. These three forms are known as nuclear energy, chemical energy and heat energy. In the case of both nuclear energy and chemi- cal energy, liberation is brought about when "fission" or "fusion" occurs, in each case with the evolution of more stable "substances". Although there are only three sources of energy in the uni- verse, we are accustomed in our scientific investigations to define the forms of energy in a manner more suitable for our current investigation. 55 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Primary Re se rvoir s Sun. Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 NaturalSecondary Energy Converters Reservoirs Available Organic growth and decomposition Origins of the earth Atmospheric weather phenomena Gravitational attraction Fossil light fuels heat Nuclear kinetic fuels energy Chemicals and chemical reactions mi411111i Wind, water Figure (3.2) Lunar ocean tjdes Energy reservoirs 56 electricity, heat mechanical heat, light mechanical Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/39 : CIA-RDP86600269R000300090001-8 First, we have nuclear energy, which can give rise to high speed particles and electromagnetic radiation of very short wave- length. Secondly, there is atomic energy, comprising the energy associated with the electronic structure of atoms and appearing in chemical reactions. This energy is only available in exchange pro- cesses. Arbitrarily, electromagnetic energy and the particles which may be emitted from the atoms and molecules are not included. Thirdly, there is microkinetic energy, comprising the energy associated with moving charged particles by virtue of their velocity and mass. We find this energy in particle accelerators, in x-ray tubes and in certain thermionic tubes. Nuclear and atomic energy are often converted into microkinetic energy in the form of fast moving electrons or positive ions. Fourthly, there is static electromagnetic energy by which we understand the energy associated with electrical circuits. This form comprises two sub-divisions: 1 2 (1) electrostatic represented by ? C V and 2 (2) magneto-static represented by ?1 L I2 2 where V = voltage, I 7: current, and C and L represent capacitative and inductive parameters. 57 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 Fifthly, there is radiant electromagnetic energy, which is associated with variable electric and magnetic fields in free space and comprise radio, infrared, visible, ultraviolet, and X and on waves. When such energy interacts with matter, we lose sight of the electric and magnetic fields and become conscious of the photon of energy ( h 17). Sixthly, there, is coherent molecular energy or elastic energy, associated with the elastic forces of matter in bulk. The source of this energy is chemical. Seventhly, there is non-coherent molecular energy, which is merely another name for heat energy associated with matter in bulk. Finally, there is the energy associated with microscopic mass by virtue of its speed or position. It is commonly referred to by the names kinetic and potential energy. Transducers are devices which change one of the forms of energy just mentioned to another. It is, therefore, possible to con- struct a chart (see Figure 3. 3) having the va..ious forms of energy at the heads of eight columns and the same forms of energy at the heads of eight rows, and every physical or chemical effect shown in an appropriate square in the chart. To take several simple examples, the Peltier effect transforms heat to electrical energy; a loudspeaker 58 Approved For Release 2004/01/30 : CIA-RDP86600269R000300090001-8 111- Apprgved Fc t Releate 20041101/30 :ICIA-ROP86130#269R040300046001-8 l II_ CONVERSION FROM TYPES OF ENERGY NUCLEAR ATOMIC ELASTIC HEAT STATIC ELECTRO? MAGNETIC RADIANT ELECTRO ? MAGNETIC MICROKINETIC MACROSCOPIC KINEnc NUCLEAR ..): ,r, 4. ???c,IA: e ,,,. .. :::: ?? t:d5t.. . 1,1,( , .:)..).0 .? ? . , ,. ?;,,,, , - ,\';'4z/P, '''e, ,,(, :?:.4.'w.: < '' %?./-:' CRYSTAL FORMATION ... ., .? ? x .;-? .:it x'::i:' ?,? N % xx.:,?.;.:r?s;k..? *,&....1 CRYSTAL FORMATION PIEZOELECTRICITY FERROELECTRICITY MAGNETOSTRICTION (LOUD ?SPEAKERS) MODIFICATIONS TO MOLECULAR STRUCTURE MODIFICATIONS TO CRYSTAL STRUCTURE GENERATIONS OF ELASTIC OSCILLATIONS STATIC ELECTRO? MAGNETIC RADIANT ELECTRO? MAGNETIC ,'; .:,.. I. ' ? . .cc. "k?',:i:kA:. .. ..?. ?....1&&a....2, .? A.? qt 4..* sz , 1?.? GAMMA RADIATION EXOTHERMIC REACTION (EXCESS) VOLTA EFFECT ATTENUATION AND SUPERSONIC HEATING . A.. :4.' , ?