PI-COMPUTER OPERATION, 67TH RECONNAISSANCE TECHNICAL SQUADRON

Document Type: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP78B05703A000300010020-0
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
6
Document Creation Date: 
December 28, 2016
Document Release Date: 
December 31, 2003
Sequence Number: 
20
Case Number: 
Publication Date: 
May 19, 1970
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP78B05703A000300010020-0.pdf183.72 KB
Body: 
SECRET Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0 NATIONAL PHOTOGRAPHIC INTERPRETATION CENTER IEG/EGD/CNKB/36-70 19 May 1970 MEMORANDUM FOR: Executive Director, NPIC THROUGH Chief, Imagery Exploitation Group, NPIC Chief, Eastern Geographic Division, IEG/NPIC Chief, China, North Korea Branch, EGD/IEG/NPIC SUBJECT PI-Computer Operation, 67th Reconnaissance Technical Squadron 25X1 1. During the recent trip to the Order of Battle Conferenc e had the opportunity to visa e U(th Reconnaissance Technical Squadron and which he was 25X1 able to observe, first hand, their PI-computer operation. 2. The operation consisted of several PI and editor stations linked into an IBM 360 computer. Each station consisted of one or more light tables (both 940 MCE and 940 split-light tables) and a computer console. The editor station consisted of several command computer consoles. 3. Probably the best way to explain the system is to follow a target through the entire operation. After the PI identifies a particular target, he types in a command into the console, whereupon a target presentation flashes on the console's viewing screen. The presentation consists of a history of the target, types of reports covering the target, and photo coverage of the target. The PI then types his readout directly into the console. The readout of the target, after command is given, is then flashed onto the editor's command console where he validates the target and if necessary makes editorial changes to the target. The editor then types in a command and the target information is fed directly into the computer data base for future exploitation. The entire operation, after the PI determines the limitations of his target, takes just several minutes to complete. 4. The advantages are obvious; it eliminates considerable amount of paperwork (Blip sheets, etc.), collateral support time, and. reduces PI time in handling targets. In light of the upcoming system and its potential in covering vast numbers of targets, a system like this could prove to be extremely beneficial to the Center. GROUP I E xc d F- ......iic 4_9,.d--d decl...ilic c sloe Declass Review by NGA SECRET Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0 SECRET Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0 NATIONAL PHOTOGRAPHIC INTERPRETATION CENTER IEG/EGD/CNKB/36-70 19 May 1970 SUBJECT: PI-Computer Operation, 67th Reconnaissance Technical Squadron Because of the 67th's invitation to NPIC to view their system and in light of NPIC's current involvement in IIS, I would recommend that the Center send two representatives to one with a strong 25X1 technical background in IIS, and a ful y1 qualified working level P1. In this way a full assessment of the potential of the system can be made from both a PI and a technical point of view. Remember, too, this system is in full operation and most of the problems have been eliminated. A list of people to contact at 67th is provided in the 25X1 recent trip report on the Order of Battle Conference. De ie , Vortia Korea Section China, North Korea Branch,EGD IEG/NPIC Distribution: Orig - Addressee 1 - NPIC/IEG 1 - NPIC/IEG/EGD 1 - NPIC/IEG/EGD/CNKB 1 - NPIC/PSG 1 - NPIC/PSG/AID GROUP I 8-1.d.d h.. or dawn-di, and d