COMMUNICATIONS SUPPORT PROCESSOR FUNCTIONAL DESCRIPTION MANUAL
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01354R000200270011-9
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
90
Document Creation Date:
December 27, 2016
Document Release Date:
February 13, 2013
Sequence Number:
11
Case Number:
Publication Date:
July 1, 1986
Content Type:
MISC
File:
Attachment | Size |
---|---|
CIA-RDP89B01354R000200270011-9.pdf | 4.67 MB |
Body:
to: Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
COMMUNICATIONS SUPPORT PROCESSOR
(CSP)
FUNCTIONAL DESCRIPTION MANUAL
2-FD-JUL 86-U-2
TR-85-43232-B004
SEPTEMBER 1985
REVISED MARCH-1986
REVISED JULY 1986
Prepared for
Rome Air Development Center
Air Force Systems Command
Griffis AFB, New York
and
Air Force Intelligence Service
Bolling AFB
Washington, D.C.
Prepared Under Contract No. F30602-85-C-0113
by Informatics General Corporation, Bellevue, Nebraska.
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 CIA-RDP89B01354R000200270011-9
as uir albs wra ANTI 1.1 11100 ir
CPCI: CSP SYSTEM DOCUMENT DATE:
DOCUMENT TITLE:
CSP Functional Description
July 1986
AFIS/IND LIBRARY CONTROL NUMBER- 2-FD-JUL86-1J-2
INFORMATICS DOCUMENT CONTROL NUMBER- TR-85-43232-B004
****************************************************
REASON FOR CHANGES TO DOCUMENT-
(I.E., CPR, CCR, SITE SURVEY, ETC.)
CSP RELEASE/UPDATE VERSION NUMBER:
V2.4.5
DOCUMENT MODIFICATION AS FOLLOWS:
NEW DOCUMENT - REPLACES ALL OTHERS SUBMITTED
REVISION WITH CHANGE BARS
X CHANGE PAGES WITH CHANGE BARS
IF REVISION, COMPLETE THE FOLLOWING:
REMOVE
111
INSERT
111
3-10 3-10
3-11 3-11, 3-11.1
3-42 3-42
3-43 3-43
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
i?OV\1111i?rhial'aiglieakill V.I.111.,JiaVa iiikPi."0
CPCI: CSP SYSTEM DOCUMENT DATE: -March. 1986
DOCUMENT TITLE: CSP Functional Description
AFIS/IND LIBRARY CONTROL NUMBER- 2-FD-MAR 86-U-1
INFORMATICS DOCUMENT CONTROL NUMBER- TR-85-43232-B004
****************************************************
REASON FOR CHANGES TO DOCUMENT-
(I.E., CPR, CCR, SITE SURVEY, ETC.)
CSP RELEASE/UPDATE VERSION NUMBER: Y2.4.4
DOCUMENT MODIFICATION AS FOLLOWS:
NEW DOCUMENT - REPLACES ALL OTHERS SUBMITTED
REVISION WATM4MiC4Roxiva
CHANGE PAGES WITH CHANGE BARS
IF REVISION, COMPLETE THE FOLLOWING:
REMOVE INSERT
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
? Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
(
TABLE OF CONTENTS
.PAGE
SECTION 1. INTRODUCTION 1-1
1.1 Purpose 1-1
1.2 Scope 1-1
-1.3 References 1-2
1.3.1 CSP Technichal Documentation 1-2
1.3.1.1 CSP System Overview 1-2
1.3.1.2 CSP System/Subsystem Specification ? 1-2
1.3.1.3 CSP Program Maintenance Manual
(Volumes I, /I, III, and IV) 1-3
1.3.1.4 CSP Program Specification 1-3
1.3.1.5 CSP Configuration Management Plan
(CMP) 1-3
1.3.1.6 CSP Software Quality Assurance
Program Plan 1-3
1.3.1.7 CSP Accreditation/Certification Test
Plan and Procedures 1-4
1.3.1.8 CSP User's Manual 1-4
1.3.1.9 CSP Training Course Outline 1-4
1.3.1.10 CSP Training Material 1-4
1.3.1.11 CSP Computer Operation Manual 1-5
1.3.1.12 CSP Configuration and Installation
Guide 1-5
1.3.2 Other Related Documents 1-5
1.3.2.1 DCAC 370-D175-1 DCA AUTODIN Interface
and Control Criteria UU) 1-5
1.3.2.2 DCAC 370-D195-3, Test and Evaluation
DCA AUTODIN Category III
Certification Test (U) 1-5
1.3.2.3 DoD C5030.58-M, Defense Special
Security Criteria and Tele-
communications Guidance (C) 1-5
1.3.2.4 DIAM 50-3, Physical Security Standards
for Sensitive Compartmented Inform-
tion Facilities (U) 1-5
1.3.2.5 DIAM 50-4, Security of Compartmented
Computer Operations (C) 1-6
1.3.2.6 DIA/RSS-4C letter, 15 May 1979; SCI
TEMPEST Policy and Guidance on
Control of Compromising Emanations
(C) 1-6
1.3.2.7 NACSEM 5100, Compromising Emanations
Laboratory Test Standard Electromag-
netics (C) 1-6
1.3.2.8 aANAP 128, AUTODIN Operating Proc-
^ edures (U) 1-6
1.3.2.9 DSSCS Operating Instruction 102,
Routing Indicators (S-CCO) 1-6
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
PAGE
1.3.2.10 DSSCS Operating Instruction 103,
System/Data Procedures (C) 1-6
1.3.2.11 Allied Communications Publication
117, Routing Indicator Book (U) 1-6
1.3.2.12 Allied Communications Publication
127, Communications Instructions
- Tape Relay (U) 1-6
1.3.2.13 IAS SYSGEN and Startup Guide 1-6
1.3.2.14 IAS EXEC Facilities Reference
Manual 1-7
1.3.2.15 IAS System Management Guide 1-7
1.3.2.16 Teleprocessing Line Controller TLC-
100-6025 (T) Operation Maintenance
Manual 1-7
1.3.2.17 1562 Dual Monitor Terminal Oper-
ator's Manual 1-7
1.3.2.18 Delta Data Manuals related to the
8260T Video Display Terminal 1-7
1.3.2.19 MACRO-11 Reference Manual 1-7
1.3.3 CSP Project Sponsor 1-7
1.3.4 User and Operating Centers 1-7
1.4 Acronyms and Abbreviations 1-8
SECTION 2. SYSTEM OVERVIEW 2-1
2.1 General Description 2-1
2.2 Applications 2-1
2.3 Organizations 2-1
2.3.1 Standard System 2-2
2.3.2 Expanded System 2-2
2.4 Assumptions and Constraints 2-2
SECTION 3. DETAILED CHARACTERISTICS 3-1
3.1 Operational Description 3-1
3.1.1 Definition of Operational Responsi-
bilities 3-1
3.1.2 Skill Level and Training of User
Personnel 3-2
3.1.3 Accuracy/Validity 3-2
3.1.3.1 Reliability 3-2
3.1.3.2 Integrity 3-3
3.1.3.3 Security 3-3
3.1.4 System Usability and Accessability 3-5
3.2 Functional Description 3-5
3.2.1 Communications Interfaces and Char-
acteristics 3-5
3.2.1.1 CSP/AUTODIN 3-6
3.2.1.1.1 Protocol 3-6
3.2.1.1.2 Message Formats 3-7
ii
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
3.2.1.1.3 Message Structures
3.2.1.1.4 References
3.2.1.2 CSP/Other Mode I
3.2.1.2.1 CSP/Modular Architecture for the
PAGE
3-7
3-7
3-7
Exchange of Intelligence (MAXI) .
3-7
3.2.1.2.1.1 Protocol
3-8
3.2.1.2.1.2 Message Formats
3-8
3.2.1.2.1.3 Message Structures
3-8
3.2.1.2.1.4 References
3-8
3.2.1.2.2 CSP/Analyst Support Processor (ASP)
3-8
3.2.1.2.2.1 Protocol
3-8
3.2.1.2.2.2 Message Formats
3-9
3.2.1.2.2.3 Message Structures
3-9
3.2.1.2.2.4 References
3-9
3.2.1.2.3 CSP/CSP
3-9
3.2.1.2.3.1 Protocol
3-9
3.2.1.2.3.2 Message Formats ..
3-9
3.2.1.2.3.3 Message Structures
3-9
3.2.1.2.3.4 References
3-10
3.2.1.2.4 CSP/IGC
3-10
3.2.1.2.4.1 Protocol
3-10
3.2.1.2.4.2 Message Formats
3-10
3.2.1.2.4.3 Message Structures
3-10
3.2.1.2.4.4 References
3-10
3.2.1.3 Mode II
3-10
3.2.1.3.1 Standard (5-level BAUDOT)
3-12
3.2.1.3.2 NSA (ZICON)
3-12
3.2.1.3.3 ASCII
3-12
3.2.1.4 Magnetic Tape
3-13
3.2.1.5 Paper Tape (8-level ASCII)
3-14
3.2.1.6 Card Reader
3-14
3.2.1.7 Line Printer
3-14
3.2.1.7.1 MDP
3-14
3.2.1.7.2 SVP
3-14
3.2.1.7.3 Remote Distribution Printers
3-14
3.2.1.8 Optical Character Reader (OCR)
3-15
3.2.1.9 Communication User Terminal (03-389
or Delta Data)
3-15
3.2.1.10 Message Purge (SCRUB)
3-15
3.2.1.11 Remote Communications Center
3-15
3.2.2 Message Processing
3-16
3.2.2.1 Storage Techniques
3-19
3.2.2.1.1 Disk
3-19
3.2.2.1.1.1 Primary Disk
3-19
3.2.2.1.1.2 Secondary Disk (Optional)
3-19
3.2.2.1.2 Tape
3-20
3.2.2.2 Message Formats
3-20
3.2.2.2.1 DOI-103 and D0I-103C
3-20
111
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
.t Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
PAGE
3.2.2.2.3 JANAP-128 and JANAP-128C 3-22
3.2.2.2.4 JANAP Single Card 3-22
3.2.2.2.5 ACP-127 3-22
3.2.2.2.6 DD-173 3-23
3.2.2.3 Message Structure 3-23
3.2.2.3.1 Straight Record Communication ? 3-23
3.2.2.3.2 Files-11 Structure Files 3-23
3.2.2.4 Format and Structure Validation ? 3-24
3.2.2.4.1 Input 3-24
3.2.2.4.2 Output 3-24
3.2.2.5 Routing and Distribution 3-24
3.2.2.5.1 Routing Indicators Based 3-24
3.2.2.5.1.1 Local 3-24
3.2.2.5.1.2 Derivative 3-25
3.2.2.5.1.3 CARP 3-25
3.2.2.5.1.4 Collective 3-25
3.2.2.6 Classification/Security Categor-
ization 3-25
3.2.2.7 PLA Expansion 3-25
3.2.3 TCC Automation 3-26
3.2.3.1 Message Distribution Position
Support 3-26
3.2.3.1.1 Message Review 3-26
3.2.3.1.2 Dissemination Via Office Symbols ^ 3-27
3.2.3.1.2.1 Fully Automated Routing of
Messages (FARM) 3-27
3.2.3.1.2.2 Light Pen 3-28
3.2.3.1.3 Message Generation 3-28
3.2.3.1.4 Message Recall 3-28
3.2.3.2 Service Supervisor Support 3-29
3.2.3.2.1 Message Editing 3-29
3.2.3.2.2 Message Deletion 3-29
3.2.3.2.3 Message Release Verification/
Authorization 3-29
3.2.3.3 Classification and Security Stamping 3-29
3.2.3.4 Message Interupt 3-30
3.2.3.5 Alternate Routing of Messages 3-31
3.2.3.6 Message Retrievability (Recall) 3-31
3.2.3.6.1 Online (Disk) 3-32
3.2.3.6.2 Offline (History Device (Disk or
Tape)) 3-33
3.2.3.6.3 Parameters 3-33
3.2.3.7 Miscellaneous 3-33
3.2.3.7.1 Come-Back Copy 3-34
3.2.3.7.2 Routing Line Segregation (RIS) 3-34
3.2.4 Statistics and Accountability 3-34
3.2.4.1 General Requirements 3-35
3.2.4.2 Hourly/Daily Statistics 3-35
iv
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.4.3 Station Status
PAGE
1-35
3.2.4.4 Communications History 3-36
3.2.4.5 PLA Historical Usage 3-36
3.2.4.6 Dynamic System Status Display 3-36
3.2.4.7 Audit Trail 3-37
3.2.4.7.1 History File Logging (LOGGEN) ^ ^ 3-37
3.2.4.7.2 Communication Line Logging (LML) ? 3-37
3.2.4.7.3 Message File Logging 3-38
3.2.5 System Security and Access 3-38
3.2.5.1 Input/Output Security for Commun-
ication Lines 3-38
3.2.5.2 System Access 3-39
3.2.5.2.1 User Validation 3-39
3.2.6 System Tables 3-39
3.2.6.1 Routing Indicators and Routing
Segregation 3-40
3.2.6.2 PLA 3-40
3.2.6.3 Dissemination 3-40
3.2.6.3.1 Office Distribution Menus 3-41
3.2.6.3.2 Automatic Routing 3-41
3.2.6.4 User Identification 3-42
3.2.6.5 Security 3-42
3.2.6.5.1 Security Common 3-42
3.2.6.5.2 Circuit Classmarking 3-42
SECTION 4. CONFIGURATION REQUIREMENTS 4-1
4.1 System Architecture 4-1
4.2 Configuration Parameters 4-1
4.2.1 Communication Lines 4-1
4.2.2 System Output Queue 4-3
4.2.3 User Terminals 4-3
4.2.4 System Capabilities 4-4
4.2.5 Optional Routing Characteristics 4-4
4.3 System Installation Options 4-5
SECTION 5. SYSTEM ENVIRONMENT 5-1
5.1 Hardware 5-1
5.1.1 CPU, Memory and System Console 5-1
5.1.2 Mass Storage 5-1
5.1.2.1 Disk 5-1
5.1.2.2 Magnetic Tape 5-3
5.1.3 Communication Interfaces ? 5-3
5.1.3.1 Communication Interfaces 5-3
5.1.3.2 DMC11 5-4
5.1.3.3 Other Interfaces 5-4
5.1.4 .AUTODIN Interface Devices 5-4
5.1.5 Line Printers 5-4
5.1.6 Other Peripherals 5-4
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
PAGE
5.1.6.1 Card Reader
5-4
5.1.6.2 Paper Tape Reader/Punch
5-4
5.1.6.3 Optical Character Reader
5-5
5.1.6.4 User Terminal
5-5
5.1.6.5 VT100/Equivalent
5-5
5.1.6.6 Magnetic Tape
5-5
5.2 Software
5-5
5.2.1 Operating System
5-5
5.2.1.1 Executive
5-6
5.2.1.2 Device Drivers
5-6
5.2.1.3 Constraints
5-6
5.2.2 Development Base
5-7
5.2.2.1 Language
5-7
5.2.2.2 Constraints
5-7
5.2.3 System Organization
5-7
5.2.3.1 Development Mode
5-7
5.2.3.2 Operational Mode
5-8
5.2.4 Software Transfer
5-8
SECTION 6.
MANAGEMENT REQUIREMENTS/SYSTEM DEVELOPMENT
PLAN
6-1
6.1
Accreditation Including the Test Plan
Update
6-1
6.2
Configuration Management (CM)
6-1
6.3
Software Quality Assurance (SQA)
6-3
6.4
Maintenance
6-4
6.5
Updates
6-5
vi
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
LIST OF FIGURES
FIGURE NO.
2-1 CUBIC Baseline CSP .
:PAGE
2-3
2-2
Expanded CSP Example 1
2-4
2-3
Expanded CSP Example 2
2-5
2-4
Expanded CSP Example 3
2-6
3-1
CSP Message Flow
3-17
4-1
CSP Functional Baseline
4-2
5-1
Minimum CSP Hardware Configuration
5-2
vii
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
.t Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 1. INTRODUCTION
This document is the Functional Description for the
Communications Support Processor (CSP). The CSP is a
computer system designed to automate the functions of a
Telecommunications Center (TCC). Its development,
distribution, and maintenance is under the auspices of
AFIS/IND, Bolling Air Force Base, Washington, D.C. CSP is an
element of the Common User's Baseline for the Intelligence
Community (CUBIC). CUBIC serves as a single source for
computer systems designed to automate nearly all phases of
intelligence data handling functions.
1.1 Purpose
This manual serves two functions:
o To provide a complete directory and description of
CSP functionality and services. As such, it may be
viewed as a catalogue of standard and optional
features provided by CSP.
o To aid management level design personnel in the
decision making processing and to properly and
completely evaluate CSP applicability and utility
in proposed installations.
Since this manual is targeted towards design/planning
level personnel, it is presented at a medium level of detail.
This is the second of three documents comprising descriptive
literature on the CSP. The CSP Overview presents the
boradest view of CSP, while the CSP System Design
Specifications presents the most detailed CSP discussion.
Since CSP is an existing system, this manual is presented in
lieu of a Functional Requirements Manual, which normally
precedes system procurement or design and development.
1.2 Scope
This document covers the following aspects of CSP:
o A generic level description of CSP, its usual
applications, and possible adaptations to
specifications user needs.
? A semi-detailed description of all visible
capabilities and functionalities of the system.
1-1
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
0 0 A description of environment, both hardware and
. software, which can be directly translated into a
- procurement list.
o Discussion of the operational requirement of a CSP
installation, including operator/user staffing,
program maintenance, and management levels.
1.3 References
The following documentation is referred to in this
manual or serves as an alternative source of information
concerning various aspects of CSP design operation,
maintenance, or procurement. The publications listed below
have been prepared, whenever applicable, in accordance with
DOD Standard 7935.1-S (Automated Data System Documentation
Standards).
1.3.1 CSP Techncial Documentation
These documents, previously developed, directly refer to
CSP. They are available through official channels from
AFIS/IND.
1.3.1.1 CSP System Overview
Author/Source - Informatics General Corporation
Reference Number - TR-83-43110-07
Date - May 1983/Revised October 1984, March 1985 and
May 1985
Security Classification - UNCLASSIFIED
The overview of the CSP is intended for use by
management and systems personnel who require knowledge of its
philosophy, background and capabilities. It provides a
synopsis of CSP origins and objectives, status of CSP
capabilities, system design and architecture, and future
enhancements.
1.3.1.2 CSP System/Subsystem Design Specification
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-A004
Date - August 1985/Revised March 1986
Security Classification - UNCLASSIFIED
This document provides a detailed definition of CSP
functions and interfaces with other systems and subsystems.
?
1-2
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
1.3.1.3 CSP Program Maintenance Manual (Volumes I, II, III
and IV)
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-B015
Date - January 1986/Revised March 1986
Security Classification - UNCLASSIFIED
These documents provide detailed program descriptions of
all CSP modules and information on the maintenance of these
modules. They are technical in nature; designed for
personnel responsible for the maintenance of computer
programs.
1.3.1.4 CSP Program Specification
Author/Source - Informatics General Corporation
Reference Number - TR-83-43110-13
Baturitgaelaspifi86XlemiseUNELABEIHEB
This document describes the program design in sufficient
detail to permit program production by the programmer/coder.
1.3.1.5 CSP Configuration Management Plan (CMP)
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-A009
Date - Revised March 1986
Security Classification - UNCLASSIFIED
This document specifies procedures for the achievement
of CUBIC configuration management for the subset of all CSP
software developed, disseminated, and/or maintained under the
CUBIC Management Program.
1.3.1.6 CSP Software Quality Assurance Program Plan
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-B017
Date - September 1985/Revised December 1985
Security Classification - UNCLASSIFIED
This document identifies requirements and procedures for
CSP software quality assurance.
1-3
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200276011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
1.3.1.7 CSP Accreditation/certification Test Plan and
Procedures Manual
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-A008
Date - August 1985
Security Classification - UNCLASSIFIED
This document is used to plan and conduct tests to
satisfy both the AUTODIN Category III requirements of DCAC
370-D195-3, June 29, 1981, and the security and
telecommunications accreditation requirements of DoD
C5030.58-M for the CSP system in a stand-alone or front-end
environment.
1.3.1.8 CSP User's Manual
Author/Source - Informatics General Corporation
Reference Number - TR-86-43232-B007
Date - August 1985/Revised March 1986
Security Classification - UNCLASSIFIED
This
messages
necessary
1.3.1.9
manual provides the user's non-ADP communications
distribution personnel with the information
to effectively use the CSP system.
CSP Training Course Outline
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-A012
Date - December 1985/Revised March 1986
Security Classification - UNCLASSIFIED
This outline contains a general slide presentation
the CSP system and a training scenario which attempts
simulate any possible problems which may occur.
1.3.1.10 cSP Training Material
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-A013
Security Classification - UNCLASSIFIED
Consisting of the following manuals:
General Overview
Date - December 1985/Revised March 1986
For Communication User
Date - December 1985/Revised March 1986
For Computer Operation
Date - December 1985/Revised March 1986
1-4
of
to
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Computer Operation Reference Guide
Date - December 1985/Revised March 1986
1.3.1.11 CSP Computer Operation Manual
Author/Source - Informatics General Corporation
Reference Number - TR-85-43232-8014
Date - November 1985
Security Classification - UNCLASSIFIED
1.3.1.12 CSP Configuration and Installation Guide
Author/Source - Informatics General Corporation
Reference Number - TR-43232-8000
Date - November 1985
Security Classification - UNCLASSIFIED
1.3.2 Other Related Documents
These manuals or documents provide supportive literature
concerning the CSP. They may be obtained from the agency or
organization indicated.
1.3.2.1 DCAC 370-D175-1 DCS AUTODIN Interface and Control
Criteria (U)
DCS procedures for the control of data interchange
between interconnected elements of DCS AUTODIN.
1.3.2.2 DCAC 370-D195-3, Test and Evaluation DCA AUTODIN
Category III Certification Test (U)
DCS
Category
1.3.2.3
policy, guidance and procedures
III certification tests
DOD C5030.58-M, Defense Special
and Telecommunications Guidance
Accreditation criteria for the CSP.
for the conduct of
Security Criteria
(C)
1.3.2.4 DIAM 50-3, Physical Security Standards for
Sensitive Compartmented Information Facilities (U)
?
Physical security requirements for facility
accreditation.
?
1-5
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
1.3.2.5
DIM! 50-4, Security Compartmented Computer
Operations (C)
Guidance and requirements for accreditation of backside
ADP systems.
1.3.2.6 .DIA/R88-4C letter, 15 Kay 1979; SC! TEMPEST Policy
- and Guidance on Control of Compromising Emanations
(C)
TEMPEST requirements for SCI facilities.
1.3.2.7 NACSEM 5100, Compromising Emanations Laboratory
Test Standard Electromagnetics (C)
Engineering criteria and standards for TEMPEST.
1.3.2.8 JANAP 128, AUTODIN Operating Procedures (U)?
Formats and procedures to be used in preparing and
processing GENSER messages.
1.3.2.9 DSSCS Operating Instruction 102, Routing Indicators
(8-CCO)
RIs, TCCs, etc. for all DSSCS tributaries.
1.3.2.10 DSSC8 Operating Instruction 103, System/Data
Procedures (C)
Formats and procedures to be used in preparing and
processing DSSCS messages.
1.3.2.11 Allied Communications Publication 117, Routing
Indicator Book (U)
GENSER routing indicators for all tributaries.
1.3.2.12 Allied Communications Publication 127,
Communications Instructions - Tape Relay (V)
General operating procedures for telecommunications
centers.
1.3.2.13 IAS SYSGEN and Startup Guide
Digital Equipment Corporation, Order AA-2519D-TC.
1-6
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
1.3.2.14 IAS EXEC Facilities Reference Manual
Digital Equipment Corporation, Order AA-H005A-TC.
1.3.2.15 IAS System Management Guide
Digital Equipment Corporation, Order AA-2520D-TC.
1.3.2.16 Teleprocessing Line Controller TLC-100-6025 (T)
Operation Maintenance Manual
1.3.2.17 1562 Dual Monitor Terminal Operator's Manual
Sperry Univac PX12323 (U).
1.3.2.18 Delta Data Manuals Related to the 8260T Video
Display Terminal
Delta Data Systems Corporation.
1.3.2.19 MACRO-11 Reference Manual
1.3.3 CSP Project Sponsor
?The CSP project development, distribution and
maintenance is under the auspices of AFIS/IND, Bolling Air
Force Base, Washington, D.C.
AFIS/IND is the management authority for all CSP
activities and, as such, is the single point of contact for
further information concerning CSP. Inquiries regarding this
manual, or any other aspects of CSP, should be directed to
them.
In addition, RADC (Rome Air Development Center),
Griffiss Air Force Base, New York, is a join sponsor of the
CSP project. RADC is involved in the following areas of CSP:
contracting, procurement, technical engineering, security
clearance billets, and administrative support for document
review.
1.3.4 User and Operating Centers
The following is a list of CSP Operating Centers
users):
AFIS - Bolling AFB, Washington, D.C.
CINCPAC - Camp Smith, HI (USA)
DIA - Washington, D.C.
EUCOM - AIDES - Stuttgart, GE (USA)
FSTC - Charlottesville, VA (USAF)
1-7
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
FTD - Wright-Patterson AFB, OH (USAF)
JSOC - Fort Bragg, NC (USA)
LANTCOM - Norfolk, VA (USA)
MAC - Scott AFB, IL (USAF)
NAVINTCOM - Suitland, MD (USA)
NORAD/SPACECOM - Colorado Springs, CO (USAF)
NOSC - San Diego, CA (USA)
NPIC - Washington, D.C.
REDCOM - MacDill, AFB, FL (USAF)
SAC - Offutt AFB, NE (USAF)
TAC - Langley AFB, VA (USAF)
TCATA - Fort Hood, TX (USA)
TFC - GE (USAF) ?
TREDS - Metro Tango, GE (USAF)
USAFE COIC - Ramstein AB, GE (USA?)
USAREUR - Heidelberg, 'GE (USA)
USAFE OSC Ramstein AB, GE (USAF)
U.S. Treasury - Washington, D.C.
1.4 Acronyms and Abbreviations
The following is a list of acronyms and abbreviations
used in this document:
???
ACP Allied Communications Publication
ADP Automatics Data Processing
ADPS Automatic Data Processing System
APIS Air Force Intelligence Service
AIG Address Indicator Group
Altroute Alternate Message Routing
AMPE Automated Message Process Exchange
AMPSSO AMPE System Security Officier
AN/GYQ-21(V) DOD nomenclature for DEC PDP-11 based systems
ASC AUTODIN Switching Center
ASCII American Standard Code for Information Interchange
ASP Analyst Support Processor
AUTODIN Automatic Digital Network
BAUDOT Code for transmission of date in which five equal-
length bits represent one character (BAUD).
BR-1569 Bunker Ramo Multiplexer
9-1731 Bunker Ramo Multiplexer
CI Command, Control; Communications and Intelligence
CARP Contingency Alternate Routing Plan
CDSN Channel Designator and Sequence Number
CIC Content Indicatot Code
CID Communications Itplementation Directive
CINCPAC Commander-ih-Chief Pacific
CM Configuration Management
CMB Configuration Management Board
CMP Configuration Management Plan
CMS Configuration Management System
1-8
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
COMP COMParison every thirty minutes of Mode. II AUTODIN line
CPU Central Processing Unit
CRC Cyclical Redundancy Code
CRITICOM Critical Intelligence Communications
CRT Cathode Ray Tube
CSN Channel Sequence Number
CSP Communications Support Processor
CT Communications Technician
CUBIC Common User's Baseline for the Intelligence
Community
DAG DSSCS Address Group
DAN Disk Address Group
DCA Defense Communications Agency
DDCMP Digital Data Communications Message Protocol
DDI Delivery Destination Indicator
DEC Digital Equipment Corporation
DECNET Digital Equipment Corporation Network
Delta Data 8260T Viedo Display Terminal
DIA Defense Intelligence Agency
DIAM Defense Intelligence Agency Memorandum
DoD Department of Defense
DoDIIS Department of Defense Intelligence Information
Systems
DSAP Data Systems Automation Program
DSSCS Defense Special Security Communications System
DTO Data Time Group
EBDIC Extended Binary Coded Decimal Interchange Code
EOF End of File
EOM End of Message
ETX End of Text
EUCOM European Command
FARM Fully Automated Routing of Messages
FDMP Full Duplex Message Protocol
FSTC Foreign Science and Technology Center
FTD Foreign Technology Division
GENSER General Service
NOSC Naval Ocean Systems Center
NPIC National Photographic Interpretations Center
NSA National Security Agency
NES NMIC Support System
OCR Optical Character Reader
OISE; Operational Intelligence Support System
0J-389-(V)/G DOD nomenclature for the Sperry-Univac 1652
Dual Scren Terminal
OM Operator's Manual
ORI Originating Routing Indicator
OSRI Originating Station Routing Indicator
PACOM Pacific Command
PAD Pointer and Descriptor
PCL11 Parallel Communications Link (DEC)
PLA Plain Language Addressing
1-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
PMM Program Maintenance Manual
QA Quality Assurance
RADAY Radio Day
RADC Rome Air Development Center
RDP Remote Distribution Printer
REDCOM Readiness Command
RI Routing Indicator
RLS Routing Line Segregation
RMS-11 IAS Record Management Services
ROM Read Only Memory
SAC Strategic Air Command
SAO Strategic Activities Office
SI Special Intelligence
SPECAT Special Category
SPINTCOM Special Intelligence Communications
SQA Software Quality Assurance
SSB Standard Software Bass
BSN Station Serial Number
SSO Special Security Office
SVC Service Clerk
SVP Service Printer
TAC Tactical Air Command
TCATA TRADOC Combined Arms Test Activity
TCC Telecommunications Center
TEMPEST Control of Compromising Emanations
TPC Tactical Fusion Controller
TLC .Telecommunications Line Controller
TOR Time of Receipt
TOT Time of Transmission
TRADOC Training and Doctrine Comm
TREDS Tactical Reconnaissance Exploitation and
Demonstration System
USAF United States Air Force
USAFE COIC United States Air Force Europe Combat
Operations Intelligence Center
USAREUR United Sates Army Europe
USAFE OSC United States Air Force Europe Operational Support
Center
USN United States Navy
USS User Support System
VFK Variable Function Key
ZICON Zone of Interior Comm Network
1-10
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
' Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 2. SYSTEM OVERVIEW
This section briefly describes the CSP and the
applications for which it is intended.
2.1 General Description
CSP can best be described as a collection of application
and system level computer programs, designed to execute as a
coordinated system, for the express purpose of store and
forward operations on record copy message traffic. While
there are many ancillary functions of CSP (all of which will
be covered subsequently), its primary task consists of
reception of message traffic, validation of proper format,
determination of required routing, and finally, delivery to
the intended recipient.
In and of itself, CSP is merely a message management
system. Stripped of all ancillary processing, CSP is a
system which reliably moves data from one point to another.
It is this ancillary software, however, that defines the
characteristics of the data being moved, and what operations
are performed along the way.
2.2 Applications
By virtue of DCA Category III and DoD 5030-58M
guidelines, CSP is accredited to operate as an AMPE system
for automation of telecommunications centers. Common
examples of CSP environments are Air Force SSO TCCs or Navy
SPINTCOM facilities. In its simplest form, CSP serves as an
AUTODIN interface for an ASC tributary. Here CSP is
responsible for reception, routing, and delivery of incoming
traffic, as well as the validation and transmission of
outgoing traffic. CSP may also serve in the capacity of a
dual home NARC, acting as a relay to other automated or non-
automated backside tributaries in addition to serving the
local TCC.
2.3 Organization
The following paragraphs discuss the organization of CSP
with respect to areas of application. Refer to the
referenced figures as an aid in visualizing potential
installations and applications.
2-1
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
2.3.1 Standard System
Common to all CSP installations is the standard system.
This is the minimum configuration required to support the
CUBIC baseline CSP. Figure 2-1 depicts this baseline system
at the organizational level. Automation of the TCC is at a
minimal level. While this configuration is possible only in
a small communications center, it is important to note that
system capability, throughput, etc., is the same as that of
the largest possible installation.
Volume and frequency of CSP message traffic is
completely site dependent and varies greatly between CSP
installations. Current traffic volumes in the range of 2000
to 3000 messages per day appear to be average although
several sites have reported fluctuations well above this
range. CSP has consistently exhibited the ability to handle
large fluctations in message trafic with no sign of system
degradation. ?
The standard system consists of a basic AN/GYQ-21(V)
system with the following components: CPU, memory (a minimum
of 256 KW), system console, tape drives (as required), two 80
MB disk drives line printer, appropriate communications
interfaces, Analytics TLC-100 or equivalent, and one or more
Univac 1652 (0J-389) dual screen and/or Delta Data 8260T
terminals. Software for the standard system includes the IAS
V3.2 operating system and the CUBIC CSP baseline package.
Section 5 provides a complete description of these
components.
2.3.2 Expanded System
Figures 2-2 through 2-4 detail other feasible
configurations for the CSP. Installations have a great deal
of flexibility in defining the communications interfaces and
functional characteristics of the system supporting them. In
most cases, CSP reconfiguration or expansion, using baseline
modules, does not require a programming effort. Such
modifications are made by altering system tables.
2.4 Assumptions and Constraints
Two identified areas which may place constraints on the
user are budget limitations and the operational environment.
To receive the full benefit of the proposed system, disk
should be considered as the media for CSP message storage.
Operational environment constraints are in two areas:
hardware (processor) constraints, and software (operating
system) constraints. The processor places constraints on
system processing time (throughput) while the operating
2-2
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
TCC (AFSSO or Equivalent)
Disk
Storage.
CSP
CPU Components
Distribution
Printer
Tape
Drives
USER
Terminals
R/Y
Over-the-Counter
Delivery of Incoming
Message Traffic in Hardcopy
Form to.TCC Customers
R Y
< >
? R/Y
Hardcopy
?
ASC
AUTODIN Switching
Center
Mode I Continuous
Tributary Circuit
300-2400 Baud
Over-the-Counter
TCC Customer Delivery
of Outgoing Message Traffic
'Figure 2-1 CUBIC Baseline CSP
Paper Tape Mag-Tape
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Paper Tape
Hardcopy
Electrical Delivery
To/Prom Pony-Circuit
TTY or Equivalent.
ZICON Circuit
to NSA
Electrical Delivery
To/From TCC Customer
Host Computer
Hardcopy
\./
Over-the-Counter
Delivery/Reception
To/From TCC Customer
Paper Tape Mag-Tape
Figure 2-2 Expanded CSP Example 1
-0
-0
0
CD
ASC 1
0-. -
Mode I Continuous
7o,
MARC Circuit GY
. 300-2400 Baud
m-
cn
? -
n)
n.)
o.)- ??
? ?
?
ASC 2
0
Mode I Continuous -o
co
MARC Circuit ?
0J ? ? ?
300- 2400 Baud o
?
cn
? ?
7) ?
o ?
o
n.)
o
o
? :
o ? .
8
CD
-n
CD
(T)
Remoted Printers
in TCC Customer
n.) Ares(s)
CA)
n.)
C)
co
0J
CA)
01
0
0
0
n.)
n.) .
0
CD -
co
?
Over-the-Counter
Delivery/Reception
To/From TCC Customer
Hardcopy
Paper Tape
Mag-Tape
Figure 2-3 Expanded CSP Example 2 .
ASC 1
ASC 2
TCC Customer
Host
System
,?-?????
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Local/Remote
Comm or
Database
System
Remote
Distribution
Processor 1.
Up to 32 Channels
?
?
Host CSP
Remote
Distribution
Processor 2
Up to 32 Channels
\[\
Figure 2-4 Expanded CSP Example 3
ASC 1
ASC 2,
Remote
Distribution
Processor 8
Up to 32 Channels
' Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
system limits the type of communications interface devices
which the system may utilize. That is, input/output speed is
constrained due to slow interface devices, but the Use of
advanced communications interface devices is restricted
because of the operating system. It should also be noted
that the CSP software system is only as secure as the
operating system on which it is dependent. In this context,
the operating system will place some constraints on total
system security.
2-7
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 3. DETAILED CHARACTERISTICS
This section presents a detailed description of each of
the operational and functional characteristics of the CSP.
3.1 Operational Description
Prior to the discussion of actual system functionality,
it is helpful to define the CSP in terms of its users in the
operational environment. The following paragraphs describe a
typical CSP environment.
3.1.1 Definition of Operational Responsibilities
As stated earlier, CSP automates a telecommunications
center. Within the TCC there are several functions to be
performed, regardless of the mechanisms used. Each TCC must
be staffed with at least two persons; a distribution clerk
and an administrative clerk. The distribution Clerk is
responsible for review and dissemination of incoming traffic,
as well as the preparation and review of outgoing traffic.
The administrative clerk audits traffic and verifies the
accuracy and validity of the TCC floor activities (often
referred to as Traffic and Analysis). A supervisor must also
be available to deal with special case traffic and
situations. The supervisor may regularly perform the
distribution or administrative clerk functions, eliminating
the need for a third person. Operation of the equipment may
be accomplished by these personnel, or a separate staff
member may be given this responsibility.
These same functions have been incorporated into CSP for
purposes of operation and use. There are three main
positions defined for CSP operation; each has a general work
station. For primary system operation and control, CSP
requires a computer operator. This individual is responsible
for all aspects of hardware initialization and operation;
control of operations such as communication lines;
maintenance of system status such as history tapes, system
statistics operations, etc.
The second CSP position is the message distribution
function. This function is responsible for the review and
dissemination of traffic received from AUTODIN, as well as
preparing traffic intended for transmission to AUTODIN. Many
of the CSP capabilities are primarily directed at
facilitating the job of the message distribution function.
3-1
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
The System Supervisor is the third CSP position. While
this position is, in some respects, an ixtension of the
message distribution function, the primary function .of the
system supervisor is to provide CSP with a definition of
responsibility for functions which CSP cannot perform
automatically or autonomously (such as message deletion).
Individuals who properly identify themselves to the CSP as
system -supervisors are granted certain privileges not
available to the message distribution function.
3.1.2 Skill Level and Training of User Personnel
The CSP does not require its users to be experienced in
data processing concepts or programming, nor does it require
experience in computer operations. Persons designated as CSP
users are expected to hae training in normal SSO TCC
procedures. This usually means persons with Air Force
Specialty Codes 291/295 or USN "CT" ratings. These
individuals should be fully versed in communications
procedures, operation of the equipment normally found in the
TCC environment, and the rules and regulations regarding the
handling of SI/SAO material.
The CSP user interface is designed with consideration of
the training of the 4918 and the terminology which has
evolved in the TCC environment. CSP is operator friendly; it
does not force the user to learn a confusing "data
processing" type of language. All commands use a syntax
familiar to communicators. Experience has shown that
communications personnel adapt to CSP much faster than those
with only data processing backgrounds.
3.1.3 Accuracy/Validity
The CSP has been designed in strict accordance with
accepted quality assurance standards and guidelines. This
controlled environment of software design and development
ensures that the CSP processes message traffic with extreme
accuracy and validity. This is apparent in terms of the
proven reliability, integrity, security, and maintainability
of the CSP software.
3.1.3.1 Reliability
Several aspects of system operation attest to the
reliability of the CSP. Messages are received and
transmitted over all communication lines, with full
accountability under all traffic loading situations. Under
extreme saturation conditions, the input lines are
3-2
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
automatically shut down, in an orderly fashion, while the
output lines are allowed to reduce the queued messages within
the system. ?
During the actual processing of a message, each message
is subjected to rigorous format validation, which
consistently ensures that the format is complete and proper.
Any messages found with format errors are rejected by CSP and
sent to the designated remote office service position for
manual review and correction by the communications supervisor
of the remote office.
If unexpected error occur during reception or
transmission of messages, due to hardware or line problems,
CSP will protect the message it was processing. If
transmission was in progress, the entire message will be
retransmitted when the problem is corrected. If reception
was in progress, the message will not be acknowledged, so the
sender will know to retransmit the message.
3.1.3.2 Integrity
The CSP system leaves a well established audit trail and
maintains strict accountability for all messages processed by
the system. This is accomplished by dual recording of each
message processing state on the primary message file disk and
the redundant device (secondary message file disk and or
history tape). Thanks to this mechanism, CSP has never lost
a message as a result of software or hardware failure, where
proper operator action was taken.
The integrity of the CSP software is apparent in the
handling of error (and other unexpected) conditions. Aborted
software is a very rare condition.
3.1.3.3 Security
The security protection afforded the messages within CSP
is achieved through many security practices. As a
stand-alone system, the CSP does not prohibit access to the
message file by the system manager; but only messages
processed by a remote office are available to that remote
office. However, it is necessary to enforce at all levels,
strict security procedures on the operation o! the CSP.
Prior to the operational acceptance of the CSP, the
facility in which it is located must be formally accredited
by DIA for a security level commensurate with the highest
classification of the information processed by the system.
The facility requirements for DIA accreditation are contained
in DIAM 50-3 and the appropriate military department security
3-3
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
regulations. DIAM 50-4 contains guidance on accrediting
backside ADP systems. Care must be exercised in installing
the CSP in the accredited area to minimize the possibility of
inadvertent exposure of classified material to uncleared
personnel. All printers, system consoles, MDC and SVC
terminals, and operator work stations must be placed away
from doors and message delivery windows which open into areas
of lesser classification. The overall physical configuration
of the facility and system will be considered when granting
security accreditation to the CSP.
In addition to the facility accreditation described
above, the site must be granted a format TEMPEST
accreditation by DIA prior to operational acceptance of the
CSP. This is to ensure that the hardware installation
complies with existing red/black engineering criteria, and
the equipment itself does not emanate compromising signals
beyond the physical control zone established for the
facility.
All personnel who operate the CSP on a daily basis or
who are permanently assigned to the facility must be cleared
and indoctrinated for all security levels processed by the
system. All other personnel, who are not appropriately
cleared or indoctrinated but require periodic or one-time
access to the facility, must be properly escorted. It is
incumbent upon each person assigned to the facility to
understand their responsibilities for safeguarding the
classified material residing in and produced by the CSP.
Final security accreditation is contingent upon strict
enforcement of personnel security policies.
This combination of physical, TEMPEST, and personnel
security prevents unauthorized access to the CSP. However,
an additional level of security is required within the CSP
software, to ensure the proper protection of the data within
the CSP and to prevent unauthorized transmission of messages
over uncleared communication lines.
For each message received or transmitted by the CSP, an
input or output security check is performed, ensuring that
the particular receive or transmit line is authorized to pass
that level of traffic. This is determined by scanning Format
Line 12 and extracting all classifications, codewords,
caveats, and compartments and comparing them to the
codewords, caveats, etc. allowed for the communications line.
Any mismatches encountered cause the message to be placed on
the supervisor queue, who takes appropriate action. This
process allows the accreditation of the CSP for concurrent
processing of. DSSCS and GENSER messages, since the
appropriate level of protection for each is guaranteed.
3-4
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.1.4 System Usability and Accessibility
CSP is designed with a table-driven architecture. As
such, site-unique and remote office unique configurability
can be achieved easily by modification of a few key tables
defining system lines and queues. All operational system
tables including routing indicators, office symbols user
identifications, routing line segregation criteria, and line
security parameters are maintained by updating a data file
and running an online program. This method provides a
simple, reliable, and effective means of updating parameters
requiring frequent modifications. From a user's standpoint,
therefore, the system configuration can be readily changed
without software modification.
3.2 Functional Description
The following paragraphs present an itemized summary of
CSP functionalities. Many of the functions are optional and
are activated as necessitated by user requirements.
3.2.1 Communications Interfaces and Characteristics
For the most part, any given CSP installation is unique
by virtue of the communications circuits to which it is
connected. The distributed baseline system contains a
library of interface software modules (referred to as
"gateways"), any of which may be selected for configuration.
Usually, inclusion of an interface requires only that the
circuit equipment be in place and that it have the
characteristics indicated below. Individual sites have
control over the line names, security level, and routing to
any particular line. Detailed configuration information is
presented in Section 4 and the CSP Configuration and
Installation Guide.
Paragraph 3.2.1.1 describes the AUTODIN Mode I interface
and paragraph 3.2.1.2 describes other Mode I interfaces.
Each of the Mode I interface descriptions is presented in the
following fashion: 1) a general overview of the interface; 2)
the protocol (if any) used for actual communiation (e.g.,
DDCMP, Bisync, AUTODIN, etc.); 3) allowable message formats
over the circuit, such as JANAP-128, DOI-103, etc. (see
paragraph 3.2.2.2 for a description of supported formats);
4) the message structure which may be handled over the
circuit (see paragraph 3.2.2.3 for a description of supported
structures); and 5) DoD or other non-CSP documentation of
supportive or 'descriptive information about the interface.
Paragraph 3.2.1.3 deals specifically with Mode II circuits.
These lines do not have automatic accountability and rely on
3-5
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
' Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
human intervention for accuracy and continuity Verification.
'Finally, paragraphs 3.2.1.4 through 3.2.1.9 describe
interfaces which are neither Mode I nor Mode II specifically,
but for which accuracy and continuity are factors of CSP
techniques and hardware capabilities.
The current CSP system is configured to allow a maximum
of 64 output queues. Communications lines must be connected
to an operating queue to function in the CSP environment.
Although system queues such as SVC, MDC, etc., do not utilize
communications lines, they do require queues. With the 64
queue limitation, it is still possible to use up all
available queues.
3.2.1.1 CSP/AUTODIN
AUTODIN is the primary means by which CSP provides
access to/from other communications facilities world-wide.
AUTODIN consists of a network of switching centers (ASCs)
within the United States and overseas which provide
multiple-path message traffic delivery between individual DoD
communication facilities. There are several levels of
interface to a particular ASC and, depending upon the nature
of a given facility, more than one ASC.
There are two levels of ASC interfaces, which cover most
CSP installations. The first is as a simple tributary
circuit. In this case, CSP is connected to one ASC and
generally serves as the final destination for message
traffic. The second level is a dual-homed non-AUTODIN relay
center (NARC). Here, CSP is connected to two ASCs and
provides relay services to backside communication centers or
host systems. Aside from the physical connections to the
ASCs, the only difference with respect to the CSP is in the
nature of the routing indicators used; this is a function of
proper table set-up (see paragraph 3.2.6.1).
3.2.1.1.1 Protocol
The CSP communicates with an ASC as a Mode I,
synchronous tributary in continuous mode. The character set
is ASCII and the baud rate may be set from 300 to 2400 buad.
The protocol is AUTODIN Mode I as defined in DCAC 370-D175-1.
This protocol generally provides for transmission of message
traffic in segments of 80 character lineblocks, framed by
appropriate control characters.
To alleviAte the overhead of blocking/deblocking
messages, the CSP relies on a pre-processor, such as the
Analytics TLC-100 (or equivalent). This device performs
several functions which simplify the interface. The
3-6
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
significant function in this application is
blocking/deblocking and conversion from synchronous (to the
ASC) to asynchronous (to the CSP). This pre-processor-may be
connected to the CSP using the BR-1569/1731 or other
asynchronous interface devices such as the DEC DV11.
3.2.1.1.2 Message Formats
The AUTODIN interface may be used to transfer the
following message formats:
o DOI-103M (old DOI-100)
o DOI-103 (narrative and data pattern)
o JANAP-128 (narrative and data pattern)
o JANAP single card
3.2.1.1.3 Message Structures
This interface supports only record copy structure.
Allowable variations within this structure are indicated by
Language Media Format codes (LMFs). By definition, CSP is an
ASCII tributary, or NARC. It may receive data from the ASC
in either fixed-length record blocks (LMFs A- and T) or
variable length (LMFD). At this time CSP may transmit only
fixed-length record blocks (LMFs A and C).
3.2.1.1.4 References
AUTODIN protocol and message formats are described in
paragraph 1.3.2.1.
3.2.1.2 CSP/Other Mode I
In addition to AUTODIN, CSP supports a number of other
Mode I interfaces; in all cases they are computer-to-computer
circuits.
3.2.1.2.1 CSP/Modular Architecture for the Exchange of
Intelligence (MAXI)
MAXI is another element in the CUBIC family of computer
systems sponsored by AFIS/IND. Its primary purpose is
automating intelligence data handling processes within
various installations. MAXI is capable of performing the
AUTODIN communicatiohs functions provided by CSP, but many
installations warrant utilization of CSP as a front-end
communications processor due to the extent of other non-MAXI
traffic handling requirements.
3-7
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.1.2.1.1 Protocol
CSP communicates with MAXI in much the same fashion as
with AUTODIN. The major differences between the MAXI
interface and the AUTODIN interface are that MAXI has an
asynchronous interface level. This difference eliminates the
need for the pre-processor used in the CSP/AUTODIN interface.
The CSP/MAXI interface is implemented via the Western
Union PTC port of the BR-1569/1731. AUTODIN Mode I protocol
is used and the character set is ASCII. The gateway which
interfaces MAXI is a slightly modified version of the AUTODIN
gateway; the modifications involve the connect/disconnect
protocol between the two systems. All other interface
aspects closely follow those of the AUTODIN interface.
3.2.1.2.1.2 Message Formats
The CSP/MAXI interface may be used to transfer the
following types of messages:
o DOI-103 (narrative and card)
o JANAP-128 (narrative and card)
3.2.1.2.1.3 Message Structures
CSP and MAXI communicate in record copy structure only.
3.2.1.2.1.4 References
Consult AFIS/IND for technical documentation concerning
MAXI. Paragraph 1.3.2.1 provides information concerning
AUTODIN protocols, although it cannot be used for specific
information concerning this interface.
3.2.1.2.2 CSP/Analyst Support Processor (ASP)
The ASP is another type of intelligence data handling
system. This system is part of the Strategic Air Command
IDHS system and serves a similar function as MAXI. While the
ASP is not generally available, the interface to it from the
CSP is generic (rather than ASP specific) in nature, thus
providing users with an optional interface to another system
using this specific protocol.
3.2.1.2.2.1 Protocol
The CSP communicates with the ASP using DDCMP link level
protocol. The communication link terminates in a BR-
1569/1731 port configured to support the DDCMP discipline.
Operation is in synchronous mode using ASCII 8-bit data at up
3-8
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
to 9600 baud. The message protocol is the Full Duplex
Message Protocol (FDMP) which controls- the flow and
accountability of message blocks.
3.2.1.2.2.2 Message Formats
The ASP interface may be used to transfer all CSP
supported message formats (see paragraph 3.2.2.2).
3.2.1.2.2.3 Message Structures
This interface supports only record copy structure.
3.2.1.2.2.4 References
ASP documentation may be obtained from the SAC OISS
program.
3.2.1.2.3 CSP/CSP
The CSP provides an interface which supports message
traffic between the CSP and other CSP or CSP-like systems.
3.2.1.2.3.1 , Protocol
The interface to other CSP/CSP-like systems uses a
synchronous line in a DEC DV11. DDCMP line discipline is
used to establish and maintain the logical communication path
for controlled transfer of data between the CSP and other
CSP/CSP-like systems. Data characters are 7-bit ASCII and
may be transmitted/received at line speeds up to 9600 baud.
Transmit/receive operations are controlled separately by
the CSP gateway and may be operated independently of each
other.
3.2.1.2. 3.2 Message Formats
This interface will handle all CSP supported message
formats (see paragraph 3.2.2.2).
3.2.1.2.3.3 Message Structures
The CSP communicates with other CSP/CSP-like systems in
record copy structure.
3-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
3.2.1.2.3.4 References
Information on DDCMP protocol and interface
specifications is available from Digital Equipment
Corporation in the form of the Digital Data Communications
Message Protocol Specification (March 1, 1978).
3.2.1.2.4 CSP/IGC
The Message Support System (MSS) implemented at PACOM
Data Systems Center at Camp H. M. Smith, Hawaii relies on
Intercomputer Communications (IGC) software to provide both
interprocessor communications among functional task groups
residing in separate physical processors and intraprocessor
communications among functional task groups residing in the
same physical processor. The CSP/IGC interface requires
communications between separate processors.
3.2.1.2.4.1 Protocol
The MSS IGC contains code to support task-to-task
protocols, processor-to-processor protocols and code to drive
the DEC Parallel Communications Link (PCL11) connecting two
processors via a half-duplex data transfer channel. Data may
be transferred at rates up to 1000K/second.
3.2.1.2.4.2 Message Formats
The CSP/ICC interface will handle all CSP supported
message formats (see paragraph 3.2.2.2).
3.2.1.2.4.3 Message Structures
The CSP communicates with the ICC software via Files-11
structured files. Each message is placed in a single Files-
11 file, with or without ancillary information (banner
stamps, etc.) and transferred as a whole unit.
3.2.1.2.4.4 References
Information on the PCL11 maya be obtained from Digital
Equipment Corporation. ICC interface information may be
obtained from PACOM Data Systems Center, Camp H.M. Smith,
Hawaii.
3.2.1.3 Mode II
CSP interfaces a variety of Mode II communication type
devices. Such devices are incapable of acknowledging receipt
of message reception, nor can they receive acknowledgement
from CSP on message transmission. Additionally, there are
3-10
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
no provisions for automatic error control. Therefore, the
verification of continuous and accurate message transfer
becomes a critical and rather time consuming function of the
operations personnel. Due to the critical nature of this
situation, the automatic service message generator was
developed. Continuous operation is verified by means of a
unique three character Channel Designator associated with a
three character Sequence number, assigned and delivered with
each message. This, together with a start of message
function makes up the first line of the message (often
referred to as the "TI" line or Format Line 1), which is
transmitted immediately prior to Format Line 2 of each
message. With the aid of the automatic service message
generator, the "TI" line is scanned for the proper Channel
ID/Sequence number. Should an inconsistency be found, the
appropriate service message will be built and submitted to
CSP for delivery to the appropriate addressee. The operators
also visually scan the entire message to ensure accuracy of
the data, as no automatic means to do this exists (e.g.,
block parity, CRC, etc).
For messages received by CSP from a Mode II tributary,
CSP verifies the continuity of the Channel Sequence number
and identifies inconsistencies in the Channel Designator.
Appropriate operator messages are issued under these
circumstances and necessary operator controls are provided,
as needed, to alter or reset the sequence. For messages
transmitted to a Mode II tributary, CSP automatically applies
the proper Channel Designator and Sequence number. Again,
appropriate operator controls are provided to alter or reset
the CSN.
Another feature of CSP, unique to Mode II lines, is the
handling of 30 minute COMP messages. These messages are
essentially self-addressed test messages generated by a
tributary and sent to CSP for the purpose of channel
connectivity verification. CSP receives these messages and,
depending on their routing, sends them back to the
originator, providing verification that the circuit is valid.
CSP maintains timers for these messages, on a circuit by
circuit basis, and notifies the operator of missing or late
COMP messages.
Finally, one of the most important functions of the CSP
with respect to Mode II tributaries is the proper
acknowledgment of Flash (or higher) messages. Upon receipt
of a Flash/Critic/Emergency message from a tributary, CSP
responds by transmitting an acknowledgment message to the
tributary. If the circuit is receive only, CSP sends the
acknowledgment to the system supervisor, but only as an
informational notice. For transmission of Flash (or higher)
3-11
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
to a tributary, CSP requires that an acknowlegment message be
sent by the tributary within 10 minutes. Non-receipt of this
acknowledgment within the prescribed period of time results
in operator notification, causing a retransmittal.
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.1.3.1 Standard (8-Level BAUDOT)
The Mode II (BAUDOT) communications pseudo handler
provides the interface between application tasks (or
gateways) and the communications driver (Mode II interface)
for Mode II (BAUDOT) lines.
The most common type of Mode I/ interface for CSP is the
5-level or BUADOT paper tape equipment found in most TCCs.
Often this is the Teletype KSR-28; normally this device is
interfaced via a BR-1569/1731 multiplexer, using the BAUDOT-
CR protocol ROM (Refer to Bunker Ramo Document #MS600-8U11,
September 1981).
it can also be interfaced to a DV11 communications
driver. These interfaces are able to convert BAUDOT to ASCII
to BAUDOT for transmit. They are also able to recognize and
cause a software interrupt on receipt of the "EOM" sequence
(LF, LF, NNNN).
3.2.1.3.2 NSA (ZICON)
This is a special case of the standard BAUDOT Mode II
circuit described above.
For proper operation of a Mode II circuit to NSA
(ZICON), a different BR-1569/1731 ROM must be used,
specifically the "ZICON" ROM or the BAUDOT-CR ROM. It is
modified for ZICON use and known as the SAC BAUDOT-CR ROM.
The special characteristics of the ROM deal primarily with
the handling of Shift-In (SI) and Shift-Out (SO) characters,
to which the NSA equipment is sensitive. Use of something
other than the BR-1569/1731 for such an interface can be
accomplished with minor software changes.
One other characteristic, pertaining only to an NSA
circuit, is the necessity for CSP to recognize and properly
time a five-minute line check transmitted by NSA. This check
amounts to the CID, CSN of the pre-empted by a normal
message. CSP recognizes these pre-emptions and reports non-
receipt of a message to the system operator. No further
action is required.
3.2.1.3.3 ASCII
CSP is also capable of communicating with ASCII Mode II
tributaries. All the characters described above apply,
except that the interface device need not perform character
conversion, ana upon reception must be able to generate a
software interrupt on the EOM function, an ASCII ETX, or some
other standard end of file function.
3-12
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Typical interface examples are the use of a Teletype
MOD-40 with the BR-1569/1731 ASCII-MOD-40 ROM or, for
transmit (from CSP) only, a DEC LA-180 printer driven via
DL11 interface. For practical purposes, any device selected
for use as a receive (to CSP) device must have paper tape,
cassette tape, or floppy disk capability for temporary
storage .of the complete message, as character-by-character
keyboard input of a message (while possible) is extremely
difficult to perform accurately and rapidly enough to satisfy
CSP timing requirements. This usually precludes use of such
terminals as DEC VT-100s, or the equivalent, unless they are
equipped as described above.
3.21.4 Magnetic Tape
The CSP has a limited purpose magnetic tape
receive/transmit capability. Its primary purpose is to serve
as an alternate method of data transfer between .CSP and
another system in the event of primary direct electrical link
failure, but it certainly can be used for data transfer in
other situations. This capability is totally separate from
the intercept tape capability (if used) explained elsewhere.
CSP produces magnetic tapes in 9-track, 800 BPI, ASCII,
odd parity format, with no labels. Messages are written to
tape beginning with Format Line 2 and ending with the normal
Format Line 16. Multiple messages may be written to tape
with single end-of-file (EOF) marks bet3een messages and a
double EOF after all the messages. The record is fixed
length, user selectable, and normally 80 characters. Thus
the data pattern (LMF "C") messages are evenly blocked on
tape and are card image. Narrative messages are also
blocked, with full blocks written for all records except the
last, which is variable length. End-of-line functions
(carriage control) are included.
For receive, much the same applies except that variable-
length records may be written (up to 512 characters); and
there is no requirement for the single EOF between messages,
although it may be present.
Any number of receive/transmit magnetic tape lines may
be configured into the CSP (subject to the system
capabilities described in Section 5). Normally, regardless
of the number of mag-tape sources, only one receive line is
required. There should be one transmit line for each
different blocking factor required. Also, there should be
one transmit line if segregation of traffic (i.e., DSSCS vs.
GENSER) is required to separate users.
3-13
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
In the future, CSP will be upgraded to handle variable-
length (LMF "D" and "B") magnetic tape formats.
3.2.1.6 Paper Tape (8-Level ASCII)
The CSP supports a paper tape reader/punch as an
optional feature. Messages are processed via an 8-level
paper tape, as well as Mode II BAUDOT paper tape support. A
DEC PC11 or an equivalent reader/punch is used.
3.2.1.6 Card Reader
Message input via a card reader is supported by the CSP:
this is an optional feature. The card reader may also be
used for table updates, if the tables are not maintained via
disk files. The DEC CR11, or its equivalent, is used.
3.2.1.7 Line Printer
The CSP supports three types of line printers: the
Message Distribution Printer (MDP), the Service Printer
(SVP), and Remote Distribution Printer (RDP). The functions
of each line printer are described in the following
paragraphs. The functions of the Message Distribution
Printer and the Remote Distribution Printer are basically the
same, while the Service Printer functions in an entirely
different capacity.
3.2.1.7.1 MDP
The Message Distribution Printer prints message traffic
according to the standard message distribution format. This
includes page numbering (at the top of every page) and
classification banner stamping (at the top and bottom of
every page). The remote distribution printer processes
traffic in much the same manner.
3.2.1.7.2 SVP
Unlike the MDP, the Service Printer does not process
pre-formatted messages. Messages with incorrect formats, or
some other type of error, can be directed to the Service
Printer. The print-outsare then brought to the attention of
the Service Supervisor who is responsible for correcting the
messages and resubmitting them to the system.
3.2.1.7.3 Remote Distribution Printers
The system has the capability to print message traffic,
in Message Distriabution Printer format, at remote printers.
This format includes classification banner stamping at the
3-14
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
top and bottom of each page, and page numbers at the top of
each page. The systemn provides the optional capability of
adding channel designation and sequence numbers to messages
printed on a Message Distribution Printer.
3.2.1.8 Optical Character Reader (OCR)
The CSP has the capability to interface an OCR, allowing
messages to be inputted, without retyping, directly into the
system. The OCR scans a typed DD Form 173, prepared by a TCC
user, and sends this message to the Plain Language Address
elements to communication routing indicators and converts the
message to the appropriate format; JANAP 128 or DOI 103.
In addition to this conversion capability, the CSP
allows interfacing of a "smart" OCR, which converts to the
proper message format in the scanner itself, before the
message enters the CSP software.
3.2.1.9 Communication User Terminal (03-389 or Delta Data)
The CSP provides the communication user with the ability
to generate a message at a terminal and subsequently
introduce that message into the system. This capability
permits generation of fully formatted, as well as DD-173
formatted messages. Additionally, the system provides the
optional capability to require message release authorization
by the Service Supervisor before allowing transmission to the
ASC. The system also allows the optional ability to print
messages at either the Service or Message Distribution
Printer.
3.2.1.10 Message Purge (SCRUB)
The online message file purge capability (SCRUB) gives
the CSP System Manager the capability to flag an inactive
message to prevent online recall and/or the means to over-
write the text of a message to prevent inadvertent disclosure
of the text.
3.2.1.11 Remote Communications Center
The Remote Communications Center (Remote Office)
capability gives the appearance of creating multiple TCCs by
breaking the existing TCC, and through the use of multiple
user terminals (i.e., 0J-389s or Delta Data 82608), into two
or more separate centers. This allows each TCC to function
as a completely separate support entity, without additional
hardware/software. This is particularly useful when one TCC
is required to iupport multiple users.
a 15
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.2 Message Processing
Message flow for the CSP (as shown in Figure 3-1). is as
follows:
o Message lineblocks are collected and stored on the
? primary disk and a redundant media (secondary disk
and/or magnetic tape) via input gateways. When the
complete message is in CSP, the gateway notifies
System Control (File Manager).
o File Manager makes necessary records of the new
message, and, when satisfied it has positive
control, passes acknowledgment back to gateway
signifying CSP acceptance of responsibility. The
gateway now passes acknowledgment back to the
transmitting station (in the case of Mode I). CSP
now owns the message.
o The first processing state for all messages
regardless of the source is Format Check. The File
Manager passes control to the Format Check module.
? Format Check has several validation functions:
- Message syntax
- Security categorization, (classification,
compartment, codewords, caveats, TCC and LMF).
- Input security check (to ensure that the input
line is authorized to receive a particular
security level)
- Routing (Routing Indicators)
o The next state is output queue determination. File
Manager passes control to the Queue Manager which
looks at the routing determined by Format Check and
queues the message appropriately. If the message
has errors (syntax or security), then regardless of
where the message was officially routed, it is sent
to the service supervisor queue for supervisor
action. If no errors are found, the message will
be sent to one or more of the following modules:
- Terminal Operations - user terminal queue
(i.e., message distribution or service
hupervisor) for review and dissemination.
3-16
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270.011-9
* AUTODIN
o MAXI ,
O MDC/SVC
* MAC-TAPE
O CARD ,
o mnor. II
LOCAL REMOTE
o OCR
O PLA
O ETC
..-Irk.rkonn"..?Pourryo-,ketr.CIkut.,,*.:?.1k?!\?11?A..ork....?Pk?VTI,...tm
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
lurnat Ct.tI
Hunt III)I. Ivrik Plat Ion
S.??tu it v cur 'rat Jun
Input Securit y Check
Autowatic Dissemination
Output Process
Cont roi
A
CM'
System Control
MI* Manager
Figure 3-1 CSP Message Flow
.....,./V
o ALOODIN
0 11,01
0 DAC -TAPE
o MODE 11
LOCAL .
SLIME '
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
O ETC
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
- PLA - If the input form of the kessage was
DD173, then the message must be expanded.
Note that PLA is a special case 'here.
It has a queue, but PLA is not really an
output process. For simplicity, it is treated
like an output gateway; but, in fact, PLA
will take the message, reformat it, and enter
the revised message as a new one.
- Auto-Dissemination - To a large extent, Auto-
Dissemination can be viewed as an alternative
to Terminal Operations; messages reaching this
module are automatically routed and
disseminated.
o When these operations are complete, additional
dissemination information is stored in the
permanent status record and the message is returned
to the Queue Manager for further distribution.
o The message now moves to the output process control
state where it awaits transmission. Note that the
message may be sent directly to output process
control from Format Check if the message is
derivatively routed.
o As the appropriate transmission line becomes
available, the Queue Manager passes the message to
the output gateway, which has three major
responsibilities:
- Performs an output security check to
ensure that the line is cleared for the
message.
- Performs routing line segregation to
strip routing indicators from the messages
which do not apply to this particular line.
- Transmits the message.
o Following successful transmission and receipt of
acknowledgment from the receiving station, the
gateway passes the acknowledgment status back to
-the Queue Manager, which updates the permanent
status record to reflect successful transmission.
o When the message is successfully sent to all
intended addressees, the Queue Manager returns
control to the File Manager,which marks the message
inactive.
3-18
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
The following paragraphs describe significant components
of this process in detail.
3.2.2.1 Storage Techniques
CSP utilizes two different recording media in order to
accomplish message storage, disk and/or magnetic tape. While
disk storage is straight forward, tape storage can take one
of three possible forms.
The dual disk capability provides the CSP user with the
option of utilizing a second disk (dual disk) as a redundant
message recording media. Redundant message recording can be
accomplished through the use of a second disk (dual disk)
only, history tape only, or via dual disk and history tape.
The dual disk redundant message recording capability will
greatly improve the speed of all storage media reads and
writes.
3.2.2.1.1 Disk
CSP message storage uses a primary message file disk and
optionally a secondary disk for redundant recording.
Messages stored on disk are stored in a message file
which conforms to Files-11 format for disk I/O operations.
The size of the message file is directly contingent upon the
amount of free space on the primary disk. For example, with
20,000 blocks of free space on the primary disk, a message
file up to 20,000 blocks in length may be created on both
disks.
3.2.2.1.1.1 Primary Disk
The primary message file disk must be utilized for CSP
operations. All message traffic and processing status
information is recorded in the message file. The primary
disk can also be utilized as the intercept device in place of
tape.
3.2.2.1.1.2 Secondary Disk (Optional)
The secondary disk optionally contains the redundant
message file which will be a morror image of the primary disk
message file and function in the same manner of recording and
updating message traffic and record data. If a secondary
disk message file is used, it can be the only redundant media
or can be used in conjunction with the history tape.
3-19
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.2.1.2 Tape
Tape storage can occur in one of three fashions;
history, intercept, and output magnetic (mag) tape. All
three types store messages in ASCII format, at a density of
800 BPI. History and intercept tapes are blocked at 512
bytes per block, while output mag-tapes are unblocked.
History tapes are labeled; output mag-tape is not labeled;
and intercept tape may either be labeled or not labeled.
Messages on output magnetic and intercept tapes are separated
by a file marker between each message. On all three types of
tape, two consecutive file markers indicate the end of the
tape
3.2.2.2 Message Formats
Seven types of message formats are authorized. The
particular format is determined by Format Line 2 of the
message.
3.2.2.2.1 D01-103 and DOI-103C
Message formats for the DOI-103 (narrative) and the DOI-
103C (card) differ in several ways. The most notable
difference is that two carriage returns and one line feed are
found at the end of every line of the D01-103 (narrative)
format; this does not occur in the card format. The
following paragraphs describe the formats of D01-103 and DOI-
103C, noting any differnces.
If the message is "piloted", Format Line 1 contains
"pilot" information. The pilot information appears as the
first line of the message and may contain lines with formats
similar to Format Lines 2, 4, and 4a. Since piloted data
takes precedence over non-piloted data, the data in
succeeding Format Lines 2, 4, and 4a is ignored if a pilot
line of that format has already been processed. These lines
will, however, be validated for the proper format.
If the pilot is for a suspected duplicate message,
character positions 5-8 of the first line of the pilot (the
Format Line 2 pilot line) contain the characters "KZFDY". In
this case, character positions 29-33, rather than containing
the security ("-") and the four-character security field (as
in a normal Format Line 2), will contain a space and four
alpha characters. The security sentinel and security field
then follow immediately, in character positions 34-38.
For other ? types of pilots, the first pilot line is
identical in format to Format Line 2. As stated above, other
pilot lines duplicating the formats of Format Lines 4 and 4a
3-20
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
' Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
may follow the first pilot lines. If present, the Format
Line 4 pilot line contains (in character positions 10-13) a
space, followed by a three-letter code starting with "Z".
These are accounted for in Format Check.
If a Format Line 4 pilot line is present, characters 7-9
of this pilot "ZNY" line (which constitute a TCC) are saved
for comparison with the TCC in the succeeding Format Line 4.
If the TCCs do not match, an error condition is noted.
Except for the considerations described above,
individual pilot lines are handled exactly as the Format
Lines described below.
The remaining Format Lines are verified in accordance
with the guidelines found in D01-103. Individual Format
Lines are fully defined in that manual. The only variation
of this format is that CSP requires Format Line 12 to
immediately follow Format Line 11. The CSP requries Format
Lines 2, 4, 11, 15 and 16 to be present and letter perfect.
Format Lines 4a and 5 are required to be letter perfect, if
they are present. Format Lines 6 and 7 are processed, if
recognized, but are not required to be letter perfect.
3.2.2.2.2 DOI-103M
If the message is "piloted", Format Line I may contain
"pilot" information. The pilot information will appear as
the first message line and may contain lines duplicating
Format Lines 2, 3, 4, and 4a. Since piloted data takes
precedence over non-piloted data, the data in Format Lines 2,
3, 4, and 4a is ignored if a pilot line of that format has
already been processed.
In all cases, characters 7 through 9 of any pilot "ZNY"
line (constituting a TCC) are saved for comparison with the
TCC in the succeeding Format Line 4. If the TCCs do not
match, an error condition is noted. Aside from the above
considerations, the individual pilot lines are handled
exactly as their counterparts.
The remaining Format Lines are verified in accordance
with the guidelines found in D01-103. Individual Format
Lines are fully defined in that manual. The only variation
of this format is that CSP requires Format Line 12 to
immediately follow Format Line 11. The CSP requires Format
Linesw 2, 3, 4, 11, 15 and 16 to be present and letter
perfect. Format Lines 4a and 5 are required to be letter
perfect, if they are present. Format Lines 6 and 7 are
processed, if recognized, but are not required to be letter
perfect.
3-21
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R00020027001,1-9
3.2.2.2.3 JANAP -128 and JANAP -128C
Message foramts for JANAP-128 (narrative) and JANAP-128C
(card) differ in several ways. The most notable difference
is that the two carriage returns and line feed found at the
end of every line of the NANAP-128 (narrative) format do not
occur in- the card format. The following paragraphs describe
the formats of JANAP-128 and JANAP-128C, noting the
differences.
If the message is "piloted", Format Line I may contain
"pilot" information. In this case, the pilot information
appears as the first line of the message. The pilot may
contain lines duplicating Format Line 2. Since piloted data
takes precedence over non-piloted data, the data in Format
Line 2 will be ignored if a pilot line of that format has
already been processed. These lines will, however, still be
checked for the proper format.
If the pilot line is present in JANAP-128, the character
positions 5 through 8 of this line contain the four character
content indicator code (CIC). In both formats, character
positions 29 through 33, rather than containing the security
sentinel ("=") and the four character security field, contain
a space and four alpha characters. The security sentinel and
the security field follow in character positions 34-38.
Except for the considerations just mentioned, the pilot
line is handled exactly as its counterpart, Format Line 2.
The remaining Format Lines are verified in accordance
with the guidelines found in JANAP-128. Individual Format
Lines are fully defined in that manual. The only variation
of this format is that CSP requires Format Line 12 to
immediately follow Format Line 11. The CSP requires Foramt
Lines 2, 4, 11, 15 and 16 to be present and letter perfect.
Format Line 5 is required ato be letter perfect, if present.
Format Lines 6 and 7 are processed if recognized, but are not
required to be letter perfect.
3.2.2.2.4 JANAP Single Card
The format of the JANAP single Card message is fully
defined in JANAP-128.
3.2.2.2.5 ACP-127
ACP-127 iea single message format. It will be used to
send GENSER messages. This format will be used to transfer
messages over a tape relay in narrative form. The format
3-22
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
lines of an ACP-127 message will be verified accdrding to the
guidelines found in the ACP-127 manual. Individual format
lines are defined in that manual.
3.2.2.2.6 DD-173
DD-173 formatted messages should be prepared in
accordance with standard DD-173 message preparation
procedures. CSP requires the inclusion of "QQQQ" on a
separate line following the classification line to indicate
termination of security information. An end of message
sequence, "NNNN", is also required by CSP to designate
completion of message input. The end of message (EOM)
sequence may be typed on the message form by the preparer or
may be appended by the CSP operator at the time of
transmission. ,
3.2.2.3 Message Structure
The CSP message structures define and limit the
interface mechanisms for CSP. A backside interface wishing
to communicate with CSP must do so either in straight record
communications format or by Files-11 transfer. The following
paragraphs describe these methods of message manipulation.
3.2.2.3.1 Straight Record Communication
The most common fashion in which CSP communicates with
external interfaces (AUTODIN, backside tributaries, etc.) is
in record communications format. The CSP transfers messages
on a lineblock by lineblock basis. The message, whole or
otherwise, is neither stored in a temporary file, nor is it
enveloped in "CSP-added" information (such as banner stamps,
distribution markings, audit trail) prior to or during
transfer. The first transferred information concerning a
given message is Format Line 2 (or Fpormat Line 1 in the case
of Mode II). The last transferred information concerning a
given message is the EOM sequence (Format Line 16); no other
information is transferred, except for protocol information
such as control characters, checksum characters, etc. which
are necessary for communications link establishment and
maintenance.
3.2.2.3.2 Files-11 Structures Files
The second technique by which CSP transfers message
traffic is via DEC Files-11 structures files. A messagelin
its entirety, is placed in a single Files-11 file, with or
without ancillary information (banner stamps, etc.) and
transferred as a whole unit by whatever means selected for
file transfer (DECNET, mag-tape, ICC, etc.).
3-23
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.2.4 Format and Structure Validation
All messages entering the CSP system are checked for
proper formatting and cons istnecy of message integrity.
3.2.2.4.1 Input
Proper format and structure of the message are ensured
by testing and comparing each Format Line within the message
against tables and predefined values. Message consistency is
determined by comparison of Format Lines to each other.
3.2.2.4.2 Output
Any message found with a descrepancy is flagged with the
proper error message, sent to the supervisor review queue for
correction, and re-entered into the system. After a message
has passed format validation, it is assigned 'to the
appropriate queue.
3.2.2.5 Routing and Distribution
CSP routing and distribution mechansims are described in
the following paragraphs.
3.2.2.5.1 Routing Indicator Based
The originating station has the responsibility for
selecting Routing Indicators for the communication facility
serving the addressee.
In determining message distribution, a scan is done of
the Routing Indicators contained in Format Line 2 of the
message. The Routing Indicators found are checked against a
system table for routing assignments. The CSP system can
handle several types of routing indicators; each is described
below.
3.2.2.5.1.1 Local
Routing and distribution of a message is determined by
the Routing Indicators located in Format Line 2. The first
four characters of a GENSER message and the first six of a
DSSCS message indicate which communication facility receives
the message. When the CSP system receives a message,
verification is made to ensure the destination is correct.
If the message is misrouted, proper action is taken.
3-24
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.2.5.1.2 Derivative
Derivative distribution is a way for the CSP to further
process the Routing Indicators. A system table is defined
with respect to the derivative Routing Indicators. As a
match is found, the message is routed to the appropriate
queue.
3.2.2.5.1.3 CARP
The Contingency Alternate Routing Program (CARP)
provides automatic alternate routng of a message. This
capability is very useful in the event of system failure or
to alleviate backlogs of traffic.
3.2.2.5.1.4 Collective
Collective Routing Indicators allow the operator to
route a message to a group of addressees using Only one
specified Routing Indicator. Single Routing Indicators may
be used in conjunction with collective indicators.
3.2.2.6 Classification/security Categorization
Categorization of traffic ensures the proper handling of
messages. Through the use of the security tables, the system
can .identify the classification/security of the message.
Processing the traffic through the security tables
categorizes the message based on classification, transmission
control codes, caveats, and compartments. This makes it
possible to check the message security level against the
security level of any given communication line.
3.2.2.7 PLA Expansion
The Plain Language Addressing (PLA) function allows
messages submitted in DD 173 format to be processed as
regular narrative traffic. This is done by actually creating
a new message in either DSSCS or GENSER format from the one
submitted in OCR format. The CSP message file is used to
store both the DD 173 message and the new narrative form
after conversion.
Prior to converting the DD 173 message to narrative
format, each header line in the DD 173 is validated to ensure
that an entire message has been received, all the pages have
been received in order, and all the required fields contain
appropriate data.
3-25
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Conversion operations consist of validation; expansion,
and copying activities. Each field in the DD 173 header line
is translated into the appropriate format for a narrative
message. Plain Language Addresses on the DD 173 are replaced
in the narrative message by Routing Indicators (RIs) obtained
from a table lookup operation. An unlimited number of PLAs
are supported, each of which may contain over 200 characters.
Address Indicator Groups (AIGs) and DSSCS Address Groups
(DAGs) are assigned Routing Indicators in a similar fashion,
with special provisions made for exemptions. GENSER messages
are paged and sectioned when necessary.
Any errors, discovered during the validation and
expansion process cause the DD 173 to be routed to the SVC
for operator action. Once all PLA processing has been
successfully completed, the expanded message is returned to
the File Manager which processes it as a new message, using
standard CSP procedures.
3.2.3 TCC Automation
This section details CSP functionality in areas directly
facilitating TCC operations. These functions cover
operations which, prior to a CSP installation, are of a
manual nature or could be considered operator aids. Items
addressed in this section apply primarily to the Message
Distribution Position and System Supervisor positions of the
CSP (see paragraph 3.1.1).
3.2.3.1 Message Distribution Position Support
There are four major tasks performed by the Message
Distribution Position on CSP: message review, message
dissemination, message generation, and message recall.
Related CSP functions are discussed below.
3.2.3.1.1 Message Review
In most installations, the majority of traffic received
byt CSP from AUTODIN requires some level of operator review,
primarily for the purpose of dissemination determination.
Each site has developed criteria covering how dissemination
is to be done. While the criteria may differ for each site,
the basic operator funciton is the same; a visual scan of the
message is made to identify key fields used for
dissemination.
CSP supports this function by providing one or more CRT
terminals and terminal-related functions, which allow an
Message Distribution Position operator to selectively review
3-26
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
f
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
messages requiring dissemination, page forward, or backward
through a message, and determine the criteria upon which to
base dissemination.
These messages are maintained on a priority-ordered
queue, allowing the Message Distribution Position to review
and disseminate the highest priority traffic first, deferring
lower priority traffic until later. If a message with Flash
(or higher) precedence is placed on the queue while review of
a lower priority message is in progress, the operator is
notified via an (audible and visual) alarm. The alarm is
cleared and the highest priority message reviewede. Once
done, the Message Distribution Position returns to the lower
priority traffic. Further aspects of the review function are
discussed in the following paragraphs to the extent that
review is involved in subsequent Message Distribution
Position activities.
3.2.3.1.2 Dissemination Via Office Symbols
Message review is the first step in message delivery to
the intended addressee. The next step, dissemination, is
generally performed during the review process. There are two
procedures by which the Message Distribution Position
operator may effect dissemination. The first is semi-
automatic, while the second is entirely manual. Both may be
used interchangeably, depending on operator preference.
3.2.3.1.2.1 Fully Automated Routing of Messages (FARM)
Fully Automated Routing of Messages (FARM) automates the
Message Distribution Clerk function. For selected messages,
FARM will scan the message heading and the first ten lines of
text. Key message elements (classification, codewords,
caveats, precedence, privacy/passing instructions, OP
signals, 0 signals, pilots, content indicator code,
addressees, DDIs, subject and keywords/phrases in the first
10 lines of text) are then compared against a set of data
base tables and a set of office symbols are assigned for
delivery. The data base tables specify both the intended and
allowed recipients of the message according to site
requirements. After recipient office codes have been
selected, system data structures are updated in the same
manner as for manually selected routing. The message is then
placed in the system output queues corresponding to the
recipients and delivered automatically.
?
3-27
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9 ?
3.2.3.1.2.2 Light Pen
To allow operators complete manual control of the
message dissemination function, CSP provides two related
capabilities. Using the features of the dual screen Univac
1652 (03-389 or Delta Data 8260T) terminal described in
Section 5, the operator is presented with a menu of all the
disseminees served by the TCC faciliuty. During message
review, disseminees are selected by using the light pen (03-
389) to touch the CRT on or near the required disseminee
symbol or highlighting the required disseminee symbol
(8260T). The CSP will then assign the disseminee to the
message. Copy count information is appended, but may be
modified as needed. If selected in error, previously
assigned diseminees may be removed.
The menu may be updated at any time during system
operation. In the event that the menu is not current, (i.e.,
a new disseminee has been identified) operators may tanually
type the undefined disseminee symbol and copy count into the
terminal command buffer; CSP will then transfer it to the
current message.
3.2.3.1.3 Message Generation
Outgoing messages are prepared on the MDC terminal using
standard text entry and editing features of the terminal.
Operators have the option of preparing messages from scratch
or selecting oine of several pre-formatted message skeletons
and filling in the required fields. After preparation and
prior to transmission, the message is reviewed and corrected.
Transmission effected aby VFK depression and the message is
subjected to format checking, security validation, etc.; and
then, as an option, it is queued to the sytem supervisor
position for release authorization. This provides complete
control over preparation and transmission of outgoing
traffic.
Messages prepared on the temrinal may either be fully
formatted (in narrative or data pattern) or in DD-173 format.
In the latter case, the message is subjected to PLA expansion
(see paragraph 3.2.2.7) and queued to the SVC for release
authorization.
3.2.3.1.4 Message Recall
Users can also perform message recall functions from
their terminals; the recalled traffic is either returned to
the terminal for subsequent processing or retransmitted.
Specific recall capabilities are detailed in paragraph
3.2.3.6.
3-28
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
' Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.3.2 Service Supervisor Support
The system provides additional capabilities to the
Service Supervisor. Appropriate validation is performed to
ensure that only users with Service Supervisor privileges can
perform the following functions: message editing, message
deletion and message release authorization/verification.
3.2.3.2.1 Message Editing
The Service Supervisor has the capability to edit an
existing message and reintroduce it into the system as a new
message. The editing functions include, but are not limited
to: line deletion, character deletion, word deletion,
character modifications, and new line insertion. The system
provides the optional capability to print the edited message
on the Service or Message Distribution Printer.
3.2.3.2.2 Message Deletion
The Service Supervisor has the capability to delete a
message from the service queue. An audit trail capability is
provided; it. includes the user's intials and time of
deletion. The system provides an optional capability to
print the deleted message on the Service or Message
Distribution Printer.
3.2.3.2.3 Message Release Verification/Authorization
One of the Service Supervisor's responsibilities is to
review certain messages prior to their transmission to
AUTODIN. This capability applies to all messages received
over input line flagged as requiring release authorization.
An audit trail capability is provided, consisting of the
user's initial and time of authorization.
3.2.3.3 classification and Security Stamping
When a message is processed, the security tables are
searched for the appropriate classification, caveats,
codewords, and compartments. As the classification items are
found, the appropriate information in the PAD record of the
message is set. If hard copies of the message traffic are
provided via local or remote distribution printers, the
classification information for each message is contained in
the message PAD record. The gateway, handling the printers,
accesses this information andproduces a classification banner
on the top and bottom of each message page. The class
stamping capability replaces manual procedures, which are
extremely time consuming.
3-29
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9 -
3.2.3.4 Message Intercept
The ability to hold traffic for periods of time for
subsequent processing provides operator flexibility in
running the TCC. There are many situations in which an
operator may decide to defer processing until a later time;
CSP provides the tools for such deferred processing. CSP is
a store-and-forward system and geared for real-time
distribution of traffic; however, it is inefficient to keep
large amounts of traffic active in the system for long
periods of time. Aside from using dynamic system resources,
a system failure rendering the online message file unusable
at the time of high utility increases the users workload in
recovering traffic from backup sources.
The intercept function of CSP provides a convenient
method for fast, temporary of storage of message traffic
which, for several reasons, is not immediately processed by
the system. The intercept function also acts to drain the
system of active traffic, in the event of scheduled or
unscheduled shutdowns. Traffic destined for one or more
particular tributaries may be alternatively routed to the
intercept device (disk or tape) and held until such time as
reintroduction to the CSP is desired. This action might be
taken in the event a backside host system is down for a
period of time and the user does not wish to hold the traffic
active, tying up system resources.
Traffic altrouted from a particular output tributary
queue(s) to the intercept device (disk or tape) returns to
the original queue(s) upon reintroduction into the system.
Message retrieval from the intercept device is possible
by selecting a block of messages, selecting by precedence, or
selecting by the queue to which the message was originally
routed. For example, a user may retrieve all FLASH
precedence traffic which was originally routed to the SVC
queue.
The intercept tape itself has a special format, intended
for use solely by CSP. Sites requiring mag-tape level
communication should look at the general-purpose magnetic
tape capability rather than intercept, as significant
security-related problems arise when attempting to use
intercept as a means of external communication.
The actual process of intercepting traffic is straight
forward. The desired queues are altrouted to the intercept
queue, and the line is turned on. Traffic currently on queue
and all subsequent traffic placed on any of the altrouted
3-30
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
_
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
queues is transferred to the intercept. device. This
condition remains in force until it is suspended by the
system operator. When the intercept device is closed, a
summary log is made detailing what traffic was placed on the
device. For re-introduction, the operator suspends the
altroutes and turns the recieve intercept line on, specifying
that one or more of the messages on intercept device is to be
read in.- Messages may be read in one by one, in groups, or
by the entire file/tape.
Intercepting is also useful in "draining" the system
when preparing for a shutdown, in system swap or to replace
the message file disk if, for some reason, it is suspected to
be unreliable. In this case, the intercept serves as a fast
technique for protecting active traffic.
3.2.3.5 Alternate Routing of Messages
The CSP operator can redirect message traffic from one
output queue to another. This .is necessary if circuit
outages and hardware difficulties cause device
unavailability; it also allows for downloading of all (or
selected) traffic to the intercept queue prior to a system
shutdown. Not all CSP queues are allowed altroute
privileges; there are a specified subset of queues to which
an authorized queue may be altrouted. This order is
specified and controlled by a CSP system table. Once
effedted, traffic continues to be redirected until the
altroute action is negated by a suspend altroute activity for
the queue involved. A system shutdown followed aby a cold
start also negates altroute assignments. However, altroute
assignments remain in effect if a normal system shutdown is
followed by a restart.
3.2.3.6 Message Retrievability (Recall)
CSP provides message recall capability from CSP-
formatted disk files (online) or CSP-formatted hsitory
devices, disk or tape (offline).
The online operation is limited to retrieval of CSP
messages still existing on the CSP primary disk message file,
allowing fast message retrieval. An added features of this
operation is the capability to recall CSP messages, in an
of mode, from an offline CSP-formatted disk file.
The history tape (offline) operation recalls CSP
messages from any number of CSP-formatted history tapes,
allowing the recall of messages no longer existing in the CSP
message file.
3-31
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011:9
3.2.3.6.1 Online (Disk)
A message is not recallable if it is currently active,
identified as a busted message, or identified as the recalled
copy of a CSP message. The following guidelines are used for
online (disk) recalls. If the recall is from the system
console or the super service position, error-free messages
may be recalled. For remote offices, a message may be
recalled if the OSRI or one of the format line 2 routing
indicators is associated with the office. For all recalls, a
message may be sent to the default recall queue, any
allowable recall queue specified in the office table, or any
queue that the message has been to before. These constraints
help maintain CSP file integrity and prevent message
duplication within the active CSP file. Messages selected
for recall are routed to the remote office default queue or
any queue identified in the queue table as valid for recall
purposes, assuming it is one of the queues identified in the
original message distribution (i.e., a message cannot be
recalled if it was not originally routed to the requesting
remote office). CSP messages with format errors are
considered for recall only if distribution is to the service
supervisor, SVP, or system default queue.
The result of an online recall varies, depending on the
type of recall search requested. A global data field is
established at each CSP operational site. The value
contained therein represents the maximum number of messages
which any single recall request is allowed. The constraint,
which can be changed at any time to suit operational needs,
prevents an overflow of recalled messages due to erroneously
constructed, but syntactically correct, recall requests.
Some ancillary capabilities, which do not recall CSP
messages but provide meaningful data and capabilities,
include:
o Display of the MLN, DAN, and time-of-receipt from
the oldest retrievable message in the primary CSP
message file.
o Cancellation of a recall-in-progress at the
inputting terminal.
o Aborting of all recalls from all terminals from the
system console.
3-32
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
o Provision of a hardcopy of PAD record data fields
(from the primary message file) of a specific
message. This capability is provided only in
conjunction with an MIN or DAN-type of recall
request.
3.2.3.6.2 Offline (History Device (Disk or Tape))
Of recall prompts the operator for recall request
parameters and identification of hte history device;
validates all input; displays an error message and new prompt
if input errors are encountered; and once satisfied with the
input, proceeds through one or more parameters. The total
number of messages selected for recall is displayed to the
operator, followed by a display of each message ledger
number. The operator determines if the output should be
directed to the service printer or to an intercept device for
reintroduction into the CSP online system. A maximum of 200
messages can be selected as the result of any single recall
request.
3.2.3.6.3 Parameters
The online and of recall systems have different
requirements and capabilities. The nature of these
requirements/capabilities, the environment (online/offline),
and the specific needs of each system dictate the system
parameter applicability. Exception parameters, i.e., those
parameters only applicable to one of the two systems, are
annotated as follows: (online = *); (offline = **). A recall
request consists of the search .type, search values, and
identification of the output queue (*), where the recalled
messages are directed.
Search tuypes include: MIN (Message Ledger Number);
CDSN (channel Designator Sequence Number); OSRI (Originating
Station Routing Indicator); DTG (* Date Time Group); TOT (*
Time of Transmission); TOR (** Time or Receipt); and DAN (*
Disk Address Number).
Search value inputs vary depending on the search type;
the input values identify, if the request is intended to
recall a single message, a range of messages or a group (**)
of messages.
3.2.3.7 Miscellaneous
The following paragraphs discuss several minor features
of CSP which aksist TCC users in the performance of their
duties.
3-33
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.3.7.1 Come-Back Copy
As an option, any input communications line to CSP
(except AUTODIN and NSA) may be configured to specify that a
"come-back" copy be returned to it or another circuit in the
system. This is particularly useful in the case of Mode II
"pony circuits" to/from remote centers which need
confirmation of receipt as well as copy of outgoing traffic.
This feature works in a similar fashion as "self-addressing",
but it obviates the need for actual tributary self-
addressing.
3.2.3.7.2 Routing Line Segregation (RIB)
In keeping with standard communication procedures, CSP
provides for routing indicator segregation on all transmit
communication lines. RLS has several uses within CSP, but
its primary function is to strip Routing Indicators not
pertaining to a particular commumnication circuit prior to
delivery to that circuit. This ensures that the recipient is
not made aware of the Routing Indicators assigned to other
addressees.
A secondary use of RIS is to strip local Routing
Indicators from a message being reintroduced to AUTODIN.
This prevents self-addressed traffic from being sent to the
switching center (ASC). In case of alternate routing of
traffic to a intercept device, it is also the function of the
RLS (by virtue of replacing all RIs on a message with a RI
unique to the particular circuit in altroute) to allow such
traffic to return to its intended queue when reintroduced.
RLS is completely table driven; the system manager
directly sets up and controls the segregation function. By
proper use of the table function commands, the user has a
large number of options as to how the message traffic is
routed within the system and how the segregation function
itself is performed. Paragraph 3.2.6 discusses table
maintenance for RLS in greater detail.
3.2.4 Statistics and Accountability
The following paragraphs deal with the ability of the
CSP to provide both complete accountability for message
transactions and supportive documentation (reports, displays,
etc.) detailing the system status and performance.
3-34
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.4.1 General Requirements
It is a requirement, by virtue of accepted standard TCC
procedures and DoD Manual C5030-581( requirements, for a
system of the CSP type to maintain complete accountability
and an audit trail for all message traffiC processed by the
system. Such information consists of, but is not limited to,
the quantity of messages, the time of receipt, from where the
message was received, the size of the message (in
lineblocks), security characteristics, the dissemination
mode, and the time of transmission. This information
provides a complete picture of the disposition of each
message.
3.2.4.2 Hourly/Daily Statistics
The CSP keeps statistics on two types of traffic: the
currently active traffic load and the message traffic
history. A report for this is generated every hour; on the
hour, and at the close of the RADAY. When RADAY is over, all
the statistics are reset to zero. This report is called the
Station Status Report.
The CSP Also produces three other reports, generated at
close of RADAY or by system operator commands:
o System History
o Transmission Line Logging
o History Log Report
3.2.4.3 Station Status
A report of the station status is generated every hour
by the system. It contains the current system queue load:
o The number of lineblocks by device, precedence, and
total for that device
? The atotal number of messages on the queue for the
system
o The total number of lineblocks on the queue for the
system
o The oldest active MLN
o The percentage of free queue nodes
o The percentage of free disk space
3-35
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
The queue statistics report is also generated at the
close of the RADAY and can be obtained, at any time, by the
operator.
3.2.4.4 Communications History
A sytem history report is the key element
system performance analysis.
The statistical communications history
generated by the system at the close of RADAY;
obtained by the system operator at any time.
contains the following information:
o The number of messages processed by a
communication's device, by precedence, and the
total for that device
in the CSP
report is
it can be
The report
o The number of lineblocks processed by a
communication's device, by precedence, and the
total for that device
? The total
system
? The total
system
number of messages processed by the
number of lineblocks processed by the
A report is generated for the receiving and transmitting
devices. All statistical counts are reinitialized at RADAY
change.
3.2.4.5 PLA Historical Usage
Information on the usage of Plain Language Addresses
(PLAs) consists of the number of times each PLA was used, as
well as a list and ?count of those PLAs encountered in a
message, but not found in the PLA/RI conversion tables. The
latter report is generated daily at RADAY change, while the
PLA count report is generated weekly. Either report is
obtainable upon request by the operator.
3.2.4.6 Dynamic System Status Display
The status of the CSP system is monitored constantly via
the CSP dynamic system status display. A VT100 (or
equivalent) terminal is used to display the status of the
active lines, the current active message number range, the
utilization percentage of the message file, the overall
system status, and the time of day. Each line currently "on"
3-36
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
is monitored on the display, thus dynamically indicating line
activity. The current number of messages on each output
queue and any altrouting information is displayed.
3.2.4.7 Audit Trail
The.following features provide the necessary audit trail
capability which enable operation's personnel to completely
evaluate system performance and trace the processing flow of
specific messages.
3.2.4.7.1 History File Logging (LOGGEN)
. The most comprehensive message processing information is
available through data reduction of the history file (disk or
tape) maintained by the system. Utilities exist which allow
the operator to reduce a history file to a printed log form,
detailing every step to which each message has been
subjected.
Due to the time-sequential nature of the history file,
this log presents a chronological picture of system
performance. Every processing state change that a message
undergoes results in a data record on the history file. This
is reflected in the log.
.This utility may be executed either online or on an
of system, but the nature of the reduction process makes
it very time consuming. Adequate thought must be given to
allocating system resources for long periods of time.
3.2.4.7.2 Communication Line Message Logging (LML)
On a line-by-line basis, users may specify that
communications (Tor R) lines be logged. As each message is
successfully transmitted to or received from a circuit, a log
entry is made for that circuit. The information routed
consists of the Originating Station Routing Indicator (OSRI),
the station serial number (SSN), the date-time group (Format
Line 5), the first 16 characters of the FROM line, the input
and output channel desingator/sequence numbers, the time of
transmission or reception, and the CSP accounting number.
All of these parameters (except the FROM line) may be used as
recall parameters in the event retransmission is required.
Summary log information is available through operator
commands. At the end of the processing day (RADAY), complete
logs are printed and the log files are zeroed for the next
day. This feature has proven very useful in tracing
activities and has, for the most part, supplanted the need to
resort 1-.1.,-tory file log to ascertain disposition of
3-37
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
a praticular message. The total number of. messages logged
for a line is included on the daily report and is also
printed on the system console.
3.2.4.7.3 Message File Logging
Message log information may also be obtained directly
from the CSP message file. This can be accomplished very
quickly and the type of information available is similar to
that from the history log, with the following exceptions: log
inforamtion may be specified for a single message or a group
of messages based on the time of receipt of the receive
communication's channel; the report generated cannot give as
complete a picture of chronological activities (exact time of
receipt, time of transmission) because the disk image
represents a cumulative status of the message; and the
messages available for logging can only range as far back as
the oldest retrievable message in the system. This feature
is particularly useful to traffic analysis personnel when
evaluating the status or disposition of a single message or a
limited group of messages, but it is rather inefficient for
evaluating system performance over a period of time.
Selection of messages to be logged follow the same
procedures and parameters as those of message recall, except
that this function may be performed only from the system
console.
3.2.5 System Security and Access
As described in paragraph 3.1.3.3, many physical
security procedures are required to operate an accredited CSP
system. Maintenance of a security environment is the
responsibility of the TCC personnel. CSP provides many
software features designed to augment physical control
procedures. These features are described in the following
paragraphs.
3.2.5.1 Input/Output Security for Communication Lines
Security classmarking is provided for every communication
line defining security levels for that line. This
classmarking information is used later to provide
input/output security checking. All messages processed by
the CSP system are categorized based on classification;
compartments, transmission control codes, caveats, codewords,
and language media format. Once the communication lines and
message traffic have been marked with the appropriate
classification, each message is checked against the level of
the given communication line. Failure of these checks
3-38
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
results in message rejection. The message is marked as
having failed the security check and is sent ot the
Supervisor Review Queue for action.
3.2.5.2 System Access
In addition to software restrictions on message
classifications, the system must preclude access of persons
without the proper clearances and/or need-to-know. This is
accomplished via user validation and physical access
limitations.
3.2.5.2.1 User Validation
Unauthorized users are prohibited from accessing various
portions of the system by sign-on and password protection.
Signing-on to the user terminal determines which remote
offices and users are allowed on the system, and the
functions they can perform. The password allows verification
of each remote office with the user privileges. Functions
are allowed or prohibited based upon these priviuleges.
Controlled functions include: access to the supervisor
review queue, the abiltiy to edit or delete a message, and
the authorization to release messages originated by another
input line.
3.2.6 System Tables
The CSP system contains elements identifying it as a
unique entity to AUTODIN and defining its charactertics, as
well as the local parameters, which allow it to differentiate
among its backside users. These elements and parameters are
organized in the following operational tables: routing
indicators, routing segregation criteria, Plain Language
Addresses, office symbols, user identification codes, and
security data.
Each table is updated by running an offline utility
program which accepts input from a disk file, card deck or
terminal. An interim table is created and printed for
inspection. The permanent table may then be replaced with
the interim table, implementing the changes made. Tables
should only be replaced with the approval of the Automated
Message Processing System Security Officer (AMPSSI) or his
designee.
Maintenance of each of the CSP system taables is
discussed in detail in the following paragraphs.
?
3-39
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
3.2.6.1 Routing Indicators and Routing Segregation
Routing indicator tables are set up at system-generation
time to reflect all local, CARP, and collective RIs for which
the site is responsible. Messages addressed with RIs not
found in these tables are transmitted to AUTODIN for
delivery.
The system manager can change, add, or delete RIs for
either the DSSCS or GENSER community. Note only me (1) RI
for each community should be specified for the delete-all-but
action. These tables, however, must match those of the
connected ASC. Changes to the RI tables are made via card or
disk file input.
Since messages may be addressed to more than one
destination, multiple RIs may appear on a message. To
prevent the CSP and ASCs from redundant transmission of these
messages, a table is set up at system generation time
specifying which RIs will be deleted from and/or appended to
Format Line 2 of the messages placed on the output queues.
If the routing line segregatin criteria changes, or an output
queue is added or deleted, the system manager changes the
table using either card or disk input.
3.2.6.2 PLA
All Plain Language Addressing (PLA) tables are created
and maintained through utilization of the Record Management
Services (RMS-11) of IAS. The PLA data base is composed of
indexed sequential files, which correlate a PLA with its
routing indicator and an AIG/DAG-with its set of routing
indicators.
The system manager can add or delete PLA entries from
the data base via card or disk file input.
3.2.6.3 Disseminaticin
Message dissemination is controlled by the
communication's operator at the user terminal. This is done
by a combination of techniques, including selection from a
menu appearing on the user terminal and selection of a group
of office symbols Via the regular or variable function
keypads. Automatic dissemination of messages is also
supported, in certain cases. The following paragraphs
describe the operational table maintenance required to.
support these functions.
3-40
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
'
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
?
3.2.6.3.1 Office Distribution Menus
Distribution office symbols are set up at system
generation time ot reflect the offices and organiiations
served by each TCC receiving the most traffic. They are then
displayed on the command screen and selected by light pen
(03-389) or highlighting (Delta Data). Also, office symbols
can be entered on the command line via keyboard entries.
If an organization is added, deleted, renamed, or the
method of servicing is changed, these tables are modified by
the system manager, using either card or disk file input.
Additionally, if the office is on the CRITIC distribution
list, the quantity value may be appended to the data field.
3.2..6.3.2 Automatic Routing
The Automatic Routing Data Base consists of a set of
tables describing key messge elements and actions to be taken
when the elements are found in a message.
Data base tables are maintained in individual source
files in ASCII format. The system manager is responsible for
keeping the tables updated as routing requirements change.
When it is newcessary to update the online data base, a
utility program is run to convert the source data base tables
to an internal format and create directories to each of the
tables. The source tables will be read and validated,
ensuring that the format of each entry is correct and that
the entries are in alpahabetical order. The new data base
may then be loaded into the system either via a system start
(cold/warm) or through the use of a utility program. Loading
of the data base entails only the reloading of the directory
areas since the actual tables are disk resident.
The following tables are used:
o Precedence Table
o Operating Signal Table
o Routing Indicator Table
o Transmission Control Code Table
o Addressee Table
o Delivery Distribution Indicator Table
o Format Line 12 Classification Table
3-41
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
o Format Line 12 Phrase Table
o GENSER or DSSCS Table
3.2.6.4 User Identification
A table containing remote office, user ID codes, and
user passwords is created at system generation time to
identify the operators with access to the supervisor and the
message distribution positions and operators with access to
the message distribution position only. The user ID codes
consist of operator initials and a shift identification or
some other means of identifying a remote office and
individual user; the remote office and user identification is
appended to all messages processed by that user. Symbols for
personnel with supervisor privileges are separated from other
personnel symbols.
As user personnel are reassigned, arrive for duty, or
are given additional access privileges, the system manager
updates the remote office user symbol and password.
3.2.6.5 Security
Two sets of security tables are defined within the CSP.
The first, the security common area, defines all
classifications, compartments, codewords, caveats, handling
instructions and transmission control codes (TCCs) legal for
messages processed by the CSP. The second security table
specifies the allowed security parameters for messages
processed by each (R or T) specific
circuit/device/channel/line.
3.2.6.5.1 Security Common
The CSP software is distributed in unclassified form and
contains dummy data in all the security tables. At a system
generation time, the system manager initializes the security
tables to reflect the actual site level classification. This
is done by placing the appropriate information in the
classification, compartmentation, codeword, caveat, language
media format, and TCC/SPECAT tables within the security
common area.
3.2.6.5.2 Circuit Classmarking
In order to ensure that a message transmitted to or
received from a channel does not exceed the security
parameters allowed for that particular line, a table is set
up defining the maximum allowable security parameter for each
line. These tables are set by the system manager at system
3-42
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
? Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
generation time to reflect, for each circuit, all
classifications, caveats/codewords, TCCs, and LMFs allowable
on messages transmitted to or received from the device/line.
If a new terminal is added or the security attributes of
an existing channel are changed, the system manager updates
the appropriate security tables via card or disk file input
using the card reader, disk, or a terminal. When the input
is from cards or disk, the security updates task assumes that
an initialization of security tables is being performed and
prohibits all elements for the specified device. Due to this
prohibitive step, input data only specifies those elements
which are to be allowed. Consequently, making minor updates
is possible only through terminal input.
3-43
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 4. CONFIGURATION REQUIREMENTS
This section addresses the configurability of CSP and
details the level of user configuration for a specific
installation.
4.1 System Architecture
Prior to discussing specific parameters, a brief
overview of the system architecture is in order. Figure 4-1
diagrams the major CSP modules, their inter-relationships,
and the overall flow of message processing, generally left to
right. Every item, except the Plain Language Expansion
Module, the Automatic Dissemination module, and the Service
Message Processor, are referred to as the "core" system.
These components and their functions are fundamental to every
CSP, regardless of application, and are not subject to
configuration, except capability or table specifications.
The other three items are either system options or directly
involved in the configuration process. The single lines
between modules (specifically System Management/Control
functions) reflect the major operational control paths. The
double lines denote message processing control transfer and
are numbered sequentially, indicating normal process
sequences. Paths 5a, 5b, 5c and 9 are contingency paths
taken under varying processing conditions.
4.2 Configuration Parameters
The CSP was designed and developed to permit dynamic
system configuration. The system manager has the necessary
tools to perform system configuration in a timely manner,
with no loss of message traffic. This capability includes,
but is not limited to, initialization of all CSP system data
structures and hardcopy output of the current system
configuration. The system data areas included in dynamic
configuration are communications lines, system output queues,
operational terminals, system capacities, and optional
routing characteristics.
4.2.1 Communication Lines
The communications lines are the basis for the CSP
configuration, the CSP was designed as a front-end or back-
side processor of message traffic flow on these lines. The
CSP maintains the necessary information to assure continued
operation of all communication lines connected to the system.
4-1
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Figure 4-1 CSP Functional Baseline
0
(D
0
(D
8
CD
-n
(D
(T)
(D
n.)
o.)
n.)
o.)
. .
0
0
-0
co
0J
c))
cn
n.)
n.)
C ?
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Establishment and control of the communication line are
handled by the CSP gateways. Each line is defined in CSPCOM
as a gateway channel entry. Each communication line is
assigned a name, a hardware device identification, a channel
designator (if required), an output queue identification, and
a system saturation shutoff value (input lines). As a
minimum, the system can identify the line type and any
characteristics of the line which necessitate exceptional
processing, such as the channel sequence number of device
specification modification.
The number of lines varies for any given site. All of
the communication device/lines can be logically turned on or
off by the system operator.
4.2.2 System Output Queue
The system output queue provides a waiting list for
message traffic awaiting operator review, editing and
dissemination, and CSP message transmission and hardcopy
output.
The CSP maintains a queue for each output line defined
in the system. Messages are placed on the appropriate
queues, according to their assigned destinations, by the
System Queue Manager. Messages leave the queues on the basis
of first in first out (FIFO) by precedence.
?
The system queues are defined or configured with their
associated output lines in the Gateway Channel Status Area.
Each output queue is given a _name, characteristics, a
servicing task identification, and an alternate queue
identification for altrouting purposes. For any given site,
the number of queues varies.
4.2.3 User Terminals
Currently, the terminals supported by the CSP system and
used by SSO communications personnel are one or more Sperry
Univac OJ-389 and/or Delta Data 8260T terminals connected via
a BR-1569/1731 communications multiplexer.
The basic function of the user terminal is to provide
the SSO personnel control over the message traffic flow.
Various combinations of terminal inputs allow the user to
perform message dissemination and distribution, message
servicing, and generation and editing of narrative message
traffic. If required, the CSP can be configured without an
user terminal. In this form, all traffic will be either
derivatively routed or manually disseminated via hardcopy
jz-r?sr printing).
4-3
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Definitions, statistics, and control of the operational
terminals are contained in a system common area.
The CSP maintains all information required to ensure the
continued operation of all user terminals. For audit trail
purposes, this information includes current user
identification. The system configuration parameters for
operations terminals consist of the maximum number of user
terminals. This number is used to allocate a sufficient
areas of memory to contain status and accounting areas for
each terminal.
4.2.4 System Capabilities
The CSP provides a system area containing definitions of
system capabilities. System capacities are broadly defined
to include message file size And device identifications,
terminal paging file device identification, the maximum
number of messages active in any output queue, the number of
terminals on the system and the number of communication
lines.
4.2.5 Optional Routing Characteristics
The CSP provides the capability for optional routing of
certain types of messages and messages requiring hardcopy
output for accounting purposes. Messages which require
optional routing include those:
o In D01-103 Modified format (DOI 103M)
o Generated at a terminal
o Of Category I
o Deleted by the Service Clerk
o Re-released by the Message Distribution Clerk
o Containing undefined disseminees
o Containing no disseminee
o Routed to the default routing by online message
recall
4-4
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
-
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
4.3 System Installation Options
The various operational parameters vary from one
location to another. An example of this condition is the
minimum length of the local routing indicator definitions.
Some locations may key off of four characters while others
may use five. The CSP provides the capability to modify
these parameters, in a manner requiring the least amount of
programmer involvement. Two separate, but similar, functions
at the same location may require different parameters.
Parameters defined by site requirements are:
o Maximum number of messages written to an intercept
device
o Maximum number of message read from an intercept
device
o Number of lines per page for distribution and
service printers
o Width of print line for service printer
o Maximum number of messages recalled by online
message recall
o Minimum length for local routing indicator
definition
o Ability to disable security sentinel and OSRI
validation
o Block size for magnetic tape interfaces
o History device retention period
o Ability to secure a hardcopy of all messages
deleted from the system
o Percentage of message file in which online recall
is prohibited
o Length of time between time hacks
o Ability to class stamp service printer traffic
o Ability to print multiple copies of a message
o The time of day to print the PLA statistics
4-5
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
? Ability to allow release of a message previously
disseminated or containing no dissemination
o Ability to obtain a courtesy copy of various types
of messages
o Ability to modify the scan parameters in the
automatic routing module
o Ability to define altroutable queues and queues
that an altrouted queue can be altrouted to.
4-6
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 5. SYSTEM ENVIRONMENT
This section describes the hardware and software
environment in which the CSP operates.
5.1 Hardware
The minimum hardware configuration which supports the
CSP is shown in Figure 5-1. Each element of this
configuration is discussed below.
5.1.1 CPU, Memory and System Console
The CSP is capable of running on the central processing
units (CPUs) of the Digital Equipment Corporation (DEC) PDP-
11 family, within the 11/34 to 11/70 range. In its minimum
configuration without PLA or FARM, the baseline CSP runs in
256KW of system memory (including 60K words for the executive
and standard device handlers). Memeory usage in the 256KW
word range occurs during peak processing.
The system console is the only device permitted to
interact with a control the system. It must be a hardcopy
terminal, such as a DECwirter (or equivalent).
5.1.2 Mass Storage
The CSP requires both disk and/or tape devices (tape
devices are not required if dual-disk recording redundancy is
used) for mass storage. The utilization of these devices is
described in the following paragraphs.
5.1.2.1 Disk
Online disk storage is required for both operational CSP
software ad the system message file. Approximately 10
megabytes are required for the CSP software. The number of
megabytes required for the message file is dependent upon the
volume of traffic and the number of days that back traffic
will be maintained. An additional 40 megabytes of disk
storage is needed to support the CSP software in maintenance
form (sources, objects, listings, etc.).
Although it is possible to run CSP with only one drive,
separation of the software and message file greatly improves
disk access time. If possible, two drives should be
dedicated to CSP use. One 10 megabyte disk is adequate for
the CSP operational software. The size of the second disk is
contingent upon the size of the message file; it may range
5-1
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
DCC
PDP 11/14
to
POP 11/70
256KW
MEMORY
LA36.
.>00MB
Is
DUNKER-
RAMO
1569/1731
?
ANALYTICS
'TLC-100
Figure 5-1 Minimum CSP Hardware Configuration
*OR EQUIVALENT
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
?
from 30 to 3000 megabytes. In order to support system
maintenance, one of the drives must accommodate a minimum of
80 megabytes.
8.1.2.2 Magnetic Tape
If a site is not using dual-disk redundancy recording, a
minimum of one magnetic tape is required for history file
recording of the message traffic. Additional tape drives can
be configured, one for the online history tape and the
remainder for either history pre-mount and/or intercept
tapes.
If sites are using a dual-disk redundant recording
configuration, magnetic tape drives are not required unless
the site desires offline tape capabilities.
Additional tape drives may be used to decrease the
workload involved in mounting/dismounting tapes when in-use
drives are needed for intercept tape, or to support magnetic
tape circuits (if so configured).
Inputs to and
received/transmitted in
image) format on 9-track
narrative format or OCR
present) messaes may be
manner.
output from the CSP maybe
80 character data pattern (card
tape. Only standard DSSCS/GENSER
format (if a PLA capability is
meaningfully transferred in this
5.1.3 Communication Interfaces
The CSP supports a variety of
with AUTODIN, NSA, ZICON, Mode
backside/front-end processors, and
The hardware devices available for
are described below.
5.1.3.1 Communication Interfaces
devices for communicating
II, the user terminal,
site unique devices/lines.
communication link support
The BR-1569 (and its successor, trhe BR-1731) 32-channel
communications multiplexer is capable of providing
communicatoin links for the majority of CSP interfaces. The
configuration of the BR-1569/1731 is selected during
procurement and is based upon existinag and projected
communicaiton requirements.
5-3
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
5.1.3.2 DMC11
The DMC11 Network Link provides a synchronous computer-
to-computer link over coaxial/triaxial cable or via
synchronous modems. This capability is used to link CSP
systems together or to access backside computer systems.
5.1.3.3 . Other Interfaces
Several other communication devices are supported by the
CSP. The DUP11 is a single line synchronous device; the DV11
is a synchronous/asynchronous eight or sixteen channel
multiplexer. Any one of these devices can be included in a
CSP hardware configuration.
5.1.4 AUTODIN Interface Devices
- In addition to the communications devices described
above, the CSP utilizes an AUTODIN interface device to
communicate with the AUTODIN Switching Center (ASC). Devices
such as the Analytics TLC-100 or the INTECI are used for this
purpose.
5.1.5 Line Printers
Line printer(s) are used to print all hardcopy forms of
message traffic and statistical reports produced by the CSP.
Two logical printer devices are defined by the CSP; one is
used for the distribution form of message traffic and the
other for the statistics and service forms of message
traffic. DEC LPlls or equivalents may be used for this
purpose.
5.1.6 Other Peripherals
Other peripherals used with the CSP are described below.
5.1.6.1 Card Reader
The CSP supports message input via a card reader. The
DEC CR11 or equivalent may be used. The card reader is
optional.
5.1.6.2 Paper Tape Reader/Punch
The CSP can process messages via ASCII paper tape, using
the DEC PC11 or an equivalent reader/punch. The CSP also
provides Mode II BAUDOT paper tape support. Inclusion of a
paper tape reader/punch is optional.
5-4
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
5.1.6.3 Optical Character Reader
The CSP supports the use of a "dumb" OCR for Message
input in DD 173 format. Any "dunb" OCR may be used. The OCR
is optional.
5.1.6.4 User Terminal
User terminals (OJ-389 or Delta Data 8260T) will be used
by the TCC personnel for : message dissemination and
distribution; message servicing; and the generation and
editing of traffic. One terminal is sufficient for minimal
control, with personnel switching between message
distribution and service functions. Additional terminals (up
to 6) may be added to decrease contention and increase
throughput. The CSP may be configured without user
terminaals if required, although this is not a typical
configuration. With this latter form, all traffic will
either be derivatively routed or manually disseminated (after
printing).
5.1.6.5 VT100/Equivalent
The VT100 (or other CRTs, such as VT52) is used as a
slave terminal for the system status display program.
Continuously updated status of the system and its components
is displayed. A VT100 (or the equivalent) is a requried
peripheral.
5.1.6.6 Magnetic Tape
Inputs to and outputs from the CSP are
received/transmitted in 80 character data pattern (card
image) formats on 9-track tape. Only standard DSSCS/GENSER
narrative format or OCR format (if a PLA capability is
present) messages may be meaningfully transferred in this
manner.
5.2 Software
The following paragraphs detail the characteristics,
organization and restrictions pertaining to CSP software
development, support, maintenance, and operation.
3.2.1 Operating System
The software comprising CSP can be viewed as an
applications package and, as such, must rely upon a resident
operating system for hardware and software services necessary
to perform its functions. Most operating systems can be
divided into two major functions:
5-5
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
o Executive services, covering program scheduling and
execution, as well as program services ranging from
inter-task communication to task input/output.
o Peripheral device interfaces allowing application
program access to various hardware components
(disk, tape, terminals, etc.) without requiring
those programs to directly interface the devices.
Both of these aspects are covered more fully in the
following paragraphs.
5.2.1.1 Executive
The executive for which CSP was designed and coded is
the Digital Equipment Corporation Interactive Application
System (IAS), Version 3.2. IAS is a multi-tasking, real-time
operating system providing a full range of services necessary
or desirable for real-time applications.
IAS can be configured in one of three ways. A minimum
size, single user system; a larger, multi-user system capable
of serving many users simultaneously; and a timesharing
version, supporting up to 64 users in a timesharing mode
while still providing real-time services to tasks requiring
them. CSP uses the multi-user version of IAS, although it is
viewed as a single integreated package of application
programs.
5.2.1.2 Device Drivers
Standard DEC and Bunker Ramo device drivers are utilized
to interface with CSP peripherals
Component
Disk
Tape
Paper Tape Reader
Paper Tape Punch
Card Reader
Printer
Component
BR-1569/1731
User Terminal
5.2.1.3 Constraints
as follows:
DEC Driver(s)
DB...., DP....,
MM...., MP....
PR....
PP....
CR. ? . ?
LP....
etc.
Bunker Ramo Driver(s)
BM....
UT....
CSP utilizes the standard IAS system and device drivers.
No modifications are made to either the operating system or
the device drivers.
5-6
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
z
r
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
The IAS operating system is installed in accordance with
the installation and system generation procedures outlined in
the IAS System Generation and Startup Guide published by DEC.
The actual configuration of the IAS system is site dependent
and will vary according to specific needs of the user.
5.2.2 Development Base
The basis for development of all software for the CSP
system is version 3.2 of the IAS operating system developed
by Digital Equipment Corporation (DEC). IAS is a real-time
operating system which allows concurrent, hardware protected
execution of multiple online tasks. Complete utilities
include a MACRO assembler, task builder, editor, debugger,
and the file utility programs.
5.2.2.1 Language
All CSP software is written in MACRO-11 assembly
language, except FARM which is written in FORTRAN. MACRO-11
is described in the IAS/RSX-11 MACRO-11 Reference Manual
produced by DEC.
5.2.2.2 Constraints
DEC IAS and MACRO-11 conventions are followed throughout
CSP software development.
5.2.3 System Organization
In normal installations, the CSP consists of two
separate systems. The first is a complete CSP system
package, including maintenance tasks and utilities. The
second is the operational configuration. The following
paragraphs described the circumstances under which each of
these systems is used.
5.2.3.1 Development Mode
The CSP package consists of the complete 1AS package,
CSP object modules and command files for building CSP. This
package is used for the installation of the CSP as well as
test and checkout of the system at any time. Modifications
or updates to the system (either IAS or CSP) must be made to
this system package.
5-7
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
'` Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
5.2.3.2 Operational Mode
The operational system is created from the maintenance
and development system and is used operationally. It
consists of only those files needed to run the system. This
is to say that only software (mostly task images) required
for CSP operation is included. As a system, it is only
capable of the CSP function and is unable to support program
development, debugging, modifications, etc. THE SECURITY
ACCREDITATION OF THE CSP IS BASED ON USE OF THE OPERATIONAL
PACK ONLY.
5.2.4 Software Transfer
Software distribution is accomplished via magnetic tape
or disk when a site is configured without tape drives. CSP
distribution tapes contain CSP baseline software, optional
software modules as required for individual sites and
indirect command files. The CSP software from the
distribution tape must be transferred to and merged with the
CSP maintenance system VCSPMAD). This is accomplished by
executing the indirect command files contained on the
distribution tape. The command files utilize the IAS FLX
utility to accomplish the physical transfer between tape and
disk. The command files ensure that all software from the
distribution tape is properly merged with the maintenance
system.
When a site has a configuration without magnetic tape
drives, the software distribution file is sent to them on
disk.
5-8
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
_
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
SECTION 6. MANAGEMENT REQUIREMENTS/SYSTEM DEVELOPMENT PLAN
Accreditation, enhancement, maintenance and distribution
of the CSP requires the application of systematic software
management techniques. This section describes techniques
which are utilized in CSP management.
6.1 Accreditation Including the Test Plan Update
Prior to the operational acceptance and security
accreditation of the CSP, several criteria must be satisfied.
Accreditation includes not only hardware and software, but
also site preparedness, physical TEMPEST and personnel
security, and operator proficiency. To evaluate these areas,
it is necessary to perform a series of tests from a standard
published CSP Accreditation/Certification Test Plan and
Procedures document. The Plan includes sufficient tests,
with expected responses for each, to evaluate the entire CSP
system (reference paragraph 1.3.1.7).
The accreditation and operational acceptance of the CSP
is actually two separate processes; the same Test Plan is
used to satisfy both. Security accreditation is granted by
DIA upon successful completion of all test groups, focusing
primarily on the security aspects of the system. Operational
acceptance is granted by DCA upon successful completion of
the Category III AUTODIN interface test, concentrating on the
integrity of the data introduced into the AUTODIN system.
6.2 Configuration Management
The Configuration Management (CM) Program plays a
critical role in governing the evolution of the CSP
throughout its life cycle. In order to accomplish this task,
the CM Program:
o Identifies and documents CSP baseline
configurations which emerge as part of the system
development process.
? Ensures that interfaces between the CSP and other
computerized systems are properly developed and
maintained.
o Establishes and maintains mechanisms for
identifying baseline and site-unique documentation,
software modules and hardware configuration.
6-1
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
L.
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
o Provides mechanisms
verifying all levels
o Ensures orderly
testing/validation,
or site-identified
software and/or its
for proposing, tracking and
of changes to CSP elements.
development, integration,
and dissemination of centrally
additions/modifications to the
documentation.
o Monitors idendification, resolution and testing of
software/documentation errors or deficiencies and
the orderly dissemination of corrections to the
user sites.
o Conducts reviews and audits as required to ensure
conformance to specifications.
All new software modules are reviewed by the Informatics
Project Manager upon completion, and when accepted by the
AFIS/IND Project Manager, made a part of the CSP baseline.
Once part of the baseline, these modules are available for
installation at additional sites where a common requirement
exists. All specifications, software, firmware, hardware,
and documentation which have been accepted as part of the
general CSP baseline, or any site tailored baseline under
configuration control, are not altered without first being
processed and approved using standard configuration
management procedures.
All changes that occur once the configuration
identification has been established are classified into two
categories: Class I or Class II changes. A change is Class
I if it affects:
o A techenical requirement or specification in
functional baseline
the
o The project schedule or cost
o The software design, performance, or external
interfaces
All changes which are not Class I, including editorial
and program error correction are Class II changes. The
minimal approval authority for Class / changes is the
AFIS/IND Project Manager and, when deemed necessary, the
Configuration Management Board (CMB). Class II changes may
be implemented without prior approval of the CMB, but are
controlled and reported in accordance with the remainder of
this subsection. In any case, the Informatics Project
Manager is the minimal approbal authority for all Class II
changes.
6-2
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Standard CUBIC Probelm Reports (CPR) 'are utilized as
necessary. Part I of the CPR is filled out by the
originator; part I/, by the AFIS/IND project officer or his
representative; parts III by the originating organization to
indicate completion. These procedures enable users to submit
requirements for development of required software, facilitate
consideration of such requirements on a common-user basis,
and establish a process for evaluation and integration of
community-developed softwre satisfying common user
requirements.
The tools used to assist the configuration management
process can enhance or destroy the effectiveness of the CM
system. In order to be useful, CM information must be
systematically and accurately recorded. Retrieval must be
both fast and flexible. Informatics has developed, as an in-
house tool, an automated ?Configuration Management System
(CMS) which meets these criteria. The CMS is used to
maintain complete CSP baseline and site inventory information
and to perform problem logging.
6.3 Software Quality Assurance (SQA)
Software Quality Assurance, or quality control, monitors
the development and performance of the system throughout its
lifecycle. The SQA Program is concerned with every aspect of
the analysis, design, development, testing, implementation,
documentation, training and operational support of the CSP
system.
The goals of the Software Quality Assurance Program are
aligned with the goals of the Configuration Management
Program, as both programs are used to monitor and control the
software and documentation produced in the CSP development
effort. The Software Quality Assurance Program is primarily
concerned with the quality of the product, whereas the
Configuration Management Program focuses upon the
configuration status ofthe baseline and site CSPs.
The CSP Software Quality Assurance Program establishes a
structure which is imposed on CSP development, providing an
efficient path for the ensuring the quality and timeliness of
the overall product.
Several tools are used to help guarantee the integrity
of the CSP software. These tools fall into three categories:
development aids, which allow simulation of real environments
in an artificial test setting; and security accreditation,
which assures that the code integrity is maintained at a
level in conformance with government specifications. All
6-3
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release-2013/02/13 : CIA-RDP89B01354R000200270011-9
aspects of the SQA Program assure that the system product
will be developed, maintained, and updated in accordance with
the highest standards.
6.4 Maintenance
Informatics has an established problem reporting
structure and a software maintenance team capable of
responding quickly to all reported problems. The cycle is
initiated with recognition of a CSP malfunction, apparently
attributable to software, by operations or user personnel at
a CSP installation. AFIS/IND will be informed of a software
malfunction by the issuance of a CUBIC Problem Report from
the CSP site where the problem was encountered. Upon
validation of the problem report by AFIS/IND, Informatics
will be notified and will begin diagnosing the problem based
upon information in the report, supplemented as required by
telephone conversations with on-site operations and user
personnel.
If the problem analysis conducted by Informatics
indicates that a software error exists, required corrective
actions will be determined and the resulting maintenance task
will be sized and scheduled. AFIS/IND will be provided
information concerning the diagnosis results scheduled
corrections, and an estimated completion date. This
notification will occur within five (5) working days of
receipt of the problem report.
Once a software fix has been designed, thoroughly tested
and evaluated, it will be incorporated into the baseline and
distribution made to AFIS/IND and to the appropriate
installations. All CSP modifications involved in software
maintenance activities will be developed, implemented, tested
and documented in accordance with the CSP Quality Assurance
Program and CSP Configuration Management Plan. In addition,
the status of all CUBIC Proglem Reports will be monitored
from start to finish by the Informatics-developed automated
Configuration Management System.
If the urgency of the problem does not permit the above
procedures to be followed, interim solution or circumventing
procedures may be instituted as a result of advice from on-
site or central support personnel after coordination with the
Project Manager and AFIS/IND. Once operational capabilities
are restored, a CUBIC Problem Report will be submitted.
Formal problem resolution steps will then be taken to ensure
a complete, tested, integrated and documented solution.
After this solution is disseminated, the interim solution
will be removed and the official correction applied.
6-4
Declassified and Approved For Release 2013/02/13 : CIA-RDP89B01354R000200270011-9
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9 ??
6.5 Updates
All new software modules are reviewed by the Informatics
Project Manager upon completion, and when accepted by
AFIS/IND, made a part of the CSP baseline. Once part of the
baseline, these modules are available for installation at
additional sites where a common requirement exists. All
specifications, software, firmware, hardware, and
documentation which have been accepted as part of the general
CSP baseline, or any site tailored baseline under
configuration control, are not altered without first being
processed and approved using standard configuration
management procedures.
As major enhancements to the CSP are developed and
successfully implemented in the CSP baseline, they are
distributed to AFIS/IND for distribution to the appropriate
CSP installations. Depending upon the complexity of the
enhancement and the expertise of on-site personnel, the
distribution procedure varies. For minor enhancements,
update tapes are sent to AFIS/IND for distribution along with
supporting documentation for installation. For extensive
enhancements and sites with no resident software support
personnel, the upgrade is installed by contractor personnel.
Software releases are scheduled periodically and contain
all new software and patches accumulated to a cut off date
which will generally be no more than one month prior tot he
release date. In any case, the cutoff date will be specified
in the accompanying release notes.
The software is accompanied by appropriate
documentation, release notes, and status reports. The
release notes include descriptions of any new software
(including name and module revision code), a description of
any problems, installation and test instructions, and any new
operational considerations of which the user should be aware.
Accompanying status report detail the status of other change
requests and developmental activities.
6-S
Declassified and Approved For Release 2013/02/13: CIA-RDP89B01354R000200270011-9