STAGE I REPORT VOLUME I

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP80B01139A000500240009-4
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
51
Document Creation Date: 
December 15, 2016
Document Release Date: 
December 8, 2003
Sequence Number: 
9
Case Number: 
Publication Date: 
October 17, 1963
Content Type: 
REPORT
File: 
AttachmentSize
PDF icon CIA-RDP80B01139A000500240009-4.pdf2.51 MB
Body: 
Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 25X1 (sciPS) SUMMARY AND CONCLUSIONS, RECOMMENDATIONS, A LIST OF REFERENCES, AND A LIST OF ILLUSTRATIONS October 1963 THIS MATERIAL CONTAINS INFORMATION AFFECT- ING THE NATIONAL DEFENSE OF THE UNITED STATES WITHIN THE MEANING OF THE ESPIONAGE LAWS, TITLE 18, USC, SECTIONS 793 AND 794, THE TRANSMIS- SION OR REVELATION OF WHICH IN ANY MANNER TO AN UNAUTHORIZED PERSON IS PROHIBITED BY LAW. 25X1 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 16 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 STAFF FOR THE COMMUNITY INFORMATION PROCESSING STUDY (SCIPS) SCIPS D-2/3 17 October 1963 MEMORANDUM FOR: Chairman, United States Intelligence Board THROUGH . Chairman, Committee on Documentation, United States Intelligence Board SUBJECT : Transmittal of Stage I Report REFERENCE : (a) CODIB D-82/9 and USIB D-39.7/1, 24 July 1961 (Terms of Reference) (b) CODIB D-82/16 and USIB D-39.7/3, 23 February 1962 (Stage I Plan) (c) USIB M-202, 28 February 1962 Transmitted in accordance with references is the SCIPS Stage I report, which is submitted in six volumes. Volumes II through VI are of varying security classifications and are published under separate cover. Volume I, forwarded herewith, contains the summary and con- clusions, the recommendations, a list of references, and a list of illustrations, together with a table of contents for all volumes. 25X1A Director SCIPS Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 FOREWORD The USIB Committee on Documentation (CODIB), like its sister com- mittees, exists as a mechanism for interagency coordination of an in- telligence activity. In the case of CODIB the activity being coordi- nated is that activity called "information processing" (IP). Informa- tion processing is that central part of the intelligence cycle between intelligence collection and. intelligence analysis-production. There is relatively common agreement as to what activities belong in the core of the IP sector, but the edges are not so distinct or agreed. This vagueness of boundaries is due to (1) an inability to agree on useful criteria as to when "information" becomes "intelligence" and (2) the fact that formal organizational structure is influenced by many factors other than functional division. With this situation pertaining, it is very safe to say that CODIB is not the only USIB committee trying to coordinate in the area of information processing. But it was CODIB that conceived and initiated and (with subsequent support from the Joint Study Group and the Director's Coordination Staff) was given monitorship by USIBB over a unique study effort known as SCIPS (Staff for the Community Information Processing Study). The term "unique" is an understatement of description. The SCIPS effort is not unique in outward appearance ("another committee," "another feasibility study," "another coordination staff," and so forth), but it is unique in the scope and area of application of the methods used. Even more important, and unique in the intelligence community, is the tenet governing the approach and content of the SCIPS effort to date. That tenet is that the lack of factual and statistical information about current opera- tions is the major cause of present problems and inadequacies and of the corollary to it -- that if such information were available, manage- ment at the respective levels would utilize it to the net benefit of the intelligence community. The following report and its appendages, both here published and unpublished, is the formal, but not the sole, product of Stage I of the SCIPS effort. The story is long and the product so voluminous that surely no one person will ever read it all -- but, then, what better time to test the basic tenet and corollary? S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T "Intelligence information processing" resides in two or three worlds simultaneously: 1. From an organizational point of view, it is a part of the several independent departmental operations. 2. From the point of view of its mission, it is an integral part of the United States Intelligence Community. 3. From the point of view of discipline, it is his- torically part of the "library" and more recently the scientific and technical information process- ing world. As used in this study, intelligence information is defined as in- formation about foreign persons, activities, subjects, places, and things. Again, "processing" refers to activities sequentially follow- ing initial or field acquisition and preceding intelligence analysis. Thus the term as used herein excludes the processing of the following: 1. Business-type data (payroll, budget, inventory, and so forth) 2. Management control data (monthly status reports, research and development [R & D], and so forth), and internal security (badge control system, employee clearance records, and so forth) 3. Scientific computation The study does include, in addition to substantive foreign information, the procedures and files used for the control of the processing of substantive information. It is a certainty that automatic data process- ing (ADP) and the computer are only minority constituents of intelli- gence information processing. The composition of the US Intelligence Community has to be defined usefully for each purpose under consideration. The composition of the community for information processing purposes is the broadest because processing occurs all the way from every initiating point inbound to - v - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T every receiving point outbound. The scope and depth of study envisioned for SCIPS in Stage I and ultimately is given in Appendix G, as are the authorization, terms of reference, and other documentation. Size, time pressures, security classifications, varying audience interest, and reproduction limitations all prompted publication of the report in separate volumes: Ifn1imp TIT I Contains the summary and conclusions, the recommendations, a list of refer- ences, and a list of illustrations, together with a table of contents for all volumes. Contains the study findings and dis- cussion, both narrative and graphic (Appendix A), including Appendix F, which is integral to the findings but separable on a security clas- sification basis of SECRET. Contains Appendixes B-l, C, D, and E, which are essentially reproductions of computer print-outs from the SCIPS data files selected on the basis of broad interest. The fact that Appendix B-1 was hand typewritten from a computer print- out is the more obvious sad com- mentary on the state-of-the-art. Contains Appendix B-2, which also is a reproduction of a computer print- out considered to be more useful on a broad basis at the lower classi- fication that it enjoys. Contains Appendix G, the narrative "SCIPS story," together with the exhibits and a list of references that document the story, the survey system, and the computer data base system. Not included in the volume are three exhibits on the computer system. These exhibits are already available in a limited number of copies and were not reproduced. - vi - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T Contains Appendix H, which deals with photographic information processing. The report is extensive because 1. A great volume of valuable and useful information was produced, 2. The potential audience is wide and varied, 3. Periodically, comprehensive summarization of accumulated findings is needed so that fragments can be discarded and forward progress enhanced, and b. The SCIPS Stage I Report may be the terminal report. - vii - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 TABLE OF CONTENTS (All Volumes Volume Page Foreword . . . . . . . . . . . . . . . . . . . . . . . . I Introduction . . . . . . . . . . . . . . . . . . . . . . I I. Summary and Conclusions (SECRET) . . . . . . . . . . I 1 A. The Situation . . . . . . . . . . . . . . . . . . 1 1. The Present System of Systems . . . . . . . . 1 2. Information Control . . . . . . . . . . . . . 4 B. Information Processing Problems . . . . . . . . . 5 1. Information Exchange . . . . . . . . . . . . 5 2. Indexing and Information Control . . . . . . 6 3. Report Formatting . . . . . . . . . . . . . . 8 4. Systems Integration and State-of-the-Art . . 9 5. Item Identification . . . . . . . . . . . . . 11 6. Other Observations . . . . . . . . . . . . . 14 7. Problems Identified . . . . . . . . . . . . . 18 C. The SCIPS Effort . . . . . . . . . . . . . . . . 20 D. Community Management of Information Processing . 21 Present . . . . . . . . . . . . . . . . . . . . 21 Future . . . . . . . . . . . . . . . . . . . . . 23 1. Alternatives . . . . . . . . . . . . . . . . 23 2. Needs . . . . . . . . . . . . . . . . . . . . 27 3. Conditions . . . . . . . . . . . . . . . . . 28 II. Recommendations (SECRET) . . . . . . . . . . . . . . I 31 A. Summary Conclusion . . . . . . . . . . . . . . B. Recommendations . . . . . . . . . . . . . . . . . 31 31 S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T List of Illustrations [Contained in Volume II] . III. Findings and Discussion A. Picture of Community Information Processing . Introduction . . . . . . . . . . . . . . . . . . The Intelligence Context . . . . . . . . . . . . The Present Information Processing System . . . . L. Organizations, People, and Equipment . . . . a. Organizations . . . . . . . . . . . . . . b. Personnel . . . . . . . . . . . . . . . . C. Equipment . . . . . . . . . . . . . . . . a. Definitions . . . . . . . . . . . . . . . b. Item Categories . . . . . . . . . . . . . c. Items by Information Types . . . . . . . d. Item Descriptions . . . . . . . . . . . . e. Items by Class . . . . . . . . . . . . . f. Items by Originator . . . . . . . . . . . g. Specific Items . . . . . . . . . . . . . a. General . . . . . . . . . . . . . . . . . b. Over-All Departmental Flow Patterns . . . c. Interdepartmental Flow Patterns . . . . . d. "World" Flow Patterns . . . . . . . . . . e. Selected Item Flow Patterns . . . . . . . +. Processes . . . . . . . . . . . . . . . . . . a. General . . . . . . . . . . . . . . . . . b. Process Descriptions . . . . . . . . . . c. Over-All Picture . . . . . . . . . . . . d. Selected Items . . . . . . . . . . . . . e. Selected Processes . . . . . . . . . . . f. Selected Organizations . . . . . . . . . Volume Page II 25X1 - x - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Volume Page a. General . . . . . . . . . . . . . . . . . b. Total Files and Size of Files . . . . . . c. Age of Files . . . . . . . . . . . . . . d. Present Rates of Growth of Files . . . . e. Future Rates of Growth of Files . . . . . f. Purge Criteria . . . . . . . . . . . . . g. Files with Standard Formats . . . . . . . h. Manual Versus Machine Files . . . . . . . i. Types of Files . . . . . . . . . . . j. File Content Categories . . . . . . . . . k. Purpose of Files . . . . . 1. Intended Utilization of Files . . . . . . in. Security Classification of Files . . . . n. Dissemination Controls on Files . . . o. Consumer Access to Files . . . . . . . . p. Physical Form of File Items . . . . . . . q. Order of Files . . . . . . . . . . . . . r. Correlation of Machine Files . . . . . . (1) Consumer Access . . . . . . . . . . . (2) Types of Files . . . . . . . . . . . (3) Content of Files . . . . . . . . . . s. Correlation of the Rates of Growth of Files with Other Factors . . . . (1) Security Classification . . . . . . . (2) Security Classification Versus Form . . . . . . . . . . . . . . . t. Correlation of the Form of Files with Other Factors . . . . . (1) Security Classification . ... . . (2) Effective Date . . . . . . . . . . . (3) Purge Criteria . . . . . . . . . . . (4) Order of Files . . . . . . . . . . . (5) Content of Files . . . . . . . . . . u. Filing Criteria . . . . . . . . . . B. Information Processing Problems . . . . . . . . . Introduction . . . . . . . . . . . . . . . . . . - xi - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Volume Page 1. Indexing . . . . . . . . . . . . . . . . . . 2. Data Exchange . . . . . . . . . . . . . . . . 3. Report Formatting . . . . . . . . . . . . . . )F. System Utilization . . . . . . . . . . . . . 5. Biographic Information . . . . . . . . . . . 6. Definition of Intelligence . . . . . . . . . 1. The Information Flood . . . . . . . . . . . . ?. The "All-Source" Problem . . . . . . . . . . 3. The All-Source Index . . . . . . . . . . . . 4. Security and Information Processing . . . . . 5. State-of-the-IP-Art in Intelligence . . . . . 1. Other Data . . . . . . . . . . . . . . . . . 2. The Study Experience . . . . . . . . . . . . Appendixes (SCIPS Data Catalog T9) . . . . . . . . . . . . III B-2. Foreign Publications Item Inventory (SCIPS Data Catalog T9) . . . . . IV C. Process Description (SCIPS Data Catalog P3) . . . . . . . . . . . . III (SCIPS Data Catalog F1A) . . . . . . . . . . . . III (SCIPS Data Catalog R2) . . . . . . . . . . . . III F. Foreign Publications Findings and An sis [Including 20 Illustrations) II. . . . . 25X1 25X1 25X1 25X1 25X1 25X1 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T Volume Page I. Introduction . . . . . . . . . . . . . . . . II. Scope Note . . . . . . . . . . . . . . . . . III. Findings . . . . . . . . . . . . . . . . . . IV. Discussion . . . . . . . . . . . . . . . . . V. Conclusions and Recommendations . . . . . . . Attachment 1 - Cover to Cover Translations . Attachment 2 - List of Selected Files . . . . G. Study Documentation and Exhibits I. Genesis of the Study . . . . . . II. The Terms of Reference . . . . . . . . . . . III. The Basic Study Plan . . . . . . IV. Preliminary Substantive Work . . . . . . . . V. Modification of the Study Plan . . . . . . . VI. Staffing for Stage I . . . . . . . VII. Development of Study Parameters . . . . . . . VIII. Design of the Field Survey System . . . . . . IX. Field Survey . . . . . . . . . . . . . . . . X. Data Reduction and Machine System . . . . . . XI. Interim Reporting to CODIB . . . . . . . XII. Analysis and Report Writing Phase . . . . . . XIII. List of References . . . . . . . . . . . . . XIV. List of Exhibits . . . . . . . . . . . . . . C. d. Codes, Output Type and Source Codes Used in the SCIPS Sample Machine List- ings "Product Organization Study" . . . . . . . . . . . List of 19 Potential Dimensions for Plotting Information Process SCIPS ManloadingChart II. . List of Principal PPrsnnn l Who Were Assigned to SCIPS e. "HUMINT" Flow Chart f. List of Organizations se I-III of Field Survey (1) SCIPS Survey Instructions. Phase II, (2) Code Sheet . . - xiii - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 1 November 1963 25X1 25X1 25X1 25X1 25X1 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Volume Page (3) SCIPS Organizations Code (4) Survey Forms h. Stage I Organizations Surveyed i_. MITRE W-5818, Scips-Description of Card Inputs and Com u iles, 6 February 1963 22 pages, Separate Distribution . . . . . . . . . J. MITRE W-6334, SCIPS Computer Program and riles, 30 July 1963 r !t . !k-1 MITRE TM-3629 SCIPS Data Processing, 23 May 1963 40 pages, Separate Distribution . . . . . . . . . k-2 MITRE TM-3629S.1. rocessing, 5 August 1963 23 pages, Separate Distribution . . . . . . . . . 1. Service Bureau Corporation, SCIPS Com- puter Programs . , . , , in. (1) SLIPS Stage I Study Secuence: Field Surveyl (2) SCIPS Stage I S !)ata Reduction . . . (3) SCIPS Stage I Study Se uence: "roduction . . . u. SCIPS N-11, Supplementary Instructions PDS Process Codes, 2 February 1963 o. SCIPS N-14, SCIPS File Element Code, ? ? . . 6 May 1963 25X1 25X1 25X1 25X1 25X1 25X1 25X1 25X1 25X1 25X1 25X1 p. Indexing Tools and Codes q. SCIPS Surve Status Chart r. MITRE w-6333, SCIPS Files:. Correction, Modification and Description, 5 August 1963 20 pages, Separate Distribution . . . . . . . . . S. SCIPS Item Numbering System t. SCIPS Stage I System Presentation and ? . Status Report, 16 July 1963 . . . . . . . . . . . . . U. Organizations Selected for Study 0 ? . . . . . . . . . . . . . . . S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T Volume Page v. Equipment Code, SCIPS N19 I ?. . . x. List of SCIPS Data Catalogs H. Photographic Information Processing I I . . . . . . . . . . . . VI - xv - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 SCIPS STAGE I REPORT VOLUME I I. Summary and Conclusions The summarization of a long and complex effort such as that repre- sented in the following report is most difficult. On the other hand, the summary and conclusions are fortunately not so important as the findings, from which the diligent can draw his own conclusions. This summary is divided into three sections -- hopefully one or another section will be that which a given member of the varied audience is seeking, and some intersectional redundancy will thereby be forgiven. The conclusions reached are not the result of a poll of experts or even of system operators. Rather, the conclusions are those resulting from a small group of people who had a unique look at the situation. Those who seek the answer will be disappointed. Those who seek specific remedies for local symptoms of system failure also will be disappointed. The report will be of assistance, however, for the person who is seek- ing a perspective and framework of guidelines within which to do some long-term planning and capital investment in improving information processing in the community. The first section (A) deals with the present total system or situation -- that is, what is the problem? The second section (B) points out and discusses some of the major problem areas of information processing and then itemizes other selected findings and problems iden- tified during the study. The third section (C) concerns the SCIPS effort itself, past and future. The last section (D) considers com- munity management factors together with a range of alternatives, needs, and conditions for future action. A. The Situation 1. The Present System of Systems Information processing for intelligence purposes can be regarded as a cyclic sequence of operations. Within the community, there is a definite tendency for each component to attempt to gain con- trol over all the information that it needs from the point of acquisi- tion through all phases of processing, production, and presentation. When this is not possible, the component will attempt to receive the information in as raw a form as possible and establish and maintain control from that point on, through the remaining processing, produc- tion, and presentation. Thus the community system can be characterized as comprising several acquisition-oriented processing systems. Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Adjustments are continually being made among these com- ponent operations to achieve maximum performance. Many of the same items of information, however, are continually being acquired and processed by more than one organizational "system." In view of -present acquisition-processing "system" autonomy, many potentially significant information intersections among these systems are overlooked during "normal" operations. This fact is particularly striking, for during times of stress these very correlations are sought by concentrating the focus of all available acquisition-processing systems on critical sub- jects or areas. During normal operations, correlations between systems are obscured by the following: a. Different reporting criteria and characteristics, b. Different technical processing re- quirements imposed by method of acquisition, c. Different lapse times from acquisition to initial and subsequent exploita- tion, and d. Different formatting, different subject- urea content representation and coding requirements presently applied within each acquisition-processing system throughout their processing cycles. An examination of present information processes conducted by USIB components reveals certain fundamental orientations that may explain "why we are the way we are" and what might reasonably be done to improve our condition. The "picture" of information processing (items, flows, processes, and files) reveals that present USIB "systems" are strongly oriented to method of acquisition of the information. Thus we have major acquisition-processing systems associated with human observation and reporting; photography; interception of communications in a variety of forms; and product exploitation, both publications and material. Done of these acquisition-processing systems employ various techniques and devices that require strict access control to provide source-method protection. Consequently, information acquired by high risk methods retains high risk controls through much if not all of its S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 processing. Much information will remain in rigid control channels as long as its existence in US hands could have come about only by the employment of a certain acquisition technique. A tool in lowering access restrictions is the existence of collateral coverage whereby low or no risk methods are directed to acquiring identical information and thus permit wider access to the same information with credibility remaining at the restricted access level. Directed acquisition of this "collateral" information need only be undertaken after it has been determined that such information has not been already acquired and is residing in one or more intelligence community files. However, our inability to identify information in files only adds further confusion and frustration. From the number and size of, and the limited access points to, the existing files, as presented in the findings section, it would appear often to be more expeditious to reacquire a specific item of information from the field than to deter- mine that it has already been acquired. and where it has been filed and to retrieve it therefrom. In numerous instances the analyst does not have time to exercise either option -- he must proceed with what he has or can acquire in a short period of time. Such conditions must continue to obtain in the absence of an effective information correlation capability across "sources." In addition, until such information control is achieved our ability to evaluate performance capabilities of acquisition-processing "systems" will remain largely intuitive, sufficient to justify the implementa- tion of additional acquisition methods but not sufficient to demon- strate which of the present methods deliver unique information. in a timely manner and which, if any, do not do so. The need to improve our ability to deliver potentially significant information in forms useful for exploitation and. to allo- cate limited exploitation resources justifies immediate system-wide adjustments leading to sufficient information control to enable cross- source correlation. These adjustments should address at th:. outset those processing variations and accommodations that cause an item of information to lose its identity to a degree that cross-source correla- tion becomes impossible and retrospective research must be done at the document rather than item of information level. Furthermore, these adjustments should be made at that point in the process where they will do the most good. This will, in many cases, seem to impinge on the "private preserves" of our source- oriented systems. This initial control point has to be after meaning- ful form is derived but before great proliferation. Therefore, the real impingement on present "technical exploitation" organization ele- ments will be in the form of different but greater responsibilities. - 3 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 However, the only alternative seems to be the present practice, which is to gain control over information content only after it reaches the analytic support environment. This practice results of course in the reproduction, transformation, processing, and filing of the items when and wherever it is deemed desirable and resources permit. The increas- ing flow of unfiltered, uncontrolled information into fourth and fifth echelon processing (all-source synthesis) implies that the community is already following this course of action on a pragmatic basis, even though its resources are and always will be demonstrably insufficient to do so. 2. Information Control Technical processing, source protection, time of receipt, format design, content representation techniques, and personal and organizational preference all militate against efforts to identify and maintain control of relationships existing in items of information acquired and processed independently. As items of information are acquired and reduced to comprehensible form, they are reproduced for local and lateral as well as onward distribution. Once this occurs, this information finds its way into post, station, and command sum- maries, briefs, and digests which in turn receive local and lateral distribution and also are placed into the main streams of dissemina- tion. In some cases, source identification may be obscured and second- order reporting might be regarded as corroboration rather than repe- tition. Items received at numerous processing points may be reproduced, if necessary, and filed in a manner to provide local access. The in- formation as initially acquired from collection or reacquired from files is incorporated in analytic outputs that are published and disseminated to consumers, many of whom also receive the "raw" take. Both of these may be considered as equally "raw" to that consumer who will reestimate in accordance with the dictates of command, need, point of view, or capability. There is always the hope of "filter" operations at suc- cessive levels in the collection-analysis cycle. ("Filter" means to associate fragmentary information on a rational basis and forward to the next level only, but all of, the nonredundant significant informa- tion.) It must be recognized that the ability, particularly of intermediaries, to determine what is or will be of significant intelli- gence value, even when based on experience, is suspect. The threat of reserving to the user the determination of significance is inundation of the user in duplicative and insignificant reporting. This need not be the case if (a) judgment as to significance is made only after re- dundant reporting within a source-system has been eliminated by the S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 technical processors and if (b) the information has been brought under initial content control. Standard formats are not necessarily a pre- requisite of content control. This approach would impinge on the present de facto prerogatives of the source-oriented systems in three respects: (a) requiring their effective elimination of duplicate re- porting (and this could be a tremendous burden in some source-systems), (b) imposition of content control, and (c) filtering for significance based on content control against consumer requirements expressed in the same content control terms. Prerogatives notwithstanding, if our prob- lems are to be solved, not salved, system adjustments must be made at points in the process where they will do the most good. Such a point occurs where items of information are being put into a comprehensible report form but before great numbers of copies have been released. This implies, as a generalization, that some content control and related filtering must be introduced at the second not the first or fourth echelons, and it must be done in all intelligence "worlds" including Photographic, Foreign Publications, Foreign Broadcasts, Communications Intelligence, Human Observation, and so forth. It is believed that this information control can be achieved without jeopardy to the early warning or watch function, the primary products for which would not have to be delayed. On the other hand, achieving this content control would require severe and basic changes in the present division of func- tional responsibility, not so much between agencies as between elements within each source-oriented system. The collectors, the technical ex- ploiters, the reference servicer, and the consumer would be redividing the load -- and the present division is deeply ingrained. B. Information Processing Problems 1. Information Exchange The present policy of free information exchange dare not be questioned in the face of "anti-Pearl Harbor" missions and in the absence of a good alternative, but the result of this practice is the rapidly approaching situation where "everyone needs everything to do anything," and consequently there may soon be no small or medium-size information processing problems, only large ones. If this day does arrive, then the supposedly "only" policy of free exchange will have failed and an alternative policy will have to evolve. The alterna- tive may lie in the possibility that nobody really needs or even wants everything but is forced to require everything for even reason- able assurance of getting what is needed. It is believed that the latter situation is the true one and that the policy is ineffective in that regard. More important than changing the policy, however, is to facilitate selectivity through better content-control practices, because the other and more important result of the policy is lack of responsibility in providing information support. The manifestation of S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 this most serious situation is the list of items and the list of files appended to this report. Can an analyst really be held responsible to "consider all pertinent available information" when it is of this variety, dispersion, and form? Are the present file holders responsible for information support to outside analysts? The only responsibility on the books is to the policy of "free exchange of information," and that is legally satisfied by the initial dissemination system. In addition, if a specific document is cited, it will even be reproduced and again provided, but it is a certainty that no other component has a need-to-know for the entire file, and the file is not built to ex- tract on those criteria for which there is a need-to-know by other analysts or components. If the file is big enough to ensure founder- ing by the recipient, it might be provided at cost despite lack of full need-to-know. It does not seem possible that the policy as stated could be wrong, but when it becomes a substitute or provides an escape for needed functional responsibility, then it is wrong. 2. Indexing and Information Control indexing is still, as it was when this study started, con- sidered central to all the major problems of data exchange, intersystem compaticility, report formatting, and duplicate processing. The dif- ference now is that the indexing problem is not what it seemed. The real indexing problem is not the codes used but the elements of infor- mation to be controlled. Analysis of formatted files shows that only about one-half of the elements are concerned with information content control, while 10 percent are concerned with local processing factors not essential to information exchange, and the rest are ephemeral or document description type elements. It is this latter group that should 'be the first concern of data exchange, and although it appears amenable to standardization, it has not been attacked. For the infor- mation elements providing content control the number of different in- dexing tools and procedures is multitudinous, and yet this is the area of past standardization efforts. As discussed previously, the point at which standardiza- tion of content control has been sought in the past is too late in the process to be achieved on a community-wide basis and may not be desir- able. Some of the failure to achieve a greater degree of standardiza- tion is due to deficiencies in the tools. There is no present single set of indexing tools that would seem to fill a majority of the com- munity's needs. The Intelligence Subject Code (ISC) would be a better tool if a fully hierarchic notation scheme were developed and issued together with full conversion equivalents to the present notation. There is still a great need for a good, well-coordinated tool for "Biographic" and "Organizations" information elements -- either as additional chapters of the ISC or as separate tools. Surely it is S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 recognized by now that a code is only a part of a system -- a tool -- and that neither standard tools alone nor identical equipment will ensure compatibility of "systems," which include instructions, train- ing, supervision, items, dictionaries, people, and so forth. The present ISC does suffer from inadequate coordination during develop- ment, but the main point is that it is a good tool and no single code .or set of codes is going to fill a broad spectrum of local deep in- dexing needs. So the object is to provide good tools for local in- dexing in depth and keep legislation of standards in the content- control category to a shallow common depth and at a point in the process where it is implementable. Although not unanimous, the appropriate "common depth" for content control seems to be (a) for area : a country code such as the AFIC or NSA digraph plus bloc codes such as the ISC area trigraph codes and (b) for subject: somewhere between about 20 categories and the 300 that would result from the first 3 digits of the ISC (using a true hierarchic notation scheme), dropping many entries but adding some for organizations, biographic, and other special popular elements of information. The area digraph codes are not so far apart, and direct conversion with other area codes is a reasonable prospect. The subject code is another matter. The depth of content control will have to be not the conceptual ideal but a compromise with other factors. The principal influencing factor is the point in the process where the content control is first applied. Within a given "source-oriented" system the flow is typically hourglass in configuration. There are a great many points of acquisition from which raw information flows to one or a few technical exploitation/publication points where it is edited, reproduced, published, and thence disseminated to multitudinous activities in the community. The "publishers" points are identifiable within each of the source "worlds" and comprise a relatively few and finite number for the bulk of information reporting, and therein lies a reasonable promise of uniformity. Even so the content coding system must be simple, not allowed to be elaborated until after a long period of successful application, if ever, and must be put on the master form of the item from which all successive copies are produced. DDP/FI, NSA, II DIA/AC, RM/STATE, and NPIC are the organi- zations within the intelligence community that identify and eliminate redundant reporting and serve as initial distribution points for the bulk of published intelligence information. A community-sponsored content control coding (4c) applied by each of the above identified organizations plus perhaps four to five lesser points (by the editorial staff in some cases and technical exploiters in others) would provide some degree of common content control at the most effective point. Such coding might eliminate some of the necessity for multiple readings of the source document by disseminators within the community. The 4C 25X1 S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 code also might serve as filing and indexing guides by the individual research officers or other points where deeper indexing resources are not available. Such a code must be specific enough so that intersec- tion of multiple broad subjects and areas will give a useful discrimi- nation and yet must be shallow enough to facilitate reasonably consistent application by other than coding specialists. The code also must re- quire little updating and a minimum of rules and instructions for appli- cation. It is believed that a code meeting these criteria can be de- veloped, and relatively easily if too much is not expected of it. There should not be much invested in its application, and then, too, many benefits will not be expected to result -- for example, it would not be expected to replace the ISC, and it would not necessarily enable automatic dissemination. When combined with standard item identifica- tion the 4C code would be the first real step, however unsophisticated, in intersystem compatibility and data exchange on a community scale, and untold benefits might be achieved, especially in comparison with the limited results of the past 10 years of reissuing "policies" and putting official seals on "coordinated codes." It is believed, as indicated by the element occurrence dis- tribution in present formatted files, that there are considerable potential benefits and opportunities in community standardization of item description elements (versus content description or processing elements). These elements should be finite in number and less dependent upon "point of view" (and therefore less controversial) than content elements but would do much to facilitate data exchange and communica- tion between systems in identifying items, categories of items, and terms of requests. There needs to be a unique list of such elements (as well as content control elements) developed (present SCIPS data base will provide the bulk) for community use as well as for depart- mental system designers. There needs to be further specific identifi- cation (possibly machine-controlled) and publication of coding tools being used to show who is really doing what with which information elements, for the use of both system designers and consumers. The development and publication (not necessarily legislation) of "how to" handbooks for information control system operators would be useful tools for the community to sponsor. The general theme of this report is particularly appropriate for this section -- the problem of under- control of information is more critical than duplication of control processing. Duplicate control processing is symptomatic of the real problem, which is lack of information control. 3. Report Formatting General "report formatting" requirements for true auto- matic input to files as implied by present file formats are unknown and will continue to be unknown for a long time to come -- that is, S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T not until there is information content control over items and files. For specially designed automated files the formatting of a few spe- cific report series will prove to be useful, if machine readable but not electrically transmitted. These cases are not going to be fre- quent enough to have serious impact on the community in proportion to the total system. The first step in automatic input is to iden- tify the item; then to determine the information elements; then to standardize on a way to identify (tag) the elements; and then to consider format, machine readability, and carrier. If taken in this sequence, there are appreciable processing benefits which result from each step ani.which are not dependent upon the success of the next step or upon automation. Although a special survey form was specifically designed to elicit report formatting requirements for automatic input there were no responses. It is believed that although part of the "no response" was due to surveyor deficiencies, there were two other good and sufficient reasons: (a) the present state-of-the-art in IP does not enable automatic input, even when machine-readable, and (b) the present systems are not developed to a level where such requirements are determinable. There are almost some exceptions to these generaliza- tions. In the interim and in preparation for the time when those two conditions are overcome the best community action would be to a. Standardize item (series) identification, b. Develop common lists of information ele- ments from present files, c. Develop standard element identifications (standard within a series sometimes and more often between series), and d. Then start using the element identifications in particular series having greatest impact. Up to and somewhat beyond this point the using systems probably will have to develop their own input means to fit local system design. A little further in development fully standard formats might be considered. The only other interim useful standardization would be to adopt a standard character set, and the set recently adopted by the American Standards Association warrants first consideration. 4. Systems Integration and State-of-the-Art After viewing the dispersion and variety of information processing (IP) systems just within the scope of the Stage I study, -9- S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 it is understandable why everyone is concerned with systems "integra- Gion" or "interface." After viewing the present state of automation and true information control it is also more understandable why systems do not seem to "integrate" or "interface." The most pressing systems integration-interface problems seem to be between components within agencies more than between agencies, but virtually all agencies have these problems. It is not only the state-of-the-art that inhibits system integration-interface -- it is also the inability to identify the systems in all the necessary terms. .A state-of-the-art survey was not made during Stage I. However, after viewing present computer applications, examining the IP problem, and actually experiencing an application (the SCIPS auto- mated data base), it is doubted that present general-purpose computers will ever solve the bulk information processing problems in the sub- stantive intelligence community. It is not that they are not concep- tually adaptable to the major problems -- it is just that the imple- mentation requirements are self-defeating. Present computers are only truly successful when used for highly structured and circumscribed processing, and even then they take man only halfway to his problem solution. The present computers must and should be used even more than they are in the intelligence community, but on specific problems. The pitfall seems to be the building of an entire information process- ing system around a general-purpose computer. The IP system should be designed and performance specifications determined, and then it will become clear at what points in the system present electronic data processing (EDP) equipment should be used. It will also become more clear which functions of the system require research and development to make significant gains in capabilities. It is believed that intel- ligence information processing problems include requirements for EDP equipment. quite different from those represented by today's general- purpose computer. Many of these requirements might well be met by developments in the electro-optical, content-addressable/associative or the analog equipment areas. The state-of-the-art solution will be successful and timely in direct proportion to the degree of specifica- tion of the problems to be solved. So what is required is roblem specific_atio_n_ (not statements of objectives or procurement requirements) by the community and then applied research on the real and significant problems by the joint efforts of the best people that the community and private industry have. Unfortunately, in that single-sentence condition there are five or six specific pitfalls; however, there is a good probability of success if the pitfalls are avoided. Unless we recognize those problem areas not susceptible to solution with present EDP systems and redirect our money, manpower, and attention resources, significant gain will never be achieved. The present-day computers are performing an invaluable function on special problems, and more of these applications should be made (including individual specific problems in S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 central reference facilities). Unfortunately, like the policy for free exchange of information substituting for information support re- sponsibilities, the computer in "total system" applications has become a substitute for systems engineering. If the reason for this is the lack of systems engineers, rather than too much vendor salesmanship to the executives, then the community has yet another prerequisite to work on. The first task then, is to identify adequately the system such that present techniques can be best applied and good focus given to the development of critical additional techniques. IP systems will then attain a better degree of information control, which is the key to systems integration/interface-versus amalgamation. The best ready- made method known that might provide adequate system identification is that used in the SCIPS field survey system. 5. Item Identification Items flowing throughout the community. contain a variety of information. In some cases an attempt is made to limit and iden- tify the scope of the subject matter by establishing specific reports series for specific subjects. However, these are the exceptions rather than the rule. In the greater number of cases, a given issue of a series may contain information on any subject or in extreme cases any number of subjects. Consequently, it becomes necessary to peruse each issue to determine information content. This in itself would not present much of a problem if each issue required only one reading. Many copies of each issue are produced, which are read over, and over., by many different people. Seldom, if ever, is the subject (or subjects) of the document designated. Generally, external notations on the docu- ments consist of routing slips designating the organization-component's which should get the document but no indication as to why they are getting it. The result. is that every component and subcomponent that gets a document must read the document to determine subject content. Report titles, even when most appropriate to the individual report, are often either too general to provide sufficient. discrimination on subject content or are so specific as to become technical and prevent a nontechnical screener from properly categorizing the item. When the term "dissemination discrimination" or "informa- tion control" is used, most reactions are negative "because of the inference of more restrictive practices. This reaction is based on the false belief that everybody is now getting everything. The Stage I data base is proof enough that this is not the case [see Figures III r (1-24)].* The 32,000 locally identified items were resolved into some 14,000 items. On the average, of the 14,000 items identified daring survey, any one of them occurred in only 2.3 of the some 50 organizations For the illustrations, see Appendix A, Volume II. - 11 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 surveyed. Even subtracting the 10,000 foreign publications, the ratio is less -chan four organizations for the same item. Failure to identify items accounts for some of this lack of commonness, but the uncommon occurrences of items is still dramatic. Although not yet analyzed, it is suspected that there are some 500 to 1,000 of the 4,000 non-foreign- publicat_Lon items that account for most of even the 4 to 1 ratio -- meaning that the other 3,000 or so items are almost unique to one organization. Whatever overstatement of the case the study figures cause, there can be no doubt that there is a high degree of selectivity over-all, even though "everybody" gets a certain group of items. The general __mplication of concern here is not costly duplication but the danger of missed items. A remarkable aspect of the community's information process- ing operations, as implied by the inability to collect (at least readily) the survey information, is that present systems do not know, and do not seem to care to know, what individual items in what volume are coming into the system for processing or from whom. Neither do they know what spe- cific items are going into which file, and often they do not know the file size or growth rate. Although the foregoing is of course a generalization, it was so common that in retrospect it seems a phenomenon. These same systems usually had prolific records on their own processes occurrences, but not on the items to which the processes were applied. it was realized very early in the study that if we were to trace the flow of information in the community, we must be able to identify specific items of information uniquely regardless of where they appeared or what they were called. However, it was also recognized that we would not know what the specific items were until after the com- pletion of the survey. It was therefore necessary first to establish an item concept and then during the initial survey to record descrip- tive information about items for subsequent comparison and identifica- tion. This descriptive information consisted primarily of the organi- zation being surveyed, the originating organization of each item, the series or serial designation (if any), and the item title. After the information collected on the survey sheets had been entered in the SCIPS item file, computer print-outs were made and unique SCIPS item numbers were assigned to each locally described item. Unfortunately it was not always possible for the surveyor to identify individual items at every organization surveyed, because records (if any) were not kept in the same way. Items were very often included in aggregations that forced the use of "item group" and "super item" iden- tification numbers. Obviously, when the items could no longer be identified uniquely, the study of the further flow and processing of the item could not be done. However, when the SCIPS item numbering was possible, it permitted us to develop flow patterns of information and greatly facilitated the manipulation and analysis of the data. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 If there is to be efficient management of the flow, processing, and filing of information in the community, or further study thereof, it is important that some standard method be instituted to identify the information items. Such a method should result in a published and maintained authoritative list of items (something like Appendix B-l, Volume III) which would be used in management record keeping and facilitate intersystem document identification for infor- mation exchange. Just the availability of such a list, even without legislating its use, would result in some degree of improvement in record keeping and communication. One approach to the establishment of such an authoritative item list would be as follows: a. Select from the SCIPS Stage I data the items already sufficiently identified (see Appen- dixes B-1 [Volume III] and B-2 [Volume IV] and Exhibit a [Appendix G, Volume V]). Make corrections to standardize title and originator. b. Reestablish the mechanized item file, uti-? lizing provisions for additions or dele- tions. c. Design and print input forms to be used for additions and deletions to the file. d. Resume the "product-organization" study (see Exhibit a, Appendix G, Volume V), adding items which can be identified positively. e. Make print-outs of items by originating organization. Send the lists and a sup- ply of forms to the originating organi- zations for correction, deletion, and additions. Make provision for continu- ing additions and deletions by these organizations. f. Design and implement a standard community item numbering system. This would not be substituted for present originator numbering systems or necessarily obviate accession numbering. The only thing worse than yet another number as here Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T proposed is to try to do everything with one numbering system. g. Maintain the file and provide periodic item catalogs on a community wide basis. 6. Other Observations Given below without further discussion are selected obser- vations and questions deriving from the Stage I data. No significance or validity factor is implied by the order in which listed. Paren- thetical references are to particularly related sections or data figures in Section III (Findings and Discussion), Volume II, of this Stage I Report. ~. Information processing is not very cen- tralized within the intelligence agencies (see Section III, A, 1, Volume II). b. The recognized central reference activity is nearly the last place to get EDP (see Figures III f-i).* c. There are already more "pieces" of EDP equipment than EAM, but files are still by far punched card versus magnetic Lape -- so EDP is present but not im- pacting on files picture. d. In general, from the clerical to the pro- fessional ratio, the IP systems must be neither particularly sophisticated (re- quiring a high professional to clerical ratio) nor routinized (requiring a high clerical to professional ratio) (see (Figure III d) . C. The intelligence community is neither mono- lithic nor isolated -- it has extensive (in number of points and flow volumes) contact with non-USIB agencies [see Fig- ures III r (7-24)]. For the illustrations, see Appendix A, Volume II. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 f. CIA serves as something of a community focal point for acquisition from noncommunity elements, but there is no particular focal point for dissemination -- everybody dis- seminates his own products [see Figures III r (7-i8)]. g. The level of intradepartmental IP activity is four or five times the interdepartmental IP activity -- so hard to stay concerned with "community" problems versus depart- mental problems [see Figures III r (1-214) and Section III, B, 4, Volume II]. h. Systems that are "source-oriented" tend to become "all-source" systems, and producers become consumers [see Figures III r (1-24+) and s (1-5)1- i. There seem to be as many as four echelons of dissemination. There are typically about 6 to 10 organizations involved in the first level, 150 in the second level, perhaps 400 in the third level, and as many as 900 in the last level. Is it pos- sible to divide and subdivide functionally the intelligence job between some 1,500 organizational elements -- is it possible to eliminate duplication? [See Figures III s (1-5) and t (1-12)]. Foreign published information is propor- tionately and absolutely little processed in terms of information content control .-- supposedly because it is "low-grade ore." The community exists as a community because of foreign security restrictions on infor- mation. Is open literature actually low- grade, or is it just too voluminous for available IP techniques? Would full ex- ploitation of foreign published informa- tion permit high risk collection to be done on an ad hoc rather than programmed basis? (See Appendix F, Volume II, and Appendix B-2, Volume IV). - 15 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 k. A very large variety of information elements are used as first and second file order criteria throughout the community. This does not bode well for standardization and data exchange when combined with manual control only [see Figures III v (68), (74), and (75)). I. Cnly about 25 percent of all information element occurrences in standard format +'iles are coded (see Section III, B, 1, Lnd Volume II). m. We must interfile-communicate in un- ,tandardized text that requires human "converters" (see Section III, B, 2, Volume II, and unpublished SCIPS data catalogs). n. The number, size, and variety of files in community storage and retrieval systems .riake the internal and external R & D work !ow being done of questionable pertienence and applicability to community problems (see Sections III, A, 5, and III, B, Li, Volume II, and Appendix D, Volume III). o. Internally consistent formats for file records is neither a panacea nor neces- :3arily an incentive to data exchange between files. Over one-third of the community files (78 million items) have internally consistent formats (see Sec- tion III, A, 5, g, Volume II). p. The small proportion of machine-readable items indicates a low degree of true automation [see Figure III n (7)h q. Some 78 million unit records are machine- naintained. Should we machine the other 1.50 million in file and the 15 million Go 25 million items added to file each .year? (See III, A, 5, h, Volume II, and reference 31/-*) x' For a list of references used in all volumes, see p. 33, below. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T r. The general absence of file-purging and the non-use of time "activity rates" as a criterion when there is purging are in- dications of not knowing what is needed or what is in the file -- that is, no content control [see Section III, A, 5, f, Volume II, and Figure III v (13)1- s. There are more file items for control purposes than there are items being con- trolled, and "documents" apparently are unsatisfactory as an information storage and control form [see Figure III v (26)]. t. Security classification of items seems to be more of a file access problem than a criterion for filing. That is, generally, separate files are not established on the basis of security classification, nor is it a file order. Either the not-fully- cleared go without, or else we multiple- file (see Section III, A, 5, m, Vol- ume II). u. The popularity of "area" ordered files is not as real as apparent. Most area files are functionally subject, date, or serial no. -- ordered files. Only some 10 per- cent of all unit records are ordered solely on elements in the USIB-sponsored Intelligence Subject Code (see Section III, A, 5, q, Volume II). v. Authorized Dissemination Controls (DCID 1/7) are not being used as an access discrimi- nator to file items. Even more than security classification, dissemination controls only restrict utilization of whole files -- another dimension of file content being unknown [see Figure III v (33)1- w. Hard copy documents as a file form of infor- mation are evidently of more perishable utility than other forms (3 x 5, 5 x 8, magnetic tape, etc., which files continue to be added to). This indicates that docu- ment files might be more susceptible to - 17 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 =;mmmon archiving than other files [see ~`i..gures III v (61-67)]. x. Some items produced by "finished intel- li_gence" producing components are the t;:Tpe produced by central reference com- ?u? )nents and, in any event, fill central _ruference needs (see Appendix B-1, .31ume III, and CIA/osI-MP/63-3). '(. Problems Identified One of the principal tasks of the Stage I plan was to iden- tify information processing problems requiring further study. To the extent that the problems discussed in 1 through 5, above, have not been resclved, they head the critical list for future study. In addi- tion, the following problem areas seem of particular commonness and importance throughout the intelligence community: a. The development of additional tools whereby the intelligence research analysts can inform themselves more rapidly and more completely on what information exists where that might bear on a particular problem. (Files inventory plus filing criteria? Item inventory? Personal contact inventory?) The absence of such tools results in the analyst's spending too much time, not looking at all, initiating unnecessary field collection, or drawing wrong conclusions. b. Loss to the community at large of the results of individual analysis of a given report or piece of information. There is insufficient system capability to make generally available either the analysts' initial assessment of incoming information or, retro- spectively, the analytic assessment of his file data in sufficient specificity. There is neither sufficient motivation nor facility for analyst input to the data base. c. The lack of quick ad hoc response from automated information and reference systems. Either you thumb through a thick print-out correlated six different ways and published periodically -- or you wait until tomorrow or next week -- or you maintain your own file. The fallacious object seems to be, first to have an "efficient" computer operation and, second, to provide service. d.. Multiple screening of the same item at multi- tudinous points throughout the community to determine not how to process but just whether the item qualifies for the process (content control code). - 18 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 e. Undocumented screening criteria at the thousands of branch points throughout the community system. f. Lack of common bibliographic control citing, limiting retrieval from several reference facilities (see indexing and common element discussion). g. Lack of documentation and terminology variations prohibit communication on depth of indexing being applied. h. Diversion of ADP system resources from substantive information processing to administrative-management support work. i. The lack of ability to test assertions such as "cable information is either of transient value or is followed up with hard copy." j. The feasibility of and basis for allocation of information processing functional responsibility between agencies or components in the absence of clear-cut division of intelligence pro- duction responsibilities. k. Duplicate processing of foreign documents and un- wanted long file life of items in many places because there is no central facility on which to rely. 1. Specification of a variety of file conversion con- ditions to enable feasible techniques to be devised. in. Use of ADP equipment as printing presses due to overloaded and uncleared printing facilities. n. Definition of the intelligence community in terms of an organization identification system -- for information process- ing and for communication and research purposes. o. The lack of identification of commonness and un- commonness of information elements and source items as well as search terms in systems, such as in "positive" and "counter" intelligence biographic systems, prevents resolution of questions of integration/ interface between these systems. p. The question of a special common programming language for intelligence information processing purposes (COINOL) versus adequacy of available languages (COBOL). - 19 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 q. Identification and specification of the apparent R & D gap between the NSF-sponsored basic research and departmental sponsored operational system development. This gap is best described as techniques application to real intelligence problems. r. Development of an effective way to integrate sys- tems, usewise, but leave organizationally and physically separate such files as the target folders in IR/CR with the indexed documents in the CIA Library with the computerized target briefs in NPIC with the mag- netic tape AIF file in DIA against locational-type ad hoc queries from decentralized users. These four systems represent the four degrees of storage and retrieval, each containing unique and overlapping informa- tion in different forms with their respective advantages and disadvan- tages of ooost and usability. C'. The SCIPS Effort The terms of reference for the study as approved by USIB in July 1961 are no longer believed to be appropriate without modifica- tions in Light of Stage I findings and experience [see Section III, B (Introduction), Volume II]. The Stage I effort and the 7 months' launching period have finally resulted in products believed to be more than a bargain for the community in terms of the input (see Section III, C, Volume II, and Appendix G, Volume V). In addition to a unique data base of about 30 percent of what's needed, there is a systems study system appropriate to intelligence information processing operations and a computerized management information mani- pulation system. Although there is not an experienced, expert organi- zation to point to as a product, there are some individuals with in- creased capabilities. The effort is believed to have been unique (at least in degree) as a cooperative community effort in terms of concrete significant results and in terms of "community" motivation and orientation. Although the staff members came from specific agencies and departments, it was found that they could be motivated to community goals. This is noteworthy and commendable whether there is a "community" market or not. At the same time, as a result of being departmentally owned, contributed, and career-obligated indi- vidually, the staffing as a whole suffered all the other usual dis- advantages of "joint" efforts. When it comes down to an individual, a department usually and understandably determines the utilization of its talent on the basis of greatest departmental return. By defini- tion, a component department's objectives are not congruent with com- munity needs, though temporarily coincident. From quite a different point of view, the complexity and con- ditions of the activities studied were a severe limitation on accom- plishments. From both points of view the past experience and findings Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 lead to the conclusion that as long as it is as difficult to conduct such a community-wide fact-finding systems study as Stage I was, it will never be done again. It takes too long to obtain, standardize, and analyze the necessary information on the spectrum of present operations. So, still believing that lasting solutions must be specific and can only evolve from specific factual data in a "broad system context," there are three things that must be done: 1. Provision of the most advantageous staffing conditions, 2. Standardization in departmental recording of management data on IP operations, and 3. Initial simplification of the IP system itself. Although believing that true solutions generally cannot be legislated, only facilitated, it might be that the first two cited preconditions will have to be legislated. The second could be developed by adapta- tion of the Stage I survey system. The initial simplification of the present IP systems could be the institution of content control and filtering on bulk series by "producers" or perhaps just "little" things like unique item identification, information element lists, and the common element control (see Section III, B, 7, Volume II). The principal conclusion on the past effort, bluntly and suc- cinctly stated, is that by doing it we proved that it could be done, and at the same time we became convinced that it never will be done again on the same basis. D. Community Management of Information Processing In this section are the principal conclusions and observations not so relatable to specific data and findings during Stage I. What follows is the result of accumulated experiences including the recent past. This is where the problems are seen in relation to mismanagement, or more often the lack of management. 1. The information processing (IP) sector of the intel- ligence cycle -- that is, those functional operations between collec- tion and intelligence production -- has not received the share of community concern that it warrants. Some indicators of this are as follows: a review of USIB agenda and minutes shows USIB attention divided between collection problems and substantive estimates; the community structure itself reveals four USIB committees on substantive S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 production (not including the Board of National Estimates) and four on collection coordination and one on information processing (CODIB); the Priority National Intelligence Objectives refer to "collection" and "research" -- information processing is lost in the shuffle and is assumed to fall within either production or collection, and nobody seems to care which. What are the Priority National Intelligence Objectives for intelligence information processing? Are they the same as for collection and production, or are they to do backup in non- priority areas? Until the present situation of not knowing what is in the file is corrected, both the necessity of collection and the validity of estimates are suspect. '. The imbalance between the amount of information col- lected and that exploited and content-controlled is evidence of im- balance in allocation of resources, and yet the recent trends are to shift resources from reference facilities to collection-related activi- ties. 3. The use of computers for substantive information processing brings on new management decisions, such as who should own the computer. As discussed in Section B, 4, the present general-purpose computer-is not very satisfactory, and yet it is a tool that we have, and it should be applied to even more IP problems -- but specific problems. Business administration type applications are almost always done by closed-shop methods. Scientific computation applications. are usually done by open-shop methods. Substantive intelligence informa- tion processing is yet a third and different category that is teeter- ing between the two camps. At this stage of development; the ADP application should be done on an open-shop basis from inception up through the initial months of routine production. If it is a sub- stanntive analytical problem, the intelligence analyst and the pro- grammer should work directly with the machine and be inefficient if necessary, but effective. If it is a reference support problem, the present system operator and the programmer should have direct access to the machine. If, when, and as such jobs become stabilized and routine, they can be done by a centralized computer complex in a closed-shop fashion. More progress will be made sooner if computer capability is separately provided for development of applications on an open-shop basis. Centralized operations control production work efficiently and inhibit developmental operations. Decentralized open-shop developmental work will be very expensive in terms of idle computer time, but a real bargain in terms of accomplishing long- range objectives. I. There is virtually no national assignment of responsi- bility to provide specific reference services. As a result, each department, understandably, does not take any chances and relies on S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 itself only by getting, processing, and filing all the information that it can afford. This condition will continue until responsibility is fixed and until dependable capability to provide information in the time and form needed is demonstrated, at least to a better degree than the departmental resources can do. Blanket assignment of responsibility in general subject areas will not do. 5. It is questionable whether genius could do anything with the present system; so it is a certainty that mediocrity can not. Responsibility has never been successfully contracted out. The chief reason for limitations in the successful use of contractors in infor- mation system design is the lack of sufficient in-house capability even to develop adequate system requirements or to monitor the development and implementation effort. 6. When the solution seems to be "centralization" and a "national center," it is usually symptomatic of failure to define and coordinate. The total of community objectives is comprised for the most part of constituent departmental objectives. At this state of development of the information processing systems, the greatest needs are for common relief of burden and a real operating success on other than a special problem. Either of these two realizations would put any benefits of centralization or "compatibility" accomplishments to shame. 7. There is in the community no accepted organization or system in terms of objective leadership or outstanding acumen or success in information processing. There is hardly a successful mousetrap, much less a better one, and successful leadership will not be legislated. 8. The only community body officially concerned with in- formation processing is CODIB. This committee is comprised of depart- mental operators with almost insoluble problems in their own components. Understandably, they are seeking in committee activities community assistance in solving their own problems. It is asking too much to expect such a body to be concerned primarily with community problems, per se, at the monthly meetings, much less the other 160 working hours in between. The community problems like the departmental problems will not be solved by such intermittent attention. Future 1. Alternatives It is easy enough to say that the whole fault is "bad management"; the ultimate is to try to specify what good management would be. This section is the ultimate. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 '..l'he following cumulative continuum is presented as the range of actions that could be considered for improvement of information processing in the intelligence community: a. Continued committee coordination (CODIB) b. Ad hoc problem groups under CODIB c. .joint Fact Survey Staff (Stage I continued) d. Joint Information Exchange Staff f. Community Operations Research Center Centralized ADP Systems Center h. Series of Technical Information Processing Centers i. Three Information Processing Centers (Photo, Signals, Documents) J. One National Information Processing Center Working from either extreme, some considerations are: Alternatives a and b represent the past practice in a coord'~_nation mode. The tools used are regular committee action, formal directives, liaison, ad hoc committees, and problem study groups. In some instances a contribution to the community is realized from using these techniques, but mutual benefits of any permanent significance are very difficult because of (1) a lack of continuous control, (2) operat- ing on a part-time basis, (3) self-defined objectives, (4) all elements not being represented, (5) conflict of departmental versus community objectives, and (6) competition for personnel resources. The present condition of information processing and the SCIPS terms of reference attest to limitations of past practice. Alternatives i and j are put forward most often as the ultimate objective. Doing i and j is the antithesis of doing a and b -- that is, with complete centralization no coordination is necessary. After viewing the nonexclusiveness of the existing centers, the size and nature of the information processing operations, and the divers de- partmental missions, it is easy to agree with the phraseology of the President's Science Advisory Committee 39/ -- "over-simplification of S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 a perplexing problem" and "To expect miracles of management to follow from centralization of the information system is unjustifiably opti- mistic ... ." Alternative c is a natural first consideration -- it represents a continuation of the present. The only apparent require- ment is for CODIB and USIB to evaluate that the results of Stage I warrant a continuation on a Stage II basis and restaff the effort. The documentation in Appendix G. Volume V, plus either the Basic Study Plan of November 1961 or the Stage I Plan would provide the basis. Alternative h has some appeal and is in vogue both inside and outside the intelligence community -- at least it is a large topic of discussion. In the nonintelligence community the technical information processing centers are discipline-oriented -- that is, physics, chemistry, medicine, engineering, metallurgy, and so forth. There are three potential orientations that the intelli- gence information centers could take: (1) Discipline-oriented centers: Economic information Biographic information Scientific and technical information Political information Order-of-battle information Installations information Commodities information Geographic information (2) Source-oriented: Electronic information Photographic information Open literature information Human observation (IR's) information Foreign broadcast information Signals information (3) Mission-oriented or use-oriented: Early warning CI and CE and other intelligence operations Military operations Policy support Basic intelligence production Management and planning S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 The existence of the three alternatives brings to mind the disadvan- tages of any one of them, and certainly none of them coincides with present departmental organization lines, and thereby has the same disadvantages, though lesser in degree, as alternative i or j. Alternative d is alternative c plus a facility for the referral and exchange of information over and above +hoge kinds col- iected_in Stage I of SCIPS. The need for a central systems-documenta- A;ion facility has been expressed recently in CODIB and SIGINT Committee, and reading the CODIB 5th Annual report attests to the need. Addi- Lionally such a staff could be charged with the functional responsibility of assisting actively in the interchange of substantive intelligence. In either case, however, there is an implied continuation -- unlike alternative c, which could be staged and stopped at any point. Alternative e is alternative d on a continuing basis plus a responsibility and authority for the coordination of some spec- ified range of IP activities, whether it beR & D projects, reporting formats, indexing standards, or system changes. The alternative implies coordination of CODIB-type matters on a full-time continuing basis. Alternative g is the amalgamation of present depart- mental ADP Staffs into one community operation. This would be cen- tralizing the staff functions of systems engineering and design, whereas line production functions would be centralized under alter- natives h, i, or j. The appeal is of course commonness of design and resultant compatibility of the decentralized operating systems. As in alternatives h, i, and j, the factor of divers departmental mis- sions is against centralization of functional activities. In addi- tion, there is more to do at home than the ADP staffs can get done now. Alternative f implies any or all of the aspects of alternatives a through e but none of g through j. The term "Opera- tions Research" is the present popular one for the function that provides the quantitative information input to aid management in rationally choosing between alternatives, particularly long-term decisions as to change in equipment and facilities, resource alloca- tion, and products and markets. The term "community" implies that the orientation is to common problems and to departmental problems of community-wide impact. The term "center" implies an appreciable mag- nitude and a product. This kind of activity is concerned with such questions as the following: Is the volume of information flowing, present and projected, exceeding the design potential of present sys- tems singly or combined? Is there anything in the nature and charac- teristics of new collection, processing, or production techniques that might drastically affect present methods, organizational structure, S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 or resource allocation? Are demands on operations increasing or de- creasing? Likewise, is the scope of operations increasing or decreas- ing? Are capabilities, manpower, and equipment decreasing, static, increasing, or all three if specified by area of concern such as by subject, system, organization, and so forth? Are systems of priority in existence or under development within various organizations that tend to maximize limited capability? Is there an over-all community system or priority, or does everybody concentrate on "problems" as' they occur? What are the characteristics of crash efforts to solve immediate problems? What are the potential benefits of optimizing total resources across the-community if a system of priorities is in fact necessary? 2. Needs There was never unanimity of the SCIPS Staff on any sub- stantive issue, but perhaps the greatest majority consensus developed on the immediate needs in the community, though not necessarily on the ultimate community needs or configuration. The following list contains unfinished Stage I tasks plus reactivation of some of the original tasks, plus other additional functions, all of which it is felt that the community needs, to improve intelligence information processing: a. Cleaning up of present SCIPS data base and re- cataloging for further analysis. b. Extending the data base coverage to some 200 other organizations of particular IP concern. c. Designing survey data collection updating pro- cedures to make the data base dynamic and current. d. Redesigning the machined data base system to provide cross-file correlation and on-line query response capability. e. Providing a data base query and research ser- vices to departmental operating and management people. f. Developing, publishing, and maintaining standards such as called for in this report -- that is, authoritative items and. files inven- tories, community content control code, unique information element lists, "how-to" handbooks, noncontent control element standards, and so forth. S-E-C-R-E-T Approved For Release 2004/01/15?: CIA-RDP80BOl139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 g. Special survey and analysis on a "problem" basis with individual reports thereon -- such as archiving, central reference for foreign pubs, transliteration, and so forth. h. Development of community requirements and speci- fications for specific IP techniques. i. Techniques development, monitoring, testing, and recommendation. Systems information library. k. Community-oriented technical and operational feasi- bility review of IP R & D proposals and system changes, plus ad hoc technical consultant service to constituent departments. 1. Continuous review and recommendation to USIB of functional division of responsibility for infor- mation processing. m. A means for testing proposed changes for impact on other community systems without actual trial and error (system simulation with the SCIPS data base). n. An operational training facility tailormade for community system operators and designers. 3. Conditions Some discussion of the required conditions and mechanism for accomplishment of these needs was held within the staff. The necessary conditions are the following: a. A large permanent organization with a choice of staff. Continuity of staff, full range of skills and grades with internal progres- sion, and career-volunteer membership. b. All-source acceptance of scope (including SI and CI). c. Departmental responsive reporting. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 e. Assured EDP machine support. f. Continuous departmental logistic support without departmental identification. g. Single point direction. h. Community orientation and motivation. Although the staff did not delinate a specific mechanism, there was a consensus that the needs (see 2, above) and conditions given above could be met be?t by altern ~v~~e f in the range of alternatives a to j as given in 1, above. On theh anal, no means of accomplishing this alternative and conditions is descernible by the staff. Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T II. Recommendations A. Summary Conclusion There is no single action that can be taken which will, result in the solution of the community's information processing problems. There are a series of specific actions that will result in improved intelligence production and operational effectiveness. Corporate com- munity management has devoted an inappropriately small proportion of its attention to the information processing activities and problems. The problem of duplicate processing and standardization between agen- cies is secondary to the major problem of providing more informa- tion content control and ease of access by the consuming analysts to collected information and developed intelligence. The constituent departments need help in overcoming this deficiency because no one agency can achieve independently sufficient content control over all the information that it needs. With the present quantity, variety, and scattering of unidentified processed and unprocessed information the chances of the analyst drawing the right intelligence conclusion are endangered. The results to date of applying ADP techniques and equipments to the principal intelligence information processing prob- lems in the community are not very encouraging, and no particular factor or development was discerned that would cause a dramatic change in either the near or the mid-range future, and yet the use of ADP remains one of the few hopes for real progress. B. Recommendations 1. That the DCI and USIB devote a greater proportion of their attention to the functional sector between collection and research, including thorough study of this report with a view to filling the identified short-term needs and the need for long-term planning in community information processing. 2. That a means of implementing alternatives e or f in Section I, D, 1 (Alternatives), above, be sought. Unless this means is found with the necessary conditions, it is recommended that SCIPS not be reconstituted. 3. That a, technical review panel, such as the PSAC Ad Hoc Study Panel on Non-Numerical Information Processing, 40/ be assembled to review the detailed findings of the study and provide comments thereon. - 31 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 h. That the Committee on Documentation give full consideration to the Stage I Report findings and conclusions and concern itself with determining the means of filling the identified community needs and recommenc to USIB accordingly. That the disposition of the Stage I data base be made dependent upon the following: a. That if there is a continuing full-time effort (alternatives c through g), it be charged with operating and maintaining the data base and servicing ad hoc requests therefrom and no farther general dissemination of the data base be made. b. That if there is no continuing effort (that is, alternative a, b, h, i, or j is implemented), the machined data base be made fully and equally available to all USIB principals and the nonmachined collections be destroyed or the pieces be returned to the component from which obtained. 6. That the individual departments and agencies develop and devote the best possible in-house talent that they can to document and engineer this engineerable part of the intelligence cycle. 7. That Stage I of SCIPS be considered completed. S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 25X1 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Next 1 Page(s) In Document Exempt Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T List of Illustrations [Contained in Volume II] [In Appendix A] Figure Number III a Number of Organizations Surveyed in Stage I III b Number of Organizations Surveyed by Direct Methods III c Processing Activities by Agency III d Personnel III e Percentage of Personnel Engaged in Various Process- ing Operations III f Summary of Equipment by Major Category III g Summary of Equipment by Agency III h Selected Major Equipment Categories III i Summary of Selected Equipment and Machines III j All SCIPS Items by Category III k SCIPS Items - Foreign Publications III 1 SCIPS Items by Category III m The Community Information System Galaxy III n (1) SCIPS Items by Info Type (All Items) n (2) SCIPS Items by Item Type (Foreign Publications Excluded) n (3) SCIPS Item Volumes by Info Type - in Thousands (Foreign Publications Excluded) n (4) Language Summary n (5) Described Items by Subject n (6) Area Coverage n (7) Item Physical Description - Form n III o (8) Item Physical Description - Carrier III p SCIPS Items by Class III q (0) SCIPS Items - By Major Originating Departments q (1) SCIPS Items - Army Originated q (2) SCIPS Items - Navy Originated q (3) SCIPS Items - Air Force Originated q (4) SCIPS Items - Defense Originated q (5) SCIPS Items - NSA Originated q (6) SCIPS Items - CIA Originated q (7) SCIPS Items - State Originated q (8) SCIPS Items - Other USIB and Combined Originated q (9) SCIPS Items - U.S. Non-USIB Originated q (10) SCIPS Items - U.S. Non-Gov't. Originated q (11) SCIPS Items - Foreign Gov't. Originated q (12) SCIPS Items - International Orgs and Other Originators III r (1) CIA Organizations Annual Receipts r (2) State Organizations Annual Receipts r (3) NSA Organizations Annual Receipts - 35 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Figure Number r (4) r (5) r (6) r (7) r (8) r (9) r (10) r (11) r (12) r (13) r (14) r (15) I. (16) r (17) r (13) r (la) r (20) r (21) r (22) r (23) r (24) :LI I s (1) s ('-) s (4) S (5) III t (1) t ( ') t ( i) t (!~) t (5) t (6) (7) t (e) t (9) t (10) t (11.) t (12) Army Organizations Annual Receipts Navy Organizations Annual Receipts Air Force Organizations Annual Receipts Flow to CIA Flow from CIA Flow to State Flow from State Flow Flow Flow Flow Flow Flow Flow Flow Flow Flow to NSA from NSA to Army from Army to Navy from Navy to Air Force from Air Force to Defense to NPIC Commerce Flow to Other US Government Flow to Non-US Government Elements Flow to Foreign Organizations Quantity of Information Reports Originated Initial Reproduction of Information Reports Inter-Agency Exchange of Information Reports Receipt of Hard Copy Information Reports Copies of All Agency IR's Received - By Agency Dissemination of All Agency IR's to CIA Components Dissemination of All Agency IR's to Air Force Components Dissemination of Information Reports to Army Components Dissemination of All Agency IR's to Navy Components Flow of Selected Initial Intelligence Item - Current Intelligence Digest Flow of Selected Ahalint Item - Sino-Soviet Aerospace Order of Battle Flow of Selected Ahalint Item - Combat Equipment Tech. Intell. Bulletin Flow of Published Refint Item - Intelligence Publica- tions Index Selected Item Flow - SCIPS Item EA00011A Selected Item Flow - SCIPS Item ED00318A Selected Item Flow - SCIPS Item DBOO014A Selected Item Flow - SCIPS Item EA00034A -36- 0-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Figure Number III u (1) u (2) u (3) u (4) u (5) u (6) u. (7) u (8) u (9) III v (1) v (2) v (3) v (4) v (5) v (6) v (7) v (8) v (9) v (10) v (11) v (12) v (13) v (14) v (15) v (16) v (17) v (18) v (19) v (20) v (21) v (22) v (23) v (24) v (25) v (26) v (27) v (28) v (29) v (30) v (31) Processes by Surveyed Organizations Processes by Surveyed Activities Processing of Information Reports by Item and Process Item Processing - AFIC 3H Item Processing - Special Register/OCR Item Processing - DFI/ARMY Item Processing FTD/AFSC Item Processing FTD/AFSC Item Processing FTD/AFSC Total Number of Files by Agency Average File Size by Agency Total Number of Unit Records by Agency Age of Files - All Agencies Age of Files - CIA Age of Files - State loge of Files - NSA Age of Files - Army Age of Files - Navy Age of Files - Air Force Present Annual Growth Rate of Files Projected Annual Growth Rate of Files File Purge Criteria - All Agencies File Purge Criteria - CIA File Purge Criteria - State File Purge Criteria - NSA File Purge Criteria - Army File Purge Criteria - Navy File Purge Criteria - Air Force Number of Files with Standard Format - All Agencies Manual Versus Machine Files (Number of Files by Agency) Manual Versus Machine Files (Number of Unit Records by Agency) Files by Type by Agency (Number of Files) Files by Type by Agency (Number of Unit Records) Files by Content Category (Number of Files by Agency) Files by Content Category (Number of Unit Records by Agency) Purpose of Files - All Agencies Intended File Utilization (Number of Files) Intended File Utilization (Number of Unit Records) Security Classification of Files Security Classification of Items in File (Number of Files) v (32) Security Classification of Items in File (Number of Unit Records) - 37 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 FiEure Number v (j-;) V (:3 ) v (35) v (36) v (37) v (38) V (399) v (4o) v (41-) v (4,-,) V (4_;) v (41-) v (It") v (46) V (41) v (i+8) if (449 ) V (50) v (51.) v (52) v (5-A v (71-) v (55) v (56) V (57) v (58) v (5y) v (6o) v (61) v (62) v (61;) v (64) v (65) v (66) v (6"() v (68) v (69) v (7o) v (7 ) v (72) v (T3) v 14) v (7`i) v (76) v (TO Dissemination Controls on Files (Number of Files) Consumer Access to Files Consumer Access to Files Physical Form of Files (Number of Files) Physical Form of Files (Number of Unit Records) Average File Size by Form Number of Files by Form by Agency Number of Unit Records by Form by Agency First Filing Order (Number of Files) First Filing Order (Number of Unit Records) First Filing Order (Average Number of Unit Records e'er File) First Filing Order by Agency (Number of Files) First Filing Order by Agency (Number of Unit Records) Machine Files Versus Method of Access (Number of Files) Machine Files Versus Methou of Access (Number of Unit ;'ecords ) Machine Files Versus Content Machine Records Versus Content by Agency Present Annual Growth Rate by Classification Projected Annual Growth Rate by Classification Present Annual Growth by Form for Unclassified Files Present Annual Growth by Form for Classified Files Present Annual Growth by Form of Special Files Projected Annual Growth by Form - Classified Files Projected Annual Growth by Form - Special File Form Versus Classification - Unclassified Files File Form Versus Classification - Classified File Form Versus Classification - Special Intelligence File Form Versus Classification - Compartmented Projects File Form Versus Effective Date - Punched Cards File Form Versus Effective Date - 3 x 5 Cards File Form Versus Effective Date - 4 x 6 Cards File Form Versus Effective Date - 5 x 8 Cards File Form Versus Effective Date - Documents File Form Versus Effective Date - Micro Reels File Form Versus Effective Date - Magnetic Tape File Form Versus File Order - All Punched-Card Files Versus lst Filing Order 3 x 5 Card Files Versus lst Filing Order 5 x 8 Card Files Versus lst Filing Order Hard Copy Document Files Versus lst Filing Order Magnetic Tape Files Versus lst Filing Order File Form Versus 2nd Filing Order for Subject Files File Form Versus 2nd Filing Order for Area Files File Form Versus Personality Files File Form Versus Content Category - 38 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 S-E-C-R-E-T Figure Number III w (1) Distri bution of All File Elements by Element Code w (2) Distri bution of Processing Elements by Element Code w (3) Distr Elem ibution of Document Description Elements by ent Code w (4) Distr Elem ibution of Substantive Content Elements by ent Code w (5) Occur rence of Information Elements for File Ordering III x (1) Index Files (Number of Files by Agency) x (2) Index Files (Number of Unit Records by Agency) x (3) Index Files (Number of Files by Form) x (4) Index Files (Number of Unit Records by Form) III y (1) Volum e of Requests by Receiving Agency A y (2) Perce gency ntage of Requests Originating Within Own y (3) Volum e of Requests by Category [In Appendix F] F 1 Pubin t Flow Process Chart F 2 Pubin t Organizations and Personnel Surveyed in Stage I F 3 Compo sition of Foreign Published Serials F 4 Forei gn Publications Flow Inte r-Organization Paper Flow - AID/LC- F 5 F 6 Inte r-Organization Paper Flow - F 7 Inte r-Organization Paper Flow - F 8 Inte r-Organization Paper Flow - CBP LC F 9 Inte r-Organization Paper Flow - STEP/LC S F'TD t I anization Paper Flow - Or e n F 10 g r- F 11 Inte r-Organization Paper Flow - F 12 A. Selected Item Distribution - Consolidated Translation Survey B. Selected Item Distribution - Consolidated Translation Survey 1-I F 13 F 14 F 15 Foreign Publications Processing by Surveyed Organizations F 16 Multiple Receipt of Foreign Publications F 17 Receipt of Foreign Serials by Area and Processing Organizations F 18 Multiple Receipt of FDD Received Titles F 19 Multiple Receipt of AID Received Titles F 20 File Summary - F-Pub Organizations - 39 - S-E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4 -E-C-R-E-T Approved For Release 2004/01/15 : CIA-RDP80B01139A000500240009-4