FY 1986 RESEARCH AND DEVELOPMENT PROGRAM
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP85B01152R001201490006-7
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
34
Document Creation Date:
December 22, 2016
Document Release Date:
January 19, 2010
Sequence Number:
6
Case Number:
Publication Date:
September 15, 1983
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP85B01152R001201490006-7.pdf | 1.24 MB |
Body:
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7 3egistry
S-E-C-R-E-T
15 September 1983
MEMORANDtM FOR: Chief, Planning Division, O DDS&T
_Iffff
DDA Planning Officer
SUBJEECT: FY 1986 Research and Development Program
/OV_a L
REFEREIE: Your Multiple Adse Memo dtd 4 Aug 83, Subject:
FY 86 R&D Planning Cycle
.1. The attached statements of research and development
requirements for the Directorate of Administration are submitted for
your review. and for forwarding to the research and development offices.
12. As you requested, we have provided fewer, broader, generic
long-range requirements. For elaboration and clarification, we have
included problem statements which address specific concerns within
these generic topics. As in previous years, we have placed the
polygraph research and development requirements in a separate category.
3. In view of the small number of generic categories submitted,
we consider each category to be of Priority 1 rank. We expect
multiple solution statements to be prepared for each of the generic
categories. While we have tried to comply with your recommended
format, we are concerned that these broad generic categories contain
high and low specific priorities. To rank the generic categories
against each other would undermine the possibility of needed research,
should one entire generic category fail to be addressed. This
approach can be used to develop a successful program only if all
generic categories receive funding.
4. In order to further enhance the success of the research and
development program, we encourage increased communication with the
contact officers in this Directorate. We also request an updatEe on
the status of the FY 1985 program. This update will help us in our
review of the proposed FY 1986 program and allow our offices to
identify the appropriate contacts to support the research and
development projects.
REGRADED UNCLASSIFIED WHEN
SEPARATED FROM ATTACHMENTS
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7 __'_.
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
5. We restate our interest in the Artificial Intelligence
research and would like to see a proposed AI project in support of a
requirement in this Directorate.
6. We look forward to the successful development of the FY 1986
research and development program.
1 - DDA Subject (w/att)
- DDA Chrono (w/o att)
1 - DDA/MS Subject (w/att)
1 = DDA/MS Chrono (w/o att)
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
DIRECTORATE OF ADMINISTRATION
RESEAICH AND DEVELOPMENT REQUIREMENTS
o Security in the Electronic Office
o Information/Communications Systems Security
o Physical Security
o Technical Security
o Communications
o General Computer Applications
o Polygraph
S-E-C-R-E-T
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
SECURITY IN THE ELECTRONIC OFFICE ( ONGOING )
The changes to the office environment that are creating
both the "electronic office of the future" and advances in
communications technology may have the greatest impact on the
security threat. The electronic office explicitly includes
word and data processing systems, electronic telephones and
computerized branch exchanges, systems for mass storage on
magnetic media, and local area networks (LAN's) that link
telephones, word and data processors together. These new
capabilities will certainly change how we handle intelligence
information. How we protect this information can only be
addressed after a thorough threat assessment. Along these same
lines, advances in communications technology have the potential
to change our present technical collection threat assessment.
.Countermeasures to new hostile systems can only be addressed
after we have taken into account what our vulnerabilities are.
While technological change will create new security
threats, it may offer new methodology to address both current
and future threats. An all-encompassing program to investigate
new technologies that have countermeasures applications against
an updated threat assessment must be undertaken.
Specific Topics / Projects in priority order
Office Electronics Security ( ONGOING )
Destruction of Non-paper Storage Media ( ONGOING )
Advanced Telephone Systems ( ONGOING )
Office Shielding Materials ( NEW )
Low-Cost TEMPEST Technology (RESUBMISSIOiu)
Device Security Profiles (014GOING)
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
OS TSD.
Problem Number DDA
Office : OS/TSD
" Ot-fice Electronics Security (ongoing)
Tit
11`1'
(ror~:erly Office Machine Protection)
Problem Descriptio ~:
ip
The market for new office electronic equipment is expanding
so fast that it is. not possible to keep pace with the security
implications of each new device that appears to save time and,
money. Assuming the technological advances continue, it is
extremely difficult to predict what new classes of equipment
will be available-in the near future. The security implica-
tions of these devices will not only include the traditional
vulnerabilities, such as easy concealments, substitutions and
emanations, but they-will foster new security hazards- The
concept of office automation is moving ahead much faster than
the security measures which need to be associated with these
new machines 25X1
Time Requirement. -
Security Droblems associated with currently available
office machines are a serious problem already since marry
sensitive areas have equipment which is not fully evaluated
from a security standpoint. Similarly as ever. new equipment
is developed additional study efforts will need to be undertaken
promptly. 25X1
Background/R~P History/References: -
Traditionally only-a few relatively simple office
machines were available such as typewriters and copiers.
Besides offering places for easy concealment of various
types Of buys or sen sors, some have been found to produce
'
Or CP.araCper ~ic_1C sigma ureS which
CG`OrO===~1='-x ~...2n nt10 S
can be easil Dread and, translated bacl: into p'? ain text.
0 ice o-Co---.uu:ai catlo'sls tempest testing has detected and
barred such naciines from sensitive areas until they could
be properly modified or cone fined. 25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Newer office machines such as word Drocessors and
computer devices that use magnetic recording materials for
information storage, present additional problems that have
not yet been defined. The CRAFT and similar programs are
attempting to consider the security problems associated with
massive network systems, but have now been forced into real
time, ad hoc solutions. Protection is often discussed, but
if the methods of exploitation are not. kno~ti-n, it is difficult
to determine what effect the protective measures will have. p25X1
Benefits/Description of Output:
The primary effort should identify the classes of
office equipment that may soon be developed and marketed
along with the inherent security risks that each may exhibit.
A study of this nature should also include the vulnerabilities
to exploitation that each will offer as well as quantities of
these machines that are expected to be found in sensitive
areas. -This list will certainly include but not be limited
to typewr copiers, word processors, and magnetic storage
machines. 25X1
Once a comprehensive-list has been compiled categorical
vulnerabilities by class should yield a "security profile".
This information should indicate corrective action to lower
the "security- pro--File" and further indicate how remaining
weaknesses can be determined or detected in the field
environment. The "security profile" should address the trend
for having this "smart hardware" advise the custodian of
tamper violations, after-hours power use, etc. Current
security alarms are not appropriate for this function. 25X1
Policy/Basis Justification:
The world of office machinery is quickly advancing toward
the point where there will be a totally paperless society. The
Dl has expresser.: a strong interest in following this trend,
as it will solve the current problems of pa-o_ er document comProiFtise.
However, the developing market of automated office machines does
not necessarily solve the compromise problem, it merely redirects
it to unexplored terr_..ory. 25X1
Sanitized Copy Approved for Release 2010/01/19 CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Problem Number -DDA OS TSD
Office: OS/TSD
Destruction of Non-paper Storage Mledia (New)
Problem Description:
M.any commercial devices and Agency unique hardware systems
now contain assorted non-volatile storage schemes. RAM, ROM,
EPROM, Bubble Nenory, and the total variety of magnetic storage
materials have na approved method of destruction - emergency or
25X1
routine.
I
Time Requirement:
This requirement is currently critical due to imminent
deployment of data processing systems to overseas facil-
Proto~type systems have been deployed and are operating. 25X1
Background/REID History/References:
On degaussing of floppy and rigid discs, and various
sizes of .reel tape there has been much discussion. ghat
c s not been forthcoming is a declarative summary of the
performance, specifications, health and safety data on
an approved final or terminal destruction device for magnetic
materials. 25X1
The non-volatile electronic storage components and
devices that will definitely be integral com-oonents or
subassemblies of systems have not been addressed.
An additional concern must be a USG standard for degaussing
and destruction. NSA was thought to be `h erent authority
but this has not been verified to date. 25X1
7,e-efits,' escriT- ion of Output: -
There should be a profile addressing the "writing" strength
and density, and indicating the corresponding degausser strength
and time reou l _ ed for total oeciass zflcatlon of the data. The
d f rence e tween. A- dec cussing and D:, i rare-earth .magnet)
ce au ssa s- ould be I?Icoh; ct"tted The Cep cits5~ he evl'' ,.. emit
may be Ar- COwerec but there must be a satlsfac rv ?^G~'.'21 en ~.
capability that is indepencent of host power. 25X1
25X1
25X1
c. L
Sanitized Copy Approved for Release 2010/01/19: rCIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
dominant. concern.
ccnC t,S e verification capability is essential for
both data storage scenarios. It, is preferred that he
degatissing/destruction/verification nave routine use snot
T the emergency use so that situational stress ~tiill not be a
ch-s,is vi
The electronic component memories will likely be
di.sbursed,throughoutcr and
orsasshor a ort notice emergencd be
considered inaccessible
destruction event. A scheme for purging these devices,
possibly a recommendation on their location within a given
-.ro PC~Pntlal_ ~~
25X1
Policy Basis/d'-=stification:
The Office of Security is charged with providing terminal
t for the classifiedraterial
destruction eetiipment appropl 25X1
at all Agency facilities.
Contact :
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Next 4 Page(s) In Document Denied 25X1
Iq
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
OFFICE: OC
TITLE: Device Security Profiles
PROBLEM DESCRIPTION:
Data terminal and III system populations are growing and,
consequently, the physical and communications security
overhead to protect them is increasing. The proliferation
of these devices/ systems to domestic sites (Agency and
contractor) and. overseas posts places new demands on our
traditional security approaches.
It is becoming increasingly difficult and expensive to
establish and maintain adequate security (physical and
COMSEC) profiles for these systems.
-- Parent room. renovations and alarm systems are costly.
Maintenance and periodic inspections will remain a .
resource burden. A new, innovative approach to provide
and ensure adequate physical security for our IH
devices/systems during and after normal duty hours is
required. Methods to reduce the risk of tampering need
to be developed along with methods that can alert a user
that his or her system has been tampered with. We also
need methods that will permit us to use IH devices
securely in a signal flooded environment.
-- Current methodology to test for compromising emanations
requires highly skilled, scarce engineering and tech-
nical talent and is very time-consuming.' New measure-,
ment and analysis techniques are needed for use in the
field and the engineering laboratory.
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Ii4EOR1ATION/COMMUf4ICATIONNNS SYSTEMS SECURITY .(ONGOING)
Research to improve information systems security must lead.
to effective protection of data: (1) as it is being processed
on a system or device, (Z) as it is stored on a variety of
media, and (3) as it is being transferred electrically within.
ne tcyorks . There must be irprovmer_ts in the sanitization of
storage media that have contained classified information_ More
secure data. processor designs should be a: goal- ? And., the
prevention or detection. of tampering with systeB hardware -
should.be. inproved? The user interface -to the system should be
e
m prov t-"-- authentication of, users ar_d th
i
e ermined ' t'a
.
~
conpartinentation of date.
Candidate Topics or Projects in prior Fty order.
Sam; t i,atT oand. destruction of data storage media
(ONGOING )
Tamper detecti on for office ADP equipment ( ONGOING )
Data base encryption ( ONGOING)
User out enticaLion ( ONGOING )
Develop?-_A-_t or a device to detect and. prevent the
Unauthorized. transmission of data. ( ONGOING )
Computer firmware verification (ONGOING),,
3e;ecomim.in ca cns Security (ONGOINIG)
Deve.op er:t oF secure netlor?ks (ONGOING)
Con taca'-
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Problem Number:
Office: OS/ISSG
Title: Sanitization and Destruction of Data Storage Media
Problem Description:
The Information Systems Security Group (ISSG) has given
top priority to research leading to ways to deal.. with erasure
of data from memory devices and the ultimate destruction of the
devices when the need exists. These twin problems,
sanitization_ and destruction, have been of concern for a long
time, but they have been treated separately. This problem
statement generalizes the requirement to eliminate stored
data. ISSG believes that appropriate research into-the
physical processes of data storage will lead to methods and '
devices that are effective in sanitizing various storage/memory
devices. This category of research-is expected to continue in
order to respond to new developments. Magnetic disks. are
examples of evolutionary design. Each new process or material
will need to be considered. Higher coercivity materials cannot
necessarily be erased magnetically by the same processes used
on present disks. Plated disks, thin films and perpendicular
recordi-ng will require new sanitization techniques that are
based on specific research and testing.
Time Requirements:
There is an immediate need to determine the effectiveness of
sanitization methods that are used on today's media.,
Continuing research will be required for new media.
Background:
Storage media for data processing routinely require
sanitization and reuse and some types must be subjected to
destruction under conditions ranging from routine to
emergency. Some of the media that are based on present
technology are: semiconductor memory and buffers, magnetic
storage devices, and optical disks and strips. Developing
technologies are likely to add new devices. Magnetic storage
devices exist in a family that is represented primarily by
rigid and flexible disks, bubble memories, rewriteable
magneto-optical disks, ferrite cores, and tapes. Remanenceir.
magnetic disks that have ostensibly been erased is a present
concern.
25X1
LOA1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Benefits:
A measure of effectiveness will be established for
sanitization methods. There will be greater assurance that
media do not retain latent data that could be exploited by a
hostile intelligence service.
Policy:
DCID 1/16.
Contact:
Off. Desi;nator/Location: C/ISSG/OS,
Telephone:
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7 ~-`
r: .
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Problem Wuriber
Off ice: OS/ISSG
Title: Tam Der Proof Detection Design for Computer Peripheral
Devices e.g., WANG OIS 250 System New
Problem Description:
Wang 0I$ 250 system hardware is being placed. in domestic ands
overseas locations as part of the CRAFT program. - Although the
CPUs will norms ly be placed in vaulted-and alarmed areas, peri-
pheral devices (e g. printers and terminals) will be -'scattered :_
bjective in designing a tamper proof
the
o
throughout worms areas.:
" ._ .
device is to. reduce the -risk of. hardware nompromise in hostile
rovide
t wi171
ff
p
or
environatexta.. -Successful cepletion of this e
an additional option -to the- current ?reuirement for volutric.:.
alarms .in overseas facilities, with vost savings. The developed
device'should not interfere with normal functions or Cause-
endor
t be
d
v
--no
service, pt?oblems. Further, this device shoul
dependent,. but should be mul ti-functional.
.Time. Requirement:
_Ia
Since the first C:IA. overseas instal tion- of the Wag_.OIS
~
ror
er
t
~
- p
amp
250 system is expected in January 1 ;83,. s ~^Qde3 _-
ibl
e.
device should be developed as soon as poss
Background
Qnts ADP peripheral devices are an--
^
.
mainteace. yL ,",;;Y
devices for alarms at some overseas locations, which would result
in cost savings. it may be advisable to use both tamper proof
devices and volumetric alarm at some overseas. locations. Me
tamper proof devices would be an excellent backup to the
volumetric alarm system in high threat areas.
T- 3e ossible'to substitute tamper proof
z
housing the periphral devices. Thl. w=1. r
-t ~.. 7 ..woaa LA7~A
in
Luc y - -
devices" is i.nstal? ation of volumetric. alarms in the work-. areas -
3 t in a si ;ai
d ~
a
b
large quantities of data which could be captured. Y c
~.II .-. ,
:In. hostile ex
attractive target for other. intelligence _?ser-vices because-- of :the
7 -
t~hni
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152RO01201490006-7
225X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Policy:
DCID 1/16.
Contact-
4
Off. Designator/Location: C/ISSG/OS,
Telephone:
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Iq
Next 2 Page(s) In Document Denied
25X1
25X1
25X1
25X125X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Problem Number:
Office: OS/ISSG.
Title: Computer Firmware Verification
Problem Description:
A major area of concern is the integrity of electronic
components used in the computer systems and networks of the
Agency. Any compromise of system firmware can nullify any
protection provided by software security utilities. The advent
of Large Scale Integrated (LSI) circuits and Very Large Scale
Integrated (VLSI) circuits have permitted powerful computer
systems to be concentrated in single printed boards. Methods
must be developed to verify the integrity of firmware prior to
bringing up classified Agency systems, after maintenance
activities-, and after the installation of new or replacement
components. The methods must be capable, of identifying
unauthorized alteration (i.e., bugs, implants) of circuit
components.
Time Requirements:
This vulnerability potentially exists now and adequate
means of verifying firmware must be developed as soon as
possible.
Background:
LSI and VLSI technologies have facilitated the spread of
powerful distributed computer systems and network. These
technologies could also. provide for the verification of the
physical separation of the respective levels of multilevel
systems-
Firmware verification will increase Office of Security
confidence in trusted computer systems.
Policy: _
DCID 1/16
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
OFFICE: OC
TITLE: Telecommunications Security
PROBLEM DESCRIPTION:
Comprehensive software and firmware design and main-
tenance techniques are needed to prevent unauthorized access
to networks and terminals and to detect unauthorized modifi-
cations. COISEC profiles of new communications systems are
often determined after procurement. This leads to costly
changes to software or firmware and delays in systems
deployment. Solution to this problem would radically reduce
costs of software changes and eliminate delays in system
deployment. Low cost techniques for end-to-end encryption
warrant particular consideration.
COidTACT: - 25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BOl 152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Problem Number:
Office: OS/ISSG
Title: Development of Secure Networks (New)
Problem Description:
With the proliferation of major Intelligence Community
networks and Agency Local Area Networks (LAN) the potential, for
accidental misuse and purposeful abuse of computer services are
increased. Clearance and need-to-know security issues are
.exacerbated with the connecting of various systems and net-
works.. In order to provide sufficiently secure networks, the
following research-and development efforts are recommended:
1. Development of Secure Gateways: Gateway systems of r
varying size-and complexity will be required at nodes on
Intelligence Community networks to serve as security control
monitors. The requirements for a network gateway must be
defined.. At a minimum, the gateways must provide network.
access control, data and service authorization checking, flow
control, and auditing. The design specifications for a gateway
must be provided for a packet. switched environment.
2. Development of Security. Filters. for Local Area
Networks: Similar to gateways, security filters provide a
checking mechanism that authorizes access between subjects
(i.e., users) and objects (i.e., data files) in LANS. The
security filter should contain a data base rules access list
which mediates all access to system resources on LANS.' The
design specification should be compatible with Ethernet-type
networks and other planned LANS in the Agency.
3. ISO 'Mode-1 Development: The International Standards
Organization has developed a seven layered Open Systems Inter-
connection -(OSI) model for communications protocols in computer
networks. The OSI is now an informal standard and provides
guidance to computer vendors and network designees. Research
is needed to determined at which levels security features
(e.g.,access control) should be incorporated into the seven
layer model. - -
Time Requirements:
The development of secure networks. will become increas-
ingly more significant as projects such as the NPIC Development
Program and Mercury progress.
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152 R001201490006-7 -- >-- ---
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Background:
Computer network design projects are now underway and
involve increased involvement of Agency computer systems.
Policy:
DCID 1/16, OMB Circular A-71
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
~b.s a'A t~.s
PHYSICAL SECURITY ( ONGOING )
The physical protection of Agency facilities, personnel and
material is achieved through maintenance of "concentric rings
of defense." Every layer of physical security must be based on
a well established need and implemented with the highest regard
for the user. A major concern that does not appear to have an
immediate comprehensive solution is the prevention of
unauthorized removal of classified material. from Agency
facilities. The problem is far-reaching :in that the material
may be paper(original or a copy), film or magnetic media.
Another physical security issue is pouch protection. Even
though acceptable systems are available now, the possibility of
compromise of these systems dictates that backup systems be
developed for future use.
Candidate' Topics or Projects in priority order
Secure Pouch ( ONGOING )
Document Control / Protection ( ONGOING )
Physical Security General Support C ONGOING )
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85B01152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Iq
Next 1 Page(s) In Document Denied
25X1
25X1
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
Sanitized Copy Approved for Release 2010/01/19: CIA-RDP85BO1152R001201490006-7
i'rOD1er ?Nursber DD-11 OS e . 1 SD
P01ng
Prcbier Description.
are needed a ~ C_ es ~s_ retie=c_
sup or: of phN'sica_ securit 2-C'' ams. LZ"cliia~iOrc o
`OT7! PG7'C.G.L s)rs,-e`1 s Gre also it~~~=: G 17. ~1t: i. _?.: .G. L C'' L -
L F
- G rea tliremeA} .. .
-Lm
This is a needed ongoing
J2 CI.4.,1.012_T?C!?/R
past Drogrars have included a i~,arl.e t survey cC
COi. 1 al'a~_ ._ 1 docu? eft, : a