PI-COMPUTER OPERATION, 67TH RECONNAISSANCE TECHNICAL SQUADRON
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78B05703A000300010020-0
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
6
Document Creation Date:
December 28, 2016
Document Release Date:
December 31, 2003
Sequence Number:
20
Case Number:
Publication Date:
May 19, 1970
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP78B05703A000300010020-0.pdf | 183.72 KB |
Body:
SECRET
Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0
NATIONAL PHOTOGRAPHIC INTERPRETATION CENTER
IEG/EGD/CNKB/36-70
19 May 1970
MEMORANDUM FOR: Executive Director, NPIC
THROUGH Chief, Imagery Exploitation Group, NPIC
Chief, Eastern Geographic Division, IEG/NPIC
Chief, China, North Korea Branch, EGD/IEG/NPIC
SUBJECT PI-Computer Operation, 67th Reconnaissance
Technical Squadron
25X1
1. During the recent trip to the Order of Battle Conferenc
e
had the opportunity to visa
e
U(th
Reconnaissance Technical Squadron and which he was 25X1
able to observe, first hand, their PI-computer operation.
2. The operation consisted of several PI and editor stations linked
into an IBM 360 computer. Each station consisted of one or more light
tables (both 940 MCE and 940 split-light tables) and a computer console.
The editor station consisted of several command computer consoles.
3. Probably the best way to explain the system is to follow a target
through the entire operation. After the PI identifies a particular target,
he types in a command into the console, whereupon a target presentation
flashes on the console's viewing screen. The presentation consists of a
history of the target, types of reports covering the target, and photo
coverage of the target. The PI then types his readout directly into the
console. The readout of the target, after command is given, is then flashed
onto the editor's command console where he validates the target and if
necessary makes editorial changes to the target. The editor then types in
a command and the target information is fed directly into the computer data
base for future exploitation. The entire operation, after the PI determines
the limitations of his target, takes just several minutes to complete.
4. The advantages are obvious; it eliminates considerable amount of
paperwork (Blip sheets, etc.), collateral support time, and. reduces PI time
in handling targets. In light of the upcoming system and its potential in
covering vast numbers of targets, a system like this could prove to be
extremely beneficial to the Center.
GROUP I
E xc d F- ......iic
4_9,.d--d decl...ilic c sloe
Declass Review by NGA
SECRET
Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0
SECRET
Approved For Release 2004/02/11 : CIA-RDP78B05703A000300010020-0
NATIONAL PHOTOGRAPHIC INTERPRETATION CENTER
IEG/EGD/CNKB/36-70
19 May 1970
SUBJECT: PI-Computer Operation, 67th Reconnaissance
Technical Squadron
Because of the 67th's invitation to NPIC to view their system and
in light of NPIC's current involvement in IIS, I would recommend that
the Center send two representatives to one with a strong 25X1
technical background in IIS, and a ful y1 qualified working level P1.
In this way a full assessment of the potential of the system can be
made from both a PI and a technical point of view. Remember, too,
this system is in full operation and most of the problems have been
eliminated. A list of people to contact at 67th is provided in the 25X1
recent trip report on the Order of Battle Conference.
De ie , Vortia Korea Section
China, North Korea Branch,EGD
IEG/NPIC
Distribution:
Orig - Addressee
1 - NPIC/IEG
1 - NPIC/IEG/EGD
1 - NPIC/IEG/EGD/CNKB
1 - NPIC/PSG
1 - NPIC/PSG/AID
GROUP I
8-1.d.d h.. or
dawn-di, and d