SAFE BRIEFING FOR(Sanitized) ASSISTANT SECRETARY OF DEFENSE FOR INTELLIGENCE, DOD
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP79-00498A000400050049-9
Release Decision:
RIPPUB
Original Classification:
K
Document Page Count:
39
Document Creation Date:
December 15, 2016
Document Release Date:
September 16, 2002
Sequence Number:
49
Case Number:
Publication Date:
August 18, 1975
Content Type:
MFR
File:
Attachment | Size |
---|---|
CIA-RDP79-00498A000400050049-9.pdf | 1.73 MB |
Body:
Approved For Release 2002/1 -00498A000400050049-9
Lire
10 AIU615
ECT: SAFE Briefing for :'r. Albert Hall,
'assistant Secretary of Defense for Intellig nCe, DOD
ATINTL
~TI NTL
1. On 13 August the undersigned was asked by John
Slack (OX 5-7072, Grey 2289), OASD (Intel), whether a
SAFE briefing could be arranged for Dr. Hall, ASO (Intel).
He said that Dr. Hall had attended an IRAC meeting on
11 august and had his interest in SAFE stimulated by a-a
DC 7s comments on SAFE. =.e added that Dr. Hall is very
interested in any modernization techniques which would
assist the analysts in their work and was also interested
in the relationship between SAFE and existing systems, such
as COINS.
2. 1 explained to ;1r. Slack that SAFE was in its
early stages and we would not he able to talk about any
technical system concepts or designs. our major effort
was in the analysis of the analysts working environment and
the detailing of requirements that should be satisfied by
the SAFE system. We had recently formed a SAFE Project
Office that would eventually translate the requirements into
a system specification and design. I also mentioned that
we had an interim SAFE system which was being used as a
test-bed for trying out some of the ideas for using a coraf.
pater to facilitate the analysts work. I told Mr. Slack
that we probably could put togst1n ar a briefing for Dr. Hall
which would describe the SAFE requirerints in some detail
followed by a description of the SAE Project Office and
the approach we plan to use to bring the SAFE' systeTi into
the world. :r r. Slack said this sounded great, and asked if
we would include some description of what is being done on
the Interim SAFE system and how it has L n' roved the analysts
capabilities.
After coordination with the Acting D/CP.S, 14r.
Iand the SAFE PD, I called *".r. Slack and
suggested a one hour briefing at a time convenient to
Dr Hall between 8 and 12 S epte ..bier. He later confirmed
this for 9 eptea')er, 0930-1030 hours in Dr. HHall's office,
3E-282, the Pentagon. We agreed that about 45 minutes
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
would b t1evotad to the briefing and 15 minutes for dis-
cussion. The majority of the 45 minutes would he on the
AVI requirements and Interim System with about 10 mintttes
devoted to the implementation approach. a told -r,-r. Slack
that the briefing would probably be given by
and they would probably be acco-mpanied-Uy-77-7.
Azenbe: :3 and Zr. fFitzwater. Eke said "fine" and added
that Dr. Hall prefers not I -o gave a large entourage for
such briefings. I told hii-it we would confirm our attend--o a
STATINTL
STATINTL
STAT
STAT
i epu .y Director of Joint computer -Support
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
i RANSMITTAL SLIP
DATE
TO:
ROOM NO. I
-,:I 1j.26
BUILDING
gv-4r
-
REMARKS:
FROM:
ROOM NO.
BUI DING
EXTENSION
FORM RFEB M NO 24I REPLACES FORM 3e~8
WHICH MAY BE USED.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050
25X1A
Project SAFE
Feasibility of an Agency-wide Information System
to Support the Analysts File Environment
Confidential
October 1974
N2 71
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
NATIONAL SECURITY INFORMATION
Unauthorized Disclosure Subject to Criminal Sanctions
25X1A
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9 ''j C; t=i4
25X1A
MEMORANDUM FOR THE RECORD
SUBJECT Facility Proposed for Project SAFE
REFERENCE: Memo dtd 16 October 74 to DDA from D/OJCS
Same Subj
1. A ost estimate to support project SAFE is included in
Paragraph-C' The estimate is based on the data presented in the
referenced memo and based on the following assumptions:
a. Central utility systems required in support
of OJCS proposed expansion will be available.
Specifically, a new 2500 kW automatic start
generator will be procured and installed, and
the Carrier Dunham/Bush chillers will be repiped
to a parallel configuration.
b. The installation will be located on the
first floor of the South end of the Headquarters
Building. The first floor slab to slab height
will allow adequate raised floor clearance, and
the central utility systems are located in the
South end of the building.
c. There will be no unique security requirements.
Costs include the provision of a special purpose
vault similar to the ORACLE installation.
d. There is no reason to believe that the proposed
configuration will exceed the load capacity of the
floor. However, a structure analysis cannot be made
until an equipment layout is provided.
e. There will be no emanation problems, i.e., a
screen room will not be required.
f. The provision of standard environmental
requirements for this type computer center is
included in the cost. There is no provision for
uniquely tight tolerances for the control of
humidity, dust or temperatures.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
STAT Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Next 3 Page(s) In Document Exempt
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved for Release 2002/11/04: CIA-RDP79-00498A000400050049-9
OJCS 1363-74
i',U ORANDUM FOR: Director of Central Reference Service
SUBJECT Comments on Draft SAFE Report
1. General. The SAFE report provides an excellent
historical base and a good picture of the kind of system
which can and should be developed for the analyst. From
our vantage point, the following are important elements of
the planned development effort described in the report:
a. The system should be designed as an integrated
system, and the development of each sub-system should be well
coordinated to fit with the others. A single coordinating
group would serve this purpose.
b. The SAFE terminal should be specially selected
to meet the SAFE requirements, and this implies that the
terminal may be different from the OJCS standard remote
terminal.
c. The use of distributed processors for terminal
support will reduce the cost and improve the usefulness of
the system.
d. The development of a SAFE system should be
done in phases with provision to accommodate user feed-back.
Our major Concerns about the report are in a few technical
areas and with the means for achieving your goals. The spe-
cific comments below are separated into those which you may
want to consider before. publication and those which should be
the subject of further discussion near the beginning of the
next phase of SAFE.
2. Comments relevant to the drafting of the report:
1.. The issue` of sec ri should. be treated in
the report. We note that it was emphasize'd in the vendor
Departs. Protecting this vast amount of information from
both deliberate penetration and unintentional disclosure,
and maintaining the "need-to-kno:,-" principle, may require a
significant effort.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
b. The report should clearly identify the critical
technical elements of the proposed system, particularly those
where some risk is involved. Specifically, the report should
caution the reader about the crucial issue of the high-speed
search of large volumes of textual information. An additional
feasibility and design study must be undertaken to find an
.propriate searching technique and understand its response
characteristics. We believe it is quite possible that such
a study would conclude that response time requirements would
have to be relaxed, and this might threaten the viability of
the whole project.
c. We believe the report should state clearly
the best estimates on the'size of the system. Each of the
five contractors had different impressions of the size of
the problem, as did the OJCS members of the team. Clearly,
the major driving forces in choosing a configuration are
the number of the various types of records, the amount of
expected activity from all of the terminals, and the maximum:
acceptable access times.
d. The report emphasizes the need for system
reliability and mentions the need for processor redundancy.
Of equal or greater importance is the need for the file back-
up, considering the large volume of data which would be
vulnerable to both hardware and software failures. The
report should mention this. The greatest vulnerability in
tee entire system is likely to be the file indexes, which, if
lost or subtly modified by malfunctioning software, could
result in long periods of file unavailability during repro-
cessing and restructuring. A scheme will have to be devised
to maintain the huge backups without draining the resources
of the system.,
e. We believe the report should state that the
SAFE system should be integrated into the Agency's data pro-
ceessing environment as much as possible. For example, the
terminal sub-system should be able to access current OJCS
,ervi.ces, such as GIM and CP/CMS. Many SAFE users will also
be users of OJCS services such as APL, SCRIPT, GIM and others,
and should not be required to have two terminals in order to
access all of these systems.
f. Because of our Agency-wide responsibilities in
ADP and because of the size of the investment, OJCS repre-
sentation in the next phase of SAFE should be more significant
t'iin the draft report suggests. Specifically, it is suggested
that the statement on OJCS participation in the section on
he Development Plan }e modified to add "one OJCS analyst
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
responsible for hardww;are:~ configuration and operating syste-m
sof tware. " If you agree with this addition, you may wish to
reduce the number of CRS people on system configuration
an -is from two to one.
g. Given our experience (and yours) on equipment
acquisition and installation, the proposed ecu::ipment instal-
lation schedule is ambitious. if maintaining such a schedule
is vital, you should include and underline a statement that
extraordinary procedures and priorities are justified and
will be needed to achieve your goals.
h. A minor point: the report should not presume
that the AMPEX Terrabit memory is the most appropriate mass
storage system for the application. it will be available,
but other devices exist which might be better for archiving
and other purposes (such as the Precision Instruments UNICOL'T).
3. Points for future discussion:
a. The report says that SAFE is only viable if
the entire task is implemented ("all or nothing"--page 8).
While the design of the system should certainly be broad
enough to accommodate all of the S aFE concepts (and more) ,
we believe that each specific sub-system should be evaluated
on its individual merits. Many of the services proposed
here are valuable; however, unless a cost-benefits analysis
is performed on each separate service, it is unclear which
services gill be worth the cost of implementation. Further,
some of the requirements might well be trimmed down to
reduce the cost'.
b. Must all of the services required in SAFE be
written specifically for SAFE? Some of the services
mentioned in the design can be supported by existing software,
although it is certainly worth the effort to modify outside
packages to add consistency of operation to the Trwhole SAFE
system.
serve
C. We. believe that backup rei-ui ?_e en s de
much more scrutiny. The report implies that all users of
c Ate SAFE sys temt require cho same level o t: Ci t. , a thou ~
degraded system (all terminals not supported) might be ade-
quate during major system failures if these occur infrequently.
This is one example of the need for an important next step;
an identification of the critial performance components is
necessary to determine the appropriate type and amount of
u ipro. ent .
d. It is no'L clear tha. the sysbeta, as outlined in
iJ. report, is state-of-the--art or, in tact, implementcble.
Approved For Release 2002/11/04: c lA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
'O he endorsements of the vendors are devalued somewhat by the
fact that their o:w7n implementation ideas are either unworkable
or would require significant amounts of untried technology
such as special purpose equipment. The use of hardware en--
l ncements, such as associative processors, should be evaluated
against the risk implied by esoteric or one-of-a-kind hard-
1re. Other vendors with implementation experience in large
scale text searching systems (such as the New York Times In-
formation Bank and Mead Data Central) should be consulted for
design ideas and implementation software.
d. Much of the high cost of the system. can be
related to the requirements for rapid access to huge amounts
of data. Would the system concept still be viable if less
were retained in the computers, or if the response time
requirements were relaxed?
e. The S_UE team should consider the use of a
common procedure language facility (such as the CMS EXEC or
GIN PROC facilities) as a means of reducing the complexity
to the user. This technique could be used in place of a
common language like SQUIRL to provide assistance and to
restructure input lines for the neophyte user while allo,,ring
total access to the full range of query complexities for more
sophisticated users.
4. When taken one at a time, the above points can prob-
a l.y be resolved, but I must confess to an uneasy personal
feeling about the totality of the problem that we face in
ui_lding and operating the proposed system. I am advised that
the volume of data, the interactions of data elements, the
response time and system availability requirements will pro-
duce complexity which no other computer system has ever faced.
The _'Agency has no experience in building systems of this size;
in fact, no text handling system of this scope has been built
anywhere. The risks are considerable, and I caution against
letting the analysts' enthusiasm and the absorbing challenge
C` t:he job ~ ~" hypnotize us into dism_ssin them or utg ~~ putting off a
x": v.Le of them to a later phase. In conclusion, it is neces-
Nary that we face up to potential problems in the early stages
o;. the proposed program to ensure against non_recover able
=ills that .may occur in the future.
STAT
L. N
y
Director
Joint omputer Support
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
4
STAT Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11C/04 : IA-RDP79-00498A000400050049-9
Project SAFE
October 1974
CONFIDENTIAL.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
CONTENTS
Page
1. INTRODUCTION AND SUMMARY 1
Introduction ........ 1
Summary .. 1
IL HISTORY OF PROJECT SAFE .................... 5
CRS Initiatives ...... ........................... ............ 5
Agency Directive ..... ........................................ 5
CRS Response .. ............................................. S
III. SAFE CONCEPTS ........... ........................... ...... 7
Remote Computer Power ............... ................... .. 7
A Spectrum of Resources ........................ . ...... . ... 7
Single SAFE Language .............................. ...... .. 9
Single Document Storage ............................ 9
A Symbiosis Between Personal and Central Files ....... ..... 10
The "Paperless Office" Concept ................................ 11
IV. DATA COLLECTION PLAN .................................... 13
Introduction ...... ........................................... 13
The Computer Merger ....................................... 14
Activities During the Merger-CY 1973 .......................... 14
Activities After the Merger-CY 1974 ........................... 20
SAFE Data Collection Techniques .............................. 27
Preliminary System Design ..................................... 32
V. DATA COLLECTION PHASE EVALUATION ..... .... ........ 33
Introduction .................................................. 33
Evaluation of the SAFE Pilot Operation .................... .... 33
Analysts Reports ....... ...................................... 48
Contractor Reports ..... ...................................... 53
VI. PROPOSED SAFE INFORMATION SYSTEM OUTLINE .... ..... 65
Introduction .............................. ................ .. 65
System Overview .......................................... 65
File Operation .................................... ........... 68
Preliminary Hardware Design .......................... ....... 72
VII. COST-BENEFIT CONSIDERATIONS 77
Introduction ......... ........ .................... ..... .. 77
Improved Intelligence Product ....... ................... ...... 77
Improving Computer Resources Allocation ............ .... 78
Potential Savings ................... ............... ........ . 79
iii
CONFIDENTIAL
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
Page
VIII. DEVELOPMENT PLAN ...... ..... ........ 81
Introduction ............ ................................. . 81
Detailed System Design Phase .... ........ .............. ..... 81
Other Development Phases ...................... ............. 82
LIST OF FIGURES
Page
Figure 1. Spectrum of Information Resources Available to Analysts ......... 8
Figure 2. Single SAFE Language ...................................... 9
Figure 3. Single Storage Concept ... .................................. 10
Figure 4. SAFE System Design Phases ................................. 13
Figure 5A. Indexed Documents and Corresponding Aperture Card ......... 17
Figure 5B. Sample Entries of Computer Listings .... .................... 18
Figure 6. Example of an Information File . ............................. 19
Figure 7. Data Collection Plan .......... ............................. 20
Figure 8. Daily Notes ..... .... 21
Figure 9. SAFE System Outline ........................................ 22
Figure 10. File Menu .................. ............................. 22
Figure 11. Completed OLDE Form .. .... ... .............. 23
Figure 12. Record of Search ............. ................... ......... 28
Figure 13. Finished Intelligence Citation 29
Figure 14. HELP Log ............................................... 30
Figure 15. Mail Log . ................................................ 31
Figure 16. Major Subsystems of the SAFE Information System ............ 32
Figure 17. Chart .............................................. follows 54
Figure 18. File Structure ...................................... follows 60
Figure 19. Overview of the Proposed SAFE Information System ..... ..... 66
Figure 20. Document Retrieval Options for the Proposed SAFE Information
System . ................................................ 68
Figure 21. Search and Retrieval from 14-Day Temporary Text Files ........ 69
Figure 22. Search and Retrieval-Mail Files ............................ 70
Figure 23. Filing of Digitally Displayed Items from Text Files ............. 71
Figure 24. Data Entry ................................................ 72
Figure 25. Search and Retrieval of Analyst and CRS Files ................. 72
Figure 26. Proposed Hardware Configuration ........................... 73
Figure 27. SAFE Development Plan ..... ........ ....... .... 83
iv
CONFIDENTIAL
Approved For Release 2002/11/04: CI -RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CI RDP79-00498A000400050049-9
CONFIDENTL
LIST OF TABLES
Page
Table 1. SAFE Modules ..... ........................... ....... 14
Table 2. List of Organizations Participating in Project SAFE ........ ...... 25
Table 3. List of Participating Organizations by Office ...... ...... ... 26
Table 4. Return of Data Forms by Participating Branches .. ....... . ... 35
Table 5. Volume of Use of Various Files ........... .. .......... 35
Table 6. Search Results Presented by Data Base Used .... ...... .. 36
Table 7. Did SAFE Files Provide Information that Would be Difficult or
Impossible to Locate in Other Ways? ..... ........ . ..... 37
Table 8. Purpose for Which SAFE Files Were Used ............ . ..... 37
Table 9. Time Spent in On-line Search (N=304) ........ ........ . ... 38
Table 10. Response Deadline by Branch (N=329) .. ............... . .. 38
Table 11. Response Deadline by File .. ... ............... ............ 38
Table 12. Speed of Searching SAFE Files as Compared with the Search of
Manual Files for the Same Information ..................... 39
Table 13. Rating of Various Characteristics of OLTA III ........... ...... 45
Table 14. Hierarchy of Operations ................ ..................... 57
Table 15. Filing Options Available to Analysts as They View Documents
at the SCS ............................................... 69
Table 16. System Costs ........ ...................................... 75
v~NU~
Approved For Release 2002/11W4NFEIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04 -F &- RP79-00498A000400050049-9
'CON
APPENDICES"
1. PROJECT SAFE PAPERS (October 1972, May 1973, November
II. DATA COLLECTION FORMS (Pilot and Self-Help Branches)
III. PRODUCTION ANALYST FEEDBACK (Reports/ Interviews)
IV. HELP LOG
V. PRELIMINARY DESIGN REPORT
VI. CONTRACTOR REPORTS
VII. REDBOOK INDEX
VIII. SAFE INSTRUCTION MANUALS
IX. PRELIMINARY SURVEYS
X. MAIL LOG
1973)
*Appendices I - X are located in Room 1E4808, CRS/Systems Analysis Staff, and will
be made available for reference.
Vii
CONFIDENTIAL.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/1111 IFIIAi4 DP79-00498A000400050049-9
1. INTRODUCTION AND SUMMARY
INTRODUCTION
Over the years CIA has made a wide array of intelligence resources available to its
analysts. Indeed, the Intelligence Community spends a large sum each year to provide
these resources and to find new ones. They are made available by such a variety of
processing systems and procedures that the individual analyst may have difficulty in
finding all the items he needs-particularly if lie has a short deadline.
Production offices have continually sought to better exploit intelligence resources by
creating their own data bases and files, sharing files of common interest, or introducing
new analytical methods or automation. For the most part, these efforts are made at the
office level and, at best, answer only office needs.
This report describes CRS efforts to design an Agency-wide, all-source intelligence
resource system that would offer all Agency analysts the best support today's
technology can provide. It suggests how such a system might he cheaper in the long
run than the sum of all the individual systems currently being developed or proposed.
The design that emerges is called the SAFE (Support for the Analysts File
Environment) Information System.
SUMMARY
CRS began work on Project SAFE in response to a June 1972 directive by Mr. Colby,
then Executive Director Comptroller. It said that CBS should "work with the analysts
and production offices within the Agency . . . to develop the most effective mix of
central bibliographic and document retrieval files and special purpose document
retrieval files for individual customer offices, (and) analysts...."
Preliminary development work with the production analysts soon showed what
characteristics a SAFE system should have. The concept that emerged was that of a
multipurpose Agency-wide information processing system operating through on-line
terminals widely distributed among the production offices. SAFE will permit the
individual analyst to view his daily mail on-line, route particular items to other
analysts, build machine files for himself or his office, and to maintain on-line files. The
on-line file building capability will allow the analyst to store a complete text, an
extract from it, or an indexed representation of it and to include his own comments on
such items. The system will allow the analyst to search the files he creates and, because
he has multiple access points to any item, to search them more thoroughly and more
specifically than he could normally search a conventional paper copy file. Where
document representations are stored in files, SAFE will provide the necessary full text
back-up, either by digital storage of text or, more commonly, microforms.
In addition to its role in dissemination and in the support of analyst or office files,
SAFE will give the analyst access, through his on-line terminal, to a wide range of
resources, including the major CRS data base and several files of the complete texts of
intelligence messages. Eventually the analyst may also be able to use the same
terminal to reach "external" data bases, including those within the community as we]I
as such commercially available files as the New York Times Information Bank. The
analyst thus will have, at his fingertips, a wide array of information resources needed
in the production of finished intelligence.
1
CONFIDENTIAL.
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002111104: CIA-RDP79-00498A000400050049-9
CBS implemented a model of a SAFE system and made it available to a small
number of production offices over an 8-month period in 1973-74. This was defined as
the data-gathering phase of the project. Its objectives were threefold: to determine the
general feasibility of SAFE; to learn the user's reaction; and to gather data from which
to develop more detailed specifications for an Agency-wide system. The SAFE model
was modest in that it used inexpensive and relatively unsophisticated software, existing
computer resources, a small number of terminals and a selected sample of users. It
nevertheless demonstrated all of the major components of the proposed system.
Close cooperation between CRS and the analysts in the production offices has been
an important feature of the data-gathering phase. Those analysts played a key role in
the design of the pilot system. Indeed, CRS assumed from the beginning that if an
Agency-wide system is to succeed, its real users must he involved in its actual design.
The pilot branches cooperated fully, and the large amount of data collected has
enabled us to define much more clearly the requirements of an Agency-wide system.
Conclusions
The overall reaction of participants in the SAFE pilot operation has been extremely
positive. Our evaluation (described in detail in Chapter V) of the pilot system indicates
that SAFE is potentially a very powerful tool, faster and more efficient than the
resources we presently have. Most analysts who have used the pilot system are
enthusiastic about its present capabilities and its potential. Indeed, there is a strong
feeling that this is the direction the Agency must take in information processing. All
the proposed features of the system have proven valuable, but the handling of text files
and the building of analyst files will probably be the most important.
Two of the most significant values of SAFE will be its ability to get incoming
material to analysts rapidly and its ability to provide fast access to a wide array of
information. It appears to have great potential utility, therefore, in the handling of
crisis situations, as reported by one of the pilot branch users:
r.
The SAFE concepts were examined by five companies involved in the design of
large computer-operated data systems. They believe most of the concepts, with one
major exception, are within the state-of-the-art. The exception refers to the part of the
original concept that called for scanning paper copy, digitizing it and entering it into
the system. In their opinion this is not currently feasible. Because parts of the SAFE
concept are close to the outer limits of the state-of-the-art, implementation of SAFE
will present major challenges in systems design, software production, and the
coordination of much hardware. A similarly large and complex system is not known to
exist elsewhere. The individual parts do exist, however, and the contractors agree that
SAFE can be built.
Our experiment has persuaded us that the Agency should move toward the
implementation of a system of this kind, having the general configuration described in
Chapter VI, and that we should immediately begin work on a detailed system design.
Cost
To support 1I the proposed system will require a substantial investment
over a number o years. Some of this investment will be compensated by a more
efficient and integrated use of Agency computer resources; by the assimilation of
25311A
2
Approved For Release 26 $ T!I IA-RDP79-00498A000400050049-9
Approved For Release 2002/1YIFIPATBQP79-00498A000400050049-9
certain existing systems and operations; and by a considerable reduction in the
generation, movement, storage and disposal of paper copy. The system must be
justified on the grounds of benefits to the Intelligence Community not on the grounds
of economy. We consider these benefits to be improved intelligence products,
generated by analysts who are informed more rapidly, more completely and more
The estimated cost of SAFE is abou dollars. This sum would cover the
software design and development and the purchase of hardware in 1974 dollars. It
does not include past costs, personnel costs of CIA employees involved in the project,
logistic costs (which may be high), or OJCS costs for continued support of the pilot
program. Our estimated cost would be less if the software could be developed in-house
(which is highly desirable) and if much of our existing equipment could be used. We
have deliberately used the high figure of our cost range to make sure that approval of
Project SAFE carries a realistic recognition of the potential financial impact (excluding
logistic costs). Development of the SAFE effort is a commitment of up t~
dollars and a development period of at least 5 years. It would also represent a major
effort-not yet defined-for logistics as well as an undetermined communications
investment.
These dollar and time costs are as firm as we can determine from current experience.
Both could increase, however, during SAFE's development and implementation.
Because we have used the higher cost figure, such increases should not have a major
impact on the overall cost of the system.
Finally, the SAFE Information System faces three major problems. First, there are
important security considerations involved in the development of a computerized file
environment which have not been addressed in this report.
Second, it was noted earlier that, although the concepts of SAFE are within the
state-of-the-art, there is no system in existence of comparable size and complexity.
There is a related risk. SAFE will become an integral part of the analyst's working
environment; if it fails him, he is out of business. Therefore reliability and backup are
critical. The Agency has limited experience in building and operating applications
where the computer is so intimately tied to an Agency function. What experience we
do have tells us that, in addition to high equipment reliability, extraordinary
developmental and operational discipline is required even for simple applications of
this kind. SAFE will represent a challenge different from any that our computer
systems people have ever encountered.
Third, the project need not necessarily be completed by FY 1980; but prolonging the
work would probably increase both the cost and risk. The funding need not be so
heavily concentrated in the first years as we have proposed; but spreading the funds
evenly across all the years will delay implementation and probably increase the risk.
Most importantly, SAFE must rationally be a complete intelligence processing system.
Because of the cost, we expect to hear proposals to create one-half or two-thirds of the
system-to handle some sources of information, but not all; or to serve some production
offices, but not all; or to perform some of the functions that are technically possible,
but not all. We oppose all such proposals.
3
CONFIDENTIAL
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
25X1A
25X1A
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
II. HISTORY OF PROJECT SAFE
CRS INITIATIVES
In December 1971 the Director of CRS created a task team to write a detailed plan
for upgrading the 1,300,000-record, computer-based CRS reference file (AEGIS).'
The general plan was to convert an off-line batch mode of operation to an on-line
interactive mode. This would improve service by allowing interactive searches to be
made at remote computer terminals as search requests were received. The ability to
enter search requests from remote computer terminals would also theoretically allow
Agency production analysts to bypass CRS analysts, who presently serve as
intermediaries.
The task team was also to consider methods by which production analysts could add
keywords, codes, and documents to the basic reference file. It had long been
recognized that many of the analysts' special interests could not be adequately
handled by the more general indexing performed by CRS.
In March of 1972 the task team began discussions with representatives from OCI,
OER, OSI, DDO (then DDP), OSR, and OBGI in order to inform them of the CRS
objective, to learn the extent of their interest as potential input or output users of such
a system, and to determine whether any of their requirements should be considered in
the proposed upgrading of AEGIS.
OCI and OBGI immediately expressed interest in a system that would give them a
computer search capability for their manual office files. OCI was especially interested
in reducing the size of its paper files by using a computer control system.
As a result of this interest, the task team conducted an OCI/CRS and OBGI/CRS 2-
week experiment, which simulated production analyst input to the CRS AEGIS file.
The results were encouraging, and in May 1972 OCI asked if CRS could implement
interim measures to allow continued OCI input prior to the upgrading of AEGIS.
AGENCY DIRECTIVE
In June of 1972 the Director of CIA, Mr. Richard Helms, approved a series of
recommendations by Mr. Colby, then Executive Director Comptroller. The series
included a directive that CRS "work with the analysts and production offices within
the Agency, and with such other Intelligence Community agencies as may be feasible,
to develop the most effective mix of central bibliographic and document retrieval files
and special purpose document retrieval files for individual customer offices, analysts,
or other requesters."'
CRS RESPONSE
Responding to this directive, CRS first critically reviewed its major file building and
information processing capabilities:
1. The MAD system, an Agency-wide Machine-Assisted Dissemination
system developed by CRS for SI electricals;
'Already Existing General Information System-this reference file is often referred to by the acronym
AEGIS, which is also the name of the computer data management program for this file. Other programs
could also "manage" the reference file. In fact, later in this paper the RECON program is introduced
as one such alternative.
'MEMORANDUM FOR THE DIRECTOR, SUBJECT: Automatic Dissemination, June 1972.
(Confidential)
5
Approved For Release 2002/114$ FI@nAIkbP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
2. The AEGIS system and an on-line version of AEGIS (which, although not
considered a candidate for the upgraded AEGIS system as discussed above,
allowed for searching from remote computer terminals);
3. The OLDE computer program, an On-Line Data Entry program by which
computer files are created and maintained at remote computer terminals
(OLDE was developed as part of the task team's AEGIS follow-on activity);
4. The OCI and OBGI experiments, which gave some evidence that the
analysts were willing to switch from their manual document files to a
computer/ microfilm system;
5. The CRS computer center, a center developed to maintain systems like
MAD, AEGIS and OLDE.
These five capabilities were the building blocks upon which two related proposals
were based:
I.-Proposal for a Demonstration of an On-line System to Provide Production
Analysts with Access to Personal, Office and General Bibliographic Files."
This work was written in August 1972
is purpose was "to demonstrate a concept, with the
object of generating interest and support within the various production
offices ... As the capabilities are demonstrated, user reaction will be observed
and gauged . . . We can learn much more about user needs and attitudes from
such a working model than we can possibly learn by a paper model and more
conventional interviews or questionnaire surveys.''
This working model would attempt to simulate the ultimate system
"... (which) will give the individual production analyst on-line, interactive
access to his personal document file, his parent office files, specially prepared
extract files, and a wide range of CRS bibliographic files."
2." Prototype of a CRS Production Analysts File Support System as an Interim
Step Toward an Operational CRS On-Line System."
This work was written in August 1972 by
Analysis Staff in response to OCI's request Tor an interim capa i ry. if
proposed that OCI analysts would mark the terms by which their documents
should be indexed; CRS would input the index records for those documents
into a special AEGIS file created solely for OCI. CRS would also microfilm
the documents for permanent retention and have computer listings printed
regularly, to give OCI analysts an index to their microfilm file holdings. The
use of microfilm in this remote system would significantly decrease the
volume of OCI holdings, and the printed indexes would give OCI analysts
improved access to their documents. This experiment with OCI was the origin
of the SAFE concept (later called Module 1.) that production analysts would
create their own document index files.
A Project SAFE paper based on these two proposals was published in October 1972.
The paper (See Appendix 1) described a set of concepts that, taken together,
postulated and partly defined a new Agency-wide information processing system for
intelligence materials.
The paper also proposed a data collection period during which production analysts
would evaluate the utility (not the cost-benefits per se) and practicality of the
concepts. First, the concepts would be partly implemented through test systems (called
"modules" in the SAFE paper) set up with existing or easily developed
computer/microfilm techniques; and then a representative sample of analysts would
work with and evaluate the test systems.
6
Approved For Release 2002t4)14iQ4ErCIARDP79-00498A000400050049-9
25X1 Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Next 54 Page(s) In Document Exempt
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11(@KQP79-00498A000400050049-9
VI. PROPOSED SAFE INFORMATION SYSTEM OUTLINE
We interpret the analysts' evaluations of the SAI'E modules and SAFE concepts as a
general endorsement-with qualifications, or reservations. The qualifications, which
relate to system reliability, file contents, user aids, response times, etc., are being
studied.
We interpret the contractors' evaluations of the technical feasibility of the SAFE
concepts as a general endorsement with qualifications. These qualifications relate to
the technical difficulties of digitally converting and storing data obtained on paper
copy medium; the problems of response time for large files; and the inherent
difficulties in the SQUIRL concept. They are being studied and are taken into
consideration in the system proposed in this report.
This chapter outlines a proposed SAFE Information System that will satisfy the
analysts' two fundamental needs: computer searching of digitally stored message
traffic (Text Files) and maintenance of computer-based analyst files.
The proposed system resembles that system hypothesized in the SAFE Concepts
chapter of this report and described in the Preliminary Design Report (Appendix V).
However, because of current technical and cost restrictions, this design differs from the
hypothesis in four important aspects:
1. Material received in paper copy form will be stored in microform rather
than in digital form. The conversion to digital form is still an objective.
2. An item received by electrical transmission need only be stored once,
regardless of the number of analysts who may have "filed" it; but, as a
corollary of item 1, material received in paper copy form will have to be stored
in as many microform collections as are required.
3. External files, such as the New York Times Information Bank, will not be a
part of the present system proposal; their inclusion is still an objective.
4. The system response time (time required to complete an analyst's
transaction) will vary depending on the size of the files and the "operation"
being performed. The original hypothetical response times now appear
impractical.
The first step in a system development program would be to design the system in
detail; this design would require 4-6 months to complete. The description that follows
is in three parts: System Overview of proposed SAFE capabilities; File Operation,
which outlines the relationships among the major files; and Preliminary Hardware
Design, which includes an estimate of total costs.
The system capability can be summarized by describing the SAFE Console Station
(SCS), the files it can access and the processes it can perform. (See Figure 19). The
SAFE system should, where practical, be integrated into the general Agency data
processing environment; a SAFE terminal should be able to access other Agency data
bases in addition to SAFE files.
65
CONFIDENTIAL
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 20MF16KTILIA-RDP79-00498A000400050049-9
SAFE
STATION
ENTER
DATA
TEXT
FILES
ANALYST
FILES
MAIL
FILES
CRS
FILES
1. Compute functions not to be considered in early SAFE System
but is a future objective. Compute would tie the file system
outputs into existing (or new) OJCS compute programs.
2. External file not to be considered in early Safe System but is
future objective.
Figure 19. Overview of the Proposed SAFE Information System
SAFE Console Station (SCS)
The production analysts will use the SAFE Information System through an SCS.
The SCS is more than a simple cathode ray tube (CRT) device. For example, it may
consist of a "local" terminal (digital viewing screen and keyboard) stationed at every
few desks; a digital printer reasonably close to the terminal; and a "regional"
microfilm viewing screen, film storage device and printer. The keyboards will have
66
Approved For Release 206{)6F4NT611A-RDP79-00498A000400050049-9
Approved For Release 2002/114@*nI ,ATBDP79-00498A000400050049-9
function keys that control the file categories to be accessed and the functions to be
performed.
The viewing screens must feature readability and general ease of use consistent with
today's state-of-the-art. The SCS will be designed with either two screens or a split
screen, so that an analyst can. view information on one part while entering data on
another. The SCS will have an alerting device which will bring a predetermined
''priority" message to the analyst's attention. Analysts will be advised automatically of
any operating abnormalities.
File Categories
1. Text Files are those electrically received transmissions that may be
processed and stored in digital form. They currently include:
-FBIS field traffic
-SI messages
-Doll Ills
-State cables
-OAKS
-CIA/IAS
-Military cables
-Wire services (Reuters, AP, etc.)
-DDO selected information cables
These items (except for certain sensitive or highly classified items) will be held
for 14 days, during which time analysts with the proper clearances can access
them for processing and possible inclusion in their own files.
2. Analyst Files are those created and maintained by analysts. They may be
document reference files (which contain indexes to specific documents) or
information files (which contain data and may or may not refer to the source
documents).
3. Mail Files are a subset of the Text Files; each mail file contains a selection
of electrically received transmissions that have been processed into it by the
Cable Dissemination System. A "distribution index" ties a specific message to
a specific set of analysts.
4. CRS Files include the Subject Index File (two million records and growing),
a major document reference system. CRS indexers select documents for
indexing in this file according to predetermined criteria. Other documents of
special merit may be "activated" for the system. SAFE proposes an additional
selection criterion, whereby CRS will index any additional document if two or
more analysts have "filed" it and if the security classification of the document
permits a "public" index record. (The process is described below in the section
on Indexing and Filing of Digitally Displayed Items.) CRS files will also
probably include certain biographic and installation information files and
certain library reference files.
Processing Functions
1. Search-Analysts will be able to perform searches on any of the above files.
In the case of Text Files, they may search by specifying any word or
combination of words and asking to see the documents in which they appear.
The other files will have different search capabilities, but to the extent
practical a common language/procedure will guide the analysts through their
searching. A search in the Mail File would probably be a simple scan of items
67
CONFIDENTIAL
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
received since the last search. Special aids will be made available to analysts
who are unfamiliar with any particular file.
2. Retrieval-Documents or information that match a search parameter can
be displayed on the screen and printed at the SCS. The mode of retrieval will
vary depending on the file and the file storage medium. Figure 20 shows the
retrieval options available.
3. File-Analysts can "file" any document being viewed on the SCS display
screen, whether it is a microfilm or digital display. Table 15 shows the file
options available. If the document is a paper copy receipt the filing
instructions are considered to he in the Data Entry category discussed below.
4. Data Entry-Analysts may create or add to analyst files by calling up the
appropriate "form" on the screen and then entering data directly on the
displayed form.
5. Compose-Analysts may use the compose function to write and edit. This
"document" can then be filed with other intelligence items or in a special
project file to which other items can he added.
This section describes briefly how the proposed system will work. For the most part,
this description was developed from the outline contained in the more detailed
Preliminary Design Report, published in May 1974.
Search and Retrieval-14 Day Temporary Text Files
Figure 21 shows the proposed schema. Digital message traffic is received after being
processed through CDS (1) or other OC sources (2). This traffic is processed through
the SAFE Automatic Cataloging program (3), which sets up one computer index file
record (called the Basic SARDINE record) for each message. The record (4) contains
the standard SAFE Number (SANS), classification, date, and file name. Messages in
this temporary text file are held for approximately 14 days (5).
TEXT whole messages, or segments, or comments are viewed/
FILES printed at the SCS. Messages are stored centrally
ANALYST
FILES
r If digital, same as above
If microform, item is automatically selected & displayed at
the SCS; item may be printed if necessary
MAIL FILES Same as text files
CRS
FILES
( If digital, same as "text files"
If microform, item is automatically selected & displayed at
the SCS, with printing as necessary
Some items, however, because of age or security restrictions
will be stored only centrally. Such items are requested at the
SCS, and are manually processed at the central store.
(automatic processing is also possible)
Figure 20. Document Retrieval Options for
the Proposed SAFE Information System
N
68
Approved For Release 2 tfiV6V" t1A-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
1. Indicate file name........
Document will appear to be filed
Microfilm and digitally dis-
under that file name.
played documents.
2. Add index terms to the
One or more words, or word phrases
Same as above.
document.
may be used to further describe the
document.
3. Add comments..........
The analyst may add evaluative
Same as above.
comments about the document.
4. Extract data ............
Analysts may extract data from the
Digitally displayed data only.
document; whole paragraphs or
specific segments.
When an analyst searches (6) this file, he may limit his search to any parameter he
chooses, e.g., date, post number, security classification, keyword in text, etc. If the
number of hits exceeds a certain level, he will have the option of refining his query to
reduce the number ofhits or having them printed in the OJCS center. Otherwise, he
can ask for the whole item to be displayed, or he may ask for only the segment of the
item that contains the search terms. lie further has the option of printing (7) or filing
(8).
Search and Retrieval-Mail File
When a message from CDS is routed into the temporary text file, at the same time
(see Figure 22) the list (Distribution Index, DI) of who gets that message is routed to
the DI file (2). When an analyst asks to search and retrieve from his mail file, this index
determines what messages are sent. The analyst need only ask for "mail" to start
scanning the items that have been selected for his office since the last time he viewed
his mail file. The analyst can also elect to further route (8) the messages being scanned.
1 COS 2 OTHER DC
AUTOMATIC
CATALOGING
SARDINE
RECORDS
14-DAY TEMPORARY
TEXT FILE
STATE CABLES,
SI ELECTRICALS,
MILITARY CABLES,
FBIS,
etc.
SEARCH and
RETRIEVE
Figure 21. Search and Retrieval From 14-Day Temporary Text Files
69
Approved For Release 2002/11.1 I$." VATJRDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
AUTOMATIC
CATALOGING
TO
SARDINE
FILE
STATE CABLES,
SI ELECTRICALS,
etc.
DISTRIBUTION INDEX
(01)
DISTRIBUTION
CONTROL
SEARCH and
RETRIEVE
PRINT FILE
This routing automatically updates the Distribution Index so that it will be available
on some other screen-if that analyst has been cleared for the item. Analysts can also
print (9) and file (10).
Indexing and Filing of Digitally Displayed Items
The creation (see Figure 23) of temporary text files (4) from OC (1,2) and the
creation of the Basic SARDINE record (5) have been discussed above under Search
and Retrieval of 14 Day Temporary Text Files. When an analyst chooses to "file" (6) a
digitally displayed text item, what he really does is add his file criteria (be they file
names, keywords, or whatever) to a record (7) associated with the SARDINE record
already created for that item. He may also use a data entry form to create a comments
file (8) for the text of comments he wishes to make on the document. When he next
retrieves that document, his own comments (but not those of other analysts) will
appear with it.
SARDINE relates the proper comment to the proper user and to the proper text
document. The above connections are made as the analyst views the document on his
SCS screen, and his data entry form is displayed concurrently with the message. If any
analyst has added a file sub-record to the Basic SARDINE, it will affect the file
reorganization (9), because after 14 days each item in the temporary text file must be
moved to another storage area.
If a given item has not been put into any file, even that of CRS, then it is processed
via computer output microfilm (10) to a central microform collection (11) or is
processed to the lower order digital storage, the Tera-Bit Memory (TBM) (12), which
may be an alternative to microform storage. The SARDINE record continues to exist
for that item.
If an item has been entered into one or more files, it will be transferred to the
primary text file (13). Analysts will be able to do text searching on all items so stored.
Items remain stored in primary text until the next reorganization, when the date and
activity of each record are automatically reviewed. If an item has not been retrieved
for a given period of time, it too will be routed to microform or TBM storage and out of
the more expensive digital primary text.
70
Approved For Release 200Z/jANCJ-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
TEMPORARY TEXT
FILE
7?
FILE REORGANIZATION
10
r---.J
cam
I
12
SARDINE
RECORDS
MICROFORM COLLECTIONS
PRIMARY TEXT
FILES
COMMENTS
FILES
Figure 23. Filing of Digitally Displayed Items From Text Files
Indexing and Filing of Non-Digitally Received Items
In a typical sequence (see Figure 24), an analyst receives a document in paper copy
form (1) and reads and marks data (2) that are to be filed. Ile enters the data on a form
that appears as a display on the SCS (3). The particular form is tailored to the kind of
file being built. Data so entered goes into term files (4) or comments files (5) as
appropriate, and the location is recorded in the SARDINE record (6), which "points"
to the CRS microform version of the original document (7). Whenever the SARDINE
record is retrieved, it references that document.
An analyst may see only a microform copy of a document. Ile can still file it by
following steps 2-7.
Search and Retrieval-Analyst and CRS Files
When the analyst searches and retrieves from his own or from the CRS files (see
Figure 25), he uses various term files (1) and the SARDINE data structure (2) related to
them. When the search is complete, he may view the SARDINE records and the term
file entries that satisfy his search statement. These may themselves contain the
information that answer his question, or the analyst can retrieve the pertinent
documents. Documents in digital form are retrieved from a primary text file (3) or the
lower-speed TBM (4) device. Once a set of these digital documents (or analyst
comments (5) about them) are retrieved, they are available to the analyst in a special
computer file called a "work space" (6). Documents thus retrieved can be further
searched by text search techniques (7) or refiled (8). Documents in microform are
retrieved from the regional storage facility (9) associated with an analyst's SCS.
Some documents will be beyond a given age limitation or will be of a special
security category. Such documents must be retrieved from central storage (10).
Requests can be made directly from the analyst's SCS; the documents are processed
manually.
71
Approved For Release 2002/114 f](NN 1.4P79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
REGIONAL
CENTRAL
1 _
DOCUMENT F---~- READ and
_J ANNOTATE
MICROFORM
CONVERSION
MICROFORM
COLLECTIONS
l
TERM
FILES
F------ J SARDINE
SEARCH
and
RETRIEVE
COMMENTS
FILES
PRIMARY
TEXT
TBM
10COMMENTS
WORK
SPACE
Figure 25. Search and Retrieval of Analyst and CRS Files
Introduction
The preliminary concepts of the system design were discussed by a joint CRS/OJCS
task team, which had been directed to determine the major parameters for an updated
SAFE Information System and to consider how those parameters would influence the
system design. Once the parameters were established, the team considered various
ways of implementing them and discussed the merits of special versus general purpose
computers and of distributed versus central processing. The team decided on a
distributed network of minicomputers attached to general purpose computers doing
central processing.
The following, more detailed hardware design was made by a team of CRS
computer specialists, based upon a consensus of the overall system configuration
determined by the joint CRS/OJCS task team. This system design indicates the
possible magnitude and cost of a SAFE Information System.
72
Approved For Release 20021 mM4E:rJM-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
Because many of the SAFE requirements are still approximations, the team
considered two possible configurations. The larger and more expensive one might be
able to do the job; the smaller and less expensive one probably will not be able to
handle peak workloads. Because of the large volume of data that will be vulnerable to
both hardware and software failures, file backup and alternate routing procedures will
be required at all levels of the system. In addition to backup equipment, SAFE will
require processing and electronic file storage equipment to restore service after either
an external problem (e.g., fire) or an internal problem (e.g., equipment malfunction)
destroys some part of the electronic files in the system.
As exact SAFE requirements are derived, the detailed system design phase of the
Development Plan (Chapter VIII) will determine the final system configuration,
which will probably lie between the minimum and maximum configurations
presented.
SAFE Configuration Description
The proposed system requires hardware for four processing levels: the analyst's
console, forward processing, central processing and central microfilm storage (see
Figure 26).
? Analyst's Console Level: It is proposed to install some 500 consoles, about one
for every two analysts. For every five consoles (approximately) there will be a
regional microfilm reader and storage device. This device will contain
microfilm images of documents (nonelectrical receipts) that were filed by the
analysts and a sub-set of the central (CRS) microfilm storage. The contents of
this sub-set will be controlled by security and document age.
FORWARD
PROCESSING
LEVEL
CENTRAL
PROCESSING
LEVEL
CENTRAL
STORAGE
CONSOLE
MINI-
COMPUTER
MAIN
PROCESSORSI
CONSOLE
CRS
LIBRARY 2
CENTRAL
MICROFILM
STORE
1. may consist of two general purpose main frames (small system); or may
consist of four special purpose main frames (large system)
2. central processing may remain manual (low-cost system) or may be
automated (hi-cost system)
73
Approved For Release 2002/11kNFL9P79-00498A000400050049-9
-------------------
CONSOLE CONSOLE
REGIONAL
MICROFORM STORE
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
? Forward Processing Level: It is proposed to station about 50 minicomputers in
the Agency, averaging one mini for every 10 consoles. This network of
minicomputers allows the SAFE consoles to be less sophisticated and therefore
less costly. It also allows the processing of simpler tasks (reading mail, writing
and editing reports, and checking syntax of commands for errors) to be
accomplished at a level closer to the analyst and relieves some of the work
load on the central processors.
? Central Processing Level: The complex computer functions of monitoring the
system, text searching, index searching and maintaining the data base will
take place at the central processing level. The minimum computer
configuration needed is two large (IBM 370/168 size) general purpose
computers. All of the functions will be performed in either machine, and each
will back up the other. Some members of the task team doubt that this
minimum system will have enough computing power to handle the workload,
especially during peak periods. The failure of either computer would seriously
degrade the entire system. An alternate design uses four large computers (IBM
370/168 size). They are specialized; two maintain the data base and search
text files, and the other two search the private and public index files and do
text searching of the current 14 day text file. Should any one computer fail, its
mate would be able to maintain the function with little or no system
degradation. This system is more expensive but guarantees maximum backup
and high computing speed.
In both systems the electrically received data and index files are stored in a
two-level storage heirarchy. The primary storage level consists of
approximately 75 disk drives (IBM 3330 size) with a couple of fixed head
devices used as a buffer. Depending on age and frequency of use, the data will
be reassigned to a mass storage TBM system.
? Central Microfilm Storage (CRS): The central storage facility will contain all
items processed by CBS as well as some aging items sent back from regional
locations because of security restrictions. The minimum system design would
continue the present manual system with one additional feature: analysts at
their consoles would be able to automatically order those documents not
available regionally. The subsequent delivery would be manual. The
alternate design calls for automating the central facility so that documents
ordered automatically could be delivered automatically. The expense of an
automated system might be justified if document requests levied on the
central facility were to increase significantly. At present, however, the SAFE
plan does not include automating the central microfilm facility.
Comparative costs of the two computer systems are shown in Table 16. The price of
iBM equipment was used to judge the cost of the main processors and disk/drum
storage system. When specifications are better defined, perhaps some other type of
equipment of the same computing power could be used. The terminal cost is
calculated for 500 terminals. The mini-processor/communication system is based upon
50 mini-processors and the associated computer communication lines. The cost shown
for the mass storage (TBM) is not that of a complete system but of an expansion of the
system the Agency is currently purchasing. The programming costs include the initial
programming of all the software for the system and the maintenance programming
needed thereafter. The costs cited do not include the expense of altering existing
74
Approved For Release 2008MVIratA-RDP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
facilities to accommodate the new equipment, nor the expense of additional personnel
to maintain it. The next chapter will discuss some of the cost savings and benefits
associated with the SAFE Information System.
System Costs
(In Millions of Dollars)
Terminals ......................
Mini computers and communication
lines .........................
Main computers .................
Card reader/punch, printers disk/
tape storage ..................
'I'BM--mass storage .............
Microfilm system ................
Software .......................
Initial rental for main computer,
and total system maintenance
cost .........................
Total cost ....................
2 General 4 General
Purpose Purpose
Computers Computers
2.5 2.5
11.0 18.0
4.0 4.0
1.0 1.0
1.5 1.5
6.0 6.9
75
Approved For Release 2002/11 4'.'R; TJRt P79-00498A000400050049-9
Approved For Release 2002/11~lRATWP79-00498A000400050049-9
VII. COST-BENEFIT CONSIDERATIONS
A cost-benefits analysis of the proposed SAFE Information System
is not possible at this time. We cannot assign a dollar figure to the potential value of
the system to the production analysts for whom it would be built. We can, however,
cite the arguments of the analysts that the SAFE system would improve the finished
intelligence product by offering new analytic techniques, data bases and data base
access. Also we can show that the SAFE system could improve the organization and
allocation of Agency computer resources. And we can suggest areas where dollar
savings may occur that would at least partly offset the cost of SAFE.
25X1
The arguments offered here are those made by the analysts in their critiques of the
pilot system. They have already been cited in Chapter V but are quoted here, in part,
because of their particular relevance.
"SF/C is a self-help user of the SAFE system. I would venture to say SF/C
is more dependent upon SAFE and possibly more convinced of SAFE's indis-
pensability than any other branch ... SF/C's SAFE system does not merely
supplement the branch files; it is the branch research file ... We are striving
to establish in SF/C the finest, most comprehensive, most usable repository of
all-source information on command and control subjects in the intelligence
community. We could not aspire to so ambitious a goal without SAFE ...
Scraps of information of interest to us can be found in all of the file mod-
ules being considered for incorporation in SAFE in the future ... The more
files we can dig through, the better chance we have of coming up with
meaningful tidbits, and no one can predict where those tidbits will be found.
Given the fantastic capabilities of computers, I see no reason to arbitrarily
restrict the scope of our search for information by limiting the number of files
to which we will have access. We want them all!!! And I promise you that we
will learn how to exploit them." (OSR/SF/C comments).
"The most immediately evident one (benefit) is the ability to store and
search vastly more information than previously possible . . . A more
fundamental consequence is that, with masses of data more easily available,
an analyst can bring more evidence to bear on a given problem. Further, the
analyst feels more inclined to check his files before writing because he knows
it (checking) can be done quickly- and comprehensively ... An interesting
effect of having files available on the computer is being able to do searches
or use data in ways not previously possible." (OSR/SEC comments.)
"During the Cyprus crisis and more recently in relation to events in the
Balkans, I had an opportunity to use the SAFE system in a crisis management
mode. The system proved to be an extraordinarily useful device in this respect.
The mail distribution system (OLTA) and COLTS were of particular im-
portance . . . SEC was able to receive relevant reports through the OLTA
system many hours before the reports were available in hard copy. This
capability allowed us to stay well ahead of possible threatening developments
77
Approved For Release 2002/1 fWl jAbP79-00498A000400050049-9
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
CONFIDENTIAL
and, in fact, alerted us to potentially interesting developments in the Balkans
before reports of this were available through regular channels. I believe that
the SAFE system has an enormous potential for crisis management."
(Comments of one OSR/SEC analyse.)
"The SAFE system holds the promise of being able to make the ever
increasing flow of information a manageable phenomenon, and to help stave
off the accumulation of innumerable safes with unmanageable files."
(OSR/TF comments.)
"The year-long experiment with Project SAFE has proven that ... analytic
capabilities can be enhanced. The savings of time and space afforded by the
system, plus the rapid search capability, represent a highly desirable
electronic package." (OER/D/TA comments.)
in summary, we believe that the data collection experiment demonstrated that the
proposed system will help Agency analysts provide a better intelligence product. A
better product may be a piece of incoming intelligence more thoroughly indexed and
annotated for later reference; or information routed to users faster and more
efficiently; or a more thoroughly researched piece of finished intelligence.
We believe the SAFE system will offer analysts improved techniques for monitoring
and manipulating a large amount of incoming intelligence items, for searching files
they could not otherwise use in the time before their deadlines, and for scanning
incoming mail minutes after it arrives in the Agency.
in acquiring new technology, the Agency has traditionally emphasized the
information collection side of the intelligence problem rather than the information
analysis side. As this continues, it resembles building an ever larger cone for a funnel
while keeping the same sized neck, and expecting the flow to increase. Agency analysts
cannot now digest all the information they receive; they often cannot quickly find
yesterday's piece of intelligence when it suddenly becomes relevant today. The task
force feels that the development of the SAFE Information System represents the
required parallel emphasis on the analysis side of the intelligence problem.
IMPROVING COMPUTER RESOURCES ALLOCATION
Computer and microfilm information systems to support production analysts have
often been developed on an essentially individual basis. Each office would set out to
meet its particular needs without knowledge of or coordination with other offices with
similar problems, and the overall development of the Agency's information system has
suffered. Proper development requires a unifying concept that would relate, for
example:
-a file building requirement in OSR with one in OBGI,
-a text search and edit requirement in OSI with a text indexing requirement
in CRS, and
-a text segment extract requirement in OWI with an automatic cataloging
requirement in CRS.
A unifying concept would reveal the relationships between such varying
requirements, and enable the task force to derive a common denominator.
Lack of a unifying concept has resulted in unnecessary developmental costs and,
probably, unnecessary acquisition of computer equipment.
The task force suggests that the SAFE Information System could be such a unifying
concept; that it is wide enough to embrace most of the information processing
requirements of the production analysts; and, in short, that SAFE could improve the
organization and allocation of Agency computer resources.
78
Approved For Release 20021OM4ENCIA-RDP79-00498A000400050049-9
Approved For Release 2002/1~ rDtr DP79-00498A000400050049-9
POTENTIAL SAVINGS
Savings could follow the adoption of the proposed SAFE methods for handling the
Agency's electrical and paper receipts and the proposed SAFE text searching system.
SAFE would also change the pattern of CRS use of computers and manpower. These
changes are discussed below, but no dollar figures are projected.
Handling of Electrical Receipts
Approximately 20 million copies of electrical messages are disseminated yearly at
the Agency. The cost of the existing operation is considerable; the existing equipment,
supplies, space and manpower will no longer be needed if they are replaced by more
efficient equipment and more efficiently used space and manpower.
Handling of Paper Receipts
The SAFE system plans to continue the current routine microfilming of documents
that are received only as paper copy. Instead of keeping them all in a central location,
however, SAFE would make a large collection of the microform documents available
in regional storage devices and thus lighten this load on the central storage facility.
This central facility now manually microfilms documents that were received as
electrical messages. SAFE will enable the central facility to receive computer output
microfilm (COM) processing, reducing the use of manpower.
Text Searching
During the data collection period analysts used the digitally stored text files to
obtain messages that they may or may not have expected to receive through the
regular delivery of SI messages, State cables, FBIS field traffic, military cables or DoD
IR electricals. Analysts used various parameters in their search of those files apd could
change the parameters as their requirements changed from day to day. They found
these searches valuable:
"I've used COLTS (text searching program) primarily to retrieve messages referred
to in other cables but nowhere to be found in our mail."
"COLTS produces messages faster than hand delivery."
The proposed SAFE Information System would regularly update the text files as
messages are received from OC. Its improved text search capability will allow analysts
to repeat a question without having to reformulate it every time, and to view only titles
or segments rather than the whole text, whenever they are scanning many messages for
relevant items.
The task force anticipates that text searching will at least partially replace the
dissemination of messages to user offices; and, possibly that someday intelligence
messages will not have to be read and reread before reaching the ultimate customer.
To the extent that shuffling, carrying and reading the mail are reduced, the Agency
can save money.
Changes within CRS
If project SAFE becomes an operational reality, it would satisfy most of the present
CRS requirements for computer support, as well as some other Agency requirements,
and release a significant amount of OJCS resources.
Under SAFE, CRS will continue to analyze documents to create the "public" index
record. Some increase in indexing may be required, but we feel money would be saved
overall because CRS will be able to use the on-line analysis and automatic cataloging
functions. Also, CRS will need fewer specialized analysts for routine reference work,
because SAFE will permit production analysts to search many of the CRS files for
themselves.
79
CpNFID NTH
Approved For Release 2002/11/04 C~A-RbP79-00498A000400050049-9
Approved For Release 2002/1 JA4 -,Dqi-RPP79-00498A000400050049-9
VIII. DEVELOPMENT PLAN
INTRODUCTION
Chapter VI of this report outlined the proposed SAFE Information System, its
capabilities, possible hardware configuration, and cost estimates. This chapter
describes the development plan of the SAFE Information System and projects the
number of developmental phases required through FY 1980 and the expenditure
required each fiscal year for the same period. These estimates arc tentative and will
certainly change as a result of the first phase activity (detailed system design).
DETAILED SYSTEM DESIGN PHASE
In the first phase of the SAFE Information System development, the task force must
draw up detailed design specifications. It will have to verify that the system hardware
configuration suggested in Chapter VI is correct or spell out the new configuration.
Once the hardware configuration is fixed, the task force must draft detailed
specifications on individual components. If the minicomputer/main processor
configuration remains the preferred one, studies must be performed to determine the
optimum mix of the functions performed by the mini and main computers. The task
force must spell out the requirements for the SAFE Console Station and decide
whether or not to use existing terminal equipment. The task force must also fix the
detailed specifications for the computer software, and determine how the overall
project is to be managed.
Task Team
Project SAFE will demand a new task team composed of various specialists. Many
are already Agency employees; some must be hired. This team would guide the
detailed system design phase and the project management plan mentioned above. It
would also maintain the interim SAFE system now in use in the various developmental
branches. The analysts who are still working with the pilot system-at their oven
request-will continue to play an important role as SAFE is developed Agency-wide.
The task team would consist of 13 to 1,5 full-time analysts from the following
organizations:
? CRS/SAS-Six or seven analysts engaged in project management, system
design, and interim system management.
? CRS/SSD and OJCS-Two analysts studying hardware configuration.
? OJCS-One analyst, engaged in coordination, would keep OJCS informed
of SAFE progress and would seek OJCS expertise as required.
? Contractors-Four or five systems analysts from a major software/system
firm to analyze the implications of the expected load and queueing through
computer simulation and modeling.
It would also need four part-time personnel as follows:
? OC-One person, familiar with the Cable Dissemination System of the
Cable Secretariat, who will coordinate the SAFE requirements with those
of the Secretariat.
? ORD-One person who would monitor industrial and academic research
developments in areas of interest to SAFE.
81
Approved For Release 2002/1 l1 -T t P79-00498A000400050049-9
25X1 Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9
Next 2 Page(s) In Document Exempt
Approved For Release 2002/11/04: CIA-RDP79-00498A000400050049-9